cybersecurity Crossword Puzzles
cybersecurity challenge 2025-10-07
Across
- Blocks bad stuff from getting into your network
- Fake emails that try to steal your info
- Scrambles data so only the right people can read it
- Bad software that can mess up your computer
Down
- Locks your files and asks for money to unlock them
- What you type in to log into something
- Someone who breaks into computers or accoun
7 Clues: What you type in to log into something • Fake emails that try to steal your info • Someone who breaks into computers or accoun • Bad software that can mess up your computer • Blocks bad stuff from getting into your network • Locks your files and asks for money to unlock them • Scrambles data so only the right people can read it
cybersecurity challenge 2025-10-07
Across
- Blocks bad stuff from getting into your network
- Fake emails that try to steal your info
- Scrambles data so only the right people can read it
- Bad software that can mess up your computer
Down
- Locks your files and asks for money to unlock them
- What you type in to log into something
- Someone who breaks into computers or accoun
7 Clues: What you type in to log into something • Fake emails that try to steal your info • Someone who breaks into computers or accoun • Bad software that can mess up your computer • Blocks bad stuff from getting into your network • Locks your files and asks for money to unlock them • Scrambles data so only the right people can read it
cruciverba cybersecurity 2025-11-17
Across
- : Copia di sicurezza dei dati
- : Trasformare i dati in codice per proteggerli
- : Chiave segreta per accedere a un account
Down
- : Software dannoso che infetta il computer
- : Tentativo di rubare dati fingendosi qualcuno di fidato via email
- : Protezione che filtra il traffico di rete
- : Rete privata virtuale che protegge la connessione
7 Clues: : Copia di sicurezza dei dati • : Software dannoso che infetta il computer • : Chiave segreta per accedere a un account • : Protezione che filtra il traffico di rete • : Trasformare i dati in codice per proteggerli • : Rete privata virtuale che protegge la connessione • : Tentativo di rubare dati fingendosi qualcuno di fidato via email
Digital media literacy 2023-09-14
Across
- a setting you turn on to camouflage yourself from internet scammers
- this is where you install games and streaming services
- a streaming service that is very well known
- people that lure people into giving them there bank details
- a way of protecting you from hackers
Down
- a website in which you order from and it’s delivered to your door
- an answer to all your questions
- watch videos from your favourite content creator
- tweet tweet
- a social media app with a blue logo
- a corporation run by bill gates
- some the would be powered by electricity
12 Clues: tweet tweet • an answer to all your questions • a corporation run by bill gates • a social media app with a blue logo • a way of protecting you from hackers • some the would be powered by electricity • a streaming service that is very well known • watch videos from your favourite content creator • this is where you install games and streaming services • ...
Business Ethics/Cyber Security 2023-09-19
Across
- practice of protecting critical systems
- work place manners
- the number of steps in the decision making process
- this person wanted to test the size of the internet by creating a program that duplicated itself
Down
- exchange of information between a sender and receiver
- these hackers send an email or text with a link to click
- guidelines for how a business should conduct themselves
- positive internet behavior
- a policy users must agree to follow in order to gain internet access
- a set of moral principles
- the most common form of communication in a business
- these hackers ask for money
12 Clues: work place manners • a set of moral principles • positive internet behavior • these hackers ask for money • practice of protecting critical systems • the number of steps in the decision making process • the most common form of communication in a business • exchange of information between a sender and receiver • guidelines for how a business should conduct themselves • ...
TDD 2023-09-19
Across
- Think before you _____.
- One of the common internet search engine used nowadays.
- Do not share your account ______ to anyone.
- We should avoid sharing any _______ news without validating the sources.
- #1 popular social media. CEO – Mark Zuckerberg
Down
- ______ has been recognized as Cybersecurity awareness month.
- One of Amcor values.
- _______ make human sick as well as computer.
- Operating System
- Short form of wireless network.
- ____ your laptop when you are stepping away. You need a key to unlock it.
- They are referred as small insects in mother nature. IT referred them as errors in computer program/system.
12 Clues: Operating System • One of Amcor values. • Think before you _____. • Short form of wireless network. • Do not share your account ______ to anyone. • _______ make human sick as well as computer. • #1 popular social media. CEO – Mark Zuckerberg • One of the common internet search engine used nowadays. • ______ has been recognized as Cybersecurity awareness month. • ...
internet safety 2023-04-19
Across
- a part of a computer system or network which is designed to block unwanted access
- like a cold for your computer
- the state of being protected against the criminal use of electronic data
- bulling done over the internet
- a person or thing that hacks
- a world wide computer network
- websites and apps that let users create and share content EX.Snapchat
Down
- a piece of information needed to log in to the internet
- the state of being free from public attention
- be careful what you make public
- information made available by a website
- facts given to learn about someone or something
12 Clues: a person or thing that hacks • like a cold for your computer • a world wide computer network • bulling done over the internet • be careful what you make public • information made available by a website • the state of being free from public attention • facts given to learn about someone or something • a piece of information needed to log in to the internet • ...
Quality Month Quiz 2022-11-04
Across
- a type of cybersecurity attack that attempts to steal your information
- Plays A VITAL ROLE IN YOUR APPRAISAL
- Skill / Knowledge to do a process
- Property of accuracy and completeness
- are implemented to mitigate the identified risks
- Action to eliminate the cause of a nonconformity and to prevent recurrence
Down
- Tailgating is also termed as
- Portrays the hierarchy in organisation / function
- plan to achieve a long-term or overall objective
- Non-fulfilment of a requirement
- A weakness of an asset or control that could potentially be exploited by one or more threats
- How many Quality Management Principle in QMS
12 Clues: Tailgating is also termed as • Non-fulfilment of a requirement • Skill / Knowledge to do a process • Plays A VITAL ROLE IN YOUR APPRAISAL • Property of accuracy and completeness • How many Quality Management Principle in QMS • plan to achieve a long-term or overall objective • are implemented to mitigate the identified risks • ...
Tech Talks: Crossword Edition 2025-08-28
Across
- Structured support to help startups develop and scale
- Field involving the design and creation of automated machines
- Protecting systems and networks from digital threats
- Using fingerprints, facial recognition, or voice for authentication
- Technology that uses living organisms or cells to develop products
Down
- Testing environment for disruptive technologies
- Raising capital from the public to fund innovation projects
- High-risk funding enabling tech companies to grow rapidly
- Collaborative network of startups, funders, and enablers driving innovation
- MOSTI platform certifying local R&D products for procurement
- Tech innovation transforming financial services
- Unmanned aerial vehicle used in delivery, agriculture, and surveillance
12 Clues: Testing environment for disruptive technologies • Tech innovation transforming financial services • Protecting systems and networks from digital threats • Structured support to help startups develop and scale • High-risk funding enabling tech companies to grow rapidly • Raising capital from the public to fund innovation projects • ...
Zero-Trust 2025-07-23
Across
- Zero Trust eliminates ___ ports to reduce attack surface.
- – Zero Trust enforces least ___ access to minimize risk.
- Every session in a Zero Trust model must be fully ___.
- OT compliance standard Secomea adheres to (abbr.).
- A secure remote access company built for OT.
- Traffic allowed in Zero Trust: ___-only.
Down
- Access should only be granted when it is scheduled and ___.
- – What Zero Trust replaces: ___ perimeter security.
- All users and devices must be continuously ___.
- European directive Secomea helps manufacturers comply with (abbr.).
- This cybersecurity model assumes no inherent trust: Zero ___.
11 Clues: Traffic allowed in Zero Trust: ___-only. • A secure remote access company built for OT. • All users and devices must be continuously ___. • OT compliance standard Secomea adheres to (abbr.). • – What Zero Trust replaces: ___ perimeter security. • Every session in a Zero Trust model must be fully ___. • – Zero Trust enforces least ___ access to minimize risk. • ...
AI Lesson 2023-03-06
Across
- A type of machine learning that is modeled after the structure and function of the human brain
- data __________
- e.g. Siri, Alexa
- using machines to perform tasks that are normally done by humans
- e.g. fingerprints, facial recognition software
- the design, construction, operation and use of robots
- AI that learns about knowledge that humans know naturally
Down
- using firewalls and antivirus software to prevent computers from being attacked
- using large datasets to find patterns and insights
- AI that learns and improves from experience by itself
- a household that uses internet-connected devices to control appliances
- feeling/emotion
- a set of instructions that complete a task
13 Clues: data __________ • feeling/emotion • e.g. Siri, Alexa • a set of instructions that complete a task • e.g. fingerprints, facial recognition software • using large datasets to find patterns and insights • AI that learns and improves from experience by itself • the design, construction, operation and use of robots • AI that learns about knowledge that humans know naturally • ...
Digital Technology 2025-04-26
Across
- After the pandemic, ____became normal in many industries.
- _____ is common in car manufacturing factories today.
- _____ forces companies to rethink their strategies.
- _____ helps doctors detect diseases earlier.
- Some companies practice _____ to hire cheaper labor abroad.
- A ____must find new clients to stay successful.
- A _____ usually needs to innovate to survive against big companies.
Down
- _____ experts are essential to protect sensitive company information.
- Many small businesses survive thanks to ____ platforms.
- With _____ , you can visit a museum without leaving your house.
- ____ reduces the need for repetitive human tasks.
- _____ helps banks process transactions faster and more securely.
- Laws about the _____ aim to prevent employee burnout.
13 Clues: _____ helps doctors detect diseases earlier. • A ____must find new clients to stay successful. • ____ reduces the need for repetitive human tasks. • _____ forces companies to rethink their strategies. • _____ is common in car manufacturing factories today. • Laws about the _____ aim to prevent employee burnout. • ...
INFORMATION GOVERNANCE SUMMER FUN 2017-08-08
Across
- Coming soon,in May 2018!
- New term under GDPR
- Increasing threat for us all
- Have you filled the new role required under GDPR?
- Process which becomes a legal requirement under GDPR
Down
- Part of important review by NDG 2016
- Mustn't forget this important law for patients
- What could happen to to you in 2018 if you steal personal data
- Part of revised definition for sensitive personal data under GDPR
9 Clues: New term under GDPR • Coming soon,in May 2018! • Increasing threat for us all • Part of important review by NDG 2016 • Mustn't forget this important law for patients • Have you filled the new role required under GDPR? • Process which becomes a legal requirement under GDPR • What could happen to to you in 2018 if you steal personal data • ...
Zine Crossword 2022-04-16
Across
- Considered to be the first hacker
- The website on which anonymous would plan their attacks
- The film that produced the famous hacking mask
Down
- The protection of information on the internet
- One of the colors of the three types of hackers
- The headwear associated with hacking
- A form of harm done on the internet
- Famous hacking group
8 Clues: Famous hacking group • Considered to be the first hacker • A form of harm done on the internet • The headwear associated with hacking • The protection of information on the internet • The film that produced the famous hacking mask • One of the colors of the three types of hackers • The website on which anonymous would plan their attacks
soujanya hazra 2025-06-19
Across
- Designed to protect network
- Illegal entry into a computer system or network.
