cybersecurity Crossword Puzzles

Business Online 2025-11-26

Business Online crossword puzzle
Across
  1. — A business’s capacity to grow its online operations smoothly as demand rises.
  2. — Rules that explain how customers can return goods and get refunds.
  3. — Initial expenses required to build and launch an online business.
  4. — The threat of scams, identity theft or dishonest transactions in online trading.
  5. — A website type that processes payments and completes sales online.
  6. — Online platforms that host many sellers (e.g., Amazon, Etsy).
  7. — The activity of buying and selling goods or services over the internet.
  8. — A customer benefit of online shopping: easy access and 24/7 availability.
  9. — Using software or technology to perform repetitive tasks without human input.
Down
  1. — Platforms used for marketing, customer engagement and brand awareness.
  2. — The planning and management of storage, transport and delivery of goods.
  3. — Simple informational websites that showcase a business and its services.
  4. — Other businesses offering similar products or services in the same market.
  5. — The ability of an online business to access customers worldwide.
  6. — Measures and practices used to protect systems and customer data online.

15 Clues: — Online platforms that host many sellers (e.g., Amazon, Etsy).— The ability of an online business to access customers worldwide.— Initial expenses required to build and launch an online business.— Rules that explain how customers can return goods and get refunds.— A website type that processes payments and completes sales online....

International security 14 (KCNS) 2022-01-08

International security 14 (KCNS) crossword puzzle
Across
  1. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. It is the process of validating a cryptocurrency transaction.
  3. The programs and other operating information used by a computer.
Down
  1. Using, requiring, or involved in high technology or short for high technology.
  2. Criminal activities carried out by means of computers or the internet.
  3. An arrangement of intersecting horizontal and vertical lines.
  4. The state of being connected or interconnected.
  5. A legal or other formal measure intended to preserve civil liberties and rights .
  6. A cryptocurrency, a virtual currency or a digital currency.
  7. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: The state of being connected or interconnected.A cryptocurrency, a virtual currency or a digital currency.An arrangement of intersecting horizontal and vertical lines.It is the process of validating a cryptocurrency transaction.The programs and other operating information used by a computer....

International security 14 (KCNS) 2022-01-08

International security 14 (KCNS) crossword puzzle
Across
  1. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. It is the process of validating a cryptocurrency transaction.
  3. The programs and other operating information used by a computer.
Down
  1. Using, requiring, or involved in high technology or short for high technology.
  2. Criminal activities carried out by means of computers or the internet.
  3. An arrangement of intersecting horizontal and vertical lines.
  4. The state of being connected or interconnected.
  5. A legal or other formal measure intended to preserve civil liberties and rights .
  6. A cryptocurrency, a virtual currency or a digital currency.
  7. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: The state of being connected or interconnected.A cryptocurrency, a virtual currency or a digital currency.An arrangement of intersecting horizontal and vertical lines.It is the process of validating a cryptocurrency transaction.The programs and other operating information used by a computer....

G.A.B.I 2023-09-13

G.A.B.I crossword puzzle
Across
  1. kegiatan p5 dalam membahas mengenai pentingnya demolrasi adalah pembuatan
  2. Dalam kegiatan keyakinan kelas,siswa dapat memberikan pendapatnya,karena salah satu poin p5 adalah Berpendapat
  3. bapak Demokrasi Indonesia
  4. kurikulum yang lebih menegaskan demokrasi dalam menyelesaikan tugas tugas yang menuntut kebersamaan disebut
  5. salah satu poin penting dalam pelaksanaan demokrasi adalah. Yang lancar
  6. seminar bersama ko Robertus wijaya membahas pentingnya peran gen muda dalam
Down
  1. kegiatan p5 yang melakukan kegiatan berdiskusi untuk membahas nilai pancasila yang berada di dalam kelas dan sebagai pelanutan kelas
  2. Dalam p5 siswa diharpkan dapat dalam demokrasi
  3. salah satu tugas dalam nenjaga sistem pemerintahan disebut
  4. salah satu kegiatan memberikan suara untuk memilih pemimpin di sekolah adalah satu prinsip demokrasi terdapat pada sila

10 Clues: bapak Demokrasi IndonesiaDalam p5 siswa diharpkan dapat dalam demokrasisalah satu tugas dalam nenjaga sistem pemerintahan disebutkegiatan p5 dalam membahas mengenai pentingnya demolrasi adalah pembuatansalah satu poin penting dalam pelaksanaan demokrasi adalah. Yang lancar...

Cyber Security 2024-03-26

Cyber Security crossword puzzle
Across
  1. A piece of software designed to update or fix vulnerabilities in a computer program.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  4. Software designed to harm or gain unauthorized access to a computer system.
  5. A secret combination of characters used to gain access to a system.
Down
  1. A network security system that monitors and controls incoming and outgoing network traffic.
  2. Software designed to detect and remove malicious software.
  3. Software that secretly gathers information about a person or organization.
  4. A type of malware disguised as legitimate software.
  5. The process of converting information into a code to prevent unauthorized access.

10 Clues: A type of malware disguised as legitimate software.Software designed to detect and remove malicious software.A secret combination of characters used to gain access to a system.Software that secretly gathers information about a person or organization.Software designed to harm or gain unauthorized access to a computer system....

iWOWriors Onboarding Quiz 1 2024-02-20

iWOWriors Onboarding Quiz 1 crossword puzzle
Across
  1. A campaign that shares the potential IT Security Risks and how to overcome them.
  2. What is needed to be done before disposing of paper documents?
  3. ____ Setting is the first milestone in Performance Appraisal Form Roadmap
  4. ____ Golden Rules for Cybersecurity.
Down
  1. ____ & Security is one of the key functions of UITS and IT.
  2. The two sections in Performance Management System are 1. Performance and 2. ____
  3. One function of Group Strategy to the UMW Group.
  4. Under Group Strategy, Unit Strategy ____ will analyse and assess industry trends and market outlook.
  5. _____ Employees are those from the Supervisory Level until Executive Vide President II.
  6. The special leave due to the death of near relative, hospitalisation of immediate family or natural disaster.

10 Clues: ____ Golden Rules for Cybersecurity.One function of Group Strategy to the UMW Group.____ & Security is one of the key functions of UITS and IT.What is needed to be done before disposing of paper documents?____ Setting is the first milestone in Performance Appraisal Form Roadmap...

Big Data 2025-02-19

Big Data crossword puzzle
Across
  1. The speed at which data is generated and processed in real-time.
  2. Protecting digital data from threats, breaches, and unauthorized access.
  3. The different types of data formats, including structured, unstructured, and semi-structured data.
  4. Large-scale datasets that require advanced techniques for storage, processing, and analysis.
Down
  1. The process of examining data to uncover patterns, correlations, and insights.
  2. The immense amount of data generated from various sources in Big Data.
  3. The quality and accuracy of data, ensuring it is reliable and not misleading.
  4. A network of connected devices that collect and share data.
  5. Enables machines to analyze data and make decisions.
  6. The importance of data in providing insights and supporting decision-making.

10 Clues: Enables machines to analyze data and make decisions.A network of connected devices that collect and share data.The speed at which data is generated and processed in real-time.The immense amount of data generated from various sources in Big Data.Protecting digital data from threats, breaches, and unauthorized access....

Women in STEM Trivia 2018-03-02

Women in STEM Trivia crossword puzzle
Across
  1. Last name of the first female CEO for Duke Energy
  2. Phebe Novakovic worked for this branch of the government
  3. This is the nation's largest utility company
  4. Sempra Energy is based in this city
  5. Popular acronym for fields related to math, science, technology, and engineering
  6. Nobel Prize equivalent of Computer Science
  7. Last name of CEO for IBM
  8. Adriana Karaboutis holds this position at National Grid
  9. Women make up 22% of this specific engineering field
Down
  1. General Dynamics is this kind of federal contractor
  2. Marissa Mayer was given this many job offers after graduating from Stanford University
  3. Marissa Mayer is the CEO of this major company
  4. Novakovic pushed General Dynamics into the direction of this type of security
  5. Brittany Wenger was this age when she designed her Artificial Brain to help detect breast cancer
  6. The name of the computer that IBM created
  7. Rometty has degrees in both computer science and this type of engineering
  8. First company Marissa Mayer chose to work for
  9. First word of the abbreviated company title PG&E
  10. This natural vegetation supplied a useful chemical for Ellen Kendall's water filter
  11. Company that worked with wearable technology to help patients and health-care providers

20 Clues: Last name of CEO for IBMSempra Energy is based in this cityThe name of the computer that IBM createdNobel Prize equivalent of Computer ScienceThis is the nation's largest utility companyFirst company Marissa Mayer chose to work forMarissa Mayer is the CEO of this major companyFirst word of the abbreviated company title PG&E...

Unit 5 and 10 Vocab 2023-09-02

Unit 5 and 10 Vocab crossword puzzle
Across
  1. Whether somthing is appropriate morally
  2. How trustworthy an individual is
  3. Too much
  4. To have or show a good judgement of something
  5. "Not supported or proven by evidence"
  6. Computing services on the internet
  7. "The use of largely automatic equipment in a system of manufacturing or other production process"
  8. A process or set of rules for computer to do somethng
  9. Making inappropriate materials not crearly visible
Down
  1. "Adaptation of a system, process, etc. to be operated with the use of computers and the internet"
  2. To prove an individual with teir physical characteristic
  3. "A tendency to be too ready to believe that something is real or true"
  4. Not being "observed" by people that the individual did't allow to
  5. "rapid increase in numbers"
  6. New things that have never been created before
  7. The scurity of technological devices, software and information online
  8. How responsible an individual is
  9. Using an exaggerated wordign to attract public's interest; often lead to inaccuracy of information
  10. To rely on something
  11. To have a strong attraction for technology espeacially new technologies
  12. "honest and having strong moral principles; moral uprightness"
  13. Giving or understanding a wrong information
  14. Fake

23 Clues: FakeToo muchTo rely on something"rapid increase in numbers"How trustworthy an individual isHow responsible an individual isComputing services on the internet"Not supported or proven by evidence"Whether somthing is appropriate morallyGiving or understanding a wrong informationTo have or show a good judgement of something...

Electricity 2023-05-30

Electricity crossword puzzle
Across
  1. If it's high, power is high
  2. Tells us how much power we get related to voltage and resistance
  3. Stops electricity from flowing, rubber
  4. Power lines connecting power supplies to homes in a large area
  5. Electricity in one direction
  6. A path for electricity to flow
  7. Anything that makes power, like a generator or a battery
  8. Electricity in two directions, going back and forth
  9. Measures the current in a circuit
  10. Too much power at one time
  11. Happens again and again
  12. Electricity that is flowing, light is on
  13. Adjusts the power in a circuit
  14. Power from water
  15. Portable power supply, can power a remote
  16. No power or power loss
Down
  1. Protects us from electric shocks
  2. Measures the voltage in a circuit
  3. Power used by a device
  4. Allows electricity to flow, metal
  5. Power from earth's heat
  6. If it's high, power is low
  7. Online protection
  8. Transfers electricity from one circuit to another with more or less power
  9. Makes your hair stand up, gives a shock
  10. Makes power, makes electricity
  11. A place to plug in a device
  12. Measurement of electrical power

28 Clues: Power from waterOnline protectionPower used by a deviceNo power or power lossPower from earth's heatHappens again and againIf it's high, power is lowToo much power at one timeIf it's high, power is highA place to plug in a deviceElectricity in one directionA path for electricity to flowMakes power, makes electricityAdjusts the power in a circuit...

Unit 1 Concepts - Intro to Cyber 2025-01-22

Unit 1 Concepts - Intro to Cyber crossword puzzle
Across
  1. A type of malware that locks files until a ransom is paid
  2. An attack that floods a system with traffic to make it unavailable
  3. A scam where attackers impersonate a trusted entity to steal sensitive information
  4. Verifying the identity of a user or system
  5. A security system that monitors and controls network traffic
  6. A security process requiring two forms of verification to access an account
  7. A tool to store and generate secure passwords
  8. Software that secretly gathers user information without consent
Down
  1. An incident where data is altered without authorization
  2. A key used in encryption to secure communications that can be shared openly
  3. The process of converting information into a secure format to prevent unauthorized access
  4. Ensuring information is not accessed by unauthorized parties
  5. Practices designed to protect computers, networks, and data from attacks
  6. Ensuring information remains accurate and trustworthy
  7. Ensuring authorized users have access to information when needed
  8. Manipulating people to give up confidential information
  9. Harassment or bullying that occurs through digital platforms
  10. Malicious software designed to harm or exploit computers
  11. An incident where sensitive data is accessed without authorization
  12. A key used in encryption that must remain confidential

20 Clues: Verifying the identity of a user or systemA tool to store and generate secure passwordsEnsuring information remains accurate and trustworthyA key used in encryption that must remain confidentialAn incident where data is altered without authorizationManipulating people to give up confidential information...

Technology vocabulary 2023-12-15

Technology vocabulary crossword puzzle
Across
  1. a secret word used to access a computer system
  2. engine a program that searches for information on the internet
  3. a portable computer with a touchscreen
  4. a mobile phone with more features
  5. a regularly updated website or webpage on a specific topic
  6. an input device with keys used to type
  7. wireless technology that allows devices to connect
  8. malicious software that replicates and spreads causing harm
  9. a global network connecting computers
  10. to make something current or bring up to date
  11. media online platforms to connect with others
  12. real-time communication between users over the internet
Down
  1. a pointing device used to interact with a computer
  2. the physical components of a computer
  3. programs and application that run on a electronic device
  4. computer system that protect data, networks, etc.
  5. a software application used to access websites
  6. word short for the word 'application'
  7. to transfer data to your device
  8. to transfer data from the internet
  9. an electronic device that starts with a 'c'
  10. a collection of webpages available through internet
  11. to end a session on a website or computer
  12. electronic mail
  13. a unique name used to identify an individual on a computer

25 Clues: electronic mailto transfer data to your devicea mobile phone with more featuresto transfer data from the internetthe physical components of a computerword short for the word 'application'a global network connecting computersa portable computer with a touchscreenan input device with keys used to typeto end a session on a website or computer...

