cybersecurity Crossword Puzzles

CIS 120 Cybersecurity Crossword Puzzle 2023-02-21

CIS 120 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. software that is constantly updating
  2. software/hardware keep intruders out
  3. text read by human eye
  4. transform ciphertext into original plaintext
  5. test distinguishes between human/robot
  6. security mechanism determining who's authorized
  7. intent to cause mischief/theft
  8. code imbedded into computer hardware
  9. technique to click bad url
  10. physical parts of a computer
  11. core of computers operating system
Down
  1. trap or decoy for attackers
  2. coding used to protect information
  3. connect computers to encrypted network
  4. attempt to violate security perimeter
  5. language to create/control website content
  6. shield users against computer damage
  7. term for unauthorized computer attacker
  8. malicious software to damage systems
  9. an error in computer program

20 Clues: text read by human eyetechnique to click bad urltrap or decoy for attackersan error in computer programphysical parts of a computerintent to cause mischief/theftcoding used to protect informationcore of computers operating systemsoftware that is constantly updatingsoftware/hardware keep intruders outshield users against computer damage...

Cybersecurity Unit 4 Terminology Crossword 2023-04-21

Cybersecurity Unit 4 Terminology Crossword crossword puzzle
Across
  1. The operation finds the remainder of a division. For example, 5 mod 2 is 1 (5 divided by 2 has a remainder of1) and 38 mod 4 is 2 (38 divided by 4 has a remainder of 2).
  2. It is an encryption method where the sender and receiver share a single private key (such as a number, word, or phrase) to use in the encryption algorithm. Also called shared key and symmetric key encryption, the same key is used in both the encryption and decryption process.
  3. A cipher in which each letter in an alphabet is replaced with a different character or symbol.
  4. It is easy to do, but hard to undo.
  5. It is an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. Also called asymmetric key encryption, the keys are combined mathematically to create one key used in the encryption/decryption algorithm
  6. The encrypted message generated by a cipher
  7. A section of a Volume that's formatted for the operating system to use as storage areas. Data used for different purposes are often stored in separate partitions, for example, operating system software versus user data.
  8. Data that is being transferred between applications, between hosts, or around the network
  9. A file that contains other data and acts like a drive. It can be mounted (connected to) or unmounted (removed from) a drive letter, giving administrators greater control when making the data available to users.
  10. A string of characters used as a parameter that determines the output of an encryption algorithm.
  11. the practice of concealing messages within other data, such as text or images.
Down
  1. The last bit (the right-most bit) in a byte.
  2. It is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime.
  3. It is information or data that is valuable to an investigation of a crime involving a computer.
  4. Sometimes called a logical volume or logical drive, the accessible storage area on a hard disk or disks. A logical volume can span multiple disks but doesn't have to.
  5. Data that is stored somewhere
  6. A digital cash system that uses cryptography to secure the exchange financial transactions.
  7. an algorithm used for encryption or decryption
  8. The science and art of delivering a message securely and confidentially.
  9. Also called hashing, it is a computational process that converts data of varying size to a fixed-size. In cryptographic hash functions, the data is converted using a one-way function so the process cannot be reversed.
  10. A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
  11. The original message that needs to be encrypted
  12. Data that is being manipulated by an application
  13. The physical drives inside of a computer.

24 Clues: Data that is stored somewhereIt is easy to do, but hard to undo.The physical drives inside of a computer.The encrypted message generated by a cipherThe last bit (the right-most bit) in a byte.an algorithm used for encryption or decryptionThe original message that needs to be encryptedData that is being manipulated by an application...

Cybersecurity Awareness Month Crossword Puzzle 2025-10-16

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. Software designed with intent to harm
  2. Locks you out system until paid
  3. Combination of stuff for security
  4. Self replicating program that spreads independently
  5. Process to verify someone's identity
  6. Overloads a network to kill it
  7. A trick to get private info
  8. Detects, prevents, and removes malware
  9. Attempt by Hackers to compromise data
  10. Programs that attach and spread file
Down
  1. Secretly collects private info
  2. Scrambles info to protect it
  3. Network of malware infected computers
  4. Disguises as legitimate software but bad
  5. Intrusively displays unwanted advertisements
  6. Way to send messages over internet
  7. Barrier between a trusted network
  8. Identity to access a website
  9. A software update to fix vulnerabilities
  10. Bad guy who steals info

20 Clues: Bad guy who steals infoA trick to get private infoScrambles info to protect itIdentity to access a websiteSecretly collects private infoOverloads a network to kill itLocks you out system until paidBarrier between a trusted networkCombination of stuff for securityWay to send messages over internetProcess to verify someone's identity...

Cybersecurity Awareness Month Crossword Puzzle 2024-09-30

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. address for accessing websites
  2. software used for destruction
  3. thief through computerized means
  4. software to monitor computerized information
  5. ID with magnetic access chip
  6. off personal computer storage
  7. lying about your location
  8. holds data hostage
  9. security tactics
  10. level for information security
  11. unsolicited meat banter
  12. strength in the security structure
Down
  1. weak point in security
  2. used to harm your computer
  3. the simplest part of security
  4. a code for keeping secrets
  5. needed for accessing secure information
  6. blocks out unauthorized access
  7. data to identify a person
  8. casting cyber bait

20 Clues: security tacticsholds data hostagecasting cyber baitweak point in securityunsolicited meat banterlying about your locationdata to identify a personused to harm your computera code for keeping secretsID with magnetic access chipsoftware used for destructionthe simplest part of securityoff personal computer storageaddress for accessing websites...

Cybersecurity Crossword Puzzle Asher Knowles 2023-01-25

Cybersecurity Crossword Puzzle Asher Knowles crossword puzzle
Across
  1. Overloading server to force shutdown
  2. looks innocent is malware
  3. Test's computers and server security
  4. Used to protect information
  5. Malware that tracks people’s activity
  6. Stands for internet protocol
  7. Faking Importance to hack someone
  8. Malicious software that damages systems
  9. tricking into clicking a fake
  10. hackers use to remote access
Down
  1. Bring your own device
  2. hacker who causes harm
  3. infected network of computers
  4. Malware that reproduces and spreads
  5. Process to access restricted things
  6. when many computers are connected
  7. used for private encrypted networking
  8. Means of attack on systems
  9. Tech to keep intruders out
  10. Tech to detect/remove viruses

20 Clues: Bring your own devicehacker who causes harmlooks innocent is malwareMeans of attack on systemsTech to keep intruders outUsed to protect informationStands for internet protocolhackers use to remote accessinfected network of computersTech to detect/remove virusestricking into clicking a fakewhen many computers are connected...

CIS 178 - Participation 3- Cybersecurity 2023-01-25

CIS 178 - Participation 3- Cybersecurity crossword puzzle
Across
  1. attacks seeking personal info
  2. virtual shield for data
  3. process of verifying user identity
  4. everyday objects connected to internet/network
  5. software that records keystrokes
  6. lots of attackers preventing legitimate users
  7. taking advantage of system flaw
  8. vulnerable points attackers gain entrance
  9. provides apps updated code
  10. appears harmless but is malicious
Down
  1. processing data for legal use
  2. allows secure remote connection
  3. decoding cypher to readable text
  4. programs that lure/trap hackers
  5. malware that makes you pay
  6. trying high volume of passwords combos
  7. commonly used for illegal internet activity
  8. method that scrambles data
  9. hacker gains access to data
  10. malware collects private information

20 Clues: virtual shield for datamalware that makes you paymethod that scrambles dataprovides apps updated codehacker gains access to dataprocessing data for legal useattacks seeking personal infoallows secure remote connectionprograms that lure/trap hackerstaking advantage of system flawdecoding cypher to readable textsoftware that records keystrokes...

Chapter 1 - Introduction to Cybersecurity 2025-08-11

Chapter 1 - Introduction to Cybersecurity crossword puzzle
Across
  1. The combination of the probability of an attack and the potential damage it could cause. (4 letters)
  2. The practice of protecting digital systems, networks, and programs. (13 letters)
  3. The practice of protecting information to ensure its confidentiality, integrity, and availability. (12 letters)
  4. The process of linking an action to a specific user. (10 letters)
  5. A person who explores and manipulates computer systems. (7 letters)
  6. The granting of privileges to a user after their identity is confirmed. (13 letters)
  7. A threat originating from outside a company's network. (8 letters)
  8. The process of safeguarding an organization's sensitive information. (10 letters)
  9. An ethical hacker who uncovers and fixes system vulnerabilities. (10 letters)
  10. The of stealing electronic data. (5 letters)
Down
  1. Amateur hackers who use tools created by others. (12 letters)
  2. A hacker who engages in malicious activities for personal gain or harm.
  3. A weakness or flaw that can be exploited by an attack. (13 letters)
  4. A potential event that could exploit a vulnerability and cause harm. (6 letters)
  5. The process of confirming a user's identity. (14 letters)
  6. The state of being usable and accessible to authorized users when required. (13 letters)
  7. An attack that is well-planned and carried out by skilled attackers. (10 letters)
  8. The property of data being accurate, consistent, and unaltered. (9 letters)
  9. A action on a system or network with the intent to cause damage or steal information. (6 letters)
  10. A hacker who may one day become either a black-hat or white-hat hacker. (8 letters)

20 Clues: The of stealing electronic data. (5 letters)The process of confirming a user's identity. (14 letters)The process of linking an action to a specific user. (10 letters)A weakness or flaw that can be exploited by an attack. (13 letters)A person who explores and manipulates computer systems. (7 letters)...

Commerce Crossword - 3/3/25 2025-03-02

Commerce Crossword - 3/3/25 crossword puzzle
Across
  1. - A repayment or sum of money payed to an unhappy customer
  2. - Make a serious or heartfelt request
  3. - Someone who purchases items for personal use
  4. - Action of helping and/or assisting someone
  5. - A Dishonest scheme or fraud usually targetted online at people for money
  6. - A conclusion or resolution made after cosideration
  7. - Buying and selling goods
  8. - A Legally enforceable document between 2 or more people
Down
  1. - A Written Guarantee to a purchaser with a promise to repay or refund in a certain time period
  2. - Pay someone for the temporary use of something
  3. - An item manufactured and refined for sale
  4. - Someones regular profession or occupation
  5. - A protected string of symbols/numbers/letters used to authenticate access to sensitive information
  6. - Buying something
  7. - An Agreement that usually involves an obligation that cannot be broken
  8. - Online applications to protect senstive and private information
  9. - Legitimate actions
  10. - Online crimes like fraud and scamming

18 Clues: - Buying something- Legitimate actions- Buying and selling goods- Make a serious or heartfelt request- Online crimes like fraud and scamming- An item manufactured and refined for sale- Someones regular profession or occupation- Action of helping and/or assisting someone- Someone who purchases items for personal use...

STS 2024-12-15

STS crossword puzzle
Across
  1. Major urban development expanding into rural areas.
  2. Tool to analyze environmental trends and data.
  3. Biodiversity loss due to human activities.
  4. Protection of endangered species and habitats.
  5. The global condition of rising temperatures and its effects.
  6. Using digital technology to enhance learning experiences.
  7. Using algorithms to mimic human thought processes.
Down
  1. Protection for computers against unauthorized access.
  2. A technology that allows virtual collaboration.
  3. The raw input used for computation or analysis.
  4. Digital networks and their protection mechanisms.
  5. Materials or energy sources found in nature.
  6. A numerical representation of environmental conditions.
  7. An invention or method that's newly created.
  8. Measure of diversity within ecosystems.
  9. A burst of rapid increase, often in demand or water levels.
  10. Sudden, uncontrolled spread of wildfires.

17 Clues: Measure of diversity within ecosystems.Sudden, uncontrolled spread of wildfires.Biodiversity loss due to human activities.Materials or energy sources found in nature.An invention or method that's newly created.Tool to analyze environmental trends and data.Protection of endangered species and habitats.A technology that allows virtual collaboration....