- the process of 'befriending' children on social media.
- Hoaxing or misleading.
- It is an act of harming or harassing using information technology in a deliberate manner
Down
- Vital Information Resources Under Seize
- Any criminal activity intended to harm anyone using the computer.
- They do Cybercrime.
8 Clues: They do Cybercrime. • Hoaxing or misleading. • Designed to protect network • Vital Information Resources Under Seize • Illegal entry into a computer system or network. • the process of 'befriending' children on social media. • Any criminal activity intended to harm anyone using the computer. • ...
Science and Technology 2025-02-11
Across
- A computer-generated simulation of a three-dimensional environment
- The application of scientific knowledge for practical purposes
- The branch of technology dealing with robots
- Related to genes and heredity
- Avoiding depletion of natural resources for long-term balance
Down
- Information processed or stored by a computer (
- The use of technology to complete tasks with minimal human input
- Protection against cyber threats and attacks
- A new idea or method
9 Clues: A new idea or method • Related to genes and heredity • Protection against cyber threats and attacks • The branch of technology dealing with robots • Information processed or stored by a computer ( • Avoiding depletion of natural resources for long-term balance • The application of scientific knowledge for practical purposes • ...
HACKING TERMS 2023-11-13
Across
- Software designed to harm or exploit computer systems
- A deliberate attempt to exploit computer systems or networks.
- A reward offered for discovering and reporting software bugs
- A secret word or phrase used for authentication.
- A series of instructions for a computer to execute.
- Protective measures against digital threats
Down
- Ethical hackers working to improve security
- The right to keep personal information and activities confidential.
- A weakness or flaw in a system that can be exploited.
- The process of converting information into a code for security.
10 Clues: Ethical hackers working to improve security • Protective measures against digital threats • A secret word or phrase used for authentication. • A series of instructions for a computer to execute. • Software designed to harm or exploit computer systems • A weakness or flaw in a system that can be exploited. • ...
Tech Terms 2023-12-01
Across
- - Software for accessing and navigating the internet. (7)
- - Step-by-step procedure for solving a problem. (8)
- Reality - Computer-generated environment that simulates reality. (13)
- - Secret code to access a protected system. (8)
- - Transfer files from the internet to a computer. (8)
Down
- - Measures to protect computer systems from theft or damage. (12)
- - Security system that prevents unauthorized access. (8)
- - Process of converting data into a code to secure it. (10)
- - Portable device with touchscreen features. (10)
- - Writing instructions for a computer program. (6)
10 Clues: - Secret code to access a protected system. (8) • - Portable device with touchscreen features. (10) • - Writing instructions for a computer program. (6) • - Step-by-step procedure for solving a problem. (8) • - Transfer files from the internet to a computer. (8) • - Security system that prevents unauthorized access. (8) • ...
Cyber Safety 2023-03-27
Across
- Sites such as Snapchat, tiktok etc...
- simulation of the real thing
- To stop a computer from reaching something on the internet.
- An attempt to trick people into visiting malicious websites.
Down
- Measures taken to protect a computer
- When a child abuser tries to start a relationship online.
- Repeated behavior that is intended to cause psychological or emotional harm.
- A word or series of letters, numbers and characters.
- Computer program designed to damage files
- Person who uses computer to gain unauthorized access to data.
10 Clues: simulation of the real thing • Measures taken to protect a computer • Sites such as Snapchat, tiktok etc... • Computer program designed to damage files • A word or series of letters, numbers and characters. • When a child abuser tries to start a relationship online. • To stop a computer from reaching something on the internet. • ...
TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET 2024-01-11
Across
- Lapisan OSI ke 3
- topologi jaringan berbentuk bintang
- Meningkatkan komunikasi antar pengguna, baik secara langsung maupun tidak langsung adalah manfaat dari
- Data yang tersimpan pada device karyawan dapat disimpan lebih aman secara terpusat dengan menggunakan
- salah satu prinsip keamanan jaringan
Down
- mekanisme pertukaran data
- kegiatan tata kelola data
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Salah satu macam jenis jaringan komputer
10 Clues: Lapisan OSI ke 3 • mekanisme pertukaran data • kegiatan tata kelola data • topologi jaringan berbentuk bintang • salah satu prinsip keamanan jaringan • Salah satu macam jenis jaringan komputer • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet) • ...
RAQAMLI IQTISODIYOTDA SANOAT TRANSFORMATSIYASI 2024-11-26
Across
- Raqamli iqtisodiyotda ma'lumotlarni saqlash va ulardan foydalanish uchun bulutli xizmatlar taqdim etuvchi tizim.
- Fabrikalar va ishlab chiqarish jarayonlarini avtomatlashtirish texnologiyasi.
- Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni.
- Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon.
Down
- Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita.
- MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA
- IoT ATAMASINING MA'NOSI
- To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi.
- Sanoat 4.0 ning asosiy komponentlaridan biri bo‘lgan sun'iy mexanik ishchi.
- DATA RAQAMLI IQTISODIYOTDA KATTA HAJMLI MA'LUMOTLARNI QAYTA ISHLASH VA TAHLIL QILISH TEXNOLOGIYASI
10 Clues: IoT ATAMASINING MA'NOSI • Sun'iy intellekt texnologiyasi orqali o‘rganish jarayoni. • MOLIYAVIY XAVFSIZLIKNI TA'MINLASHDA ISHLATILADIGAN TEXNOLOGIYA • To‘g‘ridan-to‘g‘ri tarmoqqa ulangan qurilma yoki obyektlar tizimi. • Raqamli tizimlarning hujumlardan himoyasini ta'minlaydigan jarayon. • Tizimni boshqarishda va ma'lumot yig‘ishda ishlatiladigan raqamli vosita. • ...
CODING VOCABULARY 2023-02-03
Across
- NUMBER SYSTEM USED BY COMPUTERS MADE UP OF 1'S AND 2'S
- ANY CHARACTER OR OBJECT USED IN BLOCK CODING
- A FREE PROGRAMMING LANGUAGE
- MONEY GIVEN TO A HACKER FOR FINDING A WEAKNESS
- ASKING IF A CONDITION IS MET
- SET OF LOGICAL STEPS CARRIED OUT IN ORDER
- OPEN SOURCE PROGAMMING LANGUAGE USING BLOCK CODING DEVELOPED BY MIT
- FINDING WEAKNESSES IN DIGITAL DEVICES
- IDENTIFY AND REMOVE ERRORS FROM COMPUTER PROGRAMS
Down
- PROTECTING SENSITIVE DIGITAL INFORMATION
- TOOL USED TO VIEW AND TEMPORARILY CHANGE SOURCE CODE
- MACHINE PROCESSED SIMULATION OF HUMAN INTELLIGENCE
- DATA ENTERED BY A USER
- INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO
- NAMES USED TO HOLD ONE OR MORE VALUES
- THE WAY SOMETHING IS WRITTEN
16 Clues: DATA ENTERED BY A USER • A FREE PROGRAMMING LANGUAGE • ASKING IF A CONDITION IS MET • THE WAY SOMETHING IS WRITTEN • NAMES USED TO HOLD ONE OR MORE VALUES • FINDING WEAKNESSES IN DIGITAL DEVICES • PROTECTING SENSITIVE DIGITAL INFORMATION • SET OF LOGICAL STEPS CARRIED OUT IN ORDER • ANY CHARACTER OR OBJECT USED IN BLOCK CODING • INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO • ...
Cybersecurity Awareness Crossword (2018) 2018-07-29
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Information Security is a _______ issue.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
- _______ before you click or forward.
Down
- _______ your data regularly and periodically check that you are able to restore them.
- Use a _______ password different from the passwords you use to access other sites.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Cybersecurity is _______'s responsibility.
- You should always keep your software and anti-virus definitions up-to-_______.
- Do not provide your _______ email account to social networks.
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Always use _______ factor authentication where available.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Cybersecurity Awareness Month Crossword 2023-09-18
Across
- A security process that requires users to provide two different authentication factors before gaining access.
- Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
- Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
- An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
- Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
- A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
- An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
- An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
- The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
- The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
- The process of examining network traffic to identify anomalies and potential security threats.
- Software designed to detect, prevent, and remove malicious software from a computer or network.
- A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
- A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.
15 Clues: The process of examining network traffic to identify anomalies and potential security threats. • Software designed to detect, prevent, and remove malicious software from a computer or network. • The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality. • ...
Education 2025-08-08
Across
- – Not just a name —where finance meets fun.
- – GBS emphasises this as one of the USP
- — Once a GBS student, always one—albeit slightly sarcastic.
- - Easy Lunch between ____
- – Period during which a student can cancel without tuition penalty
- – rewards that help students
- – Framework applied across GBS’s regulatory documents
- – Core value in GBS’s mission to create an inclusive environment
- – Central theme in GBS’s policies on personal data handling
Down
- — Where students start, and strong futures build.
- – Non‑refundable fee paid to secure a place (unless qualifying circumstances)
- — The _____ that whispers, ‘Look at me, I promise futures!
- – Keeping hackers’ fingers off your grades.
- – Referring to NSS scores.
- – Online events offering insight into GBS programs
- – Where silence studies hard
- – Studying trips without leaving the campus
17 Clues: - Easy Lunch between ____ • – Referring to NSS scores. • – rewards that help students • – Where silence studies hard • – GBS emphasises this as one of the USP • – Keeping hackers’ fingers off your grades. • – Not just a name —where finance meets fun. • – Studying trips without leaving the campus • — Where students start, and strong futures build. • ...
Knowledge Exchange Christmas Quiz 2023-12-05
7 Clues: Santa's helpers. • Guides Santas Sleigh • Last IT Tuesday topic • The Snowman with a corncob pipe and button nose. • At Savannah, we have a culture of continuous .... • Intranet location to learn more about IT initiatives. • The Centre of is where you can find further information on continuous improvement
Cyber-Attacks 2022-01-13
Across
- a spoof or look-alike website
- the most common way hackers gain entry to a company's computer network
- personally identifiable information
- everyone's responsibility to protect company information and assets
Down
- an add on to enhance function of browser
- software that locks up a computer system and then demands a payment to unlock it
- software designed to harm computer
- fraudulent emails designed to obtain PII
8 Clues: a spoof or look-alike website • software designed to harm computer • personally identifiable information • an add on to enhance function of browser • fraudulent emails designed to obtain PII • everyone's responsibility to protect company information and assets • the most common way hackers gain entry to a company's computer network • ...
Technological Impacts on Business & Commerce 2023-05-03
Across
- Radio Frequency Identification
- Global Positioning System
- A type of social media used by many businesses
- An immersive, interactive, computer-generated experience
- A type of mobile technology
- A common type of online payment system.
