cybersecurity Crossword Puzzles

Name: __________________Period:________ 2024-12-05

Name: __________________Period:________ crossword puzzle
Across
  1. Codes of behavior that are sometimes, but not always, enforced by laws
  2. Ongoing effort to protect networks connected to the Internet
  3. A computer program that attaches itself to other executable files on the computer
  4. Any code that can steal data, bypass access, or cause harm to a system
  5. Design to automatically deliver advertisements to a user
  6. Replicates itself to spread from one computer to another
  7. A technique that allows suspicious files to be analyzed in a safe environment.
Down
  1. Any information about you, a company or organization
  2. An Internet-based conflict that involves the networks of other nations
  3. Hardware or software that prevents hackers from accessing your data
  4. A decoys to sneak malicious software past unsuspecting users
  5. A program that scans a computer for malicious software and deletes it

12 Clues: Any information about you, a company or organizationDesign to automatically deliver advertisements to a userReplicates itself to spread from one computer to anotherOngoing effort to protect networks connected to the InternetA decoys to sneak malicious software past unsuspecting users...

Azure Core: Day of learning | October 2022-10-27

Azure Core: Day of learning | October crossword puzzle
Across
  1. One way to donate during the Giving month in Microsoft
  2. Microsoft product with more than 90 million people using it to build software
  3. ----- partnered with Microsoft to add Teams to its meeting devices
  4. Microsoft product with more than 15 million monthly active users, up 50% year over year
  5. First British Asian Prime Minister of United Kingdom
  6. ICC Men's T20 World Cup is being played in
Down
  1. Microsoft's cybersecurity ecosystem, launched with Data Security Council of India
  2. Microsoft's program which connects employees with opportunities for impact in local communities
  3. Microsoft announced a metaverse partnership with --------
  4. The quadrennial international men's football championship to be held in Qatar this year
  5. Microsoft product with more than 20 million monthly active users
  6. An internal tool for Microsoft employees to share feedback

12 Clues: ICC Men's T20 World Cup is being played inFirst British Asian Prime Minister of United KingdomOne way to donate during the Giving month in MicrosoftMicrosoft announced a metaverse partnership with --------An internal tool for Microsoft employees to share feedbackMicrosoft product with more than 20 million monthly active users...

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Digital Citizenship Crossword Puzzle 2023-11-02

Digital Citizenship Crossword Puzzle crossword puzzle
Across
  1. The practice of protecting computer systems and networks from digital attacks.
  2. Etiquette Appropriate behavior and manners when interacting with others online.
  3. Media Websites and apps that allow users to create and share content with others.
  4. Attempting to obtain sensitive information, like usernames and passwords, by pretending to be a trustworthy entity.
  5. A secret combination of characters used to access your accounts.
Down
  1. The legal protection of an original creative work (e.g., music, writing) from unauthorized use.
  2. Footprint The trail of data you create while using the internet.
  3. Harassment or threats that occur on the internet.
  4. Your right to keep personal information safe online.

9 Clues: Harassment or threats that occur on the internet.Your right to keep personal information safe online.Footprint The trail of data you create while using the internet.A secret combination of characters used to access your accounts.The practice of protecting computer systems and networks from digital attacks....

Cool Gadgets 2024-09-11

Cool Gadgets crossword puzzle
Across
  1. A mobile phone that combines features of a computer and a phone.
  2. Portable device for streaming music and podcasts
  3. The ability to learn, understand, and make judgments.
  4. Electronic devices that can be worn on the body.
  5. A group of interconnected computers or devices.
  6. A small mechanical or electronic device or tool.
  7. Existing or occurring on computers or on the internet.
  8. Introducing new ideas; creative in thinking.
Down
  1. The branch of technology dealing with the design, construction, and use of robots.
  2. A wearable device that often includes features like a phone, fitness tracker, and more.
  3. Measures taken to protect a computer or network against unauthorized access.
  4. Created by humans rather than occurring naturally.
  5. The state of things as they actually exist.
  6. Wearable tech that tracks fitness and health metrics
  7. Printing The process of creating a three-dimensional object from a digital model.
  8. The application of scientific knowledge for practical purposes.
  9. An unmanned aerial vehicle often used for photography or surveillance.

17 Clues: The state of things as they actually exist.Introducing new ideas; creative in thinking.A group of interconnected computers or devices.Portable device for streaming music and podcastsElectronic devices that can be worn on the body.A small mechanical or electronic device or tool.Created by humans rather than occurring naturally....

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Not disclosing information to unauthorized individuals
  2. An email or electronic communications scam targeted towards a specific individual, organization, or Business
  3. Assurance that information is accurate and Trustworthy
  4. Type of software that helps protect your computer against malware and cybercriminals
  5. The practice of being diligent about your online activities
  6. The process of converting information or data into a code, especially to prevent unauthorized access
Down
  1. Attacks that use email or malicious websites to infect your device
  2. Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. A secret word or phrase that be used to gain access

9 Clues: A secret word or phrase that be used to gain accessNot disclosing information to unauthorized individualsAssurance that information is accurate and TrustworthyThe practice of being diligent about your online activitiesAttacks that use email or malicious websites to infect your device...

Crossword 2023-02-27

Crossword crossword puzzle
Across
  1. Document that identifies the cost of a business's goods and/or services.
  2. Pricing and price book questions should be forwarded to this team.
  3. Generally a replacement of hardware, software or firmware with a newer or better version.
Down
  1. All Upgrade and Migration quotes need to be quoted by this team.
  2. Occurs when existing customer goes from an on prem product to cloud hosted.
  3. Orders can be placed into this for unresolved bookings.
  4. Value Added Reseller
  5. Customer wants to switch to one product for another.
  6. Is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management

9 Clues: Value Added ResellerCustomer wants to switch to one product for another.Orders can be placed into this for unresolved bookings.All Upgrade and Migration quotes need to be quoted by this team.Pricing and price book questions should be forwarded to this team.Document that identifies the cost of a business's goods and/or services....

Axel's Puzzle 2024-03-13

Axel's Puzzle crossword puzzle
Across
  1. Software designed to damage or disrupt a computer system.
  2. Process of converting information or data into a code to prevent unauthorized access.
  3. Trying to get sensitive information like usernames, passwords, and credit card details by pretending to be someone trustworthy.
  4. Secret word or phrase used for authentication and access control.
  5. Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
Down
  1. Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
  2. Software designed to detect and remove viruses and other malicious software.
  3. Network security system designed to prevent unauthorized access
  4. Update to fix vulnerabilities or improve functionality in software.

9 Clues: Software designed to damage or disrupt a computer system.Network security system designed to prevent unauthorized accessSecret word or phrase used for authentication and access control.Update to fix vulnerabilities or improve functionality in software.Software designed to detect and remove viruses and other malicious software....

INNOV 2025-11-26

INNOV crossword puzzle
Across
  1. The implied cost of additional rework caused by choosing quick solutions over better options.
  2. Building and deploying mutualized platforms of IT components for scalable services.
  3. Embedded SIM technology allowing remote provisioning of mobile subscriptions.
  4. what transforms into a programmable and sustainable platform
  5. Operational optimization, automation (CI/CD, AI-driven), and cost reduction initiatives.
Down
  1. AI-driven insights, automation, and decision-making.
  2. The ability to use existing solutions or components across multiple projects or domains.
  3. Measures and technologies to protect systems and data from cyber threats.
  4. is a strategic growth driver within the Orange Group's financial services portfolio

9 Clues: AI-driven insights, automation, and decision-making.what transforms into a programmable and sustainable platformMeasures and technologies to protect systems and data from cyber threats.Embedded SIM technology allowing remote provisioning of mobile subscriptions.is a strategic growth driver within the Orange Group's financial services portfolio...

Smarthomes Exercise 1 2024-06-05

Smarthomes Exercise 1 crossword puzzle
Across
  1. Practices and technologies designed to protect smart home systems from digital attacks.
  2. Device to store food
  3. Network of interconnected devices that communicate and exchange data.
Down
  1. attempts to obtain sensitive information by disguising as a trustworthy entity
  2. The process of converting information or data into a code to prevent unauthorized access.
  3. A home entertainment device with internet connectivity and streaming capabilities.

6 Clues: Device to store foodNetwork of interconnected devices that communicate and exchange data.attempts to obtain sensitive information by disguising as a trustworthy entityA home entertainment device with internet connectivity and streaming capabilities.Practices and technologies designed to protect smart home systems from digital attacks....

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  2. Data Istilah untuk volume data besar yang diproses untuk informasi.
  3. Tempat di mana data disimpan secara online.
  4. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.

6 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Data Istilah untuk volume data besar yang diproses untuk informasi.Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan....

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  2. Data Istilah untuk volume data besar yang diproses untuk informasi.
  3. Tempat di mana data disimpan secara online.
  4. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.

6 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Data Istilah untuk volume data besar yang diproses untuk informasi.Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan....

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Istilah untuk volume data besar yang diproses untuk informasi.
  2. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  3. Tempat di mana data disimpan secara online.
  4. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.

6 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Istilah untuk volume data besar yang diproses untuk informasi.Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan....

Cyber Awareness Month 2023-10-31

Cyber Awareness Month crossword puzzle
Across
  1. A strong password should include a random string of numbers, letters, and _______
  2. Click the orange fish______ icon in Gmail to report suspicious email to the Kent Tech Team
  3. MFA requires _____ or more credentials to verify your identity
  4. MFA or multi-factor ____________ is a layered security approach to protect your accounts
  5. Text message scams that try to trick you into disclosing personal information
Down
  1. Verifying your identity through your fingerprint or facial recognition
  2. Update _______ to install bug fixes and security updates
  3. Cybersecurity Awareness Month
  4. Email that appear to be from a legitimate source to trick you into disclosing personal information such as passwords or bank account info
  5. Sequence of words used for authentication
  6. A password _______ helps keep your accounts secure by storing and generating strong passwords

11 Clues: Cybersecurity Awareness MonthSequence of words used for authenticationUpdate _______ to install bug fixes and security updatesMFA requires _____ or more credentials to verify your identityVerifying your identity through your fingerprint or facial recognitionText message scams that try to trick you into disclosing personal information...

DigitalTransformation 2024-10-09

DigitalTransformation crossword puzzle
Across
  1. A decentralized, digital ledger technology used for secure transactions.
  2. The process of changing or revolutionizing a business through digital means.
  3. A computer-generated simulation of a 3D environment (Abbreviation).
  4. The process of creating a physical object from a digital model by layering material
  5. The discovery and interpretation of meaningful data patterns.
  6. Large volumes of structured or unstructured data that can be analyzed for insights.
Down
  1. A subset of AI where computers learn from data.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. A network of physical devices connected via the internet (Abbreviation).
  4. The simulation of human intelligence by machines (Abbreviation).
  5. The technology that designs, constructs, and operates robots.
  6. The fifth generation of mobile network technology.
  7. The use of software robots to automate repetitive tasks (Abbreviation).
  8. Raw information that can be processed to gain insights.
  9. Technology that overlays digital information onto the real world (Abbreviation).
  10. Technology that allows data to be stored and accessed over the internet.

16 Clues: A subset of AI where computers learn from data.The fifth generation of mobile network technology.Raw information that can be processed to gain insights.The technology that designs, constructs, and operates robots.The discovery and interpretation of meaningful data patterns.The simulation of human intelligence by machines (Abbreviation)....

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Tempat di mana data disimpan secara online.
  2. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.
  3. Data Istilah untuk volume data besar yang diproses untuk informasi.

5 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Data Istilah untuk volume data besar yang diproses untuk informasi.Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.

Teka Teki Techco 2024-05-16

Teka Teki Techco crossword puzzle
Across
  1. Tempat di mana data disimpan secara online.
  2. Jaringan global yang menghubungkan jutaan perangkat.
Down
  1. Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
  2. Upaya melindungi sistem komputer dari ancaman di dunia maya.
  3. Data Istilah untuk volume data besar yang diproses untuk informasi.

5 Clues: Tempat di mana data disimpan secara online.Jaringan global yang menghubungkan jutaan perangkat.Upaya melindungi sistem komputer dari ancaman di dunia maya.Data Istilah untuk volume data besar yang diproses untuk informasi.Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.

