cybersecurity Crossword Puzzles

REV Cybersecurity Awareness Crossword Puzzle # 3 2019-10-16

REV Cybersecurity Awareness Crossword Puzzle # 3 crossword puzzle
Across
  1. address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
  2. injection type of input validation attack where SQL code is inserted into application queries to manipulate the database.
  3. approval, permission, or empowerment for someone or something to do something.
  4. basic communication language or "protocol" of the Internet.
  5. sequence of eight bits.
  6. code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
  7. encrypted form of the message being sent.
  8. Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network.
  9. repudiation prove that a user sent a message and the message has not been altered.
Down
  1. stripping one layer's headers and passing the rest of the packet up to next higher layer.
  2. force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
  3. gaining unauthorized logical access to sensitive data by circumventing a system's protections.
  4. process of confirming the correctness of the claimed identity.
  5. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
  6. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.

15 Clues: sequence of eight bits.encrypted form of the message being sent.basic communication language or "protocol" of the Internet.process of confirming the correctness of the claimed identity.approval, permission, or empowerment for someone or something to do something.repudiation prove that a user sent a message and the message has not been altered....

REV CyberSecurity Awareness Crossword Puzzle # 1 2019-10-16

REV CyberSecurity Awareness Crossword Puzzle # 1 crossword puzzle
Across
  1. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.
  2. type of input validation attack where SQL code is inserted into application queries to manipulate the database.
  3. approval, permission, or empowerment for someone or something to do something.
  4. basic communication language or "protocol" of the Internet.
  5. TCP/IP protocol specifying the transfer of text or binary files across the network.
  6. gaining unauthorized logical access to sensitive data by circumventing a system's protections.
Down
  1. encrypted form of the message being sent.
  2. process of confirming the correctness of the claimed identity.
  3. prove that a user sent a message and the message has not been altered.
  4. software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
  5. sequence of eight bits.
  6. pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
  7. stripping one layer's headers and passing the rest of the packet up to next higher layer.
  8. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
  9. cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.

15 Clues: sequence of eight bits.encrypted form of the message being sent.basic communication language or "protocol" of the Internet.process of confirming the correctness of the claimed identity.prove that a user sent a message and the message has not been altered.approval, permission, or empowerment for someone or something to do something....

REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16

REV Cybersecurity Awareness Trivia Crossword Puzzle crossword puzzle
Across
  1. stripping one llayer's headers and passing the rest of the packet up to next higher layer
  2. sequence of eight bits
  3. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
  4. approval, permission, or empowerment for someone or something to do something
  5. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
  6. repudiation prove that a user sent a message and the message has not been altered
  7. basic communication language or "protocol" of the Internet
  8. Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network
  9. injection type of input validation attack where SQL code is inserted into application queries to manipulate the database
Down
  1. address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1)
  2. gaining unauthorized logical access to sensitive data by circumventing a system's protections
  3. process of confirming the correctness of the claimed identity
  4. code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse)
  5. encrypted form of the message being sent
  6. force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one

15 Clues: sequence of eight bitsencrypted form of the message being sentbasic communication language or "protocol" of the Internetprocess of confirming the correctness of the claimed identityapproval, permission, or empowerment for someone or something to do somethingrepudiation prove that a user sent a message and the message has not been altered...

022.03a - What Can You Do Online? 2024-09-23

022.03a - What Can You Do Online? crossword puzzle
Across
  1. Websites and apps that allow users to create and share content or participate in social networking
  2. The responsible use of technology and behavior online
Down
  1. The act of purchasing goods or services over the internet
  2. The practice of protecting systems, networks, and programs from digital attacks

4 Clues: The responsible use of technology and behavior onlineThe act of purchasing goods or services over the internetThe practice of protecting systems, networks, and programs from digital attacksWebsites and apps that allow users to create and share content or participate in social networking

Cyber Crosswords 2024-06-19

Cyber Crosswords crossword puzzle
Across
  1. A secret word or phrase used to gain access to a computer system (8 letters)
  2. A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
  3. The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
  1. Software that is designed to detect and destroy computer viruses (9 letters)
  2. The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
  3. The practice of protecting systems, networks, and programs from digital attacks (10 letters)
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
  5. An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
  6. Unsolicited email, often used for advertising or phishing (4 letters)

9 Clues: Unsolicited email, often used for advertising or phishing (4 letters)Software that is designed to detect and destroy computer viruses (9 letters)A secret word or phrase used to gain access to a computer system (8 letters)The practice of protecting systems, networks, and programs from digital attacks (10 letters)...

Intro to Cybersecurity CA #2 2024-10-23

Intro to Cybersecurity CA #2 crossword puzzle
Across
  1. Linux command used to search a file for keywords
  2. Base 16 system
  3. Changing the order of items
  4. Brain of the computer; determines what software can run on device
  5. Encryption method; pre-shared password is only used once
Down
  1. Subsitution cipher based on multiple alphabets using system to switch between
  2. Precise set of instructions on how to scramble/unscramble data
  3. Hiding messages in an image
  4. Displays absolute path of directory
  5. Sends message to destination device
  6. group of 2 or more computing devices connected to each other, giving access to the same data

11 Clues: Base 16 systemHiding messages in an imageChanging the order of itemsDisplays absolute path of directorySends message to destination deviceLinux command used to search a file for keywordsEncryption method; pre-shared password is only used oncePrecise set of instructions on how to scramble/unscramble data...

Cybersecurity And The Internet Puzzle 2024-12-19

Cybersecurity And The Internet Puzzle crossword puzzle
Across
  1. A secret word you use to get into something, like a computer.
  2. Site where people can send electronic mail to each other, and talk.
  3. Where your devices can get connected.
  4. Someone who is good with computers.
  5. A picture of someone or something.
  6. You give someone an answer or respond to them.
Down
  1. Where your devices gets the newest software.
  2. Games where someone plays a game but on the internet.
  3. Site online to explore and learn, one link per every site.
  4. How you connect to the internet.
  5. A software code to perform unwanted actions.

11 Clues: How you connect to the internet.A picture of someone or something.Someone who is good with computers.Where your devices can get connected.Where your devices gets the newest software.A software code to perform unwanted actions.You give someone an answer or respond to them.Games where someone plays a game but on the internet....

Introduction to Cybersecurity New Year's Challenge 102 2024-01-01

Introduction to Cybersecurity New Year's Challenge 102 crossword puzzle
Across
  1. A way to send messages between computers instantly.
  2. A level in the TLP system where information can be shared, but only with permission.
  3. The part of a computer where you see information and pictures.
  4. When someone steals your personal information, like your name, Social Security number, or bank account number, to commit fraud or other crimes.
  5. A system that connects computers all over the world.
  6. A program that finds and removes viruses on a computer.
  7. A special name that identifies you on a computer system or website.
  8. A tool that lets you point and click on things on the computer.
  9. When someone uses the internet, a cell phone, or other device to send or post text or images intended to hurt or embarrass another person.
  10. A machine that helps us store and work with data.
  11. A level in the TLP system where information can't be shared and is very private.
  12. When your personal details are kept safe on the internet.
Down
  1. A level in the TLP system where information can be shared, but not with everybody.
  2. A tool in search engines that blocks bad content.
  3. Someone who breaks into computers or networks without permission.
  4. A bad program that can hurt your computer without you knowing.
  5. A level in the TLP system where information can be shared with anyone.
  6. Unwanted emails, often trying to sell things.
  7. A system used for sharing information safely and keeping the source of the information safe.
  8. A part of the computer that keeps bad things out.
  9. A place on the internet where you can find information, images, or videos.
  10. A tool that lets you type words, numbers, and symbols into a computer.
  11. A system for sending messages from one computer to another.
  12. A secret word or phrase that lets you use a computer or website.
  13. When you send a file from your computer to somewhere on the internet.
  14. When you get a file from the internet onto your computer.

26 Clues: Unwanted emails, often trying to sell things.A tool in search engines that blocks bad content.A part of the computer that keeps bad things out.A machine that helps us store and work with data.A way to send messages between computers instantly.A system that connects computers all over the world.A program that finds and removes viruses on a computer....

Cyber Security and Laws 2022-10-17

Cyber Security and Laws crossword puzzle
Across
  1. subscription fraud can be achieved by sending "----- " requests to subscribers via the SS7 / GTP protocols
  2. EDI internet transmission protocols include ----- File Transfer Protocol (SFTP),
  3. Cyber ------ is use of the Internet or other electronic means to track someone
  4. The International Organization for ------- is referred as ISO
  5. EDI, which stands for electronic data interchange, is the intercompany ----------- of business documents in a standard format.
  6. GLBA is a United States federal law that requires ------ institutions to explain how they share and protect their customers’ private information
  7. is just one of the many frauds on the Internet, trying to fool people into parting with their money
Down
  1. PCI DSS is an acronym for “----- Card Industry Data Security Standard.”
  2. Counteracting cybercrime is ------------- , a technique used to protect computers, networks, programs, and data from exploitation.
  3. The ----- System 7 (SS7) industry standard and set of protocols were developed in 1975
  4. refers to the use of a computer to commit a crime
  5. is the legal process by which an arbiter or judge reviews evidence and argumentation.

12 Clues: refers to the use of a computer to commit a crimeThe International Organization for ------- is referred as ISOPCI DSS is an acronym for “----- Card Industry Data Security Standard.”Cyber ------ is use of the Internet or other electronic means to track someoneEDI internet transmission protocols include ----- File Transfer Protocol (SFTP),...

expanding rights of various populations 2024-01-30

expanding rights of various populations crossword puzzle
Across
  1. A woman is an adult female human
  2. "Second-generation" Japanese Americans born as the children of the issei.
  3. Highly trained professionals who operate aircraft during flights
  4. A member of an air force or air arm of a nation's armed forces.
  5. A cybersecurity professional who uses encryption codes to protect data and other sensitive information.
  6. Putting a person in prison or other kind of detention, generally in wartime
Down
  1. The biggest and deadliest war in history, involving more than 30 countries.
  2. A means of presenting information to commanders, staffs, or other designated audiences.
  3. An iconic poster of a female factory worker flexing her muscle, exhorting other women to join the World War II effort with the declaration that "We Can Do It!"
  4. Second most populous of all Native American peoples in the United States
  5. Containing or having everything that is needed within itself.
  6. The action of separating people, historically on the basis of race and/or gender.

12 Clues: A woman is an adult female humanContaining or having everything that is needed within itself.A member of an air force or air arm of a nation's armed forces.Highly trained professionals who operate aircraft during flightsSecond most populous of all Native American peoples in the United States...

Security Bytes - March 2024 2024-02-28

Security Bytes - March 2024 crossword puzzle
Across
  1. A person who uses computers to gain unauthorised access to data.
  2. A network device that forwards data packets between computer networks
  3. Security techniques that use biological data for authentication.
  4. An encryption-based Internet security protocol
  5. A number of internet connected devices each of which is running one or more bots
Down
  1. a piece of software designed to update a computer program or its supporting data to fix or improve it.
  2. No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
  3. Software designed to detect and destroy computer viruses
  4. A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
  5. Highlighted policy in march security bytes newsletter
  6. A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
  7. The practice of protecting systems, networks and programs from digital attacks

12 Clues: An encryption-based Internet security protocolHighlighted policy in march security bytes newsletterSoftware designed to detect and destroy computer virusesA person who uses computers to gain unauthorised access to data.Security techniques that use biological data for authentication....

Secure networking in the cloud 2024-03-26

Secure networking in the cloud crossword puzzle
Across
  1. is a segmented piece of a larger network
  2. a device used to connect two different networks, especially a connection to the internet
  3. a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network
  4. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  5. not physically existing as such but made by software to appear to do so
  6. the measure of a system's ability to increase or decrease in performance and cost in response to changes
Down
  1. a business or company
  2. it represents the network interface configuration for a virtual machine
  3. two or more computers that are linked in order to share resources
  4. is a border and it can be physical, or abstract
  5. a connection between two pieces of electronic equipment, or between a person and a computer
  6. a computer network security system that restricts internet traffic in to, out of, or within a private network

12 Clues: a business or companyis a segmented piece of a larger networkis a border and it can be physical, or abstracttwo or more computers that are linked in order to share resourcesnot physically existing as such but made by software to appear to do soit represents the network interface configuration for a virtual machine...

STEM Vocabulary: Digital Citizenship 2024-03-18

STEM Vocabulary: Digital Citizenship crossword puzzle
Across
  1. The skill of evaluating information and sources for accuracy, credibility, and relevance.
  2. The responsible and ethical use of technology and the internet.
  3. Harassment, threats, or negative behavior toward others on the internet or through digital devices.
  4. The quality and complexity of a password, which affects its vulnerability to hacking.
  5. Controls and options that allow individuals to manage the information they share online and who can access it.
Down
  1. The set of rules and norms for respectful behavior when communicating online.
  2. Copying or using someone else's work, ideas, or content without proper attribution or permission.
  3. A security process that requires users to provide two different authentication methods to access an account, enhancing security.
  4. The trail of information and data left behind by a person's online activities.
  5. The ability to use digital tools and technology effectively and responsibly.
  6. Measures and practices to protect digital devices, networks, and data from online threats.
  7. Individuals who seek to harm others through online interactions.

12 Clues: The responsible and ethical use of technology and the internet.Individuals who seek to harm others through online interactions.The ability to use digital tools and technology effectively and responsibly.The set of rules and norms for respectful behavior when communicating online....

Y9 Lesson 2 Cybersecurity 2025-09-04

Y9 Lesson 2 Cybersecurity crossword puzzle
Across
  1. A hacker secretly listens to or steals data while it's being sent between devices
  2. A harmful software designed to damage or steal information
  3. A hacker tricks people into giving away important information using lies or manipulation
  4. A hacker pretends to be someone else to trick you into giving up your personal info
Down
  1. A hacker puts bad information into a websites database to steal important data
  2. A hacker sends too many requests to make a website or service stop working
  3. A program that secretly records every key you press to steal information like passwords
  4. Attack A hacker tries different passwords until the find the right one to break into your account

8 Clues: A harmful software designed to damage or steal informationA hacker sends too many requests to make a website or service stop workingA hacker puts bad information into a websites database to steal important dataA hacker secretly listens to or steals data while it's being sent between devices...

Cybersecurity Lesson 3 & 4 Key Terms Crossword 2022-08-31

Cybersecurity Lesson 3 & 4 Key Terms Crossword crossword puzzle
Across
  1. could be text-based works, computer programs, musical compositions, graphical creations and sound recordings.
  2. is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
  3. Malicious code that secretly watches your computer activity and sends the information over the Internet which can secretly capture your keystrokes (including passwords) and compromise your identity.
  4. means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the companies that provide the services and probably by your browser.
  5. is important for creating strong passwords.
  6. exposes you and your computer to cybersecurity vulnerabilities are known as viruses, malware, scams and identity theft.
  7. the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody without paying for it.
  8. enables an author to distribute their copyrighted work freely also offer the right to use, share and add to work from these authors.
Down
  1. works that are not copyrighted for any of a number of reasons.
  2. is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  3. Fake e-mail message appearing to be from a trusted business, social network or other contact.
  4. Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer and spread by human actions such as sharing infected files.
  5. is the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
  6. is using someone else’s work and passing it off as your own.
  7. keeping your personal information safe and personal.
  8. protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account.
  9. Programs that look useful, but actually cause damage to your computer.
  10. downloading songs and movies from the Internet without permission or payment is an illegal use of copyrighted material.
  11. special types of viruses that can travel from computer to computer without human action, is self-replicating and can multiply until it uses up the computer's resources.
  12. URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
  13. are formal ways of giving credit to people for their work.

21 Clues: is important for creating strong passwords.keeping your personal information safe and personal.are formal ways of giving credit to people for their work.is using someone else’s work and passing it off as your own.works that are not copyrighted for any of a number of reasons.Programs that look useful, but actually cause damage to your computer....

