cybersecurity Crossword Puzzles
Homeland Security 2024-03-18
Across
- What department within Homeland Security deals with transportation security
- How many departments did the Homeland Security Act of 2002 combine
- What type of security does Homeland Security deal with when relating to the internet
- Acronym for department of homeland security
- What department within Homeland Security deals with emergency management
Down
- What is one Geographical Aspect Homeland Security Protects
- What kind of events does Homeland Security prepare for
- How would opposers of Homeland Security describe its strategy
- What Homeland Security was made to defend against
9 Clues: Acronym for department of homeland security • What Homeland Security was made to defend against • What kind of events does Homeland Security prepare for • What is one Geographical Aspect Homeland Security Protects • How would opposers of Homeland Security describe its strategy • How many departments did the Homeland Security Act of 2002 combine • ...
Computer Project 2025-06-15
Across
- : Bullying someone online through messages or social media
- : A harmful program that can damage files and software
- : People who use the internet or computers to commit crimes
- : Software that protects your computer from viruses
Down
- : The practice of protecting devices and data from cyber threats
- : Fake messages that try to steal passwords or bank info
- : Criminal activities done using computers or the internet
- : A system that blocks unauthorized access to or from a private network
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Bullying someone online through messages or social media • : Criminal activities done using computers or the internet • : People who use the internet or computers to commit crimes • ...
Cybersecurity Unit 1 Lesson 2 2022-12-02
Across
- Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
- A small local area network of computers and devices.
- Software that can stop malware from entering a network, computer, or device.
- Stores data that is in use.
- Software that runs on your computer, looking for many different types of malware from many different sources.
- Small text-based bits of information about your browser that a web server saves.
- Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
- All data on a computer.
- The arrangement of the various elements of a network.
- Executable files that are run by users.
- The systematic way to find specific web addresses and web pages.
Down
- A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
- A weakness in a system that allows an attacker to gain unauthorized access.
- A special kind of file that contains other files.
- A file that contains a collection of other files.
- Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
- Computer shared by multiple users across a network.
- An application file that is currently executing (also called running) in the operating system.
- An agreed-upon method for communication.
19 Clues: All data on a computer. • Stores data that is in use. • Executable files that are run by users. • An agreed-upon method for communication. • A special kind of file that contains other files. • A file that contains a collection of other files. • Computer shared by multiple users across a network. • A small local area network of computers and devices. • ...
Crossword - LCCI and Lilly 2021-11-25
Across
- New e-commerce added in LCCI's R&R platform
- Who heads commercial services in LCCI
- platform where you can submit bills for reimbursement
- what is the name of the building in Embassy Tech village that LCCI occupies
- critical foundation of Lilly’s ethics and compliance program
Down
- Which month was LCCI started in Bangalore
- how many employees were there at the start of LCCI
- Learning portal sponsored by LCCI for its employees
- Lilly unites caring with discovery to create medicines that make life better for people around the world.
- when was the cybersecurity month
10 Clues: when was the cybersecurity month • Who heads commercial services in LCCI • Which month was LCCI started in Bangalore • New e-commerce added in LCCI's R&R platform • how many employees were there at the start of LCCI • Learning portal sponsored by LCCI for its employees • platform where you can submit bills for reimbursement • ...
C CROSSWORD 2014-02-26
Across
- location. When reached, the invitees were
- they all had received a prank call.
- annoyed to see the party hall empty.The members realized that
- The enrolled members of "CYBERSECURITY CLUB" were called
- Twice to their surprise they found a paper unknowingly left
Down
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- for a party arranged at
- The squad diffused the bomb and saved everyone . They all came back home .
- a common
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
technology 2024-07-18
Across
- - An electronic device for storing and processing data.
- - Programs and operating information used by a computer.
- - A global network connecting millions of computers.
- - An organized collection of data, generally stored and accessed electronically.
Down
- - A mobile phone with advanced features.
- - The practice of protecting systems, networks, and programs from digital attacks.
- - An input device with keys used to type characters.
- - A process or set of rules to be followed in problem-solving operations.
- - The branch of technology dealing with the design and application of robots.
- - A small electronic device or tool.
10 Clues: - A small electronic device or tool. • - A mobile phone with advanced features. • - An input device with keys used to type characters. • - A global network connecting millions of computers. • - An electronic device for storing and processing data. • - Programs and operating information used by a computer. • ...
msn policies 2025-03-25
Across
- speaking in behalf facebook, in order to commint phishing
- any type of data that can be used to identify a person
- If you invest in this business your money will increase in two hours.
- most popular high risk drug
- buying nudes from a minor
Down
- I cant see your shoulders and knees
- The way we should address "hormonal" in Spanish
- threaten when a nude pic is shared
- Did you ask little Jane to keep the chat a secret?
- be careful, in spanish sounds like "pan" but its pronunciation in brazil is...
10 Clues: buying nudes from a minor • most popular high risk drug • threaten when a nude pic is shared • I cant see your shoulders and knees • The way we should address "hormonal" in Spanish • Did you ask little Jane to keep the chat a secret? • any type of data that can be used to identify a person • speaking in behalf facebook, in order to commint phishing • ...
test 2025-04-02
Across
- Agents must state this on every call with a patient
- Rachel Robinson
- Platform used to work patient accounts
- Where employees can access benefits, tax documents, and pay statements
- A library in REACH containing courses that employees can enroll themselves in
- Capio's space to recognize and celebrate one another through points and eCards
Down
- Cybersecurity training drama series
- A cyberattack where scammers trick individuals into revealing sensitive information, like passwords or financial details, by posing as trusted entities through deceptive messages or websites.
- Vice President Operations
- Capio's platform for encouraging health and wellness
10 Clues: Rachel Robinson • Vice President Operations • Cybersecurity training drama series • Platform used to work patient accounts • Agents must state this on every call with a patient • Capio's platform for encouraging health and wellness • Where employees can access benefits, tax documents, and pay statements • ...
Nicrossword 2 2024-12-23
Across
- State Wide Area Network to connect state administration offices.
- Software with source code that anyone can inspect, modify, and enhance.
- National Knowledge Network for connecting educational and research institutions.
- Protection against cyber threats and securing digital infrastructure.
- Extremely large data sets analyzed computationally to reveal patterns and trends.
Down
- A unique identification project by the Government of India.
- Unified Mobile Application for New-age Governance.
- An ICT solution for the management of hospital services.
- A paperless office solution by NIC for government departments.
- A nationwide communication network by NIC.
10 Clues: A nationwide communication network by NIC. • Unified Mobile Application for New-age Governance. • An ICT solution for the management of hospital services. • A unique identification project by the Government of India. • A paperless office solution by NIC for government departments. • State Wide Area Network to connect state administration offices. • ...
TEM-8 science and technology 2025-11-14
Across
- a set of rules for solving a problem in a finite number of steps
- the introduction of new ideas, methods, or products
- the protection of computer systems from theft or damage
- reality a computer-generated simulation of a 3D environment
- technology on an atomic or molecular scale
Down
- engineering the direct manipulation of an organism's genes
- a natural resource able to be replenished naturally
- the use of living organisms in technology and engineering
- able to be maintained at a certain rate without depletion
- the use of largely automatic equipment in a system of operation
10 Clues: technology on an atomic or molecular scale • a natural resource able to be replenished naturally • the introduction of new ideas, methods, or products • the protection of computer systems from theft or damage • the use of living organisms in technology and engineering • able to be maintained at a certain rate without depletion • ...
cbo crossword 1 2026-01-28
Across
- : Services that facilitate payments and settlements
- : Central bank control of money supply and credit
- : Acting on behalf of customers in financial transactions
- : Difference between lending and deposit interest rates
- is the Management of Assessment, monitoring, and control of loan portfolios
Down
- Banks : Banks allowed full range of banking services
- is the Management function where availability of cash to meet obligations is ensured
- : Institutions serving low-income and unbanked groups
- : Protection of digital banking systems from threats
- is the Management function where mismatches between bank assets and liabilities is taken care of
10 Clues: : Central bank control of money supply and credit • : Services that facilitate payments and settlements • Banks : Banks allowed full range of banking services • : Protection of digital banking systems from threats • : Institutions serving low-income and unbanked groups • : Difference between lending and deposit interest rates • ...
2024 International Privacy Week 2023-12-18
Across
- What can be used to make inferences about your socioeconomic status, demographic information and preferences
- MCA stands for
- Take _____ of your data!
- Your name, birthdate, and SSN
Down
- NCA stands for
- Your right to keep your person and your information to yourself
- Focused on preventing and solving threats (i.e., hacking, malware, online scams)
- The week-long event for spreading awareness about online privacy
- The month Data Privacy Week occurs
- Rules, guidelines, and your own personal choices about who has access to your data, and how much access they have
10 Clues: NCA stands for • MCA stands for • Take _____ of your data! • Your name, birthdate, and SSN • The month Data Privacy Week occurs • Your right to keep your person and your information to yourself • The week-long event for spreading awareness about online privacy • Focused on preventing and solving threats (i.e., hacking, malware, online scams) • ...
Artificial Intelligence Related to Information Technology 2025-01-07
Across
- Step-by-step instructions, like a recipe for computers
- A big box of information a computer can look up quickly
- A machine that can do work for people
- The games or apps you use on a computer or tablet
- Computers talking to each other to share things
Down
- A big web where people share pictures, videos, and talk
- Keeping computers safe from bad guys online
- Smart computer thinking, like a robot brain
- A box that helps you play games, write, or find answers
- The parts of a computer you can touch, like the keyboard
10 Clues: A machine that can do work for people • Keeping computers safe from bad guys online • Smart computer thinking, like a robot brain • Computers talking to each other to share things • The games or apps you use on a computer or tablet • Step-by-step instructions, like a recipe for computers • A big web where people share pictures, videos, and talk • ...
Crossword Puzzle #1 - Phishing Exposed! 2026-02-09
Across
- An Enterprise's portal that provides cybersecurity information to enhance security awareness of employees
- Also known as Two-Factor Authentication
- _ _ _ _ _ _ Engineering is tricking people to gain access
- Cyber _ _ _ _ _ _ is any malicious attempt to breach or gain unauthorized access to data
Down
- Impersonate a trusted source to deceive individuals or systems
- Suspicious messages designed to fool you into clicking, downloading, or giving information
- Unsolicited junk mail, often phishing related
- Common delivery method for phishing messages
- Is the chance that a threat will exploit a vulnerability and cause damage
- Login information sought by phishers
10 Clues: Login information sought by phishers • Also known as Two-Factor Authentication • Common delivery method for phishing messages • Unsolicited junk mail, often phishing related • _ _ _ _ _ _ Engineering is tricking people to gain access • Impersonate a trusted source to deceive individuals or systems • ...
Syniverse Crossword 2025-12-03
Across
- Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
- Using mobile service outside your home network
- Protecting networks and data from cyber threats
- Application to person messaging for OTPs, alerts, and notifications
- Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
- Delivery of texts and rich communications
- Final money movement between carriers after clearing
- Continuous advancement that keeps networks and businesses competitive
- Illicit or abusive use of telecom services
- Reconciling usage records between operators for billing
10 Clues: Delivery of texts and rich communications • Illicit or abusive use of telecom services • Using mobile service outside your home network • Protecting networks and data from cyber threats • Final money movement between carriers after clearing • Reconciling usage records between operators for billing • Application to person messaging for OTPs, alerts, and notifications • ...