The Suffolk County September 2022 Hack 2022-10-31

The Suffolk County September 2022 Hack crossword puzzle
Across
  1. __________is malware that locks access to devices & files
  2. __________ is better than a cure.
  3. Cybersecurity is a team _____
  4. Many tasks normally done online, became ________ tasks
  5. Those involved in ____ estate processing were crippled by the attack
  6. Data seized in a ransomware attack is held _____ unless payment is made
  7. The _______ of this attack is unprecedented
  8. The Suffolk County government experienced a_____ attack in early Sept. 2022
  9. $130 _______in unpaid receivables have accumulated since the hack was reported
  10. Citizens are in a ______ about their data & credit being accessed.
  11. Restoring data can be a costly & __________ task
Down
  1. Hackers posted confidential information on the _______
  2. If you see _________ say something.
  3. This ______ appears to be the most high-profile cyber attack against a government entity on LI
  4. It's important that we recognize the scope & ____ of this neighborhood cyberattack.
  5. As hackers become more sophisticated, it's important for our team to be _____
  6. ______ actors accessed or acquired personal information from County server.
  7. The County's 911 _________system was temporarily disabled
  8. ________ of dollars in Real Estate transactions are sitting on the sidelines

19 Clues: Cybersecurity is a team _______________ is better than a cure.If you see _________ say something.The _______ of this attack is unprecedentedRestoring data can be a costly & __________ taskHackers posted confidential information on the _______Many tasks normally done online, became ________ tasks...

9ABD 2025-05-12

9ABD crossword puzzle
Across
  1. - Number of wave cycles per second.
  2. - The basic unit of matter, central to quantum studies.
  3. - Field that may use quantum encryption to protect data.
  4. - Unique patterns of light produced by atoms when electrons drop energy levels.
  5. - When a quantum system exists in multiple states at once.
  6. - Branch of physics that explains the behavior of particles on a small scale.
  7. - Distance between two consecutive wave peaks.
  8. - Common display type that relies on polarized light.
  9. - Electromagnetic radiation that can behave like both a wave and a particle.
Down
  1. - Quantum link between particles no matter how far apart.
  2. - Required to excite electrons or eject them from metal surfaces.
  3. - Electrons are ejected when light hits a surface in this quantum phenomenon.
  4. - General term for strange behavior at the atomic and subatomic levels.
  5. - Heisenberg’s rule: you can’t know both position and momentum precisely.
  6. - Includes reflection, refraction, diffraction, and interference.
  7. - A particle of light with no mass, just energy.
  8. - What happens to electrons in the photoelectric effect.
  9. - Light can act as both a wave and a particle.
  10. - Describes the direction of oscillation in a transverse wave.

19 Clues: - Number of wave cycles per second.- Light can act as both a wave and a particle.- Distance between two consecutive wave peaks.- A particle of light with no mass, just energy.- Common display type that relies on polarized light.- The basic unit of matter, central to quantum studies.- Field that may use quantum encryption to protect data....

Cybersecurity Awareness Week - 9/24 2021-09-24

Cybersecurity Awareness Week - 9/24 crossword puzzle
Across
  1. a standalone malware computer program that replicates itself in order to spread to other computers
  2. a network security system that controls incoming and outgoing network traffic based on a set of rules
  3. a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity
  4. usually consists of eight bits
  5. (abbreviation) a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period
  6. (abbreviation) a way of injecting malicious scripts into web pages
  7. type of software to detect unwanted programs on a computer
Down
  1. a secret word or phrase that must be used to gain admission to something, you should never share yours with anyone!
  2. generic name someone who seeks and exploits weaknesses in a computer system or computer network
  3. a type of ransomware that attacked running Microsoft Windows operating systems in May 2017
  4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  5. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed
  6. the process of converting information or data into a code, especially to prevent unauthorized access
  7. function of one way encryption that is normally used to check integrity of data
  8. a type of malicious software designed to block access to a computer system until a sum of money is paid

15 Clues: usually consists of eight bitstype of software to detect unwanted programs on a computer(abbreviation) a way of injecting malicious scripts into web pagesfunction of one way encryption that is normally used to check integrity of dataa type of ransomware that attacked running Microsoft Windows operating systems in May 2017...

computer apps review 2022-05-02

computer apps review crossword puzzle
Across
  1. what do you need to know when using social media?
  2. what app do you use when you want to make a poster?
  3. letters on sheets
  4. how do you let other people collaborate with you?
  5. what was the first project we did in computer app?
  6. what color is the turn-in button in docs?
  7. how many wevideos did we make
  8. what's one thing you never do when writing an essay?
  9. our second unit?
  10. what do you need for your computer to work?
Down
  1. what were we taught to use when writing an email?
  2. what's the best app to make a presentation?
  3. what’s one thing you need to be careful of when being on social media?
  4. what were we given at the beginning of the year to complete schoolwork?
  5. what was our most recent project about?
  6. how do you make a quiz where anybody can answer and see their responses?
  7. what app is good for studying
  8. what is used between slides in videos and projects?
  9. what do you click on to add an image to docs?

19 Clues: our second unit?letters on sheetswhat app is good for studyinghow many wevideos did we makewhat was our most recent project about?what color is the turn-in button in docs?what's the best app to make a presentation?what do you need for your computer to work?what do you click on to add an image to docs?...

Cybersecurity Awareness Week 4 2025 2025-10-28

Cybersecurity Awareness Week 4 2025 crossword puzzle
Across
  1. When a device is not in the most current version, it means it is ______
  2. a device that is too many ______ behind will likely not receive current updates
  3. not all updates are required, some are labeled as ______.
  4. in ___ devices, you can go to the general settings section and perform a software update.
  5. you should only download updates from _______ sources
  6. You can also look for updates for a specific ________ in the app store or play store.
  7. make sure your device has enough ______ to perform the update
Down
  1. when a device has updates, you will likely be _____ a weakness
  2. keeping your devices up to date prevents hackers from exploiting a _____.
  3. a device can be _____ if weaknesses are left unchecked.
  4. A ____ update is mainly focused on fixing a flaw that can put your device at risk
  5. you should ______ updates whenever possible
  6. updates should be deemed important and done ______
  7. you should ____ all your devices whenever possible
  8. The lack of updates in an operating ______ can lead to an exposed device

15 Clues: you should ______ updates whenever possibleupdates should be deemed important and done ______you should ____ all your devices whenever possibleyou should only download updates from _______ sourcesa device can be _____ if weaknesses are left unchecked.not all updates are required, some are labeled as ______....

Kreuzworträtsel für Krisenmanager 2025-03-26

Kreuzworträtsel für Krisenmanager crossword puzzle
Across
  1. Supercomputer der Zukunft, der herkömmliche Verschlüsselung in Sekunden knacken könnte (15 Buchstaben)
  2. Meist benutzter Laut bei BBUG
  3. Die wichtigste Eigenschaft für Unternehmen, um in unsicheren Zeiten erfolgreich zu bleiben (18 Buchstaben)
Down
  1. Wer Krisen überleben will, braucht ein starkes…? (9 Buchstaben)
  2. Wird durch Quantencomputer massiv bedroht – Unternehmen sollten hier dringend aufrüsten! (14 Buchstaben)
  3. Hier treffen sich kluge Köpfe, um über die Zukunft der Wirtschaft zu diskutieren (4 Buchstaben)
  4. Wirtschaftliche Auseinandersetzung zwischen Staaten durch Zölle, Sanktionen und Exportverbote (12 Buchstaben)
  5. Diese Technologie könnte bald Entscheidungen schneller und besser treffen als Menschen (2 Buchstaben)

8 Clues: Meist benutzter Laut bei BBUGWer Krisen überleben will, braucht ein starkes…? (9 Buchstaben)Hier treffen sich kluge Köpfe, um über die Zukunft der Wirtschaft zu diskutieren (4 Buchstaben)Diese Technologie könnte bald Entscheidungen schneller und besser treffen als Menschen (2 Buchstaben)...

crossword puzzle 2023-01-25

crossword puzzle crossword puzzle
Across
  1. an attackin whickan attacker injects malicious executable scripts into the code of a trusted application or website
  2. an attack that forces an end user to execute unwanted actions on a web application
  3. A person who hacks for political gain
  4. uses computer hacking to spread fear
  5. a cyber attack that involves executing arbitrary commands on a host operating system(OS)
  6. one where the number generated is extremely hard for any third party to predict what it might be
Down
  1. meeting customers' cybersecurity ecpectations
  2. using libraries, frameworks, and other software modules that run the same privilages as the application
  3. bug found in a web application that attackers use to manipulate the URL
  4. the response and recovery procedures from error conditions present in a software application
  5. When the volume of data exceeds the storage capacity
  6. attacking information for millitary purposes
  7. uses the social media to campaign
  8. deliberate destution of an item or systeam

14 Clues: uses the social media to campaignuses computer hacking to spread fearA person who hacks for political gaindeliberate destution of an item or systeamattacking information for millitary purposesmeeting customers' cybersecurity ecpectationsWhen the volume of data exceeds the storage capacity...

Technology Crossword 2023-05-10

Technology Crossword crossword puzzle
Across
  1. Measures designed to protect your computer.
  2. The number of distinct pixels that make up the display on a computer monitor.
  3. A wireless communications technology intended to replace cables.
  4. Resources and services available on the Internet
  5. Malicious software.
  6. The process of making something digital.
Down
  1. A point within a network that interconnects with other networks.
  2. A piece of programming code inserted into other programming to cause damage.
  3. A computer that handles requests for data, email, file transfers, and other network services from other computers.
  4. The most common way of connecting computers on a network with a wired connection.
  5. A barrier that acts as a security system to protect trusted computer systems.
  6. A unique resource locator.
  7. A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company.
  8. Technology that allows computers and other devices to communicate via a wireless signal.

14 Clues: Malicious software.A unique resource locator.The process of making something digital.Measures designed to protect your computer.Resources and services available on the InternetA point within a network that interconnects with other networks.A wireless communications technology intended to replace cables....

Networking Fundamentals 2021-11-22

Networking Fundamentals crossword puzzle
Across
  1. Unwanted emails sent repeatedly, often containing phishing links.
  2. Another name for the Internet.
  3. Stealing someone's data and pretending to be them.
  4. A collection computers and other devices connected together.
  5. A type of attack where multiple computers are used.
  6. Describes keeping data and users safe on a network.
  7. Type of software that is used encrypt data. Criminals then attempt to get the owner to pay up in return for access to the data.
Down
  1. Software designed to cause damage.
  2. Fooling someone into giving out personal data.
  3. Describes a situation where data has been accessed without permission.
  4. Part of the Internet that requires specialist software. Often contains illegal material.
  5. Part of the web that is not accessible to search engines, etc.
  6. a network of computers infected by malware that are under the control of a single attacking party

13 Clues: Another name for the Internet.Software designed to cause damage.Fooling someone into giving out personal data.Stealing someone's data and pretending to be them.A type of attack where multiple computers are used.Describes keeping data and users safe on a network.A collection computers and other devices connected together....

Trick or threat : The Cybersecurity Crossword 2025-10-19

Trick or threat : The Cybersecurity Crossword crossword puzzle
Across
  1. _____________ is a secret combination of numbers, letters and symbols
  2. _________ is the protocol for Internet safety
Down
  1. ___________ is the king-ware of harmful viruses
  2. ___________ refers to illegally downloading legal things such as movies, music, videos etc.
  3. __________ is an attempt to access someone's data via email

5 Clues: _________ is the protocol for Internet safety___________ is the king-ware of harmful viruses__________ is an attempt to access someone's data via email_____________ is a secret combination of numbers, letters and symbols___________ refers to illegally downloading legal things such as movies, music, videos etc.

English for Computer Engineering Management 2018-06-30

English for Computer Engineering Management crossword puzzle
Across
  1. the unit used to measure the speed of a computer's processor
  2. set of rules that computers and other devices use when communicating with one another.
  3. designed to protect your computer
  4. a software program developed to do harm to other computers
  5. a type of email fraud in which the perpetrator sends out emails
  6. the brains of your computer
  7. the number of distinct pixels of the display for computer
Down
  1. a barrier that acts as a security system to protect trusted computer systems and networks from outside connections
  2. the maximum amount of data that can travel a communications path in a given time
  3. it experiences a sudden spike in popularity in a short period of time
  4. any type of illegal activity on your computer
  5. the process of converting electronic data to an unrecognizable
  6. unsolicited email messages sent for marketing purposes
  7. the reduction of the size of a file

14 Clues: the brains of your computerdesigned to protect your computerthe reduction of the size of a fileany type of illegal activity on your computerunsolicited email messages sent for marketing purposesthe number of distinct pixels of the display for computera software program developed to do harm to other computers...

