cybersecurity Crossword Puzzles
Criminal Justice Careers 2024-05-07
Across
- An investigator who collects information to solve crimes
- This type of officer works to prevent the distribution and use of illegal drugs
- Maintains order in courtrooms
- This agent monitors US borders for illegal activity
- Those responsible for managing wildlife are fish and game...
- This type of psychologist studies human behavior in connection with crime
- Use their knowledge of insects to help in investigations
- A person who advises and represents another in legal matters
- Study skeletal remains to help in investigations
Down
- People who want to protect the US from digital attacks should go into...
- This type of officer supervises and maintains order in prisons
- Support victims of crime
- Provide investigators with a psychological/physical description of a suspect
- This investigator collects evidence at crime scenes
- Enforce laws and protect citizens by patrolling and responding to crimes
- Assists attorneys
- Preside over trials
- A person who investigates financial statements to look for fraud is a forensic...
- Enforces laws and monitors safety on roads and highways
- This type of officer supervises convicted criminals who have been given an alternative sentence
- An individual who works in the FBI to protect the US from organized crime, terrorism and more
21 Clues: Assists attorneys • Preside over trials • Support victims of crime • Maintains order in courtrooms • Study skeletal remains to help in investigations • This investigator collects evidence at crime scenes • This agent monitors US borders for illegal activity • Enforces laws and monitors safety on roads and highways • An investigator who collects information to solve crimes • ...
Mr. Singer's Technology Crossword 2023-02-04
Across
- - A path for electricity to flow
- - a device that forwards data between networks
- - A collection of related data
- - Software that manages the resources of a computer
- - Information that is stored and processed by a computer
- - A visual way of interacting with a computer
- - A global network of connected devices
- - The last name of your technology teacher
- - Software that translates code into machine language
- - A type of networking protocol used to connect devices
- - A language used to create websites
- - A virtual place to store and access data and programs over the Internet
Down
- - The central processing unit, or "brain," of a computer
- - A unit of measurement for digital information
- - Data that is entered into a computer
- - Measures taken to protect against online threats
- - Finding and fixing errors in code
- - A brand of 3D design software
- - A coding platform that utilizes blocks instead of text
- - A set of steps for solving a problem or achieving a goal
- - A program that can harm a computer or steal information
- - A security system that blocks unauthorized access to a network
- - A system of numbers using only two digits, 0 and 1
23 Clues: - A collection of related data • - A brand of 3D design software • - A path for electricity to flow • - Finding and fixing errors in code • - A language used to create websites • - Data that is entered into a computer • - A global network of connected devices • - The last name of your technology teacher • - A visual way of interacting with a computer • ...
L&M Wedding Trivia 2025-01-06
Across
- Luke's birthday month
- Current age of both Luke and Mina
- Photographer's name
- Best man's name
- Mina's middle name
- Accent stones in their rings
- Luke's favorite musical composition (hint: planet)
- Mina's favorite food (hint: Wisconsin)
- Name of a coffee shop they frequented during college
- Mina's college major
- Location of their first date
- Luke's middle name
- Mina's birthday month
- One of Luke's hobbies is solving ______ cubes
- Maid of honor's name
- State where Luke grew up
- Luke's college dorm for 3 years
Down
- One of Mina's hobbies is making _______ snowflakes
- The first class they had together was taught by Dr. ________
- Where they went to college
- Maximum length (in hours) of their long distance calls before automatic disconnection
- Name of both Luke's and Mina's fathers
- Their favorite TV show
- Their favorite grocery store
- State where Mina grew up
- Mina's favorite language to study
- Luke's first college major
- Officiant's name
- Month they got engaged
- Month they started dating
- State where they will live
- Luke's favorite food (hint: breakfast)
- Mina's college dorm for 3 years
- State where they met
34 Clues: Best man's name • Officiant's name • Mina's middle name • Luke's middle name • Photographer's name • Mina's college major • Maid of honor's name • State where they met • Luke's birthday month • Mina's birthday month • Their favorite TV show • Month they got engaged • State where Mina grew up • State where Luke grew up • Month they started dating • Where they went to college • ...
Tugas Daring Informatika Muhammad Ardhani (X-I/23) 2025-04-11
Across
- Media sosial berbagi foto atau video budaya?
- Profesi yang melindungi sistem dari serangan hacker?
- Profesi yang membuat aplikasi atau software?
- Media penyebaran konten digital berbentuk video?
- Profesi yang mendesain tampilan aplikasi?
- Fitur untuk memblokir konten negatif secara otomatis?
- Profesi yang menganalisis dan mengolah data?
- Pelanggaran HAKI karena meniru karya orang lain disebut?
- Istilah untuk berita palsu atau tidak benar?
- Tujuan utama pembuatan konten digital budaya?
- Salah satu bentuk konten digital berisi gambar dan tulisan?
- Search engine yang dulu banyak digunakan sebelum Google?
- Perlindungan untuk nama dan logo usaha?
- Search engine buatan Microsoft?
Down
- Apa yang digunakan untuk mencari informasi di search engine?
- Hal utama yang harus dicek untuk validasi konten?
- Profesi di bidang digital yang membuat konten online?
- Perlindungan untuk penemuan teknologi atau alat baru?
- Tempat mencari informasi percaya?
- Sebutan lain untuk search engine?
- Izin resmi untuk menggunakan karya orang lain?
- Profesi yang membuat dan merawat website?
- Tindakan jika menemukan konten negatif di internet?
- Search engine paling populer saat ini?
- Perlindungan untuk karya lagu, tulisan, dan film?
- Contoh budaya Indonesia yang bisa dijadikan konten digital?
26 Clues: Search engine buatan Microsoft? • Tempat mencari informasi percaya? • Sebutan lain untuk search engine? • Search engine paling populer saat ini? • Perlindungan untuk nama dan logo usaha? • Profesi yang mendesain tampilan aplikasi? • Profesi yang membuat dan merawat website? • Media sosial berbagi foto atau video budaya? • Profesi yang membuat aplikasi atau software? • ...
TTS_RafiFahruddin_29XH 2025-04-15
Across
- Profesi yang membuat animasi dan desain digital.
- Hak untuk menggandakan dan menyebarkan karya.
- Profesional yang menjaga keamanan sistem jaringan.
- Informasi bohong yang sengaja disebarkan.
- Proses mengecek kebenaran suatu informasi.
- Platform populer untuk membagikan video digital.
- Aplikasi sosial media tempat berbagi foto dan cerita.
- Konten yang menggambarkan adat, seni, atau bahasa daerah disebut konten
- Profesi yang bertanggung jawab atas perawatan dan pengelolaan jaringan komputer.
- Platform tempat konten negatif sering tersebar.
Down
- Jenis hak kekayaan intelektual untuk logo dan nama dagang
- Informasi digital yang belum tentu benar disebut.
- Orang yang menulis dan mengembangkan kode program.
- Mesin pencari milik China yang tidak menggunakan Google
- Proses menciptakan konten digital seperti video, artikel, atau gambar
- Orang yang menganalisis dan mengolah data digital.
- Fitur yang digunakan untuk membatasi pencarian ke satu situs saja, misalnya: site:cnn.com
- Informasi digital yang belum tentu benar disebut.
- Proses penyebaran konten ke masyarakat luas.
- Search engine yang identik dengan logo huruf “Y” ungu
- Surat resmi yang menyatakan kepemilikan paten atau hak cipta.
- Singkatan dari Hak Atas Kekayaan Intelektual.
- Mesin pencari paling populer
- Istilah untuk pencurian karya orang lain tanpa izin.
- Situs web buatan Microsoft yang juga berfungsi sebagai search engine
25 Clues: Mesin pencari paling populer • Informasi bohong yang sengaja disebarkan. • Proses mengecek kebenaran suatu informasi. • Proses penyebaran konten ke masyarakat luas. • Hak untuk menggandakan dan menyebarkan karya. • Singkatan dari Hak Atas Kekayaan Intelektual. • Platform tempat konten negatif sering tersebar. • Profesi yang membuat animasi dan desain digital. • ...
Scientific Discoveries and Inventions 13 2024-11-03
Across
- "The study of landforms and the processes that shape them."
- "The protection of digital data and systems from cyber attacks."
- "A particle representing a quantum of light or other electromagnetic radiation."
- "The preservation of humans at low temperatures for possible revival."
- "The breakdown of organic substances by natural organisms."
- "The science of creating three-dimensional images with laser technology."
- "The removal of tissue for diagnostic examination."
- "An unstable isotope that decays, emitting radiation."
- "The ability to meet current needs without compromising future resources."
Down
- "The study of life in the universe beyond Earth."
- "The study of the mechanics of living organisms and their movements."
- "The scientific study of animal biology."
- "The branch of biology dealing with hormones and glands."
- "The science of designing equipment to fit the human body."
- "A parasitic disease caused by Toxoplasma gondii, often in animals."
- "The study of electronic properties of materials at low temperatures."
- "Organelles known as the 'powerhouses' of cells, producing energy."
- "A method of growing plants in a water-based solution, without soil."
- "A technique that modifies genes to treat or prevent disease."
- "A force that makes a body follow a curved path toward the center."
20 Clues: "The scientific study of animal biology." • "The study of life in the universe beyond Earth." • "The removal of tissue for diagnostic examination." • "An unstable isotope that decays, emitting radiation." • "The branch of biology dealing with hormones and glands." • "The study of landforms and the processes that shape them." • ...
Industrial security 2025-10-15
Across
- – A weakness that can be exploited by threats.
- – A prepared procedure to handle emergencies or disasters.
- – Device that signals when unauthorized access occurs.
- – Continuous observation of people or areas for security purposes.
- – Protection of computer systems from digital attacks.
- – The process of identifying and evaluating potential hazards.
- – A set of rules and guidelines for security operations.
- – The act of stealing small quantities or low-value items from the workplace.
- – A person employed to protect property and personnel.
- – The routine inspection of areas to ensure safety and security.
Down
- – Unauthorized entry into a restricted area.
- – A designated safe route used during an evacuation.
- – A badge used for identification and access within a facility.
- – A potential cause of unwanted incident or harm.
- – The act of keeping people and assets safe from harm.
- – Written documentation of a security event or breach.
- – Security measure restricting movement due to threats.
- – A system that uses video cameras to monitor and record activities.
- – A system that restricts entry to authorized personnel only.
- – The deliberate destruction or disruption of industrial operations.
20 Clues: – Unauthorized entry into a restricted area. • – A weakness that can be exploited by threats. • – A potential cause of unwanted incident or harm. • – A designated safe route used during an evacuation. • – The act of keeping people and assets safe from harm. • – Written documentation of a security event or breach. • ...
VCE Computing Glossary 2025-11-18
Across
- Protecting systems and data from threats.
- English-like statements representing algorithms.
- Graphical representations of complex data or information that provide an overview of a topic
- A process used when developing solutions to identify and fix errors
- Making a copy of data for recovery in case of loss.
- Planning tasks timelines and milestones for projects.
- Testing carried out by developers in a controlled environment during development.
- Testing by end-users under real conditions after development.
- Moving old data to long-term storage.
- Encoding data to prevent unauthorized access.
Down
- Data collected by researchers directly from sources using methods such as surveys, interviews and observations
- Data Data collected by someone else for a different purpose.
