cybersecurity Crossword Puzzles
CSAM Crossword 1 2023-06-26
Across
- Acceptable Use policies often cover bring-your-own-device (or _____) rules as well.
- One way to avoid suspicious popups in your web browser is through the use of a popup _____.
- When it comes to communications made in your name, only _____ are accountable.
- any software designed by cybercriminals to harm or exploit a device or network is called:
- Organizations can monitor your email and _____ while at work.
- You should never leave fresh documents unattended at the _____.
- One of the most common ways to get users to click on bad links is through _____ windows.
- If you find documents at the printer containing sensitive information, you should shred the documents and _____ the incident.
Down
- When posting pictures to social media, make sure no sensitive information can be seen in the _____
- make sure to follow all organizational _____ when reporting suspicious behavior
- You should never _____ links that you don't recognize; this applies to personal and professional settings.
- The quickest way to verify if an email from a coworker is phishing, is to _____ the coworker on the phone and confirm the details of the email.
- When you give an app permission to access your social media profile, it can attain any of the _____ you share.
- Personal devices can be used for work only if it complies with the _____ use policy.
- Never share sensitive, personal, or organizational information over _____ wifi networks.
- One of the best cybersecurity practices for making a new password is to never _____ old passwords
- if you receive an email that you suspect to be fishing, you should notify your IT _____ department
17 Clues: Organizations can monitor your email and _____ while at work. • You should never leave fresh documents unattended at the _____. • When it comes to communications made in your name, only _____ are accountable. • make sure to follow all organizational _____ when reporting suspicious behavior • ...
Crossword Puzzle 2025-05-21
Across
- A deceptive attempt to obtain sensitive information, such as usernames and passwords, by impersonating a trustworthy entity in electronic communication.
- A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- An attack that attempts to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- A security method where access is granted only after successfully presenting two or more pieces of evidence.
- A person who gains unauthorized access to computer systems, often with malicious intent.
- The practice of protecting computer systems and networks from digital attacks and threats.
- A system designed to prevent unauthorized access to or from a private network.
- A set of rules for communication between devices on a network.
- A digital certificate used to verify the identity of a website or email sender.
Down
- Unauthorized access to a computer system or network.
- A security measure that monitors and controls network traffic, acting as a barrier against unauthorized access.
- A program that appears legitimate but performs malicious activities in the background.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A secret string of characters used to verify a user's identity when logging into a system.
- A software vulnerability that allows a hacker to gain administrative control over a target system.
- A program that can replicate itself and spread to other computers, often causing damage.
17 Clues: Unauthorized access to a computer system or network. • A set of rules for communication between devices on a network. • A system designed to prevent unauthorized access to or from a private network. • A digital certificate used to verify the identity of a website or email sender. • ...
Hoverstate - April Crossword 2022-04-18
Across
- Hoverstate’s Italy office location
- Oregon Train, This computer game developed in 1971 was designed to teach 8th grade school children about the realities of 19th-century pioneer life heading west
- mining, the process of examining and analyzing large amounts of data to find patterns and use these patterns to get a better insight in the collected data (2 words)
- programs that mimic human like interactions
- Recognition, the concept of translating human speech into text that can be understood by computers (2 words)
- Recognition, part of computer science where computers turn the spoken word of a human into text (2 words)
- Gates, visionary co-founder of Microsoft (2 words)
- Learning, a type of Artificial Intelligence which gives computer programs the ability to learn from new data without being explicitly programmed to do so (2 words)
- Interface, the parts of an application, website, computer etc. which the user can manipulate (2 words)
- 1983 movie where a high schooler accidentally hacks a military installation running a missile-command supercomputer called the WOPR
- assurance, this role ensures that the final product observes the company's quality standards (2 words)
- the replacement of technologically advanced people with people-literate platforms or technology
Down
- a software solution company founded in 2009
- system architect, this role is responsible for designing, implementing, and maintaining databases and critical computer systems (3 words)
- Matrix, this 1999 blockbuster depicts a dystopian future in which humanity is unknowingly trapped inside a simulated reality (2 words)
- Robot, this novel by Isaac Asimov weaves stories about robots, humanity, and the deep questions of existence (2 words)
- a new type of database which is distributed not just in one place and encrypted by default
- Jobs, visionary co-founder of Apple (2 words)
- this maze action video game was developed for arcades in 1980 and kept you busy avoiding Blinky, Pinky, Inky, and Clyde
- being protected against criminal or unauthorized use of electronic data, or the measures taken to achieve this
- a cloud computing–based data warehousing company
- Experience, how the user feels, emotions they get and the ease-of-use when interacting with a product or service (2 words)
22 Clues: Hoverstate’s Italy office location • a software solution company founded in 2009 • programs that mimic human like interactions • Jobs, visionary co-founder of Apple (2 words) • a cloud computing–based data warehousing company • Gates, visionary co-founder of Microsoft (2 words) • ...
Prince FRM 2024-07-15
Across
- Insurance companies assess exposure to claims from natural disasters like earthquakes or cyclones.
- Adani Enterprises evaluates risks related to government policies affecting infrastructure projects and investments.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues affecting customer satisfaction.
- RBI monitors risks that could destabilize the entire financial system, such as banking sector crises or economic recessions.
- Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio.
- Reliance Industries faces litigation over environmental compliance impacting public perception and regulatory approvals.
- Zomato manages public perception during controversies over food quality affecting user trust and market share.
- Mahindra & Mahindra evaluates its ability to secure short-term financing for working capital needs during economic slowdowns.
- Rate Tata Steel deals with currency fluctuations impacting revenue from international steel sales.
- Indian Oil Corporation assesses geopolitical stability before expanding refining operations in new global markets.
- Nestle India assesses risks of disruptions in the supply of dairy and agricultural products impacting production.
Down
- Paytm faces disruptions in payment processing due to technical glitches during high-volume transactions.
- Rate Bajaj Finance manages exposure to fluctuations in interest rates impacting loan profitability.
- NTPC evaluates risks related to environmental regulations impacting thermal power plant operations.
- HDFC Standard Life ensures adherence to new insurance regulations impacting policy sales and operations.
- TCS reviews the accuracy of financial models used for risk assessment and project estimation.
- Infosys assesses overdependence on revenue from a few large clients in its IT services business.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- Marico evaluates exposure to changes in raw material prices affecting profit margins in FMCG sector.
- Hindustan Unilever manages risks associated with fluctuating prices of palm oil affecting production costs.
20 Clues: Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio. • TCS reviews the accuracy of financial models used for risk assessment and project estimation. • Infosys assesses overdependence on revenue from a few large clients in its IT services business. • ...
Vocabulary Reviews 2025-03-26
Across
- Tailoring products, services, or experiences to meet the specific preferences of individual customers
- A formal agreement between two or more parties to work together toward common goals while maintaining their independence.
- The process of completing an order by preparing and delivering it to the customer.
- Giving people the power or confidence to make their own choices and decisions
- The practice of establishing and nurturing professional relationships to exchange information and opportunities.
- A dialogue aimed at reaching an agreement between two or more parties with differing interests.
- Practices designed to protect computers and networks from unauthorized access or attacks
- A relationship where an experienced person helps another develop their skills and knowledge
- A business approach where customers pay a recurring fee to receive a product or service regularly
Down
- Being responsible for something, especially in terms of legal obligations or debts.
- A place where people buy and sell goods or services, often online.
- Actions taken to reduce the severity or impact of a risk
- The act of obtaining control over another company by purchasing its shares or assets
- The capacity to recover quickly from difficulties or setbacks
- Being responsible for your actions and willing to explain them to others
- a contract that provides financial protection against specific risks or losses
- A retail method where the seller does not keep products in stock but instead transfers customer orders to a supplier who ships directly to the buyer
- A Thorough examination of financial records and operations to ensure accuracy and compliance
- combined effect produced by two or more entities that is greater than the sum of their individual effects.
19 Clues: Actions taken to reduce the severity or impact of a risk • The capacity to recover quickly from difficulties or setbacks • A place where people buy and sell goods or services, often online. • Being responsible for your actions and willing to explain them to others • Giving people the power or confidence to make their own choices and decisions • ...
Digital Transformation Crossword 2018-04-02
Across
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- The intersection of marketing and technology in today's highly digital business world
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Enhancing healthcare delivery and support using telecommunications technologies
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
- Websites and applications that enable users to create and share content or to participate in social networking
- Creating relevant and consistent connections between offline and online media in real time
Down
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- The range of interactions that patients have with the health care system, including their care from health plans
- The protection of computer systems from the theft and damage
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
- A cross-channel business model and content strategy that companies use to improve their user experience
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- Computer oriented crime
- Intelligence demonstrated by machines
- The practice that aims at unifying software development and software operation
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
MEDIA AND INFORMATION LITERACY 2024-09-01
Across
- The legal right granted to the creator of original work to control its use and distribution.
- False or misleading information spread without the intent to deceive.
- An inclination or preference that affects impartial judgment, leading to skewed or unfair perspectives.
- News False or misleading news stories created to gain attention or deceive readers.
- Privacy The protection of personal data from unauthorized access or use.
- A reference to the source of information or ideas used in research or writing.
- Media Platforms and websites that enable users to create, share, and interact with content.
- Measures taken to protect computers, networks, and data from attacks or damage.
- Footprint The trail of data that individuals leave behind when using digital devices or the internet.
- A visual representation of information or data designed to make complex information easier to understand.
- The openness of information sources and the clarity about how information is obtained and presented.
Down
- Information, often biased or misleading, used to promote a particular political cause or point of view.
- Literacy The ability to access, analyze, evaluate, and create media in various forms.
- The use of various forms of content, such as text, images, audio, and video, to convey information.
- Literacy The ability to recognize when information is needed and to locate, evaluate, and use it effectively.
- Literacy The skills required to effectively and critically navigate, evaluate, and create information using digital technologies.
- The quality of being trusted and believed in, often based on evidence or expertise.
- The process of verifying the accuracy of information before presenting or sharing it.
- Thinking The ability to analyze information objectively and make reasoned judgments.
- The practice of using someone else's work or ideas without proper acknowledgment.
20 Clues: False or misleading information spread without the intent to deceive. • Privacy The protection of personal data from unauthorized access or use. • A reference to the source of information or ideas used in research or writing. • Measures taken to protect computers, networks, and data from attacks or damage. • ...
Vallari FRM 2024-07-16
Across
- NTPC evaluates risks related to environmental regulations impacting thermal power generation and emissions control.
- Dabur India assesses risks of disruptions in sourcing herbal ingredients impacting production of Ayurvedic products.
- Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours.
- RBI monitors risks that could destabilize the entire banking sector, such as economic downturns or liquidity crises.
- Biocon reviews dependency on a few key drug patents affecting revenue stability in biopharmaceuticals.
- Insurance companies assess exposure to claims from natural disasters like cyclones or floods impacting claims processing.
- Adani Green Energy evaluates risks associated with government policies impacting renewable energy projects.
- Titan Company manages risks associated with fluctuating gold prices impacting jewelry manufacturing costs.
Down
- Kotak Mahindra Bank assesses the risk of default by retail borrowers in its personal loan portfolio.
- Mahindra & Mahindra evaluates exposure to fluctuations in commodity prices affecting profitability in agricultural machinery manufacturing.
- Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations.
- BigBasket navigates consumer trust issues during data privacy concerns impacting online grocery sales.
- Zee Entertainment faces litigation over copyright infringement affecting broadcasting rights and viewer engagement.
- Sun Pharma assesses geopolitical stability before expanding pharmaceutical manufacturing operations in new global markets.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues impacting passenger satisfaction and flight schedules.
- Wipro deals with currency fluctuations impacting revenue from global IT services contracts.
- JSW Steel manages liquidity to meet debt obligations amidst fluctuating cash flows from steel production.
- L&T Finance Holdings reviews the accuracy of financial models used for risk assessment and loan underwriting.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- HDFC Life Insurance manages exposure to changes in interest rates impacting investment returns on policyholder funds.
20 Clues: Wipro deals with currency fluctuations impacting revenue from global IT services contracts. • Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations. • Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours. • ...
technology 2023-06-07
Across
- is a form of computer memory that can be read and changed in any order
- s a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device
- is a method of representing data in a visual, machine-readable form. Initially
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg
- s a collection of discrete values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network
- is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of,
- is a commonly used method of lossy compression for digital images
- is a digital multimedia container format most commonly used to store video and audio
- is a file format developed by Adobe in 1992 to present documents
Down
- is a mobile operating system
- is an American multinational technology company
- A binary code represents text, computer processor instructions
- is the most important processor in a given computer
- is a hardware or software component that stores data so that future requests for that data can be served faster
- is a type of computer program that, when executed
- is a mapping from some domain for example, a range of integers
- is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on June 15, 1987.
19 Clues: is a mobile operating system • is an American multinational technology company • is a type of computer program that, when executed • is the most important processor in a given computer • A binary code represents text, computer processor instructions • is a mapping from some domain for example, a range of integers • ...
Digital Transformation Crossword 2018-04-02
Across
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- Intelligence demonstrated by machines
- The protection of computer systems from the theft and damage
- A cross-channel business model and content strategy that companies use to improve their user experience
- The range of interactions that patients have with the health care system, including their care from health plans
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- The practice that aims at unifying software development and software operation
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- Computer oriented crime
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
Down
- Websites and applications that enable users to create and share content or to participate in social networking
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- Enhancing healthcare delivery and support using telecommunications technologies
- Creating relevant and consistent connections between offline and online media in real time
- The intersection of marketing and technology in today's highly digital business world
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
BIM Vocab 2024-12-12
Across
- Not permitted; Unlawful.
- One of two or more words or expressions of the same language that have the same or nearly the same meaning in some or all senses.
- A flat usually paper container (as for a letter).
- Computer hardware or software that prevents unauthorized access to private data (as on a company’s local area network or intranet) by outside computer users (as of the internet).
- A private computer network that functions over a public network.
