cybersecurity Crossword Puzzles
Name: __________________Period:________ 2024-12-05
Across
- Codes of behavior that are sometimes, but not always, enforced by laws
- Ongoing effort to protect networks connected to the Internet
- A computer program that attaches itself to other executable files on the computer
- Any code that can steal data, bypass access, or cause harm to a system
- Design to automatically deliver advertisements to a user
- Replicates itself to spread from one computer to another
- A technique that allows suspicious files to be analyzed in a safe environment.
Down
- Any information about you, a company or organization
- An Internet-based conflict that involves the networks of other nations
- Hardware or software that prevents hackers from accessing your data
- A decoys to sneak malicious software past unsuspecting users
- A program that scans a computer for malicious software and deletes it
12 Clues: Any information about you, a company or organization • Design to automatically deliver advertisements to a user • Replicates itself to spread from one computer to another • Ongoing effort to protect networks connected to the Internet • A decoys to sneak malicious software past unsuspecting users • ...
Azure Core: Day of learning | October 2022-10-27
Across
- One way to donate during the Giving month in Microsoft
- Microsoft product with more than 90 million people using it to build software
- ----- partnered with Microsoft to add Teams to its meeting devices
- Microsoft product with more than 15 million monthly active users, up 50% year over year
- First British Asian Prime Minister of United Kingdom
- ICC Men's T20 World Cup is being played in
Down
- Microsoft's cybersecurity ecosystem, launched with Data Security Council of India
- Microsoft's program which connects employees with opportunities for impact in local communities
- Microsoft announced a metaverse partnership with --------
- The quadrennial international men's football championship to be held in Qatar this year
- Microsoft product with more than 20 million monthly active users
- An internal tool for Microsoft employees to share feedback
12 Clues: ICC Men's T20 World Cup is being played in • First British Asian Prime Minister of United Kingdom • One way to donate during the Giving month in Microsoft • Microsoft announced a metaverse partnership with -------- • An internal tool for Microsoft employees to share feedback • Microsoft product with more than 20 million monthly active users • ...
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Digital Citizenship Crossword Puzzle 2023-11-02
Across
- The practice of protecting computer systems and networks from digital attacks.
- Etiquette Appropriate behavior and manners when interacting with others online.
- Media Websites and apps that allow users to create and share content with others.
- Attempting to obtain sensitive information, like usernames and passwords, by pretending to be a trustworthy entity.
- A secret combination of characters used to access your accounts.
Down
- The legal protection of an original creative work (e.g., music, writing) from unauthorized use.
- Footprint The trail of data you create while using the internet.
- Harassment or threats that occur on the internet.
- Your right to keep personal information safe online.
9 Clues: Harassment or threats that occur on the internet. • Your right to keep personal information safe online. • Footprint The trail of data you create while using the internet. • A secret combination of characters used to access your accounts. • The practice of protecting computer systems and networks from digital attacks. • ...
Cool Gadgets 2024-09-11
Across
- A mobile phone that combines features of a computer and a phone.
- Portable device for streaming music and podcasts
- The ability to learn, understand, and make judgments.
- Electronic devices that can be worn on the body.
- A group of interconnected computers or devices.
- A small mechanical or electronic device or tool.
- Existing or occurring on computers or on the internet.
- Introducing new ideas; creative in thinking.
Down
- The branch of technology dealing with the design, construction, and use of robots.
- A wearable device that often includes features like a phone, fitness tracker, and more.
- Measures taken to protect a computer or network against unauthorized access.
- Created by humans rather than occurring naturally.
- The state of things as they actually exist.
- Wearable tech that tracks fitness and health metrics
- Printing The process of creating a three-dimensional object from a digital model.
- The application of scientific knowledge for practical purposes.
- An unmanned aerial vehicle often used for photography or surveillance.
17 Clues: The state of things as they actually exist. • Introducing new ideas; creative in thinking. • A group of interconnected computers or devices. • Portable device for streaming music and podcasts • Electronic devices that can be worn on the body. • A small mechanical or electronic device or tool. • Created by humans rather than occurring naturally. • ...
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Crossword 2023-02-27
Across
- Document that identifies the cost of a business's goods and/or services.
- Pricing and price book questions should be forwarded to this team.
- Generally a replacement of hardware, software or firmware with a newer or better version.
Down
- All Upgrade and Migration quotes need to be quoted by this team.
- Occurs when existing customer goes from an on prem product to cloud hosted.
- Orders can be placed into this for unresolved bookings.
- Value Added Reseller
- Customer wants to switch to one product for another.
- Is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management
9 Clues: Value Added Reseller • Customer wants to switch to one product for another. • Orders can be placed into this for unresolved bookings. • All Upgrade and Migration quotes need to be quoted by this team. • Pricing and price book questions should be forwarded to this team. • Document that identifies the cost of a business's goods and/or services. • ...
Axel's Puzzle 2024-03-13
Across
- Software designed to damage or disrupt a computer system.
- Process of converting information or data into a code to prevent unauthorized access.
- Trying to get sensitive information like usernames, passwords, and credit card details by pretending to be someone trustworthy.
- Secret word or phrase used for authentication and access control.
- Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
Down
- Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
- Software designed to detect and remove viruses and other malicious software.
- Network security system designed to prevent unauthorized access
- Update to fix vulnerabilities or improve functionality in software.
9 Clues: Software designed to damage or disrupt a computer system. • Network security system designed to prevent unauthorized access • Secret word or phrase used for authentication and access control. • Update to fix vulnerabilities or improve functionality in software. • Software designed to detect and remove viruses and other malicious software. • ...
INNOV 2025-11-26
Across
- The implied cost of additional rework caused by choosing quick solutions over better options.
- Building and deploying mutualized platforms of IT components for scalable services.
- Embedded SIM technology allowing remote provisioning of mobile subscriptions.
- what transforms into a programmable and sustainable platform
- Operational optimization, automation (CI/CD, AI-driven), and cost reduction initiatives.
Down
- AI-driven insights, automation, and decision-making.
- The ability to use existing solutions or components across multiple projects or domains.
- Measures and technologies to protect systems and data from cyber threats.
- is a strategic growth driver within the Orange Group's financial services portfolio
9 Clues: AI-driven insights, automation, and decision-making. • what transforms into a programmable and sustainable platform • Measures and technologies to protect systems and data from cyber threats. • Embedded SIM technology allowing remote provisioning of mobile subscriptions. • is a strategic growth driver within the Orange Group's financial services portfolio • ...
Smarthomes Exercise 1 2024-06-05
Across
- Practices and technologies designed to protect smart home systems from digital attacks.
- Device to store food
- Network of interconnected devices that communicate and exchange data.
Down
- attempts to obtain sensitive information by disguising as a trustworthy entity
- The process of converting information or data into a code to prevent unauthorized access.
- A home entertainment device with internet connectivity and streaming capabilities.
6 Clues: Device to store food • Network of interconnected devices that communicate and exchange data. • attempts to obtain sensitive information by disguising as a trustworthy entity • A home entertainment device with internet connectivity and streaming capabilities. • Practices and technologies designed to protect smart home systems from digital attacks. • ...
Teka Teki Techco 2024-05-16
Across
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan. • ...
Teka Teki Techco 2024-05-16
Across
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan. • ...
Teka Teki Techco 2024-05-16
Across
- Istilah untuk volume data besar yang diproses untuk informasi.
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan. • ...
Cyber Awareness Month 2023-10-31
Across
- A strong password should include a random string of numbers, letters, and _______
- Click the orange fish______ icon in Gmail to report suspicious email to the Kent Tech Team
- MFA requires _____ or more credentials to verify your identity
- MFA or multi-factor ____________ is a layered security approach to protect your accounts
- Text message scams that try to trick you into disclosing personal information
Down
- Verifying your identity through your fingerprint or facial recognition
- Update _______ to install bug fixes and security updates
- Cybersecurity Awareness Month
- Email that appear to be from a legitimate source to trick you into disclosing personal information such as passwords or bank account info
- Sequence of words used for authentication
- A password _______ helps keep your accounts secure by storing and generating strong passwords
11 Clues: Cybersecurity Awareness Month • Sequence of words used for authentication • Update _______ to install bug fixes and security updates • MFA requires _____ or more credentials to verify your identity • Verifying your identity through your fingerprint or facial recognition • Text message scams that try to trick you into disclosing personal information • ...
DigitalTransformation 2024-10-09
Across
- A decentralized, digital ledger technology used for secure transactions.
- The process of changing or revolutionizing a business through digital means.
- A computer-generated simulation of a 3D environment (Abbreviation).
- The process of creating a physical object from a digital model by layering material
- The discovery and interpretation of meaningful data patterns.
- Large volumes of structured or unstructured data that can be analyzed for insights.
Down
- A subset of AI where computers learn from data.
- The practice of protecting systems, networks, and programs from digital attacks.
- A network of physical devices connected via the internet (Abbreviation).
- The simulation of human intelligence by machines (Abbreviation).
- The technology that designs, constructs, and operates robots.
- The fifth generation of mobile network technology.
- The use of software robots to automate repetitive tasks (Abbreviation).
- Raw information that can be processed to gain insights.
- Technology that overlays digital information onto the real world (Abbreviation).
- Technology that allows data to be stored and accessed over the internet.
16 Clues: A subset of AI where computers learn from data. • The fifth generation of mobile network technology. • Raw information that can be processed to gain insights. • The technology that designs, constructs, and operates robots. • The discovery and interpretation of meaningful data patterns. • The simulation of human intelligence by machines (Abbreviation). • ...
Teka Teki Techco 2024-05-16
Across
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
5 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
Teka Teki Techco 2024-05-16
Across
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
5 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
The Suffolk County September 2022 Hack 2022-10-31
Across
- __________is malware that locks access to devices & files
- __________ is better than a cure.
- Cybersecurity is a team _____
- Many tasks normally done online, became ________ tasks
- Those involved in ____ estate processing were crippled by the attack
- Data seized in a ransomware attack is held _____ unless payment is made
- The _______ of this attack is unprecedented
- The Suffolk County government experienced a_____ attack in early Sept. 2022
- $130 _______in unpaid receivables have accumulated since the hack was reported
- Citizens are in a ______ about their data & credit being accessed.
- Restoring data can be a costly & __________ task
Down
- Hackers posted confidential information on the _______
- If you see _________ say something.
- This ______ appears to be the most high-profile cyber attack against a government entity on LI
- It's important that we recognize the scope & ____ of this neighborhood cyberattack.
- As hackers become more sophisticated, it's important for our team to be _____
- ______ actors accessed or acquired personal information from County server.
- The County's 911 _________system was temporarily disabled
- ________ of dollars in Real Estate transactions are sitting on the sidelines
19 Clues: Cybersecurity is a team _____ • __________ is better than a cure. • If you see _________ say something. • The _______ of this attack is unprecedented • Restoring data can be a costly & __________ task • Hackers posted confidential information on the _______ • Many tasks normally done online, became ________ tasks • ...
