cybersecurity Crossword Puzzles

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Test Monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Test Monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Legal terminology 2019-11-19

Legal terminology crossword puzzle
Across
  1. Electronic currency.
  2. Check the safety on the internet.
  3. People with good computer knowledge and skills.
  4. A variety of data that is rapidly increasing.
  5. Computer systems, programs and data are free from threats.
  6. reality This project is the technology between reality and the virtual world.
Down
  1. Use of electronic devices to destroy, change, or steal information.
  2. Bullying and Malignant, Insulting.
  3. User avatar in a virtual world or game.
  4. Scam through the internet

10 Clues: Electronic currency.Scam through the internetCheck the safety on the internet.Bullying and Malignant, Insulting.User avatar in a virtual world or game.A variety of data that is rapidly increasing.People with good computer knowledge and skills.Computer systems, programs and data are free from threats....

Montreat College 2023-05-24

Montreat College crossword puzzle
Across
  1. What is it's school colors?
  2. What sport am I going to this college for?
  3. What is our Mascot?
  4. What is the mascots name?
  5. What is the name of Montreats honors college?
Down
  1. Which famous preacher was married in the chapel on campus?
  2. This major has been gaining a lot of popularity at Montreat.
  3. Where is Montreat Located?
  4. What popular American sport is not offered here?
  5. What is the name of Montreats popular lake?

10 Clues: What is our Mascot?What is the mascots name?Where is Montreat Located?What is it's school colors?What sport am I going to this college for?What is the name of Montreats popular lake?What is the name of Montreats honors college?What popular American sport is not offered here?Which famous preacher was married in the chapel on campus?...

General Knowledge 2025-04-16

General Knowledge crossword puzzle
Across
  1. Doctors for animals
  2. A word that can be read the same in both directions
  3. Which type of company is CrowdStrike?
  4. Missile man of India
Down
  1. Char Minar is located in which city?
  2. By which process does the excess water in plants get released?
  3. Current Home Minister of India
  4. Which country was the primary target of Trump's tariff war?
  5. Ornithology is the scientific study of?
  6. What is the term lunar related to?

10 Clues: Doctors for animalsMissile man of IndiaCurrent Home Minister of IndiaWhat is the term lunar related to?Char Minar is located in which city?Which type of company is CrowdStrike?Ornithology is the scientific study of?A word that can be read the same in both directionsWhich country was the primary target of Trump's tariff war?...

C4i4's Connect Crossword 2025-07-02

C4i4's Connect Crossword crossword puzzle
Across
  1. Future-focused maintenance strategy to reduce downtime
  2. Country widely credited for pioneering Industry 4.0.
  3. Actionable digital layer applied on physical systems.
  4. Data-driven insight method used in business intelligence.
  5. Smart factory enabler that reduces human intervention
Down
  1. Backbone technology for protecting digital infrastructure
  2. Converting analog processes to digital formats.
  3. Real-time sensor-based technology for tracking machinery performance.
  4. Seamless transfer of information across systems.
  5. Centralized location where digital info is kept safely.

10 Clues: Converting analog processes to digital formats.Seamless transfer of information across systems.Country widely credited for pioneering Industry 4.0.Actionable digital layer applied on physical systems.Smart factory enabler that reduces human interventionFuture-focused maintenance strategy to reduce downtime...

DigitalGuard: Protecting Your Online Footprint 2023-09-18

DigitalGuard: Protecting Your Online Footprint crossword puzzle
Across
  1. You need this to unlock your online world securely
  2. Doing the right thing in the digital world
  3. Defending against online threats
  4. Platforms like Facebook and Twitter for online networking
  5. Online harassment that hurts.
Down
  1. Protecting your personal space in the digital realm
  2. The process of converting data into a secret code
  3. Fraudulent attempts to obtain sensitive information
  4. Your online trail of likes, posts, and searches
  5. -An extra layer of security for online accounts

10 Clues: Online harassment that hurts.Defending against online threatsDoing the right thing in the digital worldYour online trail of likes, posts, and searches-An extra layer of security for online accountsThe process of converting data into a secret codeYou need this to unlock your online world securelyProtecting your personal space in the digital realm...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Licensed amateur radio operator
  2. Entries due NLT 11/2
  3. Test Monthly
  4. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 10/23
  2. By David C. Graham
  3. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  4. Chad's Favorite sports team?
  5. Do your Part.#BeCyberSmart
  6. Home of the 14th Flying Training Wing of Air Education and Training Command

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

CyberFun 2024-03-18

CyberFun crossword puzzle
Across
  1. Keeping personal information safe from unauthorized access
  2. A protective barrier for your computer or network
  3. Unwanted and unsolicited emails
  4. An attempt to damage or disrupt computer systems
  5. A system of interconnected computers
  6. Measures taken to protect computer systems from theft or damage
Down
  1. A harmful software that can damage your computer
  2. A secret code to access your accounts online
  3. I want to _____ my GF/BF account
  4. Illegal activities conducted using the internet

10 Clues: Unwanted and unsolicited emailsI want to _____ my GF/BF accountA system of interconnected computersA secret code to access your accounts onlineIllegal activities conducted using the internetA harmful software that can damage your computerAn attempt to damage or disrupt computer systemsA protective barrier for your computer or network...

Career Cluster Quiz 2025-05-30

Career Cluster Quiz crossword puzzle
Across
  1. includes jobs like professors and teachers
  2. includes jobs where people help design and create buildings
  3. includes jobs like factory workers and machine operators
  4. includes jobs like CEOS and managers
  5. includes jobs like hotel managers and tour guides
Down
  1. includes jobs like farmers and food scientists
  2. includes jobs like doctors and nurses
  3. includes jobs in advertising and social media
  4. includes jobs in cybersecurity and software engineering
  5. includes jobs in science, technology, engineering, and mathematics

10 Clues: includes jobs like CEOS and managersincludes jobs like doctors and nursesincludes jobs like professors and teachersincludes jobs in advertising and social mediaincludes jobs like farmers and food scientistsincludes jobs like hotel managers and tour guidesincludes jobs in cybersecurity and software engineering...

BYTETRAIL 16 2025-02-25

BYTETRAIL 16 crossword puzzle
Across
  1. Protocol for transferring files over the internet
  2. Protecting systems from unauthorized access
  3. Secures data by converting it into a coded form
  4. Small data stored on a user’s computer by a website
  5. Logical division of a drive
Down
  1. A type of scam email designed to steal user data
  2. Wireless technology for local area networking
  3. Temporary storage for faster access
  4. A device or point in a network
  5. Software that manages hardware and software resources

10 Clues: Logical division of a driveA device or point in a networkTemporary storage for faster accessProtecting systems from unauthorized accessWireless technology for local area networkingSecures data by converting it into a coded formA type of scam email designed to steal user dataProtocol for transferring files over the internet...

BYTETRAIL 16 2025-02-25

BYTETRAIL 16 crossword puzzle
Across
  1. Protocol for transferring files over the internet
  2. Protecting systems from unauthorized access
  3. Secures data by converting it into a coded form
  4. Small data stored on a user’s computer by a website
  5. Logical division of a drive
Down
  1. A type of scam email designed to steal user data
  2. Wireless technology for local area networking
  3. Temporary storage for faster access
  4. A device or point in a network
  5. Software that manages hardware and software resources

10 Clues: Logical division of a driveA device or point in a networkTemporary storage for faster accessProtecting systems from unauthorized accessWireless technology for local area networkingSecures data by converting it into a coded formA type of scam email designed to steal user dataProtocol for transferring files over the internet...

Application of Boosting And Ensemble Learning 2025-10-31

Application of Boosting And Ensemble Learning crossword puzzle
Across
  1. Detects anomalies or intrusions in networks
  2. Used in suggesting products or movies on platforms
  3. General purpose of using ensemble models
  4. Applied in detecting diseases in the medical field
  5. Helps in predicting stock prices or sales trends
  6. Used for improving decision-making processes
Down
  1. Applied in dividing images into meaningful regions
  2. Used in image and speech recognition tasks
  3. Used in identifying spam or fraudulent activities
  4. Common application in sorting data into categories

10 Clues: General purpose of using ensemble modelsUsed in image and speech recognition tasksDetects anomalies or intrusions in networksUsed for improving decision-making processesHelps in predicting stock prices or sales trendsUsed in identifying spam or fraudulent activitiesApplied in dividing images into meaningful regions...

Career Focus 2 2025-12-10

Career Focus 2 crossword puzzle
Across
  1. Sector that includes software, data and cybersecurity roles
  2. A common Registered Training Organisation in Australia
  3. Major regional NSW university, abbr.
  4. The general direction of your working life
  5. A person undertaking structured, paid training, often in non-trade areas
Down
  1. _____ OUTLOOK An industry's future demand for workers
  2. Core skill that helps you calculate trade measurements
  3. A typical trade apprenticeship.
  4. The national system of qualifications (Australian Qualifications Framework)
  5. _____ ETHIC The personal quality behind motivation and drive

10 Clues: A typical trade apprenticeship.Major regional NSW university, abbr.The general direction of your working life_____ OUTLOOK An industry's future demand for workersCore skill that helps you calculate trade measurementsA common Registered Training Organisation in AustraliaSector that includes software, data and cybersecurity roles...

Digimath 9 2025-03-05

Digimath 9 crossword puzzle
Across
  1. – The smallest unit of data in a computer
  2. – A wireless technology standard used to exchange data between devices over short distances
  3. – The practice of protecting computers and networks from digital attacks
  4. – A harmful program that can damage a computer
  5. – Used to type and input data
  6. – A screen that displays information
  7. – Physical parts of a computer
Down
  1. – A global network connecting millions of computers
  2. – A wireless connection to the internet
  3. – The "brain" of the computer
  4. – Storing data on the internet instead of a local device
  5. – Programs that run on a computer
  6. – A pointing device used to control the cursor

13 Clues: – The "brain" of the computer– Used to type and input data– Physical parts of a computer– Programs that run on a computer– A screen that displays information– A wireless connection to the internet– The smallest unit of data in a computer– A harmful program that can damage a computer– A pointing device used to control the cursor...

Intro Cybersecurity Puzzle 2 2021-09-15

Intro Cybersecurity Puzzle 2 crossword puzzle
Across
  1. Acronym for a _____ model typically used for troubleshooting communication with TCP protocol
  2. Another form of single sign on, initially supported by Twitter and Google
  3. Biometrics is an example of something you _____
  4. single sign-on authentication, think three headed dog
  5. A key fob is an example of something you _____
  6. A Command Prompt command used to test the ability of the source computer to reach a specified destination computer
  7. Robot Network
  8. Acronym for Industrial Control Systems Supervisory Software
  9. Acronym for the expectations between the service provider and the customer and describes the products or services to be delivered
Down
  1. The infected computer in a network of computers with infected malware
  2. Your location to sign in is an example of somewhere you _____
  3. the process of converting a given key into another value. If they are the same this is known as collision.
  4. An emerging technology used in cryptocurrency
  5. Acronym for "Smart Devices" over the internet
  6. Your password is an example of something you _____
  7. Acronym for Anything as a service
  8. The acronym for the masterbot centralization

17 Clues: Robot NetworkAcronym for Anything as a serviceThe acronym for the masterbot centralizationAn emerging technology used in cryptocurrencyAcronym for "Smart Devices" over the internetA key fob is an example of something you _____Biometrics is an example of something you _____Your password is an example of something you _____...

