cybersecurity Crossword Puzzles

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Social engineers use this to trick you
  2. The practice of being diligent about your online activities
Down
  1. Assurance that information is accurate and Trustworthy
  2. Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. not disclosing information to unauthorized individuals

5 Clues: Social engineers use this to trick youAssurance that information is accurate and Trustworthynot disclosing information to unauthorized individualsThe practice of being diligent about your online activitiesEngineer Someone who takes information from many sources and uses them to piece together a bigger puzzle

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. PSB Academy’s branch for training students in life sciences, sport science, engineering and cybersecurity.
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  5. First part of SC’s mission - provide (someone or something) the means to do something.
  6. IES, IET, IPRS
  7. First part of student life’s tagline
Down
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. From radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of student life’s tagline
  5. Second part of SC’s mission - participate or become involved in.
  6. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of SC’s mission - participate or become involved in.
  5. Third part of SC’s mission - give (someone) the power or drive to do something.
  6. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  7. Second part of student life’s tagline
  8. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
  1. IES, IET, IPRS
  2. SC, CSC, Dance Club, Music Club, Photog, SAC
  3. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  4. First part of SC’s mission - provide (someone or something) the means to do something.
  5. First part of student life’s tagline

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. IES, IET, IPRS
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. SC initiated, amazing three-times a year, event
  5. First part of SC’s mission - provide (someone or something) the means to do something.
Down
  1. First part of student life’s tagline
  2. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  3. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  4. Second part of student life’s tagline
  5. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  6. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  7. Keep it lit!
  8. Second part of SC’s mission - participate or become involved in.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASC initiated, amazing three-times a year, eventSecond part of SC’s mission - participate or become involved in....

ccf 2020-06-24

ccf crossword puzzle
Across
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. From radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of SC’s mission - participate or become involved in.
  5. Third part of SC’s mission - give (someone) the power or drive to do something.
  6. PSB Academy’s branch for training students in life sciences, sport science, engineering and cybersecurity.
  7. Second part of STA’s tagline
  8. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
  1. IES, IET, IPRS
  2. SC, CSC, Dance Club, Music Club, Photog, SAC
  3. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  4. First part of SC’s mission - provide (someone or something) the means to do something.
  5. First part of STA’s tagline

13 Clues: Keep it lit!IES, IET, IPRSFirst part of STA’s taglineSecond part of STA’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

Computers and Technology 2023-09-14

Computers and Technology crossword puzzle
Across
  1. A machine that can be programmed to perform tasks automatically.
  2. A portable device with a touchscreen, like an iPad.
  3. Media Online platforms where people can connect, share, and communicate.
  4. An online page or site where you can find information, like social media.
  5. Reality A technology that immerses you in a computer-generated 3D environment.
  6. Game Electronic games played on a computer or gaming console.
  7. A mobile phone that can also connect to the internet and run apps.
  8. Protecting computer systems and data from theft or damage.
Down
  1. The physical components of a computer, like the keyboard and screen.
  2. Programs and applications that run on a computer or device.
  3. Creating new ideas, products, or technologies to improve
  4. Electronic messages sent and received through the internet.
  5. A machine that processes information and performs tasks, like a PC or laptop.
  6. A global network that connects computers and allows you to access information.
  7. Writing instructions for computers to create software and websites.

15 Clues: A portable device with a touchscreen, like an iPad.Creating new ideas, products, or technologies to improveProtecting computer systems and data from theft or damage.Programs and applications that run on a computer or device.Electronic messages sent and received through the internet.Game Electronic games played on a computer or gaming console....

iSEC Dimensions, CrossWord 2024-12-08

iSEC Dimensions, CrossWord crossword puzzle
Across
  1. CPRA, DPDPA, GDPR all these regulations ensure.
  2. Attack where malicious user can use the cloud to mine cryptocurrency.
  3. A cyberattack that floods a network to make it unavailable.
  4. A service that continuously evaluates the security of cloud services and recommends improvements.
  5. The process of restoring data and systems after an attack or failure.
  6. The process of verifying the identity of a user or system.
  7. A framework for managing organizational risks.
  8. Risk management approach that accepts certain risks rather than taking actions.
Down
  1. A system used to monitor and control network traffic.
  2. The process of ensuring access control in the cloud enviorment using tokens or certificates.
  3. An attack where malicious actors exploit poorly configured cloud storage.
  4. A software tool designed to detect and safeguard from malicious software.
  5. Red team and Blue team are integral part of.
  6. The ability to recover data after loss or damage, typically in a cloud environment.
  7. Objective of GDPR is to safeguard.

15 Clues: Objective of GDPR is to safeguard.Red team and Blue team are integral part of.A framework for managing organizational risks.CPRA, DPDPA, GDPR all these regulations ensure.A system used to monitor and control network traffic.The process of verifying the identity of a user or system.A cyberattack that floods a network to make it unavailable....

Cyber Security 2025-01-27

Cyber Security crossword puzzle
Across
  1. - A cryptographic tool used to validate the authenticity of digital messages or documents
  2. - The primary legislation in India dealing with cybercrime and electronic commerce (abbreviation)
  3. - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  4. - The use of the internet to conduct violent acts that threaten or harm individuals or governments
  5. - Section of the IT Act that deals with computer-related offenses
  6. - The process of collecting and analyzing data from computer systems for legal evidence
  7. - The fraudulent use of someone else's personal information
  8. - A special police unit in India dedicated to investigating cybercrimes
Down
  1. - The use of IT to deliver government services and information to citizens
  2. - Safeguarding important information from corruption, compromise, or loss
  3. - The process of converting information into a code to prevent unauthorized access
  4. - Unauthorized access to computer systems or networks
  5. - Sending unsolicited messages, often in bulk, via electronic means
  6. - An entity that issues digital certificates for secure online transactions
  7. - The practice of protecting systems, networks, and programs from digital attacks

15 Clues: - Unauthorized access to computer systems or networks- The fraudulent use of someone else's personal information- Section of the IT Act that deals with computer-related offenses- Sending unsolicited messages, often in bulk, via electronic means- A special police unit in India dedicated to investigating cybercrimes...

Scientific terms 2024-09-25

Scientific terms crossword puzzle
Across
  1. The study of the nervous system.
  2. The practice of protecting computer systems and networks from cyberattacks.
  3. Intelligence The simulation of human intelligence in machines that can learn and solve problems.
  4. The application of computer science to biology, especially in the analysis of biological data.
  5. The study of genes and heredity.
  6. The complete set of genetic material of an organism.
  7. A well-substantiated explanation of an aspect of the natural world based on observation, experimentation, and reasoning.
Down
  1. The study of the physics of the universe.
  2. A proposed explanation for a phenomenon that can be tested through experimentation
  3. The design of products and processes inspired by nature.
  4. The design and construction of robots, often used to automate tasks.
  5. A set of rules or instructions to solve a problem or perform a task.
  6. The manipulation of matter on an atomic and molecular scale.
  7. The brain's ability to change and adapt throughout life.
  8. The use of living organisms to create products or processes.

15 Clues: The study of the nervous system.The study of genes and heredity.The study of the physics of the universe.The complete set of genetic material of an organism.The design of products and processes inspired by nature.The brain's ability to change and adapt throughout life.The manipulation of matter on an atomic and molecular scale....

IT Insights 2023-10-25

IT Insights crossword puzzle
Across
  1. Electronic letters you send and receive through the Internet
  2. Acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
  3. Aerial term used to describe online data storage
  4. Team name used for St. Clair College athletic teams
  5. This device has rules to control the flow of data into and out of a network
  6. Branch of IT responsible for protecting networks and data from external attack
  7. Where you can find your course materials, and collaborate with your instructor
  8. A program that you use to access websites on the Internet
  9. Harmful software that can infect your computer and cause problems
Down
  1. St. Clair College emblem
  2. A web site where you can ask a question and it provides matches(ie. Google, Bing)
  3. A global network of connected computers where you can find information, watch videos, and communicate with others
  4. Where you can find your student timetable, transcript, etc.(abbrev.)
  5. Term used for organized, competitive computer gaming
  6. A network connection without wires

15 Clues: St. Clair College emblemA network connection without wiresAerial term used to describe online data storageTeam name used for St. Clair College athletic teamsTerm used for organized, competitive computer gamingA program that you use to access websites on the InternetElectronic letters you send and receive through the Internet...

Techtonic Round 1 Set B 2025-03-26

Techtonic Round 1 Set B crossword puzzle
Across
  1. A computer network that spans a small geographic area, like an office.
  2. A process model used in software engineering that follows a linear, sequential approach.
  3. The main circuit board of a computer that connects all components.
  4. A popular scripting language mainly used for web development.
  5. The global network that connects billions of devices worldwide.
  6. A machine learning model inspired by the structure of the human brain.
  7. The AI technique that enables machines to improve performance based on experience.
Down
  1. A technology that allows multiple virtual machines to run on a single physical machine.
  2. A type of memory that stores frequently accessed data for quick retrieval.
  3. A cybersecurity attack that tricks users into providing sensitive information.
  4. A storage system that allows data to be accessed remotely over the internet.
  5. The process of converting source code into machine code.
  6. The standard language for querying databases.
  7. A software testing approach where individual units of code are tested separately.
  8. A method for encoding data to ensure only authorized access.

15 Clues: The standard language for querying databases.The process of converting source code into machine code.A method for encoding data to ensure only authorized access.A popular scripting language mainly used for web development.The global network that connects billions of devices worldwide....

Organizational Structure, Design, Technology, and Information Technology 2025-11-01

Organizational Structure, Design, Technology, and Information Technology crossword puzzle
Across
  1. The protection of digital systems and data from unauthorized access or attacks.
  2. The introduction of new ideas or technologies to improve public sector performance.
  3. Online platforms enabling citizens to access government services digitally.
  4. The process of converting traditional public services into technology-based systems.
  5. Extremely large datasets analyzed to reveal patterns and trends in public management.
  6. A decentralized digital ledger ensuring transparency and security of records.
Down
  1. Monitoring citizens’ data or behavior, often raising ethical and legal concerns.
  2. Intelligence The simulation of human intelligence in machines to perform administrative tasks.
  3. The process through which innovation spreads within and across organizations.
  4. The use of machines or software to perform repetitive government functions efficiently.
  5. The ability of systems, devices, and citizens to interact through digital networks.
  6. The right to control personal data and protection from misuse in digital governance.
  7. An urban area using sensors, IoT, and analytics to enhance citizen life quality.
  8. Openness in government activities, allowing citizens to access information freely.
  9. The synchronization between digital initiatives and organizational strategy.

15 Clues: Online platforms enabling citizens to access government services digitally.The synchronization between digital initiatives and organizational strategy.The process through which innovation spreads within and across organizations.A decentralized digital ledger ensuring transparency and security of records....

Business Online 2025-11-26

Business Online crossword puzzle
Across
  1. — A business’s capacity to grow its online operations smoothly as demand rises.
  2. — Rules that explain how customers can return goods and get refunds.
  3. — Initial expenses required to build and launch an online business.
  4. — The threat of scams, identity theft or dishonest transactions in online trading.
  5. — A website type that processes payments and completes sales online.
  6. — Online platforms that host many sellers (e.g., Amazon, Etsy).
  7. — The activity of buying and selling goods or services over the internet.
  8. — A customer benefit of online shopping: easy access and 24/7 availability.
  9. — Using software or technology to perform repetitive tasks without human input.
Down
  1. — Platforms used for marketing, customer engagement and brand awareness.
  2. — The planning and management of storage, transport and delivery of goods.
  3. — Simple informational websites that showcase a business and its services.
  4. — Other businesses offering similar products or services in the same market.
  5. — The ability of an online business to access customers worldwide.
  6. — Measures and practices used to protect systems and customer data online.

15 Clues: — Online platforms that host many sellers (e.g., Amazon, Etsy).— The ability of an online business to access customers worldwide.— Initial expenses required to build and launch an online business.— Rules that explain how customers can return goods and get refunds.— A website type that processes payments and completes sales online....

International security 14 (KCNS) 2022-01-08

International security 14 (KCNS) crossword puzzle
Across
  1. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. It is the process of validating a cryptocurrency transaction.
  3. The programs and other operating information used by a computer.
Down
  1. Using, requiring, or involved in high technology or short for high technology.
  2. Criminal activities carried out by means of computers or the internet.
  3. An arrangement of intersecting horizontal and vertical lines.
  4. The state of being connected or interconnected.
  5. A legal or other formal measure intended to preserve civil liberties and rights .
  6. A cryptocurrency, a virtual currency or a digital currency.
  7. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: The state of being connected or interconnected.A cryptocurrency, a virtual currency or a digital currency.An arrangement of intersecting horizontal and vertical lines.It is the process of validating a cryptocurrency transaction.The programs and other operating information used by a computer....