9ABD 2025-05-12
Across
- - Number of wave cycles per second.
- - The basic unit of matter, central to quantum studies.
- - Field that may use quantum encryption to protect data.
- - Unique patterns of light produced by atoms when electrons drop energy levels.
- - When a quantum system exists in multiple states at once.
- - Branch of physics that explains the behavior of particles on a small scale.
- - Distance between two consecutive wave peaks.
- - Common display type that relies on polarized light.
- - Electromagnetic radiation that can behave like both a wave and a particle.
Down
- - Quantum link between particles no matter how far apart.
- - Required to excite electrons or eject them from metal surfaces.
- - Electrons are ejected when light hits a surface in this quantum phenomenon.
- - General term for strange behavior at the atomic and subatomic levels.
- - Heisenberg’s rule: you can’t know both position and momentum precisely.
- - Includes reflection, refraction, diffraction, and interference.
- - A particle of light with no mass, just energy.
- - What happens to electrons in the photoelectric effect.
- - Light can act as both a wave and a particle.
- - Describes the direction of oscillation in a transverse wave.
19 Clues: - Number of wave cycles per second. • - Light can act as both a wave and a particle. • - Distance between two consecutive wave peaks. • - A particle of light with no mass, just energy. • - Common display type that relies on polarized light. • - The basic unit of matter, central to quantum studies. • - Field that may use quantum encryption to protect data. • ...
Cybersecurity Awareness Week - 9/24 2021-09-24
Across
- a standalone malware computer program that replicates itself in order to spread to other computers
- a network security system that controls incoming and outgoing network traffic based on a set of rules
- a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity
- usually consists of eight bits
- (abbreviation) a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period
- (abbreviation) a way of injecting malicious scripts into web pages
- type of software to detect unwanted programs on a computer
Down
- a secret word or phrase that must be used to gain admission to something, you should never share yours with anyone!
- generic name someone who seeks and exploits weaknesses in a computer system or computer network
- a type of ransomware that attacked running Microsoft Windows operating systems in May 2017
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed
- the process of converting information or data into a code, especially to prevent unauthorized access
- function of one way encryption that is normally used to check integrity of data
- a type of malicious software designed to block access to a computer system until a sum of money is paid
15 Clues: usually consists of eight bits • type of software to detect unwanted programs on a computer • (abbreviation) a way of injecting malicious scripts into web pages • function of one way encryption that is normally used to check integrity of data • a type of ransomware that attacked running Microsoft Windows operating systems in May 2017 • ...
computer apps review 2022-05-02
Across
- what do you need to know when using social media?
- what app do you use when you want to make a poster?
- letters on sheets
- how do you let other people collaborate with you?
- what was the first project we did in computer app?
- what color is the turn-in button in docs?
- how many wevideos did we make
- what's one thing you never do when writing an essay?
- our second unit?
- what do you need for your computer to work?
Down
- what were we taught to use when writing an email?
- what's the best app to make a presentation?
- what’s one thing you need to be careful of when being on social media?
- what were we given at the beginning of the year to complete schoolwork?
- what was our most recent project about?
- how do you make a quiz where anybody can answer and see their responses?
- what app is good for studying
- what is used between slides in videos and projects?
- what do you click on to add an image to docs?
19 Clues: our second unit? • letters on sheets • what app is good for studying • how many wevideos did we make • what was our most recent project about? • what color is the turn-in button in docs? • what's the best app to make a presentation? • what do you need for your computer to work? • what do you click on to add an image to docs? • ...
Cybersecurity Awareness Week 4 2025 2025-10-28
Across
- When a device is not in the most current version, it means it is ______
- a device that is too many ______ behind will likely not receive current updates
- not all updates are required, some are labeled as ______.
- in ___ devices, you can go to the general settings section and perform a software update.
- you should only download updates from _______ sources
- You can also look for updates for a specific ________ in the app store or play store.
- make sure your device has enough ______ to perform the update
Down
- when a device has updates, you will likely be _____ a weakness
- keeping your devices up to date prevents hackers from exploiting a _____.
- a device can be _____ if weaknesses are left unchecked.
- A ____ update is mainly focused on fixing a flaw that can put your device at risk
- you should ______ updates whenever possible
- updates should be deemed important and done ______
- you should ____ all your devices whenever possible
- The lack of updates in an operating ______ can lead to an exposed device
15 Clues: you should ______ updates whenever possible • updates should be deemed important and done ______ • you should ____ all your devices whenever possible • you should only download updates from _______ sources • a device can be _____ if weaknesses are left unchecked. • not all updates are required, some are labeled as ______. • ...
Kreuzworträtsel für Krisenmanager 2025-03-26
Across
- Supercomputer der Zukunft, der herkömmliche Verschlüsselung in Sekunden knacken könnte (15 Buchstaben)
- Meist benutzter Laut bei BBUG
- Die wichtigste Eigenschaft für Unternehmen, um in unsicheren Zeiten erfolgreich zu bleiben (18 Buchstaben)
Down
- Wer Krisen überleben will, braucht ein starkes…? (9 Buchstaben)
- Wird durch Quantencomputer massiv bedroht – Unternehmen sollten hier dringend aufrüsten! (14 Buchstaben)
- Hier treffen sich kluge Köpfe, um über die Zukunft der Wirtschaft zu diskutieren (4 Buchstaben)
- Wirtschaftliche Auseinandersetzung zwischen Staaten durch Zölle, Sanktionen und Exportverbote (12 Buchstaben)
- Diese Technologie könnte bald Entscheidungen schneller und besser treffen als Menschen (2 Buchstaben)
8 Clues: Meist benutzter Laut bei BBUG • Wer Krisen überleben will, braucht ein starkes…? (9 Buchstaben) • Hier treffen sich kluge Köpfe, um über die Zukunft der Wirtschaft zu diskutieren (4 Buchstaben) • Diese Technologie könnte bald Entscheidungen schneller und besser treffen als Menschen (2 Buchstaben) • ...
crossword puzzle 2023-01-25
Across
- an attackin whickan attacker injects malicious executable scripts into the code of a trusted application or website
- an attack that forces an end user to execute unwanted actions on a web application
- A person who hacks for political gain
- uses computer hacking to spread fear
- a cyber attack that involves executing arbitrary commands on a host operating system(OS)
- one where the number generated is extremely hard for any third party to predict what it might be
Down
- meeting customers' cybersecurity ecpectations
- using libraries, frameworks, and other software modules that run the same privilages as the application
- bug found in a web application that attackers use to manipulate the URL
- the response and recovery procedures from error conditions present in a software application
- When the volume of data exceeds the storage capacity
- attacking information for millitary purposes
- uses the social media to campaign
- deliberate destution of an item or systeam
14 Clues: uses the social media to campaign • uses computer hacking to spread fear • A person who hacks for political gain • deliberate destution of an item or systeam • attacking information for millitary purposes • meeting customers' cybersecurity ecpectations • When the volume of data exceeds the storage capacity • ...
Technology Crossword 2023-05-10
Across
- Measures designed to protect your computer.
- The number of distinct pixels that make up the display on a computer monitor.
- A wireless communications technology intended to replace cables.
- Resources and services available on the Internet
- Malicious software.
- The process of making something digital.
Down
- A point within a network that interconnects with other networks.
- A piece of programming code inserted into other programming to cause damage.
- A computer that handles requests for data, email, file transfers, and other network services from other computers.
- The most common way of connecting computers on a network with a wired connection.
- A barrier that acts as a security system to protect trusted computer systems.
- A unique resource locator.
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company.
- Technology that allows computers and other devices to communicate via a wireless signal.
14 Clues: Malicious software. • A unique resource locator. • The process of making something digital. • Measures designed to protect your computer. • Resources and services available on the Internet • A point within a network that interconnects with other networks. • A wireless communications technology intended to replace cables. • ...
Networking Fundamentals 2021-11-22
Across
- Unwanted emails sent repeatedly, often containing phishing links.
- Another name for the Internet.
- Stealing someone's data and pretending to be them.
- A collection computers and other devices connected together.
- A type of attack where multiple computers are used.
- Describes keeping data and users safe on a network.
- Type of software that is used encrypt data. Criminals then attempt to get the owner to pay up in return for access to the data.
Down
- Software designed to cause damage.
- Fooling someone into giving out personal data.
- Describes a situation where data has been accessed without permission.
- Part of the Internet that requires specialist software. Often contains illegal material.
- Part of the web that is not accessible to search engines, etc.
- a network of computers infected by malware that are under the control of a single attacking party
13 Clues: Another name for the Internet. • Software designed to cause damage. • Fooling someone into giving out personal data. • Stealing someone's data and pretending to be them. • A type of attack where multiple computers are used. • Describes keeping data and users safe on a network. • A collection computers and other devices connected together. • ...
Trick or threat : The Cybersecurity Crossword 2025-10-19
Across
- _____________ is a secret combination of numbers, letters and symbols
- _________ is the protocol for Internet safety
Down
- ___________ is the king-ware of harmful viruses
- ___________ refers to illegally downloading legal things such as movies, music, videos etc.
- __________ is an attempt to access someone's data via email
5 Clues: _________ is the protocol for Internet safety • ___________ is the king-ware of harmful viruses • __________ is an attempt to access someone's data via email • _____________ is a secret combination of numbers, letters and symbols • ___________ refers to illegally downloading legal things such as movies, music, videos etc.
English for Computer Engineering Management 2018-06-30
Across
- the unit used to measure the speed of a computer's processor
- set of rules that computers and other devices use when communicating with one another.
- designed to protect your computer
- a software program developed to do harm to other computers
- a type of email fraud in which the perpetrator sends out emails
- the brains of your computer
- the number of distinct pixels of the display for computer
Down
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections
- the maximum amount of data that can travel a communications path in a given time
- it experiences a sudden spike in popularity in a short period of time
- any type of illegal activity on your computer
- the process of converting electronic data to an unrecognizable
- unsolicited email messages sent for marketing purposes
- the reduction of the size of a file
14 Clues: the brains of your computer • designed to protect your computer • the reduction of the size of a file • any type of illegal activity on your computer • unsolicited email messages sent for marketing purposes • the number of distinct pixels of the display for computer • a software program developed to do harm to other computers • ...
The Iowa Banker Crossword 2025-02-14
Across
- The previous name of IBA’s quarterly magazine before it became The Iowa Banker.
- A major driver of change in banking operations and customer service.
- IBA’s efforts to champion and represent the interests of Iowa’s community banks.
- Shaped by those who guide and influence the future of Iowa banking.
- A key benefit of attending IBA events.
- A bank’s ability to meet cash needs.
Down
- A challenge community banks continue to face.
- Essential for protecting customer data in an increasingly digital world.
- The IBA offers schools and training to support bankers' growth.
- Technology-driven solutions transforming the banking industry.
- A critical aspect of banking operations to meet legal standards.
- Many Iowa banks prioritize supporting this through local efforts.
- The IBA’s “Money Cents” campaign was launched to help prevent this.
- The Iowa Bankers Benefit Plan helps banks provide this for bank employees.
