cybersecurity Crossword Puzzles

Cyber attack crossword puzzle 2023-09-03

Cyber attack crossword puzzle crossword puzzle
Across
  1. A secret word or phrase used to gain access to your accounts.
  2. Criminal activities carried out using computers or the internet.
  3. A security barrier that filters network traffic to prevent unauthorized access.
  4. A set of rules and practices for ensuring the security of computer systems and data.
  5. A fake email or website that tricks individuals into revealing sensitive information.
Down
  1. The unauthorized access, theft, or manipulation of data.
  2. Malicious software specifically designed to harm, infiltrate, or compromise computer systems.
  3. A malicious software that can encrypt files and demand a ransom for their release.
  4. An organization or individual responsible for securing computer systems and networks.
  5. A program designed to protect a computer from viruses and malware.

10 Clues: The unauthorized access, theft, or manipulation of data.A secret word or phrase used to gain access to your accounts.Criminal activities carried out using computers or the internet.A program designed to protect a computer from viruses and malware.A security barrier that filters network traffic to prevent unauthorized access....

Edition Puzzle 2 2024-01-02

Edition Puzzle 2 crossword puzzle
Across
  1. Refers to an interconnected and intelligent energy network
  2. A crucial field ensuring the safety and integrity of digital energy systems
  3. Method using complex algorithms for managing and optimizing energy systems
  4. The range of energy sources used within a particular system or economy
  5. Pricing mechanism adjusting prices based on immediate supply and demand
  6. Critical for balancing supply and demand in a grid increasingly reliant on renewable sources
Down
  1. The loss of energy as electricity is transmitted over long distances
  2. A system that pays for reliable sources of energy to ensure grid stability
  3. Deliberate shutdown of electric power in parts of a system to prevent total failure
  4. Describes a type of decentralized communications model in energy transactions

10 Clues: Refers to an interconnected and intelligent energy networkThe loss of energy as electricity is transmitted over long distancesThe range of energy sources used within a particular system or economyPricing mechanism adjusting prices based on immediate supply and demandA system that pays for reliable sources of energy to ensure grid stability...

SOCIETY 4 2024-07-02

SOCIETY 4 crossword puzzle
Across
  1. Software designed to perform a specific task, often more distracting than useful.
  2. The practice of protecting systems from cyber attacks, frequently failing.
  3. A digital version of a book, ensuring you never run out of things to read and ignore.
  4. A video blog, combining the narcissism of a blog with the vanity of a selfie.
  5. A small mechanical device, designed to make life easier but often complicating it.
Down
  1. The buying and selling of goods online, often leading to buyer’s remorse.
  2. A self-portrait photograph, taken to boost one’s self-esteem.
  3. A mobile device that makes people dumber.
  4. A simulated experience, preferred over actual reality.
  5. A personal website for sharing opinions, read primarily by the author's family.

10 Clues: A mobile device that makes people dumber.A simulated experience, preferred over actual reality.A self-portrait photograph, taken to boost one’s self-esteem.The buying and selling of goods online, often leading to buyer’s remorse.The practice of protecting systems from cyber attacks, frequently failing....

Cyber/Digital Literacy 2024-11-06

Cyber/Digital Literacy crossword puzzle
Across
  1. Type of crime that uses computers or networks harm.
  2. It is use protect your personal information
  3. It has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness
  4. Type of malware that can make copies of itself and spread automatically across computers in a network.
  5. typing targeted keywords about a subject into a search engine.
Down
  1. Bullying that takes place online using your smartphone, tablet and computer
  2. Who's actively participate in cyberspace and the online community offered through the internet
  3. An example of computer virus
  4. Refers to the trail of data you leave when using the internet.
  5. Assessing the credibility, reliability, and relevance of the information found online.

10 Clues: An example of computer virusIt is use protect your personal informationType of crime that uses computers or networks harm.Refers to the trail of data you leave when using the internet.typing targeted keywords about a subject into a search engine.Bullying that takes place online using your smartphone, tablet and computer...

We Grow: Learning Week - Crossword Conquest! 2025-02-11

We Grow: Learning Week - Crossword Conquest! crossword puzzle
Across
  1. The ability to inspire and motivate others (10 letters)
  2. The act of working together towards a common goal (11 letters)
  3. A plan for achieving long-term goals (8 letters)
  4. A version control system widely used for tracking changes in source code (3 letters)
  5. A programming language known for its simplicity and readability (6 letters)
Down
  1. A person who guides and supports others (6 letters)
  2. A popular operating system used in servers and desktops (5 letters)
  3. The ability to understand and share the feelings of another (10 letters)
  4. The practice of protecting systems, networks, and programs from digital attacks (10 letters)
  5. The process of improving your skills and knowledge to advance in your career (10 letters)

10 Clues: A plan for achieving long-term goals (8 letters)A person who guides and supports others (6 letters)The ability to inspire and motivate others (10 letters)The act of working together towards a common goal (11 letters)A popular operating system used in servers and desktops (5 letters)...

CyberScho 2025-06-18

CyberScho crossword puzzle
Across
  1. The introduction of new ideas, methods, or devices to improve something or create something original.
  2. The point where humans and machines meet—think screen, keyboard, or touchpad.
  3. The digital shield that protects your data and devices online.
  4. What you do to build a robot—piece by piece, part by part.
Down
  1. Part of the school’s theme for S.Y. 2025-2026
  2. CyberScho’s very own robot buddy!
  3. The process of converting data into a coded form to prevent unauthorized access.
  4. A cyber threat that that tries to harm your computer or steal your info.
  5. The branch of technology that deals with the design, construction, operation, and application of robots.
  6. What powers our modern world, from smartphones to smart classrooms.

10 Clues: CyberScho’s very own robot buddy!Part of the school’s theme for S.Y. 2025-2026What you do to build a robot—piece by piece, part by part.The digital shield that protects your data and devices online.What powers our modern world, from smartphones to smart classrooms.A cyber threat that that tries to harm your computer or steal your info....

Internet Safety 2025-10-06

Internet Safety crossword puzzle
Across
  1. Details like your name, address, phone number, or passwords
  2. Knowing how to find, evaluate, and use digital information safely
  3. The personal trail of info you leave behind when using the internet
  4. Protecting networks, devices, and data from attacks or damage
  5. Controls that help you decide who can see your posts or account info
  6. A second security step that confirms your identity, like a code sent to your phone
Down
  1. The version of yourself you create or share online
  2. An online message or email meant to trick you into sharing private data
  3. When private information is accessed or stolen without permission
  4. How others view you based on what they see about you online

10 Clues: The version of yourself you create or share onlineDetails like your name, address, phone number, or passwordsHow others view you based on what they see about you onlineProtecting networks, devices, and data from attacks or damageKnowing how to find, evaluate, and use digital information safely...

Kaien 8Gamma 2023-01-19

Kaien 8Gamma crossword puzzle
Across
  1. it is created when that data has been processed and becomes meaningful.
  2. a secret word that must be used to gain admission to a place.
  3. number a number that you dial on the telephone to reach a particular person, business, and more.
  4. media a collective term of website that focus on communication and more.
  5. a panel of keys that operate a computer or typewriter.
Down
  1. it is the practice of protecting system, networks, and programs from digital attacks.
  2. a device where people use to communicate when ever they want.
  3. a social media that was created by Mark Zuckerberg.
  4. a app that you could search anything.
  5. it is the raw facts and figures.

10 Clues: it is the raw facts and figures.a app that you could search anything.a social media that was created by Mark Zuckerberg.a panel of keys that operate a computer or typewriter.a device where people use to communicate when ever they want.a secret word that must be used to gain admission to a place....

Info Security 2025-09-10

Info Security crossword puzzle
Across
  1. Proactive promise to mitigate cyber risks.
  2. Digital protection against online threats.
  3. software intentionally designed to cause damage to a computer, server, or network.
  4. a potential danger or a malicious actor who could exploit a vulnerability to cause harm
  5. A technology that creates a secure, encrypted connection over a less secure network like the internet
Down
  1. The process of scrambling data to make it unreadable without a key
  2. process of verifying a user's identity
  3. A social engineering attack that uses fraudulent emails or messages to trick people into revealing sensitive information
  4. ensure that a business can continue to operate and deliver essential products or services
  5. A network security system that monitors and controls incoming and outgoing network traffic

10 Clues: process of verifying a user's identityProactive promise to mitigate cyber risks.Digital protection against online threats.The process of scrambling data to make it unreadable without a keysoftware intentionally designed to cause damage to a computer, server, or network....

Cybersecurity and Common Online Threats 2025-10-14

Cybersecurity and Common Online Threats crossword puzzle
Across
  1. A weakness that can be exploited by cybercriminals
  2. Engineering A manipulation technique that tricks people into giving away confidential information.
  3. The practice of protecting computers, networks, and data from digital attacks or unauthorized access.
  4. A kind of malware that locks your files and demands payment to unlock them.
  5. The process of converting information into a secure code to prevent unauthorized access.
  6. A type of scam where someone pretends to be trustworthy to steal personal information.
Down
  1. Software designed to harm or disrupt computers or steal data.
  2. The quality of being real or genuine.
  3. Software that secretly tracks your online activity or gathers personal data.
  4. To weaken or harm something, especially security or privacy.

10 Clues: The quality of being real or genuine.A weakness that can be exploited by cybercriminalsTo weaken or harm something, especially security or privacy.Software designed to harm or disrupt computers or steal data.A kind of malware that locks your files and demands payment to unlock them....

Intro to Law, Public service, and safety 2021-12-20

Intro to Law, Public service, and safety crossword puzzle
Across
  1. criminal activities that are run by groups and are carried on a large scale
  2. provides protection against threats to a users privacy and security
  3. the level that sheriff departments are on
Down
  1. security provided by a person, other than a public service, to protect or guard people
  2. the study around the nature of fire
  3. 12 people sworn to give a verdict in a legal case
  4. protects and defends the united states against foreign intelligence and enforce the criminal laws in the US
  5. to ask a higher court to review a decision by a judge
  6. taking someone's property unlawfully and by force
  7. the criminal act of deliberately setting fire to property

10 Clues: the study around the nature of firethe level that sheriff departments are on12 people sworn to give a verdict in a legal casetaking someone's property unlawfully and by forceto ask a higher court to review a decision by a judgethe criminal act of deliberately setting fire to property...

Tech 2023-06-07

Tech crossword puzzle
Across
  1. is a mobile operating system
  2. is a mapping from some domain
  3. is a method of representing data in a visual, machine-readable form.
  4. is the protection of computer systems and networks from attack by malicious actors
Down
  1. are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
  2. is the world's largest technology company by revenue
  3. is a collection of discrete values
  4. represents text, computer processor instructions, or any other data using a two-symbol system.
  5. is the most important processor in a given computer.
  6. is a hardware or software component that stores data

10 Clues: is a mobile operating systemis a mapping from some domainis a collection of discrete valuesis the world's largest technology company by revenueis the most important processor in a given computer.is a hardware or software component that stores datais a method of representing data in a visual, machine-readable form....

AI 2025-03-06

AI crossword puzzle
Across
  1. Extremely large datasets used to train AI systems and improve their decision-making.
  2. The tendency of an AI system to produce unfair outcomes due to flaws in data or algorithms
  3. AI-generated media, such as videos or images, that convincingly mimic real people or events
  4. The programs and applications that run on a computer
  5. Moral principles that govern a person’s behaviour or the conducting of an activity.
Down
  1. The physical parts of a computer
  2. Able to operate independently without human control
  3. A collection of information used to train AI systems
  4. The process of converting data into a code for security
  5. The protection of AI systems and networks from hacking and malicious attacks

10 Clues: The physical parts of a computerAble to operate independently without human controlA collection of information used to train AI systemsThe programs and applications that run on a computerThe process of converting data into a code for securityThe protection of AI systems and networks from hacking and malicious attacks...