The Iowa Banker Crossword 2025-02-14

The Iowa Banker Crossword crossword puzzle
Across
  1. The previous name of IBA’s quarterly magazine before it became The Iowa Banker.
  2. A major driver of change in banking operations and customer service.
  3. IBA’s efforts to champion and represent the interests of Iowa’s community banks.
  4. Shaped by those who guide and influence the future of Iowa banking.
  5. A key benefit of attending IBA events.
  6. A bank’s ability to meet cash needs.
Down
  1. A challenge community banks continue to face.
  2. Essential for protecting customer data in an increasingly digital world.
  3. The IBA offers schools and training to support bankers' growth.
  4. Technology-driven solutions transforming the banking industry.
  5. A critical aspect of banking operations to meet legal standards.
  6. Many Iowa banks prioritize supporting this through local efforts.
  7. The IBA’s “Money Cents” campaign was launched to help prevent this.
  8. The Iowa Bankers Benefit Plan helps banks provide this for bank employees.

14 Clues: A bank’s ability to meet cash needs.A key benefit of attending IBA events.A challenge community banks continue to face.Technology-driven solutions transforming the banking industry.The IBA offers schools and training to support bankers' growth.A critical aspect of banking operations to meet legal standards....

History, success and technology 2025-11-10

History, success and technology crossword puzzle
Across
  1. To make something happen, often through skill and effort.
  2. Relating to a king, queen, or emperor
  3. The ability to keep doing something difficult despite setbacks or opposition.
  4. The act of moving to live permanently in a foreign country.
  5. The belief or theory that things must happen the way they do; fate.
  6. A formal written agreement between countries.
  7. A system of interconnected computers or devices.
  8. An original document, object, or account from a particular time period.
  9. The widespread destruction and loss of life that happened during the Second World War.
Down
  1. A small piece of code stored on a user's computer by a website.
  2. The state of being protected against the criminal use of electronic data.
  3. An ambitious target or aim that is pursued with effort.
  4. Being able to do something successfully or efficiently; skill.
  5. The belief or theory that things must happen the way they do; fate.
  6. A sequence of steps or rules to be followed in calculations or problem-solving.

15 Clues: Relating to a king, queen, or emperorA formal written agreement between countries.A system of interconnected computers or devices.An ambitious target or aim that is pursued with effort.To make something happen, often through skill and effort.The act of moving to live permanently in a foreign country....

ENA Crossword: Part 2 2024-01-25

ENA Crossword: Part 2 crossword puzzle
Across
  1. The person who had his gift repeatedly stolen at the Christmas party (5)
  2. A metric of energy; also a meeting room (5)
  3. Device that interrupts the flow of electricity when a fault is detected (7,7)
  4. Protection against unauthorised access to the digital infrastructure of the power grid (13)
  5. Essential gear for workers, including helmets, gloves, and safety glasses (3)
  6. First person to host the Elec/SHE thursday meeting after the reformat (5)
Down
  1. Number of years ENA has existed (6-3)
  2. One of the main component in a heat pump (10)
  3. Forum hosted in the office on Tuesday (5)
  4. The UK regulator responsible for overseeing electricity markets (5)
  5. Third named storm to hit the UK this year (7)
  6. CEO of Northern Power Grid, first name (6)

12 Clues: Number of years ENA has existed (6-3)Forum hosted in the office on Tuesday (5)CEO of Northern Power Grid, first name (6)A metric of energy; also a meeting room (5)One of the main component in a heat pump (10)Third named storm to hit the UK this year (7)The UK regulator responsible for overseeing electricity markets (5)...

Computer Science Crossword 2024-03-19

Computer Science Crossword crossword puzzle
Across
  1. Protecting computers and networks from theft or damage.
  2. Wireless local area network that uses radio waves to connect devices to the internet.
  3. An icon or figure representing a person in video games, forums, etc.
  4. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. The ability to read and write.
  6. A secret word or phrase that must be used to gain admission to something.
  7. A computer program designed to simulate conversation with human users.
Down
  1. The programs and other operating information used by a computer.
  2. Facts and statistics collected for reference or analysis.
  3. A system of numerical notation that has 2 rather than 10 as a base.
  4. The action or practice of playing video games.
  5. A program or piece of software designed to fulfill a particular purpose.
  6. The physical parts of a computer system.
  7. A step-by-step procedure for calculations.

14 Clues: The ability to read and write.The physical parts of a computer system.A step-by-step procedure for calculations.The action or practice of playing video games.Protecting computers and networks from theft or damage.Facts and statistics collected for reference or analysis.The programs and other operating information used by a computer....

Vocbulary - compound nouns in IT industry 2024-09-11

Vocbulary - compound nouns in IT industry crossword puzzle
Across
  1. A copy of data stored separately to protect against loss.
  2. The process of transferring data from a remote system to a local one.
  3. A security system that controls incoming and outgoing network traffic
  4. A device used to input text and commands into a computer.
  5. A unique identifier used to log into a system or account.
  6. The protection of computer systems and networks from attacks.
  7. The physical components of a computer system, like the CPU, monitor, and keyboard.
  8. A group of connected computers and devices that share resources.
Down
  1. The process of transferring data from a local system to a remote one.
  2. A secret word or phrase used to access a system or account.
  3. The main page of a website that users first see.
  4. Programs and applications that run on computers and devices.
  5. A collection of related web pages accessed via the internet.
  6. A structured collection of data stored electronically

14 Clues: The main page of a website that users first see.A structured collection of data stored electronicallyA copy of data stored separately to protect against loss.A device used to input text and commands into a computer.A unique identifier used to log into a system or account.A secret word or phrase used to access a system or account....

The Iowa Banker Crossword 2025-02-18

The Iowa Banker Crossword crossword puzzle
Across
  1. The IBA’s “Money Cents” campaign was launched to help prevent this.
  2. A major driver of change in banking operations and customer service.
  3. A word used to describe the wave of regulations impacting banks.
  4. Many Iowa banks prioritize supporting this through local efforts.
  5. The Iowa Bankers Benefit Plan helps banks provide this for bank employees.
  6. A key benefit of attending IBA events.
Down
  1. IBA’s efforts to champion and represent the interests of Iowa’s community banks.
  2. A bank’s ability to meet cash needs.
  3. A challenge community banks continue to face.
  4. Technology-driven solutions transforming the banking industry.
  5. Essential for protecting customer data in an increasingly digital world.
  6. A critical aspect of banking operations to meet legal standards.
  7. Shaped by those who guide and influence the future of Iowa banking.
  8. The previous name of IBA’s quarterly magazine before it became The Iowa Banker.

14 Clues: A bank’s ability to meet cash needs.A key benefit of attending IBA events.A challenge community banks continue to face.Technology-driven solutions transforming the banking industry.A critical aspect of banking operations to meet legal standards.A word used to describe the wave of regulations impacting banks....

SuperPower Resources 2025-05-29

SuperPower Resources crossword puzzle
Across
  1. Raw facts and numbers collected and used to make decisions.
  2. Secret information or spying, used to know what rivals are doing.
  3. Legal ownership of things, including ideas or inventions (like patents).
  4. Tools and systems made using science, like computers or advanced robots.
  5. A country's army, navy, and air force, used for protection.
  6. Energy that comes from sources that won't run out, like sun or wind.
Down
  1. The smarts, skills, and hard work that a country's people provide.
  2. Workers with special training for specific jobs, like engineers or doctors.
  3. Agreements between countries to work together and support each other.
  4. The power that makes things work, move, or light up.
  5. Special metals used in phones, computers, and electric cars.
  6. A dark, thick liquid dug from the ground, used for fuel and making plastics.
  7. Protecting computer systems and information from online attacks.
  8. The power to change how others think or act without force.

14 Clues: The power that makes things work, move, or light up.The power to change how others think or act without force.Raw facts and numbers collected and used to make decisions.A country's army, navy, and air force, used for protection.Special metals used in phones, computers, and electric cars....

Cybersecurity Awareness Month Week 3 2025-10-20

Cybersecurity Awareness Month Week 3 crossword puzzle
Across
  1. MFA can be used in many forms, one of them is a _____
  2. apart from your ______, you should also turn on MFA to better protect yourself
  3. MFA is a way to confirm your ______ to the site and apps
  4. most companies and organizations ________ their employees to have MFA enabled in order to better protect sensitive information
  5. you have information _______ in mind if you enable MFA on your accounts
  6. you are the ______ of an attack when you receive a phishing email
  7. if you dont turn on MFA, you may run the risk of bad actors gaining ______ access to your accounts
  8. you should _____ clicking on links that look weird and are coming from an unknown source
  9. if you don't use MFA your account can be _____
Down
  1. MFA adds an extra layer of _______ to your logins
  2. it should be your personal _____ to use MFA whenever possible
  3. MFA can be used to log in to a ______
  4. if you are in a public wifi, your internet traffic can be _______
  5. you should take ______ when receiving emails from unknown senders
  6. another method of MFA has to do with "something you are," a ______ scan

15 Clues: MFA can be used to log in to a ______if you don't use MFA your account can be _____MFA adds an extra layer of _______ to your loginsMFA can be used in many forms, one of them is a _____MFA is a way to confirm your ______ to the site and appsit should be your personal _____ to use MFA whenever possible...

Set B 2023-01-29

Set B crossword puzzle
Across
  1. We must be _____ when helping new citizens integrate into our society.
  2. I show my support to family members who are in the military by _____ them.
  3. Be a _____ Singaporean.
  4. Learning life-saving skills such as CPR prepares you to help others in an _____.
  5. Regardless of age, we must continue to love _____ and acquire new skills for adaptability.
  6. It is important to practice good _____ habits such as ignoring emails and attachements from unknown sources.
Down
  1. Regardless of race, language or religion, we can have fun together as one _____.
  2. Stay vigilant against public threats and report _____ people and activities to the authorities.
  3. We thank and show our _____ to soldiers who defend Singapore.
  4. Following water and electricity saving tips to _____ resources.
  5. The Singapore Armed Forces is a strong and well-respected _____ force.
  6. _____ saves lives.

12 Clues: _____ saves lives.Be a _____ Singaporean.We thank and show our _____ to soldiers who defend Singapore.Following water and electricity saving tips to _____ resources.We must be _____ when helping new citizens integrate into our society.The Singapore Armed Forces is a strong and well-respected _____ force....

Technologia 2025-09-08

Technologia crossword puzzle
Across
  1. A set of rules or steps for solving a problem or performing a task.
  2. An organized collection of information stored electronically.
  3. The way a user communicates with a computer, device, or program.
  4. The programs and operating information used by a computer.
  5. Measures taken to protect computers and networks from attacks.
  6. The science of building and using extremely small devices or materials.
  7. The process of creating new ideas, methods, or devices.
Down
  1. The physical parts of a computer or electronic device.
  2. Something created by humans, not occurring naturally (often used with "intelligence").
  3. The act of converting information into a secret code to protect it.
  4. The use of machines or technology to perform tasks with little human input.
  5. The amount of data that can be transmitted over an internet connection.

12 Clues: The physical parts of a computer or electronic device.The process of creating new ideas, methods, or devices.The programs and operating information used by a computer.An organized collection of information stored electronically.Measures taken to protect computers and networks from attacks....

tech 2023-10-04

tech crossword puzzle
Across
  1. The evaluation or appraisal of someone or something.
  2. The practice of analyzing and interpreting complex data sets to inform decision-making.
  3. Services or strategies for finding and hiring suitable employees.
Down
  1. Measures taken to protect computer systems, networks, and data from cyber threats.
  2. The practice of recruiting highly skilled individuals for specialized positions.
  3. The process of integrating a new employee into a company.

6 Clues: The evaluation or appraisal of someone or something.The process of integrating a new employee into a company.Services or strategies for finding and hiring suitable employees.The practice of recruiting highly skilled individuals for specialized positions.Measures taken to protect computer systems, networks, and data from cyber threats....

Crossword 4 2023-09-04

Crossword 4 crossword puzzle
Across
  1. An action taken to withdraw/remove a product or system from distribution
  2. A fraudulent imitation of something.
  3. A process of increasing the knowledge and skills of an employee for doing a particular job.
Down
  1. the practice of protecting systems, networks, and programs from digital attacks.
  2. Anything that permitted by law.
  3. A practice to ensure that products are stored and handled under sanitary conditions.

