cybersecurity Crossword Puzzles
Dampak sosial informatika 2024-04-24
Across
- Istilah yang mengacu pada upaya untuk melindungi komputer, jaringan, dan data dari serangan, kerusakan, atau akses yang tidak sah.
- Istilah untuk perilaku tidak pantas atau tidak etis di internet, seperti pelecehan atau penipuan online.
- Kejahatan yang melibatkan penggunaan teknologi informasi, seperti pencurian identitas dan penipuan online.
- Istilah yang mengacu pada interaksi sosial melalui platform atau aplikasi digital, seperti media sosial atau pesan instan.
- Istilah untuk kesenjangan antara individu atau kelompok yang memiliki akses dan keterampilan teknologi informasi dan yang tidak memiliki akses atau keterampilan tersebut.
- Fenomena di mana seseorang menghabiskan terlalu banyak waktu di internet, mengakibatkan kurangnya interaksi sosial di dunia nyata.
Down
- Fenomena di mana informasi yang diposting online dapat bertahan selama periode yang lama dan memiliki dampak jangka panjang pada individu atau kelompok.
- Praktik membagi informasi pribadi atau rahasia secara tidak sah atau tidak etis di internet.
- Istilah untuk berita palsu atau informasi yang menyesatkan yang tersebar luas di internet.
- Penggunaan teknologi informasi untuk menyebarkan informasi yang bersifat memprovokasi, menyesatkan, atau menipu untuk tujuan tertentu.
10 Clues: Istilah untuk berita palsu atau informasi yang menyesatkan yang tersebar luas di internet. • Praktik membagi informasi pribadi atau rahasia secara tidak sah atau tidak etis di internet. • Istilah untuk perilaku tidak pantas atau tidak etis di internet, seperti pelecehan atau penipuan online. • ...
Zoya's cybersecurity crossword 2021-02-12
Cybersecurity Awareness Month 2023-07-21
Across
- weakness of an asset or control that can be exploited by threats
- attempt to destroy, expose, alter, disable, steal, or gain unauthorized use of an asset
- a software program that monitors for known examples of malicious code and then attempts to remove or quarantine it
Down
- a network security tool that monitors and filters incoming and outgoing network traffic
- provision of assurance that a claimed characteristic of an entity is correct
5 Clues: weakness of an asset or control that can be exploited by threats • provision of assurance that a claimed characteristic of an entity is correct • a network security tool that monitors and filters incoming and outgoing network traffic • attempt to destroy, expose, alter, disable, steal, or gain unauthorized use of an asset • ...
Cybersecurity Week 3 2022-09-27
Across
- This is a popular programming language used in security scripts.
- This type of testing simulates an attack against an organization in which ethical hackers use many of the same tools, techniques, and procedures as a real attacker would use.
Down
- What is the process of converting information or data into a code, especially to prevent unauthorized access?
- ______ detection is the process of identifying cyberattacks trying to enter a machine or network.
- A cybersecurity _____ is a set of rules and guidelines that direct everyday IT activity in your organization.
5 Clues: This is a popular programming language used in security scripts. • ______ detection is the process of identifying cyberattacks trying to enter a machine or network. • What is the process of converting information or data into a code, especially to prevent unauthorized access? • ...
the apps we should be safe from 2025-05-20
Across
- deceptive practices to misuse financial institutions and their services for personal gain or to commit other crimes
- cybersecurity tactic where attackers send emails with a forged sender address, making it appear as if the email originated from a legitimate source
Down
- the act of identifying and exploiting weaknesses in a computer system or network to gain unauthorized access or control
- a type of malicious software (malware) designed to replicate and spread between computers, causing damage or disruption.
- the use of technology to harass, threaten, embarrass, or target another person.
5 Clues: the use of technology to harass, threaten, embarrass, or target another person. • deceptive practices to misuse financial institutions and their services for personal gain or to commit other crimes • the act of identifying and exploiting weaknesses in a computer system or network to gain unauthorized access or control • ...
ISM CROSSWORD PUZZLE 2025-07-29
Across
- The position ISM Clause 4 is centered around
- Resolution MSC.428 (98) mandates that these risks be addressed in compliance with the International Safety Management (ISM) Code.
- A document intended to provide an on-board record of the history of the ship with respect to the information recorded therein
- Acronym which indicates that the risk should be lowered as low as reasonably practicable
- Risk=Likelihood X ______
- Quantitative or qualitative information records or statement
- Number of months the internal ISM audits can be postponed in exceptional circumstances
- Interim DOC is issued for ___ months
- A document issued to a company which complies with the requirements of the ISM Code
Down
- A sequence of events and/or conditions that could have resulted in loss
- International convention through which the ISM Code was mandatory and entered into force on 1st July 1998
- A statement of fact made during a safety management audit and substantiated by objective evidence
- The owner of the ship or any other organization or person such as the manager, or the bareboat charterer, who has assumed the responsibility for operation of the ship from the shipowner and who, on assuming such responsibility, has agreed to take over all the duties and responsibility imposed by the Code.
- Personnel carrying audits should be _____ of the areas being audited
14 Clues: Risk=Likelihood X ______ • Interim DOC is issued for ___ months • The position ISM Clause 4 is centered around • Quantitative or qualitative information records or statement • Personnel carrying audits should be _____ of the areas being audited • A sequence of events and/or conditions that could have resulted in loss • ...
ISM CRO 2025-07-29
Across
- The position ISM Clause 4 is centered around
- Resolution MSC.428 (98) mandates that these risks be addressed in compliance with the International Safety Management (ISM) Code.
- A document intended to provide an on-board record of the history of the ship with respect to the information recorded therein
- Acronym which indicates that the risk should be lowered as low as reasonably practicable
- Risk=Likelihood X ______
- Quantitative or qualitative information records or statement
- Number of months the internal ISM audits can be postponed in exceptional circumstances
- Interim DOC is issued for ___ months
- A document issued to a company which complies with the requirements of the ISM Code
Down
- A sequence of events and/or conditions that could have resulted in loss
- International convention through which the ISM Code was mandatory and entered into force on 1st July 1998
- A statement of fact made during a safety management audit and substantiated by objective evidence
- The owner of the ship or any other organization or person such as the manager, or the bareboat charterer, who has assumed the responsibility for operation of the ship from the shipowner and who, on assuming such responsibility, has agreed to take over all the duties and responsibility imposed by the Code.
- Personnel carrying audits should be _____ of the areas being audited
14 Clues: Risk=Likelihood X ______ • Interim DOC is issued for ___ months • The position ISM Clause 4 is centered around • Quantitative or qualitative information records or statement • Personnel carrying audits should be _____ of the areas being audited • A sequence of events and/or conditions that could have resulted in loss • ...
Masyarakat digital 2025-02-22
Across
- Kumpulan data dalam jumlah besar yang dikumpulkan dan dianalisis untuk mengidentifikasi pola atau tren dalam berbagai aspek kehidupan.
- Upaya perlindungan terhadap sistem komputer, jaringan, dan data digital dari ancaman seperti peretasan, malware, dan pencurian data.
Down
- Rekam jejak aktivitas seseorang di dunia digital, termasuk data yang ditinggalkan saat menggunakan internet, seperti postingan media sosial dan riwayat pencarian.
- Informasi palsu atau menyesatkan yang disebarkan secara daring untuk tujuan tertentu, seperti propaganda atau penipuan.
- Jaringan perangkat yang saling terhubung melalui internet untuk bertukar data dan otomatisasi proses, seperti smart home dan wearable devices.
5 Clues: Informasi palsu atau menyesatkan yang disebarkan secara daring untuk tujuan tertentu, seperti propaganda atau penipuan. • Upaya perlindungan terhadap sistem komputer, jaringan, dan data digital dari ancaman seperti peretasan, malware, dan pencurian data. • ...
Cybersecurity Week 2 2022-09-27
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
- A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
- A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid. • A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state. • A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system. • ...
Cybersecurity Week 4 2022-09-27
Across
- This is a popular network protocol analyzer, or an application that captures packets from a network connection.
- This is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
Down
- ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
- _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
- 95% of all firewalls fail due to this
5 Clues: 95% of all firewalls fail due to this • _____ scanning is a common technique hackers use to discover open doors or weak points in a network. • This is a popular network protocol analyzer, or an application that captures packets from a network connection. • ...
Cybersecurity Week 1 2022-09-27
Across
- A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
- ___ trust network access is a set of technologies and functionalities that enable secure access to internal applications and remote users
- A ___ access security broker is a security policy enforcement point positioned between enterprise users and ____ service providers.
Down
- Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
- A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic
5 Clues: A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic • A ___ access security broker is a security policy enforcement point positioned between enterprise users and ____ service providers. • ...
Day 21 2022-11-24
Across
- (First word of two, also see 1 down) The simulation of human intelligence processes by machines, especially computer systems (10 letters)
- Complete or partial replacement of human work with machine work (10 letters)
- Holistic approach to the security of our products, solutions, information security, and much more (13 letters)
- A virtual representation that uses real world data to create a simulation (two words, 7 and 4 letters). Hint: this Meet the Expert article might help [add link]
Down
- An inventory of an organization’s data assets (two words 4 and 7 letters)
- (Second word of two, see 1 across) The simulation of human intelligence processes by machines, especially computer systems (12 letters)
6 Clues: An inventory of an organization’s data assets (two words 4 and 7 letters) • Complete or partial replacement of human work with machine work (10 letters) • Holistic approach to the security of our products, solutions, information security, and much more (13 letters) • ...
Adeline - 8Gamma : Social engineering. 2023-02-02
Across
- A practice of protecting systems, networks, and programs from digital attack
- An attack where victims are asked in an app or social media to write down a few of information or to complete a short quiz in order to produce a name.
- An attack where victims are being deceive into handing over private information to be use for fraudulent purposes.
Down
- an attck which victims recieves an email disguised as if come from a reputable source
- an attack where the scammer create a scenerio in order to convince the victim to give out their private data.
- a person who tricks you into doing something and stealing private data or information from you
6 Clues: A practice of protecting systems, networks, and programs from digital attack • an attck which victims recieves an email disguised as if come from a reputable source • a person who tricks you into doing something and stealing private data or information from you • ...
Cyber Security 2022-12-18
Across
- A type of cyber attack that involves stealing sensitive information, such as credit card numbers or personal identification.
- A threat that originates from outside an organization's network.
- A type of cyber attack that involves tricking a user into revealing sensitive information, such as passwords or credit card numbers.
- A barrier that controls incoming and outgoing network traffic based on predetermined security rules.
Down
- Computer programs and related data that provide the instructions for telling a computer what to do and how to do it.
- A type of cyber attack that involves using social engineering techniques to manipulate individuals into divulging sensitive information or performing actions that may compromise their own or an organization's security.
- The process of protecting computers, networks, and data from unauthorized access or attacks.
- Intending or likely to cause harm or mischief.
8 Clues: Intending or likely to cause harm or mischief. • A threat that originates from outside an organization's network. • The process of protecting computers, networks, and data from unauthorized access or attacks. • A barrier that controls incoming and outgoing network traffic based on predetermined security rules. • ...
ANCAMAN TERHADAP KEAMANAN DATA 2025-01-23
Across
- sebuah istilah yang dilekatkan pada aktivitas yang dilakukan manusia untuk merebut kepercayaan manusia lain
- contoh ancaman siber yang dilakukan dengan menyusup ke dalam komunikasi antara dua pihak
- salah satu jenis ancaman cybersecurity yang dilakukan dengan email atau pesan yang tampak sah untuk mengelabui penerima
- Jenis malware yang bekerja dengan cara mengenkripsi file Anda, kemudian membuatnya tidak dapat diakses tanpa kunci dekripsi
Down
- perangkat lunak berbahaya yang terbagi menjadi berbagai bentuk, termasuk virus, worm, trojan, dan jenis perangkat lunak berbahaya lainnya.
- pencurian data yang melibatkan akses ilegal dan pengambilan data pribadi atau korporat, seperti catatan keuangan, informasi pelanggan, atau rahasia perdagangan.
- bisa dilakukan dengan membuat alamat email palsu, situs web yang dibuat untuk menyerupai situs asli, bahkan paket data yang disamarkan dalam jaringan.
7 Clues: contoh ancaman siber yang dilakukan dengan menyusup ke dalam komunikasi antara dua pihak • sebuah istilah yang dilekatkan pada aktivitas yang dilakukan manusia untuk merebut kepercayaan manusia lain • salah satu jenis ancaman cybersecurity yang dilakukan dengan email atau pesan yang tampak sah untuk mengelabui penerima • ...
New 2021-09-06
Across
- is any software application in which advertising banners are displayed while a program is running
- is malware that employs encryption to hold a victim's information at ransom.
- is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
Down
- is the practice of protecting systems, networks, and programs from digital attacks.
- is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
5 Clues: is malware that employs encryption to hold a victim's information at ransom. • is the practice of protecting systems, networks, and programs from digital attacks. • is any software application in which advertising banners are displayed while a program is running • ...
Cybersecurity Cross Word Puzzle activity 2025-09-12
Across
- Software designed to detect and remove malicious programs
- A scam where attackers trick users into giving up sensitive info
- Factor Authentication A method of verifying identity using multiple factors
- A weakness in a system that can be exploited
- A secret word or phrase used to gain access
- Keeping software up to date helps prevent these
Down
- A type of malware that locks data until a ransom is paid
- A network security system that monitors and controls traffic
- A person who uses computers to gain unauthorized access
9 Clues: A secret word or phrase used to gain access • A weakness in a system that can be exploited • Keeping software up to date helps prevent these • A person who uses computers to gain unauthorized access • A type of malware that locks data until a ransom is paid • Software designed to detect and remove malicious programs • ...