14 Clues: A bank’s ability to meet cash needs. • A key benefit of attending IBA events. • A challenge community banks continue to face. • Technology-driven solutions transforming the banking industry. • The IBA offers schools and training to support bankers' growth. • A critical aspect of banking operations to meet legal standards. • ...
History, success and technology 2025-11-10
Across
- To make something happen, often through skill and effort.
- Relating to a king, queen, or emperor
- The ability to keep doing something difficult despite setbacks or opposition.
- The act of moving to live permanently in a foreign country.
- The belief or theory that things must happen the way they do; fate.
- A formal written agreement between countries.
- A system of interconnected computers or devices.
- An original document, object, or account from a particular time period.
- The widespread destruction and loss of life that happened during the Second World War.
Down
- A small piece of code stored on a user's computer by a website.
- The state of being protected against the criminal use of electronic data.
- An ambitious target or aim that is pursued with effort.
- Being able to do something successfully or efficiently; skill.
- The belief or theory that things must happen the way they do; fate.
- A sequence of steps or rules to be followed in calculations or problem-solving.
15 Clues: Relating to a king, queen, or emperor • A formal written agreement between countries. • A system of interconnected computers or devices. • An ambitious target or aim that is pursued with effort. • To make something happen, often through skill and effort. • The act of moving to live permanently in a foreign country. • ...
ENA Crossword: Part 2 2024-01-25
Across
- The person who had his gift repeatedly stolen at the Christmas party (5)
- A metric of energy; also a meeting room (5)
- Device that interrupts the flow of electricity when a fault is detected (7,7)
- Protection against unauthorised access to the digital infrastructure of the power grid (13)
- Essential gear for workers, including helmets, gloves, and safety glasses (3)
- First person to host the Elec/SHE thursday meeting after the reformat (5)
Down
- Number of years ENA has existed (6-3)
- One of the main component in a heat pump (10)
- Forum hosted in the office on Tuesday (5)
- The UK regulator responsible for overseeing electricity markets (5)
- Third named storm to hit the UK this year (7)
- CEO of Northern Power Grid, first name (6)
12 Clues: Number of years ENA has existed (6-3) • Forum hosted in the office on Tuesday (5) • CEO of Northern Power Grid, first name (6) • A metric of energy; also a meeting room (5) • One of the main component in a heat pump (10) • Third named storm to hit the UK this year (7) • The UK regulator responsible for overseeing electricity markets (5) • ...
Computer Science Crossword 2024-03-19
Across
- Protecting computers and networks from theft or damage.
- Wireless local area network that uses radio waves to connect devices to the internet.
- An icon or figure representing a person in video games, forums, etc.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- The ability to read and write.
- A secret word or phrase that must be used to gain admission to something.
- A computer program designed to simulate conversation with human users.
Down
- The programs and other operating information used by a computer.
- Facts and statistics collected for reference or analysis.
- A system of numerical notation that has 2 rather than 10 as a base.
- The action or practice of playing video games.
- A program or piece of software designed to fulfill a particular purpose.
- The physical parts of a computer system.
- A step-by-step procedure for calculations.
14 Clues: The ability to read and write. • The physical parts of a computer system. • A step-by-step procedure for calculations. • The action or practice of playing video games. • Protecting computers and networks from theft or damage. • Facts and statistics collected for reference or analysis. • The programs and other operating information used by a computer. • ...
Vocbulary - compound nouns in IT industry 2024-09-11
Across
- A copy of data stored separately to protect against loss.
- The process of transferring data from a remote system to a local one.
- A security system that controls incoming and outgoing network traffic
- A device used to input text and commands into a computer.
- A unique identifier used to log into a system or account.
- The protection of computer systems and networks from attacks.
- The physical components of a computer system, like the CPU, monitor, and keyboard.
- A group of connected computers and devices that share resources.
Down
- The process of transferring data from a local system to a remote one.
- A secret word or phrase used to access a system or account.
- The main page of a website that users first see.
- Programs and applications that run on computers and devices.
- A collection of related web pages accessed via the internet.
- A structured collection of data stored electronically
14 Clues: The main page of a website that users first see. • A structured collection of data stored electronically • A copy of data stored separately to protect against loss. • A device used to input text and commands into a computer. • A unique identifier used to log into a system or account. • A secret word or phrase used to access a system or account. • ...
The Iowa Banker Crossword 2025-02-18
Across
- The IBA’s “Money Cents” campaign was launched to help prevent this.
- A major driver of change in banking operations and customer service.
- A word used to describe the wave of regulations impacting banks.
- Many Iowa banks prioritize supporting this through local efforts.
- The Iowa Bankers Benefit Plan helps banks provide this for bank employees.
- A key benefit of attending IBA events.
Down
- IBA’s efforts to champion and represent the interests of Iowa’s community banks.
- A bank’s ability to meet cash needs.
- A challenge community banks continue to face.
- Technology-driven solutions transforming the banking industry.
- Essential for protecting customer data in an increasingly digital world.
- A critical aspect of banking operations to meet legal standards.
- Shaped by those who guide and influence the future of Iowa banking.
- The previous name of IBA’s quarterly magazine before it became The Iowa Banker.
14 Clues: A bank’s ability to meet cash needs. • A key benefit of attending IBA events. • A challenge community banks continue to face. • Technology-driven solutions transforming the banking industry. • A critical aspect of banking operations to meet legal standards. • A word used to describe the wave of regulations impacting banks. • ...
SuperPower Resources 2025-05-29
Across
- Raw facts and numbers collected and used to make decisions.
- Secret information or spying, used to know what rivals are doing.
- Legal ownership of things, including ideas or inventions (like patents).
- Tools and systems made using science, like computers or advanced robots.
- A country's army, navy, and air force, used for protection.
- Energy that comes from sources that won't run out, like sun or wind.
Down
- The smarts, skills, and hard work that a country's people provide.
- Workers with special training for specific jobs, like engineers or doctors.
- Agreements between countries to work together and support each other.
- The power that makes things work, move, or light up.
- Special metals used in phones, computers, and electric cars.
- A dark, thick liquid dug from the ground, used for fuel and making plastics.
- Protecting computer systems and information from online attacks.
- The power to change how others think or act without force.
14 Clues: The power that makes things work, move, or light up. • The power to change how others think or act without force. • Raw facts and numbers collected and used to make decisions. • A country's army, navy, and air force, used for protection. • Special metals used in phones, computers, and electric cars. • ...
Cybersecurity Awareness Month Week 3 2025-10-20
Across
- MFA can be used in many forms, one of them is a _____
- apart from your ______, you should also turn on MFA to better protect yourself
- MFA is a way to confirm your ______ to the site and apps
- most companies and organizations ________ their employees to have MFA enabled in order to better protect sensitive information
- you have information _______ in mind if you enable MFA on your accounts
- you are the ______ of an attack when you receive a phishing email
- if you dont turn on MFA, you may run the risk of bad actors gaining ______ access to your accounts
- you should _____ clicking on links that look weird and are coming from an unknown source
- if you don't use MFA your account can be _____
Down
- MFA adds an extra layer of _______ to your logins
- it should be your personal _____ to use MFA whenever possible
- MFA can be used to log in to a ______
- if you are in a public wifi, your internet traffic can be _______
- you should take ______ when receiving emails from unknown senders
- another method of MFA has to do with "something you are," a ______ scan
15 Clues: MFA can be used to log in to a ______ • if you don't use MFA your account can be _____ • MFA adds an extra layer of _______ to your logins • MFA can be used in many forms, one of them is a _____ • MFA is a way to confirm your ______ to the site and apps • it should be your personal _____ to use MFA whenever possible • ...
Set B 2023-01-29
Across
- We must be _____ when helping new citizens integrate into our society.
- I show my support to family members who are in the military by _____ them.
- Be a _____ Singaporean.
- Learning life-saving skills such as CPR prepares you to help others in an _____.
- Regardless of age, we must continue to love _____ and acquire new skills for adaptability.
- It is important to practice good _____ habits such as ignoring emails and attachements from unknown sources.
Down
- Regardless of race, language or religion, we can have fun together as one _____.
- Stay vigilant against public threats and report _____ people and activities to the authorities.
- We thank and show our _____ to soldiers who defend Singapore.
- Following water and electricity saving tips to _____ resources.
- The Singapore Armed Forces is a strong and well-respected _____ force.
- _____ saves lives.
12 Clues: _____ saves lives. • Be a _____ Singaporean. • We thank and show our _____ to soldiers who defend Singapore. • Following water and electricity saving tips to _____ resources. • We must be _____ when helping new citizens integrate into our society. • The Singapore Armed Forces is a strong and well-respected _____ force. • ...
Technologia 2025-09-08
Across
- A set of rules or steps for solving a problem or performing a task.
- An organized collection of information stored electronically.
- The way a user communicates with a computer, device, or program.
- The programs and operating information used by a computer.
- Measures taken to protect computers and networks from attacks.
- The science of building and using extremely small devices or materials.
- The process of creating new ideas, methods, or devices.
Down
- The physical parts of a computer or electronic device.
- Something created by humans, not occurring naturally (often used with "intelligence").
- The act of converting information into a secret code to protect it.
- The use of machines or technology to perform tasks with little human input.
- The amount of data that can be transmitted over an internet connection.
12 Clues: The physical parts of a computer or electronic device. • The process of creating new ideas, methods, or devices. • The programs and operating information used by a computer. • An organized collection of information stored electronically. • Measures taken to protect computers and networks from attacks. • ...
tech 2023-10-04
Across
- The evaluation or appraisal of someone or something.
- The practice of analyzing and interpreting complex data sets to inform decision-making.
- Services or strategies for finding and hiring suitable employees.
Down
- Measures taken to protect computer systems, networks, and data from cyber threats.
- The practice of recruiting highly skilled individuals for specialized positions.
- The process of integrating a new employee into a company.
6 Clues: The evaluation or appraisal of someone or something. • The process of integrating a new employee into a company. • Services or strategies for finding and hiring suitable employees. • The practice of recruiting highly skilled individuals for specialized positions. • Measures taken to protect computer systems, networks, and data from cyber threats. • ...
Crossword 4 2023-09-04
Across
- An action taken to withdraw/remove a product or system from distribution
- A fraudulent imitation of something.
- A process of increasing the knowledge and skills of an employee for doing a particular job.
Down
- the practice of protecting systems, networks, and programs from digital attacks.
- Anything that permitted by law.
- A practice to ensure that products are stored and handled under sanitary conditions.
6 Clues: Anything that permitted by law. • A fraudulent imitation of something. • An action taken to withdraw/remove a product or system from distribution • the practice of protecting systems, networks, and programs from digital attacks. • A practice to ensure that products are stored and handled under sanitary conditions. • ...
