cybersecurity Crossword Puzzles

Informatica-italiano marcello e Piergiorgio 2025-03-28

Informatica-italiano marcello e Piergiorgio crossword puzzle
Across
  1. Parola che unisce frasi o parole.
  2. Chi compie l'azione o di cui si parla nella frase.
  3. Parola che descrive un sostantivo.
  4. – Componenti fisici di un computer.
  5. – Sequenza di istruzioni per risolvere un problema.
  6. Parola che collega un sostantivo ad altri elementi della frase.
  7. computing – Uso di server online per archiviare ed elaborare dati.
  8. Parola che modifica un verbo, un aggettivo o un altro avverbio.
  9. Parola che indica una persona, un oggetto o un concetto.
  10. – Archivio strutturato di dati.
Down
  1. – Protezione di dati e sistemi informatici.
  2. operativo – Software che gestisce il computer (es. Windows, Linux).
  3. – Programmi che fanno funzionare un computer.
  4. informatica – Connessione tra computer per scambio di dati.
  5. Parola che sostituisce un sostantivo.
  6. Parola che precede il sostantivo, determinandone il genere e il numero.
  7. Parte della frase che aggiunge informazioni al verbo o al nome.
  8. Parola che indica un'azione o uno stato.
  9. – Scrittura di codice per creare software.
  10. artificiale – Simulazione dell’intelligenza umana nei computer.

20 Clues: – Archivio strutturato di dati.Parola che unisce frasi o parole.Parola che descrive un sostantivo.– Componenti fisici di un computer.Parola che sostituisce un sostantivo.Parola che indica un'azione o uno stato.– Scrittura di codice per creare software.– Protezione di dati e sistemi informatici.– Programmi che fanno funzionare un computer....

Kozhyhar's Crossword 2025-06-07

Kozhyhar's Crossword crossword puzzle
Across
  1. Reaching mutual terms
  2. Scrambling data for safety
  3. Fixing software errors
  4. Barrier against hackers
  5. Larger touchscreen device
  6. Instructions for computers
  7. Virtual boundary for alerts
  8. Tech enhancing shopping
  9. Ease of use in design
  10. Monitoring for security
  11. Pocket-sized computer
  12. Hiring external providers
  13. Delay in data transmission
  14. Legal service agreement
  15. Observing systems or people
  16. Early version for testing
  17. Combined effort for greater results
  18. User interaction metric
  19. Blocks unauthorized access
  20. Health-tracking devices
Down
  1. Shaking up traditional industries
  2. Real-time media delivery
  3. Protecting digital systems
  4. Data transfer capacity
  5. Remote data storage
  6. Meeting regulations
  7. Authentication via body traits
  8. Operational availability
  9. Acceptance of new tech
  10. Consistent performance
  11. Driving force behind change
  12. On-demand audio shows
  13. Reducing human intervention
  14. Team collaboration framework
  15. Signals for location tracking
  16. Blending of tech and business
  17. Hosts data and services
  18. User interaction design
  19. Flexible project methodology
  20. Remote healthcare services

40 Clues: Remote data storageMeeting regulationsReaching mutual termsOn-demand audio showsEase of use in designPocket-sized computerData transfer capacityFixing software errorsAcceptance of new techConsistent performanceBarrier against hackersTech enhancing shoppingMonitoring for securityHosts data and servicesLegal service agreementUser interaction design...

CTF-CW7 2025-11-14

CTF-CW7 crossword puzzle
Across
  1. Logbook tracking all the data-handling jobs run by a company
  2. Strangers checking under the rug
  3. Tekion’s online bouncer from Akamai—blocking cyber troublemakers at the front door!
  4. Sewing up another digital rip
  5. Hacking your way up the office ladder
  6. Hide-and-seek champ, cybersecurity edition
  7. Hiding credit card details with asterisks in statements
  8. Swaggers in so every Tekion API gets its time to shine!
  9. Give it a spin before you buy—or face the judge!
  10. Security’s version of duct-taping a leak
  11. The recipe card for fixing cyber messes
Down
  1. Data from your system’s fitbit
  2. Mixing up data to make it hard to interpret
  3. The “no free hugs” approach to access
  4. New European law aiming to make AI safe, fair, and compliant
  5. Company’s treasure map
  6. At Tekion, even buying office supplies is a breeze with this zippy tool!
  7. Class time for grownups
  8. Turning secret code into plain gossip
  9. Letting the bots handle the boring stuff

20 Clues: Company’s treasure mapClass time for grownupsSewing up another digital ripData from your system’s fitbitStrangers checking under the rugThe “no free hugs” approach to accessHacking your way up the office ladderTurning secret code into plain gossipThe recipe card for fixing cyber messesLetting the bots handle the boring stuff...

Cybersecurity Vocab 2022-03-10

Cybersecurity Vocab crossword puzzle
Across
  1. Credit and Copyright
  2. Cipher
  3. Your Own Device (BYOD)
  4. Stalking
Down
  1. Certificate
  2. Triad
  3. Hygiene

7 Clues: TriadCipherHygieneStalkingCertificateCredit and CopyrightYour Own Device (BYOD)

Cybersecurity Concepts 2023-10-11

Cybersecurity Concepts crossword puzzle
Across
  1. assets of the computer system should be accessible only by authorized parties
  2. A set of circumstances that has the potential to cause loss or harm
  3. A weakness in the system
Down
  1. assets can be modified only by authorized parties or in authorized ways
  2. authorized parties should not be prevented from accessing objects to which they have legitimate access
  3. An action, device, procedure, or technique that eliminates/reduces a vulnerability and/or to counter threats

6 Clues: A weakness in the systemA set of circumstances that has the potential to cause loss or harmassets can be modified only by authorized parties or in authorized waysassets of the computer system should be accessible only by authorized partiesauthorized parties should not be prevented from accessing objects to which they have legitimate access...

Cybersecurity crosswords 2024-10-18

Cybersecurity crosswords crossword puzzle
Across
  1. A person who uses technical skills to gain unauthorized access to systems.
  2. Protecting information from unauthorized access or harm.
  3. Facts and statistics collected for analysis or reference.
Down
  1. A group of connected computers that can share data and resources.
  2. To make something more current or improve it, often related to software.
  3. The ability to enter or use a system, network, or resource.

6 Clues: Protecting information from unauthorized access or harm.Facts and statistics collected for analysis or reference.The ability to enter or use a system, network, or resource.A group of connected computers that can share data and resources.To make something more current or improve it, often related to software....

Cybersecurity Terminology Puzzle (participation 3) 2023-01-27

Cybersecurity Terminology Puzzle (participation 3) crossword puzzle
Across
  1. software that is harmful
  2. software that checks for malware
  3. internet access at starbucks
  4. scrambling data in unreadable
  5. attacks seeking out personal info
  6. software that tracks you
  7. shield for data
  8. tech savy criminals stealing private information
  9. improving security tools for cloud infrastructure
  10. multiple attackers preventing legitimate users
Down
  1. tricking users to click an image
  2. altered image creating false reality
  3. malware that makes you pay
  4. malware pretending to be useful
  5. designs, builds, and tests security systems
  6. malware that displays adverts
  7. network pro learning hacking techniques
  8. online harassment that intimidates victims

18 Clues: shield for datasoftware that is harmfulsoftware that tracks youmalware that makes you payinternet access at starbucksscrambling data in unreadablemalware that displays advertsmalware pretending to be usefultricking users to click an imagesoftware that checks for malwareattacks seeking out personal infoaltered image creating false reality...

Computing Practice Tutorial Worksheet #3 2024-09-16

Computing Practice Tutorial Worksheet #3 crossword puzzle
Across
  1. An important attribute for catching mistakes
  2. Someone who analyzes data for a living
  3. A person who builds websites
Down
  1. A job that involves protecting information
  2. The language computers understand

5 Clues: A person who builds websitesThe language computers understandSomeone who analyzes data for a livingA job that involves protecting informationAn important attribute for catching mistakes

Cyber Physical Systems - 1 2025-03-20

Cyber Physical Systems - 1 crossword puzzle
Across
  1. The coordination of processes to operate in unison.
  2. Protection of digital and cyber-physical systems from threats.
  3. Processing data closer to the source rather than a central server.
  4. Study of control and communication in machines and living beings.
  5. A highly automated, connected, and intelligent manufacturing system.
  6. Internet-based computing providing storage and processing power.
  7. A network of connected devices that communicate over the internet.
  8. Using models to replicate real-world behaviors.
  9. Devices that detect and respond to physical changes.
  10. The ability of different systems to work together.
  11. Large volumes of data used for analytics and decision-making.
Down
  1. A decentralized and secure digital ledger technology.
  2. Combining different subsystems into a unified system.
  3. A virtual replica of a physical system for monitoring and analysis.
  4. A computing system integrated into a larger system.
  5. The capability of a system to function independently.
  6. Devices that convert electrical signals into mechanical motion.
  7. Related to manufacturing and production systems.
  8. The process of making systems operate without human intervention.

19 Clues: Using models to replicate real-world behaviors.Related to manufacturing and production systems.The ability of different systems to work together.The coordination of processes to operate in unison.A computing system integrated into a larger system.Devices that detect and respond to physical changes....

Cyber Safety 2024-04-15

Cyber Safety crossword puzzle
Across
  1. A secret combination of words or numbers that allows a user to access an online service
  2. an attempt to trick a person into giving away money or information by pretending to be a well-known company
  3. harm inflicted through text, emails, or online sites
  4. online etiquette - being nice and respectful to others online
  5. software that displays unwanted advertising on your computer
  6. someone who gains unauthorized access to people's computers
  7. software designed to damage a computer of phone
  8. searching through websites freely
  9. a dishonest scheme to get information or money
  10. self-replicating program that attacks a computer system
Down
  1. short form for “world wide web"
  2. leaving offensive messages on the internet
  3. computer equipment, machines, and parts
  4. an internet-related crime
  5. when someone tracks, lures, or harasses people online
  6. a security system used to block malicious threats to your computer
  7. any action that’s taken to protect computers and prevent online crime
  8. a shorter word for internet
  9. unwanted emails or junk mail

19 Clues: an internet-related crimea shorter word for internetunwanted emails or junk mailshort form for “world wide web"searching through websites freelycomputer equipment, machines, and partsleaving offensive messages on the interneta dishonest scheme to get information or moneysoftware designed to damage a computer of phone...

Cybersecurity 2023-03-26

Cybersecurity crossword puzzle
Across
  1. Large marsupial
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

4 Clues: Has a trunkFlying mammalLarge marsupialMan's best friend

Cybersecurity 2023-09-13

Cybersecurity crossword puzzle
Across
  1. A spear phishing attack to be precise with the objective being to trick employees into taking harmful actions, typically sending money to the attacker.
Down
  1. Sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  2. The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.
  3. A 4 step method used for checking suspicious emails to make sure they are not a phishing email.

4 Clues: A 4 step method used for checking suspicious emails to make sure they are not a phishing email.A spear phishing attack to be precise with the objective being to trick employees into taking harmful actions, typically sending money to the attacker....

Cybersecurity 2025-08-19

Cybersecurity crossword puzzle
Across
  1. clue4
  2. clue2
Down
  1. clue1
  2. clue3

4 Clues: clue1clue4clue3clue2

brainriddle 2025-02-09

brainriddle crossword puzzle
Across
  1. A cyberattack where fake QR codes trick users into visiting malicious sites.
  2. A cyberattack that tricks users into clicking hidden elements.
  3. A tool that protects a network by blocking suspicious traffic.
  4. A method used to avoid security restrictions.
  5. When private data is exposed to unauthorized people.
  6. An attack where a hacker takes control of an active user session.
  7. A weakness in software that hackers can exploit.
Down
  1. A method of guessing passwords by trying many combinations.
  2. A small software update that fixes security flaws.
  3. A cybersecurity event that may cause harm to systems.
  4. A physical or digital device used for secure authentication.
  5. Files that store records of activity on a system.
  6. A username and password used for authentication.
  7. A type of malware that bombards users with unwanted ads.
  8. A security method that requires two types of authentication.

