cybersecurity Crossword Puzzles

mari 2024-05-20

mari crossword puzzle
Across
  1. a decentralized digital currency
  2. the application of conceptual knowledge for
  3. a wide range of criminal activity that are
  4. providing the appearance of smth without reality
  5. practice and study of techniques for secure
  6. the process of writing computer software code
Down
  1. study and experimentation of algorithmic process
  2. a public distributed ledger of lists of records
  3. protection of computer systems and networks
  4. collection of accounts in which accounting
  5. a potential for vulnerabilities to turn into
  6. a digital currency designated to work as
  7. a device that can make and receive calls over
  8. the minimum amount of any physical entity involved
  9. the opposite of natural

15 Clues: the opposite of naturala decentralized digital currencya digital currency designated to work ascollection of accounts in which accountinga wide range of criminal activity that areprotection of computer systems and networksthe application of conceptual knowledge forpractice and study of techniques for secure...

Electricity back 2023-05-30

Electricity back crossword puzzle
Across
  1. Measures the voltage in a circuit
  2. Measurement of electrical power
  3. Power lines connecting power supplies to homes in a large area
  4. A place to plug in a device
  5. Power used by a device
  6. Makes your hair stand up, gives a shock
  7. Online protection
Down
  1. Too much power at one time
  2. Transfers electricity from one circuit to another with more or less power
  3. Portable power supply, can power a remote
  4. Anything that makes power, like a generator or a battery
  5. Protects us from electric shocks
  6. Measures the current in a circuit
  7. Adjusts the power in a circuit
  8. Happens again and again

15 Clues: Online protectionPower used by a deviceHappens again and againToo much power at one timeA place to plug in a deviceAdjusts the power in a circuitMeasurement of electrical powerProtects us from electric shocksMeasures the voltage in a circuitMeasures the current in a circuitMakes your hair stand up, gives a shock...

soca 2023-03-13

soca crossword puzzle
Across
  1. Type Gryphons plan & organize ______-___-___ competitions
  2. ______ organized the SOC Open House.
  3. SEED hosts the ___-___-Series
  4. SOCC’s _____ department is in charge of planning events
  5. Programming competition only for freshmen
  6. SOCA is In charge of ________ relations
  7. Gryphons aims to promote ________ to students that are passionate about IT
  8. SOCC is in charge of maintaining and building ________ relations
Down
  1. SPAI is part of the AI Singapore Student ________
  2. SPAI attended and presented at the ____ Conference.
  3. SOCA’s ________ department is the first point of contact with outside organizations.
  4. SEED stands for Sharing, _______, Enriching, Development
  5. Gryphon’s Mascot
  6. SPAI created its own Project _____.
  7. SOCC organized Freshman Orientation ______

15 Clues: Gryphon’s MascotSEED hosts the ___-___-SeriesSPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relationsProgramming competition only for freshmenSOCC organized Freshman Orientation ______SPAI is part of the AI Singapore Student ________SPAI attended and presented at the ____ Conference....

Technology 2024-01-26

Technology crossword puzzle
Across
  1. Smallest unity of information
  2. Small electronic devices that make your life easier.
  3. Electronic devices that you can wear as accessories.
  4. About conersing analog information to a digital ones.
  5. Intenet of things.
  6. To protect systems or data from cybernetics attacks.
  7. Programmable machine to automate processes
Down
  1. The smallest technology.
  2. It's used to talk to someone that is far from you.
  3. A process or set of rules that solve a specific problem.
  4. Msurament and analysis about unique physical of everyone.
  5. Aereal no tipulated devices
  6. Can make tridimensional images to crate optical illusions.
  7. Generally, the not physical about a computer.
  8. It's used to protect data encoding the information.

15 Clues: Intenet of things.The smallest technology.Aereal no tipulated devicesSmallest unity of informationProgrammable machine to automate processesGenerally, the not physical about a computer.It's used to talk to someone that is far from you.It's used to protect data encoding the information.Small electronic devices that make your life easier....

BACO Conference Team Builder 2024-11-20

BACO Conference Team Builder crossword puzzle
Across
  1. – The process of identifying and analyzing risks.
  2. – Violation of a law, duty, or agreement.
  3. – Abbreviation for Foreign Corrupt Practices Act.
  4. – Consequences for failing to follow regulations.
  5. – Recording and documenting compliance breaches.
  6. – Procedures to ensure proper operation of systems.
  7. – A professional responsible for managing compliance.
  8. – Protecting systems and data from cyber threats.
Down
  1. – Measures to prevent illicit financial activities.
  2. – A group responsible for overseeing ethical practices.
  3. – An in-house review of processes and systems.
  4. – The act of making information known.
  5. – Adherence to moral and ethical principles.
  6. – A set of rules outlining acceptable behaviors.
  7. – Relating to rules issued by governing bodies.

15 Clues: – The act of making information known.– Violation of a law, duty, or agreement.– Adherence to moral and ethical principles.– An in-house review of processes and systems.– Relating to rules issued by governing bodies.– Recording and documenting compliance breaches.– A set of rules outlining acceptable behaviors....