6 Clues: Anything that permitted by law.A fraudulent imitation of something.An action taken to withdraw/remove a product or system from distributionthe practice of protecting systems, networks, and programs from digital attacks.A practice to ensure that products are stored and handled under sanitary conditions....

Risk Awareness! 2024-08-21

Risk Awareness! crossword puzzle
Across
  1. Type of risk related to cybersecurity attacks like clicking on malicious links
  2. Responsible for owning and managing risks
  3. One of the functions of the second line, starts with "o"
  4. The act of trying to get you to click on a malicious link
Down
  1. Type of risk that remains even after risk management
  2. Last step of the risk management process
  3. This obligation of the PDPA states that personal data we collect should be accurate and complete
  4. Provides independent assurance and advisory services on risk controls
  5. What happens if you do click on a malicious link and a hacker gets access to stored personal data
  6. Type of risk control that monitors for risks

10 Clues: Last step of the risk management processResponsible for owning and managing risksType of risk control that monitors for risksType of risk that remains even after risk managementOne of the functions of the second line, starts with "o"The act of trying to get you to click on a malicious link...

TECH ADVANCEMENT - PART 2 - ARTICLE 1A - L1 2023-02-16

TECH ADVANCEMENT - PART 2 - ARTICLE 1A - L1 crossword puzzle
Across
  1. To criticize or belittle someone or something.
  2. The origin or mode of formation of something.
  3. The final resolution of a complex plot in a story, often involving the unraveling of secrets and the tying up of loose ends.
  4. Changes or variations in a quantity or value over time.
  5. Digital or virtual tokens that use cryptography to secure and verify transactions and to control the creation of new units.
Down
  1. The process of creating a systematic and organized approach to a particular task or field.
  2. The practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  3. To provoke or oppose someone or something.
  4. Lacking in seriousness or importance.
  5. Present, appearing, or found everywhere.

10 Clues: Lacking in seriousness or importance.Present, appearing, or found everywhere.To provoke or oppose someone or something.The origin or mode of formation of something.To criticize or belittle someone or something.Changes or variations in a quantity or value over time....

Technology Laws 2025-02-21

Technology Laws crossword puzzle
Across
  1. The right to keep personal information confidential.
  2. Protecting computers and data from attacks.
  3. Breach An event where unauthorized access to confidential data happens, often exposing personal information.
  4. A legal document that outlines the terms for using a service, requiring users to agree before accessing it.
  5. The data trail left while using the internet, including websites visited and information shared.
Down
  1. Following rules or meeting established guidelines.
  2. Creations of the mind, like inventions and artistic works.
  3. Permission for something to happen, especially regarding personal data collection.
  4. A rule made by an authority to control behavior.
  5. A set of rules or instructions for a computer to perform tasks, often used to decide what content users see online.

10 Clues: Protecting computers and data from attacks.A rule made by an authority to control behavior.Following rules or meeting established guidelines.The right to keep personal information confidential.Creations of the mind, like inventions and artistic works.Permission for something to happen, especially regarding personal data collection....

QuizSurp2 2025-01-04

QuizSurp2 crossword puzzle
Across
  1. BlackBerry's reliance on its legacy products reflected a lack of strategic _______
  2. The failure to adapt to touchscreens showed BlackBerry's weak alignment with _______ market trends
  3. The shift from smartphones to software was part of BlackBerry's strategy to _______ its focus
  4. Secure messaging and privacy were part of BlackBerry's _______ proposition
Down
  1. BlackBerry's initial _______ was to create innovative devices for secure communication
  2. BlackBerry’s transition to software emphasized the need for strategic _______ in resource allocation
  3. The rise of iPhone demonstrated the dynamic nature of _______ competition
  4. External analysis involves frameworks like PESTEL, which examines _______ factors impacting businesses
  5. BlackBerry initially gained a competitive _______ by offering advanced cybersecurity and secure messaging
  6. BlackBerry's inability to compete with Apple and Android highlighted the importance of _______ in industry analysis

10 Clues: The rise of iPhone demonstrated the dynamic nature of _______ competitionSecure messaging and privacy were part of BlackBerry's _______ propositionBlackBerry's reliance on its legacy products reflected a lack of strategic _______BlackBerry's initial _______ was to create innovative devices for secure communication...

May 2025 2025-04-27

May 2025 crossword puzzle
Across
  1. A teen show that exaggerates teen life and revolves around the death of a classmate in a small town.
  2. amount of students attending speech and debate nationals.
  3. petting a dog releases this type of hormone.
Down
  1. The TPS cybersecurity team won this competition in their first year competing.
  2. Chess player who inspired "The Queens Gambit"
  3. type of bat that has become very controversial in the world of baseball.
  4. America has too many gosh darn ______

7 Clues: America has too many gosh darn ______petting a dog releases this type of hormone.Chess player who inspired "The Queens Gambit"amount of students attending speech and debate nationals.type of bat that has become very controversial in the world of baseball.The TPS cybersecurity team won this competition in their first year competing....

Week 1 Cybersecurity Know-How Challenge 2023-09-26

Week 1 Cybersecurity Know-How Challenge crossword puzzle
Across
  1. Web Browsing Safety Tip 1: _ _ with the websites you visit..
  2. What does HIPPA protect?
Down
  1. National Cybersecurity Awareness Month
  2. Health Insurance Portability and Accountability Act

4 Clues: What does HIPPA protect?National Cybersecurity Awareness MonthHealth Insurance Portability and Accountability ActWeb Browsing Safety Tip 1: _ _ with the websites you visit..

ISSO June 2021 2021-06-07

ISSO June 2021 crossword puzzle
Across
  1. IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
  2. The physical separation or isolation of a system from other systems or networks is known as an __ __.
  3. A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
  4. A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
  5. IRM office responsable for Cyber Operations oversight.
  6. ____ is the only thumb drive authorized on Department of State Automated Information Systems.
  7. vulnerabilities must be remediated within ___calendar days of initial detection.
  8. The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
  9. this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
  10. The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
  1. is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
  2. The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
  3. A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
  4. Criminal organization responsable for the cyber attack against the Colonial Pipeline.
  5. A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
  6. computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
  7. ISSO duties must be performed using an ISSO ___ account.
  8. The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
  9. of ___ is an attack that prevents or impairs the authorized use of information system resources or services.

19 Clues: IRM office responsable for Cyber Operations oversight.ISSO duties must be performed using an ISSO ___ account.vulnerabilities must be remediated within ___calendar days of initial detection.Criminal organization responsable for the cyber attack against the Colonial Pipeline....

Computer fundamentals 2025-05-23

Computer fundamentals crossword puzzle
Across
  1. Machines that mimic human intelligence to perform tasks.
  2. This company is known for electric cars and autonomous driving innovations.
  3. Virtual space where people interact using digital avatars.
  4. Security field that protects networks from hackers.
  5. A search engine developed by Microsoft.
  6. A cloud storage service provided by Google.
  7. Type of file format commonly used for storing high-quality images.
  8. Wearable device used for fitness tracking and health monitoring.
  9. This programming language is widely used for AI development and is known for its simplicity.
  10. A virtual assistant developed by Apple.
  11. Fifth-generation mobile network technology faster than 4G.
Down
  1. This type of digital currency operates on blockchain technology.
  2. A software application designed to mimic human conversation and assist users online.
  3. The process of transmitting data wirelessly over a network.
  4. A social media platform known for short 280-character posts.
  5. Short videos popular on Instagram and YouTube.
  6. A mobile operating system widely used in smartphones, developed by Google.
  7. Technology that immerses users in simulated environments through headsets.
  8. The study of designing systems that allow computers to learn without being explicitly programmed.

19 Clues: A search engine developed by Microsoft.A virtual assistant developed by Apple.A cloud storage service provided by Google.Short videos popular on Instagram and YouTube.Security field that protects networks from hackers.Machines that mimic human intelligence to perform tasks.Virtual space where people interact using digital avatars....

TIK 2025-11-05

TIK crossword puzzle
Across
  1. kejahatan siber yang mengarahkan pengguna ke situs web palsu untuk mencuri informasi pribadi
  2. Teknik penipuan lewat email, telpon atau pesan teks menyamar dari lembaga sah untuk mencuri informasi pribadi.
  3. Perangkat lunak yang memata-matai aktivitas pengguna dan mengumpulkan data tanpa izin.
  4. banyaknya usaha untuk meretas, muncul otentikasi dengan metode lain yaitu otentikasi ...
  5. mengenkripsi file korban dan meminta tebusan untuk mengembalikannya
  6. catatan harian berupa video
  7. Jenis aplikasi pengolah berupa poin utama dokumen
  8. Contoh aplikasi membuat laporan perhitungan keuangan
  9. Jenis aplikasi membuat laporan yang banyak mengandung Teks
Down
  1. Catatan harian di internet
  2. mengubah data asli menjadi bentuk kode agar tidak dapat dibaca oleh pihak yang tidak berwenang.
  3. Verifikasi identitas berdasarkan ciri fisik atau perilaku seseorang
  4. keamanan informasi di internet
  5. Perangkat lunak yang membantu membantu pengguna melindungi peranti dan file dari gangguan virus
  6. Aktivitas membobol sistem komputer, menyebar virus komputer untuk mencuri data pribadi
  7. Contoh aplikasi membuat blog yang kalian gunakan saat praktik di labor
  8. Program jahat menempel pada perangkat lain, menghapus dan menyembuyikan file
  9. Layanan yang dapat digunakan untuk mempublikasi vlog
  10. Setelah melakukan perekaman video, hal selanjutnya dilakukan

19 Clues: Catatan harian di internetcatatan harian berupa videokeamanan informasi di internetJenis aplikasi pengolah berupa poin utama dokumenLayanan yang dapat digunakan untuk mempublikasi vlogContoh aplikasi membuat laporan perhitungan keuanganJenis aplikasi membuat laporan yang banyak mengandung Teks...

Defend the Money: Cybersecurity in Finance 2025-09-24

Defend the Money: Cybersecurity in Finance crossword puzzle
Across
  1. ______ attack: flooding financial systems to halt services (3)
  2. International body combatting money laundering — abbr. (4)
  3. Finance staff are vulnerable due to high ______ to process payments quickly(6)
  4. Compliance requirement: "Know Your Customer" (3)
  5. Fraudulent CEO email scam to trick finance into urgent transfers (2 words) (8)
  6. Criminals hide illicit funds via digital or shell accounts (12)
  7. Fraud involving stolen credit card data (7)
  8. Fake websites that mimic bank login portals (8)
  9. Attack technique: secretly changing account details on vendor invoices (3 words)(23)
Down
  1. Fraudulent billing scheme tricking Accounts Payable(2 words) (12)
  2. Banking network messaging system — attackers have hacked it before (9)
  3. Cybercriminals often attempt to divert these electronic payments (11)
  4. Federal regulator often mentioned in financial cybersecurity compliance (abbr., 3)
  5. Targeted spear-phishing at executives, often CFOs (7)
  6. Malware disguised as something harmless, used to steal banking credentials(2 words) (11)
  7. Attack where hackers encrypt financial records and demand crypto payment (10)

16 Clues: Fraud involving stolen credit card data (7)Fake websites that mimic bank login portals (8)Compliance requirement: "Know Your Customer" (3)Targeted spear-phishing at executives, often CFOs (7)International body combatting money laundering — abbr. (4)______ attack: flooding financial systems to halt services (3)...

IOT competetion 2024-03-19

IOT competetion crossword puzzle
Across
  1. cybersecurity strategy that approves a list of email address ip address on domain names
  2. the technology which is used to identify the object by scanning
  3. country which has more electronis and aslo gained title of world's factory.
  4. local area computer network.
Down
  1. any devices use directly by an end user to communicate.
  2. an american multinational digital communication technology that develops networking hardware and software
  3. it is used to mobile control internet of things that covers 3GGP standardised low power wide area

7 Clues: local area computer network.any devices use directly by an end user to communicate.the technology which is used to identify the object by scanningcountry which has more electronis and aslo gained title of world's factory.cybersecurity strategy that approves a list of email address ip address on domain names...

