cybersecurity Crossword Puzzles

Networking and the Internet 2022-06-27

Networking and the Internet crossword puzzle
Across
  1. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  2. The process of transferring data between two or more digital devices
  3. Facts and statistics collected together for refences or analysis.
  4. A global computer network consisting of multiple interconnected networks.
  5. The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
  1. The ability of computers and the Internet to consistently perform to the expectations of their designed function.
  2. The speed and resource usage involved in collecting, manipulating, and analyzing data.
  3. The preservation of accuracy and consistency of a data set over the course of its analysis.
  4. A numerical label assigned to each computing device on a network.
  5. A series of interconnected computers and devices that share resources and exchange data with each other.
  6. The rate at which data is communicated from the Internet to a computer and vice versa.

11 Clues: A numerical label assigned to each computing device on a network.Facts and statistics collected together for refences or analysis.The process of transferring data between two or more digital devicesA global computer network consisting of multiple interconnected networks....

Women in Forensics 2021-01-17

Women in Forensics crossword puzzle
Across
  1. US Navy’s chief cryptanalyst who served during World War I and World War II.
  2. a women led startup providing security solutions for strong 2FA using U2F, OTP, PIV,etc.
  3. largest initiative to increase women’s participation in the cyber field in Europe.
  4. the first woman to speak at DEFCON, the world’s greatest hacker conference.
  5. India’s first woman cybercrime investigator
  6. a DSCI led initiative to enhance cyber security education for girls in India
Down
  1. a spread spectrum modulation technique derived from chirp spread spectrum (CSS) technology
  2. a security Camp supported by the NSA being largest girls-only residential camp in the country.
  3. a non profit organization which launched a program "100 Women in 100 Days" to uplift girls in cyber security
  4. a process in data cloning that spreads the data across the available drives in chunks.
  5. percentage of women in cybersecurity according to report by Frost and Sullivan in 2013.

11 Clues: India’s first woman cybercrime investigatorthe first woman to speak at DEFCON, the world’s greatest hacker conference.US Navy’s chief cryptanalyst who served during World War I and World War II.a DSCI led initiative to enhance cyber security education for girls in India...

Cyber Security 2024-11-13

Cyber Security crossword puzzle
Across
  1. An unauthorised user who attempts to or gain access to a network
  2. A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
  3. Securing your online accounts with an extra layer of protection is called ____________________ authentication
  4. Computer programs that can block, detect, and remove viruses and other malware
Down
  1. A mechanism to create a secure connection between a computer and the network
  2. The unauthorised disclosure or unwanted exposure of confidential information
  3. The protection of digital information, as well as the integrity of the infrastructure
  4. Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
  5. Faking the sender’s email address to gain access to a secure network

9 Clues: An unauthorised user who attempts to or gain access to a networkFaking the sender’s email address to gain access to a secure networkA mechanism to create a secure connection between a computer and the networkThe unauthorised disclosure or unwanted exposure of confidential information...

AI CRUCIVERBA 2025-01-31

AI CRUCIVERBA crossword puzzle
Across
  1. Learning – Tecnica avanzata di Machine Learning basata su reti neurali profonde.
  2. Artificiale – Capacità delle IA di generare arte, musica e testi originali.
  3. Artificiale (IA) – Tecnologia che simula l’intelligenza umana tramite algoritmi e reti neurali.
  4. Industriale – Uso di macchine e software IA per migliorare produttività e ridurre errori.
  5. Learning – Metodo che permette ai computer di apprendere dai dati senza programmazione esplicita.
  6. Virtuale – Sistemi basati su IA come Siri o Alexa che rispondono a comandi vocali.
  7. Neurali – Modelli ispirati alla struttura del cervello umano per elaborare dati e riconoscere pattern.
  8. Uomo-Macchina – Tecnologie che migliorano l’interazione tra persone e dispositivi IA.
  9. Tecnologica – Progresso ottenuto grazie all’introduzione dell’IA in diversi settori.
  10. Data – Enormi quantità di dati analizzati per ricavare informazioni strategiche.
  11. – Programmi che simulano conversazioni umane attraverso testi o vocali.
Down
  1. – Adattamento di servizi e contenuti alle preferenze individuali grazie all’IA.
  2. – Insieme di istruzioni logiche che guidano il funzionamento dell’IA.
  3. – Disciplina che sviluppa macchine intelligenti capaci di interagire con l’ambiente.
  4. Science – Scienza che analizza e interpreta grandi quantità di dati con strumenti IA.
  5. – Protezione dei sistemi informatici dalle minacce attraverso l’IA.
  6. Medica – Applicazione dell’IA per rilevare malattie e supportare i medici nelle cure.
  7. Algoritmico – Pregiudizi insiti negli algoritmi che possono influenzare decisioni automatiche.
  8. – Uso di tecnologie per eseguire compiti senza intervento umano diretto.
  9. – Studio degli impatti morali dell’IA sulla società e sulla responsabilità delle decisioni automatiche.

20 Clues: – Protezione dei sistemi informatici dalle minacce attraverso l’IA.– Insieme di istruzioni logiche che guidano il funzionamento dell’IA.– Programmi che simulano conversazioni umane attraverso testi o vocali.– Uso di tecnologie per eseguire compiti senza intervento umano diretto....

IT Crossward 2025-05-15

IT Crossward crossword puzzle
Across
  1. Protecting entry points (endpoints) of devices from cybersecurity threats.
  2. Best practices for IT services management, set by the Information Technology Infrastructure Library.
  3. Devices such as desktops, laptops, or servers that connect to a network.
  4. A numerical label used to identify a device on a network.
  5. A widely used wired network technology for local area networks (LANs).
  6. A backup that only copies data changes since the last backup.
  7. A portable storage device that connects via a USB port.
  8. Cisco term that refers to the connection of people, process, data, and things.
  9. A set of rules guiding users' behavior to ensure information security.
  10. Tools used by cybercriminals to take advantage of system vulnerabilities.
Down
  1. A device or software that blocks unauthorized network traffic.
  2. Devices connected to the internet that collect and share data.
  3. A cable connector with holes that plugs into a device's port.
  4. Cloud service model offering virtual machines and other computing resources.
  5. A device that connects a computer to an Ethernet network.
  6. Distributed computing that brings data processing closer to where it is needed to improve response times.
  7. A program that modifies data or prevents non-matching data from passing through.
  8. The process of converting data into unreadable code for protection.
  9. The company providing your internet connection.

19 Clues: The company providing your internet connection.A portable storage device that connects via a USB port.A numerical label used to identify a device on a network.A device that connects a computer to an Ethernet network.A cable connector with holes that plugs into a device's port.A backup that only copies data changes since the last backup....

TERMINOLOGIES RELATED TO RA 10175 2023-10-25

TERMINOLOGIES RELATED TO RA 10175 crossword puzzle
Across
  1. gathering and receiving information
  2. transmission of information through information and communication technology
  3. a set of instructions executed by the computer to achieve intended results
  4. digital information that may be used as evidence in a case
  5. refers to the computer systems, and/or networks, whether physical or virtual
  6. person who created or is the origin of the assailed electronic statement
  7. collection of tools, policies, risk management approaches and actions
  8. an electronic, magnetic, optical, electrochemical, or other data processing
  9. a person who hosts or who proposes to host internet content
  10. an exact bit-by-bit copy of a data carrier
Down
  1. either the Cybercrime Investigation and Coordinating Center
  2. modification or change, in form or substance, of an existing computer data or program
  3. representation of information, knowledge, facts, concepts or instructions which are being prepared
  4. mathematical algorithm produced against digital information
  5. keeping of data that already exists in a stored form
  6. listening to, recording, monitoring or surveillance of the content of communications
  7. refers to evidence, the use of which is sanctioned by existing rules of evidence
  8. any representation of facts, information, or concepts in a form suitable for processing in a computer system
  9. willful engagement, maintenance, control or operation, directly or indirectly

19 Clues: gathering and receiving informationan exact bit-by-bit copy of a data carrierkeeping of data that already exists in a stored formdigital information that may be used as evidence in a caseeither the Cybercrime Investigation and Coordinating Centermathematical algorithm produced against digital information...

Q1 '24 Crossword 2024-04-04

Q1 '24 Crossword crossword puzzle
Across
  1. One of our oldest litigations which was resolved in Q1
  2. Paul conducted a lunch-n-learn on this type of trading
  3. RC’s first mitigation plan of this type was published by Anne
  4. Christine & Lydvine have finalized a new bank of clauses to assist in these type of negotiations
  5. International Data Privacy Day happens in this month
  6. The office in this location is nearly complete
  7. Our upcoming CLE conducted by the Wilson team is a discussion of these type of reporting rules
  8. The new system rolled out in Q1, supported by Legal Procurement
  9. Cathleen rolled out a refreshed severance pay plan of this type
Down
  1. A delicious celebration of this was held on March 14
  2. The topic of our upcoming CLE conducted by the Orrick team
  3. Privacy is considered one of these when it comes to Trustworthy AI
  4. One of the firms with which Ops negotiated a 10% discount
  5. The IP team has developed a Registration Policy for these
  6. Sunny is working on RC’s Class A Certificate Application in this country
  7. Nikki & Jose are working to launch version 2.0 of this program
  8. One of RC India’s first customer agreements negotiated by Mandakini
  9. Jay & Allison conducted one of these on Export for our lunch-n-learn series
  10. AnneSophie’s favorite snack

19 Clues: AnneSophie’s favorite snackThe office in this location is nearly completeA delicious celebration of this was held on March 14International Data Privacy Day happens in this monthOne of our oldest litigations which was resolved in Q1Paul conducted a lunch-n-learn on this type of tradingOne of the firms with which Ops negotiated a 10% discount...

CYBERSECURITY 2025-11-27

CYBERSECURITY crossword puzzle
Across
  1. Fake messages that steal your data
  2. Software designed to harm a system
Down
  1. Blocks unauthorized network access

3 Clues: Blocks unauthorized network accessFake messages that steal your dataSoftware designed to harm a system

Safety Crossword 2022-10-20

Safety Crossword crossword puzzle
Across
  1. aerosols, nail polish and cooking oils are all highly ________
  2. if you see someone doing something unsafe on the job, you should use your _________________
  3. an unplanned event that did not result in injury, illness or damage, but had the potential to do so
  4. protection for your hands
  5. the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
Down
  1. offers a way for all employees to confirm their dedication to positive safety behavior each year
  2. a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
  3. when you are on a boat, canoe, or kayak, make sure you always wear a __________
  4. a tornado _______ means a tornado has been spotted or a radar has picked one up
  5. regulatory agency that inspects and examines workplaces
  6. you can help prevent back problems by having good _______
  7. you should check the batteries of your smoke detector _______
  8. protection for your eyes
  9. protection for your head

14 Clues: protection for your eyesprotection for your headprotection for your handsregulatory agency that inspects and examines workplacesyou can help prevent back problems by having good _______you should check the batteries of your smoke detector _______aerosols, nail polish and cooking oils are all highly ________...

Advance Adjectives 2024-02-10

Advance Adjectives crossword puzzle
Across
  1. The antique watch, passed down through generations, was not only ______ but also held sentimental value for the family.
  2. After a long hike, the hikers enjoyed a ______ dip in the cool mountain stream.
  3. The new sports car boasted a ______ design, turning heads as it sped down the highway.
  4. The student's apartment was small but well-organized, making clever use of ______ furniture to maximize space.
  5. The antique store showcased a collection of ______ clothing and accessories from the 1920s.
Down
  1. The suburban neighborhood was known for its ______ streets, lined with tall, green trees.
  2. The children's book was filled with ______ illustrations of talking animals and enchanted landscapes.
  3. The company invested in a ______ cybersecurity system to protect sensitive customer data from potential threats.

8 Clues: After a long hike, the hikers enjoyed a ______ dip in the cool mountain stream.The new sports car boasted a ______ design, turning heads as it sped down the highway.The suburban neighborhood was known for its ______ streets, lined with tall, green trees.The antique store showcased a collection of ______ clothing and accessories from the 1920s....

Safety Crossword 2022-10-20

Safety Crossword crossword puzzle
Across
  1. you should check the batteries of your smoke detector _______
  2. infectious microorganisms in human blood that can cause disease in humans
  3. offers a way for all employees to confirm their dedication to positive safety behavior each year
  4. what does PPE stand for?
  5. when you are on a boat, canoe, or kayak, make sure you always wear a __________
  6. an unplanned event that did not result in injury, illness or damage, but had the potential to do so
  7. you can help prevent back problems by having good _______
  8. protection for your head
Down
  1. regulatory agency that inspects and examines workplaces
  2. a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
  3. a tornado _______ means a tornado has been spotted or a radar has picked one up
  4. aerosols, nail polish and cooking oils are all highly ________
  5. protection for your hands
  6. the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
  7. protection for your eyes
  8. if you see someone doing something unsafe on the job, you should use your _________________

16 Clues: what does PPE stand for?protection for your eyesprotection for your headprotection for your handsregulatory agency that inspects and examines workplacesyou can help prevent back problems by having good _______you should check the batteries of your smoke detector _______aerosols, nail polish and cooking oils are all highly ________...

