cybersecurity Crossword Puzzles
Literasi digital 2024-08-20
Across
- menandai kata kunci atau topik
- kejahatan yang melibatkan penggunaan komputer
- menandai lokasi geografis dalam foto
- sebuah metode untuk memanipulasi orang
- mengambil file dari internet
- perangkat lunak yang di ciptakan untuk merusak sistem komputer
- sebuah vidio yang berfokus pada cerita
- upaya untuk mencuri informasi sensitif
- melindungi sistem komputer dan jaringan dari ancaman
- suatu konten yang cepat menyebar
- sebuah antar muka untuk menghubungkan aplikasi
- pengguna internet yang sengaja membuat komentar provokatif
- metadata
- teknologi yang memadukan dunia
- istilah untuk mengurangi penggunaan teknologi
- sebuah gambar kecil atau simbol
- sebuah format untuk menyediakan konten
- penggunaan teknologi digital untuk menghina
- catatan online atau jurnal yang sering di update
- sebuah jenis kode matriks
- pengguna internet yang memiliki banyak follower
- representasi grafis atau karakter
- informasi yang memberikan deskripsi
Down
- tempat untuk berbagi pendapat
- menyaksikan konten vidio secara langsung
- memanen data pribadi
- yang digunakan untuk melindungi jaringan
- platfrom media sosial yang paling umum
- kiriman pesan kepada banyak orang tanpa izin
- sebuah metode keamanan identitas akun
- menyimpan data secara online dalam serfer
- platfrom yang sering di gunakan untuk melakukan vidio konvergensi
- digital yang meninggalkan jejak aktivitas online
- proses merubah informasi menjadi kode
- situs web yang memungkinkan pengguna untuk mengedit
- sebuah kelemahan atau cela yang dapat diserang
- kesenjangan akses terhadap teknologi digital
- penggunaan teknologi digital untuk menghina
- sebuah unit infomasi
- layanan untuk menyimpan data online
- menyimpan prefensi menggunakan
- generasi yang tumbuh Dengan teknologi
- topik yang sedang populer
- menyimpan dan menyediakan data
- sebuah alamat web
- program yang dapat menggandakan dirinya sendiri dan menyebar ke komputer lain
- untuk menampilkan konten
- strategi untuk meningkatkan visibilitas website
- sebuah perangkat lunak atau parangkat keras
- perangkat lunak yang berinteraksi dengan pengguna
50 Clues: metadata • sebuah alamat web • memanen data pribadi • sebuah unit infomasi • untuk menampilkan konten • topik yang sedang populer • sebuah jenis kode matriks • mengambil file dari internet • tempat untuk berbagi pendapat • menandai kata kunci atau topik • menyimpan prefensi menggunakan • menyimpan dan menyediakan data • teknologi yang memadukan dunia • sebuah gambar kecil atau simbol • ...
Electronics 2025-03-05
Across
- – Field focused on designing and building robots.
- – Communication without physical cables.
- – Advanced field of physics used for computing and cryptography.
- – The field of making machines "think" like humans.
- – Type of system where software is built into hardware.
- – Board that connects electronic components.
- – The practice of protecting computer systems from attacks.
- - Systems that connect smart devices for real-time data exchange.
- – Energy sourced from nature, like solar or wind.
- - Devices that collect data and adapt based on environmental conditions.
- – Material used in electronic circuits, such as silicon.
- - The technology behind converting sunlight into electrical energy.
- – Technology that uses radio waves for identification and tracking.
- – Computing closer to the data source to reduce latency.
- – Engineering on a very tiny scale, atomic or molecular level.
Down
- – Use of technology to perform tasks with minimal human intervention.
- – Network of interconnected devices communicating via the internet.
- - A remote sensing method used in autonomous vehicles and robotics.
- - AI models inspired by the human brain, used in deep learning.
- - A revolutionary approach to processing information using qubits.
- - An integrated circuit that includes all components of a computer or electronic system.
- – A small computer on a single chip, used in embedded systems.
- – A device that detects physical properties such as temperature or motion.
- – A device that converts electrical signals into movement.
- - A next-generation display technology with superior brightness and efficiency.
- – Low-level software controlling hardware functions.
- – Unmanned aerial vehicles used for various applications.
- - A reconfigurable chip widely used in digital circuit design and embedded systems.
- – Latest generation of mobile network technology.
29 Clues: – Communication without physical cables. • – Board that connects electronic components. • – Field focused on designing and building robots. • – Energy sourced from nature, like solar or wind. • – Latest generation of mobile network technology. • – The field of making machines "think" like humans. • – Low-level software controlling hardware functions. • ...
Risk Management Puzzle 2025-11-17
Across
- / Strategy to offset potential losses
- management / Process of identifying and mitigating threats to assets
- at Risk / Estimate of potential loss in value
- detection / Identifying and preventing deceptive financial activity
- / Insurance purchased by insurers to reduce risk
- / Protection against financial loss
- controls / Procedures to ensure integrity and accuracy in operations
- appetite / Level of risk an organization is willing to accept
- tolerance / Degree of variability in outcomes an entity can withstand
- risk / Risk from fluctuations in exchange rates
- / Measure of price fluctuations
- / Statistical analysis used in insurance and finance
- / Collection of financial investments
- continuity / Planning to maintain operations during disruptions
- / Framework of rules and practices for corporate oversight
- risk / Risk of collapse affecting the entire financial system
- / Asset pledged for a loan
- rating / Assessment of a borrower's creditworthiness
- / Financial instruments based on underlying assets
- risk / Risk from business decisions or changes in market conditions
- rate risk / Risk from changes in interest rates
- risk / Risk from fluctuations in prices or rates
- testing / Simulating crisis scenarios to assess resilience
Down
- / Selling assets to pay off debts
- III / International banking regulations for risk and capital
- risk / Risk that the other party in a transaction may default
- risk / Risk of changes in laws or regulations
- / Ease of converting assets to cash
- adequacy / Measure of a bank's capital relative to its risks
- analysis / Evaluating outcomes under different hypothetical conditions
- risk / Risk from internal processes or systems
- / Protection of digital systems from threats and breaches
- / Process of evaluating and assuming risk for insurance or securities
- risk / Risk of legal actions or non-compliance
- / A borrower's ability to repay a loan
- / Independent examination of financial records and processes
- / Adherence to laws, regulations, and policies
- / Amount at risk in a financial transaction
- / Failure to meet financial obligations
39 Clues: / Asset pledged for a loan • / Measure of price fluctuations • / Selling assets to pay off debts • / Ease of converting assets to cash • / Protection against financial loss • / Strategy to offset potential losses • / Collection of financial investments • / A borrower's ability to repay a loan • / Failure to meet financial obligations • ...
Industrial Security Concepts Crossword Puzzle 2025-10-28
Across
- plan 4. A detailed plan for responding to emergencies such as fire or natural disasters.
- 2. An intentional act to harm, steal, or damage property or personnel.
- security 10. The act of protecting confidential company information from unauthorized access.
- 9. The ability to keep sensitive operations or information from being exposed.
- 8. The use of cameras to monitor activities within and around a facility.
- in 1. Unauthorized or forced entry into a building, vehicle, or area.
- 1.The protection of company assets, employees, and information from threats, theft, or damage.
- 7. a person responsible for ensuring safety and enforcing company security
- 4. The act of following and watching someone closely for safety or investigation purposes.
Down
- 5. Any weakness in a system that can be exploited by threats.
- control 5. The safe and efficient movement of people and goods in and out of a facility.
- 6. Physical barrier used to prevent unauthorized entry into restricted areas. pany security policies.
- 3. Type of security focusing on protecting computers and digital information.
- order 8. A written order outlining the duties and responsibilities of security personnel.
- report 10. A detailed report documenting any incident or breach in security.
- control 3. A system or process for controlling entry and exit of people in a facility.
- security 2. Measures designed to protect buildings and equipment from damage or loss.
- protection 7. Procedures and tools designed to prevent, detect, and respond to fire.
- assessment 9. Process of evaluating potential risks and determining preventive measures.
- 6. A person or group that poses a potential danger to an organization’s assets.
20 Clues: 5. Any weakness in a system that can be exploited by threats. • in 1. Unauthorized or forced entry into a building, vehicle, or area. • 2. An intentional act to harm, steal, or damage property or personnel. • 8. The use of cameras to monitor activities within and around a facility. • 7. a person responsible for ensuring safety and enforcing company security • ...
Technology concepts 2025-09-04
Across
- The physical components of a computer system, such as the CPU, memory, and storage devices.
- Software Programs designed for end-users, such as word processors, web browsers, and mobile apps.
- Devices Hardware that displays or outputs data from a computer, such as monitors, printers, or speakers.
- A computer that provides services, resources, or data to other devices on a network.
- Programs and applications that run on a computer and perform specific tasks for the user.
- Computing The delivery of services like storage, software, and processing power over the internet.
- (SSD) A type of storage device that uses flash memory for faster performance compared to traditional hard drives.
- A global network that connects millions of computers, enabling communication and information sharing.
- Technology that allows machines to simulate human intelligence, such as learning and decision-making.
- Devices Hardware used to enter data into a computer, such as a keyboard, mouse, or scanner.
- System The system software that manages computer hardware, software, and resources (e.g., Windows, macOS, Linux).
Down
- (AR) Technology that overlays digital information on the real world, often using smartphones or AR glasses.
- (VR) A simulated digital environment that immerses users through special gadgets like VR headsets.
- An organized collection of data stored electronically and accessed by specialized software.
- A device that forwards data between networks and provides internet connectivity.
- The practice of protecting systems, networks, and data from digital attacks or unauthorized access.
- (GPU) A specialized computer component that handles rendering images, videos, and graphics.
- An electronic device that processes information and performs tasks according to instructions.
- (Internet of Things) A network of everyday objects embedded with sensors and software to exchange data (e.g., smartwatches, smart home devices).
- A system of interconnected devices that communicate and share resources.
20 Clues: A system of interconnected devices that communicate and share resources. • A device that forwards data between networks and provides internet connectivity. • A computer that provides services, resources, or data to other devices on a network. • Programs and applications that run on a computer and perform specific tasks for the user. • ...
Tugas Informatika Terakhir 2025-05-26
Across
- Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
- Platform digital untuk pendidikan Islam dalam smart city.
- Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
- Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
- Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
- Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
- Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
- Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
- Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
- Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
- Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
- Teknologi untuk sholat berjamaah virtual dalam smart city.**
- Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
- Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
- Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
- Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
- Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
- Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
- Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
- Kota masa depan dalam Islam yang makmur dan berkelanjutan.
20 Clues: Platform digital untuk pendidikan Islam dalam smart city. • Kota masa depan dalam Islam yang makmur dan berkelanjutan. • Teknologi untuk sholat berjamaah virtual dalam smart city.** • Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam. • Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12). • ...
Tugas Informatika Terakhir 2025-05-26
Across
- Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
- Platform digital untuk pendidikan Islam dalam smart city.
- Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
- Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
- Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
- Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
- Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
- Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
- Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
- Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
- Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
- Teknologi untuk sholat berjamaah virtual dalam smart city.**
- Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
- Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
- Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
- Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
- Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
- Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
- Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
- Kota masa depan dalam Islam yang makmur dan berkelanjutan.
20 Clues: Platform digital untuk pendidikan Islam dalam smart city. • Kota masa depan dalam Islam yang makmur dan berkelanjutan. • Teknologi untuk sholat berjamaah virtual dalam smart city.** • Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam. • Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12). • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Matching known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
Cybersecurity Awareness month at Kent! 2024-10-14
Across
- Sense created by the attacker to make you react quickly without thinking.
- When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
- Software attack method to harm or exploit a device or network.
- Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
- Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
- An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
- Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
- The address of a webpage which you check the validity of before clicking it. (Acronym)
8 Clues: Software attack method to harm or exploit a device or network. • Sense created by the attacker to make you react quickly without thinking. • The address of a webpage which you check the validity of before clicking it. (Acronym) • Additional layer of security that verifies a user's access to an account more than once. (Acronym) • ...
FITAVocab.kr 2013-05-15
Across
- a saying or group of words representing a business, store, etc
- 1000 kilobytes
- Ram, memory
- a formal induction into office
- when you think who what and why when someone is talking to you online
- to start a computer by turning it off and then back on
- a port where you plug in an internet cable
- a character
- WIFI
- how you protect yourself online
- ex: dogpile and mamma.com
- circuit board
- ISP, a company that offers access to the internet and email
- NCSA
- CPU, how fast it is
- a pattern serving as a guide in mechanical work, something to get you going
- credit
- an image representing a business, store, etc
- DSL and cable are options
Down
- 8 bits
- SSID
- a brief written account about personal, educational, and professional qualifications and experience
- how you act online
- LED, lightbulb
- a right to copy and license a piece of work
- an arrangement or plan, how it looks
- ex: speaker
- a port for plugging in flash-drives
- a continuous stream of information
- ex: google, yahoo
- being safe online
- 1000 bytes
- 3G and 4G are options
- LCD, display
- a wireless networking technology that uses short-wave radio frequencies to connect wireless electronic devices
- the totality of a computer and the devices connected to it
- a port for plugging in headphones
- 1000 gigabytes
- an electronic receiver for a PS2 cable usually used to plug in a keyboard or mouse
- an promise presidents say
- gaming ports
- ex: mouse
- 1000 megabytes
- uses ones and zeros to transmit information
- the arrangement of data
45 Clues: SSID • WIFI • NCSA • 8 bits • credit • ex: mouse • 1000 bytes • Ram, memory • a character • ex: speaker • LCD, display • gaming ports • circuit board • 1000 kilobytes • LED, lightbulb • 1000 gigabytes • 1000 megabytes • ex: google, yahoo • being safe online • how you act online • CPU, how fast it is • 3G and 4G are options • the arrangement of data • ex: dogpile and mamma.com • an promise presidents say • ...