Applications of Modern Computing 2025-03-12

Applications of Modern Computing crossword puzzle
Across
  1. A technology used to build decentralized applications
  2. A system where multiple computers work together to solve a problem
  3. A technique that helps computers recognize speech
Down
  1. A method of storing data over the internet
  2. A field focused on protecting computer systems from attacks
  3. The network of interconnected devices that exchange data
  4. The process of extracting useful insights from data
  5. A system that mimics human intelligence

8 Clues: A system that mimics human intelligenceA method of storing data over the internetA technique that helps computers recognize speechThe process of extracting useful insights from dataA technology used to build decentralized applicationsThe network of interconnected devices that exchange dataA field focused on protecting computer systems from attacks...

Tech and Parenting 2023-12-08

Tech and Parenting crossword puzzle
Across
  1. Time spent in front of screens like computers or phones.
  2. Someone with expertise in technology
  3. Features to restrict or monitor access.
Down
  1. Excessive and compulsive smartphone use.
  2. Protection against digital attacks and theft
  3. A break from digital devices for well-being

6 Clues: Someone with expertise in technologyFeatures to restrict or monitor access.Excessive and compulsive smartphone use.A break from digital devices for well-beingProtection against digital attacks and theftTime spent in front of screens like computers or phones.

Digital_Banking_Ishan_Krishna_Vatsa_TCE 2025-10-01

Digital_Banking_Ishan_Krishna_Vatsa_TCE crossword puzzle
Across
  1. : Technology used to protect sensitive banking data online.
  2. : Unified Payments Interface for instant fund transfer.
  3. : A card used to make payments directly from bank account.
  4. : A digital wallet for storing and spending money online.
  5. : Immediate Payment Service available 24x7.
  6. : A code scanned to make digital payments.
  7. : International system for secure money transfers between banks.
  8. : Fraudulent attempt to steal personal banking details.
  9. : A card that allows purchases on borrowed money.
  10. : National Electronic Funds Transfer system.
Down
  1. : Process of verifying customer identity online or offline.
  2. : Protection of online banking systems from fraud.
  3. : Technology companies that provide innovative financial services.
  4. : Process of verifying identity before digital banking access.
  5. : One Time Password for secure online transactions.
  6. : Real Time Gross Settlement for high value transfers.
  7. : Unique code used to identify a bank branch in online transfers.

17 Clues: : A code scanned to make digital payments.: Immediate Payment Service available 24x7.: National Electronic Funds Transfer system.: A card that allows purchases on borrowed money.: Protection of online banking systems from fraud.: One Time Password for secure online transactions.: Real Time Gross Settlement for high value transfers....

SyberSafety 2021-05-19

SyberSafety crossword puzzle
Across
  1. Something that protects your data on online sites
  2. Being protected against the criminal or unauthorized use of electronic data
  3. An e-mail that has has malware attachments
  4. use of a computer as an instrument to further illegal ends
Down
  1. crime of obtaining the personal or financial information of another person
  2. Nefarious people _ _ _ _ into your computer
  3. malicious software

7 Clues: malicious softwareAn e-mail that has has malware attachmentsNefarious people _ _ _ _ into your computerSomething that protects your data on online sitesuse of a computer as an instrument to further illegal endscrime of obtaining the personal or financial information of another person...

ISSN Day 2 2024-10-08

ISSN Day 2 crossword puzzle
Across
  1. A key skill in IT that involves protecting data
  2. Foundational certification for cybersecurity professionals
  3. Entry-level certification for IT technicians
  4. A type of device that A+ covers
Down
  1. A role that involves helping users with tech problems
  2. Focuses on network fundamentals and infrastructure
  3. unique identifying number assigned to every device connected to the interne

7 Clues: A type of device that A+ coversEntry-level certification for IT techniciansA key skill in IT that involves protecting dataFocuses on network fundamentals and infrastructureA role that involves helping users with tech problemsFoundational certification for cybersecurity professionals...

Joon Xi 8 GAMMA 2023-01-19

Joon Xi 8 GAMMA crossword puzzle
Across
  1. Raw facts and figures. (not data)
  2. Device that everyone bring to school.
  3. A group or system of interconnected people or things.
  4. Is a practice of protecting system, network, and program from digital attack.
Down
  1. Transfer your data to a _______ organisation.
  2. Used fairly, openly, in ______ with the law.
  3. All the social media company have this policy.

7 Clues: Raw facts and figures. (not data)Device that everyone bring to school.Used fairly, openly, in ______ with the law.Transfer your data to a _______ organisation.All the social media company have this policy.A group or system of interconnected people or things.Is a practice of protecting system, network, and program from digital attack.

DPAC 2024-07-04

DPAC crossword puzzle
Across
  1. Balancing environmental and economic needs
  2. Organizing resources for efficiency
  3. Protecting systems from digital threats
  4. A fundamental resource essential for powering various activities
Down
  1. Converting processes into digital formats

5 Clues: Organizing resources for efficiencyProtecting systems from digital threatsConverting processes into digital formatsBalancing environmental and economic needsA fundamental resource essential for powering various activities

Gruppo 2 2016-05-24

Gruppo 2 crossword puzzle
Across
  1. Tipo di comunicazione senza fili
  2. Modifica di un software per rimuovere la protezione
  3. Programma informatico eseguito su un PC
  4. Applicazione per il recupero, la presentazione e la navigazione di pagine web
  5. Forma di attivismo Internet che identifica utenti o comunità online che agiscono anonimamente
  6. Attività di intercettazione passiva dei dati che transitano in una rete informatica
Down
  1. Linguaggio per la scrittura delle pagine Web
  2. Tipo di attacco informatico che impiega in la falsificazione dell'identità
  3. Insieme dei sistemi e dei servizi di protezione informatica (inglese)
  4. Diritto di autore

10 Clues: Diritto di autoreTipo di comunicazione senza filiProgramma informatico eseguito su un PCLinguaggio per la scrittura delle pagine WebModifica di un software per rimuovere la protezioneInsieme dei sistemi e dei servizi di protezione informatica (inglese)Tipo di attacco informatico che impiega in la falsificazione dell'identità...

Module 1 Test 2023-09-08

Module 1 Test crossword puzzle
Across
  1. attack that will publish or withhold data unless money is paid
  2. this triad is widely accepted security measure
  3. using phone calls and voicemails to gain personal information
  4. using deceptive emails to gain personal information
  5. protection from unauthorized people making changes
Down
  1. Identity theft, stealing money, stealing private information, controlling private computers
  2. protection of computer systems, networks, and data from digital attacks
  3. with "of things" means that so much of our devices are connect to the internet
  4. assurance that systems and data will be able to be accessed
  5. protection from people not authorized to view

10 Clues: protection from people not authorized to viewthis triad is widely accepted security measureprotection from unauthorized people making changesusing deceptive emails to gain personal informationassurance that systems and data will be able to be accessedusing phone calls and voicemails to gain personal information...

Black Hat 2024 2024-07-23

Black Hat 2024 crossword puzzle
Across
  1. Malware attack
  2. Project _____ is Talos' cross-team effort to help protect Ukraine's power grid
  3. The slogan "Our job is your defense." belongs to which Cisco Security team?
  4. Online scam to steal personal information
  5. One of the largest and most infamous ransomware attacks
  6. Bring your Security stack together with...
Down
  1. Name of the international cybersecurity event that was founded in 1997?
  2. Can be used to create code, text, music, videos, photos...
  3. Talos is now further enriched by the acquisition of..
  4. Not the next generation of something. The first generation of something new

10 Clues: Malware attackOnline scam to steal personal informationBring your Security stack together with...Talos is now further enriched by the acquisition of..One of the largest and most infamous ransomware attacksCan be used to create code, text, music, videos, photos...Name of the international cybersecurity event that was founded in 1997?...

Digital literacy 2024-08-07

Digital literacy crossword puzzle
Across
  1. What you want to avoid online
  2. A downloadable application that can be used on phones and other devices
  3. What you need to access your account
  4. Protecting yourself online
  5. A secure way to use the internet
  6. A random email sent to trick you into giving away information
Down
  1. Software added to your device without permission for malicious purposes
  2. When you use another device to confirm your identity when signing on
  3. A portable device that is larger than a phone but smaller than a computer
  4. What you may want from social media

10 Clues: Protecting yourself onlineWhat you want to avoid onlineA secure way to use the internetWhat you may want from social mediaWhat you need to access your accountA random email sent to trick you into giving away informationWhen you use another device to confirm your identity when signing on...

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

Scsu 2023-08-11

Scsu crossword puzzle
Across
  1. refers to act of hiding the ip address to miss lead the target
  2. refers to the act of monitoring user commanicetion without consent
  3. insuring the infomation staya in it origanal from and present modified over a network
  4. attack is techingave used by attackers
Down
  1. insuring that your system stays available to pletform its metendet funetion when required
  2. securing your information only authoritht person will be access
  3. unsolicited bulk mails
  4. zombies computer
  5. a small software design to hide files
  6. a protection of your cyber or digital assets or information system from attackrs

10 Clues: zombies computerunsolicited bulk mailsa small software design to hide filesattack is techingave used by attackersrefers to act of hiding the ip address to miss lead the targetsecuring your information only authoritht person will be accessrefers to the act of monitoring user commanicetion without consent...

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  2. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  3. Prinsip Keamanan Informasi agar akurat
Down
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Perangkat lunak yang diciptakan untuk merusak sistem computer
  3. Jenis Informasi yang merupakan informasi pengetahuan umum
  4. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  5. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
  6. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  7. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

CROSS WORD PUZZLE 2025-01-31

CROSS WORD PUZZLE crossword puzzle
Across
  1. A programming language used for machine learning
  2. A technique used to group similar customers in marketing analytics
  3. A cybersecurity threat where hackers encrypt files and demand payment
  4. A method used to clean missing data in analytics
  5. A key performance metric in business that measures success
  6. A database query language used to retrieve data
Down
  1. A statistical graph used to show data distribution
  2. Algorithm used in AI to classify emails as spam or not
  3. A cloud computing service by Amazon
  4. An AI technique that mimics the human brain

10 Clues: A cloud computing service by AmazonAn AI technique that mimics the human brainA database query language used to retrieve dataA programming language used for machine learningA method used to clean missing data in analyticsA statistical graph used to show data distributionAlgorithm used in AI to classify emails as spam or not...

NaSCon'25 Crossword 2025-05-13

NaSCon'25 Crossword crossword puzzle
Across
  1. Three-day solo coding guantlet-one error meant elimination
  2. Business event mixing strategy and Squid Game-style challenges.
  3. Robowars champion bot in a fierce mechanical showdown
  4. Comedy event with mimicry and spontaneous performances
Down
  1. AI exhibition with projects in art, diagnosis and trend prediction
  2. New cybersecurity event with a fun, game-like twist
  3. Showcase of Pakistan's heritage with attire, dance and traditions
  4. Theatrical play inspired by Bollywood hit-NaSCon's crowd favorite
  5. AI-themed activity mimicking neural networks using human participants
  6. Data Science event simulating high-pressure decisions with tech prizes.

10 Clues: New cybersecurity event with a fun, game-like twistRobowars champion bot in a fierce mechanical showdownComedy event with mimicry and spontaneous performancesThree-day solo coding guantlet-one error meant eliminationBusiness event mixing strategy and Squid Game-style challenges.Showcase of Pakistan's heritage with attire, dance and traditions...

