cybersecurity Crossword Puzzles
IT and How Computers Work 2023-07-05
Across
- this type of memory is permanent and saved on the hard drive
- job-specific high-speed wire used to communicate the processor with other components
- overseer of the CPU
- information that gets returned by the computer
- A machine that can quickly complete a vast number of extremely simple tasks.
- this type of bus carries data back and forth
- Stores data which is virtual information only accessible with a computer
- arithmetic and logic operations are processed here
- data we give to our computers
- printed circuit board that houses important hardware components via ports
- 0's and 1's
- used to store either temporary or permanent information
- limited space, high-speed memory that the CPU can use for quick processing
- comprised of the translation of input and the instructions given for output
Down
- this type of bus carries a specific address in memory and are unidirectional
- A way for computers all around the world to communicate with each other
- Making sure the information is communicated and stored safely and securely – only the right people should have access to it
- type of input device
- "brain of the computer"
- physical outlet used to connect outside, IO (Input/Output) devices to a computer.
- Are organized sets of instructions that utilize the computer’s hardware to complete predefined tasks.
- responsible for the long-term, or secondary storage of data and programs
- type of output device
- fast and temporary memory
- a mouse being clicked
- this type of bus carries the control signals to the other components and are unidirectional
- the use of technology to organize, store, share, and process information.
27 Clues: 0's and 1's • overseer of the CPU • type of input device • type of output device • a mouse being clicked • "brain of the computer" • fast and temporary memory • data we give to our computers • this type of bus carries data back and forth • information that gets returned by the computer • arithmetic and logic operations are processed here • ...
Public Safety 2024-08-09
Across
- a person whose job is to extinguish fires
- the action of evacuating a person or a place
- a state in which the laws and rules regulating the public behavior of members of a community are observed and authority is obeyed
- responsible for the prevention and detection of crime and the maintenance of public order
- an established or official way of doing something
- freedom from disturbance
- the system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties
- the action of keeping something harmful under control or within limits
- a danger or risk
- the action of protecting, or the state of being protected
- an act of saving or being saved from danger or distress
Down
- a person trained to give emergency medical care to people who are injured or ill, typically in a setting outside of a hospital
- the action of stopping something from happening or arising
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the act of compelling observance of or compliance with a law, rule, or obligation
- rule or directive made and maintained by an authority
- the state of being free from danger or threat
- one of a set of explicit or understood regulations or principles governing conduct within a particular activity or sphere
- protected from or not exposed to danger or risk; not likely to be harmed or lost
- the basic physical and organizational structures and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise
20 Clues: a danger or risk • freedom from disturbance • a person whose job is to extinguish fires • the action of evacuating a person or a place • the state of being free from danger or threat • an established or official way of doing something • rule or directive made and maintained by an authority • an act of saving or being saved from danger or distress • ...
September Edition Crossword 2024-09-24
Across
- 10-month-old Palestinian boy paralyzed from polio after vaccines have grown inaccessible in Gaza.
- This nation has been instrumental in mediating negotiations over repatriation between Germany and Afghanistan.
- This French political party accused the election of being "stolen" after Michel Barnier was named President.
- A form of peaceful protest which has grown increasingly popular amongst college students protesting the war in Gaza.
- Consolidated Analysis Center, Incorporated is a cybersecurity contractor for this department.
- First name of an American Turkish citizen shot by Israeli soldiers on September 6th, whilst protesting West Bank settlements.
- A town in Burkina Faso which was the most recent target of violent attacks by JNIM.
- Former Defense Department official under Biden who advised Vice President Harris' debate preparations.
- Surname of the Supreme Allied Commander of NATO.
Down
- A term used to describe Venezuela's overreliance on oil leading to a historic economic collapse.
- This Chinese investment program has led to complicated ties with Myanmar.
- Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete.
- This Japanese steel company is looking to merge with U.S. steel in a decision to heavily impact voting in the 2024 Presidential election.
- Campus News Editor Madeline Rowe interned with this former congressman.
- A defendant in the Department of Justice's case against Hamas and who heads Hamas' diaspora office.
- A recent rise in this political phenomenon threatens long-term stability and economic performance.
- This technology introduces a new threat to the cyber landscape as false media can be used for foreign intervention.
- Former vice president of Google's ad platform.
- This Long Island doctor died from anaphylactic shock at a Disney resort restaurant.
- This statute in international law reaffirms the authority of the International Criminal Court.
20 Clues: Former vice president of Google's ad platform. • Surname of the Supreme Allied Commander of NATO. • Campus News Editor Madeline Rowe interned with this former congressman. • This Chinese investment program has led to complicated ties with Myanmar. • Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete. • ...
Technology Crossword 2023-06-07
Across
- represents text, computer processor instructions, or any other data using a two-symbol system.
- is the most important processor in a given computer.
- is the protection of computer systems and networks from attack by malicious actors.
- is a form of computer memory that can be read and changed in any orde.
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
- is a file format developed by Adobe in 1992 to present document
- is a digital multimedia container format most commonly used to store video and audi.
- is a collection of discrete values that convey informatio.
- is a method of representing data in a visual, machine-readable form
Down
- is an American multinational technology company
- is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- are small blocks of data created by a web server.
- is a bitmap image format that was developed by a team at the online services provider CompuServe.
- is a mobile operating system
- is a hardware or software component that stores data so that future requests for that data can be served faster
- is a mapping from some domain (for example, a range of integers) to bits.
- is a method of transmitting and receiving messages using electronic devices.
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source devic.
20 Clues: is a mobile operating system • is an American multinational technology company • are small blocks of data created by a web server. • is the most important processor in a given computer. • is a collection of discrete values that convey informatio. • is a file format developed by Adobe in 1992 to present document • ...
Unit 8 Key Terms 2023-04-27
Across
- taken to achieve this.
- a place of refuge or safety.
- the state of being protected against the criminal or unauthorized use of electronic data, or the
- a term typically used to describe international, supranational, and global resource domains in
- a tax or duty paid on a particular class of imports or exports.
- the system.
- to do so.
- fiscal policy to stimulate the economy.
- sum of money provided by the government or a public body
- economically stimulus refers to attempts to use monetary policy
- a system of recording information in a way that makes it difficult or impossible to change, hack, or
- common-pool resources are found.
- the profession, activity or skill of managing international relations, typically
Down
- the state of being equal especially in status, rights and opportunities.
- a video of a person in which their face or body has been digitally altered so that they appear to be
- to reveal personal information, such as passwords and credit card numbers
- else, typically used maliciously or to spread false information
- money paid regularly at a particular rate for the use of money lent.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce
- sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual
- to influence a country's economy.
- businesses.
- controlling the overall supply of money that is available to the nation's banks, its consumers, and
- a set of tools that a nation's central bank has available to promote sustainable economic growth
- the use of government revenue collection and
- a countries representative abroad.
- existing or occurring within a particular country
- assist an industry or business in order to remain competitive.
28 Clues: to do so. • businesses. • the system. • taken to achieve this. • a place of refuge or safety. • common-pool resources are found. • to influence a country's economy. • a countries representative abroad. • fiscal policy to stimulate the economy. • the use of government revenue collection and • existing or occurring within a particular country • ...
TECH CONNECT 2023-08-30
Across
- Writing and structuring code that computers can execute to perform desired functions.
- Programs and applications that run on computers or devices, enabling various tasks.
- A set of rules defining how data is transmitted and received across a network.
- A interconnected system that allows devices to communicate and share resources.
- Implementing systems or processes that operate with minimal human intervention.
- The point of interaction between a user and a device or software application.
- Writing instructions that computers can understand to perform specific tasks.
- Measures to protect digital systems and information from unauthorized access or attacks.
- A remote network of servers for storing, managing, and processing data over the internet.
- A powerful computer that stores and manages data and resources for other devices.
- Intelligence, The ability of machines to simulate human cognitive functions.
Down
- Deliberate actions to compromise or disrupt digital systems, often for malicious purposes.
- Using technology to streamline and execute tasks without human intervention.
- The global network connecting computers and devices, facilitating information exchange.
- Identifying and removing errors or issues in software code.
- The process of introducing new ideas, methods, or technologies to improve existing systems.
- Combining different components or systems to work together seamlessly.
- Often in the form of facts, figures, or statistics, used for analysis.
- Examination of data to extract meaningful insights and make informed decisions.
- Converting data into a code to prevent unauthorized access.
- Short for "application," referring to software designed for specific tasks or purposes.
- The process of designing, creating, and refining software, systems, or products.
- Physical components of computers and devices that enable software to function.
- The person interacting with a device, system, or software application.
- A set of step-by-step instructions for solving a problem or completing a task.
25 Clues: Identifying and removing errors or issues in software code. • Converting data into a code to prevent unauthorized access. • Combining different components or systems to work together seamlessly. • Often in the form of facts, figures, or statistics, used for analysis. • The person interacting with a device, system, or software application. • ...
Bureaucracy and Foreign Policy 2024-10-03
Across
- Department that oversees agencies in charge of counterterrorism, cybersecurity, and immigration
- The method of influencing someone, usually a country, to behave in a certain way
- Department that leads the country’s foreign policy
- A government’s set of strategies and goals for dealing with other nations
- Allows both groups to meet their interests
- Handles significant areas of concern for the federal government (Foreign Affairs, Defense, Transportation, etc.)
- Large, complex administrative structure that handles the everyday business of an organization
- Provides the President with the support and services he needs to govern effectively
- Department that oversees and advises the president on military action
- Violent attacks against civilians
- The President oversees the miliatry as ________-in-chief.
- Government officials who live in foreign countries and represent their government
- A type of agency such as the CIA, NSA, and DIA
Down
- The heads of independent agencies are confirmed by what?
- Type of aid where money and resources go to help people with emergency responses to natural disasters, a lack of food, or the outbreak of deadly diseases
- An agreement between countries
- Type of aid that helps develop other nations
- Congress holds the power of the _________—they control how government money is raised and spent
- The federal bureaucracy is part of the ___________ branch.
- Congress sets general guidelines in laws but allows the bureaucracy to make further policy decisions through ___________ authority.
- Economics method to stop trade and assistance to a specific country
- Mutually beneficial relationship between an agency, congressional committee, and interest group.
- When the U.S. only threatens (key word threatens) to use military forces against another country
- Network of public officials, lobbyists, mass media, think tanks, etc., who promote a particular issue
24 Clues: An agreement between countries • Violent attacks against civilians • Allows both groups to meet their interests • Type of aid that helps develop other nations • A type of agency such as the CIA, NSA, and DIA • Department that leads the country’s foreign policy • The heads of independent agencies are confirmed by what? • ...
Tugas Daring Informatika Salsabila.n.l 30/xi 2025-04-11
Across
- digital upaya untuk memerangi penyebaran konten negatif disebut...
- analyst profesi yang bertugas mengamankan sistem komputer dari serangan siber adalah...
- creator profesi yang bertugas membuat konten untuk media sosial adalah...
- rangkaian karakter yang digunakan untuk mencari informasi di mesin pencari.....
- scientist profesi yang bertugas menganalisis data untuk menghasilkan informasi yang berguna adalah...
- proses penyebaran konten digital kepada khalayak luas disebut...
- proses verifikasi kebenaran konten digital disebut...
- operator boolean yang digunakan untuk menggabungkan kata kunci adalah...
- operator boolean yang digunakan untuk mengecualikan kata kunci adalah...
- cipta hak eksklusif pencipta yang timbul secara otomatis berdasarkan prinsip deklaratif setelah suatu ciptaan diwujudkan dalam bentuk nyata tanpa mengurangi pembatasan sesuai dengan ketentuan peraturan perundang-undangan disebut...
- simbol yang digunakan untuk mencari kata kunci yang mirip adalah...
Down
- salah satu contoh platform untuk diseminasi konten digital adalah...
- salah satu contoh HAKI adalah...
- Tanda kutip ganda (") digunakan untuk mencari frasa yang...
- pelanggaran haki dapat dikenakan sanksi...
- etika dalam memproduksi dan mendiseminasikan konten digital disebut...
- salah satu cara untuk memvalidasi konten negatif adalah dengan melakukan.
- profesi yang bertugas mengembangkan dan memelihara sistem komputer adalah...
- salah satu lembaga yang bertugas memvalidasi konten negatif adalah...
- dua simbol yang digunakan untuk mencari kata kunci di situs web tertentu adalah...
- salah satu contoh konten digital yang mengandung unsur budaya adalah...
- dokumenter budaya salah satu contoh konten digital yang mengandung unsur budaya adalah...
- salah satu contoh konten negatif adalah...
- hidup pencipta +70 tahun masa berlaku hak cipta untuk buku,lagu,dan karya seni lainnya adalah...
- organisasi internasional yang mengurusi HAKI adalah...
- grafis provinsi yang bertugas membuat desain visual untuk produksi digital adalah...
26 Clues: salah satu contoh HAKI adalah... • pelanggaran haki dapat dikenakan sanksi... • salah satu contoh konten negatif adalah... • proses verifikasi kebenaran konten digital disebut... • organisasi internasional yang mengurusi HAKI adalah... • Tanda kutip ganda (") digunakan untuk mencari frasa yang... • proses penyebaran konten digital kepada khalayak luas disebut... • ...