IT and How Computers Work 2023-07-05
Across
- this type of memory is permanent and saved on the hard drive
- job-specific high-speed wire used to communicate the processor with other components
- overseer of the CPU
- information that gets returned by the computer
- A machine that can quickly complete a vast number of extremely simple tasks.
- this type of bus carries data back and forth
- Stores data which is virtual information only accessible with a computer
- arithmetic and logic operations are processed here
- data we give to our computers
- printed circuit board that houses important hardware components via ports
- 0's and 1's
- used to store either temporary or permanent information
- limited space, high-speed memory that the CPU can use for quick processing
- comprised of the translation of input and the instructions given for output
Down
- this type of bus carries a specific address in memory and are unidirectional
- A way for computers all around the world to communicate with each other
- Making sure the information is communicated and stored safely and securely – only the right people should have access to it
- type of input device
- "brain of the computer"
- physical outlet used to connect outside, IO (Input/Output) devices to a computer.
- Are organized sets of instructions that utilize the computer’s hardware to complete predefined tasks.
- responsible for the long-term, or secondary storage of data and programs
- type of output device
- fast and temporary memory
- a mouse being clicked
- this type of bus carries the control signals to the other components and are unidirectional
- the use of technology to organize, store, share, and process information.
27 Clues: 0's and 1's • overseer of the CPU • type of input device • type of output device • a mouse being clicked • "brain of the computer" • fast and temporary memory • data we give to our computers • this type of bus carries data back and forth • information that gets returned by the computer • arithmetic and logic operations are processed here • ...
Public Safety 2024-08-09
Across
- a person whose job is to extinguish fires
- the action of evacuating a person or a place
- a state in which the laws and rules regulating the public behavior of members of a community are observed and authority is obeyed
- responsible for the prevention and detection of crime and the maintenance of public order
- an established or official way of doing something
- freedom from disturbance
- the system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties
- the action of keeping something harmful under control or within limits
- a danger or risk
- the action of protecting, or the state of being protected
- an act of saving or being saved from danger or distress
Down
- a person trained to give emergency medical care to people who are injured or ill, typically in a setting outside of a hospital
- the action of stopping something from happening or arising
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the act of compelling observance of or compliance with a law, rule, or obligation
- rule or directive made and maintained by an authority
- the state of being free from danger or threat
- one of a set of explicit or understood regulations or principles governing conduct within a particular activity or sphere
- protected from or not exposed to danger or risk; not likely to be harmed or lost
- the basic physical and organizational structures and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise
20 Clues: a danger or risk • freedom from disturbance • a person whose job is to extinguish fires • the action of evacuating a person or a place • the state of being free from danger or threat • an established or official way of doing something • rule or directive made and maintained by an authority • an act of saving or being saved from danger or distress • ...
September Edition Crossword 2024-09-24
Across
- 10-month-old Palestinian boy paralyzed from polio after vaccines have grown inaccessible in Gaza.
- This nation has been instrumental in mediating negotiations over repatriation between Germany and Afghanistan.
- This French political party accused the election of being "stolen" after Michel Barnier was named President.
- A form of peaceful protest which has grown increasingly popular amongst college students protesting the war in Gaza.
- Consolidated Analysis Center, Incorporated is a cybersecurity contractor for this department.
- First name of an American Turkish citizen shot by Israeli soldiers on September 6th, whilst protesting West Bank settlements.
- A town in Burkina Faso which was the most recent target of violent attacks by JNIM.
- Former Defense Department official under Biden who advised Vice President Harris' debate preparations.
- Surname of the Supreme Allied Commander of NATO.
Down
- A term used to describe Venezuela's overreliance on oil leading to a historic economic collapse.
- This Chinese investment program has led to complicated ties with Myanmar.
- Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete.
- This Japanese steel company is looking to merge with U.S. steel in a decision to heavily impact voting in the 2024 Presidential election.
- Campus News Editor Madeline Rowe interned with this former congressman.
- A defendant in the Department of Justice's case against Hamas and who heads Hamas' diaspora office.
- A recent rise in this political phenomenon threatens long-term stability and economic performance.
- This technology introduces a new threat to the cyber landscape as false media can be used for foreign intervention.
- Former vice president of Google's ad platform.
- This Long Island doctor died from anaphylactic shock at a Disney resort restaurant.
- This statute in international law reaffirms the authority of the International Criminal Court.
20 Clues: Former vice president of Google's ad platform. • Surname of the Supreme Allied Commander of NATO. • Campus News Editor Madeline Rowe interned with this former congressman. • This Chinese investment program has led to complicated ties with Myanmar. • Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete. • ...
Technology Crossword 2023-06-07
Across
- represents text, computer processor instructions, or any other data using a two-symbol system.
- is the most important processor in a given computer.
- is the protection of computer systems and networks from attack by malicious actors.
- is a form of computer memory that can be read and changed in any orde.
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
- is a file format developed by Adobe in 1992 to present document
- is a digital multimedia container format most commonly used to store video and audi.
- is a collection of discrete values that convey informatio.
- is a method of representing data in a visual, machine-readable form
Down
- is an American multinational technology company
- is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- are small blocks of data created by a web server.
- is a bitmap image format that was developed by a team at the online services provider CompuServe.
- is a mobile operating system
- is a hardware or software component that stores data so that future requests for that data can be served faster
- is a mapping from some domain (for example, a range of integers) to bits.
- is a method of transmitting and receiving messages using electronic devices.
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source devic.
20 Clues: is a mobile operating system • is an American multinational technology company • are small blocks of data created by a web server. • is the most important processor in a given computer. • is a collection of discrete values that convey informatio. • is a file format developed by Adobe in 1992 to present document • ...
Unit 8 Key Terms 2023-04-27
Across
- taken to achieve this.
- a place of refuge or safety.
- the state of being protected against the criminal or unauthorized use of electronic data, or the
- a term typically used to describe international, supranational, and global resource domains in
- a tax or duty paid on a particular class of imports or exports.
- the system.
- to do so.
- fiscal policy to stimulate the economy.
- sum of money provided by the government or a public body
- economically stimulus refers to attempts to use monetary policy
- a system of recording information in a way that makes it difficult or impossible to change, hack, or
- common-pool resources are found.
- the profession, activity or skill of managing international relations, typically
Down
- the state of being equal especially in status, rights and opportunities.
- a video of a person in which their face or body has been digitally altered so that they appear to be
- to reveal personal information, such as passwords and credit card numbers
- else, typically used maliciously or to spread false information
- money paid regularly at a particular rate for the use of money lent.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce
- sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual
- to influence a country's economy.
- businesses.
- controlling the overall supply of money that is available to the nation's banks, its consumers, and
- a set of tools that a nation's central bank has available to promote sustainable economic growth
- the use of government revenue collection and
- a countries representative abroad.
- existing or occurring within a particular country
- assist an industry or business in order to remain competitive.
28 Clues: to do so. • businesses. • the system. • taken to achieve this. • a place of refuge or safety. • common-pool resources are found. • to influence a country's economy. • a countries representative abroad. • fiscal policy to stimulate the economy. • the use of government revenue collection and • existing or occurring within a particular country • ...
TECH CONNECT 2023-08-30
Across
- Writing and structuring code that computers can execute to perform desired functions.
- Programs and applications that run on computers or devices, enabling various tasks.
- A set of rules defining how data is transmitted and received across a network.
- A interconnected system that allows devices to communicate and share resources.
- Implementing systems or processes that operate with minimal human intervention.
- The point of interaction between a user and a device or software application.
- Writing instructions that computers can understand to perform specific tasks.
- Measures to protect digital systems and information from unauthorized access or attacks.
- A remote network of servers for storing, managing, and processing data over the internet.
- A powerful computer that stores and manages data and resources for other devices.
- Intelligence, The ability of machines to simulate human cognitive functions.
Down
- Deliberate actions to compromise or disrupt digital systems, often for malicious purposes.
- Using technology to streamline and execute tasks without human intervention.
- The global network connecting computers and devices, facilitating information exchange.
- Identifying and removing errors or issues in software code.
- The process of introducing new ideas, methods, or technologies to improve existing systems.
- Combining different components or systems to work together seamlessly.
- Often in the form of facts, figures, or statistics, used for analysis.
- Examination of data to extract meaningful insights and make informed decisions.
- Converting data into a code to prevent unauthorized access.
- Short for "application," referring to software designed for specific tasks or purposes.
- The process of designing, creating, and refining software, systems, or products.
- Physical components of computers and devices that enable software to function.
- The person interacting with a device, system, or software application.
- A set of step-by-step instructions for solving a problem or completing a task.
25 Clues: Identifying and removing errors or issues in software code. • Converting data into a code to prevent unauthorized access. • Combining different components or systems to work together seamlessly. • Often in the form of facts, figures, or statistics, used for analysis. • The person interacting with a device, system, or software application. • ...
Bureaucracy and Foreign Policy 2024-10-03
Across
- Department that oversees agencies in charge of counterterrorism, cybersecurity, and immigration
- The method of influencing someone, usually a country, to behave in a certain way
- Department that leads the country’s foreign policy
- A government’s set of strategies and goals for dealing with other nations
- Allows both groups to meet their interests
- Handles significant areas of concern for the federal government (Foreign Affairs, Defense, Transportation, etc.)
- Large, complex administrative structure that handles the everyday business of an organization
- Provides the President with the support and services he needs to govern effectively
- Department that oversees and advises the president on military action
- Violent attacks against civilians
- The President oversees the miliatry as ________-in-chief.
- Government officials who live in foreign countries and represent their government
- A type of agency such as the CIA, NSA, and DIA
Down
- The heads of independent agencies are confirmed by what?
- Type of aid where money and resources go to help people with emergency responses to natural disasters, a lack of food, or the outbreak of deadly diseases
- An agreement between countries
- Type of aid that helps develop other nations
- Congress holds the power of the _________—they control how government money is raised and spent
- The federal bureaucracy is part of the ___________ branch.
- Congress sets general guidelines in laws but allows the bureaucracy to make further policy decisions through ___________ authority.
- Economics method to stop trade and assistance to a specific country
- Mutually beneficial relationship between an agency, congressional committee, and interest group.
- When the U.S. only threatens (key word threatens) to use military forces against another country
- Network of public officials, lobbyists, mass media, think tanks, etc., who promote a particular issue
24 Clues: An agreement between countries • Violent attacks against civilians • Allows both groups to meet their interests • Type of aid that helps develop other nations • A type of agency such as the CIA, NSA, and DIA • Department that leads the country’s foreign policy • The heads of independent agencies are confirmed by what? • ...
Tugas Daring Informatika Salsabila.n.l 30/xi 2025-04-11
Across
- digital upaya untuk memerangi penyebaran konten negatif disebut...
- analyst profesi yang bertugas mengamankan sistem komputer dari serangan siber adalah...
- creator profesi yang bertugas membuat konten untuk media sosial adalah...
- rangkaian karakter yang digunakan untuk mencari informasi di mesin pencari.....
- scientist profesi yang bertugas menganalisis data untuk menghasilkan informasi yang berguna adalah...
- proses penyebaran konten digital kepada khalayak luas disebut...
- proses verifikasi kebenaran konten digital disebut...
- operator boolean yang digunakan untuk menggabungkan kata kunci adalah...
- operator boolean yang digunakan untuk mengecualikan kata kunci adalah...
- cipta hak eksklusif pencipta yang timbul secara otomatis berdasarkan prinsip deklaratif setelah suatu ciptaan diwujudkan dalam bentuk nyata tanpa mengurangi pembatasan sesuai dengan ketentuan peraturan perundang-undangan disebut...
- simbol yang digunakan untuk mencari kata kunci yang mirip adalah...
Down
- salah satu contoh platform untuk diseminasi konten digital adalah...
- salah satu contoh HAKI adalah...
- Tanda kutip ganda (") digunakan untuk mencari frasa yang...
- pelanggaran haki dapat dikenakan sanksi...
- etika dalam memproduksi dan mendiseminasikan konten digital disebut...
- salah satu cara untuk memvalidasi konten negatif adalah dengan melakukan.
- profesi yang bertugas mengembangkan dan memelihara sistem komputer adalah...
- salah satu lembaga yang bertugas memvalidasi konten negatif adalah...
- dua simbol yang digunakan untuk mencari kata kunci di situs web tertentu adalah...
- salah satu contoh konten digital yang mengandung unsur budaya adalah...
- dokumenter budaya salah satu contoh konten digital yang mengandung unsur budaya adalah...
- salah satu contoh konten negatif adalah...
- hidup pencipta +70 tahun masa berlaku hak cipta untuk buku,lagu,dan karya seni lainnya adalah...
- organisasi internasional yang mengurusi HAKI adalah...
- grafis provinsi yang bertugas membuat desain visual untuk produksi digital adalah...
26 Clues: salah satu contoh HAKI adalah... • pelanggaran haki dapat dikenakan sanksi... • salah satu contoh konten negatif adalah... • proses verifikasi kebenaran konten digital disebut... • organisasi internasional yang mengurusi HAKI adalah... • Tanda kutip ganda (") digunakan untuk mencari frasa yang... • proses penyebaran konten digital kepada khalayak luas disebut... • ...
