cybersecurity Crossword Puzzles
Digital media literacy 2023-09-14
Across
- a folder for keeping all your data and work
- a electronic device that lets u have access to the internet on a keyboard
- to send something to lots of people
- to make something your so people cant copy you
- a way of protecting you from hackers
- a way of attracting someone to your business
Down
- A way of messaging your fiends and sending pics
- facts and statistics collected together for reference
- a way of infecting a device
- a way of watching videos of whatever you want
- a way of talking to lots of people about your life
- a internet page based on a famous person/subject
12 Clues: a way of infecting a device • to send something to lots of people • a way of protecting you from hackers • a folder for keeping all your data and work • a way of attracting someone to your business • a way of watching videos of whatever you want • to make something your so people cant copy you • A way of messaging your fiends and sending pics • ...
Technology 2025-11-13
Across
- brain of the computer
- Interface allowing programs to talk to each other
- An unmanned aerial vehicle controlled remotely or autonomously
- The simulation of human
- the physical parts of a computer
- A computer that provides data or services to other computers over a network
- A newer version of software or data that improves or fixes issues
Down
- The practice of protecting systems and data from digital attacks.
- Software designed to damage,
- Existing in digital form or simulated by software rather than physical reality
- the set of programs and applications that tell the computer what to do
- A step-by-step set of instructions for solving a problem
12 Clues: brain of the computer • The simulation of human • Software designed to damage, • the physical parts of a computer • Interface allowing programs to talk to each other • A step-by-step set of instructions for solving a problem • An unmanned aerial vehicle controlled remotely or autonomously • The practice of protecting systems and data from digital attacks. • ...
Cluster 1 Day 5 Consolidation 2023-10-12
Across
- Our hardship program is call?
- Missing or incorrect mobile numbers, once corrected we send a whot?
- Someone authorised on an account is called a .... person?
- The traffic lights in SAP next to the mobile and email are called?
- What is the resource with the newspaper icon in KIT called?
Down
- Accounts with a Code Word, you will need to transfer to Res+...?
- What is the compliance elearn for internet protection called?
- What is Qi's English name?
- AGL deals in retail and ...?
- What team does Elizabeth support in the Rugby?
- Who takes care of the poles and wires in the electricity network?
- BPP stands for Best ..... Procedure?
- What is the name of Caitlyn's dog?
13 Clues: What is Qi's English name? • AGL deals in retail and ...? • Our hardship program is call? • What is the name of Caitlyn's dog? • BPP stands for Best ..... Procedure? • What team does Elizabeth support in the Rugby? • Someone authorised on an account is called a .... person? • What is the resource with the newspaper icon in KIT called? • ...
computer security 2021-10-15
Across
- a study of design of computer equipment
- a person who has intention to destroy data
- a malicious code which sends out info to hacker
- a act of illegal listening to network channel
- a system of to protect safeguard network
- a secured layer of protocol to encrypt data
- a cause of system failure
- a computer health issue causing strain in hand
Down
- act of tricking user into revealing their info
- a person who access computer illegally
- a malicious act to slow down service of server
- act of making copy of files safely and secure
- act of stealing or faking information for hiding
- a malicious program which steals data from user
- a field of study on computer security
- a data protection act law in countries
- a program which copies itself repeateadly
- moral obligation to use computer with care
18 Clues: a cause of system failure • a field of study on computer security • a person who access computer illegally • a data protection act law in countries • a study of design of computer equipment • a system of to protect safeguard network • a program which copies itself repeateadly • moral obligation to use computer with care • a person who has intention to destroy data • ...
Smart city of Singapore 2024-12-04
Across
- Citizens and businesses can transact with the Government by using it.
- That Strait contributes to Signapore's prosperity.
- Reusing excess heat from machines to save energy.
- How many are the official languages?
- Name of an educational application.
- Signapore identifies its future as a certain type of island.
Down
- Singapore's commitment aligned with MRT.
- The city-state has built a waste-to-energy plant that converts waste into something else.
- Invested there to ensure the safety of data and digital infrastructure.
- Singapore’s approach focuses on building that kind of future for everyone.
- Communitacion with patients remotely.
11 Clues: Name of an educational application. • How many are the official languages? • Communitacion with patients remotely. • Singapore's commitment aligned with MRT. • Reusing excess heat from machines to save energy. • That Strait contributes to Signapore's prosperity. • Signapore identifies its future as a certain type of island. • ...
cbo crossword 1 2026-01-28
Across
- : Central bank control of money supply and credit
- : Protection of digital banking systems from threats
- which category does commercial bank belong to
- : Difference between lending and deposit interest rates
- Banks : Banks allowed full range of banking services
- : Acting on behalf of customers in financial transactions
Down
- is the Management function where availability of cash to meet obligations is ensured
- : Services that facilitate payments and settlements
- is the Management of Assessment, monitoring, and control of loan portfolios
- is the Management function where mismatches between bank assets and liabilities is taken care of
- : Institutions serving low-income and unbanked groups
11 Clues: which category does commercial bank belong to • : Central bank control of money supply and credit • : Services that facilitate payments and settlements • : Protection of digital banking systems from threats • Banks : Banks allowed full range of banking services • : Institutions serving low-income and unbanked groups • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
computer security 2021-10-15
Across
- a study of design of computer equipment
- a person who has intention to destroy data
- a malicious code which sends out info to hacker
- a act of illegal listening to network channel
- a system of to protect safeguard network
- a secured layer of protocol to encrypt data
- a cause of system failure
- a computer health issue causing strain in hand
Down
- act of tricking user into revealing their info
- a person who access computer illegally
- a malicious act to slow down service of server
- act of making copy of files safely and secure
- act of stealing or faking information for hiding
- a malicious program which steals data from user
- a field of study on computer security
- a data protection act law in countries
- a program which copies itself repeateadly
- moral obligation to use computer with care
18 Clues: a cause of system failure • a field of study on computer security • a person who access computer illegally • a data protection act law in countries • a study of design of computer equipment • a system of to protect safeguard network • a program which copies itself repeateadly • moral obligation to use computer with care • a person who has intention to destroy data • ...
computer security 2021-10-15
Across
- a study of design of computer equipment
- a person who has intention to destroy data
- a malicious code which sends out info to hacker
- a act of illegal listening to network channel
- a system of to protect safeguard network
- a secured layer of protocol to encrypt data
- a cause of system failure
- a computer health issue causing strain in hand
Down
- act of tricking user into revealing their info
- a person who access computer illegally
- a malicious act to slow down service of server
- act of making copy of files safely and secure
- act of stealing or faking information for hiding
- a malicious program which steals data from user
- a field of study on computer security
- a data protection act law in countries
- a program which copies itself repeateadly
- moral obligation to use computer with care
18 Clues: a cause of system failure • a field of study on computer security • a person who access computer illegally • a data protection act law in countries • a study of design of computer equipment • a system of to protect safeguard network • a program which copies itself repeateadly • moral obligation to use computer with care • a person who has intention to destroy data • ...
RAPA - Have you been paying attention? 2023-05-24
Across
- how does Jordan get so swole (8)
- the action of obtaining something (11)
- the source of news for anything RAPA related (4,5,2)
- instrument that Erdem plays (6)
- coreys coffee order (trading card) (3,5)
- what does Bryce like to paint in his free time (9,9)
- free coffees (3,3)
- where has Sheila spent the past 5 years working (8,9)
- what sport did Siobhan and Richard play (5,6)
Down
- what does Josh like to ride in his free time (9)
- expose (someone or something valued) to danger, harm, or loss (4)
- what Pacific Island did Matt go to for a holiday with his family (5)
- one of Gibbo's past jobs (11)
- the state of having no protection from something harmful (8)
- an official financial inspection (5)
- where we are for retreat (11)
- how many years has Lucy been cooking for? (6)
- cybersecurity tv drama (3,6,3)
18 Clues: free coffees (3,3) • one of Gibbo's past jobs (11) • where we are for retreat (11) • cybersecurity tv drama (3,6,3) • instrument that Erdem plays (6) • how does Jordan get so swole (8) • an official financial inspection (5) • the action of obtaining something (11) • coreys coffee order (trading card) (3,5) • how many years has Lucy been cooking for? (6) • ...
cyber security crossword 2025-04-09
Across
- These emails try to get your credentials by creating a sense of urgency
- A great option for a password manager
- Secures account through text/email/etc. (abbreviation)
- One of the top cybersecurity companies you can trust
- Detects and removes harmful materials on your device
Down
- Malware that can harm your computer
- Regularly check for _______ on your computer or device
- It's good to have a password length of at lest ______
- A great to store your credentials would be using a ________ manager
- It's a good idea to _____ phishing or scam emails
- Good to empty every so often and recover deleted files in
11 Clues: Malware that can harm your computer • A great option for a password manager • It's a good idea to _____ phishing or scam emails • One of the top cybersecurity companies you can trust • Detects and removes harmful materials on your device • It's good to have a password length of at lest ______ • Regularly check for _______ on your computer or device • ...
Malware 2023-03-15
Across
- A person that wants to take files and important information
- A field in IT that keeps data secured and safe
- Important information that could be used to impersonate someone else
- Many different forms of harmful software
- A malicious Software that needs a host in order to work
- A system that can be used for work, games, and to hack.
Down
- Malicious software designed to imitate normal software
- Undiscovered attack
- Software to steal data and attempt to sell it back to the user
- Raises permissions to access data
- Does not need host in order to cause problems and spread
11 Clues: Undiscovered attack • Raises permissions to access data • Many different forms of harmful software • A field in IT that keeps data secured and safe • Malicious software designed to imitate normal software • A malicious Software that needs a host in order to work • A system that can be used for work, games, and to hack. • ...