- Generating and evaluating innovative ideas for solutions.
- Data Data collected first-hand by the researcher.
- Checking data for accuracy and consistency after entry.
- Consideration of how users perceive and respond when interacting with a digital system
- Common standards for consistency in solutions.
- Describes the overall accuracy, authenticity, correctness, reasonableness, relevance and timeliness of data
- Issues that arise that challenge moral standards, principles or expectations
- Checking data for reasonableness and completeness before processing.
20 Clues: Moving old data to long-term storage. • Protecting systems and data from threats. • Encoding data to prevent unauthorized access. • Common standards for consistency in solutions. • English-like statements representing algorithms. • Data Data collected first-hand by the researcher. • Making a copy of data for recovery in case of loss. • ...
DAMPAK SOSIAL INFORMATIKA 2026-01-24
Across
- Penyebaran konten pribadi tanpa izin korban
- Ancaman yang dilakukan melalui internet
- Dampak negatif penggunaan teknologi berlebihan
- Tindakan menyerang korban secara terus-menerus melalui dunia maya
- Orang yang membobol sistem keamanan
- Jaringan global yang menghubungkan jutaan komputer
- Media untuk berbagi informasi secara online
- Pesan menyakitkan yang dikirim secara online
- Proses mengubah data agar tidak mudah dibaca
- Perilaku agresif di internet yang dilakukan secara berkelompok
- Pengaruh positif teknologi dalam mempermudah komunikasi
- Dampak teknologi yang mengurangi interaksi langsung
- Program jahat yang merusak sistem
- Perangkat lunak berbahaya yang mengunci data dan meminta tebusan
- Aplikasi untuk melindungi komputer dari virus
Down
- Upaya penipuan melalui email atau pesan
- Perilaku menghargai orang lain di dunia digital
- Kebijakan pengelolaan dan perlindungan data pribadi pengguna
- Kemampuan menggunakan teknologi dengan bijak
- Alat elektronik untuk mengolah informasi
- Kata sandi untuk mengamankan akun
- Perundungan yang terjadi di dunia maya
- Proses belajar menggunakan teknologi
- Tindakan mencuri data secara ilegal
- Perlindungan data dari akses tidak sah
- Perubahan perilaku masyarakat akibat teknologi
- Bentuk cyber bullying dengan menyamar sebagai orang lain
- Dampak psikologis jangka panjang akibat cyber bullying
- Jenis malware yang menyebar sendiri
29 Clues: Kata sandi untuk mengamankan akun • Program jahat yang merusak sistem • Orang yang membobol sistem keamanan • Tindakan mencuri data secara ilegal • Jenis malware yang menyebar sendiri • Proses belajar menggunakan teknologi • Perundungan yang terjadi di dunia maya • Perlindungan data dari akses tidak sah • Upaya penipuan melalui email atau pesan • ...
Cryptography Crossword Puzzle 2020-06-15
Across
- a type of cipher that's based on A's and B's and sounds like a breakfast food
- a job that you can do once you learn a lot about cryptography
- the art of writing and solving coded messages
- a type of cipher that uses symbols to represent letters and sounds like an animal
- when you take a normal message and put it into code
- another word for a secret coded message
Down
- a type of cipher that replaces regular letters with scrambled letters
- the first cipher ever made and sounds like a healthy lunch food
- the field that protects against electronic attacks
- when you solve a coded message and and find the true meaning
- a tool we use to solve and create coded messages and sounds like a job
- the regular alphabet you use everyday
12 Clues: the regular alphabet you use everyday • another word for a secret coded message • the art of writing and solving coded messages • the field that protects against electronic attacks • when you take a normal message and put it into code • when you solve a coded message and and find the true meaning • a job that you can do once you learn a lot about cryptography • ...
Malware Monthly June 2022 2022-07-06
Across
- Russian backed group attacking Lithuania
- This countries government was hit hard by Conti's "big finale"
- What tab in the Nebula interface allows you to monitor and export data?
- Automatically identify these with OneView
- Cybersecurity vendors identified an increase of ????% in the use of Microsoft Excel macros compared to the fourth quarter 2021.
Down
- One of the gangs empowered by the fall of Conti.
- Type of software scan used to identify vulnerabilities in OneView
- DNS Blocking default setting on security categories
- Process used by scammers to steal credit card numbers and credentials in fake Instagram plot.
- One of the gangs empowered by the fall of Conti.
- This, thought dead, botnet is back and was the top global threat of April, according to Check Point.
- One of the gangs empowered by the fall of Conti.
- Lithuania blocked shipments of goods to this Russian enclave
- Type of Instagram account created by scammers to fool friends of the victim into interacting with it.
14 Clues: Russian backed group attacking Lithuania • Automatically identify these with OneView • One of the gangs empowered by the fall of Conti. • One of the gangs empowered by the fall of Conti. • One of the gangs empowered by the fall of Conti. • DNS Blocking default setting on security categories • Lithuania blocked shipments of goods to this Russian enclave • ...
Security - Hard 2023-11-28
Across
- practice of intentionally and ethically hacking into systems to discover vulnerabilities
- cryptographic protocol providing secure key exchange over an untrusted network, often used in VPNs
- security model emphasizing the importance of confidentiality, integrity, and availability of information
- type of attack involves capturing and analyzing network traffic to obtain sensitive information
- attack that employs multiple methods simultaneously
- type of malware changes its appearance and characteristics to evade detection
Down
- process of hiding information within another file or message
- cybersecurity principle ensuring that data is accurate, complete, and unaltered
- practice of disguising data traffic to make it look like normal traffic
- Linux user's favorite game
- cryptographic process verifying the integrity of data and ensures it has not been altered during transmission
- type of malware disguises itself as legitimate software to trick users into installing it
12 Clues: Linux user's favorite game • attack that employs multiple methods simultaneously • process of hiding information within another file or message • practice of disguising data traffic to make it look like normal traffic • type of malware changes its appearance and characteristics to evade detection • ...
Secure Your Screen Crossword Puzzle 2023-09-19
Across
- Personal ______ is any ______ that can be used to identify an individual, either on its own or in combination with other _______.
- A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
- A social _____ is someone who tries to manipulate or trick others into providing sensitive information or taking certain actions.
- Do Your Part to be Security ______
- Avoid sharing personal ____ information online.
- If you suspect a phishing email, you should ____ to cybersecurity.
Down
- Avoid Connecting to ____ WIFI.
- A type of phishing attack where malware are embedded in __ codes
- An easy tool to keep track of passwords
- Passwords with longer ______ are more difficult to crack.
- Text Message from someone pretending to be our CEO asking for a gift card
- Only download company ______ software
12 Clues: Avoid Connecting to ____ WIFI. • Do Your Part to be Security ______ • Only download company ______ software • An easy tool to keep track of passwords • Avoid sharing personal ____ information online. • Passwords with longer ______ are more difficult to crack. • A type of phishing attack where malware are embedded in __ codes • ...
CIEL1 Cybersecurity Crossword 2024-03-13
Across
- Intercepts traffic as it is sent over the network to collect names, passwords and other information.
- What using when we prove we be a real sender.
- which application use for see the different trams who circulate with the PC.
Down
- Sending an email seems reliable to obtain sensitive information on the target.
- What is a name of the cyber criminal.
- Transmits malicious scripts using clickable content sent to the target's browser.
- Held hostage until she agrees to pay the attacker a ransom.
7 Clues: What is a name of the cyber criminal. • What using when we prove we be a real sender. • Held hostage until she agrees to pay the attacker a ransom. • which application use for see the different trams who circulate with the PC. • Sending an email seems reliable to obtain sensitive information on the target. • ...
Cybersecurity & Internet Safety for Kids 2024-02-18
Across
- The use of technology to harass, intimidate, or harm others online.
- Tricky online deception.
- The process of converting information into a secret code to prevent unauthorized access.
- Options on your devices or apps that you can customize, such as privacy, security, and permissions to keep your information safe online.
- When someone tries to trick you into sharing personal information, like passwords or credit card numbers, by pretending to be someone you trust.
- Unknown person online.
- A security system that helps protect your computer or network from unauthorized access by blocking certain types of internet traffic.
Down
- When you add a location to your posts or pictures online.
- Polite behavior on the Internet.
- Software designed to detect and remove viruses and other types of malware from your computer or device.
- A type of malware that can copy itself and spread to other devices, causing harm to your computer or device.
- A secret word or phrase that you create to protect your online accounts from unauthorized access.
- Short for "malicious software," it refers to harmful software that can damage your computer or steal your information.
- Keeping personal information safe and not sharing it with strangers online.
14 Clues: Unknown person online. • Tricky online deception. • Polite behavior on the Internet. • When you add a location to your posts or pictures online. • The use of technology to harass, intimidate, or harm others online. • Keeping personal information safe and not sharing it with strangers online. • ...
Cybersecurity Vocab - Easy 2025-07-29
Across
- Someone that breaks into a computer or network
- A digital wall that keeps bad traffic out
- A mistake in a program that can cause problems
- Unwanted or junk messages, especially in email
Down
- Instructions written to make software work
- Bad software that can spread and damage your files
- A secret that is used for authentication
7 Clues: A secret that is used for authentication • A digital wall that keeps bad traffic out • Instructions written to make software work • Someone that breaks into a computer or network • A mistake in a program that can cause problems • Unwanted or junk messages, especially in email • Bad software that can spread and damage your files
Risk Culture Awareness 2022-01-19
Across
- level of risk that an organization is prepared to accept
- Risk department that reviews and provides an independent opinion to the business on lending proposals
- Process and risk owners are in which line of defense?
- A measure of the level of risk an organization is willing to accept
Down
- The practice of protecting systems and information from digital attacks
- A mitigation strategy to eliminate the risk exposure to come into existence
- this function represents the third line of defense
- risk of loss resulting from ineffective or failed internal processes, people, systems
- the chance that an outcome or investment's actual gains will differ from an expected outcome or return
9 Clues: this function represents the third line of defense • Process and risk owners are in which line of defense? • level of risk that an organization is prepared to accept • A measure of the level of risk an organization is willing to accept • The practice of protecting systems and information from digital attacks • ...
Get secure 2019-08-26
Across
- something that you wear during conference calls
- you need to follow them in order not to be hacked
- you use applications from it for in-company communication, data editing, etc.
- you use it if you decide to check your email when you are not in the office
Down
- you need to do this to log in to corporate systems
- you need to do it to start working with a system
- it helps us to be sure that our online data is protected
- something you may have during a call if the internet connection is bad
- you use them for taking vacation days, reporting, creating expense reports
9 Clues: something that you wear during conference calls • you need to do it to start working with a system • you need to follow them in order not to be hacked • you need to do this to log in to corporate systems • it helps us to be sure that our online data is protected • something you may have during a call if the internet connection is bad • ...
Information Managment 2025-09-23
Across
- A business function that involves people, data, processes and organization of data for business.
- The accuracy of data and the validity of it.
- Understanding the challenges that came and are coming and learning how to overcome them and how to avoid those challenges.
- Anything that is made from the mind like ideas and inventions.
- A secret process that gives an advantage to a company and has economic value.
Down
- A computer system that allows the information management business function.
- Anything that is valuable but cannot be found in real life.
- The protection of networks, data and information from unauthorized access.