Task 7 2025-08-07

Task 7 crossword puzzle
Across
  1. A digital delivery service for software.
  2. A system which is used to detect threats from specific endpoints.
  3. Tool used for identifying and addressing vulnerabilities.
  4. Cloud computing that spreads data across multiple locations.
  5. Concept that everything can be automated.
  6. Technology that is made to not affect the environment.
  7. A system of several tools to enhance cyber security.
  8. Strategies, methods and technologies used to analyse business information.
  9. Insurance which is designed to cover legal costs and expenses from cyber attacks.
Down
  1. Computer program that learns and produces outputs.
  2. Multi step login process that uses something other than a login.
  3. A term refering to VR, AR
  4. Practice and technology to ensure security.
  5. A digital vr world made by Meta.
  6. An experience with one app from different points.
  7. A computer that uses quantum mechanics to work.

16 Clues: A term refering to VR, ARA digital vr world made by Meta.A digital delivery service for software.Concept that everything can be automated.Practice and technology to ensure security.A computer that uses quantum mechanics to work.An experience with one app from different points.Computer program that learns and produces outputs....

Unit 5 Crossword 2025-04-28

Unit 5 Crossword crossword puzzle
Across
  1. Running AI models locally on devices like smartphones without needing cloud access.
  2. AI that can create new content like images, music, or text.
  3. Python’s basic plotting library used for creating static, animated, and interactive visualizations.
  4. Google's AI framework known for deep learning and end-to-end machine learning workflows.
  5. Technology that converts spoken language into text.
  6. Open-source library used for computer vision tasks like face detection and image processing.
  7. Identifying human faces in digital images or video streams.
  8. Meta’s (Facebook's) flexible and dynamic deep learning library.
  9. Using a pre-trained AI model for a new but similar task.
Down
  1. Protection of systems and networks from digital attacks.
  2. Machine learning type where an agent learns by reward and punishment.
  3. Python library for making attractive and informative statistical graphics.
  4. Subfield of machine learning involving neural networks with many layers.

13 Clues: Technology that converts spoken language into text.Protection of systems and networks from digital attacks.Using a pre-trained AI model for a new but similar task.AI that can create new content like images, music, or text.Identifying human faces in digital images or video streams.Meta’s (Facebook's) flexible and dynamic deep learning library....

ITA EXAMPLE WORDSEARCH 2025-05-21

ITA EXAMPLE WORDSEARCH crossword puzzle
Across
  1. a popular ai chatbot that can answer questions
  2. any confirmed event that compromises the integrity, confidentiality, or availability of information
  3. flood-type attack that knocks a site offline by overwhelming it
  4. malware that encrypts files and demands payment for the key
  5. fake emails that lure you into clicking malicious links or downloading malicious files
  6. a secret string of characters that proves your identity when logging in
Down
  1. replacing a person's face or voice in a video with synthetic version or manipulation their expressions
  2. the practice of defending computer, network, and data from unauthorized access
  3. a person who breaks into system, usually maliciously
  4. a scam delivered via SMS text message
  5. QR code based phishing
  6. a network barrier that blocks out unwanted traffic
  7. two or more step login method used with a password to better secure an account

13 Clues: QR code based phishinga scam delivered via SMS text messagea popular ai chatbot that can answer questionsa network barrier that blocks out unwanted traffica person who breaks into system, usually maliciouslymalware that encrypts files and demands payment for the keyflood-type attack that knocks a site offline by overwhelming it...

HD January Crossword Puzzle 2025-12-02

HD January Crossword Puzzle crossword puzzle
Across
  1. Adhering to laws, regulations, and standards in IT practices.
  2. A software update that fixes vulnerabilities or bugs.
  3. Updating systems and processes to keep pace with technology.
  4. The time a system is operational and available.
  5. Software designed to disrupt or damage computer systems.
  6. The foundation of a strong relationship between businesses and their IT provider. Part of the "_____ Yet Verify" methodology.
  7. An unauthorized intrusion into a computer system.
  8. The day HD Tech releases their patches.
  9. The period when systems are unavailable or not functioning.
Down
  1. The ability of a system to handle growth without performance issues.
  2. A technology that delivers computing services over the internet.
  3. The practice of protecting systems and data from digital threats.
  4. A network security system that monitors and controls incoming and outgoing traffic.
  5. A copy of data stored separately to prevent loss.
  6. A method of converting data into a secure code to prevent unauthorized access.
  7. A cyberattack that tricks users into revealing sensitive information.

16 Clues: The day HD Tech releases their patches.The time a system is operational and available.A copy of data stored separately to prevent loss.An unauthorized intrusion into a computer system.A software update that fixes vulnerabilities or bugs.Software designed to disrupt or damage computer systems....

Military Careers 2025-12-05

Military Careers crossword puzzle
Across
  1. The organized movement of troops and resources to a mission location.
  2. Designing, building, and repairing structures or systems (e.g., runways, bridges).
  3. The planning and movement of supplies, equipment, and personnel.
  4. A technician who repairs and maintains vehicles and equipment.
  5. Instruction and exercises that develop skills, certifications, and readiness.
  6. Leadership structure responsible for decision-making and orders.
  7. Hub A central location where supplies and equipment are stored and distributed.
  8. Military roles related to aircraft operations, maintenance, and support.
  9. Pertaining to military operations at sea and related career roles.
  10. Support Roles that provide essential services enabling combat operations (e.g., engineering, medical, logistics).
  11. Protecting computer systems and networks from attacks.
  12. The process of returning troops and equipment home after a mission.
Down
  1. Systems and personnel who transmit information and coordinate operations.
  2. Collecting and analyzing information to support missions and decisions.
  3. Specialist A role focused on supply chain, transportation, and inventory management.
  4. — Medical personnel who treat injured service members.
  5. The act of gathering information about enemy positions or terrain.
  6. People who have served in the military.
  7. Soldiers trained to fight on foot.
  8. Operations On-site activities and tasks carried out during missions or training.

20 Clues: Soldiers trained to fight on foot.People who have served in the military.— Medical personnel who treat injured service members.Protecting computer systems and networks from attacks.A technician who repairs and maintains vehicles and equipment.The planning and movement of supplies, equipment, and personnel....

IT-OT Gap 2022-11-16

IT-OT Gap crossword puzzle
Across
  1. Susceptible to physical or cyber attacks or harm
  2. When a system has been compromised over the web or network
  3. This controls the logic of a process and runs the program
  4. The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss
  5. Two or more individuals or groups working together to accomplish a goal
  6. This is how Technicians interact with a process
Down
  1. Another term for outdated, like processes equipment in many industrial plants
  2. Person tasked to handle implementing, maintaining, and repairing computer networks.
  3. Unwilling or hesitant. Like OT is to accept change
  4. The act of being ready
  5. Unique number used to identify a computer or component on a network
  6. Should be unique and hard to guess
  7. Person in charge of others at a plant or facility
  8. The practice of employing people, policies, processes and technology to protect organizations

14 Clues: The act of being readyShould be unique and hard to guessThis is how Technicians interact with a processSusceptible to physical or cyber attacks or harmPerson in charge of others at a plant or facilityUnwilling or hesitant. Like OT is to accept changeThis controls the logic of a process and runs the program...

Kejahatan di Dunia Digital 2025-11-05

Kejahatan di Dunia Digital crossword puzzle
Across
  1. keamanan informasi di internet
  2. karakteristik biologis yang unik bagi seorang individu
  3. software yang mampu mendapatkan akses ke sistem komputer melewati security normal
  4. kegiatan yang dilakukan untuk memastikan dan mengonfirmasibahwa suatu objek itu asli
  5. kejahatan di dunia maya yang biasanya targetbdihubungi melalui surel,telepon atau pesan teksoleh seseorangbyangbmenyamar dari lembaga yang sah
  6. malware yang dapat memantau dan merekam aktivitas pengguna di komputer atau perangkat seluler
  7. perangkat lunak yang menempel pada perangkat lunak lain
Down
  1. sekelompok komputer yang memiliki virus atau malware yang dikendalikan oleh peretas melalui server pusat
  2. malware yang tampak seperti perangkat lunak jinak tetapi membawa komponen yang jahatbdi dalamnya
  3. malware yang mengeksploitasi kelemahan sistem tertentu
  4. suatu metode yang mengkodekan data sebelum dikirim melalui jaringan komputer
  5. malware yang mampu mengenkripsi file di komputer atau perangkat seluler dan menuntut pembayaran untuk mendekripsi file
  6. anti-malware
  7. usaha untuk memikat pengguna internet untuk masuk ke situs web palsu

14 Clues: anti-malwarekeamanan informasi di internetmalware yang mengeksploitasi kelemahan sistem tertentukarakteristik biologis yang unik bagi seorang individuperangkat lunak yang menempel pada perangkat lunak lainusaha untuk memikat pengguna internet untuk masuk ke situs web palsusuatu metode yang mengkodekan data sebelum dikirim melalui jaringan komputer...

Recruitment Trends in 2023 2022-12-22

Recruitment Trends in 2023 crossword puzzle
Across
  1. Working together with one or more people to complete a project or task or develop ideas or processes
  2. The range of similarities and differences each individual brings to the workplace
  3. Doing your job from any location
  4. Pay that is comparable or better than the market value of a position
  5. A focus on employee well-being
Down
  1. Protecting businesses' sensitive employee and personal data
  2. The organizational goal of keeping productive and talented workers and reducing turnover by developing a positive work environment
  3. Hiring temporary staff to work for a specific project or for a specified length of time
  4. A workplace model that mixes in-office and remote work
  5. A pool of candidates ready to fill a position
  6. A workplace where everyone feels equally involved and supported
  7. Shared values and goals of an organization

12 Clues: A focus on employee well-beingDoing your job from any locationShared values and goals of an organizationA pool of candidates ready to fill a positionA workplace model that mixes in-office and remote workProtecting businesses' sensitive employee and personal dataA workplace where everyone feels equally involved and supported...

Chapter 2 - Cybersecurity Threat Landscape 2025-09-03

Chapter 2 - Cybersecurity Threat Landscape crossword puzzle
Across
  1. ethical hacker motivated by desire to expose vulnerabilities and improve security
  2. the means that threat actors use to obtain access
  3. often the perpetrators of advanced persistent threats (APTs)
  4. unskilled attacker who uses hacking techniques but has limited skills
  5. threat intelligence gathered from publicly available sources
Down
  1. occurs when an employee, contractor, vendor, or other individuals with authorized access to information and systems
  2. attacks that exploit a previously unknown vulnerability
  3. seek to extort money or other concessions from victims by threatening to release sensitive information or launch further attacks
  4. motivated by the desire to obtain sensitive or proprietary information
  5. the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
  6. motive is simply illegal financial gain
  7. uses hacking techniques to accomplish some activist goal

12 Clues: motive is simply illegal financial gainthe means that threat actors use to obtain accessattacks that exploit a previously unknown vulnerabilityuses hacking techniques to accomplish some activist goaloften the perpetrators of advanced persistent threats (APTs)threat intelligence gathered from publicly available sources...

Software 2025-10-30

Software crossword puzzle
Across
  1. Algorithm that rearranges a collection of elements in an ascending or descending order.
  2. To divide and manage hardware resources.
  3. Allows one physical machine to run multiple OS at once.
  4. The practice of protecting systems, networks, and programs from digital attacks.
  5. Focuses on how a product looks and how users experience it.
  6. A language for accessing and managing database data.
Down
  1. A collection of code and instructions that direct computer operations.
  2. A global communication system that links together thousands of individual networks.
  3. Software that runs on a device to carry out user-defined functions.
  4. Central software that manages both a computer’s hardware and software.
  5. A theory on how much resource an algorithm takes as the input size grows larger.
  6. An attack where hackers run harmful scripts in a trusted website’s pages.

12 Clues: To divide and manage hardware resources.A language for accessing and managing database data.Allows one physical machine to run multiple OS at once.Focuses on how a product looks and how users experience it.Software that runs on a device to carry out user-defined functions.A collection of code and instructions that direct computer operations....

C.A.G.E. File 1 2020-05-07

C.A.G.E. File 1 crossword puzzle
Across
  1. In order to stay safe ________, be sure to only go to websites you trust.
  2. ________security has to do with online safety.
  3. To be a C.A.G.E. secret ____________ you must work hard and fight for good!
Down
  1. A _____ tester is an important cybersecurity job. It is also called a penetration tester.
  2. Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
  3. Microchip is the C.A.G.E. helper ___________.
  4. Agent X also goes by the name __________.
  5. A hacker might try to gain access to your computer by sending a bad link in an __________.