International security 14 (KCNS) 2022-01-08

International security 14 (KCNS) crossword puzzle
Across
  1. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. It is the process of validating a cryptocurrency transaction.
  3. The programs and other operating information used by a computer.
Down
  1. Using, requiring, or involved in high technology or short for high technology.
  2. Criminal activities carried out by means of computers or the internet.
  3. An arrangement of intersecting horizontal and vertical lines.
  4. The state of being connected or interconnected.
  5. A legal or other formal measure intended to preserve civil liberties and rights .
  6. A cryptocurrency, a virtual currency or a digital currency.
  7. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: The state of being connected or interconnected.A cryptocurrency, a virtual currency or a digital currency.An arrangement of intersecting horizontal and vertical lines.It is the process of validating a cryptocurrency transaction.The programs and other operating information used by a computer....

G.A.B.I 2023-09-13

G.A.B.I crossword puzzle
Across
  1. kegiatan p5 dalam membahas mengenai pentingnya demolrasi adalah pembuatan
  2. Dalam kegiatan keyakinan kelas,siswa dapat memberikan pendapatnya,karena salah satu poin p5 adalah Berpendapat
  3. bapak Demokrasi Indonesia
  4. kurikulum yang lebih menegaskan demokrasi dalam menyelesaikan tugas tugas yang menuntut kebersamaan disebut
  5. salah satu poin penting dalam pelaksanaan demokrasi adalah. Yang lancar
  6. seminar bersama ko Robertus wijaya membahas pentingnya peran gen muda dalam
Down
  1. kegiatan p5 yang melakukan kegiatan berdiskusi untuk membahas nilai pancasila yang berada di dalam kelas dan sebagai pelanutan kelas
  2. Dalam p5 siswa diharpkan dapat dalam demokrasi
  3. salah satu tugas dalam nenjaga sistem pemerintahan disebut
  4. salah satu kegiatan memberikan suara untuk memilih pemimpin di sekolah adalah satu prinsip demokrasi terdapat pada sila

10 Clues: bapak Demokrasi IndonesiaDalam p5 siswa diharpkan dapat dalam demokrasisalah satu tugas dalam nenjaga sistem pemerintahan disebutkegiatan p5 dalam membahas mengenai pentingnya demolrasi adalah pembuatansalah satu poin penting dalam pelaksanaan demokrasi adalah. Yang lancar...

Cyber Security 2024-03-26

Cyber Security crossword puzzle
Across
  1. A piece of software designed to update or fix vulnerabilities in a computer program.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  4. Software designed to harm or gain unauthorized access to a computer system.
  5. A secret combination of characters used to gain access to a system.
Down
  1. A network security system that monitors and controls incoming and outgoing network traffic.
  2. Software designed to detect and remove malicious software.
  3. Software that secretly gathers information about a person or organization.
  4. A type of malware disguised as legitimate software.
  5. The process of converting information into a code to prevent unauthorized access.

10 Clues: A type of malware disguised as legitimate software.Software designed to detect and remove malicious software.A secret combination of characters used to gain access to a system.Software that secretly gathers information about a person or organization.Software designed to harm or gain unauthorized access to a computer system....

iWOWriors Onboarding Quiz 1 2024-02-20

iWOWriors Onboarding Quiz 1 crossword puzzle
Across
  1. A campaign that shares the potential IT Security Risks and how to overcome them.
  2. What is needed to be done before disposing of paper documents?
  3. ____ Setting is the first milestone in Performance Appraisal Form Roadmap
  4. ____ Golden Rules for Cybersecurity.
Down
  1. ____ & Security is one of the key functions of UITS and IT.
  2. The two sections in Performance Management System are 1. Performance and 2. ____
  3. One function of Group Strategy to the UMW Group.
  4. Under Group Strategy, Unit Strategy ____ will analyse and assess industry trends and market outlook.
  5. _____ Employees are those from the Supervisory Level until Executive Vide President II.
  6. The special leave due to the death of near relative, hospitalisation of immediate family or natural disaster.

10 Clues: ____ Golden Rules for Cybersecurity.One function of Group Strategy to the UMW Group.____ & Security is one of the key functions of UITS and IT.What is needed to be done before disposing of paper documents?____ Setting is the first milestone in Performance Appraisal Form Roadmap...

Big Data 2025-02-19

Big Data crossword puzzle
Across
  1. The speed at which data is generated and processed in real-time.
  2. Protecting digital data from threats, breaches, and unauthorized access.
  3. The different types of data formats, including structured, unstructured, and semi-structured data.
  4. Large-scale datasets that require advanced techniques for storage, processing, and analysis.
Down
  1. The process of examining data to uncover patterns, correlations, and insights.
  2. The immense amount of data generated from various sources in Big Data.
  3. The quality and accuracy of data, ensuring it is reliable and not misleading.
  4. A network of connected devices that collect and share data.
  5. Enables machines to analyze data and make decisions.
  6. The importance of data in providing insights and supporting decision-making.

10 Clues: Enables machines to analyze data and make decisions.A network of connected devices that collect and share data.The speed at which data is generated and processed in real-time.The immense amount of data generated from various sources in Big Data.Protecting digital data from threats, breaches, and unauthorized access....

Women in STEM Trivia 2018-03-02

Women in STEM Trivia crossword puzzle
Across
  1. Last name of the first female CEO for Duke Energy
  2. Phebe Novakovic worked for this branch of the government
  3. This is the nation's largest utility company
  4. Sempra Energy is based in this city
  5. Popular acronym for fields related to math, science, technology, and engineering
  6. Nobel Prize equivalent of Computer Science
  7. Last name of CEO for IBM
  8. Adriana Karaboutis holds this position at National Grid
  9. Women make up 22% of this specific engineering field
Down
  1. General Dynamics is this kind of federal contractor
  2. Marissa Mayer was given this many job offers after graduating from Stanford University
  3. Marissa Mayer is the CEO of this major company
  4. Novakovic pushed General Dynamics into the direction of this type of security
  5. Brittany Wenger was this age when she designed her Artificial Brain to help detect breast cancer
  6. The name of the computer that IBM created
  7. Rometty has degrees in both computer science and this type of engineering
  8. First company Marissa Mayer chose to work for
  9. First word of the abbreviated company title PG&E
  10. This natural vegetation supplied a useful chemical for Ellen Kendall's water filter
  11. Company that worked with wearable technology to help patients and health-care providers

20 Clues: Last name of CEO for IBMSempra Energy is based in this cityThe name of the computer that IBM createdNobel Prize equivalent of Computer ScienceThis is the nation's largest utility companyFirst company Marissa Mayer chose to work forMarissa Mayer is the CEO of this major companyFirst word of the abbreviated company title PG&E...

Unit 5 and 10 Vocab 2023-09-02

Unit 5 and 10 Vocab crossword puzzle
Across
  1. Whether somthing is appropriate morally
  2. How trustworthy an individual is
  3. Too much
  4. To have or show a good judgement of something
  5. "Not supported or proven by evidence"
  6. Computing services on the internet
  7. "The use of largely automatic equipment in a system of manufacturing or other production process"
  8. A process or set of rules for computer to do somethng
  9. Making inappropriate materials not crearly visible
Down
  1. "Adaptation of a system, process, etc. to be operated with the use of computers and the internet"
  2. To prove an individual with teir physical characteristic
  3. "A tendency to be too ready to believe that something is real or true"
  4. Not being "observed" by people that the individual did't allow to
  5. "rapid increase in numbers"
  6. New things that have never been created before
  7. The scurity of technological devices, software and information online
  8. How responsible an individual is
  9. Using an exaggerated wordign to attract public's interest; often lead to inaccuracy of information
  10. To rely on something
  11. To have a strong attraction for technology espeacially new technologies
  12. "honest and having strong moral principles; moral uprightness"
  13. Giving or understanding a wrong information
  14. Fake

23 Clues: FakeToo muchTo rely on something"rapid increase in numbers"How trustworthy an individual isHow responsible an individual isComputing services on the internet"Not supported or proven by evidence"Whether somthing is appropriate morallyGiving or understanding a wrong informationTo have or show a good judgement of something...

Electricity 2023-05-30

Electricity crossword puzzle
Across
  1. If it's high, power is high
  2. Tells us how much power we get related to voltage and resistance
  3. Stops electricity from flowing, rubber
  4. Power lines connecting power supplies to homes in a large area
  5. Electricity in one direction
  6. A path for electricity to flow
  7. Anything that makes power, like a generator or a battery
  8. Electricity in two directions, going back and forth
  9. Measures the current in a circuit
  10. Too much power at one time
  11. Happens again and again
  12. Electricity that is flowing, light is on
  13. Adjusts the power in a circuit
  14. Power from water
  15. Portable power supply, can power a remote
  16. No power or power loss
Down
  1. Protects us from electric shocks
  2. Measures the voltage in a circuit
  3. Power used by a device
  4. Allows electricity to flow, metal
  5. Power from earth's heat
  6. If it's high, power is low
  7. Online protection
  8. Transfers electricity from one circuit to another with more or less power
  9. Makes your hair stand up, gives a shock
  10. Makes power, makes electricity
  11. A place to plug in a device
  12. Measurement of electrical power

28 Clues: Power from waterOnline protectionPower used by a deviceNo power or power lossPower from earth's heatHappens again and againIf it's high, power is lowToo much power at one timeIf it's high, power is highA place to plug in a deviceElectricity in one directionA path for electricity to flowMakes power, makes electricityAdjusts the power in a circuit...

Unit 1 Concepts - Intro to Cyber 2025-01-22

Unit 1 Concepts - Intro to Cyber crossword puzzle
Across
  1. A type of malware that locks files until a ransom is paid
  2. An attack that floods a system with traffic to make it unavailable
  3. A scam where attackers impersonate a trusted entity to steal sensitive information
  4. Verifying the identity of a user or system
  5. A security system that monitors and controls network traffic
  6. A security process requiring two forms of verification to access an account
  7. A tool to store and generate secure passwords
  8. Software that secretly gathers user information without consent
Down
  1. An incident where data is altered without authorization
  2. A key used in encryption to secure communications that can be shared openly
  3. The process of converting information into a secure format to prevent unauthorized access
  4. Ensuring information is not accessed by unauthorized parties
  5. Practices designed to protect computers, networks, and data from attacks
  6. Ensuring information remains accurate and trustworthy
  7. Ensuring authorized users have access to information when needed
  8. Manipulating people to give up confidential information
  9. Harassment or bullying that occurs through digital platforms
  10. Malicious software designed to harm or exploit computers
  11. An incident where sensitive data is accessed without authorization
  12. A key used in encryption that must remain confidential

20 Clues: Verifying the identity of a user or systemA tool to store and generate secure passwordsEnsuring information remains accurate and trustworthyA key used in encryption that must remain confidentialAn incident where data is altered without authorizationManipulating people to give up confidential information...

Technology vocabulary 2023-12-15

Technology vocabulary crossword puzzle
Across
  1. a secret word used to access a computer system
  2. engine a program that searches for information on the internet
  3. a portable computer with a touchscreen
  4. a mobile phone with more features
  5. a regularly updated website or webpage on a specific topic
  6. an input device with keys used to type
  7. wireless technology that allows devices to connect
  8. malicious software that replicates and spreads causing harm
  9. a global network connecting computers
  10. to make something current or bring up to date
  11. media online platforms to connect with others
  12. real-time communication between users over the internet
Down
  1. a pointing device used to interact with a computer
  2. the physical components of a computer
  3. programs and application that run on a electronic device
  4. computer system that protect data, networks, etc.
  5. a software application used to access websites
  6. word short for the word 'application'
  7. to transfer data to your device
  8. to transfer data from the internet
  9. an electronic device that starts with a 'c'
  10. a collection of webpages available through internet
  11. to end a session on a website or computer
  12. electronic mail
  13. a unique name used to identify an individual on a computer

25 Clues: electronic mailto transfer data to your devicea mobile phone with more featuresto transfer data from the internetthe physical components of a computerword short for the word 'application'a global network connecting computersa portable computer with a touchscreenan input device with keys used to typeto end a session on a website or computer...

RU ITEC411 - Chapter 5 - Crime and Security 2025-04-21

RU ITEC411 - Chapter 5 - Crime and Security crossword puzzle
Across
  1. | Gaining unauthorized access to computer systems.
  2. Theft | Stealing someone’s personal information to impersonate them.
  3. | Malware that locks files and demands payment to unlock them.
  4. of Service | An attack that floods a system with traffic to crash it.
  5. | Malicious software that attaches itself to programs and spreads when they run.
  6. | Definition
  7. of Things | Network of physical devices connected and communicating over the Internet.
  8. | Sending fake messages to trick people into giving away private information.
  9. | Any software designed to harm or exploit systems.
Down
  1. | Phishing attacks carried out through text messages.
  2. | Using hacking for political activism or protest.
  3. | A network of infected devices controlled by hackers.
  4. | A serious security flaw in encryption software that exposed user data.
  5. | A harmful program disguised as a legitimate one.
  6. | The process of scrambling data to protect it from unauthorized access.
  7. | A hidden method to bypass security and access a system.
  8. | Redirecting users to fake websites to steal their data.
  9. | Software that secretly gathers user information without consent.
  10. Engineering | Manipulating people into revealing confidential data.
  11. | A program that spreads by copying itself without needing a host file.
  12. | A team that responds to major cybersecurity incidents.