- Bullying someone online
- Technologies that require little to no human involvement to operate
- Computers that mimic human cognitive abilities
Down
- Customizing goods or services to consumers needs and preferences
- Safeguarding computer systems and networks
- The network of real-world things that exchange data form one another
- The network of businesses involved in product distribution
- Natural Language Processing
- The exchange of goods and services electronically
- Providing for the needs of this generation without compromising the needs for future generations
- A type of skill that is essential for ICT.
17 Clues: Bullying someone online • Global Positioning System • Natural Language Processing • A type of mobile technology • Radio Frequency Identification • A common type of online payment system. • Safeguarding computer systems and networks • A type of skill that is essential for ICT. • A type of social media used by many businesses • Computers that mimic human cognitive abilities • ...
test 2022-07-15
Across
- Music festival they attended -
- Michael proposed in ___ beach -
- European country michael lived in -
- How they met
- On the way to Big Sur they stopped at an ___ farm -
- Day of the week they attend life group -
- City of the music festival they attended -
- Basketball team michael supports -
- Sammi’s side hustle -
- How we are honoring sammis dad at the wedding -
- Month they met -
- City they took their engagement photos -
- Sauce michael hates -
Down
- State michael was raised in -
- Industry sammi works in -
- Sammis favorite flowers -
- Sammis bridal shower was a ___ party -
- Brand of sammi’s car -
- Type of dance sammi did growing up -
- Destination of first plane ride together -
- Type of engineer Michael is -
- Year they met -
- Color of michaels bathroom before they painted it -
- Location of their first post together on IG -
- Engagement ring shape -
25 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • Basketball team michael supports - • ...
Cisco 2022-11-30
Across
- intentional tampering
- machine within a machine
- machine for printing text onto paper
- information non-consensually given to the public
- something on many screens
- output device that displays images
- place of sale
- official procedure
- common handheld device
- faster protocol
- thick rope of wire
- putting something into another forcefully
- an autonomous device
- device that often works with mice
- IO device that displays images
- IO device for computer
Down
- negative or not good
- our fearless leader
- slower protocol
- protection of systems
- to engineer
- company
- can be divided into vlans
- attack strategy
- connects networks
- our country
- a form of social engineering
- something often worn by humans
- IO device for computers
- a type of robot
- encoded message
- device
- aspect of human lift
- a type of person
34 Clues: device • company • to engineer • our country • place of sale • slower protocol • attack strategy • faster protocol • a type of robot • encoded message • a type of person • connects networks • official procedure • thick rope of wire • our fearless leader • negative or not good • an autonomous device • aspect of human lift • intentional tampering • protection of systems • common handheld device • ...
Crossword Puzzle 2023-12-12
Across
- Coordinated anti-terrorism effort
- Diplomatic negotiation process
- Mutual defense pact
- Emotional response to stress or danger
- Country with aggressive territorial claims in the West Philippine Sea
- Protection against cyber threats
- Manipulation of information to influence opinions
- Policies aimed at reducing gender-based disparities
- Targeting of adversary's decision-making processes
- Island in the West Philippine Sea claimed by multiple countries
- Localized peace talks with insurgent groups
Down
- Common mental health condition characterized by persistent sadness
- Act of risking one's life to save others
- Joint military exercises
- Replacement of old weaponry with newer, more advanced systems
- Primary fighter aircraft used by the Air Force
- Country's plan for protecting itself from external threats
- Large warship equipped for open-sea combat
- Strategy to address the root causes of insurgency
- International court ruling on the West Philippine Sea dispute
- Declaration of the government to end insurgency
21 Clues: Mutual defense pact • Joint military exercises • Diplomatic negotiation process • Protection against cyber threats • Coordinated anti-terrorism effort • Emotional response to stress or danger • Act of risking one's life to save others • Large warship equipped for open-sea combat • Localized peace talks with insurgent groups • Primary fighter aircraft used by the Air Force • ...
NEWSLETTER 2023-11-13
Across
- The activity, you do to get to places.
- Another word for young people....
- Ghana’s Winter.
- I want for Christmas is......
- The invisible line that divides the earth into two equal parts.
- Picture on social media.
- Your identity summarized onto one thing.
- Plans for the New Year.
- Program used to harm computers.
- Color associated with the New Year.
- MIDG end-of-year package for employees.
- Popular hangout zone in Accra.
- ....is responsible for the safety and manner on the internet and other connection.
Down
- Merry Christmas
- Baby Crocodile
- .....is the most showed movie during Christmas movie in Ghana.
- Margins ID Group is made up of four....
- .... flies when you’re having fun.
- Sits atop the Christmas tree.
- Pronto’s location.
- A machine that can be used to write, connect to the writer, the internet and play games.
- Identity theft is an example of...
- A letter sent on the internet.
- What makes you, you.
24 Clues: Baby Crocodile • Merry Christmas • Ghana’s Winter. • Pronto’s location. • What makes you, you. • Plans for the New Year. • Picture on social media. • I want for Christmas is...... • Sits atop the Christmas tree. • A letter sent on the internet. • Popular hangout zone in Accra. • Program used to harm computers. • Another word for young people.... • .... flies when you’re having fun. • ...
Executive Branch 2023-06-02
Across
- The state prison or correction centers
- Government handles Urban issues such as substandard and deteriorating housing
- Ensures America's environmental and nuclear ______
- Promote student achievement and ______
- Promote the economic and social well-being of children and families
- Enhance the health and well-being of all Americans
Down
- Operates and maintains systems for the nation's finace
- Uphold the rule and law and protect civil rights
- Manages public lands and minerals
- Provides military forces and protects the United States
- Provides job and employment
- Promotes job creation and economic growth
- Offers education and rehabilitation services for Veterans
- Helps Americans start, build and grow businesses
- Responsible for terrorism and cybersecurity
- We provide leadership on food, agriculture and natural resources
- Defending the United States through control and exploitation of air and space
- Emergency services and first responders such as law enforcement
- Managing state toll factions
- Protect and promote the U.S security
20 Clues: Provides job and employment • Managing state toll factions • Manages public lands and minerals • Protect and promote the U.S security • The state prison or correction centers • Promote student achievement and ______ • Promotes job creation and economic growth • Responsible for terrorism and cybersecurity • Uphold the rule and law and protect civil rights • ...
Tugas Daring Yesika Intan Aurelia 2025-04-24
Across
- UI designer merancang tampilan?
- menyebarluaskan konten digital disebut?
- Hoaks termasuk dalam konten?
- Salah satu platform berbagi konten tulisan adalah?
- Orang yang merancang sistem jaringan komputer disebut?
- Search engine menggunakan apa untuk mengindeks data?
- HAKI melindungi karya cipta agar tidak?
- Profesi yang menjaga keamanan data disebut?
- Data analyst bertugas menganalisis?
- Salah satu situs validasi fakta di Indonesia adalah?
- YouTube digunakan untuk menyebarkan konten berupa?
- Fungsi utama search engine adalah untuk?
Down
- Validasi konten bisa dilakukan dengan cara?
- Algoritma pada search engine membantu menentukan?
- Konten digital bisa berupa teks, gambar, video, dan ?
- Contoh selain Google adalah?
- Programmer bertugas membuat?
- Hak cipta diberikan kepada?
- Konten negatif dapat berdampak pada?
- Mesin pencari paling populer saat ini adalah?
- HAKI meliputi hak cipta dan?
- Contoh karya yang dilindungi HAKI adalah?
- Ciri konten valid adalah mencantumkan?
- Pelanggaran HAKI dapat dikenai?
- Software pengolah gambar adalah?
25 Clues: Hak cipta diberikan kepada? • Contoh selain Google adalah? • Hoaks termasuk dalam konten? • Programmer bertugas membuat? • HAKI meliputi hak cipta dan? • UI designer merancang tampilan? • Pelanggaran HAKI dapat dikenai? • Software pengolah gambar adalah? • Data analyst bertugas menganalisis? • Konten negatif dapat berdampak pada? • Ciri konten valid adalah mencantumkan? • ...
New Pork Rinds Crossword Puzzle 2025-08-20
Across
- Called
- Quinoa, for example
- The coolest person ever
- Strange
- Escape from prison
- Disney dragon sidekick
- Best when solving a crossword puzzle
- A certain town clerk always says, "You're so ___."
- One may fall asleep at work if they have it
- Sinatra or hot dog
- Sport considered America's Greatest Pasttime
- Slang for guitar
- Children's bathtub toy
- Inspirational words
- Athletes who like to club
Down
- been hacked, Message concerning cybersecurity
- Outdated childish insult
- Roundabout
- frequent party guest
- "Your room is a ____"
- Tip over
- Amount that you can order in
- "___ goes his name-o"
- Before "Engine" and after "Top"
- cartoon bear who favors honey
- Super
- powerful wizard
- Gymnastics movement or secure storage
- Fried chicken state, in short
- "Broaden your ____"
- Assumes
- Pull aggressively
- Sun movement
- Pokemon trainer
34 Clues: Super • Called • Strange • Assumes • Tip over • Roundabout • Sun movement • powerful wizard • Pokemon trainer • Slang for guitar • Pull aggressively • Escape from prison • Sinatra or hot dog • Quinoa, for example • "Broaden your ____" • Inspirational words • frequent party guest • "Your room is a ____" • "___ goes his name-o" • Disney dragon sidekick • Children's bathtub toy • The coolest person ever • ...
Tema 02 perkembangan ekonomi digital 2025-10-27
Across
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Contoh aplikasi fintech di Indonesia adalah
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Perusahaan baru yang berbasis teknologi disebut
- → Masa depan ekonomi digital bergantung pada literasi
- → Pemasaran melalui media sosial disebut
- → Berjualan melalui marketplace online termasuk kegiatan
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
- → Fintech merupakan singkatan dari
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Kecerdasan buatan dikenal juga dengan istilah
- → Transaksi keuangan secara online disebut
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Keamanan transaksi online dikenal dengan istilah
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Risiko ekonomi digital adalah kebocoran
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
TEMA 2 PERKEMBANGAN EKONOMI DIGITAL 2025-10-27
Across
- Istilah lain dari pembayaran tanpa uang tunai.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Salah satu contoh dompet digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Media sosial yang sering digunakan untuk promosi produk.
- Proses promosi produk melalui media sosial.
Down
- Pihak yang menjual barang atau jasa di internet.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Proses jual beli melalui internet.
- Singkatan dari Financial Technology.
- Teknologi penyimpanan data berbasis internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Istilah lain dari pembayaran tanpa uang tunai. • Salah satu contoh dompet digital di Indonesia. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
TEMA 02 : EKONOMI DIGITAL 2025-10-23
Across
- Proses promosi produk melalui media sosial.