- An unbiased observation that investigates the safety and accuracy of information.
9 Clues: The accuracy of data and the validity of it. • Anything that is valuable but cannot be found in real life. • Anything that is made from the mind like ideas and inventions. • The protection of networks, data and information from unauthorized access. • A computer system that allows the information management business function. • ...
Crossword Puzzle 2021-02-07
Across
- FoP that support client to address interruptions like those presented by COVID-19
- A secure collaborative innovation management platform
- FoP that assist clients to stay up-to-date with security and privacy leading practices and compliance requirements.
- FoP that captures emerging market demands
Down
- FoP that help clients control and optimize costs
- Our global strategy and ambition to deliver long-term value to clients, people and society.
6 Clues: FoP that captures emerging market demands • FoP that help clients control and optimize costs • A secure collaborative innovation management platform • FoP that support client to address interruptions like those presented by COVID-19 • Our global strategy and ambition to deliver long-term value to clients, people and society. • ...
Cybersecurity Awareness Month 2024 Crossword 2024-09-19
Across
- The Hightower Approved Generative AI tool.
- When you should report suspicious activity or behavior to your Cybersecurity team.
- How often you should reboot your work and personal devices.
Down
- A type of email sent by malicious actors.
- An update for Software or applications that is deployed to fix a security issue or weakness.
- Malicious software that is intended to cause harm to a device or entire network
6 Clues: A type of email sent by malicious actors. • The Hightower Approved Generative AI tool. • How often you should reboot your work and personal devices. • Malicious software that is intended to cause harm to a device or entire network • When you should report suspicious activity or behavior to your Cybersecurity team. • ...
REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16
Across
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- an attempt by hackers to damage or destroy a computer network or system.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- designed to detect and destroy computer viruses.
- global system of interconnected computer networks that use the Internet protocol suite.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- any software program in which advertising banners are displayed while the program is running.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- door a method, often secret, of bypassing normal authentication in a product.
- a standalone malware computer program that replicates itself in order to spread to other computers.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
OpenText Cybersecurity Portfolio 2023-09-11
7 Clues: Threat Detection • Digital Forensics • Backup and Recovery • Data Protection and Privacy • Endpoint and Email Security • Application and API Security • Identity and Access Management
information technology 2023-10-28
Across
- is the process of designing, creating, testing, and maintaining software applications
- is a branch of IT that protects computer systems and data from unauthorized access
- is the study of computers and computing technology
Down
- is the process of creating and maintaining websites
- refers to the practice of connecting computer systems and other devices
5 Clues: is the study of computers and computing technology • is the process of creating and maintaining websites • refers to the practice of connecting computer systems and other devices • is a branch of IT that protects computer systems and data from unauthorized access • is the process of designing, creating, testing, and maintaining software applications
AI Crossword Puzzle 2024-10-17
Across
- The process of automatically recognizing patterns in large data sets (6 letters).
- The technique of using past data to predict future outcomes (9 letters).
- A popular programming language for AI development (6 letters).
- The full form of "AI" (14 letters).
Down
- AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis (8 letters).
- Through this technique AI models can learn the underlying patterns and create realistic and novel outputs (12 letters).
- A branch of AI focused on the interaction between computers and human language (3 letters).
- A large data repository that is queried for insights (9 letters).
8 Clues: The full form of "AI" (14 letters). • A popular programming language for AI development (6 letters). • A large data repository that is queried for insights (9 letters). • The technique of using past data to predict future outcomes (9 letters). • The process of automatically recognizing patterns in large data sets (6 letters). • ...
Find the Cybersecurity Terms 2022-10-01
Across
- Legitimate promotional email that you’ve technically solicited, though it may serve little to no purpose to you.
- Cybercriminals stealing login credentials to access an email account, which can later be used to commit fraud, send phishing emails, steal data, and beyond.
- An isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
- Acronym. Currently the most expensive type of cybercrime, evading traditional email security systems
- A data transmission error when pieces of data don’t make it to their intended destination.
Down
- A type of phishing attack aimed at high-level executives at an organization
- A trial-and-error method of finding correct login credentials.
- Type of attack; a threat vector that targets a specific group of users by compromising a website they frequently visit.
- Acronym. A cloud security checkpoint between users and cloud providers.
- A method to send emails with a forged sender address, often used to deliver spam and phishing attacks
10 Clues: A trial-and-error method of finding correct login credentials. • Acronym. A cloud security checkpoint between users and cloud providers. • A type of phishing attack aimed at high-level executives at an organization • A data transmission error when pieces of data don’t make it to their intended destination. • ...
Test Your Cybersecurity Knowledge 2024-07-24
Across
- authorization to perform some action on a system
- automated recognition of individuals based on their biological and behavioral characteristics
- guarding against improper information modification or destruction
- A string of characters to verify access authorization
Down
- assurance that information is not disclosed to unauthorized individuals or processes
- confidentiality mode that transforms usable data into an unreadable form
- scam to deceive people into revealing sensitive information
- collection of values assigned to base measures, derived measures, and/or indicators
- probability that a particular security threat will exploit a system vulnerability
- software specifically designed to disrupt, damage, or gain unauthorized access to a computer system
10 Clues: authorization to perform some action on a system • A string of characters to verify access authorization • scam to deceive people into revealing sensitive information • guarding against improper information modification or destruction • confidentiality mode that transforms usable data into an unreadable form • ...
Cybersecurity Terms Crossword Puzzle 2025-03-05
Across
- A digitally signed document that binds an entity’s identity to its public key
- A unique, single-use value that ensures fresh cryptographic operations
- The process of converting ciphertext into plaintext
- Steps taken to lessen the impact or likelihood of a security threat
- A guarantee that a party cannot deny the validity of their digital action or message
Down
- A deceptive tactic that induces individuals into revealing sensitive information
- A cryptographic marker that verifies the authenticity and integrity of a digital document
- A technique or tool that leverages a vulnerability to perform unauthorized actions
- A security approach that assumes no user or device is inherently safe
- Assurance that data remains unaltered from its original state
10 Clues: The process of converting ciphertext into plaintext • Assurance that data remains unaltered from its original state • Steps taken to lessen the impact or likelihood of a security threat • A security approach that assumes no user or device is inherently safe • A unique, single-use value that ensures fresh cryptographic operations • ...
Cybersecurity Practices and Attacks 2025-09-24
Across
- Protective barrier against spyware and viruses
- Hidden data left by websites on browsers
- Process to confirm user identities
- Security flaw in software waiting to be patched
- A backup copy stored in a separate location
Down
- A Scam via mobile messaging
- Verifying that data hasn’t been altered
- Unauthorized software modification to gain access
- A fake digital identity created for fraud
- Prevents system access until ransom is paid
10 Clues: A Scam via mobile messaging • Process to confirm user identities • Verifying that data hasn’t been altered • Hidden data left by websites on browsers • A fake digital identity created for fraud • Prevents system access until ransom is paid • A backup copy stored in a separate location • Protective barrier against spyware and viruses • ...
IT Companies 2024-04-20
Across
- A multinational technology corporation that develops, manufactures, licenses, supports, and sells computer software, consumer electronics, and personal computers
- one of the most popular company that sell premium phone
- profound and often rapid change or transformation that occurs within a society, system, or organization
- company that create first phone
Down
- Part of IT department, that control security part of IT companies
- IT GIGANT that have theyself browser, search system
- one of the companies of the largest oligarch, which is responsible for the wireless network in all parts of the world
7 Clues: company that create first phone • IT GIGANT that have theyself browser, search system • one of the most popular company that sell premium phone • Part of IT department, that control security part of IT companies • profound and often rapid change or transformation that occurs within a society, system, or organization • ...
Artificial Intelligence 2023-11-19
Across
- To set in motion; make active or more active.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The use of technology to perform tasks without human intervention.
- The systematic process of assessment and planning employed to prevent a developmental problem.
- Not functioning in a previously intended way
- Capable of operating independently without human control.
Down
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- An expert at programming and solving problems with a computer
- The design, construction, and operation of robots to perform tasks in the real world.
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
travis cyber 2023-10-08
Across
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- Pertaining to the security challenges and measures for smartphones and tablets.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
Unit 4 Cybersecurity 2022-03-02
7 Clues: a more thorough hotfix • quick fix for a software problem • proprietary journaling file system • a device that acts as a file server • securing devices by reducing the exposure • network of high speed storage used by servers • firewall command to block or allow certain user
Cybersecurity Awareness Crossword 2022-09-10
Across
- malware designed to deny a user or organization access to files on their computer
- security exploit in which an infected USB charging station is used to compromise connected devices
- social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
Down
- provides the first line of defence against unauthorized access to your computer and personal information
- is an attack that attempts to steal your money or your identity via email
- is an attack that attempts to steal your money or your identity via voice call
- _____ theft happens when someone impersonates people to commit fraud
7 Clues: _____ theft happens when someone impersonates people to commit fraud • is an attack that attempts to steal your money or your identity via email • is an attack that attempts to steal your money or your identity via voice call • malware designed to deny a user or organization access to files on their computer • ...
Smart System 2021-06-30
Across
- A maintenance technique that estimates when maintenance should be performed
- Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients.
- Application that involves wireless sensor and RFID technology,
Down
- Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
- A sensor that detects movement
- Smart system application that reduces global emission
- Modification of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
7 Clues: A sensor that detects movement • Smart system application that reduces global emission • Application that involves wireless sensor and RFID technology, • A maintenance technique that estimates when maintenance should be performed • Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients. • ...
Chapter 11- RISK 2022-09-10
Across
- It is a situation that involves danger
- It is the decision of no inverting on security not even if the system is vulnerable
- It is the risk during the transmission or movement of information from one computer to another
- It is the possibility of something unwelcome or unpleasant happening
Down
- It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
- It is information resting in a hard drive, server
- It is the action of assessing someone or something
7 Clues: It is a situation that involves danger • It is information resting in a hard drive, server • It is the action of assessing someone or something • It is the possibility of something unwelcome or unpleasant happening • It is the decision of no inverting on security not even if the system is vulnerable • ...
Cyber/Digital Literacy 2024-11-06
Across
- example of computer virus
- of malware that can make copies of itself and spread automatically across computers in a network.
- has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness.
Down
- -Refers to the trail of data you leave when using the internet.
- is use protect your personal information
- Who's actively participate in cyberspace and the online community offered through the internet
- Type of crime that uses computers or networks harm.
7 Clues: example of computer virus • is use protect your personal information • Type of crime that uses computers or networks harm. • -Refers to the trail of data you leave when using the internet. • Who's actively participate in cyberspace and the online community offered through the internet • ...
PSB CCF CROSSWORD PUZZLE 2020-06-24
Across
- SC initiated, amazing three-times a year, event
- Keep it lit!
- A campus radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- Second part of SC’s mission - participate or become involved in.
- Third part of SC’s mission - give (someone) the power or drive to do something.
- PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
- Second part of student life’s tagline
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
- IES, IET, IPRS
- SC, CSC, Dance Club, Music Club, Photog, SAC
- CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
- First part of SC’s mission - provide (someone or something) the means to do something.
- First part of student life’s tagline
13 Clues: Keep it lit! • IES, IET, IPRS • First part of student life’s tagline • Second part of student life’s tagline • SC, CSC, Dance Club, Music Club, Photog, SAC • SC initiated, amazing three-times a year, event • CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA • Second part of SC’s mission - participate or become involved in. • ...