Globalisation 2023-03-08
Across
- I __ __ __ __ __ security software to protect against harmful cyberattacks.
- With the increase in foreign culture, local culture might be l __ __ __.
- H __ __ __ __ __ __ are people who illegally gain access to other people's computer systems.
- the interconnectedness of societies.
- C__ __ __ __ __ __ __ __ __ __ __ __ protects computers and electronic devices from cyberattacks.
Down
- I__ __ __ __ __ __ __ __ __ __ __ in technology contributes to Globalisation.
- Better economic situation can lead to b__ __ __ __ __ quality of life.
- Globalisation leads to economic, c__ __ __ __ __ __ __ and security impacts.
- Globalisation has i__ __ __ __ __ __ __ __ security threats.
- M__ __ __ __ __ phones have allowed us to connect with people faster.
- F __ __ __ __ __ __ culture has spread throughout the world, such as K-pop.
- G__ __ __ __ __ of Multinational Corporations (MNCs) is a factor that drives Globalisation.
12 Clues: the interconnectedness of societies. • Globalisation has i__ __ __ __ __ __ __ __ security threats. • M__ __ __ __ __ phones have allowed us to connect with people faster. • Better economic situation can lead to b__ __ __ __ __ quality of life. • With the increase in foreign culture, local culture might be l __ __ __. • ...
Cyber Security Puzzle 2024-10-22
Across
- The process of verifying the identity of a user
- A method of disguising data to protect it
- A device that helps protect networks by filtering traffic
- A breach where sensitive data is accessed unlawfully
- A malicious email designed to trick recipients
- A protocol used to send emails securely
Down
- A common form of malware that locks files
- A program that scans for vulnerabilities in systems
- A common cybersecurity measure that involves using complex passwords
- Software that detects and removes malware
- A type of attack where multiple systems are used to overwhelm a target
- A legal framework for data protection in the EU
12 Clues: A protocol used to send emails securely • A common form of malware that locks files • A method of disguising data to protect it • Software that detects and removes malware • A malicious email designed to trick recipients • The process of verifying the identity of a user • A legal framework for data protection in the EU • ...
Кәмшат 2024-11-19
Across
- A cloud computing environment designed specifically for one organization?
- An infrastructure-as-a-service model?
- What is the process of software allocation of computer resources called?
- Protecting data and systems from cyber attacks?
- The process of automatically adjusting resources based on user demand?
Down
- Google's cloud storage service?
- A collection of key resources such as networks, servers, hardware?
- Special coding process to protect data?
- A software-as-a-service model?
- What is the process of protecting data from unauthorized access called?
- What is the level of service available to users?
- A service for hosting websites and applications on the Internet?
12 Clues: A software-as-a-service model? • Google's cloud storage service? • An infrastructure-as-a-service model? • Special coding process to protect data? • Protecting data and systems from cyber attacks? • What is the level of service available to users? • A service for hosting websites and applications on the Internet? • ...
bbb 2023-04-28
Across
- requires less memory
- measure of correctness that is achieved in true prediction.
- Identifying similar groups of data in a dataset is called
- ls called blind algorithms
- if there is a relationship between the input variable and the output variable
Down
- machine learning models are trained without labelled data sets
- maps any given percept sequence to an action
- One of the AI application
- is a tabular summary of the number of correct and incorrect predictions made by a classifier
- measures how often the classifier makes the correct prediction
10 Clues: requires less memory • One of the AI application • ls called blind algorithms • maps any given percept sequence to an action • Identifying similar groups of data in a dataset is called • measure of correctness that is achieved in true prediction. • machine learning models are trained without labelled data sets • ...
C CROSSWORD 2014-02-26
Across
- The enrolled members of "CYBERSECURITY CLUB" were called
- they all had received a prank call.
- annoyed to see the party hall empty.The members realized that
- location. When reached, the invitees were
- The squad diffused the bomb and saved everyone . They all came back home .
- a common
Down
- for a party arranged at
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- Twice to their surprise they found a paper unknowingly left
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
Security Awareness 2022-05-17
Across
- Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
- Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
- Perilaku hati-hati untuk melindungi kita terhadap ancaman
- Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
- Jenis Informasi yang merupakan informasi pengetahuan umum
- Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
- Prinsip Keamanan Informasi agar akurat
- Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
- Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
- Perangkat lunak yang diciptakan untuk merusak sistem computer
10 Clues: Prinsip Keamanan Informasi agar akurat • Jenis Informasi yang merupakan informasi pengetahuan umum • Perilaku hati-hati untuk melindungi kita terhadap ancaman • Perangkat lunak yang diciptakan untuk merusak sistem computer • Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan • ...
Technology 2023-08-24
Across
- Wireless technology that enables data transfer between devices.
- Online method of watching videos or listening to audio without downloading i.e., real time digital content.
- Secret combination used to access digital accounts.
Down
- Mathematical recipe used to solve complex tasks efficiently.
- Process of creating instructions for computers to execute tasks.
- Practices and technologies used to safeguard digital information from attacks.
- Global navigation system that provides location and navigation information.
- Malicious software that spreads and infects digital systems.
- Computer-based systems that mimic human intelligence.
- Money capital of India.
10 Clues: Money capital of India. • Secret combination used to access digital accounts. • Computer-based systems that mimic human intelligence. • Mathematical recipe used to solve complex tasks efficiently. • Malicious software that spreads and infects digital systems. • Wireless technology that enables data transfer between devices. • ...
executive branch 2023-07-09
Across
- binding agreements between nations and become part of international law
- Right to reject decisions
- Advisory body is made up of 15 executive departments
- A diplomat sent by a country
- responsible for counterterrorism, cybersecurity, aviation security etc...
Down
- promoting economic prosperity and ensuring the financial security of the United States
- Leader of the U.S.
- Chief Executive Officer
- a judge who has been chosen by the President of the United States to work in a federal appeals court
- provide the military forces needed to deter war and to protect the security of our country
10 Clues: Leader of the U.S. • Chief Executive Officer • Right to reject decisions • A diplomat sent by a country • Advisory body is made up of 15 executive departments • binding agreements between nations and become part of international law • responsible for counterterrorism, cybersecurity, aviation security etc... • ...
soal 4.0 2023-10-24
Across
- salah satu teknologi di industri 4.0 yang sangat berguna saat ini
- Alat Iot yang kegunaanya memudahkan dirumah
- Teknologi inti dari Industri 4.0
- Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
- Data besar yang kompleks yang dianalisis dalam industri 4.0
- Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
- Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
- Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
- Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
- Revolusi industri saat ini
10 Clues: Revolusi industri saat ini • Teknologi inti dari Industri 4.0 • Alat Iot yang kegunaanya memudahkan dirumah • Data besar yang kompleks yang dianalisis dalam industri 4.0 • salah satu teknologi di industri 4.0 yang sangat berguna saat ini • Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber • ...
Office Management 2025-10-12
Across
- The programs and operating information used by a computer.
- Distinctive attributes or characteristics.
- The state of keeping or being kept secret or private.
- The process of entrusting a task or responsibility to a subordinate.
- A system or organization where people are ranked by status or authority.
- room or building used for commercial or professional work.
- The process of making plans for something.
Down
- Protecting networks and data from unauthorized use.
- Computer systems able to perform tasks normally requiring human intelligence.
- The fact or quality of being on time.
10 Clues: The fact or quality of being on time. • The process of making plans for something. • Distinctive attributes or characteristics. • Protecting networks and data from unauthorized use. • The state of keeping or being kept secret or private. • room or building used for commercial or professional work. • ...
Career Focus 7 2025-12-10
Across
- The ability to move skills from one job to another
- In demand professional who builds applications or software systems
- What the trainee earns upon successful completion
- Type of program: A university preparation or bridging course
- National GTO with an Albury-Wodonga presence
- _____ LETTER A one-page letter sent with a resume
Down
- Critical skill needed for protecting digital assets
- The overall program of study you're enrolled in
- The capacity to adjust to a new work task or technology
- Formal training received at an RTO like TAFE (3 words)
10 Clues: National GTO with an Albury-Wodonga presence • The overall program of study you're enrolled in • What the trainee earns upon successful completion • _____ LETTER A one-page letter sent with a resume • The ability to move skills from one job to another • Critical skill needed for protecting digital assets • Formal training received at an RTO like TAFE (3 words) • ...
IT Trivia 2022-07-18
Across
- ... word, excel, powerpoint, office
- measures taken to protect devices, networks, and data from unauthorized access and criminal use
- a program that is dedicated to managing network resources
- the vaccine for computers
- not physical but...
- an output device that produces a tangible copy of alphanumeric or graphic data
- one of the primary input devices used with a computer
Down
- the standard way to connect computers on a network over a wired connection
- a piece of code which can corrupt a system or destroy data
- Jerry
- the button you press when you make an error
- what we hate to see in our emails
- the practice of tricking internet users through deception into revealing personal information
13 Clues: Jerry • not physical but... • the vaccine for computers • what we hate to see in our emails • ... word, excel, powerpoint, office • the button you press when you make an error • one of the primary input devices used with a computer • a program that is dedicated to managing network resources • a piece of code which can corrupt a system or destroy data • ...
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
STEM Careers 2023-12-13
Across
- Designs and oversees the construction of infrastructure like roads and bridges.
- Analyzes and develops software applications for specific user needs.
- Works on the molecular or atomic scale for various applications.
- Designs algorithms for computational problems.
- Designs solutions for environmental issues like pollution.
- Focuses on celestial bodies' formation and evolution.
Down
- Focuses on developing technologies for sustainable energy sources.
- Focuses on developing new materials for various applications.
- Involves analyzing biological data using computational methods.
- Focuses on preventing unauthorized access to computer systems.
- Uses statistical techniques to extract insights from data.
- Designs medical devices and diagnostic tools.
- Responsible for designing computer hardware components.
- Develops manufacturing processes and new materials.
- Involves studying the behavior of subatomic particles.
- Studies the interactions between organisms and their environment.
- Studies the Earth's crust, rocks, and land formations.
- Uses mathematical and statistical techniques to extract insights from data.
18 Clues: Designs medical devices and diagnostic tools. • Designs algorithms for computational problems. • Develops manufacturing processes and new materials. • Focuses on celestial bodies' formation and evolution. • Involves studying the behavior of subatomic particles. • Studies the Earth's crust, rocks, and land formations. • ...
Information and Cyber Security 2022-10-21
Across
- Hackers demanded this company cancel the planned release of a film
- The key to securing your accounts
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Virtual Private …
Down
- The term used for a broad range of malicious activities accomplished through human interactions
- Anti- ...