8 Clues: Agent X also goes by the name __________.Microchip is the C.A.G.E. helper ___________.________security has to do with online safety.In order to stay safe ________, be sure to only go to websites you trust.To be a C.A.G.E. secret ____________ you must work hard and fight for good!...

STRENGTHENING MEDIA LITERACY CROSSPUZZLE 2021-05-03

STRENGTHENING MEDIA LITERACY CROSSPUZZLE crossword puzzle
Across
  1. short text type used to communicate
  2. an electronic communication network that allows computer networks to connect to each other
  3. video and voice speech application
  4. Information technology security or electronic information security
Down
  1. it is the common name given to traditional and next-generation communication tools that provide one-way or interactive communication.
  2. A form of promotion and sharing shaped by graphic design and software languages hosted on the Internet network
  3. voice communication tool
  4. a person who provides access to systems that exploit vulnerabilities of electronic-based systems or accounts on the Internet

8 Clues: voice communication toolvideo and voice speech applicationshort text type used to communicateInformation technology security or electronic information securityan electronic communication network that allows computer networks to connect to each other...

Test 2025-01-27

Test crossword puzzle
Across
  1. What type of algorithm does my blockchain project use?
  2. What Python framework did I use to write my web financial planner app?
  3. Outside of coding I enjoy playing __________ and video game with friends.
  4. What is my github username?
Down
  1. What is the name of the top down shooter game that I made in C# and Unity?
  2. What website am I using to learn cybersecurity and do ctf's right now?
  3. In the future I want to learn more about ethical hacking and _______ computing.
  4. What company did I do my high school co-op with?

8 Clues: What is my github username?What company did I do my high school co-op with?What type of algorithm does my blockchain project use?What website am I using to learn cybersecurity and do ctf's right now?What Python framework did I use to write my web financial planner app?Outside of coding I enjoy playing __________ and video game with friends....

DELOITTE MASTERCLASS ON CYBERSECURITY & BCMS 2025-04-05

DELOITTE MASTERCLASS ON CYBERSECURITY & BCMS crossword puzzle
Across
  1. Is a security practice that involves several steps, all of which are meant to proactively prevent bad actors from taking advantage of IT vulnerabilities
  2. A software that hackers use to gain access to your system and capture sensitive information.
  3. A type of testing which a discussion-based exercise where participants respond to a hypothetical situation
  4. The B in BETH3 concept means
  5. A holistic management process that identifies disruptive threats and their impact on the organization's operations.
  6. A type of testing which a discussion-based exercise where the participants review the BCP and verify it for correctness and practicality
  7. The E in BETH3 concept means
Down
  1. A two-page document containing the organization's objectives for establishing a BCMS and the signatures of the key leaders supporting the initiative
  2. A type of testing which a simulation exercise usually involving multiple departments (rehearsals)
  3. A critical component of a BCMS because it helps an organization figure out how effective its BCMS is
  4. The T in BETH3 concept means
  5. A type of testing which an exercise where participants actually implement recovery action (e.g., move to alternate site, use backup systems, etc.)
  6. A type of phishing attacks ehich uses SMS messages or notifications to target people
  7. Is a cybercrime in which a target or targets are contacted by e-mail, telephone, or text message by someone posing as a legitimate institution to lure them into providing sensitive data
  8. A type of phishing attacks which a mash-up of 'Voice' and 'Phishing', refers to phishing done over phone calls

15 Clues: The T in BETH3 concept meansThe B in BETH3 concept meansThe E in BETH3 concept meansA type of phishing attacks ehich uses SMS messages or notifications to target peopleA software that hackers use to gain access to your system and capture sensitive information....

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Social engineers use this to trick you
  2. The practice of being diligent about your online activities
Down
  1. Assurance that information is accurate and Trustworthy
  2. Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. not disclosing information to unauthorized individuals

5 Clues: Social engineers use this to trick youAssurance that information is accurate and Trustworthynot disclosing information to unauthorized individualsThe practice of being diligent about your online activitiesEngineer Someone who takes information from many sources and uses them to piece together a bigger puzzle

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Social engineers use this to trick you
  2. The practice of being diligent about your online activities
Down
  1. Assurance that information is accurate and Trustworthy
  2. Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. not disclosing information to unauthorized individuals

5 Clues: Social engineers use this to trick youAssurance that information is accurate and Trustworthynot disclosing information to unauthorized individualsThe practice of being diligent about your online activitiesEngineer Someone who takes information from many sources and uses them to piece together a bigger puzzle

find your career? 2023-10-16

find your career? crossword puzzle
Across
  1. AI jobs chatgpt,8. Genetic engineering study,9. Data broker money
  2. Programmer comp,5. Cybersecurity sec,6. Content creator insta
  3. Healthcare health,2. Networking work,3. Geneticist doc
Down
  1. Big data engineer data sceince,14. Web developer develop
  2. Psychology mind,11. Entrepreneur business,12. Digital marketer markeiing

5 Clues: Big data engineer data sceince,14. Web developer developHealthcare health,2. Networking work,3. Geneticist docProgrammer comp,5. Cybersecurity sec,6. Content creator instaAI jobs chatgpt,8. Genetic engineering study,9. Data broker moneyPsychology mind,11. Entrepreneur business,12. Digital marketer markeiing

QUIZ 2024-12-10

QUIZ crossword puzzle
Across
  1. Protects systems,networks,and data from unauthorized access and attacks
  2. Represents information stored digitally and needs protection from breaches
Down
  1. A person who gains unauthorized access to systems or data
  2. A secret mix of letters, numbers, and symbols used to secure accounts
  3. A potential danger to systems

5 Clues: A potential danger to systemsA person who gains unauthorized access to systems or dataA secret mix of letters, numbers, and symbols used to secure accountsProtects systems,networks,and data from unauthorized access and attacksRepresents information stored digitally and needs protection from breaches

Intro to Law, Public service, and safety 2021-12-20

Intro to Law, Public service, and safety crossword puzzle
Across
  1. criminal activities that are run by groups and are carried on a large scale
  2. provides protection against threats to a users privacy and security
  3. the level that sheriff departments are on
Down
  1. security provided by a person, other than a public service, to protect or guard people
  2. the study around the nature of fire
  3. 12 people sworn to give a verdict in a legal case
  4. protects and defends the united states against foreign intelligence and enforce the criminal laws in the US
  5. to ask a higher court to review a decision by a judge
  6. taking someone's property unlawfully and by force
  7. the criminal act of deliberately setting fire to property

10 Clues: the study around the nature of firethe level that sheriff departments are on12 people sworn to give a verdict in a legal casetaking someone's property unlawfully and by forceto ask a higher court to review a decision by a judgethe criminal act of deliberately setting fire to property...

Tech 2023-06-07

Tech crossword puzzle
Across
  1. is a mobile operating system
  2. is a mapping from some domain
  3. is a method of representing data in a visual, machine-readable form.
  4. is the protection of computer systems and networks from attack by malicious actors
Down
  1. are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
  2. is the world's largest technology company by revenue
  3. is a collection of discrete values
  4. represents text, computer processor instructions, or any other data using a two-symbol system.
  5. is the most important processor in a given computer.
  6. is a hardware or software component that stores data

10 Clues: is a mobile operating systemis a mapping from some domainis a collection of discrete valuesis the world's largest technology company by revenueis the most important processor in a given computer.is a hardware or software component that stores datais a method of representing data in a visual, machine-readable form....

AI 2025-03-06

AI crossword puzzle
Across
  1. Extremely large datasets used to train AI systems and improve their decision-making.
  2. The tendency of an AI system to produce unfair outcomes due to flaws in data or algorithms
  3. AI-generated media, such as videos or images, that convincingly mimic real people or events
  4. The programs and applications that run on a computer
  5. Moral principles that govern a person’s behaviour or the conducting of an activity.
Down
  1. The physical parts of a computer
  2. Able to operate independently without human control
  3. A collection of information used to train AI systems
  4. The process of converting data into a code for security
  5. The protection of AI systems and networks from hacking and malicious attacks

10 Clues: The physical parts of a computerAble to operate independently without human controlA collection of information used to train AI systemsThe programs and applications that run on a computerThe process of converting data into a code for securityThe protection of AI systems and networks from hacking and malicious attacks...

BRA PUZZLE 2025-05-30

BRA PUZZLE crossword puzzle
Across
  1. the state of being protected against the criminal or unauthorized use of electronic data
  2. the potential for any event or circumstance to hinder the achievement of any set goal/target.
  3. the ability of individuals to control access to their personal information and to be free from interference or intrusion.
  4. being honest and consistently upholding strong moral and ethical principles.
  5. being responsible for your actions and their consequences.
Down
  1. to look over or check for possible errors or omissions
  2. one of the 4 pillars of a tax administration
  3. the practice of keeping information private
  4. principles or standards of behavior
  5. Control activity that prevents, corrects or detects errors to mitigate or lessen risks

10 Clues: principles or standards of behaviorthe practice of keeping information privateone of the 4 pillars of a tax administrationto look over or check for possible errors or omissionsbeing responsible for your actions and their consequences.being honest and consistently upholding strong moral and ethical principles....

Technology 2025-03-27

Technology crossword puzzle
Across
  1. The machines and programs we use to make our lives easier (5 letters)
  2. The positive change technology brings to how we live (10 letters)
  3. A system that allows data to be stored and accessed online (5 letters)
  4. The harm caused by too much e-waste and pollution (10 letters)
  5. This connects people through the internet (10 letters)
  6. The feeling of being attached to your devices and not wanting to disconnect (8 letters)
Down
  1. Technology used for entertainment, like games and movies (7 letters)
  2. Technology that helps protect people's personal information (12 letters)
  3. Technology used to make tasks faster and more efficient (7 letters)
  4. The feeling of being alone due to too much screen time (9 letters)
  5. The use of robots to do jobs (9 letters)

11 Clues: The use of robots to do jobs (9 letters)This connects people through the internet (10 letters)The harm caused by too much e-waste and pollution (10 letters)The positive change technology brings to how we live (10 letters)The feeling of being alone due to too much screen time (9 letters)...

CIS 178 Participation Cybersecurity Joseph Certuche 2023-07-13

CIS 178 Participation Cybersecurity Joseph Certuche crossword puzzle
Across
  1. short for malicious
  2. act of listening in
  3. duplicate copy of data
  4. to describe any fraudulent business
  5. screen out hackers, viruses, and worms
  6. humans can get it too.
  7. monitors a victim's online activity
  8. to ensure and confirm identity
  9. decoy system to attract attackers
  10. overlay on a legitimate page
  11. software program that montitors computer
  12. capture keystrokes
Down
  1. high-profile business attack
  2. Generates revenue for its developer
  3. face swapped or digitally altered
  4. online advertising to deliver malware
  5. technique for acquiring sensitive data
  6. error, fault or flaw
  7. type of malicious software
  8. flaw in the system
  9. encyption technology

21 Clues: flaw in the systemcapture keystrokesshort for maliciousact of listening inerror, fault or flawencyption technologyduplicate copy of datahumans can get it too.type of malicious softwarehigh-profile business attackoverlay on a legitimate pageto ensure and confirm identityface swapped or digitally altereddecoy system to attract attackers...

Jo-Jo's Cybersecurity Term Crossword Puzzle 2025-03-14

Jo-Jo's Cybersecurity Term Crossword Puzzle crossword puzzle
Across
  1. Everyone can use to encrypt
  2. Authentication with physical traits
  3. Accesses systems with technical skills
  4. Counting system with two digits
  5. Key aspect in scam tactics
  6. Malicious computer code/software
  7. Input, process, output, storage device
  8. Malware disguised as benign program
  9. Filters data for network security
Down
  1. System of infected computers
  2. Remote systems over the internet
  3. Phishing using text messages
  4. Secret code to decrypt data
  5. Network not accessible by public
  6. Network accessible by anyone, anywhere
  7. Malware that demands payment
  8. Connects home network to internet
  9. A way to secure data
  10. Authentication using multiple types
  11. Converts digital data into analog
  12. Simulate human intelligence

21 Clues: A way to secure dataKey aspect in scam tacticsEveryone can use to encryptSecret code to decrypt dataSimulate human intelligenceSystem of infected computersPhishing using text messagesMalware that demands paymentCounting system with two digitsRemote systems over the internetNetwork not accessible by publicMalicious computer code/software...

