cybersecurity Crossword Puzzles

Homeland Security 2024-03-18

Homeland Security crossword puzzle
Across
  1. What department within Homeland Security deals with transportation security
  2. How many departments did the Homeland Security Act of 2002 combine
  3. What type of security does Homeland Security deal with when relating to the internet
  4. Acronym for department of homeland security
  5. What department within Homeland Security deals with emergency management
Down
  1. What is one Geographical Aspect Homeland Security Protects
  2. What kind of events does Homeland Security prepare for
  3. How would opposers of Homeland Security describe its strategy
  4. What Homeland Security was made to defend against

9 Clues: Acronym for department of homeland securityWhat Homeland Security was made to defend againstWhat kind of events does Homeland Security prepare forWhat is one Geographical Aspect Homeland Security ProtectsHow would opposers of Homeland Security describe its strategyHow many departments did the Homeland Security Act of 2002 combine...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : Bullying someone online through messages or social media
  2. : A harmful program that can damage files and software
  3. : People who use the internet or computers to commit crimes
  4. : Software that protects your computer from viruses
Down
  1. : The practice of protecting devices and data from cyber threats
  2. : Fake messages that try to steal passwords or bank info
  3. : Criminal activities done using computers or the internet
  4. : A system that blocks unauthorized access to or from a private network
  5. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Bullying someone online through messages or social media: Criminal activities done using computers or the internet: People who use the internet or computers to commit crimes...

Cybersecurity Unit 1 Lesson 2 2022-12-02

Cybersecurity Unit 1 Lesson 2 crossword puzzle
Across
  1. Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
  2. A small local area network of computers and devices.
  3. Software that can stop malware from entering a network, computer, or device.
  4. Stores data that is in use.
  5. Software that runs on your computer, looking for many different types of malware from many different sources.
  6. Small text-based bits of information about your browser that a web server saves.
  7. Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
  8. All data on a computer.
  9. The arrangement of the various elements of a network.
  10. Executable files that are run by users.
  11. The systematic way to find specific web addresses and web pages.
Down
  1. A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
  2. A weakness in a system that allows an attacker to gain unauthorized access.
  3. A special kind of file that contains other files.
  4. A file that contains a collection of other files.
  5. Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
  6. Computer shared by multiple users across a network.
  7. An application file that is currently executing (also called running) in the operating system.
  8. An agreed-upon method for communication.

19 Clues: All data on a computer.Stores data that is in use.Executable files that are run by users.An agreed-upon method for communication.A special kind of file that contains other files.A file that contains a collection of other files.Computer shared by multiple users across a network.A small local area network of computers and devices....

Crossword - LCCI and Lilly 2021-11-25

Crossword - LCCI and Lilly crossword puzzle
Across
  1. New e-commerce added in LCCI's R&R platform
  2. Who heads commercial services in LCCI
  3. platform where you can submit bills for reimbursement
  4. what is the name of the building in Embassy Tech village that LCCI occupies
  5. critical foundation of Lilly’s ethics and compliance program
Down
  1. Which month was LCCI started in Bangalore
  2. how many employees were there at the start of LCCI
  3. Learning portal sponsored by LCCI for its employees
  4. Lilly unites caring with discovery to create medicines that make life better for people around the world.
  5. when was the cybersecurity month

10 Clues: when was the cybersecurity monthWho heads commercial services in LCCIWhich month was LCCI started in BangaloreNew e-commerce added in LCCI's R&R platformhow many employees were there at the start of LCCILearning portal sponsored by LCCI for its employeesplatform where you can submit bills for reimbursement...

C CROSSWORD 2014-02-26

C CROSSWORD crossword puzzle
Across
  1. location. When reached, the invitees were
  2. they all had received a prank call.
  3. annoyed to see the party hall empty.The members realized that
  4. The enrolled members of "CYBERSECURITY CLUB" were called
  5. Twice to their surprise they found a paper unknowingly left
Down
  1. by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
  2. They called the bomb squad and explained the bomb blast planned at 10' clk,
  3. for a party arranged at
  4. The squad diffused the bomb and saved everyone . They all came back home .
  5. a common

10 Clues: a commonfor a party arranged atthey all had received a prank call.location. When reached, the invitees wereThe enrolled members of "CYBERSECURITY CLUB" were calledTwice to their surprise they found a paper unknowingly leftannoyed to see the party hall empty.The members realized that...

technology 2024-07-18

technology crossword puzzle
Across
  1. - An electronic device for storing and processing data.
  2. - Programs and operating information used by a computer.
  3. - A global network connecting millions of computers.
  4. - An organized collection of data, generally stored and accessed electronically.
Down
  1. - A mobile phone with advanced features.
  2. - The practice of protecting systems, networks, and programs from digital attacks.
  3. - An input device with keys used to type characters.
  4. - A process or set of rules to be followed in problem-solving operations.
  5. - The branch of technology dealing with the design and application of robots.
  6. - A small electronic device or tool.

10 Clues: - A small electronic device or tool.- A mobile phone with advanced features.- An input device with keys used to type characters.- A global network connecting millions of computers.- An electronic device for storing and processing data.- Programs and operating information used by a computer....

msn policies 2025-03-25

msn policies crossword puzzle
Across
  1. speaking in behalf facebook, in order to commint phishing
  2. any type of data that can be used to identify a person
  3. If you invest in this business your money will increase in two hours.
  4. most popular high risk drug
  5. buying nudes from a minor
Down
  1. I cant see your shoulders and knees
  2. The way we should address "hormonal" in Spanish
  3. threaten when a nude pic is shared
  4. Did you ask little Jane to keep the chat a secret?
  5. be careful, in spanish sounds like "pan" but its pronunciation in brazil is...

10 Clues: buying nudes from a minormost popular high risk drugthreaten when a nude pic is sharedI cant see your shoulders and kneesThe way we should address "hormonal" in SpanishDid you ask little Jane to keep the chat a secret?any type of data that can be used to identify a personspeaking in behalf facebook, in order to commint phishing...

test 2025-04-02

test crossword puzzle
Across
  1. Agents must state this on every call with a patient
  2. Rachel Robinson
  3. Platform used to work patient accounts
  4. Where employees can access benefits, tax documents, and pay statements
  5. A library in REACH containing courses that employees can enroll themselves in
  6. Capio's space to recognize and celebrate one another through points and eCards
Down
  1. Cybersecurity training drama series
  2. A cyberattack where scammers trick individuals into revealing sensitive information, like passwords or financial details, by posing as trusted entities through deceptive messages or websites.
  3. Vice President Operations
  4. Capio's platform for encouraging health and wellness

10 Clues: Rachel RobinsonVice President OperationsCybersecurity training drama seriesPlatform used to work patient accountsAgents must state this on every call with a patientCapio's platform for encouraging health and wellnessWhere employees can access benefits, tax documents, and pay statements...

Nicrossword 2 2024-12-23

Nicrossword 2 crossword puzzle
Across
  1. State Wide Area Network to connect state administration offices.
  2. Software with source code that anyone can inspect, modify, and enhance.
  3. National Knowledge Network for connecting educational and research institutions.
  4. Protection against cyber threats and securing digital infrastructure.
  5. Extremely large data sets analyzed computationally to reveal patterns and trends.
Down
  1. A unique identification project by the Government of India.
  2. Unified Mobile Application for New-age Governance.
  3. An ICT solution for the management of hospital services.
  4. A paperless office solution by NIC for government departments.
  5. A nationwide communication network by NIC.

10 Clues: A nationwide communication network by NIC.Unified Mobile Application for New-age Governance.An ICT solution for the management of hospital services.A unique identification project by the Government of India.A paperless office solution by NIC for government departments.State Wide Area Network to connect state administration offices....

TEM-8 science and technology 2025-11-14

TEM-8 science and technology crossword puzzle
Across
  1. a set of rules for solving a problem in a finite number of steps
  2. the introduction of new ideas, methods, or products
  3. the protection of computer systems from theft or damage
  4. reality a computer-generated simulation of a 3D environment
  5. technology on an atomic or molecular scale
Down
  1. engineering the direct manipulation of an organism's genes
  2. a natural resource able to be replenished naturally
  3. the use of living organisms in technology and engineering
  4. able to be maintained at a certain rate without depletion
  5. the use of largely automatic equipment in a system of operation

10 Clues: technology on an atomic or molecular scalea natural resource able to be replenished naturallythe introduction of new ideas, methods, or productsthe protection of computer systems from theft or damagethe use of living organisms in technology and engineeringable to be maintained at a certain rate without depletion...

cbo crossword 1 2026-01-28

cbo crossword 1 crossword puzzle
Across
  1. : Services that facilitate payments and settlements
  2. : Central bank control of money supply and credit
  3. : Acting on behalf of customers in financial transactions
  4. : Difference between lending and deposit interest rates
  5. is the Management of Assessment, monitoring, and control of loan portfolios
Down
  1. Banks : Banks allowed full range of banking services
  2. is the Management function where availability of cash to meet obligations is ensured
  3. : Institutions serving low-income and unbanked groups
  4. : Protection of digital banking systems from threats
  5. is the Management function where mismatches between bank assets and liabilities is taken care of

10 Clues: : Central bank control of money supply and credit: Services that facilitate payments and settlementsBanks : Banks allowed full range of banking services: Protection of digital banking systems from threats: Institutions serving low-income and unbanked groups: Difference between lending and deposit interest rates...

2024 International Privacy Week 2023-12-18

2024 International Privacy Week crossword puzzle
Across
  1. What can be used to make inferences about your socioeconomic status, demographic information and preferences
  2. MCA stands for
  3. Take _____ of your data!
  4. Your name, birthdate, and SSN
Down
  1. NCA stands for
  2. Your right to keep your person and your information to yourself
  3. Focused on preventing and solving threats (i.e., hacking, malware, online scams)
  4. The week-long event for spreading awareness about online privacy
  5. The month Data Privacy Week occurs
  6. Rules, guidelines, and your own personal choices about who has access to your data, and how much access they have

10 Clues: NCA stands forMCA stands forTake _____ of your data!Your name, birthdate, and SSNThe month Data Privacy Week occursYour right to keep your person and your information to yourselfThe week-long event for spreading awareness about online privacyFocused on preventing and solving threats (i.e., hacking, malware, online scams)...

Artificial Intelligence Related to Information Technology 2025-01-07

Artificial Intelligence Related to Information Technology crossword puzzle
Across
  1. Step-by-step instructions, like a recipe for computers
  2. A big box of information a computer can look up quickly
  3. A machine that can do work for people
  4. The games or apps you use on a computer or tablet
  5. Computers talking to each other to share things
Down
  1. A big web where people share pictures, videos, and talk
  2. Keeping computers safe from bad guys online
  3. Smart computer thinking, like a robot brain
  4. A box that helps you play games, write, or find answers
  5. The parts of a computer you can touch, like the keyboard

10 Clues: A machine that can do work for peopleKeeping computers safe from bad guys onlineSmart computer thinking, like a robot brainComputers talking to each other to share thingsThe games or apps you use on a computer or tabletStep-by-step instructions, like a recipe for computersA big web where people share pictures, videos, and talk...

Crossword Puzzle #1 - Phishing Exposed! 2026-02-09

Crossword Puzzle #1 - Phishing Exposed! crossword puzzle
Across
  1. An Enterprise's portal that provides cybersecurity information to enhance security awareness of employees
  2. Also known as Two-Factor Authentication
  3. _ _ _ _ _ _ Engineering is tricking people to gain access
  4. Cyber _ _ _ _ _ _ is any malicious attempt to breach or gain unauthorized access to data
Down
  1. Impersonate a trusted source to deceive individuals or systems
  2. Suspicious messages designed to fool you into clicking, downloading, or giving information
  3. Unsolicited junk mail, often phishing related
  4. Common delivery method for phishing messages
  5. Is the chance that a threat will exploit a vulnerability and cause damage
  6. Login information sought by phishers

10 Clues: Login information sought by phishersAlso known as Two-Factor AuthenticationCommon delivery method for phishing messagesUnsolicited junk mail, often phishing related_ _ _ _ _ _ Engineering is tricking people to gain accessImpersonate a trusted source to deceive individuals or systems...

Syniverse Crossword 2025-12-03

Syniverse Crossword crossword puzzle
Across
  1. Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
  2. Using mobile service outside your home network
  3. Protecting networks and data from cyber threats
  4. Application to person messaging for OTPs, alerts, and notifications
  5. Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
  1. Delivery of texts and rich communications
  2. Final money movement between carriers after clearing
  3. Continuous advancement that keeps networks and businesses competitive
  4. Illicit or abusive use of telecom services
  5. Reconciling usage records between operators for billing

10 Clues: Delivery of texts and rich communicationsIllicit or abusive use of telecom servicesUsing mobile service outside your home networkProtecting networks and data from cyber threatsFinal money movement between carriers after clearingReconciling usage records between operators for billingApplication to person messaging for OTPs, alerts, and notifications...