15 Clues: A method used to avoid security restrictions.A username and password used for authentication.A weakness in software that hackers can exploit.Files that store records of activity on a system.A small software update that fixes security flaws.When private data is exposed to unauthorized people.A cybersecurity event that may cause harm to systems....

Claims Board Friday Fun 9/13 2024-09-13

Claims Board Friday Fun 9/13 crossword puzzle
Across
  1. Movie name referred by Google CEO during his meetings
  2. Attaches itself to clean files and spreads to other files
  3. 14 year old scientist created specialized soap to treat cancer
  4. Publishes latest tech news and Tech CEOs start their day going through this site
  5. Use phone calls to trick individuals to reveal personal details
  6. Urgency of a work item to be worked upon
  7. Cybersecurity form with major outage impacting Microsoft apps
Down
  1. Bug not directly related to the code
  2. Effective way of writing User stories
  3. Company which will bring 2 astronauts who are stuck in International Space Station
  4. Every action has an outcome and none other than you are responsible for it
  5. Deceives via emails
  6. Level of Impact
  7. Caused by Solar Storms
  8. Text messages to trick individuals to reveal personal information

15 Clues: Level of ImpactDeceives via emailsCaused by Solar StormsBug not directly related to the codeEffective way of writing User storiesUrgency of a work item to be worked uponMovie name referred by Google CEO during his meetingsAttaches itself to clean files and spreads to other filesCybersecurity form with major outage impacting Microsoft apps...

Responsible AI In Practice 2025-05-07

Responsible AI In Practice crossword puzzle
Across
  1. Use of technology to perform tasks without human intervention
  2. General Data Protection Regulation governing data privacy in the EU
  3. Assessment Evaluation of potential negative outcomes of AI applications
  4. Openness about how AI systems operate and make decisions
  5. Responsibility for the outcomes produced by AI systems
Down
  1. Ensuring individuals' personal information is protected in AI processes
  2. Minimisation Collecting only the data necessary for a specific purpose
  3. Systems that simulate human intelligence
  4. Human supervision of AI outputs to ensure accuracy and fairness
  5. Adherence to laws and regulations related to AI usage
  6. Systematic error introduced into AI models due to prejudiced data
  7. Process of removing personally identifiable information from data
  8. Moral principles guiding the responsible use of AI
  9. Protection of systems and data from digital attacks
  10. AI Act European Union legislation regulating artificial intelligence

15 Clues: Systems that simulate human intelligenceMoral principles guiding the responsible use of AIProtection of systems and data from digital attacksAdherence to laws and regulations related to AI usageResponsibility for the outcomes produced by AI systemsOpenness about how AI systems operate and make decisions...

Technology crossword 2025-06-26

Technology crossword crossword puzzle
Across
  1. Programs you use on your phone or tablet.
  2. (Virtual Reality) A headset that lets you enter a 3D digital world.
  3. Protection of computers and data from attacks.
  4. A machine that can think or learn like a human.
  5. Software you can download and use for free.
  6. Provide The company that gives you internet access.
  7. Device A phone, watch, or TV that can connect to the internet.
  8. Technology Devices like smartwatches or fitness bands you wear.
Down
  1. Engine A website like Google to find information.
  2. A small electronic tool or device.
  3. A place where you can connect to wireless internet.
  4. Media Platforms like Instagram, TikTok, or Twitter.
  5. A picture taken of your screen.
  6. A big computer that stores data and websites.
  7. Browser An app like Chrome or Safari to explore websites.
  8. Network A site where people connect and share, like Facebook.

16 Clues: A picture taken of your screen.A small electronic tool or device.Programs you use on your phone or tablet.Software you can download and use for free.A big computer that stores data and websites.Protection of computers and data from attacks.A machine that can think or learn like a human.Engine A website like Google to find information....

Safe Browsing 2025-05-27

Safe Browsing crossword puzzle
Across
  1. unethical hacker
  2. software program or piece of hardware to screen out hackers, viruses, worms that try to reach computer over internet
  3. Vital Information Resources Under Seize.
  4. Information and Communication Technology
  5. threatening over internet
  6. application of technologies to protect programs, data, users from cyber attacks and the risk of using internet
  7. software for identifying, deleting and fixing malicious software.
  8. misleading people by sending email or link pretending its from a trusted organisation or person for stealing their personal details.
  9. a file stores information about visiting of websites in the browser.
  10. malicious software for damaging computer
Down
  1. person hacks information with permission
  2. act of breaking security code of digital devices.
  3. people gain by accessing data remotely in an unauthorized manner.
  4. protect original works of authorship including text, image, music etc
  5. Crime through internet

15 Clues: unethical hackerCrime through internetthreatening over internetperson hacks information with permissionVital Information Resources Under Seize.Information and Communication Technologymalicious software for damaging computeract of breaking security code of digital devices.people gain by accessing data remotely in an unauthorized manner....

Get Familiar with IEEE's Technology Predictions for 2024 2024-02-10

Get Familiar with IEEE's Technology Predictions for 2024 crossword puzzle
Across
  1. Success Rank >10, Maturity Grade C/D (Middle word)
  2. Success Grade C+, Maturity Rank 18
  3. Maturity Grade C/D,Success Rank >20 (Last word)
  4. Success Grade B-, Market Adoption Rank 13 (Last word)
Down
  1. Commercial Adoption Horizon >3.36 years, Success Grade B (Last word)
  2. Commercial Adoption Horizon <2.98 years, Maturity Grade B- (Last word)
  3. Commercial Adoption Horizon Rank 11, Impact to Humanity Rank 10
  4. Market Adoption Grade B, Maturity Rank 1 (First word)

8 Clues: Success Grade C+, Maturity Rank 18Maturity Grade C/D,Success Rank >20 (Last word)Success Rank >10, Maturity Grade C/D (Middle word)Market Adoption Grade B, Maturity Rank 1 (First word)Success Grade B-, Market Adoption Rank 13 (Last word)Commercial Adoption Horizon Rank 11, Impact to Humanity Rank 10...

Crossword2 2024-12-18

Crossword2 crossword puzzle
Across
  1. A computer that provides resources to other devices.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. The language used to structure web pages.
  4. An error in a program that needs fixing.
  5. Address A unique string of numbers separated by periods that identifies each computer using the Internet Protocol.
Down
  1. Secures data by converting it into a coded format.
  2. Protects networks from unauthorized access.
  3. Stores data on the internet instead of your local device.

8 Clues: An error in a program that needs fixing.The language used to structure web pages.Protects networks from unauthorized access.Secures data by converting it into a coded format.A computer that provides resources to other devices.Stores data on the internet instead of your local device....

INDUSTRY 4.0 2025-08-19

INDUSTRY 4.0 crossword puzzle
Across
  1. Devices that detect and measure physical properties like temperature or pressure.
  2. Technology that enables machines to simulate human intelligence
  3. Network that connects everyday objects to the internet
  4. Online servers used for storage, computing, and services
  5. Large volumes of structured and unstructured information analyzed for insights
  6. Protection of data, systems, and networks against digital attacks.
Down
  1. A production site enhanced by connectivity, automation, and AI.
  2. Machines that can perform tasks automatically, often used in factories

8 Clues: Network that connects everyday objects to the internetOnline servers used for storage, computing, and servicesA production site enhanced by connectivity, automation, and AI.Technology that enables machines to simulate human intelligenceProtection of data, systems, and networks against digital attacks....

Online Safety 2020-10-16

Online Safety crossword puzzle
Across
  1. used to protect your data on the internet.
  2. someone who gains unauthorized access to data
  3. slang for Facebook sabotage.
  4. a way to exchange messages over the internet.
  5. information stored on computers.
Down
  1. sending emails impersonating a company to get personal information and bank details.
  2. someone who uses the internet to bully people.
  3. something that keeps your account protected that only you know, they be in the form of bio metrics, letters and numbers.

8 Clues: slang for Facebook sabotage.information stored on computers.used to protect your data on the internet.someone who gains unauthorized access to dataa way to exchange messages over the internet.someone who uses the internet to bully people.sending emails impersonating a company to get personal information and bank details....

Cybersecurity 2023-08-23

Cybersecurity crossword puzzle
Across
  1. the I in FIM stands for?
  2. Before an application goes live, it has to go through a security ___.
Down
  1. We are all
  2. Identity & Access Management.

4 Clues: We are allthe I in FIM stands for?Identity & Access Management.Before an application goes live, it has to go through a security ___.

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. a person trying to get your private information
  2. a way people get money from you by sending you a scam email
  3. a kind of virus that is also a animal
Down
  1. a code used to keep information safe

4 Clues: a code used to keep information safea kind of virus that is also a animala person trying to get your private informationa way people get money from you by sending you a scam email

Information and Network Security 2023-09-08

Information and Network Security crossword puzzle
Across
  1. coded message
  2. Cause loss of message confidentiality
  3. A security principle that ensures data is accessible only to those authorized to view or modify it.
  4. A secret combination of characters used to authenticate a user's identity
  5. A type of malware that spreads by duplicating itself and infecting other programs
  6. This Ciphers these hide the message by rearranging the letter order
  7. The practice of protecting computer systems and networks from digital attacks.
Down
  1. Causes loss of message integrity
  2. Plain text message may be hidden in image or sound It is not encryption
  3. Is most difficult attack to find out

10 Clues: coded messageCauses loss of message integrityIs most difficult attack to find outCause loss of message confidentialityThis Ciphers these hide the message by rearranging the letter orderPlain text message may be hidden in image or sound It is not encryptionA secret combination of characters used to authenticate a user's identity...

Crossword#10 2023-07-11

Crossword#10 crossword puzzle
Across
  1. - Storing and accessing data and applications remotely over the internet.
  2. - technology to manage business processes and operations.
  3. - Conducting business transactions online.
  4. - Creating virtual versions of computer hardware and software to increase efficiency and reduce costs.
  5. - Working remotely using technology to communicate and collaborate.
  6. - Using technology to automate routine tasks and processes.
Down
  1. - Protecting computer systems and networks from unauthorized access or attacks.
  2. - technology to manage interactions with customers.
  3. - computer system thatcan perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making.
  4. - Using data and statistical analysis to inform decision-making.

10 Clues: - Conducting business transactions online.- technology to manage interactions with customers.- technology to manage business processes and operations.- Using technology to automate routine tasks and processes.- Using data and statistical analysis to inform decision-making.- Working remotely using technology to communicate and collaborate....

Techy Word Search Challenge 2024-04-16

Techy Word Search Challenge crossword puzzle
Across
  1. Information stored and processed by computers, like numbers, text, or images.
  2. Writing instructions for a computer using a programming language.
  3. Machines that can move, sense, and interact with their environment.
  4. The physical parts of a computer that you can touch and see.
  5. A global network that connects computers worldwide.
Down
  1. Protecting computers, networks, and data from cyberattacks.
  2. Instructions for a computer's next move in a game.
  3. Intelligence: Computers that can learn, reason, and make decisions like humans.
  4. Programs that make computers work, like games, word processors, or music players.
  5. Turning information into a secret code to keep it safe from hackers.

10 Clues: Instructions for a computer's next move in a game.A global network that connects computers worldwide.Protecting computers, networks, and data from cyberattacks.The physical parts of a computer that you can touch and see.Writing instructions for a computer using a programming language....

SMART CITIES 2022-02-15

SMART CITIES crossword puzzle
Across
  1. The transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
  2. T in ciTies
  3. SMART is the ___ use of resources in an efficient & effective way
  4. a person who is among the first to explore or settle a new country or area
  5. E in citiEs
  6. C in Cities
  7. facts and statistics collected together for reference or analysis
Down
  1. 2nd I in citIes
  2. S in citieS
  3. A global network which facilitates communication and sharing of information online
  4. the protection of computer systems and networks from cyber threats
  5. 1st I in cIties
  6. Reuse discarded objects or material in such a way as to create a product of higher quality or value than the original

13 Clues: S in citieST in ciTiesE in citiEsC in Cities2nd I in citIes1st I in cItiesSMART is the ___ use of resources in an efficient & effective wayfacts and statistics collected together for reference or analysisthe protection of computer systems and networks from cyber threatsa person who is among the first to explore or settle a new country or area...