- Media sosial yang sering digunakan untuk promosi produk.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Pihak yang menjual barang atau jasa di internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Teknologi penyimpanan data berbasis internet.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi
- Istilah lain dari pembayaran tanpa uang tunai.
Down
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Singkatan dari Financial Technology.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Tempat di mana penjual dan pembeli bertemu secara online.
- Salah satu contoh dompet digital di Indonesia.
- Proses jual beli melalui internet.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Salah satu contoh dompet digital di Indonesia. • Istilah lain dari pembayaran tanpa uang tunai. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
WORDS IN EAGLE 101 2025-10-07
Across
- An e-cigarette.
- Someone who is outgoing and willing to work in a group.
- Coloring or listening to music for a reset.
- We watch them every Friday to keep things on the happy side of life.
- A timer race Mr. Rieck uses.
- Can happen to the lungs of people who smoke.
- The things you feel on the inside(Joy, sad,ect.)
- A motivational speaker.
Down
- Drug Abuse Resistance Education
- Drugs such as vapes that have flavor.
- Stress or worriness. A type of emotion.
- How to be a good citizen on the internet.
- Security on electronic devices.
- A movie we watched in Eagle 101.
- An opioid and drug that messes with your body.
- The act of having a bond with another person.
- To stand up to something you believe in.
- A type of drug.
- A fear of something (Mr. Rieck's is 67)
- Mr. Rieck's favorite sports team.
20 Clues: An e-cigarette. • A type of drug. • A motivational speaker. • A timer race Mr. Rieck uses. • Drug Abuse Resistance Education • Security on electronic devices. • A movie we watched in Eagle 101. • Mr. Rieck's favorite sports team. • Drugs such as vapes that have flavor. • Stress or worriness. A type of emotion. • A fear of something (Mr. Rieck's is 67) • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Techniques 2024-11-06
Across
- A protocol designed to provide privacy and security over the internet by encapsulating traffic
- The latest security protocol for Wi-Fi, enhancing protections against attacks.
- An advanced Linux technology used for monitoring and packet observability in real-time.
- A term related to busting common misconceptions in the open and secure cyberspace.
Down
- Data collected from devices or systems for monitoring and analysis, used in intelligent security
- Malicious software designed to infiltrate or damage computer systems.
- The practice of collecting, analyzing, and preserving digital evidence.
7 Clues: Malicious software designed to infiltrate or damage computer systems. • The practice of collecting, analyzing, and preserving digital evidence. • The latest security protocol for Wi-Fi, enhancing protections against attacks. • A term related to busting common misconceptions in the open and secure cyberspace. • ...
KeyW Crossword 2017-01-19
Across
- What is the name of our mascot
- Parrot Ball location
- KeyW's colors
- What month was KeyW founded
- What color is our KeyW van
- KeyW's best location
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- Applying statistical analysis to data which has a geographical or spatial aspect
- Time sheet
- What type of bird is our mascot
- Which food truck offers the best cheese steaks
Down
- What is the surname of KeyW's founder
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- What is the name of our newsletter
- Radio Detection and Ranging
- How many miles connect Key West to Florida main land
- KeyW non-profit organization abbreviated
- KeyW CEO
- When at work, what must you always carry
20 Clues: KeyW CEO • Time sheet • KeyW's colors • Parrot Ball location • KeyW's best location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • KeyW non-profit organization abbreviated • ...
Wedding 2024-06-08
Across
- What Stacey used to refer Michael to when they first started dating
- Where did Michael and Stacey meet
- Michael’s birthday month
- Michael and Stacey’s anniversary month (hint: Maid of Honour’s birth month)
- The number of years the couple is together
- Honeymoon destination
- Their favourite season
- How many years did Michael live overseas for (hint: bribe Father of Groom)
- What the groom has for breakfast everyday
- Michael’s job industry
- Number of their siblings all together
- Stacey’s favourite food (hint: ask father of bride)
- Michael’s middle name
- Who’s the better cook
Down
- Mr & Mrs _____
- City where Michael was born
- Michael’s favourite drink
- Where did Michael propose
- Brand of Michael’s car
- Flavour of the wedding cake
- Stacey’s birthday month
- Favourite AFL team (hint: ask Best Man)
- Stacey’s best friend
- How long has Stacey been in Australia for
- The age gap between the bride and the groom
25 Clues: Mr & Mrs _____ • Stacey’s best friend • Honeymoon destination • Michael’s middle name • Who’s the better cook • Brand of Michael’s car • Their favourite season • Michael’s job industry • Stacey’s birthday month • Michael’s birthday month • Michael’s favourite drink • Where did Michael propose • City where Michael was born • Flavour of the wedding cake • Where did Michael and Stacey meet • ...
Crosswords 2024-07-16
Across
- plan for successful digital transformation
- immediate data analysis
- large sets of data analyzed for insights
- combining data from different sources
- management of the flow of goods and services
- successful digital use by employees
- system that integrates various business processes
- virtual model of a physical object or system
- protection in digital business environments
- network of interconnected devices
- system for managing customer relationships
- accuracy and reliability of data
Down
- digital change impacting business processes
- redesigning business processes for improvement
- use of technology to perform tasks
- analysis of data for business insights
- based ERP solutions
- process of adopting ERP systems
- technology enhancing supply chain transparency
- integration of artificial intelligence in business
- isolated data storage within an organization
- improved by ERP systems
- analytics for customer engagement
- considerations in using AI and big data
- user experience in digital product design
25 Clues: based ERP solutions • immediate data analysis • improved by ERP systems • process of adopting ERP systems • accuracy and reliability of data • analytics for customer engagement • network of interconnected devices • use of technology to perform tasks • successful digital use by employees • combining data from different sources • analysis of data for business insights • ...
Introduction to Cyber Security 2023-09-08
Across
- protects the wireless internet
- signature sent with email to acknowledge that it was verified
- security is broken and data was stolen
- verifying a user's identity
- a verification for servers to see what can send an email
- foreign foreign software designed to harm a computer
- protocol that protects internet communication
- securing data from outside threats
- programs used when running a PC
Down
- latest version of security for wireless internet
- allows your website to be published online
- using radio waves to connect between nodes in a network
- frauding as a trusted source to steal information
- protection from cyber threats
- making a copy of a data/file
- disguising themself to steal information
- malware to deny a user of their data
- using means necessary to access someone else's device
- communication through the use of electronic devices over networks
- a protection against fake email addresses that are disguised to be real ones
20 Clues: verifying a user's identity • making a copy of a data/file • protection from cyber threats • protects the wireless internet • programs used when running a PC • securing data from outside threats • malware to deny a user of their data • security is broken and data was stolen • disguising themself to steal information • allows your website to be published online • ...
Maura & Spencer 2023-05-19
Across
- Spencer's favorite basketball player
- Where they moved after college
- The name of their cat
- Favorite "Fast Food"
- Brides Favorite Alcoholic Drink
- Spencer's Favorite Hobby
- Where did Maura & Spencer travel to this year
- Who gave out their phone number first?
- Where do they live
- Maura and Spencers First Born
- Maura's favorite Disney Movie
- How many years will they be together in September?
- Maura's middle name
- Maura's Job
Down
- Maura's Favorite Color
- What social media platform did Spencer use to slide in Maura's DM's
- Where did Maura go after DC
- Maura's Favorite Hobby
- Where Maura and Spencer met
- Where did Spencer propose?
- Spencer's Favorite Color
- What month did they get engaged
- The last addition to Maura & Spencers family
- Grooms Favorite Alcoholic Drink
- Spencers Job
- What was Maura's sport growing up
- Spencer's middle name
27 Clues: Maura's Job • Spencers Job • Where do they live • Maura's middle name • Favorite "Fast Food" • The name of their cat • Spencer's middle name • Maura's Favorite Color • Maura's Favorite Hobby • Spencer's Favorite Color • Spencer's Favorite Hobby • Where did Spencer propose? • Where did Maura go after DC • Where Maura and Spencer met • Maura and Spencers First Born • ...
Lushi and John 2025-02-22
Across
- Lushi's favorite alcoholic beverage
- First date restaurant
- John’s middle name
- Lushi’s favorite dessert
- John’s go-to drink
- Lushi’s favorite color
- Lushi’s favorite holiday
- John’s work industry
- City where they met
- Total number of their dogs
- Lushi’s favorite snack to make
- Month of their engagement
- Total countries visited together
- John’s favorite music band
- Favorite shared activity
Down
- Lushi’s favorite cuisine
- John’s hometown
- John’s favorite food
- University John attended
- Their dream honeymoon destination
- First international trip destination
- Who is older between them
- Place where John proposed
- Lushi’s favorite board game
- how John likes his coffee
- Lushi’s favorite time of year
- City they live in
- Lushi’s mom’s employer
- Name of their corgi
- Month of dating anniversary
- John’s favorite video game
- Color of John’s eyes
32 Clues: John’s hometown • City they live in • John’s middle name • John’s go-to drink • City where they met • Name of their corgi • John’s favorite food • John’s work industry • Color of John’s eyes • First date restaurant • Lushi’s favorite color • Lushi’s mom’s employer • Lushi’s favorite cuisine • University John attended • Lushi’s favorite dessert • Lushi’s favorite holiday • ...
TTS INFORMATIKA 2025-04-14
Across
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Sandi digital yang dipakai untuk keamanan transaksi.
- Penipuan online melalui email atau situs palsu.
- Penyusupan sistem oleh pihak tidak berwenang.
- Pencurian data kartu kredit atau kartu debit
- Teknik mengakses sistem tanpa otorisasi.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Kata sandi dalam sistem keamanan.
- Jenis virus komputer
Down
- Program pengintai aktivitas pengguna tanpa izin.
- Sistem keamanan biometrik yang menggunakan sidik jari.
- Proses identifikasi atau verifikasi pengguna
- Aksi mencari celah dalam sistem komputer.
- Istilah lain untuk keamanan jaringan
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Penyerang digital yang memiliki tujuan jahat.
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS INFORMATIKA 2025-04-14
Across
- Istilah lain untuk keamanan jaringan
- Penipuan online melalui email atau situs palsu.
- Penyerang digital yang memiliki tujuan jahat.
- Alamat identifikasi unik setiap perangkat di jaringan.
- Aksi mencari celah dalam sistem komputer.
- Proses menyamarkan data agar tidak bisa dibaca tanpa kunci.
- Jenis perangkat lunak berbahaya yang menyamar sebagai aplikasi sah.
- Alat bantu untuk menghindari ancaman siber, sering berupa perangkat lunak.
- Sistem keamanan biometrik yang menggunakan sidik jari.
Down
- Proses identifikasi atau verifikasi pengguna
- Sandi digital yang dipakai untuk keamanan transaksi.
- Serangan dengan membanjiri jaringan agar tidak dapat digunakan.