TTS27X_D 2025-04-27
Across
- Platform atau media yang seringkali menjadi sarana penyebaran konten negatif
- Ahli yang mengelola dan memelihara sistem basis data
- Untuk mencari informasi dari situs web tertentu, kita dapat menggunakan awalan site diikuti dengan
- Simbol asterisk dalam search engine berfungsi sebangai karakter
- Kegiatan menyaring atau membersihkan platform digital dari konten yang merugikan
- Upaya untuk memperkenalkan dan menyebarkan warisan budaya melalui platfrom digital
- Hak eksklu untuk menggunakan simbol, logo, atau nama tertentu dakam kegiatan perdagangan atau jasa
- Singkatan dari Hak Kekayaan Intelektual
- Adaptasi cerita atau mitos tradisional ke dalam format konten digital yang lebih modern
- Profesi yang bertugas merancang dan membangun jaringan komputer
- Ahli yang fokus pada keamanan sistem komputer dan jaringan dari ancaman siber
- Orang yang memberikan dukungan teknis kepada pengguna komputer dan sistem informasi
- Proses awal dalam membuat konten digital yang seringkali terinspirasi dari kekayaan budaya
Down
- Bentuk perlindungan HAKI untuk karya cipta di bidang ilmu pengetahuan, seni, dan sastra
- Operator logika dalam search engine yang mengharuskan kedua kata kunci ada dalam hasil pencarian
- Hak eksklusif yang diberikan kepada invetor atas invensinya
- Proses untuk memastikan kebenaran suatu informasi dan menangkal berita bohong
- Profesi yang berfokus pada pengembangan dan pemeliharaan situs web
- Penggunaan tanda filetype dalam pencarian digunakan untuk mencari file dengan format
- Simbol yang digunakan untuk menunjukkann merek dagang yang belum terdaftar secara resmi
- Salah satu bentuk konten digital yang efektif menyampaikan cerita rakyat atau legenda daerah
- Kemampuan berpikir kritis dan analitis dalam mengevaluasi informasi yang diterima
- Situs web atau sistem yang dirancang untuk mencari informasi di internet
- Metode untuk memeriksa keaslian gambar atau video yang beredar di internet
- Media digital yang sering digunakan untuk menyebarkan konten budaya seperti video tari tradisisonal
25 Clues: Singkatan dari Hak Kekayaan Intelektual • Ahli yang mengelola dan memelihara sistem basis data • Hak eksklusif yang diberikan kepada invetor atas invensinya • Simbol asterisk dalam search engine berfungsi sebangai karakter • Profesi yang bertugas merancang dan membangun jaringan komputer • Profesi yang berfokus pada pengembangan dan pemeliharaan situs web • ...
Applications of AI 2025-04-30
Across
- AI technology that converts spoken words to text
- AI tailors educational content to individual students
- AI helps with crop monitoring and yield prediction
- AI tools can generate novel images and music
- AI field focused on understanding and processing human language
- Vehicles that use AI to navigate without human input
- AI generates content and powers recommendation systems
- AI enabling computers to "see" and interpret images
- Identifying and labeling patterns, like faces or speech
- AI systems that sort and prioritize information
- AI detects threats and anomalies in networks
- AI programs that help with tasks, often voice-activated
- Field where AI diagnoses diseases and analyzes images
- AI is used for fraud detection and algorithmic trading in this sector
- Autonomous vehicles rely heavily on AI
- Chatbots and virtual agents are common here
Down
- AI accelerates the process of finding new medicines
- AI forecasts equipment failures in industry
- AI models help forecast weather and study environmental changes
- Personalized learning paths and grading are AI applications here
- AI is used to identify and prevent deceptive activities
- AI suggests products or content based on user history
- AI provides the intelligence for automated machines
- AI optimizes production and quality control
- AI personalizes advertising and analyzes consumer behavior
- AI systems that convert text or speech from one language to another
- AI controls non-player characters and generates game content
- Identifying objects or patterns in data, often using AI
- Creating new content like text, images, or music using AI
- AI is good at spotting unusual patterns that might indicate fraud or issues
30 Clues: Autonomous vehicles rely heavily on AI • AI forecasts equipment failures in industry • AI optimizes production and quality control • Chatbots and virtual agents are common here • AI tools can generate novel images and music • AI detects threats and anomalies in networks • AI systems that sort and prioritize information • AI technology that converts spoken words to text • ...
SCIENCE AND TECHNOLOGY 2024-10-25
Across
- The force that pulls objects toward each other, especially toward the Earth.
- The technology used to design and create robots.
- The science of building and using tiny structures at a molecular scale.
- The basic building block of all living organisms.
- The study of matter, energy, and the forces that act on them.
- The act of introducing something new, often advancing technology or science.
- A proposed explanation made based on limited evidence, to be tested.
- Facts or statistics collected for analysis or reference.
- The power needed to do work, from sources like fuel, electricity, or the sun.
- Something made by humans rather than occurring naturally.
- A place where scientists conduct experiments and research.
- The study of genes and heredity in living organisms.
- A branch of physics studying the behavior of particles on the smallest scales.
- A language or set of instructions used to program computers.
- The study of stars, planets, and outer space.
Down
- A path through which electric current flows.
- The molecule that carries genetic information in living organisms.
- An imitation of a real-world process for study or training purposes.
- A new idea or method that improves how things are done.
- The protection of computer systems from digital attacks.
- A small piece of matter, like an atom or molecule.
- A test done to discover or prove something.
- Microscopic organisms, some of which can cause diseases.
- A device that orbits Earth or another planet, used for communication or research.
- A set of rules or instructions for solving a problem, often used in computing.
- A collection of data organized for easy access and analysis.
- A small infectious agent that can multiply in living cells.
- The process by which species change over time through natural selection.
- The use of machines and technology to operate without human intervention.
29 Clues: A test done to discover or prove something. • A path through which electric current flows. • The study of stars, planets, and outer space. • The technology used to design and create robots. • The basic building block of all living organisms. • A small piece of matter, like an atom or molecule. • The study of genes and heredity in living organisms. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Security documentation that details system resource usage by users and processes for auditing.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Attacks that overwhelm a target system or network with a flood of traffic
- Policy-based accept or deny of network traffic.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
Down
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Injecting malicious scripts into webpages viewed by other users
- Matching known patterns of threats against security event data to find potential matches.
- Code examination performed without running the malicious program.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Process of transforming information into a scrambled format to secure it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- The correlation that matches the known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
Issues and Impacts Crossword 2025-12-03
Across
- Unfairness in algorithms or AI systems that can discriminate
- All the information about a person that exists online
- Copying someone else’s work without credit
- Crime where someone uses another person’s personal details illegally
- Illegal activities carried out using computers or the internet
- Platforms that can spread misinformation or affect mental health
- Technology that identifies people by their face
- Incident where sensitive information is accessed without permission
- Deliberately posting offensive or upsetting content online
- False or misleading information spread online
- Protecting systems and data from online threats
- Monitoring of people’s activities using technology
Down
- Gap between people who have access to technology and those who do not
- Computer-generated environment that feels real to users
- Software designed to damage or disrupt computers
- Legal right protecting creators of software, music, or digital content
- Money that exists only electronically, like Bitcoin
- Discarded electronic devices that harm the environment
- Technology that simulates human thinking and decision-making
- Small files stored by websites to track user activity
- Software that is freely available and can be modified by anyone
- Moral principles guiding responsible use of technology
- Process of converting data into code to prevent unauthorized access
- Creations of the mind protected by law
- Technology that overlays digital information onto the real world
- Environmental effects of producing and using technology
- Excessive use of technology leading to negative impacts on health or lifestyle
- Replacement of human jobs with computer-controlled systems
- Fraudulent attempt to steal sensitive information via fake emails or websites
- Ensuring personal information is kept safe and not misused
- Unauthorized access to computer systems
- Programs that can copy themselves and damage computers
32 Clues: Creations of the mind protected by law • Unauthorized access to computer systems • Copying someone else’s work without credit • False or misleading information spread online • Technology that identifies people by their face • Protecting systems and data from online threats • Software designed to damage or disrupt computers • ...
Cybersecurity Awareness Puzzle 2 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Challenging Indian Tech & Innovation Crossword 2024-10-10
Across
- A startup that’s revolutionizing the Indian agritech sector with AI-driven predictive analytics for farming
- This Indian multinational technology company is the world's largest provider of IT consulting services
- An Indian unicorn startup specializing in online education, now expanding globally with gamified learning solutions
- The first Indian startup to be listed on NASDAQ, specializing in AI-powered customer engagement platforms
- India’s leading tech unicorn in ride-sharing, now venturing into electric vehicles
- This Indian tech company developed a super app in the post-pandemic era, offering a wide range of services, including payments and healthcare
- An Indian renewable energy company that’s making headlines for being the largest in the world by installed capacity
- An Indian tech company focused on blockchain and AI for managing supply chain transparency in industries like pharma and logistics
Down
- An Indian company that developed an AI-based cybersecurity platform, now offering services across more than 30 countries
- India’s largest IT company by market capitalization, known for pioneering automation and AI-based IT solutions
- This Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystem
- A major player in India’s space technology, this private company built India’s first privately developed rocket
- The largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services
- This company is leading India’s AI-based conversational chatbot innovations, widely used by financial institutions
14 Clues: India’s leading tech unicorn in ride-sharing, now venturing into electric vehicles • This Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystem • The largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services • ...
CONTRACTS CROSSWORD 2025-09-03
Across
- How many different Contract bill-to's does BSRx have in NAV?
- September 3rd, 2025
- How many hours do you have to fulfill an URGENT Delivery Request if received at 12:00 pm
- As part of the _______ Compliance Program, the Provider will maintain a detailed inventory and ability to track the records of Personal Information, with audit logs showing who Handled the Personal Information
- As part of our _____ requirements, BSRx must have an information & cybersecurity program
Down
- 99.00% of Orders filled as specified in each Order during the month, without errors in product type, quality, quantity, etc = ORDER _______ ACCURACY
- How many OHaH regions does BSRx have under the NPWT Contract?
- a HCCSS request or a Patient, Patient’s physician, Caregiver or Service Provider Organization request, for a _________ with a Registered Pharmacist
- Service Delivery Locations that are used to facilitate patient pick-ups and can only be invoiced once the order has been picked up.
- REPORT The FSP shall, for each Fiscal Year during the Term, submit this to HCCSS and the HCCSS Contract Manager
- The Provider shall provide the Recipient with all necessary instruction and disposal containers required for the proper disposal of _______ Waste
- Receiving an end rental for an equipment will initiate this type of Service Request
- Cardinal & OMS are examples of what?
- This is the Del Code for Non-Urgent Delivery Requests
14 Clues: September 3rd, 2025 • Cardinal & OMS are examples of what? • This is the Del Code for Non-Urgent Delivery Requests • How many different Contract bill-to's does BSRx have in NAV? • How many OHaH regions does BSRx have under the NPWT Contract? • Receiving an end rental for an equipment will initiate this type of Service Request • ...
Cybersecurity Awareness Puzzle 5 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 1 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 7 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
CYBER FEST CROSSWORD 2024-10-18
Across
- Software designed to detect, prevent, and remove malware and other harmful software.
- Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
- A secret string of characters used to verify the identity of a user.
- An attempt by hackers to damage or disrupt a computer system or network.
- Ensuring that an organization meets regulatory and legal requirements for security practices.
- Software that secretly monitors and collects personal information from a computer.
- A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
- The process of verifying the identity of a user or device before granting access to a system.
Down
- Related to computers, information technology, or virtual reality, often used in the context of online environments.
- The process of converting data into a secret code to protect it from unauthorized access.
- A weakness in software, hardware, or procedures that could be exploited to cause harm.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
- Any software intentionally designed to cause damage to a computer, server, or network.
- A person who uses computers to gain unauthorized access to data.
- A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.
16 Clues: A person who uses computers to gain unauthorized access to data. • A secret string of characters used to verify the identity of a user. • An attempt by hackers to damage or disrupt a computer system or network. • Software that secretly monitors and collects personal information from a computer. • ...
Cybersecurity Awareness Month 2023 #InformationSecurityInsights 2023-10-03
8 Clues: Secure data disposal. • Deceptive email attacks. • Adherence to regulations. • Examination for compliance. • Security approach to the left. • Trust model with no implicit trust. • Potential for harm, loss, or breach • Ability to withstand and recover from cyberattacks
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the prevention of damage to and the protection of computer and information systems and is everyone's responsibility.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the prevention of damage to or the protection of computer and information systems. It is everyone's responsibility!
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points. • ...
SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Safety and Ethics Puzzle 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
UNIT 1 - REVISION 2024-10-14
Across
- Consisting of more than one component or instance, used to describe redundant systems or data sets.
- Based on or following established practices or standards, often referring to traditional methods or widely accepted technologies.
- Moving or extending in a direction parallel to the surface or side.
- A device used to inject or withdraw fluid, often found in medical or laboratory environments.
- Expressing much in few words, especially in communication or technical documentation.
- Hydraulic fracturing, a method to extract oil or gas from the earth by breaking rock layers with fluid pressure.
- The distance between successive peaks of a wave, often related to light or sound.
- Having equal value, function, or meaning in a technical context, such as electrical or mechanical equivalence.