Module 8 EDM-250 2023-10-17

Module 8 EDM-250 crossword puzzle
Across
  1. Critical emerging hazard w/ critical impacts
  2. National Flood Insurance Program
  3. lack of leadership is the most _____ issue in EM
Down
  1. after 9/11 changed from all-hazard to ____
  2. 1990's program called Project _____

5 Clues: National Flood Insurance Program1990's program called Project _____after 9/11 changed from all-hazard to ____Critical emerging hazard w/ critical impactslack of leadership is the most _____ issue in EM

Module 8 EDM-250 2023-08-16

Module 8 EDM-250 crossword puzzle
Across
  1. Critical emerging hazard w/ critical impacts
  2. National Flood Insurance Program
  3. lack of leadership is the most _____ issue in EM
Down
  1. after 9/11 changed from all-hazard to ____
  2. 1990's program called Project _____

5 Clues: National Flood Insurance Program1990's program called Project _____after 9/11 changed from all-hazard to ____Critical emerging hazard w/ critical impactslack of leadership is the most _____ issue in EM

HOW AI INTEGRATE IN ERP TO SOLVE CYBERSECURITY ISSUE 2025-04-27

HOW AI INTEGRATE IN ERP TO SOLVE CYBERSECURITY ISSUE crossword puzzle
Across
  1. System that integrates business processes
  2. Security process that scrambles data to protect it
Down
  1. Type of attack AI helps prevent
  2. Technique used to detect unusual patterns automatically
  3. Method that predicts future cybersecurity risks

5 Clues: Type of attack AI helps preventSystem that integrates business processesMethod that predicts future cybersecurity risksSecurity process that scrambles data to protect itTechnique used to detect unusual patterns automatically

Senior Cybersecurity Words to Know 2024-01-04

Senior Cybersecurity Words to Know crossword puzzle
Across
  1. An area of the computer's memory that only one program can acess
  2. Removing any unnecessary information
  3. A current or former employee who has access to a company's data or network and could be part of an attack
  4. A piece of message or data transmitted through the internet
  5. address A series of numbers unique to a device
  6. Giving as few people as necessary access to digital content
Down
  1. Anything that is stored on a computer.
  2. The protection of digital devices against attacks
  3. A black and white code that contains data
  4. A box that conducts electricity and prevents electromagnetic charges
  5. A wireless access point that provides internet access
  6. Keeping information from being seen by certain users

12 Clues: Removing any unnecessary informationAnything that is stored on a computer.A black and white code that contains dataaddress A series of numbers unique to a deviceThe protection of digital devices against attacksKeeping information from being seen by certain usersA wireless access point that provides internet access...

crossword puzzle 2025-07-25

crossword puzzle crossword puzzle
Across
  1. a small device or machine with a particular purpose
  2. Something that takes attention away from what is important.
  3. The exchange of information between people or devices.
  4. A word or phrase preceded by “#” used to categorize content online.
  5. Reusing discarded materials to create products of higher value.
  6. Something that spreads quickly online.
Down
  1. The flat surface on a device where images or data are displayed.
  2. Practices to protect computers and networks from attacks.
  3. Processing used materials into new products.
  4. Transmitting video or audio over the internet in real time.
  5. A mobile phone with advanced features like internet access and apps.
  6. Media: Websites and apps for sharing content and connecting with others.

12 Clues: Something that spreads quickly online.Processing used materials into new products.a small device or machine with a particular purposeThe exchange of information between people or devices.Practices to protect computers and networks from attacks.Transmitting video or audio over the internet in real time....

Internet Security Crossword puzzle 2022-10-24

Internet Security Crossword puzzle crossword puzzle
Across
  1. Who can communicate and control servers if their computers get an infection?
  2. What is the main thing Malware tries to attack?
  3. What type of internet hack uses fake sources of emails?
  4. What can Malware use to send more viruses?
Down
  1. What is an alternative to internet security?
  2. Who can collect your user credentials?
  3. What can Malware steal if it gets into your device?

7 Clues: Who can collect your user credentials?What can Malware use to send more viruses?What is an alternative to internet security?What is the main thing Malware tries to attack?What can Malware steal if it gets into your device?What type of internet hack uses fake sources of emails?...

Attack and Risk Vectors 2023-08-17

Attack and Risk Vectors crossword puzzle
Across
  1. like pretending to be a legitimate website
  2. harmful software
  3. or holding a PC or operation station hostage
  4. a cybercriminal's path to breach a computer system or network
  5. tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
  1. send fake emails
  2. the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.

7 Clues: send fake emailsharmful softwarelike pretending to be a legitimate websiteor holding a PC or operation station hostagea cybercriminal's path to breach a computer system or networktricking people into revealing sensitive information, often through deceptive emails or fake websites?...

Season4Sharing Scavenger Hunt! 2020-12-08

Season4Sharing Scavenger Hunt! crossword puzzle
Across
  1. Our CFO's Last Name
  2. Service Makes Individuals’ Lives Easier
  3. Last Name of Nobel Prize Winner interviewed by Jean English during Ignite20
  4. Nikesh announced our intent to acquire this company in Nov 11, 2020
  5. A world where each day is safer and more secure than the one before
Down
  1. First name of one of our founders
  2. One of our NGFW competitors
  3. It is the name of our of our main brands
  4. Where has James McGregor worked the longest?
  5. On this month, Palo Alto Networks became a public company in the NYSE Stock Market
  6. To be the cybersecurity partner of choice, protecting our digital way of life
  7. Palo Alto Networks Stock Symbol

12 Clues: Our CFO's Last NameOne of our NGFW competitorsPalo Alto Networks Stock SymbolFirst name of one of our foundersService Makes Individuals’ Lives EasierIt is the name of our of our main brandsWhere has James McGregor worked the longest?Nikesh announced our intent to acquire this company in Nov 11, 2020...

Computer language and browsing safely 2025-05-31

Computer language and browsing safely crossword puzzle
Across
  1. BEFRIENDING OF OPERATOR (ADULT) AND CHILDREN TO EMPHASIZE A CHILD'S EMOTIONS
  2. THE COMPUTER LANGUAGE WHICH IS USED NOWADAYS
  3. THE PEOPLE WHO DO HACKING
  4. SHORT FORM OF THE ARTIFICIAL INTELLIGENCE
  5. IT IS A ILLEGAL THING WHICH IS USED TO CAUSE DISTURBANCES IN A COMPUTER
  6. THE CYBERCRIME WHICH STEALS VITAL OR SECRET INFORMATION OF A COMPUTER
  7. THE CRIMES COMMITTED BY CYBERCRIMNIALS
  8. THE MACHINE WHICH CONVERTS MACHINE LANGUAGE INTO HUMAN LANGUAGE LINE-BY-LINE
Down
  1. EXAMPLES OF THE APPS ARE C, C++, PYTHON ETC
  2. THE PROCESS OF ADDING OR SUBTRACTING BINARY NUMBERS
  3. USES 0 AS OFF AND 1 AS ON
  4. THE ALPHABETICAL LETTERS BUTTONS USED IN ASSEMBLY LANGUAGE
  5. THE PROCESS OF PROTECTING COMPUTER AND COMPUTER SYSTEMS FROM CYBERCRIMES
  6. USES MNEMONICS INSTEAD OF USING BINARY NUMBERS
  7. THE PROCESS OF BULLYING OR HURTING SOMEONE'S FEELINGS
  8. THE MACHINE WHICH CONVERTS MACHINE LANGUAGE INTO HUMAN LANGUAGE AND VICE-VERSA IN ONE GO

16 Clues: USES 0 AS OFF AND 1 AS ONTHE PEOPLE WHO DO HACKINGTHE CRIMES COMMITTED BY CYBERCRIMNIALSSHORT FORM OF THE ARTIFICIAL INTELLIGENCEEXAMPLES OF THE APPS ARE C, C++, PYTHON ETCTHE COMPUTER LANGUAGE WHICH IS USED NOWADAYSUSES MNEMONICS INSTEAD OF USING BINARY NUMBERSTHE PROCESS OF ADDING OR SUBTRACTING BINARY NUMBERS...

Browsing safety 2025-06-06

Browsing safety crossword puzzle
Across
  1. misusing someone's personal information like name , dob
  2. the scientific knowledge and/or equipment that is needed for a particular industry
  3. malware that encrypts viticm's personal data until the ransomware is paid
  4. Refers to illegal entry into a system
  5. Criminal activity intended to harm a computer device
  6. an impression you create while surfing online
Down
  1. protects the system from computer virus
  2. Our lives heavily rely on it
  3. protects confidential information
  4. type of malicious software (malware) that infects a computer and can replicate itself by modifying other programs.
  5. Ethnical hackers are called
  6. Full form of otp
  7. Unethical hackers are called
  8. software that helps in preventing unauthorised access in the computer system
  9. cybersecurity threat where attackers use deceptive means, often email or text messages, to trick individuals into revealing personal information or installing malware
  10. harassing people online through deliberate manner

16 Clues: Full form of otpEthnical hackers are calledOur lives heavily rely on itUnethical hackers are calledprotects confidential informationRefers to illegal entry into a systemprotects the system from computer virusan impression you create while surfing onlineharassing people online through deliberate manner...

Crossword Puzzle Challenge 2025-10-20

Crossword Puzzle Challenge crossword puzzle
Across
  1. A general term for malicious software.
  2. An incident where data is accessed without authorization.
  3. A hidden method of bypassing normal authentication.
  4. Software that secretly gathers user information without consent.
  5. Impersonating another device or user to gain access.
  6. A self-replicating malware that spreads without user interaction.
  7. The process of verifying a user's identity.
Down
  1. The part of malware that performs the malicious action.
  2. A type of malware disguised as legitimate software.
  3. A potential cause of an unwanted incident in cybersecurity.
  4. Fraudulent attempt to obtain sensitive information via email or messaging.
  5. A network of infected devices controlled remotely.
  6. A stealthy type of malware designed to hide its presence.
  7. A piece of code that takes advantage of a vulnerability.
  8. Malware that attaches to files and spreads when executed.
  9. A method of converting data into a fixed-size string, often used for passwords.

16 Clues: A general term for malicious software.The process of verifying a user's identity.A network of infected devices controlled remotely.A type of malware disguised as legitimate software.A hidden method of bypassing normal authentication.Impersonating another device or user to gain access.The part of malware that performs the malicious action....

Kiberxavfsizlik siyosatida xalqaro va milliy standart meyorlarini o'rganish 2025-12-05

Kiberxavfsizlik siyosatida xalqaro va milliy standart meyorlarini o'rganish crossword puzzle
Across
  1. Industrial Control Systems (SCADA, DCS) xavfsizligi uchun NIST standarti.
  2. O‘zbekistonda shaxsiy ma’lumotlarni himoyalash bo‘yicha asosiy hukumat organi — “____ inspeksiyasi”.
  3. Kiberhujumlarga qarshi baholash modeli: __ Maturity Model (C2M2).
  4. AQSh federal hukumatida barcha federal axborot tizimlari xavfsizlik talablarini belgilovchi qonun (abbr.).
  5. Risklarni aniqlash, baholash va boshqarish bo‘yicha xalqaro standart: ISO/IEC ____.
  6. NIST tomonidan ishlab chiqilgan bulutli hisoblash xavfsizlik modeli.
  7. DSS Elektron to‘lov kartalari xavfsizligi bo‘yicha xalqaro standart (____ DSS).
  8. Blockchain xavfsizligi bo‘yicha ISO/TS ____.
Down
  1. O‘zDSt ____:2019 — O‘zbekistonda davlat axborot tizimlari uchun axborot xavfsizligi talablari.
  2. Yaponiyaning axborot xavfsizligi boshqaruv tizimi standarti (ISO 27001 ga ekvivalent).
  3. Ma’lumotlarga kirish bosqichlari: Identification → Authentication → Authorization.
  4. Operational Technology (OT) uchun ICS/SCADA xavfsizlik talablari bo‘yicha xalqaro standart.
  5. Axborot tizimlari auditiga oid xalqaro standartlar oilasi (ISO/IEC ____).
  6. Axborot xavfsizligida doimiy takomillashtirish sikli: Plan → Do → Check → Act.