BRA PUZZLE 2025-05-30

BRA PUZZLE crossword puzzle
Across
  1. the state of being protected against the criminal or unauthorized use of electronic data
  2. the potential for any event or circumstance to hinder the achievement of any set goal/target.
  3. the ability of individuals to control access to their personal information and to be free from interference or intrusion.
  4. being honest and consistently upholding strong moral and ethical principles.
  5. being responsible for your actions and their consequences.
Down
  1. to look over or check for possible errors or omissions
  2. one of the 4 pillars of a tax administration
  3. the practice of keeping information private
  4. principles or standards of behavior
  5. Control activity that prevents, corrects or detects errors to mitigate or lessen risks

10 Clues: principles or standards of behaviorthe practice of keeping information privateone of the 4 pillars of a tax administrationto look over or check for possible errors or omissionsbeing responsible for your actions and their consequences.being honest and consistently upholding strong moral and ethical principles....

CIS101 Cybersecurity Questions by Cale Therault 2025-06-04

CIS101 Cybersecurity Questions by Cale Therault crossword puzzle
Across
  1. A technology that creates a secure, encrypted connection over a less secure network, such as the internet.
  2. The process of identifying, analyzing, and evaluating potential risks to a system.
  3. A method of authentication that require two or more methods to gain access.
  4. Unsolicited or undesired electronic messages, typically email.
  5. The practice and study of techniques for secure communication in the presence of adversaries.
  6. The process of verifying the identity of a user or system.
  7. A socially engineered cyberattack where an attacker attempts to trick individuals into revealing sensitive information, often through deceptive emails or websites.
  8. Software designed to detect, prevent, and remove malicious software.
  9. An incident where unauthorized access to data or systems occurs.
  10. Short for malicious software.
  11. A software update released to fix vulnerabilities and bugs.
Down
  1. A cyber attack made from numerous compromised computer systems.
  2. An attempt to disrupt, damage, or gain unauthorized access to various computer systems.
  3. The process of converting data into code, especially to prevent unauthorized access.
  4. Making full use of and/or derive benefit from a resource.
  5. A weakness or flaw in a system that can be exploited by a threat.
  6. A type of malware that maliciously encrypts files and demands money for release.
  7. A potential danger that might exploit a vulnerability to breach security.
  8. A type of malicious software that attaches itself to legitimate programs and spreads to other computers.
  9. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

20 Clues: Short for malicious software.Making full use of and/or derive benefit from a resource.The process of verifying the identity of a user or system.A software update released to fix vulnerabilities and bugs.Unsolicited or undesired electronic messages, typically email.A cyber attack made from numerous compromised computer systems....

FC Times Crossword 2019-02-15

FC Times Crossword crossword puzzle
Across
  1. Rodolfo's home country
  2. The street name of FC's new office
  3. Foundation led this meditation company's series A
  4. Foundation's newest unicorn
Down
  1. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  2. The conference Joanne and Steve spoke at in 2018
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. The New York Times said this company will emerge as the leading residential solar installer in the US

8 Clues: Rodolfo's home countryFoundation's newest unicornThe street name of FC's new officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AThis NYC-based insurance startup was named a CNBC Upstart 100 company in 2018...

Technology 2023-01-30

Technology crossword puzzle
Across
  1. an act of transferring something such files from a usually large computer to the memory of another device
  2. a technique such as the combining of sound, video, and text for expressing ideas
  3. not physically existing as such but made by software to appear to do so
  4. the state of being protected against the criminal or unauthorized use of electronic data
Down
  1. a device for introducing fresh air or expelling foul or stagnant air
  2. a thing made for a particular purpose
  3. operating by means of transmitted electromagnetic waves
  4. an area or window on a computer screen

8 Clues: a thing made for a particular purposean area or window on a computer screenoperating by means of transmitted electromagnetic wavesa device for introducing fresh air or expelling foul or stagnant airnot physically existing as such but made by software to appear to do soa technique such as the combining of sound, video, and text for expressing ideas...

C.A.G.E. File 1 2020-05-07

C.A.G.E. File 1 crossword puzzle
Across
  1. Microchip is the C.A.G.E. helper ___________.
  2. Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
  3. Agent X also goes by the name __________.
  4. In order to stay safe ________, be sure to only go to websites you trust.
Down
  1. To be a C.A.G.E. secret ____________ you must work hard and fight for good!
  2. ________security has to do with online safety.
  3. A hacker might try to gain access to your computer by sending a bad link in an __________.
  4. A _____ tester is an important cybersecurity job. It is also called a penetration tester.

8 Clues: Agent X also goes by the name __________.Microchip is the C.A.G.E. helper ___________.________security has to do with online safety.In order to stay safe ________, be sure to only go to websites you trust.To be a C.A.G.E. secret ____________ you must work hard and fight for good!...

C.A.G.E. File 1 2020-05-07

C.A.G.E. File 1 crossword puzzle
Across
  1. Microchip is the C.A.G.E. helper ___________.
  2. Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
  3. To be a C.A.G.E. secret ____________ you must work hard and fight for good!
  4. In order to stay safe ________, be sure to only go to websites you trust.
Down
  1. ________security has to do with online safety.
  2. Agent X also goes by the name __________.
  3. A hacker might try to gain access to your computer by sending a bad link in an __________.
  4. A _____ tester is an important cybersecurity job. It is also called a penetration tester.

8 Clues: Agent X also goes by the name __________.Microchip is the C.A.G.E. helper ___________.________security has to do with online safety.In order to stay safe ________, be sure to only go to websites you trust.To be a C.A.G.E. secret ____________ you must work hard and fight for good!...

Cyber Security keywords 2024-06-07

Cyber Security keywords crossword puzzle
Across
  1. When a person calls you with a made up story to get personal information
  2. Software that secretly tracks what you do
  3. When an unauthorised user gains access to your account
  4. Software that disguises itself as something legitimate
  5. Software that copies itself over and over when it infects your device
Down
  1. The way we protect our devices and data online is known as
  2. When you receive an email from an unknown person telling you a story and asking for personal information
  3. Software designed to cause harm to a computer and its files

8 Clues: Software that secretly tracks what you doWhen an unauthorised user gains access to your accountSoftware that disguises itself as something legitimateThe way we protect our devices and data online is known asSoftware designed to cause harm to a computer and its filesSoftware that copies itself over and over when it infects your device...

Cyberspace 2025-10-16

Cyberspace crossword puzzle
Across
  1. a hypothetical moment in time when AI and other technologies have become so advanced that humanity undergoes a dramatic change
  2. the application of scientific knowledge for practical purposes, especially in industry
  3. a new method, idea, or product
  4. art of protecting networks, devices, and data from unauthorized access or criminal use
Down
  1. the perception or knowledge of something
  2. an integrated set of components for collecting, storing, and processing data
  3. the ability to learn or understand or to deal with new or trying situations
  4. Science the interdiscplinary field that involves extracting meaningful insights

8 Clues: a new method, idea, or productthe perception or knowledge of somethingthe ability to learn or understand or to deal with new or trying situationsan integrated set of components for collecting, storing, and processing dataScience the interdiscplinary field that involves extracting meaningful insights...

Malware Monthly March 2022 2022-04-08

Malware Monthly March 2022 crossword puzzle
Across
  1. Despite reports, LAPSUS$ never actually used this type of malware
  2. Ransomware deletes Volume ______ copies, preventing user recovery of encrypted files.
  3. Government agency who reported 52 infrastructure organizations had been attacked
  4. Another name for HermeticRansom
  5. United States Agency concerned with cybersecurity
  6. Microsoft product affected by the CVE-2017-11882 vulnerability
  7. Percent of phishing links clicked on by only 4% of employees.
  8. Uses the ransomware extension dihlxbl
  9. A communication app rarely used by cybercriminals, but heavily used by LAPSUS$
  10. Top Ransomware Family of February 2022
Down
  1. A malware group targeting Ukraine with phishing attacks
  2. Ransomware family that threatend to publish stolen data on a "Wall of Shame"
  3. The age of the LAPSUS$ ringleader who was arrested in the UK
  4. These types of attacks will likely plead for bogus charity donations
  5. Most malware events revolve around the 3% of users who suffered from ___ or more malware events.
  6. How many thousands of Ukranian currency is offered by Formbook in their phishing e-mail
  7. Ensuring all employees have the correct access priviledges
  8. How many, out of five, employees NEVER click on phishing links.

18 Clues: Another name for HermeticRansomUses the ransomware extension dihlxblTop Ransomware Family of February 2022United States Agency concerned with cybersecurityA malware group targeting Ukraine with phishing attacksEnsuring all employees have the correct access priviledgesThe age of the LAPSUS$ ringleader who was arrested in the UK...

CBDCs are they a good idea. 2024-02-08

CBDCs are they a good idea. crossword puzzle
Across
  1. (4)a financial institution that is licensed to accept checking and savings deposits and make loans
  2. (13)credential Des (anag)
  3. (5)country situated in eastern Asia on the western shore of the Pacific Ocean, with an area of 9.6 million square kilometers.
  4. (7)she cark (anag)
  5. (6)a digital currency, such as Bitcoin, that is used as an alternative payment method or specula
  6. (8,9)federal agency
  7. (8)the ability to make your own decisions without being controlled by anyone else
  8. (7)island country of the West Indies Capital is Kingston.
  9. (4)information (syn)
Down
  1. (5,8)the practice of protecting systems, networks, and programs from digital attacks
  2. (8)acquisition (syn)
  3. (10)of or relating to the control or direction of an activity by a set of rules, laws, etc.
  4. (7)computerised (syn)
  5. (8)legal tender
  6. (7,2,6)confiscation of property by the authorities
  7. (9)surmount. surpass (rule of law)
  8. (4)a currency not backed by a commodity and typically authorised by the issuing government to be legal tender.
  9. (1,1,1,1) Central Bank digital currency

18 Clues: (8)legal tender(7)she cark (anag)(8,9)federal agency(8)acquisition (syn)(4)information (syn)(7)computerised (syn)(13)credential Des (anag)(9)surmount. surpass (rule of law)(1,1,1,1) Central Bank digital currency(7,2,6)confiscation of property by the authorities(7)island country of the West Indies Capital is Kingston....