21 Clues: | Definition| Using hacking for political activism or protest.| Gaining unauthorized access to computer systems.| A harmful program disguised as a legitimate one.| Any software designed to harm or exploit systems.| Phishing attacks carried out through text messages.| A network of infected devices controlled by hackers....

Information Technology Careers & Terms 2023-10-05

Information Technology Careers & Terms crossword puzzle
Across
  1. This career is is the creative driver responsible for bringing a game to life
  2. A professional who uses programming languages to communicate with computers and software and make them perform certain tasks
  3. A technology professional who works on, builds and creates software, websites, applications and other systems
  4. An organized collection of data stored and accessed electronically
  5. A place where people can share information and communicate from all over the world
  6. The programs and other operating information used by a computer
Down
  1. A person who writes computer programs
  2. An electronic device for storing and processing data
  3. The physical parts of a computer, such as the CPU and RAM
  4. This career protects computers from malicious attacks
  5. Two or more computers that are linked in order to share resources
  6. Sometimes called systems architects, this career studies an organization's current computer systems and procedures

12 Clues: A person who writes computer programsAn electronic device for storing and processing dataThis career protects computers from malicious attacksThe physical parts of a computer, such as the CPU and RAMThe programs and other operating information used by a computerTwo or more computers that are linked in order to share resources...

Cyber Safety Basics 2025-11-02

Cyber Safety Basics crossword puzzle
Across
  1. create this using letters, numbers, and symbols
  2. protecting electronic devices, networks, and sensitive information
Down
  1. by clicking this in emails and websites can lead to malware and viruses
  2. responsibly using technology and resources available through the internet
  3. be careful when using this public access to log into your computer

5 Clues: create this using letters, numbers, and symbolsbe careful when using this public access to log into your computerprotecting electronic devices, networks, and sensitive informationby clicking this in emails and websites can lead to malware and virusesresponsibly using technology and resources available through the internet

CyberSecurity Awareness 2023-09-28

CyberSecurity Awareness crossword puzzle
Across
  1. malicious software
Down
  1. state of keeping private
  2. cybercriminal disguises themselves as a trusted source
  3. takes advantage of a vulnerability
  4. act of breaking or failing

5 Clues: malicious softwarestate of keeping privateact of breaking or failingtakes advantage of a vulnerabilitycybercriminal disguises themselves as a trusted source

CyberSecurity CrossWord 2023-07-29

CyberSecurity CrossWord crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cybersecurity Principles 2023-12-14

Cybersecurity Principles crossword puzzle
Across
  1. This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.
  2. This principle is achieved through cryptographic methods which prevents a person or entity from denying having performed a particular action related to data for proof of obligation, intent, or commitment; or for proof of ownership.
Down
  1. This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required.
  2. This principle covers the assurance of data privacy. Only the intended and authorized recipients: people, processes or devices, may read the data. Disclosure to unauthorized entities, such as using unauthorized network sniffing is a confidentiality violation.
  3. This principle provides an assurance of data non-alteration. This is having assurance that the information has not been altered in transmission, from origin to reception. This principle is compromised when information is corrupted or altered, willfully or accidentally, before it is read by its intended recipient.

5 Clues: This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required....

CyberSecurity Crossword 2024-10-28

CyberSecurity Crossword crossword puzzle
Across
  1. We have to ____ over a hyperlink that's displayed in the email message
  2. Malware attack that capture all keyboard inputs
Down
  1. Malware received from emails typically encrypts files and documents on the target machines
  2. What do you call an email that looks legitimate but is actually a scam?
  3. Attackers perform ____ to clone our faces, creating videos and pictures that mimic our identity

5 Clues: Malware attack that capture all keyboard inputsWe have to ____ over a hyperlink that's displayed in the email messageWhat do you call an email that looks legitimate but is actually a scam?Malware received from emails typically encrypts files and documents on the target machines...

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paidA ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system...

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid.A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system....

IT and Tech 2023-10-03

IT and Tech crossword puzzle
Across
  1. Management Strategies and practices for attracting, developing, and retaining skilled individuals within an organization.
  2. The evaluation or appraisal of someone or something.
  3. The practice of recruiting highly skilled individuals for specialized positions.
  4. Measures taken to protect computer systems, networks, and data from cyber threats.
Down
  1. Solutions Services or strategies for finding and hiring suitable employees.
  2. The process of integrating a new employee into a company.
  3. The practice of analyzing and interpreting complex data sets to inform decision-making.

7 Clues: The evaluation or appraisal of someone or something.The process of integrating a new employee into a company.Solutions Services or strategies for finding and hiring suitable employees.The practice of recruiting highly skilled individuals for specialized positions.Measures taken to protect computer systems, networks, and data from cyber threats....

CyberSecurity Awareness 2023-09-28

CyberSecurity Awareness crossword puzzle
Across
  1. malicious software
Down
  1. state of keeping private
  2. cybercriminal disguises themselves as a trusted source
  3. takes advantage of a vulnerability
  4. act of breaking or failing

5 Clues: malicious softwarestate of keeping privateact of breaking or failingtakes advantage of a vulnerabilitycybercriminal disguises themselves as a trusted source

Women's Engineering Day 2024-06-24

Women's Engineering Day crossword puzzle
Across
  1. Making sure everyone gets a seat at the table.
  2. What is AWS's managed service for creating machine learning models?
  3. A network of smart gadgets chatting and sharing secrets.
  4. Application store for IOS
  5. A jolt of creativity that sparks new ideas.
  6. The magical code that breathes life into machines.
  7. A shared and immutable ledger that facilitates the process of recording transactions and tracking assets in a business network
  8. What is the practice of deploying software updates without downtime called?
  9. What is AWS's container orchestration service?
Down
  1. What is the practice of breaking down applications into smaller, manageable services?
  2. Combining the wonders of nature with cutting-edge tech.
  3. The dream that fuels your journey to success.
  4. What is the term for a lightweight, standalone, and executable package that includes everything needed to run a piece of software?
  5. Apple's intelligent personal assistant
  6. A quest to create thinking machines that rival human wits.
  7. A kaleidoscope of different voices and perspectives.
  8. The guardians of the digital realm, defending against cyber villains.
  9. Crafting metal companions that move and think on their own.

18 Clues: Application store for IOSApple's intelligent personal assistantA jolt of creativity that sparks new ideas.The dream that fuels your journey to success.Making sure everyone gets a seat at the table.What is AWS's container orchestration service?The magical code that breathes life into machines.A kaleidoscope of different voices and perspectives....

CYB 2024-05-07

CYB crossword puzzle
Across
  1. the term used for various pop-up advertisements that show up on your computer or mobile device
  2. malware that holds a victim's data unless the victim pays a ransom to the attacker
  3. malware, that spreads between computers and causes damage to data and software
  4. malicious software that spies on the victim
Down
  1. malware that downloads onto a computer disguised as a legitimate program
  2. the practice of protecting systems, networks, and programs from digital attacks
  3. a type of malware that can automatically self-replicate without human interaction

7 Clues: malicious software that spies on the victimmalware that downloads onto a computer disguised as a legitimate programmalware, that spreads between computers and causes damage to data and softwarethe practice of protecting systems, networks, and programs from digital attacks...

Computer Science History and Cybersecurity 2021-03-08

Computer Science History and Cybersecurity crossword puzzle
Across
  1. hashing is the foundation of this technology that has been used to implement crypto-currencies
  2. Park once the top-secret home of the World War Two Codebreakers
  3. cipher that is easily broken using brute force
  4. was the U.S. Navy's Combat Intelligence Unit, called OP–20–G
  5. designed to translate content with the intent of translating it back
  6. German cipher during WWII
Down
  1. Japanese naval code during WWII
  2. bncd (single shift cipher, decrypt for answer)
  3. one of the founders of Computer Science who worked as a code-breaker in England during WWII
  4. designed to translate content with NO intent of translating it back
  5. early computers were _________ and hot!
  6. first naval battle of WWII where code breaking played a major role
  7. both the sender and the receiver must have this for encryption to work
  8. decisive naval battle of WWII where code breaking played a major role

14 Clues: German cipher during WWIIJapanese naval code during WWIIearly computers were _________ and hot!bncd (single shift cipher, decrypt for answer)cipher that is easily broken using brute forcewas the U.S. Navy's Combat Intelligence Unit, called OP–20–GPark once the top-secret home of the World War Two Codebreakers...

National Cybersecurity Awareness Month Crossword 2018-09-21

National Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. Report suspicious emails by using the “Report to CyberSafe” _____ in the Outlook toolbar
  2. Avoid using _____ WiFi hotspots and charging station USB ports
  3. When creating a _____ , use special characters and numbers, and consider using a passphrase, or a unique set of words, to make it easier for you to remember
  4. Emails from external or non-USPS senders will automatically display [_____] in the subject line
  5. Cybersecurity is our shared _____
  6. Lock your _____ and mobile phone when not in use
  7. Don't click on _____ within emails from an unknown or untrusted source
  8. Never use your USPS _____ address for non-work purposes (e.g. social media, online shopping, listserv subscriptions)
Down
  1. Don't open or download _____ from unknown or suspicious senders
  2. If you need to charge a device, plug into an _____. Never connect your personal or work devices to USPS computers or equipment
  3. _____ over hyperlinks to reveal the destination before clicking
  4. The keyphrase #_____# can be added to the subject line of an email to encrypt the contents when sending to an external recipient
  5. When traveling abroad for personal travel, _____ bring your USPS mobile device or computer
  6. _____ is an attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity

14 Clues: Cybersecurity is our shared _____Lock your _____ and mobile phone when not in useAvoid using _____ WiFi hotspots and charging station USB portsDon't open or download _____ from unknown or suspicious senders_____ over hyperlinks to reveal the destination before clickingDon't click on _____ within emails from an unknown or untrusted source...

Cybersecurity Awareness Month Crossword Puzzle! 2024-10-08

Cybersecurity Awareness Month Crossword Puzzle! crossword puzzle
Across
  1. A secret word or phrase to access an account.
  2. Misleading content designed to get you to click on a link.
  3. A small piece of code that fixes security vulnerabilities in software.
  4. When unauthorized access is gained to a system or data.
  5. A type of malicious software that replicates and spreads on its own.
  6. Software that secretly gathers information from your device.
  7. A method of converting data into a secure format that cannot be read without a key.
  8. New software version with improvements and bug fixes.
  9. Software designed to harm or exploit your computer.
Down
  1. Software that detects and removes harmful programs from your computer.
  2. A copy of important data kept in case the original is lost or damaged.
  3. A scam to trick you into revealing personal information.
  4. A security barrier that monitors and controls incoming and outgoing network traffic.
  5. Unwanted and unsolicited emails or messages.

14 Clues: Unwanted and unsolicited emails or messages.A secret word or phrase to access an account.Software designed to harm or exploit your computer.New software version with improvements and bug fixes.When unauthorized access is gained to a system or data.A scam to trick you into revealing personal information....

Principles of Cybersecurity Chapter 5 Vocabulary 2023-03-07

Principles of Cybersecurity Chapter 5 Vocabulary crossword puzzle
Across
  1. Voice-based phishing in which the hacker calls the user impersonating someone else
  2. Use of SMS messages as the means of reach- ing victims.
  3. Phishing attack targeting individuals with a high net worth or with high status also called whaling.
  4. Process of providing a new employee with all information he or she needs on the company, business processes, security policies, and other related material.
  5. Device with bars or other obstruction to alternately block an entryway and allow only one per- son to pass at a time.
  6. Physical access control system that uses two sets of interlocking doors the fi rst set of doors must close before the second set can be opened
  7. ee-shaped wall usually made of concrete to prevent vehicles from passing can be moved into and out of place with heavy equipment. (
  8. Phishing attack targeting specifi c indi- viduals who may not be wealthy or prominent.
  9. An entry is embedded in the victim’s local DNS cache that redirects a legitimate URL to an incorrect IP address.
  10. Document created by the owner of the network containing information on proper usage of the network and related asset
  11. Any data that can be used to pinpoint a specific person
  12. Process of closing an employee’s accounts and records when he or she leaves the company
  13. Electromagnetic signals given off by all electronic equipment
  14. Vertical cylinder permanently installed to pre- vent vehicles from passing may be retractable to either allow or deny passage
  15. Technique in which server racks are placed in rows with cold air entering the room on one side and hot air exiting the room on the other side
Down
  1. Attempting to obtain personal information through fake e-mails that appear to be real
  2. Barrier placed around wires to block electromagnetic interference from affecting the electri- cal signals in the wires
  3. System in which video cameras transmit signals to a centralized moni- toring location, but the signals are not publically broad- cast also known as video surveillance
  4. Secured room in which servers and net- working equipment are installed.
  5. Involves setting up a website that looks legitimate and credible, but is used to steal personal information entered by users
  6. Responsibilities are divided so no single individual has complete control over a process or task
  7. Facility specifi cally designed to store and manage vast quantities of data considerably larger than a server room.
  8. Specifi cation developed by the National Security Agency (NSA) that deals with methods for spying using electromagnetic radiation and methods to prevent such activities.
  9. DNS solution that cre- ates a special DNS record to verify the validity of an e-mail sende
  10. Attack in which hackers embed mali- cious code in websites often visited by specifi c individ- uals, departments, or all employees of a company
  11. An unauthorized person walking into a facility with or right behind authorized people to appear as if with them
  12. The type of fire based on the fuel that feeds the fire.

