cybersecurity Crossword Puzzles
Secure Your Screen Crossword Puzzle 2023-09-19
Across
- Personal ______ is any ______ that can be used to identify an individual, either on its own or in combination with other _______.
- A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
- A social _____ is someone who tries to manipulate or trick others into providing sensitive information or taking certain actions.
- Do Your Part to be Security ______
- Avoid sharing personal ____ information online.
- If you suspect a phishing email, you should ____ to cybersecurity.
Down
- Avoid Connecting to ____ WIFI.
- A type of phishing attack where malware are embedded in __ codes
- An easy tool to keep track of passwords
- Passwords with longer ______ are more difficult to crack.
- Text Message from someone pretending to be our CEO asking for a gift card
- Only download company ______ software
12 Clues: Avoid Connecting to ____ WIFI. • Do Your Part to be Security ______ • Only download company ______ software • An easy tool to keep track of passwords • Avoid sharing personal ____ information online. • Passwords with longer ______ are more difficult to crack. • A type of phishing attack where malware are embedded in __ codes • ...
GAMER ARMY CROSSWORD 2024-06-05
Across
- Floating Robot that buzzes when it flys in the air
- action on someone who puts things together.
- a thing done by skills or courages
- A headset you wear that makes you see a world a person made that you can walk into.
- take something or someone to an other place.
- a place on particular issues can be exchanged
- High definition on internet That has hyperspeed of power.
Down
- Being protected by an electronic face that watches.
- A person who unlawful violences to the civilians
- Two halves of a school year in high school.
- a Player name or person who plays that player.
- A sign that shows peace or other signs that are called… to bring to their own country.
- A thing you did that makes you popular and become a worlds and most… actor or person
- One problem happen to another problem that turn into a huge problem called.
- something that is visible and not completely border.
15 Clues: a thing done by skills or courages • Two halves of a school year in high school. • action on someone who puts things together. • take something or someone to an other place. • a place on particular issues can be exchanged • a Player name or person who plays that player. • A person who unlawful violences to the civilians • ...
JOB TITLES 2025-10-01
Across
- A professional who directs an organization's computer-related activities to meet business goals.
- A person who gides a team toward a common goal by providing direction.
- plan, desing, and supervised the construction and maintenance of building.
- A person whose job is to analyse financial accounts.
- A person who directly oversees the work of a team employees.
Down
- Analyzes and optimizes a company's inventory levels.
- A person whose job is to keep records of the financial affairs of a business.
- A person who complies and analyses statistics to calculate insurance risks
- A person who oversees the daily operations, ensuring production goals are met efficiently.
- A person who ranks below a senior person
- develops a media plan that precisely defines the distribution strategy for a campaign.
- A person highly skilled in a specific and restricted field.
- A professional who oversees an organization's workforce, managing everything from recruitment and hiring.
- A senior executive responsible for an organization's cybersecurity strategy and programs.
- A sales professional specialized in prospecting and rating of potential customers.
15 Clues: A person who ranks below a senior person • Analyzes and optimizes a company's inventory levels. • A person whose job is to analyse financial accounts. • A person highly skilled in a specific and restricted field. • A person who directly oversees the work of a team employees. • A person who gides a team toward a common goal by providing direction. • ...
Cybersecurity Crossword- Parts of a Cumputer 2025-11-10
Across
- Specialized processor that handles graphics and videos, and calculates multiple things at once.
- The main circuit of the computer which connects everything like memory, graphics cards, power, and the CPU.
- Wire that connects devices physically to the routers
- A computer’s network adapter which allows it to connect to the internet/local network
- Computer’s hardware that displays images, videos, etc. onto the screen
- The first software that runs as soon as a computer starts up.
- Computer’s short term and high speed working memory and holds memory that the CPU is actively using
- Offers a faster and smoother experience which initializes hardware and boots the operating system.
- Type of computer storage that uses microchips to save data
Down
- A computer’s long term storage and it holds data even when the power is off
- Outer shell of the computer which holds all of the internal parts together.
- Wireless tech that connects devices to one another using radio waves
- Transmits data using light through thin glass or plastic fibers
- Piece of hardware used for long term storage device for all digital content and data on computers
- Data storage in a computer
- The main part of the computer which executes instructions from programs and performs calculations
- Portable storage devices that can be inserted into and removed from a computer
- Connection used to plug devices like keyboards, mice, flash drives, etc. into computers
- Small and fast temporary storage which holds memory that is frequently used so the computer processes quicker
19 Clues: Data storage in a computer • Wire that connects devices physically to the routers • Type of computer storage that uses microchips to save data • The first software that runs as soon as a computer starts up. • Transmits data using light through thin glass or plastic fibers • Wireless tech that connects devices to one another using radio waves • ...
Media texnologiyalar kundalik hayotda 2024-10-22
Across
- Internet va raqamli ma'lumotlarni himoya qilish, kiber hujumlardan himoyalanish va xavfsizlikni ta'minlash
- Axborot va ma'lumotlarni tarqatish vositalari
- Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya
- Search Engine Optimization Veb saytlarni qidiruv tizimlarida yuqori o'rinlarda ko'rsatish uchun amalga oshiriladigan jarayon
- Reality Foydalanuvchiga to'liq immersiv tajriba beruvchi kompyuter tomonidan yaratilgan muhit
- tarmoqlarda muayyan sohada ta'sirga ega bo'lgan shaxs brendni targ'ib qilishda yordam beradi
- Data Katta hajmdagi ma'lumotlar ularni tahlil qilish va ishlatish orqali foydali ma'lumotlarni olish
Down
- content Foydalanuvchilar tomonidan yaratilgan kontent brendlar tomonidan foydalaniladi
- Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar
- marketing Mahsulot yoki xizmatni ijtimoiy tarmoqlar orqali tez tarqatish uchun yaratilgan marketing strategiyasi
- computing Internet orqali ma'lumotlarni saqlash va ularga kirish imkonini beruvchi texnologiya
- tarmoqlar Foydalanuvchilarga axborot almashish va muloqot qilish imkonini beruvchi platformalar
- Kontentni internet orqali jonli tarzda real-time tomosha qilish yoki tinglash imkoniyatini beruvchi texnologiya
- media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar
- Shaxsiy fikrlar g'oyalar yoki ma'lumotlarni qiziqarli tarzda taqdim etadigan veb-sayt
15 Clues: Axborot va ma'lumotlarni tarqatish vositalari • Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya • media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar • Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar • ...
BrainRiddle 2025-02-05
Across
- The process of verifying the identity of a user or system.
- The study of analyzing and breaking cryptographic algorithms.
- The process of removing software restrictions on a device to gain full control.
- The practice of updating software to fix security vulnerabilities.
- A security feature ensuring only trusted software runs during startup.
- The process of identifying, managing, and mitigating cybersecurity threats.
- The process of collecting and analyzing data to prevent cyber threats.
Down
- A cyberattack where an attacker secretly intercepts communication.
- A cryptographic technique used to verify the authenticity of data.
- The use of hacking techniques for political or social activism.
- A program or code that takes advantage of a vulnerability in a system.
- A hidden method of bypassing security controls to gain unauthorized access.
- Software embedded in hardware that controls low-level device operations.
- An advanced computing paradigm that can break classical encryption.
- A type of malware that records keystrokes to steal passwords and data.
15 Clues: The process of verifying the identity of a user or system. • The study of analyzing and breaking cryptographic algorithms. • The use of hacking techniques for political or social activism. • A cyberattack where an attacker secretly intercepts communication. • A cryptographic technique used to verify the authenticity of data. • ...
Science and Technology 2023-10-31
Across
- - A professional who designs and builds technology.
- - Science of living organisms.
- - Medical imaging using radiation.
- - Transmitting information over long distances.
- - Field of creating and programming robots.
- - Protection of computer systems from attacks.
- - Device for processing and storing data.
- - Study of the environment and ecosystems.
- - Study of matter, energy, and the fundamental forces of nature.
- - Study of flight and aircraft design.
- - Instrument for magnifying small objects.
- - Smallest unit of a chemical compound.
Down
- - Use of living organisms in technology.
- - Study of the atmosphere and weather.
- - Creating genetically identical organisms.
- - Related to the smallest units of energy.
- - Manipulating matter on a nanoscale.
- - Study of heredity and DNA.
- - Famous physicist known for the theory of relativity.
- - Study of extremely small structures.
- - Study of celestial objects and the universe.
- - Vehicle designed for travel in outer space.
- - Study of the composition of matter.
- - Optical device for observing distant objects.
- - Pertaining to circuits and devices using electricity.
- - Substance with a distinct molecular composition.
- - Object orbiting a celestial body.
- - Device that emits a focused beam of light.
- - Substance to stimulate immunity to disease.
- - A step-by-step problem-solving procedure.
30 Clues: - Study of heredity and DNA. • - Science of living organisms. • - Medical imaging using radiation. • - Object orbiting a celestial body. • - Manipulating matter on a nanoscale. • - Study of the composition of matter. • - Study of the atmosphere and weather. • - Study of extremely small structures. • - Study of flight and aircraft design. • ...
Science and Technology 2023-10-31
Across
- - Famous physicist known for the theory of relativity.
- - Creating genetically identical organisms.
- - Study of flight and aircraft design.
- - Protection of computer systems from attacks.
- - Device that emits a focused beam of light.
- - Science of living organisms.
- - Study of the composition of matter.
- - Medical imaging using radiation.
- - Vehicle designed for travel in outer space.
- - Device for processing and storing data.
- - Study of the atmosphere and weather.
- - Transmitting information over long distances.
- - Study of extremely small structures.
- - Substance to stimulate immunity to disease.
- - Study of the environment and ecosystems.
- - Pertaining to circuits and devices using electricity.
- - Object orbiting a celestial body.
Down
- - Study of celestial objects and the universe.
- - Related to the smallest units of energy.
- - Use of living organisms in technology.
- - Smallest unit of a chemical compound.
- - Instrument for magnifying small objects.
- - A step-by-step problem-solving procedure.
- - Field of creating and programming robots.
- - Substance with a distinct molecular composition.
- - Study of matter, energy, and the fundamental forces of nature.
- - Optical device for observing distant objects.
- - Manipulating matter on a nanoscale.
- - A professional who designs and builds technology.
- - Study of heredity and DNA.
30 Clues: - Study of heredity and DNA. • - Science of living organisms. • - Medical imaging using radiation. • - Object orbiting a celestial body. • - Study of the composition of matter. • - Manipulating matter on a nanoscale. • - Study of flight and aircraft design. • - Study of the atmosphere and weather. • - Study of extremely small structures. • ...
Informatika 2024-08-26
Across
- Malware yang dapat memantau dan merekam aktivitas pengguna komputer atau perangkat selular.
- Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data
- Orang yang menjalankan atau membuat program sebuah komputer
- Peretasan
- Kejahatan dunia maya dimana biasanya target dihubungi melalui surel, telepon, atau pesan teks oleh seseorang yang menyamar dari lembaga sah untuk mengelabui target untuk memberikan data sensitif.
- Peretas topi hitam
- Badan Siber dan Sandi Negara
- Pusat Koordinasi Tim Tanggap Darurat Komputer
Down
- Keamanan informasi Internet
- MAlware yang tampak seperti aplikasi perangkat lunak jinak, tetapi perangkat lunak ini membawa komponen yang jahat didalamnya.
- Gerakan aktivis/hacktivist internasional yang tersebar dan dikenal luas karena berbagai serangan dunia maya terhadap beberapa lembaga pemerintah, perusahaan, dan organisasi bisnis lainnya.