- Social methods (such as phishing) that are used to obtain personal or confidential information which can then be used illicitly.
- The practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly.
- A computer program enabling the user to enter or alter text.
- A software that is installed in a computer or mobile device without the user’s knowledge and that transmits information about the user’s activities.
- A book or electronic resource that lists words or groups of synonyms and related concepts.
- For a word processor, a device intended to improve or perfect what is already there.
Down
- The practice of collecting, organizing, storing, and sharing information to support decision making and create value for organizations, communities, and societies.
- A direct or personal written or printed message addressed to a person or organization.
- To mark directions for delivery.
- Measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.
- A word of opposite meaning.
- The person sending correspondence.
- To give permission or approval.
- The numeric address of a computer on the internet.
19 Clues: Not permitted; Unlawful. • A word of opposite meaning. • To give permission or approval. • To mark directions for delivery. • The person sending correspondence. • A flat usually paper container (as for a letter). • The numeric address of a computer on the internet. • A computer program enabling the user to enter or alter text. • ...
Ai Ethics 2022-02-15
3 Clues: Estimates that by 2030, 30% of all jobs will be automated. • This one of the major concerns of companies, especially in the governmental and financial services sector. • safety __________ and the reduction of crime rates are the greatest justifiers for the use of this technology.
Health Care Technology 2025-08-25
Across
- An event with a probable impact on care and operations, requiring a written incident response program to ensure ongoing safe and high-quality services
- Customizable forms and data fields often applied to electronic health records, whose proper use, including copy-and-paste and autofill functions, requires staff education
- A fraudulent act, often involving emails, used to obtain personal or organizational information, requiring cybersecurity strategies to reduce exposure
Down
- Acronym for technology or information systems used to enhance clinical decision-making for healthcare practitioners, requiring monitoring and evaluation
- This type of personal electronic device, when used for patient data, necessitates specific policies and procedures for the protection of patient information
- The act of converting information or data into a code to prevent unauthorized access, a key method for maintaining data confidentiality
6 Clues: The act of converting information or data into a code to prevent unauthorized access, a key method for maintaining data confidentiality • An event with a probable impact on care and operations, requiring a written incident response program to ensure ongoing safe and high-quality services • ...
Champions Site Trivia 2023-03-15
Across
- How many “Infosec champion newsletter” entries were sent in 2022 (Write your answer in words with no space)
- What session was conducted by Kenneth Baron for Capability & Build Session for June’2022 (Write your answer with no space)
- At what level an Infosec champion will get an opportunity to have a tea/coffee with the Infosec leadership(Sriram Lakshmanan)
- How many influencers do we have in the Infosec Champions program (Write your answer in words with no space)
Down
- Who was invited in Cybersecurity podcast series to joined us to discuss on – “The effect of human behavior in cyber" (Write your answer in words with no space)
- Beware of any unsolicited caller who asks for sensitive information like _ . (Write your answer in words with no space)
6 Clues: How many “Infosec champion newsletter” entries were sent in 2022 (Write your answer in words with no space) • How many influencers do we have in the Infosec Champions program (Write your answer in words with no space) • Beware of any unsolicited caller who asks for sensitive information like _ . (Write your answer in words with no space) • ...
Information Technology Crossword Puzzle 64 - Cybersecurity 2022-09-27
Across
- Is software that has been created to intentionally cause damage
- Involves malicious human interaction where people don’t tell the truth and they manipulate others to divulge personal information
- Pay attention to these that don’t have content or look like they are coming from a spoofed address
- Is an act of masquerading as a valid entity through falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain
- Is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
Down
- A type of malware that infects a network or steals confidential data and then demands something (typically currency of some sort) in exchange for access to systems
- Running these often will keep applications current and help protect your computer
- Is the act of surreptitiously listening to a private computer "conversation" (communication), typically between hosts on a network
- Hackers throw a line out there hoping that someone will bite, and when they do, the hacker steals sensitive information like passwords, credit card numbers and more
- Holding on to the same usage of this for ages isn’t a great idea
10 Clues: Is software that has been created to intentionally cause damage • Holding on to the same usage of this for ages isn’t a great idea • Running these often will keep applications current and help protect your computer • Pay attention to these that don’t have content or look like they are coming from a spoofed address • ...
Browsing safely 2025-05-28
Cybersecurity Fundamentals Chapter 2 Part 2 2022-11-24
Across
- requires a set of checks before allowing a device to connect to a network.
- allows users to gain access to application software and databases. Cloud providers manage the infrastructure.
- programs and services that protect operating systems, databases, and other services operating on workstations, portable devices, and servers.
- shift the technology component from the organization to the cloud provider.
Down
- run inside a virtual environment with a pre-packaged
- includes the implementation of authentication and encryption.
- appliances that are installed within the network faculties.
- secure virtual network that uses the public network.
- provides virtualized computing resources over the Internet.
- developed a comprehensive framework to guide information security management.
10 Clues: run inside a virtual environment with a pre-packaged • secure virtual network that uses the public network. • appliances that are installed within the network faculties. • provides virtualized computing resources over the Internet. • includes the implementation of authentication and encryption. • ...
Security Crossword Puzzle 2020-02-08
Across
- Establishes the standard procedures and requirements for all government contractors, with regards to classified information.(Acronym)
- Giving a spoken or written account of something that one has observed, heard, done, or investigated.
- Any breach of security regulations, requirements, procedures or guidelines(2 Words)
- Denoting or relating to a principle or policy of telling people only what is deemed necessary for them to know in order to carry out a task effectively.(3 Words)
- Information which can be used to distinguish or trace the identity of an individual(Acronym)
Down
- Information or material whose unauthorized disclosure could be expected to cause exceptionally grave damage to national security.(2 Words)
- Refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- A current or former employee, who has or had authorized access to an organization's network, system, or data and intentionally misused that access to negatively affect the organization's information or information systems.(2 Words)
- Websites and applications that enable users to create and share content or to participate in social networking.(2 Words)
9 Clues: Any breach of security regulations, requirements, procedures or guidelines(2 Words) • Information which can be used to distinguish or trace the identity of an individual(Acronym) • Giving a spoken or written account of something that one has observed, heard, done, or investigated. • ...
ORG Game 2023-07-14
Across
- (General Data Protection Regulation): A comprehensive data protection regulation in the EU that sets out rules for the processing and handling of personal data.
- neutrality: The principle that all internet traffic should be treated equally by internet service providers, without discrimination or preference.
- Intelligence: The ability of machines or computer systems to mimic or simulate human intelligence, often used in various digital applications and services.
- Espionage Act: UK legislation that criminalizes unauthorized access to computer material with the intent to commit an offense. (3 letters)
- Access to Information Regulation: An EU regulation that aims to ensure the accessibility of public sector websites and mobile applications.
Down
- A term referring to measures or actions taken to monitor individuals without their consent.
- to be Forgotten: A ruling by the European Court of Justice that allows individuals to request the removal of personal information from search engine results under certain circumstances.
- Act 2000: UK legislation that regulates the interception of communications and the acquisition and disclosure of communications data.
- Sharing: The unauthorised distribution of copyrighted material over the internet, typically through peer-to-peer networks.
9 Clues: A term referring to measures or actions taken to monitor individuals without their consent. • Sharing: The unauthorised distribution of copyrighted material over the internet, typically through peer-to-peer networks. • Act 2000: UK legislation that regulates the interception of communications and the acquisition and disclosure of communications data. • ...
Digital Transformation Crossword 2018-04-02
Across
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- Computer oriented crime
- The range of interactions that patients have with the health care system, including their care from health plans
- Enhancing healthcare delivery and support using telecommunications technologies
- Intelligence demonstrated by machines
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- The myriad IT resources provided over the internet; Digital data stored in logical pools
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
- A cross-channel business model and content strategy that companies use to improve their user experience
Down
- The practice that aims at unifying software development and software operation
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- The protection of computer systems from the theft and damage
- Creating relevant and consistent connections between offline and online media in real time
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- The intersection of marketing and technology in today's highly digital business world
- Websites and applications that enable users to create and share content or to participate in social networking
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
Nishant FRM 2024-07-15
Across
- Tata Power evaluates regulatory changes impacting renewable energy projects and carbon emissions.
- Maruti Suzuki assesses risks of disruptions in the supply of auto components impacting production schedules.
- Flipkart faces disruptions in e-commerce operations due to technical failures during peak shopping seasons.
- RBI monitors risks that could destabilize the entire banking sector, such as liquidity crises or economic recessions.
- Reliance Industries assesses overdependence on revenue from petrochemicals in its diversified business portfolio.
- Insurance companies assess exposure to claims from natural disasters like cyclones or floods.
- ONGC evaluates government policies impacting oil exploration projects in sensitive ecological zones.
- ITC manages risks associated with volatile prices of agricultural commodities used in its food and tobacco products.
Down
- State Bank of India assesses the creditworthiness of borrowers in its corporate lending portfolio.
- Infosys monitors exposure to fluctuations in global IT spending impacting service revenue.
- HDFC Bank ensures adherence to new banking regulations impacting loan approval processes.
- Amul manages public perception during food safety controversies affecting dairy product sales.
- Hindustan Unilever faces litigation over product safety regulations impacting consumer trust in its FMCG products.
- Mahindra & Mahindra assesses political stability and economic conditions before expanding manufacturing operations abroad.
- IndiGo Airlines deals with flight delays due to technical faults affecting passenger satisfaction.
- Tata Consultancy Services deals with currency fluctuations affecting revenue from international IT services contracts.
- Tata Motors evaluates the ability to raise short-term funds to meet operational expenses during economic downturns.
- Axis Bank reviews the accuracy of financial models used for risk assessment and capital allocation.
- Wipro strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- ICICI Prudential Life Insurance manages exposure to fluctuations in interest rates affecting investment returns.
20 Clues: HDFC Bank ensures adherence to new banking regulations impacting loan approval processes. • Infosys monitors exposure to fluctuations in global IT spending impacting service revenue. • Insurance companies assess exposure to claims from natural disasters like cyclones or floods. • ...
BIM Vocab 2024-12-12
Across
- Not permitted; Unlawful.
- One of two or more words or expressions of the same language that have the same or nearly the same meaning in some or all senses.
- A flat usually paper container (as for a letter).
- Computer hardware or software that prevents unauthorized access to private data (as on a company’s local area network or intranet) by outside computer users (as of the internet).
- A private computer network that functions over a public network.
- Social methods (such as phishing) that are used to obtain personal or confidential information which can then be used illicitly.
- The practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly.
- A computer program enabling the user to enter or alter text.
- A software that is installed in a computer or mobile device without the user’s knowledge and that transmits information about the user’s activities.
- A book or electronic resource that lists words or groups of synonyms and related concepts.
- For a word processor, a device intended to improve or perfect what is already there.
Down
- The practice of collecting, organizing, storing, and sharing information to support decision making and create value for organizations, communities, and societies.
- A direct or personal written or printed message addressed to a person or organization.
- To mark directions for delivery.
- Measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.
- A word of opposite meaning.
- The person sending correspondence.
- To give permission or approval.
- The numeric address of a computer on the internet.
19 Clues: Not permitted; Unlawful. • A word of opposite meaning. • To give permission or approval. • To mark directions for delivery. • The person sending correspondence. • A flat usually paper container (as for a letter). • The numeric address of a computer on the internet. • A computer program enabling the user to enter or alter text. • ...
Puzzle No. 2 2022-09-08
Across
- A common type of memorized secret, characterized by a string of characters used to verify the identity of a user during the authentication process.
- Ensuring that authorized users have access to information and associated assets when required.
- These fix general software problems and provide new security patches where criminals might get in.
- A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
- Sentence-like format of password which is strong but easier to remember.
- A weakness in your security policy, implementation, design, and controls.
- Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
- You should not write down your password in this type of physical medium.
Down
- A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
- Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
- Ensuring that information is accessible only to those authorized to have access.
- An event that will cause harm to you or your asset.
- A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
- ”________ is everyone’s responsibility”.
- Safeguarding the accuracy and completeness of information.
15 Clues: ”________ is everyone’s responsibility”. • An event that will cause harm to you or your asset. • Safeguarding the accuracy and completeness of information. • Sentence-like format of password which is strong but easier to remember. • You should not write down your password in this type of physical medium. • ...
Virus Crossword 2 2017-11-28
Across
- Short for distributed denial of service.
- Messages distributed by electronic means from one computer user to one or more recipients via a network.
- Irrelevant/innapropriate messages sent to a large number of people through through the internet.
- A program designed to breach the security of a computer system while ostensibly performing some innocuous function.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
- A self-replicating program able to propagate itself across a network, typically having a detrimental effect.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Software that is intended to damage or disable computers and computer systems.
- The programs and other operating information used by a computer.
- To request confidential information over the internet or by telephone under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.
- Being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Someone who uses programs to gain unauthorized access to a computer and its data.
- A fast spreading virus that is distributed as an attachment on an email.
15 Clues: Short for distributed denial of service. • The programs and other operating information used by a computer. • A fast spreading virus that is distributed as an attachment on an email. • Software that is intended to damage or disable computers and computer systems. • Someone who uses programs to gain unauthorized access to a computer and its data. • ...
Cyber Society 2024-04-29
Across
- A set of instructions or rules followed by a computer to solve a problem or perform a task.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A software vulnerability that is exploited by attackers before the software developer becomes aware of it.
- Measures taken to protect computer systems and networks from unauthorized access or attacks.
- Footprint: The trail of data created by an individual's online activity.
- Software intended to damage or disable computers or computer systems.
Down
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, used for criminal activities.
- The study of communication and control processes in biological, mechanical, and electronic systems, especially the comparison of these processes in biological and artificial systems.
- A person who uses computers to gain unauthorized access to data.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
- Bullying that takes place over digital devices like cell phones, computers, and tablets.
- Web: Part of the internet that is not indexed by search engines and often associated with illegal activities.
- The process of converting data into a code to prevent unauthorized access.