Globalisation 2023-03-08

Globalisation crossword puzzle
Across
  1. I __ __ __ __ __ security software to protect against harmful cyberattacks.
  2. With the increase in foreign culture, local culture might be l __ __ __.
  3. H __ __ __ __ __ __ are people who illegally gain access to other people's computer systems.
  4. the interconnectedness of societies.
  5. C__ __ __ __ __ __ __ __ __ __ __ __ protects computers and electronic devices from cyberattacks.
Down
  1. I__ __ __ __ __ __ __ __ __ __ __ in technology contributes to Globalisation.
  2. Better economic situation can lead to b__ __ __ __ __ quality of life.
  3. Globalisation leads to economic, c__ __ __ __ __ __ __ and security impacts.
  4. Globalisation has i__ __ __ __ __ __ __ __ security threats.
  5. M__ __ __ __ __ phones have allowed us to connect with people faster.
  6. F __ __ __ __ __ __ culture has spread throughout the world, such as K-pop.
  7. G__ __ __ __ __ of Multinational Corporations (MNCs) is a factor that drives Globalisation.

12 Clues: the interconnectedness of societies.Globalisation has i__ __ __ __ __ __ __ __ security threats.M__ __ __ __ __ phones have allowed us to connect with people faster.Better economic situation can lead to b__ __ __ __ __ quality of life.With the increase in foreign culture, local culture might be l __ __ __....

Cyber Security Puzzle 2024-10-22

Cyber Security Puzzle crossword puzzle
Across
  1. The process of verifying the identity of a user
  2. A method of disguising data to protect it
  3. A device that helps protect networks by filtering traffic
  4. A breach where sensitive data is accessed unlawfully
  5. A malicious email designed to trick recipients
  6. A protocol used to send emails securely
Down
  1. A common form of malware that locks files
  2. A program that scans for vulnerabilities in systems
  3. A common cybersecurity measure that involves using complex passwords
  4. Software that detects and removes malware
  5. A type of attack where multiple systems are used to overwhelm a target
  6. A legal framework for data protection in the EU

12 Clues: A protocol used to send emails securelyA common form of malware that locks filesA method of disguising data to protect itSoftware that detects and removes malwareA malicious email designed to trick recipientsThe process of verifying the identity of a userA legal framework for data protection in the EU...

Кәмшат 2024-11-19

Кәмшат crossword puzzle
Across
  1. A cloud computing environment designed specifically for one organization?
  2. An infrastructure-as-a-service model?
  3. What is the process of software allocation of computer resources called?
  4. Protecting data and systems from cyber attacks?
  5. The process of automatically adjusting resources based on user demand?
Down
  1. Google's cloud storage service?
  2. A collection of key resources such as networks, servers, hardware?
  3. Special coding process to protect data?
  4. A software-as-a-service model?
  5. What is the process of protecting data from unauthorized access called?
  6. What is the level of service available to users?
  7. A service for hosting websites and applications on the Internet?

12 Clues: A software-as-a-service model?Google's cloud storage service?An infrastructure-as-a-service model?Special coding process to protect data?Protecting data and systems from cyber attacks?What is the level of service available to users?A service for hosting websites and applications on the Internet?...

bbb 2023-04-28

bbb crossword puzzle
Across
  1. requires less memory
  2. measure of correctness that is achieved in true prediction.
  3. Identifying similar groups of data in a dataset is called
  4. ls called blind algorithms
  5. if there is a relationship between the input variable and the output variable
Down
  1. machine learning models are trained without labelled data sets
  2. maps any given percept sequence to an action
  3. One of the AI application
  4. is a tabular summary of the number of correct and incorrect predictions made by a classifier
  5. measures how often the classifier makes the correct prediction

10 Clues: requires less memoryOne of the AI applicationls called blind algorithmsmaps any given percept sequence to an actionIdentifying similar groups of data in a dataset is calledmeasure of correctness that is achieved in true prediction.machine learning models are trained without labelled data sets...

C CROSSWORD 2014-02-26

C CROSSWORD crossword puzzle
Across
  1. The enrolled members of "CYBERSECURITY CLUB" were called
  2. they all had received a prank call.
  3. annoyed to see the party hall empty.The members realized that
  4. location. When reached, the invitees were
  5. The squad diffused the bomb and saved everyone . They all came back home .
  6. a common
Down
  1. for a party arranged at
  2. They called the bomb squad and explained the bomb blast planned at 10' clk,
  3. by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
  4. Twice to their surprise they found a paper unknowingly left

10 Clues: a commonfor a party arranged atthey all had received a prank call.location. When reached, the invitees wereThe enrolled members of "CYBERSECURITY CLUB" were calledTwice to their surprise they found a paper unknowingly leftannoyed to see the party hall empty.The members realized that...

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
  3. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  4. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
  1. Jenis Informasi yang merupakan informasi pengetahuan umum
  2. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  3. Prinsip Keamanan Informasi agar akurat
  4. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  5. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  6. Perangkat lunak yang diciptakan untuk merusak sistem computer

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

Technology 2023-08-24

Technology crossword puzzle
Across
  1. Wireless technology that enables data transfer between devices.
  2. Online method of watching videos or listening to audio without downloading i.e., real time digital content.
  3. Secret combination used to access digital accounts.
Down
  1. Mathematical recipe used to solve complex tasks efficiently.
  2. Process of creating instructions for computers to execute tasks.
  3. Practices and technologies used to safeguard digital information from attacks.
  4. Global navigation system that provides location and navigation information.
  5. Malicious software that spreads and infects digital systems.
  6. Computer-based systems that mimic human intelligence.
  7. Money capital of India.

10 Clues: Money capital of India.Secret combination used to access digital accounts.Computer-based systems that mimic human intelligence.Mathematical recipe used to solve complex tasks efficiently.Malicious software that spreads and infects digital systems.Wireless technology that enables data transfer between devices....

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

soal 4.0 2023-10-24

soal 4.0 crossword puzzle
Across
  1. salah satu teknologi di industri 4.0 yang sangat berguna saat ini
  2. Alat Iot yang kegunaanya memudahkan dirumah
  3. Teknologi inti dari Industri 4.0
  4. Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
  5. Data besar yang kompleks yang dianalisis dalam industri 4.0
  6. Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
  1. Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
  2. Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
  3. Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
  4. Revolusi industri saat ini

10 Clues: Revolusi industri saat iniTeknologi inti dari Industri 4.0Alat Iot yang kegunaanya memudahkan dirumahData besar yang kompleks yang dianalisis dalam industri 4.0salah satu teknologi di industri 4.0 yang sangat berguna saat iniAlat atau kebijakan yang berguna untuk melindungi lingkungan cyber...

Office Management 2025-10-12

Office Management crossword puzzle
Across
  1. The programs and operating information used by a computer.
  2. Distinctive attributes or characteristics.
  3. The state of keeping or being kept secret or private.
  4. The process of entrusting a task or responsibility to a subordinate.
  5. A system or organization where people are ranked by status or authority.
  6. room or building used for commercial or professional work.
  7. The process of making plans for something.
Down
  1. Protecting networks and data from unauthorized use.
  2. Computer systems able to perform tasks normally requiring human intelligence.
  3. The fact or quality of being on time.

10 Clues: The fact or quality of being on time.The process of making plans for something.Distinctive attributes or characteristics.Protecting networks and data from unauthorized use.The state of keeping or being kept secret or private.room or building used for commercial or professional work....

Career Focus 7 2025-12-10

Career Focus 7 crossword puzzle
Across
  1. The ability to move skills from one job to another
  2. In demand professional who builds applications or software systems
  3. What the trainee earns upon successful completion
  4. Type of program: A university preparation or bridging course
  5. National GTO with an Albury-Wodonga presence
  6. _____ LETTER A one-page letter sent with a resume
Down
  1. Critical skill needed for protecting digital assets
  2. The overall program of study you're enrolled in
  3. The capacity to adjust to a new work task or technology
  4. Formal training received at an RTO like TAFE (3 words)

10 Clues: National GTO with an Albury-Wodonga presenceThe overall program of study you're enrolled inWhat the trainee earns upon successful completion_____ LETTER A one-page letter sent with a resumeThe ability to move skills from one job to anotherCritical skill needed for protecting digital assetsFormal training received at an RTO like TAFE (3 words)...

IT Trivia 2022-07-18

IT Trivia crossword puzzle
Across
  1. ... word, excel, powerpoint, office
  2. measures taken to protect devices, networks, and data from unauthorized access and criminal use
  3. a program that is dedicated to managing network resources
  4. the vaccine for computers
  5. not physical but...
  6. an output device that produces a tangible copy of alphanumeric or graphic data
  7. one of the primary input devices used with a computer
Down
  1. the standard way to connect computers on a network over a wired connection
  2. a piece of code which can corrupt a system or destroy data
  3. Jerry
  4. the button you press when you make an error
  5. what we hate to see in our emails
  6. the practice of tricking internet users through deception into revealing personal information

13 Clues: Jerrynot physical but...the vaccine for computerswhat we hate to see in our emails... word, excel, powerpoint, officethe button you press when you make an errorone of the primary input devices used with a computera program that is dedicated to managing network resourcesa piece of code which can corrupt a system or destroy data...

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

STEM Careers 2023-12-13

STEM Careers crossword puzzle
Across
  1. Designs and oversees the construction of infrastructure like roads and bridges.
  2. Analyzes and develops software applications for specific user needs.
  3. Works on the molecular or atomic scale for various applications.
  4. Designs algorithms for computational problems.
  5. Designs solutions for environmental issues like pollution.
  6. Focuses on celestial bodies' formation and evolution.
Down
  1. Focuses on developing technologies for sustainable energy sources.
  2. Focuses on developing new materials for various applications.
  3. Involves analyzing biological data using computational methods.
  4. Focuses on preventing unauthorized access to computer systems.
  5. Uses statistical techniques to extract insights from data.
  6. Designs medical devices and diagnostic tools.
  7. Responsible for designing computer hardware components.
  8. Develops manufacturing processes and new materials.
  9. Involves studying the behavior of subatomic particles.
  10. Studies the interactions between organisms and their environment.
  11. Studies the Earth's crust, rocks, and land formations.
  12. Uses mathematical and statistical techniques to extract insights from data.

18 Clues: Designs medical devices and diagnostic tools.Designs algorithms for computational problems.Develops manufacturing processes and new materials.Focuses on celestial bodies' formation and evolution.Involves studying the behavior of subatomic particles.Studies the Earth's crust, rocks, and land formations....

Information and Cyber Security 2022-10-21

Information and Cyber Security crossword puzzle
Across
  1. Hackers demanded this company cancel the planned release of a film
  2. The key to securing your accounts
  3. The combination of something you have, something you know, and something you are to gain access
  4. Be ...
  5. Virtual Private …
Down
  1. The term used for a broad range of malicious activities accomplished through human interactions
  2. Anti- ...
  3. What BHSF does to train colleagues to look out for phishing attacks
  4. What type of attacks are on the rise
  5. One of the biggest cybersecurity breaches so far
  6. An attack that uses text messaging or short message service (SMS)
  7. These attacks typically target a CEO, CFO, or any CXX
  8. 560,000 pieces of … are detected every day
  9. UK cyber crime has … in the past 5 years
  10. Time it takes a hacker to brute force a 6 character password

15 Clues: Be ...Anti- ...Virtual Private …The key to securing your accountsWhat type of attacks are on the riseUK cyber crime has … in the past 5 years560,000 pieces of … are detected every dayOne of the biggest cybersecurity breaches so farThese attacks typically target a CEO, CFO, or any CXXTime it takes a hacker to brute force a 6 character password...

SOF GLSS SCAVENGER HUNT 2023-09-05

SOF GLSS SCAVENGER HUNT crossword puzzle
Across
  1. Acronym for MFC's Quality Policy
  2. First word under Lockheed Martin Delivers found on the SOF Learning Dashboard
  3. The first program listed on the Programs dropdown
  4. The number of PED violations in 2023 (Hint: Cybersecurity)
  5. Click on this tab to find the JPS Library
  6. The first commitment listed on the SOF GLSS ESH Policy
  7. The next mandatory IT update starting in October
Down
  1. Quality Month
  2. Next day off on the Holiday Calendar
  3. JPS 1-102
  4. Last name of our Quality Sr. Manager
  5. 4th item found on the Command Media Menu on the portal
  6. The international standard that governs our systems relating to quality
  7. First link listed on the "ESH links" on the ESH Bulletin Board
  8. Found in the SOF GLSS Creed, our every day commitment to our customer

15 Clues: JPS 1-102Quality MonthAcronym for MFC's Quality PolicyNext day off on the Holiday CalendarLast name of our Quality Sr. ManagerClick on this tab to find the JPS LibraryThe next mandatory IT update starting in OctoberThe first program listed on the Programs dropdown4th item found on the Command Media Menu on the portal...

