cybersecurity Crossword Puzzles

Cybersecurity101 2022-11-16

Cybersecurity101 crossword puzzle
Across
  1. malware that is secretly spying on you and stealing your data
  2. act of discovering open wifi networks by driving around
  3. malware that encrypts your files and system demanding payment
  4. practice of socially engineering high value individuals of an organization
  5. agency responsible for strengthening cybersecurity posture in the US
  6. brute force technique to discover files, domains, etc.
Down
  1. method of a threat actor uses to return into your network/device
  2. phishing over the phone
  3. common public-key encryption algorithm
  4. most common threat vector for social engineering
  5. phishing over text
  6. MITRE framework for tactics techniques and procedures

12 Clues: phishing over textphishing over the phonecommon public-key encryption algorithmmost common threat vector for social engineeringMITRE framework for tactics techniques and proceduresbrute force technique to discover files, domains, etc.act of discovering open wifi networks by driving aroundmalware that is secretly spying on you and stealing your data...

SCAI Feasting with Faculty 2023-11-02

SCAI Feasting with Faculty crossword puzzle
Across
  1. Location where data is stored in a computer's memory.
  2. The study of breaking codes and ciphers.
  3. Software designed to harm or infiltrate a computer.
  4. Low-level human-readable code for computers.
  5. Investigating digital evidence for legal purposes.
  6. Small storage areas inside the computer's CPU.
  7. Measures to keep your computer and data safe online.
Down
  1. Making data unreadable to unauthorized users.
  2. A secure way to verify the sender of a message.
  3. Moving information from one place to another.
  4. A digital barrier that protects your network from threats.
  5. A command that tells the computer what to do.

12 Clues: The study of breaking codes and ciphers.Low-level human-readable code for computers.Making data unreadable to unauthorized users.Moving information from one place to another.A command that tells the computer what to do.Small storage areas inside the computer's CPU.A secure way to verify the sender of a message....

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. A popular operating system.
  2. Securing computer systems against unauthorized access.
  3. Unethical practice of gaining unauthorized access to computer systems.
  4. Act of impersonating a legitimate entity to deceive individuals or gain access.
Down
  1. Desired outcomes.
  2. Malicious software used to gain unauthorised access to computer systems.
  3. Term for gaining access to a secure network through.

7 Clues: Desired outcomes.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems.Malicious software used to gain unauthorised access to computer systems....

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. Unethical practice of gaining unauthorized access to computer systems.
  2. A popular operating system.
  3. Desired outcomes.
  4. Term for gaining access to a secure network through.
Down
  1. Securing computer systems against unauthorized access.
  2. Act of impersonating a legitimate entity to deceive individuals or gain access.
  3. Malicious software used to gain unauthorised access to computer systems.

7 Clues: Desired outcomes.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems.Malicious software used to gain unauthorised access to computer systems....

Digital Literacy Basics 2024-12-09

Digital Literacy Basics crossword puzzle
Across
  1. The traces you leave online
  2. A combination of letters, numbers, and symbols used for security
  3. A way to protect your personal information online
  4. The online platform for social interaction
  5. To transfer a file from the internet to your device
Down
  1. The software used to access the internet
  2. An unsolicited email attempt to steal personal information
  3. A virtual space to store files

8 Clues: The traces you leave onlineA virtual space to store filesThe software used to access the internetThe online platform for social interactionA way to protect your personal information onlineTo transfer a file from the internet to your deviceAn unsolicited email attempt to steal personal information...

HP GPO Crossword puzzle 2022-06-22

HP GPO Crossword puzzle crossword puzzle
Across
  1. Helps move stock for HP
  2. Document that explains input output and process
  3. Safeguarding the digital world
  4. Converts screen to paper
  5. Introducing new methods, ideas, or products
Down
  1. Making sure your future generations are comfortable
  2. The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible

7 Clues: Helps move stock for HPConverts screen to paperSafeguarding the digital worldIntroducing new methods, ideas, or productsDocument that explains input output and processMaking sure your future generations are comfortableThe practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible

C for Cybersecurity 2022-10-08

C for Cybersecurity crossword puzzle
Across
  1. violation detected!
  2. do you have one installed on your system yet?
  3. A proper request always has a ...
  4. **across might come in handy here
  5. spotting threats on the go
Down
  1. feature that works 24 x 7 (6,2)
  2. explore solutions on your own **(2,Down)
  3. might as well be maleficent
  4. is always a target, keep it safe!
  5. delegate this work, please

10 Clues: violation detected!delegate this work, pleasespotting threats on the gomight as well be maleficentfeature that works 24 x 7 (6,2)is always a target, keep it safe!A proper request always has a ...**across might come in handy hereexplore solutions on your own **(2,Down)do you have one installed on your system yet?

Cybersecurity Decoded 1 2020-07-30

Cybersecurity Decoded 1 crossword puzzle
Across
  1. childhood game
  2. the iron giant
  3. used to fix jeans... or software
  4. Not canned food
  5. Dr's are known to have the messiest ones
Down
  1. they come out after the rain
  2. type of cleanliness
  3. Troy's downfall
  4. sugar comes in these
  5. Fake mustache, trench coat, sunglasses

10 Clues: childhood gamethe iron giantTroy's downfallNot canned foodtype of cleanlinesssugar comes in thesethey come out after the rainused to fix jeans... or softwareFake mustache, trench coat, sunglassesDr's are known to have the messiest ones

Cybersecurity First Principles 2016-06-14

Cybersecurity First Principles crossword puzzle
Across
  1. less complicated, less problems
  2. multiple layers of defense protect information
  3. to simplify and decrease the number of ways the software can be exploited
  4. privilege level which limits what access people have to your resources
Down
  1. any attempt to prevent people from being able to see information
  2. keeping information worlds from colliding
  3. keeping processes separated prevents the failure of one process from negatively impacting another
  4. resources - hardware, system objects, or processes - must be separated and used as intended
  5. able to be inserted or removed from a project
  6. summarizing or explaining in a way that can be easily understood

10 Clues: less complicated, less problemskeeping information worlds from collidingable to be inserted or removed from a projectmultiple layers of defense protect informationany attempt to prevent people from being able to see informationsummarizing or explaining in a way that can be easily understood...

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. A system that verifies a user's identity through a unique physical characteristic.
  2. A sequence of characters used to authenticate identity or access.
  3. An encrypted connection between a web browser and a server.
  4. An organization that identifies security flaws in software.
  5. A type of attack that floods a network to disrupt its operation.
Down
  1. Software used to protect against viruses and malware.
  2. A technique to deceive individuals into providing sensitive information.
  3. A program that replicates itself and spreads to other computers.
  4. A secret code that only authorized parties should be able to read.
  5. The practice of keeping software up to date to protect against vulnerabilities.

10 Clues: Software used to protect against viruses and malware.An encrypted connection between a web browser and a server.An organization that identifies security flaws in software.A program that replicates itself and spreads to other computers.A type of attack that floods a network to disrupt its operation....

Cybersecurity Awareness Crossword 2024-02-08

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. A program that hurts your computer and tries to split itself among other computers\
  2. Synonym for password
  3. Something you need to improve password security
  4. Searching for private information through the trash
  5. An email pretending to be from a trusted person or organization for nefarious reasons
  6. First word in the acronym "VPN"
  7. The percent of Americans who use the same password
Down
  1. Super common password worldwide
  2. The act of looking over someone's shoulder to steal information
  3. A dishonest scheme

10 Clues: A dishonest schemeSynonym for passwordSuper common password worldwideFirst word in the acronym "VPN"Something you need to improve password securityThe percent of Americans who use the same passwordSearching for private information through the trashThe act of looking over someone's shoulder to steal information...

Introduction to Cybersecurity 2025-06-19

Introduction to Cybersecurity crossword puzzle
Across
  1. Fraudulent attempt to steal sensitive data via deceptive emails.
  2. Incident where data is accessed/stolen without permission.
  3. Three core security goals: Confidentiality, Integrity, and _______.
  4. Moral principles governing digital behavior (e.g., privacy, transparency).
Down
  1. Security system that monitors/controls network traffic (blocks unauthorized access).
  2. Self-replicating malware that spreads between devices.
  3. Process of encoding data to prevent unauthorized reading.
  4. Malicious software designed to damage systems (e.g., viruses, trojans).
  5. Person who exploits system vulnerabilities.
  6. Software update to fix security flaws.

10 Clues: Software update to fix security flaws.Person who exploits system vulnerabilities.Self-replicating malware that spreads between devices.Process of encoding data to prevent unauthorized reading.Incident where data is accessed/stolen without permission.Fraudulent attempt to steal sensitive data via deceptive emails....

Isa usando un crusigrama 2020-08-21

Isa usando un crusigrama crossword puzzle
Across
  1. te protege de el coronavirus y lo usas al tener contacto con la gente
  2. para enmarcar una foto
  3. hace que estes prevenido de lo que le pueden hacer a la computadora
  4. infectan archivos y destruyen datos de tu computadora
  5. donde guardas mucho informacion, fotos y muchas cosas tuyas
  6. para no dañarte los ojos al tomar sol
Down
  1. una enfermedad que genero una pandemia
  2. es donde esta tu rutina y te la recuerda al mirarlo
  3. para emprolijarte el pelo
  4. te despierta o te recuerda algo

10 Clues: para enmarcar una fotopara emprolijarte el pelote despierta o te recuerda algopara no dañarte los ojos al tomar soluna enfermedad que genero una pandemiaes donde esta tu rutina y te la recuerda al mirarloinfectan archivos y destruyen datos de tu computadoradonde guardas mucho informacion, fotos y muchas cosas tuyas...

Team - AllSafe 2022-03-27

Team - AllSafe crossword puzzle
Across
  1. Data that can identify a specific individual
  2. What's common between Aetnaand cyber security? (Clue: Important to save money)
  3. Compliance standard to safeguard health information
  4. An off-site attack surface (Clud: Most SaaS platforms use this service)
  5. a person who exposes information that is deemed illegal/private (Clue: cybersecurity researcher who alerted CVS of the breach)
Down
  1. A social engineering attack
  2. Risk assessment of vendors, suppliers, partners, contractors, or service providers
  3. Head of information security program
  4. Method to reduce human error
  5. Electronically-stored health information

10 Clues: A social engineering attackMethod to reduce human errorHead of information security programElectronically-stored health informationData that can identify a specific individualCompliance standard to safeguard health informationAn off-site attack surface (Clud: Most SaaS platforms use this service)...

WeWork 109NBR - Know Your Neighbours! 2024-08-30

WeWork 109NBR - Know Your Neighbours! crossword puzzle
Across
  1. Singaporean home cleaning service provider
  2. European cybersecurity company
  3. Their software helps you to manage (real estate) properties
  4. Barbie and Hot Wheels toy company
Down
  1. Has an exhibition at the Funan Underground Pedestrian Link @ B2, owner of hit series ‘The King’s Avatar’
  2. Sea creature or digital marketing platform?
  3. Yuu rewards club creator (hint: check Apple/Google Play store)
  4. Temasek founded AI-powered computer vision application
  5. Global banking company, good for currency exchange
  6. Payments platform for Boost, McDonalds and Dunkin Donuts

10 Clues: European cybersecurity companyBarbie and Hot Wheels toy companySingaporean home cleaning service providerSea creature or digital marketing platform?Global banking company, good for currency exchangeTemasek founded AI-powered computer vision applicationPayments platform for Boost, McDonalds and Dunkin Donuts...