Browsing Safely 2025-05-19

Browsing Safely crossword puzzle
Across
  1. An act of harassing anyone usig internet
  2. Asoftware that helps in preventing unauthorised access to your computer
  3. An illegal methods to get money
  4. The process of 'befrinding' children on some media
  5. Dublication of any operating system
Down
  1. A collection of technologies, processes, and practices designed to protect networworks,computers,programs and data
  2. An illgal entry into a computer system
  3. An act of sending an email to a user.
  4. Fullform is 'Vital Information Resources Under Seize'
  5. Any criminal activity intended to harm using a computer and an internet connection

10 Clues: An illegal methods to get moneyDublication of any operating systemAn act of sending an email to a user.An illgal entry into a computer systemAn act of harassing anyone usig internetThe process of 'befrinding' children on some mediaFullform is 'Vital Information Resources Under Seize'...

"Lock It Down: A Cybersecurity Challenge" 2025-06-05

"Lock It Down: A Cybersecurity Challenge" crossword puzzle
Across
  1. A secret combination used to access accounts (8 letters)
  2. A secure encrypted network connection (3 letters)
  3. The practice of protecting systems from digital attacks (11 letters)
  4. A flaw in software that hackers exploit (8 letters)
  5. Unauthorized access to data (7 letters)
Down
  1. A type of attack that floods a server with traffic (4 letters)
  2. Two-factor ________ (adds extra login security) (12 letters)
  3. A network security system that monitors traffic (8 letters)
  4. Fake emails pretending to be legitimate (8 letters)
  5. Malicious software that encrypts files and demands payment (8 letters)

10 Clues: Unauthorized access to data (7 letters)A secure encrypted network connection (3 letters)Fake emails pretending to be legitimate (8 letters)A flaw in software that hackers exploit (8 letters)A secret combination used to access accounts (8 letters)A network security system that monitors traffic (8 letters)...

Cybersecurity Awareness Month - 2022 2022-09-29

Cybersecurity Awareness Month - 2022 crossword puzzle
Across
  1. A person who circumvents information security, often with malicious intent
  2. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  3. Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
  4. Event that has been determined to have an impact on the organization prompting the need for response and recovery.
  5. Fake messages from a seemingly trusted or reputable source designed to convince you to take some sort of action
  6. A made-up scenario developed by threat actors for the purpose of stealing a victim's personal data
  7. Data or other information which otherwise identifies an individual in a way that is reasonably likely to enable identification of a specific person (hint: abbreviation)
  8. A set of instructions, data or programs used to operate computers and execute specific tasks
Down
  1. Any crime which is committed electronically
  2. Security process that requires more than one method of authentication from independent sources to verify the user’s identity (hint: abbreviation)
  3. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  4. Someone who is deceived or cheated by the dishonesty of others
  5. The computer's tangible components or delivery systems that store and run the written instructions
  6. software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.

14 Clues: Any crime which is committed electronicallySomeone who is deceived or cheated by the dishonesty of othersA person who circumvents information security, often with malicious intentMalware designed to make data or hardware inaccessible to the victim until a ransom is paid....

Elephas - Cybersecurity Awareness Month 2024-10-18

Elephas - Cybersecurity Awareness Month crossword puzzle
Across
  1. Common type of cyberattack where the hacker encrypts your files and demands payment.
  2. This form of attack tries to trick you into giving personal information via fake websites or emails.
  3. A software that fights off malicious viruses and malware.
  4. The process of verifying someone's identity.
Down
  1. A person who attempts to gain unauthorized access to your system.
  2. A harmful program disguised as legitimate software.
  3. A malicious code that spreads from computer to computer.
  4. A type of phishing attack done over text messages.
  5. A ____ test is performed to identify vulnerabilities in a system.
  6. A phishing attack done over the phone.
  7. Multi-Factor Authentication is shortened to this.
  8. Protection against unauthorized changes to data.
  9. A strong, complex one helps protect your accounts.
  10. The backbone of secure communication online, abbreviated as SSL.

14 Clues: A phishing attack done over the phone.The process of verifying someone's identity.Protection against unauthorized changes to data.Multi-Factor Authentication is shortened to this.A type of phishing attack done over text messages.A strong, complex one helps protect your accounts.A harmful program disguised as legitimate software....

CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06

CYBERSECURITY AWARENESS CROSSWORD PUZZLE crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing network traffic
  2. hygiene The routine practices and steps taken to maintain good digital security.
  3. A private network that encrypts your internet connection to protect your data online.
  4. A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
  5. A malicious program disguised as legitimate software.
  6. breach An incident where sensitive information is accessed or disclosed without authorization.
  7. Malicious software designed to damage or gain unauthorized access to systems.
  8. Determines what an authenticated user is allowed to do
Down
  1. A type of malware that locks your data and demands payment to unlock it.
  2. A method of converting data into a secret code to prevent unauthorized access.
  3. The process of verifying the identity of a user or device
  4. A software update that fixes security vulnerabilities or bugs.
  5. Software designed to detect and remove malicious programs from your computer.
  6. Protecting data from being altered or tampered with

14 Clues: Protecting data from being altered or tampered withA malicious program disguised as legitimate software.Determines what an authenticated user is allowed to doThe process of verifying the identity of a user or deviceA software update that fixes security vulnerabilities or bugs.A type of malware that locks your data and demands payment to unlock it....

Test IT Crossword 2022-02-14

Test IT Crossword crossword puzzle
Across
  1. Facebook is dead, long live ____
  2. Wasn't a known threat back in 2018, now the bane of businesses.
  3. Often said to be the weakest link in cybersecurity
  4. People are still using ____? What is this, 1983?
  5. Citrix recently announced a merger with this unlikely company
Down
  1. You can find this in every hard disk
  2. Feature that's arguably the best thing about blockchain
  3. AWS headquarters is located here
  4. Sounds like a wholesome activity, but could get you in serious online trouble

9 Clues: AWS headquarters is located hereFacebook is dead, long live ____You can find this in every hard diskPeople are still using ____? What is this, 1983?Often said to be the weakest link in cybersecurityFeature that's arguably the best thing about blockchainCitrix recently announced a merger with this unlikely company...

Weke 15 Vocabulary Quiz 2024-07-06

Weke 15 Vocabulary Quiz crossword puzzle
Across
  1. Protecting computers and networks from attacks or damage.
  2. Changing information into a secret code to keep it safe.
  3. Making something suitable for a particular place or culture.
  4. Discussing something to reach an agreement.
  5. A person who designs, builds, or fixes machines or structures.
  6. Abilities or expertise in doing something well.
  7. "_____ breach". When private information is accessed without permission.
Down
  1. "_____ Skills". The ability to examine things carefully and understand them.
  2. Keeping information private and not sharing it with others.

9 Clues: Discussing something to reach an agreement.Abilities or expertise in doing something well.Changing information into a secret code to keep it safe.Protecting computers and networks from attacks or damage.Keeping information private and not sharing it with others.Making something suitable for a particular place or culture....

Test Puzzle 2021-09-09

Test Puzzle crossword puzzle
Across
  1. highest mountain in the world
  2. What is our country name
  3. type of a cybersecurity act
Down
  1. surname of Global IT CIO
  2. poorest country in the world

5 Clues: surname of Global IT CIOWhat is our country nametype of a cybersecurity actpoorest country in the worldhighest mountain in the world

Exploring Business Unit 1 Review 2023-09-24

Exploring Business Unit 1 Review crossword puzzle
Across
  1. The set of moral principles by which people conduct themselves
  2. A set of guidelines for maintaining ethics in the workplace
Down
  1. Describes good Internet behavior
  2. The exchange of information between sender and receiver
  3. You get an email or text, its urgent
  4. Attackers ask for $$ or Crypto
  5. The most common form of written communication
  6. The practice of protecting critical systems and sensitive information from digital attacks

8 Clues: Attackers ask for $$ or CryptoDescribes good Internet behaviorYou get an email or text, its urgentThe most common form of written communicationThe exchange of information between sender and receiverA set of guidelines for maintaining ethics in the workplaceThe set of moral principles by which people conduct themselves...

Financial literacy 2024-05-10

Financial literacy crossword puzzle
Across
  1. Protection from hacking
  2. First name of the person who is on the cover of our magazine
  3. Scholarships based on athletic or academic achievements
  4. ____ percent go to needs in the 50-30-20 rule.
  5. way to save money
Down
  1. _____ Change; problem for insurance
  2. Go ____ if you've reached the sixth step to home buying
  3. _______ Score; only get to check this a certain amount of times per year

8 Clues: way to save moneyProtection from hacking_____ Change; problem for insurance____ percent go to needs in the 50-30-20 rule.Go ____ if you've reached the sixth step to home buyingScholarships based on athletic or academic achievementsFirst name of the person who is on the cover of our magazine...

TFCU 2022-03-01

TFCU crossword puzzle
Across
  1. What is the name of the building on Pullman?
  2. Who is the VP of Mortgages?
  3. How many dedicated educators established TFCU in 1936?
  4. On February 18th 2022, TFCU had a groundbreaking for which branch?
  5. Who is our Executive Assistant?
  6. Who or what department is at ext. 2670?
  7. What insurance do we offer that covers the difference between what the vehicle is worth vs. what is still owed?
  8. What is the name of our core system?
Down
  1. Which holiday was recently added?
  2. Who ensures our membership for up to $250,000?
  3. What all team meeting is scheduled for April 13th?
  4. What does TLC stand for?
  5. What CPD course is due in October?
  6. What system do we utilize to request time off?
  7. What service may the members use to make loan payments?

15 Clues: What does TLC stand for?Who is the VP of Mortgages?Who is our Executive Assistant?Which holiday was recently added?What CPD course is due in October?What is the name of our core system?Who or what department is at ext. 2670?What is the name of the building on Pullman?Who ensures our membership for up to $250,000?...

Technology 2025-11-13

Technology crossword puzzle
Across
  1. brain of the computer
  2. Interface allowing programs to talk to each other
  3. An unmanned aerial vehicle controlled remotely or autonomously
  4. The simulation of human
  5. the physical parts of a computer
  6. A computer that provides data or services to other computers over a network
  7. A newer version of software or data that improves or fixes issues
Down
  1. The practice of protecting systems and data from digital attacks.
  2. Software designed to damage,
  3. Existing in digital form or simulated by software rather than physical reality
  4. the set of programs and applications that tell the computer what to do
  5. A step-by-step set of instructions for solving a problem

12 Clues: brain of the computerThe simulation of humanSoftware designed to damage,the physical parts of a computerInterface allowing programs to talk to each otherA step-by-step set of instructions for solving a problemAn unmanned aerial vehicle controlled remotely or autonomouslyThe practice of protecting systems and data from digital attacks....

Digital media literacy 2023-09-14

Digital media literacy crossword puzzle
Across
  1. a folder for keeping all your data and work
  2. a electronic device that lets u have access to the internet on a keyboard
  3. to send something to lots of people
  4. to make something your so people cant copy you
  5. a way of protecting you from hackers
  6. a way of attracting someone to your business
Down
  1. A way of messaging your fiends and sending pics
  2. facts and statistics collected together for reference
  3. a way of infecting a device
  4. a way of watching videos of whatever you want
  5. a way of talking to lots of people about your life
  6. a internet page based on a famous person/subject

12 Clues: a way of infecting a deviceto send something to lots of peoplea way of protecting you from hackersa folder for keeping all your data and worka way of attracting someone to your businessa way of watching videos of whatever you wantto make something your so people cant copy youA way of messaging your fiends and sending pics...

Cybersecurity Awareness Month Crossword Puzzle 2022-09-23

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. See Question 10
  2. See Question 7
  3. See Question 16
  4. See Question 22
  5. See Question 21
  6. See Question 11
  7. See Question 23
  8. See Question 6
  9. See Question 9
  10. See Question 3
  11. See Question 13
  12. See Question 2
Down
  1. See Question 12
  2. See Question 18
  3. See Question 24
  4. See Question 19
  5. See Question 8
  6. See Question 25
  7. See Question 1
  8. See Question 14
  9. See Question 4
  10. See Question 17
  11. See Question 15
  12. See Question 20
  13. See Question 5

25 Clues: See Question 7See Question 8See Question 1See Question 4See Question 6See Question 9See Question 5See Question 3See Question 2See Question 12See Question 18See Question 24See Question 19See Question 10See Question 16See Question 25See Question 22See Question 14See Question 21See Question 17See Question 11See Question 15See Question 20...