Introduction to Cybersecurity New Year's Challenge 101 2024-01-01

Introduction to Cybersecurity New Year's Challenge 101 crossword puzzle
Across
  1. Information that can be shared but only with your or your parents permission.
  2. Information can be shared but not with everybody.
  3. A tool that helps make sure you only see things on the internet that are safe for kids.
  4. Things that are just for you and not for sharing on the internet, like your password.
  5. It means keeping things a secret, especially your personal information like where you live or your full name.
  6. It's a massive, invisible web that lets you visit websites from all over the world right from your home.
  7. It's like sending a letter, but it's done on the computer and the person you're sending to gets it right away.
  8. It's like a secret code that lets you open a locked door, but instead, you're getting into your online games or learning apps.
  9. It's a place on the internet where you can read, watch videos, play games, and learn new things.
  10. It's like a smart TV you can type on and use to play games and learn new things.
  11. Just like picking a toy from a store shelf and bringing it home, but you're picking a game or a picture from the internet and putting it on your computer.
  12. It's just like the keyboard on a piano but instead of making music, this one is used to type words and numbers.
  13. It's like talking to a friend in person, but you're typing words on a computer instead.
  14. It's the name you use when you play games or learn online, so you don't have to use your real name.
  15. It's like a superhero shield that protects your computer from bad guys.
Down
  1. Being careful on the internet and not talking to strangers or sharing personal information like your address.
  2. It's the part of a computer or TV where the pictures and words show up.
  3. When you take a picture or write a story on your computer and then put it on the internet for others to see.
  4. A nasty bug that can make a computer sick, much like how a cold bug can make you sick.
  5. It's when someone tries to pretend they're you on the internet. They might try to take your password or other personal information.
  6. A small device you can move around to control what happens on your computer screen.
  7. A person who tries to break into computers and websites without permission, like a burglar, but online.
  8. Just like junk mail you get in your mailbox, but this comes in your email.
  9. Do not share this information (Social Security number, passwords). Very private.
  10. This is when someone uses the internet to be mean or tease someone else. It's important to tell an adult if this happens.
  11. It's like medicine for your computer. It helps to remove viruses and keeps your computer healthy.

26 Clues: Information can be shared but not with everybody.It's the part of a computer or TV where the pictures and words show up.It's like a superhero shield that protects your computer from bad guys.Just like junk mail you get in your mailbox, but this comes in your email.Information that can be shared but only with your or your parents permission....

Crossword Puzzle of Computer-Topic: Browsing Safely 2025-05-16

Crossword Puzzle of Computer-Topic: Browsing Safely crossword puzzle
Across
  1. It harm anyone using a computer and an internet connection.
  2. It is the act of sending an email to a user; misleading him to believe that it is from a trusted person.
Down
  1. It refers to an illegal entry into a computer system or network.
  2. It is a collection of technologies, processes and practices designed to protect network
  3. It is a program that disrupts the normal functioning of a computer.

5 Clues: It harm anyone using a computer and an internet connection.It refers to an illegal entry into a computer system or network.It is a program that disrupts the normal functioning of a computer.It is a collection of technologies, processes and practices designed to protect network...

Y9 Lesson 2 Cybersecurity 2025-09-04

Y9 Lesson 2 Cybersecurity crossword puzzle
Across
  1. A hacker secretly listens to or steals data while it's being sent between devices
  2. A harmful software designed to damage or steal information
  3. A hacker tricks people into giving away important information using lies or manipulation
  4. A hacker pretends to be someone else to trick you into giving up your personal info
Down
  1. A hacker puts bad information into a websites database to steal important data
  2. A hacker sends too many requests to make a website or service stop working
  3. A program that secretly records every key you press to steal information like passwords
  4. Attack A hacker tries different passwords until the find the right one to break into your account

8 Clues: A harmful software designed to damage or steal informationA hacker sends too many requests to make a website or service stop workingA hacker puts bad information into a websites database to steal important dataA hacker secretly listens to or steals data while it's being sent between devices...

Y9 Lesson 2 Cybersecurity 2025-09-04

Y9 Lesson 2 Cybersecurity crossword puzzle
Across
  1. A hacker secretly listens to or steals data while it's being sent between devices
  2. A harmful software designed to damage or steal information
  3. A hacker tricks people into giving away important information using lies or manipulation
  4. A hacker pretends to be someone else to trick you into giving up your personal info
Down
  1. A hacker puts bad information into a websites database to steal important data
  2. A hacker sends too many requests to make a website or service stop working
  3. A program that secretly records every key you press to steal information like passwords
  4. Attack A hacker tries different passwords until the find the right one to break into your account

8 Clues: A harmful software designed to damage or steal informationA hacker sends too many requests to make a website or service stop workingA hacker puts bad information into a websites database to steal important dataA hacker secretly listens to or steals data while it's being sent between devices...

Security Awareness crossword puzzle 2018-05-07

Security Awareness crossword puzzle crossword puzzle
Across
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Do not provide your _______ email account to social networks.
  3. _______ your computer when left unattended.
  4. This can slow down your computer and watch everywhere you go on the Internet.
  5. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  6. Always use _______ factor authentication where available.
  7. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  8. Use a _______ password different from the passwords you use to access other sites.
Down
  1. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  2. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  3. You should always keep your software and anti-virus definitions up-to-_______.
  4. Cybersecurity is _______'s responsibility.
  5. Information Security is a _______ issue.
  6. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  7. _______ before you click or forward.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

CyberQuiz 2024-02-05

CyberQuiz crossword puzzle
Across
  1. Software that detects and removes malicious programs on a computer
  2. Cyber attack attempting to discover a password or cryptographic key by trying all possible combinations
  3. System designed to mimic a vulnerable resource to attract and monitor cyber attacks
  4. Malware that encrypts user data, demanding payment for decryption
  5. Secret or hidden access point in a system, often used to bypass normal authentication
  6. Code or sequence of commands exploiting a system vulnerability for unauthorized access
Down
  1. Activity where an attacker pretends to be someone else or manipulates information to appear from a trusted source
  2. Cyber attack aiming to obtain sensitive information by posing as a trustworthy source
  3. Weakness or flaw in a system that could be exploited for unauthorized access
  4. A sequence of characters used for authentication to access a system or account
  5. Hidden part of the internet associated with illicit activities and anonymity
  6. Team Group of specialists simulating attacks on a system or network to identify vulnerabilities
  7. Security system that monitors and controls network traffic
  8. Team Defensive cybersecurity team responsible for protecting a system or network.
  9. Network of compromised computers controlled by a single entity for malicious activities

15 Clues: Security system that monitors and controls network trafficMalware that encrypts user data, demanding payment for decryptionSoftware that detects and removes malicious programs on a computerWeakness or flaw in a system that could be exploited for unauthorized accessHidden part of the internet associated with illicit activities and anonymity...

Browsing safely 2025-06-14

Browsing safely crossword puzzle
Across
  1. he practice of protecting networks, applications, sensitive information, and users from cyber attacks
  2. repeated harmed through the use of computers, cell phones, and other electronic devices
  3. a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
  4. type of computer program that's designed to seek out and remove computer viruses that have infected
  5. data that directly follow either by clicking
  6. when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
  7. text files with small data
  8. a threat that involves sending email messages with a fake sender address
Down
  1. the process of befriending someone online and make them do a physical meeting and physically harm them
  2. unauthorized users who gain access to computers in order to steal, alter, or delete data
  3. appears when an application wants you to pay attention.
  4. software that spreads between computers and causes damage to data and software.
  5. illegal activities involving computers, networks, or the internet as a tool to commit attacks.
  6. deceive people into revealing sensitive information or installing malware
  7. Web pages, links in one domain

15 Clues: text files with small dataWeb pages, links in one domaindata that directly follow either by clickingappears when an application wants you to pay attention.a threat that involves sending email messages with a fake sender addressdeceive people into revealing sensitive information or installing malware...

WHO Identifies Risk 2024-07-02

WHO Identifies Risk crossword puzzle
Across
  1. identify risk systematically by using formal risk assessments, incident reports, and claim data
  2. contributes insights through patient feedback, complaints, and involvement in incident reporting systems
  3. monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
Down
  1. identify risks through audits, inspections, and review of compliance w/ healthcare standards
  2. identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews

5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standardsidentify risk systematically by using formal risk assessments, incident reports, and claim datacontributes insights through patient feedback, complaints, and involvement in incident reporting systems...

WHO Identifies Risk 2024-07-02

WHO Identifies Risk crossword puzzle
Across
  1. identify risk systematically by using formal risk assessments, incident reports, and claim data
  2. monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
  3. identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
Down
  1. contributes insights through patient feedback, complaints, and involvement in incident reporting systems
  2. identify risks through audits, inspections, and review of compliance w/ healthcare standards

5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standardsidentify risk systematically by using formal risk assessments, incident reports, and claim datacontributes insights through patient feedback, complaints, and involvement in incident reporting systems...

The Need for Cybersecurity - Chapter 1 2023-08-14

The Need for Cybersecurity - Chapter 1 crossword puzzle
Across
  1. esfuerzo continuo para proteger los sistemas en red conectados a Internet y para proteger todos los datos del uso no autorizado o daño
  2. confidentiality, integrity, y availability
  3. el término que indica exactitud, consistencia y confiabilidad de los datos
  4. códigos de comportamiento que a veces, pero no siempre, son impuestos por leyes
  5. una gran red de objetos físicos que incluye sensores y equipos
  6. un conflicto basado en Internet que involucra la penetración de sistemas informáticos y redes de otras naciones
Down
  1. el acceso a los datos está restringido solo al personal autorizado
  2. International Multilateral Partnership Against Cyber Threats
  3. el término que describe los servicios y datos que se mantienen bien y se puede acceder a ellos todo el tiempo
  4. un programa de malware diseñado para dañar la planta de enriquecimiento nuclear de Irán, un programa que es un ejemplo de un ataque patrocinado por el estado

10 Clues: confidentiality, integrity, y availabilityInternational Multilateral Partnership Against Cyber Threatsuna gran red de objetos físicos que incluye sensores y equiposel acceso a los datos está restringido solo al personal autorizadoel término que indica exactitud, consistencia y confiabilidad de los datos...

ISM CROSSWORD PUZZLE 2025-07-04

ISM CROSSWORD PUZZLE crossword puzzle
Across
  1. the owner of the ship or any other organization or person such as the manager, or the bareboat charterer, who has assumed the responsibility for operation of the ship from the shipowner and who, on assuming such responsibility, has agreed to take over all the duties and responsibility imposed by the Code.
  2. Interim DOC is issued for ___ months
  3. A statement of fact made during a safety management audit and substantiated by objective evidence
  4. Personnel carrying audits should be _____ of the areas being audited
  5. A sequence of events and/or conditions that could have resulted in loss
Down
  1. Risk=Likelihood X ______
  2. Quantitative or qualitative information records or statement
  3. Resolution MSC.428 (98) mandates that these risks be addressed in compliance with the International Safety Management (ISM) Code.
  4. The position ISM Clause 4 is centered around
  5. Acronym which indicates that the risk should be lowered as low as reasonably practicable

10 Clues: Risk=Likelihood X ______Interim DOC is issued for ___ monthsThe position ISM Clause 4 is centered aroundQuantitative or qualitative information records or statementPersonnel carrying audits should be _____ of the areas being auditedA sequence of events and/or conditions that could have resulted in loss...

Cyber security 2022-09-07

Cyber security crossword puzzle
Across
  1. An important process that verifies a user is really who they are; many different ways this can be done
  2. I am not a robot
  3. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
  4. a collection of malware infested computers that form a network to attack
  5. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  6. Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
Down
  1. Full name of DoS attack
  2. An annoying malware that spams you with ads
  3. When raw data is put into context and has meaning, the data transforms into _____
  4. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.

10 Clues: I am not a robotFull name of DoS attackAn annoying malware that spams you with adsa collection of malware infested computers that form a network to attackWhen raw data is put into context and has meaning, the data transforms into _____Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing....

FBLA Competitions Challenge 2025-10-13

FBLA Competitions Challenge crossword puzzle
Across
  1. The machinery and equipment developed from the application of scientific knowledge.
  2. The practice of protecting systems, networks, and data from digital attacks, ensuring the confidentiality, integrity, and availability of information.
  3. A formal meeting in which an applicant is asked questions to determine their suitability for a particular job.
  4. The art of effectively delivering information, ideas, or messages to an audience.
  5. A commercial operation or company.
  6. The activity, set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large.
Down
  1. The process of creating, developing, and managing a new business venture with the goal of making a profit.
  2. The responsibility for and control of a company or organization
  3. The branch of knowledge concerned with the production, consumption, and transfer of wealth.
  4. A crucial function in business that involves the collection, tracking, and correction of financial data.

10 Clues: A commercial operation or company.The responsibility for and control of a company or organizationThe art of effectively delivering information, ideas, or messages to an audience.The machinery and equipment developed from the application of scientific knowledge....

Superb Security Crossword Challenge 2020-05-07

Superb Security Crossword Challenge crossword puzzle
Across
  1. An unpatched laptop is … to an attack or how you feel when you finish watching “The Notebook”
  2. The highest level of privilege which can be exposed (Windows)
  3. Unlawful data exposure
  4. …..engineering refers to the method attackers use to manipulate people into sharing sensitive information
  5. Converts passwords to unreadable strings or a good way to prepare potatoes
  6. What makes your laptop/PC sick
  7. Cybersecurity is our shared...
  8. …..identifiable information is any data that could potentially identify a specific individual
  9. Bad junk emails
  10. European privacy law
  11. Bad for your laptop/PC, but helpful to aerate the garden
Down
  1. Everyone has these and they are unique to each person
  2. Malware that misleads users of its true intent, or a big wooden horse
  3. Technology that extends a private network across a public network
  4. Should contain a minimum of 9 characters using a combination of upper case letters, lower case letters, numbers, and special characters.
  5. A guy in a hoodie, in his mom’s basement, trying to access your personal data
  6. Tool for stealing credit cards
  7. Ransomware that affected NHS in 2017, or what you want to do when you realize you might have this malware
  8. A malicious program designed to record which keys are being pressed on a computer keyboard
  9. Don't click on….within emails from an unknown or untrusted source.

20 Clues: Bad junk emailsEuropean privacy lawUnlawful data exposureTool for stealing credit cardsWhat makes your laptop/PC sickCybersecurity is our shared...Everyone has these and they are unique to each personBad for your laptop/PC, but helpful to aerate the gardenThe highest level of privilege which can be exposed (Windows)...

FITE Vocab: Hailey Hobbs 2013-05-16

FITE Vocab: Hailey Hobbs crossword puzzle
Across
  1. to cite or quote a reference
  2. one thousand exabytes
  3. one million bytes
  4. close up preview of a template
  5. one thousand megabytes
  6. communications sent without wires or cables
  7. LCD
  8. eight bytes
  9. large circuit board
  10. symbol for a company
  11. computer software used to search data
  12. network name
  13. port that connects the mouse or keyboard to PC
  14. Ex: monitor, printer
  15. a thousand bytes
  16. appearence of a document
  17. plug your flashdrive into
  18. wireless home network
  19. wired internet
  20. one thousand brontobytes
Down
  1. zoomable presentation program
  2. arrangement of data for a computer
  3. a device that has a lot of data storage
  4. protection of information computer/networks
  5. one thousand gigabytes
  6. smallest unit of data
  7. one thousand petabytes
  8. computer screen
  9. anything you can create something on
  10. LAD
  11. search engine that checks all search engines
  12. Ex:comcast,verizon
  13. one thousand terabytes
  14. Ex: flash drive,earbuds
  15. one thousand zetabytes
  16. document or file made with a preset format
  17. personal conduct online
  18. rules to keep people safe online
  19. any type of internet hosting service
  20. ceremonial induction into office
  21. Ex: mouse, flash drive
  22. one thousand yottabytes
  23. a short memorable phrase for advertising
  24. a way to save a file in adobe
  25. Ex: headphones, speakers

45 Clues: LADLCDeight bytesnetwork namewired internetcomputer screena thousand bytesone million bytesEx:comcast,verizonlarge circuit boardsymbol for a companyEx: monitor, printerone thousand exabytessmallest unit of datawireless home networkone thousand gigabytesone thousand petabytesone thousand megabytesone thousand terabytesone thousand zetabytes...

The 2023 Learning & Development Crossword 2023-11-28

The 2023 Learning & Development Crossword crossword puzzle
Across
  1. How you prioritize personal and professional activities in your life.
  2. A human-centered approach to problem solving.
  3. measures your ability to identify, understand, and manage your emotions and the emotions of others.
  4. Communication that is delivered by way of visual aids.
  5. type of malware attack used by thieves to kidnap your data or files and hold them hostage until you pay them a ransom.
  6. The established set of attitudes held by someone.
  7. Acting in a way that makes others view you as trustworthy, respectful, accountable competent, and effective.
  8. Communication that takes the form of anything you write or type.
  9. A more senior, successful, or skilled professional who regularly provides guidance and gives you advice based on their own experience and expertise.
  10. measures someone's ability to adapt.
Down
  1. Exploratory, spontaneous, and unrestricted.
  2. Brings your attention to the here and now.
  3. Computer systems that can learn and adapt without direct human intervention.
  4. Initiation, planning, execution, and closure.
  5. the art of protecting networks, devices, and data from unauthorized access
  6. efficiently accomplishing tasks that bring you closer to your goals
  7. Communication that uses spoken word or language.
  8. Capability of a machine to imitate intelligent human behavior through automation of various types of tasks.
  9. Method of trying to gather personal information using deceptive e-mails and websites.
  10. Communication that includes facial expressions, posture, eye contact, etc.