Cybersecurity Fundamentals Chapter 5 2022-10-27

Cybersecurity Fundamentals Chapter 5 crossword puzzle
Across
  1. an efficient way to store, retrieve, and analyze data.
  2. table relationship must remain consistent.
  3. a set of rules defined by the user which does not belong to one of the other categories.
  4. use to make hashing more secure.
  5. strengthens hashing algorithm by using additional secret key as input to the hash function.
  6. a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
  7. checks that data falls within the parameters defined by the database designer.
  8. all data stored in a column must follow the same format.
  9. hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
  1. refers to the accuracy, consistency, and reliability of data stored in a
  2. developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
  3. the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
  4. provide the same functionality as handwritten signature for electronics documents.
  5. all rows must have a unique identifier called primary key.
  6. equivalent to an electronic passport.
  7. standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.

16 Clues: use to make hashing more secure.equivalent to an electronic passport.table relationship must remain consistent.an efficient way to store, retrieve, and analyze data.all data stored in a column must follow the same format.all rows must have a unique identifier called primary key....

Computer Science 2023-05-05

Computer Science crossword puzzle
Across
  1. another word for virus
  2. A software that can do problem solving and learn on it's own
  3. Bill Gate's corporation
  4. Way to stop seeing ads
  5. Software to access the internet
  6. Owner of Tesla
  7. Lots of computers joined together through signals sending data
  8. The code that the nazis communicated through
  9. A software that infects your computer secretly
  10. A collection of code
  11. Code made out of 0s and 1s
Down
  1. The person who created the Universal Turing Machine
  2. A visual display which shows the code on a computer
  3. Small device that is pushed across a small area to do different actions
  4. A software addon
  5. Stops viruses from infecting your pc
  6. What you're using
  7. What you use to type
  8. What a computer uses to operate
  9. Another software that is very HOT
  10. Owner of apple

21 Clues: Owner of TeslaOwner of appleA software addonWhat you're usingWhat you use to typeA collection of codeanother word for virusWay to stop seeing adsBill Gate's corporationCode made out of 0s and 1sSoftware to access the internetWhat a computer uses to operateAnother software that is very HOTStops viruses from infecting your pc...

TTS informatika 2025-04-10

TTS informatika crossword puzzle
Across
  1. .Hak atas kekayaan intelektual
  2. .Sistem komputer untuk menelusuri informasi di internet
  3. .Profesiyang merancang tampilan dan interaksi aplikasi
  4. .Profesi yang menulis kode program
  5. .Mesin pencari paling populer saat ini
  6. .Profesi yang mengelola data dan sistem basis data
  7. .Singkatan dari Creative Commons (izin berbagi konten)
  8. .Hak yang diberikan kepada pencipta karya seni atau tulisan
  9. .Akhiran domain untuk situs komersial
  10. .Proses mengamankan data dari akses tidak sah
Down
  1. .Tempat untuk menyimpan dan berbagi video
  2. .Jenis hak kekayaan intelektual untuk merek dagang
  3. .Proses penyebaran informasi secara luas
  4. .Media sosial berbasis gambar milik Meta
  5. .Kegiatan mengambil data dari internet secara otomatis
  6. .Jenis konten digital berbentuk suara
  7. .Produk digital berbentuk tulisan panjang seperti e-book
  8. .Format file gambar umum (3 huruf)
  9. .Konten digital berbasis gambar bergerak
  10. .Profesi yang fokus pada keamanan jaringan komputer

20 Clues: .Hak atas kekayaan intelektual.Profesi yang menulis kode program.Format file gambar umum (3 huruf).Jenis konten digital berbentuk suara.Akhiran domain untuk situs komersial.Mesin pencari paling populer saat ini.Proses penyebaran informasi secara luas.Media sosial berbasis gambar milik Meta.Konten digital berbasis gambar bergerak...

Tugas Daring INF Jum'at 04/11/25 Jasmine Khairunnisa(14) X-I 2025-04-11

Tugas Daring INF Jum'at 04/11/25 Jasmine Khairunnisa(14) X-I crossword puzzle
Across
  1. Melindungi karya seni atau tulisan.
  2. Menampilkan halaman dengan URL serupa.
  3. Proses mengatur konten.
  4. Perlindungan atas penemuan teknologi.
  5. Mengecek kebenaran informasi.
  6. Engineer Ahli jaringan komputer.
  7. Penyebaran konten ke audiens luas.
  8. Analyst Menganalisis data besar.
  9. Digunakan untuk menghilangkan kata tertentu dalam pencarian.
  10. Syntax untuk pencarian kata spesifik.
Down
  1. Verifikasi keaslian konten.
  2. Menjaga keamanan data digital.
  3. Proses memanfaatkan teknologi untuk budaya.
  4. Identifikasi konten berbahaya.
  5. Budaya Konten berbasis nilai tradisional.
  6. Industri Hak untuk desain produk tertentu.
  7. Merancang perangkat lunak.
  8. Hak atas logo atau merek dagang.
  9. Lokal Media untuk menyebarluaskan budaya lokal.
  10. Konten palsu yang menyesatkan.
  11. Lokal Nilai tradisional dalam konten digital.
  12. Operator untuk pencarian di situs tertentu.
  13. Designer Merancang antarmuka pengguna.
  14. Mencari file dengan format spesifik.
  15. Hak atas ide atau karya pemikiran.

25 Clues: Proses mengatur konten.Merancang perangkat lunak.Verifikasi keaslian konten.Mengecek kebenaran informasi.Menjaga keamanan data digital.Identifikasi konten berbahaya.Konten palsu yang menyesatkan.Hak atas logo atau merek dagang.Engineer Ahli jaringan komputer.Penyebaran konten ke audiens luas.Analyst Menganalisis data besar....

IT 2025-12-02

IT crossword puzzle
Across
  1. Tool used to secure data by converting it to code
  2. Extracting useful patterns from large datasets
  3. Software that manages computer hardware
  4. The visual part of software users interact with
  5. Rules for data communication over networks
  6. Checking a system for malicious software
  7. Online space to save and access files
  8. A software-based emulation of a computer
  9. Machines simulating human intelligence
Down
  1. Keeping servers running smoothly and securely
  2. Organizing and handling structured data
  3. Find and fix errors in software
  4. A set of rules for writing computer code
  5. Algorithms that learn from data automatically
  6. Protecting computers and networks from attacks
  7. New version of a program to improve it
  8. Measures to protect systems from digital threats
  9. Blocks unauthorized access to a network
  10. Copy of data saved for recovery purposes
  11. Write instructions for a computer program

20 Clues: Find and fix errors in softwareOnline space to save and access filesNew version of a program to improve itMachines simulating human intelligenceOrganizing and handling structured dataSoftware that manages computer hardwareBlocks unauthorized access to a networkA set of rules for writing computer codeChecking a system for malicious software...

Cybersecurity Awareness Month 2025 2025-10-07

Cybersecurity Awareness Month 2025 crossword puzzle
Across
  1. Malware that attaches to files and spreads when executed
  2. Network of infected devices, often remotely controlled
  3. Method of converting data into a fixed-size string
  4. Piece of code that takes advantage of a vulnerability
  5. Hidden method of bypassing normal authentication
  6. Software that secretly gathers data without consent
  7. Potential cause of an unwanted incident
  8. Self-replicating malware that spreads without user interaction
  9. Fraudulent attempt to obtain sensitive information via email or messaging
Down
  1. Incident where data is accessed without authorization
  2. Type of malware disguised as a legitimate file
  3. Process of verifying a user's identity
  4. Impersonating another user or device to gain access
  5. General term for malicious software
  6. Part of malware that performs the malicious action
  7. Stealthy type of malware designed to hide its presence

16 Clues: General term for malicious softwareProcess of verifying a user's identityPotential cause of an unwanted incidentType of malware disguised as a legitimate fileHidden method of bypassing normal authenticationMethod of converting data into a fixed-size stringPart of malware that performs the malicious action...

Getting to Know Darnnell 2024-08-31

Getting to Know Darnnell crossword puzzle
Across
  1. French city Darnnell visited for official duty
  2. Proud native of DC
  3. Short for Darnnell's DC high school, McKinley
  4. Darnnell's bachelor’s degree from Strayer University
  5. Where Darnnell worked in cybersecurity
  6. Cruise destination Darnnell visited on Royal Caribbean
  7. Darnnell wrote books, including *Victorious!*
  8. She served during Operation Desert Storm
  9. Darnnell's graduation honor with a 4.0 GPA
  10. City Darnnell toured for Underground Railroad history
Down
  1. Key role Darnnell played in guiding teams and projects
  2. Military operation where she served
  3. Hawaiian island Darnnell visited in 2023
  4. Focused on preventing global threats; her role at DOJ
  5. Historical figure’s birthplace Darnnell visited
  6. The cornerstone of Darnnell's strength
  7. Central to Darnnell's heart and soul
  8. Language Darnnell’s learning on Duo lingo
  9. International police organization she worked with
  10. Operating system Darnnell once specialized in

20 Clues: Proud native of DCMilitary operation where she servedCentral to Darnnell's heart and soulThe cornerstone of Darnnell's strengthWhere Darnnell worked in cybersecurityHawaiian island Darnnell visited in 2023She served during Operation Desert StormLanguage Darnnell’s learning on Duo lingoDarnnell's graduation honor with a 4.0 GPA...

Wedding 2024-06-08

Wedding crossword puzzle
Across
  1. Brand of Michael’s car
  2. Michael’s job industry
  3. The number of years the couple is together
  4. Michael’s middle name
  5. Where did Michael and Stacey meet
  6. What the groom has for breakfast everyday
  7. How long has Stacey been in Australia for
  8. Stacey’s favourite food (hint: ask father of bride)
  9. City where Michael was born
  10. Honeymoon destination
  11. Mr & Mrs _____
  12. The age gap between the bride and the groom
  13. Number of their siblings all together
Down
  1. Flavour of the wedding cake
  2. Where did Michael propose
  3. Michael’s birthday month
  4. Who’s the better cook
  5. Their favourite season
  6. Michael and Stacey’s dating anniversary month (hint: Maid of Honour’s birth month)
  7. How many years did Michael live overseas for (hint: bribe Father of Groom)
  8. Favourite AFL team (hint: ask Best Man)
  9. Michael’s favourite drink
  10. Stacey’s best friend
  11. Stacey’s birthday month

24 Clues: Mr & Mrs _____Stacey’s best friendWho’s the better cookMichael’s middle nameHoneymoon destinationTheir favourite seasonBrand of Michael’s carMichael’s job industryStacey’s birthday monthMichael’s birthday monthWhere did Michael proposeMichael’s favourite drinkFlavour of the wedding cakeCity where Michael was bornWhere did Michael and Stacey meet...