Cybersecurity awareness Cross-word game 2025-11-09

Cybersecurity awareness Cross-word game crossword puzzle
Across
  1. A type of malware that demands payment.
  2. Someone who gains unauthorized access to systems.
  3. Keeping information secret and private.
  4. Protects a network by filtering traffic.
  5. drive Removable storage that can carry malware.
  6. Protects your computer from malicious software.
  7. Secret code used to verify identity.
  8. Regularly updating software to fix vulnerabilities.
  9. Software that detects threats using patterns.
Down
  1. Process of proving you are who you say you are.
  2. Person who targets specific victims using customized phishing.
  3. A device that stores authentication codes.
  4. Converts information into unreadable form.
  5. Strategy to minimize impact of incidents.
  6. Attempt to trick people into revealing personal information.
  7. Rules for handling data and systems.
  8. breach Unauthorized duplication of data.
  9. Physical security measure to enter restricted areas.
  10. Unwanted or junk email.
  11. Secure wireless network protocol.

20 Clues: Unwanted or junk email.Secure wireless network protocol.Rules for handling data and systems.Secret code used to verify identity.A type of malware that demands payment.Keeping information secret and private.Protects a network by filtering traffic.Strategy to minimize impact of incidents.A device that stores authentication codes....

computer security 2021-10-15

computer security crossword puzzle
Across
  1. a study of design of computer equipment
  2. a person who has intention to destroy data
  3. a malicious code which sends out info to hacker
  4. a act of illegal listening to network channel
  5. a system of to protect safeguard network
  6. a secured layer of protocol to encrypt data
  7. a cause of system failure
  8. a computer health issue causing strain in hand
Down
  1. act of tricking user into revealing their info
  2. a person who access computer illegally
  3. a malicious act to slow down service of server
  4. act of making copy of files safely and secure
  5. act of stealing or faking information for hiding
  6. a malicious program which steals data from user
  7. a field of study on computer security
  8. a data protection act law in countries
  9. a program which copies itself repeateadly
  10. moral obligation to use computer with care

18 Clues: a cause of system failurea field of study on computer securitya person who access computer illegallya data protection act law in countriesa study of design of computer equipmenta system of to protect safeguard networka program which copies itself repeateadlymoral obligation to use computer with carea person who has intention to destroy data...

RAPA - Have you been paying attention? 2023-05-24

RAPA - Have you been paying attention? crossword puzzle
Across
  1. how does Jordan get so swole (8)
  2. the action of obtaining something (11)
  3. the source of news for anything RAPA related (4,5,2)
  4. instrument that Erdem plays (6)
  5. coreys coffee order (trading card) (3,5)
  6. what does Bryce like to paint in his free time (9,9)
  7. free coffees (3,3)
  8. where has Sheila spent the past 5 years working (8,9)
  9. what sport did Siobhan and Richard play (5,6)
Down
  1. what does Josh like to ride in his free time (9)
  2. expose (someone or something valued) to danger, harm, or loss (4)
  3. what Pacific Island did Matt go to for a holiday with his family (5)
  4. one of Gibbo's past jobs (11)
  5. the state of having no protection from something harmful (8)
  6. an official financial inspection (5)
  7. where we are for retreat (11)
  8. how many years has Lucy been cooking for? (6)
  9. cybersecurity tv drama (3,6,3)

18 Clues: free coffees (3,3)one of Gibbo's past jobs (11)where we are for retreat (11)cybersecurity tv drama (3,6,3)instrument that Erdem plays (6)how does Jordan get so swole (8)an official financial inspection (5)the action of obtaining something (11)coreys coffee order (trading card) (3,5)how many years has Lucy been cooking for? (6)...

Malware 2023-03-15

Malware crossword puzzle
Across
  1. A person that wants to take files and important information
  2. A field in IT that keeps data secured and safe
  3. Important information that could be used to impersonate someone else
  4. Many different forms of harmful software
  5. A malicious Software that needs a host in order to work
  6. A system that can be used for work, games, and to hack.
Down
  1. Malicious software designed to imitate normal software
  2. Undiscovered attack
  3. Software to steal data and attempt to sell it back to the user
  4. Raises permissions to access data
  5. Does not need host in order to cause problems and spread

11 Clues: Undiscovered attackRaises permissions to access dataMany different forms of harmful softwareA field in IT that keeps data secured and safeMalicious software designed to imitate normal softwareA malicious Software that needs a host in order to workA system that can be used for work, games, and to hack....

Cluster 1 Day 5 Consolidation 2023-10-12

Cluster 1 Day 5 Consolidation crossword puzzle
Across
  1. Our hardship program is call?
  2. Missing or incorrect mobile numbers, once corrected we send a whot?
  3. Someone authorised on an account is called a .... person?
  4. The traffic lights in SAP next to the mobile and email are called?
  5. What is the resource with the newspaper icon in KIT called?
Down
  1. Accounts with a Code Word, you will need to transfer to Res+...?
  2. What is the compliance elearn for internet protection called?
  3. What is Qi's English name?
  4. AGL deals in retail and ...?
  5. What team does Elizabeth support in the Rugby?
  6. Who takes care of the poles and wires in the electricity network?
  7. BPP stands for Best ..... Procedure?
  8. What is the name of Caitlyn's dog?

13 Clues: What is Qi's English name?AGL deals in retail and ...?Our hardship program is call?What is the name of Caitlyn's dog?BPP stands for Best ..... Procedure?What team does Elizabeth support in the Rugby?Someone authorised on an account is called a .... person?What is the resource with the newspaper icon in KIT called?...

computer security 2021-10-15

computer security crossword puzzle
Across
  1. a study of design of computer equipment
  2. a person who has intention to destroy data
  3. a malicious code which sends out info to hacker
  4. a act of illegal listening to network channel
  5. a system of to protect safeguard network
  6. a secured layer of protocol to encrypt data
  7. a cause of system failure
  8. a computer health issue causing strain in hand
Down
  1. act of tricking user into revealing their info
  2. a person who access computer illegally
  3. a malicious act to slow down service of server
  4. act of making copy of files safely and secure
  5. act of stealing or faking information for hiding
  6. a malicious program which steals data from user
  7. a field of study on computer security
  8. a data protection act law in countries
  9. a program which copies itself repeateadly
  10. moral obligation to use computer with care

18 Clues: a cause of system failurea field of study on computer securitya person who access computer illegallya data protection act law in countriesa study of design of computer equipmenta system of to protect safeguard networka program which copies itself repeateadlymoral obligation to use computer with carea person who has intention to destroy data...

Smart city of Singapore 2024-12-04

Smart city of Singapore crossword puzzle
Across
  1. Citizens and businesses can transact with the Government by using it.
  2. That Strait contributes to Signapore's prosperity.
  3. Reusing excess heat from machines to save energy.
  4. How many are the official languages?
  5. Name of an educational application.
  6. Signapore identifies its future as a certain type of island.
Down
  1. Singapore's commitment aligned with MRT.
  2. The city-state has built a waste-to-energy plant that converts waste into something else.
  3. Invested there to ensure the safety of data and digital infrastructure.
  4. Singapore’s approach focuses on building that kind of future for everyone.
  5. Communitacion with patients remotely.

11 Clues: Name of an educational application.How many are the official languages?Communitacion with patients remotely.Singapore's commitment aligned with MRT.Reusing excess heat from machines to save energy.That Strait contributes to Signapore's prosperity.Signapore identifies its future as a certain type of island....

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

computer security 2021-10-15

computer security crossword puzzle
Across
  1. a study of design of computer equipment
  2. a person who has intention to destroy data
  3. a malicious code which sends out info to hacker
  4. a act of illegal listening to network channel
  5. a system of to protect safeguard network
  6. a secured layer of protocol to encrypt data
  7. a cause of system failure
  8. a computer health issue causing strain in hand
Down
  1. act of tricking user into revealing their info
  2. a person who access computer illegally
  3. a malicious act to slow down service of server
  4. act of making copy of files safely and secure
  5. act of stealing or faking information for hiding
  6. a malicious program which steals data from user
  7. a field of study on computer security
  8. a data protection act law in countries
  9. a program which copies itself repeateadly
  10. moral obligation to use computer with care

18 Clues: a cause of system failurea field of study on computer securitya person who access computer illegallya data protection act law in countriesa study of design of computer equipmenta system of to protect safeguard networka program which copies itself repeateadlymoral obligation to use computer with carea person who has intention to destroy data...

cyber security crossword 2025-04-09

cyber security crossword crossword puzzle
Across
  1. These emails try to get your credentials by creating a sense of urgency
  2. A great option for a password manager
  3. Secures account through text/email/etc. (abbreviation)
  4. One of the top cybersecurity companies you can trust
  5. Detects and removes harmful materials on your device
Down
  1. Malware that can harm your computer
  2. Regularly check for _______ on your computer or device
  3. It's good to have a password length of at lest ______
  4. A great to store your credentials would be using a ________ manager
  5. It's a good idea to _____ phishing or scam emails
  6. Good to empty every so often and recover deleted files in

11 Clues: Malware that can harm your computerA great option for a password managerIt's a good idea to _____ phishing or scam emailsOne of the top cybersecurity companies you can trustDetects and removes harmful materials on your deviceIt's good to have a password length of at lest ______Regularly check for _______ on your computer or device...

Crossword 2025-10-29

Crossword crossword puzzle
Across
  1. Type of business done over the internet
  2. Protecting computers, networks, and data from digital attacks
  3. Your next destination
Down
  1. Online retail giant founded by Jeff Bezos
  2. The money a company earns from sales
  3. A young company with a new business idea, often seeking investors

6 Clues: Your next destinationThe money a company earns from salesType of business done over the internetOnline retail giant founded by Jeff BezosProtecting computers, networks, and data from digital attacksA young company with a new business idea, often seeking investors

Managers and Managing Crossword Puzzle 2016-01-16

Managers and Managing Crossword Puzzle crossword puzzle
Across
  1. It's a totally crazy business environment out there today
  2. Achieving goals
  3. A name for direct reports that should no longer be used
  4. What we're using to learn right now
  5. Perhaps the biggest threat to the control function
  6. Manager starts acting like the rules don't apply to him
  7. Term or name that doesn't apply to not-for-profit organizations
  8. What many first-level managers prefer rather than thinking
  9. A common title for a first-line manager, Team ________
Down
  1. The management role that helps direct reports improve their performance / coaching
  2. Dividing up the work that needs to be done
  3. Worker whose boss is your direct report
  4. Accomplishment with minimum effort
  5. Usually the most important type of skill for middle managers

14 Clues: Achieving goalsAccomplishment with minimum effortWhat we're using to learn right nowWorker whose boss is your direct reportDividing up the work that needs to be donePerhaps the biggest threat to the control functionA common title for a first-line manager, Team ________A name for direct reports that should no longer be used...

Mrs Dadd's Bonanza 2023-01-19

Mrs Dadd's Bonanza crossword puzzle
Across
  1. Re-using components instead of throwing them away
  2. The processes and technologies designed to protect networks, computers and programs from attack, damage or unauthorised access
  3. Electronic waste
  4. Tricking people into breaking security procedures
  5. Watching people enter passwords or PINS
  6. Designed to protect creators of books, software, etc from having their work illegally copied
  7. Misinformation which is spread
Down
  1. Stealing data as it is passed across a network
  2. Short for malicious software
  3. Describes the technology that is carried inside the body
  4. One who breaks a systems integrity maliciously
  5. The moral principles which govern attitudes and behaviour
  6. A method of obscuring data so it cannot be read if it is intercepted
  7. One who is intensely interested in a computer system

14 Clues: Electronic wasteShort for malicious softwareMisinformation which is spreadWatching people enter passwords or PINSStealing data as it is passed across a networkOne who breaks a systems integrity maliciouslyRe-using components instead of throwing them awayTricking people into breaking security procedures...