- Asal kata data dari bahasa latin
- Sifat data yang berarti menggambarkan sesuatu
- Era peretasan 1, preretas disebut...
- Program komputer yang mampu menyalin dirinya sendiri ke komputer lain.
- Sifat data yang berupa numerik (angka)
- Usaha untuk memikat pengguna internet untuk masuk ke situs web palsu.
- Salah satu media sosial yang berlogo kamera.
- Akronim Robot dan network.
- Objek untuk mengontrol akses ke informasi atau sumber daya lain.
- Salahsatu sifat informasi
21 Clues: Peretasan • Peretas topi hitam • Salahsatu sifat informasi • Akronim Robot dan network. • Keamanan informasi Internet • Badan Siber dan Sandi Negara • Asal kata data dari bahasa latin • Era peretasan 1, preretas disebut... • Sifat data yang berupa numerik (angka) • Salah satu media sosial yang berlogo kamera. • Sifat data yang berarti menggambarkan sesuatu • ...
Technology 2023-09-30
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
Technology Careers 2025-05-13
Across
- When machines do tasks without human help
- Analyst Studies information to find patterns and answers
- Designer Designs how websites look and work
- A new and creative way of doing something
- Stores files on the internet, not on your device
- Developer Makes programs for smartphones and tablets
- Protects computers and data from hackers
- Support Helps people fix problems with their computers
- Uses electronic signals to store or send data
- Solves problems using science and technology
- Tools and machines created by people to solve problems
- Builds and programs robots to do tasks
- Stands for Science, Technology, Engineering, and Math
Down
- Writes instructions that tell computers what to do
- A small electronic tool or device
- Engineer Builds and manages computer networks
- Physical parts of a computer like a keyboard or screen
- A machine used for typing, games, and the internet
- Specialist Works with smart machines that can learn
- A place to store and organize lots of information
- Writing commands that computers can understand
- A global system that connects computers
- Support Helps people solve technology problems
- Developer Creates video games for computers and consoles
- Programs or apps used on computers and devices
25 Clues: A small electronic tool or device • Builds and programs robots to do tasks • A global system that connects computers • Protects computers and data from hackers • When machines do tasks without human help • A new and creative way of doing something • Designer Designs how websites look and work • Solves problems using science and technology • ...
TTS KATA ISTILAH TEKNOLOGI INFORMASI 2025-09-02
Across
- Kumpulan data dalam jumlah sangat besar, kompleks, dan terus bertambah.
- Teknologi penyimpan data berbentuk rantai blok, dipakai misalnya pada Bitcoin
- Orang yang ahli komputer, kadang masuk ke sistem tanpa izin.
- Komputer jinjing yang bisa dibawa ke mana-mana
- Bidang ilmu yang fokus melindungi data dan sistem dari serangan digital.
- Benda buatan manusia yang ditempatkan di orbit untuk komunikasi atau pengamatan.
- Proses menemukan pola atau informasi tersembunyi dalam data besar.
- yang menciptakan pengalaman buatan seolah-olah nyata melalui perangkat khusus.
Down
- Proses mengirim file dari komputer lokal ke internet/server.
- Sistem keamanan yang menyaring lalu lintas jaringan komputer.
- Inovasi layanan finansial berbasis digital yang mengubah cara transaksi tradisional.
- Mata uang digital berbasis blockchain yang pertama kali diperkenalkan tahun 2009.
- Alat kecil di tangan untuk menggerakkan kursor
- Penghubung antara pengguna dengan komputer atau antar sistem.
- Peretas dengan tujuan merusak atau mencuri.
- Kumpulan data terstruktur yang disimpan secara sistematis di komputer.
- Upaya menipu pengguna agar memberikan data pribadi lewat email atau situs palsu.
- Kesalahan dalam kode program yang menyebabkan sistem tidak berjalan semestinya.
- Menonton atau mendengar langsung lewat internet tanpa download
- Urutan langkah logis untuk menyelesaikan suatu masalah.
- Dunia maya 3D tempat orang bisa berkumpul lewat internet
21 Clues: Peretas dengan tujuan merusak atau mencuri. • Alat kecil di tangan untuk menggerakkan kursor • Komputer jinjing yang bisa dibawa ke mana-mana • Urutan langkah logis untuk menyelesaikan suatu masalah. • Dunia maya 3D tempat orang bisa berkumpul lewat internet • Proses mengirim file dari komputer lokal ke internet/server. • ...
Vocabulary Power 3 Chapters 13-15 2024-10-17
Across
- The ___ reason for the meeting was to discuss budget cuts for the upcoming quarter.
- He missed several deadlines, and ___, the client decided to terminate the contract.
- The charity aims to ___ awareness of mental health issues through social media campaigns.
- She was ___ to accept the job offer because it required relocating to another country.
- Cybersecurity falls under the ___ of the IT department in most companies.
Down
- Climate change has had a ___ impact on the global ecosystem.
- Many people ___ their success to hard work and perseverance.
- The new shopping mall will ___ a large portion of the town’s commercial area.
- The investigative journalist sought to ___ corruption within the government.
- In this project, your ___ will be to manage the team's schedule and deliverables.
- After months of negotiations, the company finally agreed to ___ the confidential documents.
- Strict deadlines often ___ creativity in high-pressure work environments.
12 Clues: Climate change has had a ___ impact on the global ecosystem. • Many people ___ their success to hard work and perseverance. • Strict deadlines often ___ creativity in high-pressure work environments. • Cybersecurity falls under the ___ of the IT department in most companies. • The investigative journalist sought to ___ corruption within the government. • ...
Malwarebytes 2022-10-13
Across
- Apple's personal computer
- programs that include rogue advertising, toolbars and pop-ups
- a code made up of an array of black and white squares, used a lot during the Covid Pandemic
- best cybersecurity in the world
- malicious software that keeps your files hostage while requesting money
- undesired email communication, often sent out in bulk
- security mechanism that analyses all the traffic that enters and exits your network
- compressed file
- small pieces of information that a web browser generates (also great with chocolate chips)
- removed malicious files found by Malwarebytes are placed in this safe location
Down
- browser that's used the most
- malicious program that disguises itself inside real looking files and downloads
- group of computers under the same admin
- malicious software that tries to gather information and pass it on to another entity
- malicious software
- malware that's attached to another program and replicates and spreads itself
- provides secure connection to the internet by encrypting your traffic. (also great to use for watching foreign tv)
- the full link to a website
- company that provides users with internet services
- blocks advertisements
- fake or false warning
21 Clues: compressed file • malicious software • blocks advertisements • fake or false warning • Apple's personal computer • the full link to a website • browser that's used the most • best cybersecurity in the world • group of computers under the same admin • company that provides users with internet services • undesired email communication, often sent out in bulk • ...
Wraiths & Words: A Haunted Mansion Challenge 2023-09-21
Across
- Found in the graveyard
- Creepy statues
- Deceptive email pr@ctice
- Cybersecurity measure
- Malicious software
- Network of infected computers
- Mansion staff member
- En7ry k3y
- Mansion's signature tune (3 wds)
- Home of 999 happy haunts
- KN2G64TBM5SSAZTPOIQGCIDIMVQWILBAMFRWG33SMRUW4ZZAORXSA5DIMUQEQYLVNZ2GKZBAJVQW443JN5XA====
- Extra layer of security
- Voiced of several characters in the Haunted Mansion
- Haunted Mansion's musical instrument
- Changing image in Haunted Mansion
- What three ghosts do
- Protection software
- To take advantage of a security flaw
- Mansion decor
- Unauthorized computer user
Down
- Taunt at the Haunted Mansion (2wds)
- 55 6e 77 61 6e 74 65 64 20 65 6d 61 69 6c
- Where portraits lengthen (2 wds)
- Unauthorized access
- 73 110 116 101 114 110 101 116 32 105 100 101 110 116 105 102 105 99 97 116 105 111 110
- Boo!
- U2VhbmNlLWhvbGRpbmcgbWVkaXVtIGF0IEhhdW50ZWQgTWFuc2lvbg==
- Digital offensive
- Mansion's grand
- Mansion finale
- S3lf-r3plicating
- Haunted Mansion newspaper column
- Security weak point
- Malicious software demanding payment
- Mansion ride vehicle
- To fix a flaw
- Authentication via physical traits
- Contacting the dead
- Web tracking item
- Haunted Mansion location with a bride
40 Clues: Boo! • En7ry k3y • To fix a flaw • Mansion decor • Creepy statues • Mansion finale • Mansion's grand • S3lf-r3plicating • Digital offensive • Web tracking item • Malicious software • Unauthorized access • Security weak point • Contacting the dead • Protection software • Mansion staff member • Mansion ride vehicle • What three ghosts do • Cybersecurity measure • Found in the graveyard • ...
RU ITEC411 - Chapter 5 - Crime and Security 2025-04-21
Across
- A hidden method to bypass security and access a system.
- A network of infected devices controlled by hackers.
- Redirecting users to fake websites to steal their data.
- Manipulating people into revealing confidential data.
- An attack that floods a system with traffic to crash it.
- Any software designed to harm or exploit systems.
- Stealing someone’s personal information to impersonate them.
- Software that secretly gathers user information without consent.
- Sending fake messages to trick people into giving away private information.
- A harmful program disguised as a legitimate one.
- A program that spreads by copying itself without needing a host file.
- A team that responds to major cybersecurity incidents.
Down
- Phishing attacks carried out through text messages.
- Using hacking for political activism or protest.
- A serious security flaw in encryption software that exposed user data.
- Gaining unauthorized access to computer systems.
- The process of scrambling data to protect it from unauthorized access.
- An unmanned aerial device that can be vulnerable to hacking.
- Malware that locks files and demands payment to unlock them.
- Malicious software that attaches itself to programs and spreads when they run.
20 Clues: Using hacking for political activism or protest. • Gaining unauthorized access to computer systems. • A harmful program disguised as a legitimate one. • Any software designed to harm or exploit systems. • Phishing attacks carried out through text messages. • A network of infected devices controlled by hackers. • Manipulating people into revealing confidential data. • ...
IT Systems and Security 2025-07-21
Across
- Ranking tasks or risks by importance
- Public perception that can be damaged by breaches
- A fine or consequence for non-compliance
- I am harmful
- System settings that affect performance
- Programs and applications
- loss Critical information is erased or inaccessible
- The users who interact with and operate in an environment
- How often a certain risk or issue occurs
- Ordering risks based on severity and likelihood
- Numerical estimate of potential loss
- Unintentional harmful events affecting systems
- You need to identify this before setting up an IS
- Likelihood of a specific event occurring
- Flaws that can be exploited by threats
Down
- Organized collections of structured information
- Physical parts of a computer or system
- I am important for your network
- Example: Routers, switches, cables in connectivity, etc.
- disasters Earthquakes or floods that disrupt systems
- Enhancements to improve system
- Evaluation of consequences of an incident
- What do you do after completing a task?
- Gaps in security or system design
- Series of steps to accomplish tasks in systems
- System A coordinated set of components to manage data
- What else do you need other than physical components?
- Period when a system is unavailable/offline
28 Clues: I am harmful • Programs and applications • Enhancements to improve system • I am important for your network • Gaps in security or system design • Ranking tasks or risks by importance • Numerical estimate of potential loss • Physical parts of a computer or system • Flaws that can be exploited by threats • System settings that affect performance • ...
