cybersecurity Crossword Puzzles
CIS 120 Cybersecurity Crossword Puzzle 2023-02-21
Across
- software that is constantly updating
- software/hardware keep intruders out
- text read by human eye
- transform ciphertext into original plaintext
- test distinguishes between human/robot
- security mechanism determining who's authorized
- intent to cause mischief/theft
- code imbedded into computer hardware
- technique to click bad url
- physical parts of a computer
- core of computers operating system
Down
- trap or decoy for attackers
- coding used to protect information
- connect computers to encrypted network
- attempt to violate security perimeter
- language to create/control website content
- shield users against computer damage
- term for unauthorized computer attacker
- malicious software to damage systems
- an error in computer program
20 Clues: text read by human eye • technique to click bad url • trap or decoy for attackers • an error in computer program • physical parts of a computer • intent to cause mischief/theft • coding used to protect information • core of computers operating system • software that is constantly updating • software/hardware keep intruders out • shield users against computer damage • ...
Cybersecurity Unit 4 Terminology Crossword 2023-04-21
Across
- The operation finds the remainder of a division. For example, 5 mod 2 is 1 (5 divided by 2 has a remainder of1) and 38 mod 4 is 2 (38 divided by 4 has a remainder of 2).
- It is an encryption method where the sender and receiver share a single private key (such as a number, word, or phrase) to use in the encryption algorithm. Also called shared key and symmetric key encryption, the same key is used in both the encryption and decryption process.
- A cipher in which each letter in an alphabet is replaced with a different character or symbol.
- It is easy to do, but hard to undo.
- It is an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. Also called asymmetric key encryption, the keys are combined mathematically to create one key used in the encryption/decryption algorithm
- The encrypted message generated by a cipher
- A section of a Volume that's formatted for the operating system to use as storage areas. Data used for different purposes are often stored in separate partitions, for example, operating system software versus user data.
- Data that is being transferred between applications, between hosts, or around the network
- A file that contains other data and acts like a drive. It can be mounted (connected to) or unmounted (removed from) a drive letter, giving administrators greater control when making the data available to users.
- A string of characters used as a parameter that determines the output of an encryption algorithm.
- the practice of concealing messages within other data, such as text or images.
Down
- The last bit (the right-most bit) in a byte.
- It is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime.
- It is information or data that is valuable to an investigation of a crime involving a computer.
- Sometimes called a logical volume or logical drive, the accessible storage area on a hard disk or disks. A logical volume can span multiple disks but doesn't have to.
- Data that is stored somewhere
- A digital cash system that uses cryptography to secure the exchange financial transactions.
- an algorithm used for encryption or decryption
- The science and art of delivering a message securely and confidentially.
- Also called hashing, it is a computational process that converts data of varying size to a fixed-size. In cryptographic hash functions, the data is converted using a one-way function so the process cannot be reversed.
- A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
- The original message that needs to be encrypted
- Data that is being manipulated by an application
- The physical drives inside of a computer.
24 Clues: Data that is stored somewhere • It is easy to do, but hard to undo. • The physical drives inside of a computer. • The encrypted message generated by a cipher • The last bit (the right-most bit) in a byte. • an algorithm used for encryption or decryption • The original message that needs to be encrypted • Data that is being manipulated by an application • ...
Cybersecurity Awareness Month Crossword Puzzle 2025-10-16
Across
- Software designed with intent to harm
- Locks you out system until paid
- Combination of stuff for security
- Self replicating program that spreads independently
- Process to verify someone's identity
- Overloads a network to kill it
- A trick to get private info
- Detects, prevents, and removes malware
- Attempt by Hackers to compromise data
- Programs that attach and spread file
Down
- Secretly collects private info
- Scrambles info to protect it
- Network of malware infected computers
- Disguises as legitimate software but bad
- Intrusively displays unwanted advertisements
- Way to send messages over internet
- Barrier between a trusted network
- Identity to access a website
- A software update to fix vulnerabilities
- Bad guy who steals info
20 Clues: Bad guy who steals info • A trick to get private info • Scrambles info to protect it • Identity to access a website • Secretly collects private info • Overloads a network to kill it • Locks you out system until paid • Barrier between a trusted network • Combination of stuff for security • Way to send messages over internet • Process to verify someone's identity • ...
Cybersecurity Awareness Month Crossword Puzzle 2024-09-30
Across
- address for accessing websites
- software used for destruction
- thief through computerized means
- software to monitor computerized information
- ID with magnetic access chip
- off personal computer storage
- lying about your location
- holds data hostage
- security tactics
- level for information security
- unsolicited meat banter
- strength in the security structure
Down
- weak point in security
- used to harm your computer
- the simplest part of security
- a code for keeping secrets
- needed for accessing secure information
- blocks out unauthorized access
- data to identify a person
- casting cyber bait
20 Clues: security tactics • holds data hostage • casting cyber bait • weak point in security • unsolicited meat banter • lying about your location • data to identify a person • used to harm your computer • a code for keeping secrets • ID with magnetic access chip • software used for destruction • the simplest part of security • off personal computer storage • address for accessing websites • ...
Cybersecurity Crossword Puzzle Asher Knowles 2023-01-25
Across
- Overloading server to force shutdown
- looks innocent is malware
- Test's computers and server security
- Used to protect information
- Malware that tracks people’s activity
- Stands for internet protocol
- Faking Importance to hack someone
- Malicious software that damages systems
- tricking into clicking a fake
- hackers use to remote access
Down
- Bring your own device
- hacker who causes harm
- infected network of computers
- Malware that reproduces and spreads
- Process to access restricted things
- when many computers are connected
- used for private encrypted networking
- Means of attack on systems
- Tech to keep intruders out
- Tech to detect/remove viruses
20 Clues: Bring your own device • hacker who causes harm • looks innocent is malware • Means of attack on systems • Tech to keep intruders out • Used to protect information • Stands for internet protocol • hackers use to remote access • infected network of computers • Tech to detect/remove viruses • tricking into clicking a fake • when many computers are connected • ...
CIS 178 - Participation 3- Cybersecurity 2023-01-25
Across
- attacks seeking personal info
- virtual shield for data
- process of verifying user identity
- everyday objects connected to internet/network
- software that records keystrokes
- lots of attackers preventing legitimate users
- taking advantage of system flaw
- vulnerable points attackers gain entrance
- provides apps updated code
- appears harmless but is malicious
Down
- processing data for legal use
- allows secure remote connection
- decoding cypher to readable text
- programs that lure/trap hackers
- malware that makes you pay
- trying high volume of passwords combos
- commonly used for illegal internet activity
- method that scrambles data
- hacker gains access to data
- malware collects private information
20 Clues: virtual shield for data • malware that makes you pay • method that scrambles data • provides apps updated code • hacker gains access to data • processing data for legal use • attacks seeking personal info • allows secure remote connection • programs that lure/trap hackers • taking advantage of system flaw • decoding cypher to readable text • software that records keystrokes • ...
Chapter 1 - Introduction to Cybersecurity 2025-08-11
Across
- The combination of the probability of an attack and the potential damage it could cause. (4 letters)
- The practice of protecting digital systems, networks, and programs. (13 letters)
- The practice of protecting information to ensure its confidentiality, integrity, and availability. (12 letters)
- The process of linking an action to a specific user. (10 letters)
- A person who explores and manipulates computer systems. (7 letters)
- The granting of privileges to a user after their identity is confirmed. (13 letters)
- A threat originating from outside a company's network. (8 letters)
- The process of safeguarding an organization's sensitive information. (10 letters)
- An ethical hacker who uncovers and fixes system vulnerabilities. (10 letters)
- The of stealing electronic data. (5 letters)
Down
- Amateur hackers who use tools created by others. (12 letters)
- A hacker who engages in malicious activities for personal gain or harm.
- A weakness or flaw that can be exploited by an attack. (13 letters)
- A potential event that could exploit a vulnerability and cause harm. (6 letters)
- The process of confirming a user's identity. (14 letters)
- The state of being usable and accessible to authorized users when required. (13 letters)
- An attack that is well-planned and carried out by skilled attackers. (10 letters)
- The property of data being accurate, consistent, and unaltered. (9 letters)
- A action on a system or network with the intent to cause damage or steal information. (6 letters)
- A hacker who may one day become either a black-hat or white-hat hacker. (8 letters)
20 Clues: The of stealing electronic data. (5 letters) • The process of confirming a user's identity. (14 letters) • The process of linking an action to a specific user. (10 letters) • A weakness or flaw that can be exploited by an attack. (13 letters) • A person who explores and manipulates computer systems. (7 letters) • ...
Commerce Crossword - 3/3/25 2025-03-02
Across
- - A repayment or sum of money payed to an unhappy customer
- - Make a serious or heartfelt request
- - Someone who purchases items for personal use
- - Action of helping and/or assisting someone
- - A Dishonest scheme or fraud usually targetted online at people for money
- - A conclusion or resolution made after cosideration
- - Buying and selling goods
- - A Legally enforceable document between 2 or more people
Down
- - A Written Guarantee to a purchaser with a promise to repay or refund in a certain time period
- - Pay someone for the temporary use of something
- - An item manufactured and refined for sale
- - Someones regular profession or occupation
- - A protected string of symbols/numbers/letters used to authenticate access to sensitive information
- - Buying something
- - An Agreement that usually involves an obligation that cannot be broken
- - Online applications to protect senstive and private information
- - Legitimate actions
- - Online crimes like fraud and scamming
18 Clues: - Buying something • - Legitimate actions • - Buying and selling goods • - Make a serious or heartfelt request • - Online crimes like fraud and scamming • - An item manufactured and refined for sale • - Someones regular profession or occupation • - Action of helping and/or assisting someone • - Someone who purchases items for personal use • ...
STS 2024-12-15
Across
- Major urban development expanding into rural areas.
- Tool to analyze environmental trends and data.
- Biodiversity loss due to human activities.
- Protection of endangered species and habitats.
- The global condition of rising temperatures and its effects.
- Using digital technology to enhance learning experiences.
- Using algorithms to mimic human thought processes.
Down
- Protection for computers against unauthorized access.
- A technology that allows virtual collaboration.
- The raw input used for computation or analysis.
- Digital networks and their protection mechanisms.
- Materials or energy sources found in nature.
- A numerical representation of environmental conditions.
- An invention or method that's newly created.
- Measure of diversity within ecosystems.