- What BHSF does to train colleagues to look out for phishing attacks
- What type of attacks are on the rise
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- These attacks typically target a CEO, CFO, or any CXX
- 560,000 pieces of … are detected every day
- UK cyber crime has … in the past 5 years
- Time it takes a hacker to brute force a 6 character password
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
SOF GLSS SCAVENGER HUNT 2023-09-05
Across
- Acronym for MFC's Quality Policy
- First word under Lockheed Martin Delivers found on the SOF Learning Dashboard
- The first program listed on the Programs dropdown
- The number of PED violations in 2023 (Hint: Cybersecurity)
- Click on this tab to find the JPS Library
- The first commitment listed on the SOF GLSS ESH Policy
- The next mandatory IT update starting in October
Down
- Quality Month
- Next day off on the Holiday Calendar
- JPS 1-102
- Last name of our Quality Sr. Manager
- 4th item found on the Command Media Menu on the portal
- The international standard that governs our systems relating to quality
- First link listed on the "ESH links" on the ESH Bulletin Board
- Found in the SOF GLSS Creed, our every day commitment to our customer
15 Clues: JPS 1-102 • Quality Month • Acronym for MFC's Quality Policy • Next day off on the Holiday Calendar • Last name of our Quality Sr. Manager • Click on this tab to find the JPS Library • The next mandatory IT update starting in October • The first program listed on the Programs dropdown • 4th item found on the Command Media Menu on the portal • ...
Some U.S. Power Numbers 2014-06-25
Across
- Separation into three groups
- Sub-elements of a larger mechanism
- Where outage information is often posted
- Sealed from use for a period of time
- A financial product that pays for covered events
- A type of evaluation
- What can happen to frozen pipes
- Inner workings framework
- A formal inquiry
- Someone who buys accounts receivables
- Storage site
- To send on an errand or assignment
- Food gone bad
- A vehicle capable of transporting gas or liquids
Down
- A term for a loss of power
- A term for the press, radio and other news outlets
- The World Wide Web
- A term covering the network of electrical connections
- Computer security
- A way down – or up
- Phone solicitators
- Term for lines carrying electrical power
- A popular social media tool
- Someone authorized to speak for the organization
- Step 2 of 5
- Dangerous
- Information Technology
- A technique for securing and protecting data files
- Type of gaseous fuel
29 Clues: Dangerous • Step 2 of 5 • Storage site • Food gone bad • A formal inquiry • Computer security • The World Wide Web • A way down – or up • Phone solicitators • A type of evaluation • Type of gaseous fuel • Information Technology • Inner workings framework • A term for a loss of power • A popular social media tool • Separation into three groups • What can happen to frozen pipes • ...
FITE 2013-05-16
Across
- symbol for a company
- personal conduct online
- document or file made with a preset format
- one thousand terabytes
- a thousand bytes
- one thousand megabytes
- one thousand brontobytes
- search engine that checks all search engines
- wireless home network
- one thousand exabytes
- close up preview of a template
- one thousand petabytes
- protection of information computer/networks
- any type of internet hosting service
- appearence of a document
- port that connects the mouse or keyboard to PC
- one thousand yottabytes
Down
- arrangement of data for a computer
- Ex: mouse, flash drive
- one thousand zetabytes
- software used to search data
- one thousand gigabytes
- one million bytes
- a device that has a lot of data storage
- zoomable presentation program
- computer screen
- network name
- Ex:comcast,verizon
- Ex: monitor, printer
- eight bytes
- rules to keep people safe online
- smallest unit of data
- plug your flashdrive into
- Ex: headphones, speakers
- a short memorable phrase for advertising
35 Clues: eight bytes • network name • computer screen • a thousand bytes • one million bytes • Ex:comcast,verizon • symbol for a company • Ex: monitor, printer • wireless home network • one thousand exabytes • smallest unit of data • Ex: mouse, flash drive • one thousand zetabytes • one thousand gigabytes • one thousand terabytes • one thousand megabytes • one thousand petabytes • personal conduct online • ...
ITSM Challenge 2 2024-05-21
Across
- Alteration to improve IT services.
- Ensuring uninterrupted IT service.
- Activity that creates a service definition.
- Daily management of IT services.
- Temporary endeavor to achieve a goal.
- Type of Change Request that is too urgent to wait for the next CAB meeting for approval to implement.
- Type of Change Request that is medium risk or higher, requires custom planning, and must be approved for implementation.
- Framework for managing IT services.
Down
- Phase of implementing changes into operations.
- Protection against digital threats.
- Formal demand for IT service.
- Secured data storage or transmission.
- Long-term plan for IT service improvement or actions taken to determine the need for new services.
- An unexpected disruption in service.
- Rollout of IT services or IT updates to production.
- Root cause of recurring incidents.
- Best practice framework for IT service management.
- Authorized deployment of IT components.
- Type of Change Request that is low risk, repeatable, well-known, and preapproved
- Centralized project management office.
20 Clues: Formal demand for IT service. • Daily management of IT services. • Alteration to improve IT services. • Ensuring uninterrupted IT service. • Root cause of recurring incidents. • Protection against digital threats. • Framework for managing IT services. • An unexpected disruption in service. • Secured data storage or transmission. • Temporary endeavor to achieve a goal. • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
Electronics 2025-03-05
Across
- – Network of interconnected devices communicating via the internet.
- – Field focused on designing and building robots.
- – Board that connects electronic components.
- – Technology that uses radio waves for identification and tracking.
- – Energy sourced from nature, like solar or wind.
- – Type of system where software is built into hardware.
- – Advanced field of physics used for computing and cryptography.
- – Material used in electronic circuits, such as silicon.
- – Use of technology to perform tasks with minimal human intervention.
- – A small computer on a single chip, used in embedded systems.
- – Latest generation of mobile network technology.
Down
- – Communication without physical cables.
- – Low-level software controlling hardware functions.
- – A device that converts electrical signals into movement.
- – The practice of protecting computer systems from attacks.
- – Unmanned aerial vehicles used for various applications.
- – Computing closer to the data source to reduce latency.
- – A device that detects physical properties such as temperature or motion.
- – Engineering on a very tiny scale, atomic or molecular level.
- – The field of making machines "think" like humans.
20 Clues: – Communication without physical cables. • – Board that connects electronic components. • – Field focused on designing and building robots. • – Energy sourced from nature, like solar or wind. • – Latest generation of mobile network technology. • – The field of making machines "think" like humans. • – Low-level software controlling hardware functions. • ...
Satria briant ardinata (33) kelas XF 2025-04-29
Across
- Pelanggaran terhadap HAKI disebut
- Istilah untuk mengecualikan kata dalam pencarian Google
- Proses memeriksa kebenaran informasi
- Orang yang menguji kualitas perangkat lunak
- Budaya yang muncul dan berkembang di internet
- Platform untuk melaporkan konten berbahaya
- Kata kunci untuk mencari frasa secara tepat di Google
- Konten yang menyesatkan dan tidak benar
- Singkatan dari Hak Atas Kekayaan Intelektual
- Perlindungan hukum terhadap ide atau ciptaan
- Platform berbagi video terpopuler saat ini
- Platform pencarian yang sangat populer di dunia
- Proses menyebarkan informasi secara digital
- Format umum untuk gambar digital
Down
- Profesi yang mengubah data menjadi informasi berharga
- Hak atas ciptaan disebut hak
- Digunakan untuk mencari kata dalam situs tertentu
- Konten yang dibagikan secara luas disebut konten
- Spesialis yang menjaga keamanan sistem informasi
- Hak eksklusif atas merek disebut hak
- Profesi yang mengelola dan merancang sistem jaringan
- Pihak yang berwenang mengawasi konten digital
- Informasi yang memprovokasi dan merugikan disebut
- Operator pencarian untuk menampilkan hasil dari jenis file tertentu
- Orang yang menulis dan mengembangkan kode program
25 Clues: Hak atas ciptaan disebut hak • Format umum untuk gambar digital • Pelanggaran terhadap HAKI disebut • Proses memeriksa kebenaran informasi • Hak eksklusif atas merek disebut hak • Konten yang menyesatkan dan tidak benar • Platform untuk melaporkan konten berbahaya • Platform berbagi video terpopuler saat ini • Orang yang menguji kualitas perangkat lunak • ...
TTS19 X_D 2025-04-15
Across
- Pengembang perangkat lunak.
- Pelanggaran hak cipta disebut juga.
- Cerita rakyat yang bisa dibuat animasi digital.
- Penyebaran informasi secara digital.
- Hak atas penemuan atau inovasi teknologi.
- Operator pencarian untuk dua kata kunci sekaligus.
- Orang yang memperbaiki dan merawat jaringan komputer.
- Hak milik atas ciptaan lagu, buku, dan karya seni.
- Informasi palsu yang disebarkan untuk menipu.
- Lembaga yang mengatur HAKI di Indonesia.
Down
- Syntax untuk mencari di situs tertentu
- Proses mengecek kebenaran informasi sebelum membagikannya.
- Alat musik khas Jawa Barat.
- Pengelola dan penganalisis data dalam skala besar.
- Ahli dalam membuat sistem keamanan digital.
- Perilaku kasar atau menghina di media sosial.
- Seni tradisional yang bisa dijadikan konten edukatif.
- Kata untuk mengecualikan hasil pencarian.
- Proses membuat konten digital.
- Mesin pencari paling populer.
- Profesi yang merancang antarmuka pengguna.
- Lembaga yang mengawasi konten siaran di Indonesia.
- Penyebaran kebencian berbasis SARA di internet.
- Simbol atau logo dagang yang dilindungi hukum.
- Tanda yang digunakan untuk mencari frasa lengkap.
25 Clues: Alat musik khas Jawa Barat. • Pengembang perangkat lunak. • Mesin pencari paling populer. • Proses membuat konten digital. • Pelanggaran hak cipta disebut juga. • Penyebaran informasi secara digital. • Syntax untuk mencari di situs tertentu • Lembaga yang mengatur HAKI di Indonesia. • Kata untuk mengecualikan hasil pencarian. • Hak atas penemuan atau inovasi teknologi. • ...
TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16
Across
- Alat untuk menyaring konten tidak pantas
- Proses mengecek kebenaran sebuah informasi
- Orang yang menulis dan mengembangkan kode
- Simbol untuk mencari frasa tepat
- Pekerjaan yang menganalisis dan mengolah data besar
- Syntax untuk membatasi pencarian ke situs tertentu
- Direktorat di bawah Kemenkumham yang mengurus HAKI
- Perlindungan atas penemuan teknologi
- Istilah untuk penyebaran konten ke publik
Down
- Profesi bidang keamanan data dan jaringan
- Singkatan dari Hak atas Kekayaan Intelektual
- Berita palsu yang menyesatkan publik
- Konten berisi kebencian atau diskriminasi
- Lembaga negara pengawas konten digital
- Operator untuk alternatif kata
- Proses membuat media seperti video atau gambar digital
- Tindakan menyalin karya tanpa izin
- Syntax untuk mencari dokumen tertentu seperti PDF
- Istilah singkat untuk pengembang situs web
- Jenis HAKI yang melindungi nama dagang
- Platform media sosial populer untuk video pendek
- Unsur budaya lokal yang bisa diangkat ke konten digital
- Jenis tarian daerah yang bisa dijadikan konten
- Profesi yang fokus ke tampilan dan pengalaman pengguna
- Operator untuk mengecualikan istilah dari pencarian (simbol)
25 Clues: Operator untuk alternatif kata • Simbol untuk mencari frasa tepat • Tindakan menyalin karya tanpa izin • Berita palsu yang menyesatkan publik • Perlindungan atas penemuan teknologi • Lembaga negara pengawas konten digital • Jenis HAKI yang melindungi nama dagang • Alat untuk menyaring konten tidak pantas • Profesi bidang keamanan data dan jaringan • ...