27 Clues: Use of SMS messages as the means of reach- ing victims.Any data that can be used to pinpoint a specific personThe type of fire based on the fuel that feeds the fire.Electromagnetic signals given off by all electronic equipmentSecured room in which servers and net- working equipment are installed....

25 key words that represent Cybersecurity 2023-09-07

25 key words that represent Cybersecurity crossword puzzle
Across
  1. Any technology, be it software or hardware, used to keep intruders out.
  2. Software package that performs a specific function directly for a person who is intended to use a computer system.
  3. A piece of audio or video that has been altered and changed to make it seem authentic or credible
  4. A scam where a hacker poses as a legitimate business or organization
  5. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests
  6. A set of instructions, or a system of rules, written in a particular programming language
  7. A computer program that can copy itself and infect a computer without permission
  8. A mode in the computer that stores data on servers in different locations
  9. Two or more computers connected together to share resources
  10. A method of connecting a series of computers and devices in a private encrypted network,
  11. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  12. A form of malware that hijacks your system and encrypts your files
  13. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches
  14. While someone is tricked into clicking on one object on a web page when they want to click on another,
Down
  1. A means of attack on a computer system
  2. A technique to prevent unauthorized users from accessing sensitive data
  3. Smallest unit of a digital image
  4. A set of rules governing the format of data sent via the internet or local network.
  5. The capacity a network can transfer data
  6. Allows devices to communicate with each other
  7. Coding used to protect your information from hackers.
  8. The result of a hacker successfully breaking into a system
  9. A form of malware used by hackers to spy on you and your computer activities.
  10. Any attempt to breach a logical environment's security boundary
  11. a misleading computer program that looks innocent, but in fact allows the hacker into your system

25 Clues: Smallest unit of a digital imageA means of attack on a computer systemThe capacity a network can transfer dataAllows devices to communicate with each otherCoding used to protect your information from hackers.The result of a hacker successfully breaking into a systemTwo or more computers connected together to share resources...

Module 9 Participation | Cybersecurity Crossword Puzzle 2025-03-12

Module 9 Participation | Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. - Tracks and monitors user behavior
  2. - Group of infected computers
  3. - Malware disguised as legitimate software
  4. - Verifies website's online authenticity
  5. - Fraudulent emails seeking information
  6. - Overloads servers with excessive traffic
  7. - Displays unwanted advertisements
  8. - Software designed to harm systems
  9. - Blocks unauthorized network access
  10. - Tracks every keystroke entered
Down
  1. - Hides malicious software presence
  2. - Secures data with coding
  3. - Encrypts online data and browsing
  4. - Gains unauthorized computer access
  5. - Unauthorized access to data
  6. - Locks data until payment made
  7. - Secretly gathers user information
  8. - Scans and removes harmful software
  9. - Fixes system vulnerabilities
  10. - Self-replicates to spread infection

20 Clues: - Secures data with coding- Group of infected computers- Unauthorized access to data- Fixes system vulnerabilities- Locks data until payment made- Tracks every keystroke entered- Displays unwanted advertisements- Hides malicious software presence- Tracks and monitors user behavior- Encrypts online data and browsing...

Cybersecurity Crossword 2024-10-30

Cybersecurity Crossword crossword puzzle
Across
  1. Hardware or software designed to prevent unauthorized access to or from a private network.
  2. National Cyber Security Awareness month is observed during _______ month
  3. Cross-layered detection and response that collects and correlates data across multiple security layers
Down
  1. Set of algorithms and architectures capable of tasks like learning, reasoning, problem-solving, perception, and language understanding.
  2. Malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: National Cyber Security Awareness month is observed during _______ monthHardware or software designed to prevent unauthorized access to or from a private network.Malicious software designed to block access to a computer system until a sum of money is paid....

Cybersecurity Principles! 2025-09-03

Cybersecurity Principles! crossword puzzle
Across
  1. Technology that copies or mimics human behavior
  2. Someone who breaks into computer systems
  3. False or misleading information shared online
Down
  1. A scam to trick people into giving personal info
  2. virus A program that spreads and harms devices

5 Clues: Someone who breaks into computer systemsFalse or misleading information shared onlineTechnology that copies or mimics human behaviorvirus A program that spreads and harms devicesA scam to trick people into giving personal info

Cybersecurity Crorssword 2025-09-30

Cybersecurity Crorssword crossword puzzle
Across
  1. The best way of staying up to date on IT news
Down
  1. IT support
  2. ID
  3. Client docs
  4. Share

5 Clues: IDShareIT supportClient docsThe best way of staying up to date on IT news

Cybersecurity Fundamentals Chapter 4 2024-06-05

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. Also known as public-key encryption, it uses a pair of keys – a public key for encryption and a private key for decryption.
  2. The study of analyzing information systems to understand hidden aspects of the systems.
  3. The science of encrypting and decrypting information to protect data confidentiality.
  4. The process of converting plaintext into ciphertext to prevent unauthorized access.
  5. The process of managing cryptographic keys in a cryptosystem, including their generation, exchange, storage, use, and destruction.
  6. A type of encryption where the same key is used for both encryption and decryption.
Down
  1. Techniques used to regulate who can view or use resources in a computing environment.
  2. The practice of deliberately creating misleading or confusing information to hide the true meaning of the data.
  3. An algorithm used to perform encryption or decryption.
  4. The reverse process of encryption, where ciphertext is converted back into readable plaintext using a key.

10 Clues: An algorithm used to perform encryption or decryption.The process of converting plaintext into ciphertext to prevent unauthorized access.A type of encryption where the same key is used for both encryption and decryption.Techniques used to regulate who can view or use resources in a computing environment....

Cybersecurity ITF+ Module 1.1 2023-11-09

Cybersecurity ITF+ Module 1.1 crossword puzzle
Across
  1. When information is stored and processed
  2. System that processes, stores, and transfers information
  3. System that manipulates data based on a set of instructions
  4. a computer that supports other computers
  5. device with same function as PC but is handheld
Down
  1. Hardware that is connected to the computer
  2. a computer that integrates all components into a single case
  3. the system memory
  4. retrieves instructions or data from memory and processes it
  5. computer programming

10 Clues: the system memorycomputer programmingWhen information is stored and processeda computer that supports other computersHardware that is connected to the computerdevice with same function as PC but is handheldSystem that processes, stores, and transfers informationSystem that manipulates data based on a set of instructions...

Cybersecurity Puzzle 2021-11-04

Cybersecurity Puzzle crossword puzzle
Across
  1. A defensive technology designed to keep the bad guys out.
  2. Technology that allows us to store and access files or services remotely via the internet.
  3. A group of computers, printers and devices that are interconnected and governed as a whole.
Down
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. A set of programs that tells computers how to perform a set of tasks.

5 Clues: A defensive technology designed to keep the bad guys out.A set of programs that tells computers how to perform a set of tasks.Technology that allows us to store and access files or services remotely via the internet.A group of computers, printers and devices that are interconnected and governed as a whole....

Cybersecurity Definitions 2024-06-16

Cybersecurity Definitions crossword puzzle
Across
  1. Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
  2. An attack method where a perpetrator deceives individuals into divulging confidential information.
  3. The practice of protecting systems, networks, and programs from digital attacks.
Down
  1. A program that replicates itself to spread to other computers.
  2. A person who uses computers to gain unauthorized access to data.

5 Clues: A program that replicates itself to spread to other computers.A person who uses computers to gain unauthorized access to data.The practice of protecting systems, networks, and programs from digital attacks.Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems....

Thinklogic 2021-09-13

Thinklogic crossword puzzle
Across
  1. DX
  2. Search Engine
Down
  1. CX

3 Clues: CXDXSearch Engine

Cyber World (Internet) 2023-06-12

Cyber World (Internet) crossword puzzle
Across
  1. Malicious software that replicates itself and infects computer systems.
  2. The process of encoding information to protect its confidentiality.
  3. The practice of protecting computers, servers, and networks from digital threats.
  4. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
  1. Criminal activities conducted through the internet, such as fraud, hacking, or identity theft.
  2. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
  3. A network of infected computers, often controlled by a hacker, used for malicious activities.
  4. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
  5. A person who uses technical skills to gain unauthorized access to computer systems.
  6. A security measure that protects computer networks from unauthorized access.

10 Clues: The process of encoding information to protect its confidentiality.Malicious software that replicates itself and infects computer systems.A security measure that protects computer networks from unauthorized access.The practice of protecting computers, servers, and networks from digital threats....

Industrial Internet Puzzle 2016-07-27

Industrial Internet Puzzle crossword puzzle
Across
  1. The number of forces shaping the industrial internet
  2. World’s first industrial operating system
  3. The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)
  4. Headquarters for GE Digital (2 words)
Down
  1. The division of GE Digital dedicated to address potential vulnerabilities by protecting industrial assets (2 words)
  2. Current CEO for GE Digital (2 words)
  3. A virtual model of each physical production asset (2 words)
  4. Another force of the industrial internet that deals with increasing system intelligence through embedded software (2 words)
  5. One force shaping the industrial internet that has to do with transforming massive volumes into information into intelligence (2 words)

9 Clues: Current CEO for GE Digital (2 words)Headquarters for GE Digital (2 words)World’s first industrial operating systemThe number of forces shaping the industrial internetA virtual model of each physical production asset (2 words)The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)...

Risk Culture Awareness 2022-01-19

Risk Culture Awareness crossword puzzle
Across
  1. Process and risk owners are in which line of defense?
  2. the chance that an outcome or investment's actual gains will differ from an expected outcome or return
  3. level of risk that an organization is prepared to accept
  4. A mitigation strategy to eliminate the risk exposure to come into existence
  5. Risk department that reviews and provides an independent opinion to the business on lending proposals
Down
  1. this function represents the third line of defense
  2. The practice of protecting systems and information from digital attacks
  3. risk of loss resulting from ineffective or failed internal processes, people, systems
  4. A measure of the level of risk an organization is willing to accept

9 Clues: this function represents the third line of defenseProcess and risk owners are in which line of defense?level of risk that an organization is prepared to acceptA measure of the level of risk an organization is willing to acceptThe practice of protecting systems and information from digital attacks...

Cyber-security 2021-01-17

Cyber-security crossword puzzle
Across
  1. refers to the security of a computer or computer system
  2. authentication mechanisms, access channels and systems all have to work properly
  3. demands a ransom from you to get things back on track.
  4. result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
  1. ensure that information is hidden from people unauthorised to access it.
  2. modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
  3. helps hackers spy on systems and their users.
  4. self-replicating and spreads without end-user action, causing real devastation.
  5. ensuring that data has not been tampered with and, therefore, can be trusted.
  6. are attempts to expose users to unwanted, potentially malicious advertising.
  7. malicious instructions that appear as legitimate programs.

11 Clues: helps hackers spy on systems and their users.demands a ransom from you to get things back on track.refers to the security of a computer or computer systemmalicious instructions that appear as legitimate programs.ensure that information is hidden from people unauthorised to access it....

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new Palo Alto office
  2. The conference Joanne and Steve spoke at in 2018
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. The New York Times said this company will emerge as the leading residential solar installer in the US
  5. Steve's book, The Way to Design, was released in what format in late 2018?
  6. On-demand vet service in the FC portfolio
Down
  1. Foundation led this meditation company's series A
  2. Bolt Thread's Microsilk fabric is made by
  3. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  4. Foundation's newest unicorn
  5. What FC company raised $155 million in 2018 and expanded into Europe?