- A burst of rapid increase, often in demand or water levels.
- Sudden, uncontrolled spread of wildfires.
17 Clues: Measure of diversity within ecosystems. • Sudden, uncontrolled spread of wildfires. • Biodiversity loss due to human activities. • Materials or energy sources found in nature. • An invention or method that's newly created. • Tool to analyze environmental trends and data. • Protection of endangered species and habitats. • A technology that allows virtual collaboration. • ...
Applications of Modern Computing 2025-03-12
Across
- A technology used to build decentralized applications
- A system where multiple computers work together to solve a problem
- A technique that helps computers recognize speech
Down
- A method of storing data over the internet
- A field focused on protecting computer systems from attacks
- The network of interconnected devices that exchange data
- The process of extracting useful insights from data
- A system that mimics human intelligence
8 Clues: A system that mimics human intelligence • A method of storing data over the internet • A technique that helps computers recognize speech • The process of extracting useful insights from data • A technology used to build decentralized applications • The network of interconnected devices that exchange data • A field focused on protecting computer systems from attacks • ...
Tech and Parenting 2023-12-08
6 Clues: Someone with expertise in technology • Features to restrict or monitor access. • Excessive and compulsive smartphone use. • A break from digital devices for well-being • Protection against digital attacks and theft • Time spent in front of screens like computers or phones.
Digital_Banking_Ishan_Krishna_Vatsa_TCE 2025-10-01
Across
- : Technology used to protect sensitive banking data online.
- : Unified Payments Interface for instant fund transfer.
- : A card used to make payments directly from bank account.
- : A digital wallet for storing and spending money online.
- : Immediate Payment Service available 24x7.
- : A code scanned to make digital payments.
- : International system for secure money transfers between banks.
- : Fraudulent attempt to steal personal banking details.
- : A card that allows purchases on borrowed money.
- : National Electronic Funds Transfer system.
Down
- : Process of verifying customer identity online or offline.
- : Protection of online banking systems from fraud.
- : Technology companies that provide innovative financial services.
- : Process of verifying identity before digital banking access.
- : One Time Password for secure online transactions.
- : Real Time Gross Settlement for high value transfers.
- : Unique code used to identify a bank branch in online transfers.
17 Clues: : A code scanned to make digital payments. • : Immediate Payment Service available 24x7. • : National Electronic Funds Transfer system. • : A card that allows purchases on borrowed money. • : Protection of online banking systems from fraud. • : One Time Password for secure online transactions. • : Real Time Gross Settlement for high value transfers. • ...
SyberSafety 2021-05-19
Across
- Something that protects your data on online sites
- Being protected against the criminal or unauthorized use of electronic data
- An e-mail that has has malware attachments
- use of a computer as an instrument to further illegal ends
Down
- crime of obtaining the personal or financial information of another person
- Nefarious people _ _ _ _ into your computer
- malicious software
7 Clues: malicious software • An e-mail that has has malware attachments • Nefarious people _ _ _ _ into your computer • Something that protects your data on online sites • use of a computer as an instrument to further illegal ends • crime of obtaining the personal or financial information of another person • ...
ISSN Day 2 2024-10-08
Across
- A key skill in IT that involves protecting data
- Foundational certification for cybersecurity professionals
- Entry-level certification for IT technicians
- A type of device that A+ covers
Down
- A role that involves helping users with tech problems
- Focuses on network fundamentals and infrastructure
- unique identifying number assigned to every device connected to the interne
7 Clues: A type of device that A+ covers • Entry-level certification for IT technicians • A key skill in IT that involves protecting data • Focuses on network fundamentals and infrastructure • A role that involves helping users with tech problems • Foundational certification for cybersecurity professionals • ...
Joon Xi 8 GAMMA 2023-01-19
Across
- Raw facts and figures. (not data)
- Device that everyone bring to school.
- A group or system of interconnected people or things.
- Is a practice of protecting system, network, and program from digital attack.
Down
- Transfer your data to a _______ organisation.
- Used fairly, openly, in ______ with the law.
- All the social media company have this policy.
7 Clues: Raw facts and figures. (not data) • Device that everyone bring to school. • Used fairly, openly, in ______ with the law. • Transfer your data to a _______ organisation. • All the social media company have this policy. • A group or system of interconnected people or things. • Is a practice of protecting system, network, and program from digital attack.
DPAC 2024-07-04
5 Clues: Organizing resources for efficiency • Protecting systems from digital threats • Converting processes into digital formats • Balancing environmental and economic needs • A fundamental resource essential for powering various activities
Gruppo 2 2016-05-24
Across
- Tipo di comunicazione senza fili
- Modifica di un software per rimuovere la protezione
- Programma informatico eseguito su un PC
- Applicazione per il recupero, la presentazione e la navigazione di pagine web
- Forma di attivismo Internet che identifica utenti o comunità online che agiscono anonimamente
- Attività di intercettazione passiva dei dati che transitano in una rete informatica
Down
- Linguaggio per la scrittura delle pagine Web
- Tipo di attacco informatico che impiega in la falsificazione dell'identità
- Insieme dei sistemi e dei servizi di protezione informatica (inglese)
- Diritto di autore
10 Clues: Diritto di autore • Tipo di comunicazione senza fili • Programma informatico eseguito su un PC • Linguaggio per la scrittura delle pagine Web • Modifica di un software per rimuovere la protezione • Insieme dei sistemi e dei servizi di protezione informatica (inglese) • Tipo di attacco informatico che impiega in la falsificazione dell'identità • ...
Module 1 Test 2023-09-08
Across
- attack that will publish or withhold data unless money is paid
- this triad is widely accepted security measure
- using phone calls and voicemails to gain personal information
- using deceptive emails to gain personal information
- protection from unauthorized people making changes
Down
- Identity theft, stealing money, stealing private information, controlling private computers
- protection of computer systems, networks, and data from digital attacks
- with "of things" means that so much of our devices are connect to the internet
- assurance that systems and data will be able to be accessed
- protection from people not authorized to view
10 Clues: protection from people not authorized to view • this triad is widely accepted security measure • protection from unauthorized people making changes • using deceptive emails to gain personal information • assurance that systems and data will be able to be accessed • using phone calls and voicemails to gain personal information • ...
Black Hat 2024 2024-07-23
Across
- Malware attack
- Project _____ is Talos' cross-team effort to help protect Ukraine's power grid
- The slogan "Our job is your defense." belongs to which Cisco Security team?
- Online scam to steal personal information
- One of the largest and most infamous ransomware attacks
- Bring your Security stack together with...
Down
- Name of the international cybersecurity event that was founded in 1997?
- Can be used to create code, text, music, videos, photos...
- Talos is now further enriched by the acquisition of..
- Not the next generation of something. The first generation of something new
10 Clues: Malware attack • Online scam to steal personal information • Bring your Security stack together with... • Talos is now further enriched by the acquisition of.. • One of the largest and most infamous ransomware attacks • Can be used to create code, text, music, videos, photos... • Name of the international cybersecurity event that was founded in 1997? • ...
Digital literacy 2024-08-07
Across
- What you want to avoid online
- A downloadable application that can be used on phones and other devices
- What you need to access your account
- Protecting yourself online
- A secure way to use the internet
- A random email sent to trick you into giving away information
Down
- Software added to your device without permission for malicious purposes
- When you use another device to confirm your identity when signing on
- A portable device that is larger than a phone but smaller than a computer
- What you may want from social media
10 Clues: Protecting yourself online • What you want to avoid online • A secure way to use the internet • What you may want from social media • What you need to access your account • A random email sent to trick you into giving away information • When you use another device to confirm your identity when signing on • ...
executive branch 2023-07-09
Across
- binding agreements between nations and become part of international law
- Right to reject decisions
- Advisory body is made up of 15 executive departments
- A diplomat sent by a country
- responsible for counterterrorism, cybersecurity, aviation security etc...
Down
- promoting economic prosperity and ensuring the financial security of the United States
- Leader of the U.S.
- Chief Executive Officer
- a judge who has been chosen by the President of the United States to work in a federal appeals court
- provide the military forces needed to deter war and to protect the security of our country
10 Clues: Leader of the U.S. • Chief Executive Officer • Right to reject decisions • A diplomat sent by a country • Advisory body is made up of 15 executive departments • binding agreements between nations and become part of international law • responsible for counterterrorism, cybersecurity, aviation security etc... • ...
Scsu 2023-08-11
Across
- refers to act of hiding the ip address to miss lead the target
- refers to the act of monitoring user commanicetion without consent
- insuring the infomation staya in it origanal from and present modified over a network
- attack is techingave used by attackers
Down
- insuring that your system stays available to pletform its metendet funetion when required
- securing your information only authoritht person will be access
- unsolicited bulk mails
- zombies computer
- a small software design to hide files
- a protection of your cyber or digital assets or information system from attackrs
10 Clues: zombies computer • unsolicited bulk mails • a small software design to hide files • attack is techingave used by attackers • refers to act of hiding the ip address to miss lead the target • securing your information only authoritht person will be access • refers to the act of monitoring user commanicetion without consent • ...
Security Awareness 2022-05-17
Across
- Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
- Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
- Prinsip Keamanan Informasi agar akurat
Down
- Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
- Perangkat lunak yang diciptakan untuk merusak sistem computer
- Jenis Informasi yang merupakan informasi pengetahuan umum
- Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
- Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
- Perilaku hati-hati untuk melindungi kita terhadap ancaman
- Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
10 Clues: Prinsip Keamanan Informasi agar akurat • Jenis Informasi yang merupakan informasi pengetahuan umum • Perilaku hati-hati untuk melindungi kita terhadap ancaman • Perangkat lunak yang diciptakan untuk merusak sistem computer • Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan • ...
CROSS WORD PUZZLE 2025-01-31
Across
- A programming language used for machine learning
- A technique used to group similar customers in marketing analytics
- A cybersecurity threat where hackers encrypt files and demand payment
- A method used to clean missing data in analytics
- A key performance metric in business that measures success
- A database query language used to retrieve data
Down
- A statistical graph used to show data distribution
- Algorithm used in AI to classify emails as spam or not
- A cloud computing service by Amazon
- An AI technique that mimics the human brain
10 Clues: A cloud computing service by Amazon • An AI technique that mimics the human brain • A database query language used to retrieve data • A programming language used for machine learning • A method used to clean missing data in analytics • A statistical graph used to show data distribution • Algorithm used in AI to classify emails as spam or not • ...
