cybersecurity Crossword Puzzles
REV Cybersecurity Awareness Crossword Puzzle # 3 2019-10-16
Across
- address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
- injection type of input validation attack where SQL code is inserted into application queries to manipulate the database.
- approval, permission, or empowerment for someone or something to do something.
- basic communication language or "protocol" of the Internet.
- sequence of eight bits.
- code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
- encrypted form of the message being sent.
- Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network.
- repudiation prove that a user sent a message and the message has not been altered.
Down
- stripping one layer's headers and passing the rest of the packet up to next higher layer.
- force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
- gaining unauthorized logical access to sensitive data by circumventing a system's protections.
- process of confirming the correctness of the claimed identity.
- hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
- e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.
15 Clues: sequence of eight bits. • encrypted form of the message being sent. • basic communication language or "protocol" of the Internet. • process of confirming the correctness of the claimed identity. • approval, permission, or empowerment for someone or something to do something. • repudiation prove that a user sent a message and the message has not been altered. • ...
REV CyberSecurity Awareness Crossword Puzzle # 1 2019-10-16
Across
- e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.
- type of input validation attack where SQL code is inserted into application queries to manipulate the database.
- approval, permission, or empowerment for someone or something to do something.
- basic communication language or "protocol" of the Internet.
- TCP/IP protocol specifying the transfer of text or binary files across the network.
- gaining unauthorized logical access to sensitive data by circumventing a system's protections.
Down
- encrypted form of the message being sent.
- process of confirming the correctness of the claimed identity.
- prove that a user sent a message and the message has not been altered.
- software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
- sequence of eight bits.
- pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
- stripping one layer's headers and passing the rest of the packet up to next higher layer.
- hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
- cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
15 Clues: sequence of eight bits. • encrypted form of the message being sent. • basic communication language or "protocol" of the Internet. • process of confirming the correctness of the claimed identity. • prove that a user sent a message and the message has not been altered. • approval, permission, or empowerment for someone or something to do something. • ...
REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16
Across
- stripping one llayer's headers and passing the rest of the packet up to next higher layer
- sequence of eight bits
- e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
- approval, permission, or empowerment for someone or something to do something
- hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
- repudiation prove that a user sent a message and the message has not been altered
- basic communication language or "protocol" of the Internet
- Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network
- injection type of input validation attack where SQL code is inserted into application queries to manipulate the database
Down
- address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1)
- gaining unauthorized logical access to sensitive data by circumventing a system's protections
- process of confirming the correctness of the claimed identity
- code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse)
- encrypted form of the message being sent
- force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one
15 Clues: sequence of eight bits • encrypted form of the message being sent • basic communication language or "protocol" of the Internet • process of confirming the correctness of the claimed identity • approval, permission, or empowerment for someone or something to do something • repudiation prove that a user sent a message and the message has not been altered • ...
022.03a - What Can You Do Online? 2024-09-23
4 Clues: The responsible use of technology and behavior online • The act of purchasing goods or services over the internet • The practice of protecting systems, networks, and programs from digital attacks • Websites and apps that allow users to create and share content or participate in social networking
Cyber Crosswords 2024-06-19
Across
- A secret word or phrase used to gain access to a computer system (8 letters)
- A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
- The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
- Software that is designed to detect and destroy computer viruses (9 letters)
- The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
- The practice of protecting systems, networks, and programs from digital attacks (10 letters)
- A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
- An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
- Unsolicited email, often used for advertising or phishing (4 letters)
9 Clues: Unsolicited email, often used for advertising or phishing (4 letters) • Software that is designed to detect and destroy computer viruses (9 letters) • A secret word or phrase used to gain access to a computer system (8 letters) • The practice of protecting systems, networks, and programs from digital attacks (10 letters) • ...
Intro to Cybersecurity CA #2 2024-10-23
Across
- Linux command used to search a file for keywords
- Base 16 system
- Changing the order of items
- Brain of the computer; determines what software can run on device
- Encryption method; pre-shared password is only used once
Down
- Subsitution cipher based on multiple alphabets using system to switch between
- Precise set of instructions on how to scramble/unscramble data
- Hiding messages in an image
- Displays absolute path of directory
- Sends message to destination device
- group of 2 or more computing devices connected to each other, giving access to the same data
11 Clues: Base 16 system • Hiding messages in an image • Changing the order of items • Displays absolute path of directory • Sends message to destination device • Linux command used to search a file for keywords • Encryption method; pre-shared password is only used once • Precise set of instructions on how to scramble/unscramble data • ...
Cybersecurity And The Internet Puzzle 2024-12-19
Across
- A secret word you use to get into something, like a computer.
- Site where people can send electronic mail to each other, and talk.
- Where your devices can get connected.
- Someone who is good with computers.
- A picture of someone or something.
- You give someone an answer or respond to them.
Down
- Where your devices gets the newest software.
- Games where someone plays a game but on the internet.
- Site online to explore and learn, one link per every site.
- How you connect to the internet.
- A software code to perform unwanted actions.
11 Clues: How you connect to the internet. • A picture of someone or something. • Someone who is good with computers. • Where your devices can get connected. • Where your devices gets the newest software. • A software code to perform unwanted actions. • You give someone an answer or respond to them. • Games where someone plays a game but on the internet. • ...
Introduction to Cybersecurity New Year's Challenge 102 2024-01-01
Across
- A way to send messages between computers instantly.
- A level in the TLP system where information can be shared, but only with permission.
- The part of a computer where you see information and pictures.
- When someone steals your personal information, like your name, Social Security number, or bank account number, to commit fraud or other crimes.
- A system that connects computers all over the world.
- A program that finds and removes viruses on a computer.
- A special name that identifies you on a computer system or website.
- A tool that lets you point and click on things on the computer.
- When someone uses the internet, a cell phone, or other device to send or post text or images intended to hurt or embarrass another person.
- A machine that helps us store and work with data.
- A level in the TLP system where information can't be shared and is very private.
- When your personal details are kept safe on the internet.
Down
- A level in the TLP system where information can be shared, but not with everybody.
- A tool in search engines that blocks bad content.
- Someone who breaks into computers or networks without permission.
- A bad program that can hurt your computer without you knowing.
- A level in the TLP system where information can be shared with anyone.
- Unwanted emails, often trying to sell things.
- A system used for sharing information safely and keeping the source of the information safe.
- A part of the computer that keeps bad things out.
- A place on the internet where you can find information, images, or videos.
- A tool that lets you type words, numbers, and symbols into a computer.
- A system for sending messages from one computer to another.
- A secret word or phrase that lets you use a computer or website.
- When you send a file from your computer to somewhere on the internet.
- When you get a file from the internet onto your computer.
26 Clues: Unwanted emails, often trying to sell things. • A tool in search engines that blocks bad content. • A part of the computer that keeps bad things out. • A machine that helps us store and work with data. • A way to send messages between computers instantly. • A system that connects computers all over the world. • A program that finds and removes viruses on a computer. • ...
Cyber Security and Laws 2022-10-17
Across
- subscription fraud can be achieved by sending "----- " requests to subscribers via the SS7 / GTP protocols
- EDI internet transmission protocols include ----- File Transfer Protocol (SFTP),
- Cyber ------ is use of the Internet or other electronic means to track someone
- The International Organization for ------- is referred as ISO
- EDI, which stands for electronic data interchange, is the intercompany ----------- of business documents in a standard format.
- GLBA is a United States federal law that requires ------ institutions to explain how they share and protect their customers’ private information
- is just one of the many frauds on the Internet, trying to fool people into parting with their money
Down
- PCI DSS is an acronym for “----- Card Industry Data Security Standard.”
- Counteracting cybercrime is ------------- , a technique used to protect computers, networks, programs, and data from exploitation.
- The ----- System 7 (SS7) industry standard and set of protocols were developed in 1975
- refers to the use of a computer to commit a crime
- is the legal process by which an arbiter or judge reviews evidence and argumentation.
12 Clues: refers to the use of a computer to commit a crime • The International Organization for ------- is referred as ISO • PCI DSS is an acronym for “----- Card Industry Data Security Standard.” • Cyber ------ is use of the Internet or other electronic means to track someone • EDI internet transmission protocols include ----- File Transfer Protocol (SFTP), • ...
expanding rights of various populations 2024-01-30
Across
- A woman is an adult female human
- "Second-generation" Japanese Americans born as the children of the issei.
- Highly trained professionals who operate aircraft during flights
- A member of an air force or air arm of a nation's armed forces.
- A cybersecurity professional who uses encryption codes to protect data and other sensitive information.
- Putting a person in prison or other kind of detention, generally in wartime
Down
- The biggest and deadliest war in history, involving more than 30 countries.
- A means of presenting information to commanders, staffs, or other designated audiences.
- An iconic poster of a female factory worker flexing her muscle, exhorting other women to join the World War II effort with the declaration that "We Can Do It!"
- Second most populous of all Native American peoples in the United States
- Containing or having everything that is needed within itself.
- The action of separating people, historically on the basis of race and/or gender.
12 Clues: A woman is an adult female human • Containing or having everything that is needed within itself. • A member of an air force or air arm of a nation's armed forces. • Highly trained professionals who operate aircraft during flights • Second most populous of all Native American peoples in the United States • ...
Security Bytes - March 2024 2024-02-28
Across
- A person who uses computers to gain unauthorised access to data.
- A network device that forwards data packets between computer networks
- Security techniques that use biological data for authentication.
- An encryption-based Internet security protocol
- A number of internet connected devices each of which is running one or more bots
Down
- a piece of software designed to update a computer program or its supporting data to fix or improve it.
- No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
- Software designed to detect and destroy computer viruses
- A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
- Highlighted policy in march security bytes newsletter
- A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
- The practice of protecting systems, networks and programs from digital attacks
12 Clues: An encryption-based Internet security protocol • Highlighted policy in march security bytes newsletter • Software designed to detect and destroy computer viruses • A person who uses computers to gain unauthorised access to data. • Security techniques that use biological data for authentication. • ...
Secure networking in the cloud 2024-03-26
Across
- is a segmented piece of a larger network
- a device used to connect two different networks, especially a connection to the internet
- a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- not physically existing as such but made by software to appear to do so
- the measure of a system's ability to increase or decrease in performance and cost in response to changes
Down
- a business or company
- it represents the network interface configuration for a virtual machine
- two or more computers that are linked in order to share resources
- is a border and it can be physical, or abstract
- a connection between two pieces of electronic equipment, or between a person and a computer
- a computer network security system that restricts internet traffic in to, out of, or within a private network
12 Clues: a business or company • is a segmented piece of a larger network • is a border and it can be physical, or abstract • two or more computers that are linked in order to share resources • not physically existing as such but made by software to appear to do so • it represents the network interface configuration for a virtual machine • ...
STEM Vocabulary: Digital Citizenship 2024-03-18
Across
- The skill of evaluating information and sources for accuracy, credibility, and relevance.
- The responsible and ethical use of technology and the internet.
- Harassment, threats, or negative behavior toward others on the internet or through digital devices.
- The quality and complexity of a password, which affects its vulnerability to hacking.
- Controls and options that allow individuals to manage the information they share online and who can access it.
Down
- The set of rules and norms for respectful behavior when communicating online.
- Copying or using someone else's work, ideas, or content without proper attribution or permission.
- A security process that requires users to provide two different authentication methods to access an account, enhancing security.
- The trail of information and data left behind by a person's online activities.
- The ability to use digital tools and technology effectively and responsibly.
- Measures and practices to protect digital devices, networks, and data from online threats.
- Individuals who seek to harm others through online interactions.
12 Clues: The responsible and ethical use of technology and the internet. • Individuals who seek to harm others through online interactions. • The ability to use digital tools and technology effectively and responsibly. • The set of rules and norms for respectful behavior when communicating online. • ...
Y9 Lesson 2 Cybersecurity 2025-09-04
Across
- A hacker secretly listens to or steals data while it's being sent between devices
- A harmful software designed to damage or steal information
- A hacker tricks people into giving away important information using lies or manipulation
- A hacker pretends to be someone else to trick you into giving up your personal info
Down
- A hacker puts bad information into a websites database to steal important data
- A hacker sends too many requests to make a website or service stop working
- A program that secretly records every key you press to steal information like passwords
- Attack A hacker tries different passwords until the find the right one to break into your account
8 Clues: A harmful software designed to damage or steal information • A hacker sends too many requests to make a website or service stop working • A hacker puts bad information into a websites database to steal important data • A hacker secretly listens to or steals data while it's being sent between devices • ...
Cybersecurity Lesson 3 & 4 Key Terms Crossword 2022-08-31
Across
- could be text-based works, computer programs, musical compositions, graphical creations and sound recordings.
- is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
- Malicious code that secretly watches your computer activity and sends the information over the Internet which can secretly capture your keystrokes (including passwords) and compromise your identity.
- means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the companies that provide the services and probably by your browser.
- is important for creating strong passwords.
- exposes you and your computer to cybersecurity vulnerabilities are known as viruses, malware, scams and identity theft.
- the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody without paying for it.
- enables an author to distribute their copyrighted work freely also offer the right to use, share and add to work from these authors.
Down
- works that are not copyrighted for any of a number of reasons.
- is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
- Fake e-mail message appearing to be from a trusted business, social network or other contact.
- Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer and spread by human actions such as sharing infected files.
- is the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
- is using someone else’s work and passing it off as your own.
- keeping your personal information safe and personal.
- protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account.
- Programs that look useful, but actually cause damage to your computer.
- downloading songs and movies from the Internet without permission or payment is an illegal use of copyrighted material.
- special types of viruses that can travel from computer to computer without human action, is self-replicating and can multiply until it uses up the computer's resources.
- URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
- are formal ways of giving credit to people for their work.
21 Clues: is important for creating strong passwords. • keeping your personal information safe and personal. • are formal ways of giving credit to people for their work. • is using someone else’s work and passing it off as your own. • works that are not copyrighted for any of a number of reasons. • Programs that look useful, but actually cause damage to your computer. • ...
Introduction to Cybersecurity New Year's Challenge 101 2024-01-01
Across
- Information that can be shared but only with your or your parents permission.
- Information can be shared but not with everybody.
- A tool that helps make sure you only see things on the internet that are safe for kids.
- Things that are just for you and not for sharing on the internet, like your password.
- It means keeping things a secret, especially your personal information like where you live or your full name.
- It's a massive, invisible web that lets you visit websites from all over the world right from your home.
- It's like sending a letter, but it's done on the computer and the person you're sending to gets it right away.
- It's like a secret code that lets you open a locked door, but instead, you're getting into your online games or learning apps.
- It's a place on the internet where you can read, watch videos, play games, and learn new things.