Risk Awareness! 2024-08-21
Across
- Type of risk related to cybersecurity attacks like clicking on malicious links
- Responsible for owning and managing risks
- One of the functions of the second line, starts with "o"
- The act of trying to get you to click on a malicious link
Down
- Type of risk that remains even after risk management
- Last step of the risk management process
- This obligation of the PDPA states that personal data we collect should be accurate and complete
- Provides independent assurance and advisory services on risk controls
- What happens if you do click on a malicious link and a hacker gets access to stored personal data
- Type of risk control that monitors for risks
10 Clues: Last step of the risk management process • Responsible for owning and managing risks • Type of risk control that monitors for risks • Type of risk that remains even after risk management • One of the functions of the second line, starts with "o" • The act of trying to get you to click on a malicious link • ...
TECH ADVANCEMENT - PART 2 - ARTICLE 1A - L1 2023-02-16
Across
- To criticize or belittle someone or something.
- The origin or mode of formation of something.
- The final resolution of a complex plot in a story, often involving the unraveling of secrets and the tying up of loose ends.
- Changes or variations in a quantity or value over time.
- Digital or virtual tokens that use cryptography to secure and verify transactions and to control the creation of new units.
Down
- The process of creating a systematic and organized approach to a particular task or field.
- The practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- To provoke or oppose someone or something.
- Lacking in seriousness or importance.
- Present, appearing, or found everywhere.
10 Clues: Lacking in seriousness or importance. • Present, appearing, or found everywhere. • To provoke or oppose someone or something. • The origin or mode of formation of something. • To criticize or belittle someone or something. • Changes or variations in a quantity or value over time. • ...
Technology Laws 2025-02-21
Across
- The right to keep personal information confidential.
- Protecting computers and data from attacks.
- Breach An event where unauthorized access to confidential data happens, often exposing personal information.
- A legal document that outlines the terms for using a service, requiring users to agree before accessing it.
- The data trail left while using the internet, including websites visited and information shared.
Down
- Following rules or meeting established guidelines.
- Creations of the mind, like inventions and artistic works.
- Permission for something to happen, especially regarding personal data collection.
- A rule made by an authority to control behavior.
- A set of rules or instructions for a computer to perform tasks, often used to decide what content users see online.
10 Clues: Protecting computers and data from attacks. • A rule made by an authority to control behavior. • Following rules or meeting established guidelines. • The right to keep personal information confidential. • Creations of the mind, like inventions and artistic works. • Permission for something to happen, especially regarding personal data collection. • ...
QuizSurp2 2025-01-04
Across
- BlackBerry's reliance on its legacy products reflected a lack of strategic _______
- The failure to adapt to touchscreens showed BlackBerry's weak alignment with _______ market trends
- The shift from smartphones to software was part of BlackBerry's strategy to _______ its focus
- Secure messaging and privacy were part of BlackBerry's _______ proposition
Down
- BlackBerry's initial _______ was to create innovative devices for secure communication
- BlackBerry’s transition to software emphasized the need for strategic _______ in resource allocation
- The rise of iPhone demonstrated the dynamic nature of _______ competition
- External analysis involves frameworks like PESTEL, which examines _______ factors impacting businesses
- BlackBerry initially gained a competitive _______ by offering advanced cybersecurity and secure messaging
- BlackBerry's inability to compete with Apple and Android highlighted the importance of _______ in industry analysis
10 Clues: The rise of iPhone demonstrated the dynamic nature of _______ competition • Secure messaging and privacy were part of BlackBerry's _______ proposition • BlackBerry's reliance on its legacy products reflected a lack of strategic _______ • BlackBerry's initial _______ was to create innovative devices for secure communication • ...
May 2025 2025-04-27
Across
- A teen show that exaggerates teen life and revolves around the death of a classmate in a small town.
- amount of students attending speech and debate nationals.
- petting a dog releases this type of hormone.
Down
- The TPS cybersecurity team won this competition in their first year competing.
- Chess player who inspired "The Queens Gambit"
- type of bat that has become very controversial in the world of baseball.
- America has too many gosh darn ______
7 Clues: America has too many gosh darn ______ • petting a dog releases this type of hormone. • Chess player who inspired "The Queens Gambit" • amount of students attending speech and debate nationals. • type of bat that has become very controversial in the world of baseball. • The TPS cybersecurity team won this competition in their first year competing. • ...
Week 1 Cybersecurity Know-How Challenge 2023-09-26
4 Clues: What does HIPPA protect? • National Cybersecurity Awareness Month • Health Insurance Portability and Accountability Act • Web Browsing Safety Tip 1: _ _ with the websites you visit..
ISSO June 2021 2021-06-07
Across
- IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
- The physical separation or isolation of a system from other systems or networks is known as an __ __.
- A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
- A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
- IRM office responsable for Cyber Operations oversight.
- ____ is the only thumb drive authorized on Department of State Automated Information Systems.
- vulnerabilities must be remediated within ___calendar days of initial detection.
- The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
- this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
- The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
- is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
- The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
- A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
- Criminal organization responsable for the cyber attack against the Colonial Pipeline.
- A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
- computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
- ISSO duties must be performed using an ISSO ___ account.
- The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
- of ___ is an attack that prevents or impairs the authorized use of information system resources or services.
19 Clues: IRM office responsable for Cyber Operations oversight. • ISSO duties must be performed using an ISSO ___ account. • vulnerabilities must be remediated within ___calendar days of initial detection. • Criminal organization responsable for the cyber attack against the Colonial Pipeline. • ...
Computer fundamentals 2025-05-23
Across
- Machines that mimic human intelligence to perform tasks.
- This company is known for electric cars and autonomous driving innovations.
- Virtual space where people interact using digital avatars.
- Security field that protects networks from hackers.
- A search engine developed by Microsoft.
- A cloud storage service provided by Google.
- Type of file format commonly used for storing high-quality images.
- Wearable device used for fitness tracking and health monitoring.
- This programming language is widely used for AI development and is known for its simplicity.
- A virtual assistant developed by Apple.
- Fifth-generation mobile network technology faster than 4G.
Down
- This type of digital currency operates on blockchain technology.
- A software application designed to mimic human conversation and assist users online.
- The process of transmitting data wirelessly over a network.
- A social media platform known for short 280-character posts.
- Short videos popular on Instagram and YouTube.
- A mobile operating system widely used in smartphones, developed by Google.
- Technology that immerses users in simulated environments through headsets.
- The study of designing systems that allow computers to learn without being explicitly programmed.
19 Clues: A search engine developed by Microsoft. • A virtual assistant developed by Apple. • A cloud storage service provided by Google. • Short videos popular on Instagram and YouTube. • Security field that protects networks from hackers. • Machines that mimic human intelligence to perform tasks. • Virtual space where people interact using digital avatars. • ...
TIK 2025-11-05
Across
- kejahatan siber yang mengarahkan pengguna ke situs web palsu untuk mencuri informasi pribadi
- Teknik penipuan lewat email, telpon atau pesan teks menyamar dari lembaga sah untuk mencuri informasi pribadi.
- Perangkat lunak yang memata-matai aktivitas pengguna dan mengumpulkan data tanpa izin.
- banyaknya usaha untuk meretas, muncul otentikasi dengan metode lain yaitu otentikasi ...
- mengenkripsi file korban dan meminta tebusan untuk mengembalikannya
- catatan harian berupa video
- Jenis aplikasi pengolah berupa poin utama dokumen
- Contoh aplikasi membuat laporan perhitungan keuangan
- Jenis aplikasi membuat laporan yang banyak mengandung Teks
Down
- Catatan harian di internet
- mengubah data asli menjadi bentuk kode agar tidak dapat dibaca oleh pihak yang tidak berwenang.
- Verifikasi identitas berdasarkan ciri fisik atau perilaku seseorang
- keamanan informasi di internet
- Perangkat lunak yang membantu membantu pengguna melindungi peranti dan file dari gangguan virus
- Aktivitas membobol sistem komputer, menyebar virus komputer untuk mencuri data pribadi
- Contoh aplikasi membuat blog yang kalian gunakan saat praktik di labor
- Program jahat menempel pada perangkat lain, menghapus dan menyembuyikan file
- Layanan yang dapat digunakan untuk mempublikasi vlog
- Setelah melakukan perekaman video, hal selanjutnya dilakukan
19 Clues: Catatan harian di internet • catatan harian berupa video • keamanan informasi di internet • Jenis aplikasi pengolah berupa poin utama dokumen • Layanan yang dapat digunakan untuk mempublikasi vlog • Contoh aplikasi membuat laporan perhitungan keuangan • Jenis aplikasi membuat laporan yang banyak mengandung Teks • ...
Defend the Money: Cybersecurity in Finance 2025-09-24
Across
- ______ attack: flooding financial systems to halt services (3)
- International body combatting money laundering — abbr. (4)
- Finance staff are vulnerable due to high ______ to process payments quickly(6)
- Compliance requirement: "Know Your Customer" (3)
- Fraudulent CEO email scam to trick finance into urgent transfers (2 words) (8)
- Criminals hide illicit funds via digital or shell accounts (12)
- Fraud involving stolen credit card data (7)
- Fake websites that mimic bank login portals (8)
- Attack technique: secretly changing account details on vendor invoices (3 words)(23)
Down
- Fraudulent billing scheme tricking Accounts Payable(2 words) (12)
- Banking network messaging system — attackers have hacked it before (9)
- Cybercriminals often attempt to divert these electronic payments (11)
- Federal regulator often mentioned in financial cybersecurity compliance (abbr., 3)
- Targeted spear-phishing at executives, often CFOs (7)
- Malware disguised as something harmless, used to steal banking credentials(2 words) (11)
- Attack where hackers encrypt financial records and demand crypto payment (10)
16 Clues: Fraud involving stolen credit card data (7) • Fake websites that mimic bank login portals (8) • Compliance requirement: "Know Your Customer" (3) • Targeted spear-phishing at executives, often CFOs (7) • International body combatting money laundering — abbr. (4) • ______ attack: flooding financial systems to halt services (3) • ...
IOT competetion 2024-03-19
Across
- cybersecurity strategy that approves a list of email address ip address on domain names
- the technology which is used to identify the object by scanning
- country which has more electronis and aslo gained title of world's factory.
- local area computer network.
Down
- any devices use directly by an end user to communicate.
- an american multinational digital communication technology that develops networking hardware and software
- it is used to mobile control internet of things that covers 3GGP standardised low power wide area
7 Clues: local area computer network. • any devices use directly by an end user to communicate. • the technology which is used to identify the object by scanning • country which has more electronis and aslo gained title of world's factory. • cybersecurity strategy that approves a list of email address ip address on domain names • ...
Task 7 2025-08-07
Across
- A digital delivery service for software.
- A system which is used to detect threats from specific endpoints.
- Tool used for identifying and addressing vulnerabilities.
- Cloud computing that spreads data across multiple locations.
- Concept that everything can be automated.
- Technology that is made to not affect the environment.
- A system of several tools to enhance cyber security.
- Strategies, methods and technologies used to analyse business information.
- Insurance which is designed to cover legal costs and expenses from cyber attacks.
Down
- Computer program that learns and produces outputs.
- Multi step login process that uses something other than a login.