Xalqaro iqtisodiy tashkilotlar faoliyatida OAV (ommaviy axborot vositalari) va axborot texnologiyalari o‘rni 2025-12-06
Across
- – Shaxsiy yoki tashkilot tomonidan onlayn tarzda yangiliklar, fikrlar va maqolalar e’lon qilinadigan platforma nima?
- – Moliyaviy va iqtisodiy beqarorlikni ifodalovchi holat nima?
- – OAV vositalaridan biri, televizor orqali ma’lumot tarqatiladi. Bu nima?
- – Markaziy va Sharqiy Yevropada iqtisodiy loyihalarni moliyalashtiruvchi bank nomi nima?
- – Ma’lumotlarni tahlil qilish va natijalarni baholash jarayoni nima?
- – Axborot texnologiyalarining eng asosiy global tarmog‘i nima?
- – Davlatlar o‘rtasida erkin savdoni rag‘batlantiruvchi tashkilot nima?
- – Muloqot va axborot almashish uchun ishlatiladigan mashhur messenjer nomi?
- – Smartfon va planshetlarda ishlaydigan dasturiy ilova nima?
- konferensiya – Tashkilotlar va davlatlar o‘rtasida muhim iqtisodiy masalalarni muhokama qiladigan yig‘ilish nima?
- – Axborot texnologiyalarida ma’lumotlarni raqamli shaklda ifodalash uchun ishlatiladigan atama nima?
Down
- – Axborot texnologiyalarida ma’lumotlarni himoya qilish va xakerlik hujumlaridan saqlash tizimi nima?
- – Xalqaro tashkilotlar tomonidan iqtisodiy loyihalarni qo‘llab-quvvatlash uchun ajratiladigan mablag‘ nima?
- – Ommaviy axborot vositalaridan biri, ovoz orqali yangiliklar tarqatadi. Bu nima?
- – Axborot texnologiyalarida foydalanuvchilar uchun xizmat ko‘rsatadigan dasturiy muhit nima?
- – Rivojlanayotgan davlatlarga investitsiya va kredit ajratuvchi xalqaro tashkilot?
- – OAVda voqea yoki yangilikni batafsil yorituvchi material nima?
- – Onlayn tarzda audio yoki video tarkibni uzatish texnologiyasi nima?
- – Global moliyaviy barqarorlikni ta’minlovchi xalqaro tashkilot nima?
- – Tashkilot yoki kompaniya tomonidan ommaviy axborot vositalariga tarqatiladigan rasmiy bayonot nima?
20 Clues: – Smartfon va planshetlarda ishlaydigan dasturiy ilova nima? • – Moliyaviy va iqtisodiy beqarorlikni ifodalovchi holat nima? • – Axborot texnologiyalarining eng asosiy global tarmog‘i nima? • – OAVda voqea yoki yangilikni batafsil yorituvchi material nima? • – Ma’lumotlarni tahlil qilish va natijalarni baholash jarayoni nima? • ...
Cryptography Crossword Puzzle 2020-06-15
Across
- a type of cipher that's based on A's and B's and sounds like a breakfast food
- a job that you can do once you learn a lot about cryptography
- the art of writing and solving coded messages
- a type of cipher that uses symbols to represent letters and sounds like an animal
- when you take a normal message and put it into code
- another word for a secret coded message
Down
- a type of cipher that replaces regular letters with scrambled letters
- the first cipher ever made and sounds like a healthy lunch food
- the field that protects against electronic attacks
- when you solve a coded message and and find the true meaning
- a tool we use to solve and create coded messages and sounds like a job
- the regular alphabet you use everyday
12 Clues: the regular alphabet you use everyday • another word for a secret coded message • the art of writing and solving coded messages • the field that protects against electronic attacks • when you take a normal message and put it into code • when you solve a coded message and and find the true meaning • a job that you can do once you learn a lot about cryptography • ...
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- any software program in which advertising banners are displayed while the program is running.
- door a method, often secret, of bypassing normal authentication in a product.
- threat refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- someone who seeks and exploits weaknesses in a computer system or computer network.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- an attempt by hackers to damage or destroy a computer network or system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
OpenText Cybersecurity Portfolio 2023-09-11
7 Clues: Threat Detection • Digital Forensics • Backup and Recovery • Data Protection and Privacy • Endpoint and Email Security • Application and API Security • Identity and Access Management
Risk Culture Awareness 2022-01-19
Across
- level of risk that an organization is prepared to accept
- Risk department that reviews and provides an independent opinion to the business on lending proposals
- Process and risk owners are in which line of defense?
- A measure of the level of risk an organization is willing to accept
Down
- The practice of protecting systems and information from digital attacks
- A mitigation strategy to eliminate the risk exposure to come into existence
- this function represents the third line of defense
- risk of loss resulting from ineffective or failed internal processes, people, systems
- the chance that an outcome or investment's actual gains will differ from an expected outcome or return
9 Clues: this function represents the third line of defense • Process and risk owners are in which line of defense? • level of risk that an organization is prepared to accept • A measure of the level of risk an organization is willing to accept • The practice of protecting systems and information from digital attacks • ...
Get secure 2019-08-26
Across
- something that you wear during conference calls
- you need to follow them in order not to be hacked
- you use applications from it for in-company communication, data editing, etc.
- you use it if you decide to check your email when you are not in the office
Down
- you need to do this to log in to corporate systems
- you need to do it to start working with a system
- it helps us to be sure that our online data is protected
- something you may have during a call if the internet connection is bad
- you use them for taking vacation days, reporting, creating expense reports
9 Clues: something that you wear during conference calls • you need to do it to start working with a system • you need to follow them in order not to be hacked • you need to do this to log in to corporate systems • it helps us to be sure that our online data is protected • something you may have during a call if the internet connection is bad • ...
Information Managment 2025-09-23
Across
- A business function that involves people, data, processes and organization of data for business.
- The accuracy of data and the validity of it.
- Understanding the challenges that came and are coming and learning how to overcome them and how to avoid those challenges.
- Anything that is made from the mind like ideas and inventions.
- A secret process that gives an advantage to a company and has economic value.
Down
- A computer system that allows the information management business function.
- Anything that is valuable but cannot be found in real life.
- The protection of networks, data and information from unauthorized access.
- An unbiased observation that investigates the safety and accuracy of information.
9 Clues: The accuracy of data and the validity of it. • Anything that is valuable but cannot be found in real life. • Anything that is made from the mind like ideas and inventions. • The protection of networks, data and information from unauthorized access. • A computer system that allows the information management business function. • ...
Crossword Puzzle 2021-02-07
Across
- FoP that support client to address interruptions like those presented by COVID-19
- A secure collaborative innovation management platform
- FoP that assist clients to stay up-to-date with security and privacy leading practices and compliance requirements.
- FoP that captures emerging market demands
Down
- FoP that help clients control and optimize costs
- Our global strategy and ambition to deliver long-term value to clients, people and society.
6 Clues: FoP that captures emerging market demands • FoP that help clients control and optimize costs • A secure collaborative innovation management platform • FoP that support client to address interruptions like those presented by COVID-19 • Our global strategy and ambition to deliver long-term value to clients, people and society. • ...
Cybersecurity Awareness Month 2024 Crossword 2024-09-19
Across
- The Hightower Approved Generative AI tool.
- When you should report suspicious activity or behavior to your Cybersecurity team.
- How often you should reboot your work and personal devices.
Down
- A type of email sent by malicious actors.
- An update for Software or applications that is deployed to fix a security issue or weakness.
- Malicious software that is intended to cause harm to a device or entire network
6 Clues: A type of email sent by malicious actors. • The Hightower Approved Generative AI tool. • How often you should reboot your work and personal devices. • Malicious software that is intended to cause harm to a device or entire network • When you should report suspicious activity or behavior to your Cybersecurity team. • ...
information technology 2023-10-28
Across
- is the process of designing, creating, testing, and maintaining software applications
- is a branch of IT that protects computer systems and data from unauthorized access
- is the study of computers and computing technology
Down
- is the process of creating and maintaining websites
- refers to the practice of connecting computer systems and other devices
5 Clues: is the study of computers and computing technology • is the process of creating and maintaining websites • refers to the practice of connecting computer systems and other devices • is a branch of IT that protects computer systems and data from unauthorized access • is the process of designing, creating, testing, and maintaining software applications
CIEL1 Cybersecurity Crossword 2024-03-13
Across
- Intercepts traffic as it is sent over the network to collect names, passwords and other information.
- What using when we prove we be a real sender.
- which application use for see the different trams who circulate with the PC.
Down
- Sending an email seems reliable to obtain sensitive information on the target.
- What is a name of the cyber criminal.
- Transmits malicious scripts using clickable content sent to the target's browser.
- Held hostage until she agrees to pay the attacker a ransom.
7 Clues: What is a name of the cyber criminal. • What using when we prove we be a real sender. • Held hostage until she agrees to pay the attacker a ransom. • which application use for see the different trams who circulate with the PC. • Sending an email seems reliable to obtain sensitive information on the target. • ...
Cyber/Digital Literacy 2024-11-06
Across
- example of computer virus
- of malware that can make copies of itself and spread automatically across computers in a network.
- has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness.
Down
- -Refers to the trail of data you leave when using the internet.
- is use protect your personal information
- Who's actively participate in cyberspace and the online community offered through the internet
- Type of crime that uses computers or networks harm.
7 Clues: example of computer virus • is use protect your personal information • Type of crime that uses computers or networks harm. • -Refers to the trail of data you leave when using the internet. • Who's actively participate in cyberspace and the online community offered through the internet • ...
AI Crossword Puzzle 2024-10-17
Across
- The process of automatically recognizing patterns in large data sets (6 letters).
- The technique of using past data to predict future outcomes (9 letters).
- A popular programming language for AI development (6 letters).
- The full form of "AI" (14 letters).
Down
- AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis (8 letters).
- Through this technique AI models can learn the underlying patterns and create realistic and novel outputs (12 letters).
- A branch of AI focused on the interaction between computers and human language (3 letters).
- A large data repository that is queried for insights (9 letters).
8 Clues: The full form of "AI" (14 letters). • A popular programming language for AI development (6 letters). • A large data repository that is queried for insights (9 letters). • The technique of using past data to predict future outcomes (9 letters). • The process of automatically recognizing patterns in large data sets (6 letters). • ...
REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16
Across
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- an attempt by hackers to damage or destroy a computer network or system.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- designed to detect and destroy computer viruses.
- global system of interconnected computer networks that use the Internet protocol suite.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- any software program in which advertising banners are displayed while the program is running.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- door a method, often secret, of bypassing normal authentication in a product.
- a standalone malware computer program that replicates itself in order to spread to other computers.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
IT Companies 2024-04-20
Across
- A multinational technology corporation that develops, manufactures, licenses, supports, and sells computer software, consumer electronics, and personal computers
- one of the most popular company that sell premium phone
- profound and often rapid change or transformation that occurs within a society, system, or organization
- company that create first phone
Down
- Part of IT department, that control security part of IT companies
- IT GIGANT that have theyself browser, search system
- one of the companies of the largest oligarch, which is responsible for the wireless network in all parts of the world
7 Clues: company that create first phone • IT GIGANT that have theyself browser, search system • one of the most popular company that sell premium phone • Part of IT department, that control security part of IT companies • profound and often rapid change or transformation that occurs within a society, system, or organization • ...
Cybersecurity 2 2022-09-27
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
- A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
- A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid
5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid • A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state. • A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system. • ...
Cybersecurity Jargons 2024-10-18
Across
- private network that creates a secure and encrypted connection over the internet between a user’s device and a remote server.