Jobs of the future 2025-04-30

Jobs of the future crossword puzzle
Across
  1. Farmer – Someone who uses technology to grow food in cities.
  2. – A person who creates computer programs and apps.
  3. – A person who designs and builds robots.
  4. – A person who helps design self-driving cars.
  5. – A scientist who works with genes to improve health.
Down
  1. – Someone who explores space and other planets.
  2. Expert – A person who protects computers from hackers.
  3. – Someone who studies and protects the environment.
  4. Energy Specialist – Someone who creates energy from the sun and wind.
  5. Biologist – A person who studies the oceans and marine life.

10 Clues: – A person who designs and builds robots.– A person who helps design self-driving cars.– Someone who explores space and other planets.– A person who creates computer programs and apps.– Someone who studies and protects the environment.– A scientist who works with genes to improve health.Expert – A person who protects computers from hackers....

PIXEL PERFECT PUZZLE 2025-05-28

PIXEL PERFECT PUZZLE crossword puzzle
Across
  1. Refers to unwanted bulk emails that come from unknown sources
  2. The process of transforming data into an unreadable code
  3. Device that connects multiple networks
  4. It can be defined as the legal rules and restrictions imposed on online laws
Down
  1. Type of cyber attack that tricks users
  2. Wireless technology used to interconnect mobiles computers etc
  3. Network topology with a central hub
  4. Practice of protecting digital information
  5. It is a combination of two terms 'net' and 'etiquette'
  6. Refers to an illegal intrusion into a computer system or network

10 Clues: Network topology with a central hubType of cyber attack that tricks usersDevice that connects multiple networksPractice of protecting digital informationIt is a combination of two terms 'net' and 'etiquette'The process of transforming data into an unreadable codeRefers to unwanted bulk emails that come from unknown sources...

Safety week 2026-02-02

Safety week crossword puzzle
Across
  1. Knowing the risks and staying safe online
  2. Keeping your personal information safe and private
  3. Giving permission before information or pictures are used
  4. Fake images, videos, or sounds made by AI
  5. A system that stops harmful access to a computer or network
  6. Rules a computer follows to solve problems or sort information
Down
  1. Checking that information, accounts, or sources are real
  2. Knowing what is right and wrong when using technology
  3. Protecting computers, networks, and data from online threats
  4. Scrambling information so only allowed people can read it

10 Clues: Knowing the risks and staying safe onlineFake images, videos, or sounds made by AIKeeping your personal information safe and privateKnowing what is right and wrong when using technologyChecking that information, accounts, or sources are realGiving permission before information or pictures are used...

Internet Safety Crossword 2025-03-04

Internet Safety Crossword crossword puzzle
Across
  1. Cyberstalking is the use of digital technology to track and harass someone.
  2. Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
  3. When someone builds trust online to exploit or harm another person, often for illegal or abusive purposes.
  4. Something built specifically for web browsers to track, personalize and save information about each user's session.
  5. The illegal copying or distribution of copyrighted material via the Internet.
  6. Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
  7. Phishing is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
  8. The act of someone causing discord online or in person.
  9. Footprint A digital footprint is the traceable data and activity a user leaves on the internet.
  10. Someone who uses the internet to exploit or harm others, often by gaining their trust first.
Down
  1. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.
  2. Identity Theft When a malicious actor steals someone's online identity in order to cause damage – financial or reputational, or by intimidating, harassing, or threatening their victim.
  3. Photoshop is an image creation, graphic design and photo editing software developed by Adobe.
  4. Shouting is typing in all capital letter, which is considered yelling.
  5. A set of unofficial rules for good behavior and politeness followed by users of online and digital technologies such as the Internet, email, and chatrooms.
  6. Settings The part of a social networking website, web browser, or other piece of software, that allows a user to control who sees information about the user.
  7. An online real-time conversation, typically carried out by people who use nicknames instead of their real names.
  8. for weblog) A diary or personal journal kept on a website.
  9. When someone films an assault as a prank and shares it online, promoting violence and bullying
  10. The use of a computer as an instrument to further illegal ends

20 Clues: The act of someone causing discord online or in person.for weblog) A diary or personal journal kept on a website.The use of a computer as an instrument to further illegal endsShouting is typing in all capital letter, which is considered yelling.Cyberstalking is the use of digital technology to track and harass someone....

'Digital' Crossword 2019-07-07

'Digital' Crossword crossword puzzle
Across
  1. Highly digitized and connected production facility that relies on smart manufacturing
  2. Interconnected Digital Technologies for better customer experience
  3. ASTM F2792
  4. Systematic computational analysis of data or statistics
  5. Network of Internet connected objects able to collect and exchange data
  6. Digital version of a physical asset and/or process
  7. Integration of digital information with live video or the user's environment in real time
  8. Network of remote servers hosted on the Internet to store, manage, and process data
  9. Small autonomous services that work together
Down
  1. Simulated Intelligence in machines
  2. Massive Volume of Data inundated daily
  3. Robotic Process Automation
  4. Processing Quantum Bits of Data
  5. Techniques of protecting computers, networks, programs and data from unauthorized access or attacks
  6. Digital records of transaction

15 Clues: ASTM F2792Robotic Process AutomationDigital records of transactionProcessing Quantum Bits of DataSimulated Intelligence in machinesMassive Volume of Data inundated dailySmall autonomous services that work togetherDigital version of a physical asset and/or processSystematic computational analysis of data or statistics...

NCSAM 2024-08-27

NCSAM crossword puzzle
Across
  1. duh
  2. duh2
  3. duh3
Down
  1. duh4

4 Clues: duhduh4duh2duh3

Technological Progress 2024-03-09

Technological Progress crossword puzzle
Across
  1. Meeting present needs without compromising future resources
  2. Transmitting information over a distance by electronic means
  3. The use of living systems and organisms to develop products
  4. The use of machines to perform tasks without human intervention
  5. The process of introducing new ideas or methods
Down
  1. Protecting computers and networks from theft or damage
  2. Designing, constructing, and using robots
  3. A secure, shared digital ledger for recording transactions
  4. A set of rules to solve problems or perform computations

9 Clues: Designing, constructing, and using robotsThe process of introducing new ideas or methodsProtecting computers and networks from theft or damageA set of rules to solve problems or perform computationsA secure, shared digital ledger for recording transactionsMeeting present needs without compromising future resources...

Thinklogic 2021-09-13

Thinklogic crossword puzzle
Across
  1. DX
  2. CX
Down
  1. Salesguy
  2. Search Engine

4 Clues: DXCXSalesguySearch Engine

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

Knowledge Adventure Crossword Puzzle 2023-06-18

Knowledge Adventure Crossword Puzzle crossword puzzle
Across
  1. Measures to protect digital information.
  2. A reference to a source of information
  3. Online location with webpages.
  4. Connected to or available on the internet.
Down
  1. A structured collection of data accessible in various formats
  2. A significant word or term used in searching for information)
  3. A software program used to search for information on the interne
  4. Content that includes various forms of media.
  5. Legal protection for original creative works to prevent unauthorized use or copying.

9 Clues: Online location with webpages.A reference to a source of informationMeasures to protect digital information.Connected to or available on the internet.Content that includes various forms of media.A structured collection of data accessible in various formatsA significant word or term used in searching for information)...

PIXEL PERFECT PUZZLE 2025-05-28

PIXEL PERFECT PUZZLE crossword puzzle
Across
  1. Wireless technology used to interconnect mobiles computers etc
  2. Refers to unwanted bulk emails that come from unknown sources
  3. Practice of protecting digital information
  4. Network topology with a central hub
Down
  1. It is a combination of two terms 'net' and 'etiquette'
  2. The process of transforming data into an unreadable code
  3. Type of cyber attack that tricks users
  4. Refers to an illegal intrusion into a computer system or network
  5. Device that connects multiple networks

9 Clues: Network topology with a central hubType of cyber attack that tricks usersDevice that connects multiple networksPractice of protecting digital informationIt is a combination of two terms 'net' and 'etiquette'The process of transforming data into an unreadable codeRefers to unwanted bulk emails that come from unknown sources...

Planet of Nico 2021-12-09

Planet of Nico crossword puzzle
Across
  1. it's our secret word
  2. your favorite youtuber
  3. they keep you happy as long as you feed them with water
  4. our happiest place in the world
  5. the most beautiful instrument
  6. juan's best friend that eats a lot of croquettes
  7. basically what you do everyday
Down
  1. you love making them whenever you have the most beautiful view
  2. it's the most delicious kind of sandwich in the world
  3. you go there to clean your mind for a while
  4. you can sometimes eat it with some bubble tea
  5. it's the most handsome and smart man in the world
  6. you love doing this and it makes you learn a lot
  7. they're fluffy and they need belly pets

14 Clues: it's our secret wordyour favorite youtuberthe most beautiful instrumentbasically what you do everydayour happiest place in the worldthey're fluffy and they need belly petsyou go there to clean your mind for a whileyou can sometimes eat it with some bubble teajuan's best friend that eats a lot of croquettes...

CSA Terms 2022-01-13

CSA Terms crossword puzzle
Across
  1. A cybersecurity control framework for cloud computing, used as a tool for the systematic assessment of a cloud implementation
  2. A credential and training program that fills the gap in the market for technical education for cloud IT auditing
  3. A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
  4. A cloud service model that provides resource pools of virtualized infrastructure, such as compute, network, or storage pools
  5. A program designed to help customers assess and select a CSP through a three-step program of self-assessment, third-party audit, and continuous monitoring
Down
  1. A certificate that is widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
  2. A tool that offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
  3. Union's agency dedicated to achieving a high common level of cybersecurity across Europe
  4. An on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies
  5. A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted

10 Clues: Union's agency dedicated to achieving a high common level of cybersecurity across EuropeA credential and training program that fills the gap in the market for technical education for cloud IT auditingA cloud computing model where a third-party provider delivers hardware and software tools to users over the internet...

Industry Buzz 2025-01-07

Industry Buzz crossword puzzle
Across
  1. Curriculum, pedagogy, classroom, lesson plans
  2. Counseling, mental health, wellbeing
Down
  1. Marketing, finance, strategy, management
  2. Networks, cybersecurity, coding, software
  3. Patient care, diagnoses, treatment, hospitals

5 Clues: Counseling, mental health, wellbeingMarketing, finance, strategy, managementNetworks, cybersecurity, coding, softwarePatient care, diagnoses, treatment, hospitalsCurriculum, pedagogy, classroom, lesson plans

Crossword Puzzle 2024-06-26

Crossword Puzzle crossword puzzle
Across
  1. Popular brand for laptops and other tech devices, known for its ThinkPad series.
  2. Brand recognized for its audio-visual and computer connectivity products.
  3. Brand known for producing high-quality bags, cases, and other accessories.
  4. Who are we?
Down
  1. Mighty leader in sales Team.
  2. Brand specializing in interactive displays and collaboration technology.
  3. Brand famous for its cybersecurity solutions.
  4. Brand known for its Galaxy series of smartphones.