- A term refering to VR, AR
- Practice and technology to ensure security.
- A digital vr world made by Meta.
- An experience with one app from different points.
- A computer that uses quantum mechanics to work.
16 Clues: A term refering to VR, AR • A digital vr world made by Meta. • A digital delivery service for software. • Concept that everything can be automated. • Practice and technology to ensure security. • A computer that uses quantum mechanics to work. • An experience with one app from different points. • Computer program that learns and produces outputs. • ...
Unit 5 Crossword 2025-04-28
Across
- Running AI models locally on devices like smartphones without needing cloud access.
- AI that can create new content like images, music, or text.
- Python’s basic plotting library used for creating static, animated, and interactive visualizations.
- Google's AI framework known for deep learning and end-to-end machine learning workflows.
- Technology that converts spoken language into text.
- Open-source library used for computer vision tasks like face detection and image processing.
- Identifying human faces in digital images or video streams.
- Meta’s (Facebook's) flexible and dynamic deep learning library.
- Using a pre-trained AI model for a new but similar task.
Down
- Protection of systems and networks from digital attacks.
- Machine learning type where an agent learns by reward and punishment.
- Python library for making attractive and informative statistical graphics.
- Subfield of machine learning involving neural networks with many layers.
13 Clues: Technology that converts spoken language into text. • Protection of systems and networks from digital attacks. • Using a pre-trained AI model for a new but similar task. • AI that can create new content like images, music, or text. • Identifying human faces in digital images or video streams. • Meta’s (Facebook's) flexible and dynamic deep learning library. • ...
ITA EXAMPLE WORDSEARCH 2025-05-21
Across
- a popular ai chatbot that can answer questions
- any confirmed event that compromises the integrity, confidentiality, or availability of information
- flood-type attack that knocks a site offline by overwhelming it
- malware that encrypts files and demands payment for the key
- fake emails that lure you into clicking malicious links or downloading malicious files
- a secret string of characters that proves your identity when logging in
Down
- replacing a person's face or voice in a video with synthetic version or manipulation their expressions
- the practice of defending computer, network, and data from unauthorized access
- a person who breaks into system, usually maliciously
- a scam delivered via SMS text message
- QR code based phishing
- a network barrier that blocks out unwanted traffic
- two or more step login method used with a password to better secure an account
13 Clues: QR code based phishing • a scam delivered via SMS text message • a popular ai chatbot that can answer questions • a network barrier that blocks out unwanted traffic • a person who breaks into system, usually maliciously • malware that encrypts files and demands payment for the key • flood-type attack that knocks a site offline by overwhelming it • ...
HD January Crossword Puzzle 2025-12-02
Across
- Adhering to laws, regulations, and standards in IT practices.
- A software update that fixes vulnerabilities or bugs.
- Updating systems and processes to keep pace with technology.
- The time a system is operational and available.
- Software designed to disrupt or damage computer systems.
- The foundation of a strong relationship between businesses and their IT provider. Part of the "_____ Yet Verify" methodology.
- An unauthorized intrusion into a computer system.
- The day HD Tech releases their patches.
- The period when systems are unavailable or not functioning.
Down
- The ability of a system to handle growth without performance issues.
- A technology that delivers computing services over the internet.
- The practice of protecting systems and data from digital threats.
- A network security system that monitors and controls incoming and outgoing traffic.
- A copy of data stored separately to prevent loss.
- A method of converting data into a secure code to prevent unauthorized access.
- A cyberattack that tricks users into revealing sensitive information.
16 Clues: The day HD Tech releases their patches. • The time a system is operational and available. • A copy of data stored separately to prevent loss. • An unauthorized intrusion into a computer system. • A software update that fixes vulnerabilities or bugs. • Software designed to disrupt or damage computer systems. • ...
Military Careers 2025-12-05
Across
- The organized movement of troops and resources to a mission location.
- Designing, building, and repairing structures or systems (e.g., runways, bridges).
- The planning and movement of supplies, equipment, and personnel.
- A technician who repairs and maintains vehicles and equipment.
- Instruction and exercises that develop skills, certifications, and readiness.
- Leadership structure responsible for decision-making and orders.
- Hub A central location where supplies and equipment are stored and distributed.
- Military roles related to aircraft operations, maintenance, and support.
- Pertaining to military operations at sea and related career roles.
- Support Roles that provide essential services enabling combat operations (e.g., engineering, medical, logistics).
- Protecting computer systems and networks from attacks.
- The process of returning troops and equipment home after a mission.
Down
- Systems and personnel who transmit information and coordinate operations.
- Collecting and analyzing information to support missions and decisions.
- Specialist A role focused on supply chain, transportation, and inventory management.
- — Medical personnel who treat injured service members.
- The act of gathering information about enemy positions or terrain.
- People who have served in the military.
- Soldiers trained to fight on foot.
- Operations On-site activities and tasks carried out during missions or training.
20 Clues: Soldiers trained to fight on foot. • People who have served in the military. • — Medical personnel who treat injured service members. • Protecting computer systems and networks from attacks. • A technician who repairs and maintains vehicles and equipment. • The planning and movement of supplies, equipment, and personnel. • ...
IT-OT Gap 2022-11-16
Across
- Susceptible to physical or cyber attacks or harm
- When a system has been compromised over the web or network
- This controls the logic of a process and runs the program
- The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss
- Two or more individuals or groups working together to accomplish a goal
- This is how Technicians interact with a process
Down
- Another term for outdated, like processes equipment in many industrial plants
- Person tasked to handle implementing, maintaining, and repairing computer networks.
- Unwilling or hesitant. Like OT is to accept change
- The act of being ready
- Unique number used to identify a computer or component on a network
- Should be unique and hard to guess
- Person in charge of others at a plant or facility
- The practice of employing people, policies, processes and technology to protect organizations
14 Clues: The act of being ready • Should be unique and hard to guess • This is how Technicians interact with a process • Susceptible to physical or cyber attacks or harm • Person in charge of others at a plant or facility • Unwilling or hesitant. Like OT is to accept change • This controls the logic of a process and runs the program • ...
Kejahatan di Dunia Digital 2025-11-05
Across
- keamanan informasi di internet
- karakteristik biologis yang unik bagi seorang individu
- software yang mampu mendapatkan akses ke sistem komputer melewati security normal
- kegiatan yang dilakukan untuk memastikan dan mengonfirmasibahwa suatu objek itu asli
- kejahatan di dunia maya yang biasanya targetbdihubungi melalui surel,telepon atau pesan teksoleh seseorangbyangbmenyamar dari lembaga yang sah
- malware yang dapat memantau dan merekam aktivitas pengguna di komputer atau perangkat seluler
- perangkat lunak yang menempel pada perangkat lunak lain
Down
- sekelompok komputer yang memiliki virus atau malware yang dikendalikan oleh peretas melalui server pusat
- malware yang tampak seperti perangkat lunak jinak tetapi membawa komponen yang jahatbdi dalamnya
- malware yang mengeksploitasi kelemahan sistem tertentu
- suatu metode yang mengkodekan data sebelum dikirim melalui jaringan komputer
- malware yang mampu mengenkripsi file di komputer atau perangkat seluler dan menuntut pembayaran untuk mendekripsi file
- anti-malware
- usaha untuk memikat pengguna internet untuk masuk ke situs web palsu
14 Clues: anti-malware • keamanan informasi di internet • malware yang mengeksploitasi kelemahan sistem tertentu • karakteristik biologis yang unik bagi seorang individu • perangkat lunak yang menempel pada perangkat lunak lain • usaha untuk memikat pengguna internet untuk masuk ke situs web palsu • suatu metode yang mengkodekan data sebelum dikirim melalui jaringan komputer • ...
Recruitment Trends in 2023 2022-12-22
Across
- Working together with one or more people to complete a project or task or develop ideas or processes
- The range of similarities and differences each individual brings to the workplace
- Doing your job from any location
- Pay that is comparable or better than the market value of a position
- A focus on employee well-being
Down
- Protecting businesses' sensitive employee and personal data
- The organizational goal of keeping productive and talented workers and reducing turnover by developing a positive work environment
- Hiring temporary staff to work for a specific project or for a specified length of time
- A workplace model that mixes in-office and remote work
- A pool of candidates ready to fill a position
- A workplace where everyone feels equally involved and supported
- Shared values and goals of an organization
12 Clues: A focus on employee well-being • Doing your job from any location • Shared values and goals of an organization • A pool of candidates ready to fill a position • A workplace model that mixes in-office and remote work • Protecting businesses' sensitive employee and personal data • A workplace where everyone feels equally involved and supported • ...
Chapter 2 - Cybersecurity Threat Landscape 2025-09-03
Across
- ethical hacker motivated by desire to expose vulnerabilities and improve security
- the means that threat actors use to obtain access
- often the perpetrators of advanced persistent threats (APTs)
- unskilled attacker who uses hacking techniques but has limited skills
- threat intelligence gathered from publicly available sources
Down
- occurs when an employee, contractor, vendor, or other individuals with authorized access to information and systems
- attacks that exploit a previously unknown vulnerability
- seek to extort money or other concessions from victims by threatening to release sensitive information or launch further attacks
- motivated by the desire to obtain sensitive or proprietary information
- the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
- motive is simply illegal financial gain
- uses hacking techniques to accomplish some activist goal
12 Clues: motive is simply illegal financial gain • the means that threat actors use to obtain access • attacks that exploit a previously unknown vulnerability • uses hacking techniques to accomplish some activist goal • often the perpetrators of advanced persistent threats (APTs) • threat intelligence gathered from publicly available sources • ...
Software 2025-10-30
Across
- Algorithm that rearranges a collection of elements in an ascending or descending order.
- To divide and manage hardware resources.
- Allows one physical machine to run multiple OS at once.
- The practice of protecting systems, networks, and programs from digital attacks.
- Focuses on how a product looks and how users experience it.
- A language for accessing and managing database data.
Down
- A collection of code and instructions that direct computer operations.
- A global communication system that links together thousands of individual networks.
- Software that runs on a device to carry out user-defined functions.
- Central software that manages both a computer’s hardware and software.
- A theory on how much resource an algorithm takes as the input size grows larger.
- An attack where hackers run harmful scripts in a trusted website’s pages.
12 Clues: To divide and manage hardware resources. • A language for accessing and managing database data. • Allows one physical machine to run multiple OS at once. • Focuses on how a product looks and how users experience it. • Software that runs on a device to carry out user-defined functions. • A collection of code and instructions that direct computer operations. • ...
C.A.G.E. File 1 2020-05-07
Across
- In order to stay safe ________, be sure to only go to websites you trust.
- ________security has to do with online safety.
- To be a C.A.G.E. secret ____________ you must work hard and fight for good!
Down
- A _____ tester is an important cybersecurity job. It is also called a penetration tester.
- Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
- Microchip is the C.A.G.E. helper ___________.
- Agent X also goes by the name __________.
- A hacker might try to gain access to your computer by sending a bad link in an __________.