Safety Crossword 2022-10-20

Safety Crossword crossword puzzle
Across
  1. regulatory agency that inspects and examines workplaces
  2. an unplanned event that did not result in injury, illness or damage, but had the potential to do so
  3. you can help prevent back problems by having good _______
  4. aerosols, nail polish and cooking oils are all highly ________
  5. a tornado _______ means a tornado has been spotted or a radar has picked one up
  6. you should check the batteries of your smoke detector _______
  7. a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
  8. offers a way for all employees to confirm their dedication to positive safety behavior each year
  9. the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
  10. what does PPE stand for?
Down
  1. protection for your hands
  2. if you see someone doing something unsafe on the job, you should use your _________________
  3. when you are on a boat, canoe, or kayak, make sure you always wear a __________
  4. protection for your head
  5. protection for your eyes
  6. infectious microorganisms in human blood that can cause disease in humans

16 Clues: protection for your headprotection for your eyeswhat does PPE stand for?protection for your handsregulatory agency that inspects and examines workplacesyou can help prevent back problems by having good _______you should check the batteries of your smoke detector _______aerosols, nail polish and cooking oils are all highly ________...

Threat Intelligence (Medium) 2023-06-01

Threat Intelligence (Medium) crossword puzzle
Across
  1. A type of cyberattack that uses deception to trick individuals into revealing sensitive information.
  2. A software vulnerability that is known and can be exploited by attackers.
  3. The process of analyzing and evaluating threats to identify potential risks and vulnerabilities.
  4. A malicious software that disguises itself as legitimate software to gain unauthorized access or cause harm.
  5. The process of gathering and analyzing information to identify and mitigate potential threats.
Down
  1. An individual or group that conducts unauthorized activities to gain access to computer systems.
  2. A technique used to deceive individuals or systems by pretending to be a trusted entity.
  3. The process of identifying, categorizing, and prioritizing potential threats or vulnerabilities.
  4. A set of predefined rules or criteria used to identify potential threats or suspicious activities.
  5. An attack in which multiple compromised devices are used to flood a network or website with traffic.
  6. A comprehensive plan designed to detect, respond to, and recover from cybersecurity incidents.

11 Clues: A software vulnerability that is known and can be exploited by attackers.A technique used to deceive individuals or systems by pretending to be a trusted entity.A comprehensive plan designed to detect, respond to, and recover from cybersecurity incidents.The process of gathering and analyzing information to identify and mitigate potential threats....

26 2024-01-08

26 crossword puzzle
Across
  1. Work Working from a location other than the central office, often from home.
  2. Disturbance or problems that interrupt an event, activity, or process.
  3. A digital or virtual form of currency that uses cryptography for security.
  4. A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
  5. The activity of exploiting genetic material experimentally without regard to ethical considerations.
  6. The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
Down
  1. Commercial transactions conducted electronically on the Internet.
  2. A step-by-step procedure or formula for solving a problem or accomplishing a task.
  3. Reality An artificial environment created with the help of computer technology, often including simulated physical presence.
  4. The remote diagnosis and treatment of patients by means of telecommunications technology.
  5. Change Long-term change in the average weather patterns that have come to define Earth's local, regional, and global climates. (Note: Repeated for variety.)
  6. Including all or everyone; not excluding any particular group or individual.

12 Clues: Commercial transactions conducted electronically on the Internet.Disturbance or problems that interrupt an event, activity, or process.A digital or virtual form of currency that uses cryptography for security.Work Working from a location other than the central office, often from home....

Year 10 Summer 2025 Revision 2025-05-12

Year 10 Summer 2025 Revision crossword puzzle
Across
  1. when attackers send scam emails (or text messages) that contain links to malicious websites
  2. Going against the law of a country or jurisdiction
  3. Tricking people into revealing confidential information, like passwords or PINs.
  4. helps prevent bots from overwhelming websites by creating fake accounts or posting spam.
  5. A biometric scan used in place of a password
Down
  1. Copying a game from a website free that you should be paying for
  2. After entering your password, you might need to enter a code sent to your phone
  3. The practices and technologies used to protect systems, networks, programs, and data from cyber attacks and unauthorized access
  4. a type of cyberattack where scammers use phone calls or voice messages to trick individuals into revealing sensitive information
  5. The gaining of unauthorised access to data in a system or computer.
  6. An intellectual property right that protects original creative works, granting the author exclusive control over how their work is used

11 Clues: A biometric scan used in place of a passwordGoing against the law of a country or jurisdictionCopying a game from a website free that you should be paying forThe gaining of unauthorised access to data in a system or computer.After entering your password, you might need to enter a code sent to your phone...

Cybersecurity 2024-05-16

Cybersecurity crossword puzzle
Across
  1. Big red Bricks.
Down
  1. Small cats.
  2. Giant Cats.

3 Clues: Small cats.Giant Cats.Big red Bricks.

Cybersecurity 2025-03-11

Cybersecurity crossword puzzle
Across
  1. A red or green fruit
Down
  1. A tall natural elevation
  2. A programming language

3 Clues: A red or green fruitA programming languageA tall natural elevation

Cybersecurity Fundamental Chapter 6 Part 2 2022-10-27

Cybersecurity Fundamental Chapter 6 Part 2 crossword puzzle
Across
  1. in conjunction with one or more other routers attached to a lan.
  2. updates and backup location periodically and in the most bandwidth conservative options.
  3. it requires less bandwidth and sites can be further apart because latency is less of an issue.
  4. allow for faster recovery if someone maliciously or unintentionally reformats flash memory or erases the startup configuration file.
  5. detection systems monitor the traffic on a network.
  6. a cisco ios technology that provides statistics on packets flowing through a cisco router or multilayer switch.
  7. labor events, social-political events, material events and utilities disruptions.
Down
  1. allows network access for authorized users with compliant systems.
  2. ability to react to problems in one of its components while still functioning.
  3. provide high network availability by providing first-hop routing redundancy.
  4. protects data traffic from a failed router or circuit, while also allowing load balancing between a group of redundant routers.
  5. it can detect and immediately address a network problem.
  6. requires high bandwidth and locations must be close together to reduce latency.
  7. investigate the cause of the incident and ask questions to better understand the nature of the threat.
  8. a network protocol that provides for redundancy.
  9. discovering the incident.

16 Clues: discovering the incident.a network protocol that provides for redundancy.detection systems monitor the traffic on a network.it can detect and immediately address a network problem.in conjunction with one or more other routers attached to a lan.allows network access for authorized users with compliant systems....

Cybersecurity Awareness Month Week 2 2025 2025-10-09

Cybersecurity Awareness Month Week 2 2025 crossword puzzle
Across
  1. the part of the password that contains numbers is called ____
  2. Always use a _____ password so that it is harder to guess and doesn't make sense
  3. the person attempting to log in is called a ____
  4. The more ______ a password is the harder it will be to crack
  5. this ____ consists of symbols used to represent letters or numbers
  6. Your account is _____ due to too many incorrect password attempts
  7. Both Upper____ and Lower____ characters should be used in passwords all the time
  8. If you forget your login credentials you will likely need a password _____
  9. The _____ of a password determines how many characters are needed
Down
  1. your password should be kept ________
  2. most sites that are ______ will stop you from entering
  3. Permission to enter or use a resource
  4. A password _______ helps to better track all of your different passwords
  5. a device used for authentication often generated with a passcode
  6. A ______ character usually consists of characters like ?<>!@
  7. Your ______ is like a portable Desktop computer

16 Clues: your password should be kept ________Permission to enter or use a resourceYour ______ is like a portable Desktop computerthe person attempting to log in is called a ____most sites that are ______ will stop you from enteringThe more ______ a password is the harder it will be to crackA ______ character usually consists of characters like ?<>!@...

Cybersecurity Awareness Month 2025 Week 1 2025-09-23

Cybersecurity Awareness Month 2025 Week 1 crossword puzzle
Across
  1. your device can be infected with this bad software
  2. this is a type of phishing but relates to messages sent via SMS
  3. Bad actors usually add this to an email in order to get you to click on it and infect your device
  4. this should be used to log in to you account and should not be shared with anyone.
  5. this is found usually an the form of image or file that is sent with an email
  6. this is a way of locking files in your electronic device in order for others not to access it
  7. your device can be infected with this software that is used to spy on you
  8. the end of an email address usually found after the @ symbol
  9. this can be used to store information and transfer it from one device to another
  10. a weakness in any system
Down
  1. your device can be infected with this. it locks your files and the bad actor will ask for a payment in order to unlock it.
  2. you should contact this team whenever you receive a suspicious email
  3. you need to conduct these so that your device is properly protected from the latest threats
  4. the name of this operating system can also be used to describe a feature of a building
  5. This software is used to protect your electronic device from possible infections
  6. Bad actors send these emails or messages pretending to be a reputable source

16 Clues: a weakness in any systemyour device can be infected with this bad softwarethe end of an email address usually found after the @ symbolthis is a type of phishing but relates to messages sent via SMSyou should contact this team whenever you receive a suspicious emailyour device can be infected with this software that is used to spy on you...

Chapter 6 - Network Design Elements 2025-05-21

Chapter 6 - Network Design Elements crossword puzzle
Across
  1. A cloud-based delivery model for security services like antivirus and firewalls.
  2. A cloud model offering virtualized computing resources over the internet.
  3. A network state where a device defaults to open access after failure.
  4. A solution that enforces security policies before allowing network access.
  5. A method of dialing many phone numbers to find modems or unsecured lines.
  6. Impersonating a device's MAC address to bypass security.
  7. An attack that allows access to traffic on other VLANs.
  8. A network design using two firewalls to isolate a DMZ.
Down
  1. A publicly shared list of known cybersecurity vulnerabilities and exposures.
  2. A cloud model providing a platform for developers to build and deploy applications.
  3. A protocol that prevents network loops by managing redundant paths.
  4. A switch memory table that stores MAC-to-port mappings.
  5. A cloud model where applications are delivered over the internet.
  6. An attack that overwhelms a switch's memory with fake MAC addresses.
  7. A one-to-one mapping between a private and public IP address.
  8. A firewall setup with three interfaces: internal, external, and DMZ.
  9. A method that modifies IP addresses to allow private devices to access the internet.
  10. A buffer zone between internal networks and external, untrusted networks.
  11. A type of NAT that maps multiple private IPs to one public IP using port numbers.

19 Clues: A network design using two firewalls to isolate a DMZ.A switch memory table that stores MAC-to-port mappings.An attack that allows access to traffic on other VLANs.Impersonating a device's MAC address to bypass security.A one-to-one mapping between a private and public IP address.A cloud model where applications are delivered over the internet....

Enterpise Computing 2025-07-23

Enterpise Computing crossword puzzle
Across
  1. the ability of machines to perform tasks that typically require human intelligence.
  2. software designed to perform specific tasks for users
  3. the practice of protecting systems and networks from digital attacks
Down
  1. a type of malicious software (malware) that encrypts a victim's data and demands a ransom payment for its release. I
  2. causing or tending to cause disruption.
  3. a concept describing a persistent, shared, 3D virtual world, often seen as the next evolution of the internet
  4. an apparatus using or applying mechanical power and having several parts, each with a definite function and together performing a particular task.

7 Clues: causing or tending to cause disruption.software designed to perform specific tasks for usersthe practice of protecting systems and networks from digital attacksthe ability of machines to perform tasks that typically require human intelligence....

ciao 2022-02-03

ciao crossword puzzle
Across
  1. : is encrypted text transformed from clear text using a configuration algorithm
  2. : computer scam carried out by sending an e-mail with the counterfeit logo of a credit institution, in which the recipient is invited to provide confidential data.
  3. :represents information security
Down
  1. : is the expression used to refer to encrypted and not freely accessible content located on darknets, dark and "parallel" networks accessible only through specific configurations and specific access authorizations.
  2. : decrypted, simple, clean text
  3. : it is the process of encoding information
  4. : is the portion of the World Wide Web that is readily available to the general public and searchable with standard web search engines

7 Clues: : decrypted, simple, clean text:represents information security: it is the process of encoding information: is encrypted text transformed from clear text using a configuration algorithm: is the portion of the World Wide Web that is readily available to the general public and searchable with standard web search engines...

CSAM20 Week 1 2020-09-02

CSAM20 Week 1 crossword puzzle
Across
  1. A malicious software program used to record every key stroke made on keyboards, giving hackers the ability to determine account information.
  2. Social engineering and scams are designed to trick users into giving up their _____ information.
  3. A network type publicly open to everyone, including hackers.
  4. Who sings the famous song, Eye of the Tiger?
  5. Fraudulent use of a person's confidential identifying information is known as _____ theft.
  6. Another word used for "malicious software".
Down
  1. The art of protecting software, hardware and data on computer systems and networks against malicious activity.
  2. A malicious software disguised as a legitimate program.
  3. Phishing involves attachments or illegitimate website links sent via _____ that consist of malware or impersonates credible sources in attempt to receive confidential information.
  4. An unwanted software that steals your internet usage data and confidential information, watching your every move.

10 Clues: Another word used for "malicious software".Who sings the famous song, Eye of the Tiger?A malicious software disguised as a legitimate program.A network type publicly open to everyone, including hackers.Fraudulent use of a person's confidential identifying information is known as _____ theft....