20 Clues: measures someone's ability to adapt.Brings your attention to the here and now.Exploratory, spontaneous, and unrestricted.A human-centered approach to problem solving.Initiation, planning, execution, and closure.Communication that uses spoken word or language.The established set of attitudes held by someone....

informatika 2025-04-10

informatika crossword puzzle
Across
  1. Profesi yang bertugas mengelola basis data
  2. Salah satu bentuk karya yang dilindungi hak cipta
  3. Kata yang digunakan untuk mencari situs tertentu di Google adalah
  4. Salah satu unsur budaya yang bisa dikemas dalam bentuk konten digital seperti tarian
  5. Proses mengecek kebenaran konten disebut
  6. Media yang digunakan untuk menyebarkan konten video budaya secara luas
  7. Orang yang merancang dan membangun perangkat lunak
  8. Lembaga yang bertugas menyaring konten internet di Indonesia
  9. Konten budaya daerah bisa memperkenalkan lokal ke dunia
  10. Hak atas penemuan atau inovasi teknologi disebut
  11. intelektual Hak cipta termasuk bagian dari
  12. Kata kunci untuk mencari semua kata dalam satu hasil pencarian adalah
  13. Hasil pencarian umumnya ditampilkan dalam bentuk daftar yang seringkali diurutkan menurut tingkat akurasi ataupun rasio pengunjung atas suatu berkas yang disebut
  14. Teknik untuk mengidentifikasi informasi palsu di internet
  15. Profesi yang fokus pada keamanan jaringan dan data
Down
  1. Kegiatan mengirimkan atau menyebarluaskan konten disebut juga
  2. Lembaga yang mengatur HAKI di Indonesia
  3. Profesi yang membuat tampilan antarmuka aplikasi atau web
  4. Salah satu mesin pencari pertama yang sekarang berkembang menjadi usaha komersial yang cukup besar adalah
  5. Salah satu jenis konten negatif yang menyebarkan kebencian
  6. Konten yang bersifat merugikan atau menyesatkan
  7. Search engine paling populer di dunia saat ini adalah
  8. Istilah lain untuk ahli komputer
  9. Singkatan dari hak yang melindungi hasil karya cipta
  10. Proses membuat konten digital disebut sebagai

25 Clues: Istilah lain untuk ahli komputerLembaga yang mengatur HAKI di IndonesiaProses mengecek kebenaran konten disebutProfesi yang bertugas mengelola basis dataintelektual Hak cipta termasuk bagian dariProses membuat konten digital disebut sebagaiKonten yang bersifat merugikan atau menyesatkanHak atas penemuan atau inovasi teknologi disebut...

Cruci Distretto 2025-03-03

Cruci Distretto crossword puzzle
Across
  1. - Sistema di protezione delle reti da accessi non autorizzati.
  2. - Insieme di regole per la comunicazione tra dispositivi.
  3. - Intelligenza artificiale, sistema che simula l'intelligenza umana.
  4. COMPUTING - Utilizzo di risorse e servizi tramite Internet.
  5. - Linguaggio di programmazione orientato agli oggetti.
  6. - Creazione di versioni virtuali di risorse hardware e software.
  7. DATA - Raccolta e analisi di grandi volumi di dati.
  8. - Automazione dei processi tramite software robot.
  9. - Protezione dei dati da accessi non autorizzati.
  10. - Computer che fornisce servizi o risorse a client.
  11. - Processo di creazione e miglioramento di software.
  12. - Sistema operativo open source.
  13. - Processo di protezione dei dati tramite codifica.
Down
  1. - Tecnologie di identificazione basate su caratteristiche fisiche.
  2. - Tecnologia di registrazione distribuita, usata in criptovalute.
  3. - Modello di computing che offre risorse tramite internet.
  4. SCRIPT - Linguaggio di programmazione per creare interattività nelle pagine web.
  5. LEARNING - Sottocategoria dell'AI che permette ai sistemi di apprendere dai dati.
  6. - Dispositivo che instrada pacchetti di dati tra reti.
  7. - Sistema per organizzare e archiviare dati.
  8. - Interfaccia di programmazione per la comunicazione tra software.
  9. - Processi logici per risolvere problemi informatici.
  10. - Pratiche e tecnologie per proteggere i sistemi informatici.
  11. - Sequenza di operazioni per risolvere un problema.
  12. - Linguaggio di markup per la creazione di pagine web.
  13. - Indirizzo numerico univoco di un dispositivo in una rete.
  14. - Processo di individuazione e correzione degli errori nel codice.
  15. - Tecnologia per creare una rete privata sicura su internet.
  16. - Dispositivo che riceve servizi da un server.
  17. - Linguaggio usato per stilizzare le pagine web.

30 Clues: - Sistema operativo open source.- Sistema per organizzare e archiviare dati.- Dispositivo che riceve servizi da un server.- Linguaggio usato per stilizzare le pagine web.- Protezione dei dati da accessi non autorizzati.- Automazione dei processi tramite software robot.- Sequenza di operazioni per risolvere un problema....

TEKA-TEKI SILANG INFORMATIKA BAB 1-3 2025-06-04

TEKA-TEKI SILANG INFORMATIKA BAB 1-3 crossword puzzle
Across
  1. Istilah untuk keamanan jaringan komputer dari serangan.
  2. Alat yang digunakan untuk mengoutput data ke layar.
  3. Jenis perangkat keras yang digunakan untuk menyimpan data cadangan.
  4. Alat yang digunakan untuk mengontrol komputer.
  5. Alat yang digunakan untuk memperluas jaringan Wi-Fi ke area yang lebih luas
  6. Istilah untuk sistem operasi komputer.
  7. Alat yang digunakan untuk mencetak dokumen.
  8. Alat yang digunakan untuk menginput data tulisan tangan.
  9. Istilah untuk sistem komputer yang terintegrasi.
  10. Jenis perangkat lunak yang digunakan untuk mengedit video.
  11. Istilah untuk pengiriman data melalui internet.
Down
  1. Jenis perangkat keras yang digunakan untuk memproses data.
  2. Istilah untuk sistem operasi mobile.
  3. Alat yang digunakan untuk mengontrol jaringan komputer.
  4. Istilah untuk jaringan komputer yang luas.
  5. Jenis perangkat keras yang digunakan untuk menyimpan data.
  6. Alat yang digunakan untuk menginput data suara.
  7. Alat yang digunakan untuk mengakses data dari jarak jauh.
  8. Istilah untuk jaringan komputer yang menggunakan teknologi wireless.
  9. Alat yang digunakan untuk mengakses internet.
  10. Jenis perangkat lunak yang digunakan untuk mengolah presentasi.
  11. Istilah untuk pengumpulan data.
  12. Istilah untuk keamanan data.
  13. Alat yang digunakan untuk menginput data ke komputer.
  14. Jenis perangkat lunak yang digunakan untuk mengedit gambar.
  15. Alat yang digunakan untuk menyimpan data sementara.
  16. Bahasa pemrograman yang digunakan untuk membuat website.
  17. Istilah untuk pengiriman data melalui jaringan.
  18. Jenis perangkat lunak yang digunakan untuk mengolah angka.
  19. Istilah untuk jaringan
  20. Istilah untuk keamanan jaringan komputer.

31 Clues: Istilah untuk jaringanIstilah untuk keamanan data.Istilah untuk pengumpulan data.Istilah untuk sistem operasi mobile.Istilah untuk sistem operasi komputer.Istilah untuk keamanan jaringan komputer.Istilah untuk jaringan komputer yang luas.Alat yang digunakan untuk mencetak dokumen.Alat yang digunakan untuk mengakses internet....

FITCVocab.hj 2013-05-15

FITCVocab.hj crossword puzzle
Across
  1. 1000 megabytes
  2. primary circuit board
  3. EX: Google
  4. mouse with ball
  5. how you act online
  6. what ISP stands for
  7. peripheral you drag across a flat surface
  8. program stored an internet server
  9. pocket sized computing device
  10. 1000 gigabytes
  11. catch phrase
  12. behavior to keep you safe online
  13. "mouse" for laptops
  14. one page document about your life
  15. front of the program
  16. what cpu stands for
  17. abbreviation for document
  18. predesigned document
  19. the oath the president has to say during inauguration
  20. mouse with laser
  21. protection of information on the internet
  22. file format that can be viewed on any computer
  23. 1000 bytes
  24. 1000 kilobytes
Down
  1. selection of editing tools
  2. no wire
  3. device that sends and receives signals
  4. ports where you put flash-drives
  5. wireless fidelity
  6. internet and online
  7. search engine that searches other search engines
  8. what ram stands for
  9. service set identification
  10. smallest piece of information
  11. what SSID stands for
  12. serves information to other computers on a network
  13. piece of written matter
  14. what rtf stands for
  15. graphic symbol for a company
  16. 8 bits
  17. one canvas you can put anything on
  18. able to occur together without conflict
  19. computer screen
  20. where you put headphones
  21. long term memory

45 Clues: 8 bitsno wireEX: Google1000 bytescatch phrase1000 megabytes1000 gigabytes1000 kilobytesmouse with ballcomputer screenlong term memorymouse with laserwireless fidelityhow you act onlineinternet and onlinewhat ram stands forwhat ISP stands forwhat rtf stands for"mouse" for laptopswhat cpu stands forwhat SSID stands forfront of the program...

E BLOCK TECH Michael Rizza 2013-05-16

E BLOCK TECH Michael Rizza crossword puzzle
Across
  1. a little bit more memory then a byte
  2. Geting increased in you group
  3. the hardware that is in you keyboard
  4. the way you arrange your file
  5. The lowest storage unit
  6. how you act online
  7. The ability of putting something into something else
  8. a more advanced search engine
  9. Without wires
  10. Your sybol for you company
  11. National Cyber Security Alliance
  12. wired internet
  13. Copying someone elses item
  14. Screen
  15. A typed document
  16. an oath that the president has to say
  17. The ability of taking something out of something else
  18. Liquid crystal display
  19. Photo file
  20. zoomable online presitation program
  21. A typed document of your skills
Down
  1. Claiming something yours
  2. memory storage
  3. your saying for your company
  4. the act of being secure online
  5. the heart of the computer
  6. Wireless Internet
  7. Security online
  8. How you edit your format
  9. Display Unit
  10. a small box that shows you how your document looks
  11. A searching website
  12. Random memory
  13. comcast
  14. what font,text size,bold,etc.
  15. Internet
  16. Largest unit of data
  17. TB
  18. the wiring in your computer
  19. A piece of folded paper that advertises something
  20. the theme you pick for you document
  21. to startup something
  22. a file that stores music
  23. Operating system
  24. A peripheral that controls your mouse

45 Clues: TBScreencomcastInternetPhoto fileDisplay UnitRandom memoryWithout wiresmemory storagewired internetSecurity onlineA typed documentOperating systemWireless Internethow you act onlineA searching websiteLargest unit of datato startup somethingLiquid crystal displayThe lowest storage unitClaiming something yoursHow you edit your format...

Vocabulary Unit 5-10 2023-09-03

Vocabulary Unit 5-10 crossword puzzle
Across
  1. Reliability
  2. Rapid increase in numbers
  3. the use of exciting or shocking stories or language at the expense of accuracy, in order to provoke public interest or excitement.
  4. tendency to believe things too quickly or easily
  5. A precise sequence of instructions for processes that can be executed by a computer
  6. a practical joke; a trick
  7. Honesty
  8. Our love affair with technology; enthusiasm for technology
  9. Having to do with morals, values, right and wrong
  10. To ban or cover some of the information
  11. An improvement of an existing technological product, system, or method of doing something.
  12. A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually
  13. A technique that is used to make a process automatic.
Down
  1. Incorporating misleading information into one's memory of an event
  2. not supported or proven by evidence
  3. Protection of computer systems, networks, and data from digital attacks.
  4. A new idea, method, or device
  5. having or revealing keen insight and good judgment
  6. A technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
  7. working the body harder than it is normally worked
  8. the quality of being believable or trustworthy
  9. the use of digital technologies to change a business model and provide new revenue or value
  10. Willingness to take credit and blame for actions.
  11. the right of people not to reveal information about themselves

24 Clues: HonestyReliabilityRapid increase in numbersa practical joke; a trickA new idea, method, or devicenot supported or proven by evidenceTo ban or cover some of the informationthe quality of being believable or trustworthytendency to believe things too quickly or easilyHaving to do with morals, values, right and wrong...

it 2024-10-07

it crossword puzzle
Across
  1. / Provides tech support to end-users.
  2. / Manages and processes health data through technology.
  3. / Designs and develops computer hardware.
  4. / Creates animations for various media formats.
  5. / Writes and tests code for software applications.
  6. / Manages cloud computing services.
  7. / Provides hardware and software support.
  8. / Protects systems and data from cyber threats.
  9. / Leads and oversees an organization’s IT strategy.
  10. / Assesses the security and reliability of IT systems.
  11. / Finds and hires IT professionals for companies.
  12. / Interprets data to help businesses make decisions.
  13. / Conducts investigations to advance IT knowledge.
  14. / Designs and manages complex database systems.
  15. / Manages and maintains websites.
  16. / Tests software for bugs and performance issues.
Down
  1. / Tests systems for vulnerabilities, ethically.
  2. / Designs the user interface of digital products.
  3. / Creates apps for various platforms.
  4. / Manages and maintains computer networks.
  5. / Builds and develops software programs.
  6. / Designs and builds communication networks.
  7. / Improves user experience in products or services.
  8. / Analyzes and resolves tech issues for companies.
  9. / Handles and processes large datasets.
  10. / Manages and coordinates IT services.
  11. / Studies the theoretical foundations of computing.
  12. / Designs and creates websites.
  13. / Plans and implements computer networks.
  14. / Analyzes complex data to gain insights.
  15. / Develops, tests, and maintains software.
  16. / Examines and improves information systems.
  17. / Designs and implements systems for business operations.
  18. / Specializes in securing communications through encryption.

34 Clues: / Designs and creates websites./ Manages and maintains websites./ Manages cloud computing services./ Provides tech support to end-users./ Creates apps for various platforms./ Manages and coordinates IT services./ Handles and processes large datasets./ Builds and develops software programs./ Designs and develops computer hardware....

terms 2023-02-15

terms crossword puzzle
Across
  1. identity theft
  2. exclusive rights
  3. a way to change the flow of the code
  4. a loop to repeat code a fixed number of times
  5. the programs that can be ran on a computer
  6. a problem when using a while loop where you forget one action at the beginning or end
  7. a world or karel word is a grid where karel lives
  8. code you put inside an if statement or while-loop
  9. the physical components of a computer
  10. a computer security specialist
  11. attempt to find computer security vulnerabilities for personal financial gain
  12. teaching new commands to karel
Down
  1. protection of computers
  2. the version that already knows how to turn right and turn around
  3. lets us repeat code as long as somethings true
  4. a device that makes calculations
  5. network of physical devices
  6. lets you ask a question to the program and only run code if its true
  7. saying the function
  8. the part of the funtion that contains the commands
  9. bullying online
  10. a command is an instruction you can give karel
  11. a way to repeat code
  12. a naming convention where the first letter is lowercase
  13. not subject to copyright
  14. threatens to publish data
  15. control structure that lets us do either one section of code or another depending on a test
  16. using charts
  17. managing complexity by abstracting away information and detail

29 Clues: using chartsidentity theftbullying onlineexclusive rightssaying the functiona way to repeat codeprotection of computersnot subject to copyrightthreatens to publish datanetwork of physical devicesa computer security specialistteaching new commands to karela device that makes calculationsa way to change the flow of the code...