Data, Algorithms, Cybersecurity, and Global Impacts 2025-04-25

Data, Algorithms, Cybersecurity, and Global Impacts crossword puzzle
Across
  1. An asymmetric encryption system where a different key is used for encryption and decryption.
  2. Information about an individual that identifies, links, relates, or describes them.
  3. Decision problem for which an algorithm can be written to produce a correct output for all inputs.
  4. An algorithm that searches a sorted list for a value by repeatedly splitting the list in half until the value is found or all elements have been eliminated.
  5. A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer.
  6. Finite set of instructions that accomplish a specific task.
  7. Data about data.
  8. Problem with the goal of finding the "best" solution among many.
  9. Computer programs that can block, detect, and remove virus and other malware.
  10. A broad term for datasets so large or complex that traditional data processing applications are inadequate.
  11. A scheme in which the key to encrypt data is different from the key to decrypt.
  12. A technique for encrypting data where the same key is used to both encrypt and decrypt data.
  13. A method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
  14. The time used to complete a task sequentially divided by the time to complete a task in parallel.
  15. Copyrighted software that is given for free by the author or copyright owner.
  16. An algorithm that iterates through each item in a list until it finds the target value or all elements have been checked.
  17. A model in which programs are run by multiple devices.
  18. A process that reverses encryption, taking a secret message and reproducing the original plain text.
  19. A model in which programs run in order, one command at a time.
  20. The act of attempting to decode a secret message without knowing all the specifics of the cipher.
  21. A technique that attempts to trick a user into providing personal information.
  22. An application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
  23. In a worst case scenario, the number of steps of an algorithm has a exponential or factorial efficiency.
  24. A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
Down
  1. General description of a task that can (or cannot) be solved with an algorithm.
  2. Data that does not accurately reflect the full population or phenomenon being studied.
  3. A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
  4. Application of each step of an algorithm in the order in which the code statements are given.
  5. A measure of how many steps are needed to complete an algorithm.
  6. Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
  7. Software intended to damage a computing system or to take partial control over its operation.
  8. In a worst case scenario, the number of steps of an algorithm has a polynomial efficiency or lower (constant, linear, square, cube, etc.)
  9. An innovation that includes a computer or program code as an integral part of its functionality. Examples: self-driving car, picture editing software, e-commerce
  10. Problem with a yes/no answer.
  11. A process of encoding messages to keep them secret, so only "authorized" parties can read it.
  12. Data that can be freely used, re-used and redistributed by anyone.
  13. A model in which programs are broken into small pieces, some of which are run simultaneously.
  14. Choosing a smaller subset of a data set to use for analysis, for example by eliminating/keeping only certain rows in a table.
  15. Scientific research conducted in whole or part by distributed individuals (not always scientists) who contribute relevant data to research using their own computing devices.
  16. A relationship between two pieces of data.
  17. The practice of obtaining input or information from a large number of people via the Internet.
  18. Occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions due to its design or use.
  19. Process that makes the data uniform without changing its meaning.
  20. A malicious program that can copy itself and gain access to a computer in an unauthorized way.

44 Clues: Data about data.Problem with a yes/no answer.A relationship between two pieces of data.A model in which programs are run by multiple devices.Finite set of instructions that accomplish a specific task.A model in which programs run in order, one command at a time.A measure of how many steps are needed to complete an algorithm....

cybersecurity by richard f 2dt1-1 2025-12-04

cybersecurity by richard f 2dt1-1 crossword puzzle
Across
  1. Cilvēks, kas sargā ēku
  2. Aizsardzība internetā
  3. numurs, kas identificē ierīci tīklā
  4. Metāla aizsargs logiem vai durvīm
  5. Datu glabāšanas vieta internetā
  6. Ierīce brīdināšanai par apdraudējumu
  7. Kustības detektors
  8. Pārbaude ar pirkstu/seju
  9. Process, as nosaka, kam ļauts un kam ne
  10. Skaitļu kombinācija
  11. Datu aizsardzība
  12. Lai pieteiktos savā kontā, jums vajag ievadīt login un...
  13. Sistēma ieejas kontrolei
  14. Informācija elektroniskā formā
Down
  1. Ierīce, kas pārbauda, vai tu drīksti tur atrasties
  2. Vieta, kur tiek pierakstīts, kas ir ienācis un izgājis
  3. Durvju mehānisms
  4. Dokuments ar drošības noteikumiem un soļiem
  5. Kameru novērošana
  6. Drošības noteikumi
  7. Persona, kas ielaužas sistēmās
  8. Stingri aizsargāts glabāšanas objekts
  9. Telpa, kur glabājas uzņēmuma "sirds"
  10. Datu kopija
  11. Programma, kas kaitē datoram

25 Clues: Datu kopijaDurvju mehānismsDatu aizsardzībaKameru novērošanaDrošības noteikumiKustības detektorsSkaitļu kombinācijaAizsardzība internetāCilvēks, kas sargā ēkuPārbaude ar pirkstu/sejuSistēma ieejas kontroleiProgramma, kas kaitē datoramPersona, kas ielaužas sistēmāsInformācija elektroniskā formāDatu glabāšanas vieta internetā...

Kaien 8Gamma 2023-01-19

Kaien 8Gamma crossword puzzle
Across
  1. it is created when that data has been processed and becomes meaningful.
  2. a secret word that must be used to gain admission to a place.
  3. number a number that you dial on the telephone to reach a particular person, business, and more.
  4. media a collective term of website that focus on communication and more.
  5. a panel of keys that operate a computer or typewriter.
Down
  1. it is the practice of protecting system, networks, and programs from digital attacks.
  2. a device where people use to communicate when ever they want.
  3. a social media that was created by Mark Zuckerberg.
  4. a app that you could search anything.
  5. it is the raw facts and figures.

10 Clues: it is the raw facts and figures.a app that you could search anything.a social media that was created by Mark Zuckerberg.a panel of keys that operate a computer or typewriter.a device where people use to communicate when ever they want.a secret word that must be used to gain admission to a place....

Info Security 2025-09-10

Info Security crossword puzzle
Across
  1. Proactive promise to mitigate cyber risks.
  2. Digital protection against online threats.
  3. software intentionally designed to cause damage to a computer, server, or network.
  4. a potential danger or a malicious actor who could exploit a vulnerability to cause harm
  5. A technology that creates a secure, encrypted connection over a less secure network like the internet
Down
  1. The process of scrambling data to make it unreadable without a key
  2. process of verifying a user's identity
  3. A social engineering attack that uses fraudulent emails or messages to trick people into revealing sensitive information
  4. ensure that a business can continue to operate and deliver essential products or services
  5. A network security system that monitors and controls incoming and outgoing network traffic

10 Clues: process of verifying a user's identityProactive promise to mitigate cyber risks.Digital protection against online threats.The process of scrambling data to make it unreadable without a keysoftware intentionally designed to cause damage to a computer, server, or network....

Cybersecurity and Common Online Threats 2025-10-14

Cybersecurity and Common Online Threats crossword puzzle
Across
  1. A weakness that can be exploited by cybercriminals
  2. Engineering A manipulation technique that tricks people into giving away confidential information.
  3. The practice of protecting computers, networks, and data from digital attacks or unauthorized access.
  4. A kind of malware that locks your files and demands payment to unlock them.
  5. The process of converting information into a secure code to prevent unauthorized access.
  6. A type of scam where someone pretends to be trustworthy to steal personal information.
Down
  1. Software designed to harm or disrupt computers or steal data.
  2. The quality of being real or genuine.
  3. Software that secretly tracks your online activity or gathers personal data.
  4. To weaken or harm something, especially security or privacy.

10 Clues: The quality of being real or genuine.A weakness that can be exploited by cybercriminalsTo weaken or harm something, especially security or privacy.Software designed to harm or disrupt computers or steal data.A kind of malware that locks your files and demands payment to unlock them....

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new office
  2. What FC company raised $155 million in 2018 and expanded into Europe?
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. The conference Joanne and Steve spoke at in 2018
  5. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  6. The New York Times said this company will emerge as the leading residential solar installer in the US
Down
  1. Foundation led this meditation company's series A
  2. On-demand vet service in the FC portfolio
  3. Foundation's newest unicorn
  4. Bolt Thread's first fabric is made by

10 Clues: Foundation's newest unicornThe street name of FC's new officeBolt Thread's first fabric is made byOn-demand vet service in the FC portfolioThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

Cyber attack crossword puzzle 2023-09-03

Cyber attack crossword puzzle crossword puzzle
Across
  1. A secret word or phrase used to gain access to your accounts.
  2. Criminal activities carried out using computers or the internet.
  3. A security barrier that filters network traffic to prevent unauthorized access.
  4. A set of rules and practices for ensuring the security of computer systems and data.
  5. A fake email or website that tricks individuals into revealing sensitive information.
Down
  1. The unauthorized access, theft, or manipulation of data.
  2. Malicious software specifically designed to harm, infiltrate, or compromise computer systems.
  3. A malicious software that can encrypt files and demand a ransom for their release.
  4. An organization or individual responsible for securing computer systems and networks.
  5. A program designed to protect a computer from viruses and malware.

10 Clues: The unauthorized access, theft, or manipulation of data.A secret word or phrase used to gain access to your accounts.Criminal activities carried out using computers or the internet.A program designed to protect a computer from viruses and malware.A security barrier that filters network traffic to prevent unauthorized access....

Edition Puzzle 2 2024-01-02

Edition Puzzle 2 crossword puzzle
Across
  1. Refers to an interconnected and intelligent energy network
  2. A crucial field ensuring the safety and integrity of digital energy systems
  3. Method using complex algorithms for managing and optimizing energy systems
  4. The range of energy sources used within a particular system or economy
  5. Pricing mechanism adjusting prices based on immediate supply and demand
  6. Critical for balancing supply and demand in a grid increasingly reliant on renewable sources
Down
  1. The loss of energy as electricity is transmitted over long distances
  2. A system that pays for reliable sources of energy to ensure grid stability
  3. Deliberate shutdown of electric power in parts of a system to prevent total failure
  4. Describes a type of decentralized communications model in energy transactions

10 Clues: Refers to an interconnected and intelligent energy networkThe loss of energy as electricity is transmitted over long distancesThe range of energy sources used within a particular system or economyPricing mechanism adjusting prices based on immediate supply and demandA system that pays for reliable sources of energy to ensure grid stability...

SOCIETY 4 2024-07-02

SOCIETY 4 crossword puzzle
Across
  1. Software designed to perform a specific task, often more distracting than useful.
  2. The practice of protecting systems from cyber attacks, frequently failing.
  3. A digital version of a book, ensuring you never run out of things to read and ignore.
  4. A video blog, combining the narcissism of a blog with the vanity of a selfie.
  5. A small mechanical device, designed to make life easier but often complicating it.
Down
  1. The buying and selling of goods online, often leading to buyer’s remorse.
  2. A self-portrait photograph, taken to boost one’s self-esteem.
  3. A mobile device that makes people dumber.
  4. A simulated experience, preferred over actual reality.
  5. A personal website for sharing opinions, read primarily by the author's family.

10 Clues: A mobile device that makes people dumber.A simulated experience, preferred over actual reality.A self-portrait photograph, taken to boost one’s self-esteem.The buying and selling of goods online, often leading to buyer’s remorse.The practice of protecting systems from cyber attacks, frequently failing....

Cyber/Digital Literacy 2024-11-06

Cyber/Digital Literacy crossword puzzle
Across
  1. Type of crime that uses computers or networks harm.
  2. It is use protect your personal information
  3. It has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness
  4. Type of malware that can make copies of itself and spread automatically across computers in a network.
  5. typing targeted keywords about a subject into a search engine.
Down
  1. Bullying that takes place online using your smartphone, tablet and computer
  2. Who's actively participate in cyberspace and the online community offered through the internet
  3. An example of computer virus
  4. Refers to the trail of data you leave when using the internet.
  5. Assessing the credibility, reliability, and relevance of the information found online.

10 Clues: An example of computer virusIt is use protect your personal informationType of crime that uses computers or networks harm.Refers to the trail of data you leave when using the internet.typing targeted keywords about a subject into a search engine.Bullying that takes place online using your smartphone, tablet and computer...