14 Clues: Blockchain xavfsizligi bo‘yicha ISO/TS ____.Kiberhujumlarga qarshi baholash modeli: __ Maturity Model (C2M2).NIST tomonidan ishlab chiqilgan bulutli hisoblash xavfsizlik modeli.Industrial Control Systems (SCADA, DCS) xavfsizligi uchun NIST standarti.Axborot tizimlari auditiga oid xalqaro standartlar oilasi (ISO/IEC ____)....

Prep for Cybermonth with us! 2025-05-16

Prep for Cybermonth with us! crossword puzzle
Across
  1. the month that we celebrate Cybersecurity Awareness
  2. attacks that hackers use to exploit human error
  3. the name of the team who promotes cyberawareness
Down
  1. using artificial intelligence to put faces of someone onto another body
  2. something that keeps your accounts safe
  3. those who are ill actors in the cyber space

6 Clues: something that keeps your accounts safethose who are ill actors in the cyber spaceattacks that hackers use to exploit human errorthe name of the team who promotes cyberawarenessthe month that we celebrate Cybersecurity Awarenessusing artificial intelligence to put faces of someone onto another body

Q1 Crssword 2023-04-25

Q1 Crssword crossword puzzle
Across
  1. ____ First - deliver problem resolution and exceed customer expectations
  2. Product that extends patching to protect over 350 third party apps
  3. Software-defined secondary storage solution
  4. Firm who provided an audit of the systems management appliance source code
  5. A type of malicious software designed to block access to a computer system until a sum of money is paid
  6. Company who’s slogan Where Next Meets Now?
  7. Information Systems Management abbreviation
Down
  1. Cloud ready enterprise backup software
  2. Practice of defending computers, networks and data from malicious attacks
  3. This product released Query Insights, which allows customers to gain visibility into the performance of SQL statements
  4. Month of the Sales Kickoff Meeting 2023
  5. Celebrating its 25th anniversary
  6. ___ Thompson, President and GM
  7. Abbreviation, primarily covering the erwin portfolio and Toad data point

14 Clues: ___ Thompson, President and GMCelebrating its 25th anniversaryCloud ready enterprise backup softwareMonth of the Sales Kickoff Meeting 2023Company who’s slogan Where Next Meets Now?Software-defined secondary storage solutionInformation Systems Management abbreviationProduct that extends patching to protect over 350 third party apps...

Functions of the departments 2021-10-11

Functions of the departments crossword puzzle
Across
  1. Responsible for assigning employees (workers) or vehicles to customers.
  2. Responsible for making the product
  3. Responsible for the office/building and any repairs.
  4. Responsible for the management of the flow of things between the point of origin and the point of consumption in order to meet requirements of customers or corporations.
  5. Responsible of server configurations, routing protocols, network configurations and storage environments.
Down
  1. Responsible for keeping a connection with different departments
  2. Responsible for selling the product/service.
  3. work with organizations to keep their computer information systems secure.
  4. Responsible for the company's computers and proper function of the equipment.
  5. Responsible for payments, bills and expenses.
  6. Responsible for hiring new staff

11 Clues: Responsible for hiring new staffResponsible for making the productResponsible for selling the product/service.Responsible for payments, bills and expenses.Responsible for the office/building and any repairs.Responsible for keeping a connection with different departmentsResponsible for assigning employees (workers) or vehicles to customers....

Unit 5 Vocabulary 2023-09-03

Unit 5 Vocabulary crossword puzzle
Across
  1. A set of processes that are to be followed in order to complete an operation; a method to do something.
  2. Usage of automatic equipment (i.e machines) to automate a process.
  3. Protection of electronic data from criminals or unauthorized usage.
  4. An excessive amount; too much.
  5. Recognition of individuals from biological measurements or physical appearance.
Down
  1. The action of creating a new idea, product, etc.
  2. The state of being dependent.
  3. Rapid growth or reproduction of something.
  4. Using a network of servers to store data and information on the internet rather than a single computer.
  5. Being enthusiastic about technology or new advancements in technology.
  6. Adaptation to the usage of computers and internet.

11 Clues: The state of being dependent.An excessive amount; too much.Rapid growth or reproduction of something.The action of creating a new idea, product, etc.Adaptation to the usage of computers and internet.Usage of automatic equipment (i.e machines) to automate a process.Protection of electronic data from criminals or unauthorized usage....

"Algorithm Enigma: A Technology and AI Crossword" 2023-07-01

"Algorithm Enigma: A Technology and AI Crossword" crossword puzzle
Across
  1. an ai art generator
  2. image recognition api by microsoft
  3. A friendly AI assistant that can chat with you and answer questions.
  4. programming language commonly used in machine learning
  5. Using AI to create convincing fake videos or images
  6. When AI becomes self-aware and starts thinking like a human.
  7. father of artificial intelligence
Down
  1. personalized news app that curates articles using ai algorithms
  2. An AI art generator that takes you on a creative adventure.
  3. Recipe for solving a problem in the digital world.
  4. co-founder of DeepMind
  5. Machines that can do tasks on their own, like helpful little friends
  6. deep learning framework popular for computer vision tasks
  7. Protecting against digital threats with AI-powered defense systems.
  8. Letting machines do the work, so you can sit back and relax.

15 Clues: an ai art generatorco-founder of DeepMindfather of artificial intelligenceimage recognition api by microsoftRecipe for solving a problem in the digital world.Using AI to create convincing fake videos or imagesprogramming language commonly used in machine learningdeep learning framework popular for computer vision tasks...

Chapter 3 : Digital Culture and Society 2024-04-01

Chapter 3 : Digital Culture and Society crossword puzzle
Across
  1. - Health services provided through digital platforms.
  2. Z - Demographic cohort known for its deep engagement with digital technology.
  3. Dependency - Overreliance on digital devices affecting daily life.
  4. - Digital method of making payments, like PayPal or Apple Pay.
  5. Media - Platforms for networking and communication online.
  6. - Measures to protect against unauthorized digital attacks.
  7. Privacy - Protection of personal information in the digital age.
Down
  1. Learning - Educational approach combining online and face-to-face methods.
  2. Society - A society transformed by the integration of advanced technologies.
  3. Shopping - Buying goods or services via the internet.
  4. Navigation - Technology used for determining one’s location and finding routes.
  5. Tech - Devices used for tracking health and activity.
  6. - Country recognized for its advanced digital society.
  7. - Method of watching TV and movies over the internet.
  8. Work - Employment model where tasks are completed outside a traditional office.

15 Clues: - Health services provided through digital platforms.Shopping - Buying goods or services via the internet.Tech - Devices used for tracking health and activity.- Method of watching TV and movies over the internet.- Country recognized for its advanced digital society.Media - Platforms for networking and communication online....

TTS INFOR 2024-11-22

TTS INFOR crossword puzzle
Across
  1. Salah satu bentuk pelanggaran UU ITE.
  2. Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
  3. Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
  4. Proses pembuatan konten digital seperti video, gambar, atau musik.
  5. Bagian dari sistem komputer yang berfungsi untuk memproses data.
  6. Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
  7. Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
  1. Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
  2. Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
  3. Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
  4. Protokol yang digunakan untuk menghubungkan perangkat ke internet.
  5. Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
  6. Istilah lain untuk keamanan jaringan.
  7. Jenis konten digital yang paling banyak diakses melalui internet.

14 Clues: Salah satu bentuk pelanggaran UU ITE.Istilah lain untuk keamanan jaringan.Cara mengelola kata sandi agar tetap aman dan sulit ditebak.Bagian dari sistem komputer yang berfungsi untuk memproses data.Perangkat lunak yang digunakan untuk mengelola jaringan komputer.Jenis konten digital yang paling banyak diakses melalui internet....

technology 2025-02-25

technology crossword puzzle
Across
  1. Technology that simulates a 3D environment.
  2. A idea or method that leads to advancement.
  3. A mobile phone with multiple functionalities.
  4. A technology that allows data storage and access over the internet.
  5. A type of malicious code that replicates itself by inserting copies into other programs or files.
  6. The process of converting information into code to prevent unauthorized access.
  7. Protection against digital threats.
Down
  1. A field of study focused on creating intelligent machines that can perform tasks.
  2. A global network for communication and information.
  3. The standard markup language for creating web pages.
  4. Technology that builds and controls robots.
  5. Wireless internet network.
  6. Software application used to access the Internet.
  7. A simulated experience that can be similar to or completely different from the real world.

14 Clues: Wireless internet network.Protection against digital threats.Technology that simulates a 3D environment.A idea or method that leads to advancement.Technology that builds and controls robots.A mobile phone with multiple functionalities.Software application used to access the Internet.A global network for communication and information....

Puzzle #31 2023-02-05

Puzzle #31 crossword puzzle
Across
  1. - the protection of computers and networks from digital threats
  2. - information that can be processed by a computer
  3. - a collection of structured data
  4. - a computer that requests resources from a server
  5. - a set of instructions used to perform a specific task
  6. reality - a simulated environment that can be experienced through computer devices
Down
  1. computing - using remote servers over the internet to store, process, and manage data
  2. - a security system that monitors and controls incoming and outgoing network traffic
  3. - the process of converting data into a code to protect it
  4. intelligence - the development of computer systems to perform tasks that normally require human intelligence
  5. - a computer that provides shared resources

11 Clues: - a collection of structured data- a computer that provides shared resources- information that can be processed by a computer- a computer that requests resources from a server- a set of instructions used to perform a specific task- the process of converting data into a code to protect it...

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. For students pursuing a Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______ Centre for hands-on-learning.
  2. The 1800-seater ______Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  3. The diplomas offered in the School of Design & Environment focuses on ________.
  4. The Diploma in Early Childhood Development & Education (ECDE) is conducted by the National Institute of Early Childhood_______ in collaboration with Ngee Ann Polytechnic at the NIEC (NP) campus.
  5. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  6. Ngee Ann Polytechnic is an award-winning smart and ______campus.
  7. Located at the Atrium, there is a 24/7 unmanned ______.
  8. If a student is interested in cybersecurity, they should pursue a Diploma in Cybersecurity & Digital ______ from the School of InfoComm Technology.
  9. Common _____ Programme is a new programme offered in the School of Film & Media Studies.
  10. Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.
  11. Students are able to pursue a minor via the ______Learning Pathway Programme.
  12. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
Down
  1. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass ______.
  2. Radio ______ located at Ngee Ann Polytechnic’s Atrium is Singapore’s first campus radio station.
  3. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  4. Ngee Ann Polytechnic’s Diploma in ______ offers specialisation in Architecture and Product Innovation.
  5. Ngee Ann Polytechnic has 3 canteens in total:______, Makan Place and Food Club.
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Ngee Ann Polytechnic’s Diploma in _______ Engineering from the School of Engineering offers specialisations in Power Engineering and Clean Energy Management.
  8. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.

20 Clues: Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic is an award-winning smart and ______campus.Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.Students are able to pursue a minor via the ______Learning Pathway Programme.The diplomas offered in the School of Design & Environment focuses on ________....

AI 2025-09-28

AI crossword puzzle
Across
  1. Pola pikir untuk menyelesaikan masalah menggunakan prinsip ilmu komputer.
  2. Kepanjangan dari "AI"
Down
  1. Mesin yang mampu belajar sendiri dari data tanpa diprogram ulang.
  2. Sistem keamanan digital untuk melindungi data dan jaringan.
  3. Bidang ilmu yang mempelajari pengolahan data dalam jumlah besar dan kompleks.
  4. Teknologi yang menghubungkan perangkat fisik ke internet.