ADSI Terms Sebastian Salazar 2022-02-11

ADSI Terms Sebastian Salazar crossword puzzle
Across
  1. A system of words, letters, or signs used to create programs, apps or web pages.
  2. person who writes computer programs.
  3. The rules that programming languages have for typing their codes right.
  4. collection of instructions that connect the hardware and tell a computer how to work.
  5. is the global system of interconnected computer networks.
  6. the part of an application that performs an essential task not apparent to the user.
Down
  1. Is the application of processes and controls with technologies to protect systems, networks, programs, devices and data from crackers or bad hackers.
  2. An image or set of images which displays the functional elements of a website, information system or an app.
  3. an organized collection of structured information, or data, typically stored electronically in a computer system.
  4. A computer program designed to help people perform an activity.

10 Clues: person who writes computer programs.is the global system of interconnected computer networks.A computer program designed to help people perform an activity.The rules that programming languages have for typing their codes right.A system of words, letters, or signs used to create programs, apps or web pages....

types of hazards 2024-01-11

types of hazards crossword puzzle
Across
  1. Risks associated with slips, trips, and falls in the office space.
  2. The threat of violence or harm in the workplace, including bullying and harassment.
  3. Potential dangers related to the use of electrical equipment or wiring in the office.
  4. Issues related to inadequate lighting, ventilation, or air quality in the office.
Down
  1. Hazardous situations that may result from poor ergonomic design of office furniture or equipment.
  2. The risk of exposure to harmful microorganisms or infectious diseases within the office.
  3. A sudden and unexpected event that can cause harm or damage in the office environment.
  4. The risk of data breaches, unauthorized access, or loss of sensitive information in the office.
  5. Exposure to harmful substances, such as chemicals or allergens, present in the office environment.
  6. The risk of fire, whether from faulty wiring, electronic devices, or other sources in the office.

10 Clues: Risks associated with slips, trips, and falls in the office space.Issues related to inadequate lighting, ventilation, or air quality in the office.The threat of violence or harm in the workplace, including bullying and harassment.Potential dangers related to the use of electrical equipment or wiring in the office....

types of hazards 2024-01-11

types of hazards crossword puzzle
Across
  1. The threat of violence or harm in the workplace, including bullying and harassment.
  2. Exposure to harmful substances, such as chemicals or allergens, present in the office environment.
  3. The risk of exposure to harmful microorganisms or infectious diseases within the office.
  4. Risks associated with slips, trips, and falls in the office space.
  5. Hazardous situations that may result from poor ergonomic design of office furniture or equipment.
Down
  1. Issues related to inadequate lighting, ventilation, or air quality in the office.
  2. The risk of data breaches, unauthorized access, or loss of sensitive information in the office.
  3. Potential dangers related to the use of electrical equipment or wiring in the office.
  4. The risk of fire, whether from faulty wiring, electronic devices, or other sources in the office.
  5. A sudden and unexpected event that can cause harm or damage in the office environment.

10 Clues: Risks associated with slips, trips, and falls in the office space.Issues related to inadequate lighting, ventilation, or air quality in the office.The threat of violence or harm in the workplace, including bullying and harassment.Potential dangers related to the use of electrical equipment or wiring in the office....

UNIT 5.9 Management Information Systems 2024-08-14

UNIT 5.9 Management Information Systems crossword puzzle
Across
  1. a method of industrial management designed to increase efficiency and productivity
  2. is a leading global vendor of computer software
  3. protecting computer networks from hacks
  4. Covers the entire spectrum of analyzing data to derive insights and support decision-making.
  5. a process used by businesses to identify and summarize patterns within data by using software to look for patterns in large batches of data.
  6. refers to data centres on the internet.
Down
  1. something of an averall term for 'smart' technologies that are aware of and can learn from their environments to assist or support human decision-making.
  2. a simulation of a complete environment where the user can interact with.
  3. occurs when individuals or businesses undertake illegal online activities
  4. refers to large, complex data sets whose size or type is beyond the ability of traditional relational databases to capture

10 Clues: protecting computer networks from hacksrefers to data centres on the internet.is a leading global vendor of computer softwarea simulation of a complete environment where the user can interact with.occurs when individuals or businesses undertake illegal online activities...

QUIZ #2 -MEDIA AND INFORMATION LITERACY 2024-08-18

QUIZ #2 -MEDIA AND INFORMATION LITERACY crossword puzzle
Across
  1. It is known as the information age.
  2. It refers to the person and their responsible and ethical use of technology and online resources.
  3. It is the ability to identify, locate, evaluate, and effectively use information.
  4. It refers to an act concerning to safe space inside the internet including cyberbullying.
  5. It is a Legal regulation governing online behavior.
Down
  1. It is the ability to use digital technologies and internet resources.
  2. It is an act concerning to use of online material without the permission of the owner.
  3. It is the ability to access, analyze, evaluate, and create media in various forms.
  4. It is a general term for the set of rules and guidelines governing respectful and effective communication on the internet.
  5. It refers to an act securing that online information is safe from harmful use of others.

10 Clues: It is known as the information age.It is a Legal regulation governing online behavior.It is the ability to use digital technologies and internet resources.It is the ability to identify, locate, evaluate, and effectively use information.It is the ability to access, analyze, evaluate, and create media in various forms....

Digital literacy keywords 2024-09-17

Digital literacy keywords crossword puzzle
Across
  1. Effective use of digital platforms (email, social media, messaging apps) for communication.
  2. Using technology to solve problems, fix technical issues, and try new digital tools for specific tasks.
  3. Understanding the impact of sharing personal information online and managing privacy settings on digital platforms.
  4. Evaluating digital content for credibility, bias, and intent, and identifying and addressing misinformation, disinformation, and fake news.
  5. Awareness of the lasting impact of online activities, including social media posts, search histories, and other traces left online.
  6. Ability to use different technological tools and applications (e.g. computers, smart devices, software programmes.
  7. Understanding how to protect personal data, privacy, and digital identity.
Down
  1. Ability to find, evaluate, and use digital information effectively.
  2. Ability to analyze, evaluate, and produce digital media, including text, images, and videos.
  3. Understanding the ethical and legal consequences of digital actions, like respecting copyrights and behaving responsibly online.

10 Clues: Ability to find, evaluate, and use digital information effectively.Understanding how to protect personal data, privacy, and digital identity.Effective use of digital platforms (email, social media, messaging apps) for communication.Ability to analyze, evaluate, and produce digital media, including text, images, and videos....

Top 10 Challenges in Healthcare Today 2024-11-11

Top 10 Challenges in Healthcare Today crossword puzzle
Across
  1. The pandemic increased cases of depression, anxiety, and substance use disorders, straining mental health services.
  2. COVID-19 highlighted the need for resilient healthcare infrastructure to handle future crises.
  3. Shortages of RNs, technicians, and specialists strain the healthcare system, especially in rural areas.
  4. Barriers like high costs and lack of insurance prevent access to essential preventive services.
  5. Changing reimbursement models challenge providers to balance finances with quality care.
Down
  1. Systemic barriers create gaps in health outcomes, particularly among marginalized populations.
  2. Healthcare is a prime target for cyberattacks due to the sensitivity of patient data.
  3. Advances in digital health and AI improve care but require strong data management and security.
  4. Increasing expenses for labor, supplies, and services create financial pressure on healthcare organizations.
  5. An older population requires extensive resources for managing chronic diseases and long-term care.

10 Clues: Healthcare is a prime target for cyberattacks due to the sensitivity of patient data.Changing reimbursement models challenge providers to balance finances with quality care.Systemic barriers create gaps in health outcomes, particularly among marginalized populations....

Cyber Security Puzzle 2025-06-30

Cyber Security Puzzle crossword puzzle
Across
  1. Extra copies of computer files that can be used to restore files that are lost or damaged.
  2. Attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources.
  3. An unauthorized user who attempts to or gains access to an information system.
  4. Software designed to block malware from entering protected networks.
  5. A mechanism for creating a secure connection between a computing device and a computer network.
  6. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
Down
  1. A string of characters used to authenticate and identity.
  2. A flaw or weakness in an information system that could be exploited.
  3. part of internet that is not indexed by search engines.
  4. A computer program that can block, detect and remove viruses and other malware.

10 Clues: part of internet that is not indexed by search engines.A string of characters used to authenticate and identity.A flaw or weakness in an information system that could be exploited.Software designed to block malware from entering protected networks.An unauthorized user who attempts to or gains access to an information system....

RISK 101 2023-01-31

RISK 101 crossword puzzle
Across
  1. Platform for capturing incidents
  2. is the third line of defense
  3. where our production servers are located
  4. chatbot in RMP that can respond to your risk queries
  5. is the anonymous reporting
  6. is the uncertainty that objectives will not be met
Down
  1. is short for risk and self control assessment
  2. is a type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
  3. risk is the risk of financial or reputational loss that can result from lack of awareness or misunderstanding of, ambiguity in, or reckless indifference to, the way law and regulation apply to your business, its relationships, processes, products and services
  4. risk is the risk of loss suffered as a result of the inadequacy of, or failure in, internal processes, people and/or systems or from external events.

10 Clues: is the anonymous reportingis the third line of defensePlatform for capturing incidentswhere our production servers are locatedis short for risk and self control assessmentis the uncertainty that objectives will not be metchatbot in RMP that can respond to your risk queries...

Scientific and Technological Innovations 2025-04-14

Scientific and Technological Innovations crossword puzzle
Across
  1. ethics : The branch of philosophy that studies moral issues related to artificial intelligence and its applications.
  2. energy : Energy derived from natural sources that are replenished constantly, such as solar or wind power.
  3. : The practice of protecting systems, networks, and data from digital attacks.
  4. materials : Substances that change their properties in response to external conditions like temperature or pressure.
  5. : The science of manipulating matter on an atomic or molecular scale.
Down
  1. : A decentralized digital ledger technology used for securely recording transactions.
  2. : A form of 3D printing that uses living cells to create tissues and potentially organs.
  3. reality : A simulated experience that can be similar to or completely different from the real world.
  4. : The branch of technology concerned with the design, construction, and operation of robots.
  5. computing : A revolutionary technology that uses quantum mechanics to process information at incredible speeds.

10 Clues: : The science of manipulating matter on an atomic or molecular scale.: The practice of protecting systems, networks, and data from digital attacks.: A decentralized digital ledger technology used for securely recording transactions.: A form of 3D printing that uses living cells to create tissues and potentially organs....

Ellie & Jacobs Wedding Crossword 2025-07-05

Ellie & Jacobs Wedding Crossword crossword puzzle
Across
  1. What Channel Island did Jacob sneak off to whilst Ellie was away to get her ring?
  2. Where has Ellie worked for the last 5 years?
  3. Ellie patiently listened to Jacob rehearse his dissertation presentation over 50 times during finals, but on what irritating hearing condition was it on?
  4. Where do Ellie and Jacob Live (hint: not fkn Margate!)
Down
  1. For two years, Ellie (equity research) and Jacob (data) worked in the same industry, what was it?
  2. Where in Italy did Jacob take Ellie for her birthday this year?
  3. Ellie and Jacob were both born in the same year, but what month was Ellie born in?
  4. What Asian country have Ellie and Jacob both spent considerable time in individually, but not together?
  5. Where is the first destination on Ellie and Jacobs Honeymoon?
  6. Who said I love you first?

10 Clues: Who said I love you first?Where has Ellie worked for the last 5 years?Where do Ellie and Jacob Live (hint: not fkn Margate!)Where is the first destination on Ellie and Jacobs Honeymoon?Where in Italy did Jacob take Ellie for her birthday this year?What Channel Island did Jacob sneak off to whilst Ellie was away to get her ring?...

The Cybersecurity Crossword 2023-08-20

The Cybersecurity Crossword crossword puzzle
Across
  1. Science of encryption and decryption
  2. A network security device that works based on predetermined security rules
Down
  1. Converting data into code to prevent unauthorized access
  2. Software designed to exploit computers
  3. Tricking individuals for private information using deceptive websites/e-mails
  4. Software that encrypts data and demands ransom in exchange for decryption key

6 Clues: Science of encryption and decryptionSoftware designed to exploit computersConverting data into code to prevent unauthorized accessA network security device that works based on predetermined security rulesTricking individuals for private information using deceptive websites/e-mails...

Cybersecurity Awareness Puzzle 2023-03-24

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A secret code that protects your online account
  2. The act of accessing someone else's online account without their permission
  3. A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
  4. Malicious software that can damage or disrupt a computer system
  5. A measure taken to protect a computer system or network from cyber attacks
Down
  1. A security feature that confirms the identity of a user before allowing access to a system or account

6 Clues: A secret code that protects your online accountMalicious software that can damage or disrupt a computer systemA measure taken to protect a computer system or network from cyber attacksThe act of accessing someone else's online account without their permission...

Digital/Cyber Literacy 2023-07-11

Digital/Cyber Literacy crossword puzzle
Across
  1. The growths of the Internet gave rise to many important services accessible to anyone with a connection, such as digital communication
  2. refers to the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection.
Down
  1. the set of competencies required for full participation in society that includes knowledge, skills, and behaviors
  2. refers to the act of staying safe online.
  3. the practice of protecting systems, networks and programs from digital attacks.
  4. refers to being responsible when using the internet

6 Clues: refers to the act of staying safe online.refers to being responsible when using the internetthe practice of protecting systems, networks and programs from digital attacks.the set of competencies required for full participation in society that includes knowledge, skills, and behaviors...