Crossword Puzzle 2021-10-26
Across
- How many Level 1 DGS on Golf?
- What is the first name of the new OIM on Golf?
- What is the current color code for lifting gears?
- What do you call a gradual physiological adaptation that improves an individual’s ability to tolerate heat stress?
- How many Golden Rules to live by:
- In what month do we celebrate Cybersecurity awareness?
Down
- How many years LTI free is Golf?
- Plastic waste shall be disposed into ... bin
- An apparatus used for moving patients who require medical care
- Three elements that are required to start a fire: oxygen, heat, and ...
- How many consecutive shifts can personal isolation can be used for?
- How many alternative muster stations available in G-Loc?
- Portable, life-saving devices designed to treat people experiencing sudden cardiac arrest, a medical condition in which the heart suddenly and unexpectedly stops beating
13 Clues: How many Level 1 DGS on Golf? • How many years LTI free is Golf? • How many Golden Rules to live by: • Plastic waste shall be disposed into ... bin • What is the first name of the new OIM on Golf? • What is the current color code for lifting gears? • In what month do we celebrate Cybersecurity awareness? • How many alternative muster stations available in G-Loc? • ...
Cybersecurity/Web Design - use your KNOWLEDGE PLANNER 2019-11-05
Across
- to help protect a computer network from unauthorised access
- Hacking’ - Testing a computer systems to find security vulnerabilities
- is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
- group of people at which the website is aimed e.g. teenage girls
- test that a human can pass but a computer program cannot
- reason for which the website has been created e.g. to entertain
- to scramble information so that it can be sent safely over the Internet
- attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
Down
- by reproducing itself or infecting other programs by modifying them.
- a secret word to unlock a device – must include numbers/special characters
- Testing
- Audience
- a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
- to use and understand
- preferred way to present/layout digital material
15 Clues: Testing • Audience • to use and understand • preferred way to present/layout digital material • test that a human can pass but a computer program cannot • to help protect a computer network from unauthorised access • reason for which the website has been created e.g. to entertain • group of people at which the website is aimed e.g. teenage girls • ...
The internet 2023-06-19
Across
- media Online platforms for people to connect, communicate, and share content
- Sending data or files from a device to the internet or another user
- Protecting devices, networks, and data from digital threats, like hackers and viruses
- Method of sending messages electronically between people
- Collection of related webpages accessed with a browser
- Receiving data or files from the internet and saving them on a device
- Regularly updated website or web page featuring personal or informational content
Down
- Technology allowing devices to connect wirelessly to the internet or a network
- Program used to access and view websites on the World Wide Web
- game Interactive entertainment played together or against others using the internet
- engine Tool that helps find information, images, or websites using keywords
- Transmitting video or audio content allowing users to watch or listen without downloading
- Unique address of a website on the internet, often starting with "www"
13 Clues: Collection of related webpages accessed with a browser • Method of sending messages electronically between people • Program used to access and view websites on the World Wide Web • Sending data or files from a device to the internet or another user • Receiving data or files from the internet and saving them on a device • ...
Cyber Crossword Puzzle 2023-10-05
Across
- Stay _____ and be on the lookout for security threats or incidents.
- An email scam that that targets unsuspecting users to give up information.
- Measures taken to protect your or your organization's information from cyber attack
- Never write these down on a sticky note or a whiteboard.
Down
- An unauthorized person that tries to gain access to your computer.
- Never open these in email unless you already expected them from the sender.
- _____ is a level of data classification.
- _____ is when an unauthorized person follows you into a secure location.
- Lock your _____ and your mobile phone anytime they are not in use.
- Report all possible cyber _____ to the IT Service Desk.
- Files with sensitive information should always be kept in a _____ file room or drawer.
- Always keep a _____ workspace that is free of confidential information.
- Alway install updates to your computer or mobile phone. Don't click "Remind me later."
13 Clues: _____ is a level of data classification. • Report all possible cyber _____ to the IT Service Desk. • Never write these down on a sticky note or a whiteboard. • An unauthorized person that tries to gain access to your computer. • Lock your _____ and your mobile phone anytime they are not in use. • Stay _____ and be on the lookout for security threats or incidents. • ...
Unit 2 vocabolar 2025-09-30
Across
- In computer security, risk is a measure of the extent to which an entity is threatened by a potential event, such as a data breach or cyberattack. It is often calculated as a function of the likelihood of the event occurring and the potential negative impact.
- The process of implementing controls and measures to reduce the impact of a potential security threat or vulnerability. The goal is to lower risk to an acceptable level.
- The assurance that a party in a communication or transaction cannot later deny having sent or received the data. It provides proof of the origin and integrity of the data.
- A foundational model for cybersecurity that guides the development of security systems. The three pillars are Confidentiality, Integrity, and Availability.
- In the context of technology and cybersecurity, accessible means that systems, tools, and information can be used and understood by people with a wide range of abilities and disabilities.
- The guarantee that systems and data are accessible and available to authorized users when needed.
- The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals.
Down
- A network security device that not only detects malicious activity but also actively blocks or prevents it. It is often placed directly in the path of network traffic.
- The assurance that data is trustworthy, accurate, and has not been improperly altered, modified, or destroyed by an unauthorized user.
- A security tool that monitors network traffic or system activity for known malicious signatures or suspicious behavior. An IDS alerts administrators to potential threats but does not block them directly.
- A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans.
- The process of verifying the claimed identity of a user, device, or other entity before granting access to a system or network.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks.
13 Clues: The guarantee that systems and data are accessible and available to authorized users when needed. • A program or set of programs designed to prevent, detect, and remove malicious software, such as viruses, worms, and trojans. • The principle of keeping sensitive information private and ensuring that access is restricted to only authorized individuals. • ...
Cyber security 2021-03-20
Emerging Technologies Vocabulary 2025-02-13
Across
- Artificial Intelligence
- a computing environment that allows users to access computing power from any device anywhere at any time
- a blog that features audio recording instead of written text
- the use of virtual reality technology
- the activity or practice of posting short videos to or maintaining a vlog
- a combination of engineering science and technology that creates machines called robots
Down
- the practice of protecting digital assets from cyberattacks
- a tiny device that detect and measure physical chemical biological or environmental changes at the nanoscale
- a classroom technology that allows teachers to ask questions and get students answers in real time
- branch of technology that deals with dimensions and tolerances of less than 100 nanometers
- a network of physical objects that can connect and share data with other devices and systems
11 Clues: Artificial Intelligence • the use of virtual reality technology • the practice of protecting digital assets from cyberattacks • a blog that features audio recording instead of written text • the activity or practice of posting short videos to or maintaining a vlog • a combination of engineering science and technology that creates machines called robots • ...
Cyber Security - Chapter 1 2020-02-12
Across
- State Sponsored Hackers
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
- The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
- The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- is the collection of technologies that enable the connection of various devices to the Internet.
- is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
- Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
- Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
15 Clues: State Sponsored Hackers • This group of criminals breaks into computers or networks to gain access for various reasons. • is the collection of technologies that enable the connection of various devices to the Internet. • Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards. • ...
Viruses - Maria DiMeglio 2018-11-15
Across
- a type of virus that is disguised as something else
- people who hack into a company's network to find and help resolve problems in the company's cybersecurity
- a way a scammer can get your personal information through fake websites and/or fraud emails or texts
- a way to message someone electronically
- a monitor is an example of this; isn't affected by viruses
- email virus that held a seemingly innocent message, but sent itself to the top 50 people in the victim's address book
- makes copies of itself in order to spread through a network
Down
- a virus intended to do harm
- floods a network with fake traffic
- a type of virus in which a person or group of people encrypt someone else's files and asks for money in exchange for restoring them
- what software is made of
- software that can prevent virus attacks
- the first virus intended to do damage in the real world
- unwanted software, not necessarily harmful
- a virus is a type of this
15 Clues: what software is made of • a virus is a type of this • a virus intended to do harm • floods a network with fake traffic • software that can prevent virus attacks • a way to message someone electronically • unwanted software, not necessarily harmful • a type of virus that is disguised as something else • the first virus intended to do damage in the real world • ...
Digital Citizenship Vocabulary 2024-03-05
Across
- Knowing how to use digital technology safely and effectively.
- Using someone else's work in a legal and fair way, like for school projects.
- How you present yourself online through usernames, profiles, etc.
- Protecting your computer and information from digital attacks and hackers.
- Being able to find and use information online in a smart and responsible way.
- Using two different ways to prove who you are before accessing accounts online.
- Following rules for good behavior and respect when using the internet.
Down
- The trail of information you leave behind when using the internet.
- Tricky headlines or links designed to get you to click on them.
- Keeping personal information safe and not sharing it with others online.
- Bullying or hurting others online.
- How others see you based on what you do and say online.
- Your freedoms and protections when using digital technology.
- Tricking people into giving personal information by pretending to be someone else online.
- Things people create, like art or writing, that they own the rights to.
15 Clues: Bullying or hurting others online. • How others see you based on what you do and say online. • Your freedoms and protections when using digital technology. • Knowing how to use digital technology safely and effectively. • Tricky headlines or links designed to get you to click on them. • How you present yourself online through usernames, profiles, etc. • ...
IT Insights 2023-10-24
Across
- A program that you use to access websites on the Internet
- acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
- where you can find our course materials, and collaborate with your instructor
- aerial term used to describe online data storage
- a web site where you can ask a question and it provides matches
- team name used for St. Clair College athletic teams
- St. Clair College emblem
Down
- term used for organized, competitive computer gaming
- this device has rules to control the flow of data into and out of a network
- a global network of connected computers where you can find information, watch videos, and communicate with others
- branch of IT responsible for protecting networks and data from external attack
- harmful software that can infect your computer and cause problems
- electronic letters you send and receive through the Internet
- a network connection without wires
- where you can find your timetable, transcript, etc.(abbrev.)
15 Clues: St. Clair College emblem • a network connection without wires • aerial term used to describe online data storage • team name used for St. Clair College athletic teams • term used for organized, competitive computer gaming • A program that you use to access websites on the Internet • electronic letters you send and receive through the Internet • ...
Techtonic Round 2 Set B 2025-04-01
Across
- The global network that connects billions of devices worldwide.
- A popular scripting language mainly used for web development.
- A technology that allows multiple virtual machines to run on a single physical machine.
- The AI technique that enables machines to improve performance based on experience.
- A storage system that allows data to be accessed remotely over the internet.
- A process model used in software engineering that follows a linear, sequential approach.
- A software testing approach where individual units of code are tested separately.
Down
- The main circuit board of a computer that connects all components.
- The process of converting source code into machine code.
- A machine learning model inspired by the structure of the human brain.
- A type of memory that stores frequently accessed data for quick retrieval.
- A cybersecurity attack that tricks users into providing sensitive information.
- A method for encoding data to ensure only authorized access.
- The standard language for querying databases.
- A computer network that spans a small geographic area, like an office.
15 Clues: The standard language for querying databases. • The process of converting source code into machine code. • A method for encoding data to ensure only authorized access. • A popular scripting language mainly used for web development. • The global network that connects billions of devices worldwide. • ...