Technology Words 2024-10-09

Technology Words crossword puzzle
Across
  1. Computer Camera
  2. Used to type
  3. You call people on it
  4. Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  5. Communicate with others vocally
  6. Coded software
  7. Analyze and solve problems
  8. Prevents viruses
  9. Provides entertainment
  10. Something that you can transfer digital info to
  11. Stores information
  12. Another word for apps
Down
  1. Gain unauthorized access
  2. Random Access Memory
  3. Decode a code
  4. Also an animal
  5. Requires a router
  6. Protects from cyber attacks
  7. The use of computer technology
  8. Remote connection
  9. Communication technology tool
  10. Central Processing Unit
  11. Look through the web
  12. Creates apps/websites
  13. Find locations
  14. Amount of data your internet connection can handle
  15. Accessed from a browser
  16. Protects your computer from virus
  17. Convert data into a code
  18. Social feed

30 Clues: Social feedUsed to typeDecode a codeAlso an animalCoded softwareFind locationsComputer CameraPrevents virusesRequires a routerRemote connectionStores informationRandom Access MemoryLook through the webYou call people on itCreates apps/websitesAnother word for appsProvides entertainmentCentral Processing UnitAccessed from a browser...

Sip & Solve 2025-06-06

Sip & Solve crossword puzzle
Across
  1. Aydens zodiac sign
  2. Groom’s middle name
  3. How many months apart in age is the couple
  4. Camille’s College Acronym
  5. Best Man
  6. Aydens position in football
  7. What was Camille’s childhood nickname
  8. Who said I love you first
  9. Color of Ayden’s eyes
  10. Aydens current general profession
  11. Grooms favorite fast food restaurant
  12. Maid of Honor
  13. Name of Camille’s oldest friend
  14. Camille’s favorite color
  15. Couples first date
Down
  1. What month Ayden proposed
  2. Town Ayden & Camille grew up in
  3. Bride’s new last name
  4. First concert the couple attended together
  5. Bride’s maiden name
  6. Aydens birthday month
  7. Ayden & Camille’s high school mascot
  8. Camille’s favorite TV show
  9. Camille’s college degree
  10. Couples favorite soda
  11. Ayden’s College Acronym
  12. Where the couple got engaged
  13. Camille’s birthday month
  14. How many years have the couple been together

29 Clues: Best ManMaid of HonorAydens zodiac signCouples first dateGroom’s middle nameBride’s maiden nameBride’s new last nameAydens birthday monthCouples favorite sodaColor of Ayden’s eyesAyden’s College AcronymCamille’s college degreeCamille’s birthday monthCamille’s favorite colorWhat month Ayden proposedCamille’s College AcronymWho said I love you first...

Grace & Branden 2025-09-04

Grace & Branden crossword puzzle
Across
  1. The best man’s name
  2. Branden’s middle name
  3. Branden and Grace each have blank siblings
  4. Grace’s brother recently enlisted in the blank
  5. Season they met
  6. Who the better cook is
  7. Grace’s birth month
  8. Mother of the Bride’s name
  9. Grace’s eye color
  10. Branden’s favorite hobby
  11. Grace’s unknown talent
  12. Branden’s birth month
  13. Month they got engaged
  14. Grace’s new last name
  15. Their favorite sweet treat
Down
  1. Where they met
  2. Mother of the Groom’s name
  3. Grace brews some awesome
  4. Branden’s college major
  5. Branden’s eye color
  6. The maid of honor’s name
  7. Honeymoon destination
  8. What similar job did they hold while in high school
  9. The first meal they made together
  10. The officiant’s name
  11. Years they have known each other
  12. The state Branden was born in

27 Clues: Where they metSeason they metGrace’s eye colorThe best man’s nameBranden’s eye colorGrace’s birth monthThe officiant’s nameBranden’s middle nameHoneymoon destinationBranden’s birth monthGrace’s new last nameWho the better cook isGrace’s unknown talentMonth they got engagedBranden’s college majorGrace brews some awesomeThe maid of honor’s name...

Jargon Crossword 2025-12-11

Jargon Crossword crossword puzzle
Across
  1. EU directive for cybersecurity
  2. fieldbus communication standard
  3. Key metric for manufacturing productivity
  4. network device used to connect multiple devices
  5. system used to monitor and control processes
  6. IT and OT systems integration
  7. device connecting different networks or protocols
  8. Manages and monitors factory floor operations
  9. serial communication protocol
  10. industrial network protocol
  11. Lightweight messaging protocol for IoT devices
Down
  1. Upgrading existing industrial site
  2. device detecting changes in physical conditions
  3. Period when equipment is not operational
  4. computer used to automate processes
  5. specialized database for large volumes of data
  6. New facility built from scratch
  7. processes data at or near the source
  8. Automated machine performing repetitive tasks
  9. Evaluation process for systems or risks
  10. Driverless vehicle for material transport
  11. Industrial version of the Internet of Things
  12. Deviation from expected process behavior

23 Clues: industrial network protocolIT and OT systems integrationserial communication protocolEU directive for cybersecurityfieldbus communication standardNew facility built from scratchUpgrading existing industrial sitecomputer used to automate processesprocesses data at or near the sourceEvaluation process for systems or risks...

Information Security 2025-01-06

Information Security crossword puzzle
Across
  1. Malicious Software
  2. Malware that attaches to programs
  3. Designed to lessen the risk of cyber attack
  4. Protect with up to date software, encrypted information, limited employee access
Down
  1. Protect with strong passwords and password storage
  2. Protection of ownership and reputation
  3. Acceptable Use Policy

7 Clues: Malicious SoftwareAcceptable Use PolicyMalware that attaches to programsProtection of ownership and reputationDesigned to lessen the risk of cyber attackProtect with strong passwords and password storageProtect with up to date software, encrypted information, limited employee access

Online Child Safety 2013-05-14

Online Child Safety crossword puzzle
Across
  1. a person who access internet files either legally or illegally
  2. software that allows parents to control what their children do online
  3. an unsolicited email or junk mail
  4. Malicious hardware and code
  5. any software or technique used to prevent online crime
Down
  1. an interactive forum where you can talk in real time
  2. unsolicited adds on your computer
  3. a hostile strongly worded message that may contain obscene language
  4. scam that involves a fraudulent e-mail
  5. An adult internet user who exploits children or teens
  6. online site where people can post information about themselves
  7. rules/manners of inline usage
  8. a sexual message sent to someone
  9. virtual sexual encounters
  10. The Communications Decency Act

15 Clues: virtual sexual encountersMalicious hardware and coderules/manners of inline usageThe Communications Decency Acta sexual message sent to someoneunsolicited adds on your computeran unsolicited email or junk mailscam that involves a fraudulent e-mailan interactive forum where you can talk in real time...

Technology 2023-09-15

Technology crossword puzzle
Across
  1. - Prefix for environments simulated by computers.
  2. - A global network connecting computers and devices.
  3. - Unmanned aerial vehicles used for various purposes.
  4. - A mobile device with advanced features.
  5. - Prefix for intelligence created by machines.
  6. - Wireless technology for short-range data exchange.
  7. - The study of designing and building robots.
  8. - Programs and applications used on computers.
Down
  1. - Authentication based on unique physical characteristics.
  2. - Measures to protect computer systems and data.
  3. - A small, specialized electronic device.
  4. - The process of converting data into a code to secure it.
  5. - Storage and computing resources accessed over the internet.
  6. - A set of rules for solving a problem or performing a task.
  7. - Using technology to perform tasks without human intervention.

15 Clues: - A small, specialized electronic device.- A mobile device with advanced features.- The study of designing and building robots.- Prefix for intelligence created by machines.- Programs and applications used on computers.- Measures to protect computer systems and data.- Prefix for environments simulated by computers....

Computer Science 2025-08-12

Computer Science crossword puzzle
Across
  1. – Finding and fixing errors in code.
  2. – Online storage and services accessed via the internet.
  3. – Two or more computers connected to share data.
  4. – Protecting computers and networks from attacks.
  5. – The physical parts of a computer.
  6. – Data or commands entered into a computer.
Down
  1. – A device used to type into a computer.
  2. – A global network that connects computers.
  3. – Scrambling data to keep it secure.
  4. – Information a computer gives back after processing.
  5. – Step-by-step instructions to solve a problem.
  6. – A way computers store data using 0s and 1s.
  7. – Instructions written for a computer to follow.
  8. – Programs that run on a computer.
  9. – Facts or information stored on a computer.

15 Clues: – Programs that run on a computer.– The physical parts of a computer.– Scrambling data to keep it secure.– Finding and fixing errors in code.– A device used to type into a computer.– A global network that connects computers.– Data or commands entered into a computer.– Facts or information stored on a computer....

Cybersecurity Unit 10 Crossword 2025-03-20

Cybersecurity Unit 10 Crossword crossword puzzle
Across
  1. also known as a "white list"
  2. any software that relies upon by other applications and software
  3. predefined responses for security incidents
  4. this type of restart is needed for applying updates
  5. when a system is unavailable
  6. involves assessing all existing security controls, policies and procedures
  7. step-by-step instructions for security measures
  8. ideal security position based on industry standards
  9. define requirements for security controls and configurations
Down
  1. prioritization of improving security and moving to the desired state
  2. also known as "block lists"
  3. limiting certain actions or behaviors
  4. comparing the current and desired states
  5. Comparing the current state of an organization's security position to a desired state
  6. never trust, always verify
  7. these types of apps are outdated and older

16 Clues: never trust, always verifyalso known as "block lists"also known as a "white list"when a system is unavailablelimiting certain actions or behaviorscomparing the current and desired statesthese types of apps are outdated and olderpredefined responses for security incidentsstep-by-step instructions for security measures...