6 Clues: Kepanjangan dari "AI"Teknologi yang menghubungkan perangkat fisik ke internet.Sistem keamanan digital untuk melindungi data dan jaringan.Mesin yang mampu belajar sendiri dari data tanpa diprogram ulang.Pola pikir untuk menyelesaikan masalah menggunakan prinsip ilmu komputer....

Online security 2019-12-03

Online security crossword puzzle
Across
  1. This mode is more secure than public
  2. When you save your information within an external drive is called a:
  3. When you research online you should visit only _____ to avoid risks
Down
  1. Being aware of your online protection
  2. Have one and keep it updated to avoid malware and other online risks
  3. Needed to access devices

6 Clues: Needed to access devicesThis mode is more secure than publicBeing aware of your online protectionWhen you research online you should visit only _____ to avoid risksHave one and keep it updated to avoid malware and other online risksWhen you save your information within an external drive is called a:

Cybersecurity Awareness Month Crossword Puzzle 2025-09-19

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. A __________________ is any unauthorized attempt to access, disrupt, steal or damage computer systems, networks, or data.
  2. The best way to keep Cornerstone secure is to become a ________ ___________.
  3. All customer and bank information that is no longer required must be ____________.
  4. an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said
  5. A _____ _______ is a security incident where unauthorized parties access sensitive or confidential information.
  6. Malicious software designed to harm, exploit or otherwise compromise a computer system.
  7. the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data.
  8. Files containing sensitive information that are transferred in any way across the Internet must be encrypted and sent ___________.
  9. Be sure to properly _____ ______ or lock your computer screens when leaving your work area.
  10. A technique used to deceive individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communications.
  11. Create strong ___________ or passphrases and never share them with anyone else.
Down
  1. A type of malware that encrypts a victim's files and demands payment for the decryption key.
  2. the process of creating a synthetic replica of a person's voice using artificial intelligence and machine learning techniques.
  3. Follow that Bank's ___ ________ for guidance regarding the use of artificial intelligence at the Bank.
  4. Someone who tries to access data that they aren't authorized to view.
  5. All customer and bank information must be _______ in designated storage areas during non-business hours as well as during business hours when not required for extended periods.
  6. ____________ suspicious activity and security incidents plays a vital role in safeguarding the Bank.
  7. The process of verifying the identity of a user or system, often through passwords, biometrics, or security tokens.

18 Clues: Someone who tries to access data that they aren't authorized to view.The best way to keep Cornerstone secure is to become a ________ ___________.Create strong ___________ or passphrases and never share them with anyone else.All customer and bank information that is no longer required must be ____________....

Technology Vocabulary 2024-11-12

Technology Vocabulary crossword puzzle
Across
  1. A collection of data organized for easy access.
  2. The practice of protecting computers and data from unauthorized access.
  3. Programs and operating systems that tell the hardware what to do
  4. Converting data into a secret code for security
Down
  1. The physical parts of a computer
  2. The ability of a computer to perform tasks needing human intelligence
  3. A way of representing information using only two digits, 0 and 1.
  4. Writing instructions in a language a computer can understand

8 Clues: The physical parts of a computerA collection of data organized for easy access.Converting data into a secret code for securityWriting instructions in a language a computer can understandPrograms and operating systems that tell the hardware what to doA way of representing information using only two digits, 0 and 1....

Computer Ethics Crossword 2022-10-11

Computer Ethics Crossword crossword puzzle
Across
  1. A shorter word for "Internet"
  2. An attempt to trick a person into giving away money or information by pretending to be a well-known company
  3. A secret combination of words or numbers that allows a user to access an online service
  4. Short form for "World Wide Web"
  5. Harm inflicted through text, emails, or online sites
  6. Any action that's taken to protect and prevent online crime
  7. When someone tracks, lures, or harasses people online
  8. Software designed to damage a computer or phone
  9. A security system used to block threats to your computer
Down
  1. An internet-related crime
  2. Online etiquette-being nice and respectful to others online
  3. Leaving offensive messages on the internet
  4. Unwanted emails or junk mail
  5. Software that displays unwanted advertising on your computer
  6. Searching through websites freely
  7. Self-replicating software program that attacks a computer system
  8. A dishonest scheme to get information or money
  9. Computer equipment, machines, and parts
  10. Someone who gains unauthorized access to people's computers

19 Clues: An internet-related crimeUnwanted emails or junk mailA shorter word for "Internet"Short form for "World Wide Web"Searching through websites freelyComputer equipment, machines, and partsLeaving offensive messages on the internetA dishonest scheme to get information or moneySoftware designed to damage a computer or phone...

Virus- Alexis Goodney 2018-11-15

Virus- Alexis Goodney crossword puzzle
Across
  1. an unwanted piece of software that does something to your computer
  2. a person who uses computers to gain unauthorized info
  3. messages distributed to recipients via a network
  4. collection of data instructions that tells a computer what to do
  5. good hacker who hacks to find out how a companies system is faulty
  6. protection of computer systems
Down
  1. blocking servers, clogging up networks so they can't get to real costumers
  2. a strategy that pretends to be something it isn't
  3. violates security for personal gain
  4. something that enters your network's system then duplicates itself and spreads via the network
  5. programming instructions
  6. the attempt to obtain personal information by disguising yourself as a reliable company
  7. a reason why someone might send you a virus
  8. software intended to disable computers
  9. a type of computer virus

15 Clues: programming instructionsa type of computer virusprotection of computer systemsviolates security for personal gainsoftware intended to disable computersa reason why someone might send you a virusmessages distributed to recipients via a networka strategy that pretends to be something it isn'ta person who uses computers to gain unauthorized info...

tech crossword 2023-06-07

tech crossword crossword puzzle
Across
  1. a type of computer memory where data is stored
  2. it is a mobile operating system
  3. a malicous software that may cause disruption to your computer and leak private information online
  4. it is any sequence of one or more symbols
  5. small blocks of data created by a server
  6. a system that protects the Internet from cyber attacks
  7. a program that once is executed, would cause major damage to the computer
Down
  1. a digital representation of text and data
  2. a collection of data duplicating original values
  3. a mapping for some domain to bits
  4. one of the largest technology companies
  5. an image that is used for representing data
  6. a hardware used for transmitting digital video and audio from one device to another
  7. a moving digital image
  8. a method of transmitting and receiving messages using electronic devices

15 Clues: a moving digital imageit is a mobile operating systema mapping for some domain to bitsone of the largest technology companiessmall blocks of data created by a servera digital representation of text and datait is any sequence of one or more symbolsan image that is used for representing dataa type of computer memory where data is stored...

Technology words 2023-05-10

Technology words crossword puzzle
Across
  1. where your teachers assign you work to do for classes
  2. where a global system hooks up to networks
  3. a long communication without wires
  4. where you can watch videos for classes or for fun
  5. where you can send mail digitally to workers, teachers or student
  6. where it can be instructed by hardware
  7. when something is transmitting information by various types
Down
  1. it is designed to protect your computers and other devices from bugs ands hackers
  2. where you can look up answers or look for evidence
  3. where you can create a web browser
  4. where you can make a presentation
  5. where you create a bar graph, line graph, or a pie chart
  6. where scientists design and build machines
  7. where it widely describes wide range of technology's
  8. where you can hook up to internet and use your technology better

15 Clues: where you can make a presentationwhere you can create a web browsera long communication without wireswhere it can be instructed by hardwarewhere a global system hooks up to networkswhere scientists design and build machineswhere you can watch videos for classes or for funwhere you can look up answers or look for evidence...

Cyber Safety 2024-03-05

Cyber Safety crossword puzzle
Across
  1. A secret combination of words or numbers that allows a user to access an online service
  2. an attempt to trick a person into giving away money or information by pretending to be a well-known company
  3. harm inflicted through text, emails, or online sites
  4. online etiquette - being nice and respectful to others online
  5. software that displays unwanted advertising on your computer
  6. someone who gains unauthorized access to people's computers
  7. software designed to damage a computer of phone
  8. searching through websites freely
  9. a dishonest scheme to get information or money
  10. self-replicating program that attacks a computer system
Down
  1. short form for “world wide web"
  2. leaving offensive messages on the internet
  3. computer equipment, machines, and parts
  4. an internet-related crime
  5. when someone tracks, lures, or harasses people online
  6. a security system used to block malicious threats to your computer
  7. any action that’s taken to protect computers and prevent online crime
  8. a shorter word for internet
  9. unwanted emails or junk mail

19 Clues: an internet-related crimea shorter word for internetunwanted emails or junk mailshort form for “world wide web"searching through websites freelycomputer equipment, machines, and partsleaving offensive messages on the interneta dishonest scheme to get information or moneysoftware designed to damage a computer of phone...

Computer Ethics Crossword 2024-04-05

Computer Ethics Crossword crossword puzzle
Across
  1. A shorter word for "Internet"
  2. An attempt to trick a person into giving away money or information by pretending to be a well-known company
  3. A secret combination of words or numbers that allows a user to access an online service
  4. Short form for "World Wide Web"
  5. Harm inflicted through text, emails, or online sites
  6. Any action that's taken to protect and prevent online crime
  7. When someone tracks, lures, or harasses people online
  8. Software designed to damage a computer or phone
  9. A security system used to block threats to your computer
Down
  1. An internet-related crime
  2. Online etiquette-being nice and respectful to others online
  3. Leaving offensive messages on the internet
  4. Unwanted emails or junk mail
  5. Software that displays unwanted advertising on your computer
  6. Searching through websites freely
  7. Self-replicating software program that attacks a computer system
  8. A dishonest scheme to get information or money
  9. Computer equipment, machines, and parts
  10. Someone who gains unauthorized access to people's computers

19 Clues: An internet-related crimeUnwanted emails or junk mailA shorter word for "Internet"Short form for "World Wide Web"Searching through websites freelyComputer equipment, machines, and partsLeaving offensive messages on the internetA dishonest scheme to get information or moneySoftware designed to damage a computer or phone...

Cyber Physical Systems - 1 2025-03-20

Cyber Physical Systems - 1 crossword puzzle
Across
  1. The coordination of processes to operate in unison.
  2. Protection of digital and cyber-physical systems from threats.
  3. Processing data closer to the source rather than a central server.
  4. Study of control and communication in machines and living beings.
  5. A highly automated, connected, and intelligent manufacturing system.
  6. Internet-based computing providing storage and processing power.
  7. A network of connected devices that communicate over the internet.
  8. Using models to replicate real-world behaviors.
  9. Devices that detect and respond to physical changes.
  10. The ability of different systems to work together.
  11. Large volumes of data used for analytics and decision-making.
Down
  1. A decentralized and secure digital ledger technology.
  2. Combining different subsystems into a unified system.
  3. A virtual replica of a physical system for monitoring and analysis.
  4. A computing system integrated into a larger system.
  5. The capability of a system to function independently.
  6. Devices that convert electrical signals into mechanical motion.
  7. Related to manufacturing and production systems.
  8. The process of making systems operate without human intervention.

19 Clues: Using models to replicate real-world behaviors.Related to manufacturing and production systems.The ability of different systems to work together.The coordination of processes to operate in unison.A computing system integrated into a larger system.Devices that detect and respond to physical changes....

vocab 2024-10-13

vocab crossword puzzle
Across
  1. Because of all the ___ I still haven't got my visa
  2. although
  3. My clothes always ___ a bit after being in the washing machine
  4. working in a way that does not waste a resource, productive
  5. I got into a car ___ accident on the way, which is why I was late
  6. a field in IT where the main goal is protection from digital attacks
  7. After giving that 3 hour lecture, my ___ really hurt
  8. before
Down
  1. many of the company's employees were ___ after AI replaced them
  2. It's not nice to make ___ about someone based on their looks
  3. a state/feeling of uncontrolled excitement/behaviour.
  4. I've been waiting for that ___ for months, I really need the extra money
  5. something happening at the same time
  6. sometimes a synonym for "also"
  7. successful in achieving the results that you want

15 Clues: beforealthoughsometimes a synonym for "also"something happening at the same timesuccessful in achieving the results that you wantBecause of all the ___ I still haven't got my visaAfter giving that 3 hour lecture, my ___ really hurta state/feeling of uncontrolled excitement/behaviour.working in a way that does not waste a resource, productive...