BRAINWARE SOAL SEMI FINAL 2024-09-10

BRAINWARE SOAL SEMI FINAL crossword puzzle
Across
  1. merancang tampilan visual dan menu navigasi pada website
  2. Mendesain Merancang analisis suatu program
  3. Melindungi sistem keamanan jaringan
Down
  1. Mempersiapkan dan menyortir dokumen sebelum dimasukkan komputer
  2. Memfasilitasi kegiatan pembelajaran

5 Clues: Memfasilitasi kegiatan pembelajaranMelindungi sistem keamanan jaringanMendesain Merancang analisis suatu programmerancang tampilan visual dan menu navigasi pada websiteMempersiapkan dan menyortir dokumen sebelum dimasukkan komputer

Cybersecurity Awareness Crossword Puzzle Week 2 2023-10-11

Cybersecurity Awareness Crossword Puzzle Week 2 crossword puzzle
Across
  1. A bot-challenging security feature for online interactions.
  2. Code to fix or enhance software.
  3. Captures keystrokes to gather sensitive information.
  4. Security solution to analyze and detect threats in real-time from diverse data and events.
  5. Collaboration integrating security, automation, and shared responsibility in software development.
  6. Harmful software for gathering information without consent.
  7. A stealthy malware granting unauthorized system access while concealing actions.
  8. Network of devices used for malware distribution, and cyber-attacks.
Down
  1. Email attachments from unknown senders.
  2. A way to bypass authentication, used for unauthorized access or malicious intent.
  3. The most common word used for brute force.
  4. Safeguard sensitive files and communications.
  5. Isolated environment to analyze software behavior.
  6. A U.S. federal agency promoting cybersecurity standards and innovation.

14 Clues: Code to fix or enhance software.Email attachments from unknown senders.The most common word used for brute force.Safeguard sensitive files and communications.Isolated environment to analyze software behavior.Captures keystrokes to gather sensitive information.A bot-challenging security feature for online interactions....

Super U! 2024-09-19

Super U! crossword puzzle
Across
  1. I cannot ... because I’m afraid of water.
  2. I cannot ... poetry because I lack creativity.
  3. I cannot ... because I always burn the food.
  4. I can ... websites because I have a good sense of user experience.
  5. I cannot ... a bike because I have poor balance.
  6. I cannot ... the piano because I have no musical talent.
  7. I can ... because I understand logic structures well.
  8. I cannot ... because I have no rhythm.
  9. I cannot ... because my hands are unsteady.
Down
  1. I can ... networks because I understand cybersecurity protocols.
  2. I cannot ... fast because I have weak legs.
  3. I cannot ... math because numbers confuse me.
  4. I cannot ... soccer because I have no coordination.
  5. I can ... animations because I have a sharp eye for detail.
  6. I can ... videos because I’m good with digital tools.

15 Clues: I cannot ... because I have no rhythm.I cannot ... because I’m afraid of water.I cannot ... fast because I have weak legs.I cannot ... because my hands are unsteady.I cannot ... because I always burn the food.I cannot ... math because numbers confuse me.I cannot ... poetry because I lack creativity.I cannot ... a bike because I have poor balance....

CISO Crossword Quiz - 2325 2025-09-01

CISO Crossword Quiz - 2325 crossword puzzle
Across
  1. Fraud involving fake virus warnings or “system infected” messages designed to scare users into paying or clicking malicious links
  2. A cybersecurity defense method where potentially untrusted programs, files, or code are executed in a controlled, isolated environment to prevent them from affecting the host system, commonly used for malware analysis and safe application testing
  3. A general term for malicious software, such as viruses, worms, trojans, or spyware, designed to disrupt systems, steal data, or gain unauthorized access
  4. Which kind of WiFi/internet connection you should avoid using for UPI transactions because it is unsafe and open to hackers
Down
  1. Files disguised as “free movies” or “software cracks” usually carry this harmful code
  2. The official national agency under the Ministry of Electronics and Information Technology (MeitY) in India that monitors, responds to, and coordinates actions against cybersecurity threats and incidents, where organizations are required to report significant data breaches
  3. A long, complex password made of random words is called a pass___
  4. The process of keeping extra copies of important files so they can be restored after malware infections or system crash
  5. Attackers sometimes drop USB drives in public places hoping someone will pick them up and plug into their computer. What is this tactics called?
  6. A ____ hacker is an external security expert, who is specially invited to test software or systems for vulnerabilities during pre-release

10 Clues: A long, complex password made of random words is called a pass___Files disguised as “free movies” or “software cracks” usually carry this harmful codeThe process of keeping extra copies of important files so they can be restored after malware infections or system crash...

Technology 2024-06-05

Technology crossword puzzle
Across
  1. Made by humans, not natural (10 letters).
  2. Pertaining to atomic energy or reactions (7 letters).
  3. Tools or devices needed for a specific task (9 letters).
  4. To look through information on the internet casually (6 letters)
  5. A place on a website to type keywords for finding information (9 letters)
Down
  1. Relating to technology that uses computers or electronic devices (7 letters).
  2. To create something new that didn't exist before (6 letters).
  3. A place where scientific experiments are conducted (10 letters).
  4. Protecting computers and networks from attacks (12 letters).

9 Clues: Made by humans, not natural (10 letters).Pertaining to atomic energy or reactions (7 letters).Tools or devices needed for a specific task (9 letters).Protecting computers and networks from attacks (12 letters).To create something new that didn't exist before (6 letters).A place where scientific experiments are conducted (10 letters)....

Homeland Security 2024-03-18

Homeland Security crossword puzzle
Across
  1. What department within Homeland Security deals with transportation security
  2. How many departments did the Homeland Security Act of 2002 combine
  3. What type of security does Homeland Security deal with when relating to the internet
  4. Acronym for department of homeland security
  5. What department within Homeland Security deals with emergency management
Down
  1. What is one Geographical Aspect Homeland Security Protects
  2. What kind of events does Homeland Security prepare for
  3. How would opposers of Homeland Security describe its strategy
  4. What Homeland Security was made to defend against

9 Clues: Acronym for department of homeland securityWhat Homeland Security was made to defend againstWhat kind of events does Homeland Security prepare forWhat is one Geographical Aspect Homeland Security ProtectsHow would opposers of Homeland Security describe its strategyHow many departments did the Homeland Security Act of 2002 combine...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : Bullying someone online through messages or social media
  2. : A harmful program that can damage files and software
  3. : People who use the internet or computers to commit crimes
  4. : Software that protects your computer from viruses
Down
  1. : The practice of protecting devices and data from cyber threats
  2. : Fake messages that try to steal passwords or bank info
  3. : Criminal activities done using computers or the internet
  4. : A system that blocks unauthorized access to or from a private network
  5. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Bullying someone online through messages or social media: Criminal activities done using computers or the internet: People who use the internet or computers to commit crimes...

2024 International Privacy Week 2023-12-18

2024 International Privacy Week crossword puzzle
Across
  1. What can be used to make inferences about your socioeconomic status, demographic information and preferences
  2. MCA stands for
  3. Take _____ of your data!
  4. Your name, birthdate, and SSN
Down
  1. NCA stands for
  2. Your right to keep your person and your information to yourself
  3. Focused on preventing and solving threats (i.e., hacking, malware, online scams)
  4. The week-long event for spreading awareness about online privacy
  5. The month Data Privacy Week occurs
  6. Rules, guidelines, and your own personal choices about who has access to your data, and how much access they have

10 Clues: NCA stands forMCA stands forTake _____ of your data!Your name, birthdate, and SSNThe month Data Privacy Week occursYour right to keep your person and your information to yourselfThe week-long event for spreading awareness about online privacyFocused on preventing and solving threats (i.e., hacking, malware, online scams)...

Artificial Intelligence Related to Information Technology 2025-01-07

Artificial Intelligence Related to Information Technology crossword puzzle
Across
  1. Step-by-step instructions, like a recipe for computers
  2. A big box of information a computer can look up quickly
  3. A machine that can do work for people
  4. The games or apps you use on a computer or tablet
  5. Computers talking to each other to share things
Down
  1. A big web where people share pictures, videos, and talk
  2. Keeping computers safe from bad guys online
  3. Smart computer thinking, like a robot brain
  4. A box that helps you play games, write, or find answers
  5. The parts of a computer you can touch, like the keyboard

10 Clues: A machine that can do work for peopleKeeping computers safe from bad guys onlineSmart computer thinking, like a robot brainComputers talking to each other to share thingsThe games or apps you use on a computer or tabletStep-by-step instructions, like a recipe for computersA big web where people share pictures, videos, and talk...

Syniverse Crossword 2025-12-03

Syniverse Crossword crossword puzzle
Across
  1. Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
  2. Using mobile service outside your home network
  3. Protecting networks and data from cyber threats
  4. Application to person messaging for OTPs, alerts, and notifications
  5. Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
  1. Delivery of texts and rich communications
  2. Final money movement between carriers after clearing
  3. Continuous advancement that keeps networks and businesses competitive
  4. Illicit or abusive use of telecom services
  5. Reconciling usage records between operators for billing

10 Clues: Delivery of texts and rich communicationsIllicit or abusive use of telecom servicesUsing mobile service outside your home networkProtecting networks and data from cyber threatsFinal money movement between carriers after clearingReconciling usage records between operators for billingApplication to person messaging for OTPs, alerts, and notifications...

Crossword - LCCI and Lilly 2021-11-25

Crossword - LCCI and Lilly crossword puzzle
Across
  1. New e-commerce added in LCCI's R&R platform
  2. Who heads commercial services in LCCI
  3. platform where you can submit bills for reimbursement
  4. what is the name of the building in Embassy Tech village that LCCI occupies
  5. critical foundation of Lilly’s ethics and compliance program
Down
  1. Which month was LCCI started in Bangalore
  2. how many employees were there at the start of LCCI
  3. Learning portal sponsored by LCCI for its employees
  4. Lilly unites caring with discovery to create medicines that make life better for people around the world.
  5. when was the cybersecurity month

10 Clues: when was the cybersecurity monthWho heads commercial services in LCCIWhich month was LCCI started in BangaloreNew e-commerce added in LCCI's R&R platformhow many employees were there at the start of LCCILearning portal sponsored by LCCI for its employeesplatform where you can submit bills for reimbursement...

C CROSSWORD 2014-02-26

C CROSSWORD crossword puzzle
Across
  1. location. When reached, the invitees were
  2. they all had received a prank call.
  3. annoyed to see the party hall empty.The members realized that
  4. The enrolled members of "CYBERSECURITY CLUB" were called
  5. Twice to their surprise they found a paper unknowingly left
Down
  1. by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
  2. They called the bomb squad and explained the bomb blast planned at 10' clk,
  3. for a party arranged at
  4. The squad diffused the bomb and saved everyone . They all came back home .
  5. a common

10 Clues: a commonfor a party arranged atthey all had received a prank call.location. When reached, the invitees wereThe enrolled members of "CYBERSECURITY CLUB" were calledTwice to their surprise they found a paper unknowingly leftannoyed to see the party hall empty.The members realized that...

technology 2024-07-18

technology crossword puzzle
Across
  1. - An electronic device for storing and processing data.
  2. - Programs and operating information used by a computer.
  3. - A global network connecting millions of computers.
  4. - An organized collection of data, generally stored and accessed electronically.
Down
  1. - A mobile phone with advanced features.
  2. - The practice of protecting systems, networks, and programs from digital attacks.
  3. - An input device with keys used to type characters.
  4. - A process or set of rules to be followed in problem-solving operations.
  5. - The branch of technology dealing with the design and application of robots.
  6. - A small electronic device or tool.