Total Defence Day 2022 2022-01-20

Total Defence Day 2022 crossword puzzle
Across
  1. The Total Defence song "There's a Part for _ _ _ _ _ _ _ _" was written in 1984
  2. Digital Defence is the new sixth pillar of Total Defence. It requires Singaporean to practice good _ _ _ _ _ - _ _ _ _ _ _ _ _
Down
  1. Civil Defence provides for the _ _ _ _ _ _ and basic needs of the whole community so that life may go on as normally as possible during emergencies.
  2. Learning life-saving skills such as _ _ _ can prepare you to help others in an emergency
  3. You should call 995 for _ _ _ _ _ _ _ _ _ and 1777 for non-emergency
  4. _ _ _ _ _ _ _ _ Defence is about having an SAF that is able to deter aggression

6 Clues: You should call 995 for _ _ _ _ _ _ _ _ _ and 1777 for non-emergencyThe Total Defence song "There's a Part for _ _ _ _ _ _ _ _" was written in 1984_ _ _ _ _ _ _ _ Defence is about having an SAF that is able to deter aggressionLearning life-saving skills such as _ _ _ can prepare you to help others in an emergency...

Cybersecurity Awareness Puzzle 2023-03-24

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. A secret code that protects your online account
  2. The act of accessing someone else's online account without their permission
  3. A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
  4. Malicious software that can damage or disrupt a computer system
  5. A measure taken to protect a computer system or network from cyber attacks
Down
  1. A security feature that confirms the identity of a user before allowing access to a system or account

6 Clues: A secret code that protects your online accountMalicious software that can damage or disrupt a computer systemA measure taken to protect a computer system or network from cyber attacksThe act of accessing someone else's online account without their permission...

Cybersecurity Awareness Crossword 2024-03-14

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. A string of characters that allows access to a computer system or service.
  2. A set of practices users take to improve their online security.
  3. A type of scam that involves a victim to be tricked by a fake online identity, blinded by love.
Down
  1. A type of scam that uses email or websites to trick victims.
  2. Malicious activities done using or targeting digital systems or a network.
  3. A security method that requires two forms of identification to access resources and data.

6 Clues: A type of scam that uses email or websites to trick victims.A set of practices users take to improve their online security.Malicious activities done using or targeting digital systems or a network.A string of characters that allows access to a computer system or service....

GenCyber Cybersecurity Concepts 2022-06-08

GenCyber Cybersecurity Concepts crossword puzzle
Across
  1. c
  2. g
  3. c
  4. f
Down
  1. y
  2. n
  3. c
  4. e

8 Clues: ycngccef

Cybersecurity Crossword Puzzle 2023-10-19

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. is a security technology that requires multiple methods of ___________ to verify a user’s identity before allowing login. Authentication
  2. can you turn your debit card off in digital banking? Manage cards
  3. may send unsolicited Emails, pretending to be a financial institution or a company, asking you to click a link to update or confirm your personal or login information. Phishing
Down
  1. companies or organizations will never ask you to divulge any _________ information over email. Personal
  2. is the name of our P2P product? SPIN
  3. can you view when your last login to digital banking was? Recent Logins
  4. can you change your Security Questions in digital banking? My Profile
  5. is our cyber insurance carrier? Beazley

8 Clues: is the name of our P2P product? SPINis our cyber insurance carrier? Beazleycan you turn your debit card off in digital banking? Manage cardscan you change your Security Questions in digital banking? My Profilecan you view when your last login to digital banking was? Recent Logins...

Ai 2024-04-06

Ai crossword puzzle
Across
  1. A system modeled after the human brain used in deep learning
  2. reality A stimulated experience that can be similar or different from the real world
  3. A technology that overlays digital information into the real world
  4. The field of Ai that trains machines to intercept and make decisions based on visual data
  5. The practice of protecting computer systems and networks from digital attacks
  6. Extremely large data sets that could be analyzed to revel patterns and trends
  7. A set of rules or steps used by computers to solve a problem
  8. The use of technology to preform tasks without human assistance
  9. A type of machine leaning where the model is trained on labeled data
Down
  1. A type of Ai that allows computers to lean from data
  2. learning A subset of machine learning inspired by the structure and function of the brain
  3. A computer program that is design to stimulate conversation with human users
  4. Information processed or stored by a computer
  5. The branch of technology that deals with the design, construction and operation of robots

14 Clues: Information processed or stored by a computerA type of Ai that allows computers to lean from dataA system modeled after the human brain used in deep learningA set of rules or steps used by computers to solve a problemThe use of technology to preform tasks without human assistanceA technology that overlays digital information into the real world...

SuperPowers Resources 2025-05-29

SuperPowers Resources crossword puzzle
Across
  1. Facts and statistics collected together for reference or analysis.
  2. Secret information, especially about an enemy or competitor.
  3. Exclusive rights over something, especially intellectual creations.
  4. Advanced scientific knowledge applied for practical purposes.
  5. Armed forces of a nation, essential for defense and power projection.
  6. Describing energy sources that replenish naturally (e.g., solar, wind).
Down
  1. The skills, knowledge, and experience possessed by an individual or population, viewed in terms of their value or cost to an organization or country.
  2. Workers with specialized training or abilities.
  3. Formal agreements or treaties between two or more parties, typically countries, to cooperate for specific purposes.
  4. The power derived from the utilization of physical or chemical resources, especially to provide light and heat or to work machines.
  5. A group of 17 chemical elements vital for high-tech devices.
  6. Black gold, a crucial fossil fuel for energy and industry.
  7. Measures taken to protect a computer system or network from cyberattacks.
  8. The capacity to have an effect on the character, development, or behavior of someone or something, or the effect itself.

14 Clues: Workers with specialized training or abilities.Black gold, a crucial fossil fuel for energy and industry.Secret information, especially about an enemy or competitor.A group of 17 chemical elements vital for high-tech devices.Advanced scientific knowledge applied for practical purposes....

Browsing safety 2025-06-07

Browsing safety crossword puzzle
Across
  1. unethical hackers
  2. :- A software that helps in
  3. :- Collection oftechnologies, processes and practices designed to protect networks computers programs and data from your attack damage or another access.
  4. :- Computer program that is designed to identify, prevent, and remove viruses from a computer.
  5. and misusing someone's personal information.
  6. unauthorised access to your computer by blocking unsolicited communication.
  7. Theft :- Refers to the act of
  8. Frauds :- Use of illegal method to get money or other things that belong to a bank or its customers.
Down
  1. :- Act of farmingor harising using information technology in deliberate manner.
  2. :- Program or set a program that disrupt the normal functioning of a computer.
  3. :- cyber grooming isthe process of 'befriending' children on social media to facillate online or physical sexual abuse.
  4. :- Collection oftechnologies, processes and practices designed to protect us from cybercrime
  5. :- Refers to an illegal entry into computer system or network.
  6. :- Act of sending any mailto user misleading him to believe that it is from a trusted person or organisation.
  7. spoofing :- Hoaxing or misleading in it,the receive tor a message is fooled into believing that the message is received from trusted source

15 Clues: unethical hackers:- A software that helps inTheft :- Refers to the act ofand misusing someone's personal information.:- Refers to an illegal entry into computer system or network.unauthorised access to your computer by blocking unsolicited communication.:- Program or set a program that disrupt the normal functioning of a computer....

Information Technology Puzzle 34 - Computer Security 2022-02-10

Information Technology Puzzle 34 - Computer Security crossword puzzle
Across
  1. This is everyone's responsibility at CommScope
  2. Only install these from trusted sources on mobile devices
  3. Avoid these scams by being beware of suspicious emails and phone calls
  4. This application installed on your computer will defend your data and files against attack by screening out viruses, hackers and other software that is malicious
  5. This makes security unique to each site, and is critical for keeping hackers out of our data and files
Down
  1. This type of security for your devices is just as important as their technical security
  2. Always use this when storing or transmitting sensitive data
  3. This software works to keep viruses, malware, ransomware and so on from entering your computer or device and corrupting your data and files

8 Clues: This is everyone's responsibility at CommScopeOnly install these from trusted sources on mobile devicesAlways use this when storing or transmitting sensitive dataAvoid these scams by being beware of suspicious emails and phone callsThis type of security for your devices is just as important as their technical security...

2-Factor Authentication 2024-06-04

2-Factor Authentication crossword puzzle
Across
  1. a type of 2FA where a voice will ask you to press a key or say your name to identify yourself
  2. what two-factor authentication is trying to protect
  3. a type of 2FA where a message is sent directly to your phone so you can confirm/deny that you are trying to sign in
  4. 2FA protects information from these people
  5. the purpose of two-factor authentication
  6. a type of 2FA where a message is sent to a trusted phone number (this is the most common method)
Down
  1. used by 2FA to create more efficient and secure passwords
  2. an identity and access security method that requires two forms of identification to access certain data and information

8 Clues: the purpose of two-factor authentication2FA protects information from these peoplewhat two-factor authentication is trying to protectused by 2FA to create more efficient and secure passwordsa type of 2FA where a voice will ask you to press a key or say your name to identify yourself...

Why is Cybersecurity Necessary? 2023-01-27

Why is Cybersecurity Necessary? crossword puzzle
Across
  1. Set of defined actions to take in accordance with established policy.
  2. Minimum requirements from federal and state agencies and insurance companies to keep consumer data and critical infrastructure safe from cyber attacks.
  3. Set of actions taken after a cyber event has occurred.
  4. Information systems that include computers, mobile phones, tablets, security cameras, and any device that communicates over the internet, etc.
Down
  1. Cybersecurity programs must be established, maintained, and is not a set it and forget it matter.
  2. Bad actors, customers, contractors, employees, partners, visitors, and even individuals in your household.
  3. Technical and non-technical measures to know that you have been compromised.
  4. People, processes, and technologies to keep information and information systems safe from alteration, destruction, and exploitation.

8 Clues: Set of actions taken after a cyber event has occurred.Set of defined actions to take in accordance with established policy.Technical and non-technical measures to know that you have been compromised.Cybersecurity programs must be established, maintained, and is not a set it and forget it matter....

Co-Worker Crossword 2022-10-04

Co-Worker Crossword crossword puzzle
Across
  1. I was a competitive figure skater until I was 17, and I also know how to play the piano.
  2. If you see a suit and tie, it is probably I!
  3. I am an avid ice fisherman
  4. From 1989 until now I have worked at a total of 6 businesses, all of which were similar positions to what I do now!
  5. I am responsible for Ortho's IT functions and cybersecurity. I have also run four Chicago Marathons and one Ultra-Marathon!
Down
  1. I am the liasion between Customer Service and IT. A jack of all trades, you could say.
  2. I was born in Idaho
  3. I am a pilot and have a black belt in CRM.

8 Clues: I was born in IdahoI am an avid ice fishermanI am a pilot and have a black belt in CRM.If you see a suit and tie, it is probably I!I am the liasion between Customer Service and IT. A jack of all trades, you could say.I was a competitive figure skater until I was 17, and I also know how to play the piano....

Computer science 2024-04-17

Computer science crossword puzzle
Across
  1. A processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. The process of identifying someone's or something's identity
  3. The large system of connected computers around the world that allows people to share information and communicate with each other
  4. An Internet Protocol that allocates numbers to router servers, or anything connected to the Internet
Down
  1. A piece of audio or video that has been altered and changed to make it seem authentic or credible
  2. The delivery of computing servers, storage, databases, networking, software, analytics, and intelligence
  3. A network of computers used to carry out cyberattacks on other systems
  4. A means to support network communication using radio waves rather than cables

8 Clues: The process of identifying someone's or something's identityA network of computers used to carry out cyberattacks on other systemsA means to support network communication using radio waves rather than cablesA piece of audio or video that has been altered and changed to make it seem authentic or credible...

SN33003FP Chapter 2 Crossword 2024-07-03

SN33003FP Chapter 2 Crossword crossword puzzle
Across
  1. Prevents disclosure of information to unauthorized people, also known as privacy
  2. Defines security objectives, behavioral rules, and system requirements to secure assets
  3. Provides technical direction for implementing and configuring technology to fulfill policy directives
  4. Relates to organization's cybersecurity policies, procedures, and guidelines set by upper management
  5. Focuses on protecting all states of data: at rest or in storage, in transit, or in process
  6. The goals to protect cyberspace, including confidentiality, integrity, and availability (CIA Triad)
  7. Data being sent from one device to another
Down
  1. Making security awareness part of employee onboarding and ongoing training
  2. Software, hardware, network, and cloud-based tools used to safeguard an organization's assets
  3. Accuracy, consistency, and trustworthiness of data throughout its lifecycle
  4. Ensures access to information systems and services at all times
  5. Data during input, modification, computation, or output stages
  6. Identifies expertise required for protection, including technology, policies/procedures/guidelines, and people
  7. Stored data retained on storage devices when not actively used

14 Clues: Data being sent from one device to anotherData during input, modification, computation, or output stagesStored data retained on storage devices when not actively usedEnsures access to information systems and services at all timesMaking security awareness part of employee onboarding and ongoing training...