- Reality: A computer-generated simulation of an environment that can be interacted with in a seemingly real or physical way.
- Theft: The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
15 Clues: A person who uses computers to gain unauthorized access to data. • Software intended to damage or disable computers or computer systems. • Footprint: The trail of data created by an individual's online activity. • The process of converting data into a code to prevent unauthorized access. • ...
Cybersecurity Fundamental Chapter 8 Part 1 2024-06-05
Across
- Security professionals who simulate cyberattacks on systems to identify vulnerabilities.
- Includes all hardware devices such as desktops, laptops, tablets, and smartphones connected to the network, which are vulnerable to various security threats.
- Experts who monitor and analyze security measures to protect an organization's information systems.
- Services hosted by cloud providers, including SaaS, PaaS, and IaaS, where organizations must protect their resources within the cloud environment.
- Programs aimed at educating users about security policies, risks, and best practices to mitigate threats.
- A network domain consisting of interconnected devices within a limited area, requiring strong security measures to protect against unauthorized access and data breaches.
Down
- The study of ethical issues and the impact of computer technology on individuals and society.
- The realm encompassing all users accessing an organization's information system, often considered the weakest link in security.
- Legislation and regulations that govern the behavior and measures required to protect information and information systems.
- Refers to private cloud services and infrastructure accessible to an organization via the internet, posing threats like unauthorized access and network probing.
10 Clues: Security professionals who simulate cyberattacks on systems to identify vulnerabilities. • The study of ethical issues and the impact of computer technology on individuals and society. • Experts who monitor and analyze security measures to protect an organization's information systems. • ...
Safety & Security Day: Cybersecurity test 1 2025-07-23
Across
- Making data unreadable to unauthorised people.
- Software that harms your computer.
- Protects your computer from viruses and attacks.
- Action taken when uploading confidential data to ChatGPT.
- Sensitivity Labeling : Ali needs to send his payslip to his personal email.
Down
- Mandatory connection method for remote access to Maxis systems.
- System to request an exception to use Canva for a marketing project.
- Sensitivity Labeling : A Maxis employee is sending document includes internal cost assessments and timelines.
- Sensitivity Labeling : An engineer needs to share network drawings and site maintenance schedules with an authorized contractor.
- A secret word used to access an account.
10 Clues: Software that harms your computer. • A secret word used to access an account. • Making data unreadable to unauthorised people. • Protects your computer from viruses and attacks. • Action taken when uploading confidential data to ChatGPT. • Mandatory connection method for remote access to Maxis systems. • ...
Safety & Security Day: Cybersecurity test 2 2025-07-25
Across
- Prohibited tools for processing PDFs or Excel files.
- System to request exceptions for blocked apps like Google Drive.
- Label for sharing network drawings with authorized contractors.
- Label for internal project budgets or cost assessments.
Down
- Required step to protect data before sharing externally.
- Label for personal documents like payslips sent to personal emails.
- Required for secure internet access when working remotely.
- Approved collaboration tool for secure file sharing within Maxis.
- Data type (e.g., IC numbers) banned from sharing via WhatsApp/Telegram.
- Action taken when uploading confidential data to ChatGPT.
10 Clues: Prohibited tools for processing PDFs or Excel files. • Label for internal project budgets or cost assessments. • Required step to protect data before sharing externally. • Action taken when uploading confidential data to ChatGPT. • Required for secure internet access when working remotely. • Label for sharing network drawings with authorized contractors. • ...
Ai Ethics 2022-02-15
3 Clues: Estimates that by 2030, 30% of all jobs will be automated. • This one of the major concerns of companies, especially in the governmental and financial services sector. • safety __________ and the reduction of crime rates are the greatest justifiers for the use of this technology.
Computer Network Lingo 2024-10-15
Across
- A network that links computers/devices within a person's immediate vicinity.
- Network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
- Measures taken to protect a computer system against unauthorized access or attack.
- Connected to the Internet using signals transmitted by radio waves rather than over wires.
- Transmits data over a high-speed, high-bandwidth communication network.
- A measurement indicating the maximum capacity of the data transfer rate or capacity of a given network.
- Wireless Fidelity. A wireless networking technology that uses radio waves to provide wireless high-speed Internet.
- Basic unit of data that's grouped together and transferred over a computer network.
- A link between a plug or connector into a port or jack.
- Network that is wireless and spread over land areas called cells, each served by at least one tower.
Down
- A network that connects computer networks and computer facilities around the world.
- Connected to the Internet using a wire.
- Any data transmitted over a network that is for human interpretation.
- A way of scrambling data so that only authorized parties can understand the information.
- Open Systems Interconnection Model. A conceptual framework (7 layers) that describes how different computer systems communicate with each other inside a network.
- The act of identifying and then exploiting weaknesses in a network to gain unauthorized access to data.
- A computer network that extends over a large geographic area, usually connecting multiple local area networks (LANs).
- A collection of devices connected together in one physical location, such as a building, office, or home.
18 Clues: Connected to the Internet using a wire. • A link between a plug or connector into a port or jack. • Any data transmitted over a network that is for human interpretation. • Transmits data over a high-speed, high-bandwidth communication network. • A network that links computers/devices within a person's immediate vicinity. • ...
Crossword 2024-05-13
Across
- The field of knowledge and practices aimed at protecting computer systems, programs, and data from cyberattacks, theft, and unauthorized access.
- A set of rules and tools that allows programs to interact with each other.
- A model of cloud services that provides organizations with data and application recovery after emergencies.
- Action or interference taken to change or correct a process, situation, or behavior.
- The process of using up resources or goods, both in an economic and general sense.
- An individual or organization holding a current position or status in the market or society.
- Processes and technologies used to prevent the use of financial systems for the legalization of proceeds from criminal activities.
Down
- The combination of knowledge, skills, processes, and methods used to create products, services, and systems to meet human needs.
- A decentralized database used to store records of transactions, providing security, transparency, and immutability of data.
- The process of converting information using mathematical algorithms to make it unreadable to unauthorized users.
- A cryptocurrency based on blockchain technology, proposed in 2008 within a paper by Satoshi Nakamoto.
- A diversity or wide range of different elements, categories, or types.
- A procedure or set of instructions designed to solve a specific problem or perform a particular type of computation.
- At the beginning stage or at the moment of starting a specific process or event.
- To seize power, position, or right unlawfully, usually by force or deceit.
- A global standard for payment card security, based on the use of microchips to reduce fraud risks.
16 Clues: A diversity or wide range of different elements, categories, or types. • A set of rules and tools that allows programs to interact with each other. • To seize power, position, or right unlawfully, usually by force or deceit. • At the beginning stage or at the moment of starting a specific process or event. • ...
Health Care Fiji 2025-08-25
Across
- The distribution of health-related services and information via electronic information and telecommunication technologies, allowing for long-distance clinician contact, care, advice, and monitoring
- A secure online website that allows patients to access their personal health information over the Internet
Down
- The processes and procedures developed and maintained by hospitals to protect valuable patient information against digital attacks and manage associated risks
- An interruption of data systems, whether planned or unplanned, that can significantly impact patient care and hospital operations, requiring a specific program for response
- An optical radiation device for which hospitals must establish and implement a safety program for its safe use in performing procedures and treatments
- The acronym for electronic systems designed for documentation and sharing of patient health information, part of health information technology
6 Clues: A secure online website that allows patients to access their personal health information over the Internet • The acronym for electronic systems designed for documentation and sharing of patient health information, part of health information technology • ...
INFORMATION TECHNOLOGY 2021-06-28
Across
- the study of computer algorithms that improve automatically through experience and by the use of data.
- the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
- a branch of computer science dealing with the simulation of intelligent behavior in computers.
- the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks
Down
- an artificial intelligence (AI) function that imitates the workings of the human brain in processing data and creating patterns for use in decision making. Subset of Machine learning
- field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from structured and unstructured data
- the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
- developing a Web site for the Internet or an intranet.
8 Clues: developing a Web site for the Internet or an intranet. • a branch of computer science dealing with the simulation of intelligent behavior in computers. • the study of computer algorithms that improve automatically through experience and by the use of data. • ...
Can You Guess the Fraud? 2022-09-16
Across
- __________ fraud is a type, rather than an act, where fraudsters use a highly targeted approach and impersonate corporate/trusted identities to solicit financial payments and/or sensitive information.
- Cybersecurity attack carried over mobile text messaging to obtain sensitive data
- ______________ is an act of fraudulently obtaining private and personal information by tricking recipient to open malicious links, attachments or sharing data with insecure websites.
- ___________ fraud refers to instances where an individual who believes to be in a genuine relationship is defrauded by the offender for financial gains.
- The fraudulent practice of using someone’s personal information in order to gain money, goods or sensitive information is known as __________ Theft
Down
- Making an unauthorised purchase/transaction using someone’s credit/debit card details or banking account is an example of ________ fraud.
- Any type of fraudulent activity or scam executed through platforms such as Instagram, Facebook, Linkedin, Twitter, etc are classified as _____ _____ fraud
- _____ fraud occurs when bills are fabricated and disguised as legitimate to extract money.
8 Clues: Cybersecurity attack carried over mobile text messaging to obtain sensitive data • _____ fraud occurs when bills are fabricated and disguised as legitimate to extract money. • Making an unauthorised purchase/transaction using someone’s credit/debit card details or banking account is an example of ________ fraud. • ...
cybersecurity 2023-10-24
Week 3 Check In 2021-02-05
Across
- fried quickly in a little hot fat.
- A machine or device that performs processes, calculations, and operations based on instructions provided by a software or hardware program.
- The norms of appropriate, responsible behavior with regard to the use of technology.
- mixing pliable dough by stretching, folding and pushing in order to form gluten in the flour. The gluten is required for proper bread rising, as it forms elastic strands that keep the gases in the dough enabling the dough to rise.
Down
- The protection against access to, or alteration of, computing resources through the use of technology, processes, and training.
- A type of application software designed to run on a mobile device, such as a smartphone or tablet computer. Also known as a mobile application.
- Stow items/ingredients so that those with the nearest best before or use-by dates are used or sold first.
- to cook in liquid, bubbles forming and gently rising to the surface of the water, but the water is not yet at a full rolling boil.
- The global collection of computer networks and their connections, all using shared protocols to communicate.
9 Clues: fried quickly in a little hot fat. • The norms of appropriate, responsible behavior with regard to the use of technology. • Stow items/ingredients so that those with the nearest best before or use-by dates are used or sold first. • The global collection of computer networks and their connections, all using shared protocols to communicate. • ...
ARTIFUCIAL INTELLIGENCE 2024-04-22
Across
- VISION A field of AI that deals with the processing and analysis of visual information using computer algorithms.
- AI Through this technique AI models can learn the underlying patterns and create realistic and novel outputs.
- test is used to determine whether or not a computer(machine) can think intelligently like humans
- is the concept by which machines mimic or emulate the human mind’s intelligence or human behavior, with the ability to learn and apply this approach/intelligence to solve any kind of varied problems.
- AI is used for purposes, facial recognition, intrusion detection, and cybersecurity threat analysis.
Down
- Intelligence is the talk of a new changing and growing world that can be defined as a set of concepts and methodologies to improve decision-making in business through the use of facts and
- Systems is technology based on AI systems that mimic the decision-making ability of a human expert in a specific field.
- is the ability to learn and solve problems. This definition is taken from webster’s Dictionary
- Intelligence is a mental quality to learn from experiences, adapting to new situations and manipulating one’s environment by using knowledge.
9 Clues: is the ability to learn and solve problems. This definition is taken from webster’s Dictionary • test is used to determine whether or not a computer(machine) can think intelligently like humans • AI is used for purposes, facial recognition, intrusion detection, and cybersecurity threat analysis. • ...
Infosec Exercise 1 2024-08-15
Across
- Restricting access to the subject based on sensitivity/ Need to know.
- Is the hacker/attacker's clever manipulation of the natural human tendency to trust to obtain information that will allow him to gain unauthorized access to a valued system
- Is a technique used to retrieve information that could be used to carry out an attack or gain access to a computer network from disposed items.
- An object should only have the rights and privileges necessary to perform its task with no additional permissions.
- Ensures that only valid users are admitted
- Is a way of storing the same data in different places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure
Down
- Protection from unauthorized disclosure.
- Is a set of techniques used to protect networks, programs and data from attack, damage, or unauthorized access.
- Is a cyberattack vector that takes advantage of an unknown or unaddressed security flaw in computer software, hardware or firmware. "Zero day" refers to the fact that the software or device vendor has zero days to fix the flaw because malicious actors can already use it to access vulnerable systems.
- Solutions we can implement in the enterprise.
- Full identity theft packages to commit financial fraud.
- For a given task, more than 1 person should be involved.
- Do not rely on a single brand of security device.
- The cost of safeguard or protection should not be greater than the value of the asset.
14 Clues: Protection from unauthorized disclosure. • Ensures that only valid users are admitted • Solutions we can implement in the enterprise. • Do not rely on a single brand of security device. • Full identity theft packages to commit financial fraud. • For a given task, more than 1 person should be involved. • ...
Fintech 2024-03-05
Across
- the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- the intersection of payment and technology, a sub-industry within fintech that focuses solely on payments and transactions.
- the use of technology and science to reduce human impacts on the natural environment.
Down
- a system in which a record of transactions, especially those made in a cryptocurrency, is maintained across computers that are linked in a peer-to-peer network.
- the innovative use of technology in insurance and is a subset of FinTech, or financial technology
- refers to the use of innovative technologies such as artificial intelligence and Big Data to provide an alternative to traditional wealth management firms, with the aim of making wealth management and investment services more efficient and automated.
- the management of regulatory monitoring, reporting, and compliance within the financial industry through technology.
7 Clues: the use of technology and science to reduce human impacts on the natural environment. • the innovative use of technology in insurance and is a subset of FinTech, or financial technology • the management of regulatory monitoring, reporting, and compliance within the financial industry through technology. • ...