NaSCon'25 Crossword 2025-05-13
Across
- Three-day solo coding guantlet-one error meant elimination
- Business event mixing strategy and Squid Game-style challenges.
- Robowars champion bot in a fierce mechanical showdown
- Comedy event with mimicry and spontaneous performances
Down
- AI exhibition with projects in art, diagnosis and trend prediction
- New cybersecurity event with a fun, game-like twist
- Showcase of Pakistan's heritage with attire, dance and traditions
- Theatrical play inspired by Bollywood hit-NaSCon's crowd favorite
- AI-themed activity mimicking neural networks using human participants
- Data Science event simulating high-pressure decisions with tech prizes.
10 Clues: New cybersecurity event with a fun, game-like twist • Robowars champion bot in a fierce mechanical showdown • Comedy event with mimicry and spontaneous performances • Three-day solo coding guantlet-one error meant elimination • Business event mixing strategy and Squid Game-style challenges. • Showcase of Pakistan's heritage with attire, dance and traditions • ...
Browsing Safely 2025-05-19
Across
- An act of harassing anyone usig internet
- Asoftware that helps in preventing unauthorised access to your computer
- An illegal methods to get money
- The process of 'befrinding' children on some media
- Dublication of any operating system
Down
- A collection of technologies, processes, and practices designed to protect networworks,computers,programs and data
- An illgal entry into a computer system
- An act of sending an email to a user.
- Fullform is 'Vital Information Resources Under Seize'
- Any criminal activity intended to harm using a computer and an internet connection
10 Clues: An illegal methods to get money • Dublication of any operating system • An act of sending an email to a user. • An illgal entry into a computer system • An act of harassing anyone usig internet • The process of 'befrinding' children on some media • Fullform is 'Vital Information Resources Under Seize' • ...
"Lock It Down: A Cybersecurity Challenge" 2025-06-05
Across
- A secret combination used to access accounts (8 letters)
- A secure encrypted network connection (3 letters)
- The practice of protecting systems from digital attacks (11 letters)
- A flaw in software that hackers exploit (8 letters)
- Unauthorized access to data (7 letters)
Down
- A type of attack that floods a server with traffic (4 letters)
- Two-factor ________ (adds extra login security) (12 letters)
- A network security system that monitors traffic (8 letters)
- Fake emails pretending to be legitimate (8 letters)
- Malicious software that encrypts files and demands payment (8 letters)
10 Clues: Unauthorized access to data (7 letters) • A secure encrypted network connection (3 letters) • Fake emails pretending to be legitimate (8 letters) • A flaw in software that hackers exploit (8 letters) • A secret combination used to access accounts (8 letters) • A network security system that monitors traffic (8 letters) • ...
Cybersecurity Awareness Month - 2022 2022-09-29
Across
- A person who circumvents information security, often with malicious intent
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
- Event that has been determined to have an impact on the organization prompting the need for response and recovery.
- Fake messages from a seemingly trusted or reputable source designed to convince you to take some sort of action
- A made-up scenario developed by threat actors for the purpose of stealing a victim's personal data
- Data or other information which otherwise identifies an individual in a way that is reasonably likely to enable identification of a specific person (hint: abbreviation)
- A set of instructions, data or programs used to operate computers and execute specific tasks
Down
- Any crime which is committed electronically
- Security process that requires more than one method of authentication from independent sources to verify the user’s identity (hint: abbreviation)
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- Someone who is deceived or cheated by the dishonesty of others
- The computer's tangible components or delivery systems that store and run the written instructions
- software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.
14 Clues: Any crime which is committed electronically • Someone who is deceived or cheated by the dishonesty of others • A person who circumvents information security, often with malicious intent • Malware designed to make data or hardware inaccessible to the victim until a ransom is paid. • ...
Elephas - Cybersecurity Awareness Month 2024-10-18
Across
- Common type of cyberattack where the hacker encrypts your files and demands payment.
- This form of attack tries to trick you into giving personal information via fake websites or emails.
- A software that fights off malicious viruses and malware.
- The process of verifying someone's identity.
Down
- A person who attempts to gain unauthorized access to your system.
- A harmful program disguised as legitimate software.
- A malicious code that spreads from computer to computer.
- A type of phishing attack done over text messages.
- A ____ test is performed to identify vulnerabilities in a system.
- A phishing attack done over the phone.
- Multi-Factor Authentication is shortened to this.
- Protection against unauthorized changes to data.
- A strong, complex one helps protect your accounts.
- The backbone of secure communication online, abbreviated as SSL.
14 Clues: A phishing attack done over the phone. • The process of verifying someone's identity. • Protection against unauthorized changes to data. • Multi-Factor Authentication is shortened to this. • A type of phishing attack done over text messages. • A strong, complex one helps protect your accounts. • A harmful program disguised as legitimate software. • ...
CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06
Across
- A security system that monitors and controls incoming and outgoing network traffic
- hygiene The routine practices and steps taken to maintain good digital security.
- A private network that encrypts your internet connection to protect your data online.
- A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
- A malicious program disguised as legitimate software.
- breach An incident where sensitive information is accessed or disclosed without authorization.
- Malicious software designed to damage or gain unauthorized access to systems.
- Determines what an authenticated user is allowed to do
Down
- A type of malware that locks your data and demands payment to unlock it.
- A method of converting data into a secret code to prevent unauthorized access.
- The process of verifying the identity of a user or device
- A software update that fixes security vulnerabilities or bugs.
- Software designed to detect and remove malicious programs from your computer.
- Protecting data from being altered or tampered with
14 Clues: Protecting data from being altered or tampered with • A malicious program disguised as legitimate software. • Determines what an authenticated user is allowed to do • The process of verifying the identity of a user or device • A software update that fixes security vulnerabilities or bugs. • A type of malware that locks your data and demands payment to unlock it. • ...
Test IT Crossword 2022-02-14
Across
- Facebook is dead, long live ____
- Wasn't a known threat back in 2018, now the bane of businesses.
- Often said to be the weakest link in cybersecurity
- People are still using ____? What is this, 1983?
- Citrix recently announced a merger with this unlikely company
Down
- You can find this in every hard disk
- Feature that's arguably the best thing about blockchain
- AWS headquarters is located here
- Sounds like a wholesome activity, but could get you in serious online trouble
9 Clues: AWS headquarters is located here • Facebook is dead, long live ____ • You can find this in every hard disk • People are still using ____? What is this, 1983? • Often said to be the weakest link in cybersecurity • Feature that's arguably the best thing about blockchain • Citrix recently announced a merger with this unlikely company • ...
Weke 15 Vocabulary Quiz 2024-07-06
Across
- Protecting computers and networks from attacks or damage.
- Changing information into a secret code to keep it safe.
- Making something suitable for a particular place or culture.
- Discussing something to reach an agreement.
- A person who designs, builds, or fixes machines or structures.
- Abilities or expertise in doing something well.
- "_____ breach". When private information is accessed without permission.
Down
- "_____ Skills". The ability to examine things carefully and understand them.
- Keeping information private and not sharing it with others.
9 Clues: Discussing something to reach an agreement. • Abilities or expertise in doing something well. • Changing information into a secret code to keep it safe. • Protecting computers and networks from attacks or damage. • Keeping information private and not sharing it with others. • Making something suitable for a particular place or culture. • ...
Test Puzzle 2021-09-09
Exploring Business Unit 1 Review 2023-09-24
Across
- The set of moral principles by which people conduct themselves
- A set of guidelines for maintaining ethics in the workplace
Down
- Describes good Internet behavior
- The exchange of information between sender and receiver
- You get an email or text, its urgent
- Attackers ask for $$ or Crypto
- The most common form of written communication
- The practice of protecting critical systems and sensitive information from digital attacks
8 Clues: Attackers ask for $$ or Crypto • Describes good Internet behavior • You get an email or text, its urgent • The most common form of written communication • The exchange of information between sender and receiver • A set of guidelines for maintaining ethics in the workplace • The set of moral principles by which people conduct themselves • ...
Financial literacy 2024-05-10
Across
- Protection from hacking
- First name of the person who is on the cover of our magazine
- Scholarships based on athletic or academic achievements
- ____ percent go to needs in the 50-30-20 rule.
- way to save money
Down
- _____ Change; problem for insurance
- Go ____ if you've reached the sixth step to home buying
- _______ Score; only get to check this a certain amount of times per year
8 Clues: way to save money • Protection from hacking • _____ Change; problem for insurance • ____ percent go to needs in the 50-30-20 rule. • Go ____ if you've reached the sixth step to home buying • Scholarships based on athletic or academic achievements • First name of the person who is on the cover of our magazine • ...
TFCU 2022-03-01
Across
- What is the name of the building on Pullman?
- Who is the VP of Mortgages?
- How many dedicated educators established TFCU in 1936?
- On February 18th 2022, TFCU had a groundbreaking for which branch?
- Who is our Executive Assistant?
- Who or what department is at ext. 2670?
- What insurance do we offer that covers the difference between what the vehicle is worth vs. what is still owed?
- What is the name of our core system?
Down
- Which holiday was recently added?
- Who ensures our membership for up to $250,000?
- What all team meeting is scheduled for April 13th?
- What does TLC stand for?
- What CPD course is due in October?
- What system do we utilize to request time off?
- What service may the members use to make loan payments?
15 Clues: What does TLC stand for? • Who is the VP of Mortgages? • Who is our Executive Assistant? • Which holiday was recently added? • What CPD course is due in October? • What is the name of our core system? • Who or what department is at ext. 2670? • What is the name of the building on Pullman? • Who ensures our membership for up to $250,000? • ...
Technology 2025-11-13
Across
- brain of the computer
- Interface allowing programs to talk to each other
- An unmanned aerial vehicle controlled remotely or autonomously
- The simulation of human
- the physical parts of a computer
- A computer that provides data or services to other computers over a network
- A newer version of software or data that improves or fixes issues
Down
- The practice of protecting systems and data from digital attacks.
- Software designed to damage,
- Existing in digital form or simulated by software rather than physical reality
- the set of programs and applications that tell the computer what to do
- A step-by-step set of instructions for solving a problem
12 Clues: brain of the computer • The simulation of human • Software designed to damage, • the physical parts of a computer • Interface allowing programs to talk to each other • A step-by-step set of instructions for solving a problem • An unmanned aerial vehicle controlled remotely or autonomously • The practice of protecting systems and data from digital attacks. • ...