Unit 1 What is cybersecurity? 2021-09-27

Unit 1 What is cybersecurity? crossword puzzle
Across
  1. protocols for encrypting or decrypting information in order to protect computer systems, networks and data from cyber attacks
  2. assurance that systems and data are accessible by authorized users when and where needed
  3. the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data
  4. the protection of information from people who are not authorized to view it
Down
  1. the study of computational thinking which describes a step by step process
  2. a widely accepted security measure that should be guaranteed in every secure system
  3. the usage of deceptive emails and websites to maliciously gather personal information
  4. identify theft, stealing money, stealing private information controlling private computers
  5. ensures that information is protected from unauthorized or unintentional alteration

9 Clues: the study of computational thinking which describes a step by step processthe protection of information from people who are not authorized to view ita widely accepted security measure that should be guaranteed in every secure systemensures that information is protected from unauthorized or unintentional alteration...

TECHNOLOGY 2024-09-15

TECHNOLOGY crossword puzzle
Across
  1. Many companies invest heavily in __________ to protect sensitive information from hackers.
  2. Data __________helps companies make better decisions by interpreting large amounts of information.
  3. With advancements in __________, factories now produce goods with minimal human intervention.
  4. As technology progresses, many jobs that once required __________ are now being done by machines.
  5. Excessive __________ can lead to eye strain and affect your sleep patterns, especially if you use your phone before bed.
Down
  1. __________ messaging has made communication faster and more efficient, allowing people to chat in real-time.
  2. People spend hours on __________ every day, sharing their experiences and connecting with friends.
  3. smartphone is an example of an __________ device that most people use every day for communication and entertainment.
  4. In the age of the internet, digital __________ is a growing concern as personal data is often collected by various websites and apps.

9 Clues: Many companies invest heavily in __________ to protect sensitive information from hackers.With advancements in __________, factories now produce goods with minimal human intervention.As technology progresses, many jobs that once required __________ are now being done by machines....

Internet 2023-05-06

Internet crossword puzzle
Across
  1. A secret word you use to sign in to your account
  2. Protecting your computer from bad things on the internet
  3. A symbol (#) used on social media to talk about the same thing
  4. The APP you use to look at websites on the internet
  5. A tool that helps you find things on the internet
  6. When someone tries to trick you into giving them your personal information on the internet
  7. A fun thing to do on the internet (two words)
  8. When you put something from your computer or phone onto the internet
  9. Unwanted emails or messages that try to sell you something
Down
  1. A way for computers and phones to connect to the internet without using wires
  2. A name you use to log in to your account on a website
  3. When someone uses the internet to be mean to someone else
  4. A place on the internet where you can find information about something
  5. When you take something from the internet and save it on your computer or phone
  6. Websites like Facebook and Instagram where you can connect with people
  7. The address you type in to go to a website

16 Clues: The address you type in to go to a websiteA fun thing to do on the internet (two words)A secret word you use to sign in to your accountA tool that helps you find things on the internetThe APP you use to look at websites on the internetA name you use to log in to your account on a websiteProtecting your computer from bad things on the internet...

Cybersecurity 2023-05-26

Cybersecurity crossword puzzle
Across
  1. reuse
Down
  1. safety
  2. attack

3 Clues: reusesafetyattack

Business Continuity Awareness Week 2022 2022-07-04

Business Continuity Awareness Week 2022 crossword puzzle
Across
  1. One of major paradigm shift in the workforce.
  2. What is the latest overseas company that has completed their BCMS Implementation as per the latest post in BCM's Yammer page?
  3. In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
  4. to build a success for program in microsimulations.
  5. The biggest threat to Cybersecurity is human _______.
  6. Involvement and enthusiasm in resilience
  7. The capacity to recover quickly from difficulties.
Down
  1. Acknowledge new _________ in addition to the opportunities that hybrid world provides businesses and employees.
  2. In order to prepare for cyber resilience, speed and agility are required.
  3. A thing made by combining two different elements.
  4. Group CMT Members’ ‘Rose Among the Thorns’
  5. What app can WOWriors get more information about Business Continuity and Organisational Resilience from UMW Office 365?
  6. Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture.
  7. What is the third UMW Group BCM risk events.
  8. Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities.
  9. One of hybrid Pros and Cons is reliance on home utilities and ___________.

16 Clues: Involvement and enthusiasm in resilienceGroup CMT Members’ ‘Rose Among the Thorns’What is the third UMW Group BCM risk events.One of major paradigm shift in the workforce.A thing made by combining two different elements.The capacity to recover quickly from difficulties.to build a success for program in microsimulations....

IMR533-Chapter 2 2025-04-19

IMR533-Chapter 2 crossword puzzle
Across
  1. Misleading advertising, fraudulent practices, or deceptive information can result in _____ protection lawsuits.
  2. The term _____ refers to someone who exhibited a high standard of conduct or skill in their work.
  3. A set of guidelines provided to the professional by the profession spelling out what a professional ought to do and not do.
  4. Information professionals face challenges related to the _____ and management of digital information due to rapid technological changes
  5. _____ law aims to maintain public order and safety.
  6. Remaining loyal to one's clients, employers, or stakeholders.
  7. Spreading false and harmful information about someone.
  8. Taking responsibility for one's actions, decisions, and the consequences of those actions.
Down
  1. Information professionals play a critical role in ensuring the _____ use of information in society.
  2. Ethics drives profession _____ and innovation.
  3. One of the requirements to become a professional.
  4. _____ law deals with private disputes between individuals or entities.
  5. _____ law governs matters such as marriage, divorce, inheritance, and religious observance for Muslims.
  6. Information professionals denote those people where _______ is the main concern in their work.
  7. Information professionals must address _____ concerns related to the protection of sensitive information, privacy rights, and data breaches.
  8. Ethics is important to profession because it helps to ensure the quality, _____ , and reputation of the work.

16 Clues: Ethics drives profession _____ and innovation.One of the requirements to become a professional._____ law aims to maintain public order and safety.Spreading false and harmful information about someone.Remaining loyal to one's clients, employers, or stakeholders._____ law deals with private disputes between individuals or entities....

Cyber security 2023-04-21

Cyber security crossword puzzle
Across
  1. verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer
  2. facts provided or learned about something or someone.
  3. malware that replicates and transfers itself to other computers via a network
Down
  1. The authorization given to users that enables them to access specific resources on the network,
  2. type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
  3. someone who hacks into your account
  4. information that has been translated into a form that is efficient for movement or processing
  5. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

8 Clues: someone who hacks into your accountfacts provided or learned about something or someone.malware that replicates and transfers itself to other computers via a networkinformation that has been translated into a form that is efficient for movement or processing...

ATL Crossword 2023-10-16

ATL Crossword crossword puzzle
Across
  1. A term for a situation in which a system or network is completely isolated from other networks for security.
  2. A type of cybersecurity threat that mimics legitimate software but is malicious in nature.
  3. A group of computers controlled by an attacker to carry out tasks without the user's knowledge.
  4. A type of malware named after a deceptive ancient Greek tactic.
Down
  1. A form of authentication that relies on a physical attribute, like a fingerprint or iris scan.
  2. A set of rules or configurations that dictate which network traffic is allowed or blocked.
  3. A common form of cyber attack involving massive amounts of traffic to overwhelm a target system.
  4. A type of malware that can spread autonomously through networks.

8 Clues: A type of malware named after a deceptive ancient Greek tactic.A type of malware that can spread autonomously through networks.A set of rules or configurations that dictate which network traffic is allowed or blocked.A type of cybersecurity threat that mimics legitimate software but is malicious in nature....

Encapsualtion 2024-03-17

Encapsualtion crossword puzzle
Across
  1. Overriding in Object-Oriented Programming
  2. In this system a patient class could encapsulate the patient's personal information etc
  3. Plays a crucial role in securing sensitive information and preventing unauthorized acess
Down
  1. Allows a subclass to provide a specific implementation of method thats is already provided by its superclass
  2. A class may be created to encapsulate the account details such as account number balance and transaction history

5 Clues: Overriding in Object-Oriented ProgrammingIn this system a patient class could encapsulate the patient's personal information etcPlays a crucial role in securing sensitive information and preventing unauthorized acessAllows a subclass to provide a specific implementation of method thats is already provided by its superclass...

Safety Crossword 2022-10-20

Safety Crossword crossword puzzle
Across
  1. what does PPE stand for?
  2. a tornado _______ means a tornado has been spotted or a radar has picked one up
  3. regulatory agency that inspects and examines workplaces
  4. when you are on a boat, canoe, or kayak, make sure you always wear a __________
  5. if you see someone doing something unsafe on the job, you should use your _________________
  6. infectious microorganisms in human blood that can cause disease in humans
  7. you can help prevent back problems by having good _______
  8. protection for your head
Down
  1. an unplanned event that did not result in injury, illness or damage, but had the potential to do so
  2. offers a way for all employees to confirm their dedication to positive safety behavior each year
  3. a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
  4. the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
  5. you should check the batteries of your smoke detector _______
  6. protection for your hands
  7. aerosols, nail polish and cooking oils are all highly ________
  8. protection for your eyes

16 Clues: what does PPE stand for?protection for your eyesprotection for your headprotection for your handsregulatory agency that inspects and examines workplacesyou can help prevent back problems by having good _______you should check the batteries of your smoke detector _______aerosols, nail polish and cooking oils are all highly ________...

Cyber Security Month 2023 2023-09-01

Cyber Security Month 2023 crossword puzzle
Across
  1. Processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. The ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans
  3. An important process that verifies a user is really who they are; many was this can be done
  4. An example would be an email from a Nigerian prince asking you for your personal details including bank details to you can receive millions of dollars
  5. An attack that hijacks your system and denies you access until you send money
  6. Characteristics used to identify a person
  7. The form of encryption that requires two different credentials
  8. Malware hidden as an attachment or free download
Down
  1. The state of being free from danger for threat
  2. Bullying that takes place online
  3. Type of cyber attack where a person is tricked into give information via a text message
  4. Digital currency, preference for hackers
  5. A person who tries to gain unauthorised access to a network or computer system.
  6. When a hacker successfully exploits a device and gains access to files and data
  7. An annoying malware that spams you with ads
  8. A fraudulent or deceptive act or operation

16 Clues: Bullying that takes place onlineDigital currency, preference for hackersCharacteristics used to identify a personA fraudulent or deceptive act or operationAn annoying malware that spams you with adsThe state of being free from danger for threatMalware hidden as an attachment or free download...

cyber security 2024-10-25

cyber security crossword puzzle
Across
  1. Injection Hacker: Attempts to break into a system by manipulating data input.
  2. Acts as a security barrier, inspecting every request and filtering threats.
  3. Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
  4. Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
  5. Software that secretly monitors user activity on a computer or device, often used to collect personal information.
  6. Specialist: Protects a company from cyber threats.
Down
  1. Developer: Creates harmful software to damage the network.
  2. Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
  3. The process of converting information or data into a code to prevent unauthorized access.
  4. Scammer: Tries to steal information by impersonating a trusted entity.

10 Clues: Specialist: Protects a company from cyber threats.Developer: Creates harmful software to damage the network.Scammer: Tries to steal information by impersonating a trusted entity.Acts as a security barrier, inspecting every request and filtering threats.Injection Hacker: Attempts to break into a system by manipulating data input....

cyber security 2024-10-25

cyber security crossword puzzle
Across
  1. Injection Hacker: Attempts to break into a system by manipulating data input.
  2. Acts as a security barrier, inspecting every request and filtering threats.
  3. Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
  4. Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
  5. Software that secretly monitors user activity on a computer or device, often used to collect personal information.
  6. Specialist Protects a company from cyber threats.
Down
  1. Creates harmful software to damage the network.
  2. Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
  3. The process of converting information or data into a code to prevent unauthorized access.
  4. Tries to steal information by impersonating a trusted entity.

10 Clues: Creates harmful software to damage the network.Specialist Protects a company from cyber threats.Tries to steal information by impersonating a trusted entity.Acts as a security barrier, inspecting every request and filtering threats.Injection Hacker: Attempts to break into a system by manipulating data input....

Scientific and Technological Innovations 2025-04-14

Scientific and Technological Innovations crossword puzzle
Across
  1. ethics : The branch of philosophy that studies moral issues related to artificial intelligence and its applications.
  2. energy : Energy derived from natural sources that are replenished constantly, such as solar or wind power.
  3. : The practice of protecting systems, networks, and data from digital attacks.
  4. materials : Substances that change their properties in response to external conditions like temperature or pressure.
  5. : The science of manipulating matter on an atomic or molecular scale.
Down
  1. : A decentralized digital ledger technology used for securely recording transactions.
  2. : A form of 3D printing that uses living cells to create tissues and potentially organs.
  3. reality : A simulated experience that can be similar to or completely different from the real world.
  4. : The branch of technology concerned with the design, construction, and operation of robots.
  5. computing : A revolutionary technology that uses quantum mechanics to process information at incredible speeds.

10 Clues: : The science of manipulating matter on an atomic or molecular scale.: The practice of protecting systems, networks, and data from digital attacks.: A decentralized digital ledger technology used for securely recording transactions.: A form of 3D printing that uses living cells to create tissues and potentially organs....