8 Clues: Who are we?Mighty leader in sales Team.Brand famous for its cybersecurity solutions.Brand known for its Galaxy series of smartphones.Brand specializing in interactive displays and collaboration technology.Brand recognized for its audio-visual and computer connectivity products....

Financial literacy 2024-05-10

Financial literacy crossword puzzle
Across
  1. Protection from hacking
  2. First name of the person who is on the cover of our magazine
  3. Scholarships based on athletic or academic achievements
  4. ____ percent go to needs in the 50-30-20 rule.
  5. way to save money
Down
  1. _____ Change; problem for insurance
  2. Go ____ if you've reached the sixth step to home buying
  3. _______ Score; only get to check this a certain amount of times per year

8 Clues: way to save moneyProtection from hacking_____ Change; problem for insurance____ percent go to needs in the 50-30-20 rule.Go ____ if you've reached the sixth step to home buyingScholarships based on athletic or academic achievementsFirst name of the person who is on the cover of our magazine...

Security Awareness 2024-04-16

Security Awareness crossword puzzle
Across
  1. Testing environment.
  2. Protect sensitive information from being leaked by users.
  3. "M" Computer security company.
  4. Most common six-letter word that is used for passwords that doesn't require numbers. or punctuation
  5. Most common cyberattack on internet.
Down
  1. Social __ when actors trick others into revealing sensitive info.
  2. An attack where a person allows themselves to be identified as someone else.
  3. As cybersecurity threats grow, sites include this increased security feature.

8 Clues: Testing environment."M" Computer security company.Most common cyberattack on internet.Protect sensitive information from being leaked by users.Social __ when actors trick others into revealing sensitive info.An attack where a person allows themselves to be identified as someone else....

School Safety 2022-11-28

School Safety crossword puzzle
Across
  1. a reason for doing something
  2. national threat assessment center
  3. a statement with intention to inflict, pain, injury, or other hostile action on someone or something
Down
  1. protecting school networks from hackers
  2. document that outlines how a school will prepare, respond and recover
  3. a network security device
  4. a person who carries out a harmful, illegal or immoral act
  5. violence directed at a student, group, or location

8 Clues: a network security devicea reason for doing somethingnational threat assessment centerprotecting school networks from hackersviolence directed at a student, group, or locationa person who carries out a harmful, illegal or immoral actdocument that outlines how a school will prepare, respond and recover...

Cybersecurity Workforce Framework 2020-10-28

Cybersecurity Workforce Framework crossword puzzle
Across
  1. and Operate, Specialized denial and deception operations
  2. and Development, provide leadership, management, direction, an/or development
  3. Provision, Conceptualize, design, and build secure IT systems
Down
  1. and Defend, Identification, analysis and mitigation of threats
  2. Examine cyber events and/or crimes of IT systems
  3. Review and evaluate incoming cybersecurity information
  4. and maintain, Provide support, administration and maintenance

7 Clues: Examine cyber events and/or crimes of IT systemsReview and evaluate incoming cybersecurity informationand Operate, Specialized denial and deception operationsProvision, Conceptualize, design, and build secure IT systemsand Defend, Identification, analysis and mitigation of threatsand maintain, Provide support, administration and maintenance...

Cybersecurity Awareness Month - 2023 2023-10-17

Cybersecurity Awareness Month - 2023 crossword puzzle
Across
  1. an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single session
  2. one of the biggest ransomware attacks
  3. an unwanted software designed to throw advertisements up on your screen, most often within a web browser
  4. a set of changes to a computer program or its supporting data designed to update, fix, or improve
  5. a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks
  6. is an authentication method that requires the user to provide two or more verification factors to gain access
Down
  1. a malware that misleads users of its true intent by disguising itself as a standard program
  2. a software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user
  3. designed to detect and destroy computer viruses
  4. validating the user identity
  5. will you stop clicking phishing links?
  6. a self-replicating virus that does not alter files but resides in active memory and duplicates itself
  7. a type of characters that you should use in your passwords
  8. harmful software

14 Clues: harmful softwarevalidating the user identityone of the biggest ransomware attackswill you stop clicking phishing links?designed to detect and destroy computer virusesa type of characters that you should use in your passwordsa malware that misleads users of its true intent by disguising itself as a standard program...

FUN CyberSecurity Puzzle CIS120 2025-03-18

FUN CyberSecurity Puzzle CIS120 crossword puzzle
Across
  1. Rule specific configuration setting that determines how data flows through a firewall.
  2. type of malware that spreads by attaching itself to other programs or files.
  3. cyberattack that redirects users to fake websites to steal personal information.
  4. A network compromised of computers controlled remotely to perform certain activities.
  5. The process of converting data into code to prevent hacks.
  6. A program that records keystrokes to steal information like passwords and Keys.
  7. A person who gains unauthorized access to systems or networks.
Down
  1. type of malware that replicates itself to spread across networks without needing a host file.
  2. A group of devices used to monitor and gather information without user consent.
  3. An act of disguising communication to appear as if it's from a trusted source.
  4. Software updates. These fix vulnerabilities or improve security.
  5. Malware or Hacker that locks users out of their system. until ransom is paid.
  6. Factor Authentication The security process that requires two forms of verification to access an account.
  7. vulnerability in software that is unknown to the vendor and can be exploited by attackers.

14 Clues: The process of converting data into code to prevent hacks.A person who gains unauthorized access to systems or networks.Software updates. These fix vulnerabilities or improve security.type of malware that spreads by attaching itself to other programs or files.Malware or Hacker that locks users out of their system. until ransom is paid....

Cybersecurity and Compliance Week! 2025-11-10

Cybersecurity and Compliance Week! crossword puzzle
Across
  1. What emails are you supposed to report to IT?
  2. What is a security measure that requires at least two forms of identification?
  3. Who is a person who gains unauthorized access to computer systems?
  4. What is the process of converting data into a secure format?
  5. Who is the HR Reporting Officer?
  6. What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
  7. What is the term for the agreement between covered entities and business associates?
  8. You are the first line of ___ in protection of DDID and AHS
Down
  1. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
  2. What is a central concept of HIPAA that protects individuals' health information?
  3. Who is the HIPAA Privacy Officer?
  4. What is the term for malicious software?
  5. Who is the Security Officer?
  6. What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?

14 Clues: Who is the Security Officer?Who is the HR Reporting Officer?Who is the HIPAA Privacy Officer?What is the term for malicious software?What emails are you supposed to report to IT?You are the first line of ___ in protection of DDID and AHSWhat is the process of converting data into a secure format?...

Cybersecurity 701 Unit 5 2025-11-10

Cybersecurity 701 Unit 5 crossword puzzle
Across
  1. A systematic examination of security controls and configurations to identify issues and ensure compliance.
  2. A validation method that uses vulnerability scanning tools again to check the effectiveness of previous remediation efforts
  3. A remediation action that involves dividing a network into smaller, isolated sections to contain threats.
  4. A single virtual or physical host that is configured to appear vulnerable and/or attractive to potential attackers to lure them in
  5. A network composed of multiple deception hosts, which is more difficult for attackers to detect.
  6. A method of ensuring application security by analyzing source code or binary code without executing the application
Down
  1. The initial phase of a penetration test involving intelligence gathering on the target system or network
  2. The method of isolating or restricting access to compromised or suspicious systems or data to contain and limit the impact of a security incident.
  3. A cybersecurity practice that involves simulating cyberattacks to proactively identify vulnerabilities in a system.
  4. A bait file intended to be accessed by malicious actors, which sends an alarm and indicates unauthorized activity in a system
  5. The abbreviation for tools designed to prevent unauthorized access, use, or transmission of sensitive data.
  6. The abbreviation for a comprehensive solution that centralizes log and event data to quickly respond to incidents
  7. Fictitious words or records added to legitimate databases whose presence indicates stolen data, serving as a passive detection method.
  8. A network protocol that collects IP traffic flow information for analysis and monitoring to provide insight into network traffic patterns.

14 Clues: A network composed of multiple deception hosts, which is more difficult for attackers to detect.The initial phase of a penetration test involving intelligence gathering on the target system or networkA remediation action that involves dividing a network into smaller, isolated sections to contain threats....

Cybersecurity Awareness Month 2023 2023-08-29

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. The individuals who control access to people, data, and systems
  2. Kwiktrip's password policy requires that coworkers change their passwords __days
  3. You can help fight cybercrime by becoming a __________
  4. What is the common hacking method
  5. These are designed to maintain the security of everyone associated with an organization
  6. This attack occurs when cybercriminals research and track which sites employees visit the most
Down
  1. _____are the last line of defense
  2. Failure to run these equals failure to patch security vulnerabilities
  3. This security tool identified and removes malicious programs
  4. This dangerous attack targets specific people or organization, often with custom made email or messages
  5. Stealing money is the main goal behind this type of malware
  6. Any scenario that triggers emotions should also trigger your ______
  7. This attack occurs when someone sneaks into a secured area behind someone else
  8. What should you do when a workstation or device is no longer in use
  9. The future of security is_____, not machines

15 Clues: _____are the last line of defenseWhat is the common hacking methodThe future of security is_____, not machinesYou can help fight cybercrime by becoming a __________Stealing money is the main goal behind this type of malwareThis security tool identified and removes malicious programsThe individuals who control access to people, data, and systems...

Cybersecurity Fundamental Chapter 1 2022-11-03

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. attacks that originate from within an organization.
  2. the honeynet project.
  3. unethical criminals who violate computer and network security for personal gain, or for malicious reason, such as attacking networks.
  4. breaks into network or computer systems to discover weakness in order to improve the security of these systems.
  5. infragard is an example of widespread sharing of cyber intelligent.
  6. groups of criminals break into computers or networks to gain access for various reason.
  7. who rally and protest against different political and social ideas
  8. external threats from amateurs or skills attackers can exploit vulnerabilities in network devices.
Down
  1. somewhere between white and black hat attackers.
  2. grey hat hackers who attempt to discover exploits and report them to vendor, and sometimes for prizes or rewards.
  3. hobbyists mostly limited to pranks and vandalism, have little or no skills.
  4. nation common vulnerabilities and exposures (CVE) database.
  5. black hat hackers who are either self-employed or working for large cybercrime organizations.
  6. the standard provides a framework for implementing cybersecurity measures within an organization.

14 Clues: the honeynet project.somewhere between white and black hat attackers.attacks that originate from within an organization.nation common vulnerabilities and exposures (CVE) database.who rally and protest against different political and social ideasinfragard is an example of widespread sharing of cyber intelligent....