BRAINWARE SOAL SEMI FINAL 2024-09-10
5 Clues: Memfasilitasi kegiatan pembelajaran • Melindungi sistem keamanan jaringan • Mendesain Merancang analisis suatu program • merancang tampilan visual dan menu navigasi pada website • Mempersiapkan dan menyortir dokumen sebelum dimasukkan komputer
Crossword 2025-10-29
6 Clues: Your next destination • The money a company earns from sales • Type of business done over the internet • Online retail giant founded by Jeff Bezos • Protecting computers, networks, and data from digital attacks • A young company with a new business idea, often seeking investors
Cybersecurity Awareness Crossword Puzzle Week 2 2023-10-11
Across
- A bot-challenging security feature for online interactions.
- Code to fix or enhance software.
- Captures keystrokes to gather sensitive information.
- Security solution to analyze and detect threats in real-time from diverse data and events.
- Collaboration integrating security, automation, and shared responsibility in software development.
- Harmful software for gathering information without consent.
- A stealthy malware granting unauthorized system access while concealing actions.
- Network of devices used for malware distribution, and cyber-attacks.
Down
- Email attachments from unknown senders.
- A way to bypass authentication, used for unauthorized access or malicious intent.
- The most common word used for brute force.
- Safeguard sensitive files and communications.
- Isolated environment to analyze software behavior.
- A U.S. federal agency promoting cybersecurity standards and innovation.
14 Clues: Code to fix or enhance software. • Email attachments from unknown senders. • The most common word used for brute force. • Safeguard sensitive files and communications. • Isolated environment to analyze software behavior. • Captures keystrokes to gather sensitive information. • A bot-challenging security feature for online interactions. • ...
Super U! 2024-09-19
Across
- I cannot ... because I’m afraid of water.
- I cannot ... poetry because I lack creativity.
- I cannot ... because I always burn the food.
- I can ... websites because I have a good sense of user experience.
- I cannot ... a bike because I have poor balance.
- I cannot ... the piano because I have no musical talent.
- I can ... because I understand logic structures well.
- I cannot ... because I have no rhythm.
- I cannot ... because my hands are unsteady.
Down
- I can ... networks because I understand cybersecurity protocols.
- I cannot ... fast because I have weak legs.
- I cannot ... math because numbers confuse me.
- I cannot ... soccer because I have no coordination.
- I can ... animations because I have a sharp eye for detail.
- I can ... videos because I’m good with digital tools.
15 Clues: I cannot ... because I have no rhythm. • I cannot ... because I’m afraid of water. • I cannot ... fast because I have weak legs. • I cannot ... because my hands are unsteady. • I cannot ... because I always burn the food. • I cannot ... math because numbers confuse me. • I cannot ... poetry because I lack creativity. • I cannot ... a bike because I have poor balance. • ...
Jobs 2026-01-23
Across
- Protect people and enforce the law
- Make items like electronics or cars
- Work in schools to educate young people
- Work in hotels or concierge desks to help people
- Make written stories come to life on screens through the use of media
- Works as a member of a company in an office completing various tasks
- Work in AI, software engineering, cybersecurity
Down
- Build roads and buildings for people to work and live in
- Help people who are sick get better
- Work in an airplane to take care of passengers
- Help take care of patients in a hospital or home
- Help tourist travel around and take them to good places in Japan
- Fly aircraft
- Work in a restaurant to prepare food
14 Clues: Fly aircraft • Protect people and enforce the law • Help people who are sick get better • Make items like electronics or cars • Work in a restaurant to prepare food • Work in schools to educate young people • Work in an airplane to take care of passengers • Work in AI, software engineering, cybersecurity • Help take care of patients in a hospital or home • ...
Managers and Managing Crossword Puzzle 2016-01-16
Across
- It's a totally crazy business environment out there today
- Achieving goals
- A name for direct reports that should no longer be used
- What we're using to learn right now
- Perhaps the biggest threat to the control function
- Manager starts acting like the rules don't apply to him
- Term or name that doesn't apply to not-for-profit organizations
- What many first-level managers prefer rather than thinking
- A common title for a first-line manager, Team ________
Down
- The management role that helps direct reports improve their performance / coaching
- Dividing up the work that needs to be done
- Worker whose boss is your direct report
- Accomplishment with minimum effort
- Usually the most important type of skill for middle managers
14 Clues: Achieving goals • Accomplishment with minimum effort • What we're using to learn right now • Worker whose boss is your direct report • Dividing up the work that needs to be done • Perhaps the biggest threat to the control function • A common title for a first-line manager, Team ________ • A name for direct reports that should no longer be used • ...
Mrs Dadd's Bonanza 2023-01-19
Across
- Re-using components instead of throwing them away
- The processes and technologies designed to protect networks, computers and programs from attack, damage or unauthorised access
- Electronic waste
- Tricking people into breaking security procedures
- Watching people enter passwords or PINS
- Designed to protect creators of books, software, etc from having their work illegally copied
- Misinformation which is spread
Down
- Stealing data as it is passed across a network
- Short for malicious software
- Describes the technology that is carried inside the body
- One who breaks a systems integrity maliciously
- The moral principles which govern attitudes and behaviour
- A method of obscuring data so it cannot be read if it is intercepted
- One who is intensely interested in a computer system
14 Clues: Electronic waste • Short for malicious software • Misinformation which is spread • Watching people enter passwords or PINS • Stealing data as it is passed across a network • One who breaks a systems integrity maliciously • Re-using components instead of throwing them away • Tricking people into breaking security procedures • ...
CISO Crossword Quiz - 2325 2025-09-01
Across
- Fraud involving fake virus warnings or “system infected” messages designed to scare users into paying or clicking malicious links
- A cybersecurity defense method where potentially untrusted programs, files, or code are executed in a controlled, isolated environment to prevent them from affecting the host system, commonly used for malware analysis and safe application testing
- A general term for malicious software, such as viruses, worms, trojans, or spyware, designed to disrupt systems, steal data, or gain unauthorized access
- Which kind of WiFi/internet connection you should avoid using for UPI transactions because it is unsafe and open to hackers
Down
- Files disguised as “free movies” or “software cracks” usually carry this harmful code
- The official national agency under the Ministry of Electronics and Information Technology (MeitY) in India that monitors, responds to, and coordinates actions against cybersecurity threats and incidents, where organizations are required to report significant data breaches
- A long, complex password made of random words is called a pass___
- The process of keeping extra copies of important files so they can be restored after malware infections or system crash
- Attackers sometimes drop USB drives in public places hoping someone will pick them up and plug into their computer. What is this tactics called?
- A ____ hacker is an external security expert, who is specially invited to test software or systems for vulnerabilities during pre-release
10 Clues: A long, complex password made of random words is called a pass___ • Files disguised as “free movies” or “software cracks” usually carry this harmful code • The process of keeping extra copies of important files so they can be restored after malware infections or system crash • ...
Cybersecurity Unit 1 Lesson 2 2022-12-02
Across
- Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
- A small local area network of computers and devices.
- Software that can stop malware from entering a network, computer, or device.
- Stores data that is in use.
- Software that runs on your computer, looking for many different types of malware from many different sources.
- Small text-based bits of information about your browser that a web server saves.
- Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
- All data on a computer.
- The arrangement of the various elements of a network.
- Executable files that are run by users.
- The systematic way to find specific web addresses and web pages.
Down
- A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
- A weakness in a system that allows an attacker to gain unauthorized access.
- A special kind of file that contains other files.
- A file that contains a collection of other files.
- Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
- Computer shared by multiple users across a network.
- An application file that is currently executing (also called running) in the operating system.
- An agreed-upon method for communication.
19 Clues: All data on a computer. • Stores data that is in use. • Executable files that are run by users. • An agreed-upon method for communication. • A special kind of file that contains other files. • A file that contains a collection of other files. • Computer shared by multiple users across a network. • A small local area network of computers and devices. • ...
Technology 2024-06-05
Across
- Made by humans, not natural (10 letters).
- Pertaining to atomic energy or reactions (7 letters).
- Tools or devices needed for a specific task (9 letters).
- To look through information on the internet casually (6 letters)
- A place on a website to type keywords for finding information (9 letters)
Down
- Relating to technology that uses computers or electronic devices (7 letters).
- To create something new that didn't exist before (6 letters).
- A place where scientific experiments are conducted (10 letters).
- Protecting computers and networks from attacks (12 letters).
9 Clues: Made by humans, not natural (10 letters). • Pertaining to atomic energy or reactions (7 letters). • Tools or devices needed for a specific task (9 letters). • Protecting computers and networks from attacks (12 letters). • To create something new that didn't exist before (6 letters). • A place where scientific experiments are conducted (10 letters). • ...
Homeland Security 2024-03-18
Across
- What department within Homeland Security deals with transportation security
- How many departments did the Homeland Security Act of 2002 combine
- What type of security does Homeland Security deal with when relating to the internet
- Acronym for department of homeland security
- What department within Homeland Security deals with emergency management
Down
- What is one Geographical Aspect Homeland Security Protects
- What kind of events does Homeland Security prepare for
- How would opposers of Homeland Security describe its strategy
- What Homeland Security was made to defend against
9 Clues: Acronym for department of homeland security • What Homeland Security was made to defend against • What kind of events does Homeland Security prepare for • What is one Geographical Aspect Homeland Security Protects • How would opposers of Homeland Security describe its strategy • How many departments did the Homeland Security Act of 2002 combine • ...
Computer Project 2025-06-15
Across
- : Bullying someone online through messages or social media
- : A harmful program that can damage files and software
- : People who use the internet or computers to commit crimes
- : Software that protects your computer from viruses
Down
- : The practice of protecting devices and data from cyber threats
- : Fake messages that try to steal passwords or bank info
- : Criminal activities done using computers or the internet
- : A system that blocks unauthorized access to or from a private network
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Bullying someone online through messages or social media • : Criminal activities done using computers or the internet • : People who use the internet or computers to commit crimes • ...