TUGAS DARING INFORMATIKA GADIS EDYCIA P. X-I/12 2025-04-16
Across
- Alat untuk menyaring konten tidak pantas
- Proses mengecek kebenaran sebuah informasi
- Orang yang menulis dan mengembangkan kode
- Simbol untuk mencari frasa tepat
- Pekerjaan yang menganalisis dan mengolah data besar
- Syntax untuk membatasi pencarian ke situs tertentu
- Direktorat di bawah Kemenkumham yang mengurus HAKI
- Perlindungan atas penemuan teknologi
- Istilah untuk penyebaran konten ke publik
Down
- Profesi bidang keamanan data dan jaringan
- Singkatan dari Hak atas Kekayaan Intelektual
- Berita palsu yang menyesatkan publik
- Konten berisi kebencian atau diskriminasi
- Lembaga negara pengawas konten digital
- Operator untuk alternatif kata
- Proses membuat media seperti video atau gambar digital
- Tindakan menyalin karya tanpa izin
- Syntax untuk mencari dokumen tertentu seperti PDF
- Istilah singkat untuk pengembang situs web
- Jenis HAKI yang melindungi nama dagang
- Platform media sosial populer untuk video pendek
- Unsur budaya lokal yang bisa diangkat ke konten digital
- Jenis tarian daerah yang bisa dijadikan konten
- Profesi yang fokus ke tampilan dan pengalaman pengguna
- Operator untuk mengecualikan istilah dari pencarian (simbol)
25 Clues: Operator untuk alternatif kata • Simbol untuk mencari frasa tepat • Tindakan menyalin karya tanpa izin • Berita palsu yang menyesatkan publik • Perlindungan atas penemuan teknologi • Lembaga negara pengawas konten digital • Jenis HAKI yang melindungi nama dagang • Alat untuk menyaring konten tidak pantas • Profesi bidang keamanan data dan jaringan • ...
TEMA 2 2025-10-27
Across
- Aktivitas menonton, bermain, atau berkomunikasi melalui internet.
- Profesi baru yang muncul karena adanya media sosial.
- menjual dan membeli produk secara online.
- Istilah untuk kecerdasan buatan yang membantu otomatisasi bisnis.
- Layanan perbankan yang dapat diakses secara daring.
- Teknologi yang digunakan untuk mencatat transaksi kripto.
Down
- Sistem perdagangan yang dilakukan melalui internet.
- Sistem keamanan untuk melindungi data digital.
- Istilah untuk kegiatan promosi melalui media digital.
- Transaksi jual beli melalui aplikasi smartphone.
- Mata uang digital yang tidak memiliki bentuk fisik.
- Alat pembayaran digital yang banyak digunakan di ponsel.
- Bentuk uang elektronik yang diterbitkan oleh bank atau fintech.
- Pasar global tanpa batas yang diciptakan oleh internet.
- tempat menonton video digital, misalnya YouTube.
- Jenis pekerjaan yang bisa dilakukan dari rumah dengan bantuan internet.
- Perusahaan yang berbasis teknologi digital seperti Gojek atau Tokopedia.
- Teknologi penyimpanan data melalui internet.
- Istilah untuk data dalam jumlah besar yang diolah untuk bisnis.
- Proses perubahan dari sistem ekonomi tradisional ke sistem berbasis teknologi.
20 Clues: menjual dan membeli produk secara online. • Teknologi penyimpanan data melalui internet. • Sistem keamanan untuk melindungi data digital. • Transaksi jual beli melalui aplikasi smartphone. • tempat menonton video digital, misalnya YouTube. • Sistem perdagangan yang dilakukan melalui internet. • Mata uang digital yang tidak memiliki bentuk fisik. • ...
Wedding 2026-02-06
Across
- What does the Alexis do as a career?
- what is the Marcus' career?
- What is the nickname Lexi's family calls her?
- Who is the bride's favorite musical artist?
- What is the groom's cat's name?
- Where was the couple's first date?
- What is the groom's line name?
- What is the bride's cat's name?
- Where did the groom go to high school?
- Where is Marcus' hometown?
- What country did the couple visit in June 2025?
- what is the bride's middle name?
Down
- What college did the bride earn her FIRST degree from?
- Where did the bride go to high school?
- What is the bride's favorite cocktail?
- What is the groom's favorite cocktail?
- Where did the groom go to college?
- What is Marcus' nickname?
- Where was couple's first trip together?
- What month did the groom propose?
- What is the couple's goddaughter's name?
- Where can you usually find the groom?
- Where is the Lexi's hometown?
- How many years have the couple been together
24 Clues: What is Marcus' nickname? • Where is Marcus' hometown? • what is the Marcus' career? • Where is the Lexi's hometown? • What is the groom's line name? • What is the groom's cat's name? • What is the bride's cat's name? • what is the bride's middle name? • What month did the groom propose? • Where did the groom go to college? • Where was the couple's first date? • ...
Technology 2024-11-25
5 Clues: Advanced technology • Old-fashioned or no longer in use • Protecting online data and systems • A discovery that changes understanding • A place to connect and share content online
"Business Tech Brain Teaser" 2025-04-02
Across
- Using AI and software to perform tasks automatically
- The use of online payment systems in business
- The process of storing and accessing data over the internet
Down
- A system that helps businesses make smarter choices using data
- Digital tools that help businesses grow and operate
- The use of technology to protect business data
- The selling of goods and services online
- Online business that includes more than just sales
8 Clues: The selling of goods and services online • The use of online payment systems in business • The use of technology to protect business data • Digital tools that help businesses grow and operate • Online business that includes more than just sales • Using AI and software to perform tasks automatically • The process of storing and accessing data over the internet • ...
"Business Tech Brain Teaser" 2025-04-02
Across
- business that includes more than just sales
- tools that help businesses grow and operate
- use of online payment systems in business
Down
- process of storing and accessing data over the internet
- selling of goods and services online
- AI and software to perform tasks automatically
- system that helps businesses make smarter choices using data
- use of technology to protect business data
8 Clues: selling of goods and services online • use of online payment systems in business • use of technology to protect business data • business that includes more than just sales • tools that help businesses grow and operate • AI and software to perform tasks automatically • process of storing and accessing data over the internet • ...
C CROSSWORD 2014-02-26
Across
- a common
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- for a party arranged at
- The squad diffused the bomb and saved everyone . They all came back home .
Down
- annoyed to see the party hall empty.The members realized that
- location. When reached, the invitees were
- The enrolled members of "CYBERSECURITY CLUB" were called
- they all had received a prank call.
- Twice to their surprise they found a paper unknowingly left
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
Scsu 2023-08-11
Across
- refers to act of hiding the ip address to miss lead the target
- refers to the act of monitoring user commanicetion without consent
- insuring the infomation staya in it origanal from and present modified over a network
- attack is techingave used by attackers
Down
- insuring that your system stays available to pletform its metendet funetion when required
- securing your information only authoritht person will be access
- unsolicited bulk mails
- zombies computer
- a small software design to hide files
- a protection of your cyber or digital assets or information system from attackrs
10 Clues: zombies computer • unsolicited bulk mails • a small software design to hide files • attack is techingave used by attackers • refers to act of hiding the ip address to miss lead the target • securing your information only authoritht person will be access • refers to the act of monitoring user commanicetion without consent • ...
digital communications 2025-05-01
Across
- A set of related web pages located under a single domain name
- 1's and 0's
- The physical parts of a computer
- a communication method that uses electronic devices to deliver messages across computer networks
- the protection of computer systems
Down
- an emerging technology
- A global network made up of billions of electronic devices
- Information that can be interpreted and used by computers
- a set of computers sharing resources with one an other
- A set of instructions, data or programs used to operate computers and execute specific tasks
10 Clues: 1's and 0's • an emerging technology • The physical parts of a computer • the protection of computer systems • a set of computers sharing resources with one an other • Information that can be interpreted and used by computers • A global network made up of billions of electronic devices • A set of related web pages located under a single domain name • ...
Technology 2025-11-13
Across
- Existing in digital form or simulated by software rather than physical reality
- brain of the computer
- Software designed to damage
- the physical parts of a computer
- A newer version of software or data that improves or fixes issues
Down
- An unmanned aerial vehicle controlled remotely or autonomously
- A step-by-step set of instructions for solving a problem
- The practice of protecting systems and data from digital attacks
- A computer that provides data or services to other computers over a network
- Interface allowing programs to talk to each other
10 Clues: brain of the computer • Software designed to damage • the physical parts of a computer • Interface allowing programs to talk to each other • A step-by-step set of instructions for solving a problem • An unmanned aerial vehicle controlled remotely or autonomously • The practice of protecting systems and data from digital attacks • ...
Cybersecurity Fundamental Chapter 1 2022-11-29
Across
- Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
- group of criminals breaks into computers or networks to gain access for various reasons.
- Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- The Honeynet project is an example of creating Early Warning Systems.
Down
- great businesses have been created by collecting and harnessing the power of data and data analytics.
- InfraGard is an example of wide spread sharing of cyber intelligence.
- hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
- Business large and small have recognized the power of big data and data analytics.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence. • The Honeynet project is an example of creating Early Warning Systems. • Business large and small have recognized the power of big data and data analytics. • group of criminals breaks into computers or networks to gain access for various reasons. • ...
Digital Awareness 2024-10-21
Across
- A harmful software that replicates itself to spread to other computers
- The act of protecting personal information online
- A program designed to damage or disrupt systems
Down
- A global system of interconnected computer networks
- A unique string of characters used to access a computer or network
- Unsolicited email, often sent in bulk
- A software application for accessing information on the web
7 Clues: Unsolicited email, often sent in bulk • A program designed to damage or disrupt systems • The act of protecting personal information online • A global system of interconnected computer networks • A software application for accessing information on the web • A unique string of characters used to access a computer or network • ...
CURRENT ISSUE PUZZLE 2023-03-18
Across
- Factor affecting generation gap
- Security human resource technology
- Key point of talent management
Down
- Cultural difference in the workplace
- Someone uses a computer system or network in a bad way to get secret information or cause harm to the system
- Bully but virtual
- Unauthorized interception of phone conversations with the aim of listening in on what is being said.
7 Clues: Bully but virtual • Key point of talent management • Factor affecting generation gap • Security human resource technology • Cultural difference in the workplace • Unauthorized interception of phone conversations with the aim of listening in on what is being said. • ...
CIA Triad Crossword 2025-12-11
Across
- This is the digit that you will need for the falcons code for this puzzle.