CYBER SECURITY 2023-12-27

CYBER SECURITY crossword puzzle
Across
  1. Software update designed to fix security vulnerabilities.
  2. Interconnected computers facilitating communication and data exchange.
  3. Measures to protect computer systems from attacks.
  4. Hint: Verifying the identity of a user through passwords or biometrics.
  5. Secret code for user access.
  6. Deceptive emails or websites aiming to steal data.
  7. breach Unauthorized access leading to the exposure of sensitive information.
Down
  1. Software designed to harm or exploit computer systems.
  2. Software designed to detect and remove malicious programs.
  3. Converts sensitive information into a secret code.
  4. Unauthorized access or breach into a system.
  5. Deliberate exploitation of computer systems for malicious purposes.
  6. Acts as a digital barrier to unauthorized access.
  7. Requires two forms of identification for access.
  8. Hint: Weakness in a system that could be exploited by attackers.

15 Clues: Secret code for user access.Unauthorized access or breach into a system.Requires two forms of identification for access.Acts as a digital barrier to unauthorized access.Converts sensitive information into a secret code.Measures to protect computer systems from attacks.Deceptive emails or websites aiming to steal data....

DTIN- Final Crossword Part 2 2024-03-21

DTIN- Final Crossword Part 2 crossword puzzle
Across
  1. Type of digital currency that uses cryptography
  2. Methodology promoting continuous iteration of development
  3. Style of education through electronic and online media
  4. Network of physical objects connected to the internet
  5. Field involving analysis of raw data to draw conclusions
  6. Platforms for social interaction and content sharing
  7. Term for currency available only in digital form
  8. Large and complex data sets that are difficult to process
  9. Delivery of computing services over the internet
Down
  1. Decentralized ledger technology behind cryptocurrencies
  2. Simulated experience that can be similar to or different from the real world
  3. Protection of internet-connected systems from cyber threats
  4. Mobile phone with advanced features and connectivity
  5. Record of one's internet usage and online activities
  6. AI subset involving algorithms that learn over time

15 Clues: Type of digital currency that uses cryptographyTerm for currency available only in digital formDelivery of computing services over the internetAI subset involving algorithms that learn over timeMobile phone with advanced features and connectivityRecord of one's internet usage and online activitiesPlatforms for social interaction and content sharing...

Profesi Bidang Informatika 2025-04-10

Profesi Bidang Informatika crossword puzzle
Across
  1. : Orang yang menulis dan mengembangkan kode program
  2. : Profesi yang bertugas membangun dan mengembangkan aplikasi
  3. : Bidang yang berfokus pada perlindungan sistem dari serangan digital
  4. : Developer yang menguasai frontend dan backend
  5. : Bagian dari pengembangan web yang berhubungan dengan tampilan
  6. : Tempat penyimpanan data dalam sistem komputer
Down
  1. : Orang yang memberikan bantuan teknis kepada pengguna komputer
  2. : Profesi teknis dalam perancangan dan pengembangan sistem
  3. : Bagian dari pengembangan web yang mengatur logika dan basis data
  4. : Sebutan lain untuk orang yang menulis kode
  5. : Profesi yang fokus pada tampilan dan pengalaman pengguna
  6. : Seseorang yang mengakses sistem secara tidak sah, bisa positif atau negatif
  7. : Orang yang mengelola dan memelihara sistem jaringan dan server
  8. : Gabungan tugas development dan operations dalam pengembangan perangkat lunak
  9. : Orang yang menganalisis sistem dan kebutuhan perangkat lunak

15 Clues: : Sebutan lain untuk orang yang menulis kode: Developer yang menguasai frontend dan backend: Tempat penyimpanan data dalam sistem komputer: Orang yang menulis dan mengembangkan kode program: Profesi teknis dalam perancangan dan pengembangan sistem: Profesi yang fokus pada tampilan dan pengalaman pengguna...

Unlock Innovation 2025-09-12

Unlock Innovation crossword puzzle
Across
  1. Careful study to discover or develop new ideas.
  2. Word often used for devices like watches, TVs, or homes.
  3. Technology behind Bitcoin and secure digital records.
  4. The use of science and tools to solve problems.
  5. Innovation is all about shaping this.
  6. Legal protection for an invention.
  7. Where data is stored online instead of your computer.
  8. Machines that can “think” and “learn” like humans (abbr.).
  9. Immersive 3D experience using special headsets.
Down
  1. The ability to think of new ideas.
  2. The creative process of planning how something will look or work.
  3. A young company built on innovative ideas.
  4. The first working model of a new product.
  5. Machines designed to perform tasks like humans.
  6. Protecting systems and data from online attacks.

15 Clues: The ability to think of new ideas.Legal protection for an invention.Innovation is all about shaping this.The first working model of a new product.A young company built on innovative ideas.Careful study to discover or develop new ideas.Machines designed to perform tasks like humans.The use of science and tools to solve problems....

Easy Cyber Security 2021-11-28

Easy Cyber Security crossword puzzle
Across
  1. the topic is
  2. not fishing but
  3. I should open every attachment I get
  4. Bad software that infects your computer is called ______
  5. the people who attack us are called ______
Down
  1. A ____ breech is when a criminal steals confidential information
  2. you can't use your computer until you pay because you have _______
  3. I should always use a ______ password
  4. you get an email from someone you don't know asking you to open an attachment it is a

9 Clues: the topic isnot fishing butI should open every attachment I getI should always use a ______ passwordthe people who attack us are called ______Bad software that infects your computer is called ______A ____ breech is when a criminal steals confidential informationyou can't use your computer until you pay because you have _______...

business 2025-05-22

business crossword puzzle
Across
  1. RATE Leaving a company, often measured in percentages (HR).
  2. Strategy that compares performance with top competitors (Business).
  3. Security that protects systems and data (Tech).
  4. INNOVATION A revolutionary idea that changes the market (Business).
Down
  1. Design that improves how people interact with a product (Tech).
  2. Bringing new workers into a company smoothly (HR).
  3. Business model: selling directly to consumers (Business).
  4. AUDIENCE Group of people you market your product to (Marketing).
  5. Total money earned (Finance).

9 Clues: Total money earned (Finance).Security that protects systems and data (Tech).Bringing new workers into a company smoothly (HR).Business model: selling directly to consumers (Business).RATE Leaving a company, often measured in percentages (HR).Design that improves how people interact with a product (Tech)....

IT-terminology 2026-02-05

IT-terminology crossword puzzle
Across
  1. Technologies and practices designed to protect nerworks and hardware.
  2. Delivery of computing services over the internet.
  3. Digital key used for authentication.
  4. A service that creates an encrypted connection through a series of servers
  5. Unique address to indentify a website.
  6. The maximum rate of data transfer across a network.
  7. Malicious or harmful software
Down
  1. Process of finding and fixing code errors.
  2. A two-symbol numbering scheme.
  3. Rules for writing code in a programming language.
  4. A software you use to surf the internet.
  5. A network security system that monitors incoming outgoing traffic
  6. The thing every website forces on you.
  7. A virus or malware hidden in another piece of software
  8. Unwanted email messages.
  9. A set of rules allowing different software to communicate with each other.

16 Clues: Unwanted email messages.Malicious or harmful softwareA two-symbol numbering scheme.Digital key used for authentication.The thing every website forces on you.Unique address to indentify a website.A software you use to surf the internet.Process of finding and fixing code errors.Rules for writing code in a programming language....

Data Privacy and Cybersecurity 2022-08-15

Data Privacy and Cybersecurity crossword puzzle
Across
  1. This 2020 ballot initiative amended 2 down
  2. This type of document guides an organization's response after a data privacy and security incident
  3. A law firm that guides an organization through a data privacy and security incident
  4. A key "best practice" to implement to mitigate the chance of a successful data privacy and security incident
  5. This European Union law served as the basis for the creation of 2 down
  6. Ransomware is a type of ___ that or other malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is paid
  7. A financial product offered to organizations that can provide immense value in preparing for, and responding to, data privacy and security incidents
  8. An attack that involves targeting, impersonating or taking over business’ email accounts to gain access to critical business information or extract money
Down
  1. Number of comprehensive consumer privacy laws in the United States
  2. The United States' first state-specific consumer privacy law
  3. A third-party ___ incident where sensitive data from an organization is not stolen directly from it, but through one of its third-party vendors
  4. Unauthorized activity on an organization’s digital network
  5. The Advisen 2022 "Cyber Law Firm of the Year"
  6. This year's Cybersecurity Awareness Month theme - "See ___ in Cyber"

14 Clues: This 2020 ballot initiative amended 2 downThe Advisen 2022 "Cyber Law Firm of the Year"Unauthorized activity on an organization’s digital networkThe United States' first state-specific consumer privacy lawNumber of comprehensive consumer privacy laws in the United StatesThis year's Cybersecurity Awareness Month theme - "See ___ in Cyber"...

Cybersecurity Fundamentals Chapter 8 2022-11-08

Cybersecurity Fundamentals Chapter 8 crossword puzzle
Across
  1. US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
  2. poorly enforced security policies, no awareness of security
  3. the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
  4. open source linux security distribution.
  5. disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
  6. a method of testing the areas of weakness in systems by using various malicious techniques.
  7. includes the users who access the organization's information system.
Down
  1. assess computer, computer systems, networks, or applications for weakness.
  2. a non-profit organization that brings together industry, academia and government to address advance cyber threats.
  3. a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
  4. laws prohibit undesired behaviors.
  5. intercept and log network traffic
  6. provides free analysis and warning service to internet users and organizations.
  7. help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.

14 Clues: intercept and log network trafficlaws prohibit undesired behaviors.open source linux security distribution.poorly enforced security policies, no awareness of securityincludes the users who access the organization's information system.assess computer, computer systems, networks, or applications for weakness....

YTS Kitchen Tour 2024-03-08

YTS Kitchen Tour crossword puzzle
Across
  1. Your Technology Support provided IT team
  2. The easiest way to add phsyical security
  3. Hours support is available to our customers
  4. YTS is a Cisco Meraki partner to install this in your office
  5. #1 Concern of businesses today that costs over $300,000 per incident
  6. A common project YTS can handle for our customers
Down
  1. YTS provides Zoom certified staff to handle setting this up
  2. Level of service YTS provides to all customers
  3. How to prevent phsyical access to unauthorized people

9 Clues: Your Technology Support provided IT teamThe easiest way to add phsyical securityHours support is available to our customersLevel of service YTS provides to all customersA common project YTS can handle for our customersHow to prevent phsyical access to unauthorized peopleYTS provides Zoom certified staff to handle setting this up...