- It's like a smart TV you can type on and use to play games and learn new things.
- Just like picking a toy from a store shelf and bringing it home, but you're picking a game or a picture from the internet and putting it on your computer.
- It's just like the keyboard on a piano but instead of making music, this one is used to type words and numbers.
- It's like talking to a friend in person, but you're typing words on a computer instead.
- It's the name you use when you play games or learn online, so you don't have to use your real name.
- It's like a superhero shield that protects your computer from bad guys.
Down
- Being careful on the internet and not talking to strangers or sharing personal information like your address.
- It's the part of a computer or TV where the pictures and words show up.
- When you take a picture or write a story on your computer and then put it on the internet for others to see.
- A nasty bug that can make a computer sick, much like how a cold bug can make you sick.
- It's when someone tries to pretend they're you on the internet. They might try to take your password or other personal information.
- A small device you can move around to control what happens on your computer screen.
- A person who tries to break into computers and websites without permission, like a burglar, but online.
- Just like junk mail you get in your mailbox, but this comes in your email.
- Do not share this information (Social Security number, passwords). Very private.
- This is when someone uses the internet to be mean or tease someone else. It's important to tell an adult if this happens.
- It's like medicine for your computer. It helps to remove viruses and keeps your computer healthy.
26 Clues: Information can be shared but not with everybody. • It's the part of a computer or TV where the pictures and words show up. • It's like a superhero shield that protects your computer from bad guys. • Just like junk mail you get in your mailbox, but this comes in your email. • Information that can be shared but only with your or your parents permission. • ...
Crossword Puzzle of Computer-Topic: Browsing Safely 2025-05-16
Across
- It harm anyone using a computer and an internet connection.
- It is the act of sending an email to a user; misleading him to believe that it is from a trusted person.
Down
- It refers to an illegal entry into a computer system or network.
- It is a collection of technologies, processes and practices designed to protect network
- It is a program that disrupts the normal functioning of a computer.
5 Clues: It harm anyone using a computer and an internet connection. • It refers to an illegal entry into a computer system or network. • It is a program that disrupts the normal functioning of a computer. • It is a collection of technologies, processes and practices designed to protect network • ...
Y9 Lesson 2 Cybersecurity 2025-09-04
Across
- A hacker secretly listens to or steals data while it's being sent between devices
- A harmful software designed to damage or steal information
- A hacker tricks people into giving away important information using lies or manipulation
- A hacker pretends to be someone else to trick you into giving up your personal info
Down
- A hacker puts bad information into a websites database to steal important data
- A hacker sends too many requests to make a website or service stop working
- A program that secretly records every key you press to steal information like passwords
- Attack A hacker tries different passwords until the find the right one to break into your account
8 Clues: A harmful software designed to damage or steal information • A hacker sends too many requests to make a website or service stop working • A hacker puts bad information into a websites database to steal important data • A hacker secretly listens to or steals data while it's being sent between devices • ...
Y9 Lesson 2 Cybersecurity 2025-09-04
Across
- A hacker secretly listens to or steals data while it's being sent between devices
- A harmful software designed to damage or steal information
- A hacker tricks people into giving away important information using lies or manipulation
- A hacker pretends to be someone else to trick you into giving up your personal info
Down
- A hacker puts bad information into a websites database to steal important data
- A hacker sends too many requests to make a website or service stop working
- A program that secretly records every key you press to steal information like passwords
- Attack A hacker tries different passwords until the find the right one to break into your account
8 Clues: A harmful software designed to damage or steal information • A hacker sends too many requests to make a website or service stop working • A hacker puts bad information into a websites database to steal important data • A hacker secretly listens to or steals data while it's being sent between devices • ...
Security Awareness crossword puzzle 2018-05-07
Across
- _______ your data regularly and periodically check that you are able to restore them.
- Do not provide your _______ email account to social networks.
- _______ your computer when left unattended.
- This can slow down your computer and watch everywhere you go on the Internet.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Always use _______ factor authentication where available.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Use a _______ password different from the passwords you use to access other sites.
Down
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- You should always keep your software and anti-virus definitions up-to-_______.
- Cybersecurity is _______'s responsibility.
- Information Security is a _______ issue.
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- _______ before you click or forward.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
CyberQuiz 2024-02-05
Across
- Software that detects and removes malicious programs on a computer
- Cyber attack attempting to discover a password or cryptographic key by trying all possible combinations
- System designed to mimic a vulnerable resource to attract and monitor cyber attacks
- Malware that encrypts user data, demanding payment for decryption
- Secret or hidden access point in a system, often used to bypass normal authentication
- Code or sequence of commands exploiting a system vulnerability for unauthorized access
Down
- Activity where an attacker pretends to be someone else or manipulates information to appear from a trusted source
- Cyber attack aiming to obtain sensitive information by posing as a trustworthy source
- Weakness or flaw in a system that could be exploited for unauthorized access
- A sequence of characters used for authentication to access a system or account
- Hidden part of the internet associated with illicit activities and anonymity
- Team Group of specialists simulating attacks on a system or network to identify vulnerabilities
- Security system that monitors and controls network traffic
- Team Defensive cybersecurity team responsible for protecting a system or network.
- Network of compromised computers controlled by a single entity for malicious activities
15 Clues: Security system that monitors and controls network traffic • Malware that encrypts user data, demanding payment for decryption • Software that detects and removes malicious programs on a computer • Weakness or flaw in a system that could be exploited for unauthorized access • Hidden part of the internet associated with illicit activities and anonymity • ...
Browsing safely 2025-06-14
Across
- he practice of protecting networks, applications, sensitive information, and users from cyber attacks
- repeated harmed through the use of computers, cell phones, and other electronic devices
- a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
- type of computer program that's designed to seek out and remove computer viruses that have infected
- data that directly follow either by clicking
- when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
- text files with small data
- a threat that involves sending email messages with a fake sender address
Down
- the process of befriending someone online and make them do a physical meeting and physically harm them
- unauthorized users who gain access to computers in order to steal, alter, or delete data
- appears when an application wants you to pay attention.
- software that spreads between computers and causes damage to data and software.
- illegal activities involving computers, networks, or the internet as a tool to commit attacks.
- deceive people into revealing sensitive information or installing malware
- Web pages, links in one domain
15 Clues: text files with small data • Web pages, links in one domain • data that directly follow either by clicking • appears when an application wants you to pay attention. • a threat that involves sending email messages with a fake sender address • deceive people into revealing sensitive information or installing malware • ...
WHO Identifies Risk 2024-07-02
Across
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
Down
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
WHO Identifies Risk 2024-07-02
Across
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
Down
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
The Need for Cybersecurity - Chapter 1 2023-08-14
Across
- esfuerzo continuo para proteger los sistemas en red conectados a Internet y para proteger todos los datos del uso no autorizado o daño
- confidentiality, integrity, y availability
- el término que indica exactitud, consistencia y confiabilidad de los datos
- códigos de comportamiento que a veces, pero no siempre, son impuestos por leyes
- una gran red de objetos físicos que incluye sensores y equipos
- un conflicto basado en Internet que involucra la penetración de sistemas informáticos y redes de otras naciones
Down
- el acceso a los datos está restringido solo al personal autorizado
- International Multilateral Partnership Against Cyber Threats
- el término que describe los servicios y datos que se mantienen bien y se puede acceder a ellos todo el tiempo
- un programa de malware diseñado para dañar la planta de enriquecimiento nuclear de Irán, un programa que es un ejemplo de un ataque patrocinado por el estado
10 Clues: confidentiality, integrity, y availability • International Multilateral Partnership Against Cyber Threats • una gran red de objetos físicos que incluye sensores y equipos • el acceso a los datos está restringido solo al personal autorizado • el término que indica exactitud, consistencia y confiabilidad de los datos • ...
ISM CROSSWORD PUZZLE 2025-07-04
Across
- the owner of the ship or any other organization or person such as the manager, or the bareboat charterer, who has assumed the responsibility for operation of the ship from the shipowner and who, on assuming such responsibility, has agreed to take over all the duties and responsibility imposed by the Code.
- Interim DOC is issued for ___ months
- A statement of fact made during a safety management audit and substantiated by objective evidence
- Personnel carrying audits should be _____ of the areas being audited
- A sequence of events and/or conditions that could have resulted in loss
Down
- Risk=Likelihood X ______
- Quantitative or qualitative information records or statement
- Resolution MSC.428 (98) mandates that these risks be addressed in compliance with the International Safety Management (ISM) Code.
- The position ISM Clause 4 is centered around
- Acronym which indicates that the risk should be lowered as low as reasonably practicable
10 Clues: Risk=Likelihood X ______ • Interim DOC is issued for ___ months • The position ISM Clause 4 is centered around • Quantitative or qualitative information records or statement • Personnel carrying audits should be _____ of the areas being audited • A sequence of events and/or conditions that could have resulted in loss • ...
Cyber security 2022-09-07
Across
- An important process that verifies a user is really who they are; many different ways this can be done
- I am not a robot
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
- a collection of malware infested computers that form a network to attack
- A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
Down
- Full name of DoS attack
- An annoying malware that spams you with ads
- When raw data is put into context and has meaning, the data transforms into _____
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
10 Clues: I am not a robot • Full name of DoS attack • An annoying malware that spams you with ads • a collection of malware infested computers that form a network to attack • When raw data is put into context and has meaning, the data transforms into _____ • Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing. • ...
FBLA Competitions Challenge 2025-10-13
Across
- The machinery and equipment developed from the application of scientific knowledge.
- The practice of protecting systems, networks, and data from digital attacks, ensuring the confidentiality, integrity, and availability of information.
- A formal meeting in which an applicant is asked questions to determine their suitability for a particular job.
- The art of effectively delivering information, ideas, or messages to an audience.
- A commercial operation or company.
- The activity, set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large.
Down
- The process of creating, developing, and managing a new business venture with the goal of making a profit.
- The responsibility for and control of a company or organization
- The branch of knowledge concerned with the production, consumption, and transfer of wealth.
- A crucial function in business that involves the collection, tracking, and correction of financial data.
10 Clues: A commercial operation or company. • The responsibility for and control of a company or organization • The art of effectively delivering information, ideas, or messages to an audience. • The machinery and equipment developed from the application of scientific knowledge. • ...
Superb Security Crossword Challenge 2020-05-07
Across
- An unpatched laptop is … to an attack or how you feel when you finish watching “The Notebook”
- The highest level of privilege which can be exposed (Windows)
- Unlawful data exposure
- …..engineering refers to the method attackers use to manipulate people into sharing sensitive information
- Converts passwords to unreadable strings or a good way to prepare potatoes
- What makes your laptop/PC sick
- Cybersecurity is our shared...
- …..identifiable information is any data that could potentially identify a specific individual
- Bad junk emails
- European privacy law
- Bad for your laptop/PC, but helpful to aerate the garden
Down
- Everyone has these and they are unique to each person
- Malware that misleads users of its true intent, or a big wooden horse
- Technology that extends a private network across a public network
- Should contain a minimum of 9 characters using a combination of upper case letters, lower case letters, numbers, and special characters.
- A guy in a hoodie, in his mom’s basement, trying to access your personal data
- Tool for stealing credit cards
- Ransomware that affected NHS in 2017, or what you want to do when you realize you might have this malware
- A malicious program designed to record which keys are being pressed on a computer keyboard
- Don't click on….within emails from an unknown or untrusted source.
20 Clues: Bad junk emails • European privacy law • Unlawful data exposure • Tool for stealing credit cards • What makes your laptop/PC sick • Cybersecurity is our shared... • Everyone has these and they are unique to each person • Bad for your laptop/PC, but helpful to aerate the garden • The highest level of privilege which can be exposed (Windows) • ...
FITE Vocab: Hailey Hobbs 2013-05-16
Across
- to cite or quote a reference
- one thousand exabytes
- one million bytes
- close up preview of a template
- one thousand megabytes
- communications sent without wires or cables
- LCD
- eight bytes
- large circuit board
- symbol for a company
- computer software used to search data
- network name
- port that connects the mouse or keyboard to PC
- Ex: monitor, printer
- a thousand bytes
- appearence of a document
- plug your flashdrive into
- wireless home network
- wired internet
- one thousand brontobytes
Down
- zoomable presentation program
- arrangement of data for a computer
- a device that has a lot of data storage
- protection of information computer/networks
- one thousand gigabytes
- smallest unit of data
- one thousand petabytes
- computer screen
- anything you can create something on
- LAD
- search engine that checks all search engines
- Ex:comcast,verizon
- one thousand terabytes
- Ex: flash drive,earbuds
- one thousand zetabytes
- document or file made with a preset format
- personal conduct online
- rules to keep people safe online
- any type of internet hosting service
- ceremonial induction into office
- Ex: mouse, flash drive
- one thousand yottabytes
- a short memorable phrase for advertising
- a way to save a file in adobe
- Ex: headphones, speakers
45 Clues: LAD • LCD • eight bytes • network name • wired internet • computer screen • a thousand bytes • one million bytes • Ex:comcast,verizon • large circuit board • symbol for a company • Ex: monitor, printer • one thousand exabytes • smallest unit of data • wireless home network • one thousand gigabytes • one thousand petabytes • one thousand megabytes • one thousand terabytes • one thousand zetabytes • ...
The 2023 Learning & Development Crossword 2023-11-28
Across
- How you prioritize personal and professional activities in your life.
- A human-centered approach to problem solving.
- measures your ability to identify, understand, and manage your emotions and the emotions of others.
- Communication that is delivered by way of visual aids.
- type of malware attack used by thieves to kidnap your data or files and hold them hostage until you pay them a ransom.
- The established set of attitudes held by someone.
- Acting in a way that makes others view you as trustworthy, respectful, accountable competent, and effective.
- Communication that takes the form of anything you write or type.
- A more senior, successful, or skilled professional who regularly provides guidance and gives you advice based on their own experience and expertise.
- measures someone's ability to adapt.
Down
- Exploratory, spontaneous, and unrestricted.
- Brings your attention to the here and now.
- Computer systems that can learn and adapt without direct human intervention.
- Initiation, planning, execution, and closure.
- the art of protecting networks, devices, and data from unauthorized access
- efficiently accomplishing tasks that bring you closer to your goals
- Communication that uses spoken word or language.
- Capability of a machine to imitate intelligent human behavior through automation of various types of tasks.
- Method of trying to gather personal information using deceptive e-mails and websites.
- Communication that includes facial expressions, posture, eye contact, etc.