- a network of compromised computers, often referred to as "zombies," controlled remotely by a malicious actor
- is a type of malware that replicates itself to spread to other computers.
Down
- malicious software that encrypts the victim's data, rendering it inaccessible until a ransom is paid, usually in cryptocurrency.
- process of converting information or data into a code, especially to prevent unauthorized access.
5 Clues: is a type of malware that replicates itself to spread to other computers. • process of converting information or data into a code, especially to prevent unauthorized access. • a network of compromised computers, often referred to as "zombies," controlled remotely by a malicious actor • ...
Smart System 2021-06-30
Across
- A maintenance technique that estimates when maintenance should be performed
- Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients.
- Application that involves wireless sensor and RFID technology,
Down
- Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
- A sensor that detects movement
- Smart system application that reduces global emission
- Modification of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
7 Clues: A sensor that detects movement • Smart system application that reduces global emission • Application that involves wireless sensor and RFID technology, • A maintenance technique that estimates when maintenance should be performed • Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients. • ...
Chapter 11- RISK 2022-09-10
Across
- It is a situation that involves danger
- It is the decision of no inverting on security not even if the system is vulnerable
- It is the risk during the transmission or movement of information from one computer to another
- It is the possibility of something unwelcome or unpleasant happening
Down
- It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
- It is information resting in a hard drive, server
- It is the action of assessing someone or something
7 Clues: It is a situation that involves danger • It is information resting in a hard drive, server • It is the action of assessing someone or something • It is the possibility of something unwelcome or unpleasant happening • It is the decision of no inverting on security not even if the system is vulnerable • ...
Artificial Intelligence 2023-11-19
Across
- To set in motion; make active or more active.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The use of technology to perform tasks without human intervention.
- The systematic process of assessment and planning employed to prevent a developmental problem.
- Not functioning in a previously intended way
- Capable of operating independently without human control.
Down
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- An expert at programming and solving problems with a computer
- The design, construction, and operation of robots to perform tasks in the real world.
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
travis cyber 2023-10-08
Across
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- Pertaining to the security challenges and measures for smartphones and tablets.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
Cybersecurity Vocab - Easy 2025-07-29
Across
- Someone that breaks into a computer or network
- A digital wall that keeps bad traffic out
- A mistake in a program that can cause problems
- Unwanted or junk messages, especially in email
Down
- Instructions written to make software work
- Bad software that can spread and damage your files
- A secret that is used for authentication
7 Clues: A secret that is used for authentication • A digital wall that keeps bad traffic out • Instructions written to make software work • Someone that breaks into a computer or network • A mistake in a program that can cause problems • Unwanted or junk messages, especially in email • Bad software that can spread and damage your files
Emerging Technologies Vocabulary 2025-02-13
Across
- Artificial Intelligence
- a computing environment that allows users to access computing power from any device anywhere at any time
- a blog that features audio recording instead of written text
- the use of virtual reality technology
- the activity or practice of posting short videos to or maintaining a vlog
- a combination of engineering science and technology that creates machines called robots
Down
- the practice of protecting digital assets from cyberattacks
- a tiny device that detect and measure physical chemical biological or environmental changes at the nanoscale
- a classroom technology that allows teachers to ask questions and get students answers in real time
- branch of technology that deals with dimensions and tolerances of less than 100 nanometers
- a network of physical objects that can connect and share data with other devices and systems
11 Clues: Artificial Intelligence • the use of virtual reality technology • the practice of protecting digital assets from cyberattacks • a blog that features audio recording instead of written text • the activity or practice of posting short videos to or maintaining a vlog • a combination of engineering science and technology that creates machines called robots • ...
Unit 4 Cybersecurity 2022-03-02
7 Clues: a more thorough hotfix • quick fix for a software problem • proprietary journaling file system • a device that acts as a file server • securing devices by reducing the exposure • network of high speed storage used by servers • firewall command to block or allow certain user
Cybersecurity Awareness Crossword 2022-09-10
Across
- malware designed to deny a user or organization access to files on their computer
- security exploit in which an infected USB charging station is used to compromise connected devices
- social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
Down
- provides the first line of defence against unauthorized access to your computer and personal information
- is an attack that attempts to steal your money or your identity via email
- is an attack that attempts to steal your money or your identity via voice call
- _____ theft happens when someone impersonates people to commit fraud
7 Clues: _____ theft happens when someone impersonates people to commit fraud • is an attack that attempts to steal your money or your identity via email • is an attack that attempts to steal your money or your identity via voice call • malware designed to deny a user or organization access to files on their computer • ...
Cyber security 2021-03-20
PSB CCF CROSSWORD PUZZLE 2020-06-24
Across
- SC initiated, amazing three-times a year, event
- Keep it lit!
- A campus radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- Second part of SC’s mission - participate or become involved in.
- Third part of SC’s mission - give (someone) the power or drive to do something.
- PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
- Second part of student life’s tagline
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
- IES, IET, IPRS
- SC, CSC, Dance Club, Music Club, Photog, SAC
- CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
- First part of SC’s mission - provide (someone or something) the means to do something.
- First part of student life’s tagline
13 Clues: Keep it lit! • IES, IET, IPRS • First part of student life’s tagline • Second part of student life’s tagline • SC, CSC, Dance Club, Music Club, Photog, SAC • SC initiated, amazing three-times a year, event • CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA • Second part of SC’s mission - participate or become involved in. • ...
Crossword Puzzle 2021-10-26
Across
- How many Level 1 DGS on Golf?
- What is the first name of the new OIM on Golf?
- What is the current color code for lifting gears?
- What do you call a gradual physiological adaptation that improves an individual’s ability to tolerate heat stress?
- How many Golden Rules to live by:
- In what month do we celebrate Cybersecurity awareness?
Down
- How many years LTI free is Golf?
- Plastic waste shall be disposed into ... bin
- An apparatus used for moving patients who require medical care
- Three elements that are required to start a fire: oxygen, heat, and ...
- How many consecutive shifts can personal isolation can be used for?
- How many alternative muster stations available in G-Loc?
- Portable, life-saving devices designed to treat people experiencing sudden cardiac arrest, a medical condition in which the heart suddenly and unexpectedly stops beating
13 Clues: How many Level 1 DGS on Golf? • How many years LTI free is Golf? • How many Golden Rules to live by: • Plastic waste shall be disposed into ... bin • What is the first name of the new OIM on Golf? • What is the current color code for lifting gears? • In what month do we celebrate Cybersecurity awareness? • How many alternative muster stations available in G-Loc? • ...
Cybersecurity/Web Design - use your KNOWLEDGE PLANNER 2019-11-05
Across
- to help protect a computer network from unauthorised access
- Hacking’ - Testing a computer systems to find security vulnerabilities
- is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
- group of people at which the website is aimed e.g. teenage girls
- test that a human can pass but a computer program cannot
- reason for which the website has been created e.g. to entertain
- to scramble information so that it can be sent safely over the Internet
- attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
Down
- by reproducing itself or infecting other programs by modifying them.
- a secret word to unlock a device – must include numbers/special characters
- Testing
- Audience
- a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
- to use and understand
- preferred way to present/layout digital material
15 Clues: Testing • Audience • to use and understand • preferred way to present/layout digital material • test that a human can pass but a computer program cannot • to help protect a computer network from unauthorised access • reason for which the website has been created e.g. to entertain • group of people at which the website is aimed e.g. teenage girls • ...
The internet 2023-06-19
Across
- media Online platforms for people to connect, communicate, and share content
- Sending data or files from a device to the internet or another user
- Protecting devices, networks, and data from digital threats, like hackers and viruses
- Method of sending messages electronically between people
- Collection of related webpages accessed with a browser
- Receiving data or files from the internet and saving them on a device
- Regularly updated website or web page featuring personal or informational content
Down
- Technology allowing devices to connect wirelessly to the internet or a network
- Program used to access and view websites on the World Wide Web
- game Interactive entertainment played together or against others using the internet
- engine Tool that helps find information, images, or websites using keywords
- Transmitting video or audio content allowing users to watch or listen without downloading
- Unique address of a website on the internet, often starting with "www"
13 Clues: Collection of related webpages accessed with a browser • Method of sending messages electronically between people • Program used to access and view websites on the World Wide Web • Sending data or files from a device to the internet or another user • Receiving data or files from the internet and saving them on a device • ...
Cyber Crossword Puzzle 2023-10-05
Across
- Stay _____ and be on the lookout for security threats or incidents.
- An email scam that that targets unsuspecting users to give up information.
- Measures taken to protect your or your organization's information from cyber attack
- Never write these down on a sticky note or a whiteboard.
Down
- An unauthorized person that tries to gain access to your computer.
- Never open these in email unless you already expected them from the sender.
- _____ is a level of data classification.
- _____ is when an unauthorized person follows you into a secure location.
- Lock your _____ and your mobile phone anytime they are not in use.
- Report all possible cyber _____ to the IT Service Desk.
- Files with sensitive information should always be kept in a _____ file room or drawer.
- Always keep a _____ workspace that is free of confidential information.
- Alway install updates to your computer or mobile phone. Don't click "Remind me later."
13 Clues: _____ is a level of data classification. • Report all possible cyber _____ to the IT Service Desk. • Never write these down on a sticky note or a whiteboard. • An unauthorized person that tries to gain access to your computer. • Lock your _____ and your mobile phone anytime they are not in use. • Stay _____ and be on the lookout for security threats or incidents. • ...
Cybersecurity & Internet Safety for Kids 2024-02-18
Across
- The use of technology to harass, intimidate, or harm others online.
- Tricky online deception.
- The process of converting information into a secret code to prevent unauthorized access.
- Options on your devices or apps that you can customize, such as privacy, security, and permissions to keep your information safe online.
- When someone tries to trick you into sharing personal information, like passwords or credit card numbers, by pretending to be someone you trust.
- Unknown person online.
- A security system that helps protect your computer or network from unauthorized access by blocking certain types of internet traffic.
Down
- When you add a location to your posts or pictures online.
- Polite behavior on the Internet.
- Software designed to detect and remove viruses and other types of malware from your computer or device.
- A type of malware that can copy itself and spread to other devices, causing harm to your computer or device.
- A secret word or phrase that you create to protect your online accounts from unauthorized access.
- Short for "malicious software," it refers to harmful software that can damage your computer or steal your information.
- Keeping personal information safe and not sharing it with strangers online.
14 Clues: Unknown person online. • Tricky online deception. • Polite behavior on the Internet. • When you add a location to your posts or pictures online. • The use of technology to harass, intimidate, or harm others online. • Keeping personal information safe and not sharing it with strangers online. • ...
Unit 2 vocabolar 2025-09-30
Across
- In computer security, risk is a measure of the extent to which an entity is threatened by a potential event, such as a data breach or cyberattack. It is often calculated as a function of the likelihood of the event occurring and the potential negative impact.
- The process of implementing controls and measures to reduce the impact of a potential security threat or vulnerability. The goal is to lower risk to an acceptable level.
- The assurance that a party in a communication or transaction cannot later deny having sent or received the data. It provides proof of the origin and integrity of the data.
- A foundational model for cybersecurity that guides the development of security systems. The three pillars are Confidentiality, Integrity, and Availability.
- In the context of technology and cybersecurity, accessible means that systems, tools, and information can be used and understood by people with a wide range of abilities and disabilities.
- The guarantee that systems and data are accessible and available to authorized users when needed.
- The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals.
Down
- A network security device that not only detects malicious activity but also actively blocks or prevents it. It is often placed directly in the path of network traffic.