Chapter 8: Cybersecurity Vocab Crossword 2025-04-08

Chapter 8: Cybersecurity Vocab Crossword crossword puzzle
Across
  1. Update: phishing attack where the hacker sends a message regarding the restart or deactivation of your membership.
  2. a type of malware that gains access to your operating system, then locks you out of your own system, holding your own computer ransom until you pay for its release.
  3. Activity: phishing attack where the hacker sends a message regarding your account being locked out or unusual sign ins.
  4. Money Phish: phishing track where the hacker sends a message regarding some unearned money being given to you.
  5. Phish: phishing attack where the hacker sends a message for you to log back into your account.
  6. SMS phishing text messages asking you to click here.
  7. Before You Click’: Money Vehicle’s 5 Cyber security questions to ask yourself as you receive messages today, no matter if it looks like a known source or not.
  8. a system designed to block unauthorized access while still allowing outward communication.
  9. Funny Mirror: the lens people see the world of social media through, never a clear picture but always warped into how the content creator wants you to see the
Down
  1. a secret phrase used to gain admission into something.
  2. voicemail messages demanding you to take action.
  3. software that is designed to disrupt, damage, or gain unauthorized access to a computer.
  4. creating a story based on bits of information that the attacker has gathered to earn trust and manipulate an individual to share personal information.
  5. The Hackers: Money Vehicle’s approach to defending yourself in the online cyber war.
  6. Drive: a data storage device that can be used even when the device is turned off.
  7. Cloud: a data storage device that is stored on the internet
  8. Software: a program designed to detect and remove viruses and other malware from your computer.
  9. every aspect of your defense to fight the hackers.
  10. Password: an unpredictable password made up of eight (8) or more characters and using a combination of uppercase letters, lowercase letters, symbols, and numbers
  11. Engineering: the use of deception to manipulate an individual into giving personal information away.
  12. Phish: phishing attack where the hacker sends a message regarding a package being delivered.
  13. sending fraudulent messages that imitate a real company in hope of being given personal information.
  14. Horse: Leaving a piece of infected hardware, like a USB drive, some place public and waiting for someone to pick it up and try to use it, providing access to your system.

23 Clues: voicemail messages demanding you to take action.every aspect of your defense to fight the hackers.SMS phishing text messages asking you to click here.a secret phrase used to gain admission into something.Cloud: a data storage device that is stored on the internetDrive: a data storage device that can be used even when the device is turned off....

Cybersecurity Awareness Month Crossword Puzzle 2025-10-16

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. Software designed with intent to harm
  2. Overloads a network to kill it
  3. Secretly collects private info
  4. Way to send messages over internet
  5. Intrusively displays unwanted advertisements
  6. Identity to access a website
  7. Scrambles info to protect it
  8. Detects, prevents, and removes malware
  9. Attempt by Hackers to compromise data
  10. Locks you out system until paid
  11. A trick to get private info
Down
  1. Combination of stuff for security
  2. Disguises as legitimate software but bad
  3. Process to verify someone's identity
  4. Barrier between a trusted network
  5. Programs that attach and spread file
  6. A software update to fix vulnerabilities
  7. Bad guy who steals info
  8. Self replicating program that spreads independently
  9. Network of malware infected computers

20 Clues: Bad guy who steals infoA trick to get private infoIdentity to access a websiteScrambles info to protect itOverloads a network to kill itSecretly collects private infoLocks you out system until paidCombination of stuff for securityBarrier between a trusted networkWay to send messages over internetProcess to verify someone's identity...

Industry Buzz 2025-01-07

Industry Buzz crossword puzzle
Across
  1. Networks, cybersecurity, coding, software
  2. Therapy, counseling, mental health, wellbeing
Down
  1. Patient care, diagnoses, treatment, hospitals
  2. Marketing, finance, strategy, management
  3. Curriculum, pedagogy, classroom, lesson plans

5 Clues: Marketing, finance, strategy, managementNetworks, cybersecurity, coding, softwarePatient care, diagnoses, treatment, hospitalsCurriculum, pedagogy, classroom, lesson plansTherapy, counseling, mental health, wellbeing

CIS 120 Cybersecurity Crossword Puzzle 2023-02-21

CIS 120 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. software that is constantly updating
  2. software/hardware keep intruders out
  3. text read by human eye
  4. transform ciphertext into original plaintext
  5. test distinguishes between human/robot
  6. security mechanism determining who's authorized
  7. intent to cause mischief/theft
  8. code imbedded into computer hardware
  9. technique to click bad url
  10. physical parts of a computer
  11. core of computers operating system
Down
  1. trap or decoy for attackers
  2. coding used to protect information
  3. connect computers to encrypted network
  4. attempt to violate security perimeter
  5. language to create/control website content
  6. shield users against computer damage
  7. term for unauthorized computer attacker
  8. malicious software to damage systems
  9. an error in computer program

20 Clues: text read by human eyetechnique to click bad urltrap or decoy for attackersan error in computer programphysical parts of a computerintent to cause mischief/theftcoding used to protect informationcore of computers operating systemsoftware that is constantly updatingsoftware/hardware keep intruders outshield users against computer damage...

Cybersecurity Unit 4 Terminology Crossword 2023-04-21

Cybersecurity Unit 4 Terminology Crossword crossword puzzle
Across
  1. The operation finds the remainder of a division. For example, 5 mod 2 is 1 (5 divided by 2 has a remainder of1) and 38 mod 4 is 2 (38 divided by 4 has a remainder of 2).
  2. It is an encryption method where the sender and receiver share a single private key (such as a number, word, or phrase) to use in the encryption algorithm. Also called shared key and symmetric key encryption, the same key is used in both the encryption and decryption process.
  3. A cipher in which each letter in an alphabet is replaced with a different character or symbol.
  4. It is easy to do, but hard to undo.
  5. It is an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. Also called asymmetric key encryption, the keys are combined mathematically to create one key used in the encryption/decryption algorithm
  6. The encrypted message generated by a cipher
  7. A section of a Volume that's formatted for the operating system to use as storage areas. Data used for different purposes are often stored in separate partitions, for example, operating system software versus user data.
  8. Data that is being transferred between applications, between hosts, or around the network
  9. A file that contains other data and acts like a drive. It can be mounted (connected to) or unmounted (removed from) a drive letter, giving administrators greater control when making the data available to users.
  10. A string of characters used as a parameter that determines the output of an encryption algorithm.
  11. the practice of concealing messages within other data, such as text or images.
Down
  1. The last bit (the right-most bit) in a byte.
  2. It is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime.
  3. It is information or data that is valuable to an investigation of a crime involving a computer.
  4. Sometimes called a logical volume or logical drive, the accessible storage area on a hard disk or disks. A logical volume can span multiple disks but doesn't have to.
  5. Data that is stored somewhere
  6. A digital cash system that uses cryptography to secure the exchange financial transactions.
  7. an algorithm used for encryption or decryption
  8. The science and art of delivering a message securely and confidentially.
  9. Also called hashing, it is a computational process that converts data of varying size to a fixed-size. In cryptographic hash functions, the data is converted using a one-way function so the process cannot be reversed.
  10. A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
  11. The original message that needs to be encrypted
  12. Data that is being manipulated by an application
  13. The physical drives inside of a computer.

24 Clues: Data that is stored somewhereIt is easy to do, but hard to undo.The physical drives inside of a computer.The encrypted message generated by a cipherThe last bit (the right-most bit) in a byte.an algorithm used for encryption or decryptionThe original message that needs to be encryptedData that is being manipulated by an application...

Cybersecurity Awareness Month Crossword Puzzle 2025-10-16

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. Software designed with intent to harm
  2. Locks you out system until paid
  3. Combination of stuff for security
  4. Self replicating program that spreads independently
  5. Process to verify someone's identity
  6. Overloads a network to kill it
  7. A trick to get private info
  8. Detects, prevents, and removes malware
  9. Attempt by Hackers to compromise data
  10. Programs that attach and spread file
Down
  1. Secretly collects private info
  2. Scrambles info to protect it
  3. Network of malware infected computers
  4. Disguises as legitimate software but bad
  5. Intrusively displays unwanted advertisements
  6. Way to send messages over internet
  7. Barrier between a trusted network
  8. Identity to access a website
  9. A software update to fix vulnerabilities
  10. Bad guy who steals info

20 Clues: Bad guy who steals infoA trick to get private infoScrambles info to protect itIdentity to access a websiteSecretly collects private infoOverloads a network to kill itLocks you out system until paidBarrier between a trusted networkCombination of stuff for securityWay to send messages over internetProcess to verify someone's identity...

Technology Vocabulary 2025-05-03

Technology Vocabulary crossword puzzle
Across
  1. A product of digital audio
  2. A set of rules to solve a problem in a series of steps
  3. Listening or watching sound or video directly from the internet
  4. Protection of computer software
Down
  1. Username and Password
  2. Social media browse

6 Clues: Social media browseUsername and PasswordA product of digital audioProtection of computer softwareA set of rules to solve a problem in a series of stepsListening or watching sound or video directly from the internet

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

Data Breach Crossword 2025-03-28

Data Breach Crossword crossword puzzle
Across
  1. A type of attack that tricks users into revealing information (8 letters)
  2. Unauthorized access to data (6 letters)
  3. Sensitive information that could be compromised (8 letters)
  4. Someone who gains unauthorised access to data (6 letters)
  5. The process of keeping information safe (13 letters)
Down
  1. Financial consequences of breaching the DPA (5 letters)
  2. Damage to a company's public image (10 letters)
  3. Regulation that protects personal data in the EU
  4. A security measure that verifies identity (9 letters)
  5. A type of software used to steal data (7 letters)
  6. The act of making data unreadable to unauthorized users(10 letters)
  7. A measure to prevent unauthorized access (9 letters)

12 Clues: Unauthorized access to data (6 letters)Damage to a company's public image (10 letters)Regulation that protects personal data in the EUA type of software used to steal data (7 letters)A measure to prevent unauthorized access (9 letters)The process of keeping information safe (13 letters)A security measure that verifies identity (9 letters)...

CSE167 Terminology 2022-04-28

CSE167 Terminology crossword puzzle
Across
  1. a conventional encryption method that used a single key encryption
  2. when information kept private and secure
  3. the state of information while it is encrypted
  4. the state of information before it is encrypted
  5. the art of protecting information and information systems
  6. provides verification of identity
Down
  1. when systems are available to those who need them
  2. type of attack that bad actors use to gain information commonly through emails
  3. an encryption method that utilizes a public/private key
  4. two words which is a form of manipulation that bad actors use to gain unauthorized access
  5. records the identities and actives
  6. when the data is not modified

12 Clues: when the data is not modifiedprovides verification of identityrecords the identities and activeswhen information kept private and securethe state of information while it is encryptedthe state of information before it is encryptedwhen systems are available to those who need theman encryption method that utilizes a public/private key...