10 Clues: - A small electronic device or tool.- A mobile phone with advanced features.- An input device with keys used to type characters.- A global network connecting millions of computers.- An electronic device for storing and processing data.- Programs and operating information used by a computer....

msn policies 2025-03-25

msn policies crossword puzzle
Across
  1. speaking in behalf facebook, in order to commint phishing
  2. any type of data that can be used to identify a person
  3. If you invest in this business your money will increase in two hours.
  4. most popular high risk drug
  5. buying nudes from a minor
Down
  1. I cant see your shoulders and knees
  2. The way we should address "hormonal" in Spanish
  3. threaten when a nude pic is shared
  4. Did you ask little Jane to keep the chat a secret?
  5. be careful, in spanish sounds like "pan" but its pronunciation in brazil is...

10 Clues: buying nudes from a minormost popular high risk drugthreaten when a nude pic is sharedI cant see your shoulders and kneesThe way we should address "hormonal" in SpanishDid you ask little Jane to keep the chat a secret?any type of data that can be used to identify a personspeaking in behalf facebook, in order to commint phishing...

test 2025-04-02

test crossword puzzle
Across
  1. Agents must state this on every call with a patient
  2. Rachel Robinson
  3. Platform used to work patient accounts
  4. Where employees can access benefits, tax documents, and pay statements
  5. A library in REACH containing courses that employees can enroll themselves in
  6. Capio's space to recognize and celebrate one another through points and eCards
Down
  1. Cybersecurity training drama series
  2. A cyberattack where scammers trick individuals into revealing sensitive information, like passwords or financial details, by posing as trusted entities through deceptive messages or websites.
  3. Vice President Operations
  4. Capio's platform for encouraging health and wellness

10 Clues: Rachel RobinsonVice President OperationsCybersecurity training drama seriesPlatform used to work patient accountsAgents must state this on every call with a patientCapio's platform for encouraging health and wellnessWhere employees can access benefits, tax documents, and pay statements...

Nicrossword 2 2024-12-23

Nicrossword 2 crossword puzzle
Across
  1. State Wide Area Network to connect state administration offices.
  2. Software with source code that anyone can inspect, modify, and enhance.
  3. National Knowledge Network for connecting educational and research institutions.
  4. Protection against cyber threats and securing digital infrastructure.
  5. Extremely large data sets analyzed computationally to reveal patterns and trends.
Down
  1. A unique identification project by the Government of India.
  2. Unified Mobile Application for New-age Governance.
  3. An ICT solution for the management of hospital services.
  4. A paperless office solution by NIC for government departments.
  5. A nationwide communication network by NIC.

10 Clues: A nationwide communication network by NIC.Unified Mobile Application for New-age Governance.An ICT solution for the management of hospital services.A unique identification project by the Government of India.A paperless office solution by NIC for government departments.State Wide Area Network to connect state administration offices....

TEM-8 science and technology 2025-11-14

TEM-8 science and technology crossword puzzle
Across
  1. a set of rules for solving a problem in a finite number of steps
  2. the introduction of new ideas, methods, or products
  3. the protection of computer systems from theft or damage
  4. reality a computer-generated simulation of a 3D environment
  5. technology on an atomic or molecular scale
Down
  1. engineering the direct manipulation of an organism's genes
  2. a natural resource able to be replenished naturally
  3. the use of living organisms in technology and engineering
  4. able to be maintained at a certain rate without depletion
  5. the use of largely automatic equipment in a system of operation

10 Clues: technology on an atomic or molecular scalea natural resource able to be replenished naturallythe introduction of new ideas, methods, or productsthe protection of computer systems from theft or damagethe use of living organisms in technology and engineeringable to be maintained at a certain rate without depletion...

bbb 2023-04-28

bbb crossword puzzle
Across
  1. requires less memory
  2. measure of correctness that is achieved in true prediction.
  3. Identifying similar groups of data in a dataset is called
  4. ls called blind algorithms
  5. if there is a relationship between the input variable and the output variable
Down
  1. machine learning models are trained without labelled data sets
  2. maps any given percept sequence to an action
  3. One of the AI application
  4. is a tabular summary of the number of correct and incorrect predictions made by a classifier
  5. measures how often the classifier makes the correct prediction

10 Clues: requires less memoryOne of the AI applicationls called blind algorithmsmaps any given percept sequence to an actionIdentifying similar groups of data in a dataset is calledmeasure of correctness that is achieved in true prediction.machine learning models are trained without labelled data sets...

C CROSSWORD 2014-02-26

C CROSSWORD crossword puzzle
Across
  1. The enrolled members of "CYBERSECURITY CLUB" were called
  2. they all had received a prank call.
  3. annoyed to see the party hall empty.The members realized that
  4. location. When reached, the invitees were
  5. The squad diffused the bomb and saved everyone . They all came back home .
  6. a common
Down
  1. for a party arranged at
  2. They called the bomb squad and explained the bomb blast planned at 10' clk,
  3. by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
  4. Twice to their surprise they found a paper unknowingly left

10 Clues: a commonfor a party arranged atthey all had received a prank call.location. When reached, the invitees wereThe enrolled members of "CYBERSECURITY CLUB" were calledTwice to their surprise they found a paper unknowingly leftannoyed to see the party hall empty.The members realized that...

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
  3. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  4. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
  1. Jenis Informasi yang merupakan informasi pengetahuan umum
  2. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  3. Prinsip Keamanan Informasi agar akurat
  4. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  5. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  6. Perangkat lunak yang diciptakan untuk merusak sistem computer

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

Technology 2023-08-24

Technology crossword puzzle
Across
  1. Wireless technology that enables data transfer between devices.
  2. Online method of watching videos or listening to audio without downloading i.e., real time digital content.
  3. Secret combination used to access digital accounts.
Down
  1. Mathematical recipe used to solve complex tasks efficiently.
  2. Process of creating instructions for computers to execute tasks.
  3. Practices and technologies used to safeguard digital information from attacks.
  4. Global navigation system that provides location and navigation information.
  5. Malicious software that spreads and infects digital systems.
  6. Computer-based systems that mimic human intelligence.
  7. Money capital of India.

10 Clues: Money capital of India.Secret combination used to access digital accounts.Computer-based systems that mimic human intelligence.Mathematical recipe used to solve complex tasks efficiently.Malicious software that spreads and infects digital systems.Wireless technology that enables data transfer between devices....

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

soal 4.0 2023-10-24

soal 4.0 crossword puzzle
Across
  1. salah satu teknologi di industri 4.0 yang sangat berguna saat ini
  2. Alat Iot yang kegunaanya memudahkan dirumah
  3. Teknologi inti dari Industri 4.0
  4. Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
  5. Data besar yang kompleks yang dianalisis dalam industri 4.0
  6. Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
  1. Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
  2. Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
  3. Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
  4. Revolusi industri saat ini

10 Clues: Revolusi industri saat iniTeknologi inti dari Industri 4.0Alat Iot yang kegunaanya memudahkan dirumahData besar yang kompleks yang dianalisis dalam industri 4.0salah satu teknologi di industri 4.0 yang sangat berguna saat iniAlat atau kebijakan yang berguna untuk melindungi lingkungan cyber...

Office Management 2025-10-12

Office Management crossword puzzle
Across
  1. The programs and operating information used by a computer.
  2. Distinctive attributes or characteristics.
  3. The state of keeping or being kept secret or private.
  4. The process of entrusting a task or responsibility to a subordinate.
  5. A system or organization where people are ranked by status or authority.
  6. room or building used for commercial or professional work.
  7. The process of making plans for something.
Down
  1. Protecting networks and data from unauthorized use.
  2. Computer systems able to perform tasks normally requiring human intelligence.
  3. The fact or quality of being on time.

10 Clues: The fact or quality of being on time.The process of making plans for something.Distinctive attributes or characteristics.Protecting networks and data from unauthorized use.The state of keeping or being kept secret or private.room or building used for commercial or professional work....

Globalisation 2023-03-08

Globalisation crossword puzzle
Across
  1. I __ __ __ __ __ security software to protect against harmful cyberattacks.
  2. With the increase in foreign culture, local culture might be l __ __ __.
  3. H __ __ __ __ __ __ are people who illegally gain access to other people's computer systems.
  4. the interconnectedness of societies.
  5. C__ __ __ __ __ __ __ __ __ __ __ __ protects computers and electronic devices from cyberattacks.
Down
  1. I__ __ __ __ __ __ __ __ __ __ __ in technology contributes to Globalisation.
  2. Better economic situation can lead to b__ __ __ __ __ quality of life.
  3. Globalisation leads to economic, c__ __ __ __ __ __ __ and security impacts.
  4. Globalisation has i__ __ __ __ __ __ __ __ security threats.
  5. M__ __ __ __ __ phones have allowed us to connect with people faster.
  6. F __ __ __ __ __ __ culture has spread throughout the world, such as K-pop.
  7. G__ __ __ __ __ of Multinational Corporations (MNCs) is a factor that drives Globalisation.

12 Clues: the interconnectedness of societies.Globalisation has i__ __ __ __ __ __ __ __ security threats.M__ __ __ __ __ phones have allowed us to connect with people faster.Better economic situation can lead to b__ __ __ __ __ quality of life.With the increase in foreign culture, local culture might be l __ __ __....

Cyber Security Puzzle 2024-10-22

Cyber Security Puzzle crossword puzzle
Across
  1. The process of verifying the identity of a user
  2. A method of disguising data to protect it
  3. A device that helps protect networks by filtering traffic
  4. A breach where sensitive data is accessed unlawfully
  5. A malicious email designed to trick recipients
  6. A protocol used to send emails securely
Down
  1. A common form of malware that locks files
  2. A program that scans for vulnerabilities in systems
  3. A common cybersecurity measure that involves using complex passwords
  4. Software that detects and removes malware
  5. A type of attack where multiple systems are used to overwhelm a target
  6. A legal framework for data protection in the EU

12 Clues: A protocol used to send emails securelyA common form of malware that locks filesA method of disguising data to protect itSoftware that detects and removes malwareA malicious email designed to trick recipientsThe process of verifying the identity of a userA legal framework for data protection in the EU...

Кәмшат 2024-11-19

Кәмшат crossword puzzle
Across
  1. A cloud computing environment designed specifically for one organization?
  2. An infrastructure-as-a-service model?
  3. What is the process of software allocation of computer resources called?
  4. Protecting data and systems from cyber attacks?
  5. The process of automatically adjusting resources based on user demand?
Down
  1. Google's cloud storage service?
  2. A collection of key resources such as networks, servers, hardware?
  3. Special coding process to protect data?
  4. A software-as-a-service model?
  5. What is the process of protecting data from unauthorized access called?
  6. What is the level of service available to users?
  7. A service for hosting websites and applications on the Internet?

12 Clues: A software-as-a-service model?Google's cloud storage service?An infrastructure-as-a-service model?Special coding process to protect data?Protecting data and systems from cyber attacks?What is the level of service available to users?A service for hosting websites and applications on the Internet?...

Cybersecurity Unit 1 Lesson 2 2022-12-02

Cybersecurity Unit 1 Lesson 2 crossword puzzle
Across
  1. Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
  2. A small local area network of computers and devices.
  3. Software that can stop malware from entering a network, computer, or device.
  4. Stores data that is in use.
  5. Software that runs on your computer, looking for many different types of malware from many different sources.
  6. Small text-based bits of information about your browser that a web server saves.
  7. Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
  8. All data on a computer.
  9. The arrangement of the various elements of a network.
  10. Executable files that are run by users.
  11. The systematic way to find specific web addresses and web pages.
Down
  1. A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
  2. A weakness in a system that allows an attacker to gain unauthorized access.
  3. A special kind of file that contains other files.
  4. A file that contains a collection of other files.
  5. Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
  6. Computer shared by multiple users across a network.
  7. An application file that is currently executing (also called running) in the operating system.
  8. An agreed-upon method for communication.