ISC 3 2025-03-24

ISC 3 crossword puzzle
Across
  1. Mandates EU data protection
  2. Governs California consumer rights
  3. Agency sets cybersecurity benchmarks
Down
  1. Health privacy
  2. Card security

5 Clues: Card securityHealth privacyMandates EU data protectionGoverns California consumer rightsAgency sets cybersecurity benchmarks

Cybersecurity Fundamental Chapter 2 2022-11-24

Cybersecurity Fundamental Chapter 2 crossword puzzle
Across
  1. a type of storage device retains the data when no user or process is using it.
  2. cyber criminals can capture, save and steal data in-transit.
  3. uses removable media to physically move data from one computer to another.
  4. procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
  5. devices, and product available to protect information systems and fend off cyber criminals.
  6. verifies the identify of a user to prevent unauthorized access.
  7. uses cable to transmit data.
Down
  1. verifies determine which resources users can access, along with the operations that users can perform.
  2. is the principle used to describe the need to maintain availability of information systems and services at all times.
  3. involves sending information from one device to another.
  4. cyber criminals can use rogue or unauthorized devices to interrupt data availability.
  5. cyber criminals can intercept and alter data in-transit.
  6. aware and knowledgeable about their world and the dangers that threaten their world.
  7. keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
  8. prevents the disclosure of information to unauthorize people, resource and processes.
  9. uses the airways to transmit data.

16 Clues: uses cable to transmit data.uses the airways to transmit data.involves sending information from one device to another.cyber criminals can intercept and alter data in-transit.cyber criminals can capture, save and steal data in-transit.verifies the identify of a user to prevent unauthorized access....

SCIENCE AND TECHNOLOGY 2024-03-29

SCIENCE AND TECHNOLOGY crossword puzzle
Across
  1. Protection of computer systems from theft or damage.
  2. The study of living organisms.
  3. Intelligence Teaching computers to think and learn.
  4. introducing new ideas or methods.
  5. A series of steps to accomplish a task.
Down
  1. Energy Energy derived from naturally replenished resources like sunlight, wind, or water.
  2. Connecting computers or devices to communicate.
  3. Study of heredity and variation in living organisms.
  4. Distinctive features or traits.
  5. A community of living organisms and their environment.
  6. Using machines to perform tasks.
  7. Genetic material containing instructions for living organisms' development and traits.

12 Clues: The study of living organisms.Distinctive features or traits.Using machines to perform tasks.introducing new ideas or methods.A series of steps to accomplish a task.Connecting computers or devices to communicate.Study of heredity and variation in living organisms.Protection of computer systems from theft or damage....

cyber threat actors, attacks & motivations 2023-12-18

cyber threat actors, attacks & motivations crossword puzzle
Across
  1. Where to report a a cybersecurity incident at RDA
  2. It's something RDA is known for, but in the social form
  3. Homophone of a much loved pass time
  4. Supported by a government
  5. Australian Government agency that houses the ACSC
  6. Cybercrime that involves encryption and blackmail
  7. The name of the cipher you may or may not have succeeded in solving
  8. Furtum identitatis
Down
  1. A brute force technique used by cybercriminals
  2. An important aspect of security as a capability that isn't cyber
  3. Morris distributed this via the internet in 1988
  4. Something you must protect in the digital age
  5. A characteristic of cybercriminal groups
  6. Cybercriminal motivated by ideology
  7. A leading motivator for cybercriminals
  8. Malicious software used to establish remote access
  9. It's everyone's responsibility

17 Clues: Furtum identitatisSupported by a governmentIt's everyone's responsibilityHomophone of a much loved pass timeCybercriminal motivated by ideologyA leading motivator for cybercriminalsA characteristic of cybercriminal groupsSomething you must protect in the digital ageA brute force technique used by cybercriminals...

Source Vs Machine Code 2025-11-12

Source Vs Machine Code crossword puzzle
Across
  1. – Low-level software stored in ROM
  2. – Easy for humans to understand (like source code)
  3. – A single command in a program
  4. – Person who writes source code
  5. – Example of a high-level programming language
  6. – Uses programming to analyze and interpret data
  7. – Job that designs or builds software applications
  8. – Field that protects systems from digital attacks
Down
  1. – Coder who designs and codes video games
  2. – Field that creates and maintains websites
  3. – System using only 0 and 1
  4. – Part of the computer that executes machine code
  5. – Another term for bits (0s and 1s)
  6. – Hard or impossible to modify (like machine code)
  7. – Read-Only Memory that stores permanent instructions
  8. – Programs and applications created using source code
  9. – The physical components of a computer

17 Clues: – System using only 0 and 1– A single command in a program– Person who writes source code– Low-level software stored in ROM– Another term for bits (0s and 1s)– The physical components of a computer– Coder who designs and codes video games– Field that creates and maintains websites– Example of a high-level programming language...

User responsibility 2025-10-14

User responsibility crossword puzzle
Across
  1. practicing ethical respectful and safe behavior online
  2. the trace of all your online activities
  3. respecting differences and opinions in digital spaces
Down
  1. protecting systems and data from digital attacks
  2. accepting consequences for online actions
  3. checking accuracy before believing or sharing
  4. settings tools that control who can see your information
  5. false information shared without verifying facts

8 Clues: the trace of all your online activitiesaccepting consequences for online actionschecking accuracy before believing or sharingprotecting systems and data from digital attacksfalse information shared without verifying factsrespecting differences and opinions in digital spacespracticing ethical respectful and safe behavior online...

Cybersecurity Awareness Month 2023-09-20

Cybersecurity Awareness Month crossword puzzle
Across
  1. Personally Identifiable Information
  2. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
  3. Type of malware that threatens to expose information unless a payment is made
  4. Health Insurance Portability and Accountability Act
  5. An email that tricks you into giving up your passphrase
Down
  1. A weakness in a program or system that can be exploited
  2. Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
  3. CWRU classifies information as: public, internal-use, and _______
  4. Install operating system security ________ regularly
  5. The process of changing plain text to cipher text using an algorithm
  6. A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems

11 Clues: Personally Identifiable InformationHealth Insurance Portability and Accountability ActInstall operating system security ________ regularlyA weakness in a program or system that can be exploitedAn email that tricks you into giving up your passphraseCWRU classifies information as: public, internal-use, and _______...

TECHNOLOGY 2025-01-29

TECHNOLOGY crossword puzzle
Across
  1. easy to use or understand
  2. the use of machines to perform tasks without human intervention
  3. knowledgeable about modern technology
  4. the trail of data left by users on the internet
  5. a small electronic device with a specific function
Down
  1. measures taken to protect systems from cyber threats
  2. an important discovery or development
  3. introducing new ideas or methods
  4. extremely modern and advanced
  5. Intelligence (AI) the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsan important discovery or developmentknowledgeable about modern technologythe trail of data left by users on the interneta small electronic device with a specific functionmeasures taken to protect systems from cyber threats...

17 Miftahul Huda 8i 2025-10-16

17 Miftahul Huda 8i crossword puzzle
Across
  1. Program untuk mengatur dan mempercepat unduhan file.
  2. Proses mengubah data agar tidak bisa dibaca orang lain.
  3. Memuat ulang halaman web agar tampil terbaru.
  4. Program berbahaya yang bisa merusak sistem komputer.
  5. Salinan data untuk mencegah kehilangan.
  6. Upaya penipuan untuk mencuri data pribadi lewat internet.
Down
  1. Penanda halaman web agar mudah dikunjungi lagi.
  2. Perlindungan sistem komputer dari serangan digital.
  3. Proses menampilkan gambar atau halaman web di layar.
  4. Jalan pintas untuk membuka program atau file cepat.

10 Clues: Salinan data untuk mencegah kehilangan.Memuat ulang halaman web agar tampil terbaru.Penanda halaman web agar mudah dikunjungi lagi.Perlindungan sistem komputer dari serangan digital.Jalan pintas untuk membuka program atau file cepat.Program untuk mengatur dan mempercepat unduhan file.Proses menampilkan gambar atau halaman web di layar....

Career Focus 2 2025-11-05

Career Focus 2 crossword puzzle
Across
  1. Core skill that helps you calculate trade measurements
  2. A common Registered Training Organisation in Australia
  3. Major regional NSW university, abbr.
  4. OUTLOOK An industry's future demand for workers
  5. A person undertaking structured, paid training, often in non-trade areas
  6. The national system of qualifications (Australian Qualifications Framework)
  7. ETHIC The personal quality behind motivation and drive
Down
  1. The general direction of your working life
  2. Sector that includes software, data and cybersecurity roles
  3. A typical trade apprenticeship.

10 Clues: A typical trade apprenticeship.Major regional NSW university, abbr.The general direction of your working lifeOUTLOOK An industry's future demand for workersCore skill that helps you calculate trade measurementsA common Registered Training Organisation in AustraliaETHIC The personal quality behind motivation and drive...

Career Clusters Crossword 2024-12-20

Career Clusters Crossword crossword puzzle
Across
  1. Promotes whole health in individuals through an array of services
  2. Focuses on administration, strategic planning, and entrepreneurship
  3. Designing and executing the built environment
  4. Encompasses roles in local, state, and federal governments
  5. Movement of goods over air, ground, and water
Down
  1. Fostering learning from early-childhood to adulthood
  2. Supports plant and animal based industries
  3. Promoting products and brands
  4. Developing digital systems such as AI, data analytics, and cybersecurity
  5. Renewable fuel production, power generation, utilities
  6. Includes services related to food, travel, and lodging
  7. Aims to produce high quality goods
  8. Banking, lending, corporate, debt management
  9. Includes film, fashion, journalism, interior design, and more

14 Clues: Promoting products and brandsAims to produce high quality goodsSupports plant and animal based industriesBanking, lending, corporate, debt managementDesigning and executing the built environmentMovement of goods over air, ground, and waterFostering learning from early-childhood to adulthoodRenewable fuel production, power generation, utilities...

E-Commerce Crossword 2024-04-19

E-Commerce Crossword crossword puzzle
Across
  1. digital shopping cart used to hold items before purchase
  2. online advertisements targeted to specific users
  3. short for "electronic commerce"
  4. process of securely storing and transmitting customer data
  5. mobile app used to browse and purchase products online
  6. process of fulfilling an online order by delivering it
  7. process of returning a purchased item online
Down
  1. detailed description of a product listed online
  2. positive online review left by a satisfied customer
  3. online marketplace where sellers and buyers connect
  4. discounts offered online to attract customers
  5. secure online payment method using a credit card
  6. person who influences buying decisions through online reviews
  7. images used online to showcase products

14 Clues: short for "electronic commerce"images used online to showcase productsprocess of returning a purchased item onlinediscounts offered online to attract customersdetailed description of a product listed onlineonline advertisements targeted to specific userssecure online payment method using a credit card...

Internet Safety Crossword 2023-04-20

Internet Safety Crossword crossword puzzle
Across
  1. a part of a computer system or network which is made to block unwanted access
  2. the state of being free from public attention
  3. a piece of information needed to log in to websites
  4. information made available by a website
  5. never share personal information online
  6. unwanted messages
  7. bulling done over the internet
  8. facts given about something or someone
Down
  1. someone that hacks
  2. websites and apps that enable users to create and share content EX.SnapChat
  3. a world wide computer network
  4. the state of being protected against the criminal use of electronic data
  5. like a cold for your computer
  6. be careful what you make public

14 Clues: unwanted messagessomeone that hacksa world wide computer networklike a cold for your computerbulling done over the internetbe careful what you make publicfacts given about something or someoneinformation made available by a websitenever share personal information onlinethe state of being free from public attention...