TTS27X_D 2025-04-27
Across
- Platform atau media yang seringkali menjadi sarana penyebaran konten negatif
- Ahli yang mengelola dan memelihara sistem basis data
- Untuk mencari informasi dari situs web tertentu, kita dapat menggunakan awalan site diikuti dengan
- Simbol asterisk dalam search engine berfungsi sebangai karakter
- Kegiatan menyaring atau membersihkan platform digital dari konten yang merugikan
- Upaya untuk memperkenalkan dan menyebarkan warisan budaya melalui platfrom digital
- Hak eksklu untuk menggunakan simbol, logo, atau nama tertentu dakam kegiatan perdagangan atau jasa
- Singkatan dari Hak Kekayaan Intelektual
- Adaptasi cerita atau mitos tradisional ke dalam format konten digital yang lebih modern
- Profesi yang bertugas merancang dan membangun jaringan komputer
- Ahli yang fokus pada keamanan sistem komputer dan jaringan dari ancaman siber
- Orang yang memberikan dukungan teknis kepada pengguna komputer dan sistem informasi
- Proses awal dalam membuat konten digital yang seringkali terinspirasi dari kekayaan budaya
Down
- Bentuk perlindungan HAKI untuk karya cipta di bidang ilmu pengetahuan, seni, dan sastra
- Operator logika dalam search engine yang mengharuskan kedua kata kunci ada dalam hasil pencarian
- Hak eksklusif yang diberikan kepada invetor atas invensinya
- Proses untuk memastikan kebenaran suatu informasi dan menangkal berita bohong
- Profesi yang berfokus pada pengembangan dan pemeliharaan situs web
- Penggunaan tanda filetype dalam pencarian digunakan untuk mencari file dengan format
- Simbol yang digunakan untuk menunjukkann merek dagang yang belum terdaftar secara resmi
- Salah satu bentuk konten digital yang efektif menyampaikan cerita rakyat atau legenda daerah
- Kemampuan berpikir kritis dan analitis dalam mengevaluasi informasi yang diterima
- Situs web atau sistem yang dirancang untuk mencari informasi di internet
- Metode untuk memeriksa keaslian gambar atau video yang beredar di internet
- Media digital yang sering digunakan untuk menyebarkan konten budaya seperti video tari tradisisonal
25 Clues: Singkatan dari Hak Kekayaan Intelektual • Ahli yang mengelola dan memelihara sistem basis data • Hak eksklusif yang diberikan kepada invetor atas invensinya • Simbol asterisk dalam search engine berfungsi sebangai karakter • Profesi yang bertugas merancang dan membangun jaringan komputer • Profesi yang berfokus pada pengembangan dan pemeliharaan situs web • ...
Applications of AI 2025-04-30
Across
- AI technology that converts spoken words to text
- AI tailors educational content to individual students
- AI helps with crop monitoring and yield prediction
- AI tools can generate novel images and music
- AI field focused on understanding and processing human language
- Vehicles that use AI to navigate without human input
- AI generates content and powers recommendation systems
- AI enabling computers to "see" and interpret images
- Identifying and labeling patterns, like faces or speech
- AI systems that sort and prioritize information
- AI detects threats and anomalies in networks
- AI programs that help with tasks, often voice-activated
- Field where AI diagnoses diseases and analyzes images
- AI is used for fraud detection and algorithmic trading in this sector
- Autonomous vehicles rely heavily on AI
- Chatbots and virtual agents are common here
Down
- AI accelerates the process of finding new medicines
- AI forecasts equipment failures in industry
- AI models help forecast weather and study environmental changes
- Personalized learning paths and grading are AI applications here
- AI is used to identify and prevent deceptive activities
- AI suggests products or content based on user history
- AI provides the intelligence for automated machines
- AI optimizes production and quality control
- AI personalizes advertising and analyzes consumer behavior
- AI systems that convert text or speech from one language to another
- AI controls non-player characters and generates game content
- Identifying objects or patterns in data, often using AI
- Creating new content like text, images, or music using AI
- AI is good at spotting unusual patterns that might indicate fraud or issues
30 Clues: Autonomous vehicles rely heavily on AI • AI forecasts equipment failures in industry • AI optimizes production and quality control • Chatbots and virtual agents are common here • AI tools can generate novel images and music • AI detects threats and anomalies in networks • AI systems that sort and prioritize information • AI technology that converts spoken words to text • ...
SCIENCE AND TECHNOLOGY 2024-10-25
Across
- The force that pulls objects toward each other, especially toward the Earth.
- The technology used to design and create robots.
- The science of building and using tiny structures at a molecular scale.
- The basic building block of all living organisms.
- The study of matter, energy, and the forces that act on them.
- The act of introducing something new, often advancing technology or science.
- A proposed explanation made based on limited evidence, to be tested.
- Facts or statistics collected for analysis or reference.
- The power needed to do work, from sources like fuel, electricity, or the sun.
- Something made by humans rather than occurring naturally.
- A place where scientists conduct experiments and research.
- The study of genes and heredity in living organisms.
- A branch of physics studying the behavior of particles on the smallest scales.
- A language or set of instructions used to program computers.
- The study of stars, planets, and outer space.
Down
- A path through which electric current flows.
- The molecule that carries genetic information in living organisms.
- An imitation of a real-world process for study or training purposes.
- A new idea or method that improves how things are done.
- The protection of computer systems from digital attacks.
- A small piece of matter, like an atom or molecule.
- A test done to discover or prove something.
- Microscopic organisms, some of which can cause diseases.
- A device that orbits Earth or another planet, used for communication or research.
- A set of rules or instructions for solving a problem, often used in computing.
- A collection of data organized for easy access and analysis.
- A small infectious agent that can multiply in living cells.
- The process by which species change over time through natural selection.
- The use of machines and technology to operate without human intervention.
29 Clues: A test done to discover or prove something. • A path through which electric current flows. • The study of stars, planets, and outer space. • The technology used to design and create robots. • The basic building block of all living organisms. • A small piece of matter, like an atom or molecule. • The study of genes and heredity in living organisms. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Security documentation that details system resource usage by users and processes for auditing.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Attacks that overwhelm a target system or network with a flood of traffic
- Policy-based accept or deny of network traffic.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
Down
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Injecting malicious scripts into webpages viewed by other users
- Matching known patterns of threats against security event data to find potential matches.
- Code examination performed without running the malicious program.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Process of transforming information into a scrambled format to secure it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- The correlation that matches the known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
Issues and Impacts Crossword 2025-12-03
Across
- Unfairness in algorithms or AI systems that can discriminate
- All the information about a person that exists online
- Copying someone else’s work without credit
- Crime where someone uses another person’s personal details illegally
- Illegal activities carried out using computers or the internet
- Platforms that can spread misinformation or affect mental health
- Technology that identifies people by their face
- Incident where sensitive information is accessed without permission
- Deliberately posting offensive or upsetting content online
- False or misleading information spread online
- Protecting systems and data from online threats
- Monitoring of people’s activities using technology
Down
- Gap between people who have access to technology and those who do not
- Computer-generated environment that feels real to users
- Software designed to damage or disrupt computers
- Legal right protecting creators of software, music, or digital content
- Money that exists only electronically, like Bitcoin
- Discarded electronic devices that harm the environment
- Technology that simulates human thinking and decision-making
- Small files stored by websites to track user activity
- Software that is freely available and can be modified by anyone
- Moral principles guiding responsible use of technology
- Process of converting data into code to prevent unauthorized access
- Creations of the mind protected by law
- Technology that overlays digital information onto the real world
- Environmental effects of producing and using technology
- Excessive use of technology leading to negative impacts on health or lifestyle
- Replacement of human jobs with computer-controlled systems
- Fraudulent attempt to steal sensitive information via fake emails or websites
- Ensuring personal information is kept safe and not misused
- Unauthorized access to computer systems
- Programs that can copy themselves and damage computers
32 Clues: Creations of the mind protected by law • Unauthorized access to computer systems • Copying someone else’s work without credit • False or misleading information spread online • Technology that identifies people by their face • Protecting systems and data from online threats • Software designed to damage or disrupt computers • ...
Review Puzzle 2026-03-16
Across
- A digital circuit used to perform arithmetic and logic operations.
- An international character encoding standard that provides a unique number for every character across languages and scripts
- A storage space for units of memory that are used to transfer data for immediate use by the CPU (Central Processing Unit) for data processing.
- A very small piece of code contained on a chip on your system board.
- The main circuit board in a computer system. It connects all of the internal components
- American Standard Code for Information Interchange.
- A type of cybersecurity threat that targets users directly through email, text, or direct messages
- Measures the speed at which electronic components process instructions from software.
- A form of computer storage that allows short-term data access.
- A physical data storage device that stores digital information.
- The process of sending and receiving data to/from the processor and memory
Down
- A fundamental electronic component that can amplify or switch electronic signals and electrical power.
- The primary functional component of a computer.
- The essential component of a processor that generates a pulse, functioning like a heartbeat, to regulate the timing of operations.
- A storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- Is the responsible for reading instructions and ensure it execution.
- The process of converting encoded or encrypted information back into its original format.
- A bit is the smallest unit of digital information and can have a value of either 0 or 1.
- And/Or
- Any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
20 Clues: And/Or • The primary functional component of a computer. • American Standard Code for Information Interchange. • A form of computer storage that allows short-term data access. • A physical data storage device that stores digital information. • A digital circuit used to perform arithmetic and logic operations. • ...
Technology 2026-02-26
Across
- Mining The process of discovering patterns and knowledge from large amounts of data.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Source Software with source code that anyone can inspect, modify, and enhance.
- The practice of protecting systems, networks, and programs from digital attacks.
- of Things A network of physical objects embedded with sensors and software to connect and exchange data.
- The series of screens, pages, and visual elements that a user interacts with on a device.
- Computing The delivery of computing services—including servers and storage—over the internet ("the cloud").
- Application Programming Interface; a way for two or more computer programs to communicate.
Down
- A set of data that describes and gives information about other data.
- The physical components of a computer system, such as the monitor, keyboard, and CPU.
- A digital, decentralized ledger that records transactions across many computers securely.
- Data Extremely large data sets that may be analyzed computationally to reveal patterns and trends.
- A set of step-by-step instructions or rules followed by a computer to solve a problem.
- A service that creates a secure, encrypted connection over a less secure network.
- The process of converting information into a secret code to prevent unauthorized access.
- Intelligence The simulation of human intelligence processes by computer systems, especially learning and reasoning.
- The maximum amount of data transmitted over an internet connection in a given amount of time.
- Software as a Service; a software distribution model where applications are hosted by a provider.
- Random Access Memory; a computer's short-term memory used to store data for active tasks.
- Learning A subset of AI focused on building systems that learn from data to improve performance.
20 Clues: A set of data that describes and gives information about other data. • Source Software with source code that anyone can inspect, modify, and enhance. • The practice of protecting systems, networks, and programs from digital attacks. • A service that creates a secure, encrypted connection over a less secure network. • ...
FITAVocab.TC 2013-05-16
Across
- programs that you can download
- ethical uses of or on a computer or the web
- circuit board
- something that shows off a a business and shows people what it is about
- crediting a persons work
- extra docking system
- the security of or on a computer
- a paid internet access
- central processing unit
- a companies "slogan"
- a type of layout
- a format of a program on your computer
- a combination of many search engines
- a program that allows you to create documents
- the thing at the top of the screen
- a port to get wifi
- storing space
- liquid crystal display
- an illegal way of taking credit for somebody's invention
- light emitting diode
- National Cyber Security Alliance
- what you have on you desktop already
Down
- a term that describes safety o the computer or on the web
- decision tool
- a place where you can virtually go and search on the web
- a system that allows you to connect to other peoples devices over wifi or cellular data
- cd port
- an adjective that describes cyber in a way that is someway pixel ly
- the old fashion watch "not digital"
- things that you can buy to play or enjoy on
- confusing
- a term that describes the web and computers
- a virtually folder where you can save your documents, files
- your work
- a user that is online
- a device that can go anywhere
- a thing of the computer that allows you to move around on the screen or click
- memory card
38 Clues: cd port • confusing • your work • memory card • decision tool • circuit board • storing space • a type of layout • a port to get wifi • extra docking system • a companies "slogan" • light emitting diode • a user that is online • a paid internet access • liquid crystal display • central processing unit • crediting a persons work • a device that can go anywhere • programs that you can download • ...
RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) 2023-11-30
Across
- Crafting interfaces that dynamically adjust based on user behavior, preferences, or contextual factors.
- Inadequate or incomplete planning, leading to constraints, hurried decisions, or compromises in later project stages.
- Conducting meetings between people in different locations using video and audio connections.
- Ethical hacking practice where cybersecurity professionals legally attempt to identify system vulnerabilities to enhance security.
- The act of leaving out specific individuals or groups, often unintentionally, from a particular context or system.
- The science or practice of encoding information to prevent unauthorized access, especially in information security.
- Altering or eradicating identifiable information from datasets to safeguard individuals' privacy while retaining overall data utility.
- Pre-set configurations or settings automatically applied in a system or software if not explicitly specified.
- The process of identifying and rectifying inaccuracies or inconsistencies in data to improve its quality.
- Designing systems with separate, interchangeable parts, enhancing flexibility and ease of maintenance.
Down
- Employing data and algorithms to create models that predict future outcomes or behaviors.
- The process of selectively omitting or censoring sensitive information from a document or dataset, often for privacy or security reasons.
- Repeating tests post-modifications to ensure previously functioning aspects have not been adversely affected.
- The commitment to complying with established standards, specifications, or regulations.
- Catering to a specific segment or group with unique preferences or needs.
- The deliberate act of making something obscure or unclear, often used to protect intellectual property or hinder reverse engineering.
- Alternative problem-solving methods employed when conventional approaches fail.
- The capability of being customized or adapted to suit individual preferences or needs.
- Losing interest or focus during discussions, indicating a lack of engagement or understanding.
- A systematic approach or set of procedures for solving a problem or accomplishing a task.
20 Clues: Catering to a specific segment or group with unique preferences or needs. • Alternative problem-solving methods employed when conventional approaches fail. • The capability of being customized or adapted to suit individual preferences or needs. • The commitment to complying with established standards, specifications, or regulations. • ...
Electronics 2025-03-05
Across
- – Field focused on designing and building robots.
- – Communication without physical cables.
- – Advanced field of physics used for computing and cryptography.
- – The field of making machines "think" like humans.
- – Type of system where software is built into hardware.
- – Board that connects electronic components.
- – The practice of protecting computer systems from attacks.
- - Systems that connect smart devices for real-time data exchange.
- – Energy sourced from nature, like solar or wind.
- - Devices that collect data and adapt based on environmental conditions.
- – Material used in electronic circuits, such as silicon.
- - The technology behind converting sunlight into electrical energy.
- – Technology that uses radio waves for identification and tracking.
- – Computing closer to the data source to reduce latency.
- – Engineering on a very tiny scale, atomic or molecular level.
Down
- – Use of technology to perform tasks with minimal human intervention.
- – Network of interconnected devices communicating via the internet.
- - A remote sensing method used in autonomous vehicles and robotics.
- - AI models inspired by the human brain, used in deep learning.
- - A revolutionary approach to processing information using qubits.
- - An integrated circuit that includes all components of a computer or electronic system.
- – A small computer on a single chip, used in embedded systems.
- – A device that detects physical properties such as temperature or motion.
- – A device that converts electrical signals into movement.
- - A next-generation display technology with superior brightness and efficiency.
- – Low-level software controlling hardware functions.
- – Unmanned aerial vehicles used for various applications.
- - A reconfigurable chip widely used in digital circuit design and embedded systems.