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new Palo Alto office
  2. Bolt Thread's Microsilk fabric is made by
  3. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  4. What FC company raised $155 million in 2018 and expanded into Europe?
  5. Foundation led this meditation company's series A
Down
  1. Steve's book, The Way to Design, was released in what format in late 2018?
  2. Foundation's newest unicorn
  3. The New York Times said this company will emerge as the leading residential solar installer in the US
  4. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  5. The conference Joanne and Steve spoke at in 2018
  6. On-demand vet service in the FC portfolio

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The conference Joanne and Steve spoke at in 2018
  2. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  3. Foundation led this meditation company's series A
  4. Foundation's newest unicorn
  5. On-demand vet service in the FC portfolio
Down
  1. The New York Times said this company will emerge as the leading residential solar installer in the US
  2. The street name of FC's new Palo Alto office
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. Steve's book, The Way to Design, was released in what format in late 2018?
  5. Bolt Thread's Microsilk fabric is made by
  6. What FC company raised $155 million in 2018 and expanded into Europe?

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

Daily Vocab for Cybersecurity 2022-02-01

Daily Vocab for Cybersecurity crossword puzzle
Across
  1. Type of URL hijacking
  2. Phishing done through text messages.
  3. Voice phishing through the phone or a voicemail.
Down
  1. When you gather information on the victim.
  2. Redirection from a legit website to a bogus one.
  3. Phishing with inside information.
  4. Spearing the CEO.
  5. _________ information is extracting information from the victim.
  6. Lying to get information.
  7. Dumpster ________ is when you gather personal information from things that people have thrown out from their trash.

10 Clues: Spearing the CEO.Type of URL hijackingLying to get information.Phishing with inside information.Phishing done through text messages.When you gather information on the victim.Redirection from a legit website to a bogus one.Voice phishing through the phone or a voicemail._________ information is extracting information from the victim....

ICT Processes and Cybersecurity 2022-11-10

ICT Processes and Cybersecurity crossword puzzle
Across
  1. Makes systems access easier
  2. ERP module for logging all support tickets
  3. Verifying the identity of a user
  4. A type of social engineering
  5. Log ticket here without ERP credentials
Down
  1. Secret word or phrase
  2. Cyber security protects them
  3. Redirecting unresolved service request
  4. Type of priority of a service request
  5. Only for emergency service requests

10 Clues: Secret word or phraseMakes systems access easierCyber security protects themA type of social engineeringVerifying the identity of a userOnly for emergency service requestsType of priority of a service requestRedirecting unresolved service requestLog ticket here without ERP credentialsERP module for logging all support tickets

Cybersecurity Awareness Month Crossword! 2023-09-25

Cybersecurity Awareness Month Crossword! crossword puzzle
Across
  1. software designed to disrupt, damage or gain unauthorized access to a computer system
  2. a process to identify who should to have access to a system
  3. malicious software designed to block access to computer system until money is paid
  4. an electronic device used for processing and storing information
  5. an input device used with a computer
  6. a network security controller and monitor
Down
  1. cyberattack tactic designed to scare someone into visiting a spoofed or infected website
  2. the process of converting information or data into a code to prevent unauthorized access
  3. 2 or more computers connected together to share resources
  4. emails sent appearing to be from legitimate sources designed to trick the receiver into giving out information

10 Clues: an input device used with a computera network security controller and monitor2 or more computers connected together to share resourcesa process to identify who should to have access to a systeman electronic device used for processing and storing informationmalicious software designed to block access to computer system until money is paid...

TELUS Cybersecurity Crossword Puzzle 2025-01-21

TELUS Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Une cyberattaque où les attaquants incitent les utilisateurs à révéler des informations sensibles via de faux courriels ou sites Web.
  2. Méthode d’essais et d’erreurs pour deviner les mots de passe.
  3. Logiciel conçu pour détecter et supprimer les programmes malveillants de votre ordinateur.
  4. Une entreprise qui accorde la priorité à ses clients dans le but de rendre le futur meilleur
  5. Pyratage ___: manipuler les gens pour qu’ils révèlent des informations confidentielles
Down
  1. Un dispositif de sécurité réseau qui surveille et contrôle le trafic entrant et sortant en fonction de règles.
  2. Le processus de conversion de données dans un format codé pour empêcher qu’elles ne soient lues par une personne ou un système non prévu.
  3. Une combinaison secrète de caractères utilisés pour sécuriser les comptes.
  4. Un tunnel sécurisé qui crypte votre connexion Internet et masque votre adresse IP.
  5. Un incident où des informations sensibles ou confidentielles sont exposées

10 Clues: Méthode d’essais et d’erreurs pour deviner les mots de passe.Une combinaison secrète de caractères utilisés pour sécuriser les comptes.Un incident où des informations sensibles ou confidentielles sont exposéesUn tunnel sécurisé qui crypte votre connexion Internet et masque votre adresse IP....

Cybersecurity Crossword Nathan Compagnon 2024-11-27

Cybersecurity Crossword Nathan Compagnon crossword puzzle
Across
  1. : Prevent spam by temporarily rejecting communications from unknown senders
  2. : Malicious code that can cause harm to your anyone who watches the infected ad
  3. : Malware that disguise itself as a normal program to infect a system
  4. : Type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files
  5. : Security measure to distinguish human from machine input
  6. : Set of software tools that enable an unauthorized user to gain control of a computer system without being detected
Down
  1. : Process that transforms encrypted information into its original format
  2. : Turns domain names into ip addresses
  3. : Vulnerability in software or hardware that is unknown to the vendor and for which no patch or other fix is available
  4. : Force a website, computer, or online service offline by flooding the target with many requests

10 Clues: : Turns domain names into ip addresses: Security measure to distinguish human from machine input: Malware that disguise itself as a normal program to infect a system: Process that transforms encrypted information into its original format: Prevent spam by temporarily rejecting communications from unknown senders...

CYBERSECURITY TOOLS AND TECHNIQUES 2025-01-03

CYBERSECURITY TOOLS AND TECHNIQUES crossword puzzle
Across
  1. A system that collects and analyzes security data from various sources to identify potential security threats and provide real-time monitoring.
  2. Software designed to detect, prevent, and remove malicious software (malware) from a computer system.
  3. A type of cyber attack where multiple systems are used to flood a network or website with traffic, causing it to become overwhelmed and unavailable.
  4. Authentication A security process that requires two forms of verification, such as a password and a code sent to a mobile device, to access an account.
  5. Masking The process of concealing sensitive data by replacing it with fictitious or scrambled data to protect privacy and prevent unauthorized access.
Down
  1. A system that monitors network or system activities for signs of malicious activities or policy violations.
  2. Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers.
  3. Rules Predefined configurations that determine which types of network traffic are allowed or blocked by a firewall.
  4. Security Measures taken to protect individual devices (endpoints) such as computers, smartphones, and tablets from security threats.
  5. A system that actively monitors and blocks potential security threats in real-time, preventing malicious activities from compromising a network or system.

10 Clues: Software designed to detect, prevent, and remove malicious software (malware) from a computer system.A system that monitors network or system activities for signs of malicious activities or policy violations.Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers....

Automotive cybersecurity Set II 2025-08-05

Automotive cybersecurity Set II crossword puzzle
Across
  1. ability to encrypt sensitive data and provide robust defences against attacks.
  2. servers manage vehicle authentication and store results on the blockchain for quick re-authentication by edge nodes.
  3. cryptographic techniques for mutual authentication support local re-authentication when vehicles switch between edge nodes.
  4. Metric detects deviations from normal behaviour but may generate false positives.
  5. Protocol (AVTP) packets within Automotive Ethernet networks.
  6. is specifically designed to detect replay attacks on AVTP streams.
Down
  1. labelled dataset of benign and malicious packets by simulating client-server behaviour.
  2. Secure decentralized communication system for CAVs.
  3. model employs reset and update gates to manage memory connections, using an attention mechanism to enhance detection accuracy.
  4. Attack detection methods are classified into infrastructure-less.

10 Clues: Secure decentralized communication system for CAVs.Protocol (AVTP) packets within Automotive Ethernet networks.Attack detection methods are classified into infrastructure-less.is specifically designed to detect replay attacks on AVTP streams.ability to encrypt sensitive data and provide robust defences against attacks....

Cybersecurity awareness cross-word 2025-11-09

Cybersecurity awareness cross-word crossword puzzle
Across
  1. – A secret string used to verify identity.
  2. – An update that fixes software vulnerabilities.
  3. – The process of converting data into code to prevent unauthorized access.
  4. – A security threat originating from within an organization.
  5. – Software designed to disrupt, damage, or gain unauthorized access.
Down
  1. – Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  2. – Secure connection used to access a network remotely.
  3. – A network security device that monitors and filters traffic.
  4. – Unwanted or unsolicited email.
  5. – A login method requiring two or more verification factors.

10 Clues: – Unwanted or unsolicited email.– A secret string used to verify identity.– An update that fixes software vulnerabilities.– Secure connection used to access a network remotely.– A security threat originating from within an organization.– A login method requiring two or more verification factors....

Pilot Puzzle Program 2022-02-11

Pilot Puzzle Program crossword puzzle
Across
  1. A sector of safety that is not related to outdoor work (hint: digital)
  2. given by FM prior to performing non-exempt work
  3. same _____ falls are a hazard anywhere
  4. common PPE when working with any kind of sample
  5. ___ drills happen regularly to be prepared in the event of an evacuation
  6. this is a requirement when working in a CA or RA
  7. a 360 ___ is essential after returning to your vehicle
  8. Always know where the closest ___ is in case there is a building emergency
Down
  1. the biggest safety concern working in a nuclear plant
  2. historically marked across sites using lollypops
  3. fire extinguishers needs to have a full maintenance inspection every ___ months
  4. a required document to be briefed to when in a CA or RA
  5. hazard that changes depending on seasons
  6. always know where the closest ___ is in case someone has a cardiac event
  7. briefing held during warm months
  8. required to be written and discussed prior to beginning work to cover hazards
  9. You always should conduct a ___ before starting a new job or when conditions change

17 Clues: briefing held during warm monthssame _____ falls are a hazard anywherehazard that changes depending on seasonsgiven by FM prior to performing non-exempt workcommon PPE when working with any kind of samplehistorically marked across sites using lollypopsthis is a requirement when working in a CA or RA...

Cyber Threat Landscape 2024-04-04

Cyber Threat Landscape crossword puzzle
Across
  1. Pretending to be an employee that forgot their password
  2. Type of phishing scam that involves an email with phone number to call
  3. Using digital ads to deliver malware
  4. Cybercriminals send emails claiming to be from a reputable source
  5. Sending text messages containing malicious link
  6. Type of phishing attack that targets specific people or organizations through malicious emails
  7. Software designed to disrupt a device's normal operations without the user's knowledge
Down
  1. Type of authentication that uses multi-step account log in process that requires more than just a password
  2. Type of malware that prevents users from accessing their device and data
  3. Defrauding people over the phone
  4. Cybersecurity thret using QR codes to trick users
  5. Manipulated video, photo or audio recording that used AI to make it appear real
  6. Type of scam that an email appears to be sent for legitimate request

13 Clues: Defrauding people over the phoneUsing digital ads to deliver malwareSending text messages containing malicious linkCybersecurity thret using QR codes to trick usersPretending to be an employee that forgot their passwordCybercriminals send emails claiming to be from a reputable source...

Mission: Cybersecurity Word Quest 2025-05-05

Mission: Cybersecurity Word Quest crossword puzzle
Across
  1. Software that blocks unauthorized access.
  2. A name you use to log into accounts.
  3. Someone who uses technology to hurt others.
  4. Fake messages that try to steal information.
  5. A fake offer to steal money or information.
Down
  1. A secret word that keeps your account safe.
  2. A bad program that can spread through computers.
  3. Software made to harm computers.
  4. Scrambling data to keep it safe.
  5. Someone who breaks into computers to steal/spy.

10 Clues: Software made to harm computers.Scrambling data to keep it safe.A name you use to log into accounts.Software that blocks unauthorized access.A secret word that keeps your account safe.Someone who uses technology to hurt others.A fake offer to steal money or information.Fake messages that try to steal information....

Cybersecurity Awareness Month 2025 2025-09-30

Cybersecurity Awareness Month 2025 crossword puzzle
Across
  1. Warmest season, overused as a password.
  2. Three words that should be the key to your heart, not you password (1,4,3).
  3. Six of the first letter—cybercriminals love it.
  4. Catch ’em all? Hack ’em all.
  5. First six letters on your keyboard.
Down
  1. Social media giant, weak as a key.
  2. Car or cowboy, not a good password.
  3. Dark knight, weak choice.
  4. If you tell everyone, it’s not this anymore.
  5. Basic greeting, basic security

10 Clues: Dark knight, weak choice.Catch ’em all? Hack ’em all.Basic greeting, basic securitySocial media giant, weak as a key.Car or cowboy, not a good password.First six letters on your keyboard.Warmest season, overused as a password.If you tell everyone, it’s not this anymore.Six of the first letter—cybercriminals love it....