Globalisasi dan masyarakat digital 2024-10-24

Globalisasi dan masyarakat digital crossword puzzle
Across
  1. Apa istilah untuk transaksi jual-beli barang atau jasa yang dilakukan melalui internet
  2. fenomena ketika budaya lokal terpengaruh budaya asing
  3. Perpindahan massal penduduk dari desa ke kota besar disebut
  4. jaringan global yang menghubungkan komputer dan perangkat di seluruh dunia
  5. Kelompok penentang globalisasi menganggap perdagangan bebas terkait dengan kapitalisme, menjadi tantangan di bidang
  6. Globalisasi menghilangkan hambatan perdagangan antarnegara, menciptakan kesejahteraan. Ini pandangan globalisasi bagi kelompok masyarakat
  7. Sistem ekonomi di mana pasar bebas menentukan produksi dan harga barang tanpa intervensi negara
  8. Proses integrasi ekonomi, budaya, dan teknologi di seluruh dunia yang mempengaruhi cara masyarakat berinteraksi disebut
  9. Tindakan kejahatan dengan mencuri informasi pribadi di internet disebut
  10. Istilah untuk pengaruh budaya asing yang diadopsi dan mengubah gaya hidup masyarakat lokal
Down
  1. Apa istilah untuk penyebaran produk, merek, dan tren yang sama di berbagai negara
  2. Perubahan perilaku masyarakat akibat kemajuan teknologi disebut
  3. Jenis keamanan yang melindungi data dan informasi pribadi di dunia maya
  4. Masyarakat yang terhubung secara global melalui teknologi informasi disebut
  5. Apa istilah untuk perusahaan yang memiliki cabang dan beroperasi di berbagai negara
  6. Berkembangnya internet mempermudah akses informasi bagi masyarakat di seluruh dunia. Hal ini merupakan dampak globalisasi di bidang
  7. Fenomena masuknya tenaga kerja asing yang bisa mengancam pekerjaan lokal disebut
  8. Salah satu risiko yang dihadapi dalam masyarakat
  9. proses berbagi informasi dan ide melalui media sosial
  10. Fenomena penyebaran informasi palsu atau menyesatkan melalui internet disebut

20 Clues: Salah satu risiko yang dihadapi dalam masyarakatfenomena ketika budaya lokal terpengaruh budaya asingproses berbagi informasi dan ide melalui media sosialPerpindahan massal penduduk dari desa ke kota besar disebutPerubahan perilaku masyarakat akibat kemajuan teknologi disebutJenis keamanan yang melindungi data dan informasi pribadi di dunia maya...

TEKA-TEKI INFORMATIKA BAB 1-3 2025-06-04

TEKA-TEKI INFORMATIKA BAB 1-3 crossword puzzle
Across
  1. Istilah untuk keamanan jaringan komputer dari serangan.
  2. Alat yang digunakan untuk mengoutput data ke layar.
  3. Jenis perangkat keras yang digunakan untuk menyimpan data cadangan.
  4. Alat yang digunakan untuk mengontrol komputer.
  5. Alat yang digunakan untuk memperluas jaringan Wi-Fi ke area yang lebih luas
  6. Istilah untuk sistem operasi komputer.
  7. Alat yang digunakan untuk mencetak dokumen.
  8. Alat yang digunakan untuk menginput data tulisan tangan.
  9. Istilah untuk sistem komputer yang terintegrasi.
  10. Jenis perangkat lunak yang digunakan untuk mengedit video.
  11. Istilah untuk pengiriman data melalui internet.
Down
  1. Jenis perangkat keras yang digunakan untuk memproses data.
  2. Istilah untuk sistem operasi mobile.
  3. Alat yang digunakan untuk mengontrol jaringan komputer.
  4. Istilah untuk jaringan komputer yang luas.
  5. Jenis perangkat keras yang digunakan untuk menyimpan data.
  6. Alat yang digunakan untuk menginput data suara.
  7. Alat yang digunakan untuk mengakses data dari jarak jauh.
  8. Istilah untuk jaringan komputer yang menggunakan teknologi wireless.
  9. Alat yang digunakan untuk mengakses internet.
  10. Jenis perangkat lunak yang digunakan untuk mengolah presentasi.
  11. Istilah untuk pengumpulan data.
  12. Istilah untuk keamanan data.
  13. Alat yang digunakan untuk menginput data ke komputer.
  14. Jenis perangkat lunak yang digunakan untuk mengedit gambar.
  15. Alat yang digunakan untuk menyimpan data sementara.
  16. Bahasa pemrograman yang digunakan untuk membuat website.
  17. Istilah untuk pengiriman data melalui jaringan.
  18. Jenis perangkat lunak yang digunakan untuk mengolah angka.
  19. Istilah untuk jaringan
  20. Istilah untuk keamanan jaringan komputer.

31 Clues: Istilah untuk jaringanIstilah untuk keamanan data.Istilah untuk pengumpulan data.Istilah untuk sistem operasi mobile.Istilah untuk sistem operasi komputer.Istilah untuk keamanan jaringan komputer.Istilah untuk jaringan komputer yang luas.Alat yang digunakan untuk mencetak dokumen.Alat yang digunakan untuk mengakses internet....

tugas daring kelas 10i-Moch Bagas Dwi Ramadhan(22) 2025-04-17

tugas daring kelas 10i-Moch Bagas Dwi Ramadhan(22) crossword puzzle
Across
  1. Hak atas penemuan baru di bidang teknologi atau produk.
  2. Operator pencarian yang digunakan untuk mencari kata-kata yang tepat dalam tanda kutip.
  3. Profesi yang bertanggung jawab atas keamanan data dan jaringan.
  4. Bentuk konten digital yang menampilkan narasi sejarah atau budaya daerah dalam format audio.
  5. Platform populer untuk menyebarkan konten budaya secara luas melalui video.
  6. Hak atas merek dagang, logo, atau simbol suatu produk.
  7. Orang yang membuat tampilan antarmuka pengguna aplikasi.
  8. Mesin pencari paling populer di dunia.
  9. Orang yang membuat tampilan antarmuka pengguna aplikasi.
  10. Hak eksklusif atas karya tulis, musik, atau karya seni lainnya.
  11. Proses membuat konten digital yang berisi cerita, gambar, atau video budaya lokal.
Down
  1. Konten yang berisi informasi palsu dan sengaja disebarkan untuk menipu.
  2. Proses mengklasifikasikan konten berdasarkan tingkat bahaya atau pelanggaran.
  3. Profesi yang mengelola dan memelihara jaringan komputer.
  4. Pihak atau sistem yang melakukan pengecekan terhadap kebenaran sebuah konten.
  5. pembuatan konten digital yang mengangkat unsur budaya lokal seperti makanan khas atau pakaian adat.
  6. Lembaga di Indonesia yang mengurus pendaftaran HAKI.
  7. Kata kunci yang digunakan untuk mencari halaman yang berisi link ke situs tertentu.
  8. Jenis HAKI yang melindungi desain suatu produk industri.
  9. Profesi yang menganalisis data untuk membantu pengambilan keputusan.
  10. Proses memastikan bahwa informasi yang disebarkan tidak mengandung unsur hoaks atau fitnah.
  11. Syntax pencarian untuk mengecualikan kata tertentu dari hasil pencarian.
  12. Jenis konten yang dapat merugikan, menyesatkan, atau membahayakan pengguna.
  13. Singkatan dari teknik mengoptimalkan situs agar mudah ditemukan di mesin pencari.

24 Clues: Mesin pencari paling populer di dunia.Lembaga di Indonesia yang mengurus pendaftaran HAKI.Hak atas merek dagang, logo, atau simbol suatu produk.Hak atas penemuan baru di bidang teknologi atau produk.Profesi yang mengelola dan memelihara jaringan komputer.Jenis HAKI yang melindungi desain suatu produk industri....

TEKA-TEKI SILANG INFORMATIKA KELAS IX (2) 2024-11-05

TEKA-TEKI SILANG INFORMATIKA KELAS IX (2) crossword puzzle
Across
  1. Tanda pagar (#) yang digunakan untuk mengategorikan postingan di media sosial
  2. Tombol yang digunakan untuk menyukai atau memberikan tanda setuju pada suatu postingan
  3. Video blog, seringkali berisi konten pribadi atau tutorial
  4. Aplikasi yang digunakan untuk membuat presentasi dengan slide
  5. Situs web pribadi yang berisi tulisan-tulisan atau artikel secara teratur
  6. Program komputer yang digunakan untuk membuat dokumen seperti surat atau laporan
  7. Jaringan sosial yang fokus pada berbagi foto dan video singkat
  8. Praktik untuk melindungi sistem teknologi dan data dari ancaman digital, seperti kejahatan siber
  9. Format file dokumen yang umum digunakan (singkatan)
Down
  1. perangkat keras yang digunakan untuk mengontrol kursor di layar komputer
  2. Surat elektronik atau electronic mail yang merupakan cara untuk mengirim dan menerima pesan secara digital melalui jaringan internet
  3. Orang yang membuat dan mengunggah video ke YouTube atau platform serupa
  4. kegiatan yang dilakukan untuk mendapatkan akses tidak sah ke sistem atau jaringan komputer
  5. Program pengolah lembar kerja untuk mengelola data dalam bentuk tabel
  6. Platform online yang memungkinkan pengguna untuk berbagi informasi dan berinteraksi dengan orang lain
  7. Platform online yang memungkinkan pengguna untuk berkolaborasi pada dokumen secara bersamaan
  8. Orang yang membuat dan mengelola sebuah blog
  9. Platform berbagi video terbesar di dunia
  10. Bahasa pemrograman visual yang dirancang untuk membantu anak-anak dan pemula belajar pemrograman
  11. perangkat keras yang berfungsi untuk menampilkan data visual dari komputer, seperti gambar, teks, video, dan grafik

20 Clues: Platform berbagi video terbesar di duniaOrang yang membuat dan mengelola sebuah blogFormat file dokumen yang umum digunakan (singkatan)Video blog, seringkali berisi konten pribadi atau tutorialAplikasi yang digunakan untuk membuat presentasi dengan slideJaringan sosial yang fokus pada berbagi foto dan video singkat...

Information and Communication Technology 2023-02-23

Information and Communication Technology crossword puzzle
Across
  1. - The practice of protecting computer systems and networks from digital attacks.
  2. - A security system that monitors and controls incoming and outgoing network traffic.
  3. - Programs and applications that run on a computer or mobile device.
  4. - Software designed to harm computer systems or steal data.
  5. system - The software that manages a computer's basic functions, such as memory and file systems.
  6. computing - A model for delivering computing resources over the internet.
  7. - An input device used for moving the cursor on a computer screen.
  8. - A device used for processing data and running programs.
  9. - The process of designing and writing code for software applications.
  10. - An output device that prints text and images on paper.
Down
  1. - An input device used for typing text and commands.
  2. - A type of malicious software that can damage or disrupt computer systems.
  3. - A structured collection of data that is stored and organized in a computer.
  4. - A global network of interconnected computer networks.
  5. - A device that connects multiple devices to a network and directs traffic between them.
  6. - A device that connects a computer to the internet.
  7. - The process of converting data into a code to prevent unauthorized access.
  8. - The physical components of a computer system, such as the CPU, hard drive, and motherboard.
  9. - A step-by-step procedure for solving a problem or accomplishing a task.
  10. - An output device that displays images and text.

20 Clues: - An output device that displays images and text.- An input device used for typing text and commands.- A device that connects a computer to the internet.- A global network of interconnected computer networks.- An output device that prints text and images on paper.- A device used for processing data and running programs....

Safety Crossword Challenge 2022-05-04

Safety Crossword Challenge crossword puzzle
Across
  1. practice runs for tornado and fire
  2. name of our MTA Safety Trainer (2 words)
  3. protect your noggin' with this (2 words)
  4. appendix F in the ERP includes locations of this (2 words)
  5. it is your ______ to work safely and report hazards
  6. do not do this to fire extinguisher locations
  7. creating a good fit between an employee and what they do is the main concept of this
  8. two types of CPR, traditional with breaths and ___ (2 words)
  9. virus caused by mosquitoes (2 words)
  10. overloading this warehouse equipment can be very dangerous
Down
  1. this hazard can be truly shocking
  2. occurs when you use or lose more fluid than you take in
  3. safety data sheet section number for Fire Fighting Measures
  4. where you can access PR safety manual, ERP, and safety data sheets easily
  5. practice of protecting systems, networks and programs from digital attacks
  6. what to do should you catch on fire (3 words)
  7. member of PR's safety committee who reports to duty at all 3 locations (2 words)
  8. in sunscreen, what the F stands for in SPF
  9. a document you refer to if you have been exposed to a hazardous chemical (abbreviated)
  10. the first S in the acronym PASS stands for
  11. announce this if activating paging system for active shooter (two words)
  12. disease caused by deer ticks

22 Clues: disease caused by deer ticksthis hazard can be truly shockingpractice runs for tornado and firevirus caused by mosquitoes (2 words)name of our MTA Safety Trainer (2 words)protect your noggin' with this (2 words)in sunscreen, what the F stands for in SPFthe first S in the acronym PASS stands forwhat to do should you catch on fire (3 words)...

Information and Technology Crossword 2023-10-25

Information and Technology Crossword crossword puzzle
Across
  1. How reliable a source is for facts and truth
  2. well known electric car company founded by Elon Musk
  3. where either humans take over or the car itself hand over to the driver Generated roughly one
  4. protection of all an organizations’ important info including human speech against unauthorized access
  5. The company that created voter profiles out of Facebook users’ data
  6. Attempt to acquire sensitive data through a fraudulent solicitation in an email or website posing as reputable site
  7. The process of determining the meanings behind patterns, and finding ways to integrate them into certain programs
  8. self-driving vehicles
  9. What percent of high schoolers realized that a seemingly credible website on climate change was run by the fossil fuel industry
  10. The process of revealing patterns from sets of information gathered from users of certain programs
Down
  1. Fake information
  2. the approach that people attempt the trolly problem
  3. deliberate attempt to breach the info of a system of an individual or organization
  4. Something that can be determined through the use of many social media platforms
  5. technology or practice for preventing cyber attacks
  6. crash a server with traffic
  7. verifiable source
  8. The process of scrubbing useless data from large datasets
  9. where both the driver and the car jointly produces driving
  10. News Slang for false information spread by certain sources

20 Clues: Fake informationverifiable sourceself-driving vehiclescrash a server with trafficHow reliable a source is for facts and truththe approach that people attempt the trolly problemtechnology or practice for preventing cyber attackswell known electric car company founded by Elon MuskThe process of scrubbing useless data from large datasets...

Digital technologies 2025-05-01

Digital technologies crossword puzzle
Across
  1. : The physical components of a computer
  2. : A model to replicate real-world processes
  3. : Practices to safeguard personal or sensitive information
  4. : Converting data into a secure format
  5. : Structured data organized for easy access and management
  6. : Use of computers to store, retrieve, and send data
  7. : Protection of computer systems from digital attacks
  8. : Fraudulent attempt to obtain sensitive information
  9. : The discovery and communication of meaningful patterns in data
  10. : Machines mimicking human intelligence
  11. : An open-source operating system
  12. : Extremely large data sets analyzed for insights
  13. : The process of leading the work of a team to achieve goals
  14. : Decentralized ledger technology
  15. : Interconnected components working together in computing
Down
  1. : Design of systems hosted on cloud infrastructure
  2. : Involving or relating to computer technology
  3. : Combines software development and IT operations
  4. : AI that enables systems to learn from data
  5. : Use of technology to perform tasks without human input
  6. : Legally breaking into systems to find vulnerabilities
  7. : A group of connected computers
  8. : Process of evaluating software functionality and performance
  9. : The process of identifying and removing errors in code
  10. : High-level language used for general-purpose programming
  11. : ERP module for financial management
  12. : Official recognition for completing a professional qualification
  13. : Officially recognized as having a certain qualification
  14. : A set of coded instructions a computer can understand
  15. : Microsoft tool used for data analysis and spreadsheets

30 Clues: : A group of connected computers: An open-source operating system: Decentralized ledger technology: ERP module for financial management: Converting data into a secure format: The physical components of a computer: Machines mimicking human intelligence: A model to replicate real-world processes: AI that enables systems to learn from data...

Cyber ethics 2025-06-09

Cyber ethics crossword puzzle
Across
  1. The act of pretending to be someone else online, often for malicious
  2. The ethical responsibility to acknowledge and respect the original creators of digital content.
  3. A deceptive act of trying to trick users into divulging personal information, often via email.
  4. The ethical concern regarding the collection, storage, and use of personal data online.
  5. The idea that individuals should have control over their personal information online.
  6. Unwanted or unsolicited email.
Down
  1. Respecting others' privacy and personal information online.
  2. The protection of computer systems from theft or damage to their hardware, software, or electronic data.
  3. A type of online harassment that involves repeatedly sending offensive messages.
  4. The principle of using digital resources responsibly and without harming others.
  5. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  6. The moral guidelines that dictate the appropriate and responsible use of technology.
  7. The principles and values that guide behavior in the digital world.
  8. An ethical principle that encourages fair and honest dealings in the digital realm.
  9. Unauthorized access to a computer system.
  10. The illegal copying, distribution, or use of copyrighted material.
  11. The act of spreading false or misleading information online, often with malicious intent.
  12. The ethical commitment to protect sensitive information from unauthorized access.
  13. An ethical principle emphasizing honesty and truthfulness in online interactions.
  14. Online behavior that is considered rude, offensive, or disruptive.