- To make impure by exposure to or addition of unwanted substances, relevant in contexts like data or chemical purity.
Down
- Inactive but capable of becoming active
- Focused or aligned along a specific direction, often used in antenna or signal technologies.
- Capable of being controlled or directed, often used in relation to antennas or vehicles.
- The delay before a transfer of data begins following an instruction, commonly in network or computing systems.
- To fail to notice or account for, often referring to missing critical details in analysis.
- Featuring new methods or ideas that introduce improvement or change in technology or processes.
- Comprising light or radiation of a single wavelength or color.
- To pose a risk or potential harm, often in cybersecurity or environmental contexts.
- To increase the strength of a signal, sound, or electrical current.
18 Clues: Inactive but capable of becoming active • Comprising light or radiation of a single wavelength or color. • Moving or extending in a direction parallel to the surface or side. • To increase the strength of a signal, sound, or electrical current. • The distance between successive peaks of a wave, often related to light or sound. • ...
Study subjects 2024-11-29
Across
- The study of how people think, feel, and behave.
- The study and design of robots, machines that can do tasks on their own or help people.
- The activity of starting and running a business, especially when it involves taking risks to make a profit.
- The study of ideas about life, knowledge, and the difference between right and wrong.
- Systems of words and rules used by people to communicate, such as English, Spanish, or Chinese.
- The work of designing and building machines, roads, bridges, and other structures using science and math.
- A group of subjects that focus on science, technology, engineering, and mathematics.
Down
- The protection of computers, networks, and personal information from being stolen or damaged.
- A system of rules that people in a country or place must follow.
- Subjects about human life, such as history, philosophy, and literature, that focus on culture and ideas instead of science.
- The science that studies how things move, the forces that act on them, and how energy works.
- The rights and responsibilities of being a member of a country.
- The study of people, their cultures, and how they have lived in the past and present.
- Sciences The study of people and society, including subjects like psychology, sociology, and economics.
- The study and design of buildings and other structures.
- The study of money, trade, and how people and governments use resources.
- The study of numbers, shapes, and patterns.
- The science of substances, what they are made of, how they combine, and how they change.
18 Clues: The study of numbers, shapes, and patterns. • The study of how people think, feel, and behave. • The study and design of buildings and other structures. • The rights and responsibilities of being a member of a country. • A system of rules that people in a country or place must follow. • The study of money, trade, and how people and governments use resources. • ...
Cyber Security Awareness 2018-06-05
Across
- Be careful connecting to public _____.
- is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
- unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
- shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
- What month is National Cyber Security Awareness Month?
- True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
- is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
- techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- a secret word or expression used by authorized persons to prove their right to access, information, etc.
- when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
- type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
- is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user
12 Clues: Be careful connecting to public _____. • What month is National Cyber Security Awareness Month? • True/False: Call I.T. Service desk right away when you suspect a phishing email • techniques of protecting computers, networks, programs and data from unauthorized access or attacks • ...
Cybersecurity Awareness Puzzle 3 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 5 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 8 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 9 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
The Internet Crossword 2024-01-23
Across
- wide web a system of interconnected public web pages accessible through the Internet
- abbreviation away from keyboard
- a set of computers sharing resources located on or provided by network codes
- facts provided or learned about something or someone
- The maximum amount of data transmitted over an internet connection in a given amount of time.
- Chip A set of microminiaturized electronic circuits fabricated on a thin slice of semiconductor material.
- electronic technology that generates, stores and processes data
- abbreviation for "for your information."
- the application of scientific knowledge for practical purposes, especially in industry
- conduct electricity and provide a low-resistance path for electricity to flow through
- information that is set up for easy access, management and updating.
- engine, coordinated set of programs that searches for and identifies items in a database that match
- facts and statistics collected together for reference or analysis
- search for information on the internet using the search engine Google
- an electronic device for storing and processing data
- an application, especially as downloaded by a user to a mobile device
- a computer program which manages access to a centralized resource or service in a network.
- the state of being protected against the criminal or unauthorized use of data
- text files with small pieces of data like a username and password
- abbreviation for non-player character
- abbreviation for frequently asked questions
- spot a physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network
- abbreviation for By The Way
- the default or front page of a site.
Down
- a device having or operating with the aid of many small components
- an individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- the process of scrambling or enciphering data so it can be read only by someone with the means to return it to its original state
- A newb or newbie; refers to the idea that someone is new to a game, concept, or idea; implying a lack of experience.
- a software application that runs automated tasks (scripts) on the Internet.
- A protected/private string of letters, numbers, and/or special characters used to authenticate an identity or to authorize access to data.
- relating to mobile phones, handheld computers, and similar technology
- an act of logging in to a computer, database, or system
- a type of communications technology that allows voice calls and other telephony
- something that can be done or seen using computers or the internet
- a set of related web pages located under a single domain name
- relating the culture of computers, information technology, and virtual reality
- a frequently updated web page used for personal commentary or business content
- an information system that enables content sharing over the Internet
- Room an online platform that enables users to communicate with each other in real time
- social media sites, applications, or accounts
- a computer program for displaying and navigating between web pages
- complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it
- an insulated wire or wires having a protective casing and used for transmitting electricity
- a worldwide system of computer networks
- a web services provider that offers both a search engine and a directory of World Wide Web pages organized in a hierarchy of topic categories
- computer network security system that restricts internet traffic in, out, or within a private network
- the largest vendor of computer software in the world
- abbreviation which means estimated time of arrival or the time you expect to arrive.
- the application of scientific knowledge for practical purposes, especially in industry
- The technology of transmitting audio and video files
- a unique address that identifies a device on the internet or a local network
51 Clues: abbreviation for By The Way • abbreviation away from keyboard • the default or front page of a site. • abbreviation for non-player character • a worldwide system of computer networks • abbreviation for "for your information." • abbreviation for frequently asked questions • social media sites, applications, or accounts • ...
Internet Safety Puzzle 2025-03-04
Across
- controls available on many websites and apps to limit who can access your profile and what information visitors can see
- tiny files of data used to track your online activities and information when you're browsing a website
- the correct or acceptable way of communicating on the internet
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
- which is the act of someone causing discord online or in person.
- the information about a particular person that exists on the internet as a result of their online activity.
- the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
- a type of malware (malicious software) designed to deny access to a user's data
Down
- Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
- Using all caps when you type
- An online conversation
- the practice of protecting systems, networks, and programs from digital attacks
- Being nice or showing kindness to a child to eventually have them comfortable enough to do something bad
- using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- posting, sharing, or saying harmful things about someone on the internet
- the animal that looks for prey to eat
17 Clues: An online conversation • Using all caps when you type • the animal that looks for prey to eat • the correct or acceptable way of communicating on the internet • which is the act of someone causing discord online or in person. • posting, sharing, or saying harmful things about someone on the internet • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- Contain tracking information for an individual email
- Fraud like Phishing, but it comes as a text message or SMS
- It is a deceptive scheme or trick used to cheat someone out of something
- It is merely an email trying to convince you to do something
- It is a phone scam designed to get your personal information by impersonating
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- Threat that involves sending email messages with a fake sender address
- It is just like Phishing but it only targets specific individuals within an organization
Down
- is news or knowledge received or given
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- It is a type of email attack where bad people are trying to steal your precious information
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- unsolicited bulk messages normally from people trying to sell something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • unsolicited bulk messages normally from people trying to sell something • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- It is a phone scam designed to get your personal information by impersonating
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- It is a type of email attack where bad people are trying to steal your precious information
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- Fraud like Phishing, but it comes as a text message or SMS
- It is just like Phishing but it only targets specific individuals within an organization
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
Down
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- Threat that involves sending email messages with a fake sender address
- It is news or knowledge received or given
- Unsolicited bulk messages normally from people trying to sell something
- It is merely an email trying to convince you to do something
- Contain tracking information for an individual email
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- It is a deceptive scheme or trick used to cheat someone out of something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: It is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • ...
hi 2022-09-28
Across
- A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
- A generic term encompassing decode and decipher
- Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
- Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
- The service provider for CrowdStrike's internal training courses
- The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
- Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
- CrowdStrike's CEO and co-founder; abbr
- The property of being accessible and usable upon demand
- Computer compromised with malicious code; used by a threat actor to perform remote commands
- Hosting city of Fal.Con; abbr
- Someone who uses a social network to create an account with a fake identity to deceive an individual
- Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
- As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
- System of prevention and recovery from potential threats to a business; abbr
- As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- An unauthorized user who attempts to or gains access to an information system
- Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
- CrowdStrike's annual cybersecurity convention; "___.Con"
- Software that compromises the operation of a system by performing an unauthorized function or process
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
- Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
- A way to take advantage of a vulnerability in software
- A cybersecurity company
- The generic term encompassing encipher and encode
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- The process of verifying the identity or other attributes of an entity
Down
- Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
- A denial of service technique that uses numerous systems to perform the attack simultaneously
- A recognizable, distinguishing pattern; typically used to sign documents
- Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
- Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
- Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
- Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
- ___-Party Information
- Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
- A capability to limit network traffic between networks and/or information systems
- Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
- In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
- The process of transforming plaintext into ciphertext
- Type of analysis that determines what levels of impact to a system are tolerable; abbr
- Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- CrowdStrike threat hunting team
- Intranet webpage for all things CrowdStrike-related; abbr
- Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
- Cryptographic network protocol for operating network services securely over an unsecured network; abbr
- A dishonest scheme; a fraud
- CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
- Short form for "cryptography"
- When someone uses a social network to create an account with a fake identity to deceive a concrete person
- The process of transforming ciphertext into its original plaintext
- Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
- Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
- Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
- Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms
61 Clues: ___-Party Information • A cybersecurity company • A dishonest scheme; a fraud • Hosting city of Fal.Con; abbr • Short form for "cryptography" • CrowdStrike threat hunting team • CrowdStrike's CEO and co-founder; abbr • A generic term encompassing decode and decipher • The generic term encompassing encipher and encode • The process of transforming plaintext into ciphertext • ...
FITDVocab.MS 2013-05-15
Across
- Where you would plug in games, keyboard, and a mouse
- Where you would plug in a flash drive
- The way things are arranged
- A brief description of your self you would fill out in you were applying for a job or a school
- Upgrade your computer
- A picture owned by a company
- An app that you can download
- 1,000 zettabytes
- Parts that let you control your computer
- Protect information and networks
- Screen
- A cloud based software the uses one canvas instead of traditional slides
- a port that allows a computer to connect to a network
- 8 bits
- 1,000 exabytes
- Is the newer and more common type of clock
- The shape or size of a document or something you can customize
- 1,000 petabytes
- a port for headphones
- Is the older type of clock
- Service Set Identifier
- 1,000 megabytes
Down
- A readable file
- A selection of drawing or editing tools on a program
- A phrase or word owned by a company
- An object on a computer that stores data or docs.
- An already made design for a document
- PC-Windows/Mac-Osx
- A device that is mobile
- device that makes it possible to transmission of data
- A place you can save docs and use anywhere
- 1,000 gigabytes
- 1,000 kilobytes
- Way you behave online
- 1,000 yottabytes
- Rules and behavior to keep your computer safe
- 1,000 brontobytes
- Heart of the computer
- 1,000 terabytes
- Central Processing Unit
- Long term memory
- Short term memory
- Comcast
- 1,000 bytes
- wireless Fidelity
- The first and smallest data storage
46 Clues: Screen • 8 bits • Comcast • 1,000 bytes • 1,000 exabytes • A readable file • 1,000 gigabytes • 1,000 kilobytes • 1,000 terabytes • 1,000 petabytes • 1,000 megabytes • 1,000 zettabytes • 1,000 yottabytes • Long term memory • 1,000 brontobytes • Short term memory • wireless Fidelity • PC-Windows/Mac-Osx • Upgrade your computer • Way you behave online • Heart of the computer • a port for headphones • ...
FIT_ Vocab.MGB 2013-05-16
Across
- the heart of a computer
- a plan or design
- zoomable online presentation program
- a written document of what experience you have
- the right to make copies
- things you download onto your computer, phone, or pad
- protection of information on the internet
- it sends the user requests for other search engines
- a navigation tool that you use to go on websites
- a three folded pamphlet that tells about a company
- a file format that is meant for pictures
- somewhere where you can see the format of a doc
- things that have to do with a computer
- an internet provider
- a template that you can type on easily
- the act to induct into office
- a motto or something a company says to get your attention
- wireless internet
- something you plug into your computer
- to restart your computer
- flash drive mouse keyboard
- a name, symbol, or trademark
- a program that controls a display for the user
- random memory for your computer
- smallest unit of data on a computer
Down
- the arrangement of data on a document
- someone who sells space for websites
- a file having a present format
- the setup of a computer
- wired internet
- Google Bing! Yahoo
- something you can create on
- the rules or behavior to keep you safe online
- how to act online
- a online memory storing device that can be accessed anywhere
- iphone droid blackberry
- to tell people about someone's product or service
- the main processing unit
- a device that shows information
- wireless networking tech
- to help a company grow
- word excel powerpoint
- a company that helps keep you safe online
43 Clues: wired internet • a plan or design • how to act online • wireless internet • Google Bing! Yahoo • an internet provider • word excel powerpoint • to help a company grow • the heart of a computer • the setup of a computer • iphone droid blackberry • the right to make copies • the main processing unit • to restart your computer • wireless networking tech • flash drive mouse keyboard • ...
Tech puzzle 2023-03-02
Across
- Primary memory is also known as _______ memory.
- What is a document sent with with an email message called?