Crossword - LCCI and Lilly 2021-11-25
Across
- New e-commerce added in LCCI's R&R platform
- Who heads commercial services in LCCI
- platform where you can submit bills for reimbursement
- what is the name of the building in Embassy Tech village that LCCI occupies
- critical foundation of Lilly’s ethics and compliance program
Down
- Which month was LCCI started in Bangalore
- how many employees were there at the start of LCCI
- Learning portal sponsored by LCCI for its employees
- Lilly unites caring with discovery to create medicines that make life better for people around the world.
- when was the cybersecurity month
10 Clues: when was the cybersecurity month • Who heads commercial services in LCCI • Which month was LCCI started in Bangalore • New e-commerce added in LCCI's R&R platform • how many employees were there at the start of LCCI • Learning portal sponsored by LCCI for its employees • platform where you can submit bills for reimbursement • ...
C CROSSWORD 2014-02-26
Across
- location. When reached, the invitees were
- they all had received a prank call.
- annoyed to see the party hall empty.The members realized that
- The enrolled members of "CYBERSECURITY CLUB" were called
- Twice to their surprise they found a paper unknowingly left
Down
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- for a party arranged at
- The squad diffused the bomb and saved everyone . They all came back home .
- a common
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
technology 2024-07-18
Across
- - An electronic device for storing and processing data.
- - Programs and operating information used by a computer.
- - A global network connecting millions of computers.
- - An organized collection of data, generally stored and accessed electronically.
Down
- - A mobile phone with advanced features.
- - The practice of protecting systems, networks, and programs from digital attacks.
- - An input device with keys used to type characters.
- - A process or set of rules to be followed in problem-solving operations.
- - The branch of technology dealing with the design and application of robots.
- - A small electronic device or tool.
10 Clues: - A small electronic device or tool. • - A mobile phone with advanced features. • - An input device with keys used to type characters. • - A global network connecting millions of computers. • - An electronic device for storing and processing data. • - Programs and operating information used by a computer. • ...
msn policies 2025-03-25
Across
- speaking in behalf facebook, in order to commint phishing
- any type of data that can be used to identify a person
- If you invest in this business your money will increase in two hours.
- most popular high risk drug
- buying nudes from a minor
Down
- I cant see your shoulders and knees
- The way we should address "hormonal" in Spanish
- threaten when a nude pic is shared
- Did you ask little Jane to keep the chat a secret?
- be careful, in spanish sounds like "pan" but its pronunciation in brazil is...
10 Clues: buying nudes from a minor • most popular high risk drug • threaten when a nude pic is shared • I cant see your shoulders and knees • The way we should address "hormonal" in Spanish • Did you ask little Jane to keep the chat a secret? • any type of data that can be used to identify a person • speaking in behalf facebook, in order to commint phishing • ...
test 2025-04-02
Across
- Agents must state this on every call with a patient
- Rachel Robinson
- Platform used to work patient accounts
- Where employees can access benefits, tax documents, and pay statements
- A library in REACH containing courses that employees can enroll themselves in
- Capio's space to recognize and celebrate one another through points and eCards
Down
- Cybersecurity training drama series
- A cyberattack where scammers trick individuals into revealing sensitive information, like passwords or financial details, by posing as trusted entities through deceptive messages or websites.
- Vice President Operations
- Capio's platform for encouraging health and wellness
10 Clues: Rachel Robinson • Vice President Operations • Cybersecurity training drama series • Platform used to work patient accounts • Agents must state this on every call with a patient • Capio's platform for encouraging health and wellness • Where employees can access benefits, tax documents, and pay statements • ...
Nicrossword 2 2024-12-23
Across
- State Wide Area Network to connect state administration offices.
- Software with source code that anyone can inspect, modify, and enhance.
- National Knowledge Network for connecting educational and research institutions.
- Protection against cyber threats and securing digital infrastructure.
- Extremely large data sets analyzed computationally to reveal patterns and trends.
Down
- A unique identification project by the Government of India.
- Unified Mobile Application for New-age Governance.
- An ICT solution for the management of hospital services.
- A paperless office solution by NIC for government departments.
- A nationwide communication network by NIC.
10 Clues: A nationwide communication network by NIC. • Unified Mobile Application for New-age Governance. • An ICT solution for the management of hospital services. • A unique identification project by the Government of India. • A paperless office solution by NIC for government departments. • State Wide Area Network to connect state administration offices. • ...
TEM-8 science and technology 2025-11-14
Across
- a set of rules for solving a problem in a finite number of steps
- the introduction of new ideas, methods, or products
- the protection of computer systems from theft or damage
- reality a computer-generated simulation of a 3D environment
- technology on an atomic or molecular scale
Down
- engineering the direct manipulation of an organism's genes
- a natural resource able to be replenished naturally
- the use of living organisms in technology and engineering
- able to be maintained at a certain rate without depletion
- the use of largely automatic equipment in a system of operation
10 Clues: technology on an atomic or molecular scale • a natural resource able to be replenished naturally • the introduction of new ideas, methods, or products • the protection of computer systems from theft or damage • the use of living organisms in technology and engineering • able to be maintained at a certain rate without depletion • ...
cbo crossword 1 2026-01-28
Across
- : Services that facilitate payments and settlements
- : Central bank control of money supply and credit
- : Acting on behalf of customers in financial transactions
- : Difference between lending and deposit interest rates
- is the Management of Assessment, monitoring, and control of loan portfolios
Down
- Banks : Banks allowed full range of banking services
- is the Management function where availability of cash to meet obligations is ensured
- : Institutions serving low-income and unbanked groups
- : Protection of digital banking systems from threats
- is the Management function where mismatches between bank assets and liabilities is taken care of
10 Clues: : Central bank control of money supply and credit • : Services that facilitate payments and settlements • Banks : Banks allowed full range of banking services • : Protection of digital banking systems from threats • : Institutions serving low-income and unbanked groups • : Difference between lending and deposit interest rates • ...
Globalisation 2023-03-08
Across
- I __ __ __ __ __ security software to protect against harmful cyberattacks.
- With the increase in foreign culture, local culture might be l __ __ __.
- H __ __ __ __ __ __ are people who illegally gain access to other people's computer systems.
- the interconnectedness of societies.
- C__ __ __ __ __ __ __ __ __ __ __ __ protects computers and electronic devices from cyberattacks.
Down
- I__ __ __ __ __ __ __ __ __ __ __ in technology contributes to Globalisation.
- Better economic situation can lead to b__ __ __ __ __ quality of life.
- Globalisation leads to economic, c__ __ __ __ __ __ __ and security impacts.
- Globalisation has i__ __ __ __ __ __ __ __ security threats.
- M__ __ __ __ __ phones have allowed us to connect with people faster.
- F __ __ __ __ __ __ culture has spread throughout the world, such as K-pop.
- G__ __ __ __ __ of Multinational Corporations (MNCs) is a factor that drives Globalisation.
12 Clues: the interconnectedness of societies. • Globalisation has i__ __ __ __ __ __ __ __ security threats. • M__ __ __ __ __ phones have allowed us to connect with people faster. • Better economic situation can lead to b__ __ __ __ __ quality of life. • With the increase in foreign culture, local culture might be l __ __ __. • ...
Cyber Security Puzzle 2024-10-22
Across
- The process of verifying the identity of a user
- A method of disguising data to protect it
- A device that helps protect networks by filtering traffic
- A breach where sensitive data is accessed unlawfully
- A malicious email designed to trick recipients
- A protocol used to send emails securely
Down
- A common form of malware that locks files
- A program that scans for vulnerabilities in systems
- A common cybersecurity measure that involves using complex passwords
- Software that detects and removes malware
- A type of attack where multiple systems are used to overwhelm a target
- A legal framework for data protection in the EU
12 Clues: A protocol used to send emails securely • A common form of malware that locks files • A method of disguising data to protect it • Software that detects and removes malware • A malicious email designed to trick recipients • The process of verifying the identity of a user • A legal framework for data protection in the EU • ...
Кәмшат 2024-11-19
Across
- A cloud computing environment designed specifically for one organization?
- An infrastructure-as-a-service model?
- What is the process of software allocation of computer resources called?
- Protecting data and systems from cyber attacks?
- The process of automatically adjusting resources based on user demand?
Down
- Google's cloud storage service?
- A collection of key resources such as networks, servers, hardware?
- Special coding process to protect data?
- A software-as-a-service model?
- What is the process of protecting data from unauthorized access called?
- What is the level of service available to users?
- A service for hosting websites and applications on the Internet?
12 Clues: A software-as-a-service model? • Google's cloud storage service? • An infrastructure-as-a-service model? • Special coding process to protect data? • Protecting data and systems from cyber attacks? • What is the level of service available to users? • A service for hosting websites and applications on the Internet? • ...
bbb 2023-04-28
Across
- requires less memory
- measure of correctness that is achieved in true prediction.
- Identifying similar groups of data in a dataset is called
- ls called blind algorithms
- if there is a relationship between the input variable and the output variable
Down
- machine learning models are trained without labelled data sets
- maps any given percept sequence to an action
- One of the AI application
- is a tabular summary of the number of correct and incorrect predictions made by a classifier
- measures how often the classifier makes the correct prediction
10 Clues: requires less memory • One of the AI application • ls called blind algorithms • maps any given percept sequence to an action • Identifying similar groups of data in a dataset is called • measure of correctness that is achieved in true prediction. • machine learning models are trained without labelled data sets • ...
C CROSSWORD 2014-02-26
Across
- The enrolled members of "CYBERSECURITY CLUB" were called
- they all had received a prank call.