- – Latest generation of mobile network technology.
29 Clues: – Communication without physical cables. • – Board that connects electronic components. • – Field focused on designing and building robots. • – Energy sourced from nature, like solar or wind. • – Latest generation of mobile network technology. • – The field of making machines "think" like humans. • – Low-level software controlling hardware functions. • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Gaining unauthorized access to a secured area by following an authorized person.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Injecting malicious scripts into webpages viewed by other users
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
Down
- Forensic utilities tool essential for preserving the integrity of digital evidence by creating exact copies of media.
- Matching known patterns of threats against security event data to find potential matches.
- Process of transforming information into a scrambled format to secure it.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Attacks that overwhelm a target system or network with a flood of traffic
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Code examination performed without running the malicious program.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Policy-based accept or deny of network traffic.
- Graphic object used in reports to visualize the correlation between an object and its performance.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
Literasi Digital 2024-08-13
Across
- salah satu Pillar literasi digital
- aplikasi mengirim pesan di handpone
- proses meyakinkan penggunaan layanan digital dengan aman
- Informasi yang tidak sengaja salah/akurat
- kata lain keamanan siber
- perangkat dalam komputer
- dunia bisnis
- salah satu perangkat lunak password manager
- alamat web address bar peramban
- lisensi dimana seluruh hak cipta terhadap perangkat lunak telah dilepaskan
- web penjelajah internet terus menerus
- kecakapan media digital
- singkatan dari Software of a service
- sistem menggunakan perangkat keras
- fitur yang dikembangkan oleh peramban
- mencari halaman dengan judul tertentu
- mencari konten yang muncul di alamat domain
- situs web
- bidang lain informatika
- lisensi perdaganga
- pembaruan perangkat lunak
- kata kunci khusus yang digunakan dalam pencarian
Down
- provokasi di media sosia
- tantangan era literasi digita
- lisensi publik umum
- literasi yang mencari dan memahami yang ditemukan
- informasi yang dikumpulkan oleh web crawler
- kata lain dari browser
- elektronik kepanjangan dari TE
- kata kunci pengaman handphone
- mesin pencari khusus anak²
- penyadap media sosial
- perangkat kedua dalam komputer
- perangkat lunak yang digunakan untuk mengakses informasi di internet
- tempat jasa SAS beroperasi
- profesi bidangn informatika
- sebutan komputer di Amerika Serikat
- teknologi informasi dan komunikasi
- fitur pencarian yang terus meningkat
- Engine mesin pencari
- lisensi yang boleh menggunakan perangkat lebih
- gak atas kekayaan intelektua
- kata lain lisensi gratis
- Informasi yang tidak benar
- Audio konten yang berupa suara yang bisa didedidengarkan
- manager pengelola kata sandi supaya aman
- jaringan komunikasi
- dasar kajian data
- intelektual hasil buah pikir dari perangkat lunak
- salah satu perilaku yang harus diterapkan dalam budaya digital
- yayasan perangkat lunak bebas
51 Clues: situs web • dunia bisnis • dasar kajian data • lisensi perdaganga • lisensi publik umum • jaringan komunikasi • Engine mesin pencari • penyadap media sosial • kata lain dari browser • kecakapan media digital • bidang lain informatika • provokasi di media sosia • kata lain keamanan siber • perangkat dalam komputer • kata lain lisensi gratis • pembaruan perangkat lunak • mesin pencari khusus anak² • ...
Tugas Informatika Terakhir 2025-05-26
Across
- Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
- Platform digital untuk pendidikan Islam dalam smart city.
- Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
- Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
- Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
- Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
- Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
- Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
- Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
- Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
- Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
- Teknologi untuk sholat berjamaah virtual dalam smart city.**
- Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
- Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
- Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
- Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
- Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
- Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
- Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
- Kota masa depan dalam Islam yang makmur dan berkelanjutan.
20 Clues: Platform digital untuk pendidikan Islam dalam smart city. • Kota masa depan dalam Islam yang makmur dan berkelanjutan. • Teknologi untuk sholat berjamaah virtual dalam smart city.** • Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam. • Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12). • ...
Tugas Informatika Terakhir 2025-05-26
Across
- Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
- Platform digital untuk pendidikan Islam dalam smart city.
- Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
- Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
- Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
- Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
- Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
- Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
- Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
- Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
Down
- Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
- Teknologi untuk sholat berjamaah virtual dalam smart city.**
- Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
- Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
- Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
- Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
- Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
- Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
- Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
- Kota masa depan dalam Islam yang makmur dan berkelanjutan.
20 Clues: Platform digital untuk pendidikan Islam dalam smart city. • Kota masa depan dalam Islam yang makmur dan berkelanjutan. • Teknologi untuk sholat berjamaah virtual dalam smart city.** • Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam. • Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12). • ...
Science technology & society 2024-12-16
Across
- Earth's rising temperature.
- Number of species in an area.
- Long-term weather patterns.
- Height above sea level.
- Radical beliefs or actions.
- Basic unit of biological classification.
- Wireless identification technology.
- Early long-distance communication system.
- Early sound playback device.
- Political decision-making stalemate.
- Worldwide interconnectedness.
- Layer of gases around Earth.
- Computer's processing chip.
- Science of classifying organisms.
- Broadest biological group.
- Floating water droplets in the sky.
- Immersive digital environment.
- Tiny electronic switch.
- Digital currency system.
- Public participation in research.
- Group of related species.
- Global disease outbreak.
- Connected system of computers.
- Large, slow-moving ice masses.
- Genetic sequencing process.
- Taxonomic group below order.
- Rank below phylum.
- Unfair treatment of groups.
- Unequal access to resources.
- Variety of all life forms.
- Government collection of revenues.
Down
- Body that rules a nation.
- Heat-trapping atmospheric gases.
- Freedom from surveillance.
- Long-term shifts in climate.
- Look-alike species.
- Popular social network site.
- Day-to-day atmospheric conditions.
- System of medical services.
- Machine-based decision-making.
- Ability to analyze information sources.
- Unauthorized computer infiltrator.
- Grouping of related families.
- Overflow of water onto land.
- Community well-being efforts.
- Tiny particles in the air.
- Digital ledger system.
- Online social platforms.
- Frozen water falling as flakes.
- Variation in DNA within species.
- New ideas or inventions.
- Gas from burning fossil fuels.
- Potent greenhouse gas.
- Transmitted information wave.
- Protection from online threats.
- Major taxonomic category.
- Variety of ecosystems.
- Sharp division of opinions.
- Contaminated air particles.
59 Clues: Rank below phylum. • Look-alike species. • Digital ledger system. • Potent greenhouse gas. • Variety of ecosystems. • Height above sea level. • Tiny electronic switch. • Online social platforms. • New ideas or inventions. • Digital currency system. • Global disease outbreak. • Body that rules a nation. • Major taxonomic category. • Group of related species. • Freedom from surveillance. • ...
Current Events Final Exam 2024-05-08
Across
- - Competitive video gaming.
- - Able to be maintained long-term. (Often refers to environmental practices)
- - Application software for a smartphone or computer.
- - Protecting computer systems from attacks.
- - Spreading quickly on social media.
- - A virtual world users can access and interact with.
- - Audio program series distributed online.
- - Digital currency secured by cryptography.
- - Playing video games.
- - Energy sources that can be replenished, like solar or wind power.
- - Unmanned aerial vehicles used for various purposes.
- - Delivering content online in real-time.
- - Creating three-dimensional objects from a digital file.
- - Billionaire entrepreneur behind companies like Tesla and SpaceX.
- (AGI) - Hypothetical AI with human-like intelligence.
- - Online seminar or presentation.
Down
- - A large-scale disaster or event. (Can be metaphorical)
- - Science, Technology, Engineering, and Math education.
- - An additional dose of the COVID-19 vaccine given to maintain immunity.
- - Long-term shift in weather patterns.
- - Virtual reality, a simulated experience.
- - Object orbiting Earth used for communication or observation.
- - Storing and accessing data through the internet.
- - Online platforms for social connection and content sharing.
- (AI) - Machines that mimic human cognitive functions.
- - Large and complex sets of data used for analysis.
- - False or misleading information presented as news.
- (IoT) - Network of physical devices connected to the internet.
- - Non-fungible token, a unique digital asset.
- - Autonomous vehicle that operates without a driver.
- - Person with a large online following who promotes products.
- (EV) - Vehicle powered by electricity.
- - Mobile phone with advanced features.
- - The field of designing and building robots.
- - Automated vacuum cleaner.
- - Using biology to create new products or processes.
36 Clues: - Playing video games. • - Competitive video gaming. • - Automated vacuum cleaner. • - Online seminar or presentation. • - Spreading quickly on social media. • - Long-term shift in weather patterns. • (EV) - Vehicle powered by electricity. • - Mobile phone with advanced features. • - Delivering content online in real-time. • - Virtual reality, a simulated experience. • ...
Science, Technology, and Society 2024-12-15
Across
- make changes
- replace or modify
- coins made of valuable metals
- relates to society
- condition of a person
- relating worldwide
- long-term weather condition
- way or manner something occurs
- lack of evenness
- losing something
- woody perennial plant
- electronic device bigger than laptop
- to disturb
- wide variety of differences
- home of an organism
- allows users yo sync data across devices
- _______ world due to political polarization
- live-able planet in the solar system
- to advance
- eco______
- very important matter for each country
- creating something
- can be seen in the sky during cloudy days
- other word for age
- a global network for everyone
- a system of recorded transactions
- random access memory
- the process of coding
- woody plant smaller than tree
- relates to computers
Down
- situation where progress is stalled due to excess demand
- even distribution of weight
- the Earth
- grows in damp habitats
- harmful substances in environment
- practice of protecting work programs
- way of life
- area covered with trees
- to gain unauthorized access to data
- short plants
- artificial intelligence
- problem for deep discussion
- also known as digital divide
- information collected
- series of actions or steps
- there is balance
- does not exist physically
- legally recognized subject in a nation
- medium for mass communication
- opposite of old
- jumping on the bandwagon
- internet of things
- robotic process automation
- power derived from using resources
- unit of heredity
- climbing plant
- moving river of ice
- can be seen falling during snowy weather
- relating to present-time
- move from one place to another
60 Clues: the Earth • eco______ • to disturb • to advance • way of life • make changes • short plants • climbing plant • opposite of old • lack of evenness • losing something • there is balance • unit of heredity • replace or modify • relates to society • relating worldwide • internet of things • creating something • other word for age • home of an organism • moving river of ice • random access memory • ...
Information Technology_1 2025-04-03
Across
- A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- An error or flaw in software that causes it to produce incorrect or unexpected results.
- Software for which the original source code is made freely available and may be redistributed and modified.
- Learning A type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
- Programming Interface) A set of rules that allows different software applications to communicate with each other.
- The maximum rate of data transfer across a given path.
- A version control system for tracking changes in source code during software development.
- The process of finding and fixing errors in software.
- A program that translates source code into executable code.
- The practice of protecting systems, networks, and programs from digital attacks.
- A basic structure underlying a system, concept, or text.
Down
- A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
- A step-by-step procedure for solving a problem or performing a task.
- The delivery of computing services over the internet.
- The process of converting data into a code to prevent unauthorized access.
- A network security system that monitors and controls incoming and outgoing network traffic.
- The part of a website or application that users interact with directly.
- An organized collection of data, generally stored and accessed electronically.
- (Integrated Development Environment) A software application that provides comprehensive facilities to computer programmers for software development.
- A set of rules governing the exchange or transmission of data between devices.
20 Clues: The delivery of computing services over the internet. • The process of finding and fixing errors in software. • The maximum rate of data transfer across a given path. • A basic structure underlying a system, concept, or text. • A program that translates source code into executable code. • A step-by-step procedure for solving a problem or performing a task. • ...
Digital Transformation in PM 2025-04-30
Across
- Services or systems hosted on remote servers and accessed via the internet.
- Information Data that is stored and accessible from a single, unified location.
- The ability of a system to handle a growing amount of work or its potential to be enlarged.
- Occurring immediately and without delay, often used for live updates or collaboration.
- Team A group of employees working from different geographical locations.
- Management The identification and mitigation of potential problems that could negatively affect a project.
- The protection of computer systems and networks from digital attacks or unauthorized access.
- Encryption The process of converting data into a coded format to prevent unauthorized access.
- (Artificial Intelligence) Technology that enables machines to perform tasks that normally require human intelligence.
- The action of working with others to achieve a common goal.
- Transformation The integration of digital technologies into all areas of a business to improve operations and value delivery.
- Allocation The process of assigning available resources to various tasks to maximize efficiency.
Down
- Application Software designed to run on mobile devices, often used to access cloud-based systems.
- Authentication A security system that requires more than one form of identification to access data or systems.
- The use of technology to perform tasks with minimal human intervention.
- Learning A branch of AI where systems learn from data to improve their performance over time without being explicitly programmed.
- Management The process of planning, executing, and overseeing a project to meet specific goals and deadlines.
- Analytics The use of data, statistical algorithms, and machine learning to identify the likelihood of future outcomes.
- Data Analytics The process of examining large and complex data sets to uncover patterns, trends, and insights.
- A series of steps or processes through which a task is completed.
20 Clues: The action of working with others to achieve a common goal. • A series of steps or processes through which a task is completed. • The use of technology to perform tasks with minimal human intervention. • Team A group of employees working from different geographical locations. • Services or systems hosted on remote servers and accessed via the internet. • ...
tugas daring kelas X-I(Mahatma Bara) 2025-04-17
Across
- Hak eksklusif bagi pencipta untuk mengumumkan atau memperbanyak ciptaannya
- Apa nama proses di mana mesin pencari menggunakan algoritma untuk menentukan urutan hasil pencarian yang paling relevan?
- Perusahaan search engine paling populer
- Proses menyebarkan konten digital ke berbagai media atau audiens
- Salah satu tantangan utama dalam validasi konten negatif yang melibatkan subjektivitas penilaian
- Kata atau frasa yang diketik pengguna
- Jenis konten digital yang menggabungkan unsur visual dan suara
- Apa singkatan dari istilah yang merujuk pada proses pengindeksan halaman web oleh mesin pencari?
- Manfaat HAKI bagi pemegang hak atau pemilik adalah
- Proses membuat konten digital yang mengangkat cerita rakyat dari daerah tertentu.
- Singkatan dari Hak Atas Kekayaan Intelektual
- ahli yang bertanggung jawab untuk mengamankan jaringan komputer
- Sistem otomatis yang digunakan untuk mendeteksi konten negatif secara cepat dan efisien
Down
- proses mengidentifikasi dan menandai konten yang berpotensi berbahaya.