- ________________ hyperlink is a saved link to a particular web page.
- Which technology is used in Brahmastra movie?
- Visual display unit is also called _____________
- Protection of computer system and information from harm theft and unauthorised use.
- _______is considered as one of the universal gates.
- The primary component of a computer that acts as its “control center.”
- An incredibly powerful tool used to get meaning out of vast amounts of data
- The initial program that runs when a computer is powered up or rebooted.
- ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
Down
- A chatbot developed by openAI and launched in November 2022
- _________ protects your computer from viruses and hackers
- _______________ reality is the integration of digital information with live video.
- What is temporarily stored on your computer?
- What technology was used in avengers end game?
- go Give one example of a game that used unity and C#
- A software program that allows you to surf the web.
- _______ is the way of sending messages over the Internet.
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- What is the #1 social media app?
- What protects your computer from hackers?
- call An interrupt triggered by a software.
- Smallest unit of measurement in computing
25 Clues: What is the #1 social media app? • What protects your computer from hackers? • Smallest unit of measurement in computing • call An interrupt triggered by a software. • What is temporarily stored on your computer? • Which technology is used in Brahmastra movie? • What technology was used in avengers end game? • Primary memory is also known as _______ memory. • ...
UPC 2023-04-23
Across
- The act of buying or selling goods or services online
- The process of protecting computer systems and networks from unauthorized access
- A software program used to create and edit digital images
- The amount of money required to start or operate a business
- A person who starts and runs a business
- The act of selling goods or services to another country
- A written agreement between two or more parties
- The process of promoting a product or service through paid advertising
- The difference between a company's assets and liabilities
- A software program that performs a specific task
- A type of authentication that uses a physical characteristic of the user, such as a fingerprint or iris scan
Down
- A type of legal protection for creative works
- A type of software used to create and edit spreadsheets
- A system of record-keeping and financial reporting for businesses
- A programming language used to create web pages and web applications
- A system used to store and organize data
- The process of bringing a new product or service to market
- The process of converting raw materials into finished goods
- A network of computers that allows users to share resources and information
- A type of software that provides security for a computer network
- The process of finding and fixing errors in code
- The total amount of money a company has made from its operations
- A type of software that translates computer code into machine-readable instructions
- The act of purchasing goods or services from another country
- A program that protects a computer from viruses and other malicious software
25 Clues: A person who starts and runs a business • A system used to store and organize data • A type of legal protection for creative works • A written agreement between two or more parties • The process of finding and fixing errors in code • A software program that performs a specific task • The act of buying or selling goods or services online • ...
AP Computer Science Review 2021-05-24
Across
- manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation
- the use of a computer to represent the dynamic responses of one system by the behavior of another system modeled after it.
- a whole number
- a technique that attempts to trick a user into providing personal information
- data about data.
- software intended to damage a computing system or to take partial control over its operation
- a detailed yet readable description of what a computer program or algorithm must do.
- measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
- the delay between a user's action and a web application's response to that action
- the process of decoding data.
- is the practice of obtaining input or information from a large number of people via the Internet.
- study of securing (or encrypting) information such that it is inaccessible by third parties.
Down
- transmission of data from one computer to another, or from one device to another.
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- the ability to limit access to information to a certain set of users.
- either true or false.
- a base-16 number system.
- the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
- the process of encoding data to prevent unauthorized access.
- a network of servers that track the IP addresses of different domain names like “example.com”
- a base-2 number system.
21 Clues: a whole number • data about data. • either true or false. • a base-2 number system. • a base-16 number system. • the process of decoding data. • the process of encoding data to prevent unauthorized access. • the ability to limit access to information to a certain set of users. • a technique that attempts to trick a user into providing personal information • ...
BRIANA & MATTHEW 2022-05-26
Across
- city where Briana’s first project as Construction PM was located
- Name of restaurant the couple went to on their first date (note: they ate in the car because they were running late to the movie)
- The ______: the nickname given to the house in which Matthew lived during his junior year of college
- name Matthew called Briana until they started dating
- winter sport Matthew helped to teach Briana
- TV show the couple has watched at least 7 times through
- City where the couple got engaged; beach town Briana visited with her dad during summers
- City in which Matthew lived at the time the couple adopted their eldest dog
- Briana’s nickname for Matthew
- acronym of the college Briana attended for undergraduate and Matthew attended for graduate
- college Matthew attended for his undergraduate degree
- city the couple first officially lived together
- Full name of the couple’s eldest dog
- city the couple currently live in
- matthew’s eye color
Down
- type of engineering Briana studied in college
- The couple’s favorite football team
- Sport Briana played in high school
- Matthew’s undergraduate degree was for _____ _____ engineering
- City in Arizona where both Briana and Matthew lived when they met
- name of the junior high school the couple attended together
- During college, Briana worked at this LA landmark as a research library and archives assistant
- State in which Matthew was born and lived until the family moved to Arizona
- mascot of the high school the couple attended together
- Sport Matthew played in high school and college
- Name of the couple’s youngest dog
- matthew’s favorite cuisine
- number of countries they have visited together (US not included)
- briana’s eye color
29 Clues: briana’s eye color • matthew’s eye color • matthew’s favorite cuisine • Briana’s nickname for Matthew • Name of the couple’s youngest dog • city the couple currently live in • Sport Briana played in high school • The couple’s favorite football team • Full name of the couple’s eldest dog • winter sport Matthew helped to teach Briana • ...
Customer Service Week Crossword 2023-10-03
Across
- Closing a _________ closes all the children.
- a holiday for us but not for financial institutions
- email address for notification intended for all employees
- __________ Expertise Efficiency. Every day. Every time.
- set your Non-Ready code to this 15 minutes prior to leaving to complete any end of day tasks.
- Teams channel for technical and non-technical information that everyone should be aware of
- actions you take to resolve an issue that should be documented in the ticket
- Not-Ready code to be used for time spent investigating an open ticket while the customer is not on the phone
- takes calls during non-staffed hours
- updates to major system outages should be sent at least _________
- The ________ Email Report Template is used to document suspicious emails reported by users.
- used for instant messaging
- ticket management tool used by the Support Center
Down
- _________ Downtime procedures should be followed for outages of any major system in the BEPC environment.
- the on-call contact should be notified off issues needing immediate attention even during _________ hours.
- An engineering contact during non-staffed hours
- call center front end used by Support Center to take calls
- considered a major system in the BEPC environment
- If it’s not in the _______, it didn’t happen.
- a problem with a major system impacting multiple users or departments
- required monthly cybersecurity training
- SysAid template to be used for any caller who reports to Jolene Johnson
- subject line tag for notifications that application or system has resumed normal operations
- “Done” is never an acceptable one.
- Send a ticket to ________ Support if no SA group exists for that software.
25 Clues: used for instant messaging • “Done” is never an acceptable one. • takes calls during non-staffed hours • required monthly cybersecurity training • Closing a _________ closes all the children. • If it’s not in the _______, it didn’t happen. • An engineering contact during non-staffed hours • considered a major system in the BEPC environment • ...
Internet Safety 2025-02-26
Across
- Someone who uses the internet, email, or other electronic communications devices to repeatedly threaten and harass another person.
- Identity Theft Using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- The practice whereby a group of people assault a stranger at random while filming the incident on a mobile device
- The action or behavior used to establish an emotional connection with a vulnerable person
- Criminal activities carried out by means of computers or the internet
- Footprint The unique trail of data that a person or business creates while using the internet.
- Writing in ALL CAPS.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
Down
- To alter (a digital image) with Photoshop software or other image-editing software
- A frequently updated web page used for personal commentary or business content.
- An informal conversation.
- Flaming The act of posting angry or insulting messages
- Unauthorized reproduction or distribution of someone's intellectual property without their consent.
- The practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- The correct or acceptable way of communicating on the internet.
- The use of technology to harass, threaten, embarrass, or target another person.
- A person who ruthlessly exploits others.
- A piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
- Settings Controls available on many websites and apps to limit who can access your profile
- The practice of protecting systems, networks, and programs from digital attacks
20 Clues: Writing in ALL CAPS. • An informal conversation. • A person who ruthlessly exploits others. • Flaming The act of posting angry or insulting messages • The correct or acceptable way of communicating on the internet. • Criminal activities carried out by means of computers or the internet • A frequently updated web page used for personal commentary or business content. • ...
Engineering and Technological World 2025-04-30
Across
- Term used to collectively refer to the atmosphere and outer space
- Tiny programmable chips
- Factory robots to automate processes
- Digital overlay on reality
- Immersive digital world
- Virtual system replica
- Massive datasets
- Mix of mechanics and electronics
- Miniature technology
- Modeling structural load behavior
- Electricity network that uses digital and other advanced technologies to monitor and manage the transport of electricity
- Smart connected devices
- Extracting insights from data
- How humans use computers
- Secure digital ledger
- Act of teaching AI robots
- Path for transmitting electric current
- Allows devices in remote locations to process data at the "edge" of the network
- A microprocessor based computer hardware system with a dedicated function
- Secure communication coding
Down
- AI driven repairs
- Energy Sustainable earth friendly energy
- Vehicles Self driving cars
- Remote data storage
- Usage of autonomous machines
- Process of creating a physical object from a digital design
- Smartwatches, fitness trackers, different type of body monitors
- Study of heat and energy
- Problem solving procedure
- Light enabled technological systems
- Study of how objects move through air
- Flying devices used for hobbies and war
- Developing new substances
- Latest wireless network
- Fluid powered systems
- Tool used for digital design
- Study of engineering and biology
- Computers utilizing quantum physics
- Space based communication
- Simulated human technology
- Study of internet safety
- Study of machines
- Silicon chip material
- Infrastructure design
- Brain inspired artificial intelligence
45 Clues: Massive datasets • AI driven repairs • Study of machines • Remote data storage • Miniature technology • Fluid powered systems • Silicon chip material • Infrastructure design • Secure digital ledger • Virtual system replica • Tiny programmable chips • Immersive digital world • Latest wireless network • Smart connected devices • Study of heat and energy • Study of internet safety • ...
Tugas daring juang mario/15 2025-04-24
Across
- Jenis konten yang mengandung kebencian, kekerasan, atau diskriminasi.
- Proses mengidentifikasi dan menghapus konten yang berbahaya dari platform digital.
- Hak atas penggunaan nama, logo, atau simbol dagang tertentu.
- Profesi yang berfokus pada analisis data dan menemukan wawasan dari data tersebut.
- Konten digital dalam bentuk gambar bergerak yang banyak ditemukan di YouTube.
- Orang yang merancang dan mengatur tampilan antarmuka pengguna pada aplikasi atau situs
- Hak eksklusif atas karya tulis, lagu, atau film.
- Profesi yang mengatur dan memelihara infrastruktur jaringan komputer di perusahaan
- Proses awal sebelum produksi konten, termasuk ide, riset, dan perencanaan.
- Proses mengoptimalkan website agar muncul di hasil teratas pencarian.
- Hak atas penemuan atau inovasi teknologi
- Mesin pencari paling populer milik perusahaan teknologi besar di Amerika.
Down
- Alat atau aplikasi yang digunakan untuk mendeteksi konten palsu atau manipulasi media
- Kepanjangan dari Hak Atas Kekayaan
- Alat atau sistem yang digunakan untuk menemukan informasi di internet berdasarkan kata kunci.
- Proses untuk memeriksa kebenaran atau kesahihan konten di internet, baik itu gambar, teks, atau video.
- Nama algoritma penilai halaman web yang diperkenalkan oleh pendiri Google.
- Tujuan utama dari menyebarkan konten digital adalah untuk meningkatkan ini terhadap suatu brand.
- Informasi digital seperti teks, gambar, atau video yang dipublikasikan secara online.
- Lembaga resmi yang mengurus pendaftaran HAKI di Indonesia.
- Metode yang digunakan untuk memastikan apakah sebuah berita atau informasi benar-benar terjadi atau hanya hoaks.
- Media seperti Instagram, TikTok, dan Facebook yang digunakan untuk menyebarkan konten.
- Langkah awal mesin pencari menjelajahi dan mengumpulkan data situs web.
- Orang yang bertugas menjaga keamanan data dan jaringan dari ancaman
- Profesi yang membuat dan mengembangkan program komputer.
25 Clues: Kepanjangan dari Hak Atas Kekayaan • Hak atas penemuan atau inovasi teknologi • Hak eksklusif atas karya tulis, lagu, atau film. • Profesi yang membuat dan mengembangkan program komputer. • Lembaga resmi yang mengurus pendaftaran HAKI di Indonesia. • Hak atas penggunaan nama, logo, atau simbol dagang tertentu. • ...
“Family Life in a Changing World” 2025-03-27
Across
- The process of choosing the best options for family well-being
- Earning an income by running a business instead of working for someone
- Protecting family data and privacy when using the internet
- The main financial provider in a household
- The amount of work a person has in a job or at home
- Relying on others for financial or emotional support
- The connection and time spent between family members
- When individuals, including children, take responsibility for themselves
- Meaningful interactions that strengthen family relationships
- Maintaining stability between work, home, and personal life
- Emotional pressure caused by job demands and family responsibilities
- The ability of families to adjust to economic and technological changes
- Setting aside money for future family needs
- Planning and managing household income and expenses
- The exchange of information between family members
Down
- The people living together and sharing responsibilities in a home
- Buying and selling goods and services online for income
- The ability to adjust work and home responsibilities easily
- Money sent home by family members working overseas
- Tools and devices that help families communicate and work efficiently
- Using social connections to find jobs or grow a business
- A person who starts and manages their own business
- The responsibilities of each family member in managing the home
- Money earned from work or business to support the family
- Organizing tasks to ensure family and work responsibilities are met
- Online platforms used for work, school, or family communication
- The responsibilities and challenges of raising children
- Services or arrangements made for children when parents are working
- Movement of individuals to other countries for job opportunities
29 Clues: The main financial provider in a household • Setting aside money for future family needs • Money sent home by family members working overseas • A person who starts and manages their own business • The exchange of information between family members • The amount of work a person has in a job or at home • Planning and managing household income and expenses • ...