- Ensuring sensitive information is kept private and only accessed by authorized individuals
- Ensuring that information and systems are accessible to authorized users whenever they are needed
Down
- Keeping data intact
- Data at rest
- Data in transit
- Acronym for the triad that embodies cybersecurity
7 Clues: Data at rest • Data in transit • Keeping data intact • Acronym for the triad that embodies cybersecurity • This is the digit that you will need for the falcons code for this puzzle. • Ensuring sensitive information is kept private and only accessed by authorized individuals • ...
Cybersecurity Crossword Challenge 2024-09-08
Across
- Software that secretly monitors user activity and collects personal information.
- A technique where a fake email or website is used to look like a trusted source.
- Software designed to harm or exploit any device it infects.
- When sensitive information is exposed due to a cyberattack or leak.
- A scam where attackers trick you into sharing personal information.
- A network security system that monitors and controls incoming and outgoing traffic.
Down
- Malware that locks your files and demands payment.
- A tool that encrypts your internet connection, often used for secure browsing.
- The process of scrambling data to keep it secure from unauthorized access.
9 Clues: Malware that locks your files and demands payment. • Software designed to harm or exploit any device it infects. • When sensitive information is exposed due to a cyberattack or leak. • A scam where attackers trick you into sharing personal information. • The process of scrambling data to keep it secure from unauthorized access. • ...
Cybersecurity Best Practices 2024-11-08
Across
- A security practice of regularly backing up important data.
- A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock.
- A security measure that protects against unauthorized access to a network.
- A security practice of regularly updating software and systems.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible
Down
- A malicious software.
- A technique used to trick someone into revealing sensitive information.
- A security measure that prevents unauthorized access to data & systems.
- A security measure that hides data to make it unreadable.
9 Clues: A malicious software. • A security measure that hides data to make it unreadable. • A security practice of regularly backing up important data. • A security practice of regularly updating software and systems. • A technique used to trick someone into revealing sensitive information. • A security measure that prevents unauthorized access to data & systems. • ...
Intro- Cybersecurity Crossword 2026-01-23
Across
- Computer users and resources within a geographic area the size of a metropolitan area that are connected.
- A local or restricted communications network, especially a private network created using World Wide Web software.
- A collection of many networks owned by many entities that share information and communicate together.
- The term used to describe how devices are connected and how messages flow from device to device. The physical topology describes the way the network is wired. The logical topology describes the way messages are sent.
Down
- __address The portion of the IP address that identifies the network the device is assigned to.
- An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.
- A group of computers and associated devices that share a common communications line or wireless link, typically to a server.
- An address that identifies the network and host address assigned to a device.
- A network that connects several LANs. WANs are often limited to a corporation or an organization but are sometimes accessible to the public.
9 Clues: An address that identifies the network and host address assigned to a device. • __address The portion of the IP address that identifies the network the device is assigned to. • A collection of many networks owned by many entities that share information and communicate together. • ...
CROSSWORD ANGEL VILLAMIL 2022-05-04
Across
- It is the practice of defending an organization from risks, threats and vulnerabilities.
- set of programs that allow the computer to perform different tasks.
- Facts collected about a topic or item.
- A set of activities that follow a sequence.
Down
- Physical elements that make up a computer.
- is the combination of the data.
- is a global computer network.
7 Clues: is a global computer network. • is the combination of the data. • Facts collected about a topic or item. • Physical elements that make up a computer. • A set of activities that follow a sequence. • set of programs that allow the computer to perform different tasks. • It is the practice of defending an organization from risks, threats and vulnerabilities.
Digital Citizenship 2025-05-12
Across
- Turning information into code to prevent unauthorized access
- Representing data in charts or graphs to understand it better
- The field that analyzes and interprets large sets of data
- Platforms for sharing and interacting with others online
- Gathering and measuring information
- A set of steps or rules used to solve a problem
- A trick used in emails or messages to steal personal information
- Using the internet to access and store data remotely
Down
- The right to keep personal information safe
- Responsible and respectful behavior when using technology
- Legally testing systems for vulnerabilities to improve security
- Machines performing tasks that require human intelligence
- Protection of computer systems and data from digital attacks
- The ability to navigate and use digital tools effectively
- The trail of data left behind by online activity
- Stealing someone's personal information for fraud
16 Clues: Gathering and measuring information • The right to keep personal information safe • A set of steps or rules used to solve a problem • The trail of data left behind by online activity • Stealing someone's personal information for fraud • Using the internet to access and store data remotely • Platforms for sharing and interacting with others online • ...
Cybersecurity Awareness Month 2024-05-06
Across
- The practice of accessing a computer or network without authorization.
- Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
- A technique used to verify the identity of a user by requiring two different forms of authentication.
- A unique string of characters used to authenticate a user's identity.
Down
- A program designed to prevent unauthorized access to or from a private network.
- Malicious software designed to gain unauthorized access to a computer system.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- A piece of software designed to block access to a computer system until a sum of money is paid.
- A method of protecting sensitive data by converting it into an unreadable format.
9 Clues: A unique string of characters used to authenticate a user's identity. • The practice of accessing a computer or network without authorization. • Malicious software designed to gain unauthorized access to a computer system. • A program designed to prevent unauthorized access to or from a private network. • ...
Cybersecurity Crossword Puzzle 2023-05-15
Across
- It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
- is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
- -factor authentication is a second layer of security that protects our networks from cyber-attack.
- Alert Button We report phishing by using the
- threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
- is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
- Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
- such as curiosity, urgency, greed, and fear are used in phishing emails.
- can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.
9 Clues: Alert Button We report phishing by using the • such as curiosity, urgency, greed, and fear are used in phishing emails. • -factor authentication is a second layer of security that protects our networks from cyber-attack. • can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data. • ...
networks 2026-02-12
Across
- for transmitting a signal.
- cable: high-speed networking cable containing
- cable is the standard, physical cable used toconnec devices—like computers,
- label assigned to every device
- to briefly restate or condense the main points
- of glass or plastic fibres
- range of frequencies within a given band, in particular that
- refers to the time delay between a cause and its observed effec
Down
- of activity from which other parts radiate.
- s a hardware device that acts as a bridge between your home network
- the foundational cybersecurity process ofconverting readable information
- is a company or organization that provides individuals, households, and businesseswith access to the internet and related services
- user that requests and consumes services
- phonebook of the internet
- points a networking hardware device that all wireless-capable devices
- is a group of connected computing devices
16 Clues: phonebook of the internet • for transmitting a signal. • of glass or plastic fibres • label assigned to every device • user that requests and consumes services • is a group of connected computing devices • of activity from which other parts radiate. • cable: high-speed networking cable containing • to briefly restate or condense the main points • ...
Lexi & Marco 2026-04-07
Across
- on what dating app did lexi and marco meet?
- what does the groom do for work?
- who is older?
- what college did marco attend for undergrad?
- where did the couple have their first date?
- how many years have marco and lexi been together?
- what is the bride's favorite hobby?
Down
- where is the happy couple's favorite place to be?
- who is the bride's favorite singer?
- where did the newlyweds go on their third date on Valentine's Day?
- what does the bride do for work?
- who said i love you first?
- the groom proposed to the bride at an event for which holiday?
- what is the groom's favorite football team?
- after a rare night out, what fast food restaurant are they stopping at?
- what is the name of their beloved?
16 Clues: who is older? • who said i love you first? • what does the bride do for work? • what does the groom do for work? • what is the name of their beloved? • who is the bride's favorite singer? • what is the bride's favorite hobby? • on what dating app did lexi and marco meet? • what is the groom's favorite football team? • where did the couple have their first date? • ...
Information and Cyber Security 2022-10-21
Across
- 560,000 pieces of … are detected every day
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Anti- ...
- These attacks typically target a CEO, CFO, or any CXX
- UK cyber crime has … in the past 5 years
Down
- What type of attacks are on the rise
- What BHSF does to train colleagues to look out for phishing attacks
- The key to securing your accounts
- Time it takes a hacker to brute force a 6 character password
- The term used for a broad range of malicious activities accomplished through human interactions
- Virtual Private …
- Hackers demanded this company cancel the planned release of a film
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
TECHNOLOGY 1 2025-04-14
Across
- The practice of storing and accessing data and applications over the internet
- AI
- A global network of interconnected computers
- A set of instructions for a computer to follow
- A person who fears or dislikes technology
- Technology that can be used on portable devices
- A group of interconnected computers and other devices
Down
- The protection of computer systems and networks from unauthorized access or use
- To introduce something new or different
- The application of scientific knowledge for practical purposes, especially in industry
- The programs and instructions that tell a computer what to do
- A person who is enthusiastic about new technology
- Buying and selling goods and services online
- The physical components of a computer or other electronic device
- The process of extracting useful information from large amounts of data
15 Clues: AI • To introduce something new or different • A person who fears or dislikes technology • A global network of interconnected computers • Buying and selling goods and services online • A set of instructions for a computer to follow • Technology that can be used on portable devices • A person who is enthusiastic about new technology • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : The practice of protecting devices and data from cyber threats
- : Bullying someone online through messages or social media
- : A system that blocks unauthorized access to or from a private network
- : Fake messages that try to steal passwords or bank info
Down
- : People who use the internet or computers to commit crimes
- : A harmful program that can damage files and software
- : Breaking into someone’s computer or account without permission
- : Criminal activities done using computers or the internet
- : Software that protects your computer from viruses
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
PTS INFORMATIKA 2023-09-27
Across
- Kemampuan untuk memecah masalah menjadi bagian yang lebih kecil.
- Praktik menyimpan data di lokasi yang berbeda sebagai tindakan keamanan.
- Model bisnis yang melibatkan penjualan produk dan layanan secara online.
- Praktik dan teknologi yang melindungi sistem komputer dari ancaman.
- Jaringan global yang menghubungkan jaringan komputer.
- Langkah-langkah terstruktur untuk menyelesaikan masalah.
Down
- Model komputasi yang menggabungkan sumber daya dari banyak
- Situs web yang memungkinkan pengguna berbagi informasi secara online.
- Model komputasi yang memungkinkan akses ke sumber daya melalui PATTERNRECOGNITION Kemampuan untuk mengidentifikasi pola dalam data atau masalah.
9 Clues: Jaringan global yang menghubungkan jaringan komputer. • Langkah-langkah terstruktur untuk menyelesaikan masalah. • Model komputasi yang menggabungkan sumber daya dari banyak • Kemampuan untuk memecah masalah menjadi bagian yang lebih kecil. • Praktik dan teknologi yang melindungi sistem komputer dari ancaman. • ...