20 Clues: measures someone's ability to adapt. • Brings your attention to the here and now. • Exploratory, spontaneous, and unrestricted. • A human-centered approach to problem solving. • Initiation, planning, execution, and closure. • Communication that uses spoken word or language. • The established set of attitudes held by someone. • ...
informatika 2025-04-10
Across
- Profesi yang bertugas mengelola basis data
- Salah satu bentuk karya yang dilindungi hak cipta
- Kata yang digunakan untuk mencari situs tertentu di Google adalah
- Salah satu unsur budaya yang bisa dikemas dalam bentuk konten digital seperti tarian
- Proses mengecek kebenaran konten disebut
- Media yang digunakan untuk menyebarkan konten video budaya secara luas
- Orang yang merancang dan membangun perangkat lunak
- Lembaga yang bertugas menyaring konten internet di Indonesia
- Konten budaya daerah bisa memperkenalkan lokal ke dunia
- Hak atas penemuan atau inovasi teknologi disebut
- intelektual Hak cipta termasuk bagian dari
- Kata kunci untuk mencari semua kata dalam satu hasil pencarian adalah
- Hasil pencarian umumnya ditampilkan dalam bentuk daftar yang seringkali diurutkan menurut tingkat akurasi ataupun rasio pengunjung atas suatu berkas yang disebut
- Teknik untuk mengidentifikasi informasi palsu di internet
- Profesi yang fokus pada keamanan jaringan dan data
Down
- Kegiatan mengirimkan atau menyebarluaskan konten disebut juga
- Lembaga yang mengatur HAKI di Indonesia
- Profesi yang membuat tampilan antarmuka aplikasi atau web
- Salah satu mesin pencari pertama yang sekarang berkembang menjadi usaha komersial yang cukup besar adalah
- Salah satu jenis konten negatif yang menyebarkan kebencian
- Konten yang bersifat merugikan atau menyesatkan
- Search engine paling populer di dunia saat ini adalah
- Istilah lain untuk ahli komputer
- Singkatan dari hak yang melindungi hasil karya cipta
- Proses membuat konten digital disebut sebagai
25 Clues: Istilah lain untuk ahli komputer • Lembaga yang mengatur HAKI di Indonesia • Proses mengecek kebenaran konten disebut • Profesi yang bertugas mengelola basis data • intelektual Hak cipta termasuk bagian dari • Proses membuat konten digital disebut sebagai • Konten yang bersifat merugikan atau menyesatkan • Hak atas penemuan atau inovasi teknologi disebut • ...
Cruci Distretto 2025-03-03
Across
- - Sistema di protezione delle reti da accessi non autorizzati.
- - Insieme di regole per la comunicazione tra dispositivi.
- - Intelligenza artificiale, sistema che simula l'intelligenza umana.
- COMPUTING - Utilizzo di risorse e servizi tramite Internet.
- - Linguaggio di programmazione orientato agli oggetti.
- - Creazione di versioni virtuali di risorse hardware e software.
- DATA - Raccolta e analisi di grandi volumi di dati.
- - Automazione dei processi tramite software robot.
- - Protezione dei dati da accessi non autorizzati.
- - Computer che fornisce servizi o risorse a client.
- - Processo di creazione e miglioramento di software.
- - Sistema operativo open source.
- - Processo di protezione dei dati tramite codifica.
Down
- - Tecnologie di identificazione basate su caratteristiche fisiche.
- - Tecnologia di registrazione distribuita, usata in criptovalute.
- - Modello di computing che offre risorse tramite internet.
- SCRIPT - Linguaggio di programmazione per creare interattività nelle pagine web.
- LEARNING - Sottocategoria dell'AI che permette ai sistemi di apprendere dai dati.
- - Dispositivo che instrada pacchetti di dati tra reti.
- - Sistema per organizzare e archiviare dati.
- - Interfaccia di programmazione per la comunicazione tra software.
- - Processi logici per risolvere problemi informatici.
- - Pratiche e tecnologie per proteggere i sistemi informatici.
- - Sequenza di operazioni per risolvere un problema.
- - Linguaggio di markup per la creazione di pagine web.
- - Indirizzo numerico univoco di un dispositivo in una rete.
- - Processo di individuazione e correzione degli errori nel codice.
- - Tecnologia per creare una rete privata sicura su internet.
- - Dispositivo che riceve servizi da un server.
- - Linguaggio usato per stilizzare le pagine web.
30 Clues: - Sistema operativo open source. • - Sistema per organizzare e archiviare dati. • - Dispositivo che riceve servizi da un server. • - Linguaggio usato per stilizzare le pagine web. • - Protezione dei dati da accessi non autorizzati. • - Automazione dei processi tramite software robot. • - Sequenza di operazioni per risolvere un problema. • ...
TEKA-TEKI SILANG INFORMATIKA BAB 1-3 2025-06-04
Across
- Istilah untuk keamanan jaringan komputer dari serangan.
- Alat yang digunakan untuk mengoutput data ke layar.
- Jenis perangkat keras yang digunakan untuk menyimpan data cadangan.
- Alat yang digunakan untuk mengontrol komputer.
- Alat yang digunakan untuk memperluas jaringan Wi-Fi ke area yang lebih luas
- Istilah untuk sistem operasi komputer.
- Alat yang digunakan untuk mencetak dokumen.
- Alat yang digunakan untuk menginput data tulisan tangan.
- Istilah untuk sistem komputer yang terintegrasi.
- Jenis perangkat lunak yang digunakan untuk mengedit video.
- Istilah untuk pengiriman data melalui internet.
Down
- Jenis perangkat keras yang digunakan untuk memproses data.
- Istilah untuk sistem operasi mobile.
- Alat yang digunakan untuk mengontrol jaringan komputer.
- Istilah untuk jaringan komputer yang luas.
- Jenis perangkat keras yang digunakan untuk menyimpan data.
- Alat yang digunakan untuk menginput data suara.
- Alat yang digunakan untuk mengakses data dari jarak jauh.
- Istilah untuk jaringan komputer yang menggunakan teknologi wireless.
- Alat yang digunakan untuk mengakses internet.
- Jenis perangkat lunak yang digunakan untuk mengolah presentasi.
- Istilah untuk pengumpulan data.
- Istilah untuk keamanan data.
- Alat yang digunakan untuk menginput data ke komputer.
- Jenis perangkat lunak yang digunakan untuk mengedit gambar.
- Alat yang digunakan untuk menyimpan data sementara.
- Bahasa pemrograman yang digunakan untuk membuat website.
- Istilah untuk pengiriman data melalui jaringan.
- Jenis perangkat lunak yang digunakan untuk mengolah angka.
- Istilah untuk jaringan
- Istilah untuk keamanan jaringan komputer.
31 Clues: Istilah untuk jaringan • Istilah untuk keamanan data. • Istilah untuk pengumpulan data. • Istilah untuk sistem operasi mobile. • Istilah untuk sistem operasi komputer. • Istilah untuk keamanan jaringan komputer. • Istilah untuk jaringan komputer yang luas. • Alat yang digunakan untuk mencetak dokumen. • Alat yang digunakan untuk mengakses internet. • ...
FITCVocab.hj 2013-05-15
Across
- 1000 megabytes
- primary circuit board
- EX: Google
- mouse with ball
- how you act online
- what ISP stands for
- peripheral you drag across a flat surface
- program stored an internet server
- pocket sized computing device
- 1000 gigabytes
- catch phrase
- behavior to keep you safe online
- "mouse" for laptops
- one page document about your life
- front of the program
- what cpu stands for
- abbreviation for document
- predesigned document
- the oath the president has to say during inauguration
- mouse with laser
- protection of information on the internet
- file format that can be viewed on any computer
- 1000 bytes
- 1000 kilobytes
Down
- selection of editing tools
- no wire
- device that sends and receives signals
- ports where you put flash-drives
- wireless fidelity
- internet and online
- search engine that searches other search engines
- what ram stands for
- service set identification
- smallest piece of information
- what SSID stands for
- serves information to other computers on a network
- piece of written matter
- what rtf stands for
- graphic symbol for a company
- 8 bits
- one canvas you can put anything on
- able to occur together without conflict
- computer screen
- where you put headphones
- long term memory
45 Clues: 8 bits • no wire • EX: Google • 1000 bytes • catch phrase • 1000 megabytes • 1000 gigabytes • 1000 kilobytes • mouse with ball • computer screen • long term memory • mouse with laser • wireless fidelity • how you act online • internet and online • what ram stands for • what ISP stands for • what rtf stands for • "mouse" for laptops • what cpu stands for • what SSID stands for • front of the program • ...
E BLOCK TECH Michael Rizza 2013-05-16
Across
- a little bit more memory then a byte
- Geting increased in you group
- the hardware that is in you keyboard
- the way you arrange your file
- The lowest storage unit
- how you act online
- The ability of putting something into something else
- a more advanced search engine
- Without wires
- Your sybol for you company
- National Cyber Security Alliance
- wired internet
- Copying someone elses item
- Screen
- A typed document
- an oath that the president has to say
- The ability of taking something out of something else
- Liquid crystal display
- Photo file
- zoomable online presitation program
- A typed document of your skills
Down
- Claiming something yours
- memory storage
- your saying for your company
- the act of being secure online
- the heart of the computer
- Wireless Internet
- Security online
- How you edit your format
- Display Unit
- a small box that shows you how your document looks
- A searching website
- Random memory
- comcast
- what font,text size,bold,etc.
- Internet
- Largest unit of data
- TB
- the wiring in your computer
- A piece of folded paper that advertises something
- the theme you pick for you document
- to startup something
- a file that stores music
- Operating system
- A peripheral that controls your mouse
45 Clues: TB • Screen • comcast • Internet • Photo file • Display Unit • Random memory • Without wires • memory storage • wired internet • Security online • A typed document • Operating system • Wireless Internet • how you act online • A searching website • Largest unit of data • to startup something • Liquid crystal display • The lowest storage unit • Claiming something yours • How you edit your format • ...
Vocabulary Unit 5-10 2023-09-03
Across
- Reliability
- Rapid increase in numbers
- the use of exciting or shocking stories or language at the expense of accuracy, in order to provoke public interest or excitement.
- tendency to believe things too quickly or easily
- A precise sequence of instructions for processes that can be executed by a computer
- a practical joke; a trick
- Honesty
- Our love affair with technology; enthusiasm for technology
- Having to do with morals, values, right and wrong
- To ban or cover some of the information
- An improvement of an existing technological product, system, or method of doing something.
- A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually
- A technique that is used to make a process automatic.
Down
- Incorporating misleading information into one's memory of an event
- not supported or proven by evidence
- Protection of computer systems, networks, and data from digital attacks.
- A new idea, method, or device
- having or revealing keen insight and good judgment
- A technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
- working the body harder than it is normally worked
- the quality of being believable or trustworthy
- the use of digital technologies to change a business model and provide new revenue or value
- Willingness to take credit and blame for actions.
- the right of people not to reveal information about themselves
24 Clues: Honesty • Reliability • Rapid increase in numbers • a practical joke; a trick • A new idea, method, or device • not supported or proven by evidence • To ban or cover some of the information • the quality of being believable or trustworthy • tendency to believe things too quickly or easily • Having to do with morals, values, right and wrong • ...
it 2024-10-07
Across
- / Provides tech support to end-users.
- / Manages and processes health data through technology.
- / Designs and develops computer hardware.
- / Creates animations for various media formats.
- / Writes and tests code for software applications.
- / Manages cloud computing services.
- / Provides hardware and software support.
- / Protects systems and data from cyber threats.
- / Leads and oversees an organization’s IT strategy.
- / Assesses the security and reliability of IT systems.
- / Finds and hires IT professionals for companies.
- / Interprets data to help businesses make decisions.
- / Conducts investigations to advance IT knowledge.
- / Designs and manages complex database systems.
- / Manages and maintains websites.
- / Tests software for bugs and performance issues.
Down
- / Tests systems for vulnerabilities, ethically.
- / Designs the user interface of digital products.
- / Creates apps for various platforms.
- / Manages and maintains computer networks.
- / Builds and develops software programs.
- / Designs and builds communication networks.
- / Improves user experience in products or services.
- / Analyzes and resolves tech issues for companies.
- / Handles and processes large datasets.
- / Manages and coordinates IT services.
- / Studies the theoretical foundations of computing.
- / Designs and creates websites.
- / Plans and implements computer networks.
- / Analyzes complex data to gain insights.
- / Develops, tests, and maintains software.
- / Examines and improves information systems.
- / Designs and implements systems for business operations.
- / Specializes in securing communications through encryption.
34 Clues: / Designs and creates websites. • / Manages and maintains websites. • / Manages cloud computing services. • / Provides tech support to end-users. • / Creates apps for various platforms. • / Manages and coordinates IT services. • / Handles and processes large datasets. • / Builds and develops software programs. • / Designs and develops computer hardware. • ...
terms 2023-02-15
Across
- identity theft
- exclusive rights
- a way to change the flow of the code
- a loop to repeat code a fixed number of times
- the programs that can be ran on a computer
- a problem when using a while loop where you forget one action at the beginning or end
- a world or karel word is a grid where karel lives
- code you put inside an if statement or while-loop
- the physical components of a computer
- a computer security specialist
- attempt to find computer security vulnerabilities for personal financial gain
- teaching new commands to karel
Down
- protection of computers
- the version that already knows how to turn right and turn around
- lets us repeat code as long as somethings true
- a device that makes calculations
- network of physical devices
- lets you ask a question to the program and only run code if its true
- saying the function
- the part of the funtion that contains the commands
- bullying online
- a command is an instruction you can give karel
- a way to repeat code
- a naming convention where the first letter is lowercase
- not subject to copyright
- threatens to publish data
- control structure that lets us do either one section of code or another depending on a test
- using charts
- managing complexity by abstracting away information and detail
29 Clues: using charts • identity theft • bullying online • exclusive rights • saying the function • a way to repeat code • protection of computers • not subject to copyright • threatens to publish data • network of physical devices • a computer security specialist • teaching new commands to karel • a device that makes calculations • a way to change the flow of the code • ...