- Teknik mengakses sistem tanpa otorisasi.
- Program pengintai aktivitas pengguna tanpa izin.
- Penyusupan sistem oleh pihak tidak berwenang.
- Pencurian data kartu kredit atau kartu debit
- Usaha melindungi sistem komputer dari pencurian atau kerusakan.
- Jenis virus komputer
- Sistem yang membatasi lalu lintas jaringan berdasarkan aturan keamanan
- Kata sandi dalam sistem keamanan.
20 Clues: Jenis virus komputer • Kata sandi dalam sistem keamanan. • Istilah lain untuk keamanan jaringan • Teknik mengakses sistem tanpa otorisasi. • Aksi mencari celah dalam sistem komputer. • Proses identifikasi atau verifikasi pengguna • Pencurian data kartu kredit atau kartu debit • Penyusupan sistem oleh pihak tidak berwenang. • Penyerang digital yang memiliki tujuan jahat. • ...
TTS_EvandaDandy_14xh 2025-04-15
Across
- Orang yang membuat desain antarmuka.
- HAKI singkatan dari...?
- Lembaga yang mengurus HAKI di Indonesia.
- Menyebarkan konten ke publik secara digital disebut?
- Hak yang melindungi karya cipta.
- Simbol yang digunakan untuk pencarian kata bebas.
- Profesi yang membuat aplikasi disebut?
- Platform berbagi video populer.
- Informasi palsu di internet disebut?
- PENGELOLA sistem jaringan.
Down
- Proses membuat konten disebut?
- Proses memeriksa kebenaran konten disebut?
- Kata kunci yang digunakan untuk mengabaikan kata tertentu.
- Salah satu bentuk HAKI untuk brand dagang.
- Elemen tradisional dalam konten digital disebut unsur...?
- Fitur untuk mencari hasil dari situs tertentu (gunakan site:).
- yang menganalisis data.
- Simbol untuk laporan konten di media sosial.
- Ahli keamanan siber disebut...?
- Contoh media digital untuk menyebarkan budaya.
- Sistem otomatis untuk menyaring konten.
- Mesin pencari paling populer.
- Konten berbahaya disebut konten...?
- Simbol untuk mencari sinonim kata (gunakan ~).
- Hak eksklusif atas penemuan teknologi.
25 Clues: yang menganalisis data. • HAKI singkatan dari...? • Mesin pencari paling populer. • Platform berbagi video populer. • Proses membuat konten disebut? • Hak yang melindungi karya cipta. • PENGELOLA sistem jaringan. • Simbol untuk mencari sinonim kata (gunakan ~). • Simbol yang digunakan untuk pencarian kata bebas. • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
IT Terminology 2025-05-15
Across
- Distributed ledger technology with cryptographic linking.
- Using scripts or software to perform tasks without manual input.
- Project management method using small, iterative steps.
- Open-source operating system with many distributions.
- Network of malware-infected devices controlled remotely.
- Practice of protecting digital assets from threats.
- Converting data into unreadable code for protection.
- Flooding a network with traffic to disrupt service.
- A sequence of instructions used in software tasks.
- Low-level code interacting directly with hardware.
- On-demand delivery of IT resources over the internet.
- Malware that demands payment to unlock encrypted data.
Down
- Computers mimicking human cognitive functions.
- Professional who interprets data to help decision-making.
- Wireless technology for short-distance device communication.
- Numeric label identifying devices on a network.
- Loss of signal strength in networking cables.
- Attempt to infiltrate digital systems maliciously.
- Developer who creates the visual interface of websites.
- Temporary storage for fast data retrieval.
20 Clues: Temporary storage for fast data retrieval. • Loss of signal strength in networking cables. • Computers mimicking human cognitive functions. • Numeric label identifying devices on a network. • Attempt to infiltrate digital systems maliciously. • A sequence of instructions used in software tasks. • Low-level code interacting directly with hardware. • ...
tema 2 perkembangan ekonomi digital 2025-10-27
Across
- → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
- → Perusahaan baru yang berbasis teknologi disebut
- → Kecerdasan buatan dikenal juga dengan istilah
- → Data berukuran besar yang digunakan untuk analisis bisnis disebut
- → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
- → Tokopedia, Shopee, dan Lazada adalah contoh platform
- → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
- → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
- → Pemasaran melalui media sosial disebut
- → Contoh aplikasi fintech di Indonesia adalah
Down
- → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
- → Keamanan transaksi online dikenal dengan istilah
- → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
- → Transaksi keuangan secara online disebut
- → Fintech merupakan singkatan dari
- → Berjualan melalui marketplace online termasuk kegiatan
- → Ekonomi digital menciptakan pekerjaan baru berbasis
- → Masa depan ekonomi digital bergantung pada literasi
- → Risiko ekonomi digital adalah kebocoran
- → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
20 Clues: → Fintech merupakan singkatan dari • → Pemasaran melalui media sosial disebut • → Risiko ekonomi digital adalah kebocoran • → Transaksi keuangan secara online disebut • → Contoh aplikasi fintech di Indonesia adalah • → Kecerdasan buatan dikenal juga dengan istilah • → Perusahaan baru yang berbasis teknologi disebut • → Keamanan transaksi online dikenal dengan istilah • ...
TEMA 2 2025-10-27
Across
- Tokopedia dan Shopee termasuk jenis platform ini.
- Teknologi penyimpanan data berbasis internet.
- Proses jual beli melalui internet.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Proses promosi produk melalui media sosial.
- Salah satu contoh dompet digital di Indonesia.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Singkatan dari Financial Technology.
- Istilah lain dari pembayaran tanpa uang tunai.
Down
- Media sosial yang sering digunakan untuk promosi produk.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Pihak yang menjual barang atau jasa di internet.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Salah satu contoh dompet digital di Indonesia. • Istilah lain dari pembayaran tanpa uang tunai. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
TEMA 2: EKONOMI DIGITAL 2025-10-23
Across
- Istilah lain dari pembayaran tanpa uang tunai.
- Sistem keamanan digital yang digunakan untuk melindungi data.
- Mata uang digital yang tidak diatur oleh bank sentral.
- Sistem ekonomi yang berbasis pada teknologi dan internet.
- Perusahaan yang menggunakan teknologi digital untuk menjalankan bisnisnya.
- Kemampuan seseorang menggunakan teknologi informasi dengan bijak.
- Salah satu contoh dompet digital di Indonesia.
- Data besar yang digunakan untuk menganalisis perilaku konsumen.
- Media sosial yang sering digunakan untuk promosi produk.
- Proses promosi produk melalui media sosial.
Down
- Pihak yang menjual barang atau jasa di internet.
- Tokopedia dan Shopee termasuk jenis platform ini.
- Aktivitas ekonomi yang dilakukan secara daring disebut ekonomi.
- Istilah untuk kegiatan belajar atau kursus secara online.
- Proses jual beli melalui internet.
- Singkatan dari Financial Technology.
- Teknologi penyimpanan data berbasis internet.
- Platform pemerintah untuk mendukung transaksi digital di Indonesia.
- Salah satu manfaat ekonomi digital: menciptakan banyak ___ kerja.
- Tempat di mana penjual dan pembeli bertemu secara online.
20 Clues: Proses jual beli melalui internet. • Singkatan dari Financial Technology. • Proses promosi produk melalui media sosial. • Teknologi penyimpanan data berbasis internet. • Istilah lain dari pembayaran tanpa uang tunai. • Salah satu contoh dompet digital di Indonesia. • Pihak yang menjual barang atau jasa di internet. • Tokopedia dan Shopee termasuk jenis platform ini. • ...
Fundamentals of Computing Terms 2020-09-21
Across
- A harmful computer program that creates glitches
- transferring data from the internet to a device
- a small graphic that represents a file/application
- A widely-accepted cyber security measure
- the protection of computer systems/networks
- an interface for connecting peripheral devices
- an output device that displays info from CPU
- uses pictures and words to represent ideas, etc.
- a piece of equipment outside the computer
- software that is pre-programmed for user
Down
- the blocking of data access for ransom
- program that you run on a computer/phone
- an input device that allows user to click graphics
- 8 bites of info represented in 1 character
- the brain of the computer
- Temporary memory
- smallest piece of info in the computer
- items that you can touch, I.E, tablet, etc.
- transferring data to the internet
- a unit of storage that is about 1 mil bytes
- the network of physical objects
21 Clues: Temporary memory • the brain of the computer • the network of physical objects • transferring data to the internet • the blocking of data access for ransom • smallest piece of info in the computer • program that you run on a computer/phone • A widely-accepted cyber security measure • software that is pre-programmed for user • a piece of equipment outside the computer • ...
Executive Branch 2023-06-02
Across
- The state prison or correction centers
- Government handles Urban issues such as substandard and deteriorating housing
- Ensures America's environmental and nuclear ______
- Promote student achievement and ______
- Promote the economic and social well-being of children and families
- Enhance the health and well-being of all Americans
Down
- Operates and maintains systems for the nation's finace
- Uphold the rule and law and protect civil rights
- Manages public lands and minerals
- Provides military forces and protects the United States
- Provides job and employment
- Promotes job creation and economic growth
- Offers education and rehabilitation services for Veterans
- Helps Americans start, build and grow businesses
- Responsible for terrorism and cybersecurity
- We provide leadership on food, agriculture and natural resources
- Defending the United States through control and exploitation of air and space
- Emergency services and first responders such as law enforcement
- Managing state toll factions
- Protect and promote the U.S security
20 Clues: Provides job and employment • Managing state toll factions • Manages public lands and minerals • Protect and promote the U.S security • The state prison or correction centers • Promote student achievement and ______ • Promotes job creation and economic growth • Responsible for terrorism and cybersecurity • Uphold the rule and law and protect civil rights • ...
KeyW Crossword 2017-01-18
Across
- When at work, what must you always carry
- Applying statistical analysis to data which has a geographical or spatial aspect
- KeyW non-profit organization abbreviated
- KeyW's best location
- What is the name of our newsletter
- KeyW CEO
- Time sheet
- What is the surname of KeyW's founder
- What type of bird is our mascot
Down
- KeyW's colors
- What month was KeyW founded
- What is the name of our mascot
- Radio Detection and Ranging
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- Parrot Ball location
- How many miles connect Key West to Florida main land
- Which food truck offers the best cheese steaks
- What color is our KeyW van
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
science-and-technology 2 2023-11-25
Across
- Device that speeds up charged particles.
- The path of an object around a celestial body.
- Managing temperature and weather conditions.
- Computer-generated simulation of a three-dimensional environment.
- Design and construction of new biological parts.
- Device that converts hydrogen into electricity.
- Study of ionized gases (plasma).
Down
- Protection of computer systems from theft or damage.
- Altering genes in an organism's DNA.
- Relating to electric and magnetic fields.