Technology words 2023-05-10

Technology words crossword puzzle
Across
  1. where your teachers assign you work to do for classes
  2. where a global system hooks up to networks
  3. a long communication without wires
  4. where you can watch videos for classes or for fun
  5. where you can send mail digitally to workers, teachers or student
  6. where it can be instructed by hardware
  7. when something is transmitting information by various types
Down
  1. it is designed to protect your computers and other devices from bugs ands hackers
  2. where you can look up answers or look for evidence
  3. where you can create a web browser
  4. where you can make a presentation
  5. where you create a bar graph, line graph, or a pie chart
  6. where scientists design and build machines
  7. where it widely describes wide range of technology's
  8. where you can hook up to internet and use your technology better

15 Clues: where you can make a presentationwhere you can create a web browsera long communication without wireswhere it can be instructed by hardwarewhere a global system hooks up to networkswhere scientists design and build machineswhere you can watch videos for classes or for funwhere you can look up answers or look for evidence...

Ethical Online Teaching and Data Management 2025-07-22

Ethical Online Teaching and Data Management crossword puzzle
Across
  1. Making sure information is only accessible to those authorized
  2. Hiding information so only authorized users can see it
  3. An incident when sensitive information is exposed or stolen
  4. Trail of data users leave behind online
  5. Document explaining how a website collects and uses data
  6. Rules that users must agree to for online tools or access
Down
  1. An extra layer of security beyond a password
  2. Collecting only the data that is necessary
  3. Guidelines for responsible technology use in schools or workplaces
  4. Fraudulent attempt to obtain sensitive information, usually via email or text
  5. U.S. Law protecting the privacy of students and their educational records
  6. A U.S. law protecting children under 13 years old in online environments
  7. Stealing someone's personal information for fraud
  8. Malicious software like viruses or spyware
  9. Steps taken to protect digital data

15 Clues: Steps taken to protect digital dataTrail of data users leave behind onlineCollecting only the data that is necessaryMalicious software like viruses or spywareAn extra layer of security beyond a passwordStealing someone's personal information for fraudHiding information so only authorized users can see it...

Compliance and Ethics 2021-11-29

Compliance and Ethics crossword puzzle
Across
  1. attempt by individual or private interest group to lawfully influence government decision
  2. An official inspection of an individual's or organization's accounts
  3. guideline of ethical practices that a company expects its employees to follow
Down
  1. Unwelcome act of physical contact or advances
  2. conforming to a rule i.e policy, standard or law
  3. Computer Security
  4. Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others
  5. anything of value given as attempt to influence a decision to acquire improper advantage

8 Clues: Computer SecurityUnwelcome act of physical contact or advancesconforming to a rule i.e policy, standard or lawAn official inspection of an individual's or organization's accountsguideline of ethical practices that a company expects its employees to followUse of force, threat, or coercion to abuse, intimidate, or aggressively dominate others...

Cyber Safe Seniors Crossword Puzzle 2024-03-09

Cyber Safe Seniors Crossword Puzzle crossword puzzle
Across
  1. Short for “malicious software”
  2. The measures taken to protect electronic data
  3. A string of characters that allows access to a computer system or service
  4. The practice of making fraudulent phone calls or leaving voice messages
Down
  1. Software designed to detect and destroy computer viruses
  2. A person who engages in criminal activity by means of computers or the internet
  3. The fraudulent practice of sending emails purporting to be from reputable companies
  4. Malware which changes, corrupts, or destroys information (think disease)

8 Clues: Short for “malicious software”The measures taken to protect electronic dataSoftware designed to detect and destroy computer virusesThe practice of making fraudulent phone calls or leaving voice messagesMalware which changes, corrupts, or destroys information (think disease)A string of characters that allows access to a computer system or service...

Technology 2024-11-27

Technology crossword puzzle
Across
  1. A program you can download onto your phone or tablet.
  2. What you do when looking for information online.
  3. A phone that can access the internet and run apps.
  4. Wireless internet connection often found at home or cafes.
  5. Tools and devices used to make life easier.
  6. A collection of pages you visit on the internet.
Down
  1. A fraudulent scheme designed to trick or steal information.
  2. A secret word or phrase to protect your accounts.
  3. A way to send messages online, often used for communication.
  4. A popular video conferencing platform.
  5. A global network that connects computers and devices.
  6. To access your account by entering your username and password.
  7. To transfer files from the internet to your device.
  8. A device you move to control the cursor on a screen.
  9. Protecting your personal data online.

15 Clues: Protecting your personal data online.A popular video conferencing platform.Tools and devices used to make life easier.What you do when looking for information online.A collection of pages you visit on the internet.A secret word or phrase to protect your accounts.A phone that can access the internet and run apps....

Inclusive Engineering Design 2025-03-11

Inclusive Engineering Design crossword puzzle
Across
  1. A key principle of inclusive design that ensures usability for all.
  2. Designs should align with the UN’s Sustainable Development Goals to promote ______.
  3. The inclusive engineering ______ includes people-centered solutions, ethics, and sustainability.
  4. Engineering must prevent bias and discrimination while upholding ______.
  5. Teaching inclusive engineering early can foster awareness and innovation.
  6. Working with diverse teams improves design solutions and encourages ______.
  7. An important process in engineering to ensure usability and inclusivity.
  8. Designs must protect against online threats, ensuring safety and ______.
Down
  1. A lack of ______ in engineering teams can lead to biased designs.
  2. Engineering should be ______ to meet diverse user needs.
  3. Inclusive design benefits everyone, especially individuals with ______.
  4. Future-proof solutions must anticipate emerging ______ trends.
  5. Inclusive designs should prioritize usability and ______ for all users.
  6. Unconscious ______ can influence engineering decisions and impact inclusivity.
  7. Engineers create solutions through thoughtful and user-centered ______.

15 Clues: Engineering should be ______ to meet diverse user needs.Future-proof solutions must anticipate emerging ______ trends.A lack of ______ in engineering teams can lead to biased designs.A key principle of inclusive design that ensures usability for all.Inclusive design benefits everyone, especially individuals with ______....

Technology crossword 2025-06-26

Technology crossword crossword puzzle
Across
  1. Programs you use on your phone or tablet.
  2. (Virtual Reality) A headset that lets you enter a 3D digital world.
  3. Protection of computers and data from attacks.
  4. A machine that can think or learn like a human.
  5. Software you can download and use for free.
  6. Provide The company that gives you internet access.
  7. Device A phone, watch, or TV that can connect to the internet.
  8. Technology Devices like smartwatches or fitness bands you wear.
Down
  1. Engine A website like Google to find information.
  2. A small electronic tool or device.
  3. A place where you can connect to wireless internet.
  4. Media Platforms like Instagram, TikTok, or Twitter.
  5. A picture taken of your screen.
  6. A big computer that stores data and websites.
  7. Browser An app like Chrome or Safari to explore websites.
  8. Network A site where people connect and share, like Facebook.

16 Clues: A picture taken of your screen.A small electronic tool or device.Programs you use on your phone or tablet.Software you can download and use for free.A big computer that stores data and websites.Protection of computers and data from attacks.A machine that can think or learn like a human.Engine A website like Google to find information....

Ethical Online Teaching and Data Management 2025-07-12

Ethical Online Teaching and Data Management crossword puzzle
Across
  1. Data fraud disguised as communication
  2. Learning environment or technology that adapts to diverse learner needs and preferences
  3. U.S. law: civil rights protections for individuals with disabilities
  4. Information is accessible only to those authorized
  5. U.S. federal law that protects the privacy of student education records
  6. A UDL principle: providing content in multiple formats
  7. A UDL principle: offers choices to increase motivation
Down
  1. Data protection from digital attacks
  2. Acronym: supports flexible learning environments to accommodate diverse learners
  3. All learners feel valued and supported in learning environments
  4. Providing fair access to opportunities, resources, and support based on individual needs
  5. An extra layer of login protection
  6. Acronym: international standards that makes digital content accessible for all users
  7. Ensuring all users can access online content regardless of ability
  8. How user data is handled and stored

15 Clues: An extra layer of login protectionHow user data is handled and storedData protection from digital attacksData fraud disguised as communicationInformation is accessible only to those authorizedA UDL principle: providing content in multiple formatsA UDL principle: offers choices to increase motivation...

OSHEC Crossword 2023-08-16

OSHEC Crossword crossword puzzle
Across
  1. Download PDF – First word of ‘Abstract’ - Article Name: Influence of Educational Robots on Learning Performance of Learners Majoring in Computer Science.
  2. Last word of ‘Background’ - Article Name: The accuracy of artificial intelligence used for non-melanoma skin cancer diagnoses: a meta-analysis.
  3. Last word of first point of ‘Key Takeaways’- Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
  4. Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
  5. Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
Down
  1. Second word of ‘Introduction’ - Article Name: Social Media Adoption, Usage And Impact In Business-To-Business (B2B) Context: A State-Of-The-Art Literature Review.
  2. Last word, before ‘footnotes’ - Article Name: Global Mental Health Services and the Impact of Artificial Intelligence-Powered Large Language Models.
  3. Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Training in Sociology and Public Health an Essential in Medical Education.
  4. Fill in the blank -Literature, Film and ________ (Look at the Sub-headings) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.
  5. Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.

10 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.Last word of first point of ‘Key Takeaways’- Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture....

Digital literacy 2024-08-10

Digital literacy crossword puzzle
Across
  1. - The practice of protecting information from unauthorized access.
  2. - Technology used to secure online transactions and protect data.
  3. - Online platforms where people can share updates and interact.
  4. - A global network of interconnected computers and servers.
Down
  1. - The measure of how well personal information is protected online.
  2. - A collection of related web pages accessible through the internet.
  3. - The ability to use digital tools and technologies effectively.
  4. - A type of software used to access and view web pages.
  5. - Software used for specific tasks like creating documents or spreadsheets.
  6. - Data that provides context about other data.
  7. - The process of organizing and finding information online.
  8. - A system used to manage and organize digital documents.

12 Clues: - Data that provides context about other data.- A type of software used to access and view web pages.- A system used to manage and organize digital documents.- The process of organizing and finding information online.- A global network of interconnected computers and servers.- Online platforms where people can share updates and interact....

WBCi Roadshow Puzzle 1 2025-11-17

WBCi Roadshow Puzzle 1 crossword puzzle
Across
  1. Auditory stories from women navigating the world of infosec (8 letters)
  2. Quick connections for growth, WBCi style (14 letters)
  3. Found in the Spotlight Gallery (11 letters)
  4. WBCi area focused on skill-building and mentorship (11 letters)
  5. Demystifying cybersecurity—one belief at a time (12 letters)
  6. The 'F' in F.L.Y. stands for this bold quality (8 letters)
  7. Amplified, not replaced — what true allies elevate (6 letters)
Down
  1. Intentional advocacy from the sidelines (8 letters)
  2. Visibility-building dialogues in Product circles (12 letters)
  3. Seasonal initiative focused on balance, rest, and renewal (8 letters)
  4. Where memories get framed at the roadshow’s finale (5 letters)
  5. The social structures that enable connection and learning (8 letters)

12 Clues: Found in the Spotlight Gallery (11 letters)Intentional advocacy from the sidelines (8 letters)Quick connections for growth, WBCi style (14 letters)The 'F' in F.L.Y. stands for this bold quality (8 letters)Demystifying cybersecurity—one belief at a time (12 letters)Visibility-building dialogues in Product circles (12 letters)...