Globalisasi dan masyarakat digital 2024-10-24
Across
- Apa istilah untuk transaksi jual-beli barang atau jasa yang dilakukan melalui internet
- fenomena ketika budaya lokal terpengaruh budaya asing
- Perpindahan massal penduduk dari desa ke kota besar disebut
- jaringan global yang menghubungkan komputer dan perangkat di seluruh dunia
- Kelompok penentang globalisasi menganggap perdagangan bebas terkait dengan kapitalisme, menjadi tantangan di bidang
- Globalisasi menghilangkan hambatan perdagangan antarnegara, menciptakan kesejahteraan. Ini pandangan globalisasi bagi kelompok masyarakat
- Sistem ekonomi di mana pasar bebas menentukan produksi dan harga barang tanpa intervensi negara
- Proses integrasi ekonomi, budaya, dan teknologi di seluruh dunia yang mempengaruhi cara masyarakat berinteraksi disebut
- Tindakan kejahatan dengan mencuri informasi pribadi di internet disebut
- Istilah untuk pengaruh budaya asing yang diadopsi dan mengubah gaya hidup masyarakat lokal
Down
- Apa istilah untuk penyebaran produk, merek, dan tren yang sama di berbagai negara
- Perubahan perilaku masyarakat akibat kemajuan teknologi disebut
- Jenis keamanan yang melindungi data dan informasi pribadi di dunia maya
- Masyarakat yang terhubung secara global melalui teknologi informasi disebut
- Apa istilah untuk perusahaan yang memiliki cabang dan beroperasi di berbagai negara
- Berkembangnya internet mempermudah akses informasi bagi masyarakat di seluruh dunia. Hal ini merupakan dampak globalisasi di bidang
- Fenomena masuknya tenaga kerja asing yang bisa mengancam pekerjaan lokal disebut
- Salah satu risiko yang dihadapi dalam masyarakat
- proses berbagi informasi dan ide melalui media sosial
- Fenomena penyebaran informasi palsu atau menyesatkan melalui internet disebut
20 Clues: Salah satu risiko yang dihadapi dalam masyarakat • fenomena ketika budaya lokal terpengaruh budaya asing • proses berbagi informasi dan ide melalui media sosial • Perpindahan massal penduduk dari desa ke kota besar disebut • Perubahan perilaku masyarakat akibat kemajuan teknologi disebut • Jenis keamanan yang melindungi data dan informasi pribadi di dunia maya • ...
TEKA-TEKI INFORMATIKA BAB 1-3 2025-06-04
Across
- Istilah untuk keamanan jaringan komputer dari serangan.
- Alat yang digunakan untuk mengoutput data ke layar.
- Jenis perangkat keras yang digunakan untuk menyimpan data cadangan.
- Alat yang digunakan untuk mengontrol komputer.
- Alat yang digunakan untuk memperluas jaringan Wi-Fi ke area yang lebih luas
- Istilah untuk sistem operasi komputer.
- Alat yang digunakan untuk mencetak dokumen.
- Alat yang digunakan untuk menginput data tulisan tangan.
- Istilah untuk sistem komputer yang terintegrasi.
- Jenis perangkat lunak yang digunakan untuk mengedit video.
- Istilah untuk pengiriman data melalui internet.
Down
- Jenis perangkat keras yang digunakan untuk memproses data.
- Istilah untuk sistem operasi mobile.
- Alat yang digunakan untuk mengontrol jaringan komputer.
- Istilah untuk jaringan komputer yang luas.
- Jenis perangkat keras yang digunakan untuk menyimpan data.
- Alat yang digunakan untuk menginput data suara.
- Alat yang digunakan untuk mengakses data dari jarak jauh.
- Istilah untuk jaringan komputer yang menggunakan teknologi wireless.
- Alat yang digunakan untuk mengakses internet.
- Jenis perangkat lunak yang digunakan untuk mengolah presentasi.
- Istilah untuk pengumpulan data.
- Istilah untuk keamanan data.
- Alat yang digunakan untuk menginput data ke komputer.
- Jenis perangkat lunak yang digunakan untuk mengedit gambar.
- Alat yang digunakan untuk menyimpan data sementara.
- Bahasa pemrograman yang digunakan untuk membuat website.
- Istilah untuk pengiriman data melalui jaringan.
- Jenis perangkat lunak yang digunakan untuk mengolah angka.
- Istilah untuk jaringan
- Istilah untuk keamanan jaringan komputer.
31 Clues: Istilah untuk jaringan • Istilah untuk keamanan data. • Istilah untuk pengumpulan data. • Istilah untuk sistem operasi mobile. • Istilah untuk sistem operasi komputer. • Istilah untuk keamanan jaringan komputer. • Istilah untuk jaringan komputer yang luas. • Alat yang digunakan untuk mencetak dokumen. • Alat yang digunakan untuk mengakses internet. • ...
tugas daring kelas 10i-Moch Bagas Dwi Ramadhan(22) 2025-04-17
Across
- Hak atas penemuan baru di bidang teknologi atau produk.
- Operator pencarian yang digunakan untuk mencari kata-kata yang tepat dalam tanda kutip.
- Profesi yang bertanggung jawab atas keamanan data dan jaringan.
- Bentuk konten digital yang menampilkan narasi sejarah atau budaya daerah dalam format audio.
- Platform populer untuk menyebarkan konten budaya secara luas melalui video.
- Hak atas merek dagang, logo, atau simbol suatu produk.
- Orang yang membuat tampilan antarmuka pengguna aplikasi.
- Mesin pencari paling populer di dunia.
- Orang yang membuat tampilan antarmuka pengguna aplikasi.
- Hak eksklusif atas karya tulis, musik, atau karya seni lainnya.
- Proses membuat konten digital yang berisi cerita, gambar, atau video budaya lokal.
Down
- Konten yang berisi informasi palsu dan sengaja disebarkan untuk menipu.
- Proses mengklasifikasikan konten berdasarkan tingkat bahaya atau pelanggaran.
- Profesi yang mengelola dan memelihara jaringan komputer.
- Pihak atau sistem yang melakukan pengecekan terhadap kebenaran sebuah konten.
- pembuatan konten digital yang mengangkat unsur budaya lokal seperti makanan khas atau pakaian adat.
- Lembaga di Indonesia yang mengurus pendaftaran HAKI.
- Kata kunci yang digunakan untuk mencari halaman yang berisi link ke situs tertentu.
- Jenis HAKI yang melindungi desain suatu produk industri.
- Profesi yang menganalisis data untuk membantu pengambilan keputusan.
- Proses memastikan bahwa informasi yang disebarkan tidak mengandung unsur hoaks atau fitnah.
- Syntax pencarian untuk mengecualikan kata tertentu dari hasil pencarian.
- Jenis konten yang dapat merugikan, menyesatkan, atau membahayakan pengguna.
- Singkatan dari teknik mengoptimalkan situs agar mudah ditemukan di mesin pencari.
24 Clues: Mesin pencari paling populer di dunia. • Lembaga di Indonesia yang mengurus pendaftaran HAKI. • Hak atas merek dagang, logo, atau simbol suatu produk. • Hak atas penemuan baru di bidang teknologi atau produk. • Profesi yang mengelola dan memelihara jaringan komputer. • Jenis HAKI yang melindungi desain suatu produk industri. • ...
TEKA-TEKI SILANG INFORMATIKA KELAS IX (2) 2024-11-05
Across
- Tanda pagar (#) yang digunakan untuk mengategorikan postingan di media sosial
- Tombol yang digunakan untuk menyukai atau memberikan tanda setuju pada suatu postingan
- Video blog, seringkali berisi konten pribadi atau tutorial
- Aplikasi yang digunakan untuk membuat presentasi dengan slide
- Situs web pribadi yang berisi tulisan-tulisan atau artikel secara teratur
- Program komputer yang digunakan untuk membuat dokumen seperti surat atau laporan
- Jaringan sosial yang fokus pada berbagi foto dan video singkat
- Praktik untuk melindungi sistem teknologi dan data dari ancaman digital, seperti kejahatan siber
- Format file dokumen yang umum digunakan (singkatan)
Down
- perangkat keras yang digunakan untuk mengontrol kursor di layar komputer
- Surat elektronik atau electronic mail yang merupakan cara untuk mengirim dan menerima pesan secara digital melalui jaringan internet
- Orang yang membuat dan mengunggah video ke YouTube atau platform serupa
- kegiatan yang dilakukan untuk mendapatkan akses tidak sah ke sistem atau jaringan komputer
- Program pengolah lembar kerja untuk mengelola data dalam bentuk tabel
- Platform online yang memungkinkan pengguna untuk berbagi informasi dan berinteraksi dengan orang lain
- Platform online yang memungkinkan pengguna untuk berkolaborasi pada dokumen secara bersamaan
- Orang yang membuat dan mengelola sebuah blog
- Platform berbagi video terbesar di dunia
- Bahasa pemrograman visual yang dirancang untuk membantu anak-anak dan pemula belajar pemrograman
- perangkat keras yang berfungsi untuk menampilkan data visual dari komputer, seperti gambar, teks, video, dan grafik
20 Clues: Platform berbagi video terbesar di dunia • Orang yang membuat dan mengelola sebuah blog • Format file dokumen yang umum digunakan (singkatan) • Video blog, seringkali berisi konten pribadi atau tutorial • Aplikasi yang digunakan untuk membuat presentasi dengan slide • Jaringan sosial yang fokus pada berbagi foto dan video singkat • ...
Information and Communication Technology 2023-02-23
Across
- - The practice of protecting computer systems and networks from digital attacks.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Programs and applications that run on a computer or mobile device.
- - Software designed to harm computer systems or steal data.
- system - The software that manages a computer's basic functions, such as memory and file systems.
- computing - A model for delivering computing resources over the internet.
- - An input device used for moving the cursor on a computer screen.
- - A device used for processing data and running programs.
- - The process of designing and writing code for software applications.
- - An output device that prints text and images on paper.
Down
- - An input device used for typing text and commands.
- - A type of malicious software that can damage or disrupt computer systems.
- - A structured collection of data that is stored and organized in a computer.
- - A global network of interconnected computer networks.
- - A device that connects multiple devices to a network and directs traffic between them.
- - A device that connects a computer to the internet.
- - The process of converting data into a code to prevent unauthorized access.
- - The physical components of a computer system, such as the CPU, hard drive, and motherboard.
- - A step-by-step procedure for solving a problem or accomplishing a task.
- - An output device that displays images and text.
20 Clues: - An output device that displays images and text. • - An input device used for typing text and commands. • - A device that connects a computer to the internet. • - A global network of interconnected computer networks. • - An output device that prints text and images on paper. • - A device used for processing data and running programs. • ...
Safety Crossword Challenge 2022-05-04
Across
- practice runs for tornado and fire
- name of our MTA Safety Trainer (2 words)
- protect your noggin' with this (2 words)
- appendix F in the ERP includes locations of this (2 words)
- it is your ______ to work safely and report hazards
- do not do this to fire extinguisher locations
- creating a good fit between an employee and what they do is the main concept of this
- two types of CPR, traditional with breaths and ___ (2 words)
- virus caused by mosquitoes (2 words)
- overloading this warehouse equipment can be very dangerous
Down
- this hazard can be truly shocking
- occurs when you use or lose more fluid than you take in
- safety data sheet section number for Fire Fighting Measures
- where you can access PR safety manual, ERP, and safety data sheets easily
- practice of protecting systems, networks and programs from digital attacks
- what to do should you catch on fire (3 words)
- member of PR's safety committee who reports to duty at all 3 locations (2 words)
- in sunscreen, what the F stands for in SPF
- a document you refer to if you have been exposed to a hazardous chemical (abbreviated)
- the first S in the acronym PASS stands for
- announce this if activating paging system for active shooter (two words)
- disease caused by deer ticks
22 Clues: disease caused by deer ticks • this hazard can be truly shocking • practice runs for tornado and fire • virus caused by mosquitoes (2 words) • name of our MTA Safety Trainer (2 words) • protect your noggin' with this (2 words) • in sunscreen, what the F stands for in SPF • the first S in the acronym PASS stands for • what to do should you catch on fire (3 words) • ...
Information and Technology Crossword 2023-10-25
Across
- How reliable a source is for facts and truth
- well known electric car company founded by Elon Musk
- where either humans take over or the car itself hand over to the driver Generated roughly one
- protection of all an organizations’ important info including human speech against unauthorized access
- The company that created voter profiles out of Facebook users’ data
- Attempt to acquire sensitive data through a fraudulent solicitation in an email or website posing as reputable site
- The process of determining the meanings behind patterns, and finding ways to integrate them into certain programs
- self-driving vehicles
- What percent of high schoolers realized that a seemingly credible website on climate change was run by the fossil fuel industry
- The process of revealing patterns from sets of information gathered from users of certain programs
Down
- Fake information
- the approach that people attempt the trolly problem
- deliberate attempt to breach the info of a system of an individual or organization
- Something that can be determined through the use of many social media platforms
- technology or practice for preventing cyber attacks
- crash a server with traffic
- verifiable source
- The process of scrubbing useless data from large datasets
- where both the driver and the car jointly produces driving
- News Slang for false information spread by certain sources
20 Clues: Fake information • verifiable source • self-driving vehicles • crash a server with traffic • How reliable a source is for facts and truth • the approach that people attempt the trolly problem • technology or practice for preventing cyber attacks • well known electric car company founded by Elon Musk • The process of scrubbing useless data from large datasets • ...
Digital technologies 2025-05-01
Across
- : The physical components of a computer
- : A model to replicate real-world processes
- : Practices to safeguard personal or sensitive information
- : Converting data into a secure format
- : Structured data organized for easy access and management
- : Use of computers to store, retrieve, and send data
- : Protection of computer systems from digital attacks
- : Fraudulent attempt to obtain sensitive information
- : The discovery and communication of meaningful patterns in data
- : Machines mimicking human intelligence
- : An open-source operating system
- : Extremely large data sets analyzed for insights
- : The process of leading the work of a team to achieve goals
- : Decentralized ledger technology
- : Interconnected components working together in computing
Down
- : Design of systems hosted on cloud infrastructure
- : Involving or relating to computer technology
- : Combines software development and IT operations
- : AI that enables systems to learn from data
- : Use of technology to perform tasks without human input
- : Legally breaking into systems to find vulnerabilities
- : A group of connected computers
- : Process of evaluating software functionality and performance
- : The process of identifying and removing errors in code
- : High-level language used for general-purpose programming
- : ERP module for financial management
- : Official recognition for completing a professional qualification
- : Officially recognized as having a certain qualification
- : A set of coded instructions a computer can understand
- : Microsoft tool used for data analysis and spreadsheets
30 Clues: : A group of connected computers • : An open-source operating system • : Decentralized ledger technology • : ERP module for financial management • : Converting data into a secure format • : The physical components of a computer • : Machines mimicking human intelligence • : A model to replicate real-world processes • : AI that enables systems to learn from data • ...
Cyber ethics 2025-06-09
Across
- The act of pretending to be someone else online, often for malicious
- The ethical responsibility to acknowledge and respect the original creators of digital content.
- A deceptive act of trying to trick users into divulging personal information, often via email.
- The ethical concern regarding the collection, storage, and use of personal data online.
- The idea that individuals should have control over their personal information online.
- Unwanted or unsolicited email.
Down
- Respecting others' privacy and personal information online.