FIT_Vocab.ac 2013-05-16
Across
- prefix used to describe a computer
- monitor
- wired internet
- main storage in the computer
- 3G, 4G
- the CD drive on the side of the computer
- an electronic copy of something
- what does LED stand for
- something that is connected to the computer
- comcast and xfinity
- 1000 megabytes
- how you behave online
- short-term memory
- uses a rubber ball to tract movement
- provides the computer with the ability to produce sounds
- biggest unit of data
- starting up the computer
- anything that comes out of the computer (printer)
- a network that other computers can not access
Down
- a search engine that uses a bot to crawl through the internet
- you safety online
- what does USB stand for
- speen of the computer
- zoomable presintation program
- what does WIFI stand for
- identification given to a device on a certain wireless network
- NCSA
- an object on the computer that stores data
- anything that plugs into the computer (flash drive)
- the act of buying and selling in a market
- the heart of the computer
- the protection of any published work
- quoting a reference to an authority
- high speed internet
- how safe you and your and your information online is
- a distinct cry or phrase
- advancing in rank
- 1000 exabytes
- a software application
- 1000 terabytes
- smallest unit of data
- a place to store files in the air
- a part of the computer allowing you to send and receive data
44 Clues: PDF • NCSA • 3G, 4G • monitor • 1000 exabytes • wired internet • 1000 megabytes • 1000 terabytes • you safety online • short-term memory • advancing in rank • comcast and xfinity • high speed internet • biggest unit of data • speen of the computer • how you behave online • smallest unit of data • a software application • what does USB stand for • what does LED stand for • what does WIFI stand for • ...
Advertising Crossword 2023-09-18
Across
- Spam is any unsolicited communication sent in bulk.
- A marketing term that refers to the next step or the action that the marketer wants the consumer to take
- any form of advertising that appears on mobile devices such as smartphones and tablets using wireless connections
- Federal Trade Commission
- A short, simple tune that is easy to remember that is used to advertise on TV or radio is called a _____
- Unwanted mailers and promotional letters and leaflets sent through the mail are called what?
- an economic concept that presupposes that when making a choice, consumers will always focus primarily on the maximisation of their private benefits.
- Which color in advertising represents innocence?
- Example of print media
Down
- What term describes the number of times that an audience sees an advertisemen
- Which persuasive technique involves social pressure to conform, or "follow the crowd" because it is popular?
- a person who purchases goods and services for personal use.
- is a type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods,
- Refers to the specific group of consumers most likely to want your product or service
- This color in advertising represents wealth and luxury?
- Which color in advertising commands attention?
- one or two phrases that provides clarity, entertainment, or emphasis to help highlight a brand's mission, purpose, or culture.
- Which color in advertising represents nature and the earth?
- when a creative ad is displayed on a host site in hopes that it will drive traffic to the
- Example of mass media
20 Clues: Example of mass media • Example of print media • Federal Trade Commission • Which color in advertising commands attention? • Which color in advertising represents innocence? • Spam is any unsolicited communication sent in bulk. • This color in advertising represents wealth and luxury? • a person who purchases goods and services for personal use. • ...
Cyber security 2023-09-09
Across
- software that holds your data hostage
- helps make sure that a user types in the correct url to get into a desired website
- where a bunch of false information paper on ur screen forcing u to click on it causing for ur device to get infected
- one option that can help protect your business against losses resulting from a cyber attack
- a way of fighting against Phishing attacks by verifying the emails that are being sent
- the act of imitating to be someone reputable and convince another person to reveal information
- one of the most safest way to secure wireless connections
- convert data into a code to prevent unauthorized access
- a system to block unauthorized data
Down
- the act of protecting systems from digital attacks
- when data has been leaked or obtained in an illegal way
- a service that hosts websites for clients, it facilitates maintenance of a site and makes it accessible on the World Wide Web
- a action of trying to steal someone information
- a series of letter that only a trusted person would know it provides security to accounts
- a way to identify email from spoofers
- designed to disrupt, damage, or gain unauthorized access to a computer system.
- group of Computers that share user information
- when a person attempts to want to help u out wit a problem in ur computer
- a group of private computers that infect malicious software
- act of passing as someone, once you have accessed his private information
20 Clues: a system to block unauthorized data • software that holds your data hostage • a way to identify email from spoofers • group of Computers that share user information • a action of trying to steal someone information • the act of protecting systems from digital attacks • when data has been leaked or obtained in an illegal way • ...
ICT LESSON 2023-11-28
Across
- The physical components of a computer.
- A network security device that monitors and controls incoming and outgoing network traffic.
- A file made of rows and columns that help sort, organize, and arrange data efficiently.
- Code, The most basic form of computer code or programming, it uses only 0's and 1's.
- The programs and operating systems that run on a computer.
- The brain of the computer, also known as the CPU.
- set of rules governing the exchange of data over a network.
- A collection of organized data that can be accessed and managed easily.
- The method by which information is converted into secret code that hides the information's true meaning.
Down
- A set of instructions designed to perform a specific task.
- The maximum rate of data transfer across a given path.
- script, A popular programming language used primarily in web development.
- The practice of protecting systems, networks, and programs from digital attacks.
- A global network connecting millions of computers and servers.
- An acronym for Random Access Memory, a type of computer memory that can be accessed randomly.
- System, Software that controls the execution of computer programs and may provide various services.
- Computing, The delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”).
- The practice of interacting with others to exchange information and develop professional or social contacts.
- An acronym for Uniform Resource Locator, it refers to the address of a web page.
- A markup language used to create web pages.
20 Clues: The physical components of a computer. • A markup language used to create web pages. • The brain of the computer, also known as the CPU. • The maximum rate of data transfer across a given path. • A set of instructions designed to perform a specific task. • The programs and operating systems that run on a computer. • ...
CW Products 2022-03-29
Across
- E-commerce platform that allows partners to self-provision certified product offerings that integrate with the ConnectWise platform.
- Network Operations Center
- NIST Driven Risk Assesment Product
- Avoids downtime and disruption for your clients with our secure backup and disaster recovery solution
- Provides premier IT advance documentation solution with versatile dashboards.
- is a multi-tenant solution for Security Incident and Event Management
- Professional Service Automation tool i.e. Connects data and workflows across all stages of the customer lifecycle
- A data-driven technology solution provider, with enhanced business insights tools and functionality.
- Provides automation and simplifies the creation of complex technology quotes and proposals.
- works on your behalf to route and directly respond to client tickets in record time.
- Provides powerful, secure, easy-to-use remote access and support features.
Down
- RMM platform that automates technical tasks and decreases your service delivery time
- Troubleshoot on-site issues through the camera of a user's mobile device
- Data visualization and reporting tool that helps to create value added gauges as per KPI
- Provides advanced cybersecurity tools and expertise at your fingertips
- Tool available within ConnectWise Manage for live conversation
- Tool built from the ground up by ConnectWise to bring user centric billing to your business.
- Remote Management and Monitoring with Intelligent Alerting
- Dynamic marketing tool that provides full integration to ConnectWise Manage
- Automates technician's day-to-day activities through a single intuitive interface
- Allows teams to manage, monitor, and bill a swath of cloud-based solutions
- Technology provider for measuring the customer experience
- Security Operations Center
23 Clues: Network Operations Center • Security Operations Center • NIST Driven Risk Assesment Product • Technology provider for measuring the customer experience • Remote Management and Monitoring with Intelligent Alerting • Tool available within ConnectWise Manage for live conversation • is a multi-tenant solution for Security Incident and Event Management • ...
CW Products 2022-03-29
Across
- E-commerce platform that allows partners to self-provision certified product offerings that integrate with the ConnectWise platform.
- Network Operations Center
- NIST Driven Risk Assessment Product
- Avoids downtime and disruption for your clients with our secure backup and disaster recovery solution
- Provides premier IT advance documentation solution with versatile dashboards.
- is a multi-tenant solution for Security Incident and Event Management
- Professional Service Automation tool i.e. Connects data and workflows across all stages of the customer lifecycle
- A data-driven technology solution provider, with enhanced business insights tools and functionality.
- Provides automation and simplifies the creation of complex technology quotes and proposals.
- works on your behalf to route and directly respond to client tickets in record time.
- Provides powerful, secure, easy-to-use remote access and support features.
Down
- RMM platform that automates technical tasks and decreases your service delivery time
- Troubleshoot on-site issues through the camera of a user's mobile device
- Data visualization and reporting tool that helps to create value added gauges as per KPI
- Provides advanced cybersecurity tools and expertise at your fingertips
- Tool available within ConnectWise Manage for live conversation
- Tool built from the ground up by ConnectWise to bring user centric billing to your business.
- Remote Management and Monitoring with Intelligent Alerting
- Dynamic marketing tool that provides full integration to ConnectWise Manage
- Automates technician's day-to-day activities through a single intuitive interface
- Allows teams to manage, monitor, and bill a swath of cloud-based solutions
- Technology provider for measuring the customer experience
- Security Operations Center
23 Clues: Network Operations Center • Security Operations Center • NIST Driven Risk Assessment Product • Technology provider for measuring the customer experience • Remote Management and Monitoring with Intelligent Alerting • Tool available within ConnectWise Manage for live conversation • is a multi-tenant solution for Security Incident and Event Management • ...
EOCA 3-4 2024-12-13
Across
- Real-time location tracking device used by police.
- Platform often used by law enforcement to share alerts.
- Cameras: Devices worn by officers to record interactions.
- Alerts: System used to notify the public about missing children.
- Strategy involving a visible police presence to deter crime.
- Citizen-provided tips and leads are often submitted via this.
- Non-lethal devices used to subdue individuals resisting arrest.
- Advocacy: Providing support and resources to those affected by crime.
- Locker: Secure location where physical evidence is stored.
- Field focusing on protecting digital infrastructure from attacks.
- Analysis: Forensic technique for identifying suspects through genetic material.
- Systems responsible for emergency communications like 911.
- Department: Agency monitoring fire safety and suppression.
- Collection of physical evidence to support legal action in such cases.
- Initial action taken by police to ensure safety during a domestic violence call.
Down
- National agency that collaborates with local police on terrorism cases.
- Patrol: Organization that oversees highway safety and traffic law enforcement.
- Driving through neighborhoods to observe and respond quickly to incidents.
- Mapping: Technology used to identify crime hotspots.
- Cameras: Tools used to monitor public areas for safety.
- Specialized unit trained to handle high-risk operations.
- Programs aimed at educating the public about safety.
- System used to coordinate emergency response efforts across agencies.
- Tool used for analyzing trace evidence like hair and fibers.
- Method for determining a person’s identity using unique patterns in their skin.
- Strategy focused on building trust and cooperation with citizens.
- Meetings: Events where officers engage with residents to address concerns.
27 Clues: Real-time location tracking device used by police. • Mapping: Technology used to identify crime hotspots. • Programs aimed at educating the public about safety. • Platform often used by law enforcement to share alerts. • Cameras: Tools used to monitor public areas for safety. • Specialized unit trained to handle high-risk operations. • ...
Cyber IWD Crossword 2025-03-06
Across
- The official theme announced by UN Women Australia for International Women’s Day (IWD) 2025
- This number makes up the percentage of women in the cybersecurity workforce in Australia.
- The interview series by PwC’s She’s Here in Cyber and Technology program is called “She’s Here to____”.
- Gender _______; a key focus on closing the gap in opportunities.
- The woman who created the first computer program.
- Australia’s first International Women’s Day was held in 1928 in _____.
- Symbolic color often associated with women's rights.
- UN Sustainable Development Goal to achieve gender equality and empower all women and girls. (including the number)
- Australia's first female Prime Minister.
- Beatrice Page's parents think she can help them with issues with _______ because she works in Cyber and Privacy.
- The person in C&P team has two birds called Roki and Pipin.
Down
- PwC’s network focused on gender equality.
- The person in C&P team was born in Macedonia in Europe.
- The country where the idea of International Women’s Day was initiated.
- Natalie Mu played _____ gaming console as a child.
- The person in C&P team has hiked the Annapurna Circuit in Nepal.
- The person in C&P team has small disco lights at home and often will have a "dance off" on Friday afternoons with her kids to get into the mood for the weekend and celebrate the work week being done.
- Year 190_ women got the vote in Australia through The Commonwealth Franchise Act.
- International Women's Day's primary goal is to create this for women globally.
- The month International Women's Day is celebrated.
20 Clues: Australia's first female Prime Minister. • PwC’s network focused on gender equality. • The woman who created the first computer program. • Natalie Mu played _____ gaming console as a child. • The month International Women's Day is celebrated. • Symbolic color often associated with women's rights. • The person in C&P team was born in Macedonia in Europe. • ...
Tugas Daring Informatika Salsabila.n.l 30/xi 2025-04-11
Across
- scientist profesi yang bertugas menganalisis data untuk menghasilkan informasi yang berguna adalah...
- operator boolean yang digunakan untuk mengecualikan kata kunci adalah...
- dokumenter budaya salah satu contoh konten digital yang mengandung unsur budaya adalah...
- digital upaya untuk memerangi penyebaran konten negatif disebut...
- analyst profesi yang bertugas mengamankan sistem komputer dari serangan siber adalah...
- Tanda kutip ganda (") digunakan untuk mencari frasa yang...
- grafis provinsi yang bertugas membuat desain visual untuk produksi digital adalah...
- salah satu lembaga yang bertugas memvalidasi konten negatif adalah...
- salah satu contoh konten negatif adalah...
- salah satu contoh HAKI adalah...
- dua simbol yang digunakan untuk mencari kata kunci di situs web tertentu adalah...