Fintech 2024-03-05
Across
- refers to the use of innovative technologies such as artificial intelligence and Big Data to provide an alternative to traditional wealth management firms, with the aim of making wealth management and investment services more efficient and automated.
- the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- the intersection of payment and technology, a sub-industry within fintech that focuses solely on payments and transactions.
Down
- the use of technology and science to reduce human impacts on the natural environment.
- the innovative use of technology in insurance and is a subset of FinTech, or financial technology
- a system in which a record of transactions, especially those made in a cryptocurrency, is maintained across computers that are linked in a peer-to-peer network.
- the management of regulatory monitoring, reporting, and compliance within the financial industry through technology.
7 Clues: the use of technology and science to reduce human impacts on the natural environment. • the innovative use of technology in insurance and is a subset of FinTech, or financial technology • the management of regulatory monitoring, reporting, and compliance within the financial industry through technology. • ...
Cybersecurity Awareness Crossword Game 2024-09-10
Across
- It is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
- It is the term used for various pop-up advertisements that show up on your computer or mobile device.
Down
- It is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- It is a type of malware that holds a victim's sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom to the attacker.
- It is cybersecurity software that detects and removes malicious software (malware) from a computer, device, or network.
5 Clues: It is the term used for various pop-up advertisements that show up on your computer or mobile device. • It is cybersecurity software that detects and removes malicious software (malware) from a computer, device, or network. • It is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. • ...
Analytics Crossword 2025-02-18
Across
- A company notices a sudden drop in customer subscriptions. Which metric should they analyze to understand why customers are leaving?
- A marketing team is analyzing customer engagement data and finds that more engagement correlates with higher sales. What statistical concept are they observing?
- A financial analyst finds a single extremely high transaction amount in a report that looks suspicious. What is this data point called?
- What statistical measure explains the proportion of variance in the dependent variable?
- A company wants to improve data accuracy by removing duplicates and fixing inconsistent formatting. What process are they performing?
- Which database language is used to query and manipulate structured data?
- Which statistical method helps in identifying relationships between variables?
- A cybersecurity team detects an unusual spike in login attempts from a single location. What kind of issue are they identifying?
Down
- What machine learning model is used for classification and decision-making?
- An e-commerce company wants to test two different checkout page designs to see which one leads to more purchases. What method should they use?
- An IT department builds a dashboard that updates in real time to show website traffic. What tool are they using?
- Which technique groups similar data points together for analysis?
- Which term describes extremely large and complex datasets that require advanced processing?
- A retailer wants to predict how much stock they should order for next season based on past sales trends. What type of analytics should they use?
- Which visual representation helps understand the density of values in a dataset?
- What metric is used to measure business performance and goal achievement?
16 Clues: Which technique groups similar data points together for analysis? • Which database language is used to query and manipulate structured data? • What metric is used to measure business performance and goal achievement? • What machine learning model is used for classification and decision-making? • ...
Intellectual Property Rights 2025-02-06
Across
- is a legal term which comprises both the economic and moralrights which creators have over their literary and artistic works.
- Creating a model or sample of a product to test before final production
- A requirement for patentability, meaning that an invention must be new andnot previously disclosed to the public
- The official disclosure of an application in the IPOPHL Gazette to informthe public.
- The specific legal statements in a patent that define the scope of protectiongranted to the inventor.
- An exclusive legal right granted to an inventor, giving them control over theuse, sale, and production of their invention for a limited period.
Down
- A process where a neutral arbitrator hears evidence from both parties and makes a binding decision to resolve the dispute.
- is the natural person who has created the work. Some examples ofauthors include: writers, composers, carvers, etc.
- The practice of protecting online systems, networks, and data fromcyber threats, ensuring the safe use of e-services.
- means the transmission by wireless means for the public reception of sounds or of images or of representations thereof. The transmission of encrypted signals by satellite is also broadcasting, where, the means for decrypting are provided to the public by the broadcasting organization, or with its consent.
10 Clues: Creating a model or sample of a product to test before final production • The official disclosure of an application in the IPOPHL Gazette to informthe public. • The specific legal statements in a patent that define the scope of protectiongranted to the inventor. • ...
Puzzle - 10 2022-10-10
Across
- a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- a network security system that filters unsanctioned incoming and outgoing traffic.
- Refers to a program that is run entirely from the network, without requiring any installation of software on the endpoint device running the program
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
Down
- a term commonly used to describe a person who tries to gain unauthorized access into a network or computer system.
- involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
- Customizable additions to software for extra functionality
- Computing recourses that make it available to access your files and services through the internet from any point in the world.
- contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.
10 Clues: Customizable additions to software for extra functionality • a network security system that filters unsanctioned incoming and outgoing traffic. • contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed. • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- A security mechanism requiring two or more forms of verification before granting access to a system
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
Down
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
AI Criss-Cross Puzzle 2024-11-30
Across
- Intelligence is the talk of a new changing and growing world that can be defined as a set of concepts and methodologies to improve decision-making in business through the use of facts and fact-based systems
- AI Through this technique AI models can learn the underlying patterns and create realistic and novel outputs.
- Is the ability to learn and solve problems. This definition is taken from webster’s Dictionary.
- Is the concept by which machines mimic or emulate the human mind’s intelligence or human behavior, with the ability to learn and apply this approach/intelligence to solve any kind of varied problems.
- Vision A field of AI that deals with the processing and analysis of visual information using computer algorithms.
Down
- Test is used to determine whether or not a computer(machine) can think intelligently like humans
- AI is used for purposes, facial recognition, intrusion detection, and cybersecurity threat analysis.
- AI is a general purpose intelligence that can demonstrate human abilities.
- Intelligence is a mental quality to learn from experiences, adapting to new situations and manipulating one’s environment by using knowledge.
- Systems is technology based on AI systems that mimic the decision-making ability of a human expert in a specific field.
10 Clues: AI is a general purpose intelligence that can demonstrate human abilities. • Is the ability to learn and solve problems. This definition is taken from webster’s Dictionary. • Test is used to determine whether or not a computer(machine) can think intelligently like humans • ...
INTERNET TERMINOLOGIES 2025-10-06
Across
- Relying on or achieved through the application of force, effort, or power in usually large amounts instead of more efficient, carefully planned, or precisely directed methods.
- Term in journalism coined during Martial Law. It is used for publications such as the Philippine Collegian
- When someone tries to trick you into giving away your personal details, financial details, or money over the internet.
- From slang in Hiligaynon and an allusion to the gang which specialize in conniving victims to give their money or possession.
Down
- Type of electronic card which is used for transactions made online through a computer or a smartphone.
- A word, phrase, or string of characters intended to differentiate an authorized user or process, for the purpose of permitting access (such as via logging in) from an unauthorized user
- Journalism that seeks to increase transparency and accountability of our politicians and other public figures and institutions.
- A cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites
- An identifying number allocated to an individual by a bank or other organization and used for validating electronic transactions
- A temporary, secure PIN-code sent to you via SMS or e-mail that is valid only for one session.
10 Clues: A temporary, secure PIN-code sent to you via SMS or e-mail that is valid only for one session. • A cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites • Type of electronic card which is used for transactions made online through a computer or a smartphone. • ...
Intellectual Property Rights 2025-02-05
Across
- - A facilitated process where a neutral third party (mediator) helps disputing parties reach a mutually agreeable solution without imposing a decision.
- - A court order that prohibits a party from engaging in a specific action, often used in IP disputes to prevent further infringement
- - The unauthorized use, manufacture, or sale of a patented invention without the patent owner’s permission.
- - The specific legal statements in a patent that define the scope of protection granted to the inventor.
- - is a legal term which comprises both the economic and moral rights which creators have over their literary and artistic works.
Down
- - The detailed explanation of an invention in a patent application, ensuring that the public can understand how it works once the patent expires.
- - The improvement or modification of an existing product or process, which is often the focus of a utility model.
- - An exclusive legal right granted to an inventor, giving them control over the use, sale, and production of their invention for a limited period.
- - The practice of protecting online systems, networks, and data from cyber threats, ensuring the safe use of e-services.
- - A requirement for patentability, meaning that an invention must be new and not previously disclosed to the public
10 Clues: - The specific legal statements in a patent that define the scope of protection granted to the inventor. • - The unauthorized use, manufacture, or sale of a patented invention without the patent owner’s permission. • - The improvement or modification of an existing product or process, which is often the focus of a utility model. • ...
EHSPCM 2023-12-05
Across
- One of the many EHSPCM responsibilities that deals with vehicle emissions. (Acronym FEME)
- One of many Toyota initiatives Privacy provided consultation services. (Acronym NFL)
- Privacy review conducted to compare our Privacy program with Australia’s program.
- EHS, FEME, Sustainability, and chemical management scored over 65 risk statements in FY Q3.
- EHSPCM service is provided to our business units to detect issues in advance.
- One of the many EHSPCM responsibilities addressing TMNA’s electrification future.
- One of the many EHSPCM responsibilities that partners with stakeholders across the enterprise to provide guidance on personal identifiable information (PII).
- One of the many EHSPCM responsibilities looking at how we handle hazardous materials responsibly.
- One of the many EHSPCM responsibilities looking at innovating & continuously improving to minimize negative impacts and working toward making a net positive impact on the planet and society.
Down
- Compliance program element review led by the EHS DART team in conjunction with Deloitte.
- On-site facility visits conducted by EHS.
- One of the many EHSPCM responsibilities on how we can protect our people.
- EHS and FEME conducted tests of these types of processes in 2023. Also a term defined in the Compliance Program Standards.
- One of the many EHSPCM responsibilities on how we protect the environment in the communities we serve.
- Monitor existing programs and controls to confirm compliance preparedness for online threats.
- Empower team members to proactively mitigate EHS risks to prevent all injuries, generate a net positive impact on the environment, and enhance customer trust in the Toyota brand.
- To proactively identify risk through effective monitoring strategies and trend analysis to prioritize compliance preparedness for the organization and team members.
- One of the many EHSPCM responsibilities on how TMNA reviews and approves chemicals in our products and processes.
18 Clues: On-site facility visits conducted by EHS. • One of the many EHSPCM responsibilities on how we can protect our people. • EHSPCM service is provided to our business units to detect issues in advance. • Privacy review conducted to compare our Privacy program with Australia’s program. • ...
Challenge 2022-04-18
Across
- cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
- type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
- a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
- Malware that encrypts or locks a victim's computer files until the victim meets their demands
Down
- cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
- a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application
7 Clues: Malware that encrypts or locks a victim's computer files until the victim meets their demands • a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system • a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks • ...
CSD Unit 3 Lessons 1 - 4 2024-01-21
Across
- in this step of the problem solving process, you research and consider possible solutions
- in this step of the problem solving process, you may follow thru with your best solution idea and see what happens
- one of the parameters of a shape, the size from left to right on the screen
- a normal part of coding, this is identifying and fixing problems that you find in your code or the code of others
- a field of study related to the principles and uses of computing, including coding and cybersecurity (two words)
- one of the parameters of a shape, the size from top to bottom on the screen
- a process used to help people systematically slow down and think about how to best solve a problem (three words)
- this shortened form of the word rectangle is used when drawing shapes in javaScript or GameLab
Down
- additional information provided as input to a block to customize its functionality
- another word for an oval or circle used on javaScript or GameLab
- in this step of the problem solving process, you look back to see if the solution that you tried worked and what can be improved upon
- this command can be used to make the screen a different solid color that will be behind the shapes you place on the screen.
- in this step of the problem solving process, you make sure you understand the problem.
- background (_______) This is the piece of information that you put between the parenthesis in the background command
14 Clues: another word for an oval or circle used on javaScript or GameLab • one of the parameters of a shape, the size from left to right on the screen • one of the parameters of a shape, the size from top to bottom on the screen • additional information provided as input to a block to customize its functionality • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
Down
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- A security mechanism requiring two or more forms of verification before granting access to a system
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
CISO Crossword Quiz - 1625 2025-03-07
Across
- The executive responsible for overseeing the cybersecurity strategy and implementation within an organization
- A security mechanism requiring two or more forms of verification before granting access to a system
- A technique used by cyber criminals to bombards users with endless malicious ads and pop-up windows or redirect to other website
- A social engineering attack in which the fraudster builds a false sense of trust with the victim
- The process of unlocking or jailbreaking a device, such as a smartphone or tablet to achieve more administrative control
Down
- A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites
- An unethical practice used by the cyber criminals to redirect a link to a middle-man or aggregator site rather than the original site it was directed to
- Any software intentionally designed to cause harm to computers, networks, or devices, such as viruses, worms, and ransomware
- A command and control centre tasked with monitoring and responding to security incidents and threats in real-time in an organization
- A technology that creates a secure connection over a public network, ensuring privacy and data integrity
10 Clues: A social engineering attack in which the fraudster builds a false sense of trust with the victim • A security mechanism requiring two or more forms of verification before granting access to a system • A technology that creates a secure connection over a public network, ensuring privacy and data integrity • ...
ict henry morris 2026-03-25
Across
- any program designed to disrupt, damage, or gain unauthorized access to a computer system.
- a security professional who operates between white hat (ethical) and black hat (malicious) hackers
- a type of standalone, self-replicating malware that spreads automatically across networks without human intervention.
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- a network security system that acts as a barrier between a trusted internal network (or computer) and untrusted external networks, such as the internet.
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
Down
- an automatic legal right protecting original creative works—such as literature, art, music, films, and software—once they are expressed in a tangible form. I
- malicious software (malware) disguised as legitimate, harmless software, designed to trick users into installing it.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
10 Clues: any program designed to disrupt, damage, or gain unauthorized access to a computer system. • a security professional who operates between white hat (ethical) and black hat (malicious) hackers • malicious software (malware) disguised as legitimate, harmless software, designed to trick users into installing it. • ...
Insider Risk Awareness 2022-08-17
Across
- Deliberate disclosures of classified or unclassified information to the media.