20 Clues: Unwanted or unsolicited email.Unauthorized access to a computer system.Respecting others' privacy and personal information online.The illegal copying, distribution, or use of copyrighted material.Online behavior that is considered rude, offensive, or disruptive.The principles and values that guide behavior in the digital world....

Malware 2022-12-06

Malware crossword puzzle
Across
  1. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  2. a computer program used to prevent, detect, and remove malware.
  3. malicious software designed to block access to a computer system until a sum of money is paid.
  4. records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
  1. the protection of computer systems and networks from attacks from malicious software.
  2. malware that misleads users of its true intent.
  3. the psychological manipulation of people into performing actions or giving out confidential information.
  4. can propagate or self-replicate from one computer to another without human activation after breaching a system.
  5. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

9 Clues: malware that misleads users of its true intent.a computer program used to prevent, detect, and remove malware.the protection of computer systems and networks from attacks from malicious software.malicious software designed to block access to a computer system until a sum of money is paid....

OA ISM SECURITY CROSSWORD 2023-08-24

OA ISM SECURITY CROSSWORD crossword puzzle
Across
  1. A person who attempts to gain unauthorized access to computer systems.
  2. The quality of data being accurate, consistent, and unaltered.
  3. The process of converting data into a code to prevent unauthorized access.
  4. A piece of code capable of self-replicating and causing damage to a computer system.
  5. Faking the source of data to appear as if it's coming from a trusted source.
  6. The state of keeping information private and only accessible to authorized parties.
  7. A network security device that monitors and controls incoming and outgoing traffic.
  8. Ensuring that computer systems and data are accessible when needed.
Down
  1. Software intended to harm or exploit computer systems and data.
  2. Measures taken to secure computer systems from threats and vulnerabilities.
  3. A type of cyber attack where fraudulent emails are used to deceive individuals into revealing sensitive information.
  4. (Virtual Private Network): A technology that provides secure and private connections over public networks.
  5. Malicious software that encrypts a user's data and demands payment to restore access.
  6. Software that collects information from a computer or network without the user's knowledge.
  7. Engineering: Manipulating individuals to divulge confidential information or perform actions unknowingly.
  8. A secret combination of characters used to access a system or data.
  9. The potential for loss or harm in the context of cybersecurity.

17 Clues: The quality of data being accurate, consistent, and unaltered.Software intended to harm or exploit computer systems and data.The potential for loss or harm in the context of cybersecurity.A secret combination of characters used to access a system or data.Ensuring that computer systems and data are accessible when needed....

Cybersecurity Fundamental Chapter 3 Part 2 2022-10-18

Cybersecurity Fundamental Chapter 3 Part 2 crossword puzzle
Across
  1. a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
  2. one man's trash is another man's treasure
  3. use short message service (sms) to send fake text messages
  4. attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
  5. application that behave in an annoying or undesirable manner.
  6. impersonation attack, and it takes advantage of a trusted relationship between two systems.
  7. criminal tags along with an authorized person to gain entry into a secured location.
Down
  1. looking over one's shoulder to get their pin or access code.
  2. an attacker requests personal information from a party in exchange for something like a gift.
  3. intercepting communication between computers to steal information crossing the network.
  4. action of pretending to be someone else
  5. non-technical means for a criminal to gather information on a target.
  6. involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
  7. examines all network traffic as it passes through their Network Interface Card (NIC).
  8. records or logs the keystrokes of the user of the system.

15 Clues: action of pretending to be someone elseone man's trash is another man's treasurerecords or logs the keystrokes of the user of the system.use short message service (sms) to send fake text messageslooking over one's shoulder to get their pin or access code.application that behave in an annoying or undesirable manner....

Technology and AI vocabulary 2024-05-29

Technology and AI vocabulary crossword puzzle
Across
  1. The science of making machines that can think like humans.
  2. A portable and wearable electronic device in form of a watch that can do things not related to showing the time.
  3. The practice of protecting systems, networks and programs from digital attacks.
  4. A machine that does tasks without the help of a person.
  5. A mobile electronic device that work as a computer but is small enough to fit in a person's hand.
  6. It is basically the Internet. More specifically, it is to all the things that you have remotely and unlimited access over the internet.
Down
  1. An electronic device that can store and process information.
  2. A person that has the ability to influence the behaviour or opinions of others.
  3. A flying robot that can be remotely controlled or fly autonomously.
  4. A set of steps used to solve a specific problem.
  5. A computer program that simulates and processes human conversation (either written or spoken), allowing humans to interact with digital devices as if they were communicating with a real person.
  6. A technology that allows devices to communicate with each other without cables.
  7. Small, portable personal computer.

13 Clues: Small, portable personal computer.A set of steps used to solve a specific problem.A machine that does tasks without the help of a person.The science of making machines that can think like humans.An electronic device that can store and process information.A flying robot that can be remotely controlled or fly autonomously....

Smart cities 2025-10-24

Smart cities crossword puzzle
Across
  1. shared travel services such as buses, trains, and trams available for public use
  2. the effort to ensure that all citizens can participate equally in digital and social opportunities
  3. a device that measures air quality and pollution levels in real time
  4. the practice of meeting current needs without compromising the ability of future generations to meet theirs
  5. electronic tools and systems that generate, store, or process data to enhance urban functions
  6. the protection of computer systems and networks from digital attacks or unauthorized access
  7. the integration of digital technology into transportation to improve efficiency and sustainability
Down
  1. a structured process for collecting, analyzing, and managing information in a smart city
  2. the design of systems and services that can be used easily by everyone, including people with disabilities
  3. a device that converts sunlight into electrical energy for sustainable power generation
  4. energy from sources that naturally replenish, such as solar, wind, or hydro power
  5. an urban area that uses digital technology and data to improve the quality of life for its citizens
  6. a device that monitors and records vehicle movement for traffic management and safety

13 Clues: a device that measures air quality and pollution levels in real timeshared travel services such as buses, trains, and trams available for public useenergy from sources that naturally replenish, such as solar, wind, or hydro powera device that monitors and records vehicle movement for traffic management and safety...

ciao6 2022-02-03

ciao6 crossword puzzle
Across
  1. : è un testo crittografato trasformato da testo non crittografato utilizzando un algoritmo di crittografia
  2. : truffa informatica effettuata inviando un'e-mail con il logo contraffatto di un istituto di credito, in cui si invita il destinatario a fornire dati riservati.
  3. :rappresenta la sicurezza informatica
Down
  1. : è l’espressione con cui ci si riferisce ai contenuti criptati e non liberamente accessibili collocati nelle darknet, reti oscure e “parallele” accessibili solo tramite configurazioni specifiche e specifiche autorizzazioni d’accesso.
  2. : testo in chiaro in inglese
  3. : è il processo di codifica delle informazioni
  4. : è la porzione del World Wide Web che è prontamente disponibile al grande pubblico e ricercabile con i motori di ricerca web standard

7 Clues: : testo in chiaro in inglese:rappresenta la sicurezza informatica: è il processo di codifica delle informazioni: è un testo crittografato trasformato da testo non crittografato utilizzando un algoritmo di crittografia...

crossword on words related to AI 2024-10-21

crossword on words related to AI crossword puzzle
Across
  1. The process of converting information into a code to prevent unauthorized access.
  2. Protection of internet-connected systems from cyberattacks
Down
  1. A pioneering network that laid the groundwork for the internet by connecting universities and research labs.
  2. Remote servers used to store data and run applications over the internet.

4 Clues: Protection of internet-connected systems from cyberattacksRemote servers used to store data and run applications over the internet.The process of converting information into a code to prevent unauthorized access.A pioneering network that laid the groundwork for the internet by connecting universities and research labs.

WHO Identifies Risk 2024-07-02

WHO Identifies Risk crossword puzzle
Across
  1. identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
  2. monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
Down
  1. identify risk systematically by using formal risk assessments, incident reports, and claim data
  2. contributes insights through patient feedback, complaints, and involvement in incident reporting systems
  3. identify risks through audits, inspections, and review of compliance w/ healthcare standards

5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standardsidentify risk systematically by using formal risk assessments, incident reports, and claim datacontributes insights through patient feedback, complaints, and involvement in incident reporting systems...

038 - Digital Literacy 2024-10-20

038 - Digital Literacy crossword puzzle
Across
  1. the practice of protecting systems, networks, and programs from digital attacks.
  2. a person who uses digital technology responsibly and effectively.
  3. the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
Down
  1. the trail of data you create while using the internet.
  2. the ability to use, understand, and create digital content safely and effectively.

5 Clues: the trail of data you create while using the internet.a person who uses digital technology responsibly and effectively.the practice of protecting systems, networks, and programs from digital attacks.the ability to use, understand, and create digital content safely and effectively....

Module 9 Participation | Cybersecurity Crossword Puzzle - Cian 2025-03-12

Module 9 Participation | Cybersecurity Crossword Puzzle - Cian crossword puzzle
Across
  1. – Remote storage accessed from internet
  2. - One billion bytes
  3. – Creates a private and secure connection
  4. – Protect from unauthorized access
  5. – Automated software performing tasks
  6. – Copies of data for recovery purposes
  7. – Entering credentials to access course
  8. – Individual who intrudes systems illegally
  9. - Faster storage uses flash memory
  10. - Two-Factor authentication app
  11. - short term memory for active tasks
Down
  1. – Little file that stores data on device
  2. – A bug that spreads between systems
  3. - Acesses code
  4. – Warning about potential security threats
  5. Authentication – Security method using two verification factors
  6. – Security update fixing vulnerabilities
  7. – A unit of digital information
  8. – Blocks unauthorized network access
  9. - Long term magnetic storage

20 Clues: - Acesses code- One billion bytes- Long term magnetic storage– A unit of digital information- Two-Factor authentication app– Protect from unauthorized access- Faster storage uses flash memory– A bug that spreads between systems– Blocks unauthorized network access- short term memory for active tasks– Automated software performing tasks...

The Ultimate Crossword Challenge: Places, Food & Cybersecurity 2025-09-24

The Ultimate Crossword Challenge: Places, Food & Cybersecurity crossword puzzle
Across
  1. A sweet, fizzy drink. (4 letters)
  2. The place in Kerala where you can see beautiful backwaters.
  3. A security policy that blocks all traffic by default and only permits what's necessary. (5 letters)
  4. A highly precise timing device used for network synchronization. (3 letters)
  5. The process of scrambling data to protect it. (11 letters)
  6. The broad term for protecting information and systems. (8 letters)
  7. The "V" in a secure tunnel. (7 letters)
  8. The term for prioritizing network traffic to guarantee performance. (3 letters)
  9. An authentication protocol that separates AAA functions and relies on TCP. (7 letters)
  10. A security method requiring two or more forms of verification for user login. (3 letters)
  11. The practice of Hacking the networks and privacy data. (10 letters)
  12. The management dashboard for the Nutanix platform. (5 letters)
  13. Abbreviation for Industrial Automation and Control Systems. (4 letters)
  14. A scam that tricks people into giving away personal information via email. (7 letters)
  15. This city in Uttar Pradesh is one of the oldest in the world.
  16. An unauthorized program that spies on your computer. (8 letters)
  17. A malicious software that replicates itself. (5 letters)
  18. An algorithmic-based protocol that automatically calculates optimal paths. (7 letters)
  19. A famous temple complex in Odisha with a chariot shape.
  20. A person who reports security vulnerabilities. (10 letters)
  21. The state in the northeast known for its beautiful tea plantations.
  22. A subnetting method that uses one size for all subnets, leading to potential waste. (5 letters)
  23. The main component of the Nutanix platform that virtualizes the storage and compute. (9 letters)
  24. A malicious program that records keystrokes on a user's device. (9 letters)
  25. A protocol that combines authentication and authorization, and uses UDP. (6 letters)
  26. The protocol used to synchronize network clocks over a packet-switched network. (3 letters)
  27. An acronym for an encrypted tunnel established across a public network. (3 letters)
  28. A Layer 2 service that emulates a bridged LAN across an IP/MPLS core. (4 letters)
  29. The company that operates the IACS. (5 letters)
  30. A traffic "gatekeeper" that uses algorithms to distribute requests to a backend pool. (12 letters)
  31. A network segment where data packets can "collide" with each other. (8 letters)
  32. A routing table that's isolated from others on a single router. (3 letters)
Down
  1. A company that provides components for an IACS. (8 letters)
  2. The place in Delhi where the Prime Minister addresses the nation.
  3. The highest peak in India, located in the Himalayas.
  4. The company that designs and builds the IACS. (10 letters)
  5. The famous rock fortress in Madhya Pradesh
  6. The technology that provides central orchestration and path selection across a WAN. (6 letters)
  7. A logical network segment where all devices receive the same broadcast messages. (14 letters)
  8. The coastal city famous for its Gateway and Bollywood.
  9. A sweet snack often found with a hole in the middle. (6 letters)
  10. A type of network attack that can overwhelm a server with traffic. (3 letters)
  11. A system that actively blocks or prevents malicious activity based on predefined rules. (3 letters)
  12. A cold, creamy dessert often served in a cone. (9 letters)
  13. Rajasthan's colorful capital.
  14. A wall that filters network traffic. (8 letters)
  15. A California city synonymous with next-generation firewalls that use App-ID. (8 letters)
  16. The opposite of a manually configured network path. (7 letters)
  17. The opposite of a uniform subnet mask. (8 letters)
  18. A person who gains unauthorized access to computer systems. (6 letters)
  19. A marble mausoleum.
  20. A popular topping for pizza, made from tomatoes. (5 letters)
  21. A networking device used by Cisco to connect different networks. (6 letters)
  22. A program that looks legitimate but is malicious. (6 letters)
  23. A router that operates at Layer 3 to forward data based on a short, fixed-length identifier. (4 letters)
  24. A security measure that prevents unauthorized devices from connecting to a switch port. (12 letters)
  25. A series of characters used to verify a user's identity. (8 letters)
  26. A converged network architecture for industrial automation, a joint standard by Rockwell and Cisco. (13 letters)
  27. The network layer responsible for IP addressing. (7 letters)
  28. A subnetting method that allows for different subnet sizes to conserve IP addresses. (4 letters)

60 Clues: A marble mausoleum.Rajasthan's colorful capital.A sweet, fizzy drink. (4 letters)The "V" in a secure tunnel. (7 letters)The famous rock fortress in Madhya PradeshThe company that operates the IACS. (5 letters)A wall that filters network traffic. (8 letters)The opposite of a uniform subnet mask. (8 letters)...

MIC Quiz 2 2023-04-25

MIC Quiz 2 crossword puzzle
Across
  1. A community for Black-identifying employees at Cisco to cultivate career growth, community involvement, and business excellence.
  2. A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
  3. A community for employees who have been touched by Alzheimer’s disease to help bring awareness and raise funds for research.
  4. A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
  5. A community for LatinX-identifying employees to experience personal and professional growth through inspirational leadership, coaching, and giving back.
  6. A community for Cisconians to learn about different faith systems and advocate for policy that’s sensitive to the needs of people with faith.
  7. A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
  8. A community for those who have been affected by diabetes to find support through education, resources, and raising funds for valuable research.
  9. A community that connects diverse aspiring inventors who identify as women at Cisco with experienced patent holders through a mentoring process.
  10. A community for employees seeking resources and events that will help them develop more mindful and resilient habits.
  11. A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
  12. A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
  13. A community for technical employees who identify as women to create a positive impact in the lives of women and girls in STEM fields.
  14. A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
Down
  1. A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
  2. A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
  3. A community for Filipino-identifying employees to pursue professional development, mentoring, and help attract and retain Filipino talent at Cisco.
  4. A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
  5. A community where Pan-Asian-identifying employees come together to amplify cultural pride, advocate for Pan-Asian talent, and propel social justice.
  6. A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
  7. A community open to all Cisco employees who want to connect and help foster an inclusive culture.
  8. A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
  9. A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
  10. A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.

24 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture.A community for Cisco’s new and early-in-career talent to come together, network, and share resources.A community for Cisco employees who are caregivers to adults to share experiences, advice, and support....