- annoyed to see the party hall empty.The members realized that
- location. When reached, the invitees were
- The squad diffused the bomb and saved everyone . They all came back home .
- a common
Down
- for a party arranged at
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- Twice to their surprise they found a paper unknowingly left
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
Security Awareness 2022-05-17
Across
- Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
- Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
- Perilaku hati-hati untuk melindungi kita terhadap ancaman
- Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
- Jenis Informasi yang merupakan informasi pengetahuan umum
- Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
- Prinsip Keamanan Informasi agar akurat
- Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
- Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
- Perangkat lunak yang diciptakan untuk merusak sistem computer
10 Clues: Prinsip Keamanan Informasi agar akurat • Jenis Informasi yang merupakan informasi pengetahuan umum • Perilaku hati-hati untuk melindungi kita terhadap ancaman • Perangkat lunak yang diciptakan untuk merusak sistem computer • Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan • ...
Technology 2023-08-24
Across
- Wireless technology that enables data transfer between devices.
- Online method of watching videos or listening to audio without downloading i.e., real time digital content.
- Secret combination used to access digital accounts.
Down
- Mathematical recipe used to solve complex tasks efficiently.
- Process of creating instructions for computers to execute tasks.
- Practices and technologies used to safeguard digital information from attacks.
- Global navigation system that provides location and navigation information.
- Malicious software that spreads and infects digital systems.
- Computer-based systems that mimic human intelligence.
- Money capital of India.
10 Clues: Money capital of India. • Secret combination used to access digital accounts. • Computer-based systems that mimic human intelligence. • Mathematical recipe used to solve complex tasks efficiently. • Malicious software that spreads and infects digital systems. • Wireless technology that enables data transfer between devices. • ...
executive branch 2023-07-09
Across
- binding agreements between nations and become part of international law
- Right to reject decisions
- Advisory body is made up of 15 executive departments
- A diplomat sent by a country
- responsible for counterterrorism, cybersecurity, aviation security etc...
Down
- promoting economic prosperity and ensuring the financial security of the United States
- Leader of the U.S.
- Chief Executive Officer
- a judge who has been chosen by the President of the United States to work in a federal appeals court
- provide the military forces needed to deter war and to protect the security of our country
10 Clues: Leader of the U.S. • Chief Executive Officer • Right to reject decisions • A diplomat sent by a country • Advisory body is made up of 15 executive departments • binding agreements between nations and become part of international law • responsible for counterterrorism, cybersecurity, aviation security etc... • ...
soal 4.0 2023-10-24
Across
- salah satu teknologi di industri 4.0 yang sangat berguna saat ini
- Alat Iot yang kegunaanya memudahkan dirumah
- Teknologi inti dari Industri 4.0
- Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
- Data besar yang kompleks yang dianalisis dalam industri 4.0
- Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
- Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
- Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
- Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
- Revolusi industri saat ini
10 Clues: Revolusi industri saat ini • Teknologi inti dari Industri 4.0 • Alat Iot yang kegunaanya memudahkan dirumah • Data besar yang kompleks yang dianalisis dalam industri 4.0 • salah satu teknologi di industri 4.0 yang sangat berguna saat ini • Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber • ...
Office Management 2025-10-12
Across
- The programs and operating information used by a computer.
- Distinctive attributes or characteristics.
- The state of keeping or being kept secret or private.
- The process of entrusting a task or responsibility to a subordinate.
- A system or organization where people are ranked by status or authority.
- room or building used for commercial or professional work.
- The process of making plans for something.
Down
- Protecting networks and data from unauthorized use.
- Computer systems able to perform tasks normally requiring human intelligence.
- The fact or quality of being on time.
10 Clues: The fact or quality of being on time. • The process of making plans for something. • Distinctive attributes or characteristics. • Protecting networks and data from unauthorized use. • The state of keeping or being kept secret or private. • room or building used for commercial or professional work. • ...
Career Focus 7 2025-12-10
Across
- The ability to move skills from one job to another
- In demand professional who builds applications or software systems
- What the trainee earns upon successful completion
- Type of program: A university preparation or bridging course
- National GTO with an Albury-Wodonga presence
- _____ LETTER A one-page letter sent with a resume
Down
- Critical skill needed for protecting digital assets
- The overall program of study you're enrolled in
- The capacity to adjust to a new work task or technology
- Formal training received at an RTO like TAFE (3 words)
10 Clues: National GTO with an Albury-Wodonga presence • The overall program of study you're enrolled in • What the trainee earns upon successful completion • _____ LETTER A one-page letter sent with a resume • The ability to move skills from one job to another • Critical skill needed for protecting digital assets • Formal training received at an RTO like TAFE (3 words) • ...
2024 International Privacy Week 2023-12-18
Across
- What can be used to make inferences about your socioeconomic status, demographic information and preferences
- MCA stands for
- Take _____ of your data!
- Your name, birthdate, and SSN
Down
- NCA stands for
- Your right to keep your person and your information to yourself
- Focused on preventing and solving threats (i.e., hacking, malware, online scams)
- The week-long event for spreading awareness about online privacy
- The month Data Privacy Week occurs
- Rules, guidelines, and your own personal choices about who has access to your data, and how much access they have
10 Clues: NCA stands for • MCA stands for • Take _____ of your data! • Your name, birthdate, and SSN • The month Data Privacy Week occurs • Your right to keep your person and your information to yourself • The week-long event for spreading awareness about online privacy • Focused on preventing and solving threats (i.e., hacking, malware, online scams) • ...
Artificial Intelligence Related to Information Technology 2025-01-07
Across
- Step-by-step instructions, like a recipe for computers
- A big box of information a computer can look up quickly
- A machine that can do work for people
- The games or apps you use on a computer or tablet
- Computers talking to each other to share things
Down
- A big web where people share pictures, videos, and talk
- Keeping computers safe from bad guys online
- Smart computer thinking, like a robot brain
- A box that helps you play games, write, or find answers
- The parts of a computer you can touch, like the keyboard
10 Clues: A machine that can do work for people • Keeping computers safe from bad guys online • Smart computer thinking, like a robot brain • Computers talking to each other to share things • The games or apps you use on a computer or tablet • Step-by-step instructions, like a recipe for computers • A big web where people share pictures, videos, and talk • ...
Crossword Puzzle #1 - Phishing Exposed! 2026-02-09
Across
- An Enterprise's portal that provides cybersecurity information to enhance security awareness of employees
- Also known as Two-Factor Authentication
- _ _ _ _ _ _ Engineering is tricking people to gain access
- Cyber _ _ _ _ _ _ is any malicious attempt to breach or gain unauthorized access to data
Down
- Impersonate a trusted source to deceive individuals or systems
- Suspicious messages designed to fool you into clicking, downloading, or giving information
- Unsolicited junk mail, often phishing related
- Common delivery method for phishing messages
- Is the chance that a threat will exploit a vulnerability and cause damage
- Login information sought by phishers
10 Clues: Login information sought by phishers • Also known as Two-Factor Authentication • Common delivery method for phishing messages • Unsolicited junk mail, often phishing related • _ _ _ _ _ _ Engineering is tricking people to gain access • Impersonate a trusted source to deceive individuals or systems • ...
Syniverse Crossword 2025-12-03
Across
- Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
- Using mobile service outside your home network
- Protecting networks and data from cyber threats
- Application to person messaging for OTPs, alerts, and notifications
- Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
- Delivery of texts and rich communications
- Final money movement between carriers after clearing
- Continuous advancement that keeps networks and businesses competitive
- Illicit or abusive use of telecom services
- Reconciling usage records between operators for billing
10 Clues: Delivery of texts and rich communications • Illicit or abusive use of telecom services • Using mobile service outside your home network • Protecting networks and data from cyber threats • Final money movement between carriers after clearing • Reconciling usage records between operators for billing • Application to person messaging for OTPs, alerts, and notifications • ...
IT Trivia 2022-07-18
Across
- ... word, excel, powerpoint, office
- measures taken to protect devices, networks, and data from unauthorized access and criminal use
- a program that is dedicated to managing network resources
- the vaccine for computers
- not physical but...
- an output device that produces a tangible copy of alphanumeric or graphic data
- one of the primary input devices used with a computer
Down
- the standard way to connect computers on a network over a wired connection
- a piece of code which can corrupt a system or destroy data
- Jerry
- the button you press when you make an error
- what we hate to see in our emails
- the practice of tricking internet users through deception into revealing personal information
13 Clues: Jerry • not physical but... • the vaccine for computers • what we hate to see in our emails • ... word, excel, powerpoint, office • the button you press when you make an error • one of the primary input devices used with a computer • a program that is dedicated to managing network resources • a piece of code which can corrupt a system or destroy data • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
STEM Careers 2023-12-13
Across
- Designs and oversees the construction of infrastructure like roads and bridges.
- Analyzes and develops software applications for specific user needs.
- Works on the molecular or atomic scale for various applications.
- Designs algorithms for computational problems.
- Designs solutions for environmental issues like pollution.
- Focuses on celestial bodies' formation and evolution.
Down
- Focuses on developing technologies for sustainable energy sources.
- Focuses on developing new materials for various applications.
- Involves analyzing biological data using computational methods.
- Focuses on preventing unauthorized access to computer systems.
- Uses statistical techniques to extract insights from data.
- Designs medical devices and diagnostic tools.
- Responsible for designing computer hardware components.
- Develops manufacturing processes and new materials.
- Involves studying the behavior of subatomic particles.
- Studies the interactions between organisms and their environment.
- Studies the Earth's crust, rocks, and land formations.
- Uses mathematical and statistical techniques to extract insights from data.
18 Clues: Designs medical devices and diagnostic tools. • Designs algorithms for computational problems. • Develops manufacturing processes and new materials. • Focuses on celestial bodies' formation and evolution. • Involves studying the behavior of subatomic particles. • Studies the Earth's crust, rocks, and land formations. • ...