Computer Project 2025-06-15
Across
- : A system that blocks unauthorized access to or from a private network
- : The practice of protecting devices and data from cyber threats
- : A harmful program that can damage files and software
- : Fake messages that try to steal passwords or bank info
- : Bullying someone online through messages or social media
Down
- : Software that protects your computer from viruses
- : Criminal activities done using computers or the internet
- : People who use the internet or computers to commit crimes
- : Breaking into someone’s computer or account without permission
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
Computer Project 2025-06-15
Across
- : Criminal activities done using computers or the internet
- : Bullying someone online through messages or social media
- : People who use the internet or computers to commit crimes
- : Fake messages that try to steal passwords or bank info
Down
- : Breaking into someone’s computer or account without permission
- : A harmful program that can damage files and software
- : The practice of protecting devices and data from cyber threats
- : A system that blocks unauthorized access to or from a private network
- : Software that protects your computer from viruses
9 Clues: : Software that protects your computer from viruses • : A harmful program that can damage files and software • : Fake messages that try to steal passwords or bank info • : Criminal activities done using computers or the internet • : Bullying someone online through messages or social media • : People who use the internet or computers to commit crimes • ...
MIC Quiz 2 2023-04-26
Across
- A community for employees seeking resources and events that will help them develop more mindful and resilient habits.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
Down
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
MIC Quiz 2 2023-04-25
Across
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
Down
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
- A community for technical employees who identify as women to create a positive impact in the lives of women and girls in STEM fields.
15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
ICT: You & Your Data 2023-01-17
Across
- you should always keep your __________ to youself.
- all the social media company have this policy.
- one of social media company owned by Mark Zuckerberg
Down
- created when that data has been processed and becomes meaningful.
- Any company might hold your ___________ information that you have in your account.
- a practive of protecting systems,networks & programs from digital attacks.
- raw facts and figures.
- We should __________ our password once a month.
- You have the ________ to find out what information the government & other organisations store about you.
9 Clues: raw facts and figures. • all the social media company have this policy. • We should __________ our password once a month. • you should always keep your __________ to youself. • one of social media company owned by Mark Zuckerberg • created when that data has been processed and becomes meaningful. • ...
Welcome to Data Privacy Week! 2024-12-19
Across
- centers on the right to protect personal information online
- We are __________ and will join together to celebrate Data Privacy Week
- name, address, phone number, DOB, SSN
Down
- this is one reason why data privacy matters
- protecting data from hacking, malware and online threats
- do this to permissions like location, camera or microphone unless needed
- do this before clicking "allow" on any data requests
- these can collect data even if you aren't using them
- periodically check your privacy settings this often
9 Clues: name, address, phone number, DOB, SSN • this is one reason why data privacy matters • periodically check your privacy settings this often • do this before clicking "allow" on any data requests • these can collect data even if you aren't using them • protecting data from hacking, malware and online threats • centers on the right to protect personal information online • ...
YORK Chiller Access Manager 2025-04-17
Across
- Access level CHASE users use for software testing.
- Used on the login screen of the control panel to represent the serial number.
- 1st control panel to be released with YCAM.
- Majority of access codes are for this level.
- Quarterly communication for registered users.
Down
- YCAM dashboards can be accessed from this platform.
- 3rd party certification for our products to recognize efforts around cybersecurity.
- This new access level falls between Standard and Service.
- Allows users to view what changes were made in the control panel.
9 Clues: 1st control panel to be released with YCAM. • Majority of access codes are for this level. • Quarterly communication for registered users. • Access level CHASE users use for software testing. • YCAM dashboards can be accessed from this platform. • This new access level falls between Standard and Service. • ...
Cybersecurity Fundamentals Chapter 5 2024-06-05
Across
- Digital certificates are used to establish the identity of an entity (person, organization, or device) in online communications.
- Verifies that the data entered into a system conforms to expected formats and types, helping prevent common database attacks that involve injecting malformed data
- Methods and processes to ensure that data remains accurate, consistent, and reliable throughout its lifecycle.
- **: Identifies patterns in data that do not conform to expected behavior.
- Cryptographic methods used to validate the authenticity and integrity of a message, software, or digital document.
- The processes and rules applied to maintain the integrity of data within a database.
- Maintains the consistency of relationships between tables.
Down
- Mechanisms to ensure correct data entry into systems.
- Checks that data falls within specified parameters, ensuring completeness, accuracy, and consistency.
- Custom rules defined by users to meet specific data integrity requirements that are not covered by the other types of integrity rules
- Ensures that each row in a table has a unique identifier, typically a primary key, which uniquely identifies each entity in the table
- Ensures that data in a column adheres to a defined set of valid values.
- Techniques used to ensure data integrity by converting data into a fixed-length hash value.
13 Clues: Mechanisms to ensure correct data entry into systems. • Maintains the consistency of relationships between tables. • Ensures that data in a column adheres to a defined set of valid values. • **: Identifies patterns in data that do not conform to expected behavior. • The processes and rules applied to maintain the integrity of data within a database. • ...
CyberSecurity: Ch. 7 2022-11-30
Across
- unsolicited email sent to large groups
- one who accesses internet without permission
- malicious software
- acts involving a computing device on the internet
Down
- blocks unauthorized access
- connect to wifi without owner's permission
- a small text file to store personal info
- software that tracks your activity without your knowledge
- a collection of zombie computers
9 Clues: malicious software • blocks unauthorized access • a collection of zombie computers • unsolicited email sent to large groups • a small text file to store personal info • connect to wifi without owner's permission • one who accesses internet without permission • acts involving a computing device on the internet • software that tracks your activity without your knowledge
Digital Media crossword puzzle. 2023-09-14
5 Clues: ur chatting • playing games • subway surfers • so u don’t get hacked • A social media app based on chatting with friends cybersecurity a way of protecting you from hackers
Cybersecurity Fundamentals Chapter 7 2022-10-27
Across
- tool used to protect data stored in the forms of files.
- prevent rogue access point, it is also known as two-way authentication.
- transforms data using a complicated algorithm to make it unreadable.
- the stages of an information systems attack.
- consist of permissions that limits folder or file access for an individual or for a group of users.
- one of the most effective ways of protecting against data lost.
- protects computers and mobile devices using reputable software
Down
- patches are codes that manufacturers provide to prevent a newly discovered virus or worm from making successful attack.
- locks physically protecting computer equipment.
- uses radio wave to identify and track objects.
- it freezes the hard disk partition, does not save any changes that the user makes.
- idle timeout and screen lock.
- copies the contents of the computer's hard disk to an image file.
13 Clues: idle timeout and screen lock. • the stages of an information systems attack. • uses radio wave to identify and track objects. • locks physically protecting computer equipment. • tool used to protect data stored in the forms of files. • protects computers and mobile devices using reputable software • one of the most effective ways of protecting against data lost. • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- This security tool identified and removes malicious programs
- The individuals who control access to people, data, and systems
- This attack occurs when cybercriminals research and track which sites employees visit the most
- What should you do when a workstation or device is no longer in use
- Any scenario that triggers emotions should also trigger your __________
Down
- Stealing money is the main goal behind this type of malware
- Failure to run these equals failure to patch security vulnerabilities
- You can help fight cybercrime by becoming a ________________
- ____are the last line of defense
- Kwiktrip's password policy requires that coworkers change their passwords _____days
- The future of security is____,not machines
- This attack occurs when someone sneaks into a secured area behind someone else
- This dangerous attack targets specific people or organization, often with custom made email or messages
- These are designed to maintain the security of everyone associated with an organization
14 Clues: ____are the last line of defense • The future of security is____,not machines • Stealing money is the main goal behind this type of malware • You can help fight cybercrime by becoming a ________________ • This security tool identified and removes malicious programs • The individuals who control access to people, data, and systems • ...
ESLA Cybersecurity NATHAN COMPAGNON 2025-11-24
Across
- an information object (like a word) that points to related information that is located elsewhere and can be retrieved by activating the link.
- It's an ICMP message sent to determine if the machine you sent it too is online and how long traffic is.
- it's a challenge-response test commonly used by websites to verify the user is a real human
- range of frenquencies used to transmit a signal.
- It's the process of taking off one layer of headers and passing the rest of the packet up to the next higher layer on the protocol stack.
Down
- it's a kind of spyware software that records every keystroke made on a computer’s keyboard
- Discreet access placed illicitly in a system or software, making it possible to bypass legitimate access control
- Broadcasting from one host to a given set of hosts.
- A program which is often started at the time the system boots and runs continuously without intervention from users on the system.
- it's an elementary building block of a digital circuit.
- Software making revenues by displaying ads in webpages
- An algorithm that uses cryptography it include encryption, cryptographic, digital signature and key agreement algorithms.
- An attack that sends an improperly large ping with the intent of overflowing the input buffers and causing it to crash.
13 Clues: range of frenquencies used to transmit a signal. • Broadcasting from one host to a given set of hosts. • Software making revenues by displaying ads in webpages • it's an elementary building block of a digital circuit. • it's a kind of spyware software that records every keystroke made on a computer’s keyboard • ...
Cybersecurity Awareness Month 2024-05-07
Across
- The practice of accessing a computer or network without authorization.
- Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
- A technique used to verify the identity of a user by requiring two different forms of authentication.
- A unique string of characters used to authenticate a user's identity.
Down
- A program designed to prevent unauthorized access to or from a private network.
- Malicious software designed to gain unauthorized access to a computer system.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- A piece of software designed to block access to a computer system until a sum of money is paid.
- A method of protecting sensitive data by converting it into an unreadable format.
9 Clues: A unique string of characters used to authenticate a user's identity. • The practice of accessing a computer or network without authorization. • Malicious software designed to gain unauthorized access to a computer system. • A program designed to prevent unauthorized access to or from a private network. • ...
Cyber Aware 2022-11-17
Across
- an email that attempts to gain sensitive data or credentials
- software that compromises the operation of a system by performing an unauthorized function or process
- hacker with criminal intent
- activity or process where information systems are protected from unauthorized use
Down
- a person who uses computers to gain unauthorized access to data
- a dishonest scheme
- disclosure of sensitive information outside organization
- an observable occurrence in an information system or network
8 Clues: a dishonest scheme • hacker with criminal intent • disclosure of sensitive information outside organization • an email that attempts to gain sensitive data or credentials • an observable occurrence in an information system or network • a person who uses computers to gain unauthorized access to data • ...
AI in Cyberspace: Beyond the Hype 2025-03-07
Across
- A term often paired with "learning" in AI advancements.
- The practice of protecting computer systems from threats.
- A type of network modeled after the human brain.
- AI systems designed to operate without human intervention.
Down
- Related to intelligence that mimics human decision-making.
- The use of AI to protect cyberspace from cyber threats.
- A step-by-step procedure used in AI for decision-making.
- The process AI systems undergo to improve performance.
8 Clues: A type of network modeled after the human brain. • The process AI systems undergo to improve performance. • The use of AI to protect cyberspace from cyber threats. • A term often paired with "learning" in AI advancements. • A step-by-step procedure used in AI for decision-making. • The practice of protecting computer systems from threats. • ...
RU ITEC411 - Crime and Security 2023-10-17
Across
- A concealed entry point in communication systems
- Enhanced account security using multiple steps(acronym)
- This law places restrictive measures on information.
- Covert software that gathers user data
- Retail corporation affected by a major data breach in 2007.
- Legislation protecting intellectual property.
- Proving one's identity
- A United States federal law that governs unauthorized access to computer systems and data
- Deceptive cybersecurity trap for hackers.