- Proses membuat konten digital dari awal hingga siap dipublikasikan
- Unsur utama yang harus diperiksa dalam validasi konten negatif agar tidak tersebar luas.
- Profesi yang mengelola dan mengamankan jaringan komputer dalam sebuah organisasi.
- profesi yang bertugas merancang dan memelihara software
- Lembaga pemerintah yang mengelola Hak Kekayaan Intelektual di Indonesia
- Apa istilah yang digunakan untuk menyebut halaman hasil pencarian yang muncul setelah pengguna memasukkan kata kunci di mesin pencari?
- Profesi yang menganalisis data untuk membantu pengambilan keputusan bisnis.
- Proses menghapus atau menandai konten yang mengandung unsur kekerasan, pornografi, atau ujaran kebencian
- Platform media sosial yang sering digunakan untuk menyebarkan video budaya tradisional.
- Hak eksklusif yang diberikan negara kepada penemu atas hasil invensinya di bidang teknologi
- Profesi yang bertugas menulis dan mengembangkan program komputer
25 Clues: Kata atau frasa yang diketik pengguna • Perusahaan search engine paling populer • Singkatan dari Hak Atas Kekayaan Intelektual • Manfaat HAKI bagi pemegang hak atau pemilik adalah • profesi yang bertugas merancang dan memelihara software • Jenis konten digital yang menggabungkan unsur visual dan suara • ahli yang bertanggung jawab untuk mengamankan jaringan komputer • ...
Post Cold War 2024-10-01
Across
- The practice of protecting computer systems and networks from unauthorized access or attacks.
- A long-term shift in global temperatures and weather patterns caused by human activity.
- A political movement claiming to represent the voice of ordinary people against elites.
- The process of increasing interconnection between countries through trade, culture, and technology.
- 2015 international treaty aimed at reducing global greenhouse gas emissions.
- U.S.-led global military campaign launched after the 9/11 attacks.
- A series of coordinated terrorist attacks in 2001 that reshaped global security policies.
- The practice of using resources responsibly to ensure future generations can meet their needs.
- A conflict in which countries impose tariffs on each other, as seen between the U.S. and China.
Down
- Assistance provided during crises such as natural disasters, conflicts, or famines.
- Initiative China’s global infrastructure development strategy aimed at increasing its global influence.
- The rapid development of the internet and social media since the 1990s.
- The disintegration of this superpower in 1991 marked the end of the Cold War.
- Political and economic union of 27 European countries, facing challenges like Brexit.
- Laws regulating how people can enter and live in a country, often debated in the context of security and economics.
- Online platforms that have transformed global communication and activism, such as Facebook and Twitter.
- The use of violence, especially against civilians, to achieve political goals.
- The United Kingdom’s decision to leave the European Union in 2016.
- Country whose rapid economic and political rise has challenged U.S. global dominance.
- Political ideology focused on promoting the interests of one's country, often at the expense of global cooperation.
20 Clues: The United Kingdom’s decision to leave the European Union in 2016. • U.S.-led global military campaign launched after the 9/11 attacks. • The rapid development of the internet and social media since the 1990s. • 2015 international treaty aimed at reducing global greenhouse gas emissions. • ...
Literasi digital 2024-08-20
Across
- menandai kata kunci atau topik
- kejahatan yang melibatkan penggunaan komputer
- menandai lokasi geografis dalam foto
- sebuah metode untuk memanipulasi orang
- mengambil file dari internet
- perangkat lunak yang di ciptakan untuk merusak sistem komputer
- sebuah vidio yang berfokus pada cerita
- upaya untuk mencuri informasi sensitif
- melindungi sistem komputer dan jaringan dari ancaman
- suatu konten yang cepat menyebar
- sebuah antar muka untuk menghubungkan aplikasi
- pengguna internet yang sengaja membuat komentar provokatif
- metadata
- teknologi yang memadukan dunia
- istilah untuk mengurangi penggunaan teknologi
- sebuah gambar kecil atau simbol
- sebuah format untuk menyediakan konten
- penggunaan teknologi digital untuk menghina
- catatan online atau jurnal yang sering di update
- sebuah jenis kode matriks
- pengguna internet yang memiliki banyak follower
- representasi grafis atau karakter
- informasi yang memberikan deskripsi
Down
- tempat untuk berbagi pendapat
- menyaksikan konten vidio secara langsung
- memanen data pribadi
- yang digunakan untuk melindungi jaringan
- platfrom media sosial yang paling umum
- kiriman pesan kepada banyak orang tanpa izin
- sebuah metode keamanan identitas akun
- menyimpan data secara online dalam serfer
- platfrom yang sering di gunakan untuk melakukan vidio konvergensi
- digital yang meninggalkan jejak aktivitas online
- proses merubah informasi menjadi kode
- situs web yang memungkinkan pengguna untuk mengedit
- sebuah kelemahan atau cela yang dapat diserang
- kesenjangan akses terhadap teknologi digital
- penggunaan teknologi digital untuk menghina
- sebuah unit infomasi
- layanan untuk menyimpan data online
- menyimpan prefensi menggunakan
- generasi yang tumbuh Dengan teknologi
- topik yang sedang populer
- menyimpan dan menyediakan data
- sebuah alamat web
- program yang dapat menggandakan dirinya sendiri dan menyebar ke komputer lain
- untuk menampilkan konten
- strategi untuk meningkatkan visibilitas website
- sebuah perangkat lunak atau parangkat keras
- perangkat lunak yang berinteraksi dengan pengguna
50 Clues: metadata • sebuah alamat web • memanen data pribadi • sebuah unit infomasi • untuk menampilkan konten • topik yang sedang populer • sebuah jenis kode matriks • mengambil file dari internet • tempat untuk berbagi pendapat • menandai kata kunci atau topik • menyimpan prefensi menggunakan • menyimpan dan menyediakan data • teknologi yang memadukan dunia • sebuah gambar kecil atau simbol • ...
Risk Management Puzzle 2025-11-17
Across
- / Strategy to offset potential losses
- management / Process of identifying and mitigating threats to assets
- at Risk / Estimate of potential loss in value
- detection / Identifying and preventing deceptive financial activity
- / Insurance purchased by insurers to reduce risk
- / Protection against financial loss
- controls / Procedures to ensure integrity and accuracy in operations
- appetite / Level of risk an organization is willing to accept
- tolerance / Degree of variability in outcomes an entity can withstand
- risk / Risk from fluctuations in exchange rates
- / Measure of price fluctuations
- / Statistical analysis used in insurance and finance
- / Collection of financial investments
- continuity / Planning to maintain operations during disruptions
- / Framework of rules and practices for corporate oversight
- risk / Risk of collapse affecting the entire financial system
- / Asset pledged for a loan
- rating / Assessment of a borrower's creditworthiness
- / Financial instruments based on underlying assets
- risk / Risk from business decisions or changes in market conditions
- rate risk / Risk from changes in interest rates
- risk / Risk from fluctuations in prices or rates
- testing / Simulating crisis scenarios to assess resilience
Down
- / Selling assets to pay off debts
- III / International banking regulations for risk and capital
- risk / Risk that the other party in a transaction may default
- risk / Risk of changes in laws or regulations
- / Ease of converting assets to cash
- adequacy / Measure of a bank's capital relative to its risks
- analysis / Evaluating outcomes under different hypothetical conditions
- risk / Risk from internal processes or systems
- / Protection of digital systems from threats and breaches
- / Process of evaluating and assuming risk for insurance or securities
- risk / Risk of legal actions or non-compliance
- / A borrower's ability to repay a loan
- / Independent examination of financial records and processes
- / Adherence to laws, regulations, and policies
- / Amount at risk in a financial transaction
- / Failure to meet financial obligations
39 Clues: / Asset pledged for a loan • / Measure of price fluctuations • / Selling assets to pay off debts • / Ease of converting assets to cash • / Protection against financial loss • / Strategy to offset potential losses • / Collection of financial investments • / A borrower's ability to repay a loan • / Failure to meet financial obligations • ...
Industrial Security Concepts Crossword Puzzle 2025-10-28
Across
- plan 4. A detailed plan for responding to emergencies such as fire or natural disasters.
- 2. An intentional act to harm, steal, or damage property or personnel.
- security 10. The act of protecting confidential company information from unauthorized access.
- 9. The ability to keep sensitive operations or information from being exposed.
- 8. The use of cameras to monitor activities within and around a facility.
- in 1. Unauthorized or forced entry into a building, vehicle, or area.
- 1.The protection of company assets, employees, and information from threats, theft, or damage.
- 7. a person responsible for ensuring safety and enforcing company security
- 4. The act of following and watching someone closely for safety or investigation purposes.
Down
- 5. Any weakness in a system that can be exploited by threats.
- control 5. The safe and efficient movement of people and goods in and out of a facility.
- 6. Physical barrier used to prevent unauthorized entry into restricted areas. pany security policies.
- 3. Type of security focusing on protecting computers and digital information.
- order 8. A written order outlining the duties and responsibilities of security personnel.
- report 10. A detailed report documenting any incident or breach in security.
- control 3. A system or process for controlling entry and exit of people in a facility.
- security 2. Measures designed to protect buildings and equipment from damage or loss.
- protection 7. Procedures and tools designed to prevent, detect, and respond to fire.
- assessment 9. Process of evaluating potential risks and determining preventive measures.
- 6. A person or group that poses a potential danger to an organization’s assets.
20 Clues: 5. Any weakness in a system that can be exploited by threats. • in 1. Unauthorized or forced entry into a building, vehicle, or area. • 2. An intentional act to harm, steal, or damage property or personnel. • 8. The use of cameras to monitor activities within and around a facility. • 7. a person responsible for ensuring safety and enforcing company security • ...
Technology concepts 2025-09-04
Across
- The physical components of a computer system, such as the CPU, memory, and storage devices.
- Software Programs designed for end-users, such as word processors, web browsers, and mobile apps.
- Devices Hardware that displays or outputs data from a computer, such as monitors, printers, or speakers.
- A computer that provides services, resources, or data to other devices on a network.
- Programs and applications that run on a computer and perform specific tasks for the user.
- Computing The delivery of services like storage, software, and processing power over the internet.
- (SSD) A type of storage device that uses flash memory for faster performance compared to traditional hard drives.
- A global network that connects millions of computers, enabling communication and information sharing.
- Technology that allows machines to simulate human intelligence, such as learning and decision-making.
- Devices Hardware used to enter data into a computer, such as a keyboard, mouse, or scanner.
- System The system software that manages computer hardware, software, and resources (e.g., Windows, macOS, Linux).
Down
- (AR) Technology that overlays digital information on the real world, often using smartphones or AR glasses.
- (VR) A simulated digital environment that immerses users through special gadgets like VR headsets.
- An organized collection of data stored electronically and accessed by specialized software.
- A device that forwards data between networks and provides internet connectivity.
- The practice of protecting systems, networks, and data from digital attacks or unauthorized access.
- (GPU) A specialized computer component that handles rendering images, videos, and graphics.
- An electronic device that processes information and performs tasks according to instructions.
- (Internet of Things) A network of everyday objects embedded with sensors and software to exchange data (e.g., smartwatches, smart home devices).
- A system of interconnected devices that communicate and share resources.
20 Clues: A system of interconnected devices that communicate and share resources. • A device that forwards data between networks and provides internet connectivity. • A computer that provides services, resources, or data to other devices on a network. • Programs and applications that run on a computer and perform specific tasks for the user. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-26
Across
- Something that secures or makes safe; protection; defense.
- The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
- Intending or intended to do harm.
- Exposure to the chance of injury or loss.
Down
- To try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one.
- The act or a result of breaking.
- Malware planted illegally in a computer or mobile device that disables its operation or access to its data until the owner or operator pays to regain control or access.
- A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.
8 Clues: The act or a result of breaking. • Intending or intended to do harm. • Exposure to the chance of injury or loss. • Something that secures or makes safe; protection; defense. • A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network. • ...
CONTRACTS CROSSWORD 2025-09-03
Across
- How many different Contract bill-to's does BSRx have in NAV?
- September 3rd, 2025
- How many hours do you have to fulfill an URGENT Delivery Request if received at 12:00 pm
- As part of the _______ Compliance Program, the Provider will maintain a detailed inventory and ability to track the records of Personal Information, with audit logs showing who Handled the Personal Information
- As part of our _____ requirements, BSRx must have an information & cybersecurity program
Down
- 99.00% of Orders filled as specified in each Order during the month, without errors in product type, quality, quantity, etc = ORDER _______ ACCURACY
- How many OHaH regions does BSRx have under the NPWT Contract?
- a HCCSS request or a Patient, Patient’s physician, Caregiver or Service Provider Organization request, for a _________ with a Registered Pharmacist
- Service Delivery Locations that are used to facilitate patient pick-ups and can only be invoiced once the order has been picked up.
- REPORT The FSP shall, for each Fiscal Year during the Term, submit this to HCCSS and the HCCSS Contract Manager
- The Provider shall provide the Recipient with all necessary instruction and disposal containers required for the proper disposal of _______ Waste
- Receiving an end rental for an equipment will initiate this type of Service Request
- Cardinal & OMS are examples of what?
- This is the Del Code for Non-Urgent Delivery Requests
14 Clues: September 3rd, 2025 • Cardinal & OMS are examples of what? • This is the Del Code for Non-Urgent Delivery Requests • How many different Contract bill-to's does BSRx have in NAV? • How many OHaH regions does BSRx have under the NPWT Contract? • Receiving an end rental for an equipment will initiate this type of Service Request • ...
Challenging Indian Tech & Innovation Crossword 2024-10-10
Across
- A startup that’s revolutionizing the Indian agritech sector with AI-driven predictive analytics for farming
- This Indian multinational technology company is the world's largest provider of IT consulting services
- An Indian unicorn startup specializing in online education, now expanding globally with gamified learning solutions
- The first Indian startup to be listed on NASDAQ, specializing in AI-powered customer engagement platforms
- India’s leading tech unicorn in ride-sharing, now venturing into electric vehicles
- This Indian tech company developed a super app in the post-pandemic era, offering a wide range of services, including payments and healthcare
- An Indian renewable energy company that’s making headlines for being the largest in the world by installed capacity
- An Indian tech company focused on blockchain and AI for managing supply chain transparency in industries like pharma and logistics
Down
- An Indian company that developed an AI-based cybersecurity platform, now offering services across more than 30 countries
- India’s largest IT company by market capitalization, known for pioneering automation and AI-based IT solutions
- This Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystem
- A major player in India’s space technology, this private company built India’s first privately developed rocket
- The largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services
- This company is leading India’s AI-based conversational chatbot innovations, widely used by financial institutions
14 Clues: India’s leading tech unicorn in ride-sharing, now venturing into electric vehicles • This Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystem • The largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services • ...