- Elementary particle and a fundamental constituent of matter.
- Study of extremely low temperatures.
- Manipulation of matter on a molecular or atomic scale.
- Electromagnetic radiation with longer wavelengths than visible light.
- Long-term alteration in Earth's climate.
- Small rocky object orbiting the sun.
- Application of biological principles to medicine.
- Programs and applications for computers.
- Thread-like structure of DNA in the nucleus.
- Ability of machines to learn from data.
20 Clues: Study of ionized gases (plasma). • Altering genes in an organism's DNA. • Study of extremely low temperatures. • Small rocky object orbiting the sun. • Ability of machines to learn from data. • Device that speeds up charged particles. • Long-term alteration in Earth's climate. • Programs and applications for computers. • Relating to electric and magnetic fields. • ...
Technology Crossword 2024-05-29
Across
- AI
- a computer that works like a human brain
- a form of a monitarilly valuable item
- Something that is a threat to us non physically
- this is a watch or VR headset
- Something that can be invaded
- an orbit of artifical stars in a pattern
- a form of tourism that is very expensive and not many have a chance to go.
- Exploring the largest part of earth
- Advanced Computing
Down
- Finger print or face id
- a form of engineering
- A form of travel out of this world
- Threat of Unemployment
- Analysis of data
- Something seen as a toy for some but fly
- having people colonize a close planet
- Something almost everyone uses
- many people have these devices
- a way of making sure that you get what you need to get well
20 Clues: AI • Analysis of data • Advanced Computing • a form of engineering • Threat of Unemployment • Finger print or face id • this is a watch or VR headset • Something that can be invaded • Something almost everyone uses • many people have these devices • A form of travel out of this world • Exploring the largest part of earth • a form of a monitarilly valuable item • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
TTS INFORMATIKA 2025-04-24
Across
- media untuk menyebarkan konten budaya?
- contoh konten budaya?
- siapa yang mendesain tampilan apk?
- apa itu validasi konten?
- contoh search engine paling populer?
- apa tujuan produksi konten budaya?
- apa yang analisis data?
- siapa yang menggunakan search engine?
- profesi yang menjaga keamanan data?
Down
- – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
- – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
- apa itu keyword?
- siapa yang memberi haki di Indonesia?
- apa itu konten negatif
- kunci
- siapa yang bertugas memeriksa konten?
- – Profesi yang bertugas menjaga keamanan jaringan dan data.
- tujuan diseminasi konten budaya?
- contoh karya yang bisa didaftarkan haki?
- contoh konten negatif?20. apa tugas data analyst?
- saja siapa yang bisa membuat konten budaya?
- apa tugas programmer?
- – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
- – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
- apa yang diketikkan di search engine?
25 Clues: kunci • apa itu keyword? • contoh konten budaya? • apa tugas programmer? • apa itu konten negatif • apa yang analisis data? • apa itu validasi konten? • tujuan diseminasi konten budaya? • siapa yang mendesain tampilan apk? • apa tujuan produksi konten budaya? • profesi yang menjaga keamanan data? • contoh search engine paling populer? • siapa yang memberi haki di Indonesia? • ...
Reyfanzha XH/30 2025-04-15
Across
- Unsur budaya dalam konten digital disebut juga?
- Lembaga yang mengurus HAKI di Indonesia?
- Sintaks untuk mencari dalam situs tertentu?
- Kata kunci untuk mencari sinonim?
- Format umum bideo digital adalah?
- Profesi yang membuat perangkat lunak?
- Operator pencarian untuk kata kunci dijudul?
- Profesi pembuat aplikasi?
- Haki melindungi karya apa?
- Apa tujuan utama produksi konten digital?
- Haki menjaga kah dari?
- Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
- Pencarian menggunakan simbol bintang disebut?
- Operator untuk menemukan jenis file tertentu?
- Sesuatu yang tidak benar dan mengada ngada disebut?
- Ahli jaringan disebut?
- Apa media umum untuk diseminasi konten digital?
- Hak cipta dalam bahasa Inggris?
- Profesi yang menjaga keamanan data?
- Alat bantu desain konten digital adalah?
- Haki berlaku secara?
- Platform untuk distribusi video terpopuler?
- Salah satu bentuk haki?
- Konten yang disebar melalui suara?
- Apa operator untuk mengecualikan kata dalam pencarian?
25 Clues: Haki berlaku secara? • Ahli jaringan disebut? • Haki menjaga kah dari? • Salah satu bentuk haki? • Profesi pembuat aplikasi? • Haki melindungi karya apa? • Hak cipta dalam bahasa Inggris? • Kata kunci untuk mencari sinonim? • Format umum bideo digital adalah? • Konten yang disebar melalui suara? • Profesi yang menjaga keamanan data? • Profesi yang membuat perangkat lunak? • ...
TTS 2025-04-15
Across
- Perlindungan hukum untuk identitas produk
- Scientist Analis data untuk pengambilan keputusan
- Perundungan melalui media digital
- Simbol penanda pencarian fleksibel pada mesin pencari
- Masakan Jawa Timur Contoh pencarian kuliner khas Jawa Timur
- Platform berbagi video terbesar di dunia
- Cipta Perlindungan hukum untuk karya kreatif
- Kebencian Ungkapan yang menghina dan merendahkan
- Simbol pengurang kata kunci dalam pencarian
- Penulis kode program komputer
- Platform berbagi foto dan video populer
- Lembaga pemerintah pengelola HAKI
Down
- Buatan" Penulisan untuk pencarian frasa spesifik
- Ideologi yang menganjurkan kekerasan
- Digital Pedoman moral dalam pembuatan konten digital
- Developer Pengembang dan pengelola situs web
- Analyst Pakar keamanan sistem komputer
- Budaya Tujuan penyebaran konten budaya
- Konten seksual yang eksplisit
- Informasi palsu yang tersebar luas
- Jaipong Contoh konten budaya Sunda di media digital
- Perlindungan hukum untuk inovasi
- Designer Perancang antarmuka pengguna
- Singkatan dari Hak Kekayaan Intelektual
- Operator logika untuk pencarian gabungan kata kunci
25 Clues: Konten seksual yang eksplisit • Penulis kode program komputer • Perlindungan hukum untuk inovasi • Perundungan melalui media digital • Lembaga pemerintah pengelola HAKI • Informasi palsu yang tersebar luas • Ideologi yang menganjurkan kekerasan • Designer Perancang antarmuka pengguna • Analyst Pakar keamanan sistem komputer • Budaya Tujuan penyebaran konten budaya • ...
Technology vocabulary 2025-09-03
Across
- Virtual reality, a 3D digital world.
- An electronic machine that processes information.
- Technology you can put on your body.
- A person who loves technology.
- To bring software to the newest version.
- Computers that can act and “think” like humans.
- A program used on a phone or computer.
- A small electronic device.
- A screen you can control by touching.
- To take a file from the internet.
- Wireless internet connection.
Down
- A picture of what’s on your screen.
- To look through websites or files.
- Someone who writes computer code.
- Protecting computers and data from attacks.
- To write words on a keyboard.
- To turn off and then back on again.
- To add a file to an email.
- A place or device that gives Wi-Fi access.
- To send a file to the internet.
- A portable computer.
21 Clues: A portable computer. • To add a file to an email. • A small electronic device. • To write words on a keyboard. • Wireless internet connection. • A person who loves technology. • To send a file to the internet. • Someone who writes computer code. • To take a file from the internet. • To look through websites or files. • A picture of what’s on your screen. • ...
Words In Eagle 101 I Learned 2025-10-07
Across
- Drug Abuse Resistance Education
- To stand up to something you believe in.
- Can happen to the lungs of people who smoke.
- Stress or worriness. A type of emotion.
- How to be a good citizen on the internet.
- An e-cigarette.
- The things you feel on the inside(Joy, sad,ect.)
- Mr. Rieck's favorite sports team.
- The act of having a bond with another person.
- A movie we watched in Eagle 101.
Down
- Security on electronic devices.
- We watch them every Friday to keep things on the happy side of life.
- An opioid and drug that messes with your body.
- Coloring or listening to music for a reset.
- A motivational speaker.
- A timer race Mr. Rieck uses.
- A fear of something (Mr. Rieck's is 67)
- Drugs such as vapes that have flavor.
- A type of drug.
- Someone who is outgoing and willing to work in a group.
20 Clues: An e-cigarette. • A type of drug. • A motivational speaker. • A timer race Mr. Rieck uses. • Security on electronic devices. • Drug Abuse Resistance Education • A movie we watched in Eagle 101. • Mr. Rieck's favorite sports team. • Drugs such as vapes that have flavor. • Stress or worriness. A type of emotion. • A fear of something (Mr. Rieck's is 67) • ...
ch1-2-3 2021-09-25
Across
- quality of dealing with ideas rather than events
- malicious software
- track online activity and capture data
- study of what is right or wrong in human conduct
- a way to discover and fix a problem in a system
- process to protect individual and organization
Down
- the beliefs of the individuals or groups as to what is wrong and right
- replicates itself independently in a network
- automatically delivers advertisements
- holds a computer system captive until payment is made
- the degree to which something is able or fit to be used
- usually spreads by USB drives, emails or network shares
12 Clues: malicious software • automatically delivers advertisements • track online activity and capture data • replicates itself independently in a network • process to protect individual and organization • a way to discover and fix a problem in a system • quality of dealing with ideas rather than events • study of what is right or wrong in human conduct • ...
Love Data Week Crossword 2025-01-24
Across
- Acronym for the Office of the Chief Information Officer
- The process of making uniform or homogeneous
- Examination of data
- GNB’s Chief Information Officer
- The protection of computers and networks against unauthorised access and sabotage
Down
- Indigenous Data ___________ is the ability for Indigenous peoples, communities, and Nations to participate, steward, and control data that is created with or about themselves
- VPN’s offering
- Info that gives info about other info?
- Secrecy and fidelity one cannot break
- Hopephully phutile ephphort to dishonestly obtain sensitive inphormation
- Unauthorized access to personal information
- Perform very well in data analysis?
12 Clues: VPN’s offering • Examination of data • GNB’s Chief Information Officer • Perform very well in data analysis? • Secrecy and fidelity one cannot break • Info that gives info about other info? • Unauthorized access to personal information • The process of making uniform or homogeneous • Acronym for the Office of the Chief Information Officer • ...
Anson Khoo Kai Loon 8G 2023-01-19
Across
- People use this to study online during the pandemic.
- To protect others from looking in your phone.
- protects you from networks & programs digital attacks.
- We can use ________ to communicate with others all around the world.
- You can send a ______ to your friends to play with.
Down
- A website that people use to buy something online.
- A website that people use to search.
- You need to press _______ to shut your computer/laptop.
- Made by Mark Zuckerberg.
- Its use in almost all electronic devices.