Netowork Puzzle 101 2020-12-04

Netowork Puzzle 101 crossword puzzle
Across
  1. method of exchanging messages online
  2. field of work that prevents hackers
Down
  1. connection that allows peers to connect together
  2. Affected HCC type of attack uses emails

4 Clues: field of work that prevents hackersmethod of exchanging messages onlineAffected HCC type of attack uses emailsconnection that allows peers to connect together

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Social engineers use this to trick you
  2. The practice of being diligent about your online activities
Down
  1. Assurance that information is accurate and Trustworthy
  2. Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. not disclosing information to unauthorized individuals

5 Clues: Social engineers use this to trick youAssurance that information is accurate and Trustworthynot disclosing information to unauthorized individualsThe practice of being diligent about your online activitiesEngineer Someone who takes information from many sources and uses them to piece together a bigger puzzle

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. PSB Academy’s branch for training students in life sciences, sport science, engineering and cybersecurity.
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  5. First part of SC’s mission - provide (someone or something) the means to do something.
  6. IES, IET, IPRS
  7. First part of student life’s tagline
Down
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. From radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of student life’s tagline
  5. Second part of SC’s mission - participate or become involved in.
  6. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of SC’s mission - participate or become involved in.
  5. Third part of SC’s mission - give (someone) the power or drive to do something.
  6. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  7. Second part of student life’s tagline
  8. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
  1. IES, IET, IPRS
  2. SC, CSC, Dance Club, Music Club, Photog, SAC
  3. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  4. First part of SC’s mission - provide (someone or something) the means to do something.
  5. First part of student life’s tagline

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. IES, IET, IPRS
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. SC initiated, amazing three-times a year, event
  5. First part of SC’s mission - provide (someone or something) the means to do something.
Down
  1. First part of student life’s tagline
  2. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  3. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  4. Second part of student life’s tagline
  5. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  6. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  7. Keep it lit!
  8. Second part of SC’s mission - participate or become involved in.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASC initiated, amazing three-times a year, eventSecond part of SC’s mission - participate or become involved in....

ccf 2020-06-24

ccf crossword puzzle
Across
  1. SC initiated, amazing three-times a year, event
  2. Keep it lit!
  3. From radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  4. Second part of SC’s mission - participate or become involved in.
  5. Third part of SC’s mission - give (someone) the power or drive to do something.
  6. PSB Academy’s branch for training students in life sciences, sport science, engineering and cybersecurity.
  7. Second part of STA’s tagline
  8. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
  1. IES, IET, IPRS
  2. SC, CSC, Dance Club, Music Club, Photog, SAC
  3. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  4. First part of SC’s mission - provide (someone or something) the means to do something.
  5. First part of STA’s tagline

13 Clues: Keep it lit!IES, IET, IPRSFirst part of STA’s taglineSecond part of STA’s taglineSC, CSC, Dance Club, Music Club, Photog, SACSC initiated, amazing three-times a year, eventCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASecond part of SC’s mission - participate or become involved in....

International security 14 (KCNS) 2022-01-08

International security 14 (KCNS) crossword puzzle
Across
  1. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. It is the process of validating a cryptocurrency transaction.
  3. The programs and other operating information used by a computer.
Down
  1. Using, requiring, or involved in high technology or short for high technology.
  2. Criminal activities carried out by means of computers or the internet.
  3. An arrangement of intersecting horizontal and vertical lines.
  4. The state of being connected or interconnected.
  5. A legal or other formal measure intended to preserve civil liberties and rights .
  6. A cryptocurrency, a virtual currency or a digital currency.
  7. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: The state of being connected or interconnected.A cryptocurrency, a virtual currency or a digital currency.An arrangement of intersecting horizontal and vertical lines.It is the process of validating a cryptocurrency transaction.The programs and other operating information used by a computer....

International security 14 (KCNS) 2022-01-08

International security 14 (KCNS) crossword puzzle
Across
  1. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. It is the process of validating a cryptocurrency transaction.
  3. The programs and other operating information used by a computer.
Down
  1. Using, requiring, or involved in high technology or short for high technology.
  2. Criminal activities carried out by means of computers or the internet.
  3. An arrangement of intersecting horizontal and vertical lines.
  4. The state of being connected or interconnected.
  5. A legal or other formal measure intended to preserve civil liberties and rights .
  6. A cryptocurrency, a virtual currency or a digital currency.
  7. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: The state of being connected or interconnected.A cryptocurrency, a virtual currency or a digital currency.An arrangement of intersecting horizontal and vertical lines.It is the process of validating a cryptocurrency transaction.The programs and other operating information used by a computer....

G.A.B.I 2023-09-13

G.A.B.I crossword puzzle
Across
  1. kegiatan p5 dalam membahas mengenai pentingnya demolrasi adalah pembuatan
  2. Dalam kegiatan keyakinan kelas,siswa dapat memberikan pendapatnya,karena salah satu poin p5 adalah Berpendapat
  3. bapak Demokrasi Indonesia
  4. kurikulum yang lebih menegaskan demokrasi dalam menyelesaikan tugas tugas yang menuntut kebersamaan disebut
  5. salah satu poin penting dalam pelaksanaan demokrasi adalah. Yang lancar
  6. seminar bersama ko Robertus wijaya membahas pentingnya peran gen muda dalam
Down
  1. kegiatan p5 yang melakukan kegiatan berdiskusi untuk membahas nilai pancasila yang berada di dalam kelas dan sebagai pelanutan kelas
  2. Dalam p5 siswa diharpkan dapat dalam demokrasi
  3. salah satu tugas dalam nenjaga sistem pemerintahan disebut
  4. salah satu kegiatan memberikan suara untuk memilih pemimpin di sekolah adalah satu prinsip demokrasi terdapat pada sila

10 Clues: bapak Demokrasi IndonesiaDalam p5 siswa diharpkan dapat dalam demokrasisalah satu tugas dalam nenjaga sistem pemerintahan disebutkegiatan p5 dalam membahas mengenai pentingnya demolrasi adalah pembuatansalah satu poin penting dalam pelaksanaan demokrasi adalah. Yang lancar...

Cyber Security 2024-03-26

Cyber Security crossword puzzle
Across
  1. A piece of software designed to update or fix vulnerabilities in a computer program.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  4. Software designed to harm or gain unauthorized access to a computer system.
  5. A secret combination of characters used to gain access to a system.
Down
  1. A network security system that monitors and controls incoming and outgoing network traffic.
  2. Software designed to detect and remove malicious software.
  3. Software that secretly gathers information about a person or organization.
  4. A type of malware disguised as legitimate software.
  5. The process of converting information into a code to prevent unauthorized access.

10 Clues: A type of malware disguised as legitimate software.Software designed to detect and remove malicious software.A secret combination of characters used to gain access to a system.Software that secretly gathers information about a person or organization.Software designed to harm or gain unauthorized access to a computer system....

iWOWriors Onboarding Quiz 1 2024-02-20

iWOWriors Onboarding Quiz 1 crossword puzzle
Across
  1. A campaign that shares the potential IT Security Risks and how to overcome them.
  2. What is needed to be done before disposing of paper documents?
  3. ____ Setting is the first milestone in Performance Appraisal Form Roadmap
  4. ____ Golden Rules for Cybersecurity.
Down
  1. ____ & Security is one of the key functions of UITS and IT.
  2. The two sections in Performance Management System are 1. Performance and 2. ____
  3. One function of Group Strategy to the UMW Group.
  4. Under Group Strategy, Unit Strategy ____ will analyse and assess industry trends and market outlook.
  5. _____ Employees are those from the Supervisory Level until Executive Vide President II.
  6. The special leave due to the death of near relative, hospitalisation of immediate family or natural disaster.

10 Clues: ____ Golden Rules for Cybersecurity.One function of Group Strategy to the UMW Group.____ & Security is one of the key functions of UITS and IT.What is needed to be done before disposing of paper documents?____ Setting is the first milestone in Performance Appraisal Form Roadmap...

Big Data 2025-02-19

Big Data crossword puzzle
Across
  1. The speed at which data is generated and processed in real-time.
  2. Protecting digital data from threats, breaches, and unauthorized access.
  3. The different types of data formats, including structured, unstructured, and semi-structured data.
  4. Large-scale datasets that require advanced techniques for storage, processing, and analysis.
Down
  1. The process of examining data to uncover patterns, correlations, and insights.
  2. The immense amount of data generated from various sources in Big Data.
  3. The quality and accuracy of data, ensuring it is reliable and not misleading.
  4. A network of connected devices that collect and share data.
  5. Enables machines to analyze data and make decisions.
  6. The importance of data in providing insights and supporting decision-making.

10 Clues: Enables machines to analyze data and make decisions.A network of connected devices that collect and share data.The speed at which data is generated and processed in real-time.The immense amount of data generated from various sources in Big Data.Protecting digital data from threats, breaches, and unauthorized access....

Computers and Technology 2023-09-14

Computers and Technology crossword puzzle
Across
  1. A machine that can be programmed to perform tasks automatically.
  2. A portable device with a touchscreen, like an iPad.
  3. Media Online platforms where people can connect, share, and communicate.
  4. An online page or site where you can find information, like social media.
  5. Reality A technology that immerses you in a computer-generated 3D environment.
  6. Game Electronic games played on a computer or gaming console.
  7. A mobile phone that can also connect to the internet and run apps.
  8. Protecting computer systems and data from theft or damage.
Down
  1. The physical components of a computer, like the keyboard and screen.
  2. Programs and applications that run on a computer or device.
  3. Creating new ideas, products, or technologies to improve
  4. Electronic messages sent and received through the internet.
  5. A machine that processes information and performs tasks, like a PC or laptop.
  6. A global network that connects computers and allows you to access information.
  7. Writing instructions for computers to create software and websites.

15 Clues: A portable device with a touchscreen, like an iPad.Creating new ideas, products, or technologies to improveProtecting computer systems and data from theft or damage.Programs and applications that run on a computer or device.Electronic messages sent and received through the internet.Game Electronic games played on a computer or gaming console....

iSEC Dimensions, CrossWord 2024-12-08

iSEC Dimensions, CrossWord crossword puzzle
Across
  1. CPRA, DPDPA, GDPR all these regulations ensure.
  2. Attack where malicious user can use the cloud to mine cryptocurrency.
  3. A cyberattack that floods a network to make it unavailable.
  4. A service that continuously evaluates the security of cloud services and recommends improvements.
  5. The process of restoring data and systems after an attack or failure.
  6. The process of verifying the identity of a user or system.
  7. A framework for managing organizational risks.
  8. Risk management approach that accepts certain risks rather than taking actions.
Down
  1. A system used to monitor and control network traffic.
  2. The process of ensuring access control in the cloud enviorment using tokens or certificates.
  3. An attack where malicious actors exploit poorly configured cloud storage.
  4. A software tool designed to detect and safeguard from malicious software.
  5. Red team and Blue team are integral part of.
  6. The ability to recover data after loss or damage, typically in a cloud environment.
  7. Objective of GDPR is to safeguard.

15 Clues: Objective of GDPR is to safeguard.Red team and Blue team are integral part of.A framework for managing organizational risks.CPRA, DPDPA, GDPR all these regulations ensure.A system used to monitor and control network traffic.The process of verifying the identity of a user or system.A cyberattack that floods a network to make it unavailable....

Cyber Security 2025-01-27

Cyber Security crossword puzzle
Across
  1. - A cryptographic tool used to validate the authenticity of digital messages or documents
  2. - The primary legislation in India dealing with cybercrime and electronic commerce (abbreviation)
  3. - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  4. - The use of the internet to conduct violent acts that threaten or harm individuals or governments
  5. - Section of the IT Act that deals with computer-related offenses
  6. - The process of collecting and analyzing data from computer systems for legal evidence
  7. - The fraudulent use of someone else's personal information
  8. - A special police unit in India dedicated to investigating cybercrimes
Down
  1. - The use of IT to deliver government services and information to citizens
  2. - Safeguarding important information from corruption, compromise, or loss
  3. - The process of converting information into a code to prevent unauthorized access
  4. - Unauthorized access to computer systems or networks
  5. - Sending unsolicited messages, often in bulk, via electronic means
  6. - An entity that issues digital certificates for secure online transactions
  7. - The practice of protecting systems, networks, and programs from digital attacks

15 Clues: - Unauthorized access to computer systems or networks- The fraudulent use of someone else's personal information- Section of the IT Act that deals with computer-related offenses- Sending unsolicited messages, often in bulk, via electronic means- A special police unit in India dedicated to investigating cybercrimes...