We Grow: Learning Week - Crossword Conquest! 2025-02-11

We Grow: Learning Week - Crossword Conquest! crossword puzzle
Across
  1. The ability to inspire and motivate others (10 letters)
  2. The act of working together towards a common goal (11 letters)
  3. A plan for achieving long-term goals (8 letters)
  4. A version control system widely used for tracking changes in source code (3 letters)
  5. A programming language known for its simplicity and readability (6 letters)
Down
  1. A person who guides and supports others (6 letters)
  2. A popular operating system used in servers and desktops (5 letters)
  3. The ability to understand and share the feelings of another (10 letters)
  4. The practice of protecting systems, networks, and programs from digital attacks (10 letters)
  5. The process of improving your skills and knowledge to advance in your career (10 letters)

10 Clues: A plan for achieving long-term goals (8 letters)A person who guides and supports others (6 letters)The ability to inspire and motivate others (10 letters)The act of working together towards a common goal (11 letters)A popular operating system used in servers and desktops (5 letters)...

CyberScho 2025-06-18

CyberScho crossword puzzle
Across
  1. The introduction of new ideas, methods, or devices to improve something or create something original.
  2. The point where humans and machines meet—think screen, keyboard, or touchpad.
  3. The digital shield that protects your data and devices online.
  4. What you do to build a robot—piece by piece, part by part.
Down
  1. Part of the school’s theme for S.Y. 2025-2026
  2. CyberScho’s very own robot buddy!
  3. The process of converting data into a coded form to prevent unauthorized access.
  4. A cyber threat that that tries to harm your computer or steal your info.
  5. The branch of technology that deals with the design, construction, operation, and application of robots.
  6. What powers our modern world, from smartphones to smart classrooms.

10 Clues: CyberScho’s very own robot buddy!Part of the school’s theme for S.Y. 2025-2026What you do to build a robot—piece by piece, part by part.The digital shield that protects your data and devices online.What powers our modern world, from smartphones to smart classrooms.A cyber threat that that tries to harm your computer or steal your info....

Internet Safety 2025-10-06

Internet Safety crossword puzzle
Across
  1. Details like your name, address, phone number, or passwords
  2. Knowing how to find, evaluate, and use digital information safely
  3. The personal trail of info you leave behind when using the internet
  4. Protecting networks, devices, and data from attacks or damage
  5. Controls that help you decide who can see your posts or account info
  6. A second security step that confirms your identity, like a code sent to your phone
Down
  1. The version of yourself you create or share online
  2. An online message or email meant to trick you into sharing private data
  3. When private information is accessed or stolen without permission
  4. How others view you based on what they see about you online

10 Clues: The version of yourself you create or share onlineDetails like your name, address, phone number, or passwordsHow others view you based on what they see about you onlineProtecting networks, devices, and data from attacks or damageKnowing how to find, evaluate, and use digital information safely...

CIS101 Cybersecurity Questions by Cale Therault 2025-06-04

CIS101 Cybersecurity Questions by Cale Therault crossword puzzle
Across
  1. A technology that creates a secure, encrypted connection over a less secure network, such as the internet.
  2. The process of identifying, analyzing, and evaluating potential risks to a system.
  3. A method of authentication that require two or more methods to gain access.
  4. Unsolicited or undesired electronic messages, typically email.
  5. The practice and study of techniques for secure communication in the presence of adversaries.
  6. The process of verifying the identity of a user or system.
  7. A socially engineered cyberattack where an attacker attempts to trick individuals into revealing sensitive information, often through deceptive emails or websites.
  8. Software designed to detect, prevent, and remove malicious software.
  9. An incident where unauthorized access to data or systems occurs.
  10. Short for malicious software.
  11. A software update released to fix vulnerabilities and bugs.
Down
  1. A cyber attack made from numerous compromised computer systems.
  2. An attempt to disrupt, damage, or gain unauthorized access to various computer systems.
  3. The process of converting data into code, especially to prevent unauthorized access.
  4. Making full use of and/or derive benefit from a resource.
  5. A weakness or flaw in a system that can be exploited by a threat.
  6. A type of malware that maliciously encrypts files and demands money for release.
  7. A potential danger that might exploit a vulnerability to breach security.
  8. A type of malicious software that attaches itself to legitimate programs and spreads to other computers.
  9. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

20 Clues: Short for malicious software.Making full use of and/or derive benefit from a resource.The process of verifying the identity of a user or system.A software update released to fix vulnerabilities and bugs.Unsolicited or undesired electronic messages, typically email.A cyber attack made from numerous compromised computer systems....

FC Times Crossword 2019-02-15

FC Times Crossword crossword puzzle
Across
  1. Rodolfo's home country
  2. The street name of FC's new office
  3. Foundation led this meditation company's series A
  4. Foundation's newest unicorn
Down
  1. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  2. The conference Joanne and Steve spoke at in 2018
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. The New York Times said this company will emerge as the leading residential solar installer in the US

8 Clues: Rodolfo's home countryFoundation's newest unicornThe street name of FC's new officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AThis NYC-based insurance startup was named a CNBC Upstart 100 company in 2018...

Technology 2023-01-30

Technology crossword puzzle
Across
  1. an act of transferring something such files from a usually large computer to the memory of another device
  2. a technique such as the combining of sound, video, and text for expressing ideas
  3. not physically existing as such but made by software to appear to do so
  4. the state of being protected against the criminal or unauthorized use of electronic data
Down
  1. a device for introducing fresh air or expelling foul or stagnant air
  2. a thing made for a particular purpose
  3. operating by means of transmitted electromagnetic waves
  4. an area or window on a computer screen

8 Clues: a thing made for a particular purposean area or window on a computer screenoperating by means of transmitted electromagnetic wavesa device for introducing fresh air or expelling foul or stagnant airnot physically existing as such but made by software to appear to do soa technique such as the combining of sound, video, and text for expressing ideas...

C.A.G.E. File 1 2020-05-07

C.A.G.E. File 1 crossword puzzle
Across
  1. Microchip is the C.A.G.E. helper ___________.
  2. Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
  3. Agent X also goes by the name __________.
  4. In order to stay safe ________, be sure to only go to websites you trust.
Down
  1. To be a C.A.G.E. secret ____________ you must work hard and fight for good!
  2. ________security has to do with online safety.
  3. A hacker might try to gain access to your computer by sending a bad link in an __________.
  4. A _____ tester is an important cybersecurity job. It is also called a penetration tester.

8 Clues: Agent X also goes by the name __________.Microchip is the C.A.G.E. helper ___________.________security has to do with online safety.In order to stay safe ________, be sure to only go to websites you trust.To be a C.A.G.E. secret ____________ you must work hard and fight for good!...

C.A.G.E. File 1 2020-05-07

C.A.G.E. File 1 crossword puzzle
Across
  1. Microchip is the C.A.G.E. helper ___________.
  2. Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
  3. To be a C.A.G.E. secret ____________ you must work hard and fight for good!
  4. In order to stay safe ________, be sure to only go to websites you trust.
Down
  1. ________security has to do with online safety.
  2. Agent X also goes by the name __________.
  3. A hacker might try to gain access to your computer by sending a bad link in an __________.
  4. A _____ tester is an important cybersecurity job. It is also called a penetration tester.

8 Clues: Agent X also goes by the name __________.Microchip is the C.A.G.E. helper ___________.________security has to do with online safety.In order to stay safe ________, be sure to only go to websites you trust.To be a C.A.G.E. secret ____________ you must work hard and fight for good!...

Cyber Security keywords 2024-06-07

Cyber Security keywords crossword puzzle
Across
  1. When a person calls you with a made up story to get personal information
  2. Software that secretly tracks what you do
  3. When an unauthorised user gains access to your account
  4. Software that disguises itself as something legitimate
  5. Software that copies itself over and over when it infects your device
Down
  1. The way we protect our devices and data online is known as
  2. When you receive an email from an unknown person telling you a story and asking for personal information
  3. Software designed to cause harm to a computer and its files

8 Clues: Software that secretly tracks what you doWhen an unauthorised user gains access to your accountSoftware that disguises itself as something legitimateThe way we protect our devices and data online is known asSoftware designed to cause harm to a computer and its filesSoftware that copies itself over and over when it infects your device...

Cyberspace 2025-10-16

Cyberspace crossword puzzle
Across
  1. a hypothetical moment in time when AI and other technologies have become so advanced that humanity undergoes a dramatic change
  2. the application of scientific knowledge for practical purposes, especially in industry
  3. a new method, idea, or product
  4. art of protecting networks, devices, and data from unauthorized access or criminal use
Down
  1. the perception or knowledge of something
  2. an integrated set of components for collecting, storing, and processing data
  3. the ability to learn or understand or to deal with new or trying situations
  4. Science the interdiscplinary field that involves extracting meaningful insights

8 Clues: a new method, idea, or productthe perception or knowledge of somethingthe ability to learn or understand or to deal with new or trying situationsan integrated set of components for collecting, storing, and processing dataScience the interdiscplinary field that involves extracting meaningful insights...

Malware Monthly March 2022 2022-04-08

Malware Monthly March 2022 crossword puzzle
Across
  1. Despite reports, LAPSUS$ never actually used this type of malware
  2. Ransomware deletes Volume ______ copies, preventing user recovery of encrypted files.
  3. Government agency who reported 52 infrastructure organizations had been attacked
  4. Another name for HermeticRansom
  5. United States Agency concerned with cybersecurity
  6. Microsoft product affected by the CVE-2017-11882 vulnerability
  7. Percent of phishing links clicked on by only 4% of employees.
  8. Uses the ransomware extension dihlxbl
  9. A communication app rarely used by cybercriminals, but heavily used by LAPSUS$
  10. Top Ransomware Family of February 2022
Down
  1. A malware group targeting Ukraine with phishing attacks
  2. Ransomware family that threatend to publish stolen data on a "Wall of Shame"
  3. The age of the LAPSUS$ ringleader who was arrested in the UK
  4. These types of attacks will likely plead for bogus charity donations
  5. Most malware events revolve around the 3% of users who suffered from ___ or more malware events.
  6. How many thousands of Ukranian currency is offered by Formbook in their phishing e-mail
  7. Ensuring all employees have the correct access priviledges
  8. How many, out of five, employees NEVER click on phishing links.

18 Clues: Another name for HermeticRansomUses the ransomware extension dihlxblTop Ransomware Family of February 2022United States Agency concerned with cybersecurityA malware group targeting Ukraine with phishing attacksEnsuring all employees have the correct access priviledgesThe age of the LAPSUS$ ringleader who was arrested in the UK...

CBDCs are they a good idea. 2024-02-08

CBDCs are they a good idea. crossword puzzle
Across
  1. (4)a financial institution that is licensed to accept checking and savings deposits and make loans
  2. (13)credential Des (anag)
  3. (5)country situated in eastern Asia on the western shore of the Pacific Ocean, with an area of 9.6 million square kilometers.
  4. (7)she cark (anag)
  5. (6)a digital currency, such as Bitcoin, that is used as an alternative payment method or specula
  6. (8,9)federal agency
  7. (8)the ability to make your own decisions without being controlled by anyone else
  8. (7)island country of the West Indies Capital is Kingston.
  9. (4)information (syn)
Down
  1. (5,8)the practice of protecting systems, networks, and programs from digital attacks
  2. (8)acquisition (syn)
  3. (10)of or relating to the control or direction of an activity by a set of rules, laws, etc.
  4. (7)computerised (syn)
  5. (8)legal tender
  6. (7,2,6)confiscation of property by the authorities
  7. (9)surmount. surpass (rule of law)
  8. (4)a currency not backed by a commodity and typically authorised by the issuing government to be legal tender.
  9. (1,1,1,1) Central Bank digital currency

18 Clues: (8)legal tender(7)she cark (anag)(8,9)federal agency(8)acquisition (syn)(4)information (syn)(7)computerised (syn)(13)credential Des (anag)(9)surmount. surpass (rule of law)(1,1,1,1) Central Bank digital currency(7,2,6)confiscation of property by the authorities(7)island country of the West Indies Capital is Kingston....

Netowork Puzzle 101 2020-12-04

Netowork Puzzle 101 crossword puzzle
Across
  1. method of exchanging messages online
  2. field of work that prevents hackers
Down
  1. connection that allows peers to connect together
  2. Affected HCC type of attack uses emails

4 Clues: field of work that prevents hackersmethod of exchanging messages onlineAffected HCC type of attack uses emailsconnection that allows peers to connect together