PAW 2024 Crossword Puzzle 2024-05-17

PAW 2024 Crossword Puzzle crossword puzzle
Across
  1. Check twice that all information is the correct information for the correct person _____ to releasing it.
  2. When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
  3. If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
  4. Always verify the source of an email ___________ clicking open any links.
  5. The patient must be informed of the purpose of the _________, use, or disclosure of their personal health information.
  6. When faxing, ensure that the fax _____-sheet is free of any personal health information.
  7. All access to personal health information must be for a ____ -related need-to-know.
  8. A patient may not only request confidential status for privacy reasons but may also require it for ______ reasons.
  9. If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
Down
  1. ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
  2. Loss of _____ by patients and families may be one of the consequences of a privacy breach.
  3. When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
  4. Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors, including curiosity and a concern about the well-being about others.
  5. All access to personal health information must be limited to what is _________ to perform your job duties.
  6. Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
  7. If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
  8. A strong passphrase should be at least four words and ___________ characters in length.
  9. If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.
  10. Consent must be _________, whether it is written or verbal.

19 Clues: Consent must be _________, whether it is written or verbal.Always verify the source of an email ___________ clicking open any links.All access to personal health information must be for a ____ -related need-to-know.A strong passphrase should be at least four words and ___________ characters in length....

Cybersecurity Awareness Month Crossword Puzzle 2024-09-30

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. address for accessing websites
  2. software used for destruction
  3. thief through computerized means
  4. software to monitor computerized information
  5. ID with magnetic access chip
  6. off personal computer storage
  7. lying about your location
  8. holds data hostage
  9. security tactics
  10. level for information security
  11. unsolicited meat banter
  12. strength in the security structure
Down
  1. weak point in security
  2. used to harm your computer
  3. the simplest part of security
  4. a code for keeping secrets
  5. needed for accessing secure information
  6. blocks out unauthorized access
  7. data to identify a person
  8. casting cyber bait

20 Clues: security tacticsholds data hostagecasting cyber baitweak point in securityunsolicited meat banterlying about your locationdata to identify a personused to harm your computera code for keeping secretsID with magnetic access chipsoftware used for destructionthe simplest part of securityoff personal computer storageaddress for accessing websites...

Cybersecurity Crossword Puzzle Asher Knowles 2023-01-25

Cybersecurity Crossword Puzzle Asher Knowles crossword puzzle
Across
  1. Overloading server to force shutdown
  2. looks innocent is malware
  3. Test's computers and server security
  4. Used to protect information
  5. Malware that tracks people’s activity
  6. Stands for internet protocol
  7. Faking Importance to hack someone
  8. Malicious software that damages systems
  9. tricking into clicking a fake
  10. hackers use to remote access
Down
  1. Bring your own device
  2. hacker who causes harm
  3. infected network of computers
  4. Malware that reproduces and spreads
  5. Process to access restricted things
  6. when many computers are connected
  7. used for private encrypted networking
  8. Means of attack on systems
  9. Tech to keep intruders out
  10. Tech to detect/remove viruses

20 Clues: Bring your own devicehacker who causes harmlooks innocent is malwareMeans of attack on systemsTech to keep intruders outUsed to protect informationStands for internet protocolhackers use to remote accessinfected network of computersTech to detect/remove virusestricking into clicking a fakewhen many computers are connected...

CIS 178 - Participation 3- Cybersecurity 2023-01-25

CIS 178 - Participation 3- Cybersecurity crossword puzzle
Across
  1. attacks seeking personal info
  2. virtual shield for data
  3. process of verifying user identity
  4. everyday objects connected to internet/network
  5. software that records keystrokes
  6. lots of attackers preventing legitimate users
  7. taking advantage of system flaw
  8. vulnerable points attackers gain entrance
  9. provides apps updated code
  10. appears harmless but is malicious
Down
  1. processing data for legal use
  2. allows secure remote connection
  3. decoding cypher to readable text
  4. programs that lure/trap hackers
  5. malware that makes you pay
  6. trying high volume of passwords combos
  7. commonly used for illegal internet activity
  8. method that scrambles data
  9. hacker gains access to data
  10. malware collects private information

20 Clues: virtual shield for datamalware that makes you paymethod that scrambles dataprovides apps updated codehacker gains access to dataprocessing data for legal useattacks seeking personal infoallows secure remote connectionprograms that lure/trap hackerstaking advantage of system flawdecoding cypher to readable textsoftware that records keystrokes...

Chapter 1 - Introduction to Cybersecurity 2025-08-11

Chapter 1 - Introduction to Cybersecurity crossword puzzle
Across
  1. The combination of the probability of an attack and the potential damage it could cause. (4 letters)
  2. The practice of protecting digital systems, networks, and programs. (13 letters)
  3. The practice of protecting information to ensure its confidentiality, integrity, and availability. (12 letters)
  4. The process of linking an action to a specific user. (10 letters)
  5. A person who explores and manipulates computer systems. (7 letters)
  6. The granting of privileges to a user after their identity is confirmed. (13 letters)
  7. A threat originating from outside a company's network. (8 letters)
  8. The process of safeguarding an organization's sensitive information. (10 letters)
  9. An ethical hacker who uncovers and fixes system vulnerabilities. (10 letters)
  10. The of stealing electronic data. (5 letters)
Down
  1. Amateur hackers who use tools created by others. (12 letters)
  2. A hacker who engages in malicious activities for personal gain or harm.
  3. A weakness or flaw that can be exploited by an attack. (13 letters)
  4. A potential event that could exploit a vulnerability and cause harm. (6 letters)
  5. The process of confirming a user's identity. (14 letters)
  6. The state of being usable and accessible to authorized users when required. (13 letters)
  7. An attack that is well-planned and carried out by skilled attackers. (10 letters)
  8. The property of data being accurate, consistent, and unaltered. (9 letters)
  9. A action on a system or network with the intent to cause damage or steal information. (6 letters)
  10. A hacker who may one day become either a black-hat or white-hat hacker. (8 letters)

20 Clues: The of stealing electronic data. (5 letters)The process of confirming a user's identity. (14 letters)The process of linking an action to a specific user. (10 letters)A weakness or flaw that can be exploited by an attack. (13 letters)A person who explores and manipulates computer systems. (7 letters)...

Cyber security 2025-12-14

Cyber security crossword puzzle
Across
  1. Digital information stored or shared on computers
  2. A security system that blocks unwanted network access
  3. A tool that secures internet connections and hides online activity
  4. Protecting computers and networks from digital attacks
  5. Tricking users into giving away personal information online
Down
  1. Malware that locks data and demands payment
  2. A type of malware that spreads by infecting files
  3. Harmful software designed to damage or spy on devices
  4. A person who breaks into or tests computer systems
  5. Security using fingerprints, face scans, or voice patterns
  6. Scrambling data so only authorized users can read it
  7. A network of infected devices controlled by attackers
  8. A secret word or code used to access an account

13 Clues: Malware that locks data and demands paymentA secret word or code used to access an accountDigital information stored or shared on computersA type of malware that spreads by infecting filesA person who breaks into or tests computer systemsScrambling data so only authorized users can read itHarmful software designed to damage or spy on devices...

Commerce Crossword - 3/3/25 2025-03-02

Commerce Crossword - 3/3/25 crossword puzzle
Across
  1. - A repayment or sum of money payed to an unhappy customer
  2. - Make a serious or heartfelt request
  3. - Someone who purchases items for personal use
  4. - Action of helping and/or assisting someone
  5. - A Dishonest scheme or fraud usually targetted online at people for money
  6. - A conclusion or resolution made after cosideration
  7. - Buying and selling goods
  8. - A Legally enforceable document between 2 or more people
Down
  1. - A Written Guarantee to a purchaser with a promise to repay or refund in a certain time period
  2. - Pay someone for the temporary use of something
  3. - An item manufactured and refined for sale
  4. - Someones regular profession or occupation
  5. - A protected string of symbols/numbers/letters used to authenticate access to sensitive information
  6. - Buying something
  7. - An Agreement that usually involves an obligation that cannot be broken
  8. - Online applications to protect senstive and private information
  9. - Legitimate actions
  10. - Online crimes like fraud and scamming

18 Clues: - Buying something- Legitimate actions- Buying and selling goods- Make a serious or heartfelt request- Online crimes like fraud and scamming- An item manufactured and refined for sale- Someones regular profession or occupation- Action of helping and/or assisting someone- Someone who purchases items for personal use...

Applications of Modern Computing 2025-03-12

Applications of Modern Computing crossword puzzle
Across
  1. A technology used to build decentralized applications
  2. A system where multiple computers work together to solve a problem
  3. A technique that helps computers recognize speech
Down
  1. A method of storing data over the internet
  2. A field focused on protecting computer systems from attacks
  3. The network of interconnected devices that exchange data
  4. The process of extracting useful insights from data
  5. A system that mimics human intelligence

8 Clues: A system that mimics human intelligenceA method of storing data over the internetA technique that helps computers recognize speechThe process of extracting useful insights from dataA technology used to build decentralized applicationsThe network of interconnected devices that exchange dataA field focused on protecting computer systems from attacks...

Tech and Parenting 2023-12-08

Tech and Parenting crossword puzzle
Across
  1. Time spent in front of screens like computers or phones.
  2. Someone with expertise in technology
  3. Features to restrict or monitor access.
Down
  1. Excessive and compulsive smartphone use.
  2. Protection against digital attacks and theft
  3. A break from digital devices for well-being

6 Clues: Someone with expertise in technologyFeatures to restrict or monitor access.Excessive and compulsive smartphone use.A break from digital devices for well-beingProtection against digital attacks and theftTime spent in front of screens like computers or phones.

Digital_Banking_Ishan_Krishna_Vatsa_TCE 2025-10-01

Digital_Banking_Ishan_Krishna_Vatsa_TCE crossword puzzle
Across
  1. : Technology used to protect sensitive banking data online.
  2. : Unified Payments Interface for instant fund transfer.
  3. : A card used to make payments directly from bank account.
  4. : A digital wallet for storing and spending money online.
  5. : Immediate Payment Service available 24x7.
  6. : A code scanned to make digital payments.
  7. : International system for secure money transfers between banks.
  8. : Fraudulent attempt to steal personal banking details.
  9. : A card that allows purchases on borrowed money.
  10. : National Electronic Funds Transfer system.
Down
  1. : Process of verifying customer identity online or offline.
  2. : Protection of online banking systems from fraud.
  3. : Technology companies that provide innovative financial services.
  4. : Process of verifying identity before digital banking access.
  5. : One Time Password for secure online transactions.
  6. : Real Time Gross Settlement for high value transfers.
  7. : Unique code used to identify a bank branch in online transfers.

17 Clues: : A code scanned to make digital payments.: Immediate Payment Service available 24x7.: National Electronic Funds Transfer system.: A card that allows purchases on borrowed money.: Protection of online banking systems from fraud.: One Time Password for secure online transactions.: Real Time Gross Settlement for high value transfers....