- proses penyebaran konten digital kepada khalayak luas disebut...
- salah satu contoh konten digital yang mengandung unsur budaya adalah...
- profesi yang bertugas mengembangkan dan memelihara sistem komputer adalah...
Down
- proses verifikasi kebenaran konten digital disebut...
- salah satu contoh platform untuk diseminasi konten digital adalah...
- operator boolean yang digunakan untuk menggabungkan kata kunci adalah...
- simbol yang digunakan untuk mencari kata kunci yang mirip adalah...
- salah satu cara untuk memvalidasi konten negatif adalah dengan melakukan...
- etika dalam memproduksi dan mendiseminasikan konten digital disebut...
- organisasi internasional yang mengurusi HAKI adalah...
- creator profesi yang bertugas membuat konten untuk media sosial adalah...
- cipta hak eksklusif pencipta yang timbul secara otomatis berdasarkan prinsip deklaratif setelah suatu ciptaan diwujudkan dalam bentuk nyata tanpa mengurangi pembatasan sesuai dengan ketentuan peraturan perundang-undangan disebut...
- pelanggaran haki dapat dikenakan sanksi...
- hidup pencipta +70 tahun masa berlaku hak cipta untuk buku,lagu,dan karya seni lainnya adalah...
25 Clues: salah satu contoh HAKI adalah... • salah satu contoh konten negatif adalah... • pelanggaran haki dapat dikenakan sanksi... • proses verifikasi kebenaran konten digital disebut... • organisasi internasional yang mengurusi HAKI adalah... • Tanda kutip ganda (") digunakan untuk mencari frasa yang... • proses penyebaran konten digital kepada khalayak luas disebut... • ...
ADSI Julian Martinez 2022-05-11
Across
- Reload or display the contents of a Web page or window
- Describe the tasks and bisiness functions that users, managers, and IT staff members perform to achieve a specific results
- Connecting an Internet document to another that is highlighted in a special way, also called Hyperlink
- refers to the action of creating programs or applications through the development of a source code
- Folder or buffer that temporarily stores files on your computer
- Appearance that the programs present after their execution through which we exercise communication with these
- is the text that a person enters in a browser to enter a specific website
- are symbolic representations of a certain qualitative or quantitative attribute or variable
- Security devices to unauthorized entries
- A person who uses a computer or computer system
Down
- is the area related to computer science that focuses on the protection of the computational infrastructure and everything related to it
- Mix data to protect it as a security measure making it unreadable
- is the stage where a programmer can read and modify a computer program.
- Science that studies the design of automatic machines or robots in order to provide them with human intelligence
- Set of concrete and detailed instructions by which a certain action is achieved
- is the physical layer of the information system
- is any computer program
- Program capable of storing a large amount of data, related and structured, which can be consulted quickly
- Computer scientists who use their great knowledge to cross any computer barrier
- is an error in the code of a program
20 Clues: is any computer program • is an error in the code of a program • Security devices to unauthorized entries • is the physical layer of the information system • A person who uses a computer or computer system • Reload or display the contents of a Web page or window • Folder or buffer that temporarily stores files on your computer • ...
AI/Cisco Crossword 2022-12-01
Across
- Bad software that can infect your system
- Hackers who hack for a cause or reason
- a multinational technology company
- Information you must carry to verify who you are, all on one sheet of paper
- something that can harm your system
- a cloud computing platform
- an open source operating system
- The explanation(s) of internet safety
- being trustworthy enough to hold private information
- a device that connects other devices
- a way of authenticating onself
- a type of system that runs on a computing device
- Creates annoying pop ups that are difficult to get rid of
- a file of executable commands that have been stored in a file
Down
- a company made to ensure America has a skilled future workforce
- information stored on a device
- a high class based coding language
- a thing that allows you to connect to the internet
- a company that provides education on technological studies
- a list of directories
- The idea that services are available 99.999% of the time
- the act of sending a link via sms to get into someones phone
- another name for a filesystem
- theft via bluetooth
- The idea that if something bad happens you can do something to remedy it
- a coding language thats great for beginners
- a feature that connects devices to other devices wirelssly
- Fake information designed to lure in attackers (hackers)
- a type of program with the code publicly availible
- an open source hardware and software company
30 Clues: theft via bluetooth • a list of directories • a cloud computing platform • another name for a filesystem • information stored on a device • a way of authenticating onself • an open source operating system • a high class based coding language • a multinational technology company • something that can harm your system • a device that connects other devices • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
3D - UwU Montag, Vehovský 2021-04-30
Across
- several computers and other devices that are connected together
- a piece of information that forms part of a message sent through a computer network
- a device that creates a wireless local area network, or WLAN, usually in an office or large building
- global IT and cybersecurity education program that partners with learning institutions around the world
- a device that sends data to the appropriate parts of a computer network
Down
- a piece of computer equipment, especially a small one such as a smartphone
- any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
- networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
- a series of letters, numbers, etc. that you must type into a computer or computer system in order to be able to use it
- an electronic machine that can store, organize, and find information, do processes with numbers and other data
- a set of wires, covered in plastic or rubber
11 Clues: a set of wires, covered in plastic or rubber • several computers and other devices that are connected together • a device that sends data to the appropriate parts of a computer network • a piece of computer equipment, especially a small one such as a smartphone • a piece of information that forms part of a message sent through a computer network • ...
IT SECURITY 2022-10-27
Across
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the process of converting information or data into a code, especially to prevent unauthorized access.
- software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- network security device that monitors and filters incoming and outgoing network traffic
- good privacy an open source and freely available software package for email security
Down
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- The conversion of encrypted data into its original form
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
11 Clues: The conversion of encrypted data into its original form • good privacy an open source and freely available software package for email security • network security device that monitors and filters incoming and outgoing network traffic • software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • ...
Cybersecurity Awareness Month Crossword Puzzle 2021-10-01
Across
- When someone or a cyber-criminal take advantage of you by using information commonly available through social media, information sharing, or a conversation.
- Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
- Fake messages from a seemingly trusted or reputable source designed to convince you to reveal information, give unauthorized access to a system, commit financial transactions, or click on a link.
- A type of program used for automating tasks on the internet.
Down
- To properly secure systems, cellphones, tablets, computers, data, information, and passwords is to S____G_____ your device.
- Any software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.
- Happens when someone uses another person's name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- If not careful, giving up name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, or passwords can lead to loss of what?
- Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms.
9 Clues: A type of program used for automating tasks on the internet. • Malware designed to make data or hardware inaccessible to the victim until a ransom is paid. • Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms. • ...
3D - UwU - Montag Vehovský 2021-05-04
Across
- several computers and other devices that are connected together
- a piece of information that forms part of a message sent through a computer network
- a device that creates a wireless local area network, or WLAN, usually in an office or large building
- global IT and cybersecurity education program that partners with learning institutions around the world
- a device that sends data to the appropriate parts of a computer network
Down
- a piece of computer equipment, especially a small one such as a smartphone
- any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
- networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
- a series of letters, numbers, etc. that you must type into a computer or computer system in order to be able to use it
- an electronic machine that can store, organize, and find information, do processes with numbers and other data
- a set of wires, covered in plastic or rubber
11 Clues: a set of wires, covered in plastic or rubber • several computers and other devices that are connected together • a device that sends data to the appropriate parts of a computer network • a piece of computer equipment, especially a small one such as a smartphone • a piece of information that forms part of a message sent through a computer network • ...
Puzzle - 12 2022-10-10
Across
- State of being safe / free from danger or threat
- a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
- A person or event that has the potential for impacting a valuable resource in a negative manner
- software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- The programs and other operating information used by a computer
- is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
Down
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- Good guys in the world of cybercrime. Hackers who use their skills and talents for good
- extends a private network across a public network and enables users to send and receive data across shared or public networks
- a list of permitted items that are automatically let through whatever gate is being used.
- name commonly given to unsolicited email.
11 Clues: name commonly given to unsolicited email. • State of being safe / free from danger or threat • The programs and other operating information used by a computer • Good guys in the world of cybercrime. Hackers who use their skills and talents for good • a list of permitted items that are automatically let through whatever gate is being used. • ...
IT SECURITY 2022-10-27
Across
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the process of converting information or data into a code, especially to prevent unauthorized access.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- network security device that monitors and filters incoming and outgoing network traffic
- good privacy an open source and freely available software package for email security
Down
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- The conversion of encrypted data into its original form
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
11 Clues: The conversion of encrypted data into its original form • good privacy an open source and freely available software package for email security • network security device that monitors and filters incoming and outgoing network traffic • the process of converting information or data into a code, especially to prevent unauthorized access. • ...
MasterCard Fieldtrip Vocabulary 2025-10-21
Across
- Harmful digital activity detected by the Fusion Center. 54 68 72 65 61 74
- Key concept: ensuring business can recover from incidents. 52 65 73 69 6C 69 65 6E 63 65
- Analyzes network activity and alerts on threats. 53 4F 43
- Place where teams from across Mastercard collaborate to detect and respond to threats.46 75 73 69 6F 6E 43 65 6E 74 65 72
- Study of protecting systems and networks. 43 79 62 65 72 73 65 63 75 72 69 74 79
- The Fusion Center handles these to prevent data loss.49 6E 63 69 64 65 6E 74 73
- “Trust is a _______.”43 75 72 72 65 6E 63 79
Down
- An unwanted software program or attack. 4D 61 6C 77 61 72 65
- Cyber teams must work together in this way. 43 6F 6C 6C 61 62 6F 72 61 74 69 6F 6E
- The global company hosting our field trip. 4D 61 73 74 65 72 63 61 72 64
- Digital evidence is analyzed here.46 6F 72 65 6E 73 69 63 73
11 Clues: “Trust is a _______.”43 75 72 72 65 6E 63 79 • Analyzes network activity and alerts on threats. 53 4F 43 • An unwanted software program or attack. 4D 61 6C 77 61 72 65 • Digital evidence is analyzed here.46 6F 72 65 6E 73 69 63 73 • The global company hosting our field trip. 4D 61 73 74 65 72 63 61 72 64 • ...
montag, vehovsky 2021-05-04
Across
- several computers and other devices that are connected together
- a piece of information that forms part of a message sent through a computer network
- a device that creates a wireless local area network, or WLAN, usually in an office or large building
- global IT and cybersecurity education program that partners with learning institutions around the world
- a device that sends data to the appropriate parts of a computer network
Down
- a piece of computer equipment, especially a small one such as a smartphone
- any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
- networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
- a series of letters, numbers, etc. that you must type into a computer or computer system in order to be able to use it
- an electronic machine that can store, organize, and find information, do processes with numbers and other data
- a set of wires, covered in plastic or rubber
11 Clues: a set of wires, covered in plastic or rubber • several computers and other devices that are connected together • a device that sends data to the appropriate parts of a computer network • a piece of computer equipment, especially a small one such as a smartphone • a piece of information that forms part of a message sent through a computer network • ...
3D - UwU Montag, Vehovský 2021-04-30
Across
- several computers and other devices that are connected together
- an electronic machine that can store, organize, and find information, do processes with numbers and other data
- a piece of information that forms part of a message sent through a computer network
- a series of letters, numbers, etc. that you must type into a computer or computer system in order to be able to use it
- global IT and cybersecurity education program that partners with learning institutions around the world
Down
- a piece of computer equipment, especially a small one such as a smartphone
- any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
- a device that sends data to the appropriate parts of a computer network
- a device that creates a wireless local area network, or WLAN, usually in an office or large building
- networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
- a set of wires, covered in plastic or rubber
11 Clues: a set of wires, covered in plastic or rubber • several computers and other devices that are connected together • a device that sends data to the appropriate parts of a computer network • a piece of computer equipment, especially a small one such as a smartphone • a piece of information that forms part of a message sent through a computer network • ...
Privacy & Security day 2023-05-10
Across
- A designated person within an organization responsible for overseeing data protection and GDPR compliance
- The application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks
- It is a fraudulent or deceptive act or operation
- The controller is responsible for and needs to demonstrate compliance with the Data Protection Principles and regulations
- It refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons
- It is a formal, documented, comprehensive and accurate registry compiling every processing activity that is done at Riot games
- The process of analyzing and combining personal data to make predictions, assessments, or decisions about individuals
Down
- A Regulation in EU law on data protection and privacy
- It means any information relating to an identified or identifiable, directly or indirectly, natural person (‘data subject’)
- A security measure that requires multiple forms of verification, such as passwords and one-time codes, to access an account
- It is the legal justification for the processing of personal data, It can be :consent; contract; legal obligation; vital interests; public task; or legitimate interests
11 Clues: It is a fraudulent or deceptive act or operation • A Regulation in EU law on data protection and privacy • A designated person within an organization responsible for overseeing data protection and GDPR compliance • The process of analyzing and combining personal data to make predictions, assessments, or decisions about individuals • ...
Crossword 1 2021-12-26
Across
- A group of networked computers that share a common address
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- A measure of the amount of computational work that a computer system performs.
- A means of providing a common topic identifier in text and chat messages so they can be searched as a group
- an attempt by hackers to damage or destroy a computer network or system.
- body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
Down
- someone who seeks and exploits weaknesses in a computer system or computer network
- The amount of data that can be sent through a connection at one time
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- To save the URL of a webpage for easy access in the future
11 Clues: A group of networked computers that share a common address • To save the URL of a webpage for easy access in the future • The amount of data that can be sent through a connection at one time • an attempt by hackers to damage or destroy a computer network or system. • A measure of the amount of computational work that a computer system performs. • ...
Industry 4.0 Crossword Challenge 2024-02-22
Across
- Virtual and Augmented Reality (VR/AR) are used in Industry 4.0 primarily for enhancing __________ and simulation.