Networking concepts and Cyber Ethics 2025-05-21
Across
- A network that spans countries and continents
- A device that is used to connects multiple devices to each other in a network
- A wireless device that uses radio frequencies to transmit information over short distances
- A internet browser that is developed by the Mozilla foundation
- A network that covers larger area like a city
- Any kind of unwanted, unsolicited digital communication that gets sent out in bulk
- A person using vulnerability in operating system intrude in to the computer
- A network that is limited to a small geographical area such as office
Down
- A common cybersecurity threat in cyberspace
- The device used to connect computers in a network
- A device that can convert digital signals into analog and vice versa
- Script files sent through email attachment to attack host computer
- A security that is used to prevent unauthorized access to a network
- A network that is organized around a person
- The term for a clickable link on a webpage that takes to another webpage or resource
15 Clues: A common cybersecurity threat in cyberspace • A network that is organized around a person • A network that spans countries and continents • A network that covers larger area like a city • The device used to connect computers in a network • A internet browser that is developed by the Mozilla foundation • ...
CyberWeek 2023-10-15
Across
- The orange phish hook you can use to alert IT to spam in your email from Know Be 4
- Email that falsely claims to be from a legitimate source, usually with a threat or request for information
- Junk email
- Online harassment
- Altered audio/video to trick users into gaining access to a system
- A type of technology used to keep intruders out
- Cybersecurity awareness month
- Puts the “m” in MFA
- Coding used to protect sensitive data
- Where do you store infected files on your computer
Down
- A sequence of words used for authentication (hint: not a password)
- Software that allows a user to remain anonymous while using the internet. This will mask your location and encrypting traffic.
- cheat your way into someone’s network
- The company FASNY uses to encrypt your email
- Short for bring your own device
- A malicious deep web program that holds your information hostage
- Your digital ______ is a collection of information you leave on the internet that can’t be removed by deleting or setting it as private.
17 Clues: Junk email • Online harassment • Puts the “m” in MFA • Cybersecurity awareness month • Short for bring your own device • cheat your way into someone’s network • Coding used to protect sensitive data • The company FASNY uses to encrypt your email • A type of technology used to keep intruders out • Where do you store infected files on your computer • ...
Technical Crossword 2024-05-01
Across
- An OS is a system _____ that acts as an intermediatery between computer user and computer hardware
- Converting high level code into machine code
- Technique is cybersecurity to hide information inside a picture
- Language often used for building web applications
- A means of encoding text in which each symbol is represented by 16 bits.
- Platform independent and interpreted programming language
- test made to check the machine's response whether it is natural (acting humanly)
Down
- A digital circuit capable of holding a single digit.
- In symmetric key cryptography same key can be used by the sender and receiver for _____ of the message.
- To increase voltage momentarily in tubelight we use ____
- protocol used in transferring files between computer or a network
- layer in the OSI model responsible for routing packets across network.
- name of the default shell in Linux operating system
- A form of high speed internet access
- In python how do you denote single line comment
- ___memory is the fastest system memory.
- Made of materials such as carbon which inhibits the flow of current
17 Clues: A form of high speed internet access • ___memory is the fastest system memory. • Converting high level code into machine code • In python how do you denote single line comment • Language often used for building web applications • name of the default shell in Linux operating system • A digital circuit capable of holding a single digit. • ...
informatika 2025-08-26
Across
- teknologi yang memungkinkan komputer untuk belajar dan membuat keputusan sendiri
- wujud kewargaan digital dalam konteks keindonesiaan
- kepanjangan ai
- istilah yang menggambarkan volume data yang sangat besar, baik terstruktur maupun tidak terstruktur adalah
- ketika mencari sesuatu produk atau apapun secara online beberapa saat kemudian kalian ditawarkan beberapa produk yang sama yang pernah dicari ada aplikasi yang digunakan adalah contoh dari
- teknologi yang memungkinkan pengguna untuk mengalami pengalaman virtual yang reality adalah pengertian dari
- bidang ilmu yang menggali pemahaman melalui eksplorasi dunia disekitar kita maupun dunia maya adalah
Down
- prinsip kejujuran sehingga individu selalu terhindar dari perbuatan untuk memanipulasi saat bermedia digital adalah pengertian dari
- adalah ke panjangan dari
- kesiapan kita menerima berbagai konsekuensi adalah pengertian dari
- teknologi yang memungkinkan pengguna untuk melakukan transaksi secara aman dan transparan adalah pengertian dari
- sistem keamanan yang digunakan untuk melindungi data dan sistem komputer dari serabgan cyber adalah pengertian dari
- teknologi komputasi yang menggunakan prinsip-prinsip mekanika kuantum untuk mengolah data adalah pengertian dari
- sebuah metode pengiriman dan penerimaan layanan melalui internet adalah pengertian dari
- kemampuan membaca,menulis, berbicara
- teknologi yang memungkinkan pengguna untuk melihat informasi tambahan dalam lingkungan nyata adalah pengertian dari
- kemampuan mendasar individu dalam mengetahui berbagai perangkat keras dan perangkat lunak adalah
- internet of things disebut juga sebagai
18 Clues: kepanjangan ai • adalah ke panjangan dari • kemampuan membaca,menulis, berbicara • internet of things disebut juga sebagai • wujud kewargaan digital dalam konteks keindonesiaan • kesiapan kita menerima berbagai konsekuensi adalah pengertian dari • teknologi yang memungkinkan komputer untuk belajar dan membuat keputusan sendiri • ...
Career Vocabulary Review 2026-02-10
Across
- A job or profession that someone does for many years, often requiring special training or education.
- A person who submits an application for a job.
- studies nature to understand life and the universe—like biologists and meteorologists.
- The projected rate of growth or decline in employment for a job.
- A brief account of your professional experience, training, and education.
- A goal to achieve.
- A career that uses science, technology, engineering, or math.
- design and build solutions — from bridges to robots.
Down
- Conditions that must be met or things needed on a regular basis.
- A person's experience, training, and education that makes them fit for a job.
- A fixed amount of money a person earns for their work.
- use numbers and patterns, like actuaries and data scientists.
- The setting, conditions, and culture where employees perform their jobs.
- A person in a position to recommend another for a job.
- A formal meeting in person arranged to assess an applicant.
- creates apps, games, and systems—like programmers and cybersecurity analysts.
- The various abilities you use to complete your work successfully.
17 Clues: A goal to achieve. • A person who submits an application for a job. • design and build solutions — from bridges to robots. • A fixed amount of money a person earns for their work. • A person in a position to recommend another for a job. • A formal meeting in person arranged to assess an applicant. • use numbers and patterns, like actuaries and data scientists. • ...
Technology 2023-09-28
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
IT vocabulary 2023-09-07
Across
- A short-range wireless connection. Usually used for devices like headphones
- When deleted items are restored to their previous state
- When things such as updates are done automatically
- A code of numbers or letters that allow for login
- What companies use to expose you to their products
- Allows devices to connect without a physical connection
- The components that make a device
- A connection of different devices to each other
- The amount of space you have for data
- Restoring data from a previous backup
Down
- The screen where the information is displayed from a computer
- Saving all the data on a device so it can be restored at a later date
- The term for programs on devices
- A process that brings a program to a more up to date state
- Using multiple
- A computer that provides resources, data, services, or programs to other computers,over a network.
- Your security for systems online
- The term to describe information of any sort on a device
- A program that blocks your access to a system until a sum of money is paid
- Its like mail, but online
20 Clues: Using multiple • Its like mail, but online • The term for programs on devices • Your security for systems online • The components that make a device • The amount of space you have for data • Restoring data from a previous backup • A connection of different devices to each other • A code of numbers or letters that allow for login • ...
español 2024-05-14
Across
- calculator
- to fix
- to look for
- mouse
- to function (to work)
- to print
- to watch
- cybersecurity
- TV
- to send a text
- GPS navigation
- study of technology and computers
- tablet
- to turn off/to switch off
- autonomous vehicles
- monitor
- to send
- everyday objects
- fast
- social media
- empty
- keyboard
- to turn on
- to save
- uncharged
- ipad
- the internet
- dead
- to open
- to print
- to upload
- channel
- internet / navegar en la red - internet/web surfing
- headphones
- internet of things
- laptop
- screen
- to download
Down
- full
- cyber threat
- to erase/to delete
- lack of privacy
- devices
- charged
- remote control
- cyberbullying
- password
- sustainable technology
- @
- identity theft
- email address
- file
- internet connection
- printer
- artificial intelligence
- to send and email
- website
- robots
- charger
- home page/main page
- text message
- instagram profile
- to put (to put/turn on)
- to close
- the wifi
- the cloud
- program
- to record
- slow
- cell phone
71 Clues: @ • TV • full • file • fast • ipad • dead • slow • email • mouse • empty • to fix • tablet • robots • laptop • screen • devices • charged • printer • website • monitor • to send • charger • to save • to open • channel • program • password • to print • to watch • keyboard • to close • to print • the wifi • uncharged • to upload • the cloud • to record • calculator • to turn on • headphones • cell phone • to look for • to download • cyber threat • social media • text message • ...
Public Safety 2024-08-08
Across
- A serious injury to a body.
- Helping someone who is in cardiac arrest
- The continuous observation of a place, person, or group.
- Responder, The people who arrive first to arrive to an emergency.
- Casualty Incident, Healthcare systems and full because of a large number of casualties in a short period of time.
- Support, Services that are provided to people who are a victim of a crime.
- A biological substance that presents a threat to public safety
- Alert, Old person goes missing.
- Destroying property with fire
- Command System, The control of an emergency response team.
- People who protect online networks from digital attacks.
Down
- A device that uses electricity to restore the hearts normal rhythm.
- Safety, The practice of ensuring safety in the workplace.
- Health, The science of protecting a communities health.
- Assessment, Identifying where the weak points are in your project.
- Legislative process for dividing land into zones for the citizens.
- Shooter, A person attempting to kill people in a confined space with a fire arm
- Being ready to respond anytime.
- alert, Child goes missing.
- Assessment, Analyzing the possible issues that could negatively impact a project.
20 Clues: alert, Child goes missing. • A serious injury to a body. • Destroying property with fire • Being ready to respond anytime. • Alert, Old person goes missing. • Helping someone who is in cardiac arrest • Health, The science of protecting a communities health. • The continuous observation of a place, person, or group. • ...
Week 1 Crossword Puzzle 2022-01-13
Across
- alternative access to a system for malware, sometimes an entry point by someone who leaves a company, or used to re-establish a connection
- A data handling regulation only found in CANADA
- The 'A' in the CIA Triade
- Vulnerability + Threat =
- A script _______ is also known as a green hat hacker or someone who is new to programming little experience
- Using a voice channel to conduct phishing
- Organization that publishes cybersecurity frameworks
- Psychological control discouraging an attack
- A regulation applicable to Europe
- A control such as a gateway or fence
Down
- information that we may have received can be absolutely attributed to somebody. There’s no way that they can take it back.