RU ITEC411 - Chapter 5 - Crime and Security 2025-04-21

RU ITEC411 - Chapter 5 - Crime and Security crossword puzzle
Across
  1. | Gaining unauthorized access to computer systems.
  2. Theft | Stealing someone’s personal information to impersonate them.
  3. | Malware that locks files and demands payment to unlock them.
  4. of Service | An attack that floods a system with traffic to crash it.
  5. | Malicious software that attaches itself to programs and spreads when they run.
  6. | Definition
  7. of Things | Network of physical devices connected and communicating over the Internet.
  8. | Sending fake messages to trick people into giving away private information.
  9. | Any software designed to harm or exploit systems.
Down
  1. | Phishing attacks carried out through text messages.
  2. | Using hacking for political activism or protest.
  3. | A network of infected devices controlled by hackers.
  4. | A serious security flaw in encryption software that exposed user data.
  5. | A harmful program disguised as a legitimate one.
  6. | The process of scrambling data to protect it from unauthorized access.
  7. | A hidden method to bypass security and access a system.
  8. | Redirecting users to fake websites to steal their data.
  9. | Software that secretly gathers user information without consent.
  10. Engineering | Manipulating people into revealing confidential data.
  11. | A program that spreads by copying itself without needing a host file.
  12. | A team that responds to major cybersecurity incidents.

21 Clues: | Definition| Using hacking for political activism or protest.| Gaining unauthorized access to computer systems.| A harmful program disguised as a legitimate one.| Any software designed to harm or exploit systems.| Phishing attacks carried out through text messages.| A network of infected devices controlled by hackers....

Information Technology Careers & Terms 2023-10-05

Information Technology Careers & Terms crossword puzzle
Across
  1. This career is is the creative driver responsible for bringing a game to life
  2. A professional who uses programming languages to communicate with computers and software and make them perform certain tasks
  3. A technology professional who works on, builds and creates software, websites, applications and other systems
  4. An organized collection of data stored and accessed electronically
  5. A place where people can share information and communicate from all over the world
  6. The programs and other operating information used by a computer
Down
  1. A person who writes computer programs
  2. An electronic device for storing and processing data
  3. The physical parts of a computer, such as the CPU and RAM
  4. This career protects computers from malicious attacks
  5. Two or more computers that are linked in order to share resources
  6. Sometimes called systems architects, this career studies an organization's current computer systems and procedures

12 Clues: A person who writes computer programsAn electronic device for storing and processing dataThis career protects computers from malicious attacksThe physical parts of a computer, such as the CPU and RAMThe programs and other operating information used by a computerTwo or more computers that are linked in order to share resources...

Principles of Cybersecurity Chapter 5 Vocabulary 2023-03-07

Principles of Cybersecurity Chapter 5 Vocabulary crossword puzzle
Across
  1. Voice-based phishing in which the hacker calls the user impersonating someone else
  2. Use of SMS messages as the means of reach- ing victims.
  3. Phishing attack targeting individuals with a high net worth or with high status also called whaling.
  4. Process of providing a new employee with all information he or she needs on the company, business processes, security policies, and other related material.
  5. Device with bars or other obstruction to alternately block an entryway and allow only one per- son to pass at a time.
  6. Physical access control system that uses two sets of interlocking doors the fi rst set of doors must close before the second set can be opened
  7. ee-shaped wall usually made of concrete to prevent vehicles from passing can be moved into and out of place with heavy equipment. (
  8. Phishing attack targeting specifi c indi- viduals who may not be wealthy or prominent.
  9. An entry is embedded in the victim’s local DNS cache that redirects a legitimate URL to an incorrect IP address.
  10. Document created by the owner of the network containing information on proper usage of the network and related asset
  11. Any data that can be used to pinpoint a specific person
  12. Process of closing an employee’s accounts and records when he or she leaves the company
  13. Electromagnetic signals given off by all electronic equipment
  14. Vertical cylinder permanently installed to pre- vent vehicles from passing may be retractable to either allow or deny passage
  15. Technique in which server racks are placed in rows with cold air entering the room on one side and hot air exiting the room on the other side
Down
  1. Attempting to obtain personal information through fake e-mails that appear to be real
  2. Barrier placed around wires to block electromagnetic interference from affecting the electri- cal signals in the wires
  3. System in which video cameras transmit signals to a centralized moni- toring location, but the signals are not publically broad- cast also known as video surveillance
  4. Secured room in which servers and net- working equipment are installed.
  5. Involves setting up a website that looks legitimate and credible, but is used to steal personal information entered by users
  6. Responsibilities are divided so no single individual has complete control over a process or task
  7. Facility specifi cally designed to store and manage vast quantities of data considerably larger than a server room.
  8. Specifi cation developed by the National Security Agency (NSA) that deals with methods for spying using electromagnetic radiation and methods to prevent such activities.
  9. DNS solution that cre- ates a special DNS record to verify the validity of an e-mail sende
  10. Attack in which hackers embed mali- cious code in websites often visited by specifi c individ- uals, departments, or all employees of a company
  11. An unauthorized person walking into a facility with or right behind authorized people to appear as if with them
  12. The type of fire based on the fuel that feeds the fire.

27 Clues: Use of SMS messages as the means of reach- ing victims.Any data that can be used to pinpoint a specific personThe type of fire based on the fuel that feeds the fire.Electromagnetic signals given off by all electronic equipmentSecured room in which servers and net- working equipment are installed....

25 key words that represent Cybersecurity 2023-09-07

25 key words that represent Cybersecurity crossword puzzle
Across
  1. Any technology, be it software or hardware, used to keep intruders out.
  2. Software package that performs a specific function directly for a person who is intended to use a computer system.
  3. A piece of audio or video that has been altered and changed to make it seem authentic or credible
  4. A scam where a hacker poses as a legitimate business or organization
  5. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests
  6. A set of instructions, or a system of rules, written in a particular programming language
  7. A computer program that can copy itself and infect a computer without permission
  8. A mode in the computer that stores data on servers in different locations
  9. Two or more computers connected together to share resources
  10. A method of connecting a series of computers and devices in a private encrypted network,
  11. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  12. A form of malware that hijacks your system and encrypts your files
  13. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches
  14. While someone is tricked into clicking on one object on a web page when they want to click on another,
Down
  1. A means of attack on a computer system
  2. A technique to prevent unauthorized users from accessing sensitive data
  3. Smallest unit of a digital image
  4. A set of rules governing the format of data sent via the internet or local network.
  5. The capacity a network can transfer data
  6. Allows devices to communicate with each other
  7. Coding used to protect your information from hackers.
  8. The result of a hacker successfully breaking into a system
  9. A form of malware used by hackers to spy on you and your computer activities.
  10. Any attempt to breach a logical environment's security boundary
  11. a misleading computer program that looks innocent, but in fact allows the hacker into your system

25 Clues: Smallest unit of a digital imageA means of attack on a computer systemThe capacity a network can transfer dataAllows devices to communicate with each otherCoding used to protect your information from hackers.The result of a hacker successfully breaking into a systemTwo or more computers connected together to share resources...

Module 9 Participation | Cybersecurity Crossword Puzzle 2025-03-12

Module 9 Participation | Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. - Tracks and monitors user behavior
  2. - Group of infected computers
  3. - Malware disguised as legitimate software
  4. - Verifies website's online authenticity
  5. - Fraudulent emails seeking information
  6. - Overloads servers with excessive traffic
  7. - Displays unwanted advertisements
  8. - Software designed to harm systems
  9. - Blocks unauthorized network access
  10. - Tracks every keystroke entered
Down
  1. - Hides malicious software presence
  2. - Secures data with coding
  3. - Encrypts online data and browsing
  4. - Gains unauthorized computer access
  5. - Unauthorized access to data
  6. - Locks data until payment made
  7. - Secretly gathers user information
  8. - Scans and removes harmful software
  9. - Fixes system vulnerabilities
  10. - Self-replicates to spread infection

20 Clues: - Secures data with coding- Group of infected computers- Unauthorized access to data- Fixes system vulnerabilities- Locks data until payment made- Tracks every keystroke entered- Displays unwanted advertisements- Hides malicious software presence- Tracks and monitors user behavior- Encrypts online data and browsing...

CyberSecurity Awareness 2023-09-28

CyberSecurity Awareness crossword puzzle
Across
  1. malicious software
Down
  1. state of keeping private
  2. cybercriminal disguises themselves as a trusted source
  3. takes advantage of a vulnerability
  4. act of breaking or failing

5 Clues: malicious softwarestate of keeping privateact of breaking or failingtakes advantage of a vulnerabilitycybercriminal disguises themselves as a trusted source

Cybersecurity Crossword 2024-10-30

Cybersecurity Crossword crossword puzzle
Across
  1. Hardware or software designed to prevent unauthorized access to or from a private network.
  2. National Cyber Security Awareness month is observed during _______ month
  3. Cross-layered detection and response that collects and correlates data across multiple security layers
Down
  1. Set of algorithms and architectures capable of tasks like learning, reasoning, problem-solving, perception, and language understanding.
  2. Malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: National Cyber Security Awareness month is observed during _______ monthHardware or software designed to prevent unauthorized access to or from a private network.Malicious software designed to block access to a computer system until a sum of money is paid....

Cybersecurity Principles! 2025-09-03

Cybersecurity Principles! crossword puzzle
Across
  1. Technology that copies or mimics human behavior
  2. Someone who breaks into computer systems
  3. False or misleading information shared online
Down
  1. A scam to trick people into giving personal info
  2. virus A program that spreads and harms devices

5 Clues: Someone who breaks into computer systemsFalse or misleading information shared onlineTechnology that copies or mimics human behaviorvirus A program that spreads and harms devicesA scam to trick people into giving personal info

Cybersecurity Crorssword 2025-09-30

Cybersecurity Crorssword crossword puzzle
Across
  1. The best way of staying up to date on IT news
Down
  1. IT support
  2. ID
  3. Client docs
  4. Share

5 Clues: IDShareIT supportClient docsThe best way of staying up to date on IT news

Computer Science History and Cybersecurity 2021-03-08

Computer Science History and Cybersecurity crossword puzzle
Across
  1. hashing is the foundation of this technology that has been used to implement crypto-currencies
  2. Park once the top-secret home of the World War Two Codebreakers
  3. cipher that is easily broken using brute force
  4. was the U.S. Navy's Combat Intelligence Unit, called OP–20–G
  5. designed to translate content with the intent of translating it back
  6. German cipher during WWII
Down
  1. Japanese naval code during WWII
  2. bncd (single shift cipher, decrypt for answer)
  3. one of the founders of Computer Science who worked as a code-breaker in England during WWII
  4. designed to translate content with NO intent of translating it back
  5. early computers were _________ and hot!
  6. first naval battle of WWII where code breaking played a major role
  7. both the sender and the receiver must have this for encryption to work
  8. decisive naval battle of WWII where code breaking played a major role

14 Clues: German cipher during WWIIJapanese naval code during WWIIearly computers were _________ and hot!bncd (single shift cipher, decrypt for answer)cipher that is easily broken using brute forcewas the U.S. Navy's Combat Intelligence Unit, called OP–20–GPark once the top-secret home of the World War Two Codebreakers...

National Cybersecurity Awareness Month Crossword 2018-09-21

National Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. Report suspicious emails by using the “Report to CyberSafe” _____ in the Outlook toolbar
  2. Avoid using _____ WiFi hotspots and charging station USB ports
  3. When creating a _____ , use special characters and numbers, and consider using a passphrase, or a unique set of words, to make it easier for you to remember
  4. Emails from external or non-USPS senders will automatically display [_____] in the subject line
  5. Cybersecurity is our shared _____
  6. Lock your _____ and mobile phone when not in use
  7. Don't click on _____ within emails from an unknown or untrusted source
  8. Never use your USPS _____ address for non-work purposes (e.g. social media, online shopping, listserv subscriptions)
Down
  1. Don't open or download _____ from unknown or suspicious senders
  2. If you need to charge a device, plug into an _____. Never connect your personal or work devices to USPS computers or equipment
  3. _____ over hyperlinks to reveal the destination before clicking
  4. The keyphrase #_____# can be added to the subject line of an email to encrypt the contents when sending to an external recipient
  5. When traveling abroad for personal travel, _____ bring your USPS mobile device or computer
  6. _____ is an attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity

14 Clues: Cybersecurity is our shared _____Lock your _____ and mobile phone when not in useAvoid using _____ WiFi hotspots and charging station USB portsDon't open or download _____ from unknown or suspicious senders_____ over hyperlinks to reveal the destination before clickingDon't click on _____ within emails from an unknown or untrusted source...

Cybersecurity Awareness Month Crossword Puzzle! 2024-10-08

Cybersecurity Awareness Month Crossword Puzzle! crossword puzzle
Across
  1. A secret word or phrase to access an account.
  2. Misleading content designed to get you to click on a link.
  3. A small piece of code that fixes security vulnerabilities in software.
  4. When unauthorized access is gained to a system or data.
  5. A type of malicious software that replicates and spreads on its own.
  6. Software that secretly gathers information from your device.
  7. A method of converting data into a secure format that cannot be read without a key.
  8. New software version with improvements and bug fixes.
  9. Software designed to harm or exploit your computer.
Down
  1. Software that detects and removes harmful programs from your computer.
  2. A copy of important data kept in case the original is lost or damaged.
  3. A scam to trick you into revealing personal information.
  4. A security barrier that monitors and controls incoming and outgoing network traffic.
  5. Unwanted and unsolicited emails or messages.