CISO Crossword Quiz - 2025 2025-06-18

CISO Crossword Quiz - 2025 crossword puzzle
Across
  1. What is the process of collecting and analyzing electronic data to investigate security incidents?
  2. What cyberattack tricks a DNS server into redirecting traffic to a malicious site?
  3. What technique isolates programs to prevent malware from spreading across a system?
  4. What do we call configuring a web browser to reduce its vulnerability to attack?
  5. What is the proactive process of searching through networks to detect and isolate advanced threats?
  6. What cybersecurity model assumes no implicit trust and verifies every access attempt?
Down
  1. What term describes an organization’s ability to continue operations during and after a cyberattack?
  2. What browser mode hides your browsing history from others who use your device?
  3. What is the term for the trail of data a person leaves behind while using the internet?
  4. What term describes hardware or software used within an organization without explicit IT approval?

10 Clues: What browser mode hides your browsing history from others who use your device?What do we call configuring a web browser to reduce its vulnerability to attack?What cyberattack tricks a DNS server into redirecting traffic to a malicious site?What technique isolates programs to prevent malware from spreading across a system?...

AI ETHICS 2022-02-16

AI ETHICS crossword puzzle
Across
  1. This estimates that by 2030, 30% of all jobs will be automated.
  2. The presence of security cameras everywhere has created issues in regards to _________ and inspection.
  3. This is one of the major concerns of companies, especially in the governmental and financial services sector.
Down
  1. The industrial and _________ revolution has changed society.
  2. Fake news mixed into accurate and ______based news is considered the biggest threat to democracy.
  3. _______safety and the reduction of crime rates are the greatest justifiers for the use of this technology.

6 Clues: The industrial and _________ revolution has changed society.This estimates that by 2030, 30% of all jobs will be automated.Fake news mixed into accurate and ______based news is considered the biggest threat to democracy.The presence of security cameras everywhere has created issues in regards to _________ and inspection....

Meridian: 6 Pillars 2022-12-19

Meridian: 6 Pillars crossword puzzle
Across
  1. This pillar delivers specialized tools for managing workflows and processes.
  2. This pillar transforms any sized utility into an analytical powerhouse. Use these tools to create smart solutions driven by data.
  3. This pillar provides omni-channel communication solutions designed especially for utilities.
  4. This pillar keeps office crews, field crews, and their technology on the same page.
Down
  1. This pillar includes our core CIS, FIS, and GIS suites that offer the functionality your utility needs to easily and efficiently run your organization.
  2. This pillar helps you maintain constant vigilance against potential threats.

6 Clues: This pillar delivers specialized tools for managing workflows and processes.This pillar helps you maintain constant vigilance against potential threats.This pillar keeps office crews, field crews, and their technology on the same page.This pillar provides omni-channel communication solutions designed especially for utilities....

Skyworks Cybersecurity Awareness Month 2024-04-26

Skyworks Cybersecurity Awareness Month crossword puzzle
Across
  1. Cyber attack that tricks people into revealing sensitive information through email, texts, or phone calls
  2. The practice of protecting systems, networks, and programs from digital attacks
  3. a person who uses computers to gain unauthorized access to data
Down
  1. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. the process or action of verifying the identity of a user or process
  3. who is responsible for the security of an organization?

6 Clues: who is responsible for the security of an organization?a person who uses computers to gain unauthorized access to datathe process or action of verifying the identity of a user or processThe practice of protecting systems, networks, and programs from digital attacks...

FITDVocab.LCP 2013-05-15

FITDVocab.LCP crossword puzzle
Across
  1. A paper you need when applying for a job.
  2. Phising, spam, passwords are all in the category of _______.
  3. The computers short term memory or RAM.
  4. Another way to say ____drive.
  5. The way you behave online.
  6. When you need to turn on your computer.
  7. The first and smallest size of storage.
  8. Google, Bing, and Yahoo!
  9. What ISP stands for.
  10. The way things are arranged.
  11. A place where you plug in your headphones.
  12. Phones are a type of _________.
  13. An already made design for a doc.
  14. A picture or symbol that represents a company.
  15. The computers main storage device.
Down
  1. The safe and responsible use of information online.
  2. A pamphlet.
  3. What CPU stands for.
  4. 8 bits
  5. Commercials and Ads are a type of it.
  6. The heart of the computer.
  7. How well one program works with another.
  8. The screen
  9. What WIFI stands for.
  10. What LCD stands for.
  11. A word used to describe anything online.
  12. A catchy sentence that represents a company.
  13. Any type of device that puts info into your computer.
  14. Compartments that allow things to be connected to it.
  15. Any type of device that takes information out of your computer.
  16. The font or parts of your doc that you can customize.
  17. A wireless earpiece device.
  18. A blank sheet like Prezi.

33 Clues: 8 bitsThe screenA pamphlet.What CPU stands for.What LCD stands for.What ISP stands for.What WIFI stands for.Google, Bing, and Yahoo!A blank sheet like Prezi.The heart of the computer.The way you behave online.A wireless earpiece device.The way things are arranged.Another way to say ____drive.Phones are a type of _________....

IST 2024-12-11

IST crossword puzzle
Across
  1. the use or purpose of something
  2. user experience
  3. a coding/programming language often used by beginners
  4. the study of patterns and trends to collect useful information
  5. a basic command which types out text
  6. computer program used to run python
  7. state of being protected against unauthorized online access or criminal use
  8. the act of pressing down on something to make it take up less space
  9. a plane of evenly spaced vertical and horizontal lines
  10. the visual elements of something
  11. an educational website that teaches coding
  12. a collection of text and instructions that command computers to run tasks
Down
  1. value/data used or placed as an entry
  2. a series of questions used to collect data
  3. input, process, output
  4. an result based on instructions from processed data
  5. a named representation of a value that stores the value within
  6. chart displaying schedule and progress
  7. user interface
  8. application of scientific knowledge for practical purposes
  9. a type of value that is stored in text form
  10. facts and statitics that are collected for analysis
  11. entity relationship diagram
  12. a coding function that allows following code to repeat a number of times
  13. value/data used and transformed into information and instructions
  14. a documentation of progress filled over time
  15. an activity that provides entertainment or fun

27 Clues: user interfaceuser experienceinput, process, outputentity relationship diagramthe use or purpose of somethingthe visual elements of somethingcomputer program used to run pythona basic command which types out textvalue/data used or placed as an entrychart displaying schedule and progressa series of questions used to collect data...

INFORMATIKA -Decha_Dwi_XH 2025-04-15

INFORMATIKA -Decha_Dwi_XH crossword puzzle
Across
  1. Salah satu cara memvalidasi konten digital adalah dengan mengecek...
  2. Menganalisis data untuk membuat keputusan bisnis adalah tugas seorang data...
  3. Hal yang terjadi jika seseorang melanggar HAKI adalah harus membayar?
  4. Diseminasi konten digital bisa disebut juga dengan ... konten digital
  5. Salah satu contoh search engine selain google adalah?
  6. konten yang didistribusikan dalam bentuk gambar atau video dengan tulisan penuh humor?
  7. HAKI memiliki tujuan untuk melindungi?
  8. Mengambil karya orang lain tanpa izin disebut...
  9. Salah satu platform penyebaran konten digital yang paling efektif adalah...
  10. Salah satu mesin pencari yang sangat populer adalah?
  11. Halaman hasil dari pencarian disebut?
  12. Faktor penting dalam menentukan kepercayaan konten digital adalah...
Down
  1. Melindungi sistem komputer dari serangan cyber disebut adalah pekerjaan?
  2. Perpaduan kata yang memiliki daya pembeda dan digunakan dalam kegiatan perdagangan barang atau jasa disebut...
  3. HAKI merupakan singkatan dari hak kekayaan...
  4. Orang yang merancang progam perangkat lunak disebut...
  5. Langkah pertama yang harus dilakukan pada search engine adalah memasukan...
  6. Keahlian yang dibutuhkan oleh seorang web developer yaitu membuat desain grafis untuk?
  7. Konten digital yang benar berarti konten tersebut...
  8. Suatu progam komputer untuk mencari berkas berkas di dunia maya dinamakan?
  9. Proses pengecekan keakuratan konten digital disebut
  10. Prinsip HAKI yang mengatur kepentingan manusia sebagai warga Negara adalah prinsip...
  11. Salah satu jenis konten digital yang menggabungkan gambar bergerak dan audio disebut...
  12. Salah satu profesi dibidang informatika adalah...
  13. Contoh platform diseminasi konten digital adalah?

25 Clues: Halaman hasil dari pencarian disebut?HAKI memiliki tujuan untuk melindungi?HAKI merupakan singkatan dari hak kekayaan...Mengambil karya orang lain tanpa izin disebut...Salah satu profesi dibidang informatika adalah...Contoh platform diseminasi konten digital adalah?Proses pengecekan keakuratan konten digital disebut...

Trade School vs 4yr College Crossword Lab 2024-02-29

Trade School vs 4yr College Crossword Lab crossword puzzle
Across
  1. the activity or business of promoting and selling products or services
  2. to relieve stress and conditions associated with it, such as tension headaches
  3. the process of ensuring that an aircraft is safe and reliable for flight through regular inspections, repairs, and replacements
  4. the process of planning, organizing, directing, and controlling the activities of a business or organization to achieve its goals and objectives
  5. the data related to a person's medical history
  6. heating, ventilation, and air conditioning
  7. the study of machines, equipment, technology and systems
  8. an interconnected set of components used to collect, store, process and transmit data and digital information
  9. the personnel of a business or organization
  10. a trained person whose job is to improve the appearance of a customer's face, hair, or skin using makeup and beauty treatments
Down
  1. the study or use of systems
  2. the system that prescribes the fate of the criminal
  3. a mechanic who services and repairs automobiles
  4. takes patients' vital signs, such as their blood pressure
  5. (metal pieces or parts) by heating the surfaces to the point of melting using a blowtorch
  6. Commercial Driver's License
  7. the practice of protecting systems, networks, and programs from digital attacks
  8. the preparation, cooking, plating, presentation, and service of food
  9. the process of recording, classifying and summarizing financial transactions
  10. handles several important tasks within the dentist's office

20 Clues: the study or use of systemsCommercial Driver's Licenseheating, ventilation, and air conditioningthe personnel of a business or organizationthe data related to a person's medical historya mechanic who services and repairs automobilesthe system that prescribes the fate of the criminalthe study of machines, equipment, technology and systems...

Criminology and Crime Prevention 2024-03-17

Criminology and Crime Prevention crossword puzzle
Across
  1. A device that alerts to danger, often used in theft prevention.
  2. The process of being victimized or the condition in which a person or entity is victimized.
  3. Acronym for designing urban environments to reduce crime.
  4. A group of people living in the same place, involved in crime prevention efforts.
  5. Measures and technologies used to protect computers and networks from crime.
  6. Law enforcement officers' act of circulating an area to prevent and detect crime.
  7. A strategy to prevent crime through the threat of punishment.
  8. A localized community within a larger town or city, focus of policing strategies.
  9. Actions taken to stop something from happening, in this case, crime.
Down
  1. Observing subjects to prevent or solve crimes.
  2. The responsibility of a person or entity to protect others from crime.
  3. The act of maintaining law and order in communities.
  4. Specific actions or strategies designed to achieve a policing or crime prevention objective.
  5. Pertaining to electronic technology, often related to cybercrime.
  6. A person who commits an illegal act.
  7. Information or objects that are used in court to prove a crime.
  8. The study of crime, criminal behavior, and the criminal justice system.
  9. The principle of fairness and the ideal of moral equity.
  10. Relating to the surroundings in which crime can occur or be prevented.
  11. The potential for encountering harm or loss.

20 Clues: A person who commits an illegal act.The potential for encountering harm or loss.Observing subjects to prevent or solve crimes.The act of maintaining law and order in communities.The principle of fairness and the ideal of moral equity.Acronym for designing urban environments to reduce crime....

Digital Life 2025-07-28

Digital Life crossword puzzle
Across
  1. A wireless technology standard for exchanging data over short distances.
  2. Digital currency in which encryption techniques are used.
  3. A network security system that monitors and controls incoming and outgoing network traffic.
  4. Programs and other operating information used by a computer.
  5. A computer that manages access to a centralized resource or service.
  6. Unsolicited messages sent over the internet.
  7. The physical components of a computer.
  8. A malicious software program that replicates itself.
  9. A locator for an address on the internet.
  10. A step-by-step procedure for solving a problem.
  11. A global network of interconnected computers.
Down
  1. Software that is intended to damage or disable computers.
  2. Intelligence The simulation of human intelligence processes by machines.
  3. Measures taken to protect a computer or network from unauthorized access.
  4. A collection of information stored electronically.
  5. A local area wireless technology that allows electronic devices to exchange data.
  6. A document stored on the internet.
  7. Storing and accessing data over the internet instead of on local servers.
  8. A group of computers connected together to share resources.
  9. The maximum rate of data transfer across a network.
  10. A device that forwards data packets along networks.
  11. Reality An immersive computer-generated environment.
  12. The process of converting information into a secure format.
  13. Information processed or stored by a computer.
  14. The smallest unit of a digital image.