Information Management 2025-09-23

Information Management crossword puzzle
Across
  1. Identifying risks and taking precautions to avoid them.
  2. Anything valuable that isn’t natural.
  3. A system that supports functions of Information Management.
  4. Anything created with someone’s mind.
Down
  1. The protection of networks, and data.
  2. A business that involves people, processes that collects data.
  3. An unbiased inspection to review safety, integrity, and accuracy of information.
  4. The accuracy of data.
  5. A practice not knowing outside the company.

9 Clues: The accuracy of data.The protection of networks, and data.Anything valuable that isn’t natural.Anything created with someone’s mind.A practice not knowing outside the company.Identifying risks and taking precautions to avoid them.A system that supports functions of Information Management....

UNODC TOT Crossword 2025-11-11

UNODC TOT Crossword crossword puzzle
Across
  1. The hackers we aim to defend against
  2. The regional center name abbreviation under UNODC
  3. The brilliant course instructor guiding us
  4. The mandatory course we completed before the TOT
Down
  1. The country hosting our training and collaboration
  2. The field our expertise revolves around
  3. The second participating institution in the training
  4. The center in Doha where the TOT course is conducted
  5. The first participating institution in the training

9 Clues: The hackers we aim to defend againstThe field our expertise revolves aroundThe brilliant course instructor guiding usThe mandatory course we completed before the TOTThe regional center name abbreviation under UNODCThe country hosting our training and collaborationThe first participating institution in the training...

Cyber Security 2023-11-07

Cyber Security crossword puzzle
Across
  1. Logs and Event Management provided in JICA Project
  2. Set of rules, policies and operations that a company uses to achieve its business goals
  3. Compliance is act of following rules, laws and regulations
  4. Network Monitoring system short form
  5. Term that Deals with Organization secret data
  6. Operates continuously and Data visible 24*7
  7. Next Generation Firewall brand provided in JICA Project
Down
  1. Term used to define Weakness
  2. Keeping Information and Communication Private
  3. Terms used for Logging all the user activity
  4. Keeping Organizational information accurate and free of errors
  5. Authorizing a Person to perform certain activity
  6. cybersecurity standards for OT technology
  7. Role Based Access Control

14 Clues: Role Based Access ControlTerm used to define WeaknessNetwork Monitoring system short formcybersecurity standards for OT technologyOperates continuously and Data visible 24*7Terms used for Logging all the user activityKeeping Information and Communication PrivateTerm that Deals with Organization secret data...

TIAA - SMT Crossword 2024-09-19

TIAA - SMT Crossword crossword puzzle
Across
  1. One of 5 Latin American countries that celebrates their independence on sept 15
  2. TIAA strategic partner
  3. First name of a T3CON presenter
Down
  1. TIAA office location that is closing
  2. Female associates and allies BRG
  3. CS&T Drive24 initiative
  4. agile, cybersecurity, data, AI and emerging tech

7 Clues: TIAA strategic partnerCS&T Drive24 initiativeFirst name of a T3CON presenterFemale associates and allies BRGTIAA office location that is closingagile, cybersecurity, data, AI and emerging techOne of 5 Latin American countries that celebrates their independence on sept 15

Meet UAlbany 2023-07-26

Meet UAlbany crossword puzzle
Across
  1. Nonprofit who manages the UAlbany ID Card Office
  2. The last C in CEHC stands for
  3. Online platform for mandatory compliance trainings
  4. UAlbany's free safety app for your smartphone
  5. The number of libraries on the UAlbany Uptown Campus
  6. The Great Dane
  7. Renowned American architect and designer of main campus
  8. Symbol of commitment to Latina/o student success
Down
  1. Name of the weekly which facilitates discussions on ecological literacy and funding opportunities
  2. College of Arts &
  3. Office responsible for preservation, modernization, and construction that enable the University at Albany to achieve its objectives
  4. Colonial, Dutch, State, and Indigenous
  5. TAS stands for? Hint: $$

13 Clues: The Great DaneCollege of Arts &TAS stands for? Hint: $$The last C in CEHC stands forColonial, Dutch, State, and IndigenousUAlbany's free safety app for your smartphoneNonprofit who manages the UAlbany ID Card OfficeSymbol of commitment to Latina/o student successOnline platform for mandatory compliance trainings...

CIA 2025-05-08

CIA crossword puzzle
Across
  1. You can make up to _________ a year
  2. The CIA helps students develop mission _____ while finishing their degrees
  3. You must take a _________ security clearance process.
  4. To serve you need to be a U.S. ________ and have a bachelors degree
  5. It was created to coordinate the nations _______ activities
Down
  1. Headquarters is located in Langley ______
  2. Some careers are analysis, auditing, ________, and engineering
  3. It doesn´t operate with traditional __________
  4. The CIA was founded in _______
  5. How was the CIA founded_______
  6. CIA recruits through their online portal __________
  7. CIA serves the ______________
  8. The CIA gathers and ________ intelligence about foreign countries

13 Clues: CIA serves the ______________The CIA was founded in _______How was the CIA founded_______You can make up to _________ a yearHeadquarters is located in Langley ______It doesn´t operate with traditional __________CIA recruits through their online portal __________You must take a _________ security clearance process....

AUDITOR 4.0 TRENDS AND CHALLENGES 2023-06-06

AUDITOR 4.0 TRENDS AND CHALLENGES crossword puzzle
Across
  1. Use of technologies to improve accuracy.
  2. Another word for difficulties experienced.
  3. Increasing use of online and cloud based tools increases this item.
Down
  1. One of the benefits of ESG reporting.
  2. Whats new in the industry?
  3. New technology used by companies for financial reporting.
  4. Profession being explored.

7 Clues: Whats new in the industry?Profession being explored.One of the benefits of ESG reporting.Use of technologies to improve accuracy.Another word for difficulties experienced.New technology used by companies for financial reporting.Increasing use of online and cloud based tools increases this item.

CIS 178 Participation 3 Security 2023-07-17

CIS 178 Participation 3 Security crossword puzzle
Across
  1. computers or devices infected with malicious software
  2. collects and transmits sensitive information
  3. form of bullying that occurs online
  4. spreads from one computer to another
  5. virtual private network, secure online service
  6. "advertising-supported software" designed to display unwanted advertisements
  7. malicious software
  8. intrudes on a device remotely
  9. protecting digital assets
  10. development/use of computer systems/networks to store information.
  11. tricks users into clicking a disguised link
Down
  1. application designed to monitor network traffic
  2. disguises itself as a legitimate program or software
  3. uses bait to lure unsuspecting victims
  4. uses fingerprints, facial recognition, etc. to log into a device
  5. encrypts user's files or locks computer until a ransom is paid
  6. media manipulation, alter images/video for fake perception
  7. actions aimed to infiltrate computer networks.
  8. method of scrambling data for authorized users
  9. fake, disguised, bogus

20 Clues: malicious softwarefake, disguised, bogusprotecting digital assetsintrudes on a device remotelyform of bullying that occurs onlinespreads from one computer to anotheruses bait to lure unsuspecting victimstricks users into clicking a disguised linkcollects and transmits sensitive informationvirtual private network, secure online service...

Sip & Solve 2025-06-06

Sip & Solve crossword puzzle
Across
  1. Camille’s birthday month
  2. Aydens birthday month
  3. Ayden’s College Acronym
  4. Couples favorite soda
  5. How many years have the couple been together
  6. What was Camille’s childhood nickname
  7. Bride’s maiden name
  8. Where the couple got engaged
  9. Couples first date
  10. Best Man
  11. How many months apart in age is the couple
  12. Name of Camille’s oldest friend
  13. Aydens current general profession
  14. Camille’s college degree
  15. First concert the couple attended together
  16. Aydens zodiac sign
Down
  1. Camille’s favorite TV show
  2. Camille’s favorite color
  3. Aydens position in football
  4. What month Ayden proposed
  5. Groom’s middle name
  6. Maid of Honor
  7. Ayden & Camille’s high school mascot
  8. Bride’s new last name
  9. Town Ayden & Camille grew up in
  10. Who said I love you first
  11. Color of Ayden’s eyes
  12. Grooms favorite fast food restaurant
  13. Camille’s College Acronym

29 Clues: Best ManMaid of HonorCouples first dateAydens zodiac signGroom’s middle nameBride’s maiden nameAydens birthday monthCouples favorite sodaBride’s new last nameColor of Ayden’s eyesAyden’s College AcronymCamille’s birthday monthCamille’s favorite colorCamille’s college degreeWhat month Ayden proposedWho said I love you firstCamille’s College Acronym...

Sarah and Liam's wedding 2025-07-10

Sarah and Liam's wedding crossword puzzle
Across
  1. The month they first met
  2. The country they visited last summer
  3. The month the couple got engaged
  4. The first movie they watched as a couple
  5. The city they met in
  6. What did the groom study in college
  7. Where did the proposal happen
  8. Sarah's middle name
  9. The flavor of their wedding cake
  10. number of pets the couple has
  11. The stone in the engagement ring
Down
  1. The color of the bridesmaid dresses
  2. The street Sarah and Liam call home
  3. The bride's maiden name
  4. How many years the couple has been together
  5. Their first dance song
  6. First concert they saw together
  7. name of Sarah's Maid of Honor
  8. Sarah's star sign
  9. The instrument the groom played in high school
  10. The name of their dog
  11. Name of the Best Man

22 Clues: Sarah's star signSarah's middle nameThe city they met inName of the Best ManThe name of their dogTheir first dance songThe bride's maiden nameThe month they first metname of Sarah's Maid of HonorWhere did the proposal happennumber of pets the couple hasFirst concert they saw togetherThe month the couple got engagedThe flavor of their wedding cake...

WHAT LIES AHEAD 2025-11-20

WHAT LIES AHEAD crossword puzzle
Across
  1. New alloys or concrete that repairs itself.
  2. Very large, rapidly growing cities (50M+).
  3. Urban areas using technology for efficiency.
  4. Clean, very inexpensive nuclear energy.
  5. New, wealthy areas separate from declining cities.
  6. The engineering that makes all structures work together.
  7. Robotic clothing that helps workers.
  8. Machines' ability to make decisions and automate design.
  9. The issue of public money for infrastructure.
  10. Very fast train in vacuum tubes.
Down
  1. The large amounts of information from sensors.
  2. A structure's ability to resist disasters.
  3. Environmental change affecting cities
  4. Means of transport that can be automated (driverless).
  5. Small unmanned aircraft for delivery or building.
  6. Protection against hacking of connected systems.
  7. Network of sensors that exchange data in the infrastructure.
  8. Building and public works.
  9. Small devices to monitor infrastructure health.
  10. Non-fossil resources like solar or fusion

20 Clues: Building and public works.Very fast train in vacuum tubes.Robotic clothing that helps workers.Environmental change affecting citiesClean, very inexpensive nuclear energy.Non-fossil resources like solar or fusionA structure's ability to resist disasters.Very large, rapidly growing cities (50M+).New alloys or concrete that repairs itself....