Scientific terms 2024-09-25

Scientific terms crossword puzzle
Across
  1. The study of the nervous system.
  2. The practice of protecting computer systems and networks from cyberattacks.
  3. Intelligence The simulation of human intelligence in machines that can learn and solve problems.
  4. The application of computer science to biology, especially in the analysis of biological data.
  5. The study of genes and heredity.
  6. The complete set of genetic material of an organism.
  7. A well-substantiated explanation of an aspect of the natural world based on observation, experimentation, and reasoning.
Down
  1. The study of the physics of the universe.
  2. A proposed explanation for a phenomenon that can be tested through experimentation
  3. The design of products and processes inspired by nature.
  4. The design and construction of robots, often used to automate tasks.
  5. A set of rules or instructions to solve a problem or perform a task.
  6. The manipulation of matter on an atomic and molecular scale.
  7. The brain's ability to change and adapt throughout life.
  8. The use of living organisms to create products or processes.

15 Clues: The study of the nervous system.The study of genes and heredity.The study of the physics of the universe.The complete set of genetic material of an organism.The design of products and processes inspired by nature.The brain's ability to change and adapt throughout life.The manipulation of matter on an atomic and molecular scale....

IT Insights 2023-10-25

IT Insights crossword puzzle
Across
  1. Electronic letters you send and receive through the Internet
  2. Acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
  3. Aerial term used to describe online data storage
  4. Team name used for St. Clair College athletic teams
  5. This device has rules to control the flow of data into and out of a network
  6. Branch of IT responsible for protecting networks and data from external attack
  7. Where you can find your course materials, and collaborate with your instructor
  8. A program that you use to access websites on the Internet
  9. Harmful software that can infect your computer and cause problems
Down
  1. St. Clair College emblem
  2. A web site where you can ask a question and it provides matches(ie. Google, Bing)
  3. A global network of connected computers where you can find information, watch videos, and communicate with others
  4. Where you can find your student timetable, transcript, etc.(abbrev.)
  5. Term used for organized, competitive computer gaming
  6. A network connection without wires

15 Clues: St. Clair College emblemA network connection without wiresAerial term used to describe online data storageTeam name used for St. Clair College athletic teamsTerm used for organized, competitive computer gamingA program that you use to access websites on the InternetElectronic letters you send and receive through the Internet...

Techtonic Round 1 Set B 2025-03-26

Techtonic Round 1 Set B crossword puzzle
Across
  1. A computer network that spans a small geographic area, like an office.
  2. A process model used in software engineering that follows a linear, sequential approach.
  3. The main circuit board of a computer that connects all components.
  4. A popular scripting language mainly used for web development.
  5. The global network that connects billions of devices worldwide.
  6. A machine learning model inspired by the structure of the human brain.
  7. The AI technique that enables machines to improve performance based on experience.
Down
  1. A technology that allows multiple virtual machines to run on a single physical machine.
  2. A type of memory that stores frequently accessed data for quick retrieval.
  3. A cybersecurity attack that tricks users into providing sensitive information.
  4. A storage system that allows data to be accessed remotely over the internet.
  5. The process of converting source code into machine code.
  6. The standard language for querying databases.
  7. A software testing approach where individual units of code are tested separately.
  8. A method for encoding data to ensure only authorized access.

15 Clues: The standard language for querying databases.The process of converting source code into machine code.A method for encoding data to ensure only authorized access.A popular scripting language mainly used for web development.The global network that connects billions of devices worldwide....

Organizational Structure, Design, Technology, and Information Technology 2025-11-01

Organizational Structure, Design, Technology, and Information Technology crossword puzzle
Across
  1. The protection of digital systems and data from unauthorized access or attacks.
  2. The introduction of new ideas or technologies to improve public sector performance.
  3. Online platforms enabling citizens to access government services digitally.
  4. The process of converting traditional public services into technology-based systems.
  5. Extremely large datasets analyzed to reveal patterns and trends in public management.
  6. A decentralized digital ledger ensuring transparency and security of records.
Down
  1. Monitoring citizens’ data or behavior, often raising ethical and legal concerns.
  2. Intelligence The simulation of human intelligence in machines to perform administrative tasks.
  3. The process through which innovation spreads within and across organizations.
  4. The use of machines or software to perform repetitive government functions efficiently.
  5. The ability of systems, devices, and citizens to interact through digital networks.
  6. The right to control personal data and protection from misuse in digital governance.
  7. An urban area using sensors, IoT, and analytics to enhance citizen life quality.
  8. Openness in government activities, allowing citizens to access information freely.
  9. The synchronization between digital initiatives and organizational strategy.

15 Clues: Online platforms enabling citizens to access government services digitally.The synchronization between digital initiatives and organizational strategy.The process through which innovation spreads within and across organizations.A decentralized digital ledger ensuring transparency and security of records....

Business Online 2025-11-26

Business Online crossword puzzle
Across
  1. — A business’s capacity to grow its online operations smoothly as demand rises.
  2. — Rules that explain how customers can return goods and get refunds.
  3. — Initial expenses required to build and launch an online business.
  4. — The threat of scams, identity theft or dishonest transactions in online trading.
  5. — A website type that processes payments and completes sales online.
  6. — Online platforms that host many sellers (e.g., Amazon, Etsy).
  7. — The activity of buying and selling goods or services over the internet.
  8. — A customer benefit of online shopping: easy access and 24/7 availability.
  9. — Using software or technology to perform repetitive tasks without human input.
Down
  1. — Platforms used for marketing, customer engagement and brand awareness.
  2. — The planning and management of storage, transport and delivery of goods.
  3. — Simple informational websites that showcase a business and its services.
  4. — Other businesses offering similar products or services in the same market.
  5. — The ability of an online business to access customers worldwide.
  6. — Measures and practices used to protect systems and customer data online.

15 Clues: — Online platforms that host many sellers (e.g., Amazon, Etsy).— The ability of an online business to access customers worldwide.— Initial expenses required to build and launch an online business.— Rules that explain how customers can return goods and get refunds.— A website type that processes payments and completes sales online....

Women in STEM Trivia 2018-03-02

Women in STEM Trivia crossword puzzle
Across
  1. Last name of the first female CEO for Duke Energy
  2. Phebe Novakovic worked for this branch of the government
  3. This is the nation's largest utility company
  4. Sempra Energy is based in this city
  5. Popular acronym for fields related to math, science, technology, and engineering
  6. Nobel Prize equivalent of Computer Science
  7. Last name of CEO for IBM
  8. Adriana Karaboutis holds this position at National Grid
  9. Women make up 22% of this specific engineering field
Down
  1. General Dynamics is this kind of federal contractor
  2. Marissa Mayer was given this many job offers after graduating from Stanford University
  3. Marissa Mayer is the CEO of this major company
  4. Novakovic pushed General Dynamics into the direction of this type of security
  5. Brittany Wenger was this age when she designed her Artificial Brain to help detect breast cancer
  6. The name of the computer that IBM created
  7. Rometty has degrees in both computer science and this type of engineering
  8. First company Marissa Mayer chose to work for
  9. First word of the abbreviated company title PG&E
  10. This natural vegetation supplied a useful chemical for Ellen Kendall's water filter
  11. Company that worked with wearable technology to help patients and health-care providers

20 Clues: Last name of CEO for IBMSempra Energy is based in this cityThe name of the computer that IBM createdNobel Prize equivalent of Computer ScienceThis is the nation's largest utility companyFirst company Marissa Mayer chose to work forMarissa Mayer is the CEO of this major companyFirst word of the abbreviated company title PG&E...

Unit 5 and 10 Vocab 2023-09-02

Unit 5 and 10 Vocab crossword puzzle
Across
  1. Whether somthing is appropriate morally
  2. How trustworthy an individual is
  3. Too much
  4. To have or show a good judgement of something
  5. "Not supported or proven by evidence"
  6. Computing services on the internet
  7. "The use of largely automatic equipment in a system of manufacturing or other production process"
  8. A process or set of rules for computer to do somethng
  9. Making inappropriate materials not crearly visible
Down
  1. "Adaptation of a system, process, etc. to be operated with the use of computers and the internet"
  2. To prove an individual with teir physical characteristic
  3. "A tendency to be too ready to believe that something is real or true"
  4. Not being "observed" by people that the individual did't allow to
  5. "rapid increase in numbers"
  6. New things that have never been created before
  7. The scurity of technological devices, software and information online
  8. How responsible an individual is
  9. Using an exaggerated wordign to attract public's interest; often lead to inaccuracy of information
  10. To rely on something
  11. To have a strong attraction for technology espeacially new technologies
  12. "honest and having strong moral principles; moral uprightness"
  13. Giving or understanding a wrong information
  14. Fake

23 Clues: FakeToo muchTo rely on something"rapid increase in numbers"How trustworthy an individual isHow responsible an individual isComputing services on the internet"Not supported or proven by evidence"Whether somthing is appropriate morallyGiving or understanding a wrong informationTo have or show a good judgement of something...

Electricity 2023-05-30

Electricity crossword puzzle
Across
  1. If it's high, power is high
  2. Tells us how much power we get related to voltage and resistance
  3. Stops electricity from flowing, rubber
  4. Power lines connecting power supplies to homes in a large area
  5. Electricity in one direction
  6. A path for electricity to flow
  7. Anything that makes power, like a generator or a battery
  8. Electricity in two directions, going back and forth
  9. Measures the current in a circuit
  10. Too much power at one time
  11. Happens again and again
  12. Electricity that is flowing, light is on
  13. Adjusts the power in a circuit
  14. Power from water
  15. Portable power supply, can power a remote
  16. No power or power loss
Down
  1. Protects us from electric shocks
  2. Measures the voltage in a circuit
  3. Power used by a device
  4. Allows electricity to flow, metal
  5. Power from earth's heat
  6. If it's high, power is low
  7. Online protection
  8. Transfers electricity from one circuit to another with more or less power
  9. Makes your hair stand up, gives a shock
  10. Makes power, makes electricity
  11. A place to plug in a device
  12. Measurement of electrical power

28 Clues: Power from waterOnline protectionPower used by a deviceNo power or power lossPower from earth's heatHappens again and againIf it's high, power is lowToo much power at one timeIf it's high, power is highA place to plug in a deviceElectricity in one directionA path for electricity to flowMakes power, makes electricityAdjusts the power in a circuit...

Unit 1 Concepts - Intro to Cyber 2025-01-22

Unit 1 Concepts - Intro to Cyber crossword puzzle
Across
  1. A type of malware that locks files until a ransom is paid
  2. An attack that floods a system with traffic to make it unavailable
  3. A scam where attackers impersonate a trusted entity to steal sensitive information
  4. Verifying the identity of a user or system
  5. A security system that monitors and controls network traffic
  6. A security process requiring two forms of verification to access an account
  7. A tool to store and generate secure passwords
  8. Software that secretly gathers user information without consent
Down
  1. An incident where data is altered without authorization
  2. A key used in encryption to secure communications that can be shared openly
  3. The process of converting information into a secure format to prevent unauthorized access
  4. Ensuring information is not accessed by unauthorized parties
  5. Practices designed to protect computers, networks, and data from attacks
  6. Ensuring information remains accurate and trustworthy
  7. Ensuring authorized users have access to information when needed
  8. Manipulating people to give up confidential information
  9. Harassment or bullying that occurs through digital platforms
  10. Malicious software designed to harm or exploit computers
  11. An incident where sensitive data is accessed without authorization
  12. A key used in encryption that must remain confidential

20 Clues: Verifying the identity of a user or systemA tool to store and generate secure passwordsEnsuring information remains accurate and trustworthyA key used in encryption that must remain confidentialAn incident where data is altered without authorizationManipulating people to give up confidential information...