Cybersecurity 2023-03-25

Cybersecurity crossword puzzle
Across
  1. A security measure designed to verify an individual`s authorization to access a computer or security information
Down
  1. Discovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access
  2. A collection of computers subject to centralized remote control by an outside party, usually without the knowledge of the owners, using surreptitiously installed software robots. The robots are spread by trojan horses and viruses. The botnets can be used to launch denial-of-service attacks and transmit spam
  3. Small FBI Cyber Action Teams made up of computer analysts, forensic investigators and malicious-code experts ready to travel anywhere in the world where a cyber intrusion occurred

4 Clues: A security measure designed to verify an individual`s authorization to access a computer or security informationDiscovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access...

October Crossword - Cyber Security 2022-02-07

October Crossword - Cyber Security crossword puzzle
Across
  1. software designed to prevent, detect, and remove malware
  2. cyberattack that tries already compromised usernames and passwords in other sites
  3. username and ... should be complex
  4. any crime committed electronically
  5. pretending to be someone and accessing their information
Down
  1. fake messages from a seemingly trusted source designed to convince you to reveal information and give unauthorized access
  2. ensures that you are the only one who has access to your account
  3. campaign launched in 2010 by the Department of Homeland Security
  4. any software intended to damage, disable, or give someone unauthorized access
  5. agency that informs and educates about cybersecurity

10 Clues: username and ... should be complexany crime committed electronicallyagency that informs and educates about cybersecuritysoftware designed to prevent, detect, and remove malwarepretending to be someone and accessing their informationensures that you are the only one who has access to your account...

Tugas-Jaringan Komputer dan Internet 2024-01-11

Tugas-Jaringan Komputer dan Internet crossword puzzle
Across
  1. sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
  2. pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
  3. Perangkat yang digunakan manusia untuk memudahkan kehidupannya
  4. perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
  1. menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
  2. praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
  3. Bus Topologi yang menyerupai rel kereta api dinamakan
  4. Aspek teknik ada berapa
  5. Personal Area Network singkatan dari
  6. bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header

10 Clues: Aspek teknik ada berapaPersonal Area Network singkatan dariBus Topologi yang menyerupai rel kereta api dinamakanPerangkat yang digunakan manusia untuk memudahkan kehidupannyaperangkat yang menghubungkan jaringan lokal dengan jaringan eksternalpengaturan yang dilakukan komputer agar dapat terhubung satu sama lain...

Claims Board Fun Friday 9/13 2024-09-12

Claims Board Fun Friday 9/13 crossword puzzle
Across
  1. Company which will bring 2 astronauts who are stuck in International Space Station
  2. Text messages to trick individuals to reveal personal information
  3. Cybersecurity form with major outage impacting Microsoft apps
  4. Attaches itself to clean files and spreads to other files
  5. Deceives via phone calls
  6. Use phone calls to trick individuals to reveal personal details
  7. Movie name referred by Google CEO during his meetings
Down
  1. Publishes latest tech news and Tech CEOs start their day going through this site
  2. Caused by Solar Storms
  3. Every action has an outcome and none other than you are responsible for it f

10 Clues: Caused by Solar StormsDeceives via phone callsMovie name referred by Google CEO during his meetingsAttaches itself to clean files and spreads to other filesCybersecurity form with major outage impacting Microsoft appsUse phone calls to trick individuals to reveal personal detailsText messages to trick individuals to reveal personal information...

technology crossword 2023-06-07

technology crossword crossword puzzle
Across
  1. it is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure,
  2. it is a method of representing data in a visual,
  3. it represents text, computer processor instructions
  4. it is an American multinational technology company
  5. it is the most important processor in a given computer.
Down
  1. it is a mobile operating system
  2. it is a mapping from some domain
  3. it allows developers to directly manipulate its underlying data structures:...
  4. is a method of transmitting and receiving messages using electronic devices.
  5. it is a collection of discrete values that convey information,

10 Clues: it is a mobile operating systemit is a mapping from some domainit is a method of representing data in a visual,it is an American multinational technology companyit represents text, computer processor instructionsit is the most important processor in a given computer.it is a collection of discrete values that convey information,...

The Cyber Word Hunt 2025-10-22

The Cyber Word Hunt crossword puzzle
Across
  1. : Field concerned with protecting systems and data from online attacks
  2. : KAF Digital Bank applies this process to prevent money laundering (abbreviation)
  3. : The act of checking and improving quality in AML processes
  4. : Cyber attack that tricks users into revealing personal info via fake emails
  5. : The shift from traditional banking to online banking is called digital ___
Down
  1. : Process of verifying user identity before accessing an online account
  2. : Sending money electronically through a banking app
  3. : Device most commonly used to access digital banking apps
  4. : A new generation of online-only banks with no physical branches
  5. : Department that manages IT risk, compliance, and governance

10 Clues: : Sending money electronically through a banking app: Device most commonly used to access digital banking apps: The act of checking and improving quality in AML processes: Department that manages IT risk, compliance, and governance: A new generation of online-only banks with no physical branches...

Cyber Security! 2023-10-20

Cyber Security! crossword puzzle
Across
  1. Viruses, Spyware, Malicious Softwares
  2. encoding data, by converting the original representation of the information
  3. Cybercriminals sending malicious emails.
Down
  1. results in confidential, sensitive information being exposed
  2. a string of characters that allows access to a computer system or service which is usually of short length
  3. protection from malicious attacks
  4. attacker encrypts the victim’s data and threatens to publish data unless a ransom is paid

7 Clues: protection from malicious attacksViruses, Spyware, Malicious SoftwaresCybercriminals sending malicious emails.results in confidential, sensitive information being exposedencoding data, by converting the original representation of the informationattacker encrypts the victim’s data and threatens to publish data unless a ransom is paid...

Phishing A technique used to trick someone to reveal sensitive information 2024-05-10

Phishing A technique used to trick someone to reveal sensitive information crossword puzzle
Across
  1. A type of attack that floods a network or server with excess traffic
  2. The process of converting data into unreadable format to prevent unauthorized access
  3. The practice of preventing systems from digital attacks
  4. A technique used to trick someone to reveal sensitive information
Down
  1. A unique string of characters used for authentication
  2. Software designed to block unauthorized access
  3. A technique used to gain unauthorized access to a system by guessing passwords
  4. A secret code that must be entered to enter a system or account
  5. A malicious program that self replicates and spreads to other systems
  6. Unauthorized access to data or systems
  7. A deceptive email scam targeting personal information

11 Clues: Unauthorized access to data or systemsSoftware designed to block unauthorized accessA unique string of characters used for authenticationA deceptive email scam targeting personal informationThe practice of preventing systems from digital attacksA secret code that must be entered to enter a system or account...

Crossword On Internet and Technology 2025-10-03

Crossword On Internet and Technology crossword puzzle
Across
  1. Protection of digital systems from theft or damage
  2. The introduction of new ideas or methods
  3. A digital world where people interact with each other, digital objects and environments in real time
  4. An important and sudden discovery or progress
  5. The right to keep personal information secure
Down
  1. Old-fashioned; no longer useful
  2. A person who is connected to the internet or who is using electronic devices
  3. Happening in many places or among many people
  4. A person who is knowledgeable and skilled in the use of technology
  5. Cyber attacks that trick people into giving away personal data

10 Clues: Old-fashioned; no longer usefulThe introduction of new ideas or methodsHappening in many places or among many peopleAn important and sudden discovery or progressThe right to keep personal information secureProtection of digital systems from theft or damageCyber attacks that trick people into giving away personal data...

SECURITY AWARENESS EASTER EGG HUNT 2024-04-09

SECURITY AWARENESS EASTER EGG HUNT crossword puzzle
Across
  1. A secret word or phrase allows access to a computer system, email or services
  2. The process for educating employees about cybersecurity best practices
  3. A divison of Distributors that supplies a wide range of brands, generics, OTC, medical supplies, etc
  4. Your companies name
  5. One of the affiliated companies that provide banking services
Down
  1. One of the affiliated companies that deals with the production of our powdered and liquid goods
  2. One of the affiliated companies that supply customers with goods
  3. Malicious software that infects and damages computer
  4. Electronic messages sent and received over a computer network

9 Clues: Your companies nameMalicious software that infects and damages computerElectronic messages sent and received over a computer networkOne of the affiliated companies that provide banking servicesOne of the affiliated companies that supply customers with goodsThe process for educating employees about cybersecurity best practices...

DBMS and GIT commands 2023-03-09

DBMS and GIT commands crossword puzzle
Across
  1. A process of securely logging into a computer system or network
  2. A type of NoSQL database management system
  3. A technique used to protect computer networks and systems
  4. A type of application designed to run on cloud infrastructure
Down
  1. A security practice that involves protecting sensitive information from unauthorized access or disclosure
  2. A design pattern used in software development that emphasizes loose coupling between components
  3. A type of database management system
  4. A version control system commonly used in software development
  5. A tool used in software development to automate the building and testing of code
  6. Object-oriented programming paradigm

10 Clues: A type of database management systemObject-oriented programming paradigmA type of NoSQL database management systemA technique used to protect computer networks and systemsA type of application designed to run on cloud infrastructureA version control system commonly used in software development...

Tugas-Jaringan Komputer dan Internet 2024-01-11

Tugas-Jaringan Komputer dan Internet crossword puzzle
Across
  1. sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
  2. pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
  3. Perangkat yang digunakan manusia untuk memudahkan kehidupannya
  4. perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
  1. menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
  2. praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
  3. Bus Topologi yang menyerupai rel kereta api dinamakan
  4. Aspek teknik ada berapa
  5. Personal Area Network singkatan dari
  6. bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header

10 Clues: Aspek teknik ada berapaPersonal Area Network singkatan dariBus Topologi yang menyerupai rel kereta api dinamakanPerangkat yang digunakan manusia untuk memudahkan kehidupannyaperangkat yang menghubungkan jaringan lokal dengan jaringan eksternalpengaturan yang dilakukan komputer agar dapat terhubung satu sama lain...

Tugas-Jaringan Komputer dan Internet 2024-01-11

Tugas-Jaringan Komputer dan Internet crossword puzzle
Across
  1. sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
  2. pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
  3. Perangkat yang digunakan manusia untuk memudahkan kehidupannya
  4. perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
  1. menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
  2. praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
  3. Bus Topologi yang menyerupai rel kereta api dinamakan
  4. Aspek teknik ada berapa
  5. Personal Area Network singkatan dari
  6. bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header

10 Clues: Aspek teknik ada berapaPersonal Area Network singkatan dariBus Topologi yang menyerupai rel kereta api dinamakanPerangkat yang digunakan manusia untuk memudahkan kehidupannyaperangkat yang menghubungkan jaringan lokal dengan jaringan eksternalpengaturan yang dilakukan komputer agar dapat terhubung satu sama lain...

Making Science Work and knowing STEM 2024-09-06

Making Science Work and knowing STEM crossword puzzle
Across
  1. the original model of something from which later forms are developed
  2. a type of machine through which liquid or gas flows and turns a special wheel with blades in order to produce power
  3. The study of the brain
  4. A new or dramatic discovery or advancement
  5. Important or noticeable
  6. The study of space and the universe
  7. A new process or device
Down
  1. a test done in order to learn something or to discover if something works or is true
  2. ways of protecting computer systems against threats such as viruses
  3. to study something in a systematic and careful way

10 Clues: The study of the brainImportant or noticeableA new process or deviceThe study of space and the universeA new or dramatic discovery or advancementto study something in a systematic and careful wayways of protecting computer systems against threats such as virusesthe original model of something from which later forms are developed...