PROFESI TKJ 2025-05-03

PROFESI TKJ crossword puzzle
Across
  1. Orang yang bertugas memasang dan memelihara jaringan komputer
  2. Orang yang menulis dan mengembangkan kode perangkat lunak
  3. Orang yang memperbaiki dan merakit komputer
  4. Pembuat dan pengelola situs web
  5. Pengelola dan pengawas sistem server dalam sebuah jaringan
Down
  1. Ahli yang merancang dan mengelola sistem jaringan skala besar
  2. Profesional yang menjaga keamanan jaringan dan data digital
  3. Orang yang memasang perangkat dan kabel jaringan
  4. Petugas yang memberikan bantuan teknis kepada pengguna komputer
  5. Penasihat teknis dalam bidang teknologi informasi untuk perusahaan

10 Clues: Pembuat dan pengelola situs webOrang yang memperbaiki dan merakit komputerOrang yang memasang perangkat dan kabel jaringanOrang yang menulis dan mengembangkan kode perangkat lunakPengelola dan pengawas sistem server dalam sebuah jaringanProfesional yang menjaga keamanan jaringan dan data digital...

Privacy & Security 2022-11-01

Privacy & Security crossword puzzle
Across
  1. a malware designed to deny a user or organization access to files on their computer
  2. the art of protecting networks, devices, and data from unauthorized access
  3. process of identifying a user’s identity
  4. the right to be let alone
Down
  1. common examples are viruses & trojans
  2. coding protecting information from hackers
  3. (2 words) information about an individual
  4. compromise of security
  5. a set of policies and procedures for systematically managing an organization's sensitive data
  6. international organization for standardization

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses & trojansprocess of identifying a user’s identity(2 words) information about an individualcoding protecting information from hackersinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

work 2024-03-22

work crossword puzzle
Across
  1. Novel ideas and creativity.
  2. Administration and control of technological resources.
  3. Organization and oversight of tasks to achieve objectives.
  4. Advanced academic qualification.
  5. Examination and interpretation of information.
  6. Protection of digital systems and data.
  7. Long-term planning for achieving goals.
Down
  1. Investigation into government or organizational policies.
  2. Acronym for a specific department or field.
  3. Digital Academy Educational institution focusing on technology.
  4. Rules and guidelines governing behavior or activities.
  5. Possibly an acronym for a certain system or process.
  6. Techniques and processes for conducting studies.
  7. Sustainable use of ocean resources for economic growth.
  8. Government framework for science, technology, and innovation.
  9. Conference or meeting on a national scale.
  10. Legal rights over creations of the mind.
  11. Mandates Responsibilities of a certain organization.
  12. 2024 Event showcasing science, technology, and innovation in a specific year.

19 Clues: Novel ideas and creativity.Advanced academic qualification.Protection of digital systems and data.Long-term planning for achieving goals.Legal rights over creations of the mind.Conference or meeting on a national scale.Acronym for a specific department or field.Examination and interpretation of information....

Challenges Related to Community Safety in the Philippines 2024-02-29

Challenges Related to Community Safety in the Philippines crossword puzzle
Across
  1. Safety, The Philippines has one of the highest rates of road accidents and fatalities in Southeast Asia. This due to factors such as poor road infrastructure, reckless driving, and inadequate enforcement of traffic laws.
  2. Disasters, The Philippines is prone to __________ such as typhoons, earthquakes, and volcanic eruptions and it can result to significant loss of life, property damage, and also hinder economic development.
  3. and Violence, This is a major challenge in the Philippines includes robbery, as well as more serious crimes such as drug trafficking, terrorism, and political violence.
  4. is responsible for fire prevention, suppression, and investigation.
  5. is the primary law enforcement agency in the country.
  6. Awareness, This includes educating the public on disaster preparedness, crime prevention, road safety and cybersecurity as well as encouraging community participation in maintaining peace and order.
Down
  1. the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or
  2. is responsible for disaster preparedness, response, and recovery.
  3. With the increasing use of digital technologies in the Philippines has experienced a rise in cybercrime, including online scams, identity theft, and hacking.
  4. implements crime prevention programs and campaigns, such as the Barangay Peacekeeping Action Team (BPAT).

10 Clues: is the primary law enforcement agency in the country.is responsible for disaster preparedness, response, and recovery.is responsible for fire prevention, suppression, and investigation.the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or...

Classwork Crossword Puzzle 2021-09-20

Classwork Crossword Puzzle crossword puzzle
Across
  1. average per year
  2. median of cybersecurity engineer
  3. the second-longest river
Down
  1. circumference of mars
  2. critically endangered species

5 Clues: average per yearcircumference of marsthe second-longest rivercritically endangered speciesmedian of cybersecurity engineer

Career Options 2022-11-11

Career Options crossword puzzle
Across
  1. A person trained to give guidance on personal, social, or psychological problems.
  2. Joins two pieces of metal together.
  3. Types include voice, screen, stage or character.
  4. People in these jobs work to protect our communities.
  5. Protects computer systems, networks and data.
  6. Transports goods all over the country.
  7. Repairs and maintains machinery, motors, etc.
Down
  1. A scientist who studies fossils.
  2. Health of the human body.
  3. Jobs in this field include coaches, announcers and recruiters.
  4. Performs beauty treatment regimens on hair, skin and nails.
  5. Invent, design and maintain machines, structures and data systems.
  6. Defends the U.S.and its allies.
  7. Set up situations in which students can learn effectively.

14 Clues: Health of the human body.Defends the U.S.and its allies.A scientist who studies fossils.Joins two pieces of metal together.Transports goods all over the country.Protects computer systems, networks and data.Repairs and maintains machinery, motors, etc.Types include voice, screen, stage or character....

Computer Science Crossword 2024-03-21

Computer Science Crossword crossword puzzle
Across
  1. The main page of a website.
  2. A security system that controls incoming and outgoing network traffic.
  3. A small file saved by websites to remember user information.
  4. Wireless internet connection.
  5. A step-by-step procedure for calculations.
  6. A program used to navigate the internet.
  7. A list of commands executed by a program or scripting engine.
Down
  1. A scam to steal personal information via email.
  2. Information processed or stored by a computer.
  3. Finding and fixing errors in code.
  4. Protection for computer systems and networks.
  5. A way of representing data using only two digits, 0 and 1.
  6. The ability to read and write.
  7. The address of a web page.

14 Clues: The address of a web page.The main page of a website.Wireless internet connection.The ability to read and write.Finding and fixing errors in code.A program used to navigate the internet.A step-by-step procedure for calculations.Protection for computer systems and networks.Information processed or stored by a computer....

Blue Print 2024-09-11

Blue Print crossword puzzle
Across
  1. Person who flies airplanes for a job
  2. Person who promotes products or brands online
  3. Animal expert who might work at a wildlife park
  4. Person who creates new computer and console games
  5. Cook who prepares food for big events
  6. Therapist who teaches exercises to heal injuries
  7. Creator of dance routines for shows or videos
  8. Writer who reports on the latest clothing trends
Down
  1. Computer expert who protects against online threats
  2. Someone who runs for office to make laws
  3. Designer of bridges, roads, and buildings
  4. Problem-solver who works to protect nature
  5. Person in charge of making movies
  6. Sound expert who helps make songs in a studio

14 Clues: Person in charge of making moviesPerson who flies airplanes for a jobCook who prepares food for big eventsSomeone who runs for office to make lawsDesigner of bridges, roads, and buildingsProblem-solver who works to protect natureSound expert who helps make songs in a studioPerson who promotes products or brands online...

Oklahoma Computer Science 2025-05-13

Oklahoma Computer Science crossword puzzle
Across
  1. A tool to organize, calculate, and analyze data
  2. A unique number for each device on a network
  3. Programs and apps that run on a computer
  4. A list of steps to solve a problem
  5. A group of connected computers that share information
  6. Information that can be collected and used
  7. Finding and fixing errors in code
Down
  1. Protecting devices and data from digital threats
  2. A device that sends data between computers and networks
  3. Code that repeats instructions
  4. A value in a program that can change
  5. Technology doing tasks without human help
  6. Showing only specific data based on rules
  7. The physical parts of a computer

14 Clues: Code that repeats instructionsThe physical parts of a computerFinding and fixing errors in codeA list of steps to solve a problemA value in a program that can changePrograms and apps that run on a computerTechnology doing tasks without human helpShowing only specific data based on rulesInformation that can be collected and used...

btyetrails4 2025-02-25

btyetrails4 crossword puzzle
Across
  1. Protecting data from unauthorized access
  2. A system software managing computer hardware
  3. The process of transferring data from one device to another
  4. Permanently removing files from a storage device
Down
  1. A type of scam email designed to steal user data
  2. Storing data over the internet instead of local systems
  3. A web address used to access websites
  4. A software that helps navigate web pages
  5. Company that provides internet access

9 Clues: A web address used to access websitesCompany that provides internet accessProtecting data from unauthorized accessA software that helps navigate web pagesA system software managing computer hardwareA type of scam email designed to steal user dataPermanently removing files from a storage deviceStoring data over the internet instead of local systems...

tech 2025-12-12

tech crossword puzzle
Across
  1. (Anything an organization possesses that needs protection)
  2. (A security device that controls network traffic)
  3. (A key 'P' in the cybersecurity framework)
  4. (A computing system hosted online)
  5. (To watch network activity and traffic)
  6. (A software update to repair bugs or vulnerabilities)
  7. (A deception tool to detect an attack)
  8. (Network communication endpoints)
Down
  1. (Bad software installed on a computer)
  2. (A self-replicating malware program)
  3. (Relates to system processes and authentication)
  4. (Protecting data by converting it into secret code)
  5. (Unauthorized user with malicious intent)
  6. (A server that sits between a computer and the web to hide an IP address)
  7. (A notification that an attack or vulnerability has been detected)

15 Clues: (Network communication endpoints)(A computing system hosted online)(A self-replicating malware program)(Bad software installed on a computer)(A deception tool to detect an attack)(To watch network activity and traffic)(Unauthorized user with malicious intent)(A key 'P' in the cybersecurity framework)(Relates to system processes and authentication)...