Tugas Informatika Terakhir 2025-05-26
Across
- Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
- Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
- Platform digital untuk pendidikan Islam dalam smart city.
- Teknologi untuk sholat berjamaah virtual dalam smart city.**
- Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
- Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
- Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
- Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
- Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
- Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
Down
- Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
- Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
- Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
- Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
- Kota masa depan dalam Islam yang makmur dan berkelanjutan.
- Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
- Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
- Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
- Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
- Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
20 Clues: Platform digital untuk pendidikan Islam dalam smart city. • Kota masa depan dalam Islam yang makmur dan berkelanjutan. • Teknologi untuk sholat berjamaah virtual dalam smart city.** • Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam. • Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12). • ...
Shayna’s graduation! 2025-05-19
Across
- Shayna goes to UMD, but more specifically the College of ________.
- The formal name for the ceremony where Shayna becomes a college grad
- The name of Shayna’s first college roommate
- The MVP behind Shayna’s graduation. (And everything else.)
- The UMD commencement speaker
- Did Shayna live on North or South campus freshman year?
- The day Michelle and Seth’s life got a lot more expensive
- The name that Shayna calls her sister
- What Shayna is beyond thankful for
- By the end of Senior year, all students at UMD jump in the ________.
- white or red wine?
- The Latin honor Shayna is graduating with
- The mascot of UMD
- What year of college did Kayla Becker just finish? So proud!
- What is Shayna’s go-to alcohol? (Sorry mommy)
Down
- Where Seth once dreamed Shayna would go, but now knows Maryland was always meant to be.
- The field of study Mordechai is in school for right now (and is working really hard at!)
- Shayna’s apartment unit number
- The ______ is the grassy field with fountains and graduation photo ops.
- Michelle will 100% check this app 6 times on the way to Xfinity Center—just in case.
- The name of UMD’s mascot
- What Seth wants to start up at the Kabbalah Centre
- Where Shayna often spends Shabbat lunch
- When Michelle tells people about Mordechai, she says “He is Jewish AND he ______!”
- Shayna’s go-to bar in college
- Which tower is Shayna’s college apartment?
- Official title of Shayna’s minor
- The library Shayna would study at
- Shayna’s Major
- The people who paid for Shayna’s diploma
- What sorority was Shayna in?
- The first name of Shayna’s landlord
- The mascot of the school Seth originally planned for his daughter to go to
33 Clues: Shayna’s Major • The mascot of UMD • white or red wine? • The name of UMD’s mascot • The UMD commencement speaker • What sorority was Shayna in? • Shayna’s go-to bar in college • Shayna’s apartment unit number • Official title of Shayna’s minor • The library Shayna would study at • What Shayna is beyond thankful for • The first name of Shayna’s landlord • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16
Across
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Code examination performed without running the malicious program.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Process of transforming information into a scrambled format to secure it.
- Matching known patterns of threats against security event data to find potential matches.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Policy-based accept or deny of network traffic.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Gaining unauthorized access to a secured area by following an authorized person.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16
Across
- Attack that uses a list of commonly used words or phrases to guess a password.
- Injecting malicious scripts into webpages viewed by other users
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Matching known patterns of threats against security event data to find potential matches.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Policy-based accept or deny of network traffic.
Down
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Process of transforming information into a scrambled format to secure it.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Code examination performed without running the malicious program.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Cloud-based vulnerability management platform with scanning and reporting.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Attacks that overwhelm a target system or network with a flood of traffic
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Code examination performed without running the malicious program.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Process of transforming information into a scrambled format to secure it.
- Matching known patterns of threats against security event data to find potential matches.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Policy-based accept or deny of network traffic.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Gaining unauthorized access to a secured area by following an authorized person.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
Psnjan26 2026-01-25
Across
- L An old, clunky computer system that a company is still trying to use.
- D Digging through piles of information to find useful facts or trends.
- B A massive amount of information that computers study to find helpful patterns.
- F A digital "security guard" that blocks dangerous traffic from entering a network.
- E Scrambling information into a secret code so only the right person can read it.
- C Using the internet to store files instead of saving them on your own computer.
- C Tools and habits used to keep hackers away from your private data.
- A A digital bridge that lets two different apps share information with each other.
- M When a computer practices a task over and over to get better at it on its own.
- B Using your face or fingerprint to unlock an app or prove who you are.
- S A safe "practice zone" where developers test new ideas without breaking anything.
- U How easy or enjoyable it feels to use a specific app or website.
- B The hidden "brain" of an app where the data is stored and managed.
Down
- G The digital "checkout counter" that sends your credit card info to the bank.
- I When different apps or devices are able to work together without any issues.
- S Software you pay for monthly to use online, like Netflix or Microsoft 365.
- A A list of instructions a computer follows to finish a task or make a choice.
- M Building a large app by connecting many tiny, separate programs together.
- F The part of an app you can actually see, touch, and click on.
- O Software that is free for anyone to look at, change, or share.
20 Clues: F The part of an app you can actually see, touch, and click on. • O Software that is free for anyone to look at, change, or share. • U How easy or enjoyable it feels to use a specific app or website. • C Tools and habits used to keep hackers away from your private data. • B The hidden "brain" of an app where the data is stored and managed. • ...
COE Crossword Mania 2025-12-14
Across
- Iconic white coat worn by SCBE and MSE students during experiments
- Common abbreviation for tutorial sessions in NTU engineering modules
- Essential EEE lab tool for visualizing voltage signals over time
- Iconic lecture theatre in Nanyang Avenue, often used for COE finals
- NTU school merging engineering with biotech and healthcare innovation
- Interdisciplinary field led by MAE and EEE for building intelligent machines
- wire Safety practice in circuits—connected to zero voltage reference
- Hands-on space in N4 for capstone projects and student startups
- Final Year Project—the capstone engineering experience for all COE seniors
- NTU engineering school known for circuits, power, and semiconductors
- Identity of every NTU COE student solving real-world problems
Down
- Core engineering subject on fluid behavior—key for MAE and CEE students
- Popular software used in EEE and MAE for PCB and circuit design
- NTU school focused on sustainable infrastructure and water systems
- Symbolic CEE field equipment; also a beloved orientation camp prop
- ching tuan LT Lecture theatre near North Spine, home to many engineering tutorials
- NTU school designing everything from drones to jet engines
- School studying smart materials, nanotechnology, and advanced composites
- Programming language widely used in COE for data analysis and automation
- COE academic corridor housing EEE, MAE, MSE, and SCBE
- Core theme of NTU’s sustainable engineering and campus vision
- Fundamental concept in EEE—paths for current flow and system design
- SCBE’s teaching lab for biochemical and biomedical engineering practicals
- Process of fixing errors in code, circuits, or capstone prototypes
- Nickname for Thermodynamics, the challenging but foundational COE module
- NTU’s Cybersecurity Research Centre under the College of Engineering
26 Clues: COE academic corridor housing EEE, MAE, MSE, and SCBE • NTU school designing everything from drones to jet engines • Core theme of NTU’s sustainable engineering and campus vision • Identity of every NTU COE student solving real-world problems • Popular software used in EEE and MAE for PCB and circuit design • ...
COE Crossword Mania 2025-12-14
Across
- Essential EEE lab tool for visualizing voltage signals over time
- Core theme of NTU’s sustainable engineering and campus vision
- NTU school designing everything from drones to jet engines
- Popular software used in EEE and MAE for PCB and circuit design
- Symbolic CEE field equipment; also a beloved orientation camp prop
- Identity of every NTU COE student solving real-world problems
- Programming language widely used in COE for data analysis and automation
- Core engineering subject on fluid behavior—key for MAE and CEE students
- NTU engineering school known for circuits, power, and semiconductors
- Hands-on space in N4 for capstone projects and student startups
- Lecture theatre near North Spine, home to many engineering tutorials
- Fundamental concept in EEE—paths for current flow and system design
- COE academic corridor housing CEE, MAE, MSE, and SCBE
- Iconic white coat worn by SCBE and MSE students during experiments
- Common abbreviation for tutorial sessions in NTU engineering modules
Down
- Interdisciplinary field led by MAE and EEE for building intelligent machines
- NTU school focused on sustainable infrastructure and water systems
- Final Year Project—the capstone engineering experience for all COE seniors
- SCBE’s teaching lab for biochemical and biomedical engineering practicals
- NTU school merging engineering with biotech and healthcare innovation
- Process of fixing errors in code, circuits, or capstone prototypes
- wire Safety practice in circuits—connected to zero voltage reference
- NTU’s Cybersecurity Research Centre under the College of Engineering
- School studying smart materials, nanotechnology, and advanced composites
- Iconic lecture theatre in Nanyang Avenue, often used for COE finals
- Nickname for Thermodynamics, the challenging but foundational COE module
26 Clues: COE academic corridor housing CEE, MAE, MSE, and SCBE • NTU school designing everything from drones to jet engines • Core theme of NTU’s sustainable engineering and campus vision • Identity of every NTU COE student solving real-world problems • Popular software used in EEE and MAE for PCB and circuit design • ...
ING 2 B2 - Challenge 2 Vocabulary - Digitalization 2026-02-18
Across
- (with a -)the general activity of buying and selling products over the internet
- when a visitor to your site completes a goal like making a purchase
- (with a z)to change information or processes from paper to an electronic format
- (3 words)an instruction or button that tells a user what to do next
- (3 words)promoting a brand on platforms like instagram tiktok or linkedin
- (2 words)using new technology to completely change how a business operates
- the total number of likes comments and shares on a post
- (3 words)an advertising model where you only pay when someone clicks your ad
- (2 words)how visible and active a company appears across the entire internet
Down
- the practice of protecting computers and networks from digital attacks
- a specific location on the internet where a company hosts its pages
- (2 words)sharing useful blogs or videos to attract and keep customers
- (2 words)the specific group of people that a marketing message is created for
- (2 words)technology that allows machines to think or learn like humans
- (2 words)massive sets of information analyzed to find patterns and trends
- (2 words)the degree to which people recognize and remember a specific company
- using software or robots to do tasks without needing humans
- (2 words)the first page a user arrives at after clicking a specific link or ad
- how easy it is for customers to find your brand or site online
- when a new invention or company radically changes an entire industry
- (2 words)optimization the process of making a site appear higher in google search results
- (2 words)storing files and running programs over the internet instead of on your pc
22 Clues: the total number of likes comments and shares on a post • using software or robots to do tasks without needing humans • how easy it is for customers to find your brand or site online • a specific location on the internet where a company hosts its pages • when a visitor to your site completes a goal like making a purchase • ...
hi 2022-09-28
Across
- A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
- A generic term encompassing decode and decipher
- Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
- Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
- The service provider for CrowdStrike's internal training courses
- The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
- Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
- CrowdStrike's CEO and co-founder; abbr
- The property of being accessible and usable upon demand
- Computer compromised with malicious code; used by a threat actor to perform remote commands
- Hosting city of Fal.Con; abbr
- Someone who uses a social network to create an account with a fake identity to deceive an individual
- Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
- As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
- System of prevention and recovery from potential threats to a business; abbr
- As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- An unauthorized user who attempts to or gains access to an information system
- Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
- CrowdStrike's annual cybersecurity convention; "___.Con"
- Software that compromises the operation of a system by performing an unauthorized function or process
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
- Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
- A way to take advantage of a vulnerability in software
- A cybersecurity company
- The generic term encompassing encipher and encode
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- The process of verifying the identity or other attributes of an entity
Down
- Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
- A denial of service technique that uses numerous systems to perform the attack simultaneously
- A recognizable, distinguishing pattern; typically used to sign documents
- Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
- Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
- Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
- Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
- ___-Party Information
- Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
- A capability to limit network traffic between networks and/or information systems
- Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
- In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
- The process of transforming plaintext into ciphertext
- Type of analysis that determines what levels of impact to a system are tolerable; abbr
- Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- CrowdStrike threat hunting team
- Intranet webpage for all things CrowdStrike-related; abbr
- Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
- Cryptographic network protocol for operating network services securely over an unsecured network; abbr
- A dishonest scheme; a fraud
- CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
- Short form for "cryptography"
- When someone uses a social network to create an account with a fake identity to deceive a concrete person
- The process of transforming ciphertext into its original plaintext
- Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
- Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
- Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
- Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms
61 Clues: ___-Party Information • A cybersecurity company • A dishonest scheme; a fraud • Hosting city of Fal.Con; abbr • Short form for "cryptography" • CrowdStrike threat hunting team • CrowdStrike's CEO and co-founder; abbr • A generic term encompassing decode and decipher • The generic term encompassing encipher and encode • The process of transforming plaintext into ciphertext • ...
Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11
Across
- A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
- A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
- The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
- _____-force attack is a technique used to guess a password by trying many possible combinations
- Gain access to someone else’s computer or device without permission
- The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
- Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
- An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
- Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
- A location on the internet where you can save your data (rather than on your computer or device)
Down
- A program or device used to detect and prevent unauthorized access to a network
- A sequence of characters (or words) used to stop criminals from accessing your accounts
- A method of protecting data by converting it into unreadable code that only authorized parties can read
- Malicious software that could harm your computer or gadget
- What is a form of malware that monitors and records a user's activities without their knowledge?
- A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
- A security incident where sensitive information is leaked to the public is a data ______
- ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor
18 Clues: Malicious software that could harm your computer or gadget • Gain access to someone else’s computer or device without permission • A program or device used to detect and prevent unauthorized access to a network • The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge) • ...
internet basics 2024-01-18
Across
- A global network of interconnected computers that enables the sharing of information and resources.
- Media: Online platforms that enable users to create and share content, communicate, and connect with others.
- To transfer data from a local device to a remote server over the internet.
- A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
- Electronic mail that allows users to send and receive messages and files over the internet.
- A
- The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
- To transfer data from a remote server to a local device over the internet.
Down
- Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
- Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
- The buying and selling of goods and services over the internet.
- Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
- A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
- Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
14 Clues: A • The buying and selling of goods and services over the internet. • To transfer data from a local device to a remote server over the internet. • To transfer data from a remote server to a local device over the internet. • Electronic mail that allows users to send and receive messages and files over the internet. • ...
Cyber Test 2025-03-12
Across
- A Social Engineering technique that uses a fake promise to pique a victim's curiosity or greed.
- What is the name of the cybersecurity firm that has faulty software update on July 2024 and causes Global IT outage.
- Part of Social Engineering Life Cycle that identifies the victim & gathering their background information.
- It is the most targetted sector in the Philippines.
- A malicious software installed on a computing device without the end users knowledge.
- According to SimilarWeb Ranking, what is the top visited website as of February 2025.
Down
- A type of malware created to deny a user or organization access to files on their computer and will ask money for decryption.
- Occurs when a harmful code is injected into legitimate online advertising networks, and the code redirects users to malicious websites.
- Refers to a wide range of malicious activities carried out through human interactions.
- Refers to the unauthorized transfer or theft of sensitive, confidential, or private data from a computer system.
- Part of Social Engineering Life Cycle that occurs by forming a relationship and initiating communication to build trust.
- It is a type of malware that usually spreads in spam emails and malicious links.
- Is a type of malware designed to scare you into taking action.
- It is a advertisement-supported software helps generate revenue for its developers by automatically displaying adverts on your screen, typically within a web browser.
14 Clues: It is the most targetted sector in the Philippines. • Is a type of malware designed to scare you into taking action. • It is a type of malware that usually spreads in spam emails and malicious links. • A malicious software installed on a computing device without the end users knowledge. • ...
Digital Transformation Crossword 2018-04-02
Across
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- The intersection of marketing and technology in today's highly digital business world
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- Intelligence demonstrated by machines
- The protection of computer systems from the theft and damage
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- The range of interactions that patients have with the health care system, including their care from health plans
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- Websites and applications that enable users to create and share content or to participate in social networking
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
Down
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Creating relevant and consistent connections between offline and online media in real time
- A cross-channel business model and content strategy that companies use to improve their user experience
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
- Enhancing healthcare delivery and support using telecommunications technologies
- Computer oriented crime
- The practice that aims at unifying software development and software operation
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
Securing your work, home and your digital footprint! 2020-10-06
Across
- someone pretending to be someone,such as your boss, friend etc.. sends a email intending to gain money or information from a fake email address.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- electronic device for storing an processing data
- Choose a password that is easy for you to _____but hard for someone to guess.
- Cybersecurity is a shared ________
- it IS VERY IMPORTANT to use strong privacy settings on ________.
- These devices are used to direct information between public and private networks
Down
- is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's identity
- ALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESK
- DO NOT LEAVE YOUR LAPTOP OR COMPUTER______.
- system of interrelated,internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
- Device that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
- _____is an attempt by an individual or group to trick you into giving personal information by employing social engineering techniques through email.
- An option you can use to protect your credit.
- networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- Technology used to connect to a public network through a secure tunnel.
- ____Uses cellphone text messages to induce people to divulge their personal information
- ROVER12345 would be a bad example of a _____
- For a password to be secure, it should contain upper and lower case letters,numbers and ______.
19 Clues: Cybersecurity is a shared ________ • DO NOT LEAVE YOUR LAPTOP OR COMPUTER______. • ROVER12345 would be a bad example of a _____ • An option you can use to protect your credit. • electronic device for storing an processing data • ALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESK • it IS VERY IMPORTANT to use strong privacy settings on ________. • ...
Terminologies in RA 10175 2023-10-25
Across
- refers to the computer systems, and/or networks, whether physical or virtual
- refers to the mathematical algorithm produced against digital information
- refers to any representation of facts, information,
- refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- refers to any information contained in the form of computer data or any other form that is held by a service provider
- refers to the willful engagement, maintenance, control or operation, directly or indirectly,
- refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data
- refers to the application of investigative and analytical techniques that conform to evidentiary standards
Down
- refers to any computer data other than the content of the communication
- refers to a set of instructions executed by the computer to achieve intended results
- refers to any name or number that may be used alone or in conjunction with any other information to identify any specific individual,
- refers to the modification or change, in form or substance, of an existing computer data or program
- refers to the keeping of data that already exists in a stored form
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices
- refers to evidence, the use of which is sanctioned by existing rules of evidence
- refers to the person who created or is the origin of the assailed electronic statement or post using a computer system;
- refers to digital information that may be used as evidence in a case.
- also known as a forensic copy
- refers to gathering and receiving information
20 Clues: also known as a forensic copy • refers to gathering and receiving information • refers to any representation of facts, information, • refers to the keeping of data that already exists in a stored form • refers to digital information that may be used as evidence in a case. • refers to any computer data other than the content of the communication • ...
Cybersecurity Awareness Month - Acronym Edition 2022-10-07
Across
- An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
- A system turns domain names into IP addresses
- A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
- Also called a "black cloud"
Down
- A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
- A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
- A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
- Provide outsourced monitoring and management of security devices and systems
8 Clues: Also called a "black cloud" • A system turns domain names into IP addresses • Provide outsourced monitoring and management of security devices and systems • A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online • ...
ADSI Cristian Niño 2022-06-01
Across
- Set of physical or material elements that constitute a computer or a computer system
- area of science that is responsible for studying the administration of methods, techniques and processes in order to store, process and transmit information and data in digital format
- Set of programs and routines that allow the computer to perform certain tasks
- relational database management system developed under dual license: General Public License/Commercial License by Oracle Corporation
- set of computers capable of handling requests from a client and returning a response accordingly
- is the use of a network of remote servers connected to the internet to store, manage and process data, servers, databases, networks and software
- arrangement and order of the parts within a whole
Down
- Program capable of storing large amounts of data, related and structured
- programming language and a computing platform that was first commercialized in 1995 by Sun Microsystems
- set of elements that are combined following certain rules and that are semantically interpretable, which allows information to be exchanged
- sum of techniques, skills, methods and processes used in the production of goods or services or in the achievement of objectives, such as scientific research
- a person who writes computer programs
- branch of applied physics that encompasses physics, engineering, technology, and applications dealing with the emission, flow, and control of electrons
- is the practice of protecting important systems and sensitive information from digital attacks
- worldwide interconnected computer network in the form of a spider web consisting of servers
15 Clues: a person who writes computer programs • arrangement and order of the parts within a whole • Program capable of storing large amounts of data, related and structured • Set of programs and routines that allow the computer to perform certain tasks • Set of physical or material elements that constitute a computer or a computer system • ...
Cybersecurity Awareness Puzzle 4 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 6 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
SET 5 2023-01-22
Across
- Programming language whos design turned out to be general enough to address a wide variety of domains but slow in execution
- The practice of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction
Down
- A set of step-by-step instructions for solving a problem or completing a task, like a recipe for cooking a meal
- A component of a computer that controls its performance, like the foreman of a construction site, it supervises the work of all the other parts
- A network of remote servers that are used to store, manage, and process data
5 Clues: A network of remote servers that are used to store, manage, and process data • A set of step-by-step instructions for solving a problem or completing a task, like a recipe for cooking a meal • Programming language whos design turned out to be general enough to address a wide variety of domains but slow in execution • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- Contain tracking information for an individual email
- Fraud like Phishing, but it comes as a text message or SMS
- It is a deceptive scheme or trick used to cheat someone out of something
- It is merely an email trying to convince you to do something
- It is a phone scam designed to get your personal information by impersonating
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- Threat that involves sending email messages with a fake sender address
- It is just like Phishing but it only targets specific individuals within an organization
Down
- It is news or knowledge received or given
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- It is a type of email attack where bad people are trying to steal your precious information
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- Unsolicited bulk messages normally from people trying to sell something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: It is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • ...
Crossword Puzzle 2025-05-21
Across
- A deceptive attempt to obtain sensitive information, such as usernames and passwords, by impersonating a trustworthy entity in electronic communication.
- A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- An attack that attempts to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- A security method where access is granted only after successfully presenting two or more pieces of evidence.
- A person who gains unauthorized access to computer systems, often with malicious intent.
- The practice of protecting computer systems and networks from digital attacks and threats.
- A system designed to prevent unauthorized access to or from a private network.
- A set of rules for communication between devices on a network.
- A digital certificate used to verify the identity of a website or email sender.
Down
- Unauthorized access to a computer system or network.
- A security measure that monitors and controls network traffic, acting as a barrier against unauthorized access.
- A program that appears legitimate but performs malicious activities in the background.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A secret string of characters used to verify a user's identity when logging into a system.
- A software vulnerability that allows a hacker to gain administrative control over a target system.
- A program that can replicate itself and spread to other computers, often causing damage.
17 Clues: Unauthorized access to a computer system or network. • A set of rules for communication between devices on a network. • A system designed to prevent unauthorized access to or from a private network. • A digital certificate used to verify the identity of a website or email sender. • ...
CSAM Crossword 1 2023-06-26
Across
- Acceptable Use policies often cover bring-your-own-device (or _____) rules as well.
- One way to avoid suspicious popups in your web browser is through the use of a popup _____.
- When it comes to communications made in your name, only _____ are accountable.
- any software designed by cybercriminals to harm or exploit a device or network is called:
- Organizations can monitor your email and _____ while at work.
- You should never leave fresh documents unattended at the _____.
- One of the most common ways to get users to click on bad links is through _____ windows.
- If you find documents at the printer containing sensitive information, you should shred the documents and _____ the incident.
Down
- When posting pictures to social media, make sure no sensitive information can be seen in the _____
- make sure to follow all organizational _____ when reporting suspicious behavior
- You should never _____ links that you don't recognize; this applies to personal and professional settings.
- The quickest way to verify if an email from a coworker is phishing, is to _____ the coworker on the phone and confirm the details of the email.
- When you give an app permission to access your social media profile, it can attain any of the _____ you share.
- Personal devices can be used for work only if it complies with the _____ use policy.
- Never share sensitive, personal, or organizational information over _____ wifi networks.
- One of the best cybersecurity practices for making a new password is to never _____ old passwords
- if you receive an email that you suspect to be fishing, you should notify your IT _____ department
17 Clues: Organizations can monitor your email and _____ while at work. • You should never leave fresh documents unattended at the _____. • When it comes to communications made in your name, only _____ are accountable. • make sure to follow all organizational _____ when reporting suspicious behavior • ...
Hoverstate - April Crossword 2022-04-18
Across
- Hoverstate’s Italy office location
- Oregon Train, This computer game developed in 1971 was designed to teach 8th grade school children about the realities of 19th-century pioneer life heading west
- mining, the process of examining and analyzing large amounts of data to find patterns and use these patterns to get a better insight in the collected data (2 words)
- programs that mimic human like interactions
- Recognition, the concept of translating human speech into text that can be understood by computers (2 words)
- Recognition, part of computer science where computers turn the spoken word of a human into text (2 words)
- Gates, visionary co-founder of Microsoft (2 words)
- Learning, a type of Artificial Intelligence which gives computer programs the ability to learn from new data without being explicitly programmed to do so (2 words)
- Interface, the parts of an application, website, computer etc. which the user can manipulate (2 words)
- 1983 movie where a high schooler accidentally hacks a military installation running a missile-command supercomputer called the WOPR
- assurance, this role ensures that the final product observes the company's quality standards (2 words)
- the replacement of technologically advanced people with people-literate platforms or technology
Down
- a software solution company founded in 2009
- system architect, this role is responsible for designing, implementing, and maintaining databases and critical computer systems (3 words)
- Matrix, this 1999 blockbuster depicts a dystopian future in which humanity is unknowingly trapped inside a simulated reality (2 words)
- Robot, this novel by Isaac Asimov weaves stories about robots, humanity, and the deep questions of existence (2 words)
- a new type of database which is distributed not just in one place and encrypted by default
- Jobs, visionary co-founder of Apple (2 words)
- this maze action video game was developed for arcades in 1980 and kept you busy avoiding Blinky, Pinky, Inky, and Clyde
- being protected against criminal or unauthorized use of electronic data, or the measures taken to achieve this
- a cloud computing–based data warehousing company
- Experience, how the user feels, emotions they get and the ease-of-use when interacting with a product or service (2 words)
22 Clues: Hoverstate’s Italy office location • a software solution company founded in 2009 • programs that mimic human like interactions • Jobs, visionary co-founder of Apple (2 words) • a cloud computing–based data warehousing company • Gates, visionary co-founder of Microsoft (2 words) • ...