- The 'C' in the CIA Triade
- fancy word for information gathering, can be active or passive
- "hacking the human"
- Acronym for a military/state or crime syndicates with lot of resources to attack
- provides a common basis for the coordination of standards development for the purpose of systems interconnection
- Hacker with a political agenda
- Can be polymorphic and is usually memory resident
- Acronym for information that is freely available for information gathering
- The 'I' in the CIA Triade
20 Clues: "hacking the human" • Vulnerability + Threat = • The 'C' in the CIA Triade • The 'A' in the CIA Triade • The 'I' in the CIA Triade • Hacker with a political agenda • A regulation applicable to Europe • A control such as a gateway or fence • Using a voice channel to conduct phishing • Psychological control discouraging an attack • A data handling regulation only found in CANADA • ...
John and Lushi 2025-02-22
Across
- Their dream honeymoon escape
- John’s favorite ice cream flavor
- Lushi's mom's employer
- Lushi's favorite alcoholic beverage
- John’s alma mater
- Lushi’s birthplace
- The month their love story began
- Lushi’s ultimate dessert indulgence
- Lushi’s favorite cozy season
- Lushi’s favorite holiday
- John’s ultimate comfort food
- Lushi’s favorite color
- Lushi’s board game obsession
- Lushi’s favorite snack to craft
- Total countries they’ve explored together
- John’s middle name
- Where John popped the big question
- How John takes his coffee
- Their first international adventure
- John’s go-to beverage
- The SpaceX program Lushi works on
Down
- The color of John’s eyes
- John’s favorite golf trip destination
- John’s work industry
- Where their first date kicked off
- The month they got engaged
- The city where their paths first crossed
- John’s most-played video game
- Their age difference
- Lushi’s top cuisine pick
- John’s hometown roots
- The city they call home
- John’s all-time favorite band
- Lushi’s favorite hobby
- Gatsby’s breed
- Their beloved corgi’s name
- Their favorite sport to play together
- The number of furry family members
38 Clues: Gatsby’s breed • John’s alma mater • Lushi’s birthplace • John’s middle name • John’s work industry • Their age difference • John’s hometown roots • John’s go-to beverage • Lushi's mom's employer • Lushi’s favorite color • Lushi’s favorite hobby • The city they call home • The color of John’s eyes • Lushi’s top cuisine pick • Lushi’s favorite holiday • How John takes his coffee • ...
dampak sosial informatika 2025-01-21
Across
- peranti kecil (perangkat keras) yang menghasilkan kode untuk akses ke jaringan
- alat keamanan yang sangat berharga untuk pengamanan data pada komunikasi data di jaringan komputer
- kata data dalam bahasa latin
- perangkat lunak tambalan karena bug
- Malware yang mampu mengenkripsi beberapa atau semua file di komputer di sebut
- program komputer yang dapat menyalin dirinya sendiri ke komputer lain adalah
- perangkat lunak yang mampu untuk mendapatkan akses ke suatu sistem komputer atau peranti
- tindakan mencuri identitas digital orang lain
- apa yang dimaksud gerakan hacktivist yang menyerang dunia Maya
- apakah yang disebut dengan akronim robot dan network
Down
- data kecil pencatatan aktivitas di peramban
- orang untuk mengeluarkan informasi atau melakukan tugas yang melanggar protokol keamanan
- apakah istilah dari keamanan informasi di internet
- Malware yang dapat memantau dan merekam aktivitas pengguna di komputer atau perangkat seluler di sebut
- usaha untuk memikat pengguna internet untuk masuk ke situs web palsu adalah
- tindakan tidak bertanggung jawab dan merusak yang dilakukan oleh penjahat disebut
- perangkat lunak yang menempel pada perangkat lunak lain
- apa yang menjadi celah keamanan informasi
- penyebaran informasi palsu
- Malware yang tampak seperti aplikasi perangkat lunak jinak
20 Clues: penyebaran informasi palsu • kata data dalam bahasa latin • perangkat lunak tambalan karena bug • apa yang menjadi celah keamanan informasi • data kecil pencatatan aktivitas di peramban • tindakan mencuri identitas digital orang lain • apakah istilah dari keamanan informasi di internet • apakah yang disebut dengan akronim robot dan network • ...
Christian’s Crossword Puzzle 2025-07-02
Across
- Naive glutton
- “Never again”
- Obscure (and peak) DLC member who came out as gay
- “Careful with the door”
- The university where a certain long-haired blonde man plans to attend this coming spring.
- Christian’s favorite drink
- What Caleb has particularly terrible luck in
- Frequenly demands others to “Hop on the game”
- Caleb’s and Carter’s “fatal flaw” when at hangouts
- A musical, three-thousand dollar item that went missing last summer. Pushed a certain someone into employment.
- The name of a friendly, helpful, talking horse in easily the biggest Discord game sucessfully ran.
- Haris’s word to circumvent a slur, also shows up in a philosopical question of his.
Down
- Studied at Anderson University for nursing
- What Matthew is studying at Tri-County
- What Diego claims he will be his whole life
- “________ Crossing” ; Name of the apartment complex Matthew once lived in.
- Chronically late
- OG name of the group
- Haris’s new kingdom
- Nintendo fan
- *Massive* popular streamer and Noah’s role model
- Contentious “DLC” character who might as well be dating a core member of the group.
- Game played when drinking coffee in downtown
23 Clues: Nintendo fan • Naive glutton • “Never again” • Chronically late • Haris’s new kingdom • OG name of the group • “Careful with the door” • Christian’s favorite drink • What Matthew is studying at Tri-County • Studied at Anderson University for nursing • What Diego claims he will be his whole life • What Caleb has particularly terrible luck in • ...
Industrial security 2025-10-15
Across
- – A prepared procedure to handle emergencies or disasters.
- – Security measure restricting movement due to threats.
- – A potential cause of unwanted incident or harm.
- – A person employed to protect property and personnel.
- – A badge used for identification and access within a facility.
- – A designated safe route used during an evacuation.
- – A set of rules and guidelines for security operations.
- – Continuous observation of people or areas for security purposes.
- – The routine inspection of areas to ensure safety and security.
- – The act of keeping people and assets safe from harm.
- – Unauthorized entry into a restricted area.
- – A system that uses video cameras to monitor and record activities.
- – A system that restricts entry to authorized personnel only.
Down
- – Written documentation of a security event or breach.
- – The process of identifying and evaluating potential hazards.
- – The deliberate destruction or disruption of industrial operations.
- – The act of stealing small quantities or low-value items from the workplace.
- – Protection of computer systems from digital attacks.
- – A weakness that can be exploited by threats.
- – Device that signals when unauthorized access occurs.
20 Clues: – Unauthorized entry into a restricted area. • – A weakness that can be exploited by threats. • – A potential cause of unwanted incident or harm. • – A designated safe route used during an evacuation. • – Written documentation of a security event or breach. • – A person employed to protect property and personnel. • ...
August Newsletter Crossword 2024-07-30
Across
- Systems Engineering is updating JIRA, JAMA, and Plan0View Projects for what purpose?
- To meet the IT Team, please visit them where?
- What is the last name of the 4th person in the first column of the August Birthdays?
- Who is the AP Team working with to complete network laydown?
- What kind of safety concern is the result of debris puncturing a tire?
Down
- How much money can you earn by participating in Healthyroads JT4 Wellness Incentive Program? (Spelled Out)
- Who is the newest hire on our JT4 security team?
- Upon publication, new PMIs should be coordinated with whom?
- The 11DOS JT4 Team is helping the 11DOS by lending our expertise in what kind of planning?
- Who is the first TROC RCO?
- The 11th Annual Golf Tournament is what kind of start?
- Which employee just finished HARRIER maintenance training?
12 Clues: Who is the first TROC RCO? • To meet the IT Team, please visit them where? • Who is the newest hire on our JT4 security team? • The 11th Annual Golf Tournament is what kind of start? • Which employee just finished HARRIER maintenance training? • Upon publication, new PMIs should be coordinated with whom? • Who is the AP Team working with to complete network laydown? • ...
Cyber Awareness 2025-11-06
Across
- A virtual private network to access remote services securely
- A cyber attack that floods a network or server with excessive traffic to make it unavailable.
- A digital or physical device used to authenticate a user, often as a second factor.
- A hidden way into a system that bypasses normal authentication.
- Fake security alerts that trick users into installing malware or paying money.
- The practice of accessing a computer network illegally.
- A program that performs automated tasks, and can be controlled remotely and malicious
Down
- A secret combination of characters used to verify a user’s identity.
- A targeted form of phishing
- A security model that assumes no user or system is inherently trusted.
- Self-replicating malware that spreads across networks without user action.
- The practice of protecting computers, networks, and data from digital attacks or unauthorised access.
12 Clues: A targeted form of phishing • The practice of accessing a computer network illegally. • A virtual private network to access remote services securely • A hidden way into a system that bypasses normal authentication. • A secret combination of characters used to verify a user’s identity. • A security model that assumes no user or system is inherently trusted. • ...
Sherbourne Health 2026 Data Privacy Day Crossword 2026-01-08
Across
- Measures taken to protect personal data
- The principle that patient information should be accessed or disclosed only as necessary in order to provide services to the patient or as otherwise authorized by the patient or the law
- The acronym for Ontario's health privacy law
- annual agreement signed by all Sherbourne employees
- Good practice includes not sharing this anyone
Down
- This will restrict the access to a client's health information for certain people
- This tasks is done regularly by privacy officer to ensure EMR access is authorized
- The various measures we take to protect client health information in our possession
- A privacy ___ occurs when patient information is lost, stolen or accessed by or sent to someone without authorization
- Is required to communicate with them by secure email
- ____is everyone's business
- PHI stands for ____health information
12 Clues: ____is everyone's business • PHI stands for ____health information • Measures taken to protect personal data • The acronym for Ontario's health privacy law • Good practice includes not sharing this anyone • annual agreement signed by all Sherbourne employees • Is required to communicate with them by secure email • ...
Digital Literacy Crossword 2024-10-09
Across
- The exchange of information or ideas between people.
- A group of people who watch, listen to, or engage with a presentation or performance.
- Wrongful deception intended to result in financial or personal gain.
- The ability to enter or use something.
- Individuals or organisations that support an event or activity, usually financially.
- A compulsive dependence on a substance or behaviour, often harmful.
- A state of being comfortable, healthy, or happy.
- The right to keep personal information confidential and free from public scrutiny.
Down
- A particular way of viewing or considering something.
- The size, extent, or importance of something.
- A display or demonstration of information to an audience.
- A dishonest scheme or trick to deceive people, usually for money.
- An approximate calculation or judgment regarding a quantity or value.
- Measures taken to protect computers and networks from digital attacks.
- The act of communicating or engaging with others.
- A list of items to be discussed or acted upon, often in a meeting.
- A software application used to view and navigate the internet.
17 Clues: The ability to enter or use something. • The size, extent, or importance of something. • A state of being comfortable, healthy, or happy. • The act of communicating or engaging with others. • The exchange of information or ideas between people. • A particular way of viewing or considering something. • A display or demonstration of information to an audience. • ...
Love of Learning Crossword! 2025-11-05
Across
- The scientific study of crime and criminal behavior.
- The profession of reporting, writing, and editing news.
- The study of ancient Greek and Roman literature, language, and culture.
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The study of religious belief and the nature of the divine.
- The study of human history through excavation and artifacts.
- The application of science and math to design and build structures, machines, and systems.
- The study of human societies, cultures, and their development.
Down
- The field involving the design, construction, and use of machines that can act autonomously.
- The practice of protecting computers, networks, and data from attacks.