- An act or acts with intent to injure, interfere with, or obstruct the national defense of a country by willfully injuring or destroying, or attempting to injure or destroy, any national defense or war materiel, premises, or utilities
- ability to obtain knowledge of classified info
- prevention from action by fear of the consequences
- Security classification that shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or
- Unauthorized user who attempts to or gains access to an information system
Down
- Anything that effectively negates or mitigates an adversary’s ability to exploit vulnerabilities
- Formal security determination by an authorized adjudicative office that an individual is authorized access, on a need-to-know basis, to a specific level of collateral classified information
- Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks, and systems.
- Repeated incidents that may be similar in nature or dissimilar events that occur in a specific location or time span that may indicate a potential insider threat
- Prevention of damage to, protection of, and restoration of computers, electronic communications systems...etc.
11 Clues: ability to obtain knowledge of classified info • prevention from action by fear of the consequences • Unauthorized user who attempts to or gains access to an information system • Deliberate disclosures of classified or unclassified information to the media. • Anything that effectively negates or mitigates an adversary’s ability to exploit vulnerabilities • ...
random 2023-11-29
Across
- monarchy - A form of government in which a monarch serves as the head of state within the parameters of a written or unwritten constitution.
- - A period of cultural and intellectual rebirth that took place in Europe between the 14th and 17th centuries. Photosphere - The visible surface of the Sun, where energy is emitted as light and heat.
- - The philosophical belief that knowledge is primarily derived from sensory experience and observation.
- - The study of heredity and the variation of inherited characteristics.
- - A political system where power is held by the people themselves. Photosynthesis - The process in which plants convert sunlight, water, and carbon dioxide into energy.
Down
- - The process of increasing interconnectedness and integration among countries in terms of economics, culture, and politics.
- tectonics - The theory that explains the movement of Earth's lithosphere and the formation of landf dissonance - The psychological discomfort experienced when holding two contradictory beliefs or values.
- e development - Development that meets the needs of the present generation without compromising the ability of future generations to meet their own needs.
- - takeskenes taken to protect computer systems and data from unauthorized access or attacks.
- - A situation where a single company or entity dominates a particular market or industry.
- - The use of living organisms or their products to develop or improve processes, products, or services.
- - A community of living organisms and their interactions with the environment.
12 Clues: - The study of heredity and the variation of inherited characteristics. • - A community of living organisms and their interactions with the environment. • - A situation where a single company or entity dominates a particular market or industry. • - takeskenes taken to protect computer systems and data from unauthorized access or attacks. • ...
test 2024-01-23
Across
- ___________ is a cybersecurity attack that can be mistaken for a hobby.
- ___________ is any automated Processing of Personal Data to evaluate, analyse or predict a Data Subject’s performance at work, economic situation, location, health, personal preferences, interests, reliability, behaviour, driving, location, or movements.
- Privacy By ____________ is a concept intended to anticipate, build, and manage privacy during the entire life cycle of a process/system/project/product/software, right from its concept to execution to retirement. Hint
- VFS privacy ______ provides individuals a clear explanation of our personal data handling practices at the time of collection.
- Within the Volvo Group, we collect 3 categories of personal data, HR data, Business Partner data & ____________ data.
- Racial or ethnic origin, Political opinions, Genetic data are examples of ____________ personal data
- _________ is the Volvo Group Appointed cloud-based SaaS Solution for managing Privacy Compliance. hint
Down
- A personal data _________ considered to be a security incident and can be either accidental or intentional/unlawful. You should immediately alert the IT service desk and VFS privacy office.
- _________ must be freely given and easy to withdraw.
- Information classified as _______ may cause significant damage (medium to high impact) to the Volvo Group, our business partners or an individual’s right to privacy if leaked.
- What does AI stand for?(2 words)
- Privacy __________ Screening questionnaire (PISQ) is a document to identify and minimize data protection risks within a process/system/project/software. Hint
12 Clues: What does AI stand for?(2 words) • _________ must be freely given and easy to withdraw. • ___________ is a cybersecurity attack that can be mistaken for a hobby. • Racial or ethnic origin, Political opinions, Genetic data are examples of ____________ personal data • ...
Facebook Ethics 2023-09-22
Across
- - Facts and statistics collected together for reference or analysis
- - To control or play upon by artful, unfair, or insidious means especially to one's own advantage
- - An international, malicious attack on an organisation or an individual by targeting their computer systems and accessing their data, including confidential data such as banking data
- - A stated outcome that a business aims to achieve; can be broadly stated in vision and mission statements, or more narrowly stated with measurable outcomes.
- - A situation involving exposure to danger
- - Detailed examination of the elements or structure of something
Down
- Analytics - Two words. The process of inspecting and modelling data in order to discover useful information
- - A set of instructions to solve a problem or to complete a task or computation.
- - A collection of data that is organised to be easily accessed, managed, explored and updated
- - The practice of defending computers and IT systems against malicious attacks
- - Company that owns and operates Facebook, Instagram, Threads, and Whatsapp and also has an alternative name
- - is the overall long-term target or goal of the business, whereas business objectives are the short-term steps a business needs to take to meet its overall aims.
- - The state or condition of being free from being observed or disturbed by other people.
- - View that businesses, rather than focusing solely on increasing shareholder value, should contribute to the economic, social and environmental well-being of society
- - Refers to the moral principles and values that form the basis of how a person or organisation conducts their activities
- - Taking something in someone's property without permission or legal right and without intending to return it.
16 Clues: - A situation involving exposure to danger • - Detailed examination of the elements or structure of something • - Facts and statistics collected together for reference or analysis • - The practice of defending computers and IT systems against malicious attacks • - A set of instructions to solve a problem or to complete a task or computation. • ...
EMPTECH QUIZ 2024-09-18
Across
- primary characteristic of Web 1.0
- The ability of a person to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others
- This web is also known as WEB 2.0.
- A type of social engineering attack often used to steal user data, including login credentials and credit card numbers by “reeling in” victims through several and often unsophisticated ways
- Service that is offered on-demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file size-based pricing or vice versa.
- Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts to commit fraud, receive benefits, or gaining financially in some way
- any criminal activity that involves the use of a computer, networked device, or a network as an instrument to further illegal ends
- the use of scientific knowledge, experience and resources to create processes and products that fulfill human needs.
Down
- Refers to the online security or safety of people and their information when using the internet
- Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks through unauthorized access
- It was invented by Tim Berners-Lee in 1989.
- proper manner of communication in the online environment
- refers to the knowledge obtained from reading, investigation, study or research. The tools to transmit information are the telephone, television and radio.
- type of false information that is used for political agenda
- is an act of transmitting messages.
15 Clues: primary characteristic of Web 1.0 • This web is also known as WEB 2.0. • is an act of transmitting messages. • It was invented by Tim Berners-Lee in 1989. • proper manner of communication in the online environment • type of false information that is used for political agenda • ...
Network Infrastructure & Technologies 2026-03-16
Across
- An emulation of a computer system that provides the functionality of a physical computer.
- The on-demand delivery of IT resources over the internet with pay-as-you-go pricing.
- An Intermediary server that separates end users from the websites they browse, often used to hide internal IP addresses.
- A system that monitors network traffic for suspicious activity and issues alerts, but does not move to block it automatically.
- The software that supports a computer's basic functions, such as scheduling tasks and executing applications.
Down
- The process of creating a software-based representation of something, such as virtual applications, servers, or networks.
- An open-source Operating System frequently used in cybersecurity for penetration testing and server management.
- Any physical device within a network of other devices that’s able to send, receive, or forward information (e.g., a computer or router).
- A global network of servers acting as a single ecosystem, commonly used for storage or computing power.
- A decoy system or network trap designed to lure in potential attackers to study their methods.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A network security tool that monitors a network for malicious activity and takes active steps to block or prevent it.
- Software, firmware, or hardware that creates and runs Virtual Machines.
- The physical path or transmission material used to carry data signals across a network (e.g., fiber optic, copper wire, or radio waves).
- A physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually the internet.
15 Clues: Software, firmware, or hardware that creates and runs Virtual Machines. • The on-demand delivery of IT resources over the internet with pay-as-you-go pricing. • An emulation of a computer system that provides the functionality of a physical computer. • A decoy system or network trap designed to lure in potential attackers to study their methods. • ...
Day 10 Crossword Puzzle 2022-11-09
Across
- (first word out of 2) systems or machines that perform tasks and can iteratively improve themselves based on the information they collect (10 letters)
- a tool or service that maintains an inventory of data assets through the discovery, description, and organization of datasets (two words 4 and 7 letters)
- a virtual representation that serves as a real time counterpart in the production process ___ , ___ (two words 7 and 4 letters) hint: this meet the expert article might help…
- holistic approach to the security of our products, solutions, information security, and much more ____ , _____ (two words 5 and 8 letters)
Down
- (second word out of 2)systems or machines that perform tasks and can iteratively improve themselves based on the information they collect (12 letters)
- complete or partial replacement of human work with machine work (10 letters)
6 Clues: complete or partial replacement of human work with machine work (10 letters) • holistic approach to the security of our products, solutions, information security, and much more ____ , _____ (two words 5 and 8 letters) • ...
Cybersecurity Revision 2022-10-19
Cybersecurity Crosswords 2025-11-21
Cybersecurity Terms 2025-09-18
CSAM 2024-09-22
Cybersecurity Crossword 2025-11-13
AI Meetup Crosswords 2023-11-28
Across
- It is a cybersecurity company that utilizes artificial intelligence and machine learning to provide solutions for threat detection and response in real-time.
- refers to raw facts, figures, or information that can be processed and analyzed to extract meaningful insights
- In the context of machine learning, they are individual measurable properties or characteristics of the data used to make predictions or decisions
- In machine learning,it is the variable you are trying to predict or the outcome you are trying to achieve
- A social humanoid robot developed by Hong Kong-based company Hanson Robotics
- a type of machine learning where the model is given unlabeled data and must find patterns or relationships within the data on its own.
- a software agent that can perform tasks or services for an individual. Examples include voice-activated assistants like Siri, Google Assistant, and Alexa.
- Subset of ML in which multilayered Neural Networks learn from vast amount of data
Down
- A type of data that Can be displayed in rows , spreadsheet , Relational Database.
- Algorithmes whose performance improve as they are exposed to more data over time
- A type of data that Cannot be displayed in rows,Relational Database.
- The process to extract value from data and use it to make decisions
- A program that can sense,reason,act and adapt
- it a computational model inspired by the structure and function of the human brain ,Normally used in deep learning.
- Research laboratory that created and developed ChatGPT
- is a type of machine learning where the model is trained on a labeled dataset(That has a target)
- An electric vehicle and clean energy company known for its electric cars, energy storage solutions, and solar products. It was founded by Elon Musk and others.
17 Clues: A program that can sense,reason,act and adapt • Research laboratory that created and developed ChatGPT • A type of data that Cannot be displayed in rows,Relational Database. • The process to extract value from data and use it to make decisions • A social humanoid robot developed by Hong Kong-based company Hanson Robotics • ...
Technology 2023-05-09
Across
- The process of creating a physical object from a digital design by adding successive layers of material.
- the ability of machines to perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making
- the practice of protecting computer systems and networks from digital attacks, theft, and damage
- A device that detects or measures physical stimuli such as light, sound, or motion.
- a technology that overlays digital information onto the real world, usually viewed through a device like a smartphone or headset
- A set of instructions or rules that a computer program follows to perform a task or solve a problem.
- Energy that is generated from renewable sources such as wind, solar, or hydro power.
Down
- a computer-generated simulation of a three-dimensional environment that can be interacted with using special equipment
- a mobile device that can make calls, send text messages, and access the internet
- the study and application of extremely small things, such as molecules and atoms, for use in fields like medicine and electronics.
- the delivery of computing services, including servers, storage, databases, and software, over the internet
- a type of AI that uses algorithms to enable machines to learn from and make decisions based on data, without being explicitly programmed
- A portable computer that can be easily carried and used in various locations.
- an electronic device that can store, retrieve, and process data
- the use of living organisms, cells, or biological processes to develop new products or solve problems.
- websites and applications that allow users to create and share content, and connect with other users
- a way to send and receive messages over the internet
17 Clues: a way to send and receive messages over the internet • an electronic device that can store, retrieve, and process data • A portable computer that can be easily carried and used in various locations. • a mobile device that can make calls, send text messages, and access the internet • ...
Cyber security 2022-12-11
Across
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
- The ACSC's cyber security principles are grouped into four key activities:XXXX,protect,detect and respond.
- An annoying malware that spams you with ads.
- Settings on folders or files that control who is allowed to access them.
- A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
- What does the C stand for in the abbreviation AACA, as used in the Information Security Manual?
- A malicious code typically disguised as a legitimate program.
- Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
- An important process that verifies a user is really who they are; many different ways this can be done.
Down
- Full name of a DoS attack (three words).
- The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
- A collection of malware infested computers that form a network to attack.
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
- In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
- Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- An email that contains a message with a suspicious link designed to steal personal information.
17 Clues: Full name of a DoS attack (three words). • An annoying malware that spams you with ads. • A malicious code typically disguised as a legitimate program. • Settings on folders or files that control who is allowed to access them. • A collection of malware infested computers that form a network to attack. • ...
Cybersecurity Awareness Month - Crossword 3 - Easy - Malwares 2025-08-25
Across
- Malware that spreads on its own across networks
- Shows unwanted ads and may track your activity
- A fake file or app that hides harmful software inside
- Harmful software that can damage or steal data
- Hides deep in your system to avoid detection
- Secretly watches what you do and sends info to others
Down
- Records everything you type, including passwords
- A group of infected computers controlled by hackers
- Locks your files and demands money to unlock them
- Fake warnings that try to scare you into downloading bad software
- A hidden way into your system used by attackers
- A program that spreads and corrupts files or systems
12 Clues: Hides deep in your system to avoid detection • Shows unwanted ads and may track your activity • Harmful software that can damage or steal data • Malware that spreads on its own across networks • A hidden way into your system used by attackers • Records everything you type, including passwords • Locks your files and demands money to unlock them • ...