- A term used to describe the collection, processing, and analysis of large volumes of data to uncover patterns and insights.
- The pillar of Industry 4.0 that involves the use of sensors and connectivity to enable objects to send and receive data.
- A technology crucial for ensuring the security of data and systems in Industry 4.0.
Down
- The integration of cyber-physical systems is the core idea behind __________ 4.0.
- Also known as 3D printing, this technology involves the layer-by-layer addition of material to create objects.
- A computing paradigm that involves delivering computing services over the internet on a pay-per-use basis.
- The revolution marked by the convergence of digital, physical, and biological spheres, often referred to as the Fourth __________.
- The __________ Revolution is associated with the emergence of Industry 4.0.
- A perspective emphasizing integration of data and processes across the organization is termed as __________ and Connected Business Perspective.
- A key component of the technology roadmap for Industry 4.0, often referred to as the backbone of Industry 4.0.
- __________ Factories are characterized by high levels of automation and connectivity.
12 Clues: The __________ Revolution is associated with the emergence of Industry 4.0. • The integration of cyber-physical systems is the core idea behind __________ 4.0. • A technology crucial for ensuring the security of data and systems in Industry 4.0. • __________ Factories are characterized by high levels of automation and connectivity. • ...
2/1/2024 2024-01-27
Across
- A campus sustainability resource housed in Cramer Hall aimed at reducing waste.
- Campus concern blamed on the homeless, but the house population is the true culprit.
- Joint efforts of PSU, OSU, and UO resulted in the establishment of a center to fortify Oregon's defenses and increase ___________.
- TikTok has explained that their ________ does not push pro-Palestinian content; it’s simply a reflection of the younger user base’s pro-Palestine beliefs.
- The focus on the Free Palestine movement has gained international attention and traction as a global ______.
- One of the principles highlighted in The Arts at the Vanguard of Change series, emphasizing fairness and justice.
Down
- Chuck Dillard, an associate professor of collaborative piano, is the founder of this non-profit organization.
- This building had a pipe burst during the snowstorm, but was fixed before classes resumed, acronym.
- This area on campus was covered in ice, preventing students from walking to classes during the snowstorm.
- Term used by Chuck Dillard to describe the traditional nature of opera storytelling, often excluding queer perspectives.
- The groundbreaking initiative Oregon is taking to fortify its defenses against cyber threats, acronym.
11 Clues: A campus sustainability resource housed in Cramer Hall aimed at reducing waste. • Campus concern blamed on the homeless, but the house population is the true culprit. • This building had a pipe burst during the snowstorm, but was fixed before classes resumed, acronym. • ...
Advanced AcademyCrossword 2025-08-29
Across
- Code, build, and analyze software systems in a pathway to tech careers and college degrees.
- Investigate life sciences, lab research, and biotechnology in a college-prep setting and receive an associate's degree.
- Study ancient design principles and modern construction techniques inspired by Aztec culture.
- Explore law enforcement, forensic science, and legal systems through academic and fieldwork and an associate's degree.
- Train to become future educators with a focus on pedagogy and classroom experience and an associate's degree.
- Explore careers in medicine, patient care, and health sciences through hands-on learning.
- PATHWAYS IN TECHNOLOGY EARLY COLLEGE HIGH SCHOOL
- Build entrepreneurial savvy and financial literacy through real-world business simulations.
Down
- Master cutting-edge tech skills in coding, cybersecurity, and digital systems.
- Earn college credit while completing high school in a rigorous, university-linked environment.
- Challenge yourself with a globally recognized academic program emphasizing inquiry and critical thinking.
- Train for high-stakes roles in firefighting, rescue operations, and emergency response.
- Dive into law, government, and civic leadership with a focus on justice and public service.
- prepares students for careers in management, marketing, and enterprise with college-level business courses and an associate's degree.
- Innovate across four engineering disciplines with a focus on design, robotics, and problem-solving.
- Begin your journey to nursing with foundational courses in anatomy, care, and clinical practice and receive an associat's degree.
16 Clues: PATHWAYS IN TECHNOLOGY EARLY COLLEGE HIGH SCHOOL • Master cutting-edge tech skills in coding, cybersecurity, and digital systems. • Train for high-stakes roles in firefighting, rescue operations, and emergency response. • Explore careers in medicine, patient care, and health sciences through hands-on learning. • ...
Business Continuity Awareness Week 2022 2022-07-04
Across
- A thing made by combining two different elements.
- What app can WOWriors use to get more information about Business Continuity and Organisational Resilience through UMW Office 365?
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities.
- What equates to involvement and enthusiasm in resilience.
- __________are bite-sized scenario exercises that build resilience through quick yet memorable experiences in responding to a simulated critical event.
- What is the third UMW Group BCM risk event?
- Increasing the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture.
- What is the latest overseas company that has completed their BCMS Implementation as per the latest post in BCM's Yammer page?
- One of hybrid working’s Cons is the reliance on home utilities and ____________.
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes.
Down
- Group CMT Members’ ‘Rose Among the Thorns’.
- The capacity to recover quickly from difficulties.
- The biggest threat to Cybersecurity is human __________.
- The cloud and ________ are major paradigm shifts in the work norm.
- In order to prepare for cyber resilience, speed and agility in ____________ are required.
- Acknowledge new __________ in addition to the opportunities that hybrid world provides businesses and employees.
16 Clues: Group CMT Members’ ‘Rose Among the Thorns’. • What is the third UMW Group BCM risk event? • A thing made by combining two different elements. • The capacity to recover quickly from difficulties. • The biggest threat to Cybersecurity is human __________. • What equates to involvement and enthusiasm in resilience. • ...
Departments of the US government 2021-01-05
Across
- promotes job creation and economic growth by ensuing fair and reciprocal trade
- regulating food products and new pharmaceutical drugs, implementing healthcare programs and preventing the spread of disease
- responsible for providing military forces needed to deter war and protect the security of our country
- Responsible for providing vital services to Americas veterans including healthcare, and other benefits programs
- oversees farming, ranching and forestry as well as regulates food quality and safety and nutritional labeling
- in charge of country
- Responsible for managing federal finance, collection of taxes, duties and monies paid to and due to the U.S and paying of all bills
Down
- 2nd to the president
- Governments lead agency for planning and support of the nations land, air and sea-based travel systems
- responsible for national policy programs that address America's housing needs and enforce fair housing laws
- responsible for counterterrorism, cybersecurity, aviation security, border security etc.
- uses sound science to manage and sustain Americas lands, water, wildlife, and energy resources and honors ur nations responsibilities to tribal nations
- enforce the law and defend the interest of the United States according to the law
- establishes administrator policy, coordinates most federal educational assistance, collects data on U.S schools and enforce educational laws
- department responsible for advancing the energy, environmental, and nuclear security of the United States
- promotes the welfare of the job seekers, wage-earners and retirees of the United States
16 Clues: 2nd to the president • in charge of country • promotes job creation and economic growth by ensuing fair and reciprocal trade • enforce the law and defend the interest of the United States according to the law • promotes the welfare of the job seekers, wage-earners and retirees of the United States • ...
Cybersecurity Crossword Puzzle: Malware Edition 2025-05-07
Across
- Software that secretly records user activity and transmits data to attackers.
- Malicious software designed to block access until ransom is paid.
- Malware that infects the Master Boot Record, making removal difficult.
- Malicious software disguised as legitimate software.
Down
- Malicious software that displays unwanted advertisements.
- Malicious scripts that exploit vulnerabilities within software applications, often found in websites.
- Attack method involving redirection to fake websites to steal sensitive information.
- Program designed to replicate itself and spread to other devices.
- Software that allows remote control of infected computers, often part of botnets.
9 Clues: Malicious software disguised as legitimate software. • Malicious software that displays unwanted advertisements. • Program designed to replicate itself and spread to other devices. • Malicious software designed to block access until ransom is paid. • Malware that infects the Master Boot Record, making removal difficult. • ...
estelles's cybersecurity crossword 2021-02-12
5 Clues: you need to Verify • account to make sure noone can get in • when someone try's to trick you into giving your info • someone who got into your account with out permission • when YOU got into someones account with out permission
Cybersecurity Vocab Words 2021-12-14
Across
- an attack in which an attacker is positioned between two communicating parties in order to intercept and/or after data traveling between them
- an attack that exploits mathematical in encryption algorithms
- is an attack model for cryptanalysis where the attacker has access to both the plaintext
- a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
Down
- is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme
5 Clues: an attack that exploits mathematical in encryption algorithms • is an attack model for cryptanalysis where the attacker has access to both the plaintext • a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system • ...
Cybersecurity Crossword Puzzle 2023-08-03
Across
- The team that facilitates collaboration between red and blue teams
- A tool that monitors network traffic for potential security breaches
Down
- A team that simulates cyber attacks to find vulnerabilities
- The team responsible for defending against cyber threats
- The act of tricking individuals into revealing sensitive information
5 Clues: The team responsible for defending against cyber threats • A team that simulates cyber attacks to find vulnerabilities • The team that facilitates collaboration between red and blue teams • The act of tricking individuals into revealing sensitive information • A tool that monitors network traffic for potential security breaches
Cybersecurity Training Program 2025-08-22
Across
- A scam where attackers trick users into giving personal information.
- A type of malware that spreads by itself from one computer to another.
- Security method that requires more than one form of verification to log in.
Down
- A saved copy of important files to protect against data loss.
- A security system that filters and blocks unwanted network traffic.
5 Clues: A saved copy of important files to protect against data loss. • A security system that filters and blocks unwanted network traffic. • A scam where attackers trick users into giving personal information. • A type of malware that spreads by itself from one computer to another. • Security method that requires more than one form of verification to log in.
SN33003FP Chapter 1 Crossword 2024-07-03
Across
- Sensors and alert networks that warn of potential attacks.
- Comprehensive databases of known vulnerabilities shared worldwide to prevent attacks.
- Highly trained hackers who steal secrets or commit sabotage for their government.
- Threats posed by the increasing use of mobile devices to access enterprise information.
- Sharing of critical information about serious attacks to prevent similar ones.
- Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- Framework for implementing cybersecurity measures within an organization.
- Black hat hackers who steal money from consumers and businesses.
- Unethical hackers who exploit weaknesses in networks or computer systems for personal gain.
- Legislation to discourage cyberattacks and punish cyber criminals.
- Challenges posed by the huge amount, high speed, and diverse types of data needing protection.
Down
- Threats from employees or partners with inside access and knowledge.
- Gray hat hackers who protest against political and social ideas by leaking sensitive information.
- Gray hat hackers who exploit vulnerabilities and report them to vendors for rewards.
- Teenagers or hobbyists with little skill who hack for fun, not profit.
- Threats that exploit weaknesses to gain access to internal resources.
- Technology connecting billions of devices to the Internet, affecting data protection needs.
- Hackers between white and black hat who may find and report vulnerabilities or publish them for others to exploit.
18 Clues: Sensors and alert networks that warn of potential attacks. • Black hat hackers who steal money from consumers and businesses. • Legislation to discourage cyberattacks and punish cyber criminals. • Threats from employees or partners with inside access and knowledge. • Threats that exploit weaknesses to gain access to internal resources. • ...
Unit Two: Technology Vocabulary Review 2023-09-22
Across
- A digital ledger in which transactions are recorded chronologically and publicly, enhancing the security and transparency of data.
- Assumptions made by a model that simplify the process of learning to do its assigned task.
- Any technology that can function and execute tasks without being controlled by a human.
- A large dataset of written or spoken material that can be used to train a machine to perform linguistic tasks.
Down
- A broad term referring to the product of AI training, created by running a machine learning algorithm on training data.
- A collection of related data points, usually with a uniform order and tags.
- The practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, damage, or unauthorized access.
7 Clues: A collection of related data points, usually with a uniform order and tags. • Any technology that can function and execute tasks without being controlled by a human. • Assumptions made by a model that simplify the process of learning to do its assigned task. • ...
SVCSRP - Data Science/CT/CS 2020-07-05
Across
- a set of data that consists of values belonging to the set are distinct and separate unconnected values
- is the process of removing or reducing details from a complex object to facilitate focus on relevant concepts
- an area of information technology that involves the protection of computers, networks, programs, and data from unauthorized or unintentional access
- a set of data that consists of values belonging to the set can take on ANY value within a finite or infinite interval
- repeated execution of a sequence of statements
- a set of precise instructions to solve a problem or achieve a goal.
- a sequence of instructions that are repeated until a specific task achieved
- type of data that may be represented by a name, symbol, or a number code
Down
- categorical data that defines the values representing rank
- tackling larger problems by breaking them into smaller parts so that we can explain the process either to someone or to a computer.
- identifying and removing errors from scripts and programs
- type of data that is collected as values or counts and are expressed as numbers
- science, the study of computers and algorithmic processes, including their principles, their hardware and software designs, their applications, and their impact on society
- a value, which can change
14 Clues: a value, which can change • repeated execution of a sequence of statements • identifying and removing errors from scripts and programs • categorical data that defines the values representing rank • a set of precise instructions to solve a problem or achieve a goal. • type of data that may be represented by a name, symbol, or a number code • ...
Technology 2024-04-16
Across
- Physical components of a computer system, such as the CPU and monitor. (Building blocks of technology!)
- Network of interconnected devices that communicate and share data with each other. (Connecting the world around us!)
- Simulation of human intelligence by computers, including learning and problem-solving. (The rise of the machines!)
- Programs and applications that run on computers and other devices. (Powering your digital experience!)
Down
- Protection of computer systems and data from theft, damage, or unauthorized access. (Guardians of the digital realm!)