14 Clues: Unwanted and unsolicited emails or messages.A secret word or phrase to access an account.Software designed to harm or exploit your computer.New software version with improvements and bug fixes.When unauthorized access is gained to a system or data.A scam to trick you into revealing personal information....

IT and Tech 2023-10-03

IT and Tech crossword puzzle
Across
  1. Management Strategies and practices for attracting, developing, and retaining skilled individuals within an organization.
  2. The evaluation or appraisal of someone or something.
  3. The practice of recruiting highly skilled individuals for specialized positions.
  4. Measures taken to protect computer systems, networks, and data from cyber threats.
Down
  1. Solutions Services or strategies for finding and hiring suitable employees.
  2. The process of integrating a new employee into a company.
  3. The practice of analyzing and interpreting complex data sets to inform decision-making.

7 Clues: The evaluation or appraisal of someone or something.The process of integrating a new employee into a company.Solutions Services or strategies for finding and hiring suitable employees.The practice of recruiting highly skilled individuals for specialized positions.Measures taken to protect computer systems, networks, and data from cyber threats....

CyberSecurity Awareness 2023-09-28

CyberSecurity Awareness crossword puzzle
Across
  1. malicious software
Down
  1. state of keeping private
  2. cybercriminal disguises themselves as a trusted source
  3. takes advantage of a vulnerability
  4. act of breaking or failing

5 Clues: malicious softwarestate of keeping privateact of breaking or failingtakes advantage of a vulnerabilitycybercriminal disguises themselves as a trusted source

CyberSecurity CrossWord 2023-07-29

CyberSecurity CrossWord crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cybersecurity Principles 2023-12-14

Cybersecurity Principles crossword puzzle
Across
  1. This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.
  2. This principle is achieved through cryptographic methods which prevents a person or entity from denying having performed a particular action related to data for proof of obligation, intent, or commitment; or for proof of ownership.
Down
  1. This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required.
  2. This principle covers the assurance of data privacy. Only the intended and authorized recipients: people, processes or devices, may read the data. Disclosure to unauthorized entities, such as using unauthorized network sniffing is a confidentiality violation.
  3. This principle provides an assurance of data non-alteration. This is having assurance that the information has not been altered in transmission, from origin to reception. This principle is compromised when information is corrupted or altered, willfully or accidentally, before it is read by its intended recipient.

5 Clues: This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required....

CyberSecurity Crossword 2024-10-28

CyberSecurity Crossword crossword puzzle
Across
  1. We have to ____ over a hyperlink that's displayed in the email message
  2. Malware attack that capture all keyboard inputs
Down
  1. Malware received from emails typically encrypts files and documents on the target machines
  2. What do you call an email that looks legitimate but is actually a scam?
  3. Attackers perform ____ to clone our faces, creating videos and pictures that mimic our identity

5 Clues: Malware attack that capture all keyboard inputsWe have to ____ over a hyperlink that's displayed in the email messageWhat do you call an email that looks legitimate but is actually a scam?Malware received from emails typically encrypts files and documents on the target machines...

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paidA ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system...

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid.A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system....

Cyber Safety Basics 2025-11-02

Cyber Safety Basics crossword puzzle
Across
  1. create this using letters, numbers, and symbols
  2. protecting electronic devices, networks, and sensitive information
Down
  1. by clicking this in emails and websites can lead to malware and viruses
  2. responsibly using technology and resources available through the internet
  3. be careful when using this public access to log into your computer

5 Clues: create this using letters, numbers, and symbolsbe careful when using this public access to log into your computerprotecting electronic devices, networks, and sensitive informationby clicking this in emails and websites can lead to malware and virusesresponsibly using technology and resources available through the internet

Women's Engineering Day 2024-06-24

Women's Engineering Day crossword puzzle
Across
  1. Making sure everyone gets a seat at the table.
  2. What is AWS's managed service for creating machine learning models?
  3. A network of smart gadgets chatting and sharing secrets.
  4. Application store for IOS
  5. A jolt of creativity that sparks new ideas.
  6. The magical code that breathes life into machines.
  7. A shared and immutable ledger that facilitates the process of recording transactions and tracking assets in a business network
  8. What is the practice of deploying software updates without downtime called?
  9. What is AWS's container orchestration service?
Down
  1. What is the practice of breaking down applications into smaller, manageable services?
  2. Combining the wonders of nature with cutting-edge tech.
  3. The dream that fuels your journey to success.
  4. What is the term for a lightweight, standalone, and executable package that includes everything needed to run a piece of software?
  5. Apple's intelligent personal assistant
  6. A quest to create thinking machines that rival human wits.
  7. A kaleidoscope of different voices and perspectives.
  8. The guardians of the digital realm, defending against cyber villains.
  9. Crafting metal companions that move and think on their own.

18 Clues: Application store for IOSApple's intelligent personal assistantA jolt of creativity that sparks new ideas.The dream that fuels your journey to success.Making sure everyone gets a seat at the table.What is AWS's container orchestration service?The magical code that breathes life into machines.A kaleidoscope of different voices and perspectives....

CYB 2024-05-07

CYB crossword puzzle
Across
  1. the term used for various pop-up advertisements that show up on your computer or mobile device
  2. malware that holds a victim's data unless the victim pays a ransom to the attacker
  3. malware, that spreads between computers and causes damage to data and software
  4. malicious software that spies on the victim
Down
  1. malware that downloads onto a computer disguised as a legitimate program
  2. the practice of protecting systems, networks, and programs from digital attacks
  3. a type of malware that can automatically self-replicate without human interaction

7 Clues: malicious software that spies on the victimmalware that downloads onto a computer disguised as a legitimate programmalware, that spreads between computers and causes damage to data and softwarethe practice of protecting systems, networks, and programs from digital attacks...

Daily Vocab for Cybersecurity 2022-02-01

Daily Vocab for Cybersecurity crossword puzzle
Across
  1. Type of URL hijacking
  2. Phishing done through text messages.
  3. Voice phishing through the phone or a voicemail.
Down
  1. When you gather information on the victim.
  2. Redirection from a legit website to a bogus one.
  3. Phishing with inside information.
  4. Spearing the CEO.
  5. _________ information is extracting information from the victim.
  6. Lying to get information.
  7. Dumpster ________ is when you gather personal information from things that people have thrown out from their trash.

10 Clues: Spearing the CEO.Type of URL hijackingLying to get information.Phishing with inside information.Phishing done through text messages.When you gather information on the victim.Redirection from a legit website to a bogus one.Voice phishing through the phone or a voicemail._________ information is extracting information from the victim....

ICT Processes and Cybersecurity 2022-11-10

ICT Processes and Cybersecurity crossword puzzle
Across
  1. Makes systems access easier
  2. ERP module for logging all support tickets
  3. Verifying the identity of a user
  4. A type of social engineering
  5. Log ticket here without ERP credentials
Down
  1. Secret word or phrase
  2. Cyber security protects them
  3. Redirecting unresolved service request
  4. Type of priority of a service request
  5. Only for emergency service requests

10 Clues: Secret word or phraseMakes systems access easierCyber security protects themA type of social engineeringVerifying the identity of a userOnly for emergency service requestsType of priority of a service requestRedirecting unresolved service requestLog ticket here without ERP credentialsERP module for logging all support tickets

Cybersecurity Awareness Month Crossword! 2023-09-25

Cybersecurity Awareness Month Crossword! crossword puzzle
Across
  1. software designed to disrupt, damage or gain unauthorized access to a computer system
  2. a process to identify who should to have access to a system
  3. malicious software designed to block access to computer system until money is paid
  4. an electronic device used for processing and storing information
  5. an input device used with a computer
  6. a network security controller and monitor
Down
  1. cyberattack tactic designed to scare someone into visiting a spoofed or infected website
  2. the process of converting information or data into a code to prevent unauthorized access
  3. 2 or more computers connected together to share resources
  4. emails sent appearing to be from legitimate sources designed to trick the receiver into giving out information

10 Clues: an input device used with a computera network security controller and monitor2 or more computers connected together to share resourcesa process to identify who should to have access to a systeman electronic device used for processing and storing informationmalicious software designed to block access to computer system until money is paid...

TELUS Cybersecurity Crossword Puzzle 2025-01-21

TELUS Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Une cyberattaque où les attaquants incitent les utilisateurs à révéler des informations sensibles via de faux courriels ou sites Web.
  2. Méthode d’essais et d’erreurs pour deviner les mots de passe.
  3. Logiciel conçu pour détecter et supprimer les programmes malveillants de votre ordinateur.
  4. Une entreprise qui accorde la priorité à ses clients dans le but de rendre le futur meilleur
  5. Pyratage ___: manipuler les gens pour qu’ils révèlent des informations confidentielles
Down
  1. Un dispositif de sécurité réseau qui surveille et contrôle le trafic entrant et sortant en fonction de règles.
  2. Le processus de conversion de données dans un format codé pour empêcher qu’elles ne soient lues par une personne ou un système non prévu.
  3. Une combinaison secrète de caractères utilisés pour sécuriser les comptes.
  4. Un tunnel sécurisé qui crypte votre connexion Internet et masque votre adresse IP.
  5. Un incident où des informations sensibles ou confidentielles sont exposées

10 Clues: Méthode d’essais et d’erreurs pour deviner les mots de passe.Une combinaison secrète de caractères utilisés pour sécuriser les comptes.Un incident où des informations sensibles ou confidentielles sont exposéesUn tunnel sécurisé qui crypte votre connexion Internet et masque votre adresse IP....

Cybersecurity Crossword Nathan Compagnon 2024-11-27

Cybersecurity Crossword Nathan Compagnon crossword puzzle
Across
  1. : Prevent spam by temporarily rejecting communications from unknown senders
  2. : Malicious code that can cause harm to your anyone who watches the infected ad
  3. : Malware that disguise itself as a normal program to infect a system
  4. : Type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files
  5. : Security measure to distinguish human from machine input
  6. : Set of software tools that enable an unauthorized user to gain control of a computer system without being detected
Down
  1. : Process that transforms encrypted information into its original format
  2. : Turns domain names into ip addresses
  3. : Vulnerability in software or hardware that is unknown to the vendor and for which no patch or other fix is available
  4. : Force a website, computer, or online service offline by flooding the target with many requests

10 Clues: : Turns domain names into ip addresses: Security measure to distinguish human from machine input: Malware that disguise itself as a normal program to infect a system: Process that transforms encrypted information into its original format: Prevent spam by temporarily rejecting communications from unknown senders...

CYBERSECURITY TOOLS AND TECHNIQUES 2025-01-03

CYBERSECURITY TOOLS AND TECHNIQUES crossword puzzle
Across
  1. A system that collects and analyzes security data from various sources to identify potential security threats and provide real-time monitoring.
  2. Software designed to detect, prevent, and remove malicious software (malware) from a computer system.
  3. A type of cyber attack where multiple systems are used to flood a network or website with traffic, causing it to become overwhelmed and unavailable.
  4. Authentication A security process that requires two forms of verification, such as a password and a code sent to a mobile device, to access an account.
  5. Masking The process of concealing sensitive data by replacing it with fictitious or scrambled data to protect privacy and prevent unauthorized access.
Down
  1. A system that monitors network or system activities for signs of malicious activities or policy violations.
  2. Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers.
  3. Rules Predefined configurations that determine which types of network traffic are allowed or blocked by a firewall.
  4. Security Measures taken to protect individual devices (endpoints) such as computers, smartphones, and tablets from security threats.
  5. A system that actively monitors and blocks potential security threats in real-time, preventing malicious activities from compromising a network or system.

10 Clues: Software designed to detect, prevent, and remove malicious software (malware) from a computer system.A system that monitors network or system activities for signs of malicious activities or policy violations.Testing A simulated cyber attack on a system to identify vulnerabilities that could be exploited by attackers....

Automotive cybersecurity Set II 2025-08-05

Automotive cybersecurity Set II crossword puzzle
Across
  1. ability to encrypt sensitive data and provide robust defences against attacks.
  2. servers manage vehicle authentication and store results on the blockchain for quick re-authentication by edge nodes.
  3. cryptographic techniques for mutual authentication support local re-authentication when vehicles switch between edge nodes.
  4. Metric detects deviations from normal behaviour but may generate false positives.
  5. Protocol (AVTP) packets within Automotive Ethernet networks.
  6. is specifically designed to detect replay attacks on AVTP streams.
Down
  1. labelled dataset of benign and malicious packets by simulating client-server behaviour.
  2. Secure decentralized communication system for CAVs.
  3. model employs reset and update gates to manage memory connections, using an attention mechanism to enhance detection accuracy.
  4. Attack detection methods are classified into infrastructure-less.

10 Clues: Secure decentralized communication system for CAVs.Protocol (AVTP) packets within Automotive Ethernet networks.Attack detection methods are classified into infrastructure-less.is specifically designed to detect replay attacks on AVTP streams.ability to encrypt sensitive data and provide robust defences against attacks....

Cybersecurity awareness cross-word 2025-11-09

Cybersecurity awareness cross-word crossword puzzle
Across
  1. – A secret string used to verify identity.
  2. – An update that fixes software vulnerabilities.
  3. – The process of converting data into code to prevent unauthorized access.
  4. – A security threat originating from within an organization.
  5. – Software designed to disrupt, damage, or gain unauthorized access.
Down
  1. – Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  2. – Secure connection used to access a network remotely.
  3. – A network security device that monitors and filters traffic.
  4. – Unwanted or unsolicited email.
  5. – A login method requiring two or more verification factors.

10 Clues: – Unwanted or unsolicited email.– A secret string used to verify identity.– An update that fixes software vulnerabilities.– Secure connection used to access a network remotely.– A security threat originating from within an organization.– A login method requiring two or more verification factors....