- Activist use of hacking for social or political causes
- This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
- False statements harming one's reputation.
- False spoken statements harming reputation.
- This process transforms information into a coded form to protect it from unauthorized access
- Using unique physical features for identification
- Malicious software that replicates and infects
- system is used in retail to process transactions, record sales, and manage inventory(acronym.
- Ethical hacking for security assessment.
- Deceptive online tactic to steal personal information
- U.S. law for wiretaps and law enforcement access
20 Clues: Proving one's identity • Covert software that gathers user data • Ethical hacking for security assessment. • Deceptive cybersecurity trap for hackers. • False statements harming one's reputation. • False spoken statements harming reputation. • Legislation protecting intellectual property. • Malicious software that replicates and infects • ...
Technology 2024-02-29
Across
- Temporary storage of frequently accessed data for faster retrieval.
- Open-source machine learning framework developed by Google.
- Security barrier preventing unauthorized access to a network.
- Protection against digital threats and unauthorized access.
- UI toolkit for building natively compiled applications for mobile, web, and desktop.
- Securing data by converting it into a coded format.
- Modern programming language for Android app development.
- Agile framework for managing and developing products.
- Framework for distributed storage and processing of big data.
- Open-source automation server for building, testing, and deploying software.
Down
- Versatile, object-oriented programming language.
- Identification using unique biological traits like fingerprints.
- Platform for automating application deployment and scaling.
- Collaboration between development and operations teams for efficient software delivery.
- High-level programming language known for readability and versatility.
- Remote storage and computing services accessed over the internet.
- Flexible and iterative approach to project management.
- JavaScript library for building user interfaces.
- Open-source operating system kernel.
- Software intermediary enabling communication between different applications.
20 Clues: Open-source operating system kernel. • Versatile, object-oriented programming language. • JavaScript library for building user interfaces. • Securing data by converting it into a coded format. • Agile framework for managing and developing products. • Flexible and iterative approach to project management. • Modern programming language for Android app development. • ...
Crossword puzzle 2024-04-30
Across
- Online moral principles.
- Tech-enabled capability.
- Online harassment.
- Tech proficiency.
- Digital image.
- Tech competency.
- Personal info fraud.
- Network security barrier.
- Online self-representation.
- Digital illegal activities.
- Personal recognition.
- Digital data secrecy.
- Data protection.
- Personal info protection.
- Malicious program blocker.
- Protection measures.
- Access authentication code.
- Data transfer to web.
- Harmful software.
- Global web network.
- Responsible online behavior.
- Fraudulent schemes.
- Effective digital info use.
- Online conduct regulations.
- Secure data encoding.
- Digital threat knowledge.
Down
- Personal online journals.
- Analytical reasoning.
- Secure web browsing.
- Malicious digital assault.
- Digital threat protection.
- Digital education.
- Identity verification.
- Digital threat potential.
- Digital security measures.
- Online activity traces.
- Web navigation software.
- Digital education platform.
- Info safeguarding measures.
- Tech access gap.
- Unauthorized info access.
- thinking: Logical analysis.
- Malicious intrusion.
- Personal info protection.
- Internet precaution.
- Defense against digital threats.
- Online data secrecy.
- Digital safety practices.
- Deceptive data theft tactics.
- Digital communication.
50 Clues: Digital image. • Tech competency. • Tech access gap. • Data protection. • Tech proficiency. • Harmful software. • Online harassment. • Digital education. • Global web network. • Fraudulent schemes. • Secure web browsing. • Personal info fraud. • Malicious intrusion. • Protection measures. • Internet precaution. • Online data secrecy. • Analytical reasoning. • Personal recognition. • ...
TUGAS DARING SALSABILA RAMADHANI X–E /32 2025-04-14
Across
- Singkatan dari Hak Atas Kekayaan Intelektual?
- Upaya menghapus konten berbahaya disebut?
- Orang yang membuat program komputer disebut?
- Konten digital yang mengangkat nilai budaya?
- Kata atau frasa yang diketik untuk mencari informasi?
- Hak cipta termasuk jenis...?
- Proses membuat gambar, video, atau tulisan disebut
- Mesin pencari buatan Microsoft?
- Informasi palsu yang disebarkan di internet?
- Lembaga yang mengatur HAKI di Indonesia?
- Spesialis keamanan sistem disebut?
- Mesin pencari populer buatan Google?
Down
- Menyebarkan konten ke banyak orang secara digital
- Profesi yang menganalisis data digital?
- Perlindungan terhadap merek dagang disebut...?
- Musik, tari, dan cerita rakyat termasuk dalam?
- Lembaga pemerintah yang mengawasi konten internet?
- Platform populer untuk menyebarkan video budaya?
- Simbol "©" menyatakan...?
- Ahli jaringan komputer disebut?
- operator untuk cari file tertentu
- Istilah untuk hasil yang muncul setelah pencarian?
- Desainer tampilan antarmuka aplikasi?
- Tempat mengetikkan kata kunci pada search engine?
- Pemeriksaan kebenaran suatu informasi?
- Konten yang mengandung kebencian disebut?
26 Clues: Simbol "©" menyatakan...? • Hak cipta termasuk jenis...? • Ahli jaringan komputer disebut? • Mesin pencari buatan Microsoft? • operator untuk cari file tertentu • Spesialis keamanan sistem disebut? • Mesin pencari populer buatan Google? • Desainer tampilan antarmuka aplikasi? • Pemeriksaan kebenaran suatu informasi? • Profesi yang menganalisis data digital? • ...
SOLVE ME 2025-04-22
Across
- – Writing instructions for computers using programming languages.
- – The use of science to solve problems or make life easier.
- – A new method, idea, or product.
- – The physical components of a computer system.
- – A secret word used to access something securely.
- – Converting data into a secret code to protect it.
- – Sending data or files from your device to the internet.
- – A device that detects changes in the environment.
- – Programs and other operating information used by a computer.
- – A group of interconnected computers.
- – A digital ledger used to securely record transactions.
Down
- – A machine capable of carrying out tasks automatically.
- – To transfer files from the internet to your device.
- – An unmanned flying vehicle controlled remotely.
- – Using machines or software to perform tasks without human intervention.
- – Protecting systems and data from digital attacks.
- – A global network connecting millions of computers.
- – A set of instructions for solving a problem or performing a task.
- – Facts or information stored digitally.
- – A path in which electricity flows.
20 Clues: – A new method, idea, or product. • – A path in which electricity flows. • – A group of interconnected computers. • – Facts or information stored digitally. • – The physical components of a computer system. • – An unmanned flying vehicle controlled remotely. • – A secret word used to access something securely. • – Protecting systems and data from digital attacks. • ...
TTS_NABILA_XH_26 2025-04-22
Across
- des Desainer tampilan antarmuka aplikasi
- Perlindungan untuk karya tulis atau seni
- Kantor yang menangani pendaftaran HAKI di Indonesia.
- Proses membuat suatu media atau karya
- Kata untuk mencari dalam satu situs saja.
- Hak atas logo atau simbol bisnis
- IT Orang yang mengelola server dan jaringan
- Proses menyaring konten buruk
- Warisan leluhur yang dijadikan identitas
- Proses mengecek fakta
- Proses menilai kebenaran informasi
- Orang yang menulis dan membuat program komputer
Down
- Operator pencarian untuk menghilangkan kata tertentu.
- Singkatan dari hak yang melindungi karya
- Tanda yang digunakan untuk pencarian tepat di search engine
- Platform berbagi video populer
- Profesi yang menjaga keamanan data
- Hak untuk menggunakan karya secara eksklusif.
- Penyebaran konten digital secara luas
- Lembaga pengawas media digital
- Kata yang digunakan untuk menyambung dua kata kunci dalam pencarian.
- Konten tidak layak yang harus dicegah
- Orang yang menganalisis kebutuhan sistem.
- Konten yang menyatukan unsur modern dan tradisional.
- Mesin pencari milik Google
25 Clues: Proses mengecek fakta • Mesin pencari milik Google • Proses menyaring konten buruk • Platform berbagi video populer • Lembaga pengawas media digital • Hak atas logo atau simbol bisnis • Profesi yang menjaga keamanan data • Proses menilai kebenaran informasi • Penyebaran konten digital secara luas • Proses membuat suatu media atau karya • Konten tidak layak yang harus dicegah • ...
Internet vocabulary 2025-02-27
Across
- pretending to be companies to get someone's persona information
- editing a photo online to get desired results
- software used to block use of computer soft ware for a sum of monry
- place to communicate online
- being protected against online cyber attacks
- proper way to communicate on the internet
- using the internet to exploit people usually minors
- data left behind on the internet
- Speaking in All Caps to convey shouting
Down
- someone post or comment to purposely invoke anger
- a frequently updated webpage for business purposes
- recording and posting videos of assault
- a packet of data used to track their user anytime they use a site
- criminal activities committed using electrics
- using the internet to illegally copy software and give it to others
- bullying that occurs over the internet
- website setting allowing to control who see the information of the user
- someone who exploits others
- using someone else's identity for financial gain
- using electronics to harass someone
20 Clues: someone who exploits others • place to communicate online • data left behind on the internet • using electronics to harass someone • bullying that occurs over the internet • recording and posting videos of assault • Speaking in All Caps to convey shouting • proper way to communicate on the internet • being protected against online cyber attacks • ...
Raqamli Iqtsodiyot 2025-12-20
Across
- Aqlli telefonlarni birlashtiruvchi umumiy atama nima?
- Internet ulanishining ma'lumot o'tkazish qobiliyati qanday ataladi?
- Beshinchi avlod mobil aloqa texnologiyasi qaysi?
- Tizimli ravishda tashkil etilgan ma'lumotlar to'plami qanday ataladi?
- Ma'lumotlarni qayta ishlash uchun aniq ko'rsatmalar ketma-ketligi nima?
- Sun'iy intellektning inglizcha qisqartmasi nima?
- Foydalanuvchini to'liq virtual muhitga olib kiradigan texnologiya nima?
- Internet orqali ma'lumotlarni saqlash va qayta ishlash usuli qanday ataladi?
- Internet orqali loyihalar asosida masofaviy ishlash shakli qanday ataladi?
- Shaxsiy virtual tarmoqning qisqartmasi nima?
- Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima?
Down
- Tarmoqqa kirish nuqtasi va ma'lumotlarni yo'naltirish uchun ishlatiladigan qurilma nima?
- Raqamli tafovut nima?
- Narsalar interneti qanday qurilmalarni o'z ichiga oladi?
- Kompyuter tizimlari va ma'lumotlarni hujumlardan himoya qilish fan'i qaysi?
- Internet orqali tovarlar va xizmatlarni sotish va sotib olish qanday ataladi?
- Kriptovalyutalarning asosida yotadigan markazlashtirilmagan texnologiya nima?
- Innovatsion g'oya yoki mahsulot bilan yangi boshlangan biznes qanday ataladi?
- Odamlar virtual olamlarda ijtimoiylashadigan kelajak internet g'oyasi qanday ataladi?
- Onlayn muloqotdagi axloqiy qoidalar to'plami qanday ataladi?