- Electronic device for processing, storing, and manipulating data. (The brain of the digital world!)
- Measurement and analysis of unique physical or behavioral characteristics for identification and authentication. (Your body as your password!)
- Global network connecting millions of computers worldwide. (The information superhighway!)
- Technology that overlays digital information onto the real world. (Enhancing your reality!)
- Delivery of computing services over the internet, allowing access to resources on-demand. (Computing in the sky!)
- Computer-generated environment that simulates physical presence. (Step into a new reality!)
- Mobile device with advanced computing capabilities and internet access. (Your pocket-sized powerhouse!)
- Design, construction, and operation of robots to perform tasks autonomously or with human guidance. (Bringing machines to life!)
- Writing instructions for computers to execute tasks. (The language of technology!)
14 Clues: Writing instructions for computers to execute tasks. (The language of technology!) • Global network connecting millions of computers worldwide. (The information superhighway!) • Technology that overlays digital information onto the real world. (Enhancing your reality!) • ...
Digital disruption 2024-08-09
Across
- - The practice of protecting systems, networks, and programs from digital attacks, essential as digital disruption increases vulnerabilities.
- - Large volumes of data analyzed to reveal patterns and trends, disrupting traditional decision-making processes.
- -The buying and selling of goods or services over the internet, disrupting traditional retail.
- - The act of introducing something new, often a product or process, that can disrupt an industry.
- - Significant change caused by new technology or business models, impacting industries and markets.
Down
- - The process of converting information into digital formats, disrupting traditional methods of operation.
- - Platforms that allow users to create and share content, disrupting traditional communication and marketing methods.
- - The use of technology to perform tasks without human intervention, often disrupting traditional labor markets.
- - The industry that uses technology to improve and automate financial services, leading to disruption in traditional banking.
- - A digital ledger technology that can disrupt financial services and other industries by enabling secure, transparent transactions.
- - New companies, often technology-driven, that can rapidly grow and disrupt established industries.
- - A technology that allows data and applications to be stored and accessed over the internet, disrupting traditional data storage methods.
- -Artificial Intelligence, the simulation of human intelligence by machines, disrupting multiple industries.
- - Internet of Things, a network of connected devices that collect and exchange data, disrupting various sectors.
14 Clues: -The buying and selling of goods or services over the internet, disrupting traditional retail. • - The act of introducing something new, often a product or process, that can disrupt an industry. • - New companies, often technology-driven, that can rapidly grow and disrupt established industries. • ...
Mixed 2021-11-06
Across
- to add to something in a way that improves it or makes it more attractive
Down
- created by computer technology and appearing to exist but not existing in the physical world
- barrier that acts as a security system to protect computer systems and networks from outside connections and untrusted networks
- unable to think about or pay attention to something;unable to concentrate
4 Clues: unable to think about or pay attention to something;unable to concentrate • to add to something in a way that improves it or makes it more attractive • created by computer technology and appearing to exist but not existing in the physical world • ...
POLS Crossword Puzzle 2024-10-05
Across
- Actors are compelled to select outcomes that benefit one party while negatively affecting another.
- When two or more actors implement policies that improve well-being of at least one more actor without affecting any other.
- The personality, perceptions, choices, and activities of individual decision-makers and individual participants provide an explanation.
- States will build international relations around international law and institutions.
- Premeditated threat or use of violence against noncombatant targets by individuals or groups to obtain a political or social objective.
Down
- States try to influence the behavior of other actors by bargaining, negotiating, taking a specific action or refraining from such an action.
- The withdrawal of customary trade and financial relations for foreign - and security-policy purposes.
- An assemblage of units, object, or parts united by some form of regular interaction.
- Focuses on the international character of states as the most important feature of international relations.
- Art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality.
- Struggle for power, war is inevitable, bargaining and coercion, where cooperation is rare.
- An armed conflict that occurs between organized actors within a state and and that meets some minimum threshold for severity.
12 Clues: An assemblage of units, object, or parts united by some form of regular interaction. • States will build international relations around international law and institutions. • Struggle for power, war is inevitable, bargaining and coercion, where cooperation is rare. • ...
CodeChella 2025-08-27
Across
- What annual student-run CS conference connects students with industry across Canada and takes applications for volunteers/speakers?
- The first Canada CIFAR AI Chair held by a Dalhousie faculty member is?
- Which prof received the 2024 Alberta Alumni Honor Award
- Where can you join the largest student CS Discord community in Canada to get internships and peer advice?
Down
- What hackathon should you apply to if you want to attend Canada’s largest student hackathon?
- What Canadian accelerator program, also available at Dalhousie, helps students and researchers turn their ideas into startups?
- What Canadian program gives undergrads the chance to do paid summer research in CS labs across the country?
- Which competition can you sign up for if you want to try cybersecurity CTFs with other Canadian students?
- Where can you stay updated about hackathons, conferences, student accelerators, research opportunities, and CS events across Canada?
- Which prof has an award named after them at Dal
- If you want to get into AI research in Canada as a student — through labs at Vector, Mila, or Amii — which national institute should you know about?
- Which prof is a part of Canada's leading research institute Vector and is also the co-founder of several health+AI companies
12 Clues: Which prof has an award named after them at Dal • Which prof received the 2024 Alberta Alumni Honor Award • The first Canada CIFAR AI Chair held by a Dalhousie faculty member is? • What hackathon should you apply to if you want to attend Canada’s largest student hackathon? • ...
IT SECURITY 2022-10-27
Across
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- an open source and freely available software package for email security
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- the process of converting information or data into a code, especially to prevent unauthorized access.
Down
- network security device that monitors and filters incoming and outgoing network traffic
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- The conversion of encrypted data into its original form
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
11 Clues: The conversion of encrypted data into its original form • an open source and freely available software package for email security • network security device that monitors and filters incoming and outgoing network traffic • software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • ...
Day 13 2022-11-24
Across
- (First word of two, also see 1 down) The simulation of human intelligence processes by machines, especially computer systems (10 letters)
- Complete or partial replacement of human work with machine work (10 letters)
- Holistic approach to the security of our products, solutions, information security, and much more (13 letters)
- A virtual representation that uses real world data to create a simulation (two words, 7 and 4 letters). Hint: this Meet the Expert article might help [add link]
Down
- An inventory of an organization’s data assets (two words 4 and 7 letters)
- (Second word of two, see 1 across) The simulation of human intelligence processes by machines, especially computer systems (12 letters)
6 Clues: An inventory of an organization’s data assets (two words 4 and 7 letters) • Complete or partial replacement of human work with machine work (10 letters) • Holistic approach to the security of our products, solutions, information security, and much more (13 letters) • ...
Day 10 Crossword Puzzle 2022-11-10
Across
- (First word of two, also see 1 down) The simulation of human intelligence processes by machines, especially computer systems (10 letters)
- Complete or partial replacement of human work with machine work (10 letters)
- Holistic approach to the security of our products, solutions, information security, and much more (13 letters)
- A virtual representation that uses real world data to create a simulation (two words, 7 and 4 letters). Hint: this Meet the Expert article might help [add link]
Down
- An inventory of an organization’s data assets (two words 4 and 7 letters)
- (Second word of two, see 1 across) The simulation of human intelligence processes by machines, especially computer systems (12 letters)
6 Clues: An inventory of an organization’s data assets (two words 4 and 7 letters) • Complete or partial replacement of human work with machine work (10 letters) • Holistic approach to the security of our products, solutions, information security, and much more (13 letters) • ...
Cybersecurity Fundamental Chapter 3 Part 3 2022-10-19
Across
- occurs when data goes beyond the limits.
- access point install on a secure network without explicit authorization.
- pieces of software install by users to provide extended capabilities
- security protocol that attempted to provide a wireless local area network with the same level of security as a wired lan.
- attacker copies the victim's information from his/her devices
- attacker send authorized messages to another bluetooth device
- one way to store data at the website is to use a database.
Down
- vulnerability found in web applications.
- allow cybercriminals to execute malicious code and take control of a system with privileges of the user running the application remotely.
- wireless signals are susceptible to electromagnetic interfaces
- operate through an interpreter, the JVM.
- susceptible to attack and an attacker cannot recover the key by observing the traffic.
12 Clues: vulnerability found in web applications. • occurs when data goes beyond the limits. • operate through an interpreter, the JVM. • one way to store data at the website is to use a database. • attacker copies the victim's information from his/her devices • attacker send authorized messages to another bluetooth device • ...
TechSphere Crossword puzzle 2024-01-29
Across
- Process of encoding information to make it secure.
- Study and practice of techniques for secure communication in the presence of third parties.
- Authentication techniques based on unique biological characteristics such as fingerprints or retinal scans.
- Practice of protecting systems, networks, and programs from digital attacks.
- Secret code used to gain access to a computer, network, or service.
- Malicious software that encrypts files and demands payment for their release.
- Process of confirming the truth of an attribute of a single piece of data.
- Software update designed to fix problems with, or improve a computer program or its supporting data.
- Malicious software that replicates itself and spreads to other computers.
Down
- Incident where sensitive, protected, or confidential information is accessed or disclosed without authorization.
- Weakness in a system's defenses that can be exploited by a threat.
- Network of private computers infected with malicious software and controlled as a group.
- Person who uses technical knowledge to gain unauthorized access to computer systems.
- Security system designed to prevent unauthorized access to or from a private network.
- Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
- Malicious software disguised as legitimate software.
- Software intended to damage or disable computers and computer systems.
- Software designed to detect and remove computer viruses and other malicious software.
- Attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
- Secure network connection that allows users to access the internet privately.
- Interconnected group of computers and other devices capable of exchanging data.
- Unsolicited or undesired electronic messages, typically advertising.
22 Clues: Process of encoding information to make it secure. • Malicious software disguised as legitimate software. • Weakness in a system's defenses that can be exploited by a threat. • Secret code used to gain access to a computer, network, or service. • Unsolicited or undesired electronic messages, typically advertising. • ...
Tech Puzzle 2023-03-02
Across
- What protects your computer from hackers?
- What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
- What is a document sent with with an email message called?
- An interrupt triggered by a software.
- A chatbot developed by openAI and launched in November 2022
- What technology was used in avengers end game?
- Which technology is used in Brahmastra movie?
- What is temporarily stored on your computer?
- A software program that allows you to surf the web.
- ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- Visual display unit is also called _____________
- An incredibly powerful tool used to get meaning out of vast amounts of data
Down
- Primary memory is also known as _______ memory.
- The initial program that runs when a computer is powered up or rebooted.
- _______ is the way of sending messages over the Internet.
- Smallest unit of measurement in computing
- What is the #1 social media app?
- _________ protects your computer from viruses and hackers
- Give one example of a game that used unity and C#
- ________________ hyperlink is a saved link to a particular web page.
- Protection of computer system and information from harm theft and unauthorised use.
- _______________ reality is the integration of digital information with live video.
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- _______is considered as one of the universal gates.
- The primary component of a computer that acts as its “control center.”
25 Clues: What is the #1 social media app? • An interrupt triggered by a software. • What protects your computer from hackers? • Smallest unit of measurement in computing • What is temporarily stored on your computer? • Which technology is used in Brahmastra movie? • What technology was used in avengers end game? • Primary memory is also known as _______ memory. • ...
Tech Puzzle 2023-03-02
Across
- What protects your computer from hackers?
- What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
- What is a document sent with with an email message called?
- An interrupt triggered by a software.
- A chatbot developed by openAI and launched in November 2022
- What technology was used in avengers end game?
- Which technology is used in Brahmastra movie?
- What is temporarily stored on your computer?
- A software program that allows you to surf the web.
- ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- Visual display unit is also called _____________
- An incredibly powerful tool used to get meaning out of vast amounts of data
Down
- Primary memory is also known as _______ memory.
- The initial program that runs when a computer is powered up or rebooted.
- _______ is the way of sending messages over the Internet.
- Smallest unit of measurement in computing
- What is the #1 social media app?
- _________ protects your computer from viruses and hackers
- Give one example of a game that used unity and C#
- ________________ hyperlink is a saved link to a particular web page.
- Protection of computer system and information from harm theft and unauthorised use.
- _______________ reality is the integration of digital information with live video.
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- _______is considered as one of the universal gates.
- The primary component of a computer that acts as its “control center.”
25 Clues: What is the #1 social media app? • An interrupt triggered by a software. • What protects your computer from hackers? • Smallest unit of measurement in computing • What is temporarily stored on your computer? • Which technology is used in Brahmastra movie? • What technology was used in avengers end game? • Primary memory is also known as _______ memory. • ...
Network and Security 2024-07-24
Across
- A secret word or phrase that is used to access a computer system or service.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Code that is embedded into the hardware of a computer.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- programs that automatically execute tasks as ordered by creator
- form of cryptocurrency
- Stands for the National Security Agency
- The method of obtaining user information through fraudulent communications targeted directly at people.
- two words. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior
- Text that can be read by the human eye
- creating a fake identity on social network account
- A weakness in a computer system or network that can be exploited by attackers.
- any action that makes a computer system vulnerable
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
- Customizable additions to software for extra functionality
- an error, flaw, failure, or fault
20 Clues: form of cryptocurrency • an error, flaw, failure, or fault • Text that can be read by the human eye • Stands for the National Security Agency • creating a fake identity on social network account • any action that makes a computer system vulnerable • Code that is embedded into the hardware of a computer. • Customizable additions to software for extra functionality • ...
Awesome Privacy Week '25 2025-01-27
Across
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- Malicious software designed to harm or exploit computers and networks.
- A European Union law that regulates data protection and privacy.
- A tool that encrypts internet connections to enhance privacy.
- A U.S. law that gives California residents rights over their personal data.