8 Clues: Agent X also goes by the name __________. • Microchip is the C.A.G.E. helper ___________. • ________security has to do with online safety. • In order to stay safe ________, be sure to only go to websites you trust. • To be a C.A.G.E. secret ____________ you must work hard and fight for good! • ...
STRENGTHENING MEDIA LITERACY CROSSPUZZLE 2021-05-03
Across
- short text type used to communicate
- an electronic communication network that allows computer networks to connect to each other
- video and voice speech application
- Information technology security or electronic information security
Down
- it is the common name given to traditional and next-generation communication tools that provide one-way or interactive communication.
- A form of promotion and sharing shaped by graphic design and software languages hosted on the Internet network
- voice communication tool
- a person who provides access to systems that exploit vulnerabilities of electronic-based systems or accounts on the Internet
8 Clues: voice communication tool • video and voice speech application • short text type used to communicate • Information technology security or electronic information security • an electronic communication network that allows computer networks to connect to each other • ...
Test 2025-01-27
Across
- What type of algorithm does my blockchain project use?
- What Python framework did I use to write my web financial planner app?
- Outside of coding I enjoy playing __________ and video game with friends.
- What is my github username?
Down
- What is the name of the top down shooter game that I made in C# and Unity?
- What website am I using to learn cybersecurity and do ctf's right now?
- In the future I want to learn more about ethical hacking and _______ computing.
- What company did I do my high school co-op with?
8 Clues: What is my github username? • What company did I do my high school co-op with? • What type of algorithm does my blockchain project use? • What website am I using to learn cybersecurity and do ctf's right now? • What Python framework did I use to write my web financial planner app? • Outside of coding I enjoy playing __________ and video game with friends. • ...
DELOITTE MASTERCLASS ON CYBERSECURITY & BCMS 2025-04-05
Across
- Is a security practice that involves several steps, all of which are meant to proactively prevent bad actors from taking advantage of IT vulnerabilities
- A software that hackers use to gain access to your system and capture sensitive information.
- A type of testing which a discussion-based exercise where participants respond to a hypothetical situation
- The B in BETH3 concept means
- A holistic management process that identifies disruptive threats and their impact on the organization's operations.
- A type of testing which a discussion-based exercise where the participants review the BCP and verify it for correctness and practicality
- The E in BETH3 concept means
Down
- A two-page document containing the organization's objectives for establishing a BCMS and the signatures of the key leaders supporting the initiative
- A type of testing which a simulation exercise usually involving multiple departments (rehearsals)
- A critical component of a BCMS because it helps an organization figure out how effective its BCMS is
- The T in BETH3 concept means
- A type of testing which an exercise where participants actually implement recovery action (e.g., move to alternate site, use backup systems, etc.)
- A type of phishing attacks ehich uses SMS messages or notifications to target people
- Is a cybercrime in which a target or targets are contacted by e-mail, telephone, or text message by someone posing as a legitimate institution to lure them into providing sensitive data
- A type of phishing attacks which a mash-up of 'Voice' and 'Phishing', refers to phishing done over phone calls
15 Clues: The T in BETH3 concept means • The B in BETH3 concept means • The E in BETH3 concept means • A type of phishing attacks ehich uses SMS messages or notifications to target people • A software that hackers use to gain access to your system and capture sensitive information. • ...
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
find your career? 2023-10-16
Across
- AI jobs chatgpt,8. Genetic engineering study,9. Data broker money
- Programmer comp,5. Cybersecurity sec,6. Content creator insta
- Healthcare health,2. Networking work,3. Geneticist doc
Down
- Big data engineer data sceince,14. Web developer develop
- Psychology mind,11. Entrepreneur business,12. Digital marketer markeiing
5 Clues: Big data engineer data sceince,14. Web developer develop • Healthcare health,2. Networking work,3. Geneticist doc • Programmer comp,5. Cybersecurity sec,6. Content creator insta • AI jobs chatgpt,8. Genetic engineering study,9. Data broker money • Psychology mind,11. Entrepreneur business,12. Digital marketer markeiing
QUIZ 2024-12-10
Across
- Protects systems,networks,and data from unauthorized access and attacks
- Represents information stored digitally and needs protection from breaches
Down
- A person who gains unauthorized access to systems or data
- A secret mix of letters, numbers, and symbols used to secure accounts
- A potential danger to systems
5 Clues: A potential danger to systems • A person who gains unauthorized access to systems or data • A secret mix of letters, numbers, and symbols used to secure accounts • Protects systems,networks,and data from unauthorized access and attacks • Represents information stored digitally and needs protection from breaches
Intro to Law, Public service, and safety 2021-12-20
Across
- criminal activities that are run by groups and are carried on a large scale
- provides protection against threats to a users privacy and security
- the level that sheriff departments are on
Down
- security provided by a person, other than a public service, to protect or guard people
- the study around the nature of fire
- 12 people sworn to give a verdict in a legal case
- protects and defends the united states against foreign intelligence and enforce the criminal laws in the US
- to ask a higher court to review a decision by a judge
- taking someone's property unlawfully and by force
- the criminal act of deliberately setting fire to property
10 Clues: the study around the nature of fire • the level that sheriff departments are on • 12 people sworn to give a verdict in a legal case • taking someone's property unlawfully and by force • to ask a higher court to review a decision by a judge • the criminal act of deliberately setting fire to property • ...
Tech 2023-06-07
Across
- is a mobile operating system
- is a mapping from some domain
- is a method of representing data in a visual, machine-readable form.
- is the protection of computer systems and networks from attack by malicious actors
Down
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- is the world's largest technology company by revenue
- is a collection of discrete values
- represents text, computer processor instructions, or any other data using a two-symbol system.
- is the most important processor in a given computer.
- is a hardware or software component that stores data
10 Clues: is a mobile operating system • is a mapping from some domain • is a collection of discrete values • is the world's largest technology company by revenue • is the most important processor in a given computer. • is a hardware or software component that stores data • is a method of representing data in a visual, machine-readable form. • ...
AI 2025-03-06
Across
- Extremely large datasets used to train AI systems and improve their decision-making.
- The tendency of an AI system to produce unfair outcomes due to flaws in data or algorithms
- AI-generated media, such as videos or images, that convincingly mimic real people or events
- The programs and applications that run on a computer
- Moral principles that govern a person’s behaviour or the conducting of an activity.
Down
- The physical parts of a computer
- Able to operate independently without human control
- A collection of information used to train AI systems
- The process of converting data into a code for security
- The protection of AI systems and networks from hacking and malicious attacks
10 Clues: The physical parts of a computer • Able to operate independently without human control • A collection of information used to train AI systems • The programs and applications that run on a computer • The process of converting data into a code for security • The protection of AI systems and networks from hacking and malicious attacks • ...
BRA PUZZLE 2025-05-30
Across
- the state of being protected against the criminal or unauthorized use of electronic data
- the potential for any event or circumstance to hinder the achievement of any set goal/target.
- the ability of individuals to control access to their personal information and to be free from interference or intrusion.
- being honest and consistently upholding strong moral and ethical principles.
- being responsible for your actions and their consequences.
Down
- to look over or check for possible errors or omissions
- one of the 4 pillars of a tax administration
- the practice of keeping information private
- principles or standards of behavior
- Control activity that prevents, corrects or detects errors to mitigate or lessen risks
10 Clues: principles or standards of behavior • the practice of keeping information private • one of the 4 pillars of a tax administration • to look over or check for possible errors or omissions • being responsible for your actions and their consequences. • being honest and consistently upholding strong moral and ethical principles. • ...
Technology 2025-03-27
Across
- The machines and programs we use to make our lives easier (5 letters)
- The positive change technology brings to how we live (10 letters)
- A system that allows data to be stored and accessed online (5 letters)
- The harm caused by too much e-waste and pollution (10 letters)
- This connects people through the internet (10 letters)
- The feeling of being attached to your devices and not wanting to disconnect (8 letters)
Down
- Technology used for entertainment, like games and movies (7 letters)
- Technology that helps protect people's personal information (12 letters)
- Technology used to make tasks faster and more efficient (7 letters)
- The feeling of being alone due to too much screen time (9 letters)
- The use of robots to do jobs (9 letters)
11 Clues: The use of robots to do jobs (9 letters) • This connects people through the internet (10 letters) • The harm caused by too much e-waste and pollution (10 letters) • The positive change technology brings to how we live (10 letters) • The feeling of being alone due to too much screen time (9 letters) • ...
CIS 178 Participation Cybersecurity Joseph Certuche 2023-07-13
Across
- short for malicious
- act of listening in
- duplicate copy of data
- to describe any fraudulent business
- screen out hackers, viruses, and worms
- humans can get it too.
- monitors a victim's online activity
- to ensure and confirm identity
- decoy system to attract attackers
- overlay on a legitimate page
- software program that montitors computer
- capture keystrokes
Down
- high-profile business attack
- Generates revenue for its developer
- face swapped or digitally altered
- online advertising to deliver malware
- technique for acquiring sensitive data
- error, fault or flaw
- type of malicious software
- flaw in the system
- encyption technology
21 Clues: flaw in the system • capture keystrokes • short for malicious • act of listening in • error, fault or flaw • encyption technology • duplicate copy of data • humans can get it too. • type of malicious software • high-profile business attack • overlay on a legitimate page • to ensure and confirm identity • face swapped or digitally altered • decoy system to attract attackers • ...
Jo-Jo's Cybersecurity Term Crossword Puzzle 2025-03-14
Across
- Everyone can use to encrypt
- Authentication with physical traits
- Accesses systems with technical skills
- Counting system with two digits
- Key aspect in scam tactics
- Malicious computer code/software
- Input, process, output, storage device
- Malware disguised as benign program
- Filters data for network security
Down
- System of infected computers
- Remote systems over the internet
- Phishing using text messages
- Secret code to decrypt data
- Network not accessible by public
- Network accessible by anyone, anywhere
- Malware that demands payment
- Connects home network to internet
- A way to secure data
- Authentication using multiple types
- Converts digital data into analog
- Simulate human intelligence
21 Clues: A way to secure data • Key aspect in scam tactics • Everyone can use to encrypt • Secret code to decrypt data • Simulate human intelligence • System of infected computers • Phishing using text messages • Malware that demands payment • Counting system with two digits • Remote systems over the internet • Network not accessible by public • Malicious computer code/software • ...
Data, Algorithms, Cybersecurity, and Global Impacts 2025-04-25
Across
- An asymmetric encryption system where a different key is used for encryption and decryption.
- Information about an individual that identifies, links, relates, or describes them.
- Decision problem for which an algorithm can be written to produce a correct output for all inputs.
- An algorithm that searches a sorted list for a value by repeatedly splitting the list in half until the value is found or all elements have been eliminated.
- A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer.
- Finite set of instructions that accomplish a specific task.
- Data about data.
- Problem with the goal of finding the "best" solution among many.
- Computer programs that can block, detect, and remove virus and other malware.
- A broad term for datasets so large or complex that traditional data processing applications are inadequate.