Compliance and Ethics Week Puzzle 2025-09-03

Compliance and Ethics Week Puzzle crossword puzzle
Across
  1. : Individual that informs appropriate authority of misconduct
  2. : The requirement to adhere to the legal, ethical, professional and company standards
  3. : Standards that guide actions based on core values
  4. : Billing for services not provided/ falsifying docum ents
  5. : Consistency of values and actions
Down
  1. : Practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
  2. : Differential treatment based on a protected class or category
  3. : Taking responsibility for one's actions and results
  4. : Number used to report compliance incident
  5. : Any form of punishment or action taken against someone for the act of reporting misconduct

10 Clues: : Consistency of values and actions: Number used to report compliance incident: Standards that guide actions based on core values: Taking responsibility for one's actions and results: Billing for services not provided/ falsifying docum ents: Individual that informs appropriate authority of misconduct...

NotPetya Crossword. 2023-10-19

NotPetya Crossword. crossword puzzle
Across
  1. forename of the person who created this crossword
  2. modified version of Petya
  3. damaging process NotPetya did to files
  4. name of the country that was most affected by the NotPetya ransomware attack.
  5. year that the NotPetya ransomware attack occurred.
  6. abbreviation of the Russian organization that created it
  7. what class are we in?
Down
  1. behaves more like a ______ malware rather than ransomware
  2. while NotPetya may have been targeted at Ukraine, what was the bigger "group" that was affected
  3. shipping company majorly affected by NotPetya
  4. the file was more a ______ than a killswitch
  5. name of the cybercriminal group believed to be responsible for the NotPetya ransomware attack.
  6. how long after the outbreak did the police raid the headquarters?
  7. amount of billions that NotPetya is estimated to have caused in damages.

14 Clues: what class are we in?modified version of Petyadamaging process NotPetya did to filesthe file was more a ______ than a killswitchshipping company majorly affected by NotPetyaforename of the person who created this crosswordyear that the NotPetya ransomware attack occurred.abbreviation of the Russian organization that created it...

Computer science 2025-01-27

Computer science crossword puzzle
Across
  1. A decentralized ledger technology often used for cryptocurrencies
  2. A plain language description of an algorithm
  3. A programming technique where a function calls itself
  4. Interconnected devices sharing data and resources
  5. A data type with two possible values: true or false
  6. An error when a program’s stack exceeds its limit
  7. An organized way of storing and organizing data
Down
  1. A popular sorting algorithm with O(n log n) average time complexity
  2. Software that manages hardware and software resources of a computer
  3. process of converting information into code to prevent unauthorized access
  4. A subset of AI that enables systems to learn from data
  5. Translates high-level code into machine code
  6. Practice of protecting systems, networks, and data from digital attacks
  7. A step-by-step procedure for solving a problem

14 Clues: A plain language description of an algorithmTranslates high-level code into machine codeA step-by-step procedure for solving a problemAn organized way of storing and organizing dataInterconnected devices sharing data and resourcesAn error when a program’s stack exceeds its limitA data type with two possible values: true or false...

Nasalization of SEIRIM 2021-10-29

Nasalization of SEIRIM crossword puzzle
Across
  1. Theme style for the new SEIRIM design
  2. Design asset type which is source of the name "Nasalization"
  3. New service from SEIRIM that keeps client companies safe
Down
  1. Name for a Chinese astronaut
  2. Website where Stephen got most of his design examples
  3. Minutes away from Nasa where Stephen grew up

6 Clues: Name for a Chinese astronautTheme style for the new SEIRIM designMinutes away from Nasa where Stephen grew upWebsite where Stephen got most of his design examplesNew service from SEIRIM that keeps client companies safeDesign asset type which is source of the name "Nasalization"

July 15 2024-07-15

July 15 crossword puzzle
Across
  1. A method of encoding data
  2. A visual way to represent the flow of data in a program
  3. The process of finding and fixing errors in a program
Down
  1. The practice of protecting systems from digital attacks
  2. A temporary storage area used to quickly access data
  3. Language for Managing Database

6 Clues: A method of encoding dataLanguage for Managing DatabaseA temporary storage area used to quickly access dataThe process of finding and fixing errors in a programThe practice of protecting systems from digital attacksA visual way to represent the flow of data in a program

Criss-Cross Craze 2025-06-10

Criss-Cross Craze crossword puzzle
Across
  1. a controlled network that allows access to outsiders like partners or venders
  2. a local area network that connects computer within a limited area like a home or office
  3. protection of data and system from digital attacks
  4. a wireless networking technology
  5. the physical or logical arrangement of devices in a computer network
  6. the actual rate of successful data transfer in a network
  7. the process of establishing a connection between two devices before communication
  8. a command used to test the reachability of a device on a network
Down
  1. the use of digital technologies to harass, threaten, or humiliate someone online
  2. the method used to send data across a network
  3. virtual private network
  4. file transfer protocol, a standard method for transferring files over the internet
  5. internet service provider
  6. global system of interconnected computer networks
  7. unwanted digital attacks
  8. service set identifier

16 Clues: service set identifiervirtual private networkunwanted digital attacksinternet service providera wireless networking technologythe method used to send data across a networkglobal system of interconnected computer networksprotection of data and system from digital attacksthe actual rate of successful data transfer in a network...

GS Dec 2024 2024-11-25

GS Dec 2024 crossword puzzle
Across
  1. Activities like painting or gardening that retirees can explore.
  2. An online service to manage finances securely in retirement.
  3. Platforms like Facebook that help retirees stay connected.
  4. Holistic health, including mental and physical well-being.
  5. Essential for maintaining physical health in retirement.
  6. Measures like two-factor authentication to stay safe online.
  7. A tool that enhances connectivity, convenience, and health.
Down
  1. Fraudulent schemes that retirees need to watch out for.
  2. A critical aspect of managing pensions and avoiding scams.
  3. An activity that keeps the mind sharp in retirement.
  4. A way for retirees to share knowledge and give back.
  5. The type of learning that keeps retirees engaged and curious.
  6. Essential for energy and well-being during retirement.
  7. An area supported by apps like fitness trackers or telemedicine.
  8. A common sleep issue involving difficulty falling or staying asleep.
  9. A phase of life after ending full-time work.

16 Clues: A phase of life after ending full-time work.An activity that keeps the mind sharp in retirement.A way for retirees to share knowledge and give back.Essential for energy and well-being during retirement.Fraudulent schemes that retirees need to watch out for.Essential for maintaining physical health in retirement....

The Internet: Vocab Pt2 2025-01-09

The Internet: Vocab Pt2 crossword puzzle
Across
  1. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
  2. Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.
  3. Confirms the identity and authenticity of a website.
  4. When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.
  5. The usage of deceptive emails and websites to maliciously gather personal information
  6. Completes multiple tasks at a time, simultaneously.
  7. The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
  8. A type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.
Down
  1. Identity theft, stealing money, stealing private information, controlling private computers.
  2. A protocol that standardizes the language for talking to web servers to send and receive web pages, or HyperText information (HTML pages).
  3. Anonymity describes situations where the acting person’s identity is unknown.
  4. Censorship is the suppression of words, images, or ideas that are “offensive.”
  5. Generally comprises data that is created by, or prepared for, electronic systems and devices such as computers, screens, calculators, communication devices and so on, and can be stored on those devices or in the Cloud
  6. Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
  7. Refers to programs that are executed sequentially – once through, from start to finish, without other processing executing.
  8. The units of data that are sent over the network.
  9. Pretending to be a DNS name resolver. Feed your computer the wrong IP address for a given website, and your browser now goes to a false website.
  10. Distributed Denial of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes.
  11. The digital divide is a gap between those who have access to digital technology and those who don’t.

19 Clues: The units of data that are sent over the network.Completes multiple tasks at a time, simultaneously.Confirms the identity and authenticity of a website.Anonymity describes situations where the acting person’s identity is unknown.Censorship is the suppression of words, images, or ideas that are “offensive.”...

CyberSecurity Awareness Month 2024 2024-05-03

CyberSecurity Awareness Month 2024 crossword puzzle
Across
  1. Regularly released enhancements to software or applications that fix vulnerabilities and provide new features.
  2. A security attack in which the user is tricked into downloading malware, spyware, or other harmful software onto their mobile device via SMS text messages.
  3. A secret combination of characters used to access an account or device.
  4. An enhanced security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.
  5. A type of barcode that can be scanned to access information quickly, often used with smartphones.
Down
  1. A method of phishing where the fraudster uses phone calls to lure victims into divulging personal information.
  2. Technology that simulates human intelligence processes through automated algorithms.
  3. Engineering Tactics that manipulate individuals into giving up confidential information, often by exploiting human psychological weaknesses.
  4. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  6. Synthetic media in which a person in an existing image or video is replaced with someone else's likeness, often using advanced machine learning techniques.
  7. A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity in digital communication.

12 Clues: A secret combination of characters used to access an account or device.Technology that simulates human intelligence processes through automated algorithms.Software designed to disrupt, damage, or gain unauthorized access to a computer system.A type of barcode that can be scanned to access information quickly, often used with smartphones....

Cybersecurity Concepts and Threats 2025-01-24

Cybersecurity Concepts and Threats crossword puzzle
Across
  1. system used by hackers to guess long passwords
  2. a program that enables communication between a user and computer
  3. a list of commands that can be compiled together
  4. a matrix bar that is read by scanning with camera/smartphone
  5. a suspicious program intended to disrupt software
  6. an infectious program that can damage a system
Down
  1. a device that connects and entire network to the VPN
  2. a tool that regulates and analyzes network traffic
  3. a system used by hackers to guess passwords
  4. the total number of digits transmitted in data
  5. an email account or website that is almost identical to a legitimate one
  6. allows computer applications to communicate within a LAN

12 Clues: a system used by hackers to guess passwordssystem used by hackers to guess long passwordsthe total number of digits transmitted in dataan infectious program that can damage a systema list of commands that can be compiled togethera suspicious program intended to disrupt softwarea tool that regulates and analyzes network traffic...

FOC - Cybersecurity - Unit 6 2024-11-15

FOC - Cybersecurity - Unit 6 crossword puzzle
Across
  1. Involves one key for both encryption and decryption
  2. A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
  3. Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
  4. Information about an individual that identifies, links, relates, or describes them
  5. A process of encoding messages to keep them secret, so only "authorized" parties can read it
Down
  1. A wireless access point that gives unauthorized access to secure networks
  2. Protects a computing system against infection
  3. Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
  4. A process that reverses encryption, taking a secret message and reproducing the original plain text
  5. Software intended to damage a computing system or to take partial control over its operation
  6. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  7. A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

12 Clues: Protects a computing system against infectionInvolves one key for both encryption and decryptionA wireless access point that gives unauthorized access to secure networksInformation about an individual that identifies, links, relates, or describes themSoftware intended to damage a computing system or to take partial control over its operation...

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Istilah untuk volume data besar yang diproses untuk informasi.
  2. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  3. Tempat di mana data disimpan secara online.
  4. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Program perangkat lunak yang dirancang untuk melakukan tugas tertentu.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.

6 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Istilah untuk volume data besar yang diproses untuk informasi.Program perangkat lunak yang dirancang untuk melakukan tugas tertentu....

Talk To Me in Cybersecurity 2021-09-16

Talk To Me in Cybersecurity crossword puzzle
Across
  1. Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
  2. A formal and approved list of users who have defined access rights to an asset
  3. Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
  4. Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
  5. A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
  6. Surveillance software that can record every keystroke made on a computer’s keyboard
  7. The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
  8. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  9. Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
  10. The psychological manipulation of people into performing actions or divulging confidential information
  11. Computer program used to prevent, detect, and remove malware
Down
  1. The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
  2. Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
  3. Refers to a company security policy that allows for employees’ personal devices to be used in business
  4. Devices or software designed to find and prevent malicious activity on corporate networks
  5. Actions a company takes to manage the aftermath of a security breach or cyberattack
  6. A type of authentication method where the proof of a user’s identity is gained by different independent sources

17 Clues: Computer program used to prevent, detect, and remove malwareA formal and approved list of users who have defined access rights to an assetSurveillance software that can record every keystroke made on a computer’s keyboardActions a company takes to manage the aftermath of a security breach or cyberattack...