- The protection of computer systems from theft or damage to their hardware, software, or electronic data.
- A type of online harassment that involves repeatedly sending offensive messages.
- The principle of using digital resources responsibly and without harming others.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- The moral guidelines that dictate the appropriate and responsible use of technology.
- The principles and values that guide behavior in the digital world.
- An ethical principle that encourages fair and honest dealings in the digital realm.
- Unauthorized access to a computer system.
- The illegal copying, distribution, or use of copyrighted material.
- The act of spreading false or misleading information online, often with malicious intent.
- The ethical commitment to protect sensitive information from unauthorized access.
- An ethical principle emphasizing honesty and truthfulness in online interactions.
- Online behavior that is considered rude, offensive, or disruptive.
20 Clues: Unwanted or unsolicited email. • Unauthorized access to a computer system. • Respecting others' privacy and personal information online. • The illegal copying, distribution, or use of copyrighted material. • Online behavior that is considered rude, offensive, or disruptive. • The principles and values that guide behavior in the digital world. • ...
Malware 2022-12-06
Across
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- a computer program used to prevent, detect, and remove malware.
- malicious software designed to block access to a computer system until a sum of money is paid.
- records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
- the protection of computer systems and networks from attacks from malicious software.
- malware that misleads users of its true intent.
- the psychological manipulation of people into performing actions or giving out confidential information.
- can propagate or self-replicate from one computer to another without human activation after breaching a system.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
9 Clues: malware that misleads users of its true intent. • a computer program used to prevent, detect, and remove malware. • the protection of computer systems and networks from attacks from malicious software. • malicious software designed to block access to a computer system until a sum of money is paid. • ...
OA ISM SECURITY CROSSWORD 2023-08-24
Across
- A person who attempts to gain unauthorized access to computer systems.
- The quality of data being accurate, consistent, and unaltered.
- The process of converting data into a code to prevent unauthorized access.
- A piece of code capable of self-replicating and causing damage to a computer system.
- Faking the source of data to appear as if it's coming from a trusted source.
- The state of keeping information private and only accessible to authorized parties.
- A network security device that monitors and controls incoming and outgoing traffic.
- Ensuring that computer systems and data are accessible when needed.
Down
- Software intended to harm or exploit computer systems and data.
- Measures taken to secure computer systems from threats and vulnerabilities.
- A type of cyber attack where fraudulent emails are used to deceive individuals into revealing sensitive information.
- (Virtual Private Network): A technology that provides secure and private connections over public networks.
- Malicious software that encrypts a user's data and demands payment to restore access.
- Software that collects information from a computer or network without the user's knowledge.
- Engineering: Manipulating individuals to divulge confidential information or perform actions unknowingly.
- A secret combination of characters used to access a system or data.
- The potential for loss or harm in the context of cybersecurity.
17 Clues: The quality of data being accurate, consistent, and unaltered. • Software intended to harm or exploit computer systems and data. • The potential for loss or harm in the context of cybersecurity. • A secret combination of characters used to access a system or data. • Ensuring that computer systems and data are accessible when needed. • ...
Cybersecurity Fundamental Chapter 3 Part 2 2022-10-18
Across
- a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
- one man's trash is another man's treasure
- use short message service (sms) to send fake text messages
- attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
- application that behave in an annoying or undesirable manner.
- impersonation attack, and it takes advantage of a trusted relationship between two systems.
- criminal tags along with an authorized person to gain entry into a secured location.
Down
- looking over one's shoulder to get their pin or access code.
- an attacker requests personal information from a party in exchange for something like a gift.
- intercepting communication between computers to steal information crossing the network.
- action of pretending to be someone else
- non-technical means for a criminal to gather information on a target.
- involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
- examines all network traffic as it passes through their Network Interface Card (NIC).
- records or logs the keystrokes of the user of the system.
15 Clues: action of pretending to be someone else • one man's trash is another man's treasure • records or logs the keystrokes of the user of the system. • use short message service (sms) to send fake text messages • looking over one's shoulder to get their pin or access code. • application that behave in an annoying or undesirable manner. • ...
Technology and AI vocabulary 2024-05-29
Across
- The science of making machines that can think like humans.
- A portable and wearable electronic device in form of a watch that can do things not related to showing the time.
- The practice of protecting systems, networks and programs from digital attacks.
- A machine that does tasks without the help of a person.
- A mobile electronic device that work as a computer but is small enough to fit in a person's hand.
- It is basically the Internet. More specifically, it is to all the things that you have remotely and unlimited access over the internet.
Down
- An electronic device that can store and process information.
- A person that has the ability to influence the behaviour or opinions of others.
- A flying robot that can be remotely controlled or fly autonomously.
- A set of steps used to solve a specific problem.
- A computer program that simulates and processes human conversation (either written or spoken), allowing humans to interact with digital devices as if they were communicating with a real person.
- A technology that allows devices to communicate with each other without cables.
- Small, portable personal computer.
13 Clues: Small, portable personal computer. • A set of steps used to solve a specific problem. • A machine that does tasks without the help of a person. • The science of making machines that can think like humans. • An electronic device that can store and process information. • A flying robot that can be remotely controlled or fly autonomously. • ...
Smart cities 2025-10-24
Across
- shared travel services such as buses, trains, and trams available for public use
- the effort to ensure that all citizens can participate equally in digital and social opportunities
- a device that measures air quality and pollution levels in real time
- the practice of meeting current needs without compromising the ability of future generations to meet theirs
- electronic tools and systems that generate, store, or process data to enhance urban functions
- the protection of computer systems and networks from digital attacks or unauthorized access
- the integration of digital technology into transportation to improve efficiency and sustainability
Down
- a structured process for collecting, analyzing, and managing information in a smart city
- the design of systems and services that can be used easily by everyone, including people with disabilities
- a device that converts sunlight into electrical energy for sustainable power generation
- energy from sources that naturally replenish, such as solar, wind, or hydro power
- an urban area that uses digital technology and data to improve the quality of life for its citizens
- a device that monitors and records vehicle movement for traffic management and safety
13 Clues: a device that measures air quality and pollution levels in real time • shared travel services such as buses, trains, and trams available for public use • energy from sources that naturally replenish, such as solar, wind, or hydro power • a device that monitors and records vehicle movement for traffic management and safety • ...
ciao6 2022-02-03
Across
- : è un testo crittografato trasformato da testo non crittografato utilizzando un algoritmo di crittografia
- : truffa informatica effettuata inviando un'e-mail con il logo contraffatto di un istituto di credito, in cui si invita il destinatario a fornire dati riservati.
- :rappresenta la sicurezza informatica
Down
- : è l’espressione con cui ci si riferisce ai contenuti criptati e non liberamente accessibili collocati nelle darknet, reti oscure e “parallele” accessibili solo tramite configurazioni specifiche e specifiche autorizzazioni d’accesso.
- : testo in chiaro in inglese
- : è il processo di codifica delle informazioni
- : è la porzione del World Wide Web che è prontamente disponibile al grande pubblico e ricercabile con i motori di ricerca web standard
7 Clues: : testo in chiaro in inglese • :rappresenta la sicurezza informatica • : è il processo di codifica delle informazioni • : è un testo crittografato trasformato da testo non crittografato utilizzando un algoritmo di crittografia • ...
crossword on words related to AI 2024-10-21
Across
- The process of converting information into a code to prevent unauthorized access.
- Protection of internet-connected systems from cyberattacks
Down
- A pioneering network that laid the groundwork for the internet by connecting universities and research labs.
- Remote servers used to store data and run applications over the internet.
4 Clues: Protection of internet-connected systems from cyberattacks • Remote servers used to store data and run applications over the internet. • The process of converting information into a code to prevent unauthorized access. • A pioneering network that laid the groundwork for the internet by connecting universities and research labs.
WHO Identifies Risk 2024-07-02
Across
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
Down
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
038 - Digital Literacy 2024-10-20
Across
- the practice of protecting systems, networks, and programs from digital attacks.
- a person who uses digital technology responsibly and effectively.
- the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
Down
- the trail of data you create while using the internet.
- the ability to use, understand, and create digital content safely and effectively.
5 Clues: the trail of data you create while using the internet. • a person who uses digital technology responsibly and effectively. • the practice of protecting systems, networks, and programs from digital attacks. • the ability to use, understand, and create digital content safely and effectively. • ...
Module 9 Participation | Cybersecurity Crossword Puzzle - Cian 2025-03-12
Across
- – Remote storage accessed from internet
- - One billion bytes
- – Creates a private and secure connection
- – Protect from unauthorized access
- – Automated software performing tasks
- – Copies of data for recovery purposes
- – Entering credentials to access course
- – Individual who intrudes systems illegally
- - Faster storage uses flash memory
- - Two-Factor authentication app
- - short term memory for active tasks
Down
- – Little file that stores data on device
- – A bug that spreads between systems
- - Acesses code
- – Warning about potential security threats
- Authentication – Security method using two verification factors
- – Security update fixing vulnerabilities
- – A unit of digital information
- – Blocks unauthorized network access
- - Long term magnetic storage
20 Clues: - Acesses code • - One billion bytes • - Long term magnetic storage • – A unit of digital information • - Two-Factor authentication app • – Protect from unauthorized access • - Faster storage uses flash memory • – A bug that spreads between systems • – Blocks unauthorized network access • - short term memory for active tasks • – Automated software performing tasks • ...
The Ultimate Crossword Challenge: Places, Food & Cybersecurity 2025-09-24
Across
- A sweet, fizzy drink. (4 letters)
- The place in Kerala where you can see beautiful backwaters.
- A security policy that blocks all traffic by default and only permits what's necessary. (5 letters)
- A highly precise timing device used for network synchronization. (3 letters)
- The process of scrambling data to protect it. (11 letters)
- The broad term for protecting information and systems. (8 letters)
- The "V" in a secure tunnel. (7 letters)
- The term for prioritizing network traffic to guarantee performance. (3 letters)
- An authentication protocol that separates AAA functions and relies on TCP. (7 letters)
- A security method requiring two or more forms of verification for user login. (3 letters)
- The practice of Hacking the networks and privacy data. (10 letters)
- The management dashboard for the Nutanix platform. (5 letters)
- Abbreviation for Industrial Automation and Control Systems. (4 letters)
- A scam that tricks people into giving away personal information via email. (7 letters)
- This city in Uttar Pradesh is one of the oldest in the world.
- An unauthorized program that spies on your computer. (8 letters)
- A malicious software that replicates itself. (5 letters)
- An algorithmic-based protocol that automatically calculates optimal paths. (7 letters)
- A famous temple complex in Odisha with a chariot shape.
- A person who reports security vulnerabilities. (10 letters)
- The state in the northeast known for its beautiful tea plantations.
- A subnetting method that uses one size for all subnets, leading to potential waste. (5 letters)
- The main component of the Nutanix platform that virtualizes the storage and compute. (9 letters)
- A malicious program that records keystrokes on a user's device. (9 letters)
- A protocol that combines authentication and authorization, and uses UDP. (6 letters)
- The protocol used to synchronize network clocks over a packet-switched network. (3 letters)
- An acronym for an encrypted tunnel established across a public network. (3 letters)
- A Layer 2 service that emulates a bridged LAN across an IP/MPLS core. (4 letters)
- The company that operates the IACS. (5 letters)
- A traffic "gatekeeper" that uses algorithms to distribute requests to a backend pool. (12 letters)
- A network segment where data packets can "collide" with each other. (8 letters)
- A routing table that's isolated from others on a single router. (3 letters)
Down
- A company that provides components for an IACS. (8 letters)
- The place in Delhi where the Prime Minister addresses the nation.
- The highest peak in India, located in the Himalayas.
- The company that designs and builds the IACS. (10 letters)
- The famous rock fortress in Madhya Pradesh
- The technology that provides central orchestration and path selection across a WAN. (6 letters)
- A logical network segment where all devices receive the same broadcast messages. (14 letters)
- The coastal city famous for its Gateway and Bollywood.
- A sweet snack often found with a hole in the middle. (6 letters)
- A type of network attack that can overwhelm a server with traffic. (3 letters)
- A system that actively blocks or prevents malicious activity based on predefined rules. (3 letters)
- A cold, creamy dessert often served in a cone. (9 letters)
- Rajasthan's colorful capital.
- A wall that filters network traffic. (8 letters)
- A California city synonymous with next-generation firewalls that use App-ID. (8 letters)
- The opposite of a manually configured network path. (7 letters)
- The opposite of a uniform subnet mask. (8 letters)
- A person who gains unauthorized access to computer systems. (6 letters)
- A marble mausoleum.
- A popular topping for pizza, made from tomatoes. (5 letters)
- A networking device used by Cisco to connect different networks. (6 letters)
- A program that looks legitimate but is malicious. (6 letters)
- A router that operates at Layer 3 to forward data based on a short, fixed-length identifier. (4 letters)
- A security measure that prevents unauthorized devices from connecting to a switch port. (12 letters)
- A series of characters used to verify a user's identity. (8 letters)
- A converged network architecture for industrial automation, a joint standard by Rockwell and Cisco. (13 letters)
- The network layer responsible for IP addressing. (7 letters)
- A subnetting method that allows for different subnet sizes to conserve IP addresses. (4 letters)
60 Clues: A marble mausoleum. • Rajasthan's colorful capital. • A sweet, fizzy drink. (4 letters) • The "V" in a secure tunnel. (7 letters) • The famous rock fortress in Madhya Pradesh • The company that operates the IACS. (5 letters) • A wall that filters network traffic. (8 letters) • The opposite of a uniform subnet mask. (8 letters) • ...
MIC Quiz 2 2023-04-25
Across
- A community for Black-identifying employees at Cisco to cultivate career growth, community involvement, and business excellence.
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community for employees who have been touched by Alzheimer’s disease to help bring awareness and raise funds for research.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
- A community for LatinX-identifying employees to experience personal and professional growth through inspirational leadership, coaching, and giving back.
- A community for Cisconians to learn about different faith systems and advocate for policy that’s sensitive to the needs of people with faith.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community for those who have been affected by diabetes to find support through education, resources, and raising funds for valuable research.
- A community that connects diverse aspiring inventors who identify as women at Cisco with experienced patent holders through a mentoring process.
- A community for employees seeking resources and events that will help them develop more mindful and resilient habits.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
- A community for technical employees who identify as women to create a positive impact in the lives of women and girls in STEM fields.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
Down
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community for Filipino-identifying employees to pursue professional development, mentoring, and help attract and retain Filipino talent at Cisco.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
- A community where Pan-Asian-identifying employees come together to amplify cultural pride, advocate for Pan-Asian talent, and propel social justice.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
24 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
RI&S BD&S Crossword Puzzle 2021-03-30
Across
- Common word in USGIS, GS&S and S3
- Any ______. Any challenge.