Cybersecurity Puzzle 2021-11-04

Cybersecurity Puzzle crossword puzzle
Across
  1. A defensive technology designed to keep the bad guys out.
  2. Technology that allows us to store and access files or services remotely via the internet.
  3. A group of computers, printers and devices that are interconnected and governed as a whole.
Down
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. A set of programs that tells computers how to perform a set of tasks.

5 Clues: A defensive technology designed to keep the bad guys out.A set of programs that tells computers how to perform a set of tasks.Technology that allows us to store and access files or services remotely via the internet.A group of computers, printers and devices that are interconnected and governed as a whole....

Cybersecurity Definitions 2024-06-16

Cybersecurity Definitions crossword puzzle
Across
  1. Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
  2. An attack method where a perpetrator deceives individuals into divulging confidential information.
  3. The practice of protecting systems, networks, and programs from digital attacks.
Down
  1. A program that replicates itself to spread to other computers.
  2. A person who uses computers to gain unauthorized access to data.

5 Clues: A program that replicates itself to spread to other computers.A person who uses computers to gain unauthorized access to data.The practice of protecting systems, networks, and programs from digital attacks.Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems....

Mission: Cybersecurity Word Quest 2025-05-05

Mission: Cybersecurity Word Quest crossword puzzle
Across
  1. Software that blocks unauthorized access.
  2. A name you use to log into accounts.
  3. Someone who uses technology to hurt others.
  4. Fake messages that try to steal information.
  5. A fake offer to steal money or information.
Down
  1. A secret word that keeps your account safe.
  2. A bad program that can spread through computers.
  3. Software made to harm computers.
  4. Scrambling data to keep it safe.
  5. Someone who breaks into computers to steal/spy.

10 Clues: Software made to harm computers.Scrambling data to keep it safe.A name you use to log into accounts.Software that blocks unauthorized access.A secret word that keeps your account safe.Someone who uses technology to hurt others.A fake offer to steal money or information.Fake messages that try to steal information....

Cybersecurity Awareness Month 2025 2025-09-30

Cybersecurity Awareness Month 2025 crossword puzzle
Across
  1. Warmest season, overused as a password.
  2. Three words that should be the key to your heart, not you password (1,4,3).
  3. Six of the first letter—cybercriminals love it.
  4. Catch ’em all? Hack ’em all.
  5. First six letters on your keyboard.
Down
  1. Social media giant, weak as a key.
  2. Car or cowboy, not a good password.
  3. Dark knight, weak choice.
  4. If you tell everyone, it’s not this anymore.
  5. Basic greeting, basic security

10 Clues: Dark knight, weak choice.Catch ’em all? Hack ’em all.Basic greeting, basic securitySocial media giant, weak as a key.Car or cowboy, not a good password.First six letters on your keyboard.Warmest season, overused as a password.If you tell everyone, it’s not this anymore.Six of the first letter—cybercriminals love it....

Cybersecurity Day - MFA Booth 2025-10-13

Cybersecurity Day - MFA Booth crossword puzzle
Across
  1. Practice of requiring two or more independent factors.
  2. Time-based one-time password algorithm.
  3. State value that advances to produce the next HOTP code.
  4. Hardware security key used for HOTP+PIN and FIDO flows.
  5. Counter-based HMAC one-time password algorithm.
  6. USB class used for human-interface devices; referenced in your “named HID” TOTP context.
Down
  1. The application that generates TOTP and is protected with FIDO.
  2. Local secret on a security key used alongside HOTP validation.
  3. Browser-facing W3C standard that implements FIDO authenticators.
  4. Open authentication standards enabling phishing-resistant, passwordless login used in your implementation.

10 Clues: Time-based one-time password algorithm.Counter-based HMAC one-time password algorithm.Practice of requiring two or more independent factors.Hardware security key used for HOTP+PIN and FIDO flows.State value that advances to produce the next HOTP code.Local secret on a security key used alongside HOTP validation....

Cyber World (Internet) 2023-06-12

Cyber World (Internet) crossword puzzle
Across
  1. Malicious software that replicates itself and infects computer systems.
  2. The process of encoding information to protect its confidentiality.
  3. The practice of protecting computers, servers, and networks from digital threats.
  4. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
  1. Criminal activities conducted through the internet, such as fraud, hacking, or identity theft.
  2. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
  3. A network of infected computers, often controlled by a hacker, used for malicious activities.
  4. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
  5. A person who uses technical skills to gain unauthorized access to computer systems.
  6. A security measure that protects computer networks from unauthorized access.

10 Clues: The process of encoding information to protect its confidentiality.Malicious software that replicates itself and infects computer systems.A security measure that protects computer networks from unauthorized access.The practice of protecting computers, servers, and networks from digital threats....

Cyber-security 2021-01-17

Cyber-security crossword puzzle
Across
  1. refers to the security of a computer or computer system
  2. authentication mechanisms, access channels and systems all have to work properly
  3. demands a ransom from you to get things back on track.
  4. result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
  1. ensure that information is hidden from people unauthorised to access it.
  2. modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
  3. helps hackers spy on systems and their users.
  4. self-replicating and spreads without end-user action, causing real devastation.
  5. ensuring that data has not been tampered with and, therefore, can be trusted.
  6. are attempts to expose users to unwanted, potentially malicious advertising.
  7. malicious instructions that appear as legitimate programs.

11 Clues: helps hackers spy on systems and their users.demands a ransom from you to get things back on track.refers to the security of a computer or computer systemmalicious instructions that appear as legitimate programs.ensure that information is hidden from people unauthorised to access it....

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new Palo Alto office
  2. The conference Joanne and Steve spoke at in 2018
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. The New York Times said this company will emerge as the leading residential solar installer in the US
  5. Steve's book, The Way to Design, was released in what format in late 2018?
  6. On-demand vet service in the FC portfolio
Down
  1. Foundation led this meditation company's series A
  2. Bolt Thread's Microsilk fabric is made by
  3. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  4. Foundation's newest unicorn
  5. What FC company raised $155 million in 2018 and expanded into Europe?

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The street name of FC's new Palo Alto office
  2. Bolt Thread's Microsilk fabric is made by
  3. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  4. What FC company raised $155 million in 2018 and expanded into Europe?
  5. Foundation led this meditation company's series A
Down
  1. Steve's book, The Way to Design, was released in what format in late 2018?
  2. Foundation's newest unicorn
  3. The New York Times said this company will emerge as the leading residential solar installer in the US
  4. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  5. The conference Joanne and Steve spoke at in 2018
  6. On-demand vet service in the FC portfolio

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

FC Times Crossword 2019-01-30

FC Times Crossword crossword puzzle
Across
  1. The conference Joanne and Steve spoke at in 2018
  2. In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
  3. Foundation led this meditation company's series A
  4. Foundation's newest unicorn
  5. On-demand vet service in the FC portfolio
Down
  1. The New York Times said this company will emerge as the leading residential solar installer in the US
  2. The street name of FC's new Palo Alto office
  3. This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
  4. Steve's book, The Way to Design, was released in what format in late 2018?
  5. Bolt Thread's Microsilk fabric is made by
  6. What FC company raised $155 million in 2018 and expanded into Europe?

11 Clues: Foundation's newest unicornBolt Thread's Microsilk fabric is made byOn-demand vet service in the FC portfolioThe street name of FC's new Palo Alto officeThe conference Joanne and Steve spoke at in 2018Foundation led this meditation company's series AWhat FC company raised $155 million in 2018 and expanded into Europe?...

Industrial Internet Puzzle 2016-07-27

Industrial Internet Puzzle crossword puzzle
Across
  1. The number of forces shaping the industrial internet
  2. World’s first industrial operating system
  3. The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)
  4. Headquarters for GE Digital (2 words)
Down
  1. The division of GE Digital dedicated to address potential vulnerabilities by protecting industrial assets (2 words)
  2. Current CEO for GE Digital (2 words)
  3. A virtual model of each physical production asset (2 words)
  4. Another force of the industrial internet that deals with increasing system intelligence through embedded software (2 words)
  5. One force shaping the industrial internet that has to do with transforming massive volumes into information into intelligence (2 words)

9 Clues: Current CEO for GE Digital (2 words)Headquarters for GE Digital (2 words)World’s first industrial operating systemThe number of forces shaping the industrial internetA virtual model of each physical production asset (2 words)The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)...

Risk Culture Awareness 2022-01-19

Risk Culture Awareness crossword puzzle
Across
  1. Process and risk owners are in which line of defense?
  2. the chance that an outcome or investment's actual gains will differ from an expected outcome or return
  3. level of risk that an organization is prepared to accept
  4. A mitigation strategy to eliminate the risk exposure to come into existence
  5. Risk department that reviews and provides an independent opinion to the business on lending proposals
Down
  1. this function represents the third line of defense
  2. The practice of protecting systems and information from digital attacks
  3. risk of loss resulting from ineffective or failed internal processes, people, systems
  4. A measure of the level of risk an organization is willing to accept

9 Clues: this function represents the third line of defenseProcess and risk owners are in which line of defense?level of risk that an organization is prepared to acceptA measure of the level of risk an organization is willing to acceptThe practice of protecting systems and information from digital attacks...

INNOV 2025-11-26

INNOV crossword puzzle
Across
  1. The implied cost of additional rework caused by choosing quick solutions over better options.
  2. Transformation process to create a reusable foundation for products which encourages modularity & extensibility.
  3. Embedded SIM technology allowing remote provisioning of mobile subscriptions.
  4. The ability of devices and systems to communicate, exchange data and establishing a link between them.
  5. Outcome of operational optimization, automation (CI/CD, AI-driven), and cost reduction initiatives..
Down
  1. AI-driven insights, automation, and decision-making.
  2. The ability to use existing solutions or components across multiple projects or domains.
  3. Measures and technologies to protect systems and data from cyber threats.
  4. is a strategic growth driver within the Orange Group's financial services portfolio

9 Clues: AI-driven insights, automation, and decision-making.Measures and technologies to protect systems and data from cyber threats.Embedded SIM technology allowing remote provisioning of mobile subscriptions.is a strategic growth driver within the Orange Group's financial services portfolio...

Cybersecurity Fundamentals Chapter 4 2024-06-05

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. Also known as public-key encryption, it uses a pair of keys – a public key for encryption and a private key for decryption.
  2. The study of analyzing information systems to understand hidden aspects of the systems.
  3. The science of encrypting and decrypting information to protect data confidentiality.
  4. The process of converting plaintext into ciphertext to prevent unauthorized access.
  5. The process of managing cryptographic keys in a cryptosystem, including their generation, exchange, storage, use, and destruction.
  6. A type of encryption where the same key is used for both encryption and decryption.
Down
  1. Techniques used to regulate who can view or use resources in a computing environment.
  2. The practice of deliberately creating misleading or confusing information to hide the true meaning of the data.
  3. An algorithm used to perform encryption or decryption.
  4. The reverse process of encryption, where ciphertext is converted back into readable plaintext using a key.

10 Clues: An algorithm used to perform encryption or decryption.The process of converting plaintext into ciphertext to prevent unauthorized access.A type of encryption where the same key is used for both encryption and decryption.Techniques used to regulate who can view or use resources in a computing environment....

Cybersecurity ITF+ Module 1.1 2023-11-09

Cybersecurity ITF+ Module 1.1 crossword puzzle
Across
  1. When information is stored and processed
  2. System that processes, stores, and transfers information
  3. System that manipulates data based on a set of instructions
  4. a computer that supports other computers
  5. device with same function as PC but is handheld
Down
  1. Hardware that is connected to the computer
  2. a computer that integrates all components into a single case
  3. the system memory
  4. retrieves instructions or data from memory and processes it
  5. computer programming

10 Clues: the system memorycomputer programmingWhen information is stored and processeda computer that supports other computersHardware that is connected to the computerdevice with same function as PC but is handheldSystem that processes, stores, and transfers informationSystem that manipulates data based on a set of instructions...

Thinklogic 2021-09-13

Thinklogic crossword puzzle
Across
  1. DX
  2. Search Engine
Down
  1. CX

3 Clues: CXDXSearch Engine

Pilot Puzzle Program 2022-02-11

Pilot Puzzle Program crossword puzzle
Across
  1. A sector of safety that is not related to outdoor work (hint: digital)
  2. given by FM prior to performing non-exempt work
  3. same _____ falls are a hazard anywhere
  4. common PPE when working with any kind of sample
  5. ___ drills happen regularly to be prepared in the event of an evacuation
  6. this is a requirement when working in a CA or RA
  7. a 360 ___ is essential after returning to your vehicle
  8. Always know where the closest ___ is in case there is a building emergency
Down
  1. the biggest safety concern working in a nuclear plant
  2. historically marked across sites using lollypops
  3. fire extinguishers needs to have a full maintenance inspection every ___ months
  4. a required document to be briefed to when in a CA or RA
  5. hazard that changes depending on seasons
  6. always know where the closest ___ is in case someone has a cardiac event
  7. briefing held during warm months
  8. required to be written and discussed prior to beginning work to cover hazards
  9. You always should conduct a ___ before starting a new job or when conditions change

17 Clues: briefing held during warm monthssame _____ falls are a hazard anywherehazard that changes depending on seasonsgiven by FM prior to performing non-exempt workcommon PPE when working with any kind of samplehistorically marked across sites using lollypopsthis is a requirement when working in a CA or RA...