Some U.S. Power Numbers 2014-06-25

Some U.S. Power Numbers crossword puzzle
Across
  1. Separation into three groups
  2. Sub-elements of a larger mechanism
  3. Where outage information is often posted
  4. Sealed from use for a period of time
  5. A financial product that pays for covered events
  6. A type of evaluation
  7. What can happen to frozen pipes
  8. Inner workings framework
  9. A formal inquiry
  10. Someone who buys accounts receivables
  11. Storage site
  12. To send on an errand or assignment
  13. Food gone bad
  14. A vehicle capable of transporting gas or liquids
Down
  1. A term for a loss of power
  2. A term for the press, radio and other news outlets
  3. The World Wide Web
  4. A term covering the network of electrical connections
  5. Computer security
  6. A way down – or up
  7. Phone solicitators
  8. Term for lines carrying electrical power
  9. A popular social media tool
  10. Someone authorized to speak for the organization
  11. Step 2 of 5
  12. Dangerous
  13. Information Technology
  14. A technique for securing and protecting data files
  15. Type of gaseous fuel

29 Clues: DangerousStep 2 of 5Storage siteFood gone badA formal inquiryComputer securityThe World Wide WebA way down – or upPhone solicitatorsA type of evaluationType of gaseous fuelInformation TechnologyInner workings frameworkA term for a loss of powerA popular social media toolSeparation into three groupsWhat can happen to frozen pipes...

FITE 2013-05-16

FITE crossword puzzle
Across
  1. symbol for a company
  2. personal conduct online
  3. document or file made with a preset format
  4. one thousand terabytes
  5. a thousand bytes
  6. one thousand megabytes
  7. one thousand brontobytes
  8. search engine that checks all search engines
  9. wireless home network
  10. one thousand exabytes
  11. close up preview of a template
  12. one thousand petabytes
  13. protection of information computer/networks
  14. any type of internet hosting service
  15. appearence of a document
  16. port that connects the mouse or keyboard to PC
  17. one thousand yottabytes
Down
  1. arrangement of data for a computer
  2. Ex: mouse, flash drive
  3. one thousand zetabytes
  4. software used to search data
  5. one thousand gigabytes
  6. one million bytes
  7. a device that has a lot of data storage
  8. zoomable presentation program
  9. computer screen
  10. network name
  11. Ex:comcast,verizon
  12. Ex: monitor, printer
  13. eight bytes
  14. rules to keep people safe online
  15. smallest unit of data
  16. plug your flashdrive into
  17. Ex: headphones, speakers
  18. a short memorable phrase for advertising

35 Clues: eight bytesnetwork namecomputer screena thousand bytesone million bytesEx:comcast,verizonsymbol for a companyEx: monitor, printerwireless home networkone thousand exabytessmallest unit of dataEx: mouse, flash driveone thousand zetabytesone thousand gigabytesone thousand terabytesone thousand megabytesone thousand petabytespersonal conduct online...

ITSM Challenge 2 2024-05-21

ITSM Challenge 2 crossword puzzle
Across
  1. Alteration to improve IT services.
  2. Ensuring uninterrupted IT service.
  3. Activity that creates a service definition.
  4. Daily management of IT services.
  5. Temporary endeavor to achieve a goal.
  6. Type of Change Request that is too urgent to wait for the next CAB meeting for approval to implement.
  7. Type of Change Request that is medium risk or higher, requires custom planning, and must be approved for implementation.
  8. Framework for managing IT services.
Down
  1. Phase of implementing changes into operations.
  2. Protection against digital threats.
  3. Formal demand for IT service.
  4. Secured data storage or transmission.
  5. Long-term plan for IT service improvement or actions taken to determine the need for new services.
  6. An unexpected disruption in service.
  7. Rollout of IT services or IT updates to production.
  8. Root cause of recurring incidents.
  9. Best practice framework for IT service management.
  10. Authorized deployment of IT components.
  11. Type of Change Request that is low risk, repeatable, well-known, and preapproved
  12. Centralized project management office.

20 Clues: Formal demand for IT service.Daily management of IT services.Alteration to improve IT services.Ensuring uninterrupted IT service.Root cause of recurring incidents.Protection against digital threats.Framework for managing IT services.An unexpected disruption in service.Secured data storage or transmission.Temporary endeavor to achieve a goal....

4.1 Application 2023-07-07

4.1 Application crossword puzzle
Across
  1. Month of the Presidential Inauguration
  2. The cabinet department responsible for farming, food, and forestry
  3. The process by which the United States elects the president
  4. An annual message delivered by the president to Congress
  5. The head of the executive branch
  6. Main group of advisors to the president
  7. The cabinet department responsible for foreign affairs
  8. Minimum age to be president of the US
  9. The cabinet department responsible for creating policies and programs related to education in the US
  10. The building where the president resides
Down
  1. Length of presidential term
  2. If a federal official commits a crime, this may happen
  3. The chamber of Congress responsible for approving presidential appointments
  4. The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
  5. The cabinet department responsible for US nuclear infrastructure
  6. First in line of presidential succession
  7. The branch responsible for enforcing laws
  8. The department responsible for maintaining national parks
  9. Amoun of votes needed to win the electoral college
  10. The cabinet department responsible for national defense

20 Clues: Length of presidential termThe head of the executive branchMinimum age to be president of the USMonth of the Presidential InaugurationMain group of advisors to the presidentFirst in line of presidential successionThe building where the president residesThe branch responsible for enforcing lawsAmoun of votes needed to win the electoral college...

Electronics 2025-03-05

Electronics crossword puzzle
Across
  1. – Network of interconnected devices communicating via the internet.
  2. – Field focused on designing and building robots.
  3. – Board that connects electronic components.
  4. – Technology that uses radio waves for identification and tracking.
  5. – Energy sourced from nature, like solar or wind.
  6. – Type of system where software is built into hardware.
  7. – Advanced field of physics used for computing and cryptography.
  8. – Material used in electronic circuits, such as silicon.
  9. – Use of technology to perform tasks with minimal human intervention.
  10. – A small computer on a single chip, used in embedded systems.
  11. – Latest generation of mobile network technology.
Down
  1. – Communication without physical cables.
  2. – Low-level software controlling hardware functions.
  3. – A device that converts electrical signals into movement.
  4. – The practice of protecting computer systems from attacks.
  5. – Unmanned aerial vehicles used for various applications.
  6. – Computing closer to the data source to reduce latency.
  7. – A device that detects physical properties such as temperature or motion.
  8. – Engineering on a very tiny scale, atomic or molecular level.
  9. – The field of making machines "think" like humans.

20 Clues: – Communication without physical cables.– Board that connects electronic components.– Field focused on designing and building robots.– Energy sourced from nature, like solar or wind.– Latest generation of mobile network technology.– The field of making machines "think" like humans.– Low-level software controlling hardware functions....

Satria briant ardinata (33) kelas XF 2025-04-29

Satria briant ardinata (33) kelas XF crossword puzzle
Across
  1. Pelanggaran terhadap HAKI disebut
  2. Istilah untuk mengecualikan kata dalam pencarian Google
  3. Proses memeriksa kebenaran informasi
  4. Orang yang menguji kualitas perangkat lunak
  5. Budaya yang muncul dan berkembang di internet
  6. Platform untuk melaporkan konten berbahaya
  7. Kata kunci untuk mencari frasa secara tepat di Google
  8. Konten yang menyesatkan dan tidak benar
  9. Singkatan dari Hak Atas Kekayaan Intelektual
  10. Perlindungan hukum terhadap ide atau ciptaan
  11. Platform berbagi video terpopuler saat ini
  12. Platform pencarian yang sangat populer di dunia
  13. Proses menyebarkan informasi secara digital
  14. Format umum untuk gambar digital
Down
  1. Profesi yang mengubah data menjadi informasi berharga
  2. Hak atas ciptaan disebut hak
  3. Digunakan untuk mencari kata dalam situs tertentu
  4. Konten yang dibagikan secara luas disebut konten
  5. Spesialis yang menjaga keamanan sistem informasi
  6. Hak eksklusif atas merek disebut hak
  7. Profesi yang mengelola dan merancang sistem jaringan
  8. Pihak yang berwenang mengawasi konten digital
  9. Informasi yang memprovokasi dan merugikan disebut
  10. Operator pencarian untuk menampilkan hasil dari jenis file tertentu
  11. Orang yang menulis dan mengembangkan kode program

25 Clues: Hak atas ciptaan disebut hakFormat umum untuk gambar digitalPelanggaran terhadap HAKI disebutProses memeriksa kebenaran informasiHak eksklusif atas merek disebut hakKonten yang menyesatkan dan tidak benarPlatform untuk melaporkan konten berbahayaPlatform berbagi video terpopuler saat iniOrang yang menguji kualitas perangkat lunak...

TTS19 X_D 2025-04-15

TTS19 X_D crossword puzzle
Across
  1. Pengembang perangkat lunak.
  2. Pelanggaran hak cipta disebut juga.
  3. Cerita rakyat yang bisa dibuat animasi digital.
  4. Penyebaran informasi secara digital.
  5. Hak atas penemuan atau inovasi teknologi.
  6. Operator pencarian untuk dua kata kunci sekaligus.
  7. Orang yang memperbaiki dan merawat jaringan komputer.
  8. Hak milik atas ciptaan lagu, buku, dan karya seni.
  9. Informasi palsu yang disebarkan untuk menipu.
  10. Lembaga yang mengatur HAKI di Indonesia.
Down
  1. Syntax untuk mencari di situs tertentu
  2. Proses mengecek kebenaran informasi sebelum membagikannya.
  3. Alat musik khas Jawa Barat.
  4. Pengelola dan penganalisis data dalam skala besar.
  5. Ahli dalam membuat sistem keamanan digital.
  6. Perilaku kasar atau menghina di media sosial.
  7. Seni tradisional yang bisa dijadikan konten edukatif.
  8. Kata untuk mengecualikan hasil pencarian.
  9. Proses membuat konten digital.
  10. Mesin pencari paling populer.
  11. Profesi yang merancang antarmuka pengguna.
  12. Lembaga yang mengawasi konten siaran di Indonesia.
  13. Penyebaran kebencian berbasis SARA di internet.
  14. Simbol atau logo dagang yang dilindungi hukum.
  15. Tanda yang digunakan untuk mencari frasa lengkap.

25 Clues: Alat musik khas Jawa Barat.Pengembang perangkat lunak.Mesin pencari paling populer.Proses membuat konten digital.Pelanggaran hak cipta disebut juga.Penyebaran informasi secara digital.Syntax untuk mencari di situs tertentuLembaga yang mengatur HAKI di Indonesia.Kata untuk mengecualikan hasil pencarian.Hak atas penemuan atau inovasi teknologi....

TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16

TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 crossword puzzle
Across
  1. Alat untuk menyaring konten tidak pantas
  2. Proses mengecek kebenaran sebuah informasi
  3. Orang yang menulis dan mengembangkan kode
  4. Simbol untuk mencari frasa tepat
  5. Pekerjaan yang menganalisis dan mengolah data besar
  6. Syntax untuk membatasi pencarian ke situs tertentu
  7. Direktorat di bawah Kemenkumham yang mengurus HAKI
  8. Perlindungan atas penemuan teknologi
  9. Istilah untuk penyebaran konten ke publik
Down
  1. Profesi bidang keamanan data dan jaringan
  2. Singkatan dari Hak atas Kekayaan Intelektual
  3. Berita palsu yang menyesatkan publik
  4. Konten berisi kebencian atau diskriminasi
  5. Lembaga negara pengawas konten digital
  6. Operator untuk alternatif kata
  7. Proses membuat media seperti video atau gambar digital
  8. Tindakan menyalin karya tanpa izin
  9. Syntax untuk mencari dokumen tertentu seperti PDF
  10. Istilah singkat untuk pengembang situs web
  11. Jenis HAKI yang melindungi nama dagang
  12. Platform media sosial populer untuk video pendek
  13. Unsur budaya lokal yang bisa diangkat ke konten digital
  14. Jenis tarian daerah yang bisa dijadikan konten
  15. Profesi yang fokus ke tampilan dan pengalaman pengguna
  16. Operator untuk mengecualikan istilah dari pencarian (simbol)

25 Clues: Operator untuk alternatif kataSimbol untuk mencari frasa tepatTindakan menyalin karya tanpa izinBerita palsu yang menyesatkan publikPerlindungan atas penemuan teknologiLembaga negara pengawas konten digitalJenis HAKI yang melindungi nama dagangAlat untuk menyaring konten tidak pantasProfesi bidang keamanan data dan jaringan...

TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16

TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 crossword puzzle
Across
  1. Alat untuk menyaring konten tidak pantas
  2. Proses mengecek kebenaran sebuah informasi
  3. Orang yang menulis dan mengembangkan kode
  4. Simbol untuk mencari frasa tepat
  5. Pekerjaan yang menganalisis dan mengolah data besar
  6. Syntax untuk membatasi pencarian ke situs tertentu
  7. Direktorat di bawah Kemenkumham yang mengurus HAKI
  8. Perlindungan atas penemuan teknologi
  9. Istilah untuk penyebaran konten ke publik
Down
  1. Profesi bidang keamanan data dan jaringan
  2. Singkatan dari Hak atas Kekayaan Intelektual
  3. Berita palsu yang menyesatkan publik
  4. Konten berisi kebencian atau diskriminasi
  5. Lembaga negara pengawas konten digital
  6. Operator untuk alternatif kata
  7. Proses membuat media seperti video atau gambar digital
  8. Tindakan menyalin karya tanpa izin
  9. Syntax untuk mencari dokumen tertentu seperti PDF
  10. Istilah singkat untuk pengembang situs web
  11. Jenis HAKI yang melindungi nama dagang
  12. Platform media sosial populer untuk video pendek
  13. Unsur budaya lokal yang bisa diangkat ke konten digital
  14. Jenis tarian daerah yang bisa dijadikan konten
  15. Profesi yang fokus ke tampilan dan pengalaman pengguna
  16. Operator untuk mengecualikan istilah dari pencarian (simbol)

25 Clues: Operator untuk alternatif kataSimbol untuk mencari frasa tepatTindakan menyalin karya tanpa izinBerita palsu yang menyesatkan publikPerlindungan atas penemuan teknologiLembaga negara pengawas konten digitalJenis HAKI yang melindungi nama dagangAlat untuk menyaring konten tidak pantasProfesi bidang keamanan data dan jaringan...

TEMA 2 2025-10-27

TEMA 2 crossword puzzle
Across
  1. Aktivitas menonton, bermain, atau berkomunikasi melalui internet.
  2. Profesi baru yang muncul karena adanya media sosial.
  3. menjual dan membeli produk secara online.
  4. Istilah untuk kecerdasan buatan yang membantu otomatisasi bisnis.
  5. Layanan perbankan yang dapat diakses secara daring.
  6. Teknologi yang digunakan untuk mencatat transaksi kripto.
Down
  1. Sistem perdagangan yang dilakukan melalui internet.
  2. Sistem keamanan untuk melindungi data digital.
  3. Istilah untuk kegiatan promosi melalui media digital.
  4. Transaksi jual beli melalui aplikasi smartphone.
  5. Mata uang digital yang tidak memiliki bentuk fisik.
  6. Alat pembayaran digital yang banyak digunakan di ponsel.
  7. Bentuk uang elektronik yang diterbitkan oleh bank atau fintech.
  8. Pasar global tanpa batas yang diciptakan oleh internet.
  9. tempat menonton video digital, misalnya YouTube.
  10. Jenis pekerjaan yang bisa dilakukan dari rumah dengan bantuan internet.
  11. Perusahaan yang berbasis teknologi digital seperti Gojek atau Tokopedia.
  12. Teknologi penyimpanan data melalui internet.
  13. Istilah untuk data dalam jumlah besar yang diolah untuk bisnis.
  14. Proses perubahan dari sistem ekonomi tradisional ke sistem berbasis teknologi.

20 Clues: menjual dan membeli produk secara online.Teknologi penyimpanan data melalui internet.Sistem keamanan untuk melindungi data digital.Transaksi jual beli melalui aplikasi smartphone.tempat menonton video digital, misalnya YouTube.Sistem perdagangan yang dilakukan melalui internet.Mata uang digital yang tidak memiliki bentuk fisik....

Wedding 2026-02-06

Wedding crossword puzzle
Across
  1. What does the Alexis do as a career?
  2. what is the Marcus' career?
  3. What is the nickname Lexi's family calls her?
  4. Who is the bride's favorite musical artist?
  5. What is the groom's cat's name?
  6. Where was the couple's first date?
  7. What is the groom's line name?
  8. What is the bride's cat's name?
  9. Where did the groom go to high school?
  10. Where is Marcus' hometown?
  11. What country did the couple visit in June 2025?
  12. what is the bride's middle name?
Down
  1. What college did the bride earn her FIRST degree from?
  2. Where did the bride go to high school?
  3. What is the bride's favorite cocktail?
  4. What is the groom's favorite cocktail?
  5. Where did the groom go to college?
  6. What is Marcus' nickname?
  7. Where was couple's first trip together?
  8. What month did the groom propose?
  9. What is the couple's goddaughter's name?
  10. Where can you usually find the groom?
  11. Where is the Lexi's hometown?
  12. How many years have the couple been together

24 Clues: What is Marcus' nickname?Where is Marcus' hometown?what is the Marcus' career?Where is the Lexi's hometown?What is the groom's line name?What is the groom's cat's name?What is the bride's cat's name?what is the bride's middle name?What month did the groom propose?Where did the groom go to college?Where was the couple's first date?...

Technology 2024-11-25

Technology crossword puzzle
Across
  1. A discovery that changes understanding
  2. Protecting online data and systems
  3. Old-fashioned or no longer in use
Down
  1. A place to connect and share content online
  2. Advanced technology

5 Clues: Advanced technologyOld-fashioned or no longer in useProtecting online data and systemsA discovery that changes understandingA place to connect and share content online

"Business Tech Brain Teaser" 2025-04-02

"Business Tech Brain Teaser" crossword puzzle
Across
  1. Using AI and software to perform tasks automatically
  2. The use of online payment systems in business
  3. The process of storing and accessing data over the internet
Down
  1. A system that helps businesses make smarter choices using data
  2. Digital tools that help businesses grow and operate
  3. The use of technology to protect business data
  4. The selling of goods and services online
  5. Online business that includes more than just sales

8 Clues: The selling of goods and services onlineThe use of online payment systems in businessThe use of technology to protect business dataDigital tools that help businesses grow and operateOnline business that includes more than just salesUsing AI and software to perform tasks automaticallyThe process of storing and accessing data over the internet...

"Business Tech Brain Teaser" 2025-04-02

"Business Tech Brain Teaser" crossword puzzle
Across
  1. business that includes more than just sales
  2. tools that help businesses grow and operate
  3. use of online payment systems in business
Down
  1. process of storing and accessing data over the internet
  2. selling of goods and services online
  3. AI and software to perform tasks automatically
  4. system that helps businesses make smarter choices using data
  5. use of technology to protect business data

8 Clues: selling of goods and services onlineuse of online payment systems in businessuse of technology to protect business databusiness that includes more than just salestools that help businesses grow and operateAI and software to perform tasks automaticallyprocess of storing and accessing data over the internet...

C CROSSWORD 2014-02-26

C CROSSWORD crossword puzzle
Across
  1. a common
  2. They called the bomb squad and explained the bomb blast planned at 10' clk,
  3. by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
  4. for a party arranged at
  5. The squad diffused the bomb and saved everyone . They all came back home .
Down
  1. annoyed to see the party hall empty.The members realized that
  2. location. When reached, the invitees were
  3. The enrolled members of "CYBERSECURITY CLUB" were called
  4. they all had received a prank call.
  5. Twice to their surprise they found a paper unknowingly left

10 Clues: a commonfor a party arranged atthey all had received a prank call.location. When reached, the invitees wereThe enrolled members of "CYBERSECURITY CLUB" were calledTwice to their surprise they found a paper unknowingly leftannoyed to see the party hall empty.The members realized that...

Scsu 2023-08-11

Scsu crossword puzzle
Across
  1. refers to act of hiding the ip address to miss lead the target
  2. refers to the act of monitoring user commanicetion without consent
  3. insuring the infomation staya in it origanal from and present modified over a network
  4. attack is techingave used by attackers
Down
  1. insuring that your system stays available to pletform its metendet funetion when required
  2. securing your information only authoritht person will be access
  3. unsolicited bulk mails
  4. zombies computer
  5. a small software design to hide files
  6. a protection of your cyber or digital assets or information system from attackrs

10 Clues: zombies computerunsolicited bulk mailsa small software design to hide filesattack is techingave used by attackersrefers to act of hiding the ip address to miss lead the targetsecuring your information only authoritht person will be accessrefers to the act of monitoring user commanicetion without consent...

digital communications 2025-05-01

digital communications crossword puzzle
Across
  1. A set of related web pages located under a single domain name
  2. 1's and 0's
  3. The physical parts of a computer
  4. a communication method that uses electronic devices to deliver messages across computer networks
  5. the protection of computer systems
Down
  1. an emerging technology
  2. A global network made up of billions of electronic devices
  3. Information that can be interpreted and used by computers
  4. a set of computers sharing resources with one an other
  5. A set of instructions, data or programs used to operate computers and execute specific tasks

10 Clues: 1's and 0'san emerging technologyThe physical parts of a computerthe protection of computer systemsa set of computers sharing resources with one an otherInformation that can be interpreted and used by computersA global network made up of billions of electronic devicesA set of related web pages located under a single domain name...

Technology 2025-11-13

Technology crossword puzzle
Across
  1. Existing in digital form or simulated by software rather than physical reality
  2. brain of the computer
  3. Software designed to damage
  4. the physical parts of a computer
  5. A newer version of software or data that improves or fixes issues
Down
  1. An unmanned aerial vehicle controlled remotely or autonomously
  2. A step-by-step set of instructions for solving a problem
  3. The practice of protecting systems and data from digital attacks
  4. A computer that provides data or services to other computers over a network
  5. Interface allowing programs to talk to each other

10 Clues: brain of the computerSoftware designed to damagethe physical parts of a computerInterface allowing programs to talk to each otherA step-by-step set of instructions for solving a problemAn unmanned aerial vehicle controlled remotely or autonomouslyThe practice of protecting systems and data from digital attacks...

Cybersecurity Fundamental Chapter 1 2022-11-29

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
  2. group of criminals breaks into computers or networks to gain access for various reasons.
  3. Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  4. The Honeynet project is an example of creating Early Warning Systems.
Down
  1. great businesses have been created by collecting and harnessing the power of data and data analytics.
  2. InfraGard is an example of wide spread sharing of cyber intelligence.
  3. hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
  4. Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  5. attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
  6. hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
  7. Business large and small have recognized the power of big data and data analytics.
  8. attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
  9. attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.

13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence.The Honeynet project is an example of creating Early Warning Systems.Business large and small have recognized the power of big data and data analytics.group of criminals breaks into computers or networks to gain access for various reasons....

Digital Awareness 2024-10-21

Digital Awareness crossword puzzle
Across
  1. A harmful software that replicates itself to spread to other computers
  2. The act of protecting personal information online
  3. A program designed to damage or disrupt systems
Down
  1. A global system of interconnected computer networks
  2. A unique string of characters used to access a computer or network
  3. Unsolicited email, often sent in bulk
  4. A software application for accessing information on the web

7 Clues: Unsolicited email, often sent in bulkA program designed to damage or disrupt systemsThe act of protecting personal information onlineA global system of interconnected computer networksA software application for accessing information on the webA unique string of characters used to access a computer or network...

CURRENT ISSUE PUZZLE 2023-03-18

CURRENT ISSUE PUZZLE crossword puzzle
Across
  1. Factor affecting generation gap
  2. Security human resource technology
  3. Key point of talent management
Down
  1. Cultural difference in the workplace
  2. Someone uses a computer system or network in a bad way to get secret information or cause harm to the system
  3. Bully but virtual
  4. Unauthorized interception of phone conversations with the aim of listening in on what is being said.

7 Clues: Bully but virtualKey point of talent managementFactor affecting generation gapSecurity human resource technologyCultural difference in the workplaceUnauthorized interception of phone conversations with the aim of listening in on what is being said....

CIA Triad Crossword 2025-12-11

CIA Triad Crossword crossword puzzle
Across
  1. This is the digit that you will need for the falcons code for this puzzle.
  2. Ensuring sensitive information is kept private and only accessed by authorized individuals
  3. Ensuring that information and systems are accessible to authorized users whenever they are needed
Down
  1. Keeping data intact
  2. Data at rest
  3. Data in transit
  4. Acronym for the triad that embodies cybersecurity

7 Clues: Data at restData in transitKeeping data intactAcronym for the triad that embodies cybersecurityThis is the digit that you will need for the falcons code for this puzzle.Ensuring sensitive information is kept private and only accessed by authorized individuals...

Cybersecurity Crossword Challenge 2024-09-08

Cybersecurity Crossword Challenge crossword puzzle
Across
  1. Software that secretly monitors user activity and collects personal information.
  2. A technique where a fake email or website is used to look like a trusted source.
  3. Software designed to harm or exploit any device it infects.
  4. When sensitive information is exposed due to a cyberattack or leak.
  5. A scam where attackers trick you into sharing personal information.
  6. A network security system that monitors and controls incoming and outgoing traffic.
Down
  1. Malware that locks your files and demands payment.
  2. A tool that encrypts your internet connection, often used for secure browsing.
  3. The process of scrambling data to keep it secure from unauthorized access.