- An old website that people use to search something.
11 Clues: Made by Mark Zuckerberg. • A website that people use to search. • Its use in almost all electronic devices. • To protect others from looking in your phone. • A website that people use to buy something online. • An old website that people use to search something. • You can send a ______ to your friends to play with. • People use this to study online during the pandemic. • ...
Internet Crossword 2024-12-04
Across
- the global computer system that interconnects technology
- a unique form of personal data which website ask for
- a platform where resources are managed on a a computer
- the language of the computer which are performed on a computer
- the delivery of IT resources throughout the Internet
- the programs that build a computer
Down
- the physical connection of computers together
- a barricade that monitors information going in or out
- the protection of computers, data, and the Internet
- the amount of data your computer can handle
- a coding error on a computer
11 Clues: a coding error on a computer • the programs that build a computer • the amount of data your computer can handle • the physical connection of computers together • the protection of computers, data, and the Internet • a unique form of personal data which website ask for • the delivery of IT resources throughout the Internet • ...
Logiscool v3 2025-11-11
Across
- What you type to tell AI what to do
- Describes vehicles that can drive themselves
- Protecting computers and data from harm
- Doing the right thing in technology and AI
Down
- A programming language for coders
- A virtual world where people can meet and play
- A computer program that chats like a person
- Co-founder of DeepMind and leader in AI innovation
- Flying robots used for photos, deliveries, or rescue
- Teen inventor who created tech to fight cyberbullying (Gitanjali ___)
- Smart systems that can think and learn like humans
11 Clues: A programming language for coders • What you type to tell AI what to do • Protecting computers and data from harm • Doing the right thing in technology and AI • A computer program that chats like a person • Describes vehicles that can drive themselves • A virtual world where people can meet and play • Co-founder of DeepMind and leader in AI innovation • ...
Mr Robot 2022-11-15
Across
- prevent attacks by blocking malicious traffic
- unwanted files or programs that can cause harm to a computer
- private information being kept secret
- people who seek to exploit weaknesses in software
- a set of characters that allows access to a system
- software designed to detect and destroy viruses
Down
- flaws in software
- the art of protecting networks, devices, and data from attacks
- type of email use to steal information about you
9 Clues: flaws in software • private information being kept secret • prevent attacks by blocking malicious traffic • software designed to detect and destroy viruses • type of email use to steal information about you • people who seek to exploit weaknesses in software • a set of characters that allows access to a system • ...
CWSI Cyber CrossWord 2025-03-25
Across
- Foundation of both cybersecurity and team collaboration
- Common attack vector for phishing and scams
- What you should never do with suspicious links or attachments
- A vulnerability in software waiting to be exploited
- Guidelines that govern secure workplace behavior
Down
- A physical or digital object used for multi-factor authentication
- What hackers see unaware employees as
- A potential danger that exploits system vulnerabilities
- The chance that a threat will exploit a vulnerability
9 Clues: What hackers see unaware employees as • Common attack vector for phishing and scams • Guidelines that govern secure workplace behavior • A vulnerability in software waiting to be exploited • The chance that a threat will exploit a vulnerability • Foundation of both cybersecurity and team collaboration • A potential danger that exploits system vulnerabilities • ...
End Users and Cybersecurity 2023-10-13
Across
- 85% of people posting puppy photos are trying to _____ you
- _____ are connected to the internet
- ensure that the correct information is relayed to the right destination across the network
- _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
- network of connections between people, things, data, and processes
- shortened URLs
Down
- variant of malware
- person who uses IT products or services
- occurs when an end user receives an illegitimate message or email
- providing education to end users can mitigate cybersecurity _____
- almost every employee has access to this
- help protect your internet connection and privacy online
12 Clues: shortened URLs • variant of malware • _____ are connected to the internet • person who uses IT products or services • almost every employee has access to this • help protect your internet connection and privacy online • 85% of people posting puppy photos are trying to _____ you • occurs when an end user receives an illegitimate message or email • ...
1 2025-05-22
Across
- – A program or practical use of something in real life
- – Something given in recognition of excellence or achievement
- – Something given or added to help achieve a goal
- – A result gained by effort or skill
Down
- – Protection of computer systems and networks from attacks
- – The use or study of computers and technology
- – An area of study, activity, or interest
- – A fundamental element or basis of something
- – The strong effect or influence of something
- – A reward given to someone for winning or achieving something
- – An organized collection of information stored electronically
- – Something handed down from the past
12 Clues: – A result gained by effort or skill • – Something handed down from the past • – An area of study, activity, or interest • – A fundamental element or basis of something • – The strong effect or influence of something • – The use or study of computers and technology • – Something given or added to help achieve a goal • ...
Compliance Week - Day 1 Puzzle 2022-10-09
Across
- Intimidation of an individual after reporting an allegation of misconduct.
- When PHI is exposed, a _______ of the patient's privacy has been committed.
- Never share your ________ with anyone.
- The ____ is an anonymous way to report a compliance concern. (707.825.1027)
- Health insurance portability & accountability act.
Down
- Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others.
- Computer security
- It is our job to _______ our clients health record.
- Verify this for every client every time (3 words)
- An official inspection of an individual's or organization's accounts.
- Protected health information.
11 Clues: Computer security • Protected health information. • Never share your ________ with anyone. • Verify this for every client every time (3 words) • Health insurance portability & accountability act. • It is our job to _______ our clients health record. • An official inspection of an individual's or organization's accounts. • ...
ACC 2022-09-27
Across
- We waive any right of recovery we may have
- platform used to log calls
- ensures small business owners are protected from the ongoing threats of Cybersecurity breaches
- our ABI know it all
- are excluded for both Property and Liability (BOP and CPP) coverage including Inland Marine.
Down
- contains a collection of additional coverages and increased limits for certain coverages
- an inspection required in the state of NY
- optional coverage maximizes limits
- provides coverages at no cost
- Option for liability limit
- script used to answer a call
11 Clues: our ABI know it all • platform used to log calls • Option for liability limit • script used to answer a call • provides coverages at no cost • optional coverage maximizes limits • an inspection required in the state of NY • We waive any right of recovery we may have • contains a collection of additional coverages and increased limits for certain coverages • ...
ict 2024-07-02
Across
- Number system with two digits, 0 and 1, used by computers.
- Security system that monitors and controls network traffic.
- Process of converting information into a secure form.
- Organized collection of data.
- Intelligence: Simulation of human intelligence by machines.
Down
- Device connected to a computer (e.g., printer, mouse).
- Technique of creating virtual versions of computer resources.
- Protection of computer systems from digital attacks
- Finding and fixing errors or bugs in software code.
- Step-by-step procedure for solving a problem.
- System: Software that manages computer hardware and software resources.
11 Clues: Organized collection of data. • Step-by-step procedure for solving a problem. • Protection of computer systems from digital attacks • Finding and fixing errors or bugs in software code. • Process of converting information into a secure form. • Device connected to a computer (e.g., printer, mouse). • Number system with two digits, 0 and 1, used by computers. • ...
Provalus Crossword 2025-09-30
Across
- The one medication on the list that is an anti-arrythmic
- Which is the insurance plan that covers low-income individuals?
- Which Aux code is used for lunch?
- The keyboard shortcut for "select all"
- The Medicare part that covers hospital visits
- The protection of digital data
- How many folders deep can you go in OneDrive?
Down
- Which is the insurance plan that covers individuals above 65?
- Disregarding concerns
- How many days long is the probation period?
- How many times you should say a customer's name in a phone call
- What Citrix is
- The components of active listening are attention and ____
13 Clues: What Citrix is • Disregarding concerns • The protection of digital data • Which Aux code is used for lunch? • The keyboard shortcut for "select all" • How many days long is the probation period? • The Medicare part that covers hospital visits • How many folders deep can you go in OneDrive? • The one medication on the list that is an anti-arrythmic • ...
Introduction to Cybersecurity 2021-07-13
Across
- SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
- USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
- A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
- SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
- MALICIOUS SOFTWARE.
Down
- AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
- MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
- SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
- COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
- A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
10 Clues: MALICIOUS SOFTWARE. • A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE • SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE. • MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID. • ...
Introduction to Cybersecurity 2021-07-13
Across
- COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
- USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
- MALICIOUS SOFTWARE.
- SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
- SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
Down
- AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
- A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
- SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
- A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
- MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
10 Clues: MALICIOUS SOFTWARE. • A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE • SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE. • SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES. • ...
Cybersecurity Crossword Puzzle 2023-05-25
Across
- Term for sexually explicit material available on the internet
- Software designs to damage or gain unauthorized access to a computer system
- Act of sending deceptive emails to trick individuals
- Every aspect of protecting an organization and its employees and assets against cyber threats
- Process of gaining unauthorized access to computer systems
Down
- One of the internet abuse effects for teenagers
- Act of deliberately using digital communication to harass or intimidate someone
- Software designed to protect against malicious software
- Practice of protecting information by converting it into a secret code
- A secret word or phrase that must be used to gain admission
10 Clues: One of the internet abuse effects for teenagers • Act of sending deceptive emails to trick individuals • Software designed to protect against malicious software • Process of gaining unauthorized access to computer systems • A secret word or phrase that must be used to gain admission • Term for sexually explicit material available on the internet • ...
Cybersecurity Week 1 2021-10-05
Across
- Short for malicious software designed to obtain information from a computer without the user's consent
- Protection of information assets within internetworked information systems
- Ensures the timely and reliable access and use of information systems
- Full use of a vulnerability for the benefit of an attacker
Down
- Protection of information from authorized access and disclosure
- A protected string of characters that authenticate a computer user to a system
- the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
- The protection of information from unauthorized modification
- A system or combination of systems that enforces a boundary between two or more networks
- An individual who attempts to gain unauthorized access to a computer system
10 Clues: Full use of a vulnerability for the benefit of an attacker • The protection of information from unauthorized modification • Protection of information from authorized access and disclosure • Ensures the timely and reliable access and use of information systems • Protection of information assets within internetworked information systems • ...
Cybersecurity Hex Crossword 2023-11-03
10 Clues: 46 55 4E • 4D 41 54 48 • 54 45 53 54 • 4C 49 46 45 • 43 4C 41 53 53 • 43 59 42 45 52 • 50 48 4F 4E 45 • 53 43 48 4F 4F 4C • 4C 41 50 54 4F 50 0A • 43 52 4F 53 53 57 4F 52 44
TPWD Cybersecurity Awareness 2024-10-08
Across
- A fake email designed to trick users into giving up personal information
- A way to verify a person's identity online
- A malicious software designed to harm a computer
- A software update that fixes vulnerabilities in a program
- Software that blocks harmful content from reaching your computer
Down
- A security breach that involves unauthorized access to data
- A security feature that requires more than one form of verification
- A network of infected computers controlled by a hacker
- The practice of protecting information from unauthorized access
- A set of guidelines for handling sensitive data
10 Clues: A way to verify a person's identity online • A set of guidelines for handling sensitive data • A malicious software designed to harm a computer • A network of infected computers controlled by a hacker • A software update that fixes vulnerabilities in a program • A security breach that involves unauthorized access to data • ...