Information and Cyber Security 2022-10-21
Across
- Hackers demanded this company cancel the planned release of a film
- The key to securing your accounts
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Virtual Private …
Down
- The term used for a broad range of malicious activities accomplished through human interactions
- Anti- ...
- What BHSF does to train colleagues to look out for phishing attacks
- What type of attacks are on the rise
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- These attacks typically target a CEO, CFO, or any CXX
- 560,000 pieces of … are detected every day
- UK cyber crime has … in the past 5 years
- Time it takes a hacker to brute force a 6 character password
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
SOF GLSS SCAVENGER HUNT 2023-09-05
Across
- Acronym for MFC's Quality Policy
- First word under Lockheed Martin Delivers found on the SOF Learning Dashboard
- The first program listed on the Programs dropdown
- The number of PED violations in 2023 (Hint: Cybersecurity)
- Click on this tab to find the JPS Library
- The first commitment listed on the SOF GLSS ESH Policy
- The next mandatory IT update starting in October
Down
- Quality Month
- Next day off on the Holiday Calendar
- JPS 1-102
- Last name of our Quality Sr. Manager
- 4th item found on the Command Media Menu on the portal
- The international standard that governs our systems relating to quality
- First link listed on the "ESH links" on the ESH Bulletin Board
- Found in the SOF GLSS Creed, our every day commitment to our customer
15 Clues: JPS 1-102 • Quality Month • Acronym for MFC's Quality Policy • Next day off on the Holiday Calendar • Last name of our Quality Sr. Manager • Click on this tab to find the JPS Library • The next mandatory IT update starting in October • The first program listed on the Programs dropdown • 4th item found on the Command Media Menu on the portal • ...
Some U.S. Power Numbers 2014-06-25
Across
- Separation into three groups
- Sub-elements of a larger mechanism
- Where outage information is often posted
- Sealed from use for a period of time
- A financial product that pays for covered events
- A type of evaluation
- What can happen to frozen pipes
- Inner workings framework
- A formal inquiry
- Someone who buys accounts receivables
- Storage site
- To send on an errand or assignment
- Food gone bad
- A vehicle capable of transporting gas or liquids
Down
- A term for a loss of power
- A term for the press, radio and other news outlets
- The World Wide Web
- A term covering the network of electrical connections
- Computer security
- A way down – or up
- Phone solicitators
- Term for lines carrying electrical power
- A popular social media tool
- Someone authorized to speak for the organization
- Step 2 of 5
- Dangerous
- Information Technology
- A technique for securing and protecting data files
- Type of gaseous fuel
29 Clues: Dangerous • Step 2 of 5 • Storage site • Food gone bad • A formal inquiry • Computer security • The World Wide Web • A way down – or up • Phone solicitators • A type of evaluation • Type of gaseous fuel • Information Technology • Inner workings framework • A term for a loss of power • A popular social media tool • Separation into three groups • What can happen to frozen pipes • ...
FITE 2013-05-16
Across
- symbol for a company
- personal conduct online
- document or file made with a preset format
- one thousand terabytes
- a thousand bytes
- one thousand megabytes
- one thousand brontobytes
- search engine that checks all search engines
- wireless home network
- one thousand exabytes
- close up preview of a template
- one thousand petabytes
- protection of information computer/networks
- any type of internet hosting service
- appearence of a document
- port that connects the mouse or keyboard to PC
- one thousand yottabytes
Down
- arrangement of data for a computer
- Ex: mouse, flash drive
- one thousand zetabytes
- software used to search data
- one thousand gigabytes
- one million bytes
- a device that has a lot of data storage
- zoomable presentation program
- computer screen
- network name
- Ex:comcast,verizon
- Ex: monitor, printer
- eight bytes
- rules to keep people safe online
- smallest unit of data
- plug your flashdrive into
- Ex: headphones, speakers
- a short memorable phrase for advertising
35 Clues: eight bytes • network name • computer screen • a thousand bytes • one million bytes • Ex:comcast,verizon • symbol for a company • Ex: monitor, printer • wireless home network • one thousand exabytes • smallest unit of data • Ex: mouse, flash drive • one thousand zetabytes • one thousand gigabytes • one thousand terabytes • one thousand megabytes • one thousand petabytes • personal conduct online • ...
ITSM Challenge 2 2024-05-21
Across
- Alteration to improve IT services.
- Ensuring uninterrupted IT service.
- Activity that creates a service definition.
- Daily management of IT services.
- Temporary endeavor to achieve a goal.
- Type of Change Request that is too urgent to wait for the next CAB meeting for approval to implement.
- Type of Change Request that is medium risk or higher, requires custom planning, and must be approved for implementation.
- Framework for managing IT services.
Down
- Phase of implementing changes into operations.
- Protection against digital threats.
- Formal demand for IT service.
- Secured data storage or transmission.
- Long-term plan for IT service improvement or actions taken to determine the need for new services.
- An unexpected disruption in service.
- Rollout of IT services or IT updates to production.
- Root cause of recurring incidents.
- Best practice framework for IT service management.
- Authorized deployment of IT components.
- Type of Change Request that is low risk, repeatable, well-known, and preapproved
- Centralized project management office.
20 Clues: Formal demand for IT service. • Daily management of IT services. • Alteration to improve IT services. • Ensuring uninterrupted IT service. • Root cause of recurring incidents. • Protection against digital threats. • Framework for managing IT services. • An unexpected disruption in service. • Secured data storage or transmission. • Temporary endeavor to achieve a goal. • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
Electronics 2025-03-05
Across
- – Network of interconnected devices communicating via the internet.
- – Field focused on designing and building robots.
- – Board that connects electronic components.
- – Technology that uses radio waves for identification and tracking.
- – Energy sourced from nature, like solar or wind.
- – Type of system where software is built into hardware.
- – Advanced field of physics used for computing and cryptography.
- – Material used in electronic circuits, such as silicon.
- – Use of technology to perform tasks with minimal human intervention.
- – A small computer on a single chip, used in embedded systems.
- – Latest generation of mobile network technology.
Down
- – Communication without physical cables.
- – Low-level software controlling hardware functions.
- – A device that converts electrical signals into movement.
- – The practice of protecting computer systems from attacks.
- – Unmanned aerial vehicles used for various applications.
- – Computing closer to the data source to reduce latency.
- – A device that detects physical properties such as temperature or motion.
- – Engineering on a very tiny scale, atomic or molecular level.
- – The field of making machines "think" like humans.
20 Clues: – Communication without physical cables. • – Board that connects electronic components. • – Field focused on designing and building robots. • – Energy sourced from nature, like solar or wind. • – Latest generation of mobile network technology. • – The field of making machines "think" like humans. • – Low-level software controlling hardware functions. • ...
Satria briant ardinata (33) kelas XF 2025-04-29
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
TTS19 X_D 2025-04-15
Across
- Pengembang perangkat lunak.
- Pelanggaran hak cipta disebut juga.
- Cerita rakyat yang bisa dibuat animasi digital.
- Penyebaran informasi secara digital.
- Hak atas penemuan atau inovasi teknologi.
- Operator pencarian untuk dua kata kunci sekaligus.
- Orang yang memperbaiki dan merawat jaringan komputer.
- Hak milik atas ciptaan lagu, buku, dan karya seni.
- Informasi palsu yang disebarkan untuk menipu.
- Lembaga yang mengatur HAKI di Indonesia.
Down
- Syntax untuk mencari di situs tertentu
- Proses mengecek kebenaran informasi sebelum membagikannya.
- Alat musik khas Jawa Barat.
- Pengelola dan penganalisis data dalam skala besar.
- Ahli dalam membuat sistem keamanan digital.
- Perilaku kasar atau menghina di media sosial.
- Seni tradisional yang bisa dijadikan konten edukatif.
- Kata untuk mengecualikan hasil pencarian.
- Proses membuat konten digital.
- Mesin pencari paling populer.
- Profesi yang merancang antarmuka pengguna.
- Lembaga yang mengawasi konten siaran di Indonesia.
- Penyebaran kebencian berbasis SARA di internet.
- Simbol atau logo dagang yang dilindungi hukum.
- Tanda yang digunakan untuk mencari frasa lengkap.
25 Clues: Alat musik khas Jawa Barat. • Pengembang perangkat lunak. • Mesin pencari paling populer. • Proses membuat konten digital. • Pelanggaran hak cipta disebut juga. • Penyebaran informasi secara digital. • Syntax untuk mencari di situs tertentu • Lembaga yang mengatur HAKI di Indonesia. • Kata untuk mengecualikan hasil pencarian. • Hak atas penemuan atau inovasi teknologi. • ...
TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16
Across
- Alat untuk menyaring konten tidak pantas
- Proses mengecek kebenaran sebuah informasi
- Orang yang menulis dan mengembangkan kode
- Simbol untuk mencari frasa tepat
- Pekerjaan yang menganalisis dan mengolah data besar
- Syntax untuk membatasi pencarian ke situs tertentu
- Direktorat di bawah Kemenkumham yang mengurus HAKI
- Perlindungan atas penemuan teknologi
- Istilah untuk penyebaran konten ke publik
Down
- Profesi bidang keamanan data dan jaringan
- Singkatan dari Hak atas Kekayaan Intelektual
- Berita palsu yang menyesatkan publik
- Konten berisi kebencian atau diskriminasi
- Lembaga negara pengawas konten digital
- Operator untuk alternatif kata
- Proses membuat media seperti video atau gambar digital
- Tindakan menyalin karya tanpa izin
- Syntax untuk mencari dokumen tertentu seperti PDF
- Istilah singkat untuk pengembang situs web
- Jenis HAKI yang melindungi nama dagang
- Platform media sosial populer untuk video pendek
- Unsur budaya lokal yang bisa diangkat ke konten digital
- Jenis tarian daerah yang bisa dijadikan konten
- Profesi yang fokus ke tampilan dan pengalaman pengguna
- Operator untuk mengecualikan istilah dari pencarian (simbol)
25 Clues: Operator untuk alternatif kata • Simbol untuk mencari frasa tepat • Tindakan menyalin karya tanpa izin • Berita palsu yang menyesatkan publik • Perlindungan atas penemuan teknologi • Lembaga negara pengawas konten digital • Jenis HAKI yang melindungi nama dagang • Alat untuk menyaring konten tidak pantas • Profesi bidang keamanan data dan jaringan • ...
TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16
Across
- Alat untuk menyaring konten tidak pantas
- Proses mengecek kebenaran sebuah informasi
- Orang yang menulis dan mengembangkan kode
- Simbol untuk mencari frasa tepat
- Pekerjaan yang menganalisis dan mengolah data besar
- Syntax untuk membatasi pencarian ke situs tertentu
- Direktorat di bawah Kemenkumham yang mengurus HAKI
- Perlindungan atas penemuan teknologi
- Istilah untuk penyebaran konten ke publik
Down
- Profesi bidang keamanan data dan jaringan
- Singkatan dari Hak atas Kekayaan Intelektual
- Berita palsu yang menyesatkan publik
- Konten berisi kebencian atau diskriminasi
- Lembaga negara pengawas konten digital
- Operator untuk alternatif kata
- Proses membuat media seperti video atau gambar digital
- Tindakan menyalin karya tanpa izin
- Syntax untuk mencari dokumen tertentu seperti PDF
- Istilah singkat untuk pengembang situs web
- Jenis HAKI yang melindungi nama dagang
- Platform media sosial populer untuk video pendek
- Unsur budaya lokal yang bisa diangkat ke konten digital
- Jenis tarian daerah yang bisa dijadikan konten
- Profesi yang fokus ke tampilan dan pengalaman pengguna
- Operator untuk mengecualikan istilah dari pencarian (simbol)
25 Clues: Operator untuk alternatif kata • Simbol untuk mencari frasa tepat • Tindakan menyalin karya tanpa izin • Berita palsu yang menyesatkan publik • Perlindungan atas penemuan teknologi • Lembaga negara pengawas konten digital • Jenis HAKI yang melindungi nama dagang • Alat untuk menyaring konten tidak pantas • Profesi bidang keamanan data dan jaringan • ...
TEMA 2 2025-10-27
Across
- Aktivitas menonton, bermain, atau berkomunikasi melalui internet.
- Profesi baru yang muncul karena adanya media sosial.
- menjual dan membeli produk secara online.
- Istilah untuk kecerdasan buatan yang membantu otomatisasi bisnis.
- Layanan perbankan yang dapat diakses secara daring.
- Teknologi yang digunakan untuk mencatat transaksi kripto.
Down
- Sistem perdagangan yang dilakukan melalui internet.
- Sistem keamanan untuk melindungi data digital.
- Istilah untuk kegiatan promosi melalui media digital.
- Transaksi jual beli melalui aplikasi smartphone.
- Mata uang digital yang tidak memiliki bentuk fisik.
- Alat pembayaran digital yang banyak digunakan di ponsel.
- Bentuk uang elektronik yang diterbitkan oleh bank atau fintech.
- Pasar global tanpa batas yang diciptakan oleh internet.
- tempat menonton video digital, misalnya YouTube.
- Jenis pekerjaan yang bisa dilakukan dari rumah dengan bantuan internet.
- Perusahaan yang berbasis teknologi digital seperti Gojek atau Tokopedia.
- Teknologi penyimpanan data melalui internet.
- Istilah untuk data dalam jumlah besar yang diolah untuk bisnis.
- Proses perubahan dari sistem ekonomi tradisional ke sistem berbasis teknologi.
20 Clues: menjual dan membeli produk secara online. • Teknologi penyimpanan data melalui internet. • Sistem keamanan untuk melindungi data digital. • Transaksi jual beli melalui aplikasi smartphone. • tempat menonton video digital, misalnya YouTube. • Sistem perdagangan yang dilakukan melalui internet. • Mata uang digital yang tidak memiliki bentuk fisik. • ...
Wedding 2026-02-06
Across
- What does the Alexis do as a career?
- what is the Marcus' career?
- What is the nickname Lexi's family calls her?
- Who is the bride's favorite musical artist?
- What is the groom's cat's name?
- Where was the couple's first date?
- What is the groom's line name?
- What is the bride's cat's name?
- Where did the groom go to high school?
- Where is Marcus' hometown?
- What country did the couple visit in June 2025?
- what is the bride's middle name?
Down
- What college did the bride earn her FIRST degree from?
- Where did the bride go to high school?
- What is the bride's favorite cocktail?
- What is the groom's favorite cocktail?
- Where did the groom go to college?
- What is Marcus' nickname?
- Where was couple's first trip together?
- What month did the groom propose?
- What is the couple's goddaughter's name?
- Where can you usually find the groom?
- Where is the Lexi's hometown?
- How many years have the couple been together
24 Clues: What is Marcus' nickname? • Where is Marcus' hometown? • what is the Marcus' career? • Where is the Lexi's hometown? • What is the groom's line name? • What is the groom's cat's name? • What is the bride's cat's name? • what is the bride's middle name? • What month did the groom propose? • Where did the groom go to college? • Where was the couple's first date? • ...
Technology 2024-11-25
5 Clues: Advanced technology • Old-fashioned or no longer in use • Protecting online data and systems • A discovery that changes understanding • A place to connect and share content online
"Business Tech Brain Teaser" 2025-04-02
Across
- Using AI and software to perform tasks automatically
- The use of online payment systems in business
- The process of storing and accessing data over the internet
Down
- A system that helps businesses make smarter choices using data
- Digital tools that help businesses grow and operate
- The use of technology to protect business data
- The selling of goods and services online
- Online business that includes more than just sales
8 Clues: The selling of goods and services online • The use of online payment systems in business • The use of technology to protect business data • Digital tools that help businesses grow and operate • Online business that includes more than just sales • Using AI and software to perform tasks automatically • The process of storing and accessing data over the internet • ...
"Business Tech Brain Teaser" 2025-04-02
Across
- business that includes more than just sales
- tools that help businesses grow and operate
- use of online payment systems in business
Down
- process of storing and accessing data over the internet
- selling of goods and services online
- AI and software to perform tasks automatically
- system that helps businesses make smarter choices using data
- use of technology to protect business data
8 Clues: selling of goods and services online • use of online payment systems in business • use of technology to protect business data • business that includes more than just sales • tools that help businesses grow and operate • AI and software to perform tasks automatically • process of storing and accessing data over the internet • ...
Cybersecurity Fundamental Chapter 1 2022-11-29
Across
- Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
- group of criminals breaks into computers or networks to gain access for various reasons.
- Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- The Honeynet project is an example of creating Early Warning Systems.
Down
- great businesses have been created by collecting and harnessing the power of data and data analytics.
- InfraGard is an example of wide spread sharing of cyber intelligence.
- hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
- Business large and small have recognized the power of big data and data analytics.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence. • The Honeynet project is an example of creating Early Warning Systems. • Business large and small have recognized the power of big data and data analytics. • group of criminals breaks into computers or networks to gain access for various reasons. • ...
Cybersecurity Crossword Challenge 2024-09-08
Across
- Software that secretly monitors user activity and collects personal information.
- A technique where a fake email or website is used to look like a trusted source.
- Software designed to harm or exploit any device it infects.
- When sensitive information is exposed due to a cyberattack or leak.
- A scam where attackers trick you into sharing personal information.
- A network security system that monitors and controls incoming and outgoing traffic.
Down
- Malware that locks your files and demands payment.
- A tool that encrypts your internet connection, often used for secure browsing.
- The process of scrambling data to keep it secure from unauthorized access.
9 Clues: Malware that locks your files and demands payment. • Software designed to harm or exploit any device it infects. • When sensitive information is exposed due to a cyberattack or leak. • A scam where attackers trick you into sharing personal information. • The process of scrambling data to keep it secure from unauthorized access. • ...
Cybersecurity Best Practices 2024-11-08
Across
- A security practice of regularly backing up important data.
- A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock.
- A security measure that protects against unauthorized access to a network.
- A security practice of regularly updating software and systems.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible
Down
- A malicious software.
- A technique used to trick someone into revealing sensitive information.
- A security measure that prevents unauthorized access to data & systems.
- A security measure that hides data to make it unreadable.
9 Clues: A malicious software. • A security measure that hides data to make it unreadable. • A security practice of regularly backing up important data. • A security practice of regularly updating software and systems. • A technique used to trick someone into revealing sensitive information. • A security measure that prevents unauthorized access to data & systems. • ...
Intro- Cybersecurity Crossword 2026-01-23
Across
- Computer users and resources within a geographic area the size of a metropolitan area that are connected.
- A local or restricted communications network, especially a private network created using World Wide Web software.
- A collection of many networks owned by many entities that share information and communicate together.
- The term used to describe how devices are connected and how messages flow from device to device. The physical topology describes the way the network is wired. The logical topology describes the way messages are sent.
Down
- __address The portion of the IP address that identifies the network the device is assigned to.
- An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.
- A group of computers and associated devices that share a common communications line or wireless link, typically to a server.
- An address that identifies the network and host address assigned to a device.
- A network that connects several LANs. WANs are often limited to a corporation or an organization but are sometimes accessible to the public.
9 Clues: An address that identifies the network and host address assigned to a device. • __address The portion of the IP address that identifies the network the device is assigned to. • A collection of many networks owned by many entities that share information and communicate together. • ...