19 Clues: All data on a computer.Stores data that is in use.Executable files that are run by users.An agreed-upon method for communication.A special kind of file that contains other files.A file that contains a collection of other files.Computer shared by multiple users across a network.A small local area network of computers and devices....

IT Trivia 2022-07-18

IT Trivia crossword puzzle
Across
  1. ... word, excel, powerpoint, office
  2. measures taken to protect devices, networks, and data from unauthorized access and criminal use
  3. a program that is dedicated to managing network resources
  4. the vaccine for computers
  5. not physical but...
  6. an output device that produces a tangible copy of alphanumeric or graphic data
  7. one of the primary input devices used with a computer
Down
  1. the standard way to connect computers on a network over a wired connection
  2. a piece of code which can corrupt a system or destroy data
  3. Jerry
  4. the button you press when you make an error
  5. what we hate to see in our emails
  6. the practice of tricking internet users through deception into revealing personal information

13 Clues: Jerrynot physical but...the vaccine for computerswhat we hate to see in our emails... word, excel, powerpoint, officethe button you press when you make an errorone of the primary input devices used with a computera program that is dedicated to managing network resourcesa piece of code which can corrupt a system or destroy data...

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

STEM Careers 2023-12-13

STEM Careers crossword puzzle
Across
  1. Designs and oversees the construction of infrastructure like roads and bridges.
  2. Analyzes and develops software applications for specific user needs.
  3. Works on the molecular or atomic scale for various applications.
  4. Designs algorithms for computational problems.
  5. Designs solutions for environmental issues like pollution.
  6. Focuses on celestial bodies' formation and evolution.
Down
  1. Focuses on developing technologies for sustainable energy sources.
  2. Focuses on developing new materials for various applications.
  3. Involves analyzing biological data using computational methods.
  4. Focuses on preventing unauthorized access to computer systems.
  5. Uses statistical techniques to extract insights from data.
  6. Designs medical devices and diagnostic tools.
  7. Responsible for designing computer hardware components.
  8. Develops manufacturing processes and new materials.
  9. Involves studying the behavior of subatomic particles.
  10. Studies the interactions between organisms and their environment.
  11. Studies the Earth's crust, rocks, and land formations.
  12. Uses mathematical and statistical techniques to extract insights from data.

18 Clues: Designs medical devices and diagnostic tools.Designs algorithms for computational problems.Develops manufacturing processes and new materials.Focuses on celestial bodies' formation and evolution.Involves studying the behavior of subatomic particles.Studies the Earth's crust, rocks, and land formations....

Information and Cyber Security 2022-10-21

Information and Cyber Security crossword puzzle
Across
  1. Hackers demanded this company cancel the planned release of a film
  2. The key to securing your accounts
  3. The combination of something you have, something you know, and something you are to gain access
  4. Be ...
  5. Virtual Private …
Down
  1. The term used for a broad range of malicious activities accomplished through human interactions
  2. Anti- ...
  3. What BHSF does to train colleagues to look out for phishing attacks
  4. What type of attacks are on the rise
  5. One of the biggest cybersecurity breaches so far
  6. An attack that uses text messaging or short message service (SMS)
  7. These attacks typically target a CEO, CFO, or any CXX
  8. 560,000 pieces of … are detected every day
  9. UK cyber crime has … in the past 5 years
  10. Time it takes a hacker to brute force a 6 character password

15 Clues: Be ...Anti- ...Virtual Private …The key to securing your accountsWhat type of attacks are on the riseUK cyber crime has … in the past 5 years560,000 pieces of … are detected every dayOne of the biggest cybersecurity breaches so farThese attacks typically target a CEO, CFO, or any CXXTime it takes a hacker to brute force a 6 character password...

SOF GLSS SCAVENGER HUNT 2023-09-05

SOF GLSS SCAVENGER HUNT crossword puzzle
Across
  1. Acronym for MFC's Quality Policy
  2. First word under Lockheed Martin Delivers found on the SOF Learning Dashboard
  3. The first program listed on the Programs dropdown
  4. The number of PED violations in 2023 (Hint: Cybersecurity)
  5. Click on this tab to find the JPS Library
  6. The first commitment listed on the SOF GLSS ESH Policy
  7. The next mandatory IT update starting in October
Down
  1. Quality Month
  2. Next day off on the Holiday Calendar
  3. JPS 1-102
  4. Last name of our Quality Sr. Manager
  5. 4th item found on the Command Media Menu on the portal
  6. The international standard that governs our systems relating to quality
  7. First link listed on the "ESH links" on the ESH Bulletin Board
  8. Found in the SOF GLSS Creed, our every day commitment to our customer

15 Clues: JPS 1-102Quality MonthAcronym for MFC's Quality PolicyNext day off on the Holiday CalendarLast name of our Quality Sr. ManagerClick on this tab to find the JPS LibraryThe next mandatory IT update starting in OctoberThe first program listed on the Programs dropdown4th item found on the Command Media Menu on the portal...

Technology 2024-11-25

Technology crossword puzzle
Across
  1. A discovery that changes understanding
  2. Protecting online data and systems
  3. Old-fashioned or no longer in use
Down
  1. A place to connect and share content online
  2. Advanced technology

5 Clues: Advanced technologyOld-fashioned or no longer in useProtecting online data and systemsA discovery that changes understandingA place to connect and share content online

Some U.S. Power Numbers 2014-06-25

Some U.S. Power Numbers crossword puzzle
Across
  1. Separation into three groups
  2. Sub-elements of a larger mechanism
  3. Where outage information is often posted
  4. Sealed from use for a period of time
  5. A financial product that pays for covered events
  6. A type of evaluation
  7. What can happen to frozen pipes
  8. Inner workings framework
  9. A formal inquiry
  10. Someone who buys accounts receivables
  11. Storage site
  12. To send on an errand or assignment
  13. Food gone bad
  14. A vehicle capable of transporting gas or liquids
Down
  1. A term for a loss of power
  2. A term for the press, radio and other news outlets
  3. The World Wide Web
  4. A term covering the network of electrical connections
  5. Computer security
  6. A way down – or up
  7. Phone solicitators
  8. Term for lines carrying electrical power
  9. A popular social media tool
  10. Someone authorized to speak for the organization
  11. Step 2 of 5
  12. Dangerous
  13. Information Technology
  14. A technique for securing and protecting data files
  15. Type of gaseous fuel

29 Clues: DangerousStep 2 of 5Storage siteFood gone badA formal inquiryComputer securityThe World Wide WebA way down – or upPhone solicitatorsA type of evaluationType of gaseous fuelInformation TechnologyInner workings frameworkA term for a loss of powerA popular social media toolSeparation into three groupsWhat can happen to frozen pipes...

FITE 2013-05-16

FITE crossword puzzle
Across
  1. symbol for a company
  2. personal conduct online
  3. document or file made with a preset format
  4. one thousand terabytes
  5. a thousand bytes
  6. one thousand megabytes
  7. one thousand brontobytes
  8. search engine that checks all search engines
  9. wireless home network
  10. one thousand exabytes
  11. close up preview of a template
  12. one thousand petabytes
  13. protection of information computer/networks
  14. any type of internet hosting service
  15. appearence of a document
  16. port that connects the mouse or keyboard to PC
  17. one thousand yottabytes
Down
  1. arrangement of data for a computer
  2. Ex: mouse, flash drive
  3. one thousand zetabytes
  4. software used to search data
  5. one thousand gigabytes
  6. one million bytes
  7. a device that has a lot of data storage
  8. zoomable presentation program
  9. computer screen
  10. network name
  11. Ex:comcast,verizon
  12. Ex: monitor, printer
  13. eight bytes
  14. rules to keep people safe online
  15. smallest unit of data
  16. plug your flashdrive into
  17. Ex: headphones, speakers
  18. a short memorable phrase for advertising

35 Clues: eight bytesnetwork namecomputer screena thousand bytesone million bytesEx:comcast,verizonsymbol for a companyEx: monitor, printerwireless home networkone thousand exabytessmallest unit of dataEx: mouse, flash driveone thousand zetabytesone thousand gigabytesone thousand terabytesone thousand megabytesone thousand petabytespersonal conduct online...

ITSM Challenge 2 2024-05-21

ITSM Challenge 2 crossword puzzle
Across
  1. Alteration to improve IT services.
  2. Ensuring uninterrupted IT service.
  3. Activity that creates a service definition.
  4. Daily management of IT services.
  5. Temporary endeavor to achieve a goal.
  6. Type of Change Request that is too urgent to wait for the next CAB meeting for approval to implement.
  7. Type of Change Request that is medium risk or higher, requires custom planning, and must be approved for implementation.
  8. Framework for managing IT services.
Down
  1. Phase of implementing changes into operations.
  2. Protection against digital threats.
  3. Formal demand for IT service.
  4. Secured data storage or transmission.
  5. Long-term plan for IT service improvement or actions taken to determine the need for new services.
  6. An unexpected disruption in service.
  7. Rollout of IT services or IT updates to production.
  8. Root cause of recurring incidents.
  9. Best practice framework for IT service management.
  10. Authorized deployment of IT components.
  11. Type of Change Request that is low risk, repeatable, well-known, and preapproved
  12. Centralized project management office.

20 Clues: Formal demand for IT service.Daily management of IT services.Alteration to improve IT services.Ensuring uninterrupted IT service.Root cause of recurring incidents.Protection against digital threats.Framework for managing IT services.An unexpected disruption in service.Secured data storage or transmission.Temporary endeavor to achieve a goal....

4.1 Application 2023-07-07

4.1 Application crossword puzzle
Across
  1. Month of the Presidential Inauguration
  2. The cabinet department responsible for farming, food, and forestry
  3. The process by which the United States elects the president
  4. An annual message delivered by the president to Congress
  5. The head of the executive branch
  6. Main group of advisors to the president
  7. The cabinet department responsible for foreign affairs
  8. Minimum age to be president of the US
  9. The cabinet department responsible for creating policies and programs related to education in the US
  10. The building where the president resides
Down
  1. Length of presidential term
  2. If a federal official commits a crime, this may happen
  3. The chamber of Congress responsible for approving presidential appointments
  4. The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
  5. The cabinet department responsible for US nuclear infrastructure
  6. First in line of presidential succession
  7. The branch responsible for enforcing laws
  8. The department responsible for maintaining national parks
  9. Amoun of votes needed to win the electoral college
  10. The cabinet department responsible for national defense

20 Clues: Length of presidential termThe head of the executive branchMinimum age to be president of the USMonth of the Presidential InaugurationMain group of advisors to the presidentFirst in line of presidential successionThe building where the president residesThe branch responsible for enforcing lawsAmoun of votes needed to win the electoral college...

Electronics 2025-03-05

Electronics crossword puzzle
Across
  1. – Network of interconnected devices communicating via the internet.
  2. – Field focused on designing and building robots.
  3. – Board that connects electronic components.
  4. – Technology that uses radio waves for identification and tracking.
  5. – Energy sourced from nature, like solar or wind.
  6. – Type of system where software is built into hardware.
  7. – Advanced field of physics used for computing and cryptography.
  8. – Material used in electronic circuits, such as silicon.
  9. – Use of technology to perform tasks with minimal human intervention.
  10. – A small computer on a single chip, used in embedded systems.
  11. – Latest generation of mobile network technology.
Down
  1. – Communication without physical cables.
  2. – Low-level software controlling hardware functions.
  3. – A device that converts electrical signals into movement.
  4. – The practice of protecting computer systems from attacks.
  5. – Unmanned aerial vehicles used for various applications.
  6. – Computing closer to the data source to reduce latency.
  7. – A device that detects physical properties such as temperature or motion.
  8. – Engineering on a very tiny scale, atomic or molecular level.
  9. – The field of making machines "think" like humans.