25 Clues: A document stored on the internet.The smallest unit of a digital image.The physical components of a computer.A locator for an address on the internet.Unsolicited messages sent over the internet.A global network of interconnected computers.Information processed or stored by a computer.A step-by-step procedure for solving a problem....

A 2025-09-21

A crossword puzzle
Across
  1. – Company famous for GPUs and AI hardware.
  2. – Server-side logic of a web application.
  3. – Function calling itself in programming.
  4. – Memory-safe programming language focused on performance.
  5. – Practices uniting software development and IT operations.
  6. – Language that makes websites interactive.
  7. – Historic tech company known for mainframes and Watson.
  8. – Wireless technology named after a Viking king.
  9. – Intelligence demonstrated by machines.
  10. – Step-by-step procedure for solving a problem.
  11. – Distributed version control system created by Linus Torvalds.
  12. – Software used to access websites.
  13. – Company founded by Bill Gates and Paul Allen.
  14. Language for managing relational databases.
  15. – Field combining statistics, coding, and data analysis.
  16. – Visible part of a website users interact with.
  17. – Digital icons expressing emotions or ideas.
  18. – Protecting systems from digital threats.
Down
  1. – Computers within devices like cars and appliances.
  2. – Open-source operating system kernel.
  3. – “Write once, run anywhere” programming language.
  4. – Data structure following “Last In, First Out.”
  5. – Tech giant behind iPhone and Mac.
  6. – Search engine giant and AI innovator.
  7. – Popular programming language named after a comedy group.
  8. – AI technique where systems learn from data.
  9. – Microprocessor manufacturer known for Pentium and Core series.
  10. – Platform for containerization of applications.
  11. – Whole number data type.
  12. – Mobile operating system by Google.
  13. – Data structure that works on “First In, First Out.”
  14. – Core part of an operating system.
  15. – Data type representing decimal numbers.

33 Clues: – Whole number data type.– Tech giant behind iPhone and Mac.– Software used to access websites.– Core part of an operating system.– Mobile operating system by Google.– Open-source operating system kernel.– Search engine giant and AI innovator.– Intelligence demonstrated by machines.– Server-side logic of a web application....

DEPARTMENTS 2025-03-11

DEPARTMENTS crossword puzzle
Across
  1. This department handles international sales, shipping, expanding the company’s presence in foreign markets
  2. This department promotes the company's products or services to attract customers and increase sales
  3. This department orders raw materials, equipment, and services needed for business operations
  4. This department manages the sales of products or services to customers and businesses
  5. This department manages the transportation, storage, and delivery of goods to ensure efficient supply chain operations
  6. This department manages company budgets, financial planning, processes payments
  7. This department maintains and improves the company’s technological infrastructure, software, and cybersecurity
Down
  1. This department handles customer inquiries, complaints, and supports requests to ensure customer satisfaction
  2. This department develops new products and improves existing ones through innovation and testing (full name)
  3. This department handles recruitment, employee relations, training, and workplace policies (full name)
  4. This department inspects products to ensure they meet company and industry standards before reaching customers
  5. This department oversees the manufacturing process, ensuring products are made efficiently and meet required specifications

12 Clues: This department manages company budgets, financial planning, processes paymentsThis department manages the sales of products or services to customers and businessesThis department orders raw materials, equipment, and services needed for business operations...

Browsing Safely 2025-05-21

Browsing Safely crossword puzzle
Across
  1. is a two-step authentication for login involves
  2. is the process ‘befriending’ children on social media to facilitate online or physical sexual abuse
  3. is a collection of of technologies,processes,and practices designed to protect network
  4. refers to the act of stealing and misusing someone’s personal information
  5. extract confidential information from users and use this information to execute fraudulent tasks online
  6. spoofing means hoaxing or misleading
Down
  1. It is an act of sending an email to a user misleading him to believe that it is from a trusted person
  2. is an act of harming or harassing an individual using information technology in a deliberate manner
  3. is the use of illegal methods to get money or other things that belong to a bank
  4. is a two-step authentication for login involves
  5. is any criminal activity intended to harm anyone using a computer
  6. is a software that helps in preventing unauthorised access to your computer
  7. is a computer program that is designed to identify, prevent and remove viruses from a computer
  8. vital information resource under seize
  9. refers to an illegal entry into a computer

15 Clues: spoofing means hoaxing or misleadingvital information resource under seizerefers to an illegal entry into a computeris a two-step authentication for login involvesis a two-step authentication for login involvesis any criminal activity intended to harm anyone using a computerrefers to the act of stealing and misusing someone’s personal information...

IT Crossword 2019-07-23

IT Crossword crossword puzzle
Across
  1. A network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. The fact of obeying a particular law or rule, or of acting according to an agreement:
  4. Repair the damage to something in an improvised way
  5. The company with 20 years of experience that helps you with your IT issues
  6. A person who uses computers to gain unauthorized access to data
Down
  1. A collection of data or computer instructions that tell the computer how to work
  2. The quality or state of being exposed to the possibility of being attacked or harmed
  3. A means to support and help you deal with any issues/incidents in your organization
  4. A copy of a file or other item of data made in case the original is lost or damaged
  5. Conduct an examination
  6. A group or system of interconnected people or things.

12 Clues: Conduct an examinationRepair the damage to something in an improvised wayA group or system of interconnected people or things.A person who uses computers to gain unauthorized access to dataThe company with 20 years of experience that helps you with your IT issuesA collection of data or computer instructions that tell the computer how to work...

Digitalization 2019-05-25

Digitalization crossword puzzle
Across
  1. any one of the ten written numbers 0 to 9
  2. relating to or like a robot
  3. the act of watching a person or a place, esp. a person believed to be involved with criminal activity or a place where criminals gather
  4. the newest information that people connected to a central computer system can see, when the information changes regularly
  5. to get work done by making a contract with another company to do it, often in another country, rather than in your own company
  6. a quick way to start or use a computer program
  7. the use of machines or computers instead of people to do a job, especially in a factory or office
Down
  1. a person who finds something interesting on the Internet and makes it go viral
  2. the main storage area for new incoming email messages
  3. ways of protecting computer systems against threats such as viruses
  4. a photographic copy of an early plan for a building or machine
  5. someone who makes money using illegal methods, especially by tricking people

12 Clues: relating to or like a robotany one of the ten written numbers 0 to 9a quick way to start or use a computer programthe main storage area for new incoming email messagesa photographic copy of an early plan for a building or machineways of protecting computer systems against threats such as viruses...

Cyber security 2022-09-07

Cyber security crossword puzzle
Across
  1. An annoying malware that spams you with ads
  2. a collection of malware infested computers that form a network to attack
  3. An important process that verifies a user is really who they are; many different ways this can be done
  4. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
Down
  1. When raw data is put into context and has meaning, the data transforms into _____
  2. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  3. Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
  4. I am not a robot

8 Clues: I am not a robotAn annoying malware that spams you with adsa collection of malware infested computers that form a network to attackWhen raw data is put into context and has meaning, the data transforms into _____Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing....

Compliance Training 10/10/22 2022-10-04

Compliance Training 10/10/22 crossword puzzle
Across
  1. a type of test ran to test the effectiveness of the Firm's network and data security, runs alongside of penetration testing
  2. the act of removing or retiring Firm devices
  3. an event requiring the notification of Senior Management, includes cybersecurity and/or disaster recovery
  4. prohibits the acceptance of cash and requires OFAC screening
  5. signed contract outlining services provided
  6. trading that is completed in the last hour of the day, less than 4% of account value, or consists of shares held for greater than 90 days
  7. the only Firm-approved social media platform
  8. A Client's dissatisfaction if written and asks for rectification
  9. physical or electronic access and/or control of Client assets
  10. composed of the Firm's Form CRS, ADV Part 2A and 2B
Down
  1. a specific Person subject the Firm's COE, includes regular, temporary, full-time, part-time employees, intern(s), and certain independent contractors
  2. defined by the SEC as someone older than 62
  3. actual or hypothetical results presented to clients
  4. Individual's personal profile, part of NPI
  5. fees paid by the Client, done monthly in advance based on prior month-end closing value
  6. how data is organized according to sensitivity
  7. lack or hard-wired connection; access must be password-protected; public access is prohibited
  8. a word or passphrase used to secure logins

18 Clues: Individual's personal profile, part of NPIa word or passphrase used to secure loginsdefined by the SEC as someone older than 62signed contract outlining services providedthe act of removing or retiring Firm devicesthe only Firm-approved social media platformhow data is organized according to sensitivity...

CS Unit 2 Vocab 2025-09-30

CS Unit 2 Vocab crossword puzzle
Across
  1. identity verification
  2. software that is programmed to detect, prevent, and remove viruses from devices
  3. a network that only uses cables to connect to devices or the internet
  4. a network that transmit data extremely fast through thin strands of plastic or glass fiber
  5. data stored on a device that is not connected to the internet or to a network
  6. open authorization and two-factor authentication
  7. security process that requires two different forms/factors of authentication to verify someone's identity
  8. the data is trustworthy and accurate (part of the CIA triad)
  9. the exposure something has to being in danger
Down
  1. to reduce the severity of something
  2. the accessibility of data to authorized users (part of the CIA triad)
  3. services that are useable
  4. the core fundamental concept of cybersecurity
  5. proof that someone/something has performed a digital action, so they can not deny involvement
  6. network security systems that monitor and control network trafficet, used as barriers between internal and external networks
  7. only people who are authorized have access to data (part of the CIA triad)
  8. network security tool that monitors system and network activity for threats and mitigates them immediately
  9. network security tool that monitors system and nwork activity for suspicious behavior

18 Clues: identity verificationservices that are useableto reduce the severity of somethingthe core fundamental concept of cybersecuritythe exposure something has to being in dangeropen authorization and two-factor authenticationthe data is trustworthy and accurate (part of the CIA triad)the accessibility of data to authorized users (part of the CIA triad)...

Code Word 2021-12-02

Code Word crossword puzzle
Across
  1. The process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
  2. A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company
  3. Measures designed to protect your computer, device or network from cybercrime.
  4. It refers to unsolicited email messages sent for marketing purposes
  5. Any type of illegal activity that is undertaken (or relies heavily) on a computer.
  6. A software program that allows you to surf the web.
Down
  1. Reduction of the size of a file.
  2. A barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  3. It is responsible for performing calculations and tasks that make programs work.
  4. A set of computers on a network that are managed as a unit.
  5. Wireless communications technology intended to replace cables
  6. A piece of code or data created by a web server and stored on a user's computer.

12 Clues: Reduction of the size of a file.A software program that allows you to surf the web.A set of computers on a network that are managed as a unit.Wireless communications technology intended to replace cablesIt refers to unsolicited email messages sent for marketing purposesMeasures designed to protect your computer, device or network from cybercrime....

Information Governance 2022-05-05

Information Governance crossword puzzle
Across
  1. Information assets generated by or managed for the organization have a reasonable guarantee of authenticity and reliability
  2. involves protecting that information by preventing, detecting, and responding to cyber attacks
  3. Evidence of a business activity
  4. The process of safeguarding important information from corruption, compromise or loss
  5. The process of adhering to policies and decisions
  6. Ensuring timely and reliable access to and use of information
  7. Delegated responsibility for information management to appropriate individuals
Down
  1. The final stage in the records lifecycle, resulting in destruction of temporary records or the transfer of permanent records to the Digital Archives
  2. Maintaining information assets for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements
  3. Ability of an organization to make its stakeholders accessible to the information needed to make decisions
  4. A measure of the extent to which an entity is threatened by a potential circumstance or event
  5. The electronic aspect of identifying, collecting and producing information in response to a request for production in a lawsuit or investigation

12 Clues: Evidence of a business activityThe process of adhering to policies and decisionsEnsuring timely and reliable access to and use of informationDelegated responsibility for information management to appropriate individualsThe process of safeguarding important information from corruption, compromise or loss...

DIGITAL LITERACY WORD SEARCH 2024-12-10

DIGITAL LITERACY WORD SEARCH crossword puzzle
Across
  1. The practice if protecting system, networks, and programs from digital attacks.
  2. The set of competencies required for full participation in society that includes knowledge, skills, and behaviors involving the effective use of digital devices for purpose of communication, expression, collaboration and advocacy
  3. Intentionally and cruelly excluding someone from an online group
  4. Repeatedly sending nasty, mean, and insulting messages
  5. Refers to anything that has the potential to cause serious harm to computer systems.
  6. Posting inflammatory or provocative messages in online communities to elicit reaction from other
  7. Act of publicly revealing private information about an individual without their consent, often with malicious intent
Down
  1. Use of electronic communication to stalk to harass an individual, posing a credible threat to their safety.
  2. Any criminal activity carried out using computer or the internet.
  3. Creating a fake accounts or profile to misrepresent someone else online.
  4. Refers to being responsible when using the internet.
  5. An act of taking someone else's work and presenting it as your own

12 Clues: Refers to being responsible when using the internet.Repeatedly sending nasty, mean, and insulting messagesIntentionally and cruelly excluding someone from an online groupAny criminal activity carried out using computer or the internet.An act of taking someone else's work and presenting it as your own...