9 Clues: Malware that locks your files and demands payment.Software designed to harm or exploit any device it infects.When sensitive information is exposed due to a cyberattack or leak.A scam where attackers trick you into sharing personal information.The process of scrambling data to keep it secure from unauthorized access....

Cybersecurity Best Practices 2024-11-08

Cybersecurity Best Practices crossword puzzle
Across
  1. A security practice of regularly backing up important data.
  2. A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock.
  3. A security measure that protects against unauthorized access to a network.
  4. A security practice of regularly updating software and systems.
  5. A piece of audio or video that has been altered and changed to make it seem authentic or credible
Down
  1. A malicious software.
  2. A technique used to trick someone into revealing sensitive information.
  3. A security measure that prevents unauthorized access to data & systems.
  4. A security measure that hides data to make it unreadable.

9 Clues: A malicious software.A security measure that hides data to make it unreadable.A security practice of regularly backing up important data.A security practice of regularly updating software and systems.A technique used to trick someone into revealing sensitive information.A security measure that prevents unauthorized access to data & systems....

Intro- Cybersecurity Crossword 2026-01-23

Intro- Cybersecurity Crossword crossword puzzle
Across
  1. Computer users and resources within a geographic area the size of a metropolitan area that are connected.
  2. A local or restricted communications network, especially a private network created using World Wide Web software.
  3. A collection of many networks owned by many entities that share information and communicate together.
  4. The term used to describe how devices are connected and how messages flow from device to device. The physical topology describes the way the network is wired. The logical topology describes the way messages are sent.
Down
  1. __address The portion of the IP address that identifies the network the device is assigned to.
  2. An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.
  3. A group of computers and associated devices that share a common communications line or wireless link, typically to a server.
  4. An address that identifies the network and host address assigned to a device.
  5. A network that connects several LANs. WANs are often limited to a corporation or an organization but are sometimes accessible to the public.

9 Clues: An address that identifies the network and host address assigned to a device.__address The portion of the IP address that identifies the network the device is assigned to.A collection of many networks owned by many entities that share information and communicate together....

CROSSWORD ANGEL VILLAMIL 2022-05-04

CROSSWORD ANGEL VILLAMIL crossword puzzle
Across
  1. It is the practice of defending an organization from risks, threats and vulnerabilities.
  2. set of programs that allow the computer to perform different tasks.
  3. Facts collected about a topic or item.
  4. A set of activities that follow a sequence.
Down
  1. Physical elements that make up a computer.
  2. is the combination of the data.
  3. is a global computer network.

7 Clues: is a global computer network.is the combination of the data.Facts collected about a topic or item.Physical elements that make up a computer.A set of activities that follow a sequence.set of programs that allow the computer to perform different tasks.It is the practice of defending an organization from risks, threats and vulnerabilities.

Digital Citizenship 2025-05-12

Digital Citizenship crossword puzzle
Across
  1. Turning information into code to prevent unauthorized access
  2. Representing data in charts or graphs to understand it better
  3. The field that analyzes and interprets large sets of data
  4. Platforms for sharing and interacting with others online
  5. Gathering and measuring information
  6. A set of steps or rules used to solve a problem
  7. A trick used in emails or messages to steal personal information
  8. Using the internet to access and store data remotely
Down
  1. The right to keep personal information safe
  2. Responsible and respectful behavior when using technology
  3. Legally testing systems for vulnerabilities to improve security
  4. Machines performing tasks that require human intelligence
  5. Protection of computer systems and data from digital attacks
  6. The ability to navigate and use digital tools effectively
  7. The trail of data left behind by online activity
  8. Stealing someone's personal information for fraud

16 Clues: Gathering and measuring informationThe right to keep personal information safeA set of steps or rules used to solve a problemThe trail of data left behind by online activityStealing someone's personal information for fraudUsing the internet to access and store data remotelyPlatforms for sharing and interacting with others online...

Cybersecurity Awareness Month 2024-05-06

Cybersecurity Awareness Month crossword puzzle
Across
  1. The practice of accessing a computer or network without authorization.
  2. Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
  3. A technique used to verify the identity of a user by requiring two different forms of authentication.
  4. A unique string of characters used to authenticate a user's identity.
Down
  1. A program designed to prevent unauthorized access to or from a private network.
  2. Malicious software designed to gain unauthorized access to a computer system.
  3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  4. A piece of software designed to block access to a computer system until a sum of money is paid.
  5. A method of protecting sensitive data by converting it into an unreadable format.

9 Clues: A unique string of characters used to authenticate a user's identity.The practice of accessing a computer or network without authorization.Malicious software designed to gain unauthorized access to a computer system.A program designed to prevent unauthorized access to or from a private network....

Cybersecurity Crossword Puzzle 2023-05-15

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
  2. is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
  3. -factor authentication is a second layer of security that protects our networks from cyber-attack.
  4. Alert Button We report phishing by using the
  5. threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
  1. is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
  2. Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
  3. such as curiosity, urgency, greed, and fear are used in phishing emails.
  4. can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.

9 Clues: Alert Button We report phishing by using thesuch as curiosity, urgency, greed, and fear are used in phishing emails.-factor authentication is a second layer of security that protects our networks from cyber-attack.can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data....

networks 2026-02-12

networks crossword puzzle
Across
  1. for transmitting a signal.
  2. cable: high-speed networking cable containing
  3. cable is the standard, physical cable used toconnec devices—like computers,
  4. label assigned to every device
  5. to briefly restate or condense the main points
  6. of glass or plastic fibres
  7. range of frequencies within a given band, in particular that
  8. refers to the time delay between a cause and its observed effec
Down
  1. of activity from which other parts radiate.
  2. s a hardware device that acts as a bridge between your home network
  3. the foundational cybersecurity process ofconverting readable information
  4. is a company or organization that provides individuals, households, and businesseswith access to the internet and related services
  5. user that requests and consumes services
  6. phonebook of the internet
  7. points a networking hardware device that all wireless-capable devices
  8. is a group of connected computing devices

16 Clues: phonebook of the internetfor transmitting a signal.of glass or plastic fibreslabel assigned to every deviceuser that requests and consumes servicesis a group of connected computing devicesof activity from which other parts radiate.cable: high-speed networking cable containingto briefly restate or condense the main points...

Lexi & Marco 2026-04-07

Lexi & Marco crossword puzzle
Across
  1. on what dating app did lexi and marco meet?
  2. what does the groom do for work?
  3. who is older?
  4. what college did marco attend for undergrad?
  5. where did the couple have their first date?
  6. how many years have marco and lexi been together?
  7. what is the bride's favorite hobby?
Down
  1. where is the happy couple's favorite place to be?
  2. who is the bride's favorite singer?
  3. where did the newlyweds go on their third date on Valentine's Day?
  4. what does the bride do for work?
  5. who said i love you first?
  6. the groom proposed to the bride at an event for which holiday?
  7. what is the groom's favorite football team?
  8. after a rare night out, what fast food restaurant are they stopping at?
  9. what is the name of their beloved?

16 Clues: who is older?who said i love you first?what does the bride do for work?what does the groom do for work?what is the name of their beloved?who is the bride's favorite singer?what is the bride's favorite hobby?on what dating app did lexi and marco meet?what is the groom's favorite football team?where did the couple have their first date?...

Information and Cyber Security 2022-10-21

Information and Cyber Security crossword puzzle
Across
  1. 560,000 pieces of … are detected every day
  2. One of the biggest cybersecurity breaches so far
  3. An attack that uses text messaging or short message service (SMS)
  4. The combination of something you have, something you know, and something you are to gain access
  5. Be ...
  6. Anti- ...
  7. These attacks typically target a CEO, CFO, or any CXX
  8. UK cyber crime has … in the past 5 years
Down
  1. What type of attacks are on the rise
  2. What BHSF does to train colleagues to look out for phishing attacks
  3. The key to securing your accounts
  4. Time it takes a hacker to brute force a 6 character password
  5. The term used for a broad range of malicious activities accomplished through human interactions
  6. Virtual Private …
  7. Hackers demanded this company cancel the planned release of a film

15 Clues: Be ...Anti- ...Virtual Private …The key to securing your accountsWhat type of attacks are on the riseUK cyber crime has … in the past 5 years560,000 pieces of … are detected every dayOne of the biggest cybersecurity breaches so farThese attacks typically target a CEO, CFO, or any CXXTime it takes a hacker to brute force a 6 character password...

TECHNOLOGY 1 2025-04-14

TECHNOLOGY 1 crossword puzzle
Across
  1. The practice of storing and accessing data and applications over the internet
  2. AI
  3. A global network of interconnected computers
  4. A set of instructions for a computer to follow
  5. A person who fears or dislikes technology
  6. Technology that can be used on portable devices
  7. A group of interconnected computers and other devices
Down
  1. The protection of computer systems and networks from unauthorized access or use
  2. To introduce something new or different
  3. The application of scientific knowledge for practical purposes, especially in industry
  4. The programs and instructions that tell a computer what to do
  5. A person who is enthusiastic about new technology
  6. Buying and selling goods and services online
  7. The physical components of a computer or other electronic device
  8. The process of extracting useful information from large amounts of data

15 Clues: AITo introduce something new or differentA person who fears or dislikes technologyA global network of interconnected computersBuying and selling goods and services onlineA set of instructions for a computer to followTechnology that can be used on portable devicesA person who is enthusiastic about new technology...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : A system that blocks unauthorized access to or from a private network
  2. : The practice of protecting devices and data from cyber threats
  3. : A harmful program that can damage files and software
  4. : Fake messages that try to steal passwords or bank info
  5. : Bullying someone online through messages or social media
Down
  1. : Software that protects your computer from viruses
  2. : Criminal activities done using computers or the internet
  3. : People who use the internet or computers to commit crimes
  4. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : A system that blocks unauthorized access to or from a private network
  2. : The practice of protecting devices and data from cyber threats
  3. : A harmful program that can damage files and software
  4. : Fake messages that try to steal passwords or bank info
  5. : Bullying someone online through messages or social media
Down
  1. : Software that protects your computer from viruses
  2. : Criminal activities done using computers or the internet
  3. : People who use the internet or computers to commit crimes
  4. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : The practice of protecting devices and data from cyber threats
  2. : Bullying someone online through messages or social media
  3. : A system that blocks unauthorized access to or from a private network
  4. : Fake messages that try to steal passwords or bank info
Down
  1. : People who use the internet or computers to commit crimes
  2. : A harmful program that can damage files and software
  3. : Breaking into someone’s computer or account without permission
  4. : Criminal activities done using computers or the internet
  5. : Software that protects your computer from viruses

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

PTS INFORMATIKA 2023-09-27

PTS INFORMATIKA crossword puzzle
Across
  1. Kemampuan untuk memecah masalah menjadi bagian yang lebih kecil.
  2. Praktik menyimpan data di lokasi yang berbeda sebagai tindakan keamanan.
  3. Model bisnis yang melibatkan penjualan produk dan layanan secara online.
  4. Praktik dan teknologi yang melindungi sistem komputer dari ancaman.
  5. Jaringan global yang menghubungkan jaringan komputer.
  6. Langkah-langkah terstruktur untuk menyelesaikan masalah.
Down
  1. Model komputasi yang menggabungkan sumber daya dari banyak
  2. Situs web yang memungkinkan pengguna berbagi informasi secara online.
  3. Model komputasi yang memungkinkan akses ke sumber daya melalui PATTERNRECOGNITION Kemampuan untuk mengidentifikasi pola dalam data atau masalah.

9 Clues: Jaringan global yang menghubungkan jaringan komputer.Langkah-langkah terstruktur untuk menyelesaikan masalah.Model komputasi yang menggabungkan sumber daya dari banyakKemampuan untuk memecah masalah menjadi bagian yang lebih kecil.Praktik dan teknologi yang melindungi sistem komputer dari ancaman....

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : A system that blocks unauthorized access to or from a private network
  2. : The practice of protecting devices and data from cyber threats
  3. : A harmful program that can damage files and software
  4. : Fake messages that try to steal passwords or bank info
  5. : Bullying someone online through messages or social media
Down
  1. : Software that protects your computer from viruses
  2. : Criminal activities done using computers or the internet
  3. : People who use the internet or computers to commit crimes
  4. : Breaking into someone’s computer or account without permission

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

Computer Project 2025-06-15

Computer Project crossword puzzle
Across
  1. : Criminal activities done using computers or the internet
  2. : Bullying someone online through messages or social media
  3. : People who use the internet or computers to commit crimes
  4. : Fake messages that try to steal passwords or bank info
Down
  1. : Breaking into someone’s computer or account without permission
  2. : A harmful program that can damage files and software
  3. : The practice of protecting devices and data from cyber threats
  4. : A system that blocks unauthorized access to or from a private network
  5. : Software that protects your computer from viruses

9 Clues: : Software that protects your computer from viruses: A harmful program that can damage files and software: Fake messages that try to steal passwords or bank info: Criminal activities done using computers or the internet: Bullying someone online through messages or social media: People who use the internet or computers to commit crimes...