- The art and science of designing and constructing buildings.
- The study of society and human relationships within it.
- The process of recording, summarizing, and analyzing financial transactions.
- The branch of biology dealing with organisms and their environments.
- The scientific study of language and its structure.
- The study of how societies use resources and respond to scarcity.
- The science of Earth’s physical structure, history, and processes.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
technology 2023-06-07
Across
- is a file format developed by Adobe in 1992 to present documents
- is a method of representing data in a visual, machine-readable form
- is a type of computer program that, when executed, replicates itself by modifying other computer programs
- are small blocks of data created by a web serve
- is any software intentionally designed to cause disruption to a computer
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain
- is a bitmap image format that was developed by a team at the online services provider
- is a form of computer memory that can be read and changed in any order
- is a commonly used method of lossy compression for digital images
- is a mobile operating system.
Down
- is an American multinational technology company
- is a hardware or software component that stores data
- is a hardware or software component that stores data
- is a collection of discrete values that convey information
- represents text, computer processor instructions
- is the protection of computer systems and networks
- is a coding format for digital audio
- is a method of transmitting and receiving messages using electronic devices
- is a proprietary audio/video interface for transmitting uncompressed video data
20 Clues: is a mapping from some domain • is a mobile operating system. • is a coding format for digital audio • is an American multinational technology company • are small blocks of data created by a web serve • represents text, computer processor instructions • is the protection of computer systems and networks • is a hardware or software component that stores data • ...
Cyber & Digital Safety 2024-11-10
Across
- Australian agency providing tools and support for staying safe online.
- Settings that help control who can view your information online.
- An online trick designed to steal money or personal information.
- Notifying a trusted adult or platform about inappropriate content or behaviour.
- An extra layer of security for protecting online accounts.
- When someone uses your personal information to impersonate you.
- Capturing an image of your screen, sometimes used to save evidence.
- A counseling service providing support for kids in need of help.
- Pretending to be someone else online to deceive or manipulate others.
- Measures to protect devices and networks from digital threats.
Down
- Bullying or harassment that takes place online or through digital devices.
- The trail of data you leave online, like posts and searches.
- When someone builds trust with a minor online to exploit or harm them.
- The sharing of someone's private images without consent.
- Websites that are reliable and safe for information or purchases.
- Treating others well online and avoiding hurtful actions.
- False information spread online, often by mistake.
- The amount of time spent on devices with screens, like phones or tablets.
- Someone who supports others positively online, especially against bullying.
19 Clues: False information spread online, often by mistake. • The sharing of someone's private images without consent. • Treating others well online and avoiding hurtful actions. • An extra layer of security for protecting online accounts. • The trail of data you leave online, like posts and searches. • Measures to protect devices and networks from digital threats. • ...
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- a method, often secret, of bypassing normal authentication in a product.
- any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- an attempt by hackers to damage or destroy a computer network or system.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- are small files that Web sites put on your computer hard disk drive when you first visit.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
19 Clues: designed to detect and destroy computer viruses. • a method, often secret, of bypassing normal authentication in a product. • an attempt by hackers to damage or destroy a computer network or system. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Ida's Cybersecurity Crossword 2021-02-12
Across
- your files become encrypted.
- gathers information on a person and how they use their computer.
- infects your computer through email spam or instant text messages.
Down
- whether you are online or offline, it will display pop-ups or ads.
- appears as a useful or fun application (like a new game) where the hacker can use the game to perform malicious actions on your computer.
- needs to be downloaded as a part of another file to infect your computer.
- used to verify who is entering the account and is used to secure your account from hackers.
7 Clues: your files become encrypted. • gathers information on a person and how they use their computer. • whether you are online or offline, it will display pop-ups or ads. • infects your computer through email spam or instant text messages. • needs to be downloaded as a part of another file to infect your computer. • ...
Cybersecurity Crossword Puzzle 2024-09-07
Across
- Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
- Type of software that secretly gathers information from a user's computer without their consent.
- Simulated attack on a system to test its security defenses, often referred to as "pen testing."
- Network security device that monitors and filters incoming and outgoing traffic based on predefined rules.
Down
- Process of converting information into a secret code to prevent unauthorized access.
- Software vulnerability unknown to the software maker, leaving it open for attack until patched.
- Deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity, often through email.
7 Clues: Process of converting information into a secret code to prevent unauthorized access. • Malicious software designed to harm, exploit, or otherwise compromise a computer or network. • Software vulnerability unknown to the software maker, leaving it open for attack until patched. • ...
Tan Su Kyi - 8 Gamma 2023-01-19
Across
- An app where you use to communicate and call with your friend.
- We should _________ our password once a year.
- You have the _________ to find out what information the government & other organisations store about you.
Down
- It is a practice of protecting systems, networks & programs from digital attacks.
- Created when that data has been processed and become meaningful.
- A social media app that you can connect with friends, family and other people you know.
- Any company might hold your ________ information that you have in your account.
7 Clues: We should _________ our password once a year. • An app where you use to communicate and call with your friend. • Created when that data has been processed and become meaningful. • Any company might hold your ________ information that you have in your account. • It is a practice of protecting systems, networks & programs from digital attacks. • ...
Incident Response 2018-10-03
Across
- A _ _ _ _ _ _ is a copy of an electronic record, maintained to protect the information from loss and often compressed to
- An Internet scam that targets unsuspecting users through email
- space.
- A cybersecurity _ _ _ _ _ _ _ _ is considered to be any event that threatens the confidentiality, integrity or availability of an
Down
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- information resources.
- If you receive a suspicious email, the best thing to do is to _ _ _ _ _ _ the message
7 Clues: space. • information resources. • An Internet scam that targets unsuspecting users through email • If you receive a suspicious email, the best thing to do is to _ _ _ _ _ _ the message • A type of malware designed to block access to a computer system or data until a sum of money is paid • ...
Artificial intelligence crossword 2024-04-23
Across
- number of informed search method in AI
- component of artificial intelligence
- AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis.
Down
- _____ is the ability to learn and solve problems. This definition is taken from webster’s Dictionary.
- _____ test is used to determine whether or not a computer can think intelligently like humans
5 Clues: component of artificial intelligence • number of informed search method in AI • _____ test is used to determine whether or not a computer can think intelligently like humans • _____ is the ability to learn and solve problems. This definition is taken from webster’s Dictionary. • ...
Blue Frontier Crossword 2025-12-02
Across
- The practice of turning data trails into strategic truths.
- The technical foundations clients never see - until something breaks.
Down
- Where ideas become digital realities, one line at a time.
- The invisible shield guarding systems you hope never gets tested.
- The art of shaping how a business is recognised before a word is spoken.
5 Clues: Where ideas become digital realities, one line at a time. • The practice of turning data trails into strategic truths. • The invisible shield guarding systems you hope never gets tested. • The technical foundations clients never see - until something breaks. • The art of shaping how a business is recognised before a word is spoken.
Teka Teki Cyber Security 2023-10-22
Across
- Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu
- Jenis ancaman cyber yang paling sering ditemui yaitu
- Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle.
Down
- Serangkaian tindakan yang dilakukan untuk melindungi sistem komputer, jaringan, dan data dari serangan akses ilegal disebut
- Malware yg secara diam - diam merekam apa yg dilakukan pengguna, sehingga penjahat dunia maya dapat menggunkan informasinya disebut
- Selalu update _______________ untuk mengatasi ancaman cyber.
- Program yang mereplikasi diri, menempel pada file bersih dan menyebar ke seluruh sistem komputer
- Jika memperoleh email yang seolah - olah berasal dari perusahaan sah dan meminta informasi pribadi, maka itu termasuk jenis ____
8 Clues: Jenis ancaman cyber yang paling sering ditemui yaitu • Selalu update _______________ untuk mengatasi ancaman cyber. • Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu • Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle. • ...
CyF Chapter 8 2023-10-20
Across
- services hosted by a cloud provider, service provider, or internet provider.
- all of the services used by an organization including HVAC, water, and fire detection.
- collection of devices interconnected using cables or airwaves.
- the little voice in the background guiding a cybersecurity specialist as to what he/she should or should not do, regardless of whether it is legal.
Down
- any desktop computer, laptop, tablet, or smartphone that connects to the network.
- all of the critical systems, applications, and data.
- law prohibit undesired behaviors.
- includes the users who access the organization's information system.
8 Clues: law prohibit undesired behaviors. • all of the critical systems, applications, and data. • collection of devices interconnected using cables or airwaves. • includes the users who access the organization's information system. • services hosted by a cloud provider, service provider, or internet provider. • ...
Workplace Readiness Crossword (Computer Solution) 2024-09-10
Across
- includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network;
- a particular method of reasoning or argumentation
- a systematic series of actions directed to some end
- presence; the act of attending
- a belief in work as a moral good
- pretending to be someone you trust or a system you work with
- the skill of making a determination, as to a problem, or doubt, by making a judgement
- examine and judge carefully
Down
- the protection of information systems against unauthorized access (e.g., hacking, identity theft).
- a process of reasoning or a series of reasons
- the act of motivating
- malware that spreads by users from an infected device to the rest of the devices on a network/system
- book, article, person, or other resource consulted for information
- believable; reliable
- data converted into a meaningful and useful context
- the unethical distribution of mass digital messages.
- prompt; on-time
17 Clues: prompt; on-time • believable; reliable • the act of motivating • examine and judge carefully • presence; the act of attending • a belief in work as a moral good • a process of reasoning or a series of reasons • a particular method of reasoning or argumentation • a systematic series of actions directed to some end • data converted into a meaningful and useful context • ...
Love of Learning Crossword! 2025-11-05
Across
- The scientific study of crime and criminal behavior.
- The profession of reporting, writing, and editing news.
- The study of ancient Greek and Roman literature, language, and culture.
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The study of religious belief and the nature of the divine.
- The study of human history through excavation and artifacts.
- The application of science and math to design and build structures, machines, and systems.
- The study of human societies, cultures, and their development.
Down
- The field involving the design, construction, and use of machines that can act autonomously.
- The practice of protecting computers, networks, and data from attacks.
- The art and science of designing and constructing buildings.
- The study of society and human relationships within it.
- The process of recording, summarizing, and analyzing financial transactions.
- The branch of biology dealing with organisms and their environments.
- The scientific study of language and its structure.
- The study of how societies use resources and respond to scarcity.
- The science of Earth’s physical structure, history, and processes.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
Love of Learning Crossword! 2025-11-05
Across
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The art and science of designing and constructing buildings.
- The study of how societies use resources and respond to scarcity.
- The study of religious belief and the nature of the divine.
- The study of ancient Greek and Roman literature, language, and culture.
- The scientific study of crime and criminal behavior.
- The study of society and human relationships within it.
- The application of science and math to design and build structures, machines, and systems.
- The branch of biology dealing with organisms and their environments.
Down
- The study of human societies, cultures, and their development.
- The profession of reporting, writing, and editing news.
- The scientific study of language and its structure.
- The field involving the design, construction, and use of machines that can act autonomously.
- The process of recording, summarizing, and analyzing financial transactions.
- The science of Earth’s physical structure, history, and processes.
- The practice of protecting computers, networks, and data from attacks.