Lab Week 2025 Crossword 1 2025-04-09

Lab Week 2025 Crossword 1 crossword puzzle
Across
  1. The pointed hollow end of a hypodermic syringe
  2. A medicine to treat dependence on opioid drugs such as heroin, and contains Buprenorphine with Naloxone
  3. An enzyme primarily produced in the pancreas, that aids in the digestion of fats
  4. A medication used in medication-assisted treatment to help people reduce or quit their use of heroin or other opiates
  5. A life science company offering lab purification equipment and solvents
  6. An appliance which is kept artificially cool and used to store reagents
  7. An RBC with a slit-like or "mouth-shaped" central pallor, rather than the normal bi-concave disc shape
Down
  1. The contamination of a sample or experience by a previous sample or experiment, leading to inaccurate or misleading results
  2. A company that provides IT management and cybersecurity services
  3. A blood test that determines the percentage of red blood cells in total blood volume
  4. A laboratory technique that detects and measures the presence or concentration of a specific substance in a sample
  5. To inspect closely

12 Clues: To inspect closelyThe pointed hollow end of a hypodermic syringeA company that provides IT management and cybersecurity servicesA life science company offering lab purification equipment and solventsAn appliance which is kept artificially cool and used to store reagentsAn enzyme primarily produced in the pancreas, that aids in the digestion of fats...

Cyber Security Awareness Month 2024-10-15

Cyber Security Awareness Month crossword puzzle
Across
  1. An initial phase of a cyber attack where information about a target system, network, or organization is gathered.
  2. A method of faking an identity to gain access.
  3. The process of converting encrypted data back to its original form.
  4. A code or technique used to take advantage of a vulnerability.
  5. A security event where unauthorized individuals gain access to a secure computer system, network, or database.
  6. The process of verifying the identity of a user, device, or system before granting access to resources.
  7. A type of malware designed to erase its tracks after executing its malicious actions.
  8. The framework of policies and procedures that ensure cybersecurity practices are in line with organizational goals.
Down
  1. The name for a number used only once in a cryptographic communication to prevent replay attacks.
  2. The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis.
  3. The act of pretending to be someone else for malicious purposes.
  4. A form of spear phishing that targets high-profile individuals, like executives.

12 Clues: A method of faking an identity to gain access.A code or technique used to take advantage of a vulnerability.The act of pretending to be someone else for malicious purposes.The process of converting encrypted data back to its original form.A form of spear phishing that targets high-profile individuals, like executives....

Trends in Healthcare 2020-09-10

Trends in Healthcare crossword puzzle
Across
  1. is the protection of internet-connected systems including hardware, software, and databases from cyber attacks
  2. general direction in which something is changing
  3. prevents illness and disease
  4. everyone with the same ____________ related group is in one payment group as a method of cost containment
  5. recycling and turning off electronics are examples of energy _______________
  6. ________ management techniques include therapy, massage, breathing techniques, and yoga
  7. physical, social, intellectual, spiritual, occupational, emotional, financial, and environmental make up the 8 dimensions of this
  8. less expensive than inpatient care
  9. _______ health allows patient to be in the comfort of his or her own home and allows patient to leave from hospital much sooner
Down
  1. the protection or promotion of the interests of consumers
  2. health related ___________ are one of the main reasons for high costs of healthcare
  3. refers to the practice of caring for patients remotely using video and audio technology
  4. _________ medicine promotes physical, social, emotional, intellectual, and spiritual well-being
  5. the process of combining a number of facilities into a single branch or network
  6. baby ___________ created an increased need for geriatric medicine
  7. improves mood, physical and mental wellness, stamina, immune function and releases endorphins

16 Clues: prevents illness and diseaseless expensive than inpatient caregeneral direction in which something is changingthe protection or promotion of the interests of consumersbaby ___________ created an increased need for geriatric medicinerecycling and turning off electronics are examples of energy _______________...

Business Continuity Awareness Week 2022 2022-07-04

Business Continuity Awareness Week 2022 crossword puzzle
Across
  1. What is the latest overseas company that has completed their BCMS Implementation as per the latest post in BCM's Yammer page?
  2. to build a success for program in microsimulations.
  3. Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities.
  4. Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture.
  5. One of hybrid Pros and Cons is reliance on home utilities and ___________.
  6. A thing made by combining two different elements.
  7. The capacity to recover quickly from difficulties.
Down
  1. Involvement and enthusiasm in resilience
  2. What app can WOWriors get more information about Business Continuity and Organisational Resilience from UMW Office 365?
  3. Acknowledge new _________ in addition to the opportunities that hybrid world provides businesses and employees.
  4. What is the third UMW Group BCM risk events.
  5. In order to prepare for cyber resilience, speed and agility are required.
  6. Group CMT Members’ ‘Rose Among the Thorns’
  7. In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
  8. The biggest threat to Cybersecurity is human _______.
  9. One of major paradigm shift in the workforce.

16 Clues: Involvement and enthusiasm in resilienceGroup CMT Members’ ‘Rose Among the Thorns’What is the third UMW Group BCM risk events.One of major paradigm shift in the workforce.A thing made by combining two different elements.The capacity to recover quickly from difficulties.to build a success for program in microsimulations....

Safety Crossword 2022-10-20

Safety Crossword crossword puzzle
Across
  1. you should check the batteries of your smoke detector _______
  2. infectious microorganisms in human blood that can cause disease in humans
  3. regulatory agency that inspects and examines workplaces
  4. a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
  5. offers a way for all employees to confirm their dedication to positive safety behavior each year
  6. the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
  7. when you are on a boat, canoe, or kayak, make sure you always wear a __________
  8. if you see someone doing something unsafe on the job, you should use your _________________
Down
  1. aerosols, nail polish and cooking oils are all highly ________
  2. an unplanned event that did not result in injury, illness or damage, but had the potential to do so
  3. what does PPE stand for?
  4. protection for your hands
  5. protection for your eyes
  6. a tornado _______ means a tornado has been spotted or a radar has picked one up
  7. protection for your head
  8. you can help prevent back problems by having good _______

16 Clues: what does PPE stand for?protection for your eyesprotection for your headprotection for your handsregulatory agency that inspects and examines workplacesyou can help prevent back problems by having good _______you should check the batteries of your smoke detector _______aerosols, nail polish and cooking oils are all highly ________...

Workplace Readiness 2025-02-04

Workplace Readiness crossword puzzle
Across
  1. a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system.
  2. new, fresh, inventive
  3. Network a website that allows people of similar interests to interact and exchange information that is typically personal
  4. the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
  5. the protection of information systems against unauthorized access (e.g., hacking, identity theft).
  6. the ability to transcend traditional ideas, rules, patterns, to create meaningful new ideas and interpretations
  7. the combination of details or features of an event, picture or object.
  8. connected with or related to the matter at hand
Down
  1. a flaw or weakness that allows a threat agent to bypass security.
  2. the unethical distribution of mass digital messages. This is the main way that malware is opened and spread.
  3. to support with evidence or authority; to make more certain
  4. believable; reliable
  5. book, article, person, or other resource consulted for information.
  6. the exclusive right granted by a government to an inventor to manufacture, use, or sell an invention for a certain number of years
  7. unbiased; neutral
  8. to make an extensive investigation into a subject or idea

16 Clues: unbiased; neutralbelievable; reliablenew, fresh, inventiveconnected with or related to the matter at handto make an extensive investigation into a subject or ideato support with evidence or authority; to make more certaina flaw or weakness that allows a threat agent to bypass security....

Cyber security 2023-11-28

Cyber security crossword puzzle
Across
  1. Desktop is also known as.
  2. Hiding one piece of data with in another.
  3. The crime that related to computers and networks.
  4. A piece of malware that can replicate itself in order to spread the infection to other connected computer without human interaction.
  5. Secretly watches computer activity.
  6. Phishing is malware that asks for ______ details.
  7. Any program, website, or file that is defined to damage or gain unauthorized access to a device.
  8. The practice of protecting systems, networks and programs from digital attacks.
Down
  1. Someone who breaks into a computer system.
  2. URLs that mislead the user into down leading a virus and visiting a harmful website.
  3. Illegal production of copyrighted material is often referred as ____.
  4. Information is also known as.
  5. A form of malware that deliberately prevent u from accessing files in ur computer,until they are decrypted using at a cost.
  6. Type of bullying that takes place online.
  7. ____ is the ability to act in a safe and responsible manner on the internet and other connected environments.
  8. An online threat that hides itself in computers and mobile device.
  9. Software that protects computer from virus related harm.
  10. Copying the data without the permission of owner of the computer/computers system/ computer network.

18 Clues: Desktop is also known as.Information is also known as.Secretly watches computer activity.Hiding one piece of data with in another.Type of bullying that takes place online.Someone who breaks into a computer system.The crime that related to computers and networks.Phishing is malware that asks for ______ details....

GenCyber Cybersecurity Concepts 2022-06-08

GenCyber Cybersecurity Concepts crossword puzzle
Across
  1. e
  2. f
  3. g
  4. n
Down
  1. c
  2. c
  3. c
  4. y

8 Clues: ceccfgyn

What is cybersecurity? 2024-07-03

What is cybersecurity? crossword puzzle
Across
  1. Deceptive email designed to steal information
  2. Malicious software
  3. Protection from cyberattacks
Down
  1. Potential danger
  2. Secret word or phrase for access
  3. Attempt to gain unauthorized access

6 Clues: Potential dangerMalicious softwareProtection from cyberattacksSecret word or phrase for accessAttempt to gain unauthorized accessDeceptive email designed to steal information

Cybersecurity Month Puzzle 1 DAS Cybersecurity Tools 2024-10-01

Cybersecurity Month Puzzle 1 DAS Cybersecurity Tools crossword puzzle
Across
  1. The state's SIEM, where logs are sent to.
  2. The state's secure web gateway and URL filter.
  3. The state's vulnerability management solution.
  4. Encrypts the data on a users desktop or laptop.
Down
  1. The security solution built into all Windows workstations.
  2. The state's antivirus and antimalware solition.

6 Clues: The state's SIEM, where logs are sent to.The state's secure web gateway and URL filter.The state's vulnerability management solution.The state's antivirus and antimalware solition.Encrypts the data on a users desktop or laptop.The security solution built into all Windows workstations.

REV Cybersecurity Awareness Crossword Puzzle # 3 2019-10-16

REV Cybersecurity Awareness Crossword Puzzle # 3 crossword puzzle
Across
  1. address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
  2. injection type of input validation attack where SQL code is inserted into application queries to manipulate the database.
  3. approval, permission, or empowerment for someone or something to do something.
  4. basic communication language or "protocol" of the Internet.
  5. sequence of eight bits.
  6. code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
  7. encrypted form of the message being sent.
  8. Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network.
  9. repudiation prove that a user sent a message and the message has not been altered.
Down
  1. stripping one layer's headers and passing the rest of the packet up to next higher layer.
  2. force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
  3. gaining unauthorized logical access to sensitive data by circumventing a system's protections.
  4. process of confirming the correctness of the claimed identity.
  5. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
  6. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.

15 Clues: sequence of eight bits.encrypted form of the message being sent.basic communication language or "protocol" of the Internet.process of confirming the correctness of the claimed identity.approval, permission, or empowerment for someone or something to do something.repudiation prove that a user sent a message and the message has not been altered....

REV CyberSecurity Awareness Crossword Puzzle # 1 2019-10-16

REV CyberSecurity Awareness Crossword Puzzle # 1 crossword puzzle
Across
  1. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.
  2. type of input validation attack where SQL code is inserted into application queries to manipulate the database.
  3. approval, permission, or empowerment for someone or something to do something.
  4. basic communication language or "protocol" of the Internet.
  5. TCP/IP protocol specifying the transfer of text or binary files across the network.
  6. gaining unauthorized logical access to sensitive data by circumventing a system's protections.
Down
  1. encrypted form of the message being sent.
  2. process of confirming the correctness of the claimed identity.
  3. prove that a user sent a message and the message has not been altered.
  4. software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
  5. sequence of eight bits.
  6. pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
  7. stripping one layer's headers and passing the rest of the packet up to next higher layer.
  8. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
  9. cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.

15 Clues: sequence of eight bits.encrypted form of the message being sent.basic communication language or "protocol" of the Internet.process of confirming the correctness of the claimed identity.prove that a user sent a message and the message has not been altered.approval, permission, or empowerment for someone or something to do something....

REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16

REV Cybersecurity Awareness Trivia Crossword Puzzle crossword puzzle
Across
  1. stripping one llayer's headers and passing the rest of the packet up to next higher layer
  2. sequence of eight bits
  3. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
  4. approval, permission, or empowerment for someone or something to do something
  5. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
  6. repudiation prove that a user sent a message and the message has not been altered
  7. basic communication language or "protocol" of the Internet
  8. Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network
  9. injection type of input validation attack where SQL code is inserted into application queries to manipulate the database
Down
  1. address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1)
  2. gaining unauthorized logical access to sensitive data by circumventing a system's protections
  3. process of confirming the correctness of the claimed identity
  4. code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse)
  5. encrypted form of the message being sent
  6. force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one

15 Clues: sequence of eight bitsencrypted form of the message being sentbasic communication language or "protocol" of the Internetprocess of confirming the correctness of the claimed identityapproval, permission, or empowerment for someone or something to do somethingrepudiation prove that a user sent a message and the message has not been altered...