C CROSSWORD 2014-02-26
Across
- a common
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- for a party arranged at
- The squad diffused the bomb and saved everyone . They all came back home .
Down
- annoyed to see the party hall empty.The members realized that
- location. When reached, the invitees were
- The enrolled members of "CYBERSECURITY CLUB" were called
- they all had received a prank call.
- Twice to their surprise they found a paper unknowingly left
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
Scsu 2023-08-11
Across
- refers to act of hiding the ip address to miss lead the target
- refers to the act of monitoring user commanicetion without consent
- insuring the infomation staya in it origanal from and present modified over a network
- attack is techingave used by attackers
Down
- insuring that your system stays available to pletform its metendet funetion when required
- securing your information only authoritht person will be access
- unsolicited bulk mails
- zombies computer
- a small software design to hide files
- a protection of your cyber or digital assets or information system from attackrs
10 Clues: zombies computer • unsolicited bulk mails • a small software design to hide files • attack is techingave used by attackers • refers to act of hiding the ip address to miss lead the target • securing your information only authoritht person will be access • refers to the act of monitoring user commanicetion without consent • ...
digital communications 2025-05-01
Across
- A set of related web pages located under a single domain name
- 1's and 0's
- The physical parts of a computer
- a communication method that uses electronic devices to deliver messages across computer networks
- the protection of computer systems
Down
- an emerging technology
- A global network made up of billions of electronic devices
- Information that can be interpreted and used by computers
- a set of computers sharing resources with one an other
- A set of instructions, data or programs used to operate computers and execute specific tasks
10 Clues: 1's and 0's • an emerging technology • The physical parts of a computer • the protection of computer systems • a set of computers sharing resources with one an other • Information that can be interpreted and used by computers • A global network made up of billions of electronic devices • A set of related web pages located under a single domain name • ...
Technology 2025-11-13
Across
- Existing in digital form or simulated by software rather than physical reality
- brain of the computer
- Software designed to damage
- the physical parts of a computer
- A newer version of software or data that improves or fixes issues
Down
- An unmanned aerial vehicle controlled remotely or autonomously
- A step-by-step set of instructions for solving a problem
- The practice of protecting systems and data from digital attacks
- A computer that provides data or services to other computers over a network
- Interface allowing programs to talk to each other
10 Clues: brain of the computer • Software designed to damage • the physical parts of a computer • Interface allowing programs to talk to each other • A step-by-step set of instructions for solving a problem • An unmanned aerial vehicle controlled remotely or autonomously • The practice of protecting systems and data from digital attacks • ...
Cybersecurity Fundamentals Chapter 7 2022-10-27
Across
- tool used to protect data stored in the forms of files.
- prevent rogue access point, it is also known as two-way authentication.
- transforms data using a complicated algorithm to make it unreadable.
- the stages of an information systems attack.
- consist of permissions that limits folder or file access for an individual or for a group of users.
- one of the most effective ways of protecting against data lost.
- protects computers and mobile devices using reputable software
Down
- patches are codes that manufacturers provide to prevent a newly discovered virus or worm from making successful attack.
- locks physically protecting computer equipment.
- uses radio wave to identify and track objects.
- it freezes the hard disk partition, does not save any changes that the user makes.
- idle timeout and screen lock.
- copies the contents of the computer's hard disk to an image file.
13 Clues: idle timeout and screen lock. • the stages of an information systems attack. • uses radio wave to identify and track objects. • locks physically protecting computer equipment. • tool used to protect data stored in the forms of files. • protects computers and mobile devices using reputable software • one of the most effective ways of protecting against data lost. • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- This security tool identified and removes malicious programs
- The individuals who control access to people, data, and systems
- This attack occurs when cybercriminals research and track which sites employees visit the most
- What should you do when a workstation or device is no longer in use
- Any scenario that triggers emotions should also trigger your __________
Down
- Stealing money is the main goal behind this type of malware
- Failure to run these equals failure to patch security vulnerabilities
- You can help fight cybercrime by becoming a ________________
- ____are the last line of defense
- Kwiktrip's password policy requires that coworkers change their passwords _____days
- The future of security is____,not machines
- This attack occurs when someone sneaks into a secured area behind someone else
- This dangerous attack targets specific people or organization, often with custom made email or messages
- These are designed to maintain the security of everyone associated with an organization
14 Clues: ____are the last line of defense • The future of security is____,not machines • Stealing money is the main goal behind this type of malware • You can help fight cybercrime by becoming a ________________ • This security tool identified and removes malicious programs • The individuals who control access to people, data, and systems • ...
ESLA Cybersecurity NATHAN COMPAGNON 2025-11-24
Across
- an information object (like a word) that points to related information that is located elsewhere and can be retrieved by activating the link.
- It's an ICMP message sent to determine if the machine you sent it too is online and how long traffic is.
- it's a challenge-response test commonly used by websites to verify the user is a real human
- range of frenquencies used to transmit a signal.
- It's the process of taking off one layer of headers and passing the rest of the packet up to the next higher layer on the protocol stack.
Down
- it's a kind of spyware software that records every keystroke made on a computer’s keyboard
- Discreet access placed illicitly in a system or software, making it possible to bypass legitimate access control
- Broadcasting from one host to a given set of hosts.
- A program which is often started at the time the system boots and runs continuously without intervention from users on the system.
- it's an elementary building block of a digital circuit.
- Software making revenues by displaying ads in webpages
- An algorithm that uses cryptography it include encryption, cryptographic, digital signature and key agreement algorithms.
- An attack that sends an improperly large ping with the intent of overflowing the input buffers and causing it to crash.
13 Clues: range of frenquencies used to transmit a signal. • Broadcasting from one host to a given set of hosts. • Software making revenues by displaying ads in webpages • it's an elementary building block of a digital circuit. • it's a kind of spyware software that records every keystroke made on a computer’s keyboard • ...
Cybersecurity Awareness Month 2024-05-07
Across
- The practice of accessing a computer or network without authorization.
- Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
- A technique used to verify the identity of a user by requiring two different forms of authentication.
- A unique string of characters used to authenticate a user's identity.
Down
- A program designed to prevent unauthorized access to or from a private network.
- Malicious software designed to gain unauthorized access to a computer system.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- A piece of software designed to block access to a computer system until a sum of money is paid.
- A method of protecting sensitive data by converting it into an unreadable format.
9 Clues: A unique string of characters used to authenticate a user's identity. • The practice of accessing a computer or network without authorization. • Malicious software designed to gain unauthorized access to a computer system. • A program designed to prevent unauthorized access to or from a private network. • ...
Digital Awareness 2024-10-21
Across
- A harmful software that replicates itself to spread to other computers
- The act of protecting personal information online
- A program designed to damage or disrupt systems
Down
- A global system of interconnected computer networks
- A unique string of characters used to access a computer or network
- Unsolicited email, often sent in bulk
- A software application for accessing information on the web
7 Clues: Unsolicited email, often sent in bulk • A program designed to damage or disrupt systems • The act of protecting personal information online • A global system of interconnected computer networks • A software application for accessing information on the web • A unique string of characters used to access a computer or network • ...
Cybersecurity Awareness Month 2024-05-06
Across
- The practice of accessing a computer or network without authorization.
- Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
- A technique used to verify the identity of a user by requiring two different forms of authentication.
- A unique string of characters used to authenticate a user's identity.
Down
- A program designed to prevent unauthorized access to or from a private network.
- Malicious software designed to gain unauthorized access to a computer system.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- A piece of software designed to block access to a computer system until a sum of money is paid.
- A method of protecting sensitive data by converting it into an unreadable format.
9 Clues: A unique string of characters used to authenticate a user's identity. • The practice of accessing a computer or network without authorization. • Malicious software designed to gain unauthorized access to a computer system. • A program designed to prevent unauthorized access to or from a private network. • ...
Cybersecurity Crossword Puzzle 2023-05-15
Across
- It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
- is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
- -factor authentication is a second layer of security that protects our networks from cyber-attack.
- Alert Button We report phishing by using the
- threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
- is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
- Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
- such as curiosity, urgency, greed, and fear are used in phishing emails.
- can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.
9 Clues: Alert Button We report phishing by using the • such as curiosity, urgency, greed, and fear are used in phishing emails. • -factor authentication is a second layer of security that protects our networks from cyber-attack. • can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data. • ...
CROSSWORD ANGEL VILLAMIL 2022-05-04
Across
- It is the practice of defending an organization from risks, threats and vulnerabilities.
- set of programs that allow the computer to perform different tasks.
- Facts collected about a topic or item.
- A set of activities that follow a sequence.
Down
- Physical elements that make up a computer.
- is the combination of the data.
- is a global computer network.
7 Clues: is a global computer network. • is the combination of the data. • Facts collected about a topic or item. • Physical elements that make up a computer. • A set of activities that follow a sequence. • set of programs that allow the computer to perform different tasks. • It is the practice of defending an organization from risks, threats and vulnerabilities.
CURRENT ISSUE PUZZLE 2023-03-18
Across
- Factor affecting generation gap
- Security human resource technology
- Key point of talent management
Down
- Cultural difference in the workplace
- Someone uses a computer system or network in a bad way to get secret information or cause harm to the system
- Bully but virtual
- Unauthorized interception of phone conversations with the aim of listening in on what is being said.
7 Clues: Bully but virtual • Key point of talent management • Factor affecting generation gap • Security human resource technology • Cultural difference in the workplace • Unauthorized interception of phone conversations with the aim of listening in on what is being said. • ...
CIA Triad Crossword 2025-12-11
Across
- This is the digit that you will need for the falcons code for this puzzle.