Technology 2026-01-26

Technology crossword puzzle
Across
  1. Using machines to do work automatically
  2. Protecting computers and data online
  3. Intelligence When machines think like humans
  4. A new idea or way of doing things
Down
  1. To create something new / to ~ America ; to ~ electricity
  2. To find something for the first time

6 Clues: A new idea or way of doing thingsTo find something for the first timeProtecting computers and data onlineUsing machines to do work automaticallyIntelligence When machines think like humansTo create something new / to ~ America ; to ~ electricity

SyberSafety 2021-05-19

SyberSafety crossword puzzle
Across
  1. Something that protects your data on online sites
  2. Being protected against the criminal or unauthorized use of electronic data
  3. An e-mail that has has malware attachments
  4. use of a computer as an instrument to further illegal ends
Down
  1. crime of obtaining the personal or financial information of another person
  2. Nefarious people _ _ _ _ into your computer
  3. malicious software

7 Clues: malicious softwareAn e-mail that has has malware attachmentsNefarious people _ _ _ _ into your computerSomething that protects your data on online sitesuse of a computer as an instrument to further illegal endscrime of obtaining the personal or financial information of another person...

ISSN Day 2 2024-10-08

ISSN Day 2 crossword puzzle
Across
  1. A key skill in IT that involves protecting data
  2. Foundational certification for cybersecurity professionals
  3. Entry-level certification for IT technicians
  4. A type of device that A+ covers
Down
  1. A role that involves helping users with tech problems
  2. Focuses on network fundamentals and infrastructure
  3. unique identifying number assigned to every device connected to the interne

7 Clues: A type of device that A+ coversEntry-level certification for IT techniciansA key skill in IT that involves protecting dataFocuses on network fundamentals and infrastructureA role that involves helping users with tech problemsFoundational certification for cybersecurity professionals...

Joon Xi 8 GAMMA 2023-01-19

Joon Xi 8 GAMMA crossword puzzle
Across
  1. Raw facts and figures. (not data)
  2. Device that everyone bring to school.
  3. A group or system of interconnected people or things.
  4. Is a practice of protecting system, network, and program from digital attack.
Down
  1. Transfer your data to a _______ organisation.
  2. Used fairly, openly, in ______ with the law.
  3. All the social media company have this policy.

7 Clues: Raw facts and figures. (not data)Device that everyone bring to school.Used fairly, openly, in ______ with the law.Transfer your data to a _______ organisation.All the social media company have this policy.A group or system of interconnected people or things.Is a practice of protecting system, network, and program from digital attack.

STS 2024-12-15

STS crossword puzzle
Across
  1. Major urban development expanding into rural areas.
  2. Tool to analyze environmental trends and data.
  3. Biodiversity loss due to human activities.
  4. Protection of endangered species and habitats.
  5. The global condition of rising temperatures and its effects.
  6. Using digital technology to enhance learning experiences.
  7. Using algorithms to mimic human thought processes.
Down
  1. Protection for computers against unauthorized access.
  2. A technology that allows virtual collaboration.
  3. The raw input used for computation or analysis.
  4. Digital networks and their protection mechanisms.
  5. Materials or energy sources found in nature.
  6. A numerical representation of environmental conditions.
  7. An invention or method that's newly created.
  8. Measure of diversity within ecosystems.
  9. A burst of rapid increase, often in demand or water levels.
  10. Sudden, uncontrolled spread of wildfires.

17 Clues: Measure of diversity within ecosystems.Sudden, uncontrolled spread of wildfires.Biodiversity loss due to human activities.Materials or energy sources found in nature.An invention or method that's newly created.Tool to analyze environmental trends and data.Protection of endangered species and habitats.A technology that allows virtual collaboration....

Cybersecurity Awareness Month - 2022 2022-09-29

Cybersecurity Awareness Month - 2022 crossword puzzle
Across
  1. A person who circumvents information security, often with malicious intent
  2. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  3. Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
  4. Event that has been determined to have an impact on the organization prompting the need for response and recovery.
  5. Fake messages from a seemingly trusted or reputable source designed to convince you to take some sort of action
  6. A made-up scenario developed by threat actors for the purpose of stealing a victim's personal data
  7. Data or other information which otherwise identifies an individual in a way that is reasonably likely to enable identification of a specific person (hint: abbreviation)
  8. A set of instructions, data or programs used to operate computers and execute specific tasks
Down
  1. Any crime which is committed electronically
  2. Security process that requires more than one method of authentication from independent sources to verify the user’s identity (hint: abbreviation)
  3. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  4. Someone who is deceived or cheated by the dishonesty of others
  5. The computer's tangible components or delivery systems that store and run the written instructions
  6. software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.

14 Clues: Any crime which is committed electronicallySomeone who is deceived or cheated by the dishonesty of othersA person who circumvents information security, often with malicious intentMalware designed to make data or hardware inaccessible to the victim until a ransom is paid....

Elephas - Cybersecurity Awareness Month 2024-10-18

Elephas - Cybersecurity Awareness Month crossword puzzle
Across
  1. Common type of cyberattack where the hacker encrypts your files and demands payment.
  2. This form of attack tries to trick you into giving personal information via fake websites or emails.
  3. A software that fights off malicious viruses and malware.
  4. The process of verifying someone's identity.
Down
  1. A person who attempts to gain unauthorized access to your system.
  2. A harmful program disguised as legitimate software.
  3. A malicious code that spreads from computer to computer.
  4. A type of phishing attack done over text messages.
  5. A ____ test is performed to identify vulnerabilities in a system.
  6. A phishing attack done over the phone.
  7. Multi-Factor Authentication is shortened to this.
  8. Protection against unauthorized changes to data.
  9. A strong, complex one helps protect your accounts.
  10. The backbone of secure communication online, abbreviated as SSL.

14 Clues: A phishing attack done over the phone.The process of verifying someone's identity.Protection against unauthorized changes to data.Multi-Factor Authentication is shortened to this.A type of phishing attack done over text messages.A strong, complex one helps protect your accounts.A harmful program disguised as legitimate software....

CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06

CYBERSECURITY AWARENESS CROSSWORD PUZZLE crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing network traffic
  2. hygiene The routine practices and steps taken to maintain good digital security.
  3. A private network that encrypts your internet connection to protect your data online.
  4. A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
  5. A malicious program disguised as legitimate software.
  6. breach An incident where sensitive information is accessed or disclosed without authorization.
  7. Malicious software designed to damage or gain unauthorized access to systems.
  8. Determines what an authenticated user is allowed to do
Down
  1. A type of malware that locks your data and demands payment to unlock it.
  2. A method of converting data into a secret code to prevent unauthorized access.
  3. The process of verifying the identity of a user or device
  4. A software update that fixes security vulnerabilities or bugs.
  5. Software designed to detect and remove malicious programs from your computer.
  6. Protecting data from being altered or tampered with

14 Clues: Protecting data from being altered or tampered withA malicious program disguised as legitimate software.Determines what an authenticated user is allowed to doThe process of verifying the identity of a user or deviceA software update that fixes security vulnerabilities or bugs.A type of malware that locks your data and demands payment to unlock it....

DPAC 2024-07-04

DPAC crossword puzzle
Across
  1. Balancing environmental and economic needs
  2. Organizing resources for efficiency
  3. Protecting systems from digital threats
  4. A fundamental resource essential for powering various activities
Down
  1. Converting processes into digital formats

5 Clues: Organizing resources for efficiencyProtecting systems from digital threatsConverting processes into digital formatsBalancing environmental and economic needsA fundamental resource essential for powering various activities

Gruppo 2 2016-05-24

Gruppo 2 crossword puzzle
Across
  1. Tipo di comunicazione senza fili
  2. Modifica di un software per rimuovere la protezione
  3. Programma informatico eseguito su un PC
  4. Applicazione per il recupero, la presentazione e la navigazione di pagine web
  5. Forma di attivismo Internet che identifica utenti o comunità online che agiscono anonimamente
  6. Attività di intercettazione passiva dei dati che transitano in una rete informatica
Down
  1. Linguaggio per la scrittura delle pagine Web
  2. Tipo di attacco informatico che impiega in la falsificazione dell'identità
  3. Insieme dei sistemi e dei servizi di protezione informatica (inglese)
  4. Diritto di autore

10 Clues: Diritto di autoreTipo di comunicazione senza filiProgramma informatico eseguito su un PCLinguaggio per la scrittura delle pagine WebModifica di un software per rimuovere la protezioneInsieme dei sistemi e dei servizi di protezione informatica (inglese)Tipo di attacco informatico che impiega in la falsificazione dell'identità...

Module 1 Test 2023-09-08

Module 1 Test crossword puzzle
Across
  1. attack that will publish or withhold data unless money is paid
  2. this triad is widely accepted security measure
  3. using phone calls and voicemails to gain personal information
  4. using deceptive emails to gain personal information
  5. protection from unauthorized people making changes
Down
  1. Identity theft, stealing money, stealing private information, controlling private computers
  2. protection of computer systems, networks, and data from digital attacks
  3. with "of things" means that so much of our devices are connect to the internet
  4. assurance that systems and data will be able to be accessed
  5. protection from people not authorized to view

10 Clues: protection from people not authorized to viewthis triad is widely accepted security measureprotection from unauthorized people making changesusing deceptive emails to gain personal informationassurance that systems and data will be able to be accessedusing phone calls and voicemails to gain personal information...

Black Hat 2024 2024-07-23

Black Hat 2024 crossword puzzle
Across
  1. Malware attack
  2. Project _____ is Talos' cross-team effort to help protect Ukraine's power grid
  3. The slogan "Our job is your defense." belongs to which Cisco Security team?
  4. Online scam to steal personal information
  5. One of the largest and most infamous ransomware attacks
  6. Bring your Security stack together with...
Down
  1. Name of the international cybersecurity event that was founded in 1997?
  2. Can be used to create code, text, music, videos, photos...
  3. Talos is now further enriched by the acquisition of..
  4. Not the next generation of something. The first generation of something new

10 Clues: Malware attackOnline scam to steal personal informationBring your Security stack together with...Talos is now further enriched by the acquisition of..One of the largest and most infamous ransomware attacksCan be used to create code, text, music, videos, photos...Name of the international cybersecurity event that was founded in 1997?...

Digital literacy 2024-08-07

Digital literacy crossword puzzle
Across
  1. What you want to avoid online
  2. A downloadable application that can be used on phones and other devices
  3. What you need to access your account
  4. Protecting yourself online
  5. A secure way to use the internet
  6. A random email sent to trick you into giving away information
Down
  1. Software added to your device without permission for malicious purposes
  2. When you use another device to confirm your identity when signing on
  3. A portable device that is larger than a phone but smaller than a computer
  4. What you may want from social media

10 Clues: Protecting yourself onlineWhat you want to avoid onlineA secure way to use the internetWhat you may want from social mediaWhat you need to access your accountA random email sent to trick you into giving away informationWhen you use another device to confirm your identity when signing on...

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

Scsu 2023-08-11

Scsu crossword puzzle
Across
  1. refers to act of hiding the ip address to miss lead the target
  2. refers to the act of monitoring user commanicetion without consent
  3. insuring the infomation staya in it origanal from and present modified over a network
  4. attack is techingave used by attackers
Down
  1. insuring that your system stays available to pletform its metendet funetion when required
  2. securing your information only authoritht person will be access
  3. unsolicited bulk mails
  4. zombies computer
  5. a small software design to hide files
  6. a protection of your cyber or digital assets or information system from attackrs

10 Clues: zombies computerunsolicited bulk mailsa small software design to hide filesattack is techingave used by attackersrefers to act of hiding the ip address to miss lead the targetsecuring your information only authoritht person will be accessrefers to the act of monitoring user commanicetion without consent...