- The practice of protecting systems, networks, and programs from digital attacks.
- Publishing private or identifying information about someone online without consent.
- AI-generated media that mimics real people and can be used for deception.
- Small files stored on a user’s browser to track online activities.
- A tool used to record every keystroke typed on a keyboard.
- A browser feature that prevents storing history, cookies, and site data.
- The act of removing or disguising personal identifiers from datasets.
- A key document that explains how an individual's data is stored, used, and shared.
Down
- The process of removing personal identifiers from datasets.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- Software vulnerability unknown to developers and exploited by hackers.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- Theft Fraudulent use of someone's personal data to commit crimes.
- Unauthorized access or damage to computer systems and networks.
- Data that describes and gives information about other data.
- Malicious software that locks users out of their data until a ransom is paid.
23 Clues: Malicious software that secretly gathers user information. • A tool used to record every keystroke typed on a keyboard. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
CrossWord Puzzle FJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Malware analysis that involves running the program in a controlled environment.
- Attackers use username and password pairs from old breaches to access new accounts.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Free software framework for scanning and managing known security vulnerabilities.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Malicious digital communication causing emotional harm.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
- Security analysis technique that looks for statistical deviations from a security baseline
Down
- Machine learning model used in threat hunting to find correlations in data.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Formal and systematic security assessment and assurance process for a computer system.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Social engineering technique that offers something enticing like free software containing malware.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
Chapter 6: The Executive Branch review crossword 2022-03-15
Across
- elects the president
- the main reason we have foreign policy
- orders delays in punishing a person
- there are a total of five hundred thirty eight ______ in the electoral college
- executive department in charge of the safety of the nation's food supply
- the president’s title in the armed services
- prohibits all trade with another country
- the amount of electoral votes needed to win the presidency
- a formal agreement between governments of two or more nations
- many of the people who have been president worked in this type of occupation before becoming president
- executive department in charge of conducting the census and the national weather service
- executive department in charge of enforcing the laws and regulations with our nation's national parks and forests
- the only president to serve more than two terms as president (last name)
Down
- a person who wants to run for president must have lived in the U.S. for this amount of years
- a person must be this age to run for president
- the salary of the president (in thousands of dollars)
- the president is the head of this branch
- number of years of a presidential term
- the number of terms a person may serve as president
- a nation’s plan for dealing with other nations
- people who represent the U.S. government in other nations
- executive department in charge of the country's cybersecurity
- a pardon for a large group of people
- to be president must be this type of citizen
- declares forgiveness and freedom from punishment
25 Clues: elects the president • orders delays in punishing a person • a pardon for a large group of people • the main reason we have foreign policy • number of years of a presidential term • the president is the head of this branch • prohibits all trade with another country • the president’s title in the armed services • to be president must be this type of citizen • ...
Extra Credit Crossword #3 2022-01-15
Across
- Restriction on access to ideas and information
- Principles of right and wrong behavior
- Event created solely for the purpose of getting media coverage
- In early TV and radio, a company which paid for program production in exchange for name use and association
- A type of public relations which is a response to a critical situation
- Businesses or other organizations operating on an international scale
- _________ media is PR term for getting free mainstream media coverage
- (2 words) Systematic method of ethical decision-making
- Ads in print which take on the appearance of editorial content
- Measures taken to protect a computer or system against unauthorized access or attack
- Cognitive ____________ is the inconsistency between behavior and values or opinions
- Acronym for the print media measurement benchmark
- Cultural _______________ is dominance of one culture over another
- Identification of a company, product or service using distinct characteristics
Down
- Theory of mass communication which supports free publication of ideas, even those critical of government
- A type of appeal which influences behavior using sometimes irrational emotional triggers
- Conduct or speech inciting people to rebel against the government or its representatives
- Acronym of federal agency which investigates and stops unfair business practices, including advertising
- (2 words) Aristotle's term for describing ethical behavior
- Using someone else's work or ideas and passing off as own
- Written defamation
- The art of effective or persuasive speaking or writing
- Amendment to the Constitution providing five essential protections
- ___________ Responsibility Theory = media companies have duty to act in best interest of public
- Legal exaggeration using in advertising of a product
25 Clues: Written defamation • Principles of right and wrong behavior • Restriction on access to ideas and information • Acronym for the print media measurement benchmark • Legal exaggeration using in advertising of a product • The art of effective or persuasive speaking or writing • (2 words) Systematic method of ethical decision-making • ...
Senior Cyber Crossword 2020-12-24
Across
- A computer screen that doesn’t need a mouse
- A virtual meeting service
- A not-so-yummy way for websites to remember users
- A person who uses digital tools to test or break into secure systems
- A type of legal control imposed on companies
- The _____ system controls the basic functions of your computer
- Software that includes advertising
- Canned meat, or unwanted email
- A person who uses their computer skills to break the law
- Malicious software that extorts money
- A.I.
- A company’s rules about handling private user data
- A switching device that dispatches data to multiple destinations
- A security system that uses aspects of your physical body to identify you as an authorized user
- A website dedicated to user-created videos
Down
- A secret access code
- The act of breaking into a secure system is called a ______
- A method of impersonating a device or user for nefarious purposes
- A pocket-sized phone with extended functionality
- A method of keeping information secret
- Technology and practices that keep your digital information secret
- Cybernetically enhanced human, or digital device brand
- A very shiny kind of metal
- A trip among the animals
- Net _____, a service provider’s guarantee they will not censor internet content
- A method of tricking people into giving away secure information
- The “name” of a website
- A mathematical formula used by computers to automate complex tasks
- A method of breaching a secure system by hiding malicious code inside a file
- A new term for the Internet
30 Clues: A.I. • A secret access code • The “name” of a website • A trip among the animals • A virtual meeting service • A very shiny kind of metal • A new term for the Internet • Canned meat, or unwanted email • Software that includes advertising • Malicious software that extorts money • A method of keeping information secret • A website dedicated to user-created videos • ...
ashyfa devyda X-F / 05 2025-04-29
Across
- YANG MENENTUKAN URUTAN HASIL PENCARIAN apa yang dimaksud dengan algoritma search engine
- ENGINEER apa nama profesi yang bertanggung jawab mengembangkan perangkat lunak?
- apa nama search engine paling populer didunia?
- INFORMASI DI INTERNET apa fungsi utama search engine?
- TULIS , MUSIK apa yang dilindungi oleh hak cipta?
- HUKUM apa akibat dari pelanggaran HAKI?
- SOSIAL apa saja platform yang digunakan untuk diseminasi konten digital?
- ANALYST apa nama profesi yang bertanggung jawab menganalisis dan menginterpretasikan data?
- , ARTIKEL apa saja jenis konten digital yang populer ?
- KARYA INTELEKTUAL DAN MENDORONG INOVASI apa tujuan dari HAKI?
- KUNCI apa yang digunakan untuk mencari informasi di search engie
- INFORMASI PALSU DAN DAMPAK NEGATIF PADA MASYARAKAT apa akibat tidak validasi konten negatif?
- KONTEN UNTUK MENGHILANGKAN INFORMASI TIDAK AKURAT ATAU BERBAHAYA apa validasi konten negatif?
- ATAS KEKAYAAN INTELEKTUAL YAITU HAK YANG DIBERIKAN KEPADA PENCIPTA ATAU PEMILIK KARYA INTELEKTUAL apa yang dimaksud dengan HAKI?
Down
- apa nama search engine yang dikembangkan oleh microsoft?
- ALGORITMA DETEKSI DAN MODERASI MANUAL bagaimana validasi konten negatif dilakukan?
- KONTEN DIGITAL UNTUK MENINGKATKAN VISIBILITAS DI MESIN PENCARIAN apa yang dimaksud dengan SEO dalam produksi konten digital?
- HAK CIPTA apa saja jenis HAKI yang ada?
- INFORMASI apa nama profesi yang bertanggung jawab merancang dan mengembangkan sistem informasi?
- PALSU apa contoh konten negatif?
- YANG DIBUAT DAN DIDISTRIBUSIKAN DALAM FORGAT DIGITAL apa yang dimaksud konten digital ?
- SPECIALIST apa nama profesi yang bertanggung jawab menjaga keamanan sistem informasi?
- KUALITAS KONTEN DAN MENCEGAH PENYEBARAN INFORMASI PALSU apa tujuan validasi konten negatif?
- PENYEBARAN KONTEN DIGITAL KEPADA AUDIENS TARGET apa yang dimaksud dengan diseminasi konten digital?
- ADMINISTRATOR apa nama profesi yang bertanggung jawab mengelola jaringan komputer?
25 Clues: PALSU apa contoh konten negatif? • HAK CIPTA apa saja jenis HAKI yang ada? • HUKUM apa akibat dari pelanggaran HAKI? • apa nama search engine paling populer didunia? • TULIS , MUSIK apa yang dilindungi oleh hak cipta? • INFORMASI DI INTERNET apa fungsi utama search engine? • , ARTIKEL apa saja jenis konten digital yang populer ? • ...
TTS - Jaringan Komputer 2025-01-14
Across
- daftar halaman yang telah di kunjungi atau ditampilkan pada web browser
- Network Interface Card
- kegiatan menghubungkan kabel jaringan dengan konektor RJ45
- Sekelompok computer yang saling berhubungan antara satu dengan lainnya menggunakan protokol komunikasi
- media komunikasi jaringan computer yang menggunakan sistem gelombang elektronik
- perangkat lunak yang digunakan untuk melihat konten/sumber informasi yang ada pada www (word wide web)
- proses pembuktian pengguna berdasarkan data dengan memasukkan ID pengguna dan kata sandi
- jaringan computer yang luas antar gedung, antar kota
- mode komunikasi antara pengirim dan penerima yang bersifat dua arah tetapi tidak secara bersamaan (bergantian)
- lapisan informasi jaringan yang dikembangkan oleh ISO pada tahun 1984
- metode untuk mencuri informasi identitas pribadi dengan mengirimkan alamat palsu yang mirip dengan aslinya
Down
- topologi yang menghubungkan beberapa computer kedalam satu pusat komputer
- jaringan computer yang mencakup lingkup wilayah kecil
- lapisan TCP/IP paling atas
- program yang tidak terdeteksi berfungsi untuk merusak sistem dan mendapatkan informasi dari sistem target secara diam-diam
- faktor keamanan jaringan dimana informasi tidak boleh diubah tanpa seizing pemilik informasi
- upaya perlindungan terhadap keamanan data dan informasi dari berbagai serangan siber
- lapisan osi layer paling bawah
- topologi yang memiliki bentuk seperti pohon dimana hasil penggabungan topologi star dan bus
- Yang harus dimiliki computer untuk dapat saling berhubungan didalam jaringan.
- perangkat jaringan computer yang digunakan untuk menyebarkan sinyal internet
- suatu pola yang digunakan untuk menghubungkan antar computer
- perangkat yang diletakkan antara internet dengan jaringan internal sehingga menjaga agar orang/situs yang tidak berwenang tidak dapat mengakses
23 Clues: Network Interface Card • lapisan TCP/IP paling atas • lapisan osi layer paling bawah • jaringan computer yang luas antar gedung, antar kota • jaringan computer yang mencakup lingkup wilayah kecil • kegiatan menghubungkan kabel jaringan dengan konektor RJ45 • suatu pola yang digunakan untuk menghubungkan antar computer • ...
Computer Science 2 - Vocab Review 2025-08-27
Across
- A way of representing information using only two options
- The set of rules that define the combinations of symbols that are considered to be correctly structured statements or expressions in a programming language.
- The physical components that make up a computing system, computer, or computing device.
- a system or set of principles underlying the arrangements of elements in a computer or electronic device so as to perform a specified task.
- Physical items that use hardware and software to receive, process, and output information.
- 8 bits
- An error in a program that causes incorrect behavior.
- A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1
- A set of instructions that the computer executes to achieve a particular objective.
- A step-by-step process to complete a task.
Down
- Information that is collected and used for reference or analysis.
- The protection against access to, or alteration of, computing resources through the use of technology, processes, and training.
- Programs that run on a computing system, computer, or other computing device.
- A process through which digital data is saved within a data storage device by means of computing technology.
- Instructions written in a programming language that a computer can understand.
- Iteratively design, implement, debug, and review computer programs.
- The process of finding and correcting errors (bugs) in programs..
- A way of representing information using ten options
- A programming structure that repeats a sequence of instructions as long as a specific condition is true.
- A type of procedure or routine.
20 Clues: 8 bits • A type of procedure or routine. • A step-by-step process to complete a task. • A way of representing information using ten options • An error in a program that causes incorrect behavior. • A way of representing information using only two options • Information that is collected and used for reference or analysis. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII Sem FT3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
Andrew and Luisa 2024-05-04
Across
- Andrew's eye color
- Luisa's birth month
- what is their favorite Christmas movie to watch together?
- Luisa's favorite color
- If they could go anywhere in the world, they would go to... (Hint: It is in Peru. 2 words)
- What does Andrew Specialize in? (Job wise. 2 words)
- Iconic food duo they consider themselves most like
- Best Man
- Andrew and Luisa live on _ _ _ _ _ _ _ Street
- Maid of Honor
- They consider their song _ _ _ _ _ _ _ _ _ _ by Micheal Buble
- Luisa's middle name
- Day the met (Day of the week-month-day of the month with dashes in between)
- Where they met (Restaurant with 3 words, one of which is a number.)
Down
- Andrew's birth month
- What is their favorite Singer to listen to together?
- What is the farthest place they have ever traveled together?
- New thing they are going to try together
- Luisa's eye color
- Andrew's favorite color
- What is their favorite holiday to spend together?