Cybersecurity Awareness month at Kent! 2024-10-14
Across
- Sense created by the attacker to make you react quickly without thinking.
- When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
- Software attack method to harm or exploit a device or network.
- Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
- Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
- An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
- Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
- The address of a webpage which you check the validity of before clicking it. (Acronym)
8 Clues: Software attack method to harm or exploit a device or network. • Sense created by the attacker to make you react quickly without thinking. • The address of a webpage which you check the validity of before clicking it. (Acronym) • Additional layer of security that verifies a user's access to an account more than once. (Acronym) • ...
CYBER FEST CROSSWORD 2024-10-18
Across
- Software designed to detect, prevent, and remove malware and other harmful software.
- Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
- A secret string of characters used to verify the identity of a user.
- An attempt by hackers to damage or disrupt a computer system or network.
- Ensuring that an organization meets regulatory and legal requirements for security practices.
- Software that secretly monitors and collects personal information from a computer.
- A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
- The process of verifying the identity of a user or device before granting access to a system.
Down
- Related to computers, information technology, or virtual reality, often used in the context of online environments.
- The process of converting data into a secret code to protect it from unauthorized access.
- A weakness in software, hardware, or procedures that could be exploited to cause harm.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
- Any software intentionally designed to cause damage to a computer, server, or network.
- A person who uses computers to gain unauthorized access to data.
- A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.
16 Clues: A person who uses computers to gain unauthorized access to data. • A secret string of characters used to verify the identity of a user. • An attempt by hackers to damage or disrupt a computer system or network. • Software that secretly monitors and collects personal information from a computer. • ...
SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Safety and Ethics Puzzle 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
UNIT 1 - REVISION 2024-10-14
Across
- Consisting of more than one component or instance, used to describe redundant systems or data sets.
- Based on or following established practices or standards, often referring to traditional methods or widely accepted technologies.
- Moving or extending in a direction parallel to the surface or side.
- A device used to inject or withdraw fluid, often found in medical or laboratory environments.
- Expressing much in few words, especially in communication or technical documentation.
- Hydraulic fracturing, a method to extract oil or gas from the earth by breaking rock layers with fluid pressure.
- The distance between successive peaks of a wave, often related to light or sound.
- Having equal value, function, or meaning in a technical context, such as electrical or mechanical equivalence.
- To make impure by exposure to or addition of unwanted substances, relevant in contexts like data or chemical purity.
Down
- Inactive but capable of becoming active
- Focused or aligned along a specific direction, often used in antenna or signal technologies.
- Capable of being controlled or directed, often used in relation to antennas or vehicles.
- The delay before a transfer of data begins following an instruction, commonly in network or computing systems.
- To fail to notice or account for, often referring to missing critical details in analysis.
- Featuring new methods or ideas that introduce improvement or change in technology or processes.
- Comprising light or radiation of a single wavelength or color.
- To pose a risk or potential harm, often in cybersecurity or environmental contexts.
- To increase the strength of a signal, sound, or electrical current.
18 Clues: Inactive but capable of becoming active • Comprising light or radiation of a single wavelength or color. • Moving or extending in a direction parallel to the surface or side. • To increase the strength of a signal, sound, or electrical current. • The distance between successive peaks of a wave, often related to light or sound. • ...
Study subjects 2024-11-29
Across
- The study of how people think, feel, and behave.
- The study and design of robots, machines that can do tasks on their own or help people.
- The activity of starting and running a business, especially when it involves taking risks to make a profit.
- The study of ideas about life, knowledge, and the difference between right and wrong.
- Systems of words and rules used by people to communicate, such as English, Spanish, or Chinese.
- The work of designing and building machines, roads, bridges, and other structures using science and math.
- A group of subjects that focus on science, technology, engineering, and mathematics.
Down
- The protection of computers, networks, and personal information from being stolen or damaged.
- A system of rules that people in a country or place must follow.
- Subjects about human life, such as history, philosophy, and literature, that focus on culture and ideas instead of science.
- The science that studies how things move, the forces that act on them, and how energy works.
- The rights and responsibilities of being a member of a country.
- The study of people, their cultures, and how they have lived in the past and present.
- Sciences The study of people and society, including subjects like psychology, sociology, and economics.
- The study and design of buildings and other structures.
- The study of money, trade, and how people and governments use resources.
- The study of numbers, shapes, and patterns.
- The science of substances, what they are made of, how they combine, and how they change.
18 Clues: The study of numbers, shapes, and patterns. • The study of how people think, feel, and behave. • The study and design of buildings and other structures. • The rights and responsibilities of being a member of a country. • A system of rules that people in a country or place must follow. • The study of money, trade, and how people and governments use resources. • ...
Cybersecurity Awareness Puzzle 2 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 1 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 7 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cyber Security Awareness 2018-06-05
Across
- Be careful connecting to public _____.
- is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
- unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
- shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
- What month is National Cyber Security Awareness Month?
- True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
- is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
- techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- a secret word or expression used by authorized persons to prove their right to access, information, etc.
- when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
- type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
- is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user
12 Clues: Be careful connecting to public _____. • What month is National Cyber Security Awareness Month? • True/False: Call I.T. Service desk right away when you suspect a phishing email • techniques of protecting computers, networks, programs and data from unauthorized access or attacks • ...
Cybersecurity Awareness Month 2023 #InformationSecurityInsights 2023-10-03
8 Clues: Secure data disposal. • Deceptive email attacks. • Adherence to regulations. • Examination for compliance. • Security approach to the left. • Trust model with no implicit trust. • Potential for harm, loss, or breach • Ability to withstand and recover from cyberattacks
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the prevention of damage to and the protection of computer and information systems and is everyone's responsibility.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the prevention of damage to or the protection of computer and information systems. It is everyone's responsibility!
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-03-03
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive information, typically via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • ...
Standards Law & Ethics of Cybersecurity 2023-06-08
Across
- Link that is ______ often found on social media and SMS is one of the Phishing Scams.
- By sharing ______ date it potentially threatens personal safety.
- What should you do if you receive suspicious links on your mobile phone?
- Always update your ________ at least once in 6 months to make sure it is not easy to be hacked by irresponsible parties.
Down
- Resending fake emails to everyone who knows you can be identified as _______.
- Do not ______ your password.
- _____ crime is one of the crimes committed through computers on the internet. This action will cause the victim to suffer and exprience loss.
- Avoiding sharing ______ information on social media and the internet could protect yourself from becoming a cyber victim.
8 Clues: Do not ______ your password. • By sharing ______ date it potentially threatens personal safety. • What should you do if you receive suspicious links on your mobile phone? • Resending fake emails to everyone who knows you can be identified as _______. • Link that is ______ often found on social media and SMS is one of the Phishing Scams. • ...
The Internet Crossword 2024-01-23
Across
- wide web a system of interconnected public web pages accessible through the Internet
- abbreviation away from keyboard
- a set of computers sharing resources located on or provided by network codes
- facts provided or learned about something or someone
- The maximum amount of data transmitted over an internet connection in a given amount of time.
- Chip A set of microminiaturized electronic circuits fabricated on a thin slice of semiconductor material.
- electronic technology that generates, stores and processes data
- abbreviation for "for your information."
- the application of scientific knowledge for practical purposes, especially in industry
- conduct electricity and provide a low-resistance path for electricity to flow through
- information that is set up for easy access, management and updating.
- engine, coordinated set of programs that searches for and identifies items in a database that match
- facts and statistics collected together for reference or analysis
- search for information on the internet using the search engine Google
- an electronic device for storing and processing data
- an application, especially as downloaded by a user to a mobile device
- a computer program which manages access to a centralized resource or service in a network.
- the state of being protected against the criminal or unauthorized use of data
- text files with small pieces of data like a username and password
- abbreviation for non-player character
- abbreviation for frequently asked questions
- spot a physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network
- abbreviation for By The Way
- the default or front page of a site.
Down
- a device having or operating with the aid of many small components
- an individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- the process of scrambling or enciphering data so it can be read only by someone with the means to return it to its original state
- A newb or newbie; refers to the idea that someone is new to a game, concept, or idea; implying a lack of experience.
- a software application that runs automated tasks (scripts) on the Internet.
- A protected/private string of letters, numbers, and/or special characters used to authenticate an identity or to authorize access to data.
- relating to mobile phones, handheld computers, and similar technology
- an act of logging in to a computer, database, or system
- a type of communications technology that allows voice calls and other telephony
- something that can be done or seen using computers or the internet
- a set of related web pages located under a single domain name
- relating the culture of computers, information technology, and virtual reality
- a frequently updated web page used for personal commentary or business content
- an information system that enables content sharing over the Internet
- Room an online platform that enables users to communicate with each other in real time
- social media sites, applications, or accounts
- a computer program for displaying and navigating between web pages
- complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it
- an insulated wire or wires having a protective casing and used for transmitting electricity
- a worldwide system of computer networks
- a web services provider that offers both a search engine and a directory of World Wide Web pages organized in a hierarchy of topic categories
- computer network security system that restricts internet traffic in, out, or within a private network
- the largest vendor of computer software in the world
- abbreviation which means estimated time of arrival or the time you expect to arrive.
- the application of scientific knowledge for practical purposes, especially in industry
- The technology of transmitting audio and video files
- a unique address that identifies a device on the internet or a local network
51 Clues: abbreviation for By The Way • abbreviation away from keyboard • the default or front page of a site. • abbreviation for non-player character • a worldwide system of computer networks • abbreviation for "for your information." • abbreviation for frequently asked questions • social media sites, applications, or accounts • ...
Internet Safety Puzzle 2025-03-04
Across
- controls available on many websites and apps to limit who can access your profile and what information visitors can see
- tiny files of data used to track your online activities and information when you're browsing a website
- the correct or acceptable way of communicating on the internet
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
- which is the act of someone causing discord online or in person.
- the information about a particular person that exists on the internet as a result of their online activity.
- the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
- a type of malware (malicious software) designed to deny access to a user's data
Down
- Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
- Using all caps when you type
- An online conversation
- the practice of protecting systems, networks, and programs from digital attacks
- Being nice or showing kindness to a child to eventually have them comfortable enough to do something bad
- using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- posting, sharing, or saying harmful things about someone on the internet
- the animal that looks for prey to eat
17 Clues: An online conversation • Using all caps when you type • the animal that looks for prey to eat • the correct or acceptable way of communicating on the internet • which is the act of someone causing discord online or in person. • posting, sharing, or saying harmful things about someone on the internet • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- Contain tracking information for an individual email
- Fraud like Phishing, but it comes as a text message or SMS
- It is a deceptive scheme or trick used to cheat someone out of something
- It is merely an email trying to convince you to do something
- It is a phone scam designed to get your personal information by impersonating
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- Threat that involves sending email messages with a fake sender address
- It is just like Phishing but it only targets specific individuals within an organization
Down
- is news or knowledge received or given
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- It is a type of email attack where bad people are trying to steal your precious information
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- unsolicited bulk messages normally from people trying to sell something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • unsolicited bulk messages normally from people trying to sell something • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- It is a phone scam designed to get your personal information by impersonating
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- It is a type of email attack where bad people are trying to steal your precious information
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- Fraud like Phishing, but it comes as a text message or SMS
- It is just like Phishing but it only targets specific individuals within an organization
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
Down
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- Threat that involves sending email messages with a fake sender address
- It is news or knowledge received or given
- Unsolicited bulk messages normally from people trying to sell something
- It is merely an email trying to convince you to do something
- Contain tracking information for an individual email
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- It is a deceptive scheme or trick used to cheat someone out of something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: It is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • ...
3rd Quarter Review 2026-03-17
Across
- Unauthorized access, use, and modification to software, computer system, and/or network.
- an authentication process that permits a user to use one set of login credentials.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- A video, image, or audio recording created using AI that makes it look like someone said or did something they didn’t.
- Technology that allows computers to perform tasks that normally require human intelligence
- The ability to verify the identity of an entity/individual.
- Using technology to perform tasks automatically without human involvement.
Down
- The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- The information used to teach an AI model how to recognize patterns or make decisions.
- A type of AI where computers learn from data and improve their performance over time without being directly programmed for every step.
- AI that creates new content such as text, images, music, or video.
- When an AI gives false or made-up information but presents it as if it were true.
- privacy Protecting personal information from being collected or used without permission.
- The input or instruction given to an AI system to guide its response.
- When an AI system produces unfair or inaccurate results because of the data it was trained on.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information
- Protection of information from being shared to unauthorized systems, entities, or individuals.
17 Clues: The ability to verify the identity of an entity/individual. • AI that creates new content such as text, images, music, or video. • The input or instruction given to an AI system to guide its response. • Using technology to perform tasks automatically without human involvement. • When an AI gives false or made-up information but presents it as if it were true. • ...
Cybersecurity Awareness Puzzle 3 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 5 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 8 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 9 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 5 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
hi 2022-09-28
Across
- A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
- A generic term encompassing decode and decipher
- Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
- Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
- The service provider for CrowdStrike's internal training courses
- The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
- Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
- CrowdStrike's CEO and co-founder; abbr
- The property of being accessible and usable upon demand
- Computer compromised with malicious code; used by a threat actor to perform remote commands
- Hosting city of Fal.Con; abbr
- Someone who uses a social network to create an account with a fake identity to deceive an individual
- Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
- As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
- System of prevention and recovery from potential threats to a business; abbr
- As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- An unauthorized user who attempts to or gains access to an information system
- Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
- CrowdStrike's annual cybersecurity convention; "___.Con"
- Software that compromises the operation of a system by performing an unauthorized function or process
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
- Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
- A way to take advantage of a vulnerability in software
- A cybersecurity company
- The generic term encompassing encipher and encode
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- The process of verifying the identity or other attributes of an entity
Down
- Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
- A denial of service technique that uses numerous systems to perform the attack simultaneously
- A recognizable, distinguishing pattern; typically used to sign documents
- Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
- Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
- Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
- Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
- ___-Party Information
- Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
- A capability to limit network traffic between networks and/or information systems
- Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
- In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
- The process of transforming plaintext into ciphertext
- Type of analysis that determines what levels of impact to a system are tolerable; abbr
- Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- CrowdStrike threat hunting team
- Intranet webpage for all things CrowdStrike-related; abbr
- Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
- Cryptographic network protocol for operating network services securely over an unsecured network; abbr
- A dishonest scheme; a fraud
- CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
- Short form for "cryptography"
- When someone uses a social network to create an account with a fake identity to deceive a concrete person
- The process of transforming ciphertext into its original plaintext
- Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
- Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
- Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
- Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms
61 Clues: ___-Party Information • A cybersecurity company • A dishonest scheme; a fraud • Hosting city of Fal.Con; abbr • Short form for "cryptography" • CrowdStrike threat hunting team • CrowdStrike's CEO and co-founder; abbr • A generic term encompassing decode and decipher • The generic term encompassing encipher and encode • The process of transforming plaintext into ciphertext • ...