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  2. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  3. Prinsip Keamanan Informasi agar akurat
Down
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Perangkat lunak yang diciptakan untuk merusak sistem computer
  3. Jenis Informasi yang merupakan informasi pengetahuan umum
  4. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  5. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
  6. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  7. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

CROSS WORD PUZZLE 2025-01-31

CROSS WORD PUZZLE crossword puzzle
Across
  1. A programming language used for machine learning
  2. A technique used to group similar customers in marketing analytics
  3. A cybersecurity threat where hackers encrypt files and demand payment
  4. A method used to clean missing data in analytics
  5. A key performance metric in business that measures success
  6. A database query language used to retrieve data
Down
  1. A statistical graph used to show data distribution
  2. Algorithm used in AI to classify emails as spam or not
  3. A cloud computing service by Amazon
  4. An AI technique that mimics the human brain

10 Clues: A cloud computing service by AmazonAn AI technique that mimics the human brainA database query language used to retrieve dataA programming language used for machine learningA method used to clean missing data in analyticsA statistical graph used to show data distributionAlgorithm used in AI to classify emails as spam or not...

NaSCon'25 Crossword 2025-05-13

NaSCon'25 Crossword crossword puzzle
Across
  1. Three-day solo coding guantlet-one error meant elimination
  2. Business event mixing strategy and Squid Game-style challenges.
  3. Robowars champion bot in a fierce mechanical showdown
  4. Comedy event with mimicry and spontaneous performances
Down
  1. AI exhibition with projects in art, diagnosis and trend prediction
  2. New cybersecurity event with a fun, game-like twist
  3. Showcase of Pakistan's heritage with attire, dance and traditions
  4. Theatrical play inspired by Bollywood hit-NaSCon's crowd favorite
  5. AI-themed activity mimicking neural networks using human participants
  6. Data Science event simulating high-pressure decisions with tech prizes.

10 Clues: New cybersecurity event with a fun, game-like twistRobowars champion bot in a fierce mechanical showdownComedy event with mimicry and spontaneous performancesThree-day solo coding guantlet-one error meant eliminationBusiness event mixing strategy and Squid Game-style challenges.Showcase of Pakistan's heritage with attire, dance and traditions...

Browsing Safely 2025-05-19

Browsing Safely crossword puzzle
Across
  1. An act of harassing anyone usig internet
  2. Asoftware that helps in preventing unauthorised access to your computer
  3. An illegal methods to get money
  4. The process of 'befrinding' children on some media
  5. Dublication of any operating system
Down
  1. A collection of technologies, processes, and practices designed to protect networworks,computers,programs and data
  2. An illgal entry into a computer system
  3. An act of sending an email to a user.
  4. Fullform is 'Vital Information Resources Under Seize'
  5. Any criminal activity intended to harm using a computer and an internet connection

10 Clues: An illegal methods to get moneyDublication of any operating systemAn act of sending an email to a user.An illgal entry into a computer systemAn act of harassing anyone usig internetThe process of 'befrinding' children on some mediaFullform is 'Vital Information Resources Under Seize'...

"Lock It Down: A Cybersecurity Challenge" 2025-06-05

"Lock It Down: A Cybersecurity Challenge" crossword puzzle
Across
  1. A secret combination used to access accounts (8 letters)
  2. A secure encrypted network connection (3 letters)
  3. The practice of protecting systems from digital attacks (11 letters)
  4. A flaw in software that hackers exploit (8 letters)
  5. Unauthorized access to data (7 letters)
Down
  1. A type of attack that floods a server with traffic (4 letters)
  2. Two-factor ________ (adds extra login security) (12 letters)
  3. A network security system that monitors traffic (8 letters)
  4. Fake emails pretending to be legitimate (8 letters)
  5. Malicious software that encrypts files and demands payment (8 letters)

10 Clues: Unauthorized access to data (7 letters)A secure encrypted network connection (3 letters)Fake emails pretending to be legitimate (8 letters)A flaw in software that hackers exploit (8 letters)A secret combination used to access accounts (8 letters)A network security system that monitors traffic (8 letters)...

Cybersecurity Awareness Month Crossword Puzzle 2022-09-23

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. See Question 10
  2. See Question 7
  3. See Question 16
  4. See Question 22
  5. See Question 21
  6. See Question 11
  7. See Question 23
  8. See Question 6
  9. See Question 9
  10. See Question 3
  11. See Question 13
  12. See Question 2
Down
  1. See Question 12
  2. See Question 18
  3. See Question 24
  4. See Question 19
  5. See Question 8
  6. See Question 25
  7. See Question 1
  8. See Question 14
  9. See Question 4
  10. See Question 17
  11. See Question 15
  12. See Question 20
  13. See Question 5

25 Clues: See Question 7See Question 8See Question 1See Question 4See Question 6See Question 9See Question 5See Question 3See Question 2See Question 12See Question 18See Question 24See Question 19See Question 10See Question 16See Question 25See Question 22See Question 14See Question 21See Question 17See Question 11See Question 15See Question 20...

Cybersecurity awareness Cross-word game 2025-11-09

Cybersecurity awareness Cross-word game crossword puzzle
Across
  1. A type of malware that demands payment.
  2. Someone who gains unauthorized access to systems.
  3. Keeping information secret and private.
  4. Protects a network by filtering traffic.
  5. drive Removable storage that can carry malware.
  6. Protects your computer from malicious software.
  7. Secret code used to verify identity.
  8. Regularly updating software to fix vulnerabilities.
  9. Software that detects threats using patterns.
Down
  1. Process of proving you are who you say you are.
  2. Person who targets specific victims using customized phishing.
  3. A device that stores authentication codes.
  4. Converts information into unreadable form.
  5. Strategy to minimize impact of incidents.
  6. Attempt to trick people into revealing personal information.
  7. Rules for handling data and systems.
  8. breach Unauthorized duplication of data.
  9. Physical security measure to enter restricted areas.
  10. Unwanted or junk email.
  11. Secure wireless network protocol.

20 Clues: Unwanted or junk email.Secure wireless network protocol.Rules for handling data and systems.Secret code used to verify identity.A type of malware that demands payment.Keeping information secret and private.Protects a network by filtering traffic.Strategy to minimize impact of incidents.A device that stores authentication codes....

Test IT Crossword 2022-02-14

Test IT Crossword crossword puzzle
Across
  1. Facebook is dead, long live ____
  2. Wasn't a known threat back in 2018, now the bane of businesses.
  3. Often said to be the weakest link in cybersecurity
  4. People are still using ____? What is this, 1983?
  5. Citrix recently announced a merger with this unlikely company
Down
  1. You can find this in every hard disk
  2. Feature that's arguably the best thing about blockchain
  3. AWS headquarters is located here
  4. Sounds like a wholesome activity, but could get you in serious online trouble

9 Clues: AWS headquarters is located hereFacebook is dead, long live ____You can find this in every hard diskPeople are still using ____? What is this, 1983?Often said to be the weakest link in cybersecurityFeature that's arguably the best thing about blockchainCitrix recently announced a merger with this unlikely company...

Weke 15 Vocabulary Quiz 2024-07-06

Weke 15 Vocabulary Quiz crossword puzzle
Across
  1. Protecting computers and networks from attacks or damage.
  2. Changing information into a secret code to keep it safe.
  3. Making something suitable for a particular place or culture.
  4. Discussing something to reach an agreement.
  5. A person who designs, builds, or fixes machines or structures.
  6. Abilities or expertise in doing something well.
  7. "_____ breach". When private information is accessed without permission.
Down
  1. "_____ Skills". The ability to examine things carefully and understand them.
  2. Keeping information private and not sharing it with others.

9 Clues: Discussing something to reach an agreement.Abilities or expertise in doing something well.Changing information into a secret code to keep it safe.Protecting computers and networks from attacks or damage.Keeping information private and not sharing it with others.Making something suitable for a particular place or culture....

TFCU 2022-03-01

TFCU crossword puzzle
Across
  1. What is the name of the building on Pullman?
  2. Who is the VP of Mortgages?
  3. How many dedicated educators established TFCU in 1936?
  4. On February 18th 2022, TFCU had a groundbreaking for which branch?
  5. Who is our Executive Assistant?
  6. Who or what department is at ext. 2670?
  7. What insurance do we offer that covers the difference between what the vehicle is worth vs. what is still owed?
  8. What is the name of our core system?
Down
  1. Which holiday was recently added?
  2. Who ensures our membership for up to $250,000?
  3. What all team meeting is scheduled for April 13th?
  4. What does TLC stand for?
  5. What CPD course is due in October?
  6. What system do we utilize to request time off?
  7. What service may the members use to make loan payments?

15 Clues: What does TLC stand for?Who is the VP of Mortgages?Who is our Executive Assistant?Which holiday was recently added?What CPD course is due in October?What is the name of our core system?Who or what department is at ext. 2670?What is the name of the building on Pullman?Who ensures our membership for up to $250,000?...

Exploring Business Unit 1 Review 2023-09-24

Exploring Business Unit 1 Review crossword puzzle
Across
  1. The set of moral principles by which people conduct themselves
  2. A set of guidelines for maintaining ethics in the workplace
Down
  1. Describes good Internet behavior
  2. The exchange of information between sender and receiver
  3. You get an email or text, its urgent
  4. Attackers ask for $$ or Crypto
  5. The most common form of written communication
  6. The practice of protecting critical systems and sensitive information from digital attacks

8 Clues: Attackers ask for $$ or CryptoDescribes good Internet behaviorYou get an email or text, its urgentThe most common form of written communicationThe exchange of information between sender and receiverA set of guidelines for maintaining ethics in the workplaceThe set of moral principles by which people conduct themselves...

Financial literacy 2024-05-10

Financial literacy crossword puzzle
Across
  1. Protection from hacking
  2. First name of the person who is on the cover of our magazine
  3. Scholarships based on athletic or academic achievements
  4. ____ percent go to needs in the 50-30-20 rule.
  5. way to save money
Down
  1. _____ Change; problem for insurance
  2. Go ____ if you've reached the sixth step to home buying
  3. _______ Score; only get to check this a certain amount of times per year

8 Clues: way to save moneyProtection from hacking_____ Change; problem for insurance____ percent go to needs in the 50-30-20 rule.Go ____ if you've reached the sixth step to home buyingScholarships based on athletic or academic achievementsFirst name of the person who is on the cover of our magazine...

Test Puzzle 2021-09-09

Test Puzzle crossword puzzle
Across
  1. highest mountain in the world
  2. What is our country name
  3. type of a cybersecurity act
Down
  1. surname of Global IT CIO
  2. poorest country in the world

5 Clues: surname of Global IT CIOWhat is our country nametype of a cybersecurity actpoorest country in the worldhighest mountain in the world