Technology vocabulary 2023-12-15

Technology vocabulary crossword puzzle
Across
  1. a secret word used to access a computer system
  2. engine a program that searches for information on the internet
  3. a portable computer with a touchscreen
  4. a mobile phone with more features
  5. a regularly updated website or webpage on a specific topic
  6. an input device with keys used to type
  7. wireless technology that allows devices to connect
  8. malicious software that replicates and spreads causing harm
  9. a global network connecting computers
  10. to make something current or bring up to date
  11. media online platforms to connect with others
  12. real-time communication between users over the internet
Down
  1. a pointing device used to interact with a computer
  2. the physical components of a computer
  3. programs and application that run on a electronic device
  4. computer system that protect data, networks, etc.
  5. a software application used to access websites
  6. word short for the word 'application'
  7. to transfer data to your device
  8. to transfer data from the internet
  9. an electronic device that starts with a 'c'
  10. a collection of webpages available through internet
  11. to end a session on a website or computer
  12. electronic mail
  13. a unique name used to identify an individual on a computer

25 Clues: electronic mailto transfer data to your devicea mobile phone with more featuresto transfer data from the internetthe physical components of a computerword short for the word 'application'a global network connecting computersa portable computer with a touchscreenan input device with keys used to typeto end a session on a website or computer...

RU ITEC411 - Chapter 5 - Crime and Security 2025-04-21

RU ITEC411 - Chapter 5 - Crime and Security crossword puzzle
Across
  1. | Gaining unauthorized access to computer systems.
  2. Theft | Stealing someone’s personal information to impersonate them.
  3. | Malware that locks files and demands payment to unlock them.
  4. of Service | An attack that floods a system with traffic to crash it.
  5. | Malicious software that attaches itself to programs and spreads when they run.
  6. | Definition
  7. of Things | Network of physical devices connected and communicating over the Internet.
  8. | Sending fake messages to trick people into giving away private information.
  9. | Any software designed to harm or exploit systems.
Down
  1. | Phishing attacks carried out through text messages.
  2. | Using hacking for political activism or protest.
  3. | A network of infected devices controlled by hackers.
  4. | A serious security flaw in encryption software that exposed user data.
  5. | A harmful program disguised as a legitimate one.
  6. | The process of scrambling data to protect it from unauthorized access.
  7. | A hidden method to bypass security and access a system.
  8. | Redirecting users to fake websites to steal their data.
  9. | Software that secretly gathers user information without consent.
  10. Engineering | Manipulating people into revealing confidential data.
  11. | A program that spreads by copying itself without needing a host file.
  12. | A team that responds to major cybersecurity incidents.

21 Clues: | Definition| Using hacking for political activism or protest.| Gaining unauthorized access to computer systems.| A harmful program disguised as a legitimate one.| Any software designed to harm or exploit systems.| Phishing attacks carried out through text messages.| A network of infected devices controlled by hackers....

Information Technology Careers & Terms 2023-10-05

Information Technology Careers & Terms crossword puzzle
Across
  1. This career is is the creative driver responsible for bringing a game to life
  2. A professional who uses programming languages to communicate with computers and software and make them perform certain tasks
  3. A technology professional who works on, builds and creates software, websites, applications and other systems
  4. An organized collection of data stored and accessed electronically
  5. A place where people can share information and communicate from all over the world
  6. The programs and other operating information used by a computer
Down
  1. A person who writes computer programs
  2. An electronic device for storing and processing data
  3. The physical parts of a computer, such as the CPU and RAM
  4. This career protects computers from malicious attacks
  5. Two or more computers that are linked in order to share resources
  6. Sometimes called systems architects, this career studies an organization's current computer systems and procedures

12 Clues: A person who writes computer programsAn electronic device for storing and processing dataThis career protects computers from malicious attacksThe physical parts of a computer, such as the CPU and RAMThe programs and other operating information used by a computerTwo or more computers that are linked in order to share resources...

IT and Tech 2023-10-03

IT and Tech crossword puzzle
Across
  1. Management Strategies and practices for attracting, developing, and retaining skilled individuals within an organization.
  2. The evaluation or appraisal of someone or something.
  3. The practice of recruiting highly skilled individuals for specialized positions.
  4. Measures taken to protect computer systems, networks, and data from cyber threats.
Down
  1. Solutions Services or strategies for finding and hiring suitable employees.
  2. The process of integrating a new employee into a company.
  3. The practice of analyzing and interpreting complex data sets to inform decision-making.

7 Clues: The evaluation or appraisal of someone or something.The process of integrating a new employee into a company.Solutions Services or strategies for finding and hiring suitable employees.The practice of recruiting highly skilled individuals for specialized positions.Measures taken to protect computer systems, networks, and data from cyber threats....

Principles of Cybersecurity Chapter 5 Vocabulary 2023-03-07

Principles of Cybersecurity Chapter 5 Vocabulary crossword puzzle
Across
  1. Voice-based phishing in which the hacker calls the user impersonating someone else
  2. Use of SMS messages as the means of reach- ing victims.
  3. Phishing attack targeting individuals with a high net worth or with high status also called whaling.
  4. Process of providing a new employee with all information he or she needs on the company, business processes, security policies, and other related material.
  5. Device with bars or other obstruction to alternately block an entryway and allow only one per- son to pass at a time.
  6. Physical access control system that uses two sets of interlocking doors the fi rst set of doors must close before the second set can be opened
  7. ee-shaped wall usually made of concrete to prevent vehicles from passing can be moved into and out of place with heavy equipment. (
  8. Phishing attack targeting specifi c indi- viduals who may not be wealthy or prominent.
  9. An entry is embedded in the victim’s local DNS cache that redirects a legitimate URL to an incorrect IP address.
  10. Document created by the owner of the network containing information on proper usage of the network and related asset
  11. Any data that can be used to pinpoint a specific person
  12. Process of closing an employee’s accounts and records when he or she leaves the company
  13. Electromagnetic signals given off by all electronic equipment
  14. Vertical cylinder permanently installed to pre- vent vehicles from passing may be retractable to either allow or deny passage
  15. Technique in which server racks are placed in rows with cold air entering the room on one side and hot air exiting the room on the other side
Down
  1. Attempting to obtain personal information through fake e-mails that appear to be real
  2. Barrier placed around wires to block electromagnetic interference from affecting the electri- cal signals in the wires
  3. System in which video cameras transmit signals to a centralized moni- toring location, but the signals are not publically broad- cast also known as video surveillance
  4. Secured room in which servers and net- working equipment are installed.
  5. Involves setting up a website that looks legitimate and credible, but is used to steal personal information entered by users
  6. Responsibilities are divided so no single individual has complete control over a process or task
  7. Facility specifi cally designed to store and manage vast quantities of data considerably larger than a server room.
  8. Specifi cation developed by the National Security Agency (NSA) that deals with methods for spying using electromagnetic radiation and methods to prevent such activities.
  9. DNS solution that cre- ates a special DNS record to verify the validity of an e-mail sende
  10. Attack in which hackers embed mali- cious code in websites often visited by specifi c individ- uals, departments, or all employees of a company
  11. An unauthorized person walking into a facility with or right behind authorized people to appear as if with them
  12. The type of fire based on the fuel that feeds the fire.

27 Clues: Use of SMS messages as the means of reach- ing victims.Any data that can be used to pinpoint a specific personThe type of fire based on the fuel that feeds the fire.Electromagnetic signals given off by all electronic equipmentSecured room in which servers and net- working equipment are installed....

25 key words that represent Cybersecurity 2023-09-07

25 key words that represent Cybersecurity crossword puzzle
Across
  1. Any technology, be it software or hardware, used to keep intruders out.
  2. Software package that performs a specific function directly for a person who is intended to use a computer system.
  3. A piece of audio or video that has been altered and changed to make it seem authentic or credible
  4. A scam where a hacker poses as a legitimate business or organization
  5. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests
  6. A set of instructions, or a system of rules, written in a particular programming language
  7. A computer program that can copy itself and infect a computer without permission
  8. A mode in the computer that stores data on servers in different locations
  9. Two or more computers connected together to share resources
  10. A method of connecting a series of computers and devices in a private encrypted network,
  11. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  12. A form of malware that hijacks your system and encrypts your files
  13. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches
  14. While someone is tricked into clicking on one object on a web page when they want to click on another,
Down
  1. A means of attack on a computer system
  2. A technique to prevent unauthorized users from accessing sensitive data
  3. Smallest unit of a digital image
  4. A set of rules governing the format of data sent via the internet or local network.
  5. The capacity a network can transfer data
  6. Allows devices to communicate with each other
  7. Coding used to protect your information from hackers.
  8. The result of a hacker successfully breaking into a system
  9. A form of malware used by hackers to spy on you and your computer activities.
  10. Any attempt to breach a logical environment's security boundary
  11. a misleading computer program that looks innocent, but in fact allows the hacker into your system

25 Clues: Smallest unit of a digital imageA means of attack on a computer systemThe capacity a network can transfer dataAllows devices to communicate with each otherCoding used to protect your information from hackers.The result of a hacker successfully breaking into a systemTwo or more computers connected together to share resources...

Module 9 Participation | Cybersecurity Crossword Puzzle 2025-03-12

Module 9 Participation | Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. - Tracks and monitors user behavior
  2. - Group of infected computers
  3. - Malware disguised as legitimate software
  4. - Verifies website's online authenticity
  5. - Fraudulent emails seeking information
  6. - Overloads servers with excessive traffic
  7. - Displays unwanted advertisements
  8. - Software designed to harm systems
  9. - Blocks unauthorized network access
  10. - Tracks every keystroke entered
Down
  1. - Hides malicious software presence
  2. - Secures data with coding
  3. - Encrypts online data and browsing
  4. - Gains unauthorized computer access
  5. - Unauthorized access to data
  6. - Locks data until payment made
  7. - Secretly gathers user information
  8. - Scans and removes harmful software
  9. - Fixes system vulnerabilities
  10. - Self-replicates to spread infection

20 Clues: - Secures data with coding- Group of infected computers- Unauthorized access to data- Fixes system vulnerabilities- Locks data until payment made- Tracks every keystroke entered- Displays unwanted advertisements- Hides malicious software presence- Tracks and monitors user behavior- Encrypts online data and browsing...

CyberSecurity Awareness 2023-09-28

CyberSecurity Awareness crossword puzzle
Across
  1. malicious software
Down
  1. state of keeping private
  2. cybercriminal disguises themselves as a trusted source
  3. takes advantage of a vulnerability
  4. act of breaking or failing

5 Clues: malicious softwarestate of keeping privateact of breaking or failingtakes advantage of a vulnerabilitycybercriminal disguises themselves as a trusted source

CyberSecurity CrossWord 2023-07-29

CyberSecurity CrossWord crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cybersecurity Principles 2023-12-14

Cybersecurity Principles crossword puzzle
Across
  1. This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.
  2. This principle is achieved through cryptographic methods which prevents a person or entity from denying having performed a particular action related to data for proof of obligation, intent, or commitment; or for proof of ownership.
Down
  1. This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required.
  2. This principle covers the assurance of data privacy. Only the intended and authorized recipients: people, processes or devices, may read the data. Disclosure to unauthorized entities, such as using unauthorized network sniffing is a confidentiality violation.
  3. This principle provides an assurance of data non-alteration. This is having assurance that the information has not been altered in transmission, from origin to reception. This principle is compromised when information is corrupted or altered, willfully or accidentally, before it is read by its intended recipient.