FITDVocab.MS 2013-05-15
Across
- Where you would plug in games, keyboard, and a mouse
- Where you would plug in a flash drive
- The way things are arranged
- A brief description of your self you would fill out in you were applying for a job or a school
- Upgrade your computer
- A picture owned by a company
- An app that you can download
- 1,000 zettabytes
- Parts that let you control your computer
- Protect information and networks
- Screen
- A cloud based software the uses one canvas instead of traditional slides
- a port that allows a computer to connect to a network
- 8 bits
- 1,000 exabytes
- Is the newer and more common type of clock
- The shape or size of a document or something you can customize
- 1,000 petabytes
- a port for headphones
- Is the older type of clock
- Service Set Identifier
- 1,000 megabytes
Down
- A readable file
- A selection of drawing or editing tools on a program
- A phrase or word owned by a company
- An object on a computer that stores data or docs.
- An already made design for a document
- PC-Windows/Mac-Osx
- A device that is mobile
- device that makes it possible to transmission of data
- A place you can save docs and use anywhere
- 1,000 gigabytes
- 1,000 kilobytes
- Way you behave online
- 1,000 yottabytes
- Rules and behavior to keep your computer safe
- 1,000 brontobytes
- Heart of the computer
- 1,000 terabytes
- Central Processing Unit
- Long term memory
- Short term memory
- Comcast
- 1,000 bytes
- wireless Fidelity
- The first and smallest data storage
46 Clues: Screen • 8 bits • Comcast • 1,000 bytes • 1,000 exabytes • A readable file • 1,000 gigabytes • 1,000 kilobytes • 1,000 terabytes • 1,000 petabytes • 1,000 megabytes • 1,000 zettabytes • 1,000 yottabytes • Long term memory • 1,000 brontobytes • Short term memory • wireless Fidelity • PC-Windows/Mac-Osx • Upgrade your computer • Way you behave online • Heart of the computer • a port for headphones • ...
FIT_ Vocab.MGB 2013-05-16
Across
- the heart of a computer
- a plan or design
- zoomable online presentation program
- a written document of what experience you have
- the right to make copies
- things you download onto your computer, phone, or pad
- protection of information on the internet
- it sends the user requests for other search engines
- a navigation tool that you use to go on websites
- a three folded pamphlet that tells about a company
- a file format that is meant for pictures
- somewhere where you can see the format of a doc
- things that have to do with a computer
- an internet provider
- a template that you can type on easily
- the act to induct into office
- a motto or something a company says to get your attention
- wireless internet
- something you plug into your computer
- to restart your computer
- flash drive mouse keyboard
- a name, symbol, or trademark
- a program that controls a display for the user
- random memory for your computer
- smallest unit of data on a computer
Down
- the arrangement of data on a document
- someone who sells space for websites
- a file having a present format
- the setup of a computer
- wired internet
- Google Bing! Yahoo
- something you can create on
- the rules or behavior to keep you safe online
- how to act online
- a online memory storing device that can be accessed anywhere
- iphone droid blackberry
- to tell people about someone's product or service
- the main processing unit
- a device that shows information
- wireless networking tech
- to help a company grow
- word excel powerpoint
- a company that helps keep you safe online
43 Clues: wired internet • a plan or design • how to act online • wireless internet • Google Bing! Yahoo • an internet provider • word excel powerpoint • to help a company grow • the heart of a computer • the setup of a computer • iphone droid blackberry • the right to make copies • the main processing unit • to restart your computer • wireless networking tech • flash drive mouse keyboard • ...
Tech puzzle 2023-03-02
Across
- Primary memory is also known as _______ memory.
- What is a document sent with with an email message called?
- ________________ hyperlink is a saved link to a particular web page.
- Which technology is used in Brahmastra movie?
- Visual display unit is also called _____________
- Protection of computer system and information from harm theft and unauthorised use.
- _______is considered as one of the universal gates.
- The primary component of a computer that acts as its “control center.”
- An incredibly powerful tool used to get meaning out of vast amounts of data
- The initial program that runs when a computer is powered up or rebooted.
- ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
Down
- A chatbot developed by openAI and launched in November 2022
- _________ protects your computer from viruses and hackers
- _______________ reality is the integration of digital information with live video.
- What is temporarily stored on your computer?
- What technology was used in avengers end game?
- go Give one example of a game that used unity and C#
- A software program that allows you to surf the web.
- _______ is the way of sending messages over the Internet.
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- What is the #1 social media app?
- What protects your computer from hackers?
- call An interrupt triggered by a software.
- Smallest unit of measurement in computing
25 Clues: What is the #1 social media app? • What protects your computer from hackers? • Smallest unit of measurement in computing • call An interrupt triggered by a software. • What is temporarily stored on your computer? • Which technology is used in Brahmastra movie? • What technology was used in avengers end game? • Primary memory is also known as _______ memory. • ...
UPC 2023-04-23
Across
- The act of buying or selling goods or services online
- The process of protecting computer systems and networks from unauthorized access
- A software program used to create and edit digital images
- The amount of money required to start or operate a business
- A person who starts and runs a business
- The act of selling goods or services to another country
- A written agreement between two or more parties
- The process of promoting a product or service through paid advertising
- The difference between a company's assets and liabilities
- A software program that performs a specific task
- A type of authentication that uses a physical characteristic of the user, such as a fingerprint or iris scan
Down
- A type of legal protection for creative works
- A type of software used to create and edit spreadsheets
- A system of record-keeping and financial reporting for businesses
- A programming language used to create web pages and web applications
- A system used to store and organize data
- The process of bringing a new product or service to market
- The process of converting raw materials into finished goods
- A network of computers that allows users to share resources and information
- A type of software that provides security for a computer network
- The process of finding and fixing errors in code
- The total amount of money a company has made from its operations
- A type of software that translates computer code into machine-readable instructions
- The act of purchasing goods or services from another country
- A program that protects a computer from viruses and other malicious software
25 Clues: A person who starts and runs a business • A system used to store and organize data • A type of legal protection for creative works • A written agreement between two or more parties • The process of finding and fixing errors in code • A software program that performs a specific task • The act of buying or selling goods or services online • ...
AP Computer Science Review 2021-05-24
Across
- manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation
- the use of a computer to represent the dynamic responses of one system by the behavior of another system modeled after it.
- a whole number
- a technique that attempts to trick a user into providing personal information
- data about data.
- software intended to damage a computing system or to take partial control over its operation
- a detailed yet readable description of what a computer program or algorithm must do.
- measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
- the delay between a user's action and a web application's response to that action
- the process of decoding data.
- is the practice of obtaining input or information from a large number of people via the Internet.
- study of securing (or encrypting) information such that it is inaccessible by third parties.
Down
- transmission of data from one computer to another, or from one device to another.
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- the ability to limit access to information to a certain set of users.
- either true or false.
- a base-16 number system.
- the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
- the process of encoding data to prevent unauthorized access.
- a network of servers that track the IP addresses of different domain names like “example.com”
- a base-2 number system.
21 Clues: a whole number • data about data. • either true or false. • a base-2 number system. • a base-16 number system. • the process of decoding data. • the process of encoding data to prevent unauthorized access. • the ability to limit access to information to a certain set of users. • a technique that attempts to trick a user into providing personal information • ...
BRIANA & MATTHEW 2022-05-26
Across
- city where Briana’s first project as Construction PM was located
- Name of restaurant the couple went to on their first date (note: they ate in the car because they were running late to the movie)
- The ______: the nickname given to the house in which Matthew lived during his junior year of college
- name Matthew called Briana until they started dating
- winter sport Matthew helped to teach Briana
- TV show the couple has watched at least 7 times through
- City where the couple got engaged; beach town Briana visited with her dad during summers
- City in which Matthew lived at the time the couple adopted their eldest dog
- Briana’s nickname for Matthew
- acronym of the college Briana attended for undergraduate and Matthew attended for graduate
- college Matthew attended for his undergraduate degree
- city the couple first officially lived together
- Full name of the couple’s eldest dog
- city the couple currently live in
- matthew’s eye color
Down
- type of engineering Briana studied in college
- The couple’s favorite football team
- Sport Briana played in high school
- Matthew’s undergraduate degree was for _____ _____ engineering
- City in Arizona where both Briana and Matthew lived when they met
- name of the junior high school the couple attended together
- During college, Briana worked at this LA landmark as a research library and archives assistant
- State in which Matthew was born and lived until the family moved to Arizona
- mascot of the high school the couple attended together
- Sport Matthew played in high school and college
- Name of the couple’s youngest dog
- matthew’s favorite cuisine
- number of countries they have visited together (US not included)
- briana’s eye color
29 Clues: briana’s eye color • matthew’s eye color • matthew’s favorite cuisine • Briana’s nickname for Matthew • Name of the couple’s youngest dog • city the couple currently live in • Sport Briana played in high school • The couple’s favorite football team • Full name of the couple’s eldest dog • winter sport Matthew helped to teach Briana • ...
Customer Service Week Crossword 2023-10-03
Across
- Closing a _________ closes all the children.
- a holiday for us but not for financial institutions
- email address for notification intended for all employees
- __________ Expertise Efficiency. Every day. Every time.
- set your Non-Ready code to this 15 minutes prior to leaving to complete any end of day tasks.
- Teams channel for technical and non-technical information that everyone should be aware of
- actions you take to resolve an issue that should be documented in the ticket
- Not-Ready code to be used for time spent investigating an open ticket while the customer is not on the phone
- takes calls during non-staffed hours
- updates to major system outages should be sent at least _________
- The ________ Email Report Template is used to document suspicious emails reported by users.
- used for instant messaging
- ticket management tool used by the Support Center
Down
- _________ Downtime procedures should be followed for outages of any major system in the BEPC environment.
- the on-call contact should be notified off issues needing immediate attention even during _________ hours.
- An engineering contact during non-staffed hours
- call center front end used by Support Center to take calls
- considered a major system in the BEPC environment
- If it’s not in the _______, it didn’t happen.
- a problem with a major system impacting multiple users or departments
- required monthly cybersecurity training
- SysAid template to be used for any caller who reports to Jolene Johnson
- subject line tag for notifications that application or system has resumed normal operations
- “Done” is never an acceptable one.
- Send a ticket to ________ Support if no SA group exists for that software.
25 Clues: used for instant messaging • “Done” is never an acceptable one. • takes calls during non-staffed hours • required monthly cybersecurity training • Closing a _________ closes all the children. • If it’s not in the _______, it didn’t happen. • An engineering contact during non-staffed hours • considered a major system in the BEPC environment • ...
Internet Safety 2025-02-26
Across
- Someone who uses the internet, email, or other electronic communications devices to repeatedly threaten and harass another person.
- Identity Theft Using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- The practice whereby a group of people assault a stranger at random while filming the incident on a mobile device
- The action or behavior used to establish an emotional connection with a vulnerable person
- Criminal activities carried out by means of computers or the internet
- Footprint The unique trail of data that a person or business creates while using the internet.
- Writing in ALL CAPS.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
Down
- To alter (a digital image) with Photoshop software or other image-editing software
- A frequently updated web page used for personal commentary or business content.
- An informal conversation.
- Flaming The act of posting angry or insulting messages
- Unauthorized reproduction or distribution of someone's intellectual property without their consent.
- The practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- The correct or acceptable way of communicating on the internet.
- The use of technology to harass, threaten, embarrass, or target another person.
- A person who ruthlessly exploits others.
- A piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
- Settings Controls available on many websites and apps to limit who can access your profile
- The practice of protecting systems, networks, and programs from digital attacks
20 Clues: Writing in ALL CAPS. • An informal conversation. • A person who ruthlessly exploits others. • Flaming The act of posting angry or insulting messages • The correct or acceptable way of communicating on the internet. • Criminal activities carried out by means of computers or the internet • A frequently updated web page used for personal commentary or business content. • ...
Engineering and Technological World 2025-04-30
Across
- Term used to collectively refer to the atmosphere and outer space
- Tiny programmable chips
- Factory robots to automate processes
- Digital overlay on reality
- Immersive digital world
- Virtual system replica
- Massive datasets
- Mix of mechanics and electronics
- Miniature technology
- Modeling structural load behavior
- Electricity network that uses digital and other advanced technologies to monitor and manage the transport of electricity
- Smart connected devices
- Extracting insights from data
- How humans use computers
- Secure digital ledger
- Act of teaching AI robots
- Path for transmitting electric current
- Allows devices in remote locations to process data at the "edge" of the network
- A microprocessor based computer hardware system with a dedicated function
- Secure communication coding
Down
- AI driven repairs
- Energy Sustainable earth friendly energy
- Vehicles Self driving cars
- Remote data storage
- Usage of autonomous machines
- Process of creating a physical object from a digital design
- Smartwatches, fitness trackers, different type of body monitors
- Study of heat and energy
- Problem solving procedure
- Light enabled technological systems
- Study of how objects move through air
- Flying devices used for hobbies and war
- Developing new substances
- Latest wireless network
- Fluid powered systems
- Tool used for digital design
- Study of engineering and biology
- Computers utilizing quantum physics
- Space based communication
- Simulated human technology
- Study of internet safety
- Study of machines
- Silicon chip material
- Infrastructure design
- Brain inspired artificial intelligence
45 Clues: Massive datasets • AI driven repairs • Study of machines • Remote data storage • Miniature technology • Fluid powered systems • Silicon chip material • Infrastructure design • Secure digital ledger • Virtual system replica • Tiny programmable chips • Immersive digital world • Latest wireless network • Smart connected devices • Study of heat and energy • Study of internet safety • ...