Digital media literacy 2023-09-14
Across
- a folder for keeping all your data and work
- a electronic device that lets u have access to the internet on a keyboard
- to send something to lots of people
- to make something your so people cant copy you
- a way of protecting you from hackers
- a way of attracting someone to your business
Down
- A way of messaging your fiends and sending pics
- facts and statistics collected together for reference
- a way of infecting a device
- a way of watching videos of whatever you want
- a way of talking to lots of people about your life
- a internet page based on a famous person/subject
12 Clues: a way of infecting a device • to send something to lots of people • a way of protecting you from hackers • a folder for keeping all your data and work • a way of attracting someone to your business • a way of watching videos of whatever you want • to make something your so people cant copy you • A way of messaging your fiends and sending pics • ...
Cybersecurity Awareness Month Crossword Puzzle 2022-09-23
Across
- See Question 10
- See Question 7
- See Question 16
- See Question 22
- See Question 21
- See Question 11
- See Question 23
- See Question 6
- See Question 9
- See Question 3
- See Question 13
- See Question 2
Down
- See Question 12
- See Question 18
- See Question 24
- See Question 19
- See Question 8
- See Question 25
- See Question 1
- See Question 14
- See Question 4
- See Question 17
- See Question 15
- See Question 20
- See Question 5
25 Clues: See Question 7 • See Question 8 • See Question 1 • See Question 4 • See Question 6 • See Question 9 • See Question 5 • See Question 3 • See Question 2 • See Question 12 • See Question 18 • See Question 24 • See Question 19 • See Question 10 • See Question 16 • See Question 25 • See Question 22 • See Question 14 • See Question 21 • See Question 17 • See Question 11 • See Question 15 • See Question 20 • ...
Cybersecurity awareness Cross-word game 2025-11-09
Across
- A type of malware that demands payment.
- Someone who gains unauthorized access to systems.
- Keeping information secret and private.
- Protects a network by filtering traffic.
- drive Removable storage that can carry malware.
- Protects your computer from malicious software.
- Secret code used to verify identity.
- Regularly updating software to fix vulnerabilities.
- Software that detects threats using patterns.
Down
- Process of proving you are who you say you are.
- Person who targets specific victims using customized phishing.
- A device that stores authentication codes.
- Converts information into unreadable form.
- Strategy to minimize impact of incidents.
- Attempt to trick people into revealing personal information.
- Rules for handling data and systems.
- breach Unauthorized duplication of data.
- Physical security measure to enter restricted areas.
- Unwanted or junk email.
- Secure wireless network protocol.
20 Clues: Unwanted or junk email. • Secure wireless network protocol. • Rules for handling data and systems. • Secret code used to verify identity. • A type of malware that demands payment. • Keeping information secret and private. • Protects a network by filtering traffic. • Strategy to minimize impact of incidents. • A device that stores authentication codes. • ...
computer security 2021-10-15
Across
- a study of design of computer equipment
- a person who has intention to destroy data
- a malicious code which sends out info to hacker
- a act of illegal listening to network channel
- a system of to protect safeguard network
- a secured layer of protocol to encrypt data
- a cause of system failure
- a computer health issue causing strain in hand
Down
- act of tricking user into revealing their info
- a person who access computer illegally
- a malicious act to slow down service of server
- act of making copy of files safely and secure
- act of stealing or faking information for hiding
- a malicious program which steals data from user
- a field of study on computer security
- a data protection act law in countries
- a program which copies itself repeateadly
- moral obligation to use computer with care
18 Clues: a cause of system failure • a field of study on computer security • a person who access computer illegally • a data protection act law in countries • a study of design of computer equipment • a system of to protect safeguard network • a program which copies itself repeateadly • moral obligation to use computer with care • a person who has intention to destroy data • ...
RAPA - Have you been paying attention? 2023-05-24
Across
- how does Jordan get so swole (8)
- the action of obtaining something (11)
- the source of news for anything RAPA related (4,5,2)
- instrument that Erdem plays (6)
- coreys coffee order (trading card) (3,5)
- what does Bryce like to paint in his free time (9,9)
- free coffees (3,3)
- where has Sheila spent the past 5 years working (8,9)
- what sport did Siobhan and Richard play (5,6)
Down
- what does Josh like to ride in his free time (9)
- expose (someone or something valued) to danger, harm, or loss (4)
- what Pacific Island did Matt go to for a holiday with his family (5)
- one of Gibbo's past jobs (11)
- the state of having no protection from something harmful (8)
- an official financial inspection (5)
- where we are for retreat (11)
- how many years has Lucy been cooking for? (6)
- cybersecurity tv drama (3,6,3)
18 Clues: free coffees (3,3) • one of Gibbo's past jobs (11) • where we are for retreat (11) • cybersecurity tv drama (3,6,3) • instrument that Erdem plays (6) • how does Jordan get so swole (8) • an official financial inspection (5) • the action of obtaining something (11) • coreys coffee order (trading card) (3,5) • how many years has Lucy been cooking for? (6) • ...
Malware 2023-03-15
Across
- A person that wants to take files and important information
- A field in IT that keeps data secured and safe
- Important information that could be used to impersonate someone else
- Many different forms of harmful software
- A malicious Software that needs a host in order to work
- A system that can be used for work, games, and to hack.
Down
- Malicious software designed to imitate normal software
- Undiscovered attack
- Software to steal data and attempt to sell it back to the user
- Raises permissions to access data
- Does not need host in order to cause problems and spread
11 Clues: Undiscovered attack • Raises permissions to access data • Many different forms of harmful software • A field in IT that keeps data secured and safe • Malicious software designed to imitate normal software • A malicious Software that needs a host in order to work • A system that can be used for work, games, and to hack. • ...
Cluster 1 Day 5 Consolidation 2023-10-12
Across
- Our hardship program is call?
- Missing or incorrect mobile numbers, once corrected we send a whot?
- Someone authorised on an account is called a .... person?
- The traffic lights in SAP next to the mobile and email are called?
- What is the resource with the newspaper icon in KIT called?
Down
- Accounts with a Code Word, you will need to transfer to Res+...?
- What is the compliance elearn for internet protection called?
- What is Qi's English name?
- AGL deals in retail and ...?
- What team does Elizabeth support in the Rugby?
- Who takes care of the poles and wires in the electricity network?
- BPP stands for Best ..... Procedure?
- What is the name of Caitlyn's dog?
13 Clues: What is Qi's English name? • AGL deals in retail and ...? • Our hardship program is call? • What is the name of Caitlyn's dog? • BPP stands for Best ..... Procedure? • What team does Elizabeth support in the Rugby? • Someone authorised on an account is called a .... person? • What is the resource with the newspaper icon in KIT called? • ...
computer security 2021-10-15
Across
- a study of design of computer equipment
- a person who has intention to destroy data
- a malicious code which sends out info to hacker
- a act of illegal listening to network channel
- a system of to protect safeguard network
- a secured layer of protocol to encrypt data
- a cause of system failure
- a computer health issue causing strain in hand
Down
- act of tricking user into revealing their info
- a person who access computer illegally
- a malicious act to slow down service of server
- act of making copy of files safely and secure
- act of stealing or faking information for hiding
- a malicious program which steals data from user
- a field of study on computer security
- a data protection act law in countries
- a program which copies itself repeateadly
- moral obligation to use computer with care
18 Clues: a cause of system failure • a field of study on computer security • a person who access computer illegally • a data protection act law in countries • a study of design of computer equipment • a system of to protect safeguard network • a program which copies itself repeateadly • moral obligation to use computer with care • a person who has intention to destroy data • ...
Smart city of Singapore 2024-12-04
Across
- Citizens and businesses can transact with the Government by using it.
- That Strait contributes to Signapore's prosperity.
- Reusing excess heat from machines to save energy.
- How many are the official languages?
- Name of an educational application.
- Signapore identifies its future as a certain type of island.
Down
- Singapore's commitment aligned with MRT.
- The city-state has built a waste-to-energy plant that converts waste into something else.
- Invested there to ensure the safety of data and digital infrastructure.
- Singapore’s approach focuses on building that kind of future for everyone.
- Communitacion with patients remotely.
11 Clues: Name of an educational application. • How many are the official languages? • Communitacion with patients remotely. • Singapore's commitment aligned with MRT. • Reusing excess heat from machines to save energy. • That Strait contributes to Signapore's prosperity. • Signapore identifies its future as a certain type of island. • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
computer security 2021-10-15
Across
- a study of design of computer equipment
- a person who has intention to destroy data
- a malicious code which sends out info to hacker
- a act of illegal listening to network channel
- a system of to protect safeguard network
- a secured layer of protocol to encrypt data
- a cause of system failure
- a computer health issue causing strain in hand
Down
- act of tricking user into revealing their info
- a person who access computer illegally
- a malicious act to slow down service of server
- act of making copy of files safely and secure
- act of stealing or faking information for hiding
- a malicious program which steals data from user
- a field of study on computer security
- a data protection act law in countries
- a program which copies itself repeateadly
- moral obligation to use computer with care
18 Clues: a cause of system failure • a field of study on computer security • a person who access computer illegally • a data protection act law in countries • a study of design of computer equipment • a system of to protect safeguard network • a program which copies itself repeateadly • moral obligation to use computer with care • a person who has intention to destroy data • ...
cyber security crossword 2025-04-09
Across
- These emails try to get your credentials by creating a sense of urgency
- A great option for a password manager
- Secures account through text/email/etc. (abbreviation)
- One of the top cybersecurity companies you can trust
- Detects and removes harmful materials on your device
Down
- Malware that can harm your computer
- Regularly check for _______ on your computer or device
- It's good to have a password length of at lest ______
- A great to store your credentials would be using a ________ manager
- It's a good idea to _____ phishing or scam emails
- Good to empty every so often and recover deleted files in
11 Clues: Malware that can harm your computer • A great option for a password manager • It's a good idea to _____ phishing or scam emails • One of the top cybersecurity companies you can trust • Detects and removes harmful materials on your device • It's good to have a password length of at lest ______ • Regularly check for _______ on your computer or device • ...