MIC Quiz 2 2023-04-26

MIC Quiz 2 crossword puzzle
Across
  1. A community for employees seeking resources and events that will help them develop more mindful and resilient habits.
  2. A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
  3. A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
  4. A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
  5. A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
  6. A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
  7. A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
  8. A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
Down
  1. A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
  2. A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
  3. A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
  4. A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
  5. A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
  6. A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
  7. A community open to all Cisco employees who want to connect and help foster an inclusive culture.

15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture.A community for Cisco’s new and early-in-career talent to come together, network, and share resources.A community for Cisco employees who are caregivers to adults to share experiences, advice, and support....

MIC Quiz 2 2023-04-25

MIC Quiz 2 crossword puzzle
Across
  1. A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
  2. A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
  3. A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
  4. A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
  5. A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
  6. A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
  7. A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
Down
  1. A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
  2. A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
  3. A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
  4. A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
  5. A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
  6. A community open to all Cisco employees who want to connect and help foster an inclusive culture.
  7. A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
  8. A community for technical employees who identify as women to create a positive impact in the lives of women and girls in STEM fields.

15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture.A community for Cisco’s new and early-in-career talent to come together, network, and share resources.A community for Cisco employees who are caregivers to adults to share experiences, advice, and support....

ICT: You & Your Data 2023-01-17

ICT: You & Your Data crossword puzzle
Across
  1. you should always keep your __________ to youself.
  2. all the social media company have this policy.
  3. one of social media company owned by Mark Zuckerberg
Down
  1. created when that data has been processed and becomes meaningful.
  2. Any company might hold your ___________ information that you have in your account.
  3. a practive of protecting systems,networks & programs from digital attacks.
  4. raw facts and figures.
  5. We should __________ our password once a month.
  6. You have the ________ to find out what information the government & other organisations store about you.

9 Clues: raw facts and figures.all the social media company have this policy.We should __________ our password once a month.you should always keep your __________ to youself.one of social media company owned by Mark Zuckerbergcreated when that data has been processed and becomes meaningful....

Welcome to Data Privacy Week! 2024-12-19

Welcome to Data Privacy Week! crossword puzzle
Across
  1. centers on the right to protect personal information online
  2. We are __________ and will join together to celebrate Data Privacy Week
  3. name, address, phone number, DOB, SSN
Down
  1. this is one reason why data privacy matters
  2. protecting data from hacking, malware and online threats
  3. do this to permissions like location, camera or microphone unless needed
  4. do this before clicking "allow" on any data requests
  5. these can collect data even if you aren't using them
  6. periodically check your privacy settings this often

9 Clues: name, address, phone number, DOB, SSNthis is one reason why data privacy mattersperiodically check your privacy settings this oftendo this before clicking "allow" on any data requeststhese can collect data even if you aren't using themprotecting data from hacking, malware and online threatscenters on the right to protect personal information online...

YORK Chiller Access Manager 2025-04-17

YORK Chiller Access Manager crossword puzzle
Across
  1. Access level CHASE users use for software testing.
  2. Used on the login screen of the control panel to represent the serial number.
  3. 1st control panel to be released with YCAM.
  4. Majority of access codes are for this level.
  5. Quarterly communication for registered users.
Down
  1. YCAM dashboards can be accessed from this platform.
  2. 3rd party certification for our products to recognize efforts around cybersecurity.
  3. This new access level falls between Standard and Service.
  4. Allows users to view what changes were made in the control panel.

9 Clues: 1st control panel to be released with YCAM.Majority of access codes are for this level.Quarterly communication for registered users.Access level CHASE users use for software testing.YCAM dashboards can be accessed from this platform.This new access level falls between Standard and Service....

Cybersecurity Fundamentals Chapter 5 2024-06-05

Cybersecurity Fundamentals Chapter 5 crossword puzzle
Across
  1. Digital certificates are used to establish the identity of an entity (person, organization, or device) in online communications.
  2. Verifies that the data entered into a system conforms to expected formats and types, helping prevent common database attacks that involve injecting malformed data
  3. Methods and processes to ensure that data remains accurate, consistent, and reliable throughout its lifecycle.
  4. **: Identifies patterns in data that do not conform to expected behavior.
  5. Cryptographic methods used to validate the authenticity and integrity of a message, software, or digital document.
  6. The processes and rules applied to maintain the integrity of data within a database.
  7. Maintains the consistency of relationships between tables.
Down
  1. Mechanisms to ensure correct data entry into systems.
  2. Checks that data falls within specified parameters, ensuring completeness, accuracy, and consistency.
  3. Custom rules defined by users to meet specific data integrity requirements that are not covered by the other types of integrity rules
  4. Ensures that each row in a table has a unique identifier, typically a primary key, which uniquely identifies each entity in the table
  5. Ensures that data in a column adheres to a defined set of valid values.
  6. Techniques used to ensure data integrity by converting data into a fixed-length hash value.

13 Clues: Mechanisms to ensure correct data entry into systems.Maintains the consistency of relationships between tables.Ensures that data in a column adheres to a defined set of valid values.**: Identifies patterns in data that do not conform to expected behavior.The processes and rules applied to maintain the integrity of data within a database....

CyberSecurity: Ch. 7 2022-11-30

CyberSecurity: Ch. 7 crossword puzzle
Across
  1. unsolicited email sent to large groups
  2. one who accesses internet without permission
  3. malicious software
  4. acts involving a computing device on the internet
Down
  1. blocks unauthorized access
  2. connect to wifi without owner's permission
  3. a small text file to store personal info
  4. software that tracks your activity without your knowledge
  5. a collection of zombie computers

9 Clues: malicious softwareblocks unauthorized accessa collection of zombie computersunsolicited email sent to large groupsa small text file to store personal infoconnect to wifi without owner's permissionone who accesses internet without permissionacts involving a computing device on the internetsoftware that tracks your activity without your knowledge

Digital Media crossword puzzle. 2023-09-14

Digital Media crossword  puzzle. crossword puzzle
Across
  1. A social media app based on chatting with friends cybersecurity a way of protecting you from hackers
  2. subway surfers
Down
  1. ur chatting
  2. so u don’t get hacked
  3. playing games

5 Clues: ur chattingplaying gamessubway surfersso u don’t get hackedA social media app based on chatting with friends cybersecurity a way of protecting you from hackers

Cybersecurity Fundamentals Chapter 7 2022-10-27

Cybersecurity Fundamentals Chapter 7 crossword puzzle
Across
  1. tool used to protect data stored in the forms of files.
  2. prevent rogue access point, it is also known as two-way authentication.
  3. transforms data using a complicated algorithm to make it unreadable.
  4. the stages of an information systems attack.
  5. consist of permissions that limits folder or file access for an individual or for a group of users.
  6. one of the most effective ways of protecting against data lost.
  7. protects computers and mobile devices using reputable software
Down
  1. patches are codes that manufacturers provide to prevent a newly discovered virus or worm from making successful attack.
  2. locks physically protecting computer equipment.
  3. uses radio wave to identify and track objects.
  4. it freezes the hard disk partition, does not save any changes that the user makes.
  5. idle timeout and screen lock.
  6. copies the contents of the computer's hard disk to an image file.

13 Clues: idle timeout and screen lock.the stages of an information systems attack.uses radio wave to identify and track objects.locks physically protecting computer equipment.tool used to protect data stored in the forms of files.protects computers and mobile devices using reputable softwareone of the most effective ways of protecting against data lost....

Cybersecurity Awareness Month 2023 2023-08-29

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. This security tool identified and removes malicious programs
  2. The individuals who control access to people, data, and systems
  3. This attack occurs when cybercriminals research and track which sites employees visit the most
  4. What should you do when a workstation or device is no longer in use
  5. Any scenario that triggers emotions should also trigger your __________
Down
  1. Stealing money is the main goal behind this type of malware
  2. Failure to run these equals failure to patch security vulnerabilities
  3. You can help fight cybercrime by becoming a ________________
  4. ____are the last line of defense
  5. Kwiktrip's password policy requires that coworkers change their passwords _____days
  6. The future of security is____,not machines
  7. This attack occurs when someone sneaks into a secured area behind someone else
  8. This dangerous attack targets specific people or organization, often with custom made email or messages
  9. These are designed to maintain the security of everyone associated with an organization

14 Clues: ____are the last line of defenseThe future of security is____,not machinesStealing money is the main goal behind this type of malwareYou can help fight cybercrime by becoming a ________________This security tool identified and removes malicious programsThe individuals who control access to people, data, and systems...

ESLA Cybersecurity NATHAN COMPAGNON 2025-11-24

ESLA Cybersecurity NATHAN COMPAGNON crossword puzzle
Across
  1. an information object (like a word) that points to related information that is located elsewhere and can be retrieved by activating the link.
  2. It's an ICMP message sent to determine if the machine you sent it too is online and how long traffic is.
  3. it's a challenge-response test commonly used by websites to verify the user is a real human
  4. range of frenquencies used to transmit a signal.
  5. It's the process of taking off one layer of headers and passing the rest of the packet up to the next higher layer on the protocol stack.
Down
  1. it's a kind of spyware software that records every keystroke made on a computer’s keyboard
  2. Discreet access placed illicitly in a system or software, making it possible to bypass legitimate access control
  3. Broadcasting from one host to a given set of hosts.
  4. A program which is often started at the time the system boots and runs continuously without intervention from users on the system.
  5. it's an elementary building block of a digital circuit.
  6. Software making revenues by displaying ads in webpages
  7. An algorithm that uses cryptography it include encryption, cryptographic, digital signature and key agreement algorithms.
  8. An attack that sends an improperly large ping with the intent of overflowing the input buffers and causing it to crash.

13 Clues: range of frenquencies used to transmit a signal.Broadcasting from one host to a given set of hosts.Software making revenues by displaying ads in webpagesit's an elementary building block of a digital circuit.it's a kind of spyware software that records every keystroke made on a computer’s keyboard...

Cybersecurity Awareness Month 2024-05-07

Cybersecurity Awareness Month crossword puzzle
Across
  1. The practice of accessing a computer or network without authorization.
  2. Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
  3. A technique used to verify the identity of a user by requiring two different forms of authentication.
  4. A unique string of characters used to authenticate a user's identity.
Down
  1. A program designed to prevent unauthorized access to or from a private network.
  2. Malicious software designed to gain unauthorized access to a computer system.
  3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  4. A piece of software designed to block access to a computer system until a sum of money is paid.
  5. A method of protecting sensitive data by converting it into an unreadable format.

9 Clues: A unique string of characters used to authenticate a user's identity.The practice of accessing a computer or network without authorization.Malicious software designed to gain unauthorized access to a computer system.A program designed to prevent unauthorized access to or from a private network....

Cyber Aware 2022-11-17

Cyber Aware crossword puzzle
Across
  1. an email that attempts to gain sensitive data or credentials
  2. software that compromises the operation of a system by performing an unauthorized function or process
  3. hacker with criminal intent
  4. activity or process where information systems are protected from unauthorized use
Down
  1. a person who uses computers to gain unauthorized access to data
  2. a dishonest scheme
  3. disclosure of sensitive information outside organization
  4. an observable occurrence in an information system or network

8 Clues: a dishonest schemehacker with criminal intentdisclosure of sensitive information outside organizationan email that attempts to gain sensitive data or credentialsan observable occurrence in an information system or networka person who uses computers to gain unauthorized access to data...

AI in Cyberspace: Beyond the Hype 2025-03-07

AI in Cyberspace: Beyond the Hype crossword puzzle
Across
  1. A term often paired with "learning" in AI advancements.
  2. The practice of protecting computer systems from threats.
  3. A type of network modeled after the human brain.
  4. AI systems designed to operate without human intervention.
Down
  1. Related to intelligence that mimics human decision-making.
  2. The use of AI to protect cyberspace from cyber threats.
  3. A step-by-step procedure used in AI for decision-making.
  4. The process AI systems undergo to improve performance.

8 Clues: A type of network modeled after the human brain.The process AI systems undergo to improve performance.The use of AI to protect cyberspace from cyber threats.A term often paired with "learning" in AI advancements.A step-by-step procedure used in AI for decision-making.The practice of protecting computer systems from threats....