- What does Luisa specialize in? (Job wise. 2 words)
- Andrew's middle name
- Dating app Andrew and Luisa met on
- Favorite sports team to watch together
- What was their first trip together; _ _ _ _ _ _
- City and country they were engaged in (Put city then country right next to each other no space)
- The cake flavors are Red Velvet and _ _ _ _ _ _ _
- What do they consider their ship name? (A ship name is when you put 2 peoples names together)
- If they could see anyone in concert together, who would they see?
30 Clues: Best Man • Maid of Honor • Luisa's eye color • Andrew's eye color • Luisa's birth month • Luisa's middle name • Andrew's birth month • Andrew's middle name • Luisa's favorite color • Andrew's favorite color • Dating app Andrew and Luisa met on • Favorite sports team to watch together • New thing they are going to try together • Andrew and Luisa live on _ _ _ _ _ _ _ Street • ...
Digital Crossword Awesome Privacy Week '25 2025-01-27
Across
- A key document that explains how an individual's data is stored, used, and shared.
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- The process of removing personal identifiers from datasets.
- The act of removing or disguising personal identifiers from datasets.
- A tool used to record every keystroke typed on a keyboard.
- The practice of protecting systems, networks, and programs from digital attacks.
- Data that describes and gives information about other data.
- Theft Fraudulent use of someone's personal data to commit crimes.
- A browser feature that prevents storing history, cookies, and site data.
- Malicious software that locks users out of their data until a ransom is paid.
Down
- AI-generated media that mimics real people and can be used for deception.
- Unauthorized access or damage to computer systems and networks.
- Small files stored on a user’s browser to track online activities.
- Malicious software designed to harm or exploit computers and networks.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- A U.S. law that gives California residents rights over their personal data.
- Publishing private or identifying information about someone online without consent.
- A tool that encrypts internet connections to enhance privacy.
- A European Union law that regulates data protection and privacy.
- Software vulnerability unknown to developers and exploited by hackers.
23 Clues: A tool used to record every keystroke typed on a keyboard. • Malicious software that secretly gathers user information. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
CGS1000 Review 2025-11-18
Across
- electronic communication
- support system for iot devices
- unwanted advertising software
- value used in encryption
- internet protocol address
- breaking encryption
- method of encryption
- malicious software
- connected urban systems
- self-spreading malware
- live online media
- encoding information
- denial of service attack
- connects devices within a network
- data unit for transmission
- public key algorithm
- encrypts files for ransom
- communication rules
- secure sockets layer
- layer two tunneling protocol
- circular network topology
- rearrangement cipher
- computer-related crime
- device that detects input
- deceptive email attack
- personally identifiable information
- online interaction platforms
- advanced encryption standard
- virtual reality
- records keystrokes
- secure communication methods
- simple shift cipher
- translates domain names
Down
- fixed substitution cipher
- connected transportation device
- voice over internet protocol
- unauthorized data access
- self-replicating malware
- online buying and selling
- personal information
- distributing media online
- linear network topology
- internet of things
- wide area network
- unknown software vulnerability
- protection of digital systems
- interconnected computer system
- communication via digital spaces
- decoding information
- connecting with others online
- central hub topology
- single shared key
- local area network
- automated home environment
- directs data between networks
- public and private keys
- personal area network
- one-way data transformation
- secretly monitors activity
- confidentiality integrity availability
- data encryption standard
- connection point in a network
- smart household device
- many-to-many topology
- levels in networking model
- tunneling protocol
66 Clues: virtual reality • wide area network • live online media • single shared key • internet of things • malicious software • local area network • records keystrokes • tunneling protocol • breaking encryption • communication rules • simple shift cipher • personal information • method of encryption • encoding information • decoding information • public key algorithm • central hub topology • ...
CrossWord Puzzle Course Code & Title: 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
ISM CROSSWORD PUZZLE 2025-07-08
Across
- The position ISM Clause 4 is centered around
- A statement of fact made during a safety management audit and substantiated by objective evidence
- A sequence of events and/or conditions that could have resulted in loss
- Personnel carrying audits should be _____ of the areas being audited
- Interim DOC is issued for ___ months
- Number of months the internal ISM audits can be postponed in exceptional circumstances
- Resolution MSC.428 (98) mandates that these risks be addressed in compliance with the International Safety Management (ISM) Code.
- The owner of the ship or any other organization or person such as the manager, or the bareboat charterer, who has assumed the responsibility for operation of the ship from the shipowner and who, on assuming such responsibility, has agreed to take over all the duties and responsibility imposed by the Code.
Down
- International convention through which the ISM Code was mandatory and entered into force on 1st July 1998
- Quantitative or qualitative information records or statement
- Risk=Likelihood X ______
- A document intended to provide an on-board record of the history of the ship with respect to the information recorded therein
- Acronym which indicates that the risk should be lowered as low as reasonably practicable
- A document issued to a company which complies with the requirements of the ISM Code
14 Clues: Risk=Likelihood X ______ • Interim DOC is issued for ___ months • The position ISM Clause 4 is centered around • Quantitative or qualitative information records or statement • Personnel carrying audits should be _____ of the areas being audited • A sequence of events and/or conditions that could have resulted in loss • ...
Cyber security 2020-10-21
Across
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
- designed to detect and destroy computer viruses.
Down
- body of technologies, processes and practices designed to protectnetworks, computers, programs and data from attack, damage orunauthorized access
- are small files that Web sites put on your computer hard disk drive when you first visit
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
6 Clues: designed to detect and destroy computer viruses. • are small files that Web sites put on your computer hard disk drive when you first visit • the activity of defrauding an online account holder of financial information by posing as a legitimate company. • ...
browsing safely 2025-05-21
Across
- nvolves gaining unauthorized access to computer systems, networks, or data by exploiting vulnerabilities.
- often an adult, uses the internet to establish an emotional connection with a child in order to gain their trust
- a malicious cyberattack where criminals impersonate legitimate entities, like banks or social media platforms, to trick individuals into revealing sensitive information like passwords, credit card details, or personal data.
Down
- a cybersecurity tactic where attackers send emails with a forged sender address, making it appear as if the email originated from a legitimate source.
- when someone uses technology to harass, threaten, embarrass, or target another person
- that infects a computer system by replicating itself and attaching to other programs or files.
6 Clues: when someone uses technology to harass, threaten, embarrass, or target another person • that infects a computer system by replicating itself and attaching to other programs or files. • nvolves gaining unauthorized access to computer systems, networks, or data by exploiting vulnerabilities. • ...
27 2024-01-08
Across
- Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device. (Note: Repeated for variety.)
- Artificially manipulated media that may depict events that never occurred or present fictionalized versions of real events.
- The use of largely automatic equipment in a system of operation. (Note: Repeated for variety.)
- The activity of exploiting genetic material experimentally without regard to ethical considerations. (Note: Repeated for variety.)
- The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
Down
- A virtual reality space where users can interact with a computer-generated environment.
- The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
- Economy A labor market characterized by the prevalence of short-term, flexible jobs.
- A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
- Physical or emotional exhaustion, often due to prolonged stress or overwork.
- Tech Technology designed to enhance the relationship between citizens and government.
- Literacy The ability to use and understand digital technologies, communication tools, and networks.
12 Clues: Physical or emotional exhaustion, often due to prolonged stress or overwork. • Economy A labor market characterized by the prevalence of short-term, flexible jobs. • Tech Technology designed to enhance the relationship between citizens and government. • A virtual reality space where users can interact with a computer-generated environment. • ...
Online Safety Word Bank 2021-06-03
Across
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this (paragraph 4)
- these are the usernames or passwords you use to access a website (paragraph 6)
- these fake sites imitate official ones with the intent to collect your personal information (paragraph 6)
- a software designed to detect or destroy viruses (paragraph 9)
- it is the address of a specific webpage or file on the internet (paragraph 6)
- the information processed and stored by electronic devices (paragraph 2)
Down
- people who commit crimes by means of computers or the internet (paragraph 6)
- the deceitful practice of sending emails pretending to be from legitimate companies for you to reveal personal information, such as passwords and credit card numbers (paragraph 8)
- a software designed to stop the normal functioning of computers (paragraph 7)
- it contains a group of computers that can be accessed and administered with a common set of rules defined a by a company or institution (paragraph 4)
- it is a form of security that allows or blocks traffic based on a set of security rules (paragraph 3)
- a digital replication of something real (paragraph 2)
12 Clues: a digital replication of something real (paragraph 2) • a software designed to detect or destroy viruses (paragraph 9) • the information processed and stored by electronic devices (paragraph 2) • people who commit crimes by means of computers or the internet (paragraph 6) • a software designed to stop the normal functioning of computers (paragraph 7) • ...
Network security 2022-07-18
Across
- type of malicious code or software that looks legitimate but can take control of your computer
- an online scam similar to phishing, where a website's traffic is manipulated, and confidential information is stolen.
- Groups of criminals who unite to carry out cyber attacks in support of political causes.
- Also known as “white hats,” ethical hackers are security experts that perform these security assessments
- type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
- The practice of protecting systems, networks, and programs from digital attacks
Down
- “Flags” are secrets purposely placed by companies or hackers. Planting the flag itself refers to placing these flags
- the practice of using a software program or hardware device (keylogger ) to record all keystrokes on a computer keyboard, either overtly as a surveillance tool or covertly as spyware
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- malware that employs encryption to hold a victim's information at ransom
- any program or file that is intentionally harmful to a computer, network or server.
- A person who breaks into a computer system
12 Clues: A person who breaks into a computer system • malware that employs encryption to hold a victim's information at ransom • The practice of protecting systems, networks, and programs from digital attacks • any program or file that is intentionally harmful to a computer, network or server. • ...
FIT-D 2013-05-15
Across
- monitor
- an internet host
- to restart or start up a computer
- responsibility online
- the presidents have to say it
- wireless internet
- National Center Super coming applications
- long term, main memory
- a saying or catchphrase on a company
- The act of promotion
- similar to modem
- a readable file
- light emitting diode
- location for cd in a laptop
- cord that gives you internet
- combines results from searchengines
- google, bing
- optical,mechanical
- cable is an example
- earphones, printer
- signals of info online
Down
- another word for internet
- plug in on the side of computer
- a symbol or picture for a company
- Blank sheet to draw,type on etc.
- 8 bits of info
- connection to other devices
- how you behave online
- stuff that goes into the computer, keyboard
- a booklet for advertisement
- plug-in for headphones
- more usb ports
- a item that is portable such as a phone
- 4g and 3g
- ipod, iphone, computer...hard
- short term memory
- central processing unit
- stuff that is downloadable....soft____
- easybib
- apps
- to protect your info online
- internet service provider
- "brain of computer"
- a sheet of paper that lists your life success
- a thing that allows you to make a symbol or words yours
- Largest storage available
- liquid crystal display
- a mark for a brand
- object on computer that you can save stuff to
49 Clues: apps • monitor • easybib • 4g and 3g • google, bing • 8 bits of info • more usb ports • a readable file • an internet host • similar to modem • wireless internet • short term memory • optical,mechanical • a mark for a brand • earphones, printer • "brain of computer" • cable is an example • The act of promotion • light emitting diode • how you behave online • responsibility online • plug-in for headphones • ...
Technology Crossword 2023-06-07
Across
- the most important processor in a given computer.
- a collection of discrete values that convey information.
- any software intentionally designed to cause disruption to a computer, server, client, or computer network
- a coding format for digital audio
- small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
- a method of representing data in a visual, machine-readable form.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- An American multinational technology company headquartered in Cupertino, California.
- a mapping from some domain (for example, a range of integers) to bits.
- is a bitmap image format
Down
- the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure.
- a mobile operating system primarily developed by Googl
- a proprietary audio/video interface for transmitting uncompressed video data.
- a form of computer memory that can be read and changed in any order
- a digital multimedia container format most commonly used to store video and audio
- a hardware or software component that stores data so that future requests for that data can be served faster.
- a method of transmitting and receiving messages using electronic devices.
- a representation of numbers using only two digits.
- a file format developed by Adobe in 1992 to present documents.
20 Clues: is a bitmap image format • a coding format for digital audio • the most important processor in a given computer. • a representation of numbers using only two digits. • a mobile operating system primarily developed by Googl • a collection of discrete values that convey information. • a file format developed by Adobe in 1992 to present documents. • ...
CodeCrissCross 2024-03-14
Across
- Collaborative approach to software development and IT operations aimed at automating and streamlining the software delivery process
- Security system that monitors and controls incoming and outgoing network traffic
- Device that forwards data packets between computer networks
- High-level programming language primarily used for adding interactivity to web pages, often employed in front-end development alongside HTML and CSS
- Remote storage and computing services accessed over the internet
- uidelines that provide a foundation for developing software applications
- Flexible software development methodology emphasizing collaboration and adaptability
- The specific rules and structure governing the composition of statements in a programming language, often encountered when writing 'Hello, World!' programs
- Process of replacing manual tasks with computer-controlled systems
- Subset of artificial intelligence that enables computers to learn and improve from experience without being explicitly programmed
Down
- Practices and technologies designed to protect computer systems and data from unauthorized access, theft, or damage
- Multinational technology corporation known for developing software products such as Windows operating system, Microsoft Office suite, and Azure cloud services
- Technology that allows multiple operating systems or applications to run on a single physical server
- Large volumes of structured and unstructured data that require advanced processing techniques for analysis
- Detailed procedure or set of conditions to be followed for testing a specific aspect
- Collection of interconnected devices
- Programs and applications used to operate computers and perform specific tasks
- Structured collection of data stored electronically
- Simulation of human intelligence processes by computer systems
- Process of finding and fixing errors or bugs in software code
20 Clues: Collection of interconnected devices • Structured collection of data stored electronically • Device that forwards data packets between computer networks • Process of finding and fixing errors or bugs in software code • Simulation of human intelligence processes by computer systems • Remote storage and computing services accessed over the internet • ...