Crossword 2025-10-29
6 Clues: Your next destination • The money a company earns from sales • Type of business done over the internet • Online retail giant founded by Jeff Bezos • Protecting computers, networks, and data from digital attacks • A young company with a new business idea, often seeking investors
Managers and Managing Crossword Puzzle 2016-01-16
Across
- It's a totally crazy business environment out there today
- Achieving goals
- A name for direct reports that should no longer be used
- What we're using to learn right now
- Perhaps the biggest threat to the control function
- Manager starts acting like the rules don't apply to him
- Term or name that doesn't apply to not-for-profit organizations
- What many first-level managers prefer rather than thinking
- A common title for a first-line manager, Team ________
Down
- The management role that helps direct reports improve their performance / coaching
- Dividing up the work that needs to be done
- Worker whose boss is your direct report
- Accomplishment with minimum effort
- Usually the most important type of skill for middle managers
14 Clues: Achieving goals • Accomplishment with minimum effort • What we're using to learn right now • Worker whose boss is your direct report • Dividing up the work that needs to be done • Perhaps the biggest threat to the control function • A common title for a first-line manager, Team ________ • A name for direct reports that should no longer be used • ...
Mrs Dadd's Bonanza 2023-01-19
Across
- Re-using components instead of throwing them away
- The processes and technologies designed to protect networks, computers and programs from attack, damage or unauthorised access
- Electronic waste
- Tricking people into breaking security procedures
- Watching people enter passwords or PINS
- Designed to protect creators of books, software, etc from having their work illegally copied
- Misinformation which is spread
Down
- Stealing data as it is passed across a network
- Short for malicious software
- Describes the technology that is carried inside the body
- One who breaks a systems integrity maliciously
- The moral principles which govern attitudes and behaviour
- A method of obscuring data so it cannot be read if it is intercepted
- One who is intensely interested in a computer system
14 Clues: Electronic waste • Short for malicious software • Misinformation which is spread • Watching people enter passwords or PINS • Stealing data as it is passed across a network • One who breaks a systems integrity maliciously • Re-using components instead of throwing them away • Tricking people into breaking security procedures • ...
BRAINWARE SOAL SEMI FINAL 2024-09-10
5 Clues: Memfasilitasi kegiatan pembelajaran • Melindungi sistem keamanan jaringan • Mendesain Merancang analisis suatu program • merancang tampilan visual dan menu navigasi pada website • Mempersiapkan dan menyortir dokumen sebelum dimasukkan komputer
Cybersecurity Awareness Crossword Puzzle Week 2 2023-10-11
Across
- A bot-challenging security feature for online interactions.
- Code to fix or enhance software.
- Captures keystrokes to gather sensitive information.
- Security solution to analyze and detect threats in real-time from diverse data and events.
- Collaboration integrating security, automation, and shared responsibility in software development.
- Harmful software for gathering information without consent.
- A stealthy malware granting unauthorized system access while concealing actions.
- Network of devices used for malware distribution, and cyber-attacks.
Down
- Email attachments from unknown senders.
- A way to bypass authentication, used for unauthorized access or malicious intent.
- The most common word used for brute force.
- Safeguard sensitive files and communications.
- Isolated environment to analyze software behavior.
- A U.S. federal agency promoting cybersecurity standards and innovation.
14 Clues: Code to fix or enhance software. • Email attachments from unknown senders. • The most common word used for brute force. • Safeguard sensitive files and communications. • Isolated environment to analyze software behavior. • Captures keystrokes to gather sensitive information. • A bot-challenging security feature for online interactions. • ...
Super U! 2024-09-19
Across
- I cannot ... because I’m afraid of water.
- I cannot ... poetry because I lack creativity.
- I cannot ... because I always burn the food.
- I can ... websites because I have a good sense of user experience.
- I cannot ... a bike because I have poor balance.
- I cannot ... the piano because I have no musical talent.
- I can ... because I understand logic structures well.
- I cannot ... because I have no rhythm.
- I cannot ... because my hands are unsteady.
Down
- I can ... networks because I understand cybersecurity protocols.
- I cannot ... fast because I have weak legs.
- I cannot ... math because numbers confuse me.
- I cannot ... soccer because I have no coordination.
- I can ... animations because I have a sharp eye for detail.
- I can ... videos because I’m good with digital tools.
15 Clues: I cannot ... because I have no rhythm. • I cannot ... because I’m afraid of water. • I cannot ... fast because I have weak legs. • I cannot ... because my hands are unsteady. • I cannot ... because I always burn the food. • I cannot ... math because numbers confuse me. • I cannot ... poetry because I lack creativity. • I cannot ... a bike because I have poor balance. • ...
CISO Crossword Quiz - 2325 2025-09-01
Across
- Fraud involving fake virus warnings or “system infected” messages designed to scare users into paying or clicking malicious links
- A cybersecurity defense method where potentially untrusted programs, files, or code are executed in a controlled, isolated environment to prevent them from affecting the host system, commonly used for malware analysis and safe application testing
- A general term for malicious software, such as viruses, worms, trojans, or spyware, designed to disrupt systems, steal data, or gain unauthorized access
- Which kind of WiFi/internet connection you should avoid using for UPI transactions because it is unsafe and open to hackers
Down
- Files disguised as “free movies” or “software cracks” usually carry this harmful code
- The official national agency under the Ministry of Electronics and Information Technology (MeitY) in India that monitors, responds to, and coordinates actions against cybersecurity threats and incidents, where organizations are required to report significant data breaches
- A long, complex password made of random words is called a pass___
- The process of keeping extra copies of important files so they can be restored after malware infections or system crash
- Attackers sometimes drop USB drives in public places hoping someone will pick them up and plug into their computer. What is this tactics called?
- A ____ hacker is an external security expert, who is specially invited to test software or systems for vulnerabilities during pre-release
10 Clues: A long, complex password made of random words is called a pass___ • Files disguised as “free movies” or “software cracks” usually carry this harmful code • The process of keeping extra copies of important files so they can be restored after malware infections or system crash • ...
Technology 2024-06-05
Across
- Made by humans, not natural (10 letters).
- Pertaining to atomic energy or reactions (7 letters).
- Tools or devices needed for a specific task (9 letters).
- To look through information on the internet casually (6 letters)
- A place on a website to type keywords for finding information (9 letters)
Down
- Relating to technology that uses computers or electronic devices (7 letters).
- To create something new that didn't exist before (6 letters).
- A place where scientific experiments are conducted (10 letters).
- Protecting computers and networks from attacks (12 letters).
9 Clues: Made by humans, not natural (10 letters). • Pertaining to atomic energy or reactions (7 letters). • Tools or devices needed for a specific task (9 letters). • Protecting computers and networks from attacks (12 letters). • To create something new that didn't exist before (6 letters). • A place where scientific experiments are conducted (10 letters). • ...
Homeland Security 2024-03-18
Across
- What department within Homeland Security deals with transportation security
- How many departments did the Homeland Security Act of 2002 combine
- What type of security does Homeland Security deal with when relating to the internet
- Acronym for department of homeland security
- What department within Homeland Security deals with emergency management
Down
- What is one Geographical Aspect Homeland Security Protects
- What kind of events does Homeland Security prepare for
- How would opposers of Homeland Security describe its strategy
- What Homeland Security was made to defend against
9 Clues: Acronym for department of homeland security • What Homeland Security was made to defend against • What kind of events does Homeland Security prepare for • What is one Geographical Aspect Homeland Security Protects • How would opposers of Homeland Security describe its strategy • How many departments did the Homeland Security Act of 2002 combine • ...
Computer Project 2025-06-15
Across
- : Bullying someone online through messages or social media
- : A harmful program that can damage files and software
- : People who use the internet or computers to commit crimes
- : Software that protects your computer from viruses
Down
- : The practice of protecting devices and data from cyber threats
- : Fake messages that try to steal passwords or bank info
- : Criminal activities done using computers or the internet
- : A system that blocks unauthorized access to or from a private network
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Bullying someone online through messages or social media • : Criminal activities done using computers or the internet • : People who use the internet or computers to commit crimes • ...
2024 International Privacy Week 2023-12-18
Across
- What can be used to make inferences about your socioeconomic status, demographic information and preferences
- MCA stands for
- Take _____ of your data!
- Your name, birthdate, and SSN
Down
- NCA stands for
- Your right to keep your person and your information to yourself
- Focused on preventing and solving threats (i.e., hacking, malware, online scams)
- The week-long event for spreading awareness about online privacy
- The month Data Privacy Week occurs
- Rules, guidelines, and your own personal choices about who has access to your data, and how much access they have
10 Clues: NCA stands for • MCA stands for • Take _____ of your data! • Your name, birthdate, and SSN • The month Data Privacy Week occurs • Your right to keep your person and your information to yourself • The week-long event for spreading awareness about online privacy • Focused on preventing and solving threats (i.e., hacking, malware, online scams) • ...
Artificial Intelligence Related to Information Technology 2025-01-07
Across
- Step-by-step instructions, like a recipe for computers
- A big box of information a computer can look up quickly
- A machine that can do work for people
- The games or apps you use on a computer or tablet
- Computers talking to each other to share things
Down
- A big web where people share pictures, videos, and talk
- Keeping computers safe from bad guys online
- Smart computer thinking, like a robot brain
- A box that helps you play games, write, or find answers
- The parts of a computer you can touch, like the keyboard
10 Clues: A machine that can do work for people • Keeping computers safe from bad guys online • Smart computer thinking, like a robot brain • Computers talking to each other to share things • The games or apps you use on a computer or tablet • Step-by-step instructions, like a recipe for computers • A big web where people share pictures, videos, and talk • ...
Syniverse Crossword 2025-12-03
Across
- Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
- Using mobile service outside your home network
- Protecting networks and data from cyber threats
- Application to person messaging for OTPs, alerts, and notifications
- Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
- Delivery of texts and rich communications
- Final money movement between carriers after clearing
- Continuous advancement that keeps networks and businesses competitive
- Illicit or abusive use of telecom services
- Reconciling usage records between operators for billing
10 Clues: Delivery of texts and rich communications • Illicit or abusive use of telecom services • Using mobile service outside your home network • Protecting networks and data from cyber threats • Final money movement between carriers after clearing • Reconciling usage records between operators for billing • Application to person messaging for OTPs, alerts, and notifications • ...
Crossword - LCCI and Lilly 2021-11-25
Across
- New e-commerce added in LCCI's R&R platform
- Who heads commercial services in LCCI
- platform where you can submit bills for reimbursement
- what is the name of the building in Embassy Tech village that LCCI occupies
- critical foundation of Lilly’s ethics and compliance program
Down
- Which month was LCCI started in Bangalore
- how many employees were there at the start of LCCI
- Learning portal sponsored by LCCI for its employees
- Lilly unites caring with discovery to create medicines that make life better for people around the world.