- A scheme in which the key to encrypt data is different from the key to decrypt.
- A technique for encrypting data where the same key is used to both encrypt and decrypt data.
- A method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
- The time used to complete a task sequentially divided by the time to complete a task in parallel.
- Copyrighted software that is given for free by the author or copyright owner.
- An algorithm that iterates through each item in a list until it finds the target value or all elements have been checked.
- A model in which programs are run by multiple devices.
- A process that reverses encryption, taking a secret message and reproducing the original plain text.
- A model in which programs run in order, one command at a time.
- The act of attempting to decode a secret message without knowing all the specifics of the cipher.
- A technique that attempts to trick a user into providing personal information.
- An application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
- In a worst case scenario, the number of steps of an algorithm has a exponential or factorial efficiency.
- A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
Down
- General description of a task that can (or cannot) be solved with an algorithm.
- Data that does not accurately reflect the full population or phenomenon being studied.
- A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
- Application of each step of an algorithm in the order in which the code statements are given.
- A measure of how many steps are needed to complete an algorithm.
- Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
- Software intended to damage a computing system or to take partial control over its operation.
- In a worst case scenario, the number of steps of an algorithm has a polynomial efficiency or lower (constant, linear, square, cube, etc.)
- An innovation that includes a computer or program code as an integral part of its functionality. Examples: self-driving car, picture editing software, e-commerce
- Problem with a yes/no answer.
- A process of encoding messages to keep them secret, so only "authorized" parties can read it.
- Data that can be freely used, re-used and redistributed by anyone.
- A model in which programs are broken into small pieces, some of which are run simultaneously.
- Choosing a smaller subset of a data set to use for analysis, for example by eliminating/keeping only certain rows in a table.
- Scientific research conducted in whole or part by distributed individuals (not always scientists) who contribute relevant data to research using their own computing devices.
- A relationship between two pieces of data.
- The practice of obtaining input or information from a large number of people via the Internet.
- Occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions due to its design or use.
- Process that makes the data uniform without changing its meaning.
- A malicious program that can copy itself and gain access to a computer in an unauthorized way.
44 Clues: Data about data. • Problem with a yes/no answer. • A relationship between two pieces of data. • A model in which programs are run by multiple devices. • Finite set of instructions that accomplish a specific task. • A model in which programs run in order, one command at a time. • A measure of how many steps are needed to complete an algorithm. • ...
cybersecurity by richard f 2dt1-1 2025-12-04
Across
- Cilvēks, kas sargā ēku
- Aizsardzība internetā
- numurs, kas identificē ierīci tīklā
- Metāla aizsargs logiem vai durvīm
- Datu glabāšanas vieta internetā
- Ierīce brīdināšanai par apdraudējumu
- Kustības detektors
- Pārbaude ar pirkstu/seju
- Process, as nosaka, kam ļauts un kam ne
- Skaitļu kombinācija
- Datu aizsardzība
- Lai pieteiktos savā kontā, jums vajag ievadīt login un...
- Sistēma ieejas kontrolei
- Informācija elektroniskā formā
Down
- Ierīce, kas pārbauda, vai tu drīksti tur atrasties
- Vieta, kur tiek pierakstīts, kas ir ienācis un izgājis
- Durvju mehānisms
- Dokuments ar drošības noteikumiem un soļiem
- Kameru novērošana
- Drošības noteikumi
- Persona, kas ielaužas sistēmās
- Stingri aizsargāts glabāšanas objekts
- Telpa, kur glabājas uzņēmuma "sirds"
- Datu kopija
- Programma, kas kaitē datoram
25 Clues: Datu kopija • Durvju mehānisms • Datu aizsardzība • Kameru novērošana • Drošības noteikumi • Kustības detektors • Skaitļu kombinācija • Aizsardzība internetā • Cilvēks, kas sargā ēku • Pārbaude ar pirkstu/seju • Sistēma ieejas kontrolei • Programma, kas kaitē datoram • Persona, kas ielaužas sistēmās • Informācija elektroniskā formā • Datu glabāšanas vieta internetā • ...
Kaien 8Gamma 2023-01-19
Across
- it is created when that data has been processed and becomes meaningful.
- a secret word that must be used to gain admission to a place.
- number a number that you dial on the telephone to reach a particular person, business, and more.
- media a collective term of website that focus on communication and more.
- a panel of keys that operate a computer or typewriter.
Down
- it is the practice of protecting system, networks, and programs from digital attacks.
- a device where people use to communicate when ever they want.
- a social media that was created by Mark Zuckerberg.
- a app that you could search anything.
- it is the raw facts and figures.
10 Clues: it is the raw facts and figures. • a app that you could search anything. • a social media that was created by Mark Zuckerberg. • a panel of keys that operate a computer or typewriter. • a device where people use to communicate when ever they want. • a secret word that must be used to gain admission to a place. • ...
Info Security 2025-09-10
Across
- Proactive promise to mitigate cyber risks.
- Digital protection against online threats.
- software intentionally designed to cause damage to a computer, server, or network.
- a potential danger or a malicious actor who could exploit a vulnerability to cause harm
- A technology that creates a secure, encrypted connection over a less secure network like the internet
Down
- The process of scrambling data to make it unreadable without a key
- process of verifying a user's identity
- A social engineering attack that uses fraudulent emails or messages to trick people into revealing sensitive information
- ensure that a business can continue to operate and deliver essential products or services
- A network security system that monitors and controls incoming and outgoing network traffic
10 Clues: process of verifying a user's identity • Proactive promise to mitigate cyber risks. • Digital protection against online threats. • The process of scrambling data to make it unreadable without a key • software intentionally designed to cause damage to a computer, server, or network. • ...
Cybersecurity and Common Online Threats 2025-10-14
Across
- A weakness that can be exploited by cybercriminals
- Engineering A manipulation technique that tricks people into giving away confidential information.
- The practice of protecting computers, networks, and data from digital attacks or unauthorized access.
- A kind of malware that locks your files and demands payment to unlock them.
- The process of converting information into a secure code to prevent unauthorized access.
- A type of scam where someone pretends to be trustworthy to steal personal information.
Down
- Software designed to harm or disrupt computers or steal data.
- The quality of being real or genuine.
- Software that secretly tracks your online activity or gathers personal data.
- To weaken or harm something, especially security or privacy.
10 Clues: The quality of being real or genuine. • A weakness that can be exploited by cybercriminals • To weaken or harm something, especially security or privacy. • Software designed to harm or disrupt computers or steal data. • A kind of malware that locks your files and demands payment to unlock them. • ...
FC Times Crossword 2019-01-30
Across
- The street name of FC's new office
- What FC company raised $155 million in 2018 and expanded into Europe?
- This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
- The conference Joanne and Steve spoke at in 2018
- In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
- The New York Times said this company will emerge as the leading residential solar installer in the US
Down
- Foundation led this meditation company's series A
- On-demand vet service in the FC portfolio
- Foundation's newest unicorn
- Bolt Thread's first fabric is made by
10 Clues: Foundation's newest unicorn • The street name of FC's new office • Bolt Thread's first fabric is made by • On-demand vet service in the FC portfolio • The conference Joanne and Steve spoke at in 2018 • Foundation led this meditation company's series A • What FC company raised $155 million in 2018 and expanded into Europe? • ...
Cyber attack crossword puzzle 2023-09-03
Across
- A secret word or phrase used to gain access to your accounts.
- Criminal activities carried out using computers or the internet.
- A security barrier that filters network traffic to prevent unauthorized access.
- A set of rules and practices for ensuring the security of computer systems and data.
- A fake email or website that tricks individuals into revealing sensitive information.
Down
- The unauthorized access, theft, or manipulation of data.
- Malicious software specifically designed to harm, infiltrate, or compromise computer systems.
- A malicious software that can encrypt files and demand a ransom for their release.
- An organization or individual responsible for securing computer systems and networks.
- A program designed to protect a computer from viruses and malware.
10 Clues: The unauthorized access, theft, or manipulation of data. • A secret word or phrase used to gain access to your accounts. • Criminal activities carried out using computers or the internet. • A program designed to protect a computer from viruses and malware. • A security barrier that filters network traffic to prevent unauthorized access. • ...
Edition Puzzle 2 2024-01-02
Across
- Refers to an interconnected and intelligent energy network
- A crucial field ensuring the safety and integrity of digital energy systems
- Method using complex algorithms for managing and optimizing energy systems
- The range of energy sources used within a particular system or economy
- Pricing mechanism adjusting prices based on immediate supply and demand
- Critical for balancing supply and demand in a grid increasingly reliant on renewable sources
Down
- The loss of energy as electricity is transmitted over long distances
- A system that pays for reliable sources of energy to ensure grid stability
- Deliberate shutdown of electric power in parts of a system to prevent total failure
- Describes a type of decentralized communications model in energy transactions
10 Clues: Refers to an interconnected and intelligent energy network • The loss of energy as electricity is transmitted over long distances • The range of energy sources used within a particular system or economy • Pricing mechanism adjusting prices based on immediate supply and demand • A system that pays for reliable sources of energy to ensure grid stability • ...
SOCIETY 4 2024-07-02
Across
- Software designed to perform a specific task, often more distracting than useful.
- The practice of protecting systems from cyber attacks, frequently failing.
- A digital version of a book, ensuring you never run out of things to read and ignore.
- A video blog, combining the narcissism of a blog with the vanity of a selfie.
- A small mechanical device, designed to make life easier but often complicating it.
Down
- The buying and selling of goods online, often leading to buyer’s remorse.
- A self-portrait photograph, taken to boost one’s self-esteem.
- A mobile device that makes people dumber.
- A simulated experience, preferred over actual reality.
- A personal website for sharing opinions, read primarily by the author's family.
10 Clues: A mobile device that makes people dumber. • A simulated experience, preferred over actual reality. • A self-portrait photograph, taken to boost one’s self-esteem. • The buying and selling of goods online, often leading to buyer’s remorse. • The practice of protecting systems from cyber attacks, frequently failing. • ...
Cyber/Digital Literacy 2024-11-06
Across
- Type of crime that uses computers or networks harm.
- It is use protect your personal information
- It has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness
- Type of malware that can make copies of itself and spread automatically across computers in a network.
- typing targeted keywords about a subject into a search engine.
Down
- Bullying that takes place online using your smartphone, tablet and computer
- Who's actively participate in cyberspace and the online community offered through the internet
- An example of computer virus
- Refers to the trail of data you leave when using the internet.
- Assessing the credibility, reliability, and relevance of the information found online.
10 Clues: An example of computer virus • It is use protect your personal information • Type of crime that uses computers or networks harm. • Refers to the trail of data you leave when using the internet. • typing targeted keywords about a subject into a search engine. • Bullying that takes place online using your smartphone, tablet and computer • ...