Cybersecurity Day - MFA Booth 2025-10-13

Cybersecurity Day - MFA Booth crossword puzzle
Across
  1. Practice of requiring two or more independent factors.
  2. Time-based one-time password algorithm.
  3. State value that advances to produce the next HOTP code.
  4. Hardware security key used for HOTP+PIN and FIDO flows.
  5. Counter-based HMAC one-time password algorithm.
  6. USB class used for human-interface devices; referenced in your “named HID” TOTP context.
Down
  1. The application that generates TOTP and is protected with FIDO.
  2. Local secret on a security key used alongside HOTP validation.
  3. Browser-facing W3C standard that implements FIDO authenticators.
  4. Open authentication standards enabling phishing-resistant, passwordless login used in your implementation.

10 Clues: Time-based one-time password algorithm.Counter-based HMAC one-time password algorithm.Practice of requiring two or more independent factors.Hardware security key used for HOTP+PIN and FIDO flows.State value that advances to produce the next HOTP code.Local secret on a security key used alongside HOTP validation....

First Principles of Cybersecurity 2019-10-15

First Principles of Cybersecurity crossword puzzle
Across
  1. hiding data from people who don't need to have access to it
  2. using mulitple strategies to protect something
  3. making sure that only the necessary people have access
  4. reducin the number of weaknesses in something
  5. labeling objects based on how they can be used and by whom
  6. removing any clutter and only displaying the important information
Down
  1. making designs as simple and intuitive as possible
  2. keeping things separate based on categories
  3. making it easy to swap one part out for another
  4. only doing one thing at a time

10 Clues: only doing one thing at a timekeeping things separate based on categoriesreducin the number of weaknesses in somethingusing mulitple strategies to protect somethingmaking it easy to swap one part out for anothermaking designs as simple and intuitive as possiblemaking sure that only the necessary people have access...

Cybersecurity Threats and Defenses 2025-09-24

Cybersecurity Threats and Defenses crossword puzzle
Across
  1. Fake website designed to steal credentials
  2. Protects data on a wireless network
  3. Continuous monitoring of network traffic
  4. Security test that simulates a real attack
  5. Prevents unauthorized physical entry to a secure area
Down
  1. A malicious attack that floods a system with traffic
  2. Secures communication over the internet
  3. Framework of rules and policies governing security
  4. Keeps track of system events for auditing
  5. Hidden malicious code inserted into software

10 Clues: Protects data on a wireless networkSecures communication over the internetContinuous monitoring of network trafficKeeps track of system events for auditingFake website designed to steal credentialsSecurity test that simulates a real attackHidden malicious code inserted into softwareFramework of rules and policies governing security...

Internet 2023-07-05

Internet crossword puzzle
Across
  1. A digital message sent electronically to communicate with others.
  2. Safety Guidelines and precautions to ensure safe and responsible internet use.
  3. Gaming Playing games with other people over the internet.
  4. To transfer data or files from the internet to your computer.
  5. Measures taken to protect computers, networks, and data from unauthorized access or attacks.
  6. Media Websites and applications that allow people to connect and share content online.
  7. A global network that connects computers and allows communication and access to information.
Down
  1. A collection of web pages that can be accessed on the internet.
  2. To communicate with others in real time using text messages on the internet.
  3. Connected to or available through the internet.
  4. A wireless technology that allows devices to connect to the internet without using cables.
  5. A program used to access and navigate websites on the internet.
  6. Playing audio or video content directly from the internet without downloading it.
  7. Engine A tool that helps you find information on the internet.
  8. To transfer data or files from your computer to the internet.

15 Clues: Connected to or available through the internet.Gaming Playing games with other people over the internet.To transfer data or files from the internet to your computer.To transfer data or files from your computer to the internet.Engine A tool that helps you find information on the internet....

Computer Science Vocabulary 2025-03-10

Computer Science Vocabulary crossword puzzle
Across
  1. A set of steps carried out, in order, to solve a problem
  2. Converting actions into a symbolic language
  3. Shows a start or end point on a flowchart
  4. Shows a decision on a flowchart
  5. The protection of computing devices, systems, and networks from theft of, or damage to their hardware, software, or electronic data
  6. When you write down a computer code in plain English, shorthand, or bullet points to communicate the high level design without actually writing the program
  7. Shows a process on a flowchart
Down
  1. Finding and fixing issues in code
  2. A graphical representation that depicts a troubleshooting process, system, or algorithm
  3. The study of computers and their algorithmic processes
  4. Shows the relationships between things in a flowchart
  5. A programming concept that is a set of steps carried out, in order
  6. All information stored and processed by a computing device

13 Clues: Shows a process on a flowchartShows a decision on a flowchartFinding and fixing issues in codeShows a start or end point on a flowchartConverting actions into a symbolic languageShows the relationships between things in a flowchartThe study of computers and their algorithmic processesA set of steps carried out, in order, to solve a problem...

Common Cybersecurity Roles 2025-02-05

Common Cybersecurity Roles crossword puzzle
Across
  1. Investigates and mitigates cyber incidents, such as data breaches or malware attacks.
  2. Simulates cyberattacks to find vulnerabilities in systems.
Down
  1. Monitors and analyzes security threats to protect an organization.
  2. Designs, implements, and maintains secure network infrastructure.
  3. A high-level executive responsible for overseeing an organization's entire cybersecurity strategy.

5 Clues: Simulates cyberattacks to find vulnerabilities in systems.Designs, implements, and maintains secure network infrastructure.Monitors and analyzes security threats to protect an organization.Investigates and mitigates cyber incidents, such as data breaches or malware attacks....

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. IES, IET, IPRS
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. SC initiated, amazing three-times a year, event
  5. First part of SC’s mission - provide (someone or something) the means to do something.
Down
  1. First part of student life’s tagline
  2. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  3. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  4. Second part of student life’s tagline
  5. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  6. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  7. Keep it lit!
  8. Second part of SC’s mission - participate or become involved in.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASC initiated, amazing three-times a year, eventSecond part of SC’s mission - participate or become involved in....

Cyber Crossword Puzzle 2023-10-05

Cyber Crossword Puzzle crossword puzzle
Across
  1. Never write these down on a sticky note or a whiteboard.
  2. Never open these in email unless you already expected them from the sender.
  3. _____ is a level of data classification.
  4. Lock your _____ and your mobile phone anytime they are not in use.
  5. Files with sensitive information should always be kept in a _____ file room or drawer.
  6. Alway install _____ to your computer or mobile phone. Don't click "Remind me later."
Down
  1. _____ is when an unauthorized person follows you into a secure location.
  2. Report all possible cyber _____ to the IT Service Desk.
  3. An email scam that that targets unsuspecting users to give up information.
  4. Measures taken to protect your or your organization's information from cyber attack
  5. An unauthorized person that tries to gain access to your computer.
  6. Stay _____ and be on the lookout for security threats or incidents.
  7. Always keep a _____ workspace that is free of confidential information.

13 Clues: _____ is a level of data classification.Report all possible cyber _____ to the IT Service Desk.Never write these down on a sticky note or a whiteboard.An unauthorized person that tries to gain access to your computer.Lock your _____ and your mobile phone anytime they are not in use.Stay _____ and be on the lookout for security threats or incidents....

Virus Crossword 2017-11-28

Virus Crossword crossword puzzle
Across
  1. Malware that replicates itself.
  2. A service used to send digital letters to people at specific addresses.
  3. A program that protects against viruses.
  4. A secret word or phrase that must be used to gain admission to something.
  5. Something that is added to an email and can contain a virus.
  6. Viruses that are hidden in advertisements that ask to download software.
  7. The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  8. To affect a computer with a virus.
Down
  1. A program that can be installed.
  2. An unwanted
  3. A program that hides by posing as a program it is not.
  4. A computer that is targeted and given a virus to.
  5. A virus that floods a network.
  6. Software that is intended to damage or disable computers or computer systems.
  7. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

15 Clues: An unwantedA virus that floods a network.Malware that replicates itself.A program that can be installed.To affect a computer with a virus.A program that protects against viruses.A computer that is targeted and given a virus to.A program that hides by posing as a program it is not.Something that is added to an email and can contain a virus....

Camp Gateway Crossword Puzzle 2021-07-21

Camp Gateway Crossword Puzzle crossword puzzle
Across
  1. (n) a large area covered with trees and undergrowth
  2. (n) space in which to work.
  3. (n) an experience or activity
  4. (n) the state or fact of continuing to live or exist, typically in spite of an accident, ordeal, or difficult circumstances.
  5. (n) what you sleep under when you go camping
  6. (n) another word for the great outdoors
  7. (n)the process of increasing
  8. (n) the necessary items for a particular purpose
  9. (n) the interconnection via the internet of computing devices embedded in everyday things — allowing them to send and receive data
Down
  1. (n) shows the direction of magnetic north and bearings from it.
  2. (n) a state of focus
  3. (n) the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  4. (n) the activity of going for long walks, especially in the country or woods
  5. (n) a newly established business.
  6. (n) 3 letters for "remote" work

15 Clues: (n) a state of focus(n) space in which to work.(n)the process of increasing(n) an experience or activity(n) 3 letters for "remote" work(n) a newly established business.(n) another word for the great outdoors(n) what you sleep under when you go camping(n) the necessary items for a particular purpose(n) a large area covered with trees and undergrowth...

IT 2023-11-27

IT crossword puzzle
Across
  1. The use of largely automatic equipment in a system of operation.
  2. programs follow a step-by-step ______ to perform tasks efficiently."
  3. mechanics explores the fundamental properties and behavior of subatomic particles."
  4. A set of instructions for solving a problem, often used in computer programming.
  5. holds promise for advancements in medicine, electronics, and materials science."
  6. The design, construction, operation, and use of robots.
Down
  1. The practice of protecting computer systems, networks, and data from digital attacks.
  2. Relating to the branch of physics dealing with the behavior of very small particles.
  3. The introduction of new ideas, methods, or products.
  4. Information that is collected and stored, often used for analysis and decision-making.
  5. The manipulation of matter on an atomic or molecular scale.
  6. invest in research and development to drive ______ and stay ahead in the market."
  7. is a field that combines engineering and technology to create intelligent machines."
  8. implement ______ to streamline production processes and increase efficiency."
  9. growing reliance on digital technologies highlights the importance of strong ______ measures."
  10. rely on accurate and reliable ______ to draw meaningful conclusions."

16 Clues: The introduction of new ideas, methods, or products.The design, construction, operation, and use of robots.The manipulation of matter on an atomic or molecular scale.The use of largely automatic equipment in a system of operation.programs follow a step-by-step ______ to perform tasks efficiently."...

Influential Black Scientist 2025-03-18

Influential Black Scientist crossword puzzle
Across
  1. – First Black female neurosurgeon in the U.S., known for pediatric neurosurgery.
  2. – First Black woman in space, physician, and engineer.
  3. – Ophthalmologist who invented laser cataract surgery.
  4. – First Black woman in the U.S. to earn a Ph.D. in chemistry, known for her work on hypertension.
  5. (via HeLa Cells) – Her cells contributed to countless medical breakthroughs, including cancer and polio research.
  6. – Aerospace engineer and NASA scientist working on satellite guidance systems.
  7. – Inventor of electronic control devices, including improvements to pacemakers.
  8. – Aerospace engineer and former CEO of The Aerospace Corporation, specializing in satellite and cybersecurity research.
  9. – Astrophysicist and science communicator, director of the Hayden Planetarium.
  10. – Theoretical physicist and first Black woman to earn a Ph.D. from MIT in physics.
Down
  1. – Mathematician, astronomer, and surveyor who helped design Washington, D.C.
  2. – Mathematician whose calculations helped NASA send astronauts to the Moon.
  3. – Agricultural scientist and inventor, known for crop rotation and peanut innovations.
  4. – Surgeon and researcher who developed blood banks and blood plasma preservation.
  5. – Biologist known for his pioneering work in cell biology and fertilization.

15 Clues: – First Black woman in space, physician, and engineer.– Ophthalmologist who invented laser cataract surgery.– Mathematician whose calculations helped NASA send astronauts to the Moon.– Mathematician, astronomer, and surveyor who helped design Washington, D.C.– Biologist known for his pioneering work in cell biology and fertilization....

Activity 7 2025-04-26

Activity 7 crossword puzzle
Across
  1. A collective term for virtual reality, augmented reality, and mixed reality.
  2. The practice of analyzing data to support business decisions.
  3. A cybersecurity solution that monitors and responds to threats on network endpoints like laptops and phones.
  4. Delivering everything, from software to storage, over the internet.
  5. A broader virtual environment combining physical and digital worlds.
  6. Automation of every possible process in business using advanced technology.
  7. A system designed to automatically identify and respond to vulnerabilities in cybersecurity.
  8. A design approach for securing all digital assets independently instead of securing one perimeter.
  9. Insurance coverage protecting companies from cyberattacks and data breaches.
  10. A form of computing based on the principles of quantum theory.
Down
  1. Creating seamless, consistent user experiences across multiple platforms and devices.
  2. A security feature requiring two or more forms of identification before access is granted.
  3. Using technology that is environmentally responsible and resource-efficient.
  4. Regularly testing systems to find security weaknesses before hackers do.
  5. Technology that mimics human learning and decision-making processes.
  6. A technology concept where cloud services are located at multiple locations but managed centrally.