SECURITY DOMAIN 2023-11-03
Across
- / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access.
- / Means the program to increase the knowledge and improve the attitude that members of an organization possess regarding the protection of the physical, and especially informational, assets of an organization.
- / Responsible for managing and maintaining the security of computer systems, including user accounts, access controls, and system configurations.
- Issues / Refers to the ethical, legal, and social considerations related to technology and cybersecurity, including privacy and compliance issues.
- / Refer to the underlying software and hardware technologies that provide a foundation for building applications or services, like operating systems or cloud platforms.
Down
- / The study, planning and design of how people and computers work together so that a person’s need are satisfied in the most effective way.
- and Architecture / Addresses the security aspects of integrating different systems and designing secure system architectures.
- / Refers to physical security measures, such as securing data centers, facilities, and infrastructure from physical threats.
- / Centered on securing web applications, servers, and the communication between users and web services.
- / Refers to the practice of integrating different software components or systems to work together cohesively and efficiently.
- / Deals with the secure handling, storage, retrieval, and sharing of sensitive information and data within an organization.
- / Refers to the foundational principles and concepts in computer programming, such as data structures, algorithms, and coding basics.
12 Clues: / Centered on securing web applications, servers, and the communication between users and web services. • / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access. • ...
"Cybersecurity Glossary". 2024-02-04
Cybersecurity Units 1 & 2 Vocab 2024-10-03
Across
- A type of cyberattack disguised as a legitimate communication.
- A cipher that shifts letters by a fixed amount.
- The process of encoding data to protect it from unauthorized access.
Down
- A one-way function that transforms data into a fixed-length string.
- Data that provides information about other data, often hidden.
- What attackers try to guess or crack to access accounts.
- A language only computers speak.
7 Clues: A language only computers speak. • A cipher that shifts letters by a fixed amount. • What attackers try to guess or crack to access accounts. • Data that provides information about other data, often hidden. • A type of cyberattack disguised as a legitimate communication. • A one-way function that transforms data into a fixed-length string. • ...
Cybersecurity Awareness Crossword 2022-09-10
Across
- _______security provides the first line of defence against unauthorized access to your computer and personal information
- is an attack that attempts to steal your money or your identity via email
Down
- is an attack that attempts to steal your money or your identity via voice call
- malware designed to deny a user or organization access to files on their computer
4 Clues: is an attack that attempts to steal your money or your identity via email • is an attack that attempts to steal your money or your identity via voice call • malware designed to deny a user or organization access to files on their computer • ...
Trends 2021 2021-01-11
Across
- Intelligence Two common words for new age term for machine learning often shortened to two letters
- AWS, Google, Microsoft all offer this – ensuring access to information stored in the ____
- AI -A term referring to the governance of robotics and machine learning. risk, trust, transparency, ethics, fairness, interpretability, accountability, safety and compliance
- Acronym for the current industry revolution.
- Something most people make up in the beginning of January, but most broken later in the year
- the technology that is the next generation and rolled out in SA in 2020 by Vodacom and MTN. Some conspiracy theorists also think its linked to the coronavirus
Down
- experience Customers continue to expect the brands they do business with to deliver on their higher expectations. Customers have become smarter and more impatient, companies must deliver on this (hint Cx)
- – South Africa will receive 1 million doses of this from India at the end of January
- Umbrella tech term top of the IT agenda to ensure integrity and safety of network
- One of the larger international streaming partners available in South Africa
- a freemium video and conferencing based tool which exploded in growth and subscriptions in 2020
- privacy Increasing cry amongst internet and social media users, customers and employees where information is shared online. References some parts of the POPI act
- from Home –Term used regarding new way for employees, starting with the acronym WFH
- Edge New technology trend which is “more clever” and happening closer to the source or locality
- RAN A new standard currently being deployed in Radio Access Networks to reduce vendor lock in.
15 Clues: Acronym for the current industry revolution. • One of the larger international streaming partners available in South Africa • Umbrella tech term top of the IT agenda to ensure integrity and safety of network • from Home –Term used regarding new way for employees, starting with the acronym WFH • ...
DIGITAL TECHNOLOGY AND YOU 2024-09-02
Across
- Responsible and respectful behavior when using the internet and digital tools.
- How you present yourself online, including your profiles, activities, and personal information.
- An online space where teachers and students interact, similar to a traditional classroom but conducted over the internet.
- of Things A network of connected devices, such as appliances and wearables, that communicate and exchange data over the internet.
- Well-Being Maintaining a healthy balance of technology use that supports mental and physical health.
- The use of digital communication to provide healthcare remotely, such as video consultations with doctors.
- Storage A service that allows you to save data online instead of on a local computer or device, making it accessible from anywhere.
Down
- A mobile device that combines a phone with a variety of functions such as internet access, apps, and a camera.
- Measures and practices to protect devices, networks, and data from digital attacks and unauthorized access.
- A wearable device that tracks fitness, shows notifications, and often includes apps, similar to a small smartphone on your wrist.
- The process of sending and receiving messages or information using digital devices like phones or computers.
- The ability to use digital tools and platforms to find, evaluate, create, and communicate information responsibly.
- The study of designing equipment and workspaces to fit the user's needs, reducing strain and improving comfort.
- Education that takes place over the internet, using digital tools like virtual classrooms and educational platforms.
- Devices Gadgets that connect to the internet and can be controlled remotely, like smart lights or thermostats.
15 Clues: Responsible and respectful behavior when using the internet and digital tools. • How you present yourself online, including your profiles, activities, and personal information. • Well-Being Maintaining a healthy balance of technology use that supports mental and physical health. • ...
ADSI Oscar Gómez 2022-06-01
Across
- a set of lines of text with the steps that the computer must follow
- Set of information found at a given internet address.
- is the name by which an organized set of processed data is known
- creation, modification, use and knowledge of tools, machines, techniques, systems and methods of organization
- Set of physical or material elements that constitute a computer or a computer system.
- It is the process of creating a set of data that tells a computer how to perform some type of task.
- Figure,letter or word that is processed and becomes information
- gives a person, in this case the programmer, the ability to write a series of instructions
- are the instructions to communicate with the computer and that make it possible to use it
Down
- is the area related to computing and telematics that focuses on the protection of computing infrastructure
- is an electronic document or information capable of containing text, sound, video, programs, links, images, hyperlinks and many other things
- to those tools that users can use by accessing a web server through the internet
- is the use of a network of remote servers connected to the internet to store, manage and process data, servers, databases, networks and software
- It is a programmable digital electronic machine that executes a series of commands to process the input data, conveniently obtaining information that is later sent to the output units.
- It is an organized collection of information or structured data, which is usually stored electronically in a computer system.
15 Clues: Set of information found at a given internet address. • Figure,letter or word that is processed and becomes information • is the name by which an organized set of processed data is known • a set of lines of text with the steps that the computer must follow • to those tools that users can use by accessing a web server through the internet • ...
Cyber security 2022-10-19
Across
- In order to ensure the security of the data/information, we need to ____________ the data:
- _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- ________is actually considered the first computer virus?
- ________ is when attackers send malicious emails designed to trick people into falling for a scam.
- ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
- __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Advertising software can be used to spread malware.
- _______ is a program that secretly records what a user does so that cybercriminals can make use of this information.
- Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
- _______ is a type of software designed to help the user's computer detect viruses and avoid them.
- _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
- _______ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
- Which wifi cummunication protocol is more Secure?
15 Clues: Which wifi cummunication protocol is more Secure? • Advertising software can be used to spread malware. • ________is actually considered the first computer virus? • In order to ensure the security of the data/information, we need to ____________ the data: • _______ is a type of software designed to help the user's computer detect viruses and avoid them. • ...
IMR533-Chapter 5.1-Computer Crimes 2025-05-28
Across
- The spread of _____can interfere with computers and change or erase data, which affects how data is stored.
- Many parties, including authorities, make significant investments, such as sophisticated threat detection systems, encryption tools, and staff training in order to improve it.
- Viruses, worms, ransomware, trojans and spyware are the examples.
- Typically intended to advertise goods and services, but it can also be used to spread malware or launch phishing scams.
- Any criminal activity that involves a computer or network as the primary tool or target of the offense.
- An assault on a networking system that stops a server from servicing customers.
- Cyber _____ occurs when someone creates or joins online groups or communities that harass, mock, or bully their target.
- _____theft occurs when an attacker deceives a victim into giving up personal information and then utilises it to commit a crime.
- Cyber _____is defined as the use of the internet to create, display, import, distribute, or publish pornographic or obscene content.
Down
- Finding and taking advantage of flaws in computer networks or systems in order to obtain data without authorisation, or accomplish other nefarious goals.
- Cyberbullying can cause self-doubt and _____ thoughts.
- Computer _____ is a subset of computer crime.
- Extreme types of pornography, violent movies, graphic novels, and other media that show violent or sexual behaviours in a way that is meant to shock or arouse are examples of _____ publications.
- Hacking, malware distribution, denial-of-service attacks, and cyber _____ are examples of illegal activities on the Net.
- Deception using emails, messages, or websites to collect personal data for malevolent reasons.
- _____ is morally acceptable when it is done to strengthen security, find security flaws, and address them.
16 Clues: Computer _____ is a subset of computer crime. • Cyberbullying can cause self-doubt and _____ thoughts. • Viruses, worms, ransomware, trojans and spyware are the examples. • An assault on a networking system that stops a server from servicing customers. • Deception using emails, messages, or websites to collect personal data for malevolent reasons. • ...
Cyber Security 1 2023-04-23
Across
- Manipulative tactics used by cybercriminals to trick people into divulging sensitive information or performing actions that compromise security.
- The part of the internet not indexed by search engines and accessible only through special software, often associated with illegal activities.
- An incident in which unauthorized individuals gain access to sensitive, protected, or confidential data.
- An additional layer of security that requires a user to provide two separate pieces of evidence for authentication.
- The process of converting data into a code to prevent unauthorized access.
- A trial-and-error method used by attackers to gain access to an account or system by systematically guessing passwords or encryption keys.
- A string of characters used to authenticate a user's identity and grant access to a computer system or account.
Down
- Malicious software designed to infiltrate or damage computer systems, networks, or devices.
- A virtual private network that extends a private network across a public network, allowing users to send and receive data securely and anonymously.
- A type of malicious software that encrypts a victim's files and demands payment for their release.
- The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
- A piece of information used to decrypt or encrypt data, ensuring its confidentiality and integrity.
- A network of compromised computers remotely controlled by a cybercriminal to perform tasks such as launching attacks or sending spam emails.
- A security system that controls incoming and outgoing network traffic based on predetermined rules.
- A cyber attack that attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.
15 Clues: The process of converting data into a code to prevent unauthorized access. • Malicious software designed to infiltrate or damage computer systems, networks, or devices. • A type of malicious software that encrypts a victim's files and demands payment for their release. • ...
GROUP 2 2024-02-13
Across
- It stresses technical knowledge and proficiency.
- It is mental dispositions people have towards others and the current circumstances before making decisions that result in behaviour.
- It is the ability of an individual or a group of people to influence and guide followers or members of an organization, society or team.
- It is the process of defining the architecture, interfaces, and data for a system that satisfies specific requirements.
- It refers to where the software or products have been made live for use of the intended users.
- It is the process of finding and eliminating the cause of a problem.
- It is the practice of protecting systems, networks, and programs from digital attacks.
- It means you can respond quickly to changing ideas, responsibilities, expectations, trends, strategies and other processes.
Down
- It uses and examines pre-release software to identify errors, missteps, or bugs that may hinder end-user, or customer experience.
- They design, program, build, deploy and maintain software using many different skills and tools.
- It refers to all the public websites or pages that users can access on their local computers and other devices through the internet.
- It is a person who uses analysis and design techniques to solve business problems using information technology.
- It is the process of acquiring new understanding, knowledge, behaviors, skills, values, attitudes, and preferences.
- It is the process of gradually improving or getting nearer to achieving or completing something.
- It is about having strong principles and values, which you demonstrate through your conduct in the work environment
15 Clues: It stresses technical knowledge and proficiency. • It is the process of finding and eliminating the cause of a problem. • It is the practice of protecting systems, networks, and programs from digital attacks. • It refers to where the software or products have been made live for use of the intended users. • ...
Cruciverba Modulo 5 - Cybersecurity Awareness 2024-05-24
Across
- Variante di phishing che mira specificamente a individui o organizzazioni selezionati.
- Attacco mirato a individui di alto profilo all'interno di un'organizzazione.
- hole Tecnica di attacco che compromette siti frequentati da un target specifico.
- Strategia di inganno che implica la creazione di un falso scenario per ottenere informazioni riservate.
Down
- Tecnica di phishing effettuata tramite comunicazione telefonica.
- Tentativo di ottenere dati sensibili attraverso messaggi che sembrano provenire da entità affidabili.
- Tipo di crittografia che protegge i dati trasmessi dall'origine fino alla destinazione.
7 Clues: Tecnica di phishing effettuata tramite comunicazione telefonica. • Attacco mirato a individui di alto profilo all'interno di un'organizzazione. • hole Tecnica di attacco che compromette siti frequentati da un target specifico. • Variante di phishing che mira specificamente a individui o organizzazioni selezionati. • ...
Cybersecurity Vocabulary Crossword 2022-03-22
4 Clues: attaches itself with host file and replicates • designed to damage and destroy networks and computer systems • used to prove one's identity, or authorize access to a resource • practice of sending fraudulent messages that appear to come from a reputable source
Cybersecurity Vocabulary Crossword 2022-03-22
4 Clues: designed to damage and destroy networks and computer systems • used to prove one's identity, or authorize access to a resource • software used to prevent, check, detect and remove malicious code from a device • practice of sending fraudulent messages that appear to come from a reputable source
Vocabulary 2023-12-17
Across
- The unauthorized use or exploitation of an existing connection or system to gain access to another system or network.
- A malicious program that can replicate itself and spread to other computers, often causing damage to files and systems.