RU ITEC411 - Crime and Security 2023-10-17

RU ITEC411 - Crime and Security crossword puzzle
Across
  1. A concealed entry point in communication systems
  2. Enhanced account security using multiple steps(acronym)
  3. This law places restrictive measures on information.
  4. Covert software that gathers user data
  5. Retail corporation affected by a major data breach in 2007.
  6. Legislation protecting intellectual property.
  7. Proving one's identity
  8. A United States federal law that governs unauthorized access to computer systems and data
  9. Deceptive cybersecurity trap for hackers.
  10. Activist use of hacking for social or political causes
  11. This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
  1. False statements harming one's reputation.
  2. False spoken statements harming reputation.
  3. This process transforms information into a coded form to protect it from unauthorized access
  4. Using unique physical features for identification
  5. Malicious software that replicates and infects
  6. system is used in retail to process transactions, record sales, and manage inventory(acronym.
  7. Ethical hacking for security assessment.
  8. Deceptive online tactic to steal personal information
  9. U.S. law for wiretaps and law enforcement access

20 Clues: Proving one's identityCovert software that gathers user dataEthical hacking for security assessment.Deceptive cybersecurity trap for hackers.False statements harming one's reputation.False spoken statements harming reputation.Legislation protecting intellectual property.Malicious software that replicates and infects...

Technology 2024-02-29

Technology crossword puzzle
Across
  1. Temporary storage of frequently accessed data for faster retrieval.
  2. Open-source machine learning framework developed by Google.
  3. Security barrier preventing unauthorized access to a network.
  4. Protection against digital threats and unauthorized access.
  5. UI toolkit for building natively compiled applications for mobile, web, and desktop.
  6. Securing data by converting it into a coded format.
  7. Modern programming language for Android app development.
  8. Agile framework for managing and developing products.
  9. Framework for distributed storage and processing of big data.
  10. Open-source automation server for building, testing, and deploying software.
Down
  1. Versatile, object-oriented programming language.
  2. Identification using unique biological traits like fingerprints.
  3. Platform for automating application deployment and scaling.
  4. Collaboration between development and operations teams for efficient software delivery.
  5. High-level programming language known for readability and versatility.
  6. Remote storage and computing services accessed over the internet.
  7. Flexible and iterative approach to project management.
  8. JavaScript library for building user interfaces.
  9. Open-source operating system kernel.
  10. Software intermediary enabling communication between different applications.

20 Clues: Open-source operating system kernel.Versatile, object-oriented programming language.JavaScript library for building user interfaces.Securing data by converting it into a coded format.Agile framework for managing and developing products.Flexible and iterative approach to project management.Modern programming language for Android app development....

Crossword puzzle 2024-04-30

Crossword puzzle crossword puzzle
Across
  1. Online moral principles.
  2. Tech-enabled capability.
  3. Online harassment.
  4. Tech proficiency.
  5. Digital image.
  6. Tech competency.
  7. Personal info fraud.
  8. Network security barrier.
  9. Online self-representation.
  10. Digital illegal activities.
  11. Personal recognition.
  12. Digital data secrecy.
  13. Data protection.
  14. Personal info protection.
  15. Malicious program blocker.
  16. Protection measures.
  17. Access authentication code.
  18. Data transfer to web.
  19. Harmful software.
  20. Global web network.
  21. Responsible online behavior.
  22. Fraudulent schemes.
  23. Effective digital info use.
  24. Online conduct regulations.
  25. Secure data encoding.
  26. Digital threat knowledge.
Down
  1. Personal online journals.
  2. Analytical reasoning.
  3. Secure web browsing.
  4. Malicious digital assault.
  5. Digital threat protection.
  6. Digital education.
  7. Identity verification.
  8. Digital threat potential.
  9. Digital security measures.
  10. Online activity traces.
  11. Web navigation software.
  12. Digital education platform.
  13. Info safeguarding measures.
  14. Tech access gap.
  15. Unauthorized info access.
  16. thinking: Logical analysis.
  17. Malicious intrusion.
  18. Personal info protection.
  19. Internet precaution.
  20. Defense against digital threats.
  21. Online data secrecy.
  22. Digital safety practices.
  23. Deceptive data theft tactics.
  24. Digital communication.

50 Clues: Digital image.Tech competency.Tech access gap.Data protection.Tech proficiency.Harmful software.Online harassment.Digital education.Global web network.Fraudulent schemes.Secure web browsing.Personal info fraud.Malicious intrusion.Protection measures.Internet precaution.Online data secrecy.Analytical reasoning.Personal recognition....

TUGAS DARING SALSABILA RAMADHANI X–E /32 2025-04-14

TUGAS DARING SALSABILA RAMADHANI X–E /32 crossword puzzle
Across
  1. Singkatan dari Hak Atas Kekayaan Intelektual?
  2. Upaya menghapus konten berbahaya disebut?
  3. Orang yang membuat program komputer disebut?
  4. Konten digital yang mengangkat nilai budaya?
  5. Kata atau frasa yang diketik untuk mencari informasi?
  6. Hak cipta termasuk jenis...?
  7. Proses membuat gambar, video, atau tulisan disebut
  8. Mesin pencari buatan Microsoft?
  9. Informasi palsu yang disebarkan di internet?
  10. Lembaga yang mengatur HAKI di Indonesia?
  11. Spesialis keamanan sistem disebut?
  12. Mesin pencari populer buatan Google?
Down
  1. Menyebarkan konten ke banyak orang secara digital
  2. Profesi yang menganalisis data digital?
  3. Perlindungan terhadap merek dagang disebut...?
  4. Musik, tari, dan cerita rakyat termasuk dalam?
  5. Lembaga pemerintah yang mengawasi konten internet?
  6. Platform populer untuk menyebarkan video budaya?
  7. Simbol "©" menyatakan...?
  8. Ahli jaringan komputer disebut?
  9. operator untuk cari file tertentu
  10. Istilah untuk hasil yang muncul setelah pencarian?
  11. Desainer tampilan antarmuka aplikasi?
  12. Tempat mengetikkan kata kunci pada search engine?
  13. Pemeriksaan kebenaran suatu informasi?
  14. Konten yang mengandung kebencian disebut?

26 Clues: Simbol "©" menyatakan...?Hak cipta termasuk jenis...?Ahli jaringan komputer disebut?Mesin pencari buatan Microsoft?operator untuk cari file tertentuSpesialis keamanan sistem disebut?Mesin pencari populer buatan Google?Desainer tampilan antarmuka aplikasi?Pemeriksaan kebenaran suatu informasi?Profesi yang menganalisis data digital?...

SOLVE ME 2025-04-22

SOLVE ME crossword puzzle
Across
  1. – Writing instructions for computers using programming languages.
  2. – The use of science to solve problems or make life easier.
  3. – A new method, idea, or product.
  4. – The physical components of a computer system.
  5. – A secret word used to access something securely.
  6. – Converting data into a secret code to protect it.
  7. – Sending data or files from your device to the internet.
  8. – A device that detects changes in the environment.
  9. – Programs and other operating information used by a computer.
  10. – A group of interconnected computers.
  11. – A digital ledger used to securely record transactions.
Down
  1. – A machine capable of carrying out tasks automatically.
  2. – To transfer files from the internet to your device.
  3. – An unmanned flying vehicle controlled remotely.
  4. – Using machines or software to perform tasks without human intervention.
  5. – Protecting systems and data from digital attacks.
  6. – A global network connecting millions of computers.
  7. – A set of instructions for solving a problem or performing a task.
  8. – Facts or information stored digitally.
  9. – A path in which electricity flows.

20 Clues: – A new method, idea, or product.– A path in which electricity flows.– A group of interconnected computers.– Facts or information stored digitally.– The physical components of a computer system.– An unmanned flying vehicle controlled remotely.– A secret word used to access something securely.– Protecting systems and data from digital attacks....

TTS_NABILA_XH_26 2025-04-22

TTS_NABILA_XH_26 crossword puzzle
Across
  1. des Desainer tampilan antarmuka aplikasi
  2. Perlindungan untuk karya tulis atau seni
  3. Kantor yang menangani pendaftaran HAKI di Indonesia.
  4. Proses membuat suatu media atau karya
  5. Kata untuk mencari dalam satu situs saja.
  6. Hak atas logo atau simbol bisnis
  7. IT Orang yang mengelola server dan jaringan
  8. Proses menyaring konten buruk
  9. Warisan leluhur yang dijadikan identitas
  10. Proses mengecek fakta
  11. Proses menilai kebenaran informasi
  12. Orang yang menulis dan membuat program komputer
Down
  1. Operator pencarian untuk menghilangkan kata tertentu.
  2. Singkatan dari hak yang melindungi karya
  3. Tanda yang digunakan untuk pencarian tepat di search engine
  4. Platform berbagi video populer
  5. Profesi yang menjaga keamanan data
  6. Hak untuk menggunakan karya secara eksklusif.
  7. Penyebaran konten digital secara luas
  8. Lembaga pengawas media digital
  9. Kata yang digunakan untuk menyambung dua kata kunci dalam pencarian.
  10. Konten tidak layak yang harus dicegah
  11. Orang yang menganalisis kebutuhan sistem.
  12. Konten yang menyatukan unsur modern dan tradisional.
  13. Mesin pencari milik Google

25 Clues: Proses mengecek faktaMesin pencari milik GoogleProses menyaring konten burukPlatform berbagi video populerLembaga pengawas media digitalHak atas logo atau simbol bisnisProfesi yang menjaga keamanan dataProses menilai kebenaran informasiPenyebaran konten digital secara luasProses membuat suatu media atau karyaKonten tidak layak yang harus dicegah...

Internet vocabulary 2025-02-27

Internet vocabulary crossword puzzle
Across
  1. pretending to be companies to get someone's persona information
  2. editing a photo online to get desired results
  3. software used to block use of computer soft ware for a sum of monry
  4. place to communicate online
  5. being protected against online cyber attacks
  6. proper way to communicate on the internet
  7. using the internet to exploit people usually minors
  8. data left behind on the internet
  9. Speaking in All Caps to convey shouting
Down
  1. someone post or comment to purposely invoke anger
  2. a frequently updated webpage for business purposes
  3. recording and posting videos of assault
  4. a packet of data used to track their user anytime they use a site
  5. criminal activities committed using electrics
  6. using the internet to illegally copy software and give it to others
  7. bullying that occurs over the internet
  8. website setting allowing to control who see the information of the user
  9. someone who exploits others
  10. using someone else's identity for financial gain
  11. using electronics to harass someone

20 Clues: someone who exploits othersplace to communicate onlinedata left behind on the internetusing electronics to harass someonebullying that occurs over the internetrecording and posting videos of assaultSpeaking in All Caps to convey shoutingproper way to communicate on the internetbeing protected against online cyber attacks...

Raqamli Iqtsodiyot 2025-12-20

Raqamli Iqtsodiyot crossword puzzle
Across
  1. Aqlli telefonlarni birlashtiruvchi umumiy atama nima?
  2. Internet ulanishining ma'lumot o'tkazish qobiliyati qanday ataladi?
  3. Beshinchi avlod mobil aloqa texnologiyasi qaysi?
  4. Tizimli ravishda tashkil etilgan ma'lumotlar to'plami qanday ataladi?
  5. Ma'lumotlarni qayta ishlash uchun aniq ko'rsatmalar ketma-ketligi nima?
  6. Sun'iy intellektning inglizcha qisqartmasi nima?
  7. Foydalanuvchini to'liq virtual muhitga olib kiradigan texnologiya nima?
  8. Internet orqali ma'lumotlarni saqlash va qayta ishlash usuli qanday ataladi?
  9. Internet orqali loyihalar asosida masofaviy ishlash shakli qanday ataladi?
  10. Shaxsiy virtual tarmoqning qisqartmasi nima?
  11. Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima?
Down
  1. Tarmoqqa kirish nuqtasi va ma'lumotlarni yo'naltirish uchun ishlatiladigan qurilma nima?
  2. Raqamli tafovut nima?
  3. Narsalar interneti qanday qurilmalarni o'z ichiga oladi?
  4. Kompyuter tizimlari va ma'lumotlarni hujumlardan himoya qilish fan'i qaysi?
  5. Internet orqali tovarlar va xizmatlarni sotish va sotib olish qanday ataladi?
  6. Kriptovalyutalarning asosida yotadigan markazlashtirilmagan texnologiya nima?
  7. Innovatsion g'oya yoki mahsulot bilan yangi boshlangan biznes qanday ataladi?
  8. Odamlar virtual olamlarda ijtimoiylashadigan kelajak internet g'oyasi qanday ataladi?
  9. Onlayn muloqotdagi axloqiy qoidalar to'plami qanday ataladi?

20 Clues: Raqamli tafovut nima?Shaxsiy virtual tarmoqning qisqartmasi nima?Beshinchi avlod mobil aloqa texnologiyasi qaysi?Sun'iy intellektning inglizcha qisqartmasi nima?Aqlli telefonlarni birlashtiruvchi umumiy atama nima?Narsalar interneti qanday qurilmalarni o'z ichiga oladi?Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima?...