- The study of human history through excavation and artefacts.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
Jaringan komputer dan internet (stefani) 2024-01-13
Across
- pada jaringan memudahkan proses hubungan antarkomputer, sehingga informasi yang disalurkan bisa diakses dengan baik
- perangkat komputasi yang saling terhubung serta dapat bertukar data dan berbagi sumber daya satu sama lain
- metodologi yang memastikan agar data berada dalam kondisi yang tepat untuk mendukung inisiatif dan operasi bisnis
- metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya
Down
- termasuk salah satu dari aspek teknis jaringan komputer
- merupakan sebuah praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- salah satu tipe jaringan komputer yang paling umum ditemukan
- jaringan komputer yang andal juga bergantung pada kualitas data yang tersedia
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
- layer yang bertanggung jawab mempersiapkan data agar digunakan program tertentu
10 Clues: termasuk salah satu dari aspek teknis jaringan komputer • salah satu tipe jaringan komputer yang paling umum ditemukan • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • jaringan komputer yang andal juga bergantung pada kualitas data yang tersedia • layer yang bertanggung jawab mempersiapkan data agar digunakan program tertentu • ...
sif 2024-04-11
Across
- A distributed database that maintains a continuously growing list of ordered record called blocks
- Communication over a distance by cable, telegraph, telephone, or broadcasting
- The science of making machines that can think like humans
- The act of bringing together smaller components are information stored in different subsystems into a single functional unit
Down
- A set of commands that must be followed for a computer to perform calculations
- The practice of protecting systems, networks and programs from digital attacks
- To convert something to a computer generated simulation of reality
- computing The delivery of hosted computing services and IT resources over the internet
- A new idea, method or device
- A security method that scrambles data so it is only read by using a key
10 Clues: A new idea, method or device • The science of making machines that can think like humans • To convert something to a computer generated simulation of reality • A security method that scrambles data so it is only read by using a key • Communication over a distance by cable, telegraph, telephone, or broadcasting • ...
technology and innovation vocabulary for IELTS (3) www.atomicielts.com 2024-09-01
Across
- to go -----; spreading quickly and widely on the internet (5)
- -------; extremely large sets of information that are analysed to find trends or patterns (3,4)
- cybersecurity is protecting --------- and data from theft or damage (9)
- data ----------; converting data into a code to keep it secure (10)
- ---- interface (UI); how a person interacts with a computer or device (4)
- a digital service or website that supports interactions or activities (8)
Down
- ----- computing; using the internet to store and access data and programs (5)
- websites or apps where people share content and communicate (5,5)
- internet of ------ (IoT); a network of devices connected to the internet that can communicate with each other (6)
- ------- creation; making digital material, like videos or articles, to share online (7)
10 Clues: to go -----; spreading quickly and widely on the internet (5) • websites or apps where people share content and communicate (5,5) • data ----------; converting data into a code to keep it secure (10) • cybersecurity is protecting --------- and data from theft or damage (9) • ---- interface (UI); how a person interacts with a computer or device (4) • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
CSE 167 2022-11-16
Across
- copies of data that can be used to replace the original
- is a method of gaining unauthorized access to a network or computer system
- The use of multiple layers of security techniques to help rescue the chance of successful attacks
- in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
- allows you to encrypt and sign your data and communications
- An attack that tricks people in believing they are someone else
- Confidentiality,Integrity,Availability
- Study of techniques for secure communication in the presenter of third parties
- Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
- attack that involves trying all possible private keys
10 Clues: Confidentiality,Integrity,Availability • attack that involves trying all possible private keys • copies of data that can be used to replace the original • allows you to encrypt and sign your data and communications • An attack that tricks people in believing they are someone else • is a method of gaining unauthorized access to a network or computer system • ...
test 2023-10-08
Across
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
Down
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Pertaining to the security challenges and measures for smartphones and tablets.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
COMPUTER SCIENCE 2022-12-13
Across
- string of commands or directions used by different programming languages
- is the hardware component used to store data that is actively being used by a processor
- an area of computer science that is concerned with the intersection of social behavior and computational systems.
- maximum rate of data transfer across a given path.
Down
- is the process of protecting data from unauthorized users or hackers.
- The other Components of HCI for System Functionality aside from Hardware and Software
- simply specific procedures used to solve computational problems.
- computer program that transforms computer code written in one programming language (the source language) into another programming language
- a programming error that causes unexpected glitches or problems for a program’s end user.
- an abbreviation for “binary digit,”
10 Clues: an abbreviation for “binary digit,” • maximum rate of data transfer across a given path. • simply specific procedures used to solve computational problems. • is the process of protecting data from unauthorized users or hackers. • string of commands or directions used by different programming languages • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 1 2022-10-06
Across
- What is the best way to maintain privacy between two parties?
- Necessary when the circumstances of an incident require more details
- This horse can stampede your security defence for the bad guy and make you look sheepish too!
- When someone sends an e-mail with a link a bogus website is called
Down
- What is the weakest link in cybersecurity?
- What type of calls are made by social engineers
- ___ was the first personal computer virus?
- A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- Our company may _________ your internet usage
10 Clues: What is the weakest link in cybersecurity? • ___ was the first personal computer virus? • Our company may _________ your internet usage • What type of calls are made by social engineers • What is the best way to maintain privacy between two parties? • When someone sends an e-mail with a link a bogus website is called • ...
Cyber Security Awareness Month Crossword Puzzle - Week 1 2022-10-06
Across
- What is the weakest link in cybersecurity?
- ___ was the first personal computer virus?
- A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- Necessary when the circumstances of an incident require more details
- Our company may _________ your internet usage
Down
- is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- What is the best way to maintain privacy between two parties?
- When someone sends an e-mail with a link a bogus website is called
- This horse can stampede your security defence for the bad guy and make you look sheepish too!
- What type of calls are made by social engineers
10 Clues: What is the weakest link in cybersecurity? • ___ was the first personal computer virus? • Our company may _________ your internet usage • What type of calls are made by social engineers • What is the best way to maintain privacy between two parties? • When someone sends an e-mail with a link a bogus website is called • ...
Camouflaged text 2023-08-01
Across
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- uicydata;104.18.12.126
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- A remote code execution flaw in Nginx web server.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Artificial Intelligence 2023-11-20
Across
- The use of technology to perform tasks without human intervention.
- An expert at programming and solving problems with a computer
- To set in motion; make active or more active.
- Capable of operating independently without human control.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The systematic process of assessment and planning employed to prevent a developmental problem.
Down
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- Not functioning in a previously intended way
- The design, construction, and operation of robots to perform tasks in the real world.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
The Digital Reflection 2024-02-11
Across
- Pertaining to the online world as opposed to the physical.
- Information processed or stored by a computer, used in AI to understand user behaviors.
- How individuals are recognized or known in their social contexts, heavily influenced by digital interactions.
- A person utilizing information technology in order to engage in society, politics, and government participation.
- A process or set of rules followed by computers in problem-solving operations.
Down
- Platforms where users create, share content or participate in social networking.
- The quality of being genuine or true in the digital representation of oneself.
- The simulation of human intelligence in machines.
- The state of being free from public attention in the digital age.
- Measures taken to protect electronic information from unauthorized access.
10 Clues: The simulation of human intelligence in machines. • Pertaining to the online world as opposed to the physical. • The state of being free from public attention in the digital age. • Measures taken to protect electronic information from unauthorized access. • The quality of being genuine or true in the digital representation of oneself. • ...
crossword 2025-11-04
Across
- Internet tarmog‘i orqali xalqaro va mahalliy bozorlarni ulashga imkon beruvchi iqtisodiy jarayon.
- Axborot-kommunikatsiya texnologiyalari yordamida ma’lumotlarni tezkor almashish va biznes jarayonlarni avtomatlashtirish imkonini beruvchi tizimlar.
- O‘zbekistonning “raqamli iqtisodiyot” konsepsiyasida davlat xizmatlarini onlayn shaklda koʻrsatish uchun yaratilgan tizim.
- Oʻzbekistonda elektron tijoratning rivojlanishida asosiy rol oʻynaydigan internet orqali tovar va xizmatlar savdosi.
- O‘zbekiston Respublikasi tomonidan ilgari surilgan zamonaviy iqtisodiyot va raqamli transformatsiya dasturi.
Down
- Axborot-kommunikatsiya texnologiyalari yordamida ish jarayonlarini masofadan boshqarish imkonini beruvchi vosita.
- Raqamli iqtisodiyotda xavfsizlikni ta’minlash, ma’lumotlarni himoya qilish va firibgarlikning oldini olish texnologiyalari.
- Axborot-kommunikatsiya texnologiyalari asosida ishlab chiqilgan startaplar va innovatsion loyihalarni rag‘batlantirish tizimi.
- Raqamli iqtisodiyotda korxonalarga moliyaviy va boshqa ma’lumotlarni boshqarish imkonini beruvchi dasturiy tizimlar.
- Zamonaviy texnologiyalar yordamida tahliliy va moliyaviy qarorlar qabul qilish imkonini beruvchi tizimlar.
10 Clues: Internet tarmog‘i orqali xalqaro va mahalliy bozorlarni ulashga imkon beruvchi iqtisodiy jarayon. • Zamonaviy texnologiyalar yordamida tahliliy va moliyaviy qarorlar qabul qilish imkonini beruvchi tizimlar. • O‘zbekiston Respublikasi tomonidan ilgari surilgan zamonaviy iqtisodiyot va raqamli transformatsiya dasturi. • ...
Hospitality Today - An Introduction Internal Assessment 1 2025-10-26
Across
- Travel for leisure, business, or other purposes that drives demand in the hospitality industry.
- The use of technology to perform routine hospitality tasks efficiently without human intervention.
- Lodging facilities that provide overnight stays for guests, such as hotels and resorts.
- The protection of hospitality data and systems against digital threats and breaches
- A key customer demographic shaping modern hospitality trends through digital expectations.
- The act of providing services and experiences to guests with warmth and generosity.
Down
- A technologically advanced hotel that automates guest services and operations through IoT and AI.
- Practicing environmentally and socially responsible operations in hospitality services.
- A simulated digital environment that enhances guest engagement and training experiences in hospitality.
- The blending of business and leisure travel, creating new guest expectations and markets.
10 Clues: The protection of hospitality data and systems against digital threats and breaches • The act of providing services and experiences to guests with warmth and generosity. • Practicing environmentally and socially responsible operations in hospitality services. • Lodging facilities that provide overnight stays for guests, such as hotels and resorts. • ...
The Identity Crossword 2022-01-28
Across
- A country which is placing facial recognition technology in lamp posts.
- Face recognition, fingerprints, DNA are classified as an individuals?
- In 2018/19 _____ crime and misuse cost the Australian economy an estimated $3.1 billion.
- We need to ensure we maintain an individuals _____ when dealing with their biometrics.
- A company who recently breached the privacy act for misusing individuals biometrics without consent.
- If we do not act now to regulate biometric use, companies may further _____ this technology.
Down
- We need to ensure that we are _____ when making decisions when using biometrics.
- Digital Identity name of Denmark.
- We want biometrics to be used?
- The application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
10 Clues: We want biometrics to be used? • Digital Identity name of Denmark. • Face recognition, fingerprints, DNA are classified as an individuals? • A country which is placing facial recognition technology in lamp posts. • We need to ensure that we are _____ when making decisions when using biometrics. • ...