- when was the cybersecurity month
10 Clues: when was the cybersecurity month • Who heads commercial services in LCCI • Which month was LCCI started in Bangalore • New e-commerce added in LCCI's R&R platform • how many employees were there at the start of LCCI • Learning portal sponsored by LCCI for its employees • platform where you can submit bills for reimbursement • ...
C CROSSWORD 2014-02-26
Across
- location. When reached, the invitees were
- they all had received a prank call.
- annoyed to see the party hall empty.The members realized that
- The enrolled members of "CYBERSECURITY CLUB" were called
- Twice to their surprise they found a paper unknowingly left
Down
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- for a party arranged at
- The squad diffused the bomb and saved everyone . They all came back home .
- a common
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
technology 2024-07-18
Across
- - An electronic device for storing and processing data.
- - Programs and operating information used by a computer.
- - A global network connecting millions of computers.
- - An organized collection of data, generally stored and accessed electronically.
Down
- - A mobile phone with advanced features.
- - The practice of protecting systems, networks, and programs from digital attacks.
- - An input device with keys used to type characters.
- - A process or set of rules to be followed in problem-solving operations.
- - The branch of technology dealing with the design and application of robots.
- - A small electronic device or tool.
10 Clues: - A small electronic device or tool. • - A mobile phone with advanced features. • - An input device with keys used to type characters. • - A global network connecting millions of computers. • - An electronic device for storing and processing data. • - Programs and operating information used by a computer. • ...
msn policies 2025-03-25
Across
- speaking in behalf facebook, in order to commint phishing
- any type of data that can be used to identify a person
- If you invest in this business your money will increase in two hours.
- most popular high risk drug
- buying nudes from a minor
Down
- I cant see your shoulders and knees
- The way we should address "hormonal" in Spanish
- threaten when a nude pic is shared
- Did you ask little Jane to keep the chat a secret?
- be careful, in spanish sounds like "pan" but its pronunciation in brazil is...
10 Clues: buying nudes from a minor • most popular high risk drug • threaten when a nude pic is shared • I cant see your shoulders and knees • The way we should address "hormonal" in Spanish • Did you ask little Jane to keep the chat a secret? • any type of data that can be used to identify a person • speaking in behalf facebook, in order to commint phishing • ...
test 2025-04-02
Across
- Agents must state this on every call with a patient
- Rachel Robinson
- Platform used to work patient accounts
- Where employees can access benefits, tax documents, and pay statements
- A library in REACH containing courses that employees can enroll themselves in
- Capio's space to recognize and celebrate one another through points and eCards
Down
- Cybersecurity training drama series
- A cyberattack where scammers trick individuals into revealing sensitive information, like passwords or financial details, by posing as trusted entities through deceptive messages or websites.
- Vice President Operations
- Capio's platform for encouraging health and wellness
10 Clues: Rachel Robinson • Vice President Operations • Cybersecurity training drama series • Platform used to work patient accounts • Agents must state this on every call with a patient • Capio's platform for encouraging health and wellness • Where employees can access benefits, tax documents, and pay statements • ...
Nicrossword 2 2024-12-23
Across
- State Wide Area Network to connect state administration offices.
- Software with source code that anyone can inspect, modify, and enhance.
- National Knowledge Network for connecting educational and research institutions.
- Protection against cyber threats and securing digital infrastructure.
- Extremely large data sets analyzed computationally to reveal patterns and trends.
Down
- A unique identification project by the Government of India.
- Unified Mobile Application for New-age Governance.
- An ICT solution for the management of hospital services.
- A paperless office solution by NIC for government departments.
- A nationwide communication network by NIC.
10 Clues: A nationwide communication network by NIC. • Unified Mobile Application for New-age Governance. • An ICT solution for the management of hospital services. • A unique identification project by the Government of India. • A paperless office solution by NIC for government departments. • State Wide Area Network to connect state administration offices. • ...
TEM-8 science and technology 2025-11-14
Across
- a set of rules for solving a problem in a finite number of steps
- the introduction of new ideas, methods, or products
- the protection of computer systems from theft or damage
- reality a computer-generated simulation of a 3D environment
- technology on an atomic or molecular scale
Down
- engineering the direct manipulation of an organism's genes
- a natural resource able to be replenished naturally
- the use of living organisms in technology and engineering
- able to be maintained at a certain rate without depletion
- the use of largely automatic equipment in a system of operation
10 Clues: technology on an atomic or molecular scale • a natural resource able to be replenished naturally • the introduction of new ideas, methods, or products • the protection of computer systems from theft or damage • the use of living organisms in technology and engineering • able to be maintained at a certain rate without depletion • ...
bbb 2023-04-28
Across
- requires less memory
- measure of correctness that is achieved in true prediction.
- Identifying similar groups of data in a dataset is called
- ls called blind algorithms
- if there is a relationship between the input variable and the output variable
Down
- machine learning models are trained without labelled data sets
- maps any given percept sequence to an action
- One of the AI application
- is a tabular summary of the number of correct and incorrect predictions made by a classifier
- measures how often the classifier makes the correct prediction
10 Clues: requires less memory • One of the AI application • ls called blind algorithms • maps any given percept sequence to an action • Identifying similar groups of data in a dataset is called • measure of correctness that is achieved in true prediction. • machine learning models are trained without labelled data sets • ...
C CROSSWORD 2014-02-26
Across
- The enrolled members of "CYBERSECURITY CLUB" were called
- they all had received a prank call.
- annoyed to see the party hall empty.The members realized that
- location. When reached, the invitees were
- The squad diffused the bomb and saved everyone . They all came back home .
- a common
Down
- for a party arranged at
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- Twice to their surprise they found a paper unknowingly left
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
Security Awareness 2022-05-17
Across
- Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
- Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
- Perilaku hati-hati untuk melindungi kita terhadap ancaman
- Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
- Jenis Informasi yang merupakan informasi pengetahuan umum
- Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
- Prinsip Keamanan Informasi agar akurat
- Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
- Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
- Perangkat lunak yang diciptakan untuk merusak sistem computer
10 Clues: Prinsip Keamanan Informasi agar akurat • Jenis Informasi yang merupakan informasi pengetahuan umum • Perilaku hati-hati untuk melindungi kita terhadap ancaman • Perangkat lunak yang diciptakan untuk merusak sistem computer • Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan • ...
Technology 2023-08-24
Across
- Wireless technology that enables data transfer between devices.
- Online method of watching videos or listening to audio without downloading i.e., real time digital content.
- Secret combination used to access digital accounts.
Down
- Mathematical recipe used to solve complex tasks efficiently.
- Process of creating instructions for computers to execute tasks.
- Practices and technologies used to safeguard digital information from attacks.
- Global navigation system that provides location and navigation information.
- Malicious software that spreads and infects digital systems.
- Computer-based systems that mimic human intelligence.
- Money capital of India.
10 Clues: Money capital of India. • Secret combination used to access digital accounts. • Computer-based systems that mimic human intelligence. • Mathematical recipe used to solve complex tasks efficiently. • Malicious software that spreads and infects digital systems. • Wireless technology that enables data transfer between devices. • ...
executive branch 2023-07-09
Across
- binding agreements between nations and become part of international law
- Right to reject decisions
- Advisory body is made up of 15 executive departments
- A diplomat sent by a country
- responsible for counterterrorism, cybersecurity, aviation security etc...
Down
- promoting economic prosperity and ensuring the financial security of the United States
- Leader of the U.S.
- Chief Executive Officer
- a judge who has been chosen by the President of the United States to work in a federal appeals court
- provide the military forces needed to deter war and to protect the security of our country
10 Clues: Leader of the U.S. • Chief Executive Officer • Right to reject decisions • A diplomat sent by a country • Advisory body is made up of 15 executive departments • binding agreements between nations and become part of international law • responsible for counterterrorism, cybersecurity, aviation security etc... • ...
soal 4.0 2023-10-24
Across
- salah satu teknologi di industri 4.0 yang sangat berguna saat ini
- Alat Iot yang kegunaanya memudahkan dirumah
- Teknologi inti dari Industri 4.0
- Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
- Data besar yang kompleks yang dianalisis dalam industri 4.0
- Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
- Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
- Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
- Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
- Revolusi industri saat ini
10 Clues: Revolusi industri saat ini • Teknologi inti dari Industri 4.0 • Alat Iot yang kegunaanya memudahkan dirumah • Data besar yang kompleks yang dianalisis dalam industri 4.0 • salah satu teknologi di industri 4.0 yang sangat berguna saat ini • Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber • ...
Office Management 2025-10-12
Across
- The programs and operating information used by a computer.
- Distinctive attributes or characteristics.
- The state of keeping or being kept secret or private.
- The process of entrusting a task or responsibility to a subordinate.
- A system or organization where people are ranked by status or authority.
- room or building used for commercial or professional work.
- The process of making plans for something.
Down
- Protecting networks and data from unauthorized use.
- Computer systems able to perform tasks normally requiring human intelligence.
- The fact or quality of being on time.
10 Clues: The fact or quality of being on time. • The process of making plans for something. • Distinctive attributes or characteristics. • Protecting networks and data from unauthorized use. • The state of keeping or being kept secret or private. • room or building used for commercial or professional work. • ...
Globalisation 2023-03-08
Across
- I __ __ __ __ __ security software to protect against harmful cyberattacks.
- With the increase in foreign culture, local culture might be l __ __ __.
- H __ __ __ __ __ __ are people who illegally gain access to other people's computer systems.
- the interconnectedness of societies.
- C__ __ __ __ __ __ __ __ __ __ __ __ protects computers and electronic devices from cyberattacks.
Down
- I__ __ __ __ __ __ __ __ __ __ __ in technology contributes to Globalisation.
- Better economic situation can lead to b__ __ __ __ __ quality of life.
- Globalisation leads to economic, c__ __ __ __ __ __ __ and security impacts.
- Globalisation has i__ __ __ __ __ __ __ __ security threats.
- M__ __ __ __ __ phones have allowed us to connect with people faster.
- F __ __ __ __ __ __ culture has spread throughout the world, such as K-pop.
- G__ __ __ __ __ of Multinational Corporations (MNCs) is a factor that drives Globalisation.