Prince FRM 2024-07-15
Across
- Insurance companies assess exposure to claims from natural disasters like earthquakes or cyclones.
- Adani Enterprises evaluates risks related to government policies affecting infrastructure projects and investments.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues affecting customer satisfaction.
- RBI monitors risks that could destabilize the entire financial system, such as banking sector crises or economic recessions.
- Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio.
- Reliance Industries faces litigation over environmental compliance impacting public perception and regulatory approvals.
- Zomato manages public perception during controversies over food quality affecting user trust and market share.
- Mahindra & Mahindra evaluates its ability to secure short-term financing for working capital needs during economic slowdowns.
- Rate Tata Steel deals with currency fluctuations impacting revenue from international steel sales.
- Indian Oil Corporation assesses geopolitical stability before expanding refining operations in new global markets.
- Nestle India assesses risks of disruptions in the supply of dairy and agricultural products impacting production.
Down
- Paytm faces disruptions in payment processing due to technical glitches during high-volume transactions.
- Rate Bajaj Finance manages exposure to fluctuations in interest rates impacting loan profitability.
- NTPC evaluates risks related to environmental regulations impacting thermal power plant operations.
- HDFC Standard Life ensures adherence to new insurance regulations impacting policy sales and operations.
- TCS reviews the accuracy of financial models used for risk assessment and project estimation.
- Infosys assesses overdependence on revenue from a few large clients in its IT services business.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- Marico evaluates exposure to changes in raw material prices affecting profit margins in FMCG sector.
- Hindustan Unilever manages risks associated with fluctuating prices of palm oil affecting production costs.
20 Clues: Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio. • TCS reviews the accuracy of financial models used for risk assessment and project estimation. • Infosys assesses overdependence on revenue from a few large clients in its IT services business. • ...
Vocabulary Reviews 2025-03-26
Across
- Tailoring products, services, or experiences to meet the specific preferences of individual customers
- A formal agreement between two or more parties to work together toward common goals while maintaining their independence.
- The process of completing an order by preparing and delivering it to the customer.
- Giving people the power or confidence to make their own choices and decisions
- The practice of establishing and nurturing professional relationships to exchange information and opportunities.
- A dialogue aimed at reaching an agreement between two or more parties with differing interests.
- Practices designed to protect computers and networks from unauthorized access or attacks
- A relationship where an experienced person helps another develop their skills and knowledge
- A business approach where customers pay a recurring fee to receive a product or service regularly
Down
- Being responsible for something, especially in terms of legal obligations or debts.
- A place where people buy and sell goods or services, often online.
- Actions taken to reduce the severity or impact of a risk
- The act of obtaining control over another company by purchasing its shares or assets
- The capacity to recover quickly from difficulties or setbacks
- Being responsible for your actions and willing to explain them to others
- a contract that provides financial protection against specific risks or losses
- A retail method where the seller does not keep products in stock but instead transfers customer orders to a supplier who ships directly to the buyer
- A Thorough examination of financial records and operations to ensure accuracy and compliance
- combined effect produced by two or more entities that is greater than the sum of their individual effects.
19 Clues: Actions taken to reduce the severity or impact of a risk • The capacity to recover quickly from difficulties or setbacks • A place where people buy and sell goods or services, often online. • Being responsible for your actions and willing to explain them to others • Giving people the power or confidence to make their own choices and decisions • ...
Digital Transformation Crossword 2018-04-02
Across
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- Intelligence demonstrated by machines
- The protection of computer systems from the theft and damage
- A cross-channel business model and content strategy that companies use to improve their user experience
- The range of interactions that patients have with the health care system, including their care from health plans
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- The practice that aims at unifying software development and software operation
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- Computer oriented crime
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
Down
- Websites and applications that enable users to create and share content or to participate in social networking
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- Enhancing healthcare delivery and support using telecommunications technologies
- Creating relevant and consistent connections between offline and online media in real time
- The intersection of marketing and technology in today's highly digital business world
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
BIM Vocab 2024-12-12
Across
- Not permitted; Unlawful.
- One of two or more words or expressions of the same language that have the same or nearly the same meaning in some or all senses.
- A flat usually paper container (as for a letter).
- Computer hardware or software that prevents unauthorized access to private data (as on a company’s local area network or intranet) by outside computer users (as of the internet).
- A private computer network that functions over a public network.
- Social methods (such as phishing) that are used to obtain personal or confidential information which can then be used illicitly.
- The practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly.
- A computer program enabling the user to enter or alter text.
- A software that is installed in a computer or mobile device without the user’s knowledge and that transmits information about the user’s activities.
- A book or electronic resource that lists words or groups of synonyms and related concepts.
- For a word processor, a device intended to improve or perfect what is already there.
Down
- The practice of collecting, organizing, storing, and sharing information to support decision making and create value for organizations, communities, and societies.
- A direct or personal written or printed message addressed to a person or organization.
- To mark directions for delivery.
- Measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.
- A word of opposite meaning.
- The person sending correspondence.
- To give permission or approval.
- The numeric address of a computer on the internet.
19 Clues: Not permitted; Unlawful. • A word of opposite meaning. • To give permission or approval. • To mark directions for delivery. • The person sending correspondence. • A flat usually paper container (as for a letter). • The numeric address of a computer on the internet. • A computer program enabling the user to enter or alter text. • ...
Digital Transformation Crossword 2018-04-02
Across
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- The intersection of marketing and technology in today's highly digital business world
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Enhancing healthcare delivery and support using telecommunications technologies
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
- Websites and applications that enable users to create and share content or to participate in social networking
- Creating relevant and consistent connections between offline and online media in real time
Down
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- The range of interactions that patients have with the health care system, including their care from health plans
- The protection of computer systems from the theft and damage
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
- A cross-channel business model and content strategy that companies use to improve their user experience
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- Computer oriented crime
- Intelligence demonstrated by machines
- The practice that aims at unifying software development and software operation
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
MEDIA AND INFORMATION LITERACY 2024-09-01
Across
- The legal right granted to the creator of original work to control its use and distribution.
- False or misleading information spread without the intent to deceive.
- An inclination or preference that affects impartial judgment, leading to skewed or unfair perspectives.
- News False or misleading news stories created to gain attention or deceive readers.
- Privacy The protection of personal data from unauthorized access or use.
- A reference to the source of information or ideas used in research or writing.
- Media Platforms and websites that enable users to create, share, and interact with content.
- Measures taken to protect computers, networks, and data from attacks or damage.
- Footprint The trail of data that individuals leave behind when using digital devices or the internet.
- A visual representation of information or data designed to make complex information easier to understand.
- The openness of information sources and the clarity about how information is obtained and presented.
Down
- Information, often biased or misleading, used to promote a particular political cause or point of view.
- Literacy The ability to access, analyze, evaluate, and create media in various forms.
- The use of various forms of content, such as text, images, audio, and video, to convey information.
- Literacy The ability to recognize when information is needed and to locate, evaluate, and use it effectively.
- Literacy The skills required to effectively and critically navigate, evaluate, and create information using digital technologies.
- The quality of being trusted and believed in, often based on evidence or expertise.
- The process of verifying the accuracy of information before presenting or sharing it.
- Thinking The ability to analyze information objectively and make reasoned judgments.
- The practice of using someone else's work or ideas without proper acknowledgment.
20 Clues: False or misleading information spread without the intent to deceive. • Privacy The protection of personal data from unauthorized access or use. • A reference to the source of information or ideas used in research or writing. • Measures taken to protect computers, networks, and data from attacks or damage. • ...
Vallari FRM 2024-07-16
Across
- NTPC evaluates risks related to environmental regulations impacting thermal power generation and emissions control.
- Dabur India assesses risks of disruptions in sourcing herbal ingredients impacting production of Ayurvedic products.
- Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours.
- RBI monitors risks that could destabilize the entire banking sector, such as economic downturns or liquidity crises.
- Biocon reviews dependency on a few key drug patents affecting revenue stability in biopharmaceuticals.
- Insurance companies assess exposure to claims from natural disasters like cyclones or floods impacting claims processing.
- Adani Green Energy evaluates risks associated with government policies impacting renewable energy projects.
- Titan Company manages risks associated with fluctuating gold prices impacting jewelry manufacturing costs.
Down
- Kotak Mahindra Bank assesses the risk of default by retail borrowers in its personal loan portfolio.
- Mahindra & Mahindra evaluates exposure to fluctuations in commodity prices affecting profitability in agricultural machinery manufacturing.
- Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations.
- BigBasket navigates consumer trust issues during data privacy concerns impacting online grocery sales.
- Zee Entertainment faces litigation over copyright infringement affecting broadcasting rights and viewer engagement.
- Sun Pharma assesses geopolitical stability before expanding pharmaceutical manufacturing operations in new global markets.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues impacting passenger satisfaction and flight schedules.
- Wipro deals with currency fluctuations impacting revenue from global IT services contracts.
- JSW Steel manages liquidity to meet debt obligations amidst fluctuating cash flows from steel production.
- L&T Finance Holdings reviews the accuracy of financial models used for risk assessment and loan underwriting.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- HDFC Life Insurance manages exposure to changes in interest rates impacting investment returns on policyholder funds.
20 Clues: Wipro deals with currency fluctuations impacting revenue from global IT services contracts. • Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations. • Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours. • ...
technology 2023-06-07
Across
- is a form of computer memory that can be read and changed in any order
- s a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device
- is a method of representing data in a visual, machine-readable form. Initially
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg
- s a collection of discrete values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network
- is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of,
- is a commonly used method of lossy compression for digital images
- is a digital multimedia container format most commonly used to store video and audio
- is a file format developed by Adobe in 1992 to present documents
Down
- is a mobile operating system
- is an American multinational technology company
- A binary code represents text, computer processor instructions
- is the most important processor in a given computer
- is a hardware or software component that stores data so that future requests for that data can be served faster
- is a type of computer program that, when executed
- is a mapping from some domain for example, a range of integers
- is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on June 15, 1987.
19 Clues: is a mobile operating system • is an American multinational technology company • is a type of computer program that, when executed • is the most important processor in a given computer • A binary code represents text, computer processor instructions • is a mapping from some domain for example, a range of integers • ...
Ai Ethics 2022-02-15
3 Clues: Estimates that by 2030, 30% of all jobs will be automated. • This one of the major concerns of companies, especially in the governmental and financial services sector. • safety __________ and the reduction of crime rates are the greatest justifiers for the use of this technology.
Information Technology Crossword Puzzle 64 - Cybersecurity 2022-09-27
Across
- Is software that has been created to intentionally cause damage
- Involves malicious human interaction where people don’t tell the truth and they manipulate others to divulge personal information
- Pay attention to these that don’t have content or look like they are coming from a spoofed address
- Is an act of masquerading as a valid entity through falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain
- Is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
Down
- A type of malware that infects a network or steals confidential data and then demands something (typically currency of some sort) in exchange for access to systems
- Running these often will keep applications current and help protect your computer
- Is the act of surreptitiously listening to a private computer "conversation" (communication), typically between hosts on a network
- Hackers throw a line out there hoping that someone will bite, and when they do, the hacker steals sensitive information like passwords, credit card numbers and more
- Holding on to the same usage of this for ages isn’t a great idea
10 Clues: Is software that has been created to intentionally cause damage • Holding on to the same usage of this for ages isn’t a great idea • Running these often will keep applications current and help protect your computer • Pay attention to these that don’t have content or look like they are coming from a spoofed address • ...
Health Care Technology 2025-08-25
Across
- An event with a probable impact on care and operations, requiring a written incident response program to ensure ongoing safe and high-quality services
- Customizable forms and data fields often applied to electronic health records, whose proper use, including copy-and-paste and autofill functions, requires staff education
- A fraudulent act, often involving emails, used to obtain personal or organizational information, requiring cybersecurity strategies to reduce exposure
Down
- Acronym for technology or information systems used to enhance clinical decision-making for healthcare practitioners, requiring monitoring and evaluation
- This type of personal electronic device, when used for patient data, necessitates specific policies and procedures for the protection of patient information
- The act of converting information or data into a code to prevent unauthorized access, a key method for maintaining data confidentiality
6 Clues: The act of converting information or data into a code to prevent unauthorized access, a key method for maintaining data confidentiality • An event with a probable impact on care and operations, requiring a written incident response program to ensure ongoing safe and high-quality services • ...
Champions Site Trivia 2023-03-15
Across
- How many “Infosec champion newsletter” entries were sent in 2022 (Write your answer in words with no space)
- What session was conducted by Kenneth Baron for Capability & Build Session for June’2022 (Write your answer with no space)
- At what level an Infosec champion will get an opportunity to have a tea/coffee with the Infosec leadership(Sriram Lakshmanan)
- How many influencers do we have in the Infosec Champions program (Write your answer in words with no space)
Down
- Who was invited in Cybersecurity podcast series to joined us to discuss on – “The effect of human behavior in cyber" (Write your answer in words with no space)
- Beware of any unsolicited caller who asks for sensitive information like _ . (Write your answer in words with no space)
6 Clues: How many “Infosec champion newsletter” entries were sent in 2022 (Write your answer in words with no space) • How many influencers do we have in the Infosec Champions program (Write your answer in words with no space) • Beware of any unsolicited caller who asks for sensitive information like _ . (Write your answer in words with no space) • ...