20 Clues: Raqamli tafovut nima? • Shaxsiy virtual tarmoqning qisqartmasi nima? • Beshinchi avlod mobil aloqa texnologiyasi qaysi? • Sun'iy intellektning inglizcha qisqartmasi nima? • Aqlli telefonlarni birlashtiruvchi umumiy atama nima? • Narsalar interneti qanday qurilmalarni o'z ichiga oladi? • Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima? • ...
Raqamli Iqtsodiyot 2025-12-20
Across
- Aqlli telefonlarni birlashtiruvchi umumiy atama nima?
- Internet ulanishining ma'lumot o'tkazish qobiliyati qanday ataladi?
- Beshinchi avlod mobil aloqa texnologiyasi qaysi?
- Tizimli ravishda tashkil etilgan ma'lumotlar to'plami qanday ataladi?
- Ma'lumotlarni qayta ishlash uchun aniq ko'rsatmalar ketma-ketligi nima?
- Sun'iy intellektning inglizcha qisqartmasi nima?
- Foydalanuvchini to'liq virtual muhitga olib kiradigan texnologiya nima?
- Internet orqali ma'lumotlarni saqlash va qayta ishlash usuli qanday ataladi?
- Internet orqali loyihalar asosida masofaviy ishlash shakli qanday ataladi?
- Shaxsiy virtual tarmoqning qisqartmasi nima?
- Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima?
Down
- Tarmoqqa kirish nuqtasi va ma'lumotlarni yo'naltirish uchun ishlatiladigan qurilma nima?
- Raqamli tafovut nima?
- Narsalar interneti qanday qurilmalarni o'z ichiga oladi?
- Kompyuter tizimlari va ma'lumotlarni hujumlardan himoya qilish fan'i qaysi?
- Internet orqali tovarlar va xizmatlarni sotish va sotib olish qanday ataladi?
- Kriptovalyutalarning asosida yotadigan markazlashtirilmagan texnologiya nima?
- Innovatsion g'oya yoki mahsulot bilan yangi boshlangan biznes qanday ataladi?
- Odamlar virtual olamlarda ijtimoiylashadigan kelajak internet g'oyasi qanday ataladi?
- Onlayn muloqotdagi axloqiy qoidalar to'plami qanday ataladi?
20 Clues: Raqamli tafovut nima? • Shaxsiy virtual tarmoqning qisqartmasi nima? • Beshinchi avlod mobil aloqa texnologiyasi qaysi? • Sun'iy intellektning inglizcha qisqartmasi nima? • Aqlli telefonlarni birlashtiruvchi umumiy atama nima? • Narsalar interneti qanday qurilmalarni o'z ichiga oladi? • Ma'lumotlarni shifrlash orqali himoya qilish jarayoni nima? • ...
Blikken jubileum NWO Woord van het jaar 2024-01-22
Across
- Open deur voor hackers.
- Iedereen mag mee doen met deze cursus
- De beste plek om je auto schoon te maken van heel Scandinavië
- Surft snel weg in de auto
- Sesamstraatbewoner zonder bekakte r ontmoet presentatrice van Lingo
- Hard rock samenwerkingsverband van Steve Harris en Bruce Dickinson?
- Timmerman met een Ierse opa
- Wordt vaak geserveerd met kletskoek
- Wordt hierop verband gewikkeld?
- Partijtje van complottheoristen?
- Wordt hierop het nieuwe functiehuis gebouwd?
- Conclaaf in de lerarenkamer
- Tijd om in beweging te komen?
- Dit vormden de zeven dwergen
- Werken aan een suffe klus.
Down
- Geeft energie aan financiële zaken.
- Terughoudendheid is op zijn plaats op kantoor
- Internetpolitie
- Oproepen tot rekenen moet je tijdig in de agenda zetten.
- Allen die naar de dierentuin gaan
- Tegemoetkoming voor het winnende boontje
- Dit jaar door USV Hercules aan Ajax opgelegd, niet duurzaam
- Rustgevende hobby op de computer?
- Kwaal bij aanvragers in de NWA en het KIC?
- Familie van de airbag en de kniebeschermer.
25 Clues: Internetpolitie • Open deur voor hackers. • Surft snel weg in de auto • Werken aan een suffe klus. • Timmerman met een Ierse opa • Conclaaf in de lerarenkamer • Dit vormden de zeven dwergen • Tijd om in beweging te komen? • Wordt hierop verband gewikkeld? • Partijtje van complottheoristen? • Allen die naar de dierentuin gaan • Rustgevende hobby op de computer? • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
charlotte's computer apps review 2022-05-02
Across
- Protects your computer from cyber attacks
- Where all of your stuff is stored.
- An app that you use functions in.
- The page at the very end of something to show where you got your information
- What app do you make a poster or card on?
- Teacher.
- What app do you use to communicate with teachers or other students during school time?
- Mean people that try to steal your information online
- An app used to make your works cited page.
- Copying other people's words is known as _____
Down
- This class.
- An app that makes it easy to present your ideas.
- Something that is really bad in Ms. Burghorns class
- You can make videos or podcasts on _____.
- Something supplied by the school so we can do all of this.
- An app used to make a survey.
- What is the default size margin?
- Format for English essays
- Quick access to websites or apps.
- What app can you write essays and papers in.
20 Clues: Teacher. • This class. • Format for English essays • An app used to make a survey. • What is the default size margin? • An app that you use functions in. • Quick access to websites or apps. • Where all of your stuff is stored. • Protects your computer from cyber attacks • You can make videos or podcasts on _____. • What app do you make a poster or card on? • ...
RHS Clubs and Organizations 2025-03-20
Across
- Readers unite
- OuiOui
- PomPoms and Megaphones
- Dead language
- If you want to be a veterinarian you should join this club
- Students who enjoy SteM
- High kicks and splits
- Gamers compete here
- Touchdown
- Makeup and Hair
- 3 point shot
- Best note takers in the school
- Silly gooses on the six strings
- People who care about the planet
- Do Re Mi Fa So La Ti Do
- The military at RHS
- Flag Twirling
Down
- Students who live for drama
- More sophisticated music
- Bird's View
- Students that love to compare styles
- Solving quarrels between students
- Articulate arguments and long monologues
- Spiking over a net
- School sanctioned fights
- Build yourself a friend
- Keeping people safe online
- Board games
- Underwater students
- We've got spirit! Yes We do!
- Hit a homerun
- Boot Scootin Boogie
- Students who live for the past
- Swinging rackets
- A musical bunch
35 Clues: OuiOui • Touchdown • Bird's View • Board games • 3 point shot • Readers unite • Dead language • Hit a homerun • Flag Twirling • Makeup and Hair • A musical bunch • Swinging rackets • Spiking over a net • Underwater students • Boot Scootin Boogie • Gamers compete here • The military at RHS • High kicks and splits • PomPoms and Megaphones • Build yourself a friend • Students who enjoy SteM • ...
TEKA TEKI SILANG EKONOMI DIGITAL 2024-10-26
Across
- contoh aplikasi di ekonomi digital dalam bidang Transportasi
- tersambung ke internet (daring)
- pembeli tidak perlu berhari-hari untuk belanja langsung ke Cina
- sesuatu yang berupa teks, gambar, video serta identitas yang tersimpan di internet
- standar kode QR nasional untuk pembayaran di Indonesia
- perusahaan atau perorangan yang menyediakan barang untuk dijual ke konsumen
- kegiatan produksi, distribusi, konsumsi
- peraturan dan undang undang dalam perlindungan konsumen
- menggunakan teknologi dan jaringan internet dalam menyimpan data dan memproses data
- banyaknya persaingan dalam ekonomi digital
- ciri utama ekonomi digital
Down
- keamanan data di internet
- kecerdasan buatan
- web atau aplikasi yang memungkinkan pembeli untuk mencari, memesan, dan membayar produk secara digital
- ponsel yang telah menunjang penggunaan berbagai aplikasi digital
- konsumen membeli jersey ke penjual tanpa perantara
- contoh aplikasi di ekonomi digital dalam bidang bisnis
- contoh aplikasi di ekonomi digital dalam bidang kesehatan
- contoh aplikasi di ekonomi digital dalam bidang perbankan
- kemampuan memahami dan menggunakan teknologi digital secara efektif
20 Clues: kecerdasan buatan • keamanan data di internet • ciri utama ekonomi digital • tersambung ke internet (daring) • kegiatan produksi, distribusi, konsumsi • banyaknya persaingan dalam ekonomi digital • konsumen membeli jersey ke penjual tanpa perantara • contoh aplikasi di ekonomi digital dalam bidang bisnis • standar kode QR nasional untuk pembayaran di Indonesia • ...
RU ITEC41 2025-04-18
Across
- Converting data into a secure format to prevent unauthorized access.
- Protection of data and systems from cyber threats.
- Ensuring information is only accessible to authorized individuals.
- Safeguarding data from unauthorized access or damage.
- Legal rights over creations, such as digital content.
- Legal entitlements related to digital privacy and data.
- A weakness that can be exploited in a system.
- Deceptive attempts to acquire sensitive information, often via email.
- Software designed to disrupt or damage systems.
- Unauthorized access to or exposure of data.
Down
- Limiting access to data or systems based on authorization.
- The accuracy and consistency of data.
- Responsibility for actions and decisions, especially regarding data.
- Permission granted for the use of personal data.
- Illegal activities conducted through digital means.
- The trace of an individual's online activity.
- Defense against digital threats and attacks.
- Monitoring or tracking of online activity.
- Unauthorized access to systems or networks.
- The right to keep personal information secure and undisclosed.
20 Clues: The accuracy and consistency of data. • Monitoring or tracking of online activity. • Unauthorized access to systems or networks. • Unauthorized access to or exposure of data. • Defense against digital threats and attacks. • The trace of an individual's online activity. • A weakness that can be exploited in a system. • Software designed to disrupt or damage systems. • ...
cybercrime 2024-11-09
Across
- Virus or worm code hidden within a seemingly harmless program
- Theft Stealing another person’s identity to impersonate them online
- Fake messages asking for sensitive information
- Protection Protecting children from inappropriate online content
- Act of unauthorized copying or using someone's content
- Fake sites mimicking real ones to steal information
- Passwords, PINs, and fingerprints used for digital security
- Protecting data and systems from cyber attacks
- Software designed to harm or exploit computers
- Common scam emails that trick people into sharing private info
- Attacks aimed at disrupting or disabling a network
Down
- Financial theft through hacking or scams
- Law-breaking activities online
- The backbone of online communications targeted by cybercriminals
- Method of verifying identity online, often in two steps
- Tracking software that monitors user activity without consent
- Criminals who exploit security weaknesses online
- Testing Breaking into a system to test its defenses legally
- Program that spreads across computers, copying itself
- Illegal access to systems without permission
20 Clues: Law-breaking activities online • Financial theft through hacking or scams • Illegal access to systems without permission • Fake messages asking for sensitive information • Protecting data and systems from cyber attacks • Software designed to harm or exploit computers • Criminals who exploit security weaknesses online • Attacks aimed at disrupting or disabling a network • ...