12 Clues: the interconnectedness of societies. • Globalisation has i__ __ __ __ __ __ __ __ security threats. • M__ __ __ __ __ phones have allowed us to connect with people faster. • Better economic situation can lead to b__ __ __ __ __ quality of life. • With the increase in foreign culture, local culture might be l __ __ __. • ...
Cyber Security Puzzle 2024-10-22
Across
- The process of verifying the identity of a user
- A method of disguising data to protect it
- A device that helps protect networks by filtering traffic
- A breach where sensitive data is accessed unlawfully
- A malicious email designed to trick recipients
- A protocol used to send emails securely
Down
- A common form of malware that locks files
- A program that scans for vulnerabilities in systems
- A common cybersecurity measure that involves using complex passwords
- Software that detects and removes malware
- A type of attack where multiple systems are used to overwhelm a target
- A legal framework for data protection in the EU
12 Clues: A protocol used to send emails securely • A common form of malware that locks files • A method of disguising data to protect it • Software that detects and removes malware • A malicious email designed to trick recipients • The process of verifying the identity of a user • A legal framework for data protection in the EU • ...
Кәмшат 2024-11-19
Across
- A cloud computing environment designed specifically for one organization?
- An infrastructure-as-a-service model?
- What is the process of software allocation of computer resources called?
- Protecting data and systems from cyber attacks?
- The process of automatically adjusting resources based on user demand?
Down
- Google's cloud storage service?
- A collection of key resources such as networks, servers, hardware?
- Special coding process to protect data?
- A software-as-a-service model?
- What is the process of protecting data from unauthorized access called?
- What is the level of service available to users?
- A service for hosting websites and applications on the Internet?
12 Clues: A software-as-a-service model? • Google's cloud storage service? • An infrastructure-as-a-service model? • Special coding process to protect data? • Protecting data and systems from cyber attacks? • What is the level of service available to users? • A service for hosting websites and applications on the Internet? • ...
Cybersecurity Unit 1 Lesson 2 2022-12-02
Across
- Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
- A small local area network of computers and devices.
- Software that can stop malware from entering a network, computer, or device.
- Stores data that is in use.
- Software that runs on your computer, looking for many different types of malware from many different sources.
- Small text-based bits of information about your browser that a web server saves.
- Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
- All data on a computer.
- The arrangement of the various elements of a network.
- Executable files that are run by users.
- The systematic way to find specific web addresses and web pages.
Down
- A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
- A weakness in a system that allows an attacker to gain unauthorized access.
- A special kind of file that contains other files.
- A file that contains a collection of other files.
- Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
- Computer shared by multiple users across a network.
- An application file that is currently executing (also called running) in the operating system.
- An agreed-upon method for communication.
19 Clues: All data on a computer. • Stores data that is in use. • Executable files that are run by users. • An agreed-upon method for communication. • A special kind of file that contains other files. • A file that contains a collection of other files. • Computer shared by multiple users across a network. • A small local area network of computers and devices. • ...
IT Trivia 2022-07-18
Across
- ... word, excel, powerpoint, office
- measures taken to protect devices, networks, and data from unauthorized access and criminal use
- a program that is dedicated to managing network resources
- the vaccine for computers
- not physical but...
- an output device that produces a tangible copy of alphanumeric or graphic data
- one of the primary input devices used with a computer
Down
- the standard way to connect computers on a network over a wired connection
- a piece of code which can corrupt a system or destroy data
- Jerry
- the button you press when you make an error
- what we hate to see in our emails
- the practice of tricking internet users through deception into revealing personal information
13 Clues: Jerry • not physical but... • the vaccine for computers • what we hate to see in our emails • ... word, excel, powerpoint, office • the button you press when you make an error • one of the primary input devices used with a computer • a program that is dedicated to managing network resources • a piece of code which can corrupt a system or destroy data • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
STEM Careers 2023-12-13
Across
- Designs and oversees the construction of infrastructure like roads and bridges.
- Analyzes and develops software applications for specific user needs.
- Works on the molecular or atomic scale for various applications.
- Designs algorithms for computational problems.
- Designs solutions for environmental issues like pollution.
- Focuses on celestial bodies' formation and evolution.
Down
- Focuses on developing technologies for sustainable energy sources.
- Focuses on developing new materials for various applications.
- Involves analyzing biological data using computational methods.
- Focuses on preventing unauthorized access to computer systems.
- Uses statistical techniques to extract insights from data.
- Designs medical devices and diagnostic tools.
- Responsible for designing computer hardware components.
- Develops manufacturing processes and new materials.
- Involves studying the behavior of subatomic particles.
- Studies the interactions between organisms and their environment.
- Studies the Earth's crust, rocks, and land formations.
- Uses mathematical and statistical techniques to extract insights from data.
18 Clues: Designs medical devices and diagnostic tools. • Designs algorithms for computational problems. • Develops manufacturing processes and new materials. • Focuses on celestial bodies' formation and evolution. • Involves studying the behavior of subatomic particles. • Studies the Earth's crust, rocks, and land formations. • ...
Information and Cyber Security 2022-10-21
Across
- Hackers demanded this company cancel the planned release of a film
- The key to securing your accounts
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Virtual Private …
Down
- The term used for a broad range of malicious activities accomplished through human interactions
- Anti- ...
- What BHSF does to train colleagues to look out for phishing attacks
- What type of attacks are on the rise
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- These attacks typically target a CEO, CFO, or any CXX
- 560,000 pieces of … are detected every day
- UK cyber crime has … in the past 5 years
- Time it takes a hacker to brute force a 6 character password
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
SOF GLSS SCAVENGER HUNT 2023-09-05
Across
- Acronym for MFC's Quality Policy
- First word under Lockheed Martin Delivers found on the SOF Learning Dashboard
- The first program listed on the Programs dropdown
- The number of PED violations in 2023 (Hint: Cybersecurity)
- Click on this tab to find the JPS Library
- The first commitment listed on the SOF GLSS ESH Policy
- The next mandatory IT update starting in October
Down
- Quality Month
- Next day off on the Holiday Calendar
- JPS 1-102
- Last name of our Quality Sr. Manager
- 4th item found on the Command Media Menu on the portal
- The international standard that governs our systems relating to quality
- First link listed on the "ESH links" on the ESH Bulletin Board
- Found in the SOF GLSS Creed, our every day commitment to our customer
15 Clues: JPS 1-102 • Quality Month • Acronym for MFC's Quality Policy • Next day off on the Holiday Calendar • Last name of our Quality Sr. Manager • Click on this tab to find the JPS Library • The next mandatory IT update starting in October • The first program listed on the Programs dropdown • 4th item found on the Command Media Menu on the portal • ...
Technology 2024-11-25
5 Clues: Advanced technology • Old-fashioned or no longer in use • Protecting online data and systems • A discovery that changes understanding • A place to connect and share content online
Some U.S. Power Numbers 2014-06-25
Across
- Separation into three groups
- Sub-elements of a larger mechanism
- Where outage information is often posted
- Sealed from use for a period of time
- A financial product that pays for covered events
- A type of evaluation
- What can happen to frozen pipes
- Inner workings framework
- A formal inquiry
- Someone who buys accounts receivables
- Storage site
- To send on an errand or assignment
- Food gone bad
- A vehicle capable of transporting gas or liquids
Down
- A term for a loss of power
- A term for the press, radio and other news outlets
- The World Wide Web
- A term covering the network of electrical connections
- Computer security
- A way down – or up
- Phone solicitators
- Term for lines carrying electrical power
- A popular social media tool
- Someone authorized to speak for the organization
- Step 2 of 5
- Dangerous
- Information Technology
- A technique for securing and protecting data files
- Type of gaseous fuel
29 Clues: Dangerous • Step 2 of 5 • Storage site • Food gone bad • A formal inquiry • Computer security • The World Wide Web • A way down – or up • Phone solicitators • A type of evaluation • Type of gaseous fuel • Information Technology • Inner workings framework • A term for a loss of power • A popular social media tool • Separation into three groups • What can happen to frozen pipes • ...
FITE 2013-05-16
Across
- symbol for a company
- personal conduct online
- document or file made with a preset format
- one thousand terabytes
- a thousand bytes
- one thousand megabytes
- one thousand brontobytes
- search engine that checks all search engines
- wireless home network
- one thousand exabytes
- close up preview of a template
- one thousand petabytes
- protection of information computer/networks
- any type of internet hosting service
- appearence of a document
- port that connects the mouse or keyboard to PC
- one thousand yottabytes
Down
- arrangement of data for a computer
- Ex: mouse, flash drive
- one thousand zetabytes
- software used to search data
- one thousand gigabytes
- one million bytes
- a device that has a lot of data storage
- zoomable presentation program
- computer screen
- network name
- Ex:comcast,verizon
- Ex: monitor, printer
- eight bytes
- rules to keep people safe online
- smallest unit of data
- plug your flashdrive into
- Ex: headphones, speakers
- a short memorable phrase for advertising
35 Clues: eight bytes • network name • computer screen • a thousand bytes • one million bytes • Ex:comcast,verizon • symbol for a company • Ex: monitor, printer • wireless home network • one thousand exabytes • smallest unit of data • Ex: mouse, flash drive • one thousand zetabytes • one thousand gigabytes • one thousand terabytes • one thousand megabytes • one thousand petabytes • personal conduct online • ...
ITSM Challenge 2 2024-05-21
Across
- Alteration to improve IT services.
- Ensuring uninterrupted IT service.
- Activity that creates a service definition.
- Daily management of IT services.
- Temporary endeavor to achieve a goal.
- Type of Change Request that is too urgent to wait for the next CAB meeting for approval to implement.
- Type of Change Request that is medium risk or higher, requires custom planning, and must be approved for implementation.
- Framework for managing IT services.
Down
- Phase of implementing changes into operations.
- Protection against digital threats.
- Formal demand for IT service.
- Secured data storage or transmission.
- Long-term plan for IT service improvement or actions taken to determine the need for new services.
- An unexpected disruption in service.
- Rollout of IT services or IT updates to production.
- Root cause of recurring incidents.
- Best practice framework for IT service management.
- Authorized deployment of IT components.
- Type of Change Request that is low risk, repeatable, well-known, and preapproved
- Centralized project management office.