AI Cyberspace 2024-10-15

AI Cyberspace crossword puzzle
Across
  1. Political factors influencing behavior in cybersecurity
  2. Measures to protect against cyber threats.
  3. AI enabling systems to learn from data.
  4. Total points vulnerable to cyber attacks.
Down
  1. Actions in cyberspace for security or attack.
  2. Actions to exploit vulnerabilities in systems.
  3. Intelligence Machines simulating human intelligence processes.

7 Clues: AI enabling systems to learn from data.Total points vulnerable to cyber attacks.Measures to protect against cyber threats.Actions in cyberspace for security or attack.Actions to exploit vulnerabilities in systems.Political factors influencing behavior in cybersecurityIntelligence Machines simulating human intelligence processes.

FOP 2023-04-01

FOP crossword puzzle
Across
  1. SOCA’s ________ department is the first point of contact with outside organizations.
  2. DISM’s SIG.
  3. Gryphons plan & organize ______-___-___ competitions.
  4. SPAI attended and presented at the ____ Conference.
  5. SEED hosts the ___-___-Series.
  6. SOCA is In charge of ________ relations.
  7. ______ organized the SOC Open House.
Down
  1. Gryphons aims to promote ________ to students that are passionate about it.
  2. SPAI created its own Project _____.
  3. SPAI is part of the AI Singapore Student ____ Group.
  4. SEED stands for Sharing, _______, Enriching, Development.
  5. SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events.
  6. SOCC is in charge of maintaining and building ________ relations.
  7. League Programming competition only for freshmen.
  8. SOCC organized Freshman Orientation ______.

15 Clues: DISM’s SIG.SEED hosts the ___-___-Series.SPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relations.SOCC organized Freshman Orientation ______.League Programming competition only for freshmen.SPAI attended and presented at the ____ Conference.SPAI is part of the AI Singapore Student ____ Group....

Buzzwords and Trends of Disruptive Technology 2025-07-23

Buzzwords and Trends of Disruptive Technology crossword puzzle
Across
  1. A shared virtual world
  2. A Cyber Security Approach
  3. The ability of computer systems to replicate human intelligence
Down
  1. A cybersecurity strengthener
  2. A process used to analyse business data
  3. A Public Cloud Computing Service

6 Clues: A shared virtual worldA Cyber Security ApproachA cybersecurity strengthenerA Public Cloud Computing ServiceA process used to analyse business dataThe ability of computer systems to replicate human intelligence

Buzzwords and Trends of Disruptive Technology 2025-07-23

Buzzwords and Trends of Disruptive Technology crossword puzzle
Across
  1. A shared virtual world
  2. A Cyber Security Approach
  3. The ability of computer systems to replicate human intelligence
Down
  1. A cybersecurity strengthener
  2. A process used to analyse business data
  3. A Public Cloud Computing Service

6 Clues: A shared virtual worldA Cyber Security ApproachA cybersecurity strengthenerA Public Cloud Computing ServiceA process used to analyse business dataThe ability of computer systems to replicate human intelligence

Fundamentals of Computing: McKown 2022-10-26

Fundamentals of Computing: McKown crossword puzzle
Across
  1. Series of code that completes a specific task
  2. First Digital Computer
  3. Being mean directly or indirectly to an individual or group online
  4. Father of the computer
  5. .mp3 file type
  6. Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
  7. RAM Memory - Short Term
  8. Device used to display data to the user from the computer
  9. Single unit of the binary language
  10. First computer programmers
  11. 8 bits
Down
  1. Where all of the of compentants of a computer connect to or live
  2. Device used to give the computer data from the user
  3. The brain of the computer
  4. Industry that works to secure computers and computer networks as a whole
  5. Series of commands
  6. CodeHS Programming Dog
  7. Computer language

18 Clues: 8 bits.mp3 file typeComputer languageSeries of commandsFirst Digital ComputerFather of the computerCodeHS Programming DogRAM Memory - Short TermThe brain of the computerFirst computer programmersSingle unit of the binary languageSeries of code that completes a specific taskDevice used to give the computer data from the user...

Cyber Midterm P1 2025-12-09

Cyber Midterm P1 crossword puzzle
Across
  1. Keeping data intact and safe
  2. Keeps data only accessible to authorized persons
  3. Reliable access to information
Down
  1. Data at rest
  2. Acronym for the triad that embodies Cybersecurity as a whole
  3. Data in transit

6 Clues: Data at restData in transitKeeping data intact and safeReliable access to informationKeeps data only accessible to authorized personsAcronym for the triad that embodies Cybersecurity as a whole

Ransomware 2021-09-23

Ransomware crossword puzzle
Across
  1. Convert information into a code
  2. Protects against threat online
  3. Software created for malicious purposes
  4. New Ransomware Variant
Down
  1. A technique used by hackers to obtain sensitive information
  2. Protecting networks, devices and data from unauthorized access

6 Clues: New Ransomware VariantProtects against threat onlineConvert information into a codeSoftware created for malicious purposesA technique used by hackers to obtain sensitive informationProtecting networks, devices and data from unauthorized access

Tecnologia de la Informacion 2023-05-06

Tecnologia de la Informacion crossword puzzle
Across
  1. Implica en los trabajos en tecnología de la información
  2. La TI admite muchas funciones comerciales y ayuda a?
  3. Una de las carreras que abarca la TI
  4. Es un tipo de tecnología de información
  5. Sigla de la tecnología de información
  6. Las empresas globales utilizan la tecnología de información para?
Down
  1. ¿Qué es la tecnología de la información?
  2. ¿La tecnología de información es responsable de?
  3. ¿Porqué es necesaria la tecnología de la información?

9 Clues: Una de las carreras que abarca la TISigla de la tecnología de informaciónEs un tipo de tecnología de información¿Qué es la tecnología de la información?¿La tecnología de información es responsable de?La TI admite muchas funciones comerciales y ayuda a?¿Porqué es necesaria la tecnología de la información?...

business 2025-05-22

business crossword puzzle
Across
  1. Business model: selling directly to consumers (Business).
  2. Leaving a company, often measured in percentages (HR).
  3. A revolutionary idea that changes the market (Business).
  4. Strategy that compares performance with top competitors (Business).
Down
  1. Security that protects systems and data (Tech).
  2. Design that improves how people interact with a product (Tech).
  3. Bringing new workers into a company smoothly (HR).
  4. Total money earned (Finance).
  5. Group of people you market your product to (Marketing).

9 Clues: Total money earned (Finance).Security that protects systems and data (Tech).Bringing new workers into a company smoothly (HR).Leaving a company, often measured in percentages (HR).Group of people you market your product to (Marketing).A revolutionary idea that changes the market (Business).Business model: selling directly to consumers (Business)....

Cyber security 2025-08-22

Cyber security crossword puzzle
Across
  1. organized collection of data, stored and accessed by computers
  2. unauthorized access or exposure of sensitive information
  3. a collection of interconnected computing devices that can communicate and share resources with each other
  4. a weakness in a system
  5. publishing private personal information about an individual online without their consent
Down
  1. IT professional who ensures an organization's computer networks are secure
  2. raw facts, figures, and observations
  3. protecting digital systems
  4. Personal identification information

9 Clues: a weakness in a systemprotecting digital systemsPersonal identification informationraw facts, figures, and observationsunauthorized access or exposure of sensitive informationorganized collection of data, stored and accessed by computersIT professional who ensures an organization's computer networks are secure...

Cyber Security Puzzle 2024-10-21

Cyber Security Puzzle crossword puzzle
Across
  1. term used for various pop-up advertisements that show up on your computer or mobile device.
  2. a malware designed to deny a user or organization access to files on their computer
  3. what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
  1. specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
  2. the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
  3. refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  4. what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
  5. A worm in cybersecurity is a type of malicious software that spreads across computer networks
  6. A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user

9 Clues: a malware designed to deny a user or organization access to files on their computerterm used for various pop-up advertisements that show up on your computer or mobile device.A worm in cybersecurity is a type of malicious software that spreads across computer networks...

Phishing Crossword 2023-10-14

Phishing Crossword crossword puzzle
Across
  1. an email that tricks people
  2. commonly hunted by fisherman
  3. a way scams try to reach you
  4. a sense that a scammer creates when rushing you
Down
  1. a fake email address
  2. The process of verifying a claimed identity of a user or device
  3. protects against online threats

7 Clues: a fake email addressan email that tricks peoplecommonly hunted by fishermana way scams try to reach youprotects against online threatsa sense that a scammer creates when rushing youThe process of verifying a claimed identity of a user or device

The Voice: October 7th, 2024 2024-10-07

The Voice: October 7th, 2024 crossword puzzle
Across
  1. Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
  2. What _____ look like in Canada today.
  3. Limited spots left for this event!
  4. October is what awareness month?
Down
  1. One of the highlighted members this week.
  2. Since 2012, the Chamber has advocated for improved what?
  3. EcoBrooks _____ Award.

7 Clues: EcoBrooks _____ Award.October is what awareness month?Limited spots left for this event!What _____ look like in Canada today.One of the highlighted members this week.Since 2012, the Chamber has advocated for improved what?Going to represent Canada internationally Finalist for 2024 Constantinus International Award.

CYBERSECURITY PUZZLE 2023-09-13

CYBERSECURITY PUZZLE crossword puzzle
Across
  1. Shady..do not click!
  2. Do not visit
  3. Don't ever share this to strangers!
  4. Dishonest offer online
Down
  1. Publishing someone's private information on the internet
  2. Always change this throughout accounts!
  3. Be careful when doing this on social media!

7 Clues: Do not visitShady..do not click!Dishonest offer onlineDon't ever share this to strangers!Always change this throughout accounts!Be careful when doing this on social media!Publishing someone's private information on the internet

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity crossword 2023-03-17

Cybersecurity crossword crossword puzzle
Across
  1. Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
  2. Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
  3. Find a synonym of preempt
Down
  1. What is the naming convention for ecrime category ?
  2. What is 84 minutes the average time for ?
  3. What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
  4. Which type of accounts are mainly targeted by adversaries ?

7 Clues: Find a synonym of preemptWhat is 84 minutes the average time for ?What is the naming convention for ecrime category ?Which type of accounts are mainly targeted by adversaries ?Which tool can reveal hidden relationships and identify attack paths within an AD environment ?...

Cybersecurity Crossword 2022-05-19

Cybersecurity Crossword crossword puzzle
Across
  1. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  2. establishes a secure connection between you and the internet
  3. the practice of protecting critical systems and sensitive information from digital attacks.
Down
  1. a set of instructions, data or programs used to operate computers and execute specific tasks
  2. a standalone malware computer program that replicates itself in order to spread to other computers
  3. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  4. a computer program that can copy itself and infect a computer without permission or knowledge of the user

7 Clues: establishes a secure connection between you and the internetthe practice of protecting critical systems and sensitive information from digital attacks.a set of instructions, data or programs used to operate computers and execute specific tasksa standalone malware computer program that replicates itself in order to spread to other computers...