- A security system that monitors and controls incoming and outgoing network traffic, acting as a barrier between a private network and external networks.
- To take advantage of a vulnerability or weakness in a computer system for malicious purposes.
- The process of converting information into code to prevent unauthorized access, ensuring secure transmission and storage of sensitive data.
- A list of approved entities, such as software applications or IP addresses, allowed to access a particular system or network.
Down
- A person who exploits computer hardware and software, either for malicious purposes or ethical ones.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- Short for malicious software, it refers to any software designed to harm or exploit computer systems, including viruses, worms, and ransomware.
- A technique where a person or program masquerades as someone or something else to deceive or gain an advantage, often used in phishing attacks.
- A hidden method for bypassing normal authentication or encryption to access a computer system, often used by hackers.
- Unauthorized access or entry into a computer system or network by an individual or software.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in electronic communication.
13 Clues: Unauthorized access or entry into a computer system or network by an individual or software. • To take advantage of a vulnerability or weakness in a computer system for malicious purposes. • A person who exploits computer hardware and software, either for malicious purposes or ethical ones. • ...
Cruciverba Modulo 6 - Cybersecurity Awareness 2024-05-27
Across
- Un attacco che sfrutta dispositivi USB compromessi per eseguire codice malevolo o manipolare il sistema.
- Un software o dispositivo che registra ogni tasto premuto su una tastiera, spesso utilizzato per rubare informazioni sensibili.
- Una tecnica di attacco che sfrutta le vulnerabilità nei campi di input per eseguire comandi SQL malevoli.
Down
- Un dispositivo USB che simula l'input di una tastiera per eseguire comandi malevoli su un computer.
- La copia di dati importanti per prevenire la perdita di informazioni in caso di guasti o attacchi.
- Un metodo segreto che permette di bypassare le normali procedure di autenticazione per ottenere accesso non autorizzato a un sistema.
- Un tipo di attacco che inserisce script malevoli in pagine web visualizzate da altri utenti.
7 Clues: Un tipo di attacco che inserisce script malevoli in pagine web visualizzate da altri utenti. • La copia di dati importanti per prevenire la perdita di informazioni in caso di guasti o attacchi. • Un dispositivo USB che simula l'input di una tastiera per eseguire comandi malevoli su un computer. • ...
The Role of Cybersecurity Professional 2024-09-29
Across
- Pembaruan perangkat lunak kecil untuk memperbaiki kerentanan atau bug keamanan
- Jenis malware yang dapat menyebar sendiri ke sistem lain tanpa interaksi pengguna
- Teknik tersembunyi yang digunakan untuk menangkap pengguna tidak sah atau mendeteksi serangan
Down
- Pesan yang tidak diinginkan atau berbahaya yang dikirim secara massal, sering kali berisi penipuan
- Tindakan untuk mencegah akses ke sistem atau jaringan
- Proses mengkodekan data untuk menjaga keamanannya (enkripsi)
- Mengganggu atau memblokir komunikasi dalam jaringan atau sistem
7 Clues: Tindakan untuk mencegah akses ke sistem atau jaringan • Proses mengkodekan data untuk menjaga keamanannya (enkripsi) • Mengganggu atau memblokir komunikasi dalam jaringan atau sistem • Pembaruan perangkat lunak kecil untuk memperbaiki kerentanan atau bug keamanan • Jenis malware yang dapat menyebar sendiri ke sistem lain tanpa interaksi pengguna • ...
FITDVocab.HB 2013-05-15
Across
- Reference to a book, paper, author, magazine, etc.
- A plug-in device
- a picture representing a company
- physical components of computer wiring
- .RTF
- a mouse with a rolling ball in the bottom
- ISP
- LED
- A portable,handheld, wireless computing device.
- GB 1,073,741,824 bytes
- A ceremonial induction into office
- Your computer's short term memory
- a pre-formated document
- Who is it? Why are they contacting me? What do they want?
- (apps) programs on a computer
- USB
- Protection of information on the internet
- SSID; a 32 digit code
- A handsfree communicating device
- A device that sends information out of the computer Ex.Headphones, Printer
- 8 bits
Down
- LCD
- A search tool that uses results from multiple search engines
- A online, zoomable presentation website
- An affirmation taken by a person before understanding the duties of an office
- a phrase representing a
- Internet and online world
- a program for the retrieval of data ex: Bing, Yahoo, Google
- NCSA
- KB;1,024 bytes
- The ability to work with another program or hardware device
- a space used to plug mice and keyboards into PCs
- The way you behave online
- to start up a computer
- Wireless local area network; WIFI
- VDU
- MB; 1,048,576 bytes
- The main circuit center usually located in the modem
- used to connect your computer to another computer, a local network, or a cable modem
- the arrangement of a document
- A brief summary of achievements and previous and current occupations that you use to apply to a job
- rules and behavior to keep you safe online
- A device that sends information into the computer Ex. Keyboard, Mouse
- a file extension used for Microsoft Word 97-03
45 Clues: LCD • ISP • LED • VDU • USB • NCSA • .RTF • .PDF • 8 bits • KB;1,024 bytes • A plug-in device • MB; 1,048,576 bytes • SSID; a 32 digit code • GB 1,073,741,824 bytes • to start up a computer • a phrase representing a • a pre-formated document • Internet and online world • The way you behave online • (apps) programs on a computer • the arrangement of a document • a picture representing a company • ...
FITEVocab.cg 2013-05-16
Across
- you search for information on it, google is a _____
- provider of internet
- the display for the computer, a moniter
- things like safari, ical, and garageband
- where you plug in earbuds/headphones
- a printer, keyboard
- the processing unit in your computer
- a small booklet promoting a business
- short term memory
- plug this in and you have more ports
- a port in which you can plug in a wired internet
- an uneditable file
- mac OSX is an _______, plural
- what a document or webpage looks like
- the display on your computer
- how compatible something is with your computer
- online storage center; google docs stores info in the ____
- the main storage center in your computer
- a phone, ipad, ipod touch etc
- a part of the computer, without it, you don't have a working computer
- also known as a tower
Down
- where you plug in your flashdrive
- how secure you are online, like installing antivirus
- a green or purple plug on the back of a computer
- we used this early in the year instead of powerpoint
- internet that is not wired, the first part of wifi
- an alliance dedicated to protecting people online
- the smallest storage unit
- an application for a job
- wireless internet
- blank document
- your "pointer" for the computer
- differs from regular search engine by searching multiple search engine, dogpile is a ____
- a drive for cd's or disks
- what the president take to be sworn in as president
- what you ask yourself when someone contacts you online
- how you act and behave on anything online
- allows the user to interact with the computer, not hardware but____
- how safe you are online
- promoting a business through billboards, tv commercials etc
- means online
- what is downstairs to control our computers
- acronym MB
- one bigger than bit
- the process of the computer starting up
45 Clues: acronym MB • means online • blank document • wireless internet • short term memory • an uneditable file • a printer, keyboard • one bigger than bit • provider of internet • also known as a tower • how safe you are online • an application for a job • the smallest storage unit • a drive for cd's or disks • the display on your computer • mac OSX is an _______, plural • a phone, ipad, ipod touch etc • ...
Cyber and digital literacy 2024-04-30
Across
- - Knowledge of cyber risks and precautions.
- - Writing instructions for computers.
- - Legal regulations governing cyberspace.
- - Right to control personal information.
- - Internet-based currency for online transactions.
- - Verification of a user's identity.
- - Individuals gaining unauthorized access to systems.
- - Global network connecting computers worldwide.
- - Practices to maintain online safety and security.
- - Accountability for one's online actions.
- - Gap between those with and without access to technology.
- - Banking services conducted over the internet.
- - Investigation of cybercrimes.
- - Fraudulent acquisition of someone's identity.
- - Representation of a person's online presence.
- - Study of human behavior in cyberspace.
- - Platforms for online social interaction.
- - Conflict conducted in the digital realm.
- - Programs and applications for computers.
- - Fraudulent attempt to obtain sensitive information.
- - Ethical behavior in the digital world.
Down
- - Education on protecting against cyber threats.
- - Electronic system for online financial transactions.
- - Gathering and analyzing digital threat information.
- - Securing data by converting it into a code.
- - Secret word or phrase to access a system.
- - Harassment or intimidation online.
- - Person raised in the digital age.
- - Measures to protect against cyber attacks.
- - Protection of digital systems from cyber threats.
- - Understanding of cyber threats and safety measures.
- - Protection against cyber-related losses.
- - Encoding data for secure transmission.
- - Shared values and norms in the digital community.
- - Barrier to block unauthorized access to a network.
- - Rights related to digital content and technology.
- - Mobile phone with advanced capabilities.
- - Criminal activities conducted via digital means.
- - Potential dangers to digital systems.
- - Promoting products or services online.
- - Responsible use of technology.
- - Unsolicited and often irrelevant messages.
- - Software designed to harm or infiltrate a system.
- - Protection of sensitive information.
- - Ability to effectively use digital tools and technologies.
- - Trail of data left by online activity.
- - Deliberate exploitation of computer systems.
- - Malicious software that replicates itself.
- - Unique name used to identify oneself online.
- - System of interconnected computers.
50 Clues: - Investigation of cybercrimes. • - Responsible use of technology. • - Person raised in the digital age. • - Harassment or intimidation online. • - Verification of a user's identity. • - Writing instructions for computers. • - System of interconnected computers. • - Protection of sensitive information. • - Potential dangers to digital systems. • ...
CYBER AND DIGITAL LITERACY 2024-04-30
Across
- - Knowledge of cyber risks and precautions.
- - Writing instructions for computers.
- - Legal regulations governing cyberspace.
- - Right to control personal information.
- - Internet-based currency for online transactions.
- - Verification of a user's identity.
- - Individuals gaining unauthorized access to systems.
- - Global network connecting computers worldwide.
- - Practices to maintain online safety and security.
- - Accountability for one's online actions.
- - Gap between those with and without access to technology.
- - Banking services conducted over the internet.
- - Investigation of cybercrimes.
- - Fraudulent acquisition of someone's identity.
- - Representation of a person's online presence.
- - Study of human behavior in cyberspace.
- - Platforms for online social interaction.
- - Conflict conducted in the digital realm.
- - Programs and applications for computers.
- - Fraudulent attempt to obtain sensitive information.
- - Ethical behavior in the digital world.
Down
- - Education on protecting against cyber threats.
- - Electronic system for online financial transactions.
- - Gathering and analyzing digital threat information.
- - Securing data by converting it into a code.
- - Secret word or phrase to access a system.
- - Harassment or intimidation online.
- - Person raised in the digital age.
- - Measures to protect against cyber attacks.
- - Protection of digital systems from cyber threats.
- - Understanding of cyber threats and safety measures.
- - Protection against cyber-related losses.
- - Encoding data for secure transmission.
- - Shared values and norms in the digital community.
- - Barrier to block unauthorized access to a network.
- - Rights related to digital content and technology.
- - Mobile phone with advanced capabilities.
- - Criminal activities conducted via digital means.
- - Potential dangers to digital systems.
- - Promoting products or services online.
- - Responsible use of technology.
- - Unsolicited and often irrelevant messages.
- - Software designed to harm or infiltrate a system.
- - Protection of sensitive information.
- - Ability to effectively use digital tools and technologies.
- - Trail of data left by online activity.
- - Deliberate exploitation of computer systems.
- - Malicious software that replicates itself.
- - Unique name used to identify oneself online.
- - System of interconnected computers.
50 Clues: - Investigation of cybercrimes. • - Responsible use of technology. • - Person raised in the digital age. • - Harassment or intimidation online. • - Verification of a user's identity. • - Writing instructions for computers. • - System of interconnected computers. • - Protection of sensitive information. • - Potential dangers to digital systems. • ...
CIHQ 2023 Summit 2023-09-21
Across
- Professional certification recently added by CIHQ
- This type of Jubilee for 2024 Summit to be held at Pedrotti’s Ranch in San Antonio
- <USP 800> details standards for handling this (2 wds)
- A plan for response to man-made and natural disasters (2 wds)
- Cool app used by summit attendees
- Adherence to established guidelines or specifications
- A national crisis associated with overdose and death
- Program or tool useful to identify potential non-compliance
- Gov body that develops CoPs
- Entitlements legally given to those seeking treatment (2 wds)
- Professionals that can assist with all compliance needs (3 wds)
- Created PTSD for healthcare workers
- Seal of approval that an organization meets quality and safety standards
- Process that destroys or eliminates all forms of microbial life
- Motivating others to achieve something new or better
- Reduces risk of HAI’s (2 wds)
- Responsible for providing direction and oversight (2 wds)
Down
- A code that protects building occupants from danger (2wds)
- Special event dinner at 2023 Summit (2 wds)
- Org. hosting this Summit and Certifications
- Measurable progress toward better patient care and outcomes (2 wds)
- Org. that play a critical role in fire safety
- Waterborne pathogen contributing to infection risk
- Method used to evaluate a healthcare organization’s compliance
- Method of providing health related services remotely
- Number one failure during a disaster
- Serious deficiency (2 wds)
- Obligation or willingness to accept responsibility for one's actions
- Prevents malware, ransom attacks and breaches
- Used to prevent or minimize exposure to hazards
- Physical or mental response to an external cause
- Evaluation of provider practice and qualifications
- Gov agency which sets and enforces standards to ensure workplace safety
- Standards to help mitigate risk in physical surroundings
- Contains objectives and info that is used in the mgmt of an event
- Item observed or discovered
36 Clues: Serious deficiency (2 wds) • Gov body that develops CoPs • Item observed or discovered • Reduces risk of HAI’s (2 wds) • Cool app used by summit attendees • Created PTSD for healthcare workers • Number one failure during a disaster • Special event dinner at 2023 Summit (2 wds) • Org. hosting this Summit and Certifications • Org. that play a critical role in fire safety • ...