Raqamli Iqtsodiyot 2025-12-20

Raqamli Iqtsodiyot crossword puzzle
Across
  1. Aqlli telefonlarni birlashtiruvchi umumiy atama nima?
  2. Internet ulanishining ma'lumot o'tkazish qobiliyati qanday ataladi?
  3. Beshinchi avlod mobil aloqa texnologiyasi qaysi?
  4. Tizimli ravishda tashkil etilgan ma'lumotlar to'plami qanday ataladi?
  5. Ma'lumotlarni qayta ishlash uchun aniq ko'rsatmalar ketma-ketligi nima?
  6. Sun'iy intellektning inglizcha qisqartmasi nima?
  7. Foydalanuvchini to'liq virtual muhitga olib kiradigan texnologiya nima?
  8. Internet orqali ma'lumotlarni saqlash va qayta ishlash usuli qanday ataladi?
  9. Internet orqali loyihalar asosida masofaviy ishlash shakli qanday ataladi?
  10. Shaxsiy virtual tarmoqning qisqartmasi nima?
  11. Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima?
Down
  1. Tarmoqqa kirish nuqtasi va ma'lumotlarni yo'naltirish uchun ishlatiladigan qurilma nima?
  2. Raqamli tafovut nima?
  3. Narsalar interneti qanday qurilmalarni o'z ichiga oladi?
  4. Kompyuter tizimlari va ma'lumotlarni hujumlardan himoya qilish fan'i qaysi?
  5. Internet orqali tovarlar va xizmatlarni sotish va sotib olish qanday ataladi?
  6. Kriptovalyutalarning asosida yotadigan markazlashtirilmagan texnologiya nima?
  7. Innovatsion g'oya yoki mahsulot bilan yangi boshlangan biznes qanday ataladi?
  8. Odamlar virtual olamlarda ijtimoiylashadigan kelajak internet g'oyasi qanday ataladi?
  9. Onlayn muloqotdagi axloqiy qoidalar to'plami qanday ataladi?

20 Clues: Raqamli tafovut nima?Shaxsiy virtual tarmoqning qisqartmasi nima?Beshinchi avlod mobil aloqa texnologiyasi qaysi?Sun'iy intellektning inglizcha qisqartmasi nima?Aqlli telefonlarni birlashtiruvchi umumiy atama nima?Narsalar interneti qanday qurilmalarni o'z ichiga oladi?Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima?...

Blikken jubileum NWO Woord van het jaar 2024-01-22

Blikken jubileum NWO Woord van het jaar crossword puzzle
Across
  1. Open deur voor hackers.
  2. Iedereen mag mee doen met deze cursus
  3. De beste plek om je auto schoon te maken van heel Scandinavië
  4. Surft snel weg in de auto
  5. Sesamstraatbewoner zonder bekakte r ontmoet presentatrice van Lingo
  6. Hard rock samenwerkingsverband van Steve Harris en Bruce Dickinson?
  7. Timmerman met een Ierse opa
  8. Wordt vaak geserveerd met kletskoek
  9. Wordt hierop verband gewikkeld?
  10. Partijtje van complottheoristen?
  11. Wordt hierop het nieuwe functiehuis gebouwd?
  12. Conclaaf in de lerarenkamer
  13. Tijd om in beweging te komen?
  14. Dit vormden de zeven dwergen
  15. Werken aan een suffe klus.
Down
  1. Geeft energie aan financiële zaken.
  2. Terughoudendheid is op zijn plaats op kantoor
  3. Internetpolitie
  4. Oproepen tot rekenen moet je tijdig in de agenda zetten.
  5. Allen die naar de dierentuin gaan
  6. Tegemoetkoming voor het winnende boontje
  7. Dit jaar door USV Hercules aan Ajax opgelegd, niet duurzaam
  8. Rustgevende hobby op de computer?
  9. Kwaal bij aanvragers in de NWA en het KIC?
  10. Familie van de airbag en de kniebeschermer.

25 Clues: InternetpolitieOpen deur voor hackers.Surft snel weg in de autoWerken aan een suffe klus.Timmerman met een Ierse opaConclaaf in de lerarenkamerDit vormden de zeven dwergenTijd om in beweging te komen?Wordt hierop verband gewikkeld?Partijtje van complottheoristen?Allen die naar de dierentuin gaanRustgevende hobby op de computer?...

4.1 Application 2023-07-07

4.1 Application crossword puzzle
Across
  1. Month of the Presidential Inauguration
  2. The cabinet department responsible for farming, food, and forestry
  3. The process by which the United States elects the president
  4. An annual message delivered by the president to Congress
  5. The head of the executive branch
  6. Main group of advisors to the president
  7. The cabinet department responsible for foreign affairs
  8. Minimum age to be president of the US
  9. The cabinet department responsible for creating policies and programs related to education in the US
  10. The building where the president resides
Down
  1. Length of presidential term
  2. If a federal official commits a crime, this may happen
  3. The chamber of Congress responsible for approving presidential appointments
  4. The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
  5. The cabinet department responsible for US nuclear infrastructure
  6. First in line of presidential succession
  7. The branch responsible for enforcing laws
  8. The department responsible for maintaining national parks
  9. Amoun of votes needed to win the electoral college
  10. The cabinet department responsible for national defense

20 Clues: Length of presidential termThe head of the executive branchMinimum age to be president of the USMonth of the Presidential InaugurationMain group of advisors to the presidentFirst in line of presidential successionThe building where the president residesThe branch responsible for enforcing lawsAmoun of votes needed to win the electoral college...

charlotte's computer apps review 2022-05-02

charlotte's computer apps review crossword puzzle
Across
  1. Protects your computer from cyber attacks
  2. Where all of your stuff is stored.
  3. An app that you use functions in.
  4. The page at the very end of something to show where you got your information
  5. What app do you make a poster or card on?
  6. Teacher.
  7. What app do you use to communicate with teachers or other students during school time?
  8. Mean people that try to steal your information online
  9. An app used to make your works cited page.
  10. Copying other people's words is known as _____
Down
  1. This class.
  2. An app that makes it easy to present your ideas.
  3. Something that is really bad in Ms. Burghorns class
  4. You can make videos or podcasts on _____.
  5. Something supplied by the school so we can do all of this.
  6. An app used to make a survey.
  7. What is the default size margin?
  8. Format for English essays
  9. Quick access to websites or apps.
  10. What app can you write essays and papers in.

20 Clues: Teacher.This class.Format for English essaysAn app used to make a survey.What is the default size margin?An app that you use functions in.Quick access to websites or apps.Where all of your stuff is stored.Protects your computer from cyber attacksYou can make videos or podcasts on _____.What app do you make a poster or card on?...

RHS Clubs and Organizations 2025-03-20

RHS Clubs and Organizations crossword puzzle
Across
  1. Readers unite
  2. OuiOui
  3. PomPoms and Megaphones
  4. Dead language
  5. If you want to be a veterinarian you should join this club
  6. Students who enjoy SteM
  7. High kicks and splits
  8. Gamers compete here
  9. Touchdown
  10. Makeup and Hair
  11. 3 point shot
  12. Best note takers in the school
  13. Silly gooses on the six strings
  14. People who care about the planet
  15. Do Re Mi Fa So La Ti Do
  16. The military at RHS
  17. Flag Twirling
Down
  1. Students who live for drama
  2. More sophisticated music
  3. Bird's View
  4. Students that love to compare styles
  5. Solving quarrels between students
  6. Articulate arguments and long monologues
  7. Spiking over a net
  8. School sanctioned fights
  9. Build yourself a friend
  10. Keeping people safe online
  11. Board games
  12. Underwater students
  13. We've got spirit! Yes We do!
  14. Hit a homerun
  15. Boot Scootin Boogie
  16. Students who live for the past
  17. Swinging rackets
  18. A musical bunch

35 Clues: OuiOuiTouchdownBird's ViewBoard games3 point shotReaders uniteDead languageHit a homerunFlag TwirlingMakeup and HairA musical bunchSwinging racketsSpiking over a netUnderwater studentsBoot Scootin BoogieGamers compete hereThe military at RHSHigh kicks and splitsPomPoms and MegaphonesBuild yourself a friendStudents who enjoy SteM...

TEKA TEKI SILANG EKONOMI DIGITAL 2024-10-26

TEKA TEKI SILANG EKONOMI DIGITAL crossword puzzle
Across
  1. contoh aplikasi di ekonomi digital dalam bidang Transportasi
  2. tersambung ke internet (daring)
  3. pembeli tidak perlu berhari-hari untuk belanja langsung ke Cina
  4. sesuatu yang berupa teks, gambar, video serta identitas yang tersimpan di internet
  5. standar kode QR nasional untuk pembayaran di Indonesia
  6. perusahaan atau perorangan yang menyediakan barang untuk dijual ke konsumen
  7. kegiatan produksi, distribusi, konsumsi
  8. peraturan dan undang undang dalam perlindungan konsumen
  9. menggunakan teknologi dan jaringan internet dalam menyimpan data dan memproses data
  10. banyaknya persaingan dalam ekonomi digital
  11. ciri utama ekonomi digital
Down
  1. keamanan data di internet
  2. kecerdasan buatan
  3. web atau aplikasi yang memungkinkan pembeli untuk mencari, memesan, dan membayar produk secara digital
  4. ponsel yang telah menunjang penggunaan berbagai aplikasi digital
  5. konsumen membeli jersey ke penjual tanpa perantara
  6. contoh aplikasi di ekonomi digital dalam bidang bisnis
  7. contoh aplikasi di ekonomi digital dalam bidang kesehatan
  8. contoh aplikasi di ekonomi digital dalam bidang perbankan
  9. kemampuan memahami dan menggunakan teknologi digital secara efektif

20 Clues: kecerdasan buatankeamanan data di internetciri utama ekonomi digitaltersambung ke internet (daring)kegiatan produksi, distribusi, konsumsibanyaknya persaingan dalam ekonomi digitalkonsumen membeli jersey ke penjual tanpa perantaracontoh aplikasi di ekonomi digital dalam bidang bisnisstandar kode QR nasional untuk pembayaran di Indonesia...

RU ITEC41 2025-04-18

RU ITEC41 crossword puzzle
Across
  1. Converting data into a secure format to prevent unauthorized access.
  2. Protection of data and systems from cyber threats.
  3. Ensuring information is only accessible to authorized individuals.
  4. Safeguarding data from unauthorized access or damage.
  5. Legal rights over creations, such as digital content.
  6. Legal entitlements related to digital privacy and data.
  7. A weakness that can be exploited in a system.
  8. Deceptive attempts to acquire sensitive information, often via email.
  9. Software designed to disrupt or damage systems.
  10. Unauthorized access to or exposure of data.
Down
  1. Limiting access to data or systems based on authorization.
  2. The accuracy and consistency of data.
  3. Responsibility for actions and decisions, especially regarding data.
  4. Permission granted for the use of personal data.
  5. Illegal activities conducted through digital means.
  6. The trace of an individual's online activity.
  7. Defense against digital threats and attacks.
  8. Monitoring or tracking of online activity.
  9. Unauthorized access to systems or networks.
  10. The right to keep personal information secure and undisclosed.

20 Clues: The accuracy and consistency of data.Monitoring or tracking of online activity.Unauthorized access to systems or networks.Unauthorized access to or exposure of data.Defense against digital threats and attacks.The trace of an individual's online activity.A weakness that can be exploited in a system.Software designed to disrupt or damage systems....

cybercrime 2024-11-09

cybercrime crossword puzzle
Across
  1. Virus or worm code hidden within a seemingly harmless program
  2. Theft Stealing another person’s identity to impersonate them online
  3. Fake messages asking for sensitive information
  4. Protection Protecting children from inappropriate online content
  5. Act of unauthorized copying or using someone's content
  6. Fake sites mimicking real ones to steal information
  7. Passwords, PINs, and fingerprints used for digital security
  8. Protecting data and systems from cyber attacks
  9. Software designed to harm or exploit computers
  10. Common scam emails that trick people into sharing private info
  11. Attacks aimed at disrupting or disabling a network
Down
  1. Financial theft through hacking or scams
  2. Law-breaking activities online
  3. The backbone of online communications targeted by cybercriminals
  4. Method of verifying identity online, often in two steps
  5. Tracking software that monitors user activity without consent
  6. Criminals who exploit security weaknesses online
  7. Testing Breaking into a system to test its defenses legally
  8. Program that spreads across computers, copying itself
  9. Illegal access to systems without permission

20 Clues: Law-breaking activities onlineFinancial theft through hacking or scamsIllegal access to systems without permissionFake messages asking for sensitive informationProtecting data and systems from cyber attacksSoftware designed to harm or exploit computersCriminals who exploit security weaknesses onlineAttacks aimed at disrupting or disabling a network...