Tugas daring juang mario/15 2025-04-24
Across
- Jenis konten yang mengandung kebencian, kekerasan, atau diskriminasi.
- Proses mengidentifikasi dan menghapus konten yang berbahaya dari platform digital.
- Hak atas penggunaan nama, logo, atau simbol dagang tertentu.
- Profesi yang berfokus pada analisis data dan menemukan wawasan dari data tersebut.
- Konten digital dalam bentuk gambar bergerak yang banyak ditemukan di YouTube.
- Orang yang merancang dan mengatur tampilan antarmuka pengguna pada aplikasi atau situs
- Hak eksklusif atas karya tulis, lagu, atau film.
- Profesi yang mengatur dan memelihara infrastruktur jaringan komputer di perusahaan
- Proses awal sebelum produksi konten, termasuk ide, riset, dan perencanaan.
- Proses mengoptimalkan website agar muncul di hasil teratas pencarian.
- Hak atas penemuan atau inovasi teknologi
- Mesin pencari paling populer milik perusahaan teknologi besar di Amerika.
Down
- Alat atau aplikasi yang digunakan untuk mendeteksi konten palsu atau manipulasi media
- Kepanjangan dari Hak Atas Kekayaan
- Alat atau sistem yang digunakan untuk menemukan informasi di internet berdasarkan kata kunci.
- Proses untuk memeriksa kebenaran atau kesahihan konten di internet, baik itu gambar, teks, atau video.
- Nama algoritma penilai halaman web yang diperkenalkan oleh pendiri Google.
- Tujuan utama dari menyebarkan konten digital adalah untuk meningkatkan ini terhadap suatu brand.
- Informasi digital seperti teks, gambar, atau video yang dipublikasikan secara online.
- Lembaga resmi yang mengurus pendaftaran HAKI di Indonesia.
- Metode yang digunakan untuk memastikan apakah sebuah berita atau informasi benar-benar terjadi atau hanya hoaks.
- Media seperti Instagram, TikTok, dan Facebook yang digunakan untuk menyebarkan konten.
- Langkah awal mesin pencari menjelajahi dan mengumpulkan data situs web.
- Orang yang bertugas menjaga keamanan data dan jaringan dari ancaman
- Profesi yang membuat dan mengembangkan program komputer.
25 Clues: Kepanjangan dari Hak Atas Kekayaan • Hak atas penemuan atau inovasi teknologi • Hak eksklusif atas karya tulis, lagu, atau film. • Profesi yang membuat dan mengembangkan program komputer. • Lembaga resmi yang mengurus pendaftaran HAKI di Indonesia. • Hak atas penggunaan nama, logo, atau simbol dagang tertentu. • ...
“Family Life in a Changing World” 2025-03-27
Across
- The process of choosing the best options for family well-being
- Earning an income by running a business instead of working for someone
- Protecting family data and privacy when using the internet
- The main financial provider in a household
- The amount of work a person has in a job or at home
- Relying on others for financial or emotional support
- The connection and time spent between family members
- When individuals, including children, take responsibility for themselves
- Meaningful interactions that strengthen family relationships
- Maintaining stability between work, home, and personal life
- Emotional pressure caused by job demands and family responsibilities
- The ability of families to adjust to economic and technological changes
- Setting aside money for future family needs
- Planning and managing household income and expenses
- The exchange of information between family members
Down
- The people living together and sharing responsibilities in a home
- Buying and selling goods and services online for income
- The ability to adjust work and home responsibilities easily
- Money sent home by family members working overseas
- Tools and devices that help families communicate and work efficiently
- Using social connections to find jobs or grow a business
- A person who starts and manages their own business
- The responsibilities of each family member in managing the home
- Money earned from work or business to support the family
- Organizing tasks to ensure family and work responsibilities are met
- Online platforms used for work, school, or family communication
- The responsibilities and challenges of raising children
- Services or arrangements made for children when parents are working
- Movement of individuals to other countries for job opportunities
29 Clues: The main financial provider in a household • Setting aside money for future family needs • Money sent home by family members working overseas • A person who starts and manages their own business • The exchange of information between family members • The amount of work a person has in a job or at home • Planning and managing household income and expenses • ...
Tugas Informatika Terakhir 2025-05-26
Across
- Sistem transportasi cerdas yang mengurangi kemacetan, mencerminkan prinsip tidak boros (QS. Al-A’raf: 31).
- Prinsip keadilan dalam pembangunan smart city, sesuai QS. Al-Hadid: 25 tentang Allah menyuruh berlaku adil.
- Platform digital untuk pendidikan Islam dalam smart city.
- Teknologi untuk sholat berjamaah virtual dalam smart city.**
- Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12).
- Konsep partisipasi masyarakat dalam smart city, seperti syura dalam QS. Asy-Syura: 38.
- Teknologi yang digunakan untuk mengoptimalkan sumber daya air dalam smart city, disebut dalam Al-Quran sebagai karunia Allah (QS. Al-Mu’minun: 18).
- Konsep pengelolaan sampah cerdas yang sejalan dengan prinsip kebersihan dalam Islam (QS. Al-Baqarah: 222).
- Konsep kota yang aman dan nyaman, seperti dalam QS. An-Nahl: 112 tentang negeri yang aman dan makmur.
- Teknologi sensor untuk memantau kebersihan air wudhu di masjid cerdas, sesuai hadis "Kebersihan sebagian dari iman".
Down
- Sistem informasi terpadu dalam smart city, seperti dalam QS. Al-An’am: 59 tentang ilmu Allah yang luas.
- Konsep berbagi data untuk kebaikan bersama, seperti sedekah dalam Islam (QS. Al-Baqarah: 261).
- Konsep smart city yang mendorong kebaikan dan mencegah kemungkaran (QS. Ali Imran: 104).
- Sistem pengelolaan data warga berbasis KTP digital yang sejalan dengan prinsip transparansi (QS. Al-Baqarah: 282 tentang pencatatan transaksi).
- Kota masa depan dalam Islam yang makmur dan berkelanjutan.
- Teknologi untuk memantau energi terbarukan, sejalan dengan QS. Ya Sin: 80 tentang api dari kayu hijau.
- Platform digital untuk membayar zakat, infaq, dan sedekah secara online dalam smart city (QS. At-Taubah: 60).
- Konsep kota berkelanjutan yang mengoptimalkan energi matahari, seperti dalam QS. Yasin: 80 tentang cahaya Allah.
- Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam.
- Teknologi untuk pertanian cerdas, disebutkan dalam QS. Abasa: 24-32 tentang biji-bijian.
20 Clues: Platform digital untuk pendidikan Islam dalam smart city. • Kota masa depan dalam Islam yang makmur dan berkelanjutan. • Teknologi untuk sholat berjamaah virtual dalam smart city.** • Kota suci yang bisa menjadi contoh smart city berbasis nilai Islam. • Konsep keamanan digital dalam Islam, melindungi privasi (QS. Al-Hujurat: 12). • ...
Shayna’s graduation! 2025-05-19
Across
- Shayna goes to UMD, but more specifically the College of ________.
- The formal name for the ceremony where Shayna becomes a college grad
- The name of Shayna’s first college roommate
- The MVP behind Shayna’s graduation. (And everything else.)
- The UMD commencement speaker
- Did Shayna live on North or South campus freshman year?
- The day Michelle and Seth’s life got a lot more expensive
- The name that Shayna calls her sister
- What Shayna is beyond thankful for
- By the end of Senior year, all students at UMD jump in the ________.
- white or red wine?
- The Latin honor Shayna is graduating with
- The mascot of UMD
- What year of college did Kayla Becker just finish? So proud!
- What is Shayna’s go-to alcohol? (Sorry mommy)
Down
- Where Seth once dreamed Shayna would go, but now knows Maryland was always meant to be.
- The field of study Mordechai is in school for right now (and is working really hard at!)
- Shayna’s apartment unit number
- The ______ is the grassy field with fountains and graduation photo ops.
- Michelle will 100% check this app 6 times on the way to Xfinity Center—just in case.
- The name of UMD’s mascot
- What Seth wants to start up at the Kabbalah Centre
- Where Shayna often spends Shabbat lunch
- When Michelle tells people about Mordechai, she says “He is Jewish AND he ______!”
- Shayna’s go-to bar in college
- Which tower is Shayna’s college apartment?
- Official title of Shayna’s minor
- The library Shayna would study at
- Shayna’s Major
- The people who paid for Shayna’s diploma
- What sorority was Shayna in?
- The first name of Shayna’s landlord
- The mascot of the school Seth originally planned for his daughter to go to
33 Clues: Shayna’s Major • The mascot of UMD • white or red wine? • The name of UMD’s mascot • The UMD commencement speaker • What sorority was Shayna in? • Shayna’s go-to bar in college • Shayna’s apartment unit number • Official title of Shayna’s minor • The library Shayna would study at • What Shayna is beyond thankful for • The first name of Shayna’s landlord • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Policy-based accept or deny of network traffic.
- Code examination performed without running the malicious program.
- Gaining unauthorized access to a secured area by following an authorized person.
- Injecting malicious scripts into webpages viewed by other users
- Cloud-based vulnerability management platform with scanning and reporting.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Process of transforming information into a scrambled format to secure it.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Matching known patterns of threats against security event data to find potential matches.
Down
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Security documentation that details system resource usage by users and processes for auditing.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that overwhelm a target system or network with a flood of traffic
- Criminal use of the internet or other electronic means to persistently harass an individual.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16
Across
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Code examination performed without running the malicious program.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Process of transforming information into a scrambled format to secure it.
- Matching known patterns of threats against security event data to find potential matches.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Policy-based accept or deny of network traffic.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Gaining unauthorized access to a secured area by following an authorized person.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle FJ3 -17.10.25 Duration :15 mins Marks:20 2025-10-16
Across
- Attack that uses a list of commonly used words or phrases to guess a password.
- Injecting malicious scripts into webpages viewed by other users
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Matching known patterns of threats against security event data to find potential matches.
- Gaining unauthorized access to a secured area by following an authorized person.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Policy-based accept or deny of network traffic.
Down
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Process of transforming information into a scrambled format to secure it.
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Code examination performed without running the malicious program.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Cloud-based vulnerability management platform with scanning and reporting.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Attacks that overwhelm a target system or network with a flood of traffic
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Process of transforming information into a scrambled format to secure it. • Attacks that overwhelm a target system or network with a flood of traffic • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
- Code examination performed without running the malicious program.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Process of transforming information into a scrambled format to secure it.
- Matching known patterns of threats against security event data to find potential matches.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Cloud-based vulnerability management platform with scanning and reporting.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
Down
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Policy-based accept or deny of network traffic.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- Gaining unauthorized access to a secured area by following an authorized person.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Security documentation that details system resource usage by users and processes for auditing.
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
CrossWord Puzzle FJ3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Criminal use of the internet or other electronic means to persistently harass an individual.
- Network security appliances that monitor traffic for malicious activity and automatically take action to stop threats.
- Policy-based accept or deny of network traffic.
- Field essential for gathering evidence of hacking, fraud, and online harassment for legal proceedings
- A formal process used to identify, analyze, and evaluate potential threats to an organization's IT infrastructure.
- Gaining unauthorized access to a secured area by following an authorized person.
- Process of transforming information into a scrambled format to secure it.
- Security documentation that details system resource usage by users and processes for auditing.
- Cybersecurity discipline focused on the continuous cycle of identification, assessment, and response to IT infrastructure risks.
- Code examination performed without running the malicious program.
Down
- Event where confidential or sensitive information is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
- Matching known patterns of threats against security event data to find potential matches.
- Cloud-based vulnerability management platform with scanning and reporting.
- Attacks that overwhelm a target system or network with a flood of traffic
- Injecting malicious scripts into webpages viewed by other users
- Forensic utilities essential for preserving the integrity of digital evidence by creating exact copies of media.
- Decoy system or resource meant to be probed, attacked, or compromised, primarily for intelligence gathering.
- Attack that uses a list of commonly used words or phrases to guess a password.
- Graphic object used in reports to visualize the correlation between an object and its performance.
- Attacks that leverage a vulnerability on the same day the vendor becomes aware of it.
20 Clues: Policy-based accept or deny of network traffic. • Injecting malicious scripts into webpages viewed by other users • Code examination performed without running the malicious program. • Attacks that overwhelm a target system or network with a flood of traffic • Process of transforming information into a scrambled format to secure it. • ...
Psnjan26 2026-01-25
Across
- L An old, clunky computer system that a company is still trying to use.
- D Digging through piles of information to find useful facts or trends.
- B A massive amount of information that computers study to find helpful patterns.
- F A digital "security guard" that blocks dangerous traffic from entering a network.
- E Scrambling information into a secret code so only the right person can read it.
- C Using the internet to store files instead of saving them on your own computer.
- C Tools and habits used to keep hackers away from your private data.
- A A digital bridge that lets two different apps share information with each other.
- M When a computer practices a task over and over to get better at it on its own.
- B Using your face or fingerprint to unlock an app or prove who you are.
- S A safe "practice zone" where developers test new ideas without breaking anything.
- U How easy or enjoyable it feels to use a specific app or website.
- B The hidden "brain" of an app where the data is stored and managed.
Down
- G The digital "checkout counter" that sends your credit card info to the bank.
- I When different apps or devices are able to work together without any issues.
- S Software you pay for monthly to use online, like Netflix or Microsoft 365.
- A A list of instructions a computer follows to finish a task or make a choice.
- M Building a large app by connecting many tiny, separate programs together.
- F The part of an app you can actually see, touch, and click on.
- O Software that is free for anyone to look at, change, or share.
20 Clues: F The part of an app you can actually see, touch, and click on. • O Software that is free for anyone to look at, change, or share. • U How easy or enjoyable it feels to use a specific app or website. • C Tools and habits used to keep hackers away from your private data. • B The hidden "brain" of an app where the data is stored and managed. • ...