20 Clues: – Communication without physical cables.– Board that connects electronic components.– Field focused on designing and building robots.– Energy sourced from nature, like solar or wind.– Latest generation of mobile network technology.– The field of making machines "think" like humans.– Low-level software controlling hardware functions....

Satria briant ardinata (33) kelas XF 2025-04-29

Satria briant ardinata (33) kelas XF crossword puzzle
Across
  1. Pelanggaran terhadap HAKI disebut
  2. Istilah untuk mengecualikan kata dalam pencarian Google
  3. Proses memeriksa kebenaran informasi
  4. Orang yang menguji kualitas perangkat lunak
  5. Budaya yang muncul dan berkembang di internet
  6. Platform untuk melaporkan konten berbahaya
  7. Kata kunci untuk mencari frasa secara tepat di Google
  8. Konten yang menyesatkan dan tidak benar
  9. Singkatan dari Hak Atas Kekayaan Intelektual
  10. Perlindungan hukum terhadap ide atau ciptaan
  11. Platform berbagi video terpopuler saat ini
  12. Platform pencarian yang sangat populer di dunia
  13. Proses menyebarkan informasi secara digital
  14. Format umum untuk gambar digital
Down
  1. Profesi yang mengubah data menjadi informasi berharga
  2. Hak atas ciptaan disebut hak
  3. Digunakan untuk mencari kata dalam situs tertentu
  4. Konten yang dibagikan secara luas disebut konten
  5. Spesialis yang menjaga keamanan sistem informasi
  6. Hak eksklusif atas merek disebut hak
  7. Profesi yang mengelola dan merancang sistem jaringan
  8. Pihak yang berwenang mengawasi konten digital
  9. Informasi yang memprovokasi dan merugikan disebut
  10. Operator pencarian untuk menampilkan hasil dari jenis file tertentu
  11. Orang yang menulis dan mengembangkan kode program

25 Clues: Hak atas ciptaan disebut hakFormat umum untuk gambar digitalPelanggaran terhadap HAKI disebutProses memeriksa kebenaran informasiHak eksklusif atas merek disebut hakKonten yang menyesatkan dan tidak benarPlatform untuk melaporkan konten berbahayaPlatform berbagi video terpopuler saat iniOrang yang menguji kualitas perangkat lunak...

TTS19 X_D 2025-04-15

TTS19 X_D crossword puzzle
Across
  1. Pengembang perangkat lunak.
  2. Pelanggaran hak cipta disebut juga.
  3. Cerita rakyat yang bisa dibuat animasi digital.
  4. Penyebaran informasi secara digital.
  5. Hak atas penemuan atau inovasi teknologi.
  6. Operator pencarian untuk dua kata kunci sekaligus.
  7. Orang yang memperbaiki dan merawat jaringan komputer.
  8. Hak milik atas ciptaan lagu, buku, dan karya seni.
  9. Informasi palsu yang disebarkan untuk menipu.
  10. Lembaga yang mengatur HAKI di Indonesia.
Down
  1. Syntax untuk mencari di situs tertentu
  2. Proses mengecek kebenaran informasi sebelum membagikannya.
  3. Alat musik khas Jawa Barat.
  4. Pengelola dan penganalisis data dalam skala besar.
  5. Ahli dalam membuat sistem keamanan digital.
  6. Perilaku kasar atau menghina di media sosial.
  7. Seni tradisional yang bisa dijadikan konten edukatif.
  8. Kata untuk mengecualikan hasil pencarian.
  9. Proses membuat konten digital.
  10. Mesin pencari paling populer.
  11. Profesi yang merancang antarmuka pengguna.
  12. Lembaga yang mengawasi konten siaran di Indonesia.
  13. Penyebaran kebencian berbasis SARA di internet.
  14. Simbol atau logo dagang yang dilindungi hukum.
  15. Tanda yang digunakan untuk mencari frasa lengkap.

25 Clues: Alat musik khas Jawa Barat.Pengembang perangkat lunak.Mesin pencari paling populer.Proses membuat konten digital.Pelanggaran hak cipta disebut juga.Penyebaran informasi secara digital.Syntax untuk mencari di situs tertentuLembaga yang mengatur HAKI di Indonesia.Kata untuk mengecualikan hasil pencarian.Hak atas penemuan atau inovasi teknologi....

TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16

TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 crossword puzzle
Across
  1. Alat untuk menyaring konten tidak pantas
  2. Proses mengecek kebenaran sebuah informasi
  3. Orang yang menulis dan mengembangkan kode
  4. Simbol untuk mencari frasa tepat
  5. Pekerjaan yang menganalisis dan mengolah data besar
  6. Syntax untuk membatasi pencarian ke situs tertentu
  7. Direktorat di bawah Kemenkumham yang mengurus HAKI
  8. Perlindungan atas penemuan teknologi
  9. Istilah untuk penyebaran konten ke publik
Down
  1. Profesi bidang keamanan data dan jaringan
  2. Singkatan dari Hak atas Kekayaan Intelektual
  3. Berita palsu yang menyesatkan publik
  4. Konten berisi kebencian atau diskriminasi
  5. Lembaga negara pengawas konten digital
  6. Operator untuk alternatif kata
  7. Proses membuat media seperti video atau gambar digital
  8. Tindakan menyalin karya tanpa izin
  9. Syntax untuk mencari dokumen tertentu seperti PDF
  10. Istilah singkat untuk pengembang situs web
  11. Jenis HAKI yang melindungi nama dagang
  12. Platform media sosial populer untuk video pendek
  13. Unsur budaya lokal yang bisa diangkat ke konten digital
  14. Jenis tarian daerah yang bisa dijadikan konten
  15. Profesi yang fokus ke tampilan dan pengalaman pengguna
  16. Operator untuk mengecualikan istilah dari pencarian (simbol)

25 Clues: Operator untuk alternatif kataSimbol untuk mencari frasa tepatTindakan menyalin karya tanpa izinBerita palsu yang menyesatkan publikPerlindungan atas penemuan teknologiLembaga negara pengawas konten digitalJenis HAKI yang melindungi nama dagangAlat untuk menyaring konten tidak pantasProfesi bidang keamanan data dan jaringan...

TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16

TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 crossword puzzle
Across
  1. Alat untuk menyaring konten tidak pantas
  2. Proses mengecek kebenaran sebuah informasi
  3. Orang yang menulis dan mengembangkan kode
  4. Simbol untuk mencari frasa tepat
  5. Pekerjaan yang menganalisis dan mengolah data besar
  6. Syntax untuk membatasi pencarian ke situs tertentu
  7. Direktorat di bawah Kemenkumham yang mengurus HAKI
  8. Perlindungan atas penemuan teknologi
  9. Istilah untuk penyebaran konten ke publik
Down
  1. Profesi bidang keamanan data dan jaringan
  2. Singkatan dari Hak atas Kekayaan Intelektual
  3. Berita palsu yang menyesatkan publik
  4. Konten berisi kebencian atau diskriminasi
  5. Lembaga negara pengawas konten digital
  6. Operator untuk alternatif kata
  7. Proses membuat media seperti video atau gambar digital
  8. Tindakan menyalin karya tanpa izin
  9. Syntax untuk mencari dokumen tertentu seperti PDF
  10. Istilah singkat untuk pengembang situs web
  11. Jenis HAKI yang melindungi nama dagang
  12. Platform media sosial populer untuk video pendek
  13. Unsur budaya lokal yang bisa diangkat ke konten digital
  14. Jenis tarian daerah yang bisa dijadikan konten
  15. Profesi yang fokus ke tampilan dan pengalaman pengguna
  16. Operator untuk mengecualikan istilah dari pencarian (simbol)

25 Clues: Operator untuk alternatif kataSimbol untuk mencari frasa tepatTindakan menyalin karya tanpa izinBerita palsu yang menyesatkan publikPerlindungan atas penemuan teknologiLembaga negara pengawas konten digitalJenis HAKI yang melindungi nama dagangAlat untuk menyaring konten tidak pantasProfesi bidang keamanan data dan jaringan...

TEMA 2 2025-10-27

TEMA 2 crossword puzzle
Across
  1. Aktivitas menonton, bermain, atau berkomunikasi melalui internet.
  2. Profesi baru yang muncul karena adanya media sosial.
  3. menjual dan membeli produk secara online.
  4. Istilah untuk kecerdasan buatan yang membantu otomatisasi bisnis.
  5. Layanan perbankan yang dapat diakses secara daring.
  6. Teknologi yang digunakan untuk mencatat transaksi kripto.
Down
  1. Sistem perdagangan yang dilakukan melalui internet.
  2. Sistem keamanan untuk melindungi data digital.
  3. Istilah untuk kegiatan promosi melalui media digital.
  4. Transaksi jual beli melalui aplikasi smartphone.
  5. Mata uang digital yang tidak memiliki bentuk fisik.
  6. Alat pembayaran digital yang banyak digunakan di ponsel.
  7. Bentuk uang elektronik yang diterbitkan oleh bank atau fintech.
  8. Pasar global tanpa batas yang diciptakan oleh internet.
  9. tempat menonton video digital, misalnya YouTube.
  10. Jenis pekerjaan yang bisa dilakukan dari rumah dengan bantuan internet.
  11. Perusahaan yang berbasis teknologi digital seperti Gojek atau Tokopedia.
  12. Teknologi penyimpanan data melalui internet.
  13. Istilah untuk data dalam jumlah besar yang diolah untuk bisnis.
  14. Proses perubahan dari sistem ekonomi tradisional ke sistem berbasis teknologi.

20 Clues: menjual dan membeli produk secara online.Teknologi penyimpanan data melalui internet.Sistem keamanan untuk melindungi data digital.Transaksi jual beli melalui aplikasi smartphone.tempat menonton video digital, misalnya YouTube.Sistem perdagangan yang dilakukan melalui internet.Mata uang digital yang tidak memiliki bentuk fisik....

"Business Tech Brain Teaser" 2025-04-02

"Business Tech Brain Teaser" crossword puzzle
Across
  1. Using AI and software to perform tasks automatically
  2. The use of online payment systems in business
  3. The process of storing and accessing data over the internet
Down
  1. A system that helps businesses make smarter choices using data
  2. Digital tools that help businesses grow and operate
  3. The use of technology to protect business data
  4. The selling of goods and services online
  5. Online business that includes more than just sales

8 Clues: The selling of goods and services onlineThe use of online payment systems in businessThe use of technology to protect business dataDigital tools that help businesses grow and operateOnline business that includes more than just salesUsing AI and software to perform tasks automaticallyThe process of storing and accessing data over the internet...

"Business Tech Brain Teaser" 2025-04-02

"Business Tech Brain Teaser" crossword puzzle
Across
  1. business that includes more than just sales
  2. tools that help businesses grow and operate
  3. use of online payment systems in business
Down
  1. process of storing and accessing data over the internet
  2. selling of goods and services online
  3. AI and software to perform tasks automatically
  4. system that helps businesses make smarter choices using data
  5. use of technology to protect business data

8 Clues: selling of goods and services onlineuse of online payment systems in businessuse of technology to protect business databusiness that includes more than just salestools that help businesses grow and operateAI and software to perform tasks automaticallyprocess of storing and accessing data over the internet...

CURRENT ISSUE PUZZLE 2023-03-18

CURRENT ISSUE PUZZLE crossword puzzle
Across
  1. Factor affecting generation gap
  2. Security human resource technology
  3. Key point of talent management
Down
  1. Cultural difference in the workplace
  2. Someone uses a computer system or network in a bad way to get secret information or cause harm to the system
  3. Bully but virtual
  4. Unauthorized interception of phone conversations with the aim of listening in on what is being said.

7 Clues: Bully but virtualKey point of talent managementFactor affecting generation gapSecurity human resource technologyCultural difference in the workplaceUnauthorized interception of phone conversations with the aim of listening in on what is being said....