5 Clues: This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required....

CyberSecurity Crossword 2024-10-28

CyberSecurity Crossword crossword puzzle
Across
  1. We have to ____ over a hyperlink that's displayed in the email message
  2. Malware attack that capture all keyboard inputs
Down
  1. Malware received from emails typically encrypts files and documents on the target machines
  2. What do you call an email that looks legitimate but is actually a scam?
  3. Attackers perform ____ to clone our faces, creating videos and pictures that mimic our identity

5 Clues: Malware attack that capture all keyboard inputsWe have to ____ over a hyperlink that's displayed in the email messageWhat do you call an email that looks legitimate but is actually a scam?Malware received from emails typically encrypts files and documents on the target machines...

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paidA ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system...

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid.A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system....

Cyber Safety Basics 2025-11-02

Cyber Safety Basics crossword puzzle
Across
  1. create this using letters, numbers, and symbols
  2. protecting electronic devices, networks, and sensitive information
Down
  1. by clicking this in emails and websites can lead to malware and viruses
  2. responsibly using technology and resources available through the internet
  3. be careful when using this public access to log into your computer

5 Clues: create this using letters, numbers, and symbolsbe careful when using this public access to log into your computerprotecting electronic devices, networks, and sensitive informationby clicking this in emails and websites can lead to malware and virusesresponsibly using technology and resources available through the internet

Women's Engineering Day 2024-06-24

Women's Engineering Day crossword puzzle
Across
  1. Making sure everyone gets a seat at the table.
  2. What is AWS's managed service for creating machine learning models?
  3. A network of smart gadgets chatting and sharing secrets.
  4. Application store for IOS
  5. A jolt of creativity that sparks new ideas.
  6. The magical code that breathes life into machines.
  7. A shared and immutable ledger that facilitates the process of recording transactions and tracking assets in a business network
  8. What is the practice of deploying software updates without downtime called?
  9. What is AWS's container orchestration service?
Down
  1. What is the practice of breaking down applications into smaller, manageable services?
  2. Combining the wonders of nature with cutting-edge tech.
  3. The dream that fuels your journey to success.
  4. What is the term for a lightweight, standalone, and executable package that includes everything needed to run a piece of software?
  5. Apple's intelligent personal assistant
  6. A quest to create thinking machines that rival human wits.
  7. A kaleidoscope of different voices and perspectives.
  8. The guardians of the digital realm, defending against cyber villains.
  9. Crafting metal companions that move and think on their own.

18 Clues: Application store for IOSApple's intelligent personal assistantA jolt of creativity that sparks new ideas.The dream that fuels your journey to success.Making sure everyone gets a seat at the table.What is AWS's container orchestration service?The magical code that breathes life into machines.A kaleidoscope of different voices and perspectives....

CyberSecurity Awareness 2023-09-28

CyberSecurity Awareness crossword puzzle
Across
  1. malicious software
Down
  1. state of keeping private
  2. cybercriminal disguises themselves as a trusted source
  3. takes advantage of a vulnerability
  4. act of breaking or failing

5 Clues: malicious softwarestate of keeping privateact of breaking or failingtakes advantage of a vulnerabilitycybercriminal disguises themselves as a trusted source

CYB 2024-05-07

CYB crossword puzzle
Across
  1. the term used for various pop-up advertisements that show up on your computer or mobile device
  2. malware that holds a victim's data unless the victim pays a ransom to the attacker
  3. malware, that spreads between computers and causes damage to data and software
  4. malicious software that spies on the victim
Down
  1. malware that downloads onto a computer disguised as a legitimate program
  2. the practice of protecting systems, networks, and programs from digital attacks
  3. a type of malware that can automatically self-replicate without human interaction

7 Clues: malicious software that spies on the victimmalware that downloads onto a computer disguised as a legitimate programmalware, that spreads between computers and causes damage to data and softwarethe practice of protecting systems, networks, and programs from digital attacks...

Computer Science History and Cybersecurity 2021-03-08

Computer Science History and Cybersecurity crossword puzzle
Across
  1. hashing is the foundation of this technology that has been used to implement crypto-currencies
  2. Park once the top-secret home of the World War Two Codebreakers
  3. cipher that is easily broken using brute force
  4. was the U.S. Navy's Combat Intelligence Unit, called OP–20–G
  5. designed to translate content with the intent of translating it back
  6. German cipher during WWII
Down
  1. Japanese naval code during WWII
  2. bncd (single shift cipher, decrypt for answer)
  3. one of the founders of Computer Science who worked as a code-breaker in England during WWII
  4. designed to translate content with NO intent of translating it back
  5. early computers were _________ and hot!
  6. first naval battle of WWII where code breaking played a major role
  7. both the sender and the receiver must have this for encryption to work
  8. decisive naval battle of WWII where code breaking played a major role

14 Clues: German cipher during WWIIJapanese naval code during WWIIearly computers were _________ and hot!bncd (single shift cipher, decrypt for answer)cipher that is easily broken using brute forcewas the U.S. Navy's Combat Intelligence Unit, called OP–20–GPark once the top-secret home of the World War Two Codebreakers...

National Cybersecurity Awareness Month Crossword 2018-09-21

National Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. Report suspicious emails by using the “Report to CyberSafe” _____ in the Outlook toolbar
  2. Avoid using _____ WiFi hotspots and charging station USB ports
  3. When creating a _____ , use special characters and numbers, and consider using a passphrase, or a unique set of words, to make it easier for you to remember
  4. Emails from external or non-USPS senders will automatically display [_____] in the subject line
  5. Cybersecurity is our shared _____
  6. Lock your _____ and mobile phone when not in use
  7. Don't click on _____ within emails from an unknown or untrusted source
  8. Never use your USPS _____ address for non-work purposes (e.g. social media, online shopping, listserv subscriptions)
Down
  1. Don't open or download _____ from unknown or suspicious senders
  2. If you need to charge a device, plug into an _____. Never connect your personal or work devices to USPS computers or equipment
  3. _____ over hyperlinks to reveal the destination before clicking
  4. The keyphrase #_____# can be added to the subject line of an email to encrypt the contents when sending to an external recipient
  5. When traveling abroad for personal travel, _____ bring your USPS mobile device or computer
  6. _____ is an attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity

14 Clues: Cybersecurity is our shared _____Lock your _____ and mobile phone when not in useAvoid using _____ WiFi hotspots and charging station USB portsDon't open or download _____ from unknown or suspicious senders_____ over hyperlinks to reveal the destination before clickingDon't click on _____ within emails from an unknown or untrusted source...

Cybersecurity Awareness Month Crossword Puzzle! 2024-10-08

Cybersecurity Awareness Month Crossword Puzzle! crossword puzzle
Across
  1. A secret word or phrase to access an account.
  2. Misleading content designed to get you to click on a link.
  3. A small piece of code that fixes security vulnerabilities in software.
  4. When unauthorized access is gained to a system or data.
  5. A type of malicious software that replicates and spreads on its own.
  6. Software that secretly gathers information from your device.
  7. A method of converting data into a secure format that cannot be read without a key.
  8. New software version with improvements and bug fixes.
  9. Software designed to harm or exploit your computer.
Down
  1. Software that detects and removes harmful programs from your computer.
  2. A copy of important data kept in case the original is lost or damaged.
  3. A scam to trick you into revealing personal information.
  4. A security barrier that monitors and controls incoming and outgoing network traffic.
  5. Unwanted and unsolicited emails or messages.

14 Clues: Unwanted and unsolicited emails or messages.A secret word or phrase to access an account.Software designed to harm or exploit your computer.New software version with improvements and bug fixes.When unauthorized access is gained to a system or data.A scam to trick you into revealing personal information....

Cybersecurity Crossword 2024-10-30

Cybersecurity Crossword crossword puzzle
Across
  1. Hardware or software designed to prevent unauthorized access to or from a private network.
  2. National Cyber Security Awareness month is observed during _______ month
  3. Cross-layered detection and response that collects and correlates data across multiple security layers
Down
  1. Set of algorithms and architectures capable of tasks like learning, reasoning, problem-solving, perception, and language understanding.
  2. Malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: National Cyber Security Awareness month is observed during _______ monthHardware or software designed to prevent unauthorized access to or from a private network.Malicious software designed to block access to a computer system until a sum of money is paid....

Cybersecurity Principles! 2025-09-03

Cybersecurity Principles! crossword puzzle
Across
  1. Technology that copies or mimics human behavior
  2. Someone who breaks into computer systems
  3. False or misleading information shared online
Down
  1. A scam to trick people into giving personal info
  2. virus A program that spreads and harms devices

5 Clues: Someone who breaks into computer systemsFalse or misleading information shared onlineTechnology that copies or mimics human behaviorvirus A program that spreads and harms devicesA scam to trick people into giving personal info

Cybersecurity Crorssword 2025-09-30

Cybersecurity Crorssword crossword puzzle
Across
  1. The best way of staying up to date on IT news
Down
  1. IT support
  2. ID
  3. Client docs
  4. Share

5 Clues: IDShareIT supportClient docsThe best way of staying up to date on IT news

Cybersecurity Puzzle 2021-11-04

Cybersecurity Puzzle crossword puzzle
Across
  1. A defensive technology designed to keep the bad guys out.
  2. Technology that allows us to store and access files or services remotely via the internet.
  3. A group of computers, printers and devices that are interconnected and governed as a whole.
Down
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. A set of programs that tells computers how to perform a set of tasks.

5 Clues: A defensive technology designed to keep the bad guys out.A set of programs that tells computers how to perform a set of tasks.Technology that allows us to store and access files or services remotely via the internet.A group of computers, printers and devices that are interconnected and governed as a whole....

Cybersecurity Definitions 2024-06-16

Cybersecurity Definitions crossword puzzle
Across
  1. Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
  2. An attack method where a perpetrator deceives individuals into divulging confidential information.
  3. The practice of protecting systems, networks, and programs from digital attacks.
Down
  1. A program that replicates itself to spread to other computers.
  2. A person who uses computers to gain unauthorized access to data.

5 Clues: A program that replicates itself to spread to other computers.A person who uses computers to gain unauthorized access to data.The practice of protecting systems, networks, and programs from digital attacks.Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems....

Industrial Internet Puzzle 2016-07-27

Industrial Internet Puzzle crossword puzzle
Across
  1. The number of forces shaping the industrial internet
  2. World’s first industrial operating system
  3. The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)
  4. Headquarters for GE Digital (2 words)
Down
  1. The division of GE Digital dedicated to address potential vulnerabilities by protecting industrial assets (2 words)
  2. Current CEO for GE Digital (2 words)
  3. A virtual model of each physical production asset (2 words)
  4. Another force of the industrial internet that deals with increasing system intelligence through embedded software (2 words)
  5. One force shaping the industrial internet that has to do with transforming massive volumes into information into intelligence (2 words)

9 Clues: Current CEO for GE Digital (2 words)Headquarters for GE Digital (2 words)World’s first industrial operating systemThe number of forces shaping the industrial internetA virtual model of each physical production asset (2 words)The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)...