We Grow: Learning Week - Crossword Conquest! 2025-02-11
Across
- The ability to inspire and motivate others (10 letters)
- The act of working together towards a common goal (11 letters)
- A plan for achieving long-term goals (8 letters)
- A version control system widely used for tracking changes in source code (3 letters)
- A programming language known for its simplicity and readability (6 letters)
Down
- A person who guides and supports others (6 letters)
- A popular operating system used in servers and desktops (5 letters)
- The ability to understand and share the feelings of another (10 letters)
- The practice of protecting systems, networks, and programs from digital attacks (10 letters)
- The process of improving your skills and knowledge to advance in your career (10 letters)
10 Clues: A plan for achieving long-term goals (8 letters) • A person who guides and supports others (6 letters) • The ability to inspire and motivate others (10 letters) • The act of working together towards a common goal (11 letters) • A popular operating system used in servers and desktops (5 letters) • ...
CyberScho 2025-06-18
Across
- The introduction of new ideas, methods, or devices to improve something or create something original.
- The point where humans and machines meet—think screen, keyboard, or touchpad.
- The digital shield that protects your data and devices online.
- What you do to build a robot—piece by piece, part by part.
Down
- Part of the school’s theme for S.Y. 2025-2026
- CyberScho’s very own robot buddy!
- The process of converting data into a coded form to prevent unauthorized access.
- A cyber threat that that tries to harm your computer or steal your info.
- The branch of technology that deals with the design, construction, operation, and application of robots.
- What powers our modern world, from smartphones to smart classrooms.
10 Clues: CyberScho’s very own robot buddy! • Part of the school’s theme for S.Y. 2025-2026 • What you do to build a robot—piece by piece, part by part. • The digital shield that protects your data and devices online. • What powers our modern world, from smartphones to smart classrooms. • A cyber threat that that tries to harm your computer or steal your info. • ...
Internet Safety 2025-10-06
Across
- Details like your name, address, phone number, or passwords
- Knowing how to find, evaluate, and use digital information safely
- The personal trail of info you leave behind when using the internet
- Protecting networks, devices, and data from attacks or damage
- Controls that help you decide who can see your posts or account info
- A second security step that confirms your identity, like a code sent to your phone
Down
- The version of yourself you create or share online
- An online message or email meant to trick you into sharing private data
- When private information is accessed or stolen without permission
- How others view you based on what they see about you online
10 Clues: The version of yourself you create or share online • Details like your name, address, phone number, or passwords • How others view you based on what they see about you online • Protecting networks, devices, and data from attacks or damage • Knowing how to find, evaluate, and use digital information safely • ...
CIS101 Cybersecurity Questions by Cale Therault 2025-06-04
Across
- A technology that creates a secure, encrypted connection over a less secure network, such as the internet.
- The process of identifying, analyzing, and evaluating potential risks to a system.
- A method of authentication that require two or more methods to gain access.
- Unsolicited or undesired electronic messages, typically email.
- The practice and study of techniques for secure communication in the presence of adversaries.
- The process of verifying the identity of a user or system.
- A socially engineered cyberattack where an attacker attempts to trick individuals into revealing sensitive information, often through deceptive emails or websites.
- Software designed to detect, prevent, and remove malicious software.
- An incident where unauthorized access to data or systems occurs.
- Short for malicious software.
- A software update released to fix vulnerabilities and bugs.
Down
- A cyber attack made from numerous compromised computer systems.
- An attempt to disrupt, damage, or gain unauthorized access to various computer systems.
- The process of converting data into code, especially to prevent unauthorized access.
- Making full use of and/or derive benefit from a resource.
- A weakness or flaw in a system that can be exploited by a threat.
- A type of malware that maliciously encrypts files and demands money for release.
- A potential danger that might exploit a vulnerability to breach security.
- A type of malicious software that attaches itself to legitimate programs and spreads to other computers.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
20 Clues: Short for malicious software. • Making full use of and/or derive benefit from a resource. • The process of verifying the identity of a user or system. • A software update released to fix vulnerabilities and bugs. • Unsolicited or undesired electronic messages, typically email. • A cyber attack made from numerous compromised computer systems. • ...
FC Times Crossword 2019-02-15
Across
- Rodolfo's home country
- The street name of FC's new office
- Foundation led this meditation company's series A
- Foundation's newest unicorn
Down
- In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
- The conference Joanne and Steve spoke at in 2018
- This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
- The New York Times said this company will emerge as the leading residential solar installer in the US
8 Clues: Rodolfo's home country • Foundation's newest unicorn • The street name of FC's new office • The conference Joanne and Steve spoke at in 2018 • Foundation led this meditation company's series A • This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018 • ...
Technology 2023-01-30
Across
- an act of transferring something such files from a usually large computer to the memory of another device
- a technique such as the combining of sound, video, and text for expressing ideas
- not physically existing as such but made by software to appear to do so
- the state of being protected against the criminal or unauthorized use of electronic data
Down
- a device for introducing fresh air or expelling foul or stagnant air
- a thing made for a particular purpose
- operating by means of transmitted electromagnetic waves
- an area or window on a computer screen
8 Clues: a thing made for a particular purpose • an area or window on a computer screen • operating by means of transmitted electromagnetic waves • a device for introducing fresh air or expelling foul or stagnant air • not physically existing as such but made by software to appear to do so • a technique such as the combining of sound, video, and text for expressing ideas • ...
C.A.G.E. File 1 2020-05-07
Across
- Microchip is the C.A.G.E. helper ___________.
- Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
- Agent X also goes by the name __________.
- In order to stay safe ________, be sure to only go to websites you trust.
Down
- To be a C.A.G.E. secret ____________ you must work hard and fight for good!
- ________security has to do with online safety.
- A hacker might try to gain access to your computer by sending a bad link in an __________.
- A _____ tester is an important cybersecurity job. It is also called a penetration tester.
8 Clues: Agent X also goes by the name __________. • Microchip is the C.A.G.E. helper ___________. • ________security has to do with online safety. • In order to stay safe ________, be sure to only go to websites you trust. • To be a C.A.G.E. secret ____________ you must work hard and fight for good! • ...
C.A.G.E. File 1 2020-05-07
Across
- Microchip is the C.A.G.E. helper ___________.
- Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
- To be a C.A.G.E. secret ____________ you must work hard and fight for good!
- In order to stay safe ________, be sure to only go to websites you trust.
Down
- ________security has to do with online safety.
- Agent X also goes by the name __________.
- A hacker might try to gain access to your computer by sending a bad link in an __________.
- A _____ tester is an important cybersecurity job. It is also called a penetration tester.
8 Clues: Agent X also goes by the name __________. • Microchip is the C.A.G.E. helper ___________. • ________security has to do with online safety. • In order to stay safe ________, be sure to only go to websites you trust. • To be a C.A.G.E. secret ____________ you must work hard and fight for good! • ...
Cyber Security keywords 2024-06-07
Across
- When a person calls you with a made up story to get personal information
- Software that secretly tracks what you do
- When an unauthorised user gains access to your account
- Software that disguises itself as something legitimate
- Software that copies itself over and over when it infects your device
Down
- The way we protect our devices and data online is known as
- When you receive an email from an unknown person telling you a story and asking for personal information
- Software designed to cause harm to a computer and its files
8 Clues: Software that secretly tracks what you do • When an unauthorised user gains access to your account • Software that disguises itself as something legitimate • The way we protect our devices and data online is known as • Software designed to cause harm to a computer and its files • Software that copies itself over and over when it infects your device • ...
Cyberspace 2025-10-16
Across
- a hypothetical moment in time when AI and other technologies have become so advanced that humanity undergoes a dramatic change
- the application of scientific knowledge for practical purposes, especially in industry
- a new method, idea, or product
- art of protecting networks, devices, and data from unauthorized access or criminal use
Down
- the perception or knowledge of something
- an integrated set of components for collecting, storing, and processing data
- the ability to learn or understand or to deal with new or trying situations
- Science the interdiscplinary field that involves extracting meaningful insights
8 Clues: a new method, idea, or product • the perception or knowledge of something • the ability to learn or understand or to deal with new or trying situations • an integrated set of components for collecting, storing, and processing data • Science the interdiscplinary field that involves extracting meaningful insights • ...
Malware Monthly March 2022 2022-04-08
Across
- Despite reports, LAPSUS$ never actually used this type of malware
- Ransomware deletes Volume ______ copies, preventing user recovery of encrypted files.
- Government agency who reported 52 infrastructure organizations had been attacked
- Another name for HermeticRansom
- United States Agency concerned with cybersecurity
- Microsoft product affected by the CVE-2017-11882 vulnerability
- Percent of phishing links clicked on by only 4% of employees.
- Uses the ransomware extension dihlxbl
- A communication app rarely used by cybercriminals, but heavily used by LAPSUS$
- Top Ransomware Family of February 2022
Down
- A malware group targeting Ukraine with phishing attacks
- Ransomware family that threatend to publish stolen data on a "Wall of Shame"
- The age of the LAPSUS$ ringleader who was arrested in the UK
- These types of attacks will likely plead for bogus charity donations
- Most malware events revolve around the 3% of users who suffered from ___ or more malware events.
- How many thousands of Ukranian currency is offered by Formbook in their phishing e-mail
- Ensuring all employees have the correct access priviledges
- How many, out of five, employees NEVER click on phishing links.
18 Clues: Another name for HermeticRansom • Uses the ransomware extension dihlxbl • Top Ransomware Family of February 2022 • United States Agency concerned with cybersecurity • A malware group targeting Ukraine with phishing attacks • Ensuring all employees have the correct access priviledges • The age of the LAPSUS$ ringleader who was arrested in the UK • ...
CBDCs are they a good idea. 2024-02-08
Across
- (4)a financial institution that is licensed to accept checking and savings deposits and make loans
- (13)credential Des (anag)
- (5)country situated in eastern Asia on the western shore of the Pacific Ocean, with an area of 9.6 million square kilometers.
- (7)she cark (anag)
- (6)a digital currency, such as Bitcoin, that is used as an alternative payment method or specula
- (8,9)federal agency
- (8)the ability to make your own decisions without being controlled by anyone else
- (7)island country of the West Indies Capital is Kingston.
- (4)information (syn)
Down
- (5,8)the practice of protecting systems, networks, and programs from digital attacks
- (8)acquisition (syn)
- (10)of or relating to the control or direction of an activity by a set of rules, laws, etc.
- (7)computerised (syn)
- (8)legal tender
- (7,2,6)confiscation of property by the authorities
- (9)surmount. surpass (rule of law)
- (4)a currency not backed by a commodity and typically authorised by the issuing government to be legal tender.
- (1,1,1,1) Central Bank digital currency
18 Clues: (8)legal tender • (7)she cark (anag) • (8,9)federal agency • (8)acquisition (syn) • (4)information (syn) • (7)computerised (syn) • (13)credential Des (anag) • (9)surmount. surpass (rule of law) • (1,1,1,1) Central Bank digital currency • (7,2,6)confiscation of property by the authorities • (7)island country of the West Indies Capital is Kingston. • ...
Netowork Puzzle 101 2020-12-04
4 Clues: field of work that prevents hackers • method of exchanging messages online • Affected HCC type of attack uses emails • connection that allows peers to connect together