COE Crossword Mania 2025-12-14
Across
- Iconic white coat worn by SCBE and MSE students during experiments
- Common abbreviation for tutorial sessions in NTU engineering modules
- Essential EEE lab tool for visualizing voltage signals over time
- Iconic lecture theatre in Nanyang Avenue, often used for COE finals
- NTU school merging engineering with biotech and healthcare innovation
- Interdisciplinary field led by MAE and EEE for building intelligent machines
- wire Safety practice in circuits—connected to zero voltage reference
- Hands-on space in N4 for capstone projects and student startups
- Final Year Project—the capstone engineering experience for all COE seniors
- NTU engineering school known for circuits, power, and semiconductors
- Identity of every NTU COE student solving real-world problems
Down
- Core engineering subject on fluid behavior—key for MAE and CEE students
- Popular software used in EEE and MAE for PCB and circuit design
- NTU school focused on sustainable infrastructure and water systems
- Symbolic CEE field equipment; also a beloved orientation camp prop
- ching tuan LT Lecture theatre near North Spine, home to many engineering tutorials
- NTU school designing everything from drones to jet engines
- School studying smart materials, nanotechnology, and advanced composites
- Programming language widely used in COE for data analysis and automation
- COE academic corridor housing EEE, MAE, MSE, and SCBE
- Core theme of NTU’s sustainable engineering and campus vision
- Fundamental concept in EEE—paths for current flow and system design
- SCBE’s teaching lab for biochemical and biomedical engineering practicals
- Process of fixing errors in code, circuits, or capstone prototypes
- Nickname for Thermodynamics, the challenging but foundational COE module
- NTU’s Cybersecurity Research Centre under the College of Engineering
26 Clues: COE academic corridor housing EEE, MAE, MSE, and SCBE • NTU school designing everything from drones to jet engines • Core theme of NTU’s sustainable engineering and campus vision • Identity of every NTU COE student solving real-world problems • Popular software used in EEE and MAE for PCB and circuit design • ...
COE Crossword Mania 2025-12-14
Across
- Essential EEE lab tool for visualizing voltage signals over time
- Core theme of NTU’s sustainable engineering and campus vision
- NTU school designing everything from drones to jet engines
- Popular software used in EEE and MAE for PCB and circuit design
- Symbolic CEE field equipment; also a beloved orientation camp prop
- Identity of every NTU COE student solving real-world problems
- Programming language widely used in COE for data analysis and automation
- Core engineering subject on fluid behavior—key for MAE and CEE students
- NTU engineering school known for circuits, power, and semiconductors
- Hands-on space in N4 for capstone projects and student startups
- Lecture theatre near North Spine, home to many engineering tutorials
- Fundamental concept in EEE—paths for current flow and system design
- COE academic corridor housing CEE, MAE, MSE, and SCBE
- Iconic white coat worn by SCBE and MSE students during experiments
- Common abbreviation for tutorial sessions in NTU engineering modules
Down
- Interdisciplinary field led by MAE and EEE for building intelligent machines
- NTU school focused on sustainable infrastructure and water systems
- Final Year Project—the capstone engineering experience for all COE seniors
- SCBE’s teaching lab for biochemical and biomedical engineering practicals
- NTU school merging engineering with biotech and healthcare innovation
- Process of fixing errors in code, circuits, or capstone prototypes
- wire Safety practice in circuits—connected to zero voltage reference
- NTU’s Cybersecurity Research Centre under the College of Engineering
- School studying smart materials, nanotechnology, and advanced composites
- Iconic lecture theatre in Nanyang Avenue, often used for COE finals
- Nickname for Thermodynamics, the challenging but foundational COE module
26 Clues: COE academic corridor housing CEE, MAE, MSE, and SCBE • NTU school designing everything from drones to jet engines • Core theme of NTU’s sustainable engineering and campus vision • Identity of every NTU COE student solving real-world problems • Popular software used in EEE and MAE for PCB and circuit design • ...
hi 2022-09-28
Across
- A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
- A generic term encompassing decode and decipher
- Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
- Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
- The service provider for CrowdStrike's internal training courses
- The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
- Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
- CrowdStrike's CEO and co-founder; abbr
- The property of being accessible and usable upon demand
- Computer compromised with malicious code; used by a threat actor to perform remote commands
- Hosting city of Fal.Con; abbr
- Someone who uses a social network to create an account with a fake identity to deceive an individual
- Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
- As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
- System of prevention and recovery from potential threats to a business; abbr
- As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- An unauthorized user who attempts to or gains access to an information system
- Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
- CrowdStrike's annual cybersecurity convention; "___.Con"
- Software that compromises the operation of a system by performing an unauthorized function or process
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
- Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
- A way to take advantage of a vulnerability in software
- A cybersecurity company
- The generic term encompassing encipher and encode
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- The process of verifying the identity or other attributes of an entity
Down
- Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
- A denial of service technique that uses numerous systems to perform the attack simultaneously
- A recognizable, distinguishing pattern; typically used to sign documents
- Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
- Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
- Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
- Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
- ___-Party Information
- Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
- A capability to limit network traffic between networks and/or information systems
- Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
- In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
- The process of transforming plaintext into ciphertext
- Type of analysis that determines what levels of impact to a system are tolerable; abbr
- Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- CrowdStrike threat hunting team
- Intranet webpage for all things CrowdStrike-related; abbr
- Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
- Cryptographic network protocol for operating network services securely over an unsecured network; abbr
- A dishonest scheme; a fraud
- CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
- Short form for "cryptography"
- When someone uses a social network to create an account with a fake identity to deceive a concrete person
- The process of transforming ciphertext into its original plaintext
- Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
- Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
- Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
- Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms
61 Clues: ___-Party Information • A cybersecurity company • A dishonest scheme; a fraud • Hosting city of Fal.Con; abbr • Short form for "cryptography" • CrowdStrike threat hunting team • CrowdStrike's CEO and co-founder; abbr • A generic term encompassing decode and decipher • The generic term encompassing encipher and encode • The process of transforming plaintext into ciphertext • ...
internet basics 2024-01-18
Across
- A global network of interconnected computers that enables the sharing of information and resources.
- Media: Online platforms that enable users to create and share content, communicate, and connect with others.
- To transfer data from a local device to a remote server over the internet.
- A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
- Electronic mail that allows users to send and receive messages and files over the internet.
- A
- The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
- To transfer data from a remote server to a local device over the internet.
Down
- Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
- Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
- The buying and selling of goods and services over the internet.
- Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
- A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
- Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
14 Clues: A • The buying and selling of goods and services over the internet. • To transfer data from a local device to a remote server over the internet. • To transfer data from a remote server to a local device over the internet. • Electronic mail that allows users to send and receive messages and files over the internet. • ...
Cyber Test 2025-03-12
Across
- A Social Engineering technique that uses a fake promise to pique a victim's curiosity or greed.
- What is the name of the cybersecurity firm that has faulty software update on July 2024 and causes Global IT outage.
- Part of Social Engineering Life Cycle that identifies the victim & gathering their background information.
- It is the most targetted sector in the Philippines.
- A malicious software installed on a computing device without the end users knowledge.
- According to SimilarWeb Ranking, what is the top visited website as of February 2025.
Down
- A type of malware created to deny a user or organization access to files on their computer and will ask money for decryption.
- Occurs when a harmful code is injected into legitimate online advertising networks, and the code redirects users to malicious websites.
- Refers to a wide range of malicious activities carried out through human interactions.
- Refers to the unauthorized transfer or theft of sensitive, confidential, or private data from a computer system.
- Part of Social Engineering Life Cycle that occurs by forming a relationship and initiating communication to build trust.
- It is a type of malware that usually spreads in spam emails and malicious links.
- Is a type of malware designed to scare you into taking action.
- It is a advertisement-supported software helps generate revenue for its developers by automatically displaying adverts on your screen, typically within a web browser.
14 Clues: It is the most targetted sector in the Philippines. • Is a type of malware designed to scare you into taking action. • It is a type of malware that usually spreads in spam emails and malicious links. • A malicious software installed on a computing device without the end users knowledge. • ...
Digital Transformation Crossword 2018-04-02
Across
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- The intersection of marketing and technology in today's highly digital business world
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- Intelligence demonstrated by machines
- The protection of computer systems from the theft and damage
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- The range of interactions that patients have with the health care system, including their care from health plans
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- Websites and applications that enable users to create and share content or to participate in social networking
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
Down
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Creating relevant and consistent connections between offline and online media in real time
- A cross-channel business model and content strategy that companies use to improve their user experience
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
- Enhancing healthcare delivery and support using telecommunications technologies
- Computer oriented crime
- The practice that aims at unifying software development and software operation
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
Securing your work, home and your digital footprint! 2020-10-06
Across
- someone pretending to be someone,such as your boss, friend etc.. sends a email intending to gain money or information from a fake email address.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- electronic device for storing an processing data
- Choose a password that is easy for you to _____but hard for someone to guess.
- Cybersecurity is a shared ________
- it IS VERY IMPORTANT to use strong privacy settings on ________.
- These devices are used to direct information between public and private networks
Down
- is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's identity
- ALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESK
- DO NOT LEAVE YOUR LAPTOP OR COMPUTER______.
- system of interrelated,internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
- Device that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
- _____is an attempt by an individual or group to trick you into giving personal information by employing social engineering techniques through email.
- An option you can use to protect your credit.
- networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- Technology used to connect to a public network through a secure tunnel.
- ____Uses cellphone text messages to induce people to divulge their personal information
- ROVER12345 would be a bad example of a _____
- For a password to be secure, it should contain upper and lower case letters,numbers and ______.
19 Clues: Cybersecurity is a shared ________ • DO NOT LEAVE YOUR LAPTOP OR COMPUTER______. • ROVER12345 would be a bad example of a _____ • An option you can use to protect your credit. • electronic device for storing an processing data • ALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESK • it IS VERY IMPORTANT to use strong privacy settings on ________. • ...
Terminologies in RA 10175 2023-10-25
Across
- refers to the computer systems, and/or networks, whether physical or virtual
- refers to the mathematical algorithm produced against digital information
- refers to any representation of facts, information,
- refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- refers to any information contained in the form of computer data or any other form that is held by a service provider
- refers to the willful engagement, maintenance, control or operation, directly or indirectly,
- refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data
- refers to the application of investigative and analytical techniques that conform to evidentiary standards
Down
- refers to any computer data other than the content of the communication
- refers to a set of instructions executed by the computer to achieve intended results
- refers to any name or number that may be used alone or in conjunction with any other information to identify any specific individual,
- refers to the modification or change, in form or substance, of an existing computer data or program
- refers to the keeping of data that already exists in a stored form
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices
- refers to evidence, the use of which is sanctioned by existing rules of evidence
- refers to the person who created or is the origin of the assailed electronic statement or post using a computer system;
- refers to digital information that may be used as evidence in a case.
- also known as a forensic copy
- refers to gathering and receiving information
20 Clues: also known as a forensic copy • refers to gathering and receiving information • refers to any representation of facts, information, • refers to the keeping of data that already exists in a stored form • refers to digital information that may be used as evidence in a case. • refers to any computer data other than the content of the communication • ...
Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11
Across
- A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
- A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
- The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
- _____-force attack is a technique used to guess a password by trying many possible combinations
- Gain access to someone else’s computer or device without permission
- The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
- Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
- An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
- Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
- A location on the internet where you can save your data (rather than on your computer or device)
Down
- A program or device used to detect and prevent unauthorized access to a network
- A sequence of characters (or words) used to stop criminals from accessing your accounts
- A method of protecting data by converting it into unreadable code that only authorized parties can read
- Malicious software that could harm your computer or gadget
- What is a form of malware that monitors and records a user's activities without their knowledge?
- A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
- A security incident where sensitive information is leaked to the public is a data ______
- ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor
18 Clues: Malicious software that could harm your computer or gadget • Gain access to someone else’s computer or device without permission • A program or device used to detect and prevent unauthorized access to a network • The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge) • ...
ADSI Cristian Niño 2022-06-01
Across
- Set of physical or material elements that constitute a computer or a computer system
- area of science that is responsible for studying the administration of methods, techniques and processes in order to store, process and transmit information and data in digital format
- Set of programs and routines that allow the computer to perform certain tasks
- relational database management system developed under dual license: General Public License/Commercial License by Oracle Corporation
- set of computers capable of handling requests from a client and returning a response accordingly
- is the use of a network of remote servers connected to the internet to store, manage and process data, servers, databases, networks and software
- arrangement and order of the parts within a whole
Down
- Program capable of storing large amounts of data, related and structured
- programming language and a computing platform that was first commercialized in 1995 by Sun Microsystems
- set of elements that are combined following certain rules and that are semantically interpretable, which allows information to be exchanged
- sum of techniques, skills, methods and processes used in the production of goods or services or in the achievement of objectives, such as scientific research
- a person who writes computer programs
- branch of applied physics that encompasses physics, engineering, technology, and applications dealing with the emission, flow, and control of electrons
- is the practice of protecting important systems and sensitive information from digital attacks
- worldwide interconnected computer network in the form of a spider web consisting of servers
15 Clues: a person who writes computer programs • arrangement and order of the parts within a whole • Program capable of storing large amounts of data, related and structured • Set of programs and routines that allow the computer to perform certain tasks • Set of physical or material elements that constitute a computer or a computer system • ...
Cybersecurity Awareness Month - Acronym Edition 2022-10-07
Across
- An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
- A system turns domain names into IP addresses
- A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
- Also called a "black cloud"
Down
- A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
- A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
- A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
- Provide outsourced monitoring and management of security devices and systems
8 Clues: Also called a "black cloud" • A system turns domain names into IP addresses • Provide outsourced monitoring and management of security devices and systems • A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online • ...
Cybersecurity Awareness Puzzle 4 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 6 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
SET 5 2023-01-22
Across
- Programming language whos design turned out to be general enough to address a wide variety of domains but slow in execution
- The practice of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction
Down
- A set of step-by-step instructions for solving a problem or completing a task, like a recipe for cooking a meal
- A component of a computer that controls its performance, like the foreman of a construction site, it supervises the work of all the other parts
- A network of remote servers that are used to store, manage, and process data
5 Clues: A network of remote servers that are used to store, manage, and process data • A set of step-by-step instructions for solving a problem or completing a task, like a recipe for cooking a meal • Programming language whos design turned out to be general enough to address a wide variety of domains but slow in execution • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- Contain tracking information for an individual email
- Fraud like Phishing, but it comes as a text message or SMS
- It is a deceptive scheme or trick used to cheat someone out of something
- It is merely an email trying to convince you to do something
- It is a phone scam designed to get your personal information by impersonating
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- Threat that involves sending email messages with a fake sender address
- It is just like Phishing but it only targets specific individuals within an organization
Down
- It is news or knowledge received or given
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- It is a type of email attack where bad people are trying to steal your precious information
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- Unsolicited bulk messages normally from people trying to sell something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: It is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • ...