16 Clues: The practice of analyzing data to support business decisions.A form of computing based on the principles of quantum theory.Delivering everything, from software to storage, over the internet.Technology that mimics human learning and decision-making processes.A broader virtual environment combining physical and digital worlds....

Ethical Online Teaching 2025-07-21

Ethical Online Teaching crossword puzzle
Across
  1. law that restricts data collection from children under 13 online
  2. law that protects the privacy of student education records
  3. The trail of data left behind by users on digital platforms
  4. Required permission from users before collecting or using their personal data
  5. A digital platform used to deliver and manage educational content
  6. The practice of protecting systems, networks, and data from digital attacks
  7. A security method that requires two forms of identification to access an account
  8. Using someone else's work without proper attribution
Down
  1. An incident where data is accessed or disclosed without authorization
  2. Any data that could identify a specific individual, like name or student ID
  3. A method of converting data into a secure format to prevent unauthorized access
  4. The ethical duty to keep sensitive information private
  5. The principle of collecting only the data that is necessary
  6. Designing digital content so it can be used by people with disabilities and more accessible
  7. A document that explains how a website or platform collects and uses user data

15 Clues: Using someone else's work without proper attributionThe ethical duty to keep sensitive information privatelaw that protects the privacy of student education recordsThe principle of collecting only the data that is necessaryThe trail of data left behind by users on digital platformslaw that restricts data collection from children under 13 online...

Media texnologiyalar kundalik hayotda 2024-10-22

Media texnologiyalar kundalik hayotda crossword puzzle
Across
  1. Internet va raqamli ma'lumotlarni himoya qilish, kiber hujumlardan himoyalanish va xavfsizlikni ta'minlash
  2. Axborot va ma'lumotlarni tarqatish vositalari
  3. Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya
  4. Search Engine Optimization Veb saytlarni qidiruv tizimlarida yuqori o'rinlarda ko'rsatish uchun amalga oshiriladigan jarayon
  5. Reality Foydalanuvchiga to'liq immersiv tajriba beruvchi kompyuter tomonidan yaratilgan muhit
  6. tarmoqlarda muayyan sohada ta'sirga ega bo'lgan shaxs brendni targ'ib qilishda yordam beradi
  7. Data Katta hajmdagi ma'lumotlar ularni tahlil qilish va ishlatish orqali foydali ma'lumotlarni olish
Down
  1. content Foydalanuvchilar tomonidan yaratilgan kontent brendlar tomonidan foydalaniladi
  2. Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar
  3. marketing Mahsulot yoki xizmatni ijtimoiy tarmoqlar orqali tez tarqatish uchun yaratilgan marketing strategiyasi
  4. computing Internet orqali ma'lumotlarni saqlash va ularga kirish imkonini beruvchi texnologiya
  5. tarmoqlar Foydalanuvchilarga axborot almashish va muloqot qilish imkonini beruvchi platformalar
  6. Kontentni internet orqali jonli tarzda real-time tomosha qilish yoki tinglash imkoniyatini beruvchi texnologiya
  7. media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar
  8. Shaxsiy fikrlar g'oyalar yoki ma'lumotlarni qiziqarli tarzda taqdim etadigan veb-sayt

15 Clues: Axborot va ma'lumotlarni tarqatish vositalariReality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiyamedia Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlarAudio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar...

Technology words 2025-11-26

Technology words crossword puzzle
Across
  1. A wireless technology for connecting devices to the internet
  2. Harmful software designed to damage or access a computer without permission
  3. A computer that provides data or services to other computers on a network
  4. Protection of computers and networks from attacks or unauthorized access
  5. Programs and applications that run on a computer or device
Down
  1. A program used to access and view websites
  2. The physical parts of a computer, like the keyboard or processor.
  3. An organized collection of information stored electronically
  4. The amount of data that can be transmitted over a network in a given time
  5. Software that is built into hardware devices to help them operate
  6. The smallest unit of a Digital image or screen display
  7. A method of encoding information so only authorized people can read it
  8. A group of connected computers that share information
  9. A set of instructions that tells a computer how to solve a problem
  10. The address of a webpage on the internet

15 Clues: The address of a webpage on the internetA program used to access and view websitesA group of connected computers that share informationThe smallest unit of a Digital image or screen displayPrograms and applications that run on a computer or deviceAn organized collection of information stored electronically...

FITE: Vocab. DB 2013-05-16

FITE: Vocab. DB crossword puzzle
Across
  1. how safe your computer is online
  2. iphone
  3. how safe you are online
  4. the brain of the computer
  5. something you use to find info
  6. how you connect to the internet
  7. screen
  8. something you use like a monitor so you can see stuff in the computer
  9. comcast
  10. the wiring inside a computer
  11. wireless internet
  12. touch pad
  13. where headphones go
  14. apps for computer
  15. wired internet
Down
  1. online server
  2. dsl cable
  3. a catchy phrase used by companies
  4. short term memory or ram on a computer
  5. attachments for a computer
  6. brings up different search engine info
  7. something you send to a business to get a job
  8. how you act online
  9. the heart of the computer
  10. non wired internet
  11. something you type on
  12. places in the computer for flash drives
  13. the speed inside your computer
  14. microsoft word
  15. place for a cd on a computer
  16. something you use to put stuff into the computer
  17. an emblem for a company
  18. something that catches your eye to make you interested in a company
  19. a place to keep things
  20. flash drive slot
  21. tall modem (box) for desktop computer

36 Clues: iphonescreencomcastdsl cabletouch padonline servermicrosoft wordwired internetflash drive slotwireless internetapps for computerhow you act onlinenon wired internetwhere headphones gosomething you type ona place to keep thingshow safe you are onlinean emblem for a companythe brain of the computerthe heart of the computerattachments for a computer...

IT Networking Terms 2023-09-07

IT Networking Terms crossword puzzle
Across
  1. a set of computers sharing resources provided by nodes
  2. an independent U.S.A agency that is a part of the government and enforces consumer protection
  3. hardware such as computers an
  4. the process of a fraudulent scheme
  5. a U.S agency that promotes American innovation
  6. a government agency that supports small businesses
  7. a person who is hired for a salary that is also not at an executive level
  8. the center of your network that serves as the main connecting point for all of your devices
  9. converting data into a code
  10. electronics that allow you to access the internet like smartphones, laptops and tablets
  11. an an encrypted security protocol that protects internet traffic on wireless networks
Down
  1. the ability to have physical access to a computer system
  2. the process of copying files over to a secondary loin case in case of equipment failure
  3. a federal executive department that is responsible for public security
  4. a layered approach to protecting data and applications
  5. a container for storing data on a computer
  6. practice of protecting data from hackers
  7. programs used by a computer
  8. a structure used to build software on
  9. a string of special characters used to allow access to a computer service

20 Clues: programs used by a computerconverting data into a codehardware such as computers anthe process of a fraudulent schemea structure used to build software onpractice of protecting data from hackersa container for storing data on a computera U.S agency that promotes American innovationa government agency that supports small businesses...

THE INTERNET 2023-09-19

THE INTERNET crossword puzzle
Across
  1. Secret code to access protected online accounts?
  2. The device that connects a computer to the internet?
  3. The term for online storage and computing resources accessible via the internet?
  4. Transferring files from the internet to a device?
  5. Method of watching/listening to media content online in real-time?
  6. Wireless technology that allows internet access?
  7. Action of looking for information on the web?
  8. The term for online platforms for connecting with others?
  9. Symbol used to categorize and search for topics on social media?
  10. the harmful behavior of using the internet to harass others?
Down
  1. The process of converting data into a code to secure it during transmission?
  2. Security system that blocks unauthorized access to a network?
  3. The practice of protecting computer systems and networks from online threats?
  4. An online seminar/presentation conducted over the internet?
  5. Electronic communication system for sending messages over the internet?
  6. Software used to access and view web pages?
  7. A collection of web pages accessible via the internet?
  8. Device that directs internet traffic to various devices in a network?
  9. A unique address used to locate a website on the web?
  10. The term for content that spreads rapidly across the internet?

20 Clues: Software used to access and view web pages?Action of looking for information on the web?Secret code to access protected online accounts?Wireless technology that allows internet access?Transferring files from the internet to a device?The device that connects a computer to the internet?A unique address used to locate a website on the web?...

Famous Entrepreneurs 2024-02-14

Famous Entrepreneurs crossword puzzle
Across
  1. Caused Chanel to temporarily close her business
  2. One of Microsoft's goals
  3. Tesla faced these types of challenges
  4. Age of Warren Buffet when he made his 1st investment
  5. The percentage that Nike owns of the shoe industry
  6. Premier League football club formally owned by Roman Arkadyevich
  7. Founder of Chanel (first name)
  8. A deal with ____ led Microsoft to release the Windows Operating System
  9. Bill Gates attended this university
  10. The former name of Marvel
  11. Africa, Elon Musk was born in (2 words)
  12. Original name for Nike (3 words)
  13. Dr. Dre partnered with this fashion brand
Down
  1. Phil _____ founder of Nike
  2. Founder of Beats headphones (2 words)
  3. Fast fashion brands create these based on Chanel designs (2 words)
  4. Steve ____ is the co-founder of Apple
  5. Stan Lee created the _____ Four with his friend
  6. Roman Arkadyevich was raised by his______
  7. Company co-founded by Musk focused on artificial intelligence
  8. Warren Buffet was born in Omaha,___________
  9. Jobs developed Apple because he could not_____ a personal computer
  10. The 2008 Financial _____ was a big challenge for Buffet
  11. Stan Lee is the founder of this company
  12. Jimmy ______: Partner with Dr. Dre for Beats

25 Clues: One of Microsoft's goalsThe former name of MarvelPhil _____ founder of NikeFounder of Chanel (first name)Original name for Nike (3 words)Bill Gates attended this universitySteve ____ is the co-founder of AppleTesla faced these types of challengesFounder of Beats headphones (2 words)Stan Lee is the founder of this company...

Criminal Justice Careers 2024-05-07

Criminal Justice Careers crossword puzzle
Across
  1. An investigator who collects information to solve crimes
  2. This type of officer works to prevent the distribution and use of illegal drugs
  3. Maintains order in courtrooms
  4. This agent monitors US borders for illegal activity
  5. Those responsible for managing wildlife are fish and game...
  6. This type of psychologist studies human behavior in connection with crime
  7. Use their knowledge of insects to help in investigations
  8. A person who advises and represents another in legal matters
  9. Study skeletal remains to help in investigations
Down
  1. People who want to protect the US from digital attacks should go into...
  2. This type of officer supervises and maintains order in prisons
  3. Support victims of crime
  4. Provide investigators with a psychological/physical description of a suspect
  5. This investigator collects evidence at crime scenes
  6. Enforce laws and protect citizens by patrolling and responding to crimes
  7. Assists attorneys
  8. Preside over trials
  9. A person who investigates financial statements to look for fraud is a forensic...
  10. Enforces laws and monitors safety on roads and highways
  11. This type of officer supervises convicted criminals who have been given an alternative sentence
  12. An individual who works in the FBI to protect the US from organized crime, terrorism and more

21 Clues: Assists attorneysPreside over trialsSupport victims of crimeMaintains order in courtroomsStudy skeletal remains to help in investigationsThis investigator collects evidence at crime scenesThis agent monitors US borders for illegal activityEnforces laws and monitors safety on roads and highwaysAn investigator who collects information to solve crimes...

Mr. Singer's Technology Crossword 2023-02-04

Mr. Singer's Technology Crossword crossword puzzle
Across
  1. - A path for electricity to flow
  2. - a device that forwards data between networks
  3. - A collection of related data
  4. - Software that manages the resources of a computer
  5. - Information that is stored and processed by a computer
  6. - A visual way of interacting with a computer
  7. - A global network of connected devices
  8. - The last name of your technology teacher
  9. - Software that translates code into machine language
  10. - A type of networking protocol used to connect devices
  11. - A language used to create websites
  12. - A virtual place to store and access data and programs over the Internet
Down
  1. - The central processing unit, or "brain," of a computer
  2. - A unit of measurement for digital information
  3. - Data that is entered into a computer
  4. - Measures taken to protect against online threats
  5. - Finding and fixing errors in code
  6. - A brand of 3D design software
  7. - A coding platform that utilizes blocks instead of text
  8. - A set of steps for solving a problem or achieving a goal
  9. - A program that can harm a computer or steal information
  10. - A security system that blocks unauthorized access to a network
  11. - A system of numbers using only two digits, 0 and 1

23 Clues: - A collection of related data- A brand of 3D design software- A path for electricity to flow- Finding and fixing errors in code- A language used to create websites- Data that is entered into a computer- A global network of connected devices- The last name of your technology teacher- A visual way of interacting with a computer...