- The assurance that data is trustworthy, accurate, and has not been improperly altered, modified, or destroyed by an unauthorized user.
- A security tool that monitors network traffic or system activity for known malicious signatures or suspicious behavior. An IDS alerts administrators to potential threats but does not block them directly.
- A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.
- The process of verifying the claimed identity of a user, device, or other entity before granting access to a system or network.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.
13 Clues: The guarantee that systems and data are accessible and available to authorized users when needed. • A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans. • The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals. • ...
Digital Literacy Crossword 2024-10-09
Across
- The exchange of information or ideas between people.
- A group of people who watch, listen to, or engage with a presentation or performance.
- Wrongful deception intended to result in financial or personal gain.
- The ability to enter or use something.
- Individuals or organisations that support an event or activity, usually financially.
- A compulsive dependence on a substance or behaviour, often harmful.
- A state of being comfortable, healthy, or happy.
- The right to keep personal information confidential and free from public scrutiny.
Down
- A particular way of viewing or considering something.
- The size, extent, or importance of something.
- A display or demonstration of information to an audience.
- A dishonest scheme or trick to deceive people, usually for money.
- An approximate calculation or judgment regarding a quantity or value.
- Measures taken to protect computers and networks from digital attacks.
- The act of communicating or engaging with others.
- A list of items to be discussed or acted upon, often in a meeting.
- A software application used to view and navigate the internet.
17 Clues: The ability to enter or use something. • The size, extent, or importance of something. • A state of being comfortable, healthy, or happy. • The act of communicating or engaging with others. • The exchange of information or ideas between people. • A particular way of viewing or considering something. • A display or demonstration of information to an audience. • ...
Love of Learning Crossword! 2025-11-05
Across
- The scientific study of crime and criminal behavior.
- The profession of reporting, writing, and editing news.
- The study of ancient Greek and Roman literature, language, and culture.
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The study of religious belief and the nature of the divine.
- The study of human history through excavation and artifacts.
- The application of science and math to design and build structures, machines, and systems.
- The study of human societies, cultures, and their development.
Down
- The field involving the design, construction, and use of machines that can act autonomously.
- The practice of protecting computers, networks, and data from attacks.
- The art and science of designing and constructing buildings.
- The study of society and human relationships within it.
- The process of recording, summarizing, and analyzing financial transactions.
- The branch of biology dealing with organisms and their environments.
- The scientific study of language and its structure.
- The study of how societies use resources and respond to scarcity.
- The science of Earth’s physical structure, history, and processes.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
Viruses - Maria DiMeglio 2018-11-15
Across
- a type of virus that is disguised as something else
- people who hack into a company's network to find and help resolve problems in the company's cybersecurity
- a way a scammer can get your personal information through fake websites and/or fraud emails or texts
- a way to message someone electronically
- a monitor is an example of this; isn't affected by viruses
- email virus that held a seemingly innocent message, but sent itself to the top 50 people in the victim's address book
- makes copies of itself in order to spread through a network
Down
- a virus intended to do harm
- floods a network with fake traffic
- a type of virus in which a person or group of people encrypt someone else's files and asks for money in exchange for restoring them
- what software is made of
- software that can prevent virus attacks
- the first virus intended to do damage in the real world
- unwanted software, not necessarily harmful
- a virus is a type of this
15 Clues: what software is made of • a virus is a type of this • a virus intended to do harm • floods a network with fake traffic • software that can prevent virus attacks • a way to message someone electronically • unwanted software, not necessarily harmful • a type of virus that is disguised as something else • the first virus intended to do damage in the real world • ...
Digital Citizenship Vocabulary 2024-03-05
Across
- Knowing how to use digital technology safely and effectively.
- Using someone else's work in a legal and fair way, like for school projects.
- How you present yourself online through usernames, profiles, etc.
- Protecting your computer and information from digital attacks and hackers.
- Being able to find and use information online in a smart and responsible way.
- Using two different ways to prove who you are before accessing accounts online.
- Following rules for good behavior and respect when using the internet.
Down
- The trail of information you leave behind when using the internet.
- Tricky headlines or links designed to get you to click on them.
- Keeping personal information safe and not sharing it with others online.
- Bullying or hurting others online.
- How others see you based on what you do and say online.
- Your freedoms and protections when using digital technology.
- Tricking people into giving personal information by pretending to be someone else online.
- Things people create, like art or writing, that they own the rights to.
15 Clues: Bullying or hurting others online. • How others see you based on what you do and say online. • Your freedoms and protections when using digital technology. • Knowing how to use digital technology safely and effectively. • Tricky headlines or links designed to get you to click on them. • How you present yourself online through usernames, profiles, etc. • ...
IT Insights 2023-10-24
Across
- A program that you use to access websites on the Internet
- acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
- where you can find our course materials, and collaborate with your instructor
- aerial term used to describe online data storage
- a web site where you can ask a question and it provides matches
- team name used for St. Clair College athletic teams
- St. Clair College emblem
Down
- term used for organized, competitive computer gaming
- this device has rules to control the flow of data into and out of a network
- a global network of connected computers where you can find information, watch videos, and communicate with others
- branch of IT responsible for protecting networks and data from external attack
- harmful software that can infect your computer and cause problems
- electronic letters you send and receive through the Internet
- a network connection without wires
- where you can find your timetable, transcript, etc.(abbrev.)
15 Clues: St. Clair College emblem • a network connection without wires • aerial term used to describe online data storage • team name used for St. Clair College athletic teams • term used for organized, competitive computer gaming • A program that you use to access websites on the Internet • electronic letters you send and receive through the Internet • ...
Techtonic Round 2 Set B 2025-04-01
Across
- The global network that connects billions of devices worldwide.
- A popular scripting language mainly used for web development.
- A technology that allows multiple virtual machines to run on a single physical machine.
- The AI technique that enables machines to improve performance based on experience.
- A storage system that allows data to be accessed remotely over the internet.
- A process model used in software engineering that follows a linear, sequential approach.
- A software testing approach where individual units of code are tested separately.
Down
- The main circuit board of a computer that connects all components.
- The process of converting source code into machine code.
- A machine learning model inspired by the structure of the human brain.
- A type of memory that stores frequently accessed data for quick retrieval.
- A cybersecurity attack that tricks users into providing sensitive information.
- A method for encoding data to ensure only authorized access.
- The standard language for querying databases.
- A computer network that spans a small geographic area, like an office.
15 Clues: The standard language for querying databases. • The process of converting source code into machine code. • A method for encoding data to ensure only authorized access. • A popular scripting language mainly used for web development. • The global network that connects billions of devices worldwide. • ...
Networking concepts and Cyber Ethics 2025-05-21
Across
- A network that spans countries and continents
- A device that is used to connects multiple devices to each other in a network
- A wireless device that uses radio frequencies to transmit information over short distances
- A internet browser that is developed by the Mozilla foundation
- A network that covers larger area like a city
- Any kind of unwanted, unsolicited digital communication that gets sent out in bulk
- A person using vulnerability in operating system intrude in to the computer
- A network that is limited to a small geographical area such as office
Down
- A common cybersecurity threat in cyberspace
- The device used to connect computers in a network
- A device that can convert digital signals into analog and vice versa
- Script files sent through email attachment to attack host computer
- A security that is used to prevent unauthorized access to a network
- A network that is organized around a person
- The term for a clickable link on a webpage that takes to another webpage or resource
15 Clues: A common cybersecurity threat in cyberspace • A network that is organized around a person • A network that spans countries and continents • A network that covers larger area like a city • The device used to connect computers in a network • A internet browser that is developed by the Mozilla foundation • ...
Cyber Security - Chapter 1 2020-02-12
Across
- State Sponsored Hackers
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
- The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
- The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- is the collection of technologies that enable the connection of various devices to the Internet.
- is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
- Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
- Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
15 Clues: State Sponsored Hackers • This group of criminals breaks into computers or networks to gain access for various reasons. • is the collection of technologies that enable the connection of various devices to the Internet. • Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards. • ...
Find the Cybersecurity Terms 2022-10-01
Across
- Legitimate promotional email that you’ve technically solicited, though it may serve little to no purpose to you.
- Cybercriminals stealing login credentials to access an email account, which can later be used to commit fraud, send phishing emails, steal data, and beyond.
- An isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
- Acronym. Currently the most expensive type of cybercrime, evading traditional email security systems
- A data transmission error when pieces of data don’t make it to their intended destination.
Down
- A type of phishing attack aimed at high-level executives at an organization
- A trial-and-error method of finding correct login credentials.
- Type of attack; a threat vector that targets a specific group of users by compromising a website they frequently visit.
- Acronym. A cloud security checkpoint between users and cloud providers.
- A method to send emails with a forged sender address, often used to deliver spam and phishing attacks
10 Clues: A trial-and-error method of finding correct login credentials. • Acronym. A cloud security checkpoint between users and cloud providers. • A type of phishing attack aimed at high-level executives at an organization • A data transmission error when pieces of data don’t make it to their intended destination. • ...
Test Your Cybersecurity Knowledge 2024-07-24
Across
- authorization to perform some action on a system
- automated recognition of individuals based on their biological and behavioral characteristics
- guarding against improper information modification or destruction
- A string of characters to verify access authorization
Down
- assurance that information is not disclosed to unauthorized individuals or processes
- confidentiality mode that transforms usable data into an unreadable form
- scam to deceive people into revealing sensitive information
- collection of values assigned to base measures, derived measures, and/or indicators
- probability that a particular security threat will exploit a system vulnerability
- software specifically designed to disrupt, damage, or gain unauthorized access to a computer system
10 Clues: authorization to perform some action on a system • A string of characters to verify access authorization • scam to deceive people into revealing sensitive information • guarding against improper information modification or destruction • confidentiality mode that transforms usable data into an unreadable form • ...
Cybersecurity Terms Crossword Puzzle 2025-03-05
Across
- A digitally signed document that binds an entity’s identity to its public key
- A unique, single-use value that ensures fresh cryptographic operations
- The process of converting ciphertext into plaintext
- Steps taken to lessen the impact or likelihood of a security threat
- A guarantee that a party cannot deny the validity of their digital action or message
Down
- A deceptive tactic that induces individuals into revealing sensitive information
- A cryptographic marker that verifies the authenticity and integrity of a digital document
- A technique or tool that leverages a vulnerability to perform unauthorized actions
- A security approach that assumes no user or device is inherently safe
- Assurance that data remains unaltered from its original state
10 Clues: The process of converting ciphertext into plaintext • Assurance that data remains unaltered from its original state • Steps taken to lessen the impact or likelihood of a security threat • A security approach that assumes no user or device is inherently safe • A unique, single-use value that ensures fresh cryptographic operations • ...
Cybersecurity Practices and Attacks 2025-09-24
Across
- Protective barrier against spyware and viruses
- Hidden data left by websites on browsers
- Process to confirm user identities
- Security flaw in software waiting to be patched
- A backup copy stored in a separate location
Down
- A Scam via mobile messaging
- Verifying that data hasn’t been altered
- Unauthorized software modification to gain access
- A fake digital identity created for fraud
- Prevents system access until ransom is paid
10 Clues: A Scam via mobile messaging • Process to confirm user identities • Verifying that data hasn’t been altered • Hidden data left by websites on browsers • A fake digital identity created for fraud • Prevents system access until ransom is paid • A backup copy stored in a separate location • Protective barrier against spyware and viruses • ...