Risk Culture Awareness 2022-01-19

Risk Culture Awareness crossword puzzle
Across
  1. Process and risk owners are in which line of defense?
  2. the chance that an outcome or investment's actual gains will differ from an expected outcome or return
  3. level of risk that an organization is prepared to accept
  4. A mitigation strategy to eliminate the risk exposure to come into existence
  5. Risk department that reviews and provides an independent opinion to the business on lending proposals
Down
  1. this function represents the third line of defense
  2. The practice of protecting systems and information from digital attacks
  3. risk of loss resulting from ineffective or failed internal processes, people, systems
  4. A measure of the level of risk an organization is willing to accept

9 Clues: this function represents the third line of defenseProcess and risk owners are in which line of defense?level of risk that an organization is prepared to acceptA measure of the level of risk an organization is willing to acceptThe practice of protecting systems and information from digital attacks...

INNOV 2025-11-26

INNOV crossword puzzle
Across
  1. The implied cost of additional rework caused by choosing quick solutions over better options.
  2. Transformation process to create a reusable foundation for products which encourages modularity & extensibility.
  3. Embedded SIM technology allowing remote provisioning of mobile subscriptions.
  4. The ability of devices and systems to communicate, exchange data and establishing a link between them.
  5. Outcome of operational optimization, automation (CI/CD, AI-driven), and cost reduction initiatives..
Down
  1. AI-driven insights, automation, and decision-making.
  2. The ability to use existing solutions or components across multiple projects or domains.
  3. Measures and technologies to protect systems and data from cyber threats.
  4. is a strategic growth driver within the Orange Group's financial services portfolio

9 Clues: AI-driven insights, automation, and decision-making.Measures and technologies to protect systems and data from cyber threats.Embedded SIM technology allowing remote provisioning of mobile subscriptions.is a strategic growth driver within the Orange Group's financial services portfolio...

Cyber World (Internet) 2023-06-12

Cyber World (Internet) crossword puzzle
Across
  1. Malicious software that replicates itself and infects computer systems.
  2. The process of encoding information to protect its confidentiality.
  3. The practice of protecting computers, servers, and networks from digital threats.
  4. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
  1. Criminal activities conducted through the internet, such as fraud, hacking, or identity theft.
  2. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
  3. A network of infected computers, often controlled by a hacker, used for malicious activities.
  4. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
  5. A person who uses technical skills to gain unauthorized access to computer systems.
  6. A security measure that protects computer networks from unauthorized access.

10 Clues: The process of encoding information to protect its confidentiality.Malicious software that replicates itself and infects computer systems.A security measure that protects computer networks from unauthorized access.The practice of protecting computers, servers, and networks from digital threats....

Cybersecurity Fundamentals Chapter 4 2024-06-05

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. Also known as public-key encryption, it uses a pair of keys – a public key for encryption and a private key for decryption.
  2. The study of analyzing information systems to understand hidden aspects of the systems.
  3. The science of encrypting and decrypting information to protect data confidentiality.
  4. The process of converting plaintext into ciphertext to prevent unauthorized access.
  5. The process of managing cryptographic keys in a cryptosystem, including their generation, exchange, storage, use, and destruction.
  6. A type of encryption where the same key is used for both encryption and decryption.
Down
  1. Techniques used to regulate who can view or use resources in a computing environment.
  2. The practice of deliberately creating misleading or confusing information to hide the true meaning of the data.
  3. An algorithm used to perform encryption or decryption.
  4. The reverse process of encryption, where ciphertext is converted back into readable plaintext using a key.

10 Clues: An algorithm used to perform encryption or decryption.The process of converting plaintext into ciphertext to prevent unauthorized access.A type of encryption where the same key is used for both encryption and decryption.Techniques used to regulate who can view or use resources in a computing environment....

Cybersecurity ITF+ Module 1.1 2023-11-09

Cybersecurity ITF+ Module 1.1 crossword puzzle
Across
  1. When information is stored and processed
  2. System that processes, stores, and transfers information
  3. System that manipulates data based on a set of instructions
  4. a computer that supports other computers
  5. device with same function as PC but is handheld
Down
  1. Hardware that is connected to the computer
  2. a computer that integrates all components into a single case
  3. the system memory
  4. retrieves instructions or data from memory and processes it
  5. computer programming

10 Clues: the system memorycomputer programmingWhen information is stored and processeda computer that supports other computersHardware that is connected to the computerdevice with same function as PC but is handheldSystem that processes, stores, and transfers informationSystem that manipulates data based on a set of instructions...

Thinklogic 2021-09-13

Thinklogic crossword puzzle
Across
  1. DX
  2. Search Engine
Down
  1. CX

3 Clues: CXDXSearch Engine

Cyber-security 2021-01-17

Cyber-security crossword puzzle
Across
  1. refers to the security of a computer or computer system
  2. authentication mechanisms, access channels and systems all have to work properly
  3. demands a ransom from you to get things back on track.
  4. result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
  1. ensure that information is hidden from people unauthorised to access it.
  2. modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
  3. helps hackers spy on systems and their users.
  4. self-replicating and spreads without end-user action, causing real devastation.
  5. ensuring that data has not been tampered with and, therefore, can be trusted.
  6. are attempts to expose users to unwanted, potentially malicious advertising.
  7. malicious instructions that appear as legitimate programs.

11 Clues: helps hackers spy on systems and their users.demands a ransom from you to get things back on track.refers to the security of a computer or computer systemmalicious instructions that appear as legitimate programs.ensure that information is hidden from people unauthorised to access it....

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new Palo Alto office
  2. The conference Joanne and Steve spoke at in 2018
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. The New York Times said this company will emerge as the leading residential solar installer in the US
  5. Steve's book, The Way to Design, was released in what format in late 2018?
  6. On-demand vet service in the FC portfolio
Down
  1. Foundation led this meditation company's series A
  2. Bolt Thread's Microsilk fabric is made by
  3. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  4. Foundation's newest unicorn
  5. What FC company raised $155 million in 2018 and expanded into Europe?

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new Palo Alto office
  2. Bolt Thread's Microsilk fabric is made by
  3. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  4. What FC company raised $155 million in 2018 and expanded into Europe?
  5. Foundation led this meditation company's series A
Down
  1. Steve's book, The Way to Design, was released in what format in late 2018?
  2. Foundation's newest unicorn
  3. The New York Times said this company will emerge as the leading residential solar installer in the US
  4. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  5. The conference Joanne and Steve spoke at in 2018
  6. On-demand vet service in the FC portfolio

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The conference Joanne and Steve spoke at in 2018
  2. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  3. Foundation led this meditation company's series A
  4. Foundation's newest unicorn
  5. On-demand vet service in the FC portfolio
Down
  1. The New York Times said this company will emerge as the leading residential solar installer in the US
  2. The street name of FC's new Palo Alto office
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. Steve's book, The Way to Design, was released in what format in late 2018?
  5. Bolt Thread's Microsilk fabric is made by
  6. What FC company raised $155 million in 2018 and expanded into Europe?

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

Daily Vocab for Cybersecurity 2022-02-01

Daily Vocab for Cybersecurity crossword puzzle
Across
  1. Type of URL hijacking
  2. Phishing done through text messages.
  3. Voice phishing through the phone or a voicemail.
Down
  1. When you gather information on the victim.
  2. Redirection from a legit website to a bogus one.
  3. Phishing with inside information.
  4. Spearing the CEO.
  5. _________ information is extracting information from the victim.
  6. Lying to get information.
  7. Dumpster ________ is when you gather personal information from things that people have thrown out from their trash.

10 Clues: Spearing the CEO.Type of URL hijackingLying to get information.Phishing with inside information.Phishing done through text messages.When you gather information on the victim.Redirection from a legit website to a bogus one.Voice phishing through the phone or a voicemail._________ information is extracting information from the victim....

ICT Processes and Cybersecurity 2022-11-10

ICT Processes and Cybersecurity crossword puzzle
Across
  1. Makes systems access easier
  2. ERP module for logging all support tickets
  3. Verifying the identity of a user
  4. A type of social engineering
  5. Log ticket here without ERP credentials
Down
  1. Secret word or phrase
  2. Cyber security protects them
  3. Redirecting unresolved service request
  4. Type of priority of a service request
  5. Only for emergency service requests

10 Clues: Secret word or phraseMakes systems access easierCyber security protects themA type of social engineeringVerifying the identity of a userOnly for emergency service requestsType of priority of a service requestRedirecting unresolved service requestLog ticket here without ERP credentialsERP module for logging all support tickets

Cybersecurity Awareness Month Crossword! 2023-09-25

Cybersecurity Awareness Month Crossword! crossword puzzle
Across
  1. software designed to disrupt, damage or gain unauthorized access to a computer system
  2. a process to identify who should to have access to a system
  3. malicious software designed to block access to computer system until money is paid
  4. an electronic device used for processing and storing information
  5. an input device used with a computer
  6. a network security controller and monitor
Down
  1. cyberattack tactic designed to scare someone into visiting a spoofed or infected website
  2. the process of converting information or data into a code to prevent unauthorized access
  3. 2 or more computers connected together to share resources
  4. emails sent appearing to be from legitimate sources designed to trick the receiver into giving out information

10 Clues: an input device used with a computera network security controller and monitor2 or more computers connected together to share resourcesa process to identify who should to have access to a systeman electronic device used for processing and storing informationmalicious software designed to block access to computer system until money is paid...

TELUS Cybersecurity Crossword Puzzle 2025-01-21

TELUS Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Une cyberattaque où les attaquants incitent les utilisateurs à révéler des informations sensibles via de faux courriels ou sites Web.
  2. Méthode d’essais et d’erreurs pour deviner les mots de passe.
  3. Logiciel conçu pour détecter et supprimer les programmes malveillants de votre ordinateur.
  4. Une entreprise qui accorde la priorité à ses clients dans le but de rendre le futur meilleur
  5. Pyratage ___: manipuler les gens pour qu’ils révèlent des informations confidentielles
Down
  1. Un dispositif de sécurité réseau qui surveille et contrôle le trafic entrant et sortant en fonction de règles.
  2. Le processus de conversion de données dans un format codé pour empêcher qu’elles ne soient lues par une personne ou un système non prévu.
  3. Une combinaison secrète de caractères utilisés pour sécuriser les comptes.
  4. Un tunnel sécurisé qui crypte votre connexion Internet et masque votre adresse IP.
  5. Un incident où des informations sensibles ou confidentielles sont exposées

10 Clues: Méthode d’essais et d’erreurs pour deviner les mots de passe.Une combinaison secrète de caractères utilisés pour sécuriser les comptes.Un incident où des informations sensibles ou confidentielles sont exposéesUn tunnel sécurisé qui crypte votre connexion Internet et masque votre adresse IP....

Cybersecurity Crossword Nathan Compagnon 2024-11-27

Cybersecurity Crossword Nathan Compagnon crossword puzzle
Across
  1. : Prevent spam by temporarily rejecting communications from unknown senders
  2. : Malicious code that can cause harm to your anyone who watches the infected ad
  3. : Malware that disguise itself as a normal program to infect a system
  4. : Type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files
  5. : Security measure to distinguish human from machine input
  6. : Set of software tools that enable an unauthorized user to gain control of a computer system without being detected
Down
  1. : Process that transforms encrypted information into its original format
  2. : Turns domain names into ip addresses
  3. : Vulnerability in software or hardware that is unknown to the vendor and for which no patch or other fix is available
  4. : Force a website, computer, or online service offline by flooding the target with many requests

10 Clues: : Turns domain names into ip addresses: Security measure to distinguish human from machine input: Malware that disguise itself as a normal program to infect a system: Process that transforms encrypted information into its original format: Prevent spam by temporarily rejecting communications from unknown senders...