- "Formal agreement" + "car"
- The future of ______ and defense.
- "&" formal name for the symbol
- Last name of former VP of BD&S
- DE&I motto
- "light from the gods"
- "the second" in spanish
- Advanced _______ & Technology
- An RI&S strategic imperative: Secure market _______
- Global Solutions & ______
- Challenge ________
- The R in ISRS
- Enterprise Raytheon _______ Manager
- The opposite words of mechanical peacetime haphazards
- Common word in CAMS, EWS and ISRS
Down
- Former SAS headquarters (city)
- RTX just had its' first on 4.3.21.
- What is Rosslyn, Virginia (for RI&S)?
- Function led by the former BDE of ISRS (acronym, letters only)
- The first C in C2.
- The second C in C2
- Delivers trusted networking solutions for Joint All Domain Operations. (RI&S PL, acronym)
- The value: We act with integrity and do the right thing.
- A type of win.
- Span the enterprise and drive our actions, behaviors and _________.
- The first word of the BD&S mission statement.
- RI&S Product Line with alliteration
- Not a competitive win
- A safer, more _______ world.
- ________, Training and Services
- An enterprise wide RTX meeting (hint: there is one coming up on May 5)
- Function home of BD Ops and Customer Engagement
- The "I" in USGIS
- Bye bye Skype. Hello Microsoft _______.
36 Clues: DE&I motto • The R in ISRS • A type of win. • The "I" in USGIS • The first C in C2. • The second C in C2 • Challenge ________ • Not a competitive win • "light from the gods" • "the second" in spanish • Global Solutions & ______ • Any ______. Any challenge. • "Formal agreement" + "car" • A safer, more _______ world. • Advanced _______ & Technology • Former SAS headquarters (city) • ...
TOPIC 8 2024-05-02
Across
- What technology provides high-speed internet access through cable television lines?
- What are programs and operating information used by a computer?
- What refers to buying and selling goods or services over the internet?
- What are materials that do not conduct electricity?
- What technology uses unique biological characteristics for authentication?
- What refers to the physical components of a computer system?
- What are private networks that can only be accessed by authorized users?
- What material has electrical conductivity between a conductor and an insulator?
- What connects computers and other devices to share resources and information?
Down
- What is the process of combining multiple signals into one signal?
- What focuses on protecting computer systems from theft or damage to their hardware, software, or electronic data?
- What technology delivers computing services over the Internet?
- What technology overlays digital information on the real world?
- What is a decentralized and distributed digital ledger used for secure transactions?
- What are private networks that allow access to specific external users?
- What is a type of artificial intelligence that enables systems to learn from data?
- What technology uses lasers to read and write data on discs?
- What process converts information into a code to prevent unauthorized access?
- What concerns the protection of sensitive information from unauthorized access?
- What allows users to access data and information from anywhere using mobile devices?
20 Clues: What are materials that do not conduct electricity? • What technology uses lasers to read and write data on discs? • What refers to the physical components of a computer system? • What technology delivers computing services over the Internet? • What technology overlays digital information on the real world? • ...
TEKA-TEKI SILANG INFORMATIKA KELAS IX 2024-10-30
Across
- Platform online yang memungkinkan pengguna untuk berkolaborasi pada dokumen secara bersamaan
- Tombol yang digunakan untuk menyukai atau memberikan tanda setuju pada suatu postingan
- Program untuk mengelola data dalam bentuk tabel
- Video blog, seringkali berisi konten pribadi atau tutorial
- Situs web pribadi yang berisi tulisan-tulisan atau artikel secara teratur
- Program komputer yang digunakan untuk membuat dokumen seperti surat atau laporan
- Platform berbagi video terbesar di dunia
- Orang yang membuat dan mengelola sebuah blog
- Jaringan sosial yang fokus pada berbagi foto dan video singkat
- Bahasa pemrograman visual yang dirancang untuk membantu anak-anak dan pemula belajar pemrograman
- Tanda pagar (#) yang digunakan untuk mengategorikan postingan di media sosial
Down
- perangkat keras yang digunakan untuk mengontrol kursor di layar komputer
- Format file dokumen yang umum digunakan (singkatan)
- Aplikasi yang digunakan untuk membuat presentasi dengan slide
- Praktik untuk melindungi sistem teknologi dan data dari ancaman digital, seperti kejahatan siber
- kegiatan yang dilakukan untuk mendapatkan akses tidak sah ke sistem atau jaringan komputer
- perangkat keras yang berfungsi untuk menampilkan data visual dari komputer, seperti gambar, teks, video, dan grafik
- Surat elektronik atau electronic mail yang merupakan cara untuk mengirim dan menerima pesan secara digital melalui jaringan internet
- Orang yang membuat dan mengunggah video ke YouTube atau platform serupa
- Platform online yang memungkinkan pengguna untuk berbagi informasi dan berinteraksi dengan orang lain
20 Clues: Platform berbagi video terbesar di dunia • Orang yang membuat dan mengelola sebuah blog • Program untuk mengelola data dalam bentuk tabel • Format file dokumen yang umum digunakan (singkatan) • Video blog, seringkali berisi konten pribadi atau tutorial • Aplikasi yang digunakan untuk membuat presentasi dengan slide • ...
Unraveling The Contemporary World 2025-02-12
Across
- – People fleeing their country due to danger.
- – Hiring external workers or firms for tasks.
- – Mixing elements of different cultures.
- – Fair and equal treatment in society.
- – Large sets of data analyzed for insights.
- – Cultures becoming more alike due to globalization.
- – An economic system favoring free markets and privatization.
- – Movement of people to a new place.
- – Machines mimicking human intelligence.
- – Fear or dislike of foreigners.
- – Trade without tariffs or restrictions.
- – Managing international relations through negotiation.
Down
- – Belief that one’s culture is superior.
- - An international governing body like the UN or EU.
- – Protecting digital systems from attacks.
- – Naturally replenishing energy sources like solar and wind.
- – Progress that meets present needs without harming the future.
- – Gap between people with and without digital access.
- – A company operating in multiple countries.
- – Equal opportunities for all genders.
- – Total greenhouse gas emissions from human activities.
- – Basic freedoms entitled to all people.
- – A country's right to govern itself.
- – Lack of financial resources for basic needs.
- – Using violence for political or ideological goals.
- – Large-scale clearing of forests.
- – How geography affects politics and global relations.
- – Growing connections between countries.
- – Long-term shifts in global weather patterns.
- – Online platforms for sharing and communication.
30 Clues: – Fear or dislike of foreigners. • – Large-scale clearing of forests. • – Movement of people to a new place. • – A country's right to govern itself. • – Equal opportunities for all genders. • – Fair and equal treatment in society. • – Belief that one’s culture is superior. • – Mixing elements of different cultures. • – Basic freedoms entitled to all people. • ...
Internet Safety 2025-03-05
Across
- unauthorized use, copying or distribution of copyrighted software
- A dishonest scheme to get information or money
- Shorter word for "internet"
- Any action that's taken to protect computers and prevent online crime
- Unwanted e-mails or junk mail
- An attempt to trick a person into giving away money or information by pretending to be a well-known company
- Self-replicating software program that attacks a computer system
- Short form for "WorldWideWeb"
- Software that displays unwanted advertising on your computer
- Online etiquette-being nice and respectful to others online
- Leaving offensive messages on the internet
- Harm inflicted through text, e-mails, or online sites
- Searching through websites freely
- A secret combination of words or numbers that allows a user to access an online service
- Software designed to damage a computer or phone
Down
- Someone who gains unauthorized access to people's computers
- managing high-capacity lines between central offices, carriers, ISPs and very large corporations rather than subscriber lines
- A security system used to block malicious threats to your computer
- a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style
- a type of malware that encrypts the victim's personal data until a ransom is paid
- Computer equipment, machines, and parts
- When someone tracks, lures, or harasses people online
- An internet related crime
23 Clues: An internet related crime • Shorter word for "internet" • Unwanted e-mails or junk mail • Short form for "WorldWideWeb" • Searching through websites freely • Computer equipment, machines, and parts • Leaving offensive messages on the internet • A dishonest scheme to get information or money • Software designed to damage a computer or phone • ...
tugas daring informatika diantri rahmawati X-I/7 2025-04-17
Across
- Simbol huruf kecil yang melindungi merek dagang
- Hak yang dimiliki atas lagu ciptaan sendiri
- perlindungan atas penemuan teknologi masuk ke dalam hak ini
- Lembaga Indonesia yang menangani aduan konten negatif
- Jenis berita palsu yang sering tersebar di media sosial
- Konten digital yang berisi cerita rakyat termasuk jenis ini
- Bentuk lisensi yang membolehkan orang lain menggunakan karya dengan izin terbuka
- Operator untuk mencari di satu situs tertentu saja
- Profesional yang merancang sistem perangkat lunak
- Gambar bergerak pendek yang menyebarkan nilai budaya secara viral
- Mereka menciptakan pengalaman visual dan interaktif di situs web
- Platform populer untuk berbagi video pendek bernuansa budaya lokal
- Kata yang digunakan untuk mengecualikan hasil pencarian di Google
Down
- Pekerjaan yang mengolah data jadi informasi bermakna
- Teknik menggabungkan visual, musik, dan narasi untuk menyampaikan tradisi
- Jenis konten digital yang menampilkan kesenian daerah dalam bentuk audio
- Simbol yang digunakan untuk mencari kata kunci yang mirip atau bentuk lainnya
- Proses memastikan kebenaran informasi di internet
- Konten yang menyesatkan dengan narasi yang dimanipulasi disebut
- Metode menggunakan kecerdasan buatan untuk mendeteksi konten bermasalah
- Operator pencarian yang menampilkan hasil yang mengandung semua kata kunci
- Profesional yang melatih mesin untuk belajar dari data
- Ahli dalam menjaga keamanan sistem informasi
- Untuk mencari frasa persis, kita gunakan tanda ini di awal dan akhir
- Lembaga negara yang mengurusi perlindungan kekayaan intelektual di Indonesia
25 Clues: Hak yang dimiliki atas lagu ciptaan sendiri • Ahli dalam menjaga keamanan sistem informasi • Simbol huruf kecil yang melindungi merek dagang • Proses memastikan kebenaran informasi di internet • Profesional yang merancang sistem perangkat lunak • Operator untuk mencari di satu situs tertentu saja • Pekerjaan yang mengolah data jadi informasi bermakna • ...
TEKA-TEKI INFORMATIKA BAB 1-3 2025-06-04
Across
- Istilah untuk keamanan jaringan komputer dari serangan.
- Alat yang digunakan untuk mengoutput data ke layar.
- Jenis perangkat keras yang digunakan untuk menyimpan data cadangan.
- Alat yang digunakan untuk mengontrol komputer.
- Alat yang digunakan untuk memperluas jaringan Wi-Fi ke area yang lebih luas
- Istilah untuk sistem operasi komputer.
- Alat yang digunakan untuk mencetak dokumen.
- Alat yang digunakan untuk menginput data tulisan tangan.
- Istilah untuk sistem komputer yang terintegrasi.
- Jenis perangkat lunak yang digunakan untuk mengedit video.
- Istilah untuk pengiriman data melalui internet.
Down
- Jenis perangkat keras yang digunakan untuk memproses data.
- Istilah untuk sistem operasi mobile.
- Alat yang digunakan untuk mengontrol jaringan komputer.
- Istilah untuk jaringan komputer yang luas.
- Jenis perangkat keras yang digunakan untuk menyimpan data.
- Alat yang digunakan untuk menginput data suara.
- Alat yang digunakan untuk mengakses data dari jarak jauh.
- Istilah untuk jaringan komputer yang menggunakan teknologi wireless.
- Alat yang digunakan untuk mengakses internet.
- Jenis perangkat lunak yang digunakan untuk mengolah presentasi.
- Istilah untuk pengumpulan data.
- Istilah untuk keamanan data.
- Alat yang digunakan untuk menginput data ke komputer.
- Jenis perangkat lunak yang digunakan untuk mengedit gambar.
- Alat yang digunakan untuk menyimpan data sementara.
- Bahasa pemrograman yang digunakan untuk membuat website.
- Istilah untuk pengiriman data melalui jaringan.
- Jenis perangkat lunak yang digunakan untuk mengolah angka.
- Istilah untuk jaringan
- Istilah untuk keamanan jaringan komputer.
31 Clues: Istilah untuk jaringan • Istilah untuk keamanan data. • Istilah untuk pengumpulan data. • Istilah untuk sistem operasi mobile. • Istilah untuk sistem operasi komputer. • Istilah untuk keamanan jaringan komputer. • Istilah untuk jaringan komputer yang luas. • Alat yang digunakan untuk mencetak dokumen. • Alat yang digunakan untuk mengakses internet. • ...
Browsing Safely 2025-05-18
Across
- a software or a computer program that is designed to identify or remove viruses from your computer
- befriending children on social media
- receiver is fool to believe that the messages from a trusted so which is not true
- Full-form of OTP
- misusing someone's personal information reach includes a person's name, date of birth, account number, etc
- a crime in which the victim is attacked first and then forced to pay money to stop further attacks
- the better commit crimes buy your name after stealing or identity
- collection of technology or processes designed to protect networks, computers, etc
- Digital/unethical hackers
Down
- an impression you create when you engage in various online activities
- refers to conduct terrorism by using internet to cause fear and panic
- refers to illegal methods to get money from a bank or its customers
- Hoaxing or to mislead
- Criminal activity intended to harm a computer using the Internet
- Used to extract secret or confidential information
- software that helps to prevent unauthorised access to your computer by blocking and unsolicited communication
- refers to a illegal entry into a computer system or network
- harrassing someone using information technology through a deliberate manner
- Set of programs that disorders the functioning of a computer
- This is what our lives heavy rely on
20 Clues: Full-form of OTP • Hoaxing or to mislead • Digital/unethical hackers • befriending children on social media • This is what our lives heavy rely on • Used to extract secret or confidential information • refers to a illegal entry into a computer system or network • Set of programs that disorders the functioning of a computer • ...