RI&S BD&S Crossword Puzzle 2021-03-30

RI&S BD&S Crossword Puzzle crossword puzzle
Across
  1. Common word in USGIS, GS&S and S3
  2. Any ______. Any challenge.
  3. "Formal agreement" + "car"
  4. The future of ______ and defense.
  5. "&" formal name for the symbol
  6. Last name of former VP of BD&S
  7. DE&I motto
  8. "light from the gods"
  9. "the second" in spanish
  10. Advanced _______ & Technology
  11. An RI&S strategic imperative: Secure market _______
  12. Global Solutions & ______
  13. Challenge ________
  14. The R in ISRS
  15. Enterprise Raytheon _______ Manager
  16. The opposite words of mechanical peacetime haphazards
  17. Common word in CAMS, EWS and ISRS
Down
  1. Former SAS headquarters (city)
  2. RTX just had its' first on 4.3.21.
  3. What is Rosslyn, Virginia (for RI&S)?
  4. Function led by the former BDE of ISRS (acronym, letters only)
  5. The first C in C2.
  6. The second C in C2
  7. Delivers trusted networking solutions for Joint All Domain Operations. (RI&S PL, acronym)
  8. The value: We act with integrity and do the right thing.
  9. A type of win.
  10. Span the enterprise and drive our actions, behaviors and _________.
  11. The first word of the BD&S mission statement.
  12. RI&S Product Line with alliteration
  13. Not a competitive win
  14. A safer, more _______ world.
  15. ________, Training and Services
  16. An enterprise wide RTX meeting (hint: there is one coming up on May 5)
  17. Function home of BD Ops and Customer Engagement
  18. The "I" in USGIS
  19. Bye bye Skype. Hello Microsoft _______.

36 Clues: DE&I mottoThe R in ISRSA type of win.The "I" in USGISThe first C in C2.The second C in C2Challenge ________Not a competitive win"light from the gods""the second" in spanishGlobal Solutions & ______Any ______. Any challenge."Formal agreement" + "car"A safer, more _______ world.Advanced _______ & TechnologyFormer SAS headquarters (city)...

TOPIC 8 2024-05-02

TOPIC 8 crossword puzzle
Across
  1. What technology provides high-speed internet access through cable television lines?
  2. What are programs and operating information used by a computer?
  3. What refers to buying and selling goods or services over the internet?
  4. What are materials that do not conduct electricity?
  5. What technology uses unique biological characteristics for authentication?
  6. What refers to the physical components of a computer system?
  7. What are private networks that can only be accessed by authorized users?
  8. What material has electrical conductivity between a conductor and an insulator?
  9. What connects computers and other devices to share resources and information?
Down
  1. What is the process of combining multiple signals into one signal?
  2. What focuses on protecting computer systems from theft or damage to their hardware, software, or electronic data?
  3. What technology delivers computing services over the Internet?
  4. What technology overlays digital information on the real world?
  5. What is a decentralized and distributed digital ledger used for secure transactions?
  6. What are private networks that allow access to specific external users?
  7. What is a type of artificial intelligence that enables systems to learn from data?
  8. What technology uses lasers to read and write data on discs?
  9. What process converts information into a code to prevent unauthorized access?
  10. What concerns the protection of sensitive information from unauthorized access?
  11. What allows users to access data and information from anywhere using mobile devices?

20 Clues: What are materials that do not conduct electricity?What technology uses lasers to read and write data on discs?What refers to the physical components of a computer system?What technology delivers computing services over the Internet?What technology overlays digital information on the real world?...

TEKA-TEKI SILANG INFORMATIKA KELAS IX 2024-10-30

TEKA-TEKI SILANG INFORMATIKA KELAS IX crossword puzzle
Across
  1. Platform online yang memungkinkan pengguna untuk berkolaborasi pada dokumen secara bersamaan
  2. Tombol yang digunakan untuk menyukai atau memberikan tanda setuju pada suatu postingan
  3. Program untuk mengelola data dalam bentuk tabel
  4. Video blog, seringkali berisi konten pribadi atau tutorial
  5. Situs web pribadi yang berisi tulisan-tulisan atau artikel secara teratur
  6. Program komputer yang digunakan untuk membuat dokumen seperti surat atau laporan
  7. Platform berbagi video terbesar di dunia
  8. Orang yang membuat dan mengelola sebuah blog
  9. Jaringan sosial yang fokus pada berbagi foto dan video singkat
  10. Bahasa pemrograman visual yang dirancang untuk membantu anak-anak dan pemula belajar pemrograman
  11. Tanda pagar (#) yang digunakan untuk mengategorikan postingan di media sosial
Down
  1. perangkat keras yang digunakan untuk mengontrol kursor di layar komputer
  2. Format file dokumen yang umum digunakan (singkatan)
  3. Aplikasi yang digunakan untuk membuat presentasi dengan slide
  4. Praktik untuk melindungi sistem teknologi dan data dari ancaman digital, seperti kejahatan siber
  5. kegiatan yang dilakukan untuk mendapatkan akses tidak sah ke sistem atau jaringan komputer
  6. perangkat keras yang berfungsi untuk menampilkan data visual dari komputer, seperti gambar, teks, video, dan grafik
  7. Surat elektronik atau electronic mail yang merupakan cara untuk mengirim dan menerima pesan secara digital melalui jaringan internet
  8. Orang yang membuat dan mengunggah video ke YouTube atau platform serupa
  9. Platform online yang memungkinkan pengguna untuk berbagi informasi dan berinteraksi dengan orang lain

20 Clues: Platform berbagi video terbesar di duniaOrang yang membuat dan mengelola sebuah blogProgram untuk mengelola data dalam bentuk tabelFormat file dokumen yang umum digunakan (singkatan)Video blog, seringkali berisi konten pribadi atau tutorialAplikasi yang digunakan untuk membuat presentasi dengan slide...

Unraveling The Contemporary World 2025-02-12

Unraveling The Contemporary World crossword puzzle
Across
  1. – People fleeing their country due to danger.
  2. – Hiring external workers or firms for tasks.
  3. – Mixing elements of different cultures.
  4. – Fair and equal treatment in society.
  5. – Large sets of data analyzed for insights.
  6. – Cultures becoming more alike due to globalization.
  7. – An economic system favoring free markets and privatization.
  8. – Movement of people to a new place.
  9. – Machines mimicking human intelligence.
  10. – Fear or dislike of foreigners.
  11. – Trade without tariffs or restrictions.
  12. – Managing international relations through negotiation.
Down
  1. – Belief that one’s culture is superior.
  2. - An international governing body like the UN or EU.
  3. – Protecting digital systems from attacks.
  4. – Naturally replenishing energy sources like solar and wind.
  5. – Progress that meets present needs without harming the future.
  6. – Gap between people with and without digital access.
  7. – A company operating in multiple countries.
  8. – Equal opportunities for all genders.
  9. – Total greenhouse gas emissions from human activities.
  10. – Basic freedoms entitled to all people.
  11. – A country's right to govern itself.
  12. – Lack of financial resources for basic needs.
  13. – Using violence for political or ideological goals.
  14. – Large-scale clearing of forests.
  15. – How geography affects politics and global relations.
  16. – Growing connections between countries.
  17. – Long-term shifts in global weather patterns.
  18. – Online platforms for sharing and communication.

30 Clues: – Fear or dislike of foreigners.– Large-scale clearing of forests.– Movement of people to a new place.– A country's right to govern itself.– Equal opportunities for all genders.– Fair and equal treatment in society.– Belief that one’s culture is superior.– Mixing elements of different cultures.– Basic freedoms entitled to all people....

Internet Safety 2025-03-05

Internet Safety crossword puzzle
Across
  1. unauthorized use, copying or distribution of copyrighted software
  2. A dishonest scheme to get information or money
  3. Shorter word for "internet"
  4. Any action that's taken to protect computers and prevent online crime
  5. Unwanted e-mails or junk mail
  6. An attempt to trick a person into giving away money or information by pretending to be a well-known company
  7. Self-replicating software program that attacks a computer system
  8. Short form for "WorldWideWeb"
  9. Software that displays unwanted advertising on your computer
  10. Online etiquette-being nice and respectful to others online
  11. Leaving offensive messages on the internet
  12. Harm inflicted through text, e-mails, or online sites
  13. Searching through websites freely
  14. A secret combination of words or numbers that allows a user to access an online service
  15. Software designed to damage a computer or phone
Down
  1. Someone who gains unauthorized access to people's computers
  2. managing high-capacity lines between central offices, carriers, ISPs and very large corporations rather than subscriber lines
  3. A security system used to block malicious threats to your computer
  4. a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style
  5. a type of malware that encrypts the victim's personal data until a ransom is paid
  6. Computer equipment, machines, and parts
  7. When someone tracks, lures, or harasses people online
  8. An internet related crime

23 Clues: An internet related crimeShorter word for "internet"Unwanted e-mails or junk mailShort form for "WorldWideWeb"Searching through websites freelyComputer equipment, machines, and partsLeaving offensive messages on the internetA dishonest scheme to get information or moneySoftware designed to damage a computer or phone...

tugas daring informatika diantri rahmawati X-I/7 2025-04-17

tugas daring informatika diantri rahmawati X-I/7 crossword puzzle
Across
  1. Simbol huruf kecil yang melindungi merek dagang
  2. Hak yang dimiliki atas lagu ciptaan sendiri
  3. perlindungan atas penemuan teknologi masuk ke dalam hak ini
  4. Lembaga Indonesia yang menangani aduan konten negatif
  5. Jenis berita palsu yang sering tersebar di media sosial
  6. Konten digital yang berisi cerita rakyat termasuk jenis ini
  7. Bentuk lisensi yang membolehkan orang lain menggunakan karya dengan izin terbuka
  8. Operator untuk mencari di satu situs tertentu saja
  9. Profesional yang merancang sistem perangkat lunak
  10. Gambar bergerak pendek yang menyebarkan nilai budaya secara viral
  11. Mereka menciptakan pengalaman visual dan interaktif di situs web
  12. Platform populer untuk berbagi video pendek bernuansa budaya lokal
  13. Kata yang digunakan untuk mengecualikan hasil pencarian di Google
Down
  1. Pekerjaan yang mengolah data jadi informasi bermakna
  2. Teknik menggabungkan visual, musik, dan narasi untuk menyampaikan tradisi
  3. Jenis konten digital yang menampilkan kesenian daerah dalam bentuk audio
  4. Simbol yang digunakan untuk mencari kata kunci yang mirip atau bentuk lainnya
  5. Proses memastikan kebenaran informasi di internet
  6. Konten yang menyesatkan dengan narasi yang dimanipulasi disebut
  7. Metode menggunakan kecerdasan buatan untuk mendeteksi konten bermasalah
  8. Operator pencarian yang menampilkan hasil yang mengandung semua kata kunci
  9. Profesional yang melatih mesin untuk belajar dari data
  10. Ahli dalam menjaga keamanan sistem informasi
  11. Untuk mencari frasa persis, kita gunakan tanda ini di awal dan akhir
  12. Lembaga negara yang mengurusi perlindungan kekayaan intelektual di Indonesia

25 Clues: Hak yang dimiliki atas lagu ciptaan sendiriAhli dalam menjaga keamanan sistem informasiSimbol huruf kecil yang melindungi merek dagangProses memastikan kebenaran informasi di internetProfesional yang merancang sistem perangkat lunakOperator untuk mencari di satu situs tertentu sajaPekerjaan yang mengolah data jadi informasi bermakna...

TEKA-TEKI INFORMATIKA BAB 1-3 2025-06-04

TEKA-TEKI INFORMATIKA BAB 1-3 crossword puzzle
Across
  1. Istilah untuk keamanan jaringan komputer dari serangan.
  2. Alat yang digunakan untuk mengoutput data ke layar.
  3. Jenis perangkat keras yang digunakan untuk menyimpan data cadangan.
  4. Alat yang digunakan untuk mengontrol komputer.
  5. Alat yang digunakan untuk memperluas jaringan Wi-Fi ke area yang lebih luas
  6. Istilah untuk sistem operasi komputer.
  7. Alat yang digunakan untuk mencetak dokumen.
  8. Alat yang digunakan untuk menginput data tulisan tangan.
  9. Istilah untuk sistem komputer yang terintegrasi.
  10. Jenis perangkat lunak yang digunakan untuk mengedit video.
  11. Istilah untuk pengiriman data melalui internet.
Down
  1. Jenis perangkat keras yang digunakan untuk memproses data.
  2. Istilah untuk sistem operasi mobile.
  3. Alat yang digunakan untuk mengontrol jaringan komputer.
  4. Istilah untuk jaringan komputer yang luas.
  5. Jenis perangkat keras yang digunakan untuk menyimpan data.
  6. Alat yang digunakan untuk menginput data suara.
  7. Alat yang digunakan untuk mengakses data dari jarak jauh.
  8. Istilah untuk jaringan komputer yang menggunakan teknologi wireless.
  9. Alat yang digunakan untuk mengakses internet.
  10. Jenis perangkat lunak yang digunakan untuk mengolah presentasi.
  11. Istilah untuk pengumpulan data.
  12. Istilah untuk keamanan data.
  13. Alat yang digunakan untuk menginput data ke komputer.
  14. Jenis perangkat lunak yang digunakan untuk mengedit gambar.
  15. Alat yang digunakan untuk menyimpan data sementara.
  16. Bahasa pemrograman yang digunakan untuk membuat website.
  17. Istilah untuk pengiriman data melalui jaringan.
  18. Jenis perangkat lunak yang digunakan untuk mengolah angka.
  19. Istilah untuk jaringan
  20. Istilah untuk keamanan jaringan komputer.

31 Clues: Istilah untuk jaringanIstilah untuk keamanan data.Istilah untuk pengumpulan data.Istilah untuk sistem operasi mobile.Istilah untuk sistem operasi komputer.Istilah untuk keamanan jaringan komputer.Istilah untuk jaringan komputer yang luas.Alat yang digunakan untuk mencetak dokumen.Alat yang digunakan untuk mengakses internet....

Browsing Safely 2025-05-18

Browsing Safely crossword puzzle
Across
  1. a software or a computer program that is designed to identify or remove viruses from your computer
  2. befriending children on social media
  3. receiver is fool to believe that the messages from a trusted so which is not true
  4. Full-form of OTP
  5. misusing someone's personal information reach includes a person's name, date of birth, account number, etc
  6. a crime in which the victim is attacked first and then forced to pay money to stop further attacks
  7. the better commit crimes buy your name after stealing or identity
  8. collection of technology or processes designed to protect networks, computers, etc
  9. Digital/unethical hackers
Down
  1. an impression you create when you engage in various online activities
  2. refers to conduct terrorism by using internet to cause fear and panic
  3. refers to illegal methods to get money from a bank or its customers
  4. Hoaxing or to mislead
  5. Criminal activity intended to harm a computer using the Internet
  6. Used to extract secret or confidential information
  7. software that helps to prevent unauthorised access to your computer by blocking and unsolicited communication
  8. refers to a illegal entry into a computer system or network
  9. harrassing someone using information technology through a deliberate manner
  10. Set of programs that disorders the functioning of a computer
  11. This is what our lives heavy rely on

20 Clues: Full-form of OTPHoaxing or to misleadDigital/unethical hackersbefriending children on social mediaThis is what our lives heavy rely onUsed to extract secret or confidential informationrefers to a illegal entry into a computer system or networkSet of programs that disorders the functioning of a computer...

RU ITEC411 Crime and Security 2025-10-22

RU ITEC411 Crime and Security crossword puzzle
Across
  1. a time when unauthorized user get access to a system
  2. a program that helps protect you against virus's and malware
  3. a way to identify a person based on physical characteristics like fingerprints
  4. a type of malware that sits in the background on a computer and spys on the user
  5. the way a computer converts hostname to ip address
  6. a type of malware that encrypts some amount of files on your computer then demands payment to decrypt them
  7. an digital attack on a computer or system
  8. weaknesses or weak points that can be exploited
  9. a way people steal credit card info with a physical device
  10. a type of malware that lets attackers us a lot of personal devices to attack someone
Down
  1. a type of malware that lets attackers back in to a system after they have put it in
  2. hacking for political causes
  3. security for computers
  4. fake messages that look real to steal info like login info
  5. software that is malicious
  6. a type of malware that can self replicate and spread
  7. a type of malware that looks and acts like a normal program but includes additional malicious code
  8. a way of protecting data by obscuring it
  9. people who hack into computers and do harm
  10. the base system upon which all other software run

20 Clues: security for computerssoftware that is malicioushacking for political causesa way of protecting data by obscuring itan digital attack on a computer or systempeople who hack into computers and do harmweaknesses or weak points that can be exploitedthe base system upon which all other software runthe way a computer converts hostname to ip address...