First Principles of Cybersecurity 2019-10-15

First Principles of Cybersecurity crossword puzzle
Across
  1. hiding data from people who don't need to have access to it
  2. using mulitple strategies to protect something
  3. making sure that only the necessary people have access
  4. reducin the number of weaknesses in something
  5. labeling objects based on how they can be used and by whom
  6. removing any clutter and only displaying the important information
Down
  1. making designs as simple and intuitive as possible
  2. keeping things separate based on categories
  3. making it easy to swap one part out for another
  4. only doing one thing at a time

10 Clues: only doing one thing at a timekeeping things separate based on categoriesreducin the number of weaknesses in somethingusing mulitple strategies to protect somethingmaking it easy to swap one part out for anothermaking designs as simple and intuitive as possiblemaking sure that only the necessary people have access...

Cybersecurity Threats and Defenses 2025-09-24

Cybersecurity Threats and Defenses crossword puzzle
Across
  1. Fake website designed to steal credentials
  2. Protects data on a wireless network
  3. Continuous monitoring of network traffic
  4. Security test that simulates a real attack
  5. Prevents unauthorized physical entry to a secure area
Down
  1. A malicious attack that floods a system with traffic
  2. Secures communication over the internet
  3. Framework of rules and policies governing security
  4. Keeps track of system events for auditing
  5. Hidden malicious code inserted into software

10 Clues: Protects data on a wireless networkSecures communication over the internetContinuous monitoring of network trafficKeeps track of system events for auditingFake website designed to steal credentialsSecurity test that simulates a real attackHidden malicious code inserted into softwareFramework of rules and policies governing security...

Internet 2023-07-05

Internet crossword puzzle
Across
  1. A digital message sent electronically to communicate with others.
  2. Safety Guidelines and precautions to ensure safe and responsible internet use.
  3. Gaming Playing games with other people over the internet.
  4. To transfer data or files from the internet to your computer.
  5. Measures taken to protect computers, networks, and data from unauthorized access or attacks.
  6. Media Websites and applications that allow people to connect and share content online.
  7. A global network that connects computers and allows communication and access to information.
Down
  1. A collection of web pages that can be accessed on the internet.
  2. To communicate with others in real time using text messages on the internet.
  3. Connected to or available through the internet.
  4. A wireless technology that allows devices to connect to the internet without using cables.
  5. A program used to access and navigate websites on the internet.
  6. Playing audio or video content directly from the internet without downloading it.
  7. Engine A tool that helps you find information on the internet.
  8. To transfer data or files from your computer to the internet.

15 Clues: Connected to or available through the internet.Gaming Playing games with other people over the internet.To transfer data or files from the internet to your computer.To transfer data or files from your computer to the internet.Engine A tool that helps you find information on the internet....

Computer Science Vocabulary 2025-03-10

Computer Science Vocabulary crossword puzzle
Across
  1. A set of steps carried out, in order, to solve a problem
  2. Converting actions into a symbolic language
  3. Shows a start or end point on a flowchart
  4. Shows a decision on a flowchart
  5. The protection of computing devices, systems, and networks from theft of, or damage to their hardware, software, or electronic data
  6. When you write down a computer code in plain English, shorthand, or bullet points to communicate the high level design without actually writing the program
  7. Shows a process on a flowchart
Down
  1. Finding and fixing issues in code
  2. A graphical representation that depicts a troubleshooting process, system, or algorithm
  3. The study of computers and their algorithmic processes
  4. Shows the relationships between things in a flowchart
  5. A programming concept that is a set of steps carried out, in order
  6. All information stored and processed by a computing device

13 Clues: Shows a process on a flowchartShows a decision on a flowchartFinding and fixing issues in codeShows a start or end point on a flowchartConverting actions into a symbolic languageShows the relationships between things in a flowchartThe study of computers and their algorithmic processesA set of steps carried out, in order, to solve a problem...

PSB CCF CROSSWORD PUZZLE 2020-06-24

PSB CCF CROSSWORD PUZZLE crossword puzzle
Across
  1. Third part of SC’s mission - give (someone) the power or drive to do something.
  2. IES, IET, IPRS
  3. SC, CSC, Dance Club, Music Club, Photog, SAC
  4. SC initiated, amazing three-times a year, event
  5. First part of SC’s mission - provide (someone or something) the means to do something.
Down
  1. First part of student life’s tagline
  2. CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
  3. PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
  4. Second part of student life’s tagline
  5. A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
  6. A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
  7. Keep it lit!
  8. Second part of SC’s mission - participate or become involved in.

13 Clues: Keep it lit!IES, IET, IPRSFirst part of student life’s taglineSecond part of student life’s taglineSC, CSC, Dance Club, Music Club, Photog, SACCSA, GSC, MAPIA, KC, Myanmar Student Club, SASASC initiated, amazing three-times a year, eventSecond part of SC’s mission - participate or become involved in....

Cyber Crossword Puzzle 2023-10-05

Cyber Crossword Puzzle crossword puzzle
Across
  1. Never write these down on a sticky note or a whiteboard.
  2. Never open these in email unless you already expected them from the sender.
  3. _____ is a level of data classification.
  4. Lock your _____ and your mobile phone anytime they are not in use.
  5. Files with sensitive information should always be kept in a _____ file room or drawer.
  6. Alway install _____ to your computer or mobile phone. Don't click "Remind me later."
Down
  1. _____ is when an unauthorized person follows you into a secure location.
  2. Report all possible cyber _____ to the IT Service Desk.
  3. An email scam that that targets unsuspecting users to give up information.
  4. Measures taken to protect your or your organization's information from cyber attack
  5. An unauthorized person that tries to gain access to your computer.
  6. Stay _____ and be on the lookout for security threats or incidents.
  7. Always keep a _____ workspace that is free of confidential information.

13 Clues: _____ is a level of data classification.Report all possible cyber _____ to the IT Service Desk.Never write these down on a sticky note or a whiteboard.An unauthorized person that tries to gain access to your computer.Lock your _____ and your mobile phone anytime they are not in use.Stay _____ and be on the lookout for security threats or incidents....

Cyber Threat Landscape 2024-04-04

Cyber Threat Landscape crossword puzzle
Across
  1. Pretending to be an employee that forgot their password
  2. Type of phishing scam that involves an email with phone number to call
  3. Using digital ads to deliver malware
  4. Cybercriminals send emails claiming to be from a reputable source
  5. Sending text messages containing malicious link
  6. Type of phishing attack that targets specific people or organizations through malicious emails
  7. Software designed to disrupt a device's normal operations without the user's knowledge
Down
  1. Type of authentication that uses multi-step account log in process that requires more than just a password
  2. Type of malware that prevents users from accessing their device and data
  3. Defrauding people over the phone
  4. Cybersecurity thret using QR codes to trick users
  5. Manipulated video, photo or audio recording that used AI to make it appear real
  6. Type of scam that an email appears to be sent for legitimate request

13 Clues: Defrauding people over the phoneUsing digital ads to deliver malwareSending text messages containing malicious linkCybersecurity thret using QR codes to trick usersPretending to be an employee that forgot their passwordCybercriminals send emails claiming to be from a reputable source...

Common Cybersecurity Roles 2025-02-05

Common Cybersecurity Roles crossword puzzle
Across
  1. Investigates and mitigates cyber incidents, such as data breaches or malware attacks.
  2. Simulates cyberattacks to find vulnerabilities in systems.
Down
  1. Monitors and analyzes security threats to protect an organization.
  2. Designs, implements, and maintains secure network infrastructure.
  3. A high-level executive responsible for overseeing an organization's entire cybersecurity strategy.

5 Clues: Simulates cyberattacks to find vulnerabilities in systems.Designs, implements, and maintains secure network infrastructure.Monitors and analyzes security threats to protect an organization.Investigates and mitigates cyber incidents, such as data breaches or malware attacks....

REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16

REV Cybersecurity Awareness Crossword Puzzle #2 crossword puzzle
Across
  1. the activity of defrauding an online account holder of financial information by posing as a legitimate company.
  2. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  3. horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  4. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
  5. code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
  6. a standalone malware computer program that replicates itself in order to spread to other computers.
  7. any software program in which advertising banners are displayed while the program is running.
  8. door a method, often secret, of bypassing normal authentication in a product.
  9. threat refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
  1. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. someone who seeks and exploits weaknesses in a computer system or computer network.
  3. global system of interconnected computer networks that use the Internet protocol suite.
  4. designed to detect and destroy computer viruses.
  5. security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  6. are small files that Web sites put on your computer hard disk drive when you first visit.
  7. an attempt by hackers to damage or destroy a computer network or system.
  8. a local or restricted communications network, especially a private network created using World Wide Web software.
  9. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  10. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.

19 Clues: designed to detect and destroy computer viruses.an attempt by hackers to damage or destroy a computer network or system.door a method, often secret, of bypassing normal authentication in a product.someone who seeks and exploits weaknesses in a computer system or computer network....

GAMER ARMY CROSSWORD 2024-06-05

GAMER ARMY CROSSWORD crossword puzzle
Across
  1. Floating Robot that buzzes when it flys in the air
  2. action on someone who puts things together.
  3. a thing done by skills or courages
  4. A headset you wear that makes you see a world a person made that you can walk into.
  5. take something or someone to an other place.
  6. a place on particular issues can be exchanged
  7. High definition on internet That has hyperspeed of power.
Down
  1. Being protected by an electronic face that watches.
  2. A person who unlawful violences to the civilians
  3. Two halves of a school year in high school.
  4. a Player name or person who plays that player.
  5. A sign that shows peace or other signs that are called… to bring to their own country.
  6. A thing you did that makes you popular and become a worlds and most… actor or person
  7. One problem happen to another problem that turn into a huge problem called.
  8. something that is visible and not completely border.

15 Clues: a thing done by skills or couragesTwo halves of a school year in high school.action on someone who puts things together.take something or someone to an other place.a place on particular issues can be exchangeda Player name or person who plays that player.A person who unlawful violences to the civilians...

JOB TITLES 2025-10-01

JOB TITLES crossword puzzle
Across
  1. A professional who directs an organization's computer-related activities to meet business goals.
  2. A person who gides a team toward a common goal by providing direction.
  3. plan, desing, and supervised the construction and maintenance of building.
  4. A person whose job is to analyse financial accounts.
  5. A person who directly oversees the work of a team employees.
Down
  1. Analyzes and optimizes a company's inventory levels.
  2. A person whose job is to keep records of the financial affairs of a business.
  3. A person who complies and analyses statistics to calculate insurance risks
  4. A person who oversees the daily operations, ensuring production goals are met efficiently.
  5. A person who ranks below a senior person
  6. develops a media plan that precisely defines the distribution strategy for a campaign.
  7. A person highly skilled in a specific and restricted field.
  8. A professional who oversees an organization's workforce, managing everything from recruitment and hiring.
  9. A senior executive responsible for an organization's cybersecurity strategy and programs.
  10. A sales professional specialized in prospecting and rating of potential customers.

15 Clues: A person who ranks below a senior personAnalyzes and optimizes a company's inventory levels.A person whose job is to analyse financial accounts.A person highly skilled in a specific and restricted field.A person who directly oversees the work of a team employees.A person who gides a team toward a common goal by providing direction....

Media texnologiyalar kundalik hayotda 2024-10-22

Media texnologiyalar kundalik hayotda crossword puzzle
Across
  1. Internet va raqamli ma'lumotlarni himoya qilish, kiber hujumlardan himoyalanish va xavfsizlikni ta'minlash
  2. Axborot va ma'lumotlarni tarqatish vositalari
  3. Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya
  4. Search Engine Optimization Veb saytlarni qidiruv tizimlarida yuqori o'rinlarda ko'rsatish uchun amalga oshiriladigan jarayon
  5. Reality Foydalanuvchiga to'liq immersiv tajriba beruvchi kompyuter tomonidan yaratilgan muhit
  6. tarmoqlarda muayyan sohada ta'sirga ega bo'lgan shaxs brendni targ'ib qilishda yordam beradi
  7. Data Katta hajmdagi ma'lumotlar ularni tahlil qilish va ishlatish orqali foydali ma'lumotlarni olish
Down
  1. content Foydalanuvchilar tomonidan yaratilgan kontent brendlar tomonidan foydalaniladi
  2. Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar
  3. marketing Mahsulot yoki xizmatni ijtimoiy tarmoqlar orqali tez tarqatish uchun yaratilgan marketing strategiyasi
  4. computing Internet orqali ma'lumotlarni saqlash va ularga kirish imkonini beruvchi texnologiya
  5. tarmoqlar Foydalanuvchilarga axborot almashish va muloqot qilish imkonini beruvchi platformalar
  6. Kontentni internet orqali jonli tarzda real-time tomosha qilish yoki tinglash imkoniyatini beruvchi texnologiya
  7. media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar
  8. Shaxsiy fikrlar g'oyalar yoki ma'lumotlarni qiziqarli tarzda taqdim etadigan veb-sayt

15 Clues: Axborot va ma'lumotlarni tarqatish vositalariReality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiyamedia Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlarAudio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar...

BrainRiddle 2025-02-05

BrainRiddle crossword puzzle
Across
  1. The process of verifying the identity of a user or system.
  2. The study of analyzing and breaking cryptographic algorithms.
  3. The process of removing software restrictions on a device to gain full control.
  4. The practice of updating software to fix security vulnerabilities.
  5. A security feature ensuring only trusted software runs during startup.
  6. The process of identifying, managing, and mitigating cybersecurity threats.
  7. The process of collecting and analyzing data to prevent cyber threats.
Down
  1. A cyberattack where an attacker secretly intercepts communication.
  2. A cryptographic technique used to verify the authenticity of data.
  3. The use of hacking techniques for political or social activism.
  4. A program or code that takes advantage of a vulnerability in a system.
  5. A hidden method of bypassing security controls to gain unauthorized access.
  6. Software embedded in hardware that controls low-level device operations.
  7. An advanced computing paradigm that can break classical encryption.
  8. A type of malware that records keystrokes to steal passwords and data.