CyberWeek 2023-10-15
Across
- The orange phish hook you can use to alert IT to spam in your email from Know Be 4
- Email that falsely claims to be from a legitimate source, usually with a threat or request for information
- Junk email
- Online harassment
- Altered audio/video to trick users into gaining access to a system
- A type of technology used to keep intruders out
- Cybersecurity awareness month
- Puts the “m” in MFA
- Coding used to protect sensitive data
- Where do you store infected files on your computer
Down
- A sequence of words used for authentication (hint: not a password)
- Software that allows a user to remain anonymous while using the internet. This will mask your location and encrypting traffic.
- cheat your way into someone’s network
- The company FASNY uses to encrypt your email
- Short for bring your own device
- A malicious deep web program that holds your information hostage
- Your digital ______ is a collection of information you leave on the internet that can’t be removed by deleting or setting it as private.
17 Clues: Junk email • Online harassment • Puts the “m” in MFA • Cybersecurity awareness month • Short for bring your own device • cheat your way into someone’s network • Coding used to protect sensitive data • The company FASNY uses to encrypt your email • A type of technology used to keep intruders out • Where do you store infected files on your computer • ...
Technical Crossword 2024-05-01
Across
- An OS is a system _____ that acts as an intermediatery between computer user and computer hardware
- Converting high level code into machine code
- Technique is cybersecurity to hide information inside a picture
- Language often used for building web applications
- A means of encoding text in which each symbol is represented by 16 bits.
- Platform independent and interpreted programming language
- test made to check the machine's response whether it is natural (acting humanly)
Down
- A digital circuit capable of holding a single digit.
- In symmetric key cryptography same key can be used by the sender and receiver for _____ of the message.
- To increase voltage momentarily in tubelight we use ____
- protocol used in transferring files between computer or a network
- layer in the OSI model responsible for routing packets across network.
- name of the default shell in Linux operating system
- A form of high speed internet access
- In python how do you denote single line comment
- ___memory is the fastest system memory.
- Made of materials such as carbon which inhibits the flow of current
17 Clues: A form of high speed internet access • ___memory is the fastest system memory. • Converting high level code into machine code • In python how do you denote single line comment • Language often used for building web applications • name of the default shell in Linux operating system • A digital circuit capable of holding a single digit. • ...
informatika 2025-08-26
Across
- teknologi yang memungkinkan komputer untuk belajar dan membuat keputusan sendiri
- wujud kewargaan digital dalam konteks keindonesiaan
- kepanjangan ai
- istilah yang menggambarkan volume data yang sangat besar, baik terstruktur maupun tidak terstruktur adalah
- ketika mencari sesuatu produk atau apapun secara online beberapa saat kemudian kalian ditawarkan beberapa produk yang sama yang pernah dicari ada aplikasi yang digunakan adalah contoh dari
- teknologi yang memungkinkan pengguna untuk mengalami pengalaman virtual yang reality adalah pengertian dari
- bidang ilmu yang menggali pemahaman melalui eksplorasi dunia disekitar kita maupun dunia maya adalah
Down
- prinsip kejujuran sehingga individu selalu terhindar dari perbuatan untuk memanipulasi saat bermedia digital adalah pengertian dari
- adalah ke panjangan dari
- kesiapan kita menerima berbagai konsekuensi adalah pengertian dari
- teknologi yang memungkinkan pengguna untuk melakukan transaksi secara aman dan transparan adalah pengertian dari
- sistem keamanan yang digunakan untuk melindungi data dan sistem komputer dari serabgan cyber adalah pengertian dari
- teknologi komputasi yang menggunakan prinsip-prinsip mekanika kuantum untuk mengolah data adalah pengertian dari
- sebuah metode pengiriman dan penerimaan layanan melalui internet adalah pengertian dari
- kemampuan membaca,menulis, berbicara
- teknologi yang memungkinkan pengguna untuk melihat informasi tambahan dalam lingkungan nyata adalah pengertian dari
- kemampuan mendasar individu dalam mengetahui berbagai perangkat keras dan perangkat lunak adalah
- internet of things disebut juga sebagai
18 Clues: kepanjangan ai • adalah ke panjangan dari • kemampuan membaca,menulis, berbicara • internet of things disebut juga sebagai • wujud kewargaan digital dalam konteks keindonesiaan • kesiapan kita menerima berbagai konsekuensi adalah pengertian dari • teknologi yang memungkinkan komputer untuk belajar dan membuat keputusan sendiri • ...
Technology 2023-09-28
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
IT vocabulary 2023-09-07
Across
- A short-range wireless connection. Usually used for devices like headphones
- When deleted items are restored to their previous state
- When things such as updates are done automatically
- A code of numbers or letters that allow for login
- What companies use to expose you to their products
- Allows devices to connect without a physical connection
- The components that make a device
- A connection of different devices to each other
- The amount of space you have for data
- Restoring data from a previous backup
Down
- The screen where the information is displayed from a computer
- Saving all the data on a device so it can be restored at a later date
- The term for programs on devices
- A process that brings a program to a more up to date state
- Using multiple
- A computer that provides resources, data, services, or programs to other computers,over a network.
- Your security for systems online
- The term to describe information of any sort on a device
- A program that blocks your access to a system until a sum of money is paid
- Its like mail, but online
20 Clues: Using multiple • Its like mail, but online • The term for programs on devices • Your security for systems online • The components that make a device • The amount of space you have for data • Restoring data from a previous backup • A connection of different devices to each other • A code of numbers or letters that allow for login • ...
español 2024-05-14
Across
- calculator
- to fix
- to look for
- mouse
- to function (to work)
- to print
- to watch
- cybersecurity
- TV
- to send a text
- GPS navigation
- study of technology and computers
- tablet
- to turn off/to switch off
- autonomous vehicles
- monitor
- to send
- everyday objects
- fast
- social media
- empty
- keyboard
- to turn on
- to save
- uncharged
- ipad
- the internet
- dead
- to open
- to print
- to upload
- channel
- internet / navegar en la red - internet/web surfing
- headphones
- internet of things
- laptop
- screen
- to download
Down
- full
- cyber threat
- to erase/to delete
- lack of privacy
- devices
- charged
- remote control
- cyberbullying
- password
- sustainable technology
- @
- identity theft
- email address
- file
- internet connection
- printer
- artificial intelligence
- to send and email
- website
- robots
- charger
- home page/main page
- text message
- instagram profile
- to put (to put/turn on)
- to close
- the wifi
- the cloud
- program
- to record
- slow
- cell phone
71 Clues: @ • TV • full • file • fast • ipad • dead • slow • email • mouse • empty • to fix • tablet • robots • laptop • screen • devices • charged • printer • website • monitor • to send • charger • to save • to open • channel • program • password • to print • to watch • keyboard • to close • to print • the wifi • uncharged • to upload • the cloud • to record • calculator • to turn on • headphones • cell phone • to look for • to download • cyber threat • social media • text message • ...
Public Safety 2024-08-08
Across
- A serious injury to a body.
- Helping someone who is in cardiac arrest
- The continuous observation of a place, person, or group.
- Responder, The people who arrive first to arrive to an emergency.
- Casualty Incident, Healthcare systems and full because of a large number of casualties in a short period of time.
- Support, Services that are provided to people who are a victim of a crime.
- A biological substance that presents a threat to public safety
- Alert, Old person goes missing.
- Destroying property with fire
- Command System, The control of an emergency response team.
- People who protect online networks from digital attacks.
Down
- A device that uses electricity to restore the hearts normal rhythm.
- Safety, The practice of ensuring safety in the workplace.
- Health, The science of protecting a communities health.
- Assessment, Identifying where the weak points are in your project.
- Legislative process for dividing land into zones for the citizens.
- Shooter, A person attempting to kill people in a confined space with a fire arm
- Being ready to respond anytime.
- alert, Child goes missing.
- Assessment, Analyzing the possible issues that could negatively impact a project.
20 Clues: alert, Child goes missing. • A serious injury to a body. • Destroying property with fire • Being ready to respond anytime. • Alert, Old person goes missing. • Helping someone who is in cardiac arrest • Health, The science of protecting a communities health. • The continuous observation of a place, person, or group. • ...
Week 1 Crossword Puzzle 2022-01-13
Across
- alternative access to a system for malware, sometimes an entry point by someone who leaves a company, or used to re-establish a connection
- A data handling regulation only found in CANADA
- The 'A' in the CIA Triade
- Vulnerability + Threat =
- A script _______ is also known as a green hat hacker or someone who is new to programming little experience
- Using a voice channel to conduct phishing
- Organization that publishes cybersecurity frameworks
- Psychological control discouraging an attack
- A regulation applicable to Europe
- A control such as a gateway or fence
Down
- information that we may have received can be absolutely attributed to somebody. There’s no way that they can take it back.
- The 'C' in the CIA Triade
- fancy word for information gathering, can be active or passive
- "hacking the human"
- Acronym for a military/state or crime syndicates with lot of resources to attack
- provides a common basis for the coordination of standards development for the purpose of systems interconnection
- Hacker with a political agenda
- Can be polymorphic and is usually memory resident
- Acronym for information that is freely available for information gathering
- The 'I' in the CIA Triade
20 Clues: "hacking the human" • Vulnerability + Threat = • The 'C' in the CIA Triade • The 'A' in the CIA Triade • The 'I' in the CIA Triade • Hacker with a political agenda • A regulation applicable to Europe • A control such as a gateway or fence • Using a voice channel to conduct phishing • Psychological control discouraging an attack • A data handling regulation only found in CANADA • ...
John and Lushi 2025-02-22
Across
- Their dream honeymoon escape
- John’s favorite ice cream flavor
- Lushi's mom's employer
- Lushi's favorite alcoholic beverage
- John’s alma mater
- Lushi’s birthplace
- The month their love story began
- Lushi’s ultimate dessert indulgence
- Lushi’s favorite cozy season
- Lushi’s favorite holiday
- John’s ultimate comfort food
- Lushi’s favorite color
- Lushi’s board game obsession
- Lushi’s favorite snack to craft
- Total countries they’ve explored together
- John’s middle name
- Where John popped the big question
- How John takes his coffee
- Their first international adventure
- John’s go-to beverage
- The SpaceX program Lushi works on
Down
- The color of John’s eyes
- John’s favorite golf trip destination
- John’s work industry
- Where their first date kicked off
- The month they got engaged
- The city where their paths first crossed
- John’s most-played video game
- Their age difference
- Lushi’s top cuisine pick
- John’s hometown roots
- The city they call home
- John’s all-time favorite band
- Lushi’s favorite hobby
- Gatsby’s breed
- Their beloved corgi’s name
- Their favorite sport to play together
- The number of furry family members
38 Clues: Gatsby’s breed • John’s alma mater • Lushi’s birthplace • John’s middle name • John’s work industry • Their age difference • John’s hometown roots • John’s go-to beverage • Lushi's mom's employer • Lushi’s favorite color • Lushi’s favorite hobby • The city they call home • The color of John’s eyes • Lushi’s top cuisine pick • Lushi’s favorite holiday • How John takes his coffee • ...
dampak sosial informatika 2025-01-21
Across
- peranti kecil (perangkat keras) yang menghasilkan kode untuk akses ke jaringan
- alat keamanan yang sangat berharga untuk pengamanan data pada komunikasi data di jaringan komputer
- kata data dalam bahasa latin
- perangkat lunak tambalan karena bug
- Malware yang mampu mengenkripsi beberapa atau semua file di komputer di sebut
- program komputer yang dapat menyalin dirinya sendiri ke komputer lain adalah
- perangkat lunak yang mampu untuk mendapatkan akses ke suatu sistem komputer atau peranti
- tindakan mencuri identitas digital orang lain
- apa yang dimaksud gerakan hacktivist yang menyerang dunia Maya
- apakah yang disebut dengan akronim robot dan network
Down
- data kecil pencatatan aktivitas di peramban
- orang untuk mengeluarkan informasi atau melakukan tugas yang melanggar protokol keamanan
- apakah istilah dari keamanan informasi di internet
- Malware yang dapat memantau dan merekam aktivitas pengguna di komputer atau perangkat seluler di sebut
- usaha untuk memikat pengguna internet untuk masuk ke situs web palsu adalah
- tindakan tidak bertanggung jawab dan merusak yang dilakukan oleh penjahat disebut
- perangkat lunak yang menempel pada perangkat lunak lain
- apa yang menjadi celah keamanan informasi
- penyebaran informasi palsu
- Malware yang tampak seperti aplikasi perangkat lunak jinak
20 Clues: penyebaran informasi palsu • kata data dalam bahasa latin • perangkat lunak tambalan karena bug • apa yang menjadi celah keamanan informasi • data kecil pencatatan aktivitas di peramban • tindakan mencuri identitas digital orang lain • apakah istilah dari keamanan informasi di internet • apakah yang disebut dengan akronim robot dan network • ...