Tecnohpreneurship dan Job Profile 2024-09-13
Across
- Keberanian dalam mengambil risiko yang telah diperhitungkan
- Kemampuan untuk mengidentifikasi peluang bisnis dan bertindak dengan cepat
- Sertifikasi dari EC-Council untuk profesional keamanan siber
- Sertifikasi yang fokus pada jaringan cloud AWS
- Kecenderungan untuk selalu mencari cara baru dan inovatif dalam bisnis
- Keyakinan pada diri sendiri dan kemampuan untuk mencapai tujuan
- Sertifikasi yang memvalidasi kemampuan virtualisasi jaringan
- Orang yang bertanggung jawab atas administrasi sistem jaringan
- Bisnis yang menawarkan pengembangan jaringan dan implementasi cloud
- Kemampuan untuk mengendalikan diri dan tetap tenang di bawah tekanan
- Sertifikasi untuk profesional keamanan informasi dari ISC²
- Profesi yang merancang dan memelihara jaringan telekomunikasi
- Sertifikasi tingkat lanjut dari Cisco untuk pengelolaan jaringan
- Sistem yang digunakan untuk membangun dan mengelola jaringan
- Kemampuan untuk menciptakan dan mengelola bisnis baru
- Profesi yang memonitor dan memecahkan masalah jaringan komputer
Down
- Istilah untuk jaringan komputer yang mencakup wilayah luas
- Jenis usaha yang menawarkan layanan instalasi jaringan
- Sertifikasi dari Juniper untuk pemahaman dasar jaringan
- Kemampuan untuk mengambil risiko secara bijak
- Sifat gigih dan tidak mudah menyerah dalam menghadapi tantangan
- Profesi yang bertanggung jawab atas desain dan arsitektur jaringan komputer
- Proses memulai bisnis baru dengan risiko yang terukur
- Profesi yang menangani pemecahan masalah jaringan di perusahaan
- Ketelitian dan perhatian pada detail kecil untuk menghindari kesalahan
- Profesi yang menangani masalah keamanan dan enkripsi data pada jaringan
- Proses menerapkan inovasi teknologi untuk menciptakan bisnis
- Sertifikasi tertinggi dalam bidang jaringan dari Cisco
- Rasa tanggung jawab dan komitmen yang tinggi terhadap pekerjaan
- Keinginan untuk berinovasi dan terus berkembang secara pribadi dan profesional
- Jenis usaha yang memberikan layanan pengelolaan keamanan jaringan
- Profesional yang bertugas mengelola infrastruktur jaringan
- Profesi yang bertanggung jawab atas keamanan jaringan dan pelaksanaan audit keamanan
- Sertifikasi untuk ahli teknologi jaringan nirkabel
- Sertifikasi dasar untuk jaringan dari Cisco.
35 Clues: Sertifikasi dasar untuk jaringan dari Cisco. • Kemampuan untuk mengambil risiko secara bijak • Sertifikasi yang fokus pada jaringan cloud AWS • Sertifikasi untuk ahli teknologi jaringan nirkabel • Proses memulai bisnis baru dengan risiko yang terukur • Kemampuan untuk menciptakan dan mengelola bisnis baru • Jenis usaha yang menawarkan layanan instalasi jaringan • ...
JESA 2024-11-24
Across
- The acquisition of knowledge or skills through study or experience.
- The process of planning and organizing tasks over time.
- A modest view of one's own importance.
- He is the first JFN 2024-2025 Senior Talk Guest.
- The degree of excellence met by a product or service.
- The process of creating new ideas, methods, or products.
- A professional who manages and monitors project expenses.
- The act of guiding and supporting less experienced individuals.
- A key support to JFN, and first JFN president
- The practice of protecting systems, networks, and programs from digital attacks
- He is a key person of JESA construction
- JESA under 32s community that organizes incredible events
- Adherence to strong ethical and moral principles.
- A professional who applies scientific principles to design and build systems.
- Social activities or gatherings after work hours.
Down
- She is the Training manager and has the same name as the JESA Innovation Director
- The process of finding and hiring skilled employees.
- The advancement of an employee to a higher position.
- The inclusion of different types of people or ideas.
- The collaborative effort of a group to achieve a common goal.
- The condition of being protected from harm or risk.
- A financial plan for allocating resources to a project.
- The coordination of people and resources to achieve goals efficiently.
- A framework for health, safety, and environmental management.
- Head of Department, responsible for overseeing a specific unit.
- An increase in size, value, or importance over time.
- The adoption of digital technology to improve processes.
- the highest-ranking person in a company.
- The ability to quickly adapt to changes.
- The provision of necessary attention and support.
- An engineer who oversees technical and project management tasks.
- A temporary endeavor undertaken to create a unique product, service, or result.
- Open to all and not limited by exclusion.
- JESA's HSE label emphasizing safety and excellence
34 Clues: A modest view of one's own importance. • He is a key person of JESA construction • the highest-ranking person in a company. • The ability to quickly adapt to changes. • Open to all and not limited by exclusion. • A key support to JFN, and first JFN president • He is the first JFN 2024-2025 Senior Talk Guest. • The provision of necessary attention and support. • ...
Risk management 2023-01-17
Across
- Establish and enforce controls that prevent changing information without data owner permission
- whether to accept, transfer, mitigate, or refuse the risk.
- letting only the people with higher privilege access the files.
- process of finding potential issues.
- Establish and enforce controls that prevent systems, networks, and software from being out of service.
- Conceptually,identifying the locations where your data resides seems simple enough.
- firewalls, data encryption, data backups, keeping hardware up to date, and putting in place multi-factor authentication controls, to keep attacks at bay.
- Building and maintaining a secure IT infrastructure is critical to preventing cybersecurity risks.
- Any individual, group, or organization conducting an attack on a computer, network, or computerized system with the aim of compromising that system
- The consequences of an incident to the organization, including financial loss, reputational damage, and hidden costs in operational disruption
- When an attacker discovers a vulnerability and uses it to gain unauthorized access
Down
- Process of determining which type of access an authenticated user, device, or system has to a given resource
- Establish and enforce appropriate authorization controls so that only users who need access have access.
- An individual or system is able to use a particular resource, either physically or virtually.
- Establishing strict authentication and authorization procedures can minimize the data security risks in your organization.
- Individuals, groups, and organizations operating to damage, steal, or disrupt an organization’s applications or data along with the strategies that accomplish these goals
- You need to determine how the risk each poses overlaps and impacts the potential for a malicious actor to attack.
- Trying to avoid compromising events as a way to eliminate liability.
- Events involved in accessing and transferring data
- potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization
- Set of activities that detect, describe and catalog all potential risks to assets and processes
21 Clues: process of finding potential issues. • Events involved in accessing and transferring data • whether to accept, transfer, mitigate, or refuse the risk. • letting only the people with higher privilege access the files. • Trying to avoid compromising events as a way to eliminate liability. • ...
Know your QMS! 2020-07-23
Across
- A Bug state where all work activities except test is done and includes investigation, design, code, documentation etc (6)
- Process of protecting information by preventing, detecting and responding to attacks (13)
- A term used for testing an application with the primary goal of getting the application to fail. It is synonymous with "negative" testing or "exceptions" testing. (11,8)
- The manufacturer’s objective intent for the device and its usage – Intended use (8,3)
- Folder in DHF structure where documentation such as drawings, product documentation, labeling, device specifications, sw documentation etc…..(6,6)
- Any change to product is controlled by a 7 step process (11,6,5)
- Name one of the project outcomes of tollgate meetings where the project is being terminated and the result is documented (4)
- Instruction that outlines how to assign a software safety class based on the risk of harm, defined in the product risk management plan (8,6,14)
Down
- The group that decides to approve or postpone or reject proposed changes for a specific project (6,7,5)
- The Software Hotfix Release process cannot be used for _______________ modifications(10)
- Examination of your task/activities performed at every milestone of your project(6,6)
- One of the activities performed periodically to check if the __________________ is carried out as described in the PMS Plan (4,6,12)
- Name of the procedure in RMED QMS where the ‘Retention Period’ for all the created documents are specified (7,6)
- Defined as any identifiable part of a computer program, i.e., source code, object code, control code, control data, or a collection of these (8, 4)
- QSR Section number related to Design Verification (3,2,1)
15 Clues: QSR Section number related to Design Verification (3,2,1) • Any change to product is controlled by a 7 step process (11,6,5) • Examination of your task/activities performed at every milestone of your project(6,6) • The manufacturer’s objective intent for the device and its usage – Intended use (8,3) • ...
Know your QMS! 2020-07-23
Across
- A Bug state where all work activities except test is done and includes investigation, design, code, documentation etc (6)
- Process of protecting information by preventing, detecting and responding to attacks (13)
- A term used for testing an application with the primary goal of getting the application to fail. It is synonymous with "negative" testing or "exceptions" testing. (11,8)
- The manufacturer’s objective intent for the device and its usage(8,3)
- Folder in DHF structure where documentation such as drawings, product documentation, labeling, device specifications, sw documentation etc…..(6,6)
- Any change to product is controlled by a 7 step process (11,6,5)
- Name one of the project outcomes of tollgate meetings where the project is being terminated and the result is documented (4)
- Instruction that outlines how to assign a software safety class based on the risk of harm, defined in the product risk management plan (8,6,14)
Down
- The group that decides to approve or postpone or reject proposed changes for a specific project (6,7,5)
- The Software Hotfix Release process cannot be used for _______________ modifications(10)
- Examination of your task/activities performed at every milestone of your project(6,6)
- One of the activities performed periodically to check if the __________________ is carried out as described in the PMS Plan (4,6,12)
- Name of the procedure in RMED QMS where the ‘Retention Period’ for all the created documents are specified (7,6)
- Defined as any identifiable part of a computer program, i.e., source code, object code, control code, control data, or a collection of these (8, 4)
- QSR Section number related to Design Verification (3,2,1)
15 Clues: QSR Section number related to Design Verification (3,2,1) • Any change to product is controlled by a 7 step process (11,6,5) • The manufacturer’s objective intent for the device and its usage(8,3) • Examination of your task/activities performed at every milestone of your project(6,6) • ...
Executive Departments Crossword Puzzle 2022-02-10
Across
- Responsible for fostering, promoting, and developing the welfare of the wage earners, such as federal minimum wage and overtime pay.
- Responsible for providing benefits, health care and cemetery services, such as the National Cemetery Administration.
- Responsible for providing leadership on food, agriculture, natural resources, and related issues, such as managing the American farming industry
- Responsible for managing public lands and minerals, such as the National Park Service.
- Responsible for leading and facilitating the development and implementation of a quality public education system, such as collecting data on trends.
- Responsible for promoting job creation and economic growth by ensuring fair trade, such as measuring the health and vitality of the economy
- Responsible for providing the military forces needed to deter war, such as the Army or Navy.
Down
- Responsible for administering programs that provide community developing assistance, such as revitalizing neighborhoods
- Responsible for advising the President and leads the nation in foreign policy issues, such as the CIA and the US Agency
- Responsible for advancing the environmental and nuclear security of the US, such as managing the US nuclear infrastructure.
- Responsible for enforcing the law and defending the interests of the US, such as the FBI.
- Responsible for counterterrorism, cybersecurity, aviation security, such as the US Customs and Border Patrol.
- Responsible for planning and coordinating federal transportation projects, such as the Federal Highway Administration.
- Responsible for managing Federal finances by collecting taxes and paying bills, such as enforcing finance and tax laws
- Responsible for enhancing the health and well-being of all Americans, such as providing essential human services.
15 Clues: Responsible for managing public lands and minerals, such as the National Park Service. • Responsible for enforcing the law and defending the interests of the US, such as the FBI. • Responsible for providing the military forces needed to deter war, such as the Army or Navy. • ...
Defense Departments 2024-05-14
Across
- Experts who protect computers and the internet from bad guys who try to do harm.
- Brave people who wear uniforms and work together to keep our country safe. They have different groups like the Army, Navy, Air Force, and Marines.
- A big, five-sided building where important decisions about keeping our country safe are made.
- Pilots who fly planes way up in the sky to protect us.
- Brave sailors who protect our seas and oceans. They travel on big ships.
- Part-time soldiers who help out in emergencies like floods or fires. They also protect our country when needed.
- Tools and machines that soldiers use to defend our country, like guns, tanks, and planes.
Down
- People who make sure our country is safe from bad things like terrorists or big disasters.
- Soldiers who work on the ground, marching and using tanks and big guns.
- Heroes who keep our coasts safe. They rescue people in trouble and stop bad guys on the water.
- Smart people who find out important information to keep us safe. They solve puzzles to know what’s going on in the world.
- Making sure all the right things are in the right place at the right time for our soldiers to do their job well.
- Protecting our country and people from bad things happening.
- Planning Figuring out the best ways to keep our country safe and making plans to do it.
- Tough soldiers who can fight on land or at sea. They’re like a mix of the Army and Navy.
15 Clues: Pilots who fly planes way up in the sky to protect us. • Protecting our country and people from bad things happening. • Soldiers who work on the ground, marching and using tanks and big guns. • Brave sailors who protect our seas and oceans. They travel on big ships. • Experts who protect computers and the internet from bad guys who try to do harm. • ...
Chapter 4 2025-04-28
Across
- It is one of the basic education research agenda that centers on administration and stakeholder engagement.
- Process of improving curriculum competencies, educational resources, and teaching-learning processes in relation to the learner’s community’s bio geographical, historical, and socio-cultural context.
- An analysis of tech in the curriculum examines how technology strengthens learning, exposes weaknesses like cost, creates opportunities for innovation, and presents threats like inequality and cybersecurity issues.
Down
- Educational process of connecting the curriculum to a specific setting, situation, or area of application in order to make the competencies more relevant, meaningful, & useful to the learners.
- One of the challenges in the role of technology in Curriculum, that not all students have equal access to technology
5 Clues: It is one of the basic education research agenda that centers on administration and stakeholder engagement. • One of the challenges in the role of technology in Curriculum, that not all students have equal access to technology • ...