15 Clues: The process of verifying the identity of a user or system.The study of analyzing and breaking cryptographic algorithms.The use of hacking techniques for political or social activism.A cyberattack where an attacker secretly intercepts communication.A cryptographic technique used to verify the authenticity of data....

Virus Crossword 2017-11-28

Virus Crossword crossword puzzle
Across
  1. Malware that replicates itself.
  2. A service used to send digital letters to people at specific addresses.
  3. A program that protects against viruses.
  4. A secret word or phrase that must be used to gain admission to something.
  5. Something that is added to an email and can contain a virus.
  6. Viruses that are hidden in advertisements that ask to download software.
  7. The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  8. To affect a computer with a virus.
Down
  1. A program that can be installed.
  2. An unwanted
  3. A program that hides by posing as a program it is not.
  4. A computer that is targeted and given a virus to.
  5. A virus that floods a network.
  6. Software that is intended to damage or disable computers or computer systems.
  7. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

15 Clues: An unwantedA virus that floods a network.Malware that replicates itself.A program that can be installed.To affect a computer with a virus.A program that protects against viruses.A computer that is targeted and given a virus to.A program that hides by posing as a program it is not.Something that is added to an email and can contain a virus....

Camp Gateway Crossword Puzzle 2021-07-21

Camp Gateway Crossword Puzzle crossword puzzle
Across
  1. (n) a large area covered with trees and undergrowth
  2. (n) space in which to work.
  3. (n) an experience or activity
  4. (n) the state or fact of continuing to live or exist, typically in spite of an accident, ordeal, or difficult circumstances.
  5. (n) what you sleep under when you go camping
  6. (n) another word for the great outdoors
  7. (n)the process of increasing
  8. (n) the necessary items for a particular purpose
  9. (n) the interconnection via the internet of computing devices embedded in everyday things — allowing them to send and receive data
Down
  1. (n) shows the direction of magnetic north and bearings from it.
  2. (n) a state of focus
  3. (n) the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  4. (n) the activity of going for long walks, especially in the country or woods
  5. (n) a newly established business.
  6. (n) 3 letters for "remote" work

15 Clues: (n) a state of focus(n) space in which to work.(n)the process of increasing(n) an experience or activity(n) 3 letters for "remote" work(n) a newly established business.(n) another word for the great outdoors(n) what you sleep under when you go camping(n) the necessary items for a particular purpose(n) a large area covered with trees and undergrowth...

IT 2023-11-27

IT crossword puzzle
Across
  1. The use of largely automatic equipment in a system of operation.
  2. programs follow a step-by-step ______ to perform tasks efficiently."
  3. mechanics explores the fundamental properties and behavior of subatomic particles."
  4. A set of instructions for solving a problem, often used in computer programming.
  5. holds promise for advancements in medicine, electronics, and materials science."
  6. The design, construction, operation, and use of robots.
Down
  1. The practice of protecting computer systems, networks, and data from digital attacks.
  2. Relating to the branch of physics dealing with the behavior of very small particles.
  3. The introduction of new ideas, methods, or products.
  4. Information that is collected and stored, often used for analysis and decision-making.
  5. The manipulation of matter on an atomic or molecular scale.
  6. invest in research and development to drive ______ and stay ahead in the market."
  7. is a field that combines engineering and technology to create intelligent machines."
  8. implement ______ to streamline production processes and increase efficiency."
  9. growing reliance on digital technologies highlights the importance of strong ______ measures."
  10. rely on accurate and reliable ______ to draw meaningful conclusions."

16 Clues: The introduction of new ideas, methods, or products.The design, construction, operation, and use of robots.The manipulation of matter on an atomic or molecular scale.The use of largely automatic equipment in a system of operation.programs follow a step-by-step ______ to perform tasks efficiently."...

Influential Black Scientist 2025-03-18

Influential Black Scientist crossword puzzle
Across
  1. – First Black female neurosurgeon in the U.S., known for pediatric neurosurgery.
  2. – First Black woman in space, physician, and engineer.
  3. – Ophthalmologist who invented laser cataract surgery.
  4. – First Black woman in the U.S. to earn a Ph.D. in chemistry, known for her work on hypertension.
  5. (via HeLa Cells) – Her cells contributed to countless medical breakthroughs, including cancer and polio research.
  6. – Aerospace engineer and NASA scientist working on satellite guidance systems.
  7. – Inventor of electronic control devices, including improvements to pacemakers.
  8. – Aerospace engineer and former CEO of The Aerospace Corporation, specializing in satellite and cybersecurity research.
  9. – Astrophysicist and science communicator, director of the Hayden Planetarium.
  10. – Theoretical physicist and first Black woman to earn a Ph.D. from MIT in physics.
Down
  1. – Mathematician, astronomer, and surveyor who helped design Washington, D.C.
  2. – Mathematician whose calculations helped NASA send astronauts to the Moon.
  3. – Agricultural scientist and inventor, known for crop rotation and peanut innovations.
  4. – Surgeon and researcher who developed blood banks and blood plasma preservation.
  5. – Biologist known for his pioneering work in cell biology and fertilization.

15 Clues: – First Black woman in space, physician, and engineer.– Ophthalmologist who invented laser cataract surgery.– Mathematician whose calculations helped NASA send astronauts to the Moon.– Mathematician, astronomer, and surveyor who helped design Washington, D.C.– Biologist known for his pioneering work in cell biology and fertilization....

Activity 7 2025-04-26

Activity 7 crossword puzzle
Across
  1. A collective term for virtual reality, augmented reality, and mixed reality.
  2. The practice of analyzing data to support business decisions.
  3. A cybersecurity solution that monitors and responds to threats on network endpoints like laptops and phones.
  4. Delivering everything, from software to storage, over the internet.
  5. A broader virtual environment combining physical and digital worlds.
  6. Automation of every possible process in business using advanced technology.
  7. A system designed to automatically identify and respond to vulnerabilities in cybersecurity.
  8. A design approach for securing all digital assets independently instead of securing one perimeter.
  9. Insurance coverage protecting companies from cyberattacks and data breaches.
  10. A form of computing based on the principles of quantum theory.
Down
  1. Creating seamless, consistent user experiences across multiple platforms and devices.
  2. A security feature requiring two or more forms of identification before access is granted.
  3. Using technology that is environmentally responsible and resource-efficient.
  4. Regularly testing systems to find security weaknesses before hackers do.
  5. Technology that mimics human learning and decision-making processes.
  6. A technology concept where cloud services are located at multiple locations but managed centrally.

16 Clues: The practice of analyzing data to support business decisions.A form of computing based on the principles of quantum theory.Delivering everything, from software to storage, over the internet.Technology that mimics human learning and decision-making processes.A broader virtual environment combining physical and digital worlds....

Ethical Online Teaching 2025-07-21

Ethical Online Teaching crossword puzzle
Across
  1. law that restricts data collection from children under 13 online
  2. law that protects the privacy of student education records
  3. The trail of data left behind by users on digital platforms
  4. Required permission from users before collecting or using their personal data
  5. A digital platform used to deliver and manage educational content
  6. The practice of protecting systems, networks, and data from digital attacks
  7. A security method that requires two forms of identification to access an account
  8. Using someone else's work without proper attribution
Down
  1. An incident where data is accessed or disclosed without authorization
  2. Any data that could identify a specific individual, like name or student ID
  3. A method of converting data into a secure format to prevent unauthorized access
  4. The ethical duty to keep sensitive information private
  5. The principle of collecting only the data that is necessary
  6. Designing digital content so it can be used by people with disabilities and more accessible
  7. A document that explains how a website or platform collects and uses user data

15 Clues: Using someone else's work without proper attributionThe ethical duty to keep sensitive information privatelaw that protects the privacy of student education recordsThe principle of collecting only the data that is necessaryThe trail of data left behind by users on digital platformslaw that restricts data collection from children under 13 online...

Media texnologiyalar kundalik hayotda 2024-10-22

Media texnologiyalar kundalik hayotda crossword puzzle
Across
  1. Internet va raqamli ma'lumotlarni himoya qilish, kiber hujumlardan himoyalanish va xavfsizlikni ta'minlash
  2. Axborot va ma'lumotlarni tarqatish vositalari
  3. Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya
  4. Search Engine Optimization Veb saytlarni qidiruv tizimlarida yuqori o'rinlarda ko'rsatish uchun amalga oshiriladigan jarayon
  5. Reality Foydalanuvchiga to'liq immersiv tajriba beruvchi kompyuter tomonidan yaratilgan muhit
  6. tarmoqlarda muayyan sohada ta'sirga ega bo'lgan shaxs brendni targ'ib qilishda yordam beradi
  7. Data Katta hajmdagi ma'lumotlar ularni tahlil qilish va ishlatish orqali foydali ma'lumotlarni olish
Down
  1. content Foydalanuvchilar tomonidan yaratilgan kontent brendlar tomonidan foydalaniladi
  2. Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar
  3. marketing Mahsulot yoki xizmatni ijtimoiy tarmoqlar orqali tez tarqatish uchun yaratilgan marketing strategiyasi
  4. computing Internet orqali ma'lumotlarni saqlash va ularga kirish imkonini beruvchi texnologiya
  5. tarmoqlar Foydalanuvchilarga axborot almashish va muloqot qilish imkonini beruvchi platformalar
  6. Kontentni internet orqali jonli tarzda real-time tomosha qilish yoki tinglash imkoniyatini beruvchi texnologiya
  7. media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar
  8. Shaxsiy fikrlar g'oyalar yoki ma'lumotlarni qiziqarli tarzda taqdim etadigan veb-sayt

15 Clues: Axborot va ma'lumotlarni tarqatish vositalariReality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiyamedia Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlarAudio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar...

Technology words 2025-11-26

Technology words crossword puzzle
Across
  1. A wireless technology for connecting devices to the internet
  2. Harmful software designed to damage or access a computer without permission
  3. A computer that provides data or services to other computers on a network
  4. Protection of computers and networks from attacks or unauthorized access
  5. Programs and applications that run on a computer or device
Down
  1. A program used to access and view websites
  2. The physical parts of a computer, like the keyboard or processor.
  3. An organized collection of information stored electronically
  4. The amount of data that can be transmitted over a network in a given time
  5. Software that is built into hardware devices to help them operate
  6. The smallest unit of a Digital image or screen display
  7. A method of encoding information so only authorized people can read it
  8. A group of connected computers that share information
  9. A set of instructions that tells a computer how to solve a problem
  10. The address of a webpage on the internet

15 Clues: The address of a webpage on the internetA program used to access and view websitesA group of connected computers that share informationThe smallest unit of a Digital image or screen displayPrograms and applications that run on a computer or deviceAn organized collection of information stored electronically...

Science and Technology 2023-10-31

Science and Technology crossword puzzle
Across
  1. - A professional who designs and builds technology.
  2. - Science of living organisms.
  3. - Medical imaging using radiation.
  4. - Transmitting information over long distances.
  5. - Field of creating and programming robots.
  6. - Protection of computer systems from attacks.
  7. - Device for processing and storing data.
  8. - Study of the environment and ecosystems.
  9. - Study of matter, energy, and the fundamental forces of nature.
  10. - Study of flight and aircraft design.
  11. - Instrument for magnifying small objects.
  12. - Smallest unit of a chemical compound.
Down
  1. - Use of living organisms in technology.
  2. - Study of the atmosphere and weather.
  3. - Creating genetically identical organisms.
  4. - Related to the smallest units of energy.
  5. - Manipulating matter on a nanoscale.
  6. - Study of heredity and DNA.
  7. - Famous physicist known for the theory of relativity.
  8. - Study of extremely small structures.
  9. - Study of celestial objects and the universe.
  10. - Vehicle designed for travel in outer space.
  11. - Study of the composition of matter.
  12. - Optical device for observing distant objects.
  13. - Pertaining to circuits and devices using electricity.
  14. - Substance with a distinct molecular composition.
  15. - Object orbiting a celestial body.
  16. - Device that emits a focused beam of light.
  17. - Substance to stimulate immunity to disease.
  18. - A step-by-step problem-solving procedure.

30 Clues: - Study of heredity and DNA.- Science of living organisms.- Medical imaging using radiation.- Object orbiting a celestial body.- Manipulating matter on a nanoscale.- Study of the composition of matter.- Study of the atmosphere and weather.- Study of extremely small structures.- Study of flight and aircraft design....

Science and Technology 2023-10-31

Science and Technology crossword puzzle
Across
  1. - Famous physicist known for the theory of relativity.
  2. - Creating genetically identical organisms.
  3. - Study of flight and aircraft design.
  4. - Protection of computer systems from attacks.
  5. - Device that emits a focused beam of light.
  6. - Science of living organisms.
  7. - Study of the composition of matter.
  8. - Medical imaging using radiation.
  9. - Vehicle designed for travel in outer space.
  10. - Device for processing and storing data.
  11. - Study of the atmosphere and weather.
  12. - Transmitting information over long distances.
  13. - Study of extremely small structures.
  14. - Substance to stimulate immunity to disease.
  15. - Study of the environment and ecosystems.
  16. - Pertaining to circuits and devices using electricity.
  17. - Object orbiting a celestial body.
Down
  1. - Study of celestial objects and the universe.
  2. - Related to the smallest units of energy.
  3. - Use of living organisms in technology.
  4. - Smallest unit of a chemical compound.
  5. - Instrument for magnifying small objects.
  6. - A step-by-step problem-solving procedure.
  7. - Field of creating and programming robots.
  8. - Substance with a distinct molecular composition.
  9. - Study of matter, energy, and the fundamental forces of nature.
  10. - Optical device for observing distant objects.
  11. - Manipulating matter on a nanoscale.
  12. - A professional who designs and builds technology.
  13. - Study of heredity and DNA.

30 Clues: - Study of heredity and DNA.- Science of living organisms.- Medical imaging using radiation.- Object orbiting a celestial body.- Study of the composition of matter.- Manipulating matter on a nanoscale.- Study of flight and aircraft design.- Study of the atmosphere and weather.- Study of extremely small structures....