L&M Wedding Trivia 2025-01-06

L&M Wedding Trivia crossword puzzle
Across
  1. Luke's birthday month
  2. Current age of both Luke and Mina
  3. Photographer's name
  4. Best man's name
  5. Mina's middle name
  6. Accent stones in their rings
  7. Luke's favorite musical composition (hint: planet)
  8. Mina's favorite food (hint: Wisconsin)
  9. Name of a coffee shop they frequented during college
  10. Mina's college major
  11. Location of their first date
  12. Luke's middle name
  13. Mina's birthday month
  14. One of Luke's hobbies is solving ______ cubes
  15. Maid of honor's name
  16. State where Luke grew up
  17. Luke's college dorm for 3 years
Down
  1. One of Mina's hobbies is making _______ snowflakes
  2. The first class they had together was taught by Dr. ________
  3. Where they went to college
  4. Maximum length (in hours) of their long distance calls before automatic disconnection
  5. Name of both Luke's and Mina's fathers
  6. Their favorite TV show
  7. Their favorite grocery store
  8. State where Mina grew up
  9. Mina's favorite language to study
  10. Luke's first college major
  11. Officiant's name
  12. Month they got engaged
  13. Month they started dating
  14. State where they will live
  15. Luke's favorite food (hint: breakfast)
  16. Mina's college dorm for 3 years
  17. State where they met

34 Clues: Best man's nameOfficiant's nameMina's middle nameLuke's middle namePhotographer's nameMina's college majorMaid of honor's nameState where they metLuke's birthday monthMina's birthday monthTheir favorite TV showMonth they got engagedState where Mina grew upState where Luke grew upMonth they started datingWhere they went to college...

Tugas Daring Informatika Muhammad Ardhani (X-I/23) 2025-04-11

Tugas Daring Informatika Muhammad Ardhani (X-I/23) crossword puzzle
Across
  1. Media sosial berbagi foto atau video budaya?
  2. Profesi yang melindungi sistem dari serangan hacker?
  3. Profesi yang membuat aplikasi atau software?
  4. Media penyebaran konten digital berbentuk video?
  5. Profesi yang mendesain tampilan aplikasi?
  6. Fitur untuk memblokir konten negatif secara otomatis?
  7. Profesi yang menganalisis dan mengolah data?
  8. Pelanggaran HAKI karena meniru karya orang lain disebut?
  9. Istilah untuk berita palsu atau tidak benar?
  10. Tujuan utama pembuatan konten digital budaya?
  11. Salah satu bentuk konten digital berisi gambar dan tulisan?
  12. Search engine yang dulu banyak digunakan sebelum Google?
  13. Perlindungan untuk nama dan logo usaha?
  14. Search engine buatan Microsoft?
Down
  1. Apa yang digunakan untuk mencari informasi di search engine?
  2. Hal utama yang harus dicek untuk validasi konten?
  3. Profesi di bidang digital yang membuat konten online?
  4. Perlindungan untuk penemuan teknologi atau alat baru?
  5. Tempat mencari informasi percaya?
  6. Sebutan lain untuk search engine?
  7. Izin resmi untuk menggunakan karya orang lain?
  8. Profesi yang membuat dan merawat website?
  9. Tindakan jika menemukan konten negatif di internet?
  10. Search engine paling populer saat ini?
  11. Perlindungan untuk karya lagu, tulisan, dan film?
  12. Contoh budaya Indonesia yang bisa dijadikan konten digital?

26 Clues: Search engine buatan Microsoft?Tempat mencari informasi percaya?Sebutan lain untuk search engine?Search engine paling populer saat ini?Perlindungan untuk nama dan logo usaha?Profesi yang mendesain tampilan aplikasi?Profesi yang membuat dan merawat website?Media sosial berbagi foto atau video budaya?Profesi yang membuat aplikasi atau software?...

TTS_RafiFahruddin_29XH 2025-04-15

TTS_RafiFahruddin_29XH crossword puzzle
Across
  1. Profesi yang membuat animasi dan desain digital.
  2. Hak untuk menggandakan dan menyebarkan karya.
  3. Profesional yang menjaga keamanan sistem jaringan.
  4. Informasi bohong yang sengaja disebarkan.
  5. Proses mengecek kebenaran suatu informasi.
  6. Platform populer untuk membagikan video digital.
  7. Aplikasi sosial media tempat berbagi foto dan cerita.
  8. Konten yang menggambarkan adat, seni, atau bahasa daerah disebut konten
  9. Profesi yang bertanggung jawab atas perawatan dan pengelolaan jaringan komputer.
  10. Platform tempat konten negatif sering tersebar.
Down
  1. Jenis hak kekayaan intelektual untuk logo dan nama dagang
  2. Informasi digital yang belum tentu benar disebut.
  3. Orang yang menulis dan mengembangkan kode program.
  4. Mesin pencari milik China yang tidak menggunakan Google
  5. Proses menciptakan konten digital seperti video, artikel, atau gambar
  6. Orang yang menganalisis dan mengolah data digital.
  7. Fitur yang digunakan untuk membatasi pencarian ke satu situs saja, misalnya: site:cnn.com
  8. Informasi digital yang belum tentu benar disebut.
  9. Proses penyebaran konten ke masyarakat luas.
  10. Search engine yang identik dengan logo huruf “Y” ungu
  11. Surat resmi yang menyatakan kepemilikan paten atau hak cipta.
  12. Singkatan dari Hak Atas Kekayaan Intelektual.
  13. Mesin pencari paling populer
  14. Istilah untuk pencurian karya orang lain tanpa izin.
  15. Situs web buatan Microsoft yang juga berfungsi sebagai search engine

25 Clues: Mesin pencari paling populerInformasi bohong yang sengaja disebarkan.Proses mengecek kebenaran suatu informasi.Proses penyebaran konten ke masyarakat luas.Hak untuk menggandakan dan menyebarkan karya.Singkatan dari Hak Atas Kekayaan Intelektual.Platform tempat konten negatif sering tersebar.Profesi yang membuat animasi dan desain digital....

Scientific Discoveries and Inventions 13 2024-11-03

Scientific Discoveries and Inventions 13 crossword puzzle
Across
  1. "The study of landforms and the processes that shape them."
  2. "The protection of digital data and systems from cyber attacks."
  3. "A particle representing a quantum of light or other electromagnetic radiation."
  4. "The preservation of humans at low temperatures for possible revival."
  5. "The breakdown of organic substances by natural organisms."
  6. "The science of creating three-dimensional images with laser technology."
  7. "The removal of tissue for diagnostic examination."
  8. "An unstable isotope that decays, emitting radiation."
  9. "The ability to meet current needs without compromising future resources."
Down
  1. "The study of life in the universe beyond Earth."
  2. "The study of the mechanics of living organisms and their movements."
  3. "The scientific study of animal biology."
  4. "The branch of biology dealing with hormones and glands."
  5. "The science of designing equipment to fit the human body."
  6. "A parasitic disease caused by Toxoplasma gondii, often in animals."
  7. "The study of electronic properties of materials at low temperatures."
  8. "Organelles known as the 'powerhouses' of cells, producing energy."
  9. "A method of growing plants in a water-based solution, without soil."
  10. "A technique that modifies genes to treat or prevent disease."
  11. "A force that makes a body follow a curved path toward the center."

20 Clues: "The scientific study of animal biology.""The study of life in the universe beyond Earth.""The removal of tissue for diagnostic examination.""An unstable isotope that decays, emitting radiation.""The branch of biology dealing with hormones and glands.""The study of landforms and the processes that shape them."...

Industrial security 2025-10-15

Industrial security crossword puzzle
Across
  1. – A weakness that can be exploited by threats.
  2. – A prepared procedure to handle emergencies or disasters.
  3. – Device that signals when unauthorized access occurs.
  4. – Continuous observation of people or areas for security purposes.
  5. – Protection of computer systems from digital attacks.
  6. – The process of identifying and evaluating potential hazards.
  7. – A set of rules and guidelines for security operations.
  8. – The act of stealing small quantities or low-value items from the workplace.
  9. – A person employed to protect property and personnel.
  10. – The routine inspection of areas to ensure safety and security.
Down
  1. – Unauthorized entry into a restricted area.
  2. – A designated safe route used during an evacuation.
  3. – A badge used for identification and access within a facility.
  4. – A potential cause of unwanted incident or harm.
  5. – The act of keeping people and assets safe from harm.
  6. – Written documentation of a security event or breach.
  7. – Security measure restricting movement due to threats.
  8. – A system that uses video cameras to monitor and record activities.
  9. – A system that restricts entry to authorized personnel only.
  10. – The deliberate destruction or disruption of industrial operations.

20 Clues: – Unauthorized entry into a restricted area.– A weakness that can be exploited by threats.– A potential cause of unwanted incident or harm.– A designated safe route used during an evacuation.– The act of keeping people and assets safe from harm.– Written documentation of a security event or breach....

VCE Computing Glossary 2025-11-18

VCE Computing Glossary crossword puzzle
Across
  1. Protecting systems and data from threats.
  2. English-like statements representing algorithms.
  3. Graphical representations of complex data or information that provide an overview of a topic
  4. A process used when developing solutions to identify and fix errors
  5. Making a copy of data for recovery in case of loss.
  6. Planning tasks timelines and milestones for projects.
  7. Testing carried out by developers in a controlled environment during development.
  8. Testing by end-users under real conditions after development.
  9. Moving old data to long-term storage.
  10. Encoding data to prevent unauthorized access.
Down
  1. Data collected by researchers directly from sources using methods such as surveys, interviews and observations
  2. Data Data collected by someone else for a different purpose.
  3. Generating and evaluating innovative ideas for solutions.
  4. Data Data collected first-hand by the researcher.
  5. Checking data for accuracy and consistency after entry.
  6. Consideration of how users perceive and respond when interacting with a digital system
  7. Common standards for consistency in solutions.
  8. Describes the overall accuracy, authenticity, correctness, reasonableness, relevance and timeliness of data
  9. Issues that arise that challenge moral standards, principles or expectations
  10. Checking data for reasonableness and completeness before processing.

20 Clues: Moving old data to long-term storage.Protecting systems and data from threats.Encoding data to prevent unauthorized access.Common standards for consistency in solutions.English-like statements representing algorithms.Data Data collected first-hand by the researcher.Making a copy of data for recovery in case of loss....

Malware Monthly June 2022 2022-07-06

Malware Monthly June 2022 crossword puzzle
Across
  1. Russian backed group attacking Lithuania
  2. This countries government was hit hard by Conti's "big finale"
  3. What tab in the Nebula interface allows you to monitor and export data?
  4. Automatically identify these with OneView
  5. Cybersecurity vendors identified an increase of ????% in the use of Microsoft Excel macros compared to the fourth quarter 2021.
Down
  1. One of the gangs empowered by the fall of Conti.
  2. Type of software scan used to identify vulnerabilities in OneView
  3. DNS Blocking default setting on security categories
  4. Process used by scammers to steal credit card numbers and credentials in fake Instagram plot.
  5. One of the gangs empowered by the fall of Conti.
  6. This, thought dead, botnet is back and was the top global threat of April, according to Check Point.
  7. One of the gangs empowered by the fall of Conti.
  8. Lithuania blocked shipments of goods to this Russian enclave
  9. Type of Instagram account created by scammers to fool friends of the victim into interacting with it.

14 Clues: Russian backed group attacking LithuaniaAutomatically identify these with OneViewOne of the gangs empowered by the fall of Conti.One of the gangs empowered by the fall of Conti.One of the gangs empowered by the fall of Conti.DNS Blocking default setting on security categoriesLithuania blocked shipments of goods to this Russian enclave...

Security - Hard 2023-11-28

Security - Hard crossword puzzle
Across
  1. practice of intentionally and ethically hacking into systems to discover vulnerabilities
  2. cryptographic protocol providing secure key exchange over an untrusted network, often used in VPNs
  3. security model emphasizing the importance of confidentiality, integrity, and availability of information
  4. type of attack involves capturing and analyzing network traffic to obtain sensitive information
  5. attack that employs multiple methods simultaneously
  6. type of malware changes its appearance and characteristics to evade detection
Down
  1. process of hiding information within another file or message
  2. cybersecurity principle ensuring that data is accurate, complete, and unaltered
  3. practice of disguising data traffic to make it look like normal traffic
  4. Linux user's favorite game
  5. cryptographic process verifying the integrity of data and ensures it has not been altered during transmission
  6. type of malware disguises itself as legitimate software to trick users into installing it

12 Clues: Linux user's favorite gameattack that employs multiple methods simultaneouslyprocess of hiding information within another file or messagepractice of disguising data traffic to make it look like normal traffictype of malware changes its appearance and characteristics to evade detection...