WHO Identifies Risk 2024-07-02

WHO Identifies Risk crossword puzzle
Across
  1. identify risk systematically by using formal risk assessments, incident reports, and claim data
  2. monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
  3. identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
Down
  1. contributes insights through patient feedback, complaints, and involvement in incident reporting systems
  2. identify risks through audits, inspections, and review of compliance w/ healthcare standards

5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standardsidentify risk systematically by using formal risk assessments, incident reports, and claim datacontributes insights through patient feedback, complaints, and involvement in incident reporting systems...

Sa 2017-11-28

Sa crossword puzzle
Across
  1. The branch of logic dealing with analysis.
  2. Is a program that, when installed on your computer, enables unauthorized people to access it and sometimes to send spam from it.
  3. Security against electronic attacks.
  4. Is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
  5. One who uses programming skills to gain illegal access to a computer network or file.
  6. Is the small amount of information that a website copies to the hard drive, which helps that website identify you the next time you visit.
  7. The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.
Down
  1. An expression of an intention to inflict pain, injury or evil.
  2. Crime committed using computer networks.
  3. Is a public, worldwide network of computers and computer networks. It facilitates the World Wide Web, email, instant messaging, chat rooms, and many online services such as banking.
  4. Relating to or resembling a digit.
  5. Is set to protect access to personal or professional info.
  6. To set upon with violent force.
  7. A personal identification number - commonly assigned to bank customers.
  8. Web page address.

15 Clues: Web page address.To set upon with violent force.Relating to or resembling a digit.Security against electronic attacks.Crime committed using computer networks.The branch of logic dealing with analysis.Is set to protect access to personal or professional info.An expression of an intention to inflict pain, injury or evil....

ISTA MAGAZINE CROSSWORD 2024-02-03

ISTA MAGAZINE CROSSWORD crossword puzzle
Across
  1. - The systematic analysis of data to gain insights and make informed decisions.
  2. - Programs and instructions that control the operation of a computer system.
  3. - A device that directs data traffic between computer networks.
  4. - The creation of a virtual version of a resource, such as an operating system or server.
  5. - The process of converting information into a code to secure it from unauthorized access.
  6. - A global network connecting millions of computers, making information and resources accessible.
  7. - Physical components of a computer system, such as the central processing unit and peripherals.
  8. - A network of remote servers used to store and manage data, accessible via the internet.
Down
  1. - The point of interaction between a user and a computer system or device.
  2. - A structured collection of data, often stored and managed electronically.
  3. - Measures taken to protect computer systems and data from unauthorized access or attacks.
  4. - A step-by-step procedure for solving a problem, often used in programming.
  5. - A system of interconnected computers and devices that communicate with each other.
  6. - A computer or system that manages network resources and provides services to other computers.
  7. - A barrier designed to prevent unauthorized access to or from a private network.

15 Clues: - A device that directs data traffic between computer networks.- The point of interaction between a user and a computer system or device.- A structured collection of data, often stored and managed electronically.- A step-by-step procedure for solving a problem, often used in programming....

techbyte 2024-07-18

techbyte crossword puzzle
Across
  1. A problem-solving method used by AI to find solutions in a large search space.
  2. The process of cleaning, transforming, and modeling data to discover useful information
  3. A type of network inspired by the human brain, used in deep learning
  4. A framework or tool used for developing and training machine learning models
  5. The practice of protecting systems and networks from digital attacks
  6. The ability of a machine to imitate intelligent human behavior
Down
  1. A subset of AI that involves neural networks with many layers
  2. A popular programming language for data analysis and machine learning
  3. A statistical model used to make predictions or decisions without being explicitly programmed to perform the task
  4. A software tool used for data visualization and analysis in R.
  5. The branch of AI that deals with the simulation of intelligent behavior in computers
  6. An AI planning problem involving an agent navigating a cave to avoid pits and a dangerous creature
  7. The process of extracting useful information from large datasets
  8. A set of inputs and outputs used to train an AI model.
  9. A sequence of steps that an AI system follows to solve a problem.

15 Clues: A set of inputs and outputs used to train an AI model.A subset of AI that involves neural networks with many layersA software tool used for data visualization and analysis in R.The ability of a machine to imitate intelligent human behaviorThe process of extracting useful information from large datasets...

ADSI - Luis Castañeda 2022-06-06

ADSI - Luis Castañeda crossword puzzle
Across
  1. What is the practice of protecting digital information and systems called?.
  2. It is the basic component of a web page.
  3. It is an object-oriented programming language and is the most widely used.
  4. are words used exclusively by a programming language.
  5. In the entity relationship model, what geometric figure represents the relationship between two entities?.
  6. what is the name of the database manager that has a dolphin in its logo.
  7. similar to the programming language but without so much rigidity.
  8. Is the representation of a qualitative or quantitative variable to which a value is assigned.
  9. It is a set of rules that must be followed to write a code.
Down
  1. It is the way to communicate with the computer to tell it what we want to do.
  2. what is the name of the database that is displayed in rows and columns.
  3. is the element that refers to changeable values ​​of a program.
  4. What are the acronyms in Spanish for the entity relationship model?.
  5. what is the programming language that has the name of a snake.
  6. It is in charge of collecting the data and connecting them with each other.

15 Clues: It is the basic component of a web page.are words used exclusively by a programming language.It is a set of rules that must be followed to write a code.what is the programming language that has the name of a snake.is the element that refers to changeable values ​​of a program.similar to the programming language but without so much rigidity....

Security Awareness crossword puzzle 2018-05-07

Security Awareness crossword puzzle crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  3. _______ your data regularly and periodically check that you are able to restore them.
  4. _______ before you click or forward.
  5. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  6. Cybersecurity is _______'s responsibility.
  7. Always use _______ factor authentication where available.
  8. This can slow down your computer and watch everywhere you go on the Internet.
  9. _______ your computer when left unattended.
Down
  1. You should always keep your software and anti-virus definitions up-to-_______.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  5. Information Security is a _______ issue.
  6. Do not provide your _______ email account to social networks.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Information Security 2023-12-18

Information Security crossword puzzle
Across
  1. A secret word or phrase that must be used to gain access to a system or service.
  2. A technique that falsifies the identity or location of a sender or receiver.
  3. A deliberate attempt to compromise or damage a system, network, or program.
  4. The process of protecting data by secret code.
  5. A cybercriminal who breaks into systems
  6. A part of the internet that is hidden from regular search engines and requires special software to access.
  7. A software program that enters a computer system without the owner’s knowledge or consent.
Down
  1. The practice of protecting systems, networks, and programs from digital attacks.
  2. A type of malware that infects and replicates itself on other files or programs
  3. A small computer defect that causes errors or failures.
  4. A small piece of data stored on a user’s browser that tracks their preferences or activities.
  5. A fraudulent attempt to obtain sensitive information by impersonating a legitimate entity.
  6. A type of malware that encrypts the victim’s data and demands payment for its decryption.
  7. Unsolicited or unwanted messages sent over the internet, usually for advertising purposes.
  8. A system that prevents unauthorized access to a network or device.

15 Clues: A cybercriminal who breaks into systemsThe process of protecting data by secret code.A small computer defect that causes errors or failures.A system that prevents unauthorized access to a network or device.A deliberate attempt to compromise or damage a system, network, or program....

Cyber Security 2024-09-20

Cyber Security crossword puzzle
Across
  1. – An event or occurrence that disrupts normal operations, often involving security threats.
  2. – The act of breaking into a system, network, or data storage illegally.
  3. – Free from danger or threat; used to describe a well-protected system.
  4. – A copy of data stored separately to restore the original in case of data loss.
  5. – Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. – Unauthorized access or entry into a computer system or network.
  7. – A secret word or phrase used to gain access to a computer system or service.
  8. – Software specifically designed to disrupt, damage, or gain unauthorized access to systems.
  9. – The process of verifying the identity of a user or system.
Down
  1. – The process of converting data into a code to prevent unauthorized access.
  2. – Adherence to laws, regulations, and standards, especially in cybersecurity.
  3. – A type of malicious software that replicates itself and spreads to other systems.
  4. – A network security system that monitors and controls incoming and outgoing network traffic.
  5. – Malicious software designed to gather information about a person or organization without their knowledge.
  6. – Strong and reliable, often used to describe a system that can withstand attacks or failures.

15 Clues: – The process of verifying the identity of a user or system.– Unauthorized access or entry into a computer system or network.– Free from danger or threat; used to describe a well-protected system.– The act of breaking into a system, network, or data storage illegally.– The process of converting data into a code to prevent unauthorized access....

Browsing safely 2025-06-08

Browsing safely crossword puzzle
Across
  1. It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
  2. It is an act ab harming or harassing using information technology in deliberate manner.
  3. It is the process of befriending children on social media to facilitate online or physical sexual abuse.
  4. Standard form of vital information resources under seize.
  5. It refer to the act of stealing and misusing someone's personal Plus information.
  6. It referred to an illegal entry into a computer system or network.
  7. It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
  1. ____ also known as unethical hacker.
  2. A ____ is a software that help in preventing unauthorised access to your computer.
  3. ____ means hoaxing or misleading.
  4. _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
  5. ____ is any criminal activity intended to harm anyone using a computer and internet connection.
  6. ______ is a popular anti-virus.
  7. _______ is the use of illegal method to get money or other things that belong to bank or its customers.
  8. Never share your ____ while chatting.

15 Clues: ______ is a popular anti-virus.____ means hoaxing or misleading.____ also known as unethical hacker.Never share your ____ while chatting.Standard form of vital information resources under seize.It referred to an illegal entry into a computer system or network.It refer to the act of stealing and misusing someone's personal Plus information....

#2 (Un) Riddle 2021-04-21

#2 (Un) Riddle crossword puzzle
Across
  1. is a cryptocurrency invented in 2008 by an unknown person or group of people using the name Satoshi Nakamoto
  2. case that struck down S 66A of IT Act, 2000
  3. a technology capable of matching a human face from a digital image or a video frame against a database of faces
  4. A global company in news over its privacy policy concerns
Down
  1. spyware developed by the Israeli firm NSO Group
  2. Indian Cybersecurity Company founded by Kailash and Sanjay Katkar
  3. refers to events related to the formatting and storage of calendar data for dates beginning in the year 2000 (Use Words only)
  4. provides the infrastructure to help support the delivery of government IT services and the delivery of some of the initiatives of Digital India
  5. malware that encrypts a victim's files and extorts money to access the data
  6. CJEU recognised this right in the famous case of Google Spain v AEPD and Mario Costeja González (Use acronym)

10 Clues: case that struck down S 66A of IT Act, 2000spyware developed by the Israeli firm NSO GroupA global company in news over its privacy policy concernsIndian Cybersecurity Company founded by Kailash and Sanjay Katkarmalware that encrypts a victim's files and extorts money to access the data...

CYBER CROSSWORD 2021-09-05

CYBER CROSSWORD crossword puzzle
Across
  1. A critical requirement for the sharing of digital text
  2. An independent U.S. government agency that oversees all interstate and international communications.
  3. The integration of two or more different technologies in a single device or system
  4. an economy that is based on digital computing technologies
  5. literacy the ability to use computer technologies effectively and to understand the implications of your actions
Down
  1. The code is creating the environment that then forms Cyberspace.
  2. Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
  3. Device that raise a number of security concerns because they create links between your computer and the outside world
  4. the use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
  5. An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce

10 Clues: A critical requirement for the sharing of digital textan economy that is based on digital computing technologiesThe code is creating the environment that then forms Cyberspace.The integration of two or more different technologies in a single device or system...

CYBERLAW CROSSWORD 2021-09-05

CYBERLAW CROSSWORD crossword puzzle
Across
  1. Device that raise a number of security concerns because they create links between your computer and the outside world
  2. an economy that is based on digital computing technologies
  3. The code used in creating the environment that then forms Cyberspace.
  4. the use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
  5. the ability to use computer technologies effectively and to understand the implications of your actions
Down
  1. The integration of two or more different technologies in a single device or system
  2. An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
  3. An independent U.S. government agency that oversees all interstate and international communications.
  4. Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
  5. A critical requirement for the sharing of digital text

10 Clues: A critical requirement for the sharing of digital textan economy that is based on digital computing technologiesThe code used in creating the environment that then forms Cyberspace.The integration of two or more different technologies in a single device or system...

INFORMATION SECURITY PUZZLE 2017-11-14

INFORMATION SECURITY PUZZLE crossword puzzle
Across
  1. Global system of interconnected computer networks that use the Internet protocol suite
  2. Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  3. A software that is designed to detect and destroy compute viruses.
  4. Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  5. A piece of digital information generated by a web server and saved in your computer after visiting a website
Down
  1. A network using which things can communicate with each other using internet as means of communication between them.
  2. An attempt by hackers to damage or destroy a computer network or system.
  3. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  4. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
  5. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source

10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _A software that is designed to detect and destroy compute viruses.An attempt by hackers to damage or destroy a computer network or system.Don't click on _ _ _ _ _ within emails from an unknown or untrusted source...

CISO Crossword Quiz - 0924 2024-07-25

CISO Crossword Quiz - 0924 crossword puzzle
Across
  1. Cyber Attackers intercept communication illegally and steal sensitive data in transit
  2. The computer system that is a host to the malware agent of the botnet or to the malware agent itself
  3. A Security incident in which a malicious threat actor gains access to systems without authorization
  4. The process of monitoring and capturing all data packets passing through a given network
  5. The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files
  6. A software program designed to take advantage of a flaw in a network, typically for malicious purposes
  7. The action or process of spoiling the appearance of a website in a cyber attack
Down
  1. A social engineering technique which cybercriminal use to disguises themselves as a known/trusted source
  2. Related to information security, confidentiality is the opposite to _______
  3. A cybersecurity strategy which allows only pre-approved or trusted users, entities, or actions to operate on a system or network

10 Clues: Related to information security, confidentiality is the opposite to _______The action or process of spoiling the appearance of a website in a cyber attackCyber Attackers intercept communication illegally and steal sensitive data in transitThe process of monitoring and capturing all data packets passing through a given network...

Compliance & Ethics Week 2022 2022-09-28

Compliance & Ethics Week 2022 crossword puzzle
Across
  1. Taking responsibility for one's actions.
  2. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Conforming to a rule, such as specification, policy, standard or law.
  4. Making choices that are consistent with each other and with the stated and operative values one espouses.
  5. The act, process of power of exercising authority or control in an organizational setting.
Down
  1. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  2. Wrongful or criminal deception intended to result in financial or personal gain.
  3. The practice of protecting systems, networks and programs form digital attacks.
  4. Protects the patient's right to privacy of health information and what appropriate safeguards are required to protect the information.
  5. Moral principles that govern a person's behavior or the conducting of an activity.

10 Clues: Taking responsibility for one's actions.Conforming to a rule, such as specification, policy, standard or law.The practice of protecting systems, networks and programs form digital attacks.Wrongful or criminal deception intended to result in financial or personal gain.Moral principles that govern a person's behavior or the conducting of an activity....

Forensic Investigation and Incident Response 2022-09-26

Forensic Investigation and Incident Response crossword puzzle
Across
  1. It is a technique used to consistently trick an adversary during a cyber-attack.
  2. Identify and track the origin of data, software, and/or hardware elements.
  3. Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
  4. Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
  5. Identifying critical assets that could be at risk – what could go wrong?
  6. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
  1. the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
  2. info that can be of vital importance to the outcome of legal proceedings or investigations.
  3. Understanding the potential impacts of cyber threats were they to materialize is important.
  4. process to ensure the needed logs data is collected and stored for an appropriate amount of time.

10 Clues: Identifying critical assets that could be at risk – what could go wrong?Identify and track the origin of data, software, and/or hardware elements.It is a technique used to consistently trick an adversary during a cyber-attack.info that can be of vital importance to the outcome of legal proceedings or investigations....