Informatika 2024-08-26

Informatika crossword puzzle
Across
  1. Malware yang dapat memantau dan merekam aktivitas pengguna komputer atau perangkat selular.
  2. Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data
  3. Orang yang menjalankan atau membuat program sebuah komputer
  4. Peretasan
  5. Kejahatan dunia maya dimana biasanya target dihubungi melalui surel, telepon, atau pesan teks oleh seseorang yang menyamar dari lembaga sah untuk mengelabui target untuk memberikan data sensitif.
  6. Peretas topi hitam
  7. Badan Siber dan Sandi Negara
  8. Pusat Koordinasi Tim Tanggap Darurat Komputer
Down
  1. Keamanan informasi Internet
  2. MAlware yang tampak seperti aplikasi perangkat lunak jinak, tetapi perangkat lunak ini membawa komponen yang jahat didalamnya.
  3. Gerakan aktivis/hacktivist internasional yang tersebar dan dikenal luas karena berbagai serangan dunia maya terhadap beberapa lembaga pemerintah, perusahaan, dan organisasi bisnis lainnya.
  4. Asal kata data dari bahasa latin
  5. Sifat data yang berarti menggambarkan sesuatu
  6. Era peretasan 1, preretas disebut...
  7. Program komputer yang mampu menyalin dirinya sendiri ke komputer lain.
  8. Sifat data yang berupa numerik (angka)
  9. Usaha untuk memikat pengguna internet untuk masuk ke situs web palsu.
  10. Salah satu media sosial yang berlogo kamera.
  11. Akronim Robot dan network.
  12. Objek untuk mengontrol akses ke informasi atau sumber daya lain.
  13. Salahsatu sifat informasi

21 Clues: PeretasanPeretas topi hitamSalahsatu sifat informasiAkronim Robot dan network.Keamanan informasi InternetBadan Siber dan Sandi NegaraAsal kata data dari bahasa latinEra peretasan 1, preretas disebut...Sifat data yang berupa numerik (angka)Salah satu media sosial yang berlogo kamera.Sifat data yang berarti menggambarkan sesuatu...

Technology 2023-09-30

Technology crossword puzzle
Across
  1. Writing instructions for computers to execute specific tasks.
  2. Programs and applications that run on a computer.
  3. Devices with internet connectivity and the ability to interact with other devices or systems.
  4. Structured collection of data organized for efficient retrieval and management.
  5. Use of biological systems, organisms, or cells to develop products or technologies.
  6. Use of computers and software for various applications.
  7. Global system of interconnected computer networks.
  8. Study and manipulation of matter on an atomic and molecular scale.
  9. Creating physical objects from a digital model using successive layering of materials.
Down
  1. Step-by-step instructions for solving a particular problem or task.
  2. Technology that overlays digital information onto the real world.
  3. Development of computer systems that can perform tasks requiring human intelligence.
  4. Design, construction, operation, and use of robots.
  5. Protection of computer systems, networks, and data from theft or damage.
  6. Use of largely automatic equipment in a system of operation.
  7. Delivery of computing services over the internet.
  8. Physical components of a computer system.
  9. Computer-generated simulation of a three-dimensional environment.
  10. Transmission of information over a distance using electronic means.
  11. Unmanned aerial vehicles operated remotely or autonomously.

20 Clues: Physical components of a computer system.Programs and applications that run on a computer.Delivery of computing services over the internet.Global system of interconnected computer networks.Design, construction, operation, and use of robots.Use of computers and software for various applications....

Technology Careers 2025-05-13

Technology Careers crossword puzzle
Across
  1. When machines do tasks without human help
  2. Analyst Studies information to find patterns and answers
  3. Designer Designs how websites look and work
  4. A new and creative way of doing something
  5. Stores files on the internet, not on your device
  6. Developer Makes programs for smartphones and tablets
  7. Protects computers and data from hackers
  8. Support Helps people fix problems with their computers
  9. Uses electronic signals to store or send data
  10. Solves problems using science and technology
  11. Tools and machines created by people to solve problems
  12. Builds and programs robots to do tasks
  13. Stands for Science, Technology, Engineering, and Math
Down
  1. Writes instructions that tell computers what to do
  2. A small electronic tool or device
  3. Engineer Builds and manages computer networks
  4. Physical parts of a computer like a keyboard or screen
  5. A machine used for typing, games, and the internet
  6. Specialist Works with smart machines that can learn
  7. A place to store and organize lots of information
  8. Writing commands that computers can understand
  9. A global system that connects computers
  10. Support Helps people solve technology problems
  11. Developer Creates video games for computers and consoles
  12. Programs or apps used on computers and devices

25 Clues: A small electronic tool or deviceBuilds and programs robots to do tasksA global system that connects computersProtects computers and data from hackersWhen machines do tasks without human helpA new and creative way of doing somethingDesigner Designs how websites look and workSolves problems using science and technology...

TTS KATA ISTILAH TEKNOLOGI INFORMASI 2025-09-02

TTS KATA ISTILAH TEKNOLOGI INFORMASI crossword puzzle
Across
  1. Kumpulan data dalam jumlah sangat besar, kompleks, dan terus bertambah.
  2. Teknologi penyimpan data berbentuk rantai blok, dipakai misalnya pada Bitcoin
  3. Orang yang ahli komputer, kadang masuk ke sistem tanpa izin.
  4. Komputer jinjing yang bisa dibawa ke mana-mana
  5. Bidang ilmu yang fokus melindungi data dan sistem dari serangan digital.
  6. Benda buatan manusia yang ditempatkan di orbit untuk komunikasi atau pengamatan.
  7. Proses menemukan pola atau informasi tersembunyi dalam data besar.
  8. yang menciptakan pengalaman buatan seolah-olah nyata melalui perangkat khusus.
Down
  1. Proses mengirim file dari komputer lokal ke internet/server.
  2. Sistem keamanan yang menyaring lalu lintas jaringan komputer.
  3. Inovasi layanan finansial berbasis digital yang mengubah cara transaksi tradisional.
  4. Mata uang digital berbasis blockchain yang pertama kali diperkenalkan tahun 2009.
  5. Alat kecil di tangan untuk menggerakkan kursor
  6. Penghubung antara pengguna dengan komputer atau antar sistem.
  7. Peretas dengan tujuan merusak atau mencuri.
  8. Kumpulan data terstruktur yang disimpan secara sistematis di komputer.
  9. Upaya menipu pengguna agar memberikan data pribadi lewat email atau situs palsu.
  10. Kesalahan dalam kode program yang menyebabkan sistem tidak berjalan semestinya.
  11. Menonton atau mendengar langsung lewat internet tanpa download
  12. Urutan langkah logis untuk menyelesaikan suatu masalah.
  13. Dunia maya 3D tempat orang bisa berkumpul lewat internet

21 Clues: Peretas dengan tujuan merusak atau mencuri.Alat kecil di tangan untuk menggerakkan kursorKomputer jinjing yang bisa dibawa ke mana-manaUrutan langkah logis untuk menyelesaikan suatu masalah.Dunia maya 3D tempat orang bisa berkumpul lewat internetProses mengirim file dari komputer lokal ke internet/server....

Vocabulary Power 3 Chapters 13-15 2024-10-17

Vocabulary Power 3 Chapters 13-15 crossword puzzle
Across
  1. The ___ reason for the meeting was to discuss budget cuts for the upcoming quarter.
  2. He missed several deadlines, and ___, the client decided to terminate the contract.
  3. The charity aims to ___ awareness of mental health issues through social media campaigns.
  4. She was ___ to accept the job offer because it required relocating to another country.
  5. Cybersecurity falls under the ___ of the IT department in most companies.
Down
  1. Climate change has had a ___ impact on the global ecosystem.
  2. Many people ___ their success to hard work and perseverance.
  3. The new shopping mall will ___ a large portion of the town’s commercial area.
  4. The investigative journalist sought to ___ corruption within the government.
  5. In this project, your ___ will be to manage the team's schedule and deliverables.
  6. After months of negotiations, the company finally agreed to ___ the confidential documents.
  7. Strict deadlines often ___ creativity in high-pressure work environments.

12 Clues: Climate change has had a ___ impact on the global ecosystem.Many people ___ their success to hard work and perseverance.Strict deadlines often ___ creativity in high-pressure work environments.Cybersecurity falls under the ___ of the IT department in most companies.The investigative journalist sought to ___ corruption within the government....

Malwarebytes 2022-10-13

Malwarebytes crossword puzzle
Across
  1. Apple's personal computer
  2. programs that include rogue advertising, toolbars and pop-ups
  3. a code made up of an array of black and white squares, used a lot during the Covid Pandemic
  4. best cybersecurity in the world
  5. malicious software that keeps your files hostage while requesting money
  6. undesired email communication, often sent out in bulk
  7. security mechanism that analyses all the traffic that enters and exits your network
  8. compressed file
  9. small pieces of information that a web browser generates (also great with chocolate chips)
  10. removed malicious files found by Malwarebytes are placed in this safe location
Down
  1. browser that's used the most
  2. malicious program that disguises itself inside real looking files and downloads
  3. group of computers under the same admin
  4. malicious software that tries to gather information and pass it on to another entity
  5. malicious software
  6. malware that's attached to another program and replicates and spreads itself
  7. provides secure connection to the internet by encrypting your traffic. (also great to use for watching foreign tv)
  8. the full link to a website
  9. company that provides users with internet services
  10. blocks advertisements
  11. fake or false warning

21 Clues: compressed filemalicious softwareblocks advertisementsfake or false warningApple's personal computerthe full link to a websitebrowser that's used the mostbest cybersecurity in the worldgroup of computers under the same admincompany that provides users with internet servicesundesired email communication, often sent out in bulk...

Wraiths & Words: A Haunted Mansion Challenge 2023-09-21

Wraiths & Words: A Haunted Mansion Challenge crossword puzzle
Across
  1. Found in the graveyard
  2. Creepy statues
  3. Deceptive email pr@ctice
  4. Cybersecurity measure
  5. Malicious software
  6. Network of infected computers
  7. Mansion staff member
  8. En7ry k3y
  9. Mansion's signature tune (3 wds)
  10. Home of 999 happy haunts
  11. KN2G64TBM5SSAZTPOIQGCIDIMVQWILBAMFRWG33SMRUW4ZZAORXSA5DIMUQEQYLVNZ2GKZBAJVQW443JN5XA====
  12. Extra layer of security
  13. Voiced of several characters in the Haunted Mansion
  14. Haunted Mansion's musical instrument
  15. Changing image in Haunted Mansion
  16. What three ghosts do
  17. Protection software
  18. To take advantage of a security flaw
  19. Mansion decor
  20. Unauthorized computer user
Down
  1. Taunt at the Haunted Mansion (2wds)
  2. 55 6e 77 61 6e 74 65 64 20 65 6d 61 69 6c
  3. Where portraits lengthen (2 wds)
  4. Unauthorized access
  5. 73 110 116 101 114 110 101 116 32 105 100 101 110 116 105 102 105 99 97 116 105 111 110
  6. Boo!
  7. U2VhbmNlLWhvbGRpbmcgbWVkaXVtIGF0IEhhdW50ZWQgTWFuc2lvbg==
  8. Digital offensive
  9. Mansion's grand
  10. Mansion finale
  11. S3lf-r3plicating
  12. Haunted Mansion newspaper column
  13. Security weak point
  14. Malicious software demanding payment
  15. Mansion ride vehicle
  16. To fix a flaw
  17. Authentication via physical traits
  18. Contacting the dead
  19. Web tracking item
  20. Haunted Mansion location with a bride

40 Clues: Boo!En7ry k3yTo fix a flawMansion decorCreepy statuesMansion finaleMansion's grandS3lf-r3plicatingDigital offensiveWeb tracking itemMalicious softwareUnauthorized accessSecurity weak pointContacting the deadProtection softwareMansion staff memberMansion ride vehicleWhat three ghosts doCybersecurity measureFound in the graveyard...

RU ITEC411 - Chapter 5 - Crime and Security 2025-04-21

RU ITEC411 - Chapter 5 - Crime and Security crossword puzzle
Across
  1. A hidden method to bypass security and access a system.
  2. A network of infected devices controlled by hackers.
  3. Redirecting users to fake websites to steal their data.
  4. Manipulating people into revealing confidential data.
  5. An attack that floods a system with traffic to crash it.
  6. Any software designed to harm or exploit systems.
  7. Stealing someone’s personal information to impersonate them.
  8. Software that secretly gathers user information without consent.
  9. Sending fake messages to trick people into giving away private information.
  10. A harmful program disguised as a legitimate one.
  11. A program that spreads by copying itself without needing a host file.
  12. A team that responds to major cybersecurity incidents.
Down
  1. Phishing attacks carried out through text messages.
  2. Using hacking for political activism or protest.
  3. A serious security flaw in encryption software that exposed user data.
  4. Gaining unauthorized access to computer systems.
  5. The process of scrambling data to protect it from unauthorized access.
  6. An unmanned aerial device that can be vulnerable to hacking.
  7. Malware that locks files and demands payment to unlock them.
  8. Malicious software that attaches itself to programs and spreads when they run.

20 Clues: Using hacking for political activism or protest.Gaining unauthorized access to computer systems.A harmful program disguised as a legitimate one.Any software designed to harm or exploit systems.Phishing attacks carried out through text messages.A network of infected devices controlled by hackers.Manipulating people into revealing confidential data....