Foundations of Cybersecurity 2024-11-20
Across
- This device inspects and filters network traffic
- the process of converting data into a code
- the process of verifying an identity before granting access
- the process of encoding information so that only the person that the message was intended for can read it
Down
- the practice of sending fake emails
- a network of compromised computers that are controlled by a single attacker
- a weakness within a computer system
- software that is designed to disrupt or damage access to a computer
- a type of malicious software that secretly gathers a user's personal data
- a type of malware that encrypts a victim's files or locks their device, and then demands payment
10 Clues: the practice of sending fake emails • a weakness within a computer system • the process of converting data into a code • This device inspects and filters network traffic • the process of verifying an identity before granting access • software that is designed to disrupt or damage access to a computer • ...
TBP FL-D 10/23 2023-10-23
Across
- Type of current produced by solar panels.
- The c in E=mc^2.
- Amount of heat required to raise temperature by 1 degree Celsius.
Down
- Type of engineer responsible for harnessing electricity.
- This cat may or may not be alive.
- Building with the most popular bathroom on UCF campus.
- Plastic polymer that can be recycled and reformed into another shape
- The cybersecurity team that works to defend an organization.
- Support structure that uses triangles.
9 Clues: The c in E=mc^2. • This cat may or may not be alive. • Support structure that uses triangles. • Type of current produced by solar panels. • Building with the most popular bathroom on UCF campus. • Type of engineer responsible for harnessing electricity. • The cybersecurity team that works to defend an organization. • ...
SBU TBP Crossword 10/5 2022-10-04
Across
- Species with the most genetic similarity to humans.
- Series of educational lectures hosted by Tau Beta Pi.
- Protection against unauthorized electronic data access.
- Process of converting data into a code for protection.
Down
- Mathematical function without "in-between" values.
- Longest bone in the human body.
- A structure consisting of beams connected in triangular shapes.
- ____'s constant gives the relationship between the energy and frequency of a photon.
- Third most common element in the universe.
9 Clues: Longest bone in the human body. • Third most common element in the universe. • Mathematical function without "in-between" values. • Species with the most genetic similarity to humans. • Series of educational lectures hosted by Tau Beta Pi. • Process of converting data into a code for protection. • Protection against unauthorized electronic data access. • ...
30 2023-06-06
Across
- - Online storage and computing services
- - Uniform Resource Locator, the address of a web page
- - Measures to protect computer systems and data from digital threats
- - Buying and selling goods or services online
- - Component that stores electrical energy
- - Conductive material for transmitting electricity
- - Device that changes the voltage of an electrical current
Down
- - Device that stores and provides electrical energy
- - Electrical socket for connecting devices to the power supply
- - Safety device that breaks the circuit when current exceeds a certain level
- - Complete path for electrical current
- - Device used to control the flow of electrical current
- - Component that restricts the flow of electricity
13 Clues: - Complete path for electrical current • - Online storage and computing services • - Component that stores electrical energy • - Buying and selling goods or services online • - Component that restricts the flow of electricity • - Conductive material for transmitting electricity • - Device that stores and provides electrical energy • ...
Computer Concepts 2025-11-18
Across
- software that detects and removes harmful programs
- images, visuals, and video are processed by a ___ processing unit
- protection of computers, networks, and data from attacks
- number system made of 0s and 1s
- the main circuit board that connects all components
- short-term working space used by a computer, also called RAM
- security tool that blocks unwanted network traffic
Down
- the screen that shows images and text
- scrambling data so only authorised users can read it
- number system based on 10
- the ___ processing unit is where calculations are performed
- scam where someone is tricked into giving personal information
- harmful software designed to damage or steal information
13 Clues: number system based on 10 • number system made of 0s and 1s • the screen that shows images and text • software that detects and removes harmful programs • security tool that blocks unwanted network traffic • the main circuit board that connects all components • scrambling data so only authorised users can read it • ...
technolgy 2024-12-20
Across
- Protecting digital information from threats.
- An online community for connecting with others.
- A person skilled in technology.
- A computer that provides data to other computers.
- Someone very interested in computers.
- A software used to access websites.
- To transfer a file from the internet to your device.
- To create an account on a website or app.
- Abbreviation for Artificial Intelligence.
Down
- Software that is free to use.
- Smart devices worn on the body, like fitness trackers.
- MEDIA Online platforms for sharing content and communication.
- HOTSPOT A location where wireless internet is available.
- PROVIDER A company that provides internet access.
- To transfer a file from your device to the internet.
- A computer-generated immersive experience.
- To log into an account.
17 Clues: To log into an account. • Software that is free to use. • A person skilled in technology. • A software used to access websites. • Someone very interested in computers. • To create an account on a website or app. • Abbreviation for Artificial Intelligence. • A computer-generated immersive experience. • Protecting digital information from threats. • ...
Rush Health Cybersecurity 2020-02-24
Across
- Malicious software that is implanted into a computer to disable, infect or allow to be remotely controlled by a hacker.
- Type of attack to steal username and password
- Type of unwanted emails
- a standalone malware computer program that replicates itself in order to spread to other computers
- Someone that does harm to a computer
- Scrambling information so that only those with the keys can read it
Down
- Type of malware that requires a ransom to remove the malware.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- Something that can harm your computer
10 Clues: Type of unwanted emails • Someone that does harm to a computer • Something that can harm your computer • Type of attack to steal username and password • Type of malware that requires a ransom to remove the malware. • Scrambling information so that only those with the keys can read it • ...
All Things Cybersecurity 2021-03-31
Across
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Small files that Web sites put on your computer hard disk drive when you first visit.
- Algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- Someone who seeks and exploits weaknesses in a computer system or computer network.
Down
- A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- An attempt by hackers to damage or destroy a computer network or system.
- A local or restricted communications network, especially a private network created using World Wide Web software.
10 Clues: An attempt by hackers to damage or destroy a computer network or system. • Someone who seeks and exploits weaknesses in a computer system or computer network. • Small files that Web sites put on your computer hard disk drive when you first visit. • ...
Cybersecurity crossword puzzle 2023-12-14
Across
- Software used to protect against viruses and malware.
- A program that replicates itself and spreads to other computers.
- An organization that identifies security flaws in software.
- An encrypted connection between a web browser and a server.
- A technique to deceive individuals into providing sensitive information.
- A type of attack that floods a network to disrupt its operation.
Down
- A system that verifies a user's identity through a unique physical characteristic.
- A secret code that only authorized parties should be able to read.
- The practice of keeping software up to date to protect against vulnerabilities.
- A sequence of characters used to authenticate identity or access.
10 Clues: Software used to protect against viruses and malware. • An organization that identifies security flaws in software. • An encrypted connection between a web browser and a server. • A program that replicates itself and spreads to other computers. • A type of attack that floods a network to disrupt its operation. • ...
Basic cybersecurity terms 2024-07-29
Across
- An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A security process that verifies the identity of a user or device attempting to access a system.
- A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
10 Clues: A security process that verifies the identity of a user or device attempting to access a system. • Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity Basics #1 2024-09-17
Across
- The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
- Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
- Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
- Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
- Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
- Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
- A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
- A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
- To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
- To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.
10 Clues: Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen. • To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn. • Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only. • ...
Compliance And Cybersecurity 2024-12-23
Across
- The process of confirming the identity of a user or device
- A malicious software program that encrypts files for ransom
- A set of rules or guidelines adopted by an organization.
- Do not share a password with members
Down
- A defensive system protecting networks from cyberattacks
- The act of adhering to laws, regulations, and standards.
- What does the HIPAA Privacy Rule protect?
- The deliberate act of stealing personal information online
- Data that is unreadable without decryption
- Rules to guard patient data
10 Clues: Rules to guard patient data • Do not share a password with members • What does the HIPAA Privacy Rule protect? • Data that is unreadable without decryption • A defensive system protecting networks from cyberattacks • The act of adhering to laws, regulations, and standards. • A set of rules or guidelines adopted by an organization. • ...
CYBERSECURITY CROSSWORD PUZZLE 2025-08-15
Across
- The process of converting data into a coded format to prevent unauthorized access.
- Malicious software designed to damage or disrupt systems.
- A network security device that monitors and filters incoming and outgoing traffic.
- A cyberattack method that tricks users into revealing sensitive information.
- A copy of data kept in case the original is lost or damaged.
Down
- Software that secretly monitors and collects user information.
- Secure connection method over the internet, often used for privacy.
- A self-replicating program that infects files or systems.
- An update to fix software vulnerabilities.
- A secret string used for authentication.
10 Clues: A secret string used for authentication. • An update to fix software vulnerabilities. • Malicious software designed to damage or disrupt systems. • A self-replicating program that infects files or systems. • A copy of data kept in case the original is lost or damaged. • Software that secretly monitors and collects user information. • ...
Cybersecurity Amelie BTS1 2025-12-02
Across
- A group of Internet-connected devices, each of which runs one or more bots.
- Completely Automated Public Turing test to tell Computers and Humans Apart.
- information that is officially secret.
Down
- An occasion when private information can be seen by people who should not be able to see it.
- deriving from or relating to a previously unknown vulnerability to attack in some software.
- (Acronym) - set of tools and processes designed to help organizations detect, prevent, and manage the unauthorized access, transmission, or leakage of sensitive data security strategy.
- (Acronym) - in the US, a law that states the level of care that employer health insurance plans must provide and the rules for the exchange and protection of personal medical information.
- (Acronym)- The use of two or more different types of proof of your identity when you are doing something online.
- Programs that surreptitiously monitor and report the actions of a computer user.
- theft the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
10 Clues: information that is officially secret. • A group of Internet-connected devices, each of which runs one or more bots. • Completely Automated Public Turing test to tell Computers and Humans Apart. • Programs that surreptitiously monitor and report the actions of a computer user. • ...
FITAVocab.lo 2013-05-15
Across
- code of positive conduct one uses such as plagiarism, copyright, etc.
- rules and behaviors designed to keep individuals safe online
- a search engine that goes through all the search engines.
- speed of machine
- short term memory for your computer
- a
Down
- a website that protects young people from cyber bullies
- protecting information on computer systems/networks
- a program that allows you to search information on the internet.
- a combining form meaning "computer," "computer network," or "virtual reality," used in the formation of compound words.
10 Clues: a • speed of machine • short term memory for your computer • protecting information on computer systems/networks • a website that protects young people from cyber bullies • a search engine that goes through all the search engines. • rules and behaviors designed to keep individuals safe online • a program that allows you to search information on the internet. • ...