RU ITEC411 Crime and Security 2025-10-22
Across
- a time when unauthorized user get access to a system
- a program that helps protect you against virus's and malware
- a way to identify a person based on physical characteristics like fingerprints
- a type of malware that sits in the background on a computer and spys on the user
- the way a computer converts hostname to ip address
- a type of malware that encrypts some amount of files on your computer then demands payment to decrypt them
- an digital attack on a computer or system
- weaknesses or weak points that can be exploited
- a way people steal credit card info with a physical device
- a type of malware that lets attackers us a lot of personal devices to attack someone
Down
- a type of malware that lets attackers back in to a system after they have put it in
- hacking for political causes
- security for computers
- fake messages that look real to steal info like login info
- software that is malicious
- a type of malware that can self replicate and spread
- a type of malware that looks and acts like a normal program but includes additional malicious code
- a way of protecting data by obscuring it
- people who hack into computers and do harm
- the base system upon which all other software run
20 Clues: security for computers • software that is malicious • hacking for political causes • a way of protecting data by obscuring it • an digital attack on a computer or system • people who hack into computers and do harm • weaknesses or weak points that can be exploited • the base system upon which all other software run • the way a computer converts hostname to ip address • ...
WHO Identifies Risk 2024-07-02
Across
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
Down
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
Sa 2017-11-28
Across
- The branch of logic dealing with analysis.
- Is a program that, when installed on your computer, enables unauthorized people to access it and sometimes to send spam from it.
- Security against electronic attacks.
- Is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
- One who uses programming skills to gain illegal access to a computer network or file.
- Is the small amount of information that a website copies to the hard drive, which helps that website identify you the next time you visit.
- The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.
Down
- An expression of an intention to inflict pain, injury or evil.
- Crime committed using computer networks.
- Is a public, worldwide network of computers and computer networks. It facilitates the World Wide Web, email, instant messaging, chat rooms, and many online services such as banking.
- Relating to or resembling a digit.
- Is set to protect access to personal or professional info.
- To set upon with violent force.
- A personal identification number - commonly assigned to bank customers.
- Web page address.
15 Clues: Web page address. • To set upon with violent force. • Relating to or resembling a digit. • Security against electronic attacks. • Crime committed using computer networks. • The branch of logic dealing with analysis. • Is set to protect access to personal or professional info. • An expression of an intention to inflict pain, injury or evil. • ...
ISTA MAGAZINE CROSSWORD 2024-02-03
Across
- - The systematic analysis of data to gain insights and make informed decisions.
- - Programs and instructions that control the operation of a computer system.
- - A device that directs data traffic between computer networks.
- - The creation of a virtual version of a resource, such as an operating system or server.
- - The process of converting information into a code to secure it from unauthorized access.
- - A global network connecting millions of computers, making information and resources accessible.
- - Physical components of a computer system, such as the central processing unit and peripherals.
- - A network of remote servers used to store and manage data, accessible via the internet.
Down
- - The point of interaction between a user and a computer system or device.
- - A structured collection of data, often stored and managed electronically.
- - Measures taken to protect computer systems and data from unauthorized access or attacks.
- - A step-by-step procedure for solving a problem, often used in programming.
- - A system of interconnected computers and devices that communicate with each other.
- - A computer or system that manages network resources and provides services to other computers.
- - A barrier designed to prevent unauthorized access to or from a private network.
15 Clues: - A device that directs data traffic between computer networks. • - The point of interaction between a user and a computer system or device. • - A structured collection of data, often stored and managed electronically. • - A step-by-step procedure for solving a problem, often used in programming. • ...
techbyte 2024-07-18
Across
- A problem-solving method used by AI to find solutions in a large search space.
- The process of cleaning, transforming, and modeling data to discover useful information
- A type of network inspired by the human brain, used in deep learning
- A framework or tool used for developing and training machine learning models
- The practice of protecting systems and networks from digital attacks
- The ability of a machine to imitate intelligent human behavior
Down
- A subset of AI that involves neural networks with many layers
- A popular programming language for data analysis and machine learning
- A statistical model used to make predictions or decisions without being explicitly programmed to perform the task
- A software tool used for data visualization and analysis in R.
- The branch of AI that deals with the simulation of intelligent behavior in computers
- An AI planning problem involving an agent navigating a cave to avoid pits and a dangerous creature
- The process of extracting useful information from large datasets
- A set of inputs and outputs used to train an AI model.
- A sequence of steps that an AI system follows to solve a problem.
15 Clues: A set of inputs and outputs used to train an AI model. • A subset of AI that involves neural networks with many layers • A software tool used for data visualization and analysis in R. • The ability of a machine to imitate intelligent human behavior • The process of extracting useful information from large datasets • ...
ADSI - Luis Castañeda 2022-06-06
Across
- What is the practice of protecting digital information and systems called?.
- It is the basic component of a web page.
- It is an object-oriented programming language and is the most widely used.
- are words used exclusively by a programming language.
- In the entity relationship model, what geometric figure represents the relationship between two entities?.
- what is the name of the database manager that has a dolphin in its logo.
- similar to the programming language but without so much rigidity.
- Is the representation of a qualitative or quantitative variable to which a value is assigned.
- It is a set of rules that must be followed to write a code.
Down
- It is the way to communicate with the computer to tell it what we want to do.
- what is the name of the database that is displayed in rows and columns.
- is the element that refers to changeable values of a program.
- What are the acronyms in Spanish for the entity relationship model?.
- what is the programming language that has the name of a snake.
- It is in charge of collecting the data and connecting them with each other.
15 Clues: It is the basic component of a web page. • are words used exclusively by a programming language. • It is a set of rules that must be followed to write a code. • what is the programming language that has the name of a snake. • is the element that refers to changeable values of a program. • similar to the programming language but without so much rigidity. • ...
Security Awareness crossword puzzle 2018-05-07
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- _______ your data regularly and periodically check that you are able to restore them.
- _______ before you click or forward.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- Cybersecurity is _______'s responsibility.
- Always use _______ factor authentication where available.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
Down
- You should always keep your software and anti-virus definitions up-to-_______.
- Use a _______ password different from the passwords you use to access other sites.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Information Security is a _______ issue.
- Do not provide your _______ email account to social networks.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Information Security 2023-12-18
Across
- A secret word or phrase that must be used to gain access to a system or service.
- A technique that falsifies the identity or location of a sender or receiver.
- A deliberate attempt to compromise or damage a system, network, or program.
- The process of protecting data by secret code.
- A cybercriminal who breaks into systems
- A part of the internet that is hidden from regular search engines and requires special software to access.
- A software program that enters a computer system without the owner’s knowledge or consent.
Down
- The practice of protecting systems, networks, and programs from digital attacks.
- A type of malware that infects and replicates itself on other files or programs
- A small computer defect that causes errors or failures.
- A small piece of data stored on a user’s browser that tracks their preferences or activities.
- A fraudulent attempt to obtain sensitive information by impersonating a legitimate entity.
- A type of malware that encrypts the victim’s data and demands payment for its decryption.
- Unsolicited or unwanted messages sent over the internet, usually for advertising purposes.
- A system that prevents unauthorized access to a network or device.
15 Clues: A cybercriminal who breaks into systems • The process of protecting data by secret code. • A small computer defect that causes errors or failures. • A system that prevents unauthorized access to a network or device. • A deliberate attempt to compromise or damage a system, network, or program. • ...
Cyber Security 2024-09-20
Across
- – An event or occurrence that disrupts normal operations, often involving security threats.
- – The act of breaking into a system, network, or data storage illegally.
- – Free from danger or threat; used to describe a well-protected system.
- – A copy of data stored separately to restore the original in case of data loss.
- – Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- – Unauthorized access or entry into a computer system or network.
- – A secret word or phrase used to gain access to a computer system or service.
- – Software specifically designed to disrupt, damage, or gain unauthorized access to systems.
- – The process of verifying the identity of a user or system.
Down
- – The process of converting data into a code to prevent unauthorized access.
- – Adherence to laws, regulations, and standards, especially in cybersecurity.
- – A type of malicious software that replicates itself and spreads to other systems.
- – A network security system that monitors and controls incoming and outgoing network traffic.
- – Malicious software designed to gather information about a person or organization without their knowledge.
- – Strong and reliable, often used to describe a system that can withstand attacks or failures.
15 Clues: – The process of verifying the identity of a user or system. • – Unauthorized access or entry into a computer system or network. • – Free from danger or threat; used to describe a well-protected system. • – The act of breaking into a system, network, or data storage illegally. • – The process of converting data into a code to prevent unauthorized access. • ...
Browsing safely 2025-06-08
Across
- It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
- It is an act ab harming or harassing using information technology in deliberate manner.
- It is the process of befriending children on social media to facilitate online or physical sexual abuse.
- Standard form of vital information resources under seize.
- It refer to the act of stealing and misusing someone's personal Plus information.
- It referred to an illegal entry into a computer system or network.
- It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
- ____ also known as unethical hacker.
- A ____ is a software that help in preventing unauthorised access to your computer.
- ____ means hoaxing or misleading.
- _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
- ____ is any criminal activity intended to harm anyone using a computer and internet connection.
- ______ is a popular anti-virus.
- _______ is the use of illegal method to get money or other things that belong to bank or its customers.
- Never share your ____ while chatting.
15 Clues: ______ is a popular anti-virus. • ____ means hoaxing or misleading. • ____ also known as unethical hacker. • Never share your ____ while chatting. • Standard form of vital information resources under seize. • It referred to an illegal entry into a computer system or network. • It refer to the act of stealing and misusing someone's personal Plus information. • ...
#2 (Un) Riddle 2021-04-21
Across
- is a cryptocurrency invented in 2008 by an unknown person or group of people using the name Satoshi Nakamoto
- case that struck down S 66A of IT Act, 2000
- a technology capable of matching a human face from a digital image or a video frame against a database of faces
- A global company in news over its privacy policy concerns
Down
- spyware developed by the Israeli firm NSO Group
- Indian Cybersecurity Company founded by Kailash and Sanjay Katkar
- refers to events related to the formatting and storage of calendar data for dates beginning in the year 2000 (Use Words only)
- provides the infrastructure to help support the delivery of government IT services and the delivery of some of the initiatives of Digital India
- malware that encrypts a victim's files and extorts money to access the data
- CJEU recognised this right in the famous case of Google Spain v AEPD and Mario Costeja González (Use acronym)
10 Clues: case that struck down S 66A of IT Act, 2000 • spyware developed by the Israeli firm NSO Group • A global company in news over its privacy policy concerns • Indian Cybersecurity Company founded by Kailash and Sanjay Katkar • malware that encrypts a victim's files and extorts money to access the data • ...
CYBER CROSSWORD 2021-09-05
Across
- A critical requirement for the sharing of digital text
- An independent U.S. government agency that oversees all interstate and international communications.
- The integration of two or more different technologies in a single device or system
- an economy that is based on digital computing technologies
- literacy the ability to use computer technologies effectively and to understand the implications of your actions
Down
- The code is creating the environment that then forms Cyberspace.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- Device that raise a number of security concerns because they create links between your computer and the outside world
- the use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
10 Clues: A critical requirement for the sharing of digital text • an economy that is based on digital computing technologies • The code is creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
CYBERLAW CROSSWORD 2021-09-05
Across
- Device that raise a number of security concerns because they create links between your computer and the outside world
- an economy that is based on digital computing technologies
- The code used in creating the environment that then forms Cyberspace.
- the use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- the ability to use computer technologies effectively and to understand the implications of your actions
Down
- The integration of two or more different technologies in a single device or system
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
- An independent U.S. government agency that oversees all interstate and international communications.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- A critical requirement for the sharing of digital text
10 Clues: A critical requirement for the sharing of digital text • an economy that is based on digital computing technologies • The code used in creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- A software that is designed to detect and destroy compute viruses.
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- A piece of digital information generated by a web server and saved in your computer after visiting a website
Down
- A network using which things can communicate with each other using internet as means of communication between them.
- An attempt by hackers to damage or destroy a computer network or system.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
CISO Crossword Quiz - 0924 2024-07-25
Across
- Cyber Attackers intercept communication illegally and steal sensitive data in transit
- The computer system that is a host to the malware agent of the botnet or to the malware agent itself
- A Security incident in which a malicious threat actor gains access to systems without authorization
- The process of monitoring and capturing all data packets passing through a given network
- The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files
- A software program designed to take advantage of a flaw in a network, typically for malicious purposes
- The action or process of spoiling the appearance of a website in a cyber attack
Down
- A social engineering technique which cybercriminal use to disguises themselves as a known/trusted source
- Related to information security, confidentiality is the opposite to _______
- A cybersecurity strategy which allows only pre-approved or trusted users, entities, or actions to operate on a system or network
10 Clues: Related to information security, confidentiality is the opposite to _______ • The action or process of spoiling the appearance of a website in a cyber attack • Cyber Attackers intercept communication illegally and steal sensitive data in transit • The process of monitoring and capturing all data packets passing through a given network • ...
Compliance & Ethics Week 2022 2022-09-28
Across
- Taking responsibility for one's actions.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Conforming to a rule, such as specification, policy, standard or law.
- Making choices that are consistent with each other and with the stated and operative values one espouses.
- The act, process of power of exercising authority or control in an organizational setting.
Down
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Wrongful or criminal deception intended to result in financial or personal gain.
- The practice of protecting systems, networks and programs form digital attacks.
- Protects the patient's right to privacy of health information and what appropriate safeguards are required to protect the information.
- Moral principles that govern a person's behavior or the conducting of an activity.
10 Clues: Taking responsibility for one's actions. • Conforming to a rule, such as specification, policy, standard or law. • The practice of protecting systems, networks and programs form digital attacks. • Wrongful or criminal deception intended to result in financial or personal gain. • Moral principles that govern a person's behavior or the conducting of an activity. • ...
Forensic Investigation and Incident Response 2022-09-26
Across
- It is a technique used to consistently trick an adversary during a cyber-attack.
- Identify and track the origin of data, software, and/or hardware elements.
- Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
- Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
- Identifying critical assets that could be at risk – what could go wrong?
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
- info that can be of vital importance to the outcome of legal proceedings or investigations.
- Understanding the potential impacts of cyber threats were they to materialize is important.
- process to ensure the needed logs data is collected and stored for an appropriate amount of time.
10 Clues: Identifying critical assets that could be at risk – what could go wrong? • Identify and track the origin of data, software, and/or hardware elements. • It is a technique used to consistently trick an adversary during a cyber-attack. • info that can be of vital importance to the outcome of legal proceedings or investigations. • ...
RBI HISTORY 2024-09-16
Across
- (National Centre for Financial Education): Works to promote financial literacy and education across India.
- (Indian Financial Technology and Allied Services): Provides critical technology infrastructure for the Indian financial sector.
- RBI Research institution
- (National Housing Bank): Regulates and promotes housing finance institutions in India.
- (National Bank for Agriculture and Rural Development): Focuses on agriculture and rural development finance in India.
Down
- (Reserve Bank Information Technology Private Limited): Handles IT and cybersecurity needs for the Reserve Bank of India.