Xalqaro iqtisodiy tashkilotlar faoliyatida OAV (ommaviy axborot vositalari) va axborot texnologiyalari o‘rni 2025-12-06

Xalqaro iqtisodiy tashkilotlar faoliyatida OAV (ommaviy axborot vositalari) va axborot texnologiyalari o‘rni crossword puzzle
Across
  1. – Shaxsiy yoki tashkilot tomonidan onlayn tarzda yangiliklar, fikrlar va maqolalar e’lon qilinadigan platforma nima?
  2. – Moliyaviy va iqtisodiy beqarorlikni ifodalovchi holat nima?
  3. – OAV vositalaridan biri, televizor orqali ma’lumot tarqatiladi. Bu nima?
  4. – Markaziy va Sharqiy Yevropada iqtisodiy loyihalarni moliyalashtiruvchi bank nomi nima?
  5. – Ma’lumotlarni tahlil qilish va natijalarni baholash jarayoni nima?
  6. – Axborot texnologiyalarining eng asosiy global tarmog‘i nima?
  7. – Davlatlar o‘rtasida erkin savdoni rag‘batlantiruvchi tashkilot nima?
  8. – Muloqot va axborot almashish uchun ishlatiladigan mashhur messenjer nomi?
  9. – Smartfon va planshetlarda ishlaydigan dasturiy ilova nima?
  10. konferensiya – Tashkilotlar va davlatlar o‘rtasida muhim iqtisodiy masalalarni muhokama qiladigan yig‘ilish nima?
  11. – Axborot texnologiyalarida ma’lumotlarni raqamli shaklda ifodalash uchun ishlatiladigan atama nima?
Down
  1. – Axborot texnologiyalarida ma’lumotlarni himoya qilish va xakerlik hujumlaridan saqlash tizimi nima?
  2. – Xalqaro tashkilotlar tomonidan iqtisodiy loyihalarni qo‘llab-quvvatlash uchun ajratiladigan mablag‘ nima?
  3. – Ommaviy axborot vositalaridan biri, ovoz orqali yangiliklar tarqatadi. Bu nima?
  4. – Axborot texnologiyalarida foydalanuvchilar uchun xizmat ko‘rsatadigan dasturiy muhit nima?
  5. – Rivojlanayotgan davlatlarga investitsiya va kredit ajratuvchi xalqaro tashkilot?
  6. – OAVda voqea yoki yangilikni batafsil yorituvchi material nima?
  7. – Onlayn tarzda audio yoki video tarkibni uzatish texnologiyasi nima?
  8. – Global moliyaviy barqarorlikni ta’minlovchi xalqaro tashkilot nima?
  9. – Tashkilot yoki kompaniya tomonidan ommaviy axborot vositalariga tarqatiladigan rasmiy bayonot nima?

20 Clues: – Smartfon va planshetlarda ishlaydigan dasturiy ilova nima?– Moliyaviy va iqtisodiy beqarorlikni ifodalovchi holat nima?– Axborot texnologiyalarining eng asosiy global tarmog‘i nima?– OAVda voqea yoki yangilikni batafsil yorituvchi material nima?– Ma’lumotlarni tahlil qilish va natijalarni baholash jarayoni nima?...

IT Systems and Security 2025-07-21

IT Systems and Security crossword puzzle
Across
  1. Ranking tasks or risks by importance
  2. Public perception that can be damaged by breaches
  3. A fine or consequence for non-compliance
  4. I am harmful
  5. System settings that affect performance
  6. Programs and applications
  7. loss Critical information is erased or inaccessible
  8. The users who interact with and operate in an environment
  9. How often a certain risk or issue occurs
  10. Ordering risks based on severity and likelihood
  11. Numerical estimate of potential loss
  12. Unintentional harmful events affecting systems
  13. You need to identify this before setting up an IS
  14. Likelihood of a specific event occurring
  15. Flaws that can be exploited by threats
Down
  1. Organized collections of structured information
  2. Physical parts of a computer or system
  3. I am important for your network
  4. Example: Routers, switches, cables in connectivity, etc.
  5. disasters Earthquakes or floods that disrupt systems
  6. Enhancements to improve system
  7. Evaluation of consequences of an incident
  8. What do you do after completing a task?
  9. Gaps in security or system design
  10. Series of steps to accomplish tasks in systems
  11. System A coordinated set of components to manage data
  12. What else do you need other than physical components?
  13. Period when a system is unavailable/offline

28 Clues: I am harmfulPrograms and applicationsEnhancements to improve systemI am important for your networkGaps in security or system designRanking tasks or risks by importanceNumerical estimate of potential lossPhysical parts of a computer or systemFlaws that can be exploited by threatsSystem settings that affect performance...

Information Technology Terminology 2026-01-05

Information Technology Terminology crossword puzzle
Across
  1. – Temporary memory that helps the computer run programs.
  2. – A secure connection that protects data when using the internet.
  3. – A group of computers connected to share data and resources.
  4. System – Software that manages a computer’s hardware and programs.
  5. – A copy of data saved in case the original is lost.
  6. – Protecting computers and data from unauthorized access.
  7. – Software designed for a specific task, like writing or browsing.
  8. – Where data is saved long-term on a computer.
  9. – A secret word or code used to access a system.
  10. – A container used to organize files.
  11. – A single collection of information stored on a computer.
Down
  1. – The physical parts of a computer you can touch.
  2. – The global system of interconnected computer networks.
  3. – A way of changing data so only authorized people can read it.
  4. Computing – Using online services to store and access data and programs.
  5. – Programs that tell the computer what to do.
  6. – The “brain” of the computer that performs calculations.
  7. – A set of instructions for solving a problem or completing a task.
  8. – An electronic device that processes and stores information.
  9. – Raw facts or information that can be processed by a computer.

20 Clues: – A container used to organize files.– Programs that tell the computer what to do.– Where data is saved long-term on a computer.– A secret word or code used to access a system.– The physical parts of a computer you can touch.– A copy of data saved in case the original is lost.– Temporary memory that helps the computer run programs....

Cybersecurity 2 2022-09-27

Cybersecurity 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paidA ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system....

Cybersecurity Jargons 2024-10-18

Cybersecurity Jargons crossword puzzle
Across
  1. private network that creates a secure and encrypted connection over the internet between a user’s device and a remote server.
  2. a network of compromised computers, often referred to as "zombies," controlled remotely by a malicious actor
  3. is a type of malware that replicates itself to spread to other computers.
Down
  1. malicious software that encrypts the victim's data, rendering it inaccessible until a ransom is paid, usually in cryptocurrency.
  2. process of converting information or data into a code, especially to prevent unauthorized access.

5 Clues: is a type of malware that replicates itself to spread to other computers.process of converting information or data into a code, especially to prevent unauthorized access.a network of compromised computers, often referred to as "zombies," controlled remotely by a malicious actor...

Cybersecurity Crossword- Parts of a Cumputer 2025-11-10

Cybersecurity Crossword- Parts of a Cumputer crossword puzzle
Across
  1. Specialized processor that handles graphics and videos, and calculates multiple things at once.
  2. The main circuit of the computer which connects everything like memory, graphics cards, power, and the CPU.
  3. Wire that connects devices physically to the routers
  4. A computer’s network adapter which allows it to connect to the internet/local network
  5. Computer’s hardware that displays images, videos, etc. onto the screen
  6. The first software that runs as soon as a computer starts up.
  7. Computer’s short term and high speed working memory and holds memory that the CPU is actively using
  8. Offers a faster and smoother experience which initializes hardware and boots the operating system.
  9. Type of computer storage that uses microchips to save data
Down
  1. A computer’s long term storage and it holds data even when the power is off
  2. Outer shell of the computer which holds all of the internal parts together.
  3. Wireless tech that connects devices to one another using radio waves
  4. Transmits data using light through thin glass or plastic fibers
  5. Piece of hardware used for long term storage device for all digital content and data on computers
  6. Data storage in a computer
  7. The main part of the computer which executes instructions from programs and performs calculations
  8. Portable storage devices that can be inserted into and removed from a computer
  9. Connection used to plug devices like keyboards, mice, flash drives, etc. into computers
  10. Small and fast temporary storage which holds memory that is frequently used so the computer processes quicker

19 Clues: Data storage in a computerWire that connects devices physically to the routersType of computer storage that uses microchips to save dataThe first software that runs as soon as a computer starts up.Transmits data using light through thin glass or plastic fibersWireless tech that connects devices to one another using radio waves...

FITE: Vocab. DB 2013-05-16

FITE: Vocab. DB crossword puzzle
Across
  1. how safe your computer is online
  2. iphone
  3. how safe you are online
  4. the brain of the computer
  5. something you use to find info
  6. how you connect to the internet
  7. screen
  8. something you use like a monitor so you can see stuff in the computer
  9. comcast
  10. the wiring inside a computer
  11. wireless internet
  12. touch pad
  13. where headphones go
  14. apps for computer
  15. wired internet
Down
  1. online server
  2. dsl cable
  3. a catchy phrase used by companies
  4. short term memory or ram on a computer
  5. attachments for a computer
  6. brings up different search engine info
  7. something you send to a business to get a job
  8. how you act online
  9. the heart of the computer
  10. non wired internet
  11. something you type on
  12. places in the computer for flash drives
  13. the speed inside your computer
  14. microsoft word
  15. place for a cd on a computer
  16. something you use to put stuff into the computer
  17. an emblem for a company
  18. something that catches your eye to make you interested in a company
  19. a place to keep things
  20. flash drive slot
  21. tall modem (box) for desktop computer

36 Clues: iphonescreencomcastdsl cabletouch padonline servermicrosoft wordwired internetflash drive slotwireless internetapps for computerhow you act onlinenon wired internetwhere headphones gosomething you type ona place to keep thingshow safe you are onlinean emblem for a companythe brain of the computerthe heart of the computerattachments for a computer...

IT Networking Terms 2023-09-07

IT Networking Terms crossword puzzle
Across
  1. a set of computers sharing resources provided by nodes
  2. an independent U.S.A agency that is a part of the government and enforces consumer protection
  3. hardware such as computers an
  4. the process of a fraudulent scheme
  5. a U.S agency that promotes American innovation
  6. a government agency that supports small businesses
  7. a person who is hired for a salary that is also not at an executive level
  8. the center of your network that serves as the main connecting point for all of your devices
  9. converting data into a code
  10. electronics that allow you to access the internet like smartphones, laptops and tablets
  11. an an encrypted security protocol that protects internet traffic on wireless networks
Down
  1. the ability to have physical access to a computer system
  2. the process of copying files over to a secondary loin case in case of equipment failure
  3. a federal executive department that is responsible for public security
  4. a layered approach to protecting data and applications
  5. a container for storing data on a computer
  6. practice of protecting data from hackers
  7. programs used by a computer
  8. a structure used to build software on
  9. a string of special characters used to allow access to a computer service

20 Clues: programs used by a computerconverting data into a codehardware such as computers anthe process of a fraudulent schemea structure used to build software onpractice of protecting data from hackersa container for storing data on a computera U.S agency that promotes American innovationa government agency that supports small businesses...

THE INTERNET 2023-09-19

THE INTERNET crossword puzzle
Across
  1. Secret code to access protected online accounts?
  2. The device that connects a computer to the internet?
  3. The term for online storage and computing resources accessible via the internet?
  4. Transferring files from the internet to a device?
  5. Method of watching/listening to media content online in real-time?
  6. Wireless technology that allows internet access?
  7. Action of looking for information on the web?
  8. The term for online platforms for connecting with others?
  9. Symbol used to categorize and search for topics on social media?
  10. the harmful behavior of using the internet to harass others?
Down
  1. The process of converting data into a code to secure it during transmission?
  2. Security system that blocks unauthorized access to a network?
  3. The practice of protecting computer systems and networks from online threats?
  4. An online seminar/presentation conducted over the internet?
  5. Electronic communication system for sending messages over the internet?
  6. Software used to access and view web pages?
  7. A collection of web pages accessible via the internet?
  8. Device that directs internet traffic to various devices in a network?
  9. A unique address used to locate a website on the web?
  10. The term for content that spreads rapidly across the internet?

20 Clues: Software used to access and view web pages?Action of looking for information on the web?Secret code to access protected online accounts?Wireless technology that allows internet access?Transferring files from the internet to a device?The device that connects a computer to the internet?A unique address used to locate a website on the web?...

Famous Entrepreneurs 2024-02-14

Famous Entrepreneurs crossword puzzle
Across
  1. Caused Chanel to temporarily close her business
  2. One of Microsoft's goals
  3. Tesla faced these types of challenges
  4. Age of Warren Buffet when he made his 1st investment
  5. The percentage that Nike owns of the shoe industry
  6. Premier League football club formally owned by Roman Arkadyevich
  7. Founder of Chanel (first name)
  8. A deal with ____ led Microsoft to release the Windows Operating System
  9. Bill Gates attended this university
  10. The former name of Marvel
  11. Africa, Elon Musk was born in (2 words)
  12. Original name for Nike (3 words)
  13. Dr. Dre partnered with this fashion brand
Down
  1. Phil _____ founder of Nike
  2. Founder of Beats headphones (2 words)
  3. Fast fashion brands create these based on Chanel designs (2 words)
  4. Steve ____ is the co-founder of Apple
  5. Stan Lee created the _____ Four with his friend
  6. Roman Arkadyevich was raised by his______
  7. Company co-founded by Musk focused on artificial intelligence
  8. Warren Buffet was born in Omaha,___________
  9. Jobs developed Apple because he could not_____ a personal computer
  10. The 2008 Financial _____ was a big challenge for Buffet
  11. Stan Lee is the founder of this company
  12. Jimmy ______: Partner with Dr. Dre for Beats

25 Clues: One of Microsoft's goalsThe former name of MarvelPhil _____ founder of NikeFounder of Chanel (first name)Original name for Nike (3 words)Bill Gates attended this universitySteve ____ is the co-founder of AppleTesla faced these types of challengesFounder of Beats headphones (2 words)Stan Lee is the founder of this company...