Cybersecurity Crossword 2023-11-10

Cybersecurity Crossword crossword puzzle
Across
  1. What type of hacker exploits systems for personal gain and bad intention
  2. What is used to hide messages so only authorized people can understand?
  3. What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
  1. Using deceptive measures to manipulate someone in disclosing personal information
  2. Data, information , device anything that is of value
  3. Acquiring unauthorized access to system or data
  4. An incident where attackers steal information without authorization?

7 Clues: Acquiring unauthorized access to system or dataData, information , device anything that is of valueAn incident where attackers steal information without authorization?What is used to hide messages so only authorized people can understand?What type of hacker exploits systems for personal gain and bad intention...

IT 2024-11-28

IT crossword puzzle
Across
  1. Field focused on protecting data from cyberattacks.
  2. What does IoT stand for?
  3. Common programming language used for AI.
  4. Process of identifying and fixing software issues.
Down
  1. A key method for securing data online.
  2. Smart system connecting everyday devices.
  3. Main component of a computer system's physical setup.

7 Clues: What does IoT stand for?A key method for securing data online.Common programming language used for AI.Smart system connecting everyday devices.Process of identifying and fixing software issues.Field focused on protecting data from cyberattacks.Main component of a computer system's physical setup.

MEKATRONIK T3 2024-05-24

MEKATRONIK T3 crossword puzzle
Across
  1. merupakan satu teras utama revolusi industri 4.0
  2. satu sistem susunan dan sambungan fizikal komponen dalam satu litar
  3. merupakan contoh bagi sistem kawalan
  4. LITAR merupakan salah satu aspek penning dalam product mekatronik
  5. merupakan salah satu ujian kefungsian
  6. ..........manufacturing Hialeah pembuatan bah mental
Down
  1. berfungsi membekalkan arus bagi membolehkan peranti berfungsi
  2. ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
  3. ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
  4. jurutera jepun yang memperkenalkan konsep mekatronik

10 Clues: merupakan contoh bagi sistem kawalanmerupakan salah satu ujian kefungsianmerupakan satu teras utama revolusi industri 4.0..........manufacturing Hialeah pembuatan bah mentaljurutera jepun yang memperkenalkan konsep mekatronikberfungsi membekalkan arus bagi membolehkan peranti berfungsi...

Globalization and Technology 2025-02-06

Globalization and Technology crossword puzzle
Across
  1. Transaction on the internet like Amazon Pay, Paypal etc
  2. A global network the world uses for communications and other features
  3. A period of hundred years
  4. A system that gives music and transmits audio
  5. The act of buying and selling goods
  6. An Act of introducing new ideas or products
Down
  1. Process of exchanging Information through any medium
  2. A simulated experience using computer technology used by headset
  3. Moving things from one place to another
  4. Measures taken to protect a computer

10 Clues: A period of hundred yearsThe act of buying and selling goodsMeasures taken to protect a computerMoving things from one place to anotherAn Act of introducing new ideas or productsA system that gives music and transmits audioProcess of exchanging Information through any mediumTransaction on the internet like Amazon Pay, Paypal etc...

03 Almer Billie prabawa 2025-10-17

03 Almer Billie prabawa crossword puzzle
Across
  1. Memuat ulang halaman web agar tampil terbaru.
  2. Program untuk mengatur dan mempercepat unduhan file.
  3. Proses mengubah data agar tidak bisa dibaca orang lain.
  4. Lembar atau jendela kecil dalam browser untuk membuka situs lain.
  5. menampilkan gambar atau halaman web di layar.
  6. Perlindungan sistem komputer dari serangan digital.
Down
  1. Tempat menulis alamat situs web (URL) di browser.
  2. Tab baru untuk membuka halaman web lain.
  3. Memperbarui tampilan halaman yang sedang dibuka.
  4. Upaya penipuan untuk mencuri data pribadi lewat internet.

10 Clues: Tab baru untuk membuka halaman web lain.Memuat ulang halaman web agar tampil terbaru.menampilkan gambar atau halaman web di layar.Memperbarui tampilan halaman yang sedang dibuka.Tempat menulis alamat situs web (URL) di browser.Perlindungan sistem komputer dari serangan digital.Program untuk mengatur dan mempercepat unduhan file....

AI in education 2024-06-05

AI in education crossword puzzle
Across
  1. Protection of personal information.
  2. Lack of neutrality, prejudice.
  3. Guidelines or principles governing proper conduct.
  4. Actions taken to use something wrongly or inappropriately.
  5. The quality of being honest and having strong moral principles.
  6. The state of being clear and open.
Down
  1. The protection of data from unauthorized access or corruption.
  2. The state of being answerable or responsible.
  3. Practices designed to ensure secure data and systems.
  4. The practice of keeping information secret to prevent unauthorized access.

10 Clues: Lack of neutrality, prejudice.The state of being clear and open.Protection of personal information.The state of being answerable or responsible.Guidelines or principles governing proper conduct.Practices designed to ensure secure data and systems.Actions taken to use something wrongly or inappropriately....

Comms & Media Crossword - October Edition 2022-10-04

Comms & Media Crossword - October Edition crossword puzzle
Across
  1. This company was recently in news for launching 5G Lab-as-a-service ​
  2. Leading telecom equipment provider, & our client
  3. Virtual representation of a real-world physical system​
  4. One of the most important digital challenges today​
  5. Continuous Expenditure that companies incur
Down
  1. Satoshi Nakamoto was the pioneer behind this technology​
  2. Software based technology used in Telecom
  3. This company launched India’s 1st multiplex in Metaverse
  4. Telecom players fight for this
  5. boAt had a K-pop concert on this platform​

10 Clues: Telecom players fight for thisSoftware based technology used in TelecomboAt had a K-pop concert on this platform​Continuous Expenditure that companies incurLeading telecom equipment provider, & our clientOne of the most important digital challenges today​Virtual representation of a real-world physical system​...

4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02

4.1 Computer Vulnerability - Crossword Puzzle crossword puzzle
Across
  1. The protection of information and systems from cyberattacks
  2. A threat originating from within an organization
  3. The overall protection of computer systems and data
  4. A weakness in a computer system that can be exploited
  5. The transfer of information between devices
Down
  1. The act of stealing or manipulating data
  2. Unintentional harm caused to data or systems
  3. A threat originating from the internet
  4. The practice of illegally gaining access to a computer system

9 Clues: A threat originating from the internetThe act of stealing or manipulating dataThe transfer of information between devicesUnintentional harm caused to data or systemsA threat originating from within an organizationThe overall protection of computer systems and dataA weakness in a computer system that can be exploited...

pasar uang dan ekonomi digital 2024-02-28

pasar uang dan ekonomi digital crossword puzzle
Across
  1. sektor pendukung ekonomi digital
  2. contoh E-Commerce yang ada di Indonesia
  3. sumber pendanaan dalam pasar uang yang berupa utang dagang
  4. karakteristik pasar uang
  5. peluang bisnis ekonomi digital
Down
  1. pekerjaan masyarakat Indonesia dengan adanya media online
  2. masih menjadi ancaman bagi sebagian besar pengguna internet di Indonesia
  3. ekonomi digital sangat efisien
  4. salah satu memanfaatkan ekonomi digital adalah membuat
  5. karakteristik ekonomi digiral yang membuat orang tidak bertemu langsungh
  6. kegiatan pinjam meminjam dana antara satu bank dengan bank lainnya untuk jangka waktu yang pendek
  7. berperan sebagai perantara di antara pelaku dalam Pasar Uang
  8. salah satu fungsi pasar uang
  9. instrumen pasar uang yang diteritkan Bank Umum
  10. pelaku utama dalam pasar uang yang menjaga kestabilan moneter dan harga

15 Clues: karakteristik pasar uangsalah satu fungsi pasar uangekonomi digital sangat efisienpeluang bisnis ekonomi digitalsektor pendukung ekonomi digitalcontoh E-Commerce yang ada di Indonesiainstrumen pasar uang yang diteritkan Bank Umumsalah satu memanfaatkan ekonomi digital adalah membuatpekerjaan masyarakat Indonesia dengan adanya media online...

browsing safely 2025-05-29

browsing safely crossword puzzle
Across
  1. bullying act of harming or harassing using technology
  2. program used to identify and remove viruses
  3. use of illegal methods to get money
  4. criminal activity used to harm anyone using the internet
  5. a set of programs that disrupts the functioning of a compute
  6. hoaxing or misleading
  7. process of 'befriending children' on social media
Down
  1. to conduct terrorism using a computer
  2. sending an email to an user and misleading them to believe its from a trusted account
  3. unethical hackers
  4. helps prevent unauthorised access to your computer
  5. victim is attacked and then forced to pay money
  6. misusing someone's personal information
  7. to protect networks or your devices
  8. illegal entry into computer system

15 Clues: unethical hackershoaxing or misleadingillegal entry into computer systemuse of illegal methods to get moneyto protect networks or your devicesto conduct terrorism using a computermisusing someone's personal informationprogram used to identify and remove virusesvictim is attacked and then forced to pay money...

EQUATE - Cybersecurity 2023-05-30

EQUATE - Cybersecurity crossword puzzle
Across
  1. file included with an email that may carry risks
  2. Unwanted bulk emails
  3. Something to look for when verifying an email
Down
  1. Website or email address identifier
  2. Malicious assault on computer systems or networks.
  3. Microsoft-developed email client for managing email accounts
  4. Deceptive emails aiming to extract personal data

7 Clues: Unwanted bulk emailsWebsite or email address identifierSomething to look for when verifying an emailDeceptive emails aiming to extract personal datafile included with an email that may carry risksMalicious assault on computer systems or networks.Microsoft-developed email client for managing email accounts

EQUATE - Cybersecurity 2023-05-30

EQUATE - Cybersecurity crossword puzzle
Across
  1. file included with an email that may carry risks
  2. Unwanted bulk emails
  3. Something to look for when verifying an email
Down
  1. Website or email address identifier
  2. Malicious assault on computer systems or networks.
  3. Microsoft-developed email client for managing email accounts
  4. Deceptive emails aiming to extract personal data

7 Clues: Unwanted bulk emailsWebsite or email address identifierSomething to look for when verifying an emailDeceptive emails aiming to extract personal datafile included with an email that may carry risksMalicious assault on computer systems or networks.Microsoft-developed email client for managing email accounts

Cybersecurity Month 2023-09-27

Cybersecurity Month crossword puzzle
Across
  1. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
  2. The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
  3. Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
  1. A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
  2. A form of malware used by hackers to spy on you and your computer activities
  3. Any technology, be it software or hardware, used to keep intruders out
  4. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications

7 Clues: Any technology, be it software or hardware, used to keep intruders outA form of malware used by hackers to spy on you and your computer activitiesCoding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....