Christian’s Crossword Puzzle 2025-07-02
Across
- Naive glutton
- “Never again”
- Obscure (and peak) DLC member who came out as gay
- “Careful with the door”
- The university where a certain long-haired blonde man plans to attend this coming spring.
- Christian’s favorite drink
- What Caleb has particularly terrible luck in
- Frequenly demands others to “Hop on the game”
- Caleb’s and Carter’s “fatal flaw” when at hangouts
- A musical, three-thousand dollar item that went missing last summer. Pushed a certain someone into employment.
- The name of a friendly, helpful, talking horse in easily the biggest Discord game sucessfully ran.
- Haris’s word to circumvent a slur, also shows up in a philosopical question of his.
Down
- Studied at Anderson University for nursing
- What Matthew is studying at Tri-County
- What Diego claims he will be his whole life
- “________ Crossing” ; Name of the apartment complex Matthew once lived in.
- Chronically late
- OG name of the group
- Haris’s new kingdom
- Nintendo fan
- *Massive* popular streamer and Noah’s role model
- Contentious “DLC” character who might as well be dating a core member of the group.
- Game played when drinking coffee in downtown
23 Clues: Nintendo fan • Naive glutton • “Never again” • Chronically late • Haris’s new kingdom • OG name of the group • “Careful with the door” • Christian’s favorite drink • What Matthew is studying at Tri-County • Studied at Anderson University for nursing • What Diego claims he will be his whole life • What Caleb has particularly terrible luck in • ...
Industrial security 2025-10-15
Across
- – A prepared procedure to handle emergencies or disasters.
- – Security measure restricting movement due to threats.
- – A potential cause of unwanted incident or harm.
- – A person employed to protect property and personnel.
- – A badge used for identification and access within a facility.
- – A designated safe route used during an evacuation.
- – A set of rules and guidelines for security operations.
- – Continuous observation of people or areas for security purposes.
- – The routine inspection of areas to ensure safety and security.
- – The act of keeping people and assets safe from harm.
- – Unauthorized entry into a restricted area.
- – A system that uses video cameras to monitor and record activities.
- – A system that restricts entry to authorized personnel only.
Down
- – Written documentation of a security event or breach.
- – The process of identifying and evaluating potential hazards.
- – The deliberate destruction or disruption of industrial operations.
- – The act of stealing small quantities or low-value items from the workplace.
- – Protection of computer systems from digital attacks.
- – A weakness that can be exploited by threats.
- – Device that signals when unauthorized access occurs.
20 Clues: – Unauthorized entry into a restricted area. • – A weakness that can be exploited by threats. • – A potential cause of unwanted incident or harm. • – A designated safe route used during an evacuation. • – Written documentation of a security event or breach. • – A person employed to protect property and personnel. • ...
August Newsletter Crossword 2024-07-30
Across
- Systems Engineering is updating JIRA, JAMA, and Plan0View Projects for what purpose?
- To meet the IT Team, please visit them where?
- What is the last name of the 4th person in the first column of the August Birthdays?
- Who is the AP Team working with to complete network laydown?
- What kind of safety concern is the result of debris puncturing a tire?
Down
- How much money can you earn by participating in Healthyroads JT4 Wellness Incentive Program? (Spelled Out)
- Who is the newest hire on our JT4 security team?
- Upon publication, new PMIs should be coordinated with whom?
- The 11DOS JT4 Team is helping the 11DOS by lending our expertise in what kind of planning?
- Who is the first TROC RCO?
- The 11th Annual Golf Tournament is what kind of start?
- Which employee just finished HARRIER maintenance training?
12 Clues: Who is the first TROC RCO? • To meet the IT Team, please visit them where? • Who is the newest hire on our JT4 security team? • The 11th Annual Golf Tournament is what kind of start? • Which employee just finished HARRIER maintenance training? • Upon publication, new PMIs should be coordinated with whom? • Who is the AP Team working with to complete network laydown? • ...
Cyber Awareness 2025-11-06
Across
- A virtual private network to access remote services securely
- A cyber attack that floods a network or server with excessive traffic to make it unavailable.
- A digital or physical device used to authenticate a user, often as a second factor.
- A hidden way into a system that bypasses normal authentication.
- Fake security alerts that trick users into installing malware or paying money.
- The practice of accessing a computer network illegally.
- A program that performs automated tasks, and can be controlled remotely and malicious
Down
- A secret combination of characters used to verify a user’s identity.
- A targeted form of phishing
- A security model that assumes no user or system is inherently trusted.
- Self-replicating malware that spreads across networks without user action.
- The practice of protecting computers, networks, and data from digital attacks or unauthorised access.
12 Clues: A targeted form of phishing • The practice of accessing a computer network illegally. • A virtual private network to access remote services securely • A hidden way into a system that bypasses normal authentication. • A secret combination of characters used to verify a user’s identity. • A security model that assumes no user or system is inherently trusted. • ...
technology 2023-06-07
Across
- is a file format developed by Adobe in 1992 to present documents
- is a method of representing data in a visual, machine-readable form
- is a type of computer program that, when executed, replicates itself by modifying other computer programs
- are small blocks of data created by a web serve
- is any software intentionally designed to cause disruption to a computer
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain
- is a bitmap image format that was developed by a team at the online services provider
- is a form of computer memory that can be read and changed in any order
- is a commonly used method of lossy compression for digital images
- is a mobile operating system.
Down
- is an American multinational technology company
- is a hardware or software component that stores data
- is a hardware or software component that stores data
- is a collection of discrete values that convey information
- represents text, computer processor instructions
- is the protection of computer systems and networks
- is a coding format for digital audio
- is a method of transmitting and receiving messages using electronic devices
- is a proprietary audio/video interface for transmitting uncompressed video data
20 Clues: is a mapping from some domain • is a mobile operating system. • is a coding format for digital audio • is an American multinational technology company • are small blocks of data created by a web serve • represents text, computer processor instructions • is the protection of computer systems and networks • is a hardware or software component that stores data • ...
Cyber & Digital Safety 2024-11-10
Across
- Australian agency providing tools and support for staying safe online.
- Settings that help control who can view your information online.
- An online trick designed to steal money or personal information.
- Notifying a trusted adult or platform about inappropriate content or behaviour.
- An extra layer of security for protecting online accounts.
- When someone uses your personal information to impersonate you.
- Capturing an image of your screen, sometimes used to save evidence.
- A counseling service providing support for kids in need of help.
- Pretending to be someone else online to deceive or manipulate others.
- Measures to protect devices and networks from digital threats.
Down
- Bullying or harassment that takes place online or through digital devices.
- The trail of data you leave online, like posts and searches.
- When someone builds trust with a minor online to exploit or harm them.
- The sharing of someone's private images without consent.
- Websites that are reliable and safe for information or purchases.
- Treating others well online and avoiding hurtful actions.
- False information spread online, often by mistake.
- The amount of time spent on devices with screens, like phones or tablets.
- Someone who supports others positively online, especially against bullying.
19 Clues: False information spread online, often by mistake. • The sharing of someone's private images without consent. • Treating others well online and avoiding hurtful actions. • An extra layer of security for protecting online accounts. • The trail of data you leave online, like posts and searches. • Measures to protect devices and networks from digital threats. • ...
Tan Su Kyi - 8 Gamma 2023-01-19
Across
- An app where you use to communicate and call with your friend.
- We should _________ our password once a year.
- You have the _________ to find out what information the government & other organisations store about you.
Down
- It is a practice of protecting systems, networks & programs from digital attacks.
- Created when that data has been processed and become meaningful.
- A social media app that you can connect with friends, family and other people you know.
- Any company might hold your ________ information that you have in your account.
7 Clues: We should _________ our password once a year. • An app where you use to communicate and call with your friend. • Created when that data has been processed and become meaningful. • Any company might hold your ________ information that you have in your account. • It is a practice of protecting systems, networks & programs from digital attacks. • ...
Incident Response 2018-10-03
Across
- A _ _ _ _ _ _ is a copy of an electronic record, maintained to protect the information from loss and often compressed to
- An Internet scam that targets unsuspecting users through email
- space.
- A cybersecurity _ _ _ _ _ _ _ _ is considered to be any event that threatens the confidentiality, integrity or availability of an
Down
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- information resources.
- If you receive a suspicious email, the best thing to do is to _ _ _ _ _ _ the message
7 Clues: space. • information resources. • An Internet scam that targets unsuspecting users through email • If you receive a suspicious email, the best thing to do is to _ _ _ _ _ _ the message • A type of malware designed to block access to a computer system or data until a sum of money is paid • ...
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- a method, often secret, of bypassing normal authentication in a product.
- any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- an attempt by hackers to damage or destroy a computer network or system.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- are small files that Web sites put on your computer hard disk drive when you first visit.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
19 Clues: designed to detect and destroy computer viruses. • a method, often secret, of bypassing normal authentication in a product. • an attempt by hackers to damage or destroy a computer network or system. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Artificial intelligence crossword 2024-04-23
Across
- number of informed search method in AI
- component of artificial intelligence
- AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis.
Down
- _____ is the ability to learn and solve problems. This definition is taken from webster’s Dictionary.
- _____ test is used to determine whether or not a computer can think intelligently like humans
5 Clues: component of artificial intelligence • number of informed search method in AI • _____ test is used to determine whether or not a computer can think intelligently like humans • _____ is the ability to learn and solve problems. This definition is taken from webster’s Dictionary. • ...
Blue Frontier Crossword 2025-12-02
Across
- The practice of turning data trails into strategic truths.
- The technical foundations clients never see - until something breaks.
Down
- Where ideas become digital realities, one line at a time.
- The invisible shield guarding systems you hope never gets tested.
- The art of shaping how a business is recognised before a word is spoken.
5 Clues: Where ideas become digital realities, one line at a time. • The practice of turning data trails into strategic truths. • The invisible shield guarding systems you hope never gets tested. • The technical foundations clients never see - until something breaks. • The art of shaping how a business is recognised before a word is spoken.
Teka Teki Cyber Security 2023-10-22
Across
- Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu
- Jenis ancaman cyber yang paling sering ditemui yaitu
- Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle.
Down
- Serangkaian tindakan yang dilakukan untuk melindungi sistem komputer, jaringan, dan data dari serangan akses ilegal disebut
- Malware yg secara diam - diam merekam apa yg dilakukan pengguna, sehingga penjahat dunia maya dapat menggunkan informasinya disebut
- Selalu update _______________ untuk mengatasi ancaman cyber.