RBI HISTORY 2024-09-16

RBI HISTORY crossword puzzle
Across
  1. (National Centre for Financial Education): Works to promote financial literacy and education across India.
  2. (Indian Financial Technology and Allied Services): Provides critical technology infrastructure for the Indian financial sector.
  3. RBI Research institution
  4. (National Housing Bank): Regulates and promotes housing finance institutions in India.
  5. (National Bank for Agriculture and Rural Development): Focuses on agriculture and rural development finance in India.
Down
  1. (Reserve Bank Information Technology Private Limited): Handles IT and cybersecurity needs for the Reserve Bank of India.
  2. The Reserve Bank of India also promoted a public limited company on January 14, 1971, named the
  3. to extend facilities for an equity type investment to small investors and also mobilize resources and channel them into investments so as to facilitate the growth of the economy.
  4. (Bharatiya Reserve Bank Note Mudran Private Limited): RBI's subsidiary responsible for printing Indian currency notes.
  5. (Industrial Development Bank of India): Established to provide credit and financial facilities for industrial development in India.

10 Clues: RBI Research institution(National Housing Bank): Regulates and promotes housing finance institutions in India.The Reserve Bank of India also promoted a public limited company on January 14, 1971, named the(National Centre for Financial Education): Works to promote financial literacy and education across India....

FINAL ROUND - GRIDLOCK CHALLENGE 2025-01-17

FINAL ROUND - GRIDLOCK CHALLENGE crossword puzzle
Across
  1. The process of converting information into a secure format to prevent unauthorized access.
  2. A pioneer in open-source enterprise solutions, famous for its Linux distributions.
  3. A semiconductor company revolutionizing CPU and GPU design, often praised for innovation in high-performance computing.
  4. A James Cameron blockbuster set on Pandora, where humans use remotely controlled bodies to interact with the alien world.
  5. A popular, open-source code editor used by developers for writing and debugging software.
  6. A dystopian cyberpunk film where humans are unknowingly trapped in a simulated reality controlled by machines.
  7. A leader in networking technology, specializing in routers, switches, and cybersecurity. Founded in 1984.
Down
  1. A sandbox game where players build and explore.
  2. The brutal game in which participants must select a specific shape from a fragile piece of honeycomb candy without breaking it.
  3. 1980s puzzle game where geometric shapes fall into place

10 Clues: A sandbox game where players build and explore.1980s puzzle game where geometric shapes fall into placeA pioneer in open-source enterprise solutions, famous for its Linux distributions.A popular, open-source code editor used by developers for writing and debugging software....

Cyber Security Month Crossword! 2025-10-01

Cyber Security Month Crossword! crossword puzzle
Across
  1. A highly realistic video, image or audio clip generated by AI depicting someone saying or doing something that they didn't actually do
  2. A method of protecting data by encoding it to make it unreadable by unauthorised users
  3. A phishing attack that uses SMS instead of email
  4. A hacker pretending to be someone else to trick you into giving away money or information
  5. Malicious software that locks access to a computer until a ransom is paid
Down
  1. A relatively new cyberattack technique that injects malicious code within digital ads
  2. When a hacker gains access to a business email account to trick users into transferring money out of an organisation
  3. Kyogle Councils' email filtering and web security program
  4. A virtual private network that encrypts your data, preventing hackers from viewing it
  5. A cybersecurity method that protects your data by requiring more than one method of verifying your identity

10 Clues: A phishing attack that uses SMS instead of emailKyogle Councils' email filtering and web security programMalicious software that locks access to a computer until a ransom is paidA relatively new cyberattack technique that injects malicious code within digital adsA virtual private network that encrypts your data, preventing hackers from viewing it...

Puzzle - 8 2022-10-10

Puzzle - 8 crossword puzzle
Across
  1. Badguys in the world of cybercrime. Hackers with criminal intentions
  2. a program that can automatically perform some simple repeated task to reach a pursued goal.
  3. A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
  4. a type of internet fraud that seeks to acquire a user’s credentials by deception.
  5. A combination of the words "robot" and "network"
Down
  1. the process of verifying the identity of a user or piece of information and the veracity of information provided.
  2. Cryptocurrency, a form of electronic cash
  3. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  4. Completely Automated Public Turing test to tell Computers and Humans Apart
  5. malware that spies on the computer to collect information about a product, a company, a person

10 Clues: Cryptocurrency, a form of electronic cashA combination of the words "robot" and "network"Badguys in the world of cybercrime. Hackers with criminal intentionsCompletely Automated Public Turing test to tell Computers and Humans Aparta type of internet fraud that seeks to acquire a user’s credentials by deception....

Forensic Investigation and Incident Response 2022-09-26

Forensic Investigation and Incident Response crossword puzzle
Across
  1. Identifying critical assets that could be at risk – what could go wrong?
  2. Understanding the potential impacts of cyber threats were they to materialize is important.
  3. process to ensure the needed logs data is collected and stored for an appropriate amount of time.
  4. the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
  5. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
  6. Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
Down
  1. Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
  2. Identify and track the origin of data, software, and/or hardware elements.
  3. info that can be of vital importance to the outcome of legal proceedings or investigations.
  4. It is a technique used to consistently trick an adversary during a cyber-attack.

10 Clues: Identifying critical assets that could be at risk – what could go wrong?Identify and track the origin of data, software, and/or hardware elements.It is a technique used to consistently trick an adversary during a cyber-attack.Understanding the potential impacts of cyber threats were they to materialize is important....

Fundamental Concept Related to ICT 2024-09-28

Fundamental Concept Related to ICT crossword puzzle
Across
  1. computing the delivery of computing services (e.g., servers, storage, databases, networking) over the internet ("the cloud")
  2. Intelligence (AI) the simulation of human intelligence processes by machines, particularly computer systems.
  3. an organized collection of data that is stored and accessed electronically from a computer system.
  4. a global system of interconnected computer networks that use the TCP/IP protocol to communicate between devices.
  5. the physical components of a computer s(e.g., monitor, keyboard, CPU).
  6. the process of connecting multiple computing devices together to share resources and information.
Down
  1. programs and applications that run on a computer or other digital devices, instructing them how to perform tasks.
  2. information that is processed or stored by a computer, often in digital form.
  3. Literacy the ability to use information and communication technologies to find, evaluate, create, and communicate information.
  4. the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.

10 Clues: the physical components of a computer s(e.g., monitor, keyboard, CPU).information that is processed or stored by a computer, often in digital form.the process of connecting multiple computing devices together to share resources and information.an organized collection of data that is stored and accessed electronically from a computer system....

Technology in our lives 2024-12-21

Technology in our lives crossword puzzle
Across
  1. – The practice of meeting current needs without harming future generations or the environment.
  2. – The use of machines or technology to perform tasks without human assistance.
  3. Computing – A type of computing that uses quantum mechanics to perform complex calculations much faster than traditional computers.
  4. – The practice of protecting computers, networks, and data from unauthorized access or attacks.
  5. – The science of building and using materials or devices at the nanoscale (extremely small sizes).
Down
  1. Intelligence – A branch of computer science that enables machines to perform tasks that typically require human intelligence, such as problem-solving and learning.
  2. – The process of creating new ideas, methods, or products that bring improvement or solve problems.
  3. Reality (AR) – A technology that overlays digital information or images on the real-world environment.
  4. – The ability to connect devices or systems to each other for communication and data exchange.
  5. Learning – A field of AI where computers learn from data and improve their performance without being explicitly programmed.

10 Clues: – The use of machines or technology to perform tasks without human assistance.– The practice of meeting current needs without harming future generations or the environment.– The ability to connect devices or systems to each other for communication and data exchange....

Browsing safely 2025-06-22

Browsing safely crossword puzzle
Across
  1. Criminal activity intended to harm anyone using a computer and an internet connection.
  2. THEFT- Act of stealing and misusing someone's personal informations.
  3. A program that disturbs the normal functioning of the computer.
  4. Computer program, designed to identify, prevent,and remove viruses from a computer.
  5. An illegal entry into a computer system or network.
Down
  1. Collection of technologies,processes, and practices designed to protect networks,computers, program,and data from attack,damage,or unauthorised access.
  2. The act of sending an email to a user and misleading him to believe that it is from a trusted person or organisation.
  3. Illegal method to get money or other things that belong to a bank or it's customers.
  4. Unethical hackers,extract confidential information from users and use this information to execute fraudulent tasks online
  5. A software that helps in preventing unauthorised access to you computer by blocking communication.

10 Clues: An illegal entry into a computer system or network.A program that disturbs the normal functioning of the computer.THEFT- Act of stealing and misusing someone's personal informations.Computer program, designed to identify, prevent,and remove viruses from a computer.Illegal method to get money or other things that belong to a bank or it's customers....

PHW Compliance Week 2024-10-08

PHW Compliance Week crossword puzzle
Across
  1. 2. You should call the _____________ to report a suspected or known violation.
  2. 3. Wrongful or criminal deception intended to result in financial or personal gain.
  3. 14. Any possible ______________ event should be reported to the compliance team as soon as it is discovered.
  4. 13. Compliance _____________ is my favorite time of the year!
  5. 4. The Compliance program is supported by _____________ and Procedures.
  6. 9. Abusive, Offensive or Discriminatory remarks are what type of abuse?
  7. 8. PHW will strictly prohibit and will not tolerate any form of ___________ or bullying.
  8. 7. All _______________ are responsible for the information in the Code of Conduct and Compliance Program and will be held accountable for failing to comply.
Down
  1. 6. An official inspection of an individual’s or organization’s accounts.
  2. 15. You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the __________ home page.
  3. 1. The _________________ Officer is responsible for implementing and supporting the effectiveness of the Compliance Program.
  4. 5. Computer Security.
  5. 10. All employees are required to complete these in Centene University by the assigned due dates.
  6. 12. Sending an email securely means it has been _____________________.
  7. 11. FWA stands for Fraud, ____________ and Abuse.

15 Clues: 5. Computer Security.11. FWA stands for Fraud, ____________ and Abuse.13. Compliance _____________ is my favorite time of the year!12. Sending an email securely means it has been _____________________.4. The Compliance program is supported by _____________ and Procedures.9. Abusive, Offensive or Discriminatory remarks are what type of abuse?...

Compliance week 2024-10-28

Compliance week crossword puzzle
Across
  1. Abusive, Offensive or Discriminatory remarks are what type of abuse?
  2. PHW will strictly prohibit and will not tolerate any form of ____ or bullying.
  3. Compliance ______ is my favorite time of the year!
  4. The compliance program is supported by _____ and Procedures.
  5. The _______ Officer is responsible for implementing and supporting the effectiveness of the compliance program.
  6. Protecting systems and data from digital attacks
  7. Sending and email securely means it has been ______
  8. You should call the ____ to report a suspected or known violation.
Down
  1. Any Possible _____ event should be reported to the compliance team as soon as it is discovered
  2. All ______ are responsible for the information in the Code of Conduct and Compliance Program and will be responsible for failing to comply
  3. FWA stands for Fraud,_____ and Abuse.
  4. All employees are required to complete these in Centene University by the assigned due dates.
  5. An official inspection of an individual's or organization's accounts.
  6. You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the _____ home page.
  7. Wrongful or criminal deception intended to result in financial or personal gain

15 Clues: FWA stands for Fraud,_____ and Abuse.Protecting systems and data from digital attacksCompliance ______ is my favorite time of the year!Sending and email securely means it has been ______The compliance program is supported by _____ and Procedures.You should call the ____ to report a suspected or known violation....

Browsing Safely (SAPTADIP SAMADDER ) 2025-06-17

Browsing Safely (SAPTADIP SAMADDER ) crossword puzzle
Across
  1. The data we leave behind when we use in internet
  2. Any criminal activity intended to harm anyone using computer and an internet connection
  3. It is referred to the act of stealing and misusing someone's personal information
  4. A collection of technology to protect networks and data from an unauthorized access
  5. It is a program or set of programs that disrupt the normal functioning of a computer
  6. Known as crackers
Down
  1. A crime in which the victim is attacked first and then forced to pay money to stop further attack
  2. used to conduct terrorism through the use of computers and internet
  3. Referred to an illegal entry into a computer system or network
  4. The process befriending with children on social media to continue online or physical sexual abuse
  5. illegal method to get money or other things that belong to a bank or its customers
  6. Example of a antivirus
  7. The receiver of a messages fold into believing at the message is received by him is from trusted source which is actually not true
  8. Ethical hackers
  9. A computer program that is designed to identify, prevent and remove virus from a computer

15 Clues: Ethical hackersKnown as crackersExample of a antivirusThe data we leave behind when we use in internetReferred to an illegal entry into a computer system or networkused to conduct terrorism through the use of computers and internetIt is referred to the act of stealing and misusing someone's personal information...

FWD Crossword 2025-10-28

FWD Crossword crossword puzzle
Across
  1. Measurement and reporting solution for emissions baselines and reductions across operations and supply chain.
  2. Cybersecurity asset prototyping strategy lifecycle: scoping, intake, dynamic controls mapping, gap analysis,visual reporting.
  3. Suite of AI agents that emulate expert decisions using deep functional and industry knowledge.
  4. In-workflow helper that drafts, summarizes, and recommends actions to speed day-to-day tasks.
  5. Financial-services accelerators that plug into core platforms to streamline onboarding and compliance.
  6. Operations layer that orchestrates analytics, automation, and workflows to improve speed and quality.
  7. Analytics environment that unifies curated data and prebuilt models for faster, governed insights.
  8. Proprietary industry cloud tailored for retail, consumer products, and hospitality organizations.
  9. Healthcare analytics capability that integrates clinical and operational data to surface actionable insights.
Down
  1. Deployed intelligence at the edge that processes data locally for low-latency decisions and automation.
  2. Digital transformation platform that unifies methods, industry expertise, and tools to accelerate execution.
  3. Guided data companion that prepares, validates, and documents datasets for analytics and reporting.
  4. Automated modernization toolkit that converts legacy code to target stacks and accelerates cloud migration.
  5. Service transformation toolkit that designs journeys, digitizes operations, and measures experience outcomes.
  6. Pattern library that standardizes methods and automates boilerplate so teams deliver consistently.

15 Clues: In-workflow helper that drafts, summarizes, and recommends actions to speed day-to-day tasks.Suite of AI agents that emulate expert decisions using deep functional and industry knowledge.Proprietary industry cloud tailored for retail, consumer products, and hospitality organizations....

CYBERLAW CROSSWORD 2021-09-05

CYBERLAW CROSSWORD crossword puzzle
Across
  1. Device that raise a number of security concerns because they create links between your computer and the outside world
  2. An economy that is based on digital computing technologies
  3. The code used in creating the environment that then forms Cyberspace.
  4. The use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
  5. The ability to use computer technologies effectively and to understand the implications of your actions
Down
  1. The integration of two or more different technologies in a single device or system
  2. An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
  3. An independent U.S. government agency that oversees all interstate and international communications.
  4. Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
  5. A critical requirement for the sharing of digital text

10 Clues: A critical requirement for the sharing of digital textAn economy that is based on digital computing technologiesThe code used in creating the environment that then forms Cyberspace.The integration of two or more different technologies in a single device or system...

INFORMATION SECURITY PUZZLE 2017-11-14

INFORMATION SECURITY PUZZLE crossword puzzle
Across
  1. A piece of digital information generated by a web server and saved in your computer after visiting a website
  2. A network using which things can communicate with each other using internet as means of communication between them.
  3. Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
  4. Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
Down
  1. Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
  2. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  3. An attempt by hackers to damage or destroy a computer network or system.
  4. A software that is designed to detect and destroy compute viruses.
  5. Global system of interconnected computer networks that use the Internet protocol suite
  6. Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.

10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _A software that is designed to detect and destroy compute viruses.An attempt by hackers to damage or destroy a computer network or system.Don't click on _ _ _ _ _ within emails from an unknown or untrusted source...

CAES Security Week 2024-01-29

CAES Security Week crossword puzzle
Across
  1. This network security system acts as a barrier, controlling and monitoring incoming and outgoing traffic.
  2. Enhances security by requiring users to provide two different authentication factors, often something they know and something they have.
  3. The process of converting information into a code to secure it from unauthorized access.
  4. Weaknesses or flaws in a system’s security that could be exploited by attackers.
  5. A broad term for malicious software, including viruses, worms, and ransomware, designed to harm or exploit computer systems.
  6. Cyber attackers often use deceptive emails or messages in an attempt to trick individuals into revealing sensitive information through this method.
Down
  1. Software updates designed to fix security vulnerabilities and improve overall system performance.
  2. Unauthorized access or breach into a system, network, or device.
  3. The process of verifying the identity of a user, device, or system, typically through passwords or biometrics.
  4. The art of writing or solving codes; used in cybersecurity to secure communication through encryption.

10 Clues: Unauthorized access or breach into a system, network, or device.Weaknesses or flaws in a system’s security that could be exploited by attackers.The process of converting information into a code to secure it from unauthorized access.Software updates designed to fix security vulnerabilities and improve overall system performance....