- The Reserve Bank of India also promoted a public limited company on January 14, 1971, named the
- to extend facilities for an equity type investment to small investors and also mobilize resources and channel them into investments so as to facilitate the growth of the economy.
- (Bharatiya Reserve Bank Note Mudran Private Limited): RBI's subsidiary responsible for printing Indian currency notes.
- (Industrial Development Bank of India): Established to provide credit and financial facilities for industrial development in India.
10 Clues: RBI Research institution • (National Housing Bank): Regulates and promotes housing finance institutions in India. • The Reserve Bank of India also promoted a public limited company on January 14, 1971, named the • (National Centre for Financial Education): Works to promote financial literacy and education across India. • ...
FINAL ROUND - GRIDLOCK CHALLENGE 2025-01-17
Across
- The process of converting information into a secure format to prevent unauthorized access.
- A pioneer in open-source enterprise solutions, famous for its Linux distributions.
- A semiconductor company revolutionizing CPU and GPU design, often praised for innovation in high-performance computing.
- A James Cameron blockbuster set on Pandora, where humans use remotely controlled bodies to interact with the alien world.
- A popular, open-source code editor used by developers for writing and debugging software.
- A dystopian cyberpunk film where humans are unknowingly trapped in a simulated reality controlled by machines.
- A leader in networking technology, specializing in routers, switches, and cybersecurity. Founded in 1984.
Down
- A sandbox game where players build and explore.
- The brutal game in which participants must select a specific shape from a fragile piece of honeycomb candy without breaking it.
- 1980s puzzle game where geometric shapes fall into place
10 Clues: A sandbox game where players build and explore. • 1980s puzzle game where geometric shapes fall into place • A pioneer in open-source enterprise solutions, famous for its Linux distributions. • A popular, open-source code editor used by developers for writing and debugging software. • ...
Cyber Security Month Crossword! 2025-10-01
Across
- A highly realistic video, image or audio clip generated by AI depicting someone saying or doing something that they didn't actually do
- A method of protecting data by encoding it to make it unreadable by unauthorised users
- A phishing attack that uses SMS instead of email
- A hacker pretending to be someone else to trick you into giving away money or information
- Malicious software that locks access to a computer until a ransom is paid
Down
- A relatively new cyberattack technique that injects malicious code within digital ads
- When a hacker gains access to a business email account to trick users into transferring money out of an organisation
- Kyogle Councils' email filtering and web security program
- A virtual private network that encrypts your data, preventing hackers from viewing it
- A cybersecurity method that protects your data by requiring more than one method of verifying your identity
10 Clues: A phishing attack that uses SMS instead of email • Kyogle Councils' email filtering and web security program • Malicious software that locks access to a computer until a ransom is paid • A relatively new cyberattack technique that injects malicious code within digital ads • A virtual private network that encrypts your data, preventing hackers from viewing it • ...
Puzzle - 8 2022-10-10
Across
- Badguys in the world of cybercrime. Hackers with criminal intentions
- a program that can automatically perform some simple repeated task to reach a pursued goal.
- A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- a type of internet fraud that seeks to acquire a user’s credentials by deception.
- A combination of the words "robot" and "network"
Down
- the process of verifying the identity of a user or piece of information and the veracity of information provided.
- Cryptocurrency, a form of electronic cash
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- Completely Automated Public Turing test to tell Computers and Humans Apart
- malware that spies on the computer to collect information about a product, a company, a person
10 Clues: Cryptocurrency, a form of electronic cash • A combination of the words "robot" and "network" • Badguys in the world of cybercrime. Hackers with criminal intentions • Completely Automated Public Turing test to tell Computers and Humans Apart • a type of internet fraud that seeks to acquire a user’s credentials by deception. • ...
Forensic Investigation and Incident Response 2022-09-26
Across
- Identifying critical assets that could be at risk – what could go wrong?
- Understanding the potential impacts of cyber threats were they to materialize is important.
- process to ensure the needed logs data is collected and stored for an appropriate amount of time.
- the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
- Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
Down
- Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
- Identify and track the origin of data, software, and/or hardware elements.
- info that can be of vital importance to the outcome of legal proceedings or investigations.
- It is a technique used to consistently trick an adversary during a cyber-attack.
10 Clues: Identifying critical assets that could be at risk – what could go wrong? • Identify and track the origin of data, software, and/or hardware elements. • It is a technique used to consistently trick an adversary during a cyber-attack. • Understanding the potential impacts of cyber threats were they to materialize is important. • ...
Fundamental Concept Related to ICT 2024-09-28
Across
- computing the delivery of computing services (e.g., servers, storage, databases, networking) over the internet ("the cloud")
- Intelligence (AI) the simulation of human intelligence processes by machines, particularly computer systems.
- an organized collection of data that is stored and accessed electronically from a computer system.
- a global system of interconnected computer networks that use the TCP/IP protocol to communicate between devices.
- the physical components of a computer s(e.g., monitor, keyboard, CPU).
- the process of connecting multiple computing devices together to share resources and information.
Down
- programs and applications that run on a computer or other digital devices, instructing them how to perform tasks.
- information that is processed or stored by a computer, often in digital form.
- Literacy the ability to use information and communication technologies to find, evaluate, create, and communicate information.
- the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
10 Clues: the physical components of a computer s(e.g., monitor, keyboard, CPU). • information that is processed or stored by a computer, often in digital form. • the process of connecting multiple computing devices together to share resources and information. • an organized collection of data that is stored and accessed electronically from a computer system. • ...
Technology in our lives 2024-12-21
Across
- – The practice of meeting current needs without harming future generations or the environment.
- – The use of machines or technology to perform tasks without human assistance.
- Computing – A type of computing that uses quantum mechanics to perform complex calculations much faster than traditional computers.
- – The practice of protecting computers, networks, and data from unauthorized access or attacks.
- – The science of building and using materials or devices at the nanoscale (extremely small sizes).
Down
- Intelligence – A branch of computer science that enables machines to perform tasks that typically require human intelligence, such as problem-solving and learning.
- – The process of creating new ideas, methods, or products that bring improvement or solve problems.
- Reality (AR) – A technology that overlays digital information or images on the real-world environment.
- – The ability to connect devices or systems to each other for communication and data exchange.
- Learning – A field of AI where computers learn from data and improve their performance without being explicitly programmed.
10 Clues: – The use of machines or technology to perform tasks without human assistance. • – The practice of meeting current needs without harming future generations or the environment. • – The ability to connect devices or systems to each other for communication and data exchange. • ...
Browsing safely 2025-06-22
Across
- Criminal activity intended to harm anyone using a computer and an internet connection.
- THEFT- Act of stealing and misusing someone's personal informations.
- A program that disturbs the normal functioning of the computer.
- Computer program, designed to identify, prevent,and remove viruses from a computer.
- An illegal entry into a computer system or network.
Down
- Collection of technologies,processes, and practices designed to protect networks,computers, program,and data from attack,damage,or unauthorised access.
- The act of sending an email to a user and misleading him to believe that it is from a trusted person or organisation.
- Illegal method to get money or other things that belong to a bank or it's customers.
- Unethical hackers,extract confidential information from users and use this information to execute fraudulent tasks online
- A software that helps in preventing unauthorised access to you computer by blocking communication.
10 Clues: An illegal entry into a computer system or network. • A program that disturbs the normal functioning of the computer. • THEFT- Act of stealing and misusing someone's personal informations. • Computer program, designed to identify, prevent,and remove viruses from a computer. • Illegal method to get money or other things that belong to a bank or it's customers. • ...
PHW Compliance Week 2024-10-08
Across
- 2. You should call the _____________ to report a suspected or known violation.
- 3. Wrongful or criminal deception intended to result in financial or personal gain.
- 14. Any possible ______________ event should be reported to the compliance team as soon as it is discovered.
- 13. Compliance _____________ is my favorite time of the year!
- 4. The Compliance program is supported by _____________ and Procedures.
- 9. Abusive, Offensive or Discriminatory remarks are what type of abuse?
- 8. PHW will strictly prohibit and will not tolerate any form of ___________ or bullying.
- 7. All _______________ are responsible for the information in the Code of Conduct and Compliance Program and will be held accountable for failing to comply.
Down
- 6. An official inspection of an individual’s or organization’s accounts.
- 15. You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the __________ home page.
- 1. The _________________ Officer is responsible for implementing and supporting the effectiveness of the Compliance Program.
- 5. Computer Security.
- 10. All employees are required to complete these in Centene University by the assigned due dates.
- 12. Sending an email securely means it has been _____________________.
- 11. FWA stands for Fraud, ____________ and Abuse.
15 Clues: 5. Computer Security. • 11. FWA stands for Fraud, ____________ and Abuse. • 13. Compliance _____________ is my favorite time of the year! • 12. Sending an email securely means it has been _____________________. • 4. The Compliance program is supported by _____________ and Procedures. • 9. Abusive, Offensive or Discriminatory remarks are what type of abuse? • ...
Compliance week 2024-10-28
Across
- Abusive, Offensive or Discriminatory remarks are what type of abuse?
- PHW will strictly prohibit and will not tolerate any form of ____ or bullying.
- Compliance ______ is my favorite time of the year!
- The compliance program is supported by _____ and Procedures.
- The _______ Officer is responsible for implementing and supporting the effectiveness of the compliance program.
- Protecting systems and data from digital attacks
- Sending and email securely means it has been ______
- You should call the ____ to report a suspected or known violation.
Down
- Any Possible _____ event should be reported to the compliance team as soon as it is discovered
- All ______ are responsible for the information in the Code of Conduct and Compliance Program and will be responsible for failing to comply
- FWA stands for Fraud,_____ and Abuse.
- All employees are required to complete these in Centene University by the assigned due dates.
- An official inspection of an individual's or organization's accounts.
- You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the _____ home page.
- Wrongful or criminal deception intended to result in financial or personal gain
15 Clues: FWA stands for Fraud,_____ and Abuse. • Protecting systems and data from digital attacks • Compliance ______ is my favorite time of the year! • Sending and email securely means it has been ______ • The compliance program is supported by _____ and Procedures. • You should call the ____ to report a suspected or known violation. • ...
Browsing Safely (SAPTADIP SAMADDER ) 2025-06-17
Across
- The data we leave behind when we use in internet
- Any criminal activity intended to harm anyone using computer and an internet connection
- It is referred to the act of stealing and misusing someone's personal information
- A collection of technology to protect networks and data from an unauthorized access
- It is a program or set of programs that disrupt the normal functioning of a computer
- Known as crackers
Down
- A crime in which the victim is attacked first and then forced to pay money to stop further attack
- used to conduct terrorism through the use of computers and internet
- Referred to an illegal entry into a computer system or network
- The process befriending with children on social media to continue online or physical sexual abuse
- illegal method to get money or other things that belong to a bank or its customers
- Example of a antivirus
- The receiver of a messages fold into believing at the message is received by him is from trusted source which is actually not true
- Ethical hackers
- A computer program that is designed to identify, prevent and remove virus from a computer
15 Clues: Ethical hackers • Known as crackers • Example of a antivirus • The data we leave behind when we use in internet • Referred to an illegal entry into a computer system or network • used to conduct terrorism through the use of computers and internet • It is referred to the act of stealing and misusing someone's personal information • ...
FWD Crossword 2025-10-28
Across
- Measurement and reporting solution for emissions baselines and reductions across operations and supply chain.
- Cybersecurity asset prototyping strategy lifecycle: scoping, intake, dynamic controls mapping, gap analysis,visual reporting.
- Suite of AI agents that emulate expert decisions using deep functional and industry knowledge.
- In-workflow helper that drafts, summarizes, and recommends actions to speed day-to-day tasks.
- Financial-services accelerators that plug into core platforms to streamline onboarding and compliance.
- Operations layer that orchestrates analytics, automation, and workflows to improve speed and quality.
- Analytics environment that unifies curated data and prebuilt models for faster, governed insights.
- Proprietary industry cloud tailored for retail, consumer products, and hospitality organizations.
- Healthcare analytics capability that integrates clinical and operational data to surface actionable insights.
Down
- Deployed intelligence at the edge that processes data locally for low-latency decisions and automation.
- Digital transformation platform that unifies methods, industry expertise, and tools to accelerate execution.
- Guided data companion that prepares, validates, and documents datasets for analytics and reporting.
- Automated modernization toolkit that converts legacy code to target stacks and accelerates cloud migration.
- Service transformation toolkit that designs journeys, digitizes operations, and measures experience outcomes.
- Pattern library that standardizes methods and automates boilerplate so teams deliver consistently.
15 Clues: In-workflow helper that drafts, summarizes, and recommends actions to speed day-to-day tasks. • Suite of AI agents that emulate expert decisions using deep functional and industry knowledge. • Proprietary industry cloud tailored for retail, consumer products, and hospitality organizations. • ...
CYBERLAW CROSSWORD 2021-09-05
Across
- Device that raise a number of security concerns because they create links between your computer and the outside world
- An economy that is based on digital computing technologies
- The code used in creating the environment that then forms Cyberspace.
- The use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- The ability to use computer technologies effectively and to understand the implications of your actions
Down
- The integration of two or more different technologies in a single device or system
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
- An independent U.S. government agency that oversees all interstate and international communications.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- A critical requirement for the sharing of digital text
10 Clues: A critical requirement for the sharing of digital text • An economy that is based on digital computing technologies • The code used in creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- A piece of digital information generated by a web server and saved in your computer after visiting a website
- A network using which things can communicate with each other using internet as means of communication between them.
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
Down
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- An attempt by hackers to damage or destroy a computer network or system.
- A software that is designed to detect and destroy compute viruses.
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
CAES Security Week 2024-01-29
Across
- This network security system acts as a barrier, controlling and monitoring incoming and outgoing traffic.
- Enhances security by requiring users to provide two different authentication factors, often something they know and something they have.
- The process of converting information into a code to secure it from unauthorized access.
- Weaknesses or flaws in a system’s security that could be exploited by attackers.
- A broad term for malicious software, including viruses, worms, and ransomware, designed to harm or exploit computer systems.
- Cyber attackers often use deceptive emails or messages in an attempt to trick individuals into revealing sensitive information through this method.
Down
- Software updates designed to fix security vulnerabilities and improve overall system performance.
- Unauthorized access or breach into a system, network, or device.
- The process of verifying the identity of a user, device, or system, typically through passwords or biometrics.
- The art of writing or solving codes; used in cybersecurity to secure communication through encryption.
10 Clues: Unauthorized access or breach into a system, network, or device. • Weaknesses or flaws in a system’s security that could be exploited by attackers. • The process of converting information into a code to secure it from unauthorized access. • Software updates designed to fix security vulnerabilities and improve overall system performance. • ...