- Program yang mereplikasi diri, menempel pada file bersih dan menyebar ke seluruh sistem komputer
- Jika memperoleh email yang seolah - olah berasal dari perusahaan sah dan meminta informasi pribadi, maka itu termasuk jenis ____
8 Clues: Jenis ancaman cyber yang paling sering ditemui yaitu • Selalu update _______________ untuk mengatasi ancaman cyber. • Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu • Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle. • ...
CyF Chapter 8 2023-10-20
Across
- services hosted by a cloud provider, service provider, or internet provider.
- all of the services used by an organization including HVAC, water, and fire detection.
- collection of devices interconnected using cables or airwaves.
- the little voice in the background guiding a cybersecurity specialist as to what he/she should or should not do, regardless of whether it is legal.
Down
- any desktop computer, laptop, tablet, or smartphone that connects to the network.
- all of the critical systems, applications, and data.
- law prohibit undesired behaviors.
- includes the users who access the organization's information system.
8 Clues: law prohibit undesired behaviors. • all of the critical systems, applications, and data. • collection of devices interconnected using cables or airwaves. • includes the users who access the organization's information system. • services hosted by a cloud provider, service provider, or internet provider. • ...
The Identity Crossword 2022-01-28
Across
- A country which is placing facial recognition technology in lamp posts.
- Face recognition, fingerprints, DNA are classified as an individuals?
- In 2018/19 _____ crime and misuse cost the Australian economy an estimated $3.1 billion.
- We need to ensure we maintain an individuals _____ when dealing with their biometrics.
- A company who recently breached the privacy act for misusing individuals biometrics without consent.
- If we do not act now to regulate biometric use, companies may further _____ this technology.
Down
- We need to ensure that we are _____ when making decisions when using biometrics.
- Digital Identity name of Denmark.
- We want biometrics to be used?
- The application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
10 Clues: We want biometrics to be used? • Digital Identity name of Denmark. • Face recognition, fingerprints, DNA are classified as an individuals? • A country which is placing facial recognition technology in lamp posts. • We need to ensure that we are _____ when making decisions when using biometrics. • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 1 2022-10-06
Across
- what is the weakest link in cybersecurity?
- ___ was the first personal computer virus?
- A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- Necessary when the circumstances of an incident require more details
- Our company may _________ your internet usage
Down
- is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- What is the best way to maintain privacy between two parties?
- When someone sends an e-mail with a link a bogus website is called
- This horse can stampede your security defence for the bad guy and make you look sheepish too!
- What type of calls are made by social engineers
10 Clues: what is the weakest link in cybersecurity? • ___ was the first personal computer virus? • Our company may _________ your internet usage • What type of calls are made by social engineers • What is the best way to maintain privacy between two parties? • When someone sends an e-mail with a link a bogus website is called • ...
Ida's Cybersecurity Crossword 2021-02-12
Across
- your files become encrypted.
- gathers information on a person and how they use their computer.
- infects your computer through email spam or instant text messages.
Down
- whether you are online or offline, it will display pop-ups or ads.
- appears as a useful or fun application (like a new game) where the hacker can use the game to perform malicious actions on your computer.
- needs to be downloaded as a part of another file to infect your computer.
- used to verify who is entering the account and is used to secure your account from hackers.
7 Clues: your files become encrypted. • gathers information on a person and how they use their computer. • whether you are online or offline, it will display pop-ups or ads. • infects your computer through email spam or instant text messages. • needs to be downloaded as a part of another file to infect your computer. • ...
Cybersecurity Crossword Puzzle 2024-09-07
Across
- Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
- Type of software that secretly gathers information from a user's computer without their consent.
- Simulated attack on a system to test its security defenses, often referred to as "pen testing."
- Network security device that monitors and filters incoming and outgoing traffic based on predefined rules.
Down
- Process of converting information into a secret code to prevent unauthorized access.
- Software vulnerability unknown to the software maker, leaving it open for attack until patched.
- Deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity, often through email.
7 Clues: Process of converting information into a secret code to prevent unauthorized access. • Malicious software designed to harm, exploit, or otherwise compromise a computer or network. • Software vulnerability unknown to the software maker, leaving it open for attack until patched. • ...
Workplace Readiness Crossword (Computer Solution) 2024-09-10
Across
- includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network;
- a particular method of reasoning or argumentation
- a systematic series of actions directed to some end
- presence; the act of attending
- a belief in work as a moral good
- pretending to be someone you trust or a system you work with
- the skill of making a determination, as to a problem, or doubt, by making a judgement
- examine and judge carefully
Down
- the protection of information systems against unauthorized access (e.g., hacking, identity theft).
- a process of reasoning or a series of reasons
- the act of motivating
- malware that spreads by users from an infected device to the rest of the devices on a network/system
- book, article, person, or other resource consulted for information
- believable; reliable
- data converted into a meaningful and useful context
- the unethical distribution of mass digital messages.
- prompt; on-time
17 Clues: prompt; on-time • believable; reliable • the act of motivating • examine and judge carefully • presence; the act of attending • a belief in work as a moral good • a process of reasoning or a series of reasons • a particular method of reasoning or argumentation • a systematic series of actions directed to some end • data converted into a meaningful and useful context • ...
Love of Learning Crossword! 2025-11-05
Across
- The scientific study of crime and criminal behavior.
- The profession of reporting, writing, and editing news.
- The study of ancient Greek and Roman literature, language, and culture.
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The study of religious belief and the nature of the divine.
- The study of human history through excavation and artifacts.
- The application of science and math to design and build structures, machines, and systems.
- The study of human societies, cultures, and their development.
Down
- The field involving the design, construction, and use of machines that can act autonomously.
- The practice of protecting computers, networks, and data from attacks.
- The art and science of designing and constructing buildings.
- The study of society and human relationships within it.
- The process of recording, summarizing, and analyzing financial transactions.
- The branch of biology dealing with organisms and their environments.
- The scientific study of language and its structure.
- The study of how societies use resources and respond to scarcity.
- The science of Earth’s physical structure, history, and processes.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
Love of Learning Crossword! 2025-11-05
Across
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The art and science of designing and constructing buildings.
- The study of how societies use resources and respond to scarcity.
- The study of religious belief and the nature of the divine.
- The study of ancient Greek and Roman literature, language, and culture.
- The scientific study of crime and criminal behavior.
- The study of society and human relationships within it.
- The application of science and math to design and build structures, machines, and systems.
- The branch of biology dealing with organisms and their environments.
Down
- The study of human societies, cultures, and their development.
- The profession of reporting, writing, and editing news.
- The scientific study of language and its structure.
- The field involving the design, construction, and use of machines that can act autonomously.
- The process of recording, summarizing, and analyzing financial transactions.
- The science of Earth’s physical structure, history, and processes.
- The practice of protecting computers, networks, and data from attacks.
- The study of human history through excavation and artefacts.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
Jaringan komputer dan internet (stefani) 2024-01-13
Across
- pada jaringan memudahkan proses hubungan antarkomputer, sehingga informasi yang disalurkan bisa diakses dengan baik
- perangkat komputasi yang saling terhubung serta dapat bertukar data dan berbagi sumber daya satu sama lain
- metodologi yang memastikan agar data berada dalam kondisi yang tepat untuk mendukung inisiatif dan operasi bisnis
- metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya
Down
- termasuk salah satu dari aspek teknis jaringan komputer
- merupakan sebuah praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- salah satu tipe jaringan komputer yang paling umum ditemukan
- jaringan komputer yang andal juga bergantung pada kualitas data yang tersedia
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
- layer yang bertanggung jawab mempersiapkan data agar digunakan program tertentu
10 Clues: termasuk salah satu dari aspek teknis jaringan komputer • salah satu tipe jaringan komputer yang paling umum ditemukan • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • jaringan komputer yang andal juga bergantung pada kualitas data yang tersedia • layer yang bertanggung jawab mempersiapkan data agar digunakan program tertentu • ...
sif 2024-04-11
Across
- A distributed database that maintains a continuously growing list of ordered record called blocks
- Communication over a distance by cable, telegraph, telephone, or broadcasting
- The science of making machines that can think like humans
- The act of bringing together smaller components are information stored in different subsystems into a single functional unit
Down
- A set of commands that must be followed for a computer to perform calculations
- The practice of protecting systems, networks and programs from digital attacks
- To convert something to a computer generated simulation of reality
- computing The delivery of hosted computing services and IT resources over the internet
- A new idea, method or device
- A security method that scrambles data so it is only read by using a key
10 Clues: A new idea, method or device • The science of making machines that can think like humans • To convert something to a computer generated simulation of reality • A security method that scrambles data so it is only read by using a key • Communication over a distance by cable, telegraph, telephone, or broadcasting • ...
technology and innovation vocabulary for IELTS (3) www.atomicielts.com 2024-09-01
Across
- to go -----; spreading quickly and widely on the internet (5)
- -------; extremely large sets of information that are analysed to find trends or patterns (3,4)
- cybersecurity is protecting --------- and data from theft or damage (9)
- data ----------; converting data into a code to keep it secure (10)
- ---- interface (UI); how a person interacts with a computer or device (4)
- a digital service or website that supports interactions or activities (8)
Down
- ----- computing; using the internet to store and access data and programs (5)
- websites or apps where people share content and communicate (5,5)
- internet of ------ (IoT); a network of devices connected to the internet that can communicate with each other (6)
- ------- creation; making digital material, like videos or articles, to share online (7)
10 Clues: to go -----; spreading quickly and widely on the internet (5) • websites or apps where people share content and communicate (5,5) • data ----------; converting data into a code to keep it secure (10) • cybersecurity is protecting --------- and data from theft or damage (9) • ---- interface (UI); how a person interacts with a computer or device (4) • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
CSE 167 2022-11-16
Across
- copies of data that can be used to replace the original
- is a method of gaining unauthorized access to a network or computer system
- The use of multiple layers of security techniques to help rescue the chance of successful attacks
- in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
- allows you to encrypt and sign your data and communications
- An attack that tricks people in believing they are someone else
- Confidentiality,Integrity,Availability
- Study of techniques for secure communication in the presenter of third parties
- Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
- attack that involves trying all possible private keys
10 Clues: Confidentiality,Integrity,Availability • attack that involves trying all possible private keys • copies of data that can be used to replace the original • allows you to encrypt and sign your data and communications • An attack that tricks people in believing they are someone else • is a method of gaining unauthorized access to a network or computer system • ...
test 2023-10-08
Across
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
Down
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Pertaining to the security challenges and measures for smartphones and tablets.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
COMPUTER SCIENCE 2022-12-13
Across
- string of commands or directions used by different programming languages
- is the hardware component used to store data that is actively being used by a processor
- an area of computer science that is concerned with the intersection of social behavior and computational systems.
- maximum rate of data transfer across a given path.
Down
- is the process of protecting data from unauthorized users or hackers.
- The other Components of HCI for System Functionality aside from Hardware and Software
- simply specific procedures used to solve computational problems.
- computer program that transforms computer code written in one programming language (the source language) into another programming language
- a programming error that causes unexpected glitches or problems for a program’s end user.
- an abbreviation for “binary digit,”
10 Clues: an abbreviation for “binary digit,” • maximum rate of data transfer across a given path. • simply specific procedures used to solve computational problems. • is the process of protecting data from unauthorized users or hackers. • string of commands or directions used by different programming languages • ...