20 Clues: Formal demand for IT service. • Daily management of IT services. • Alteration to improve IT services. • Ensuring uninterrupted IT service. • Root cause of recurring incidents. • Protection against digital threats. • Framework for managing IT services. • An unexpected disruption in service. • Secured data storage or transmission. • Temporary endeavor to achieve a goal. • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
Electronics 2025-03-05
Across
- – Network of interconnected devices communicating via the internet.
- – Field focused on designing and building robots.
- – Board that connects electronic components.
- – Technology that uses radio waves for identification and tracking.
- – Energy sourced from nature, like solar or wind.
- – Type of system where software is built into hardware.
- – Advanced field of physics used for computing and cryptography.
- – Material used in electronic circuits, such as silicon.
- – Use of technology to perform tasks with minimal human intervention.
- – A small computer on a single chip, used in embedded systems.
- – Latest generation of mobile network technology.
Down
- – Communication without physical cables.
- – Low-level software controlling hardware functions.
- – A device that converts electrical signals into movement.
- – The practice of protecting computer systems from attacks.
- – Unmanned aerial vehicles used for various applications.
- – Computing closer to the data source to reduce latency.
- – A device that detects physical properties such as temperature or motion.
- – Engineering on a very tiny scale, atomic or molecular level.
- – The field of making machines "think" like humans.
20 Clues: – Communication without physical cables. • – Board that connects electronic components. • – Field focused on designing and building robots. • – Energy sourced from nature, like solar or wind. • – Latest generation of mobile network technology. • – The field of making machines "think" like humans. • – Low-level software controlling hardware functions. • ...
Satria briant ardinata (33) kelas XF 2025-04-29
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
TTS19 X_D 2025-04-15
Across
- Pengembang perangkat lunak.
- Pelanggaran hak cipta disebut juga.
- Cerita rakyat yang bisa dibuat animasi digital.
- Penyebaran informasi secara digital.
- Hak atas penemuan atau inovasi teknologi.
- Operator pencarian untuk dua kata kunci sekaligus.
- Orang yang memperbaiki dan merawat jaringan komputer.
- Hak milik atas ciptaan lagu, buku, dan karya seni.
- Informasi palsu yang disebarkan untuk menipu.
- Lembaga yang mengatur HAKI di Indonesia.
Down
- Syntax untuk mencari di situs tertentu
- Proses mengecek kebenaran informasi sebelum membagikannya.
- Alat musik khas Jawa Barat.
- Pengelola dan penganalisis data dalam skala besar.
- Ahli dalam membuat sistem keamanan digital.
- Perilaku kasar atau menghina di media sosial.
- Seni tradisional yang bisa dijadikan konten edukatif.
- Kata untuk mengecualikan hasil pencarian.
- Proses membuat konten digital.
- Mesin pencari paling populer.
- Profesi yang merancang antarmuka pengguna.
- Lembaga yang mengawasi konten siaran di Indonesia.
- Penyebaran kebencian berbasis SARA di internet.
- Simbol atau logo dagang yang dilindungi hukum.
- Tanda yang digunakan untuk mencari frasa lengkap.
25 Clues: Alat musik khas Jawa Barat. • Pengembang perangkat lunak. • Mesin pencari paling populer. • Proses membuat konten digital. • Pelanggaran hak cipta disebut juga. • Penyebaran informasi secara digital. • Syntax untuk mencari di situs tertentu • Lembaga yang mengatur HAKI di Indonesia. • Kata untuk mengecualikan hasil pencarian. • Hak atas penemuan atau inovasi teknologi. • ...
TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16
Across
- Alat untuk menyaring konten tidak pantas
- Proses mengecek kebenaran sebuah informasi
- Orang yang menulis dan mengembangkan kode
- Simbol untuk mencari frasa tepat
- Pekerjaan yang menganalisis dan mengolah data besar
- Syntax untuk membatasi pencarian ke situs tertentu
- Direktorat di bawah Kemenkumham yang mengurus HAKI
- Perlindungan atas penemuan teknologi
- Istilah untuk penyebaran konten ke publik
Down
- Profesi bidang keamanan data dan jaringan
- Singkatan dari Hak atas Kekayaan Intelektual
- Berita palsu yang menyesatkan publik
- Konten berisi kebencian atau diskriminasi
- Lembaga negara pengawas konten digital
- Operator untuk alternatif kata
- Proses membuat media seperti video atau gambar digital
- Tindakan menyalin karya tanpa izin
- Syntax untuk mencari dokumen tertentu seperti PDF
- Istilah singkat untuk pengembang situs web
- Jenis HAKI yang melindungi nama dagang
- Platform media sosial populer untuk video pendek
- Unsur budaya lokal yang bisa diangkat ke konten digital
- Jenis tarian daerah yang bisa dijadikan konten
- Profesi yang fokus ke tampilan dan pengalaman pengguna
- Operator untuk mengecualikan istilah dari pencarian (simbol)
25 Clues: Operator untuk alternatif kata • Simbol untuk mencari frasa tepat • Tindakan menyalin karya tanpa izin • Berita palsu yang menyesatkan publik • Perlindungan atas penemuan teknologi • Lembaga negara pengawas konten digital • Jenis HAKI yang melindungi nama dagang • Alat untuk menyaring konten tidak pantas • Profesi bidang keamanan data dan jaringan • ...
TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16
Across
- Alat untuk menyaring konten tidak pantas
- Proses mengecek kebenaran sebuah informasi
- Orang yang menulis dan mengembangkan kode
- Simbol untuk mencari frasa tepat
- Pekerjaan yang menganalisis dan mengolah data besar
- Syntax untuk membatasi pencarian ke situs tertentu
- Direktorat di bawah Kemenkumham yang mengurus HAKI
- Perlindungan atas penemuan teknologi
- Istilah untuk penyebaran konten ke publik
Down
- Profesi bidang keamanan data dan jaringan
- Singkatan dari Hak atas Kekayaan Intelektual
- Berita palsu yang menyesatkan publik
- Konten berisi kebencian atau diskriminasi
- Lembaga negara pengawas konten digital
- Operator untuk alternatif kata
- Proses membuat media seperti video atau gambar digital
- Tindakan menyalin karya tanpa izin
- Syntax untuk mencari dokumen tertentu seperti PDF
- Istilah singkat untuk pengembang situs web
- Jenis HAKI yang melindungi nama dagang
- Platform media sosial populer untuk video pendek
- Unsur budaya lokal yang bisa diangkat ke konten digital
- Jenis tarian daerah yang bisa dijadikan konten
- Profesi yang fokus ke tampilan dan pengalaman pengguna
- Operator untuk mengecualikan istilah dari pencarian (simbol)
25 Clues: Operator untuk alternatif kata • Simbol untuk mencari frasa tepat • Tindakan menyalin karya tanpa izin • Berita palsu yang menyesatkan publik • Perlindungan atas penemuan teknologi • Lembaga negara pengawas konten digital • Jenis HAKI yang melindungi nama dagang • Alat untuk menyaring konten tidak pantas • Profesi bidang keamanan data dan jaringan • ...
TEMA 2 2025-10-27
Across
- Aktivitas menonton, bermain, atau berkomunikasi melalui internet.
- Profesi baru yang muncul karena adanya media sosial.
- menjual dan membeli produk secara online.
- Istilah untuk kecerdasan buatan yang membantu otomatisasi bisnis.
- Layanan perbankan yang dapat diakses secara daring.
- Teknologi yang digunakan untuk mencatat transaksi kripto.
Down
- Sistem perdagangan yang dilakukan melalui internet.
- Sistem keamanan untuk melindungi data digital.
- Istilah untuk kegiatan promosi melalui media digital.
- Transaksi jual beli melalui aplikasi smartphone.
- Mata uang digital yang tidak memiliki bentuk fisik.
- Alat pembayaran digital yang banyak digunakan di ponsel.
- Bentuk uang elektronik yang diterbitkan oleh bank atau fintech.
- Pasar global tanpa batas yang diciptakan oleh internet.
- tempat menonton video digital, misalnya YouTube.
- Jenis pekerjaan yang bisa dilakukan dari rumah dengan bantuan internet.
- Perusahaan yang berbasis teknologi digital seperti Gojek atau Tokopedia.
- Teknologi penyimpanan data melalui internet.
- Istilah untuk data dalam jumlah besar yang diolah untuk bisnis.
- Proses perubahan dari sistem ekonomi tradisional ke sistem berbasis teknologi.
20 Clues: menjual dan membeli produk secara online. • Teknologi penyimpanan data melalui internet. • Sistem keamanan untuk melindungi data digital. • Transaksi jual beli melalui aplikasi smartphone. • tempat menonton video digital, misalnya YouTube. • Sistem perdagangan yang dilakukan melalui internet. • Mata uang digital yang tidak memiliki bentuk fisik. • ...
"Business Tech Brain Teaser" 2025-04-02
Across
- Using AI and software to perform tasks automatically
- The use of online payment systems in business
- The process of storing and accessing data over the internet
Down
- A system that helps businesses make smarter choices using data
- Digital tools that help businesses grow and operate
- The use of technology to protect business data
- The selling of goods and services online
- Online business that includes more than just sales
8 Clues: The selling of goods and services online • The use of online payment systems in business • The use of technology to protect business data • Digital tools that help businesses grow and operate • Online business that includes more than just sales • Using AI and software to perform tasks automatically • The process of storing and accessing data over the internet • ...
"Business Tech Brain Teaser" 2025-04-02
Across
- business that includes more than just sales
- tools that help businesses grow and operate
- use of online payment systems in business
Down
- process of storing and accessing data over the internet
- selling of goods and services online
- AI and software to perform tasks automatically
- system that helps businesses make smarter choices using data
- use of technology to protect business data
8 Clues: selling of goods and services online • use of online payment systems in business • use of technology to protect business data • business that includes more than just sales • tools that help businesses grow and operate • AI and software to perform tasks automatically • process of storing and accessing data over the internet • ...
CURRENT ISSUE PUZZLE 2023-03-18
Across
- Factor affecting generation gap
- Security human resource technology
- Key point of talent management
Down
- Cultural difference in the workplace
- Someone uses a computer system or network in a bad way to get secret information or cause harm to the system
- Bully but virtual
- Unauthorized interception of phone conversations with the aim of listening in on what is being said.
7 Clues: Bully but virtual • Key point of talent management • Factor affecting generation gap • Security human resource technology • Cultural difference in the workplace • Unauthorized interception of phone conversations with the aim of listening in on what is being said. • ...