- Ensuring sensitive information is kept private and only accessed by authorized individuals
- Ensuring that information and systems are accessible to authorized users whenever they are needed
Down
- Keeping data intact
- Data at rest
- Data in transit
- Acronym for the triad that embodies cybersecurity
7 Clues: Data at rest • Data in transit • Keeping data intact • Acronym for the triad that embodies cybersecurity • This is the digit that you will need for the falcons code for this puzzle. • Ensuring sensitive information is kept private and only accessed by authorized individuals • ...
networks 2026-02-12
Across
- for transmitting a signal.
- cable: high-speed networking cable containing
- cable is the standard, physical cable used toconnec devices—like computers,
- label assigned to every device
- to briefly restate or condense the main points
- of glass or plastic fibres
- range of frequencies within a given band, in particular that
- refers to the time delay between a cause and its observed effec
Down
- of activity from which other parts radiate.
- s a hardware device that acts as a bridge between your home network
- the foundational cybersecurity process ofconverting readable information
- is a company or organization that provides individuals, households, and businesseswith access to the internet and related services
- user that requests and consumes services
- phonebook of the internet
- points a networking hardware device that all wireless-capable devices
- is a group of connected computing devices
16 Clues: phonebook of the internet • for transmitting a signal. • of glass or plastic fibres • label assigned to every device • user that requests and consumes services • is a group of connected computing devices • of activity from which other parts radiate. • cable: high-speed networking cable containing • to briefly restate or condense the main points • ...
Digital Citizenship 2025-05-12
Across
- Turning information into code to prevent unauthorized access
- Representing data in charts or graphs to understand it better
- The field that analyzes and interprets large sets of data
- Platforms for sharing and interacting with others online
- Gathering and measuring information
- A set of steps or rules used to solve a problem
- A trick used in emails or messages to steal personal information
- Using the internet to access and store data remotely
Down
- The right to keep personal information safe
- Responsible and respectful behavior when using technology
- Legally testing systems for vulnerabilities to improve security
- Machines performing tasks that require human intelligence
- Protection of computer systems and data from digital attacks
- The ability to navigate and use digital tools effectively
- The trail of data left behind by online activity
- Stealing someone's personal information for fraud
16 Clues: Gathering and measuring information • The right to keep personal information safe • A set of steps or rules used to solve a problem • The trail of data left behind by online activity • Stealing someone's personal information for fraud • Using the internet to access and store data remotely • Platforms for sharing and interacting with others online • ...
Cybersecurity Fundamentals Chapter 5 2024-06-05
Across
- Digital certificates are used to establish the identity of an entity (person, organization, or device) in online communications.
- Verifies that the data entered into a system conforms to expected formats and types, helping prevent common database attacks that involve injecting malformed data
- Methods and processes to ensure that data remains accurate, consistent, and reliable throughout its lifecycle.
- **: Identifies patterns in data that do not conform to expected behavior.
- Cryptographic methods used to validate the authenticity and integrity of a message, software, or digital document.
- The processes and rules applied to maintain the integrity of data within a database.
- Maintains the consistency of relationships between tables.
Down
- Mechanisms to ensure correct data entry into systems.
- Checks that data falls within specified parameters, ensuring completeness, accuracy, and consistency.
- Custom rules defined by users to meet specific data integrity requirements that are not covered by the other types of integrity rules
- Ensures that each row in a table has a unique identifier, typically a primary key, which uniquely identifies each entity in the table
- Ensures that data in a column adheres to a defined set of valid values.
- Techniques used to ensure data integrity by converting data into a fixed-length hash value.
13 Clues: Mechanisms to ensure correct data entry into systems. • Maintains the consistency of relationships between tables. • Ensures that data in a column adheres to a defined set of valid values. • **: Identifies patterns in data that do not conform to expected behavior. • The processes and rules applied to maintain the integrity of data within a database. • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : The practice of protecting devices and data from cyber threats
- : Bullying someone online through messages or social media
- : A system that blocks unauthorized access to or from a private network
- : Fake messages that try to steal passwords or bank info
Down
- : People who use the internet or computers to commit crimes
- : A harmful program that can damage files and software
- : Breaking into someone’s computer or account without permission
- : Criminal activities done using computers or the internet
- : Software that protects your computer from viruses
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
CyberSecurity: Ch. 7 2022-11-30
Across
- unsolicited email sent to large groups
- one who accesses internet without permission
- malicious software
- acts involving a computing device on the internet
Down
- blocks unauthorized access
- connect to wifi without owner's permission
- a small text file to store personal info
- software that tracks your activity without your knowledge
- a collection of zombie computers
9 Clues: malicious software • blocks unauthorized access • a collection of zombie computers • unsolicited email sent to large groups • a small text file to store personal info • connect to wifi without owner's permission • one who accesses internet without permission • acts involving a computing device on the internet • software that tracks your activity without your knowledge
Information and Cyber Security 2022-10-21
Across
- 560,000 pieces of … are detected every day
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Anti- ...
- These attacks typically target a CEO, CFO, or any CXX
- UK cyber crime has … in the past 5 years
Down
- What type of attacks are on the rise
- What BHSF does to train colleagues to look out for phishing attacks
- The key to securing your accounts
- Time it takes a hacker to brute force a 6 character password
- The term used for a broad range of malicious activities accomplished through human interactions
- Virtual Private …
- Hackers demanded this company cancel the planned release of a film
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
TECHNOLOGY 1 2025-04-14
Across
- The practice of storing and accessing data and applications over the internet
- AI
- A global network of interconnected computers
- A set of instructions for a computer to follow
- A person who fears or dislikes technology
- Technology that can be used on portable devices
- A group of interconnected computers and other devices
Down
- The protection of computer systems and networks from unauthorized access or use
- To introduce something new or different
- The application of scientific knowledge for practical purposes, especially in industry
- The programs and instructions that tell a computer what to do
- A person who is enthusiastic about new technology
- Buying and selling goods and services online
- The physical components of a computer or other electronic device
- The process of extracting useful information from large amounts of data
15 Clues: AI • To introduce something new or different • A person who fears or dislikes technology • A global network of interconnected computers • Buying and selling goods and services online • A set of instructions for a computer to follow • Technology that can be used on portable devices • A person who is enthusiastic about new technology • ...
ICT: You & Your Data 2023-01-17
Across
- you should always keep your __________ to youself.
- all the social media company have this policy.
- one of social media company owned by Mark Zuckerberg
Down
- created when that data has been processed and becomes meaningful.
- Any company might hold your ___________ information that you have in your account.
- a practive of protecting systems,networks & programs from digital attacks.
- raw facts and figures.
- We should __________ our password once a month.
- You have the ________ to find out what information the government & other organisations store about you.
9 Clues: raw facts and figures. • all the social media company have this policy. • We should __________ our password once a month. • you should always keep your __________ to youself. • one of social media company owned by Mark Zuckerberg • created when that data has been processed and becomes meaningful. • ...
Welcome to Data Privacy Week! 2024-12-19
Across
- centers on the right to protect personal information online
- We are __________ and will join together to celebrate Data Privacy Week
- name, address, phone number, DOB, SSN
Down
- this is one reason why data privacy matters
- protecting data from hacking, malware and online threats
- do this to permissions like location, camera or microphone unless needed
- do this before clicking "allow" on any data requests
- these can collect data even if you aren't using them
- periodically check your privacy settings this often
9 Clues: name, address, phone number, DOB, SSN • this is one reason why data privacy matters • periodically check your privacy settings this often • do this before clicking "allow" on any data requests • these can collect data even if you aren't using them • protecting data from hacking, malware and online threats • centers on the right to protect personal information online • ...
YORK Chiller Access Manager 2025-04-17
Across
- Access level CHASE users use for software testing.
- Used on the login screen of the control panel to represent the serial number.
- 1st control panel to be released with YCAM.
- Majority of access codes are for this level.
- Quarterly communication for registered users.
Down
- YCAM dashboards can be accessed from this platform.
- 3rd party certification for our products to recognize efforts around cybersecurity.
- This new access level falls between Standard and Service.
- Allows users to view what changes were made in the control panel.
9 Clues: 1st control panel to be released with YCAM. • Majority of access codes are for this level. • Quarterly communication for registered users. • Access level CHASE users use for software testing. • YCAM dashboards can be accessed from this platform. • This new access level falls between Standard and Service. • ...
PTS INFORMATIKA 2023-09-27
Across
- Kemampuan untuk memecah masalah menjadi bagian yang lebih kecil.
- Praktik menyimpan data di lokasi yang berbeda sebagai tindakan keamanan.
- Model bisnis yang melibatkan penjualan produk dan layanan secara online.
- Praktik dan teknologi yang melindungi sistem komputer dari ancaman.
- Jaringan global yang menghubungkan jaringan komputer.
- Langkah-langkah terstruktur untuk menyelesaikan masalah.
Down
- Model komputasi yang menggabungkan sumber daya dari banyak
- Situs web yang memungkinkan pengguna berbagi informasi secara online.
- Model komputasi yang memungkinkan akses ke sumber daya melalui PATTERNRECOGNITION Kemampuan untuk mengidentifikasi pola dalam data atau masalah.
9 Clues: Jaringan global yang menghubungkan jaringan komputer. • Langkah-langkah terstruktur untuk menyelesaikan masalah. • Model komputasi yang menggabungkan sumber daya dari banyak • Kemampuan untuk memecah masalah menjadi bagian yang lebih kecil. • Praktik dan teknologi yang melindungi sistem komputer dari ancaman. • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : Criminal activities done using computers or the internet
- : Bullying someone online through messages or social media
- : People who use the internet or computers to commit crimes
- : Fake messages that try to steal passwords or bank info
Down
- : Breaking into someone’s computer or account without permission
- : A harmful program that can damage files and software
- : The practice of protecting devices and data from cyber threats
- : A system that blocks unauthorized access to or from a private network
- : Software that protects your computer from viruses
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