CYBERSECURITY TOOLS AND TECHNIQUES 2025-01-03

CYBERSECURITY TOOLS AND TECHNIQUES crossword puzzle
Across
  1. A system that collects and analyzes security data from various sources to identify potential security threats and provide real-time monitoring.
  2. Software designed to detect, prevent, and remove malicious software (malware) from a computer system.
  3. A type of cyber attack where multiple systems are used to flood a network or website with traffic, causing it to become overwhelmed and unavailable.
  4. Authentication A security process that requires two forms of verification, such as a password and a code sent to a mobile device, to access an account.
  5. Masking The process of concealing sensitive data by replacing it with fictitious or scrambled data to protect privacy and prevent unauthorized access.
Down
  1. A system that monitors network or system activities for signs of malicious activities or policy violations.
  2. Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers.
  3. Rules Predefined configurations that determine which types of network traffic are allowed or blocked by a firewall.
  4. Security Measures taken to protect individual devices (endpoints) such as computers, smartphones, and tablets from security threats.
  5. A system that actively monitors and blocks potential security threats in real-time, preventing malicious activities from compromising a network or system.

10 Clues: Software designed to detect, prevent, and remove malicious software (malware) from a computer system.A system that monitors network or system activities for signs of malicious activities or policy violations.Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers....

Automotive cybersecurity Set II 2025-08-05

Automotive cybersecurity Set II crossword puzzle
Across
  1. ability to encrypt sensitive data and provide robust defences against attacks.
  2. servers manage vehicle authentication and store results on the blockchain for quick re-authentication by edge nodes.
  3. cryptographic techniques for mutual authentication support local re-authentication when vehicles switch between edge nodes.
  4. Metric detects deviations from normal behaviour but may generate false positives.
  5. Protocol (AVTP) packets within Automotive Ethernet networks.
  6. is specifically designed to detect replay attacks on AVTP streams.
Down
  1. labelled dataset of benign and malicious packets by simulating client-server behaviour.
  2. Secure decentralized communication system for CAVs.
  3. model employs reset and update gates to manage memory connections, using an attention mechanism to enhance detection accuracy.
  4. Attack detection methods are classified into infrastructure-less.

10 Clues: Secure decentralized communication system for CAVs.Protocol (AVTP) packets within Automotive Ethernet networks.Attack detection methods are classified into infrastructure-less.is specifically designed to detect replay attacks on AVTP streams.ability to encrypt sensitive data and provide robust defences against attacks....

Cybersecurity awareness cross-word 2025-11-09

Cybersecurity awareness cross-word crossword puzzle
Across
  1. – A secret string used to verify identity.
  2. – An update that fixes software vulnerabilities.
  3. – The process of converting data into code to prevent unauthorized access.
  4. – A security threat originating from within an organization.
  5. – Software designed to disrupt, damage, or gain unauthorized access.
Down
  1. – Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  2. – Secure connection used to access a network remotely.
  3. – A network security device that monitors and filters traffic.
  4. – Unwanted or unsolicited email.
  5. – A login method requiring two or more verification factors.

10 Clues: – Unwanted or unsolicited email.– A secret string used to verify identity.– An update that fixes software vulnerabilities.– Secure connection used to access a network remotely.– A security threat originating from within an organization.– A login method requiring two or more verification factors....

Pilot Puzzle Program 2022-02-11

Pilot Puzzle Program crossword puzzle
Across
  1. A sector of safety that is not related to outdoor work (hint: digital)
  2. given by FM prior to performing non-exempt work
  3. same _____ falls are a hazard anywhere
  4. common PPE when working with any kind of sample
  5. ___ drills happen regularly to be prepared in the event of an evacuation
  6. this is a requirement when working in a CA or RA
  7. a 360 ___ is essential after returning to your vehicle
  8. Always know where the closest ___ is in case there is a building emergency
Down
  1. the biggest safety concern working in a nuclear plant
  2. historically marked across sites using lollypops
  3. fire extinguishers needs to have a full maintenance inspection every ___ months
  4. a required document to be briefed to when in a CA or RA
  5. hazard that changes depending on seasons
  6. always know where the closest ___ is in case someone has a cardiac event
  7. briefing held during warm months
  8. required to be written and discussed prior to beginning work to cover hazards
  9. You always should conduct a ___ before starting a new job or when conditions change

17 Clues: briefing held during warm monthssame _____ falls are a hazard anywherehazard that changes depending on seasonsgiven by FM prior to performing non-exempt workcommon PPE when working with any kind of samplehistorically marked across sites using lollypopsthis is a requirement when working in a CA or RA...

Mission: Cybersecurity Word Quest 2025-05-05

Mission: Cybersecurity Word Quest crossword puzzle
Across
  1. Software that blocks unauthorized access.
  2. A name you use to log into accounts.
  3. Someone who uses technology to hurt others.
  4. Fake messages that try to steal information.
  5. A fake offer to steal money or information.
Down
  1. A secret word that keeps your account safe.
  2. A bad program that can spread through computers.
  3. Software made to harm computers.
  4. Scrambling data to keep it safe.
  5. Someone who breaks into computers to steal/spy.

10 Clues: Software made to harm computers.Scrambling data to keep it safe.A name you use to log into accounts.Software that blocks unauthorized access.A secret word that keeps your account safe.Someone who uses technology to hurt others.A fake offer to steal money or information.Fake messages that try to steal information....

Cybersecurity Awareness Month 2025 2025-09-30

Cybersecurity Awareness Month 2025 crossword puzzle
Across
  1. Warmest season, overused as a password.
  2. Three words that should be the key to your heart, not you password (1,4,3).
  3. Six of the first letter—cybercriminals love it.
  4. Catch ’em all? Hack ’em all.
  5. First six letters on your keyboard.
Down
  1. Social media giant, weak as a key.
  2. Car or cowboy, not a good password.
  3. Dark knight, weak choice.
  4. If you tell everyone, it’s not this anymore.
  5. Basic greeting, basic security

10 Clues: Dark knight, weak choice.Catch ’em all? Hack ’em all.Basic greeting, basic securitySocial media giant, weak as a key.Car or cowboy, not a good password.First six letters on your keyboard.Warmest season, overused as a password.If you tell everyone, it’s not this anymore.Six of the first letter—cybercriminals love it....

Cybersecurity Day - MFA Booth 2025-10-13

Cybersecurity Day - MFA Booth crossword puzzle
Across
  1. Practice of requiring two or more independent factors.
  2. Time-based one-time password algorithm.
  3. State value that advances to produce the next HOTP code.
  4. Hardware security key used for HOTP+PIN and FIDO flows.
  5. Counter-based HMAC one-time password algorithm.
  6. USB class used for human-interface devices; referenced in your “named HID” TOTP context.
Down
  1. The application that generates TOTP and is protected with FIDO.
  2. Local secret on a security key used alongside HOTP validation.
  3. Browser-facing W3C standard that implements FIDO authenticators.
  4. Open authentication standards enabling phishing-resistant, passwordless login used in your implementation.

10 Clues: Time-based one-time password algorithm.Counter-based HMAC one-time password algorithm.Practice of requiring two or more independent factors.Hardware security key used for HOTP+PIN and FIDO flows.State value that advances to produce the next HOTP code.Local secret on a security key used alongside HOTP validation....

First Principles of Cybersecurity 2019-10-15

First Principles of Cybersecurity crossword puzzle
Across
  1. hiding data from people who don't need to have access to it
  2. using mulitple strategies to protect something
  3. making sure that only the necessary people have access
  4. reducin the number of weaknesses in something
  5. labeling objects based on how they can be used and by whom
  6. removing any clutter and only displaying the important information
Down
  1. making designs as simple and intuitive as possible
  2. keeping things separate based on categories
  3. making it easy to swap one part out for another
  4. only doing one thing at a time

10 Clues: only doing one thing at a timekeeping things separate based on categoriesreducin the number of weaknesses in somethingusing mulitple strategies to protect somethingmaking it easy to swap one part out for anothermaking designs as simple and intuitive as possiblemaking sure that only the necessary people have access...

Cybersecurity Threats and Defenses 2025-09-24

Cybersecurity Threats and Defenses crossword puzzle
Across
  1. Fake website designed to steal credentials
  2. Protects data on a wireless network
  3. Continuous monitoring of network traffic
  4. Security test that simulates a real attack
  5. Prevents unauthorized physical entry to a secure area
Down
  1. A malicious attack that floods a system with traffic
  2. Secures communication over the internet
  3. Framework of rules and policies governing security
  4. Keeps track of system events for auditing
  5. Hidden malicious code inserted into software

10 Clues: Protects data on a wireless networkSecures communication over the internetContinuous monitoring of network trafficKeeps track of system events for auditingFake website designed to steal credentialsSecurity test that simulates a real attackHidden malicious code inserted into softwareFramework of rules and policies governing security...

Common Cybersecurity Roles 2025-02-05

Common Cybersecurity Roles crossword puzzle
Across
  1. Investigates and mitigates cyber incidents, such as data breaches or malware attacks.
  2. Simulates cyberattacks to find vulnerabilities in systems.
Down
  1. Monitors and analyzes security threats to protect an organization.
  2. Designs, implements, and maintains secure network infrastructure.
  3. A high-level executive responsible for overseeing an organization's entire cybersecurity strategy.

5 Clues: Simulates cyberattacks to find vulnerabilities in systems.Designs, implements, and maintains secure network infrastructure.Monitors and analyzes security threats to protect an organization.Investigates and mitigates cyber incidents, such as data breaches or malware attacks....

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. IES, IET, IPRS
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. SC initiated, amazing three-times a year, event
  5. First part of SC’s mission - provide (someone or something) the means to do something.
Down
  1. First part of student life’s tagline
  2. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  3. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  4. Second part of student life’s tagline
  5. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  6. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  7. Keep it lit!
  8. Second part of SC’s mission - participate or become involved in.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASC initiated, amazing three-times a year, eventSecond part of SC’s mission - participate or become involved in....

Cyber Crossword Puzzle 2023-10-05

Cyber Crossword Puzzle crossword puzzle
Across
  1. Never write these down on a sticky note or a whiteboard.
  2. Never open these in email unless you already expected them from the sender.
  3. _____ is a level of data classification.
  4. Lock your _____ and your mobile phone anytime they are not in use.
  5. Files with sensitive information should always be kept in a _____ file room or drawer.
  6. Alway install _____ to your computer or mobile phone. Don't click "Remind me later."
Down
  1. _____ is when an unauthorized person follows you into a secure location.
  2. Report all possible cyber _____ to the IT Service Desk.
  3. An email scam that that targets unsuspecting users to give up information.
  4. Measures taken to protect your or your organization's information from cyber attack
  5. An unauthorized person that tries to gain access to your computer.
  6. Stay _____ and be on the lookout for security threats or incidents.
  7. Always keep a _____ workspace that is free of confidential information.

13 Clues: _____ is a level of data classification.Report all possible cyber _____ to the IT Service Desk.Never write these down on a sticky note or a whiteboard.An unauthorized person that tries to gain access to your computer.Lock your _____ and your mobile phone anytime they are not in use.Stay _____ and be on the lookout for security threats or incidents....