Digital Crossword Awesome Privacy Week '25 2025-01-27
Across
- A key document that explains how an individual's data is stored, used, and shared.
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- The process of removing personal identifiers from datasets.
- The act of removing or disguising personal identifiers from datasets.
- A tool used to record every keystroke typed on a keyboard.
- The practice of protecting systems, networks, and programs from digital attacks.
- Data that describes and gives information about other data.
- Theft Fraudulent use of someone's personal data to commit crimes.
- A browser feature that prevents storing history, cookies, and site data.
- Malicious software that locks users out of their data until a ransom is paid.
Down
- AI-generated media that mimics real people and can be used for deception.
- Unauthorized access or damage to computer systems and networks.
- Small files stored on a user’s browser to track online activities.
- Malicious software designed to harm or exploit computers and networks.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- A U.S. law that gives California residents rights over their personal data.
- Publishing private or identifying information about someone online without consent.
- A tool that encrypts internet connections to enhance privacy.
- A European Union law that regulates data protection and privacy.
- Software vulnerability unknown to developers and exploited by hackers.
23 Clues: A tool used to record every keystroke typed on a keyboard. • Malicious software that secretly gathers user information. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
Tugas Daring Informatika Salsabila.n.l 30/xi 2025-04-11
Across
- salah satu contoh konten digital yang mengandung unsur budaya adalah...
- digital upaya untuk memerangi penyebaran konten negatif disebut...
- profesi yang bertugas mengembangkan dan memelihara sistem komputer adalah...
- creator profesi yang bertugas membuat konten untuk media sosial adalah...
- operator boolean yang digunakan untuk menggabungkan kata kunci adalah...
- operator boolean yang digunakan untuk mengecualikan kata kunci adalah...
- hidup pencipta +70 tahun masa berlaku hak cipta untuk buku,lagu,dan karya seni lainnya adalah...
- proses penyebaran konten digital kepada khalayak luas disebut...
- grafis provinsi yang bertugas membuat desain visual untuk produksi digital adalah...
- salah satu contoh HAKI adalah...
- dua simbol yang digunakan untuk mencari kata kunci di situs web tertentu adalah...
Down
- analyst profesi yang bertugas mengamankan sistem komputer dari serangan siber adalah...
- salah satu lembaga yang bertugas memvalidasi konten negatif adalah...
- organisasi internasional yang mengurusi HAKI adalah...
- salah satu contoh konten negatif adalah...
- etika dalam memproduksi dan mendiseminasikan konten digital disebut...
- salah satu cara untuk memvalidasi konten negatif adalah dengan melakukan...
- pelanggaran haki dapat dikenakan sanksi...
- dokumenter budaya salah satu contoh konten digital yang mengandung unsur budaya adalah...
- proses verifikasi kebenaran konten digital disebut...
- simbol yang digunakan untuk mencari kata kunci yang mirip adalah...
- salah satu contoh platform untuk diseminasi konten digital adalah...
- Tanda kutip ganda (") digunakan untuk mencari frasa yang...
- scientist profesi yang bertugas menganalisis data untuk menghasilkan informasi yang berguna adalah...
- cipta hak eksklusif pencipta yang timbul secara otomatis berdasarkan prinsip deklaratif setelah suatu ciptaan diwujudkan dalam bentuk nyata tanpa mengurangi pembatasan sesuai dengan ketentuan peraturan perundang-undangan disebut...
25 Clues: salah satu contoh HAKI adalah... • salah satu contoh konten negatif adalah... • pelanggaran haki dapat dikenakan sanksi... • proses verifikasi kebenaran konten digital disebut... • organisasi internasional yang mengurusi HAKI adalah... • Tanda kutip ganda (") digunakan untuk mencari frasa yang... • proses penyebaran konten digital kepada khalayak luas disebut... • ...
tugas daring Dinar Hayuningtyas Dipo x-i/08 2025-04-24
Across
- Search engine adalah alat yang digunakan untuk mencari di internet
- Salah satu jenis konten negatif yang perlu divalidasi adalah palsu
- analyst Profesi yang bertanggung jawab menjaga keamanan data dan sistem komputer disebut
- Tujuan utama HAKI adalah melindungi karya agar tidak oleh orang lain
- Contoh karya yang dilindungi hak cipta adalah
- Orang yang merancang tempilan dan pengalaman pengguna pada aplikasi disebut
- Membagikan konten digital ke berbagai platform disebut proses
- Contoh search engine yang paling banyak digunakan saat ini adalah
- sosial Platform yang sering digunakan untuk menyebarkan konten digital adalah
- Search engine menampilkan hasil pencarian dalam bentuk
- audiens Konten digital harus dibuat dengan memperhatikan agar mudah dipahami oleh audiens
- HAKI adalah singkatan dari Hak Atas Intelektual
- Salah satu tujuan dari diseminasi konten digital adalah untuk menjangkau yang lebih luas
- Search engine bekerja dengan cara menjelajahi,mengindeks dan
Down
- Orang yang bertugas membuat dan mengembangkan perangkat lunak disebut
- Proses membuat teks,gambar,vidio,atau audio untuk dibagikan secara digital disebut
- Hak cipta termasuk salah satu bentuk perlindungan dalam sistem
- Kata kunci yang diketik pengguna dalam search engine disebut
- Sebelum membagikan informasi kita harus memeriksa sumbernya
- Hak paten diberikan untuk penemuan di bidang dan teknologi
- Seorang bertugas merancang jaringan komputer agar terhubung dan berfungsi dengan baik
- Profesi yang menganalisis data dalam jumlah besar untuk menemukan pola atau informasi penting disebut
- Konten yang mengandung ujaran kebencian termasuk dalam kategori konten
- Validasi konten negatif bertujuan untuk mencegah penyebaran informasi yang
- Validasi konten dapat dilakukan dengan cara membandingkan informasi dari beberapa terpercaya
25 Clues: Contoh karya yang dilindungi hak cipta adalah • HAKI adalah singkatan dari Hak Atas Intelektual • Search engine menampilkan hasil pencarian dalam bentuk • Hak paten diberikan untuk penemuan di bidang dan teknologi • Sebelum membagikan informasi kita harus memeriksa sumbernya • Kata kunci yang diketik pengguna dalam search engine disebut • ...
OS Crossword 2025-09-14
Across
- The very first OS.
- Any computer program that is intended for end-user user.
- A computer program embedded on a chip on a computer's motherboard that recognizes and controls various devices that make up the computer.
- The main circuit board in any electronic system.
- The central part of an operating system.
- A human readable plain text that can eventually result in controlling the behavior of a computer.
- A set of instructions and documentation that tells a computer what to do or how to perform a task.
- The primary processor in a given computer.
- A request for the processor to prevent currently executing code.
- What happens when a computer starts.
Down
- A software that directly executes encoded logic.
- What the user uses on an operating system to make the computer do tasks.
- Software that translates computer code written in one programming language into another language.
- An operating system for computers made by Apple Inc.
- The most popular operating system used in mobile devices.
- The most popular operating system used in desktops and laptops.
- A subdiscipline within the field of information security. It focuses on protecting computer software, systems and networks.
- The process by which a computer or virtual machine interprets and acts on the instructions of a computer program.
- Kind of a computer program that helps a computer to interact with other machines or with people.
- What stores information, such as data and programs, for immediate use in the computer.
- The most popular open source operating system.
21 Clues: The very first OS. • What happens when a computer starts. • The central part of an operating system. • The primary processor in a given computer. • The most popular open source operating system. • A software that directly executes encoded logic. • The main circuit board in any electronic system. • An operating system for computers made by Apple Inc. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
Vocabulary 1 2025-10-21
Across
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- and or used to combine multiple conditions
- The information that a computer displays, prints, or sends to another device after processing input.
- The data or instructions that are entered into a computer program to make it run.
- Short for "else if" used after an if statement to check multiple conditions.
- A visual representation of decision making processes based on rules.
- the theory and development of computer systems able to perform tasks that normally require human intelligence.
- The study of data to impact better business decisions/ life decisions.
- The practice of protecting computer systems, networks, devices, and data from unauthorized access or attack.
- How to connect to devices to share information with others.
Down
- An letter, number, or symbol.
- A sequence of characters surrounded by quotes
- A named storage of data in a program.
- A factor by which a number is multiplied
- An expression that evaluates to true or false
- The process of building websites and web applications for the internet.
- A data type with two possible values true or false.
- the study of the the principles and use of computers.
- A whole number without a decimal
- A command to determine the data type of a value.
- Text in code ignored by the computer, used for explanations.
- Type A classification identifying one of various types of data, such as string or integer.
- Spaces or tabs used to structure code
23 Clues: An letter, number, or symbol. • A whole number without a decimal • A named storage of data in a program. • Spaces or tabs used to structure code • A factor by which a number is multiplied • and or used to combine multiple conditions • A sequence of characters surrounded by quotes • An expression that evaluates to true or false • ...
Cybersecurity Challenge: Crack the Code!" 🚀🔒 2025-03-21
Across
- The process of converting data into a secret code to prevent unauthorized access.
- A type of malware disguised as legitimate software to trick users into installing it.
- A cyberattack that overwhelms a website with traffic to make it unavailable.
- A secret combination of characters used to access accounts securely.
- Malicious software designed to harm or exploit computer systems.
- A security process requiring two verification methods to access an account.
- A program that detects and removes malicious software.
- Criminal activities carried out using computers or the internet.
- A security system that monitors and controls incoming and outgoing network traffic.
Down
- Malicious software that locks a user’s files and demands payment for their release.
- Manipulating people into giving up confidential information.
- A person who gains unauthorized access to computer systems.
- An incident where sensitive information is accessed without authorization.
- A cyberattack that tricks people into revealing personal information through fake emails or websites.
- A type of malware that secretly gathers information about a person or organization.
15 Clues: A program that detects and removes malicious software. • A person who gains unauthorized access to computer systems. • Manipulating people into giving up confidential information. • Malicious software designed to harm or exploit computer systems. • Criminal activities carried out using computers or the internet. • ...
Dampak Sosial Informatika 2024-05-16
Across
- Istilah yang mengacu pada upaya untuk melindungi komputer, jaringan, dan data dari serangan, kerusakan, atau akses yang tidak sah.
- Praktik membagi informasi pribadi atau rahasia secara tidak sah atau tidak etis di internet.
- of information Fenomena di mana informasi yang diposting online dapat bertahan selama periode yang lama dan memiliki dampak jangka panjang pada individu atau kelompok.
- misconduct Istilah untuk perilaku tidak pantas atau tidak etis di internet, seperti pelecehan atau penipuan online.
- Kejahatan yang melibatkan penggunaan teknologi informasi, seperti pencurian identitas dan penipuan online.
- divide Istilah untuk kesenjangan antara individu atau kelompok yang memiliki akses dan keterampilan teknologi informasi dan yang tidak memiliki akses atau keterampilan tersebut.
Down
- addiction Fenomena di mana seseorang menghabiskan terlalu banyak waktu di internet, mengakibatkan kurangnya interaksi sosial di dunia nyata.
- Istilah yang mengacu pada upaya untuk melindungi komputer, jaringan, dan data dari serangan, kerusakan, atau akses yang tidak sah.
- Penggunaan teknologi informasi untuk menyebarkan informasi yang bersifat memprovokasi, menyesatkan, atau menipu untuk tujuan tertentu.
- social interaction Istilah yang mengacu pada interaksi sosial melalui platform atau aplikasi digital, seperti media sosial atau pesan instan.
10 Clues: Praktik membagi informasi pribadi atau rahasia secara tidak sah atau tidak etis di internet. • Kejahatan yang melibatkan penggunaan teknologi informasi, seperti pencurian identitas dan penipuan online. • misconduct Istilah untuk perilaku tidak pantas atau tidak etis di internet, seperti pelecehan atau penipuan online. • ...
iACE Crossword Puzzle 3 2021-11-09
Across
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
- An official inspection of an individual’s or organization’s accounts.
Down
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Unacceptable or improper behaviour, especially by an employee or professional person.
- Wrongful or criminal deception intended to result in financial or personal gain.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain. • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
THIS ONE'S FOR TATI! 2025-03-12
Across
- It follows Shetland & Old English in the names of dog breeds used to guide other animals
- A ransomware attack that encrypted 3,800 City of Atlanta computers demanded 6 of these digital items to unfreeze them
- In real life, it can slow the spread of flames and smoke; in your digital life, it blocks unauthorized access to your private data
- Beware of these types of programs that track every stroke you make while typing in an effort to glean your password
- Breeds of this dog group include the Airedale & Bedlington
- "Elegant toy dog... distinguished from other breeds by (its) beautiful, butterfly-like ears"
- A Rand Corp. blog post says this, the "bedrock of most cybersecurity measures", is at risk when quantum computing scales up
Down
- The tallest of the working breeds, it's Pennsylvania's state dog; William Penn is said to have owned one
- Don't click on that link, dummy! You could fall prey to this common scam, which "lures" you into revealing private info
- This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability
- The heaviest of dog breeds, it can exceed 180 pounds
- This hunting hound is the state dog of Virginia
12 Clues: This hunting hound is the state dog of Virginia • The heaviest of dog breeds, it can exceed 180 pounds • Breeds of this dog group include the Airedale & Bedlington • It follows Shetland & Old English in the names of dog breeds used to guide other animals • "Elegant toy dog... distinguished from other breeds by (its) beautiful, butterfly-like ears" • ...