Technology Terminology 2022-09-26

Technology Terminology crossword puzzle
Across
  1. Imaginary creatures that cause unexplained technology problems
  2. IT protection.
  3. Computer that manages access to centralized resource.
Down
  1. American multinational technology corporation based in Washington.
  2. Location of multiple centralized IT resources.
  3. Tool used to send and receive data across shared or public networks.
  4. Data "rains" from here.
  5. Interconnected people or technology.

8 Clues: IT protection.Data "rains" from here.Interconnected people or technology.Location of multiple centralized IT resources.Computer that manages access to centralized resource.Imaginary creatures that cause unexplained technology problemsAmerican multinational technology corporation based in Washington....

CYBER AWARENESS 2024-11-02

CYBER AWARENESS crossword puzzle
Across
  1. A group of experts dedicated to responding to computer security incidents.
  2. The practice of protecting computer systems and networks from digital attacks.
  3. The process of converting data into an unreadable format to protect it from unauthorized access.
  4. Acronym for the process of collecting and analyzing publicly available information to gain insights.
  5. The unauthorized access to computer systems or networks.
  6. A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
  7. Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
  8. A security system that monitors and controls network traffic.
  9. The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
  10. Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
  11. Malicious software designed to harm computer systems or networks.
  12. A network of compromised computers controlled by an attacker.
Down
  1. Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
  2. Malware that encrypts a victim's data and demands a ransom for its decryption.
  3. Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
  4. The likelihood of a threat exploiting a vulnerability and causing harm.
  5. A weakness in a system or network that can be exploited by attackers.
  6. A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
  7. The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
  8. Web A part of the internet that is not indexed by search engines and requires special software to access.
  9. A group of information security experts who respond to malware attacks or other computer security incidents.
  10. Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
  11. Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
  12. Illegal activities committed using computer networks or devices.

24 Clues: The unauthorized access to computer systems or networks.A security system that monitors and controls network traffic.A network of compromised computers controlled by an attacker.Illegal activities committed using computer networks or devices.Malicious software designed to harm computer systems or networks....

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Fundamentals of CYbersecurity 2023-01-22

Fundamentals of CYbersecurity crossword puzzle
Across
  1. secrecy of the information
  2. Involves a computer or computer network
  3. Warning for malicious activity
  4. control Role management and rule management
  5. Weakness in information system
Down
  1. assurance that the information received is exact and accurate
  2. enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
  3. Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
  4. Attempt to gain unauthorized access
  5. Virtual component world
  6. security triads
  7. identify the user or system or the entity

12 Clues: security triadsVirtual component worldsecrecy of the informationWarning for malicious activityWeakness in information systemAttempt to gain unauthorized accessInvolves a computer or computer networkidentify the user or system or the entitycontrol Role management and rule managementassurance that the information received is exact and accurate...

Cybersecurity Awareness Month 2023-09-21

Cybersecurity Awareness Month crossword puzzle
Across
  1. ____ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the use
  2. Secure your home wi-fi network with ____ password to prevent unauthorized access
  3. Do not open email attachment or click on ____ from an unknown or unsolicited sources
  4. Regularly ____ your important data to prevent data loss in case of cyberattack
  5. Always ____ any suspicious activity or security incident to security team immediately
  6. Be cautious about oversharing ___ information online as it could be used for social engineering attacks
  7. Email scam or attempt to trick you into giving your password or personal information
Down
  1. ____ is something you should always change and never share with anyone else.
  2. Never uninstall ____ software that is designed to destroy computer viruses
  3. Do not leave your ____ unattended
  4. Regularly review and adjust your ___ settings on social media and online accounts
  5. Always use ____ websites/Appstore's when downloading apps to reduce risk of malware

12 Clues: Do not leave your ____ unattendedNever uninstall ____ software that is designed to destroy computer viruses____ is something you should always change and never share with anyone else.Regularly ____ your important data to prevent data loss in case of cyberattackSecure your home wi-fi network with ____ password to prevent unauthorized access...

Cybersecurity & Data Protection 2022-11-16

Cybersecurity & Data Protection crossword puzzle
Across
  1. One of the acronyms in the data breach response plan CARE framework.
  2. I am one possible cause of a data breach
  3. It is phising with text messages
  4. Stop and think before you download
  5. I identify, assess and address personal data protection risks specific to SCC.
  6. I run like scam ads
  7. I process personal data on behalf of SCC
Down
  1. These should not be left around the office
  2. Do this over email links to display URL
  3. A malicious software. You cannot access your files unless you pay a ransom
  4. I file incident reports to PDPC if necessary.
  5. Who you gonna call when a data breach is suspected or confirmed?

12 Clues: I run like scam adsIt is phising with text messagesStop and think before you downloadDo this over email links to display URLI am one possible cause of a data breachI process personal data on behalf of SCCThese should not be left around the officeI file incident reports to PDPC if necessary....

CyberSecurity Awareness 2021 2021-10-15

CyberSecurity Awareness 2021 crossword puzzle
Across
  1. the art of manipulating, influencing or deceiving you in order to gain control over your computer system.
  2. considered one or the best places to work
  3. subject matter of the most clicked on email from our 11/14/21 phish campaign
  4. October is Awareness Month for this
  5. disruptive, unsolicited messages (such as emails, text messages, or Internet postings) especially commercial messages, sent to a large number of recipients or posted in a large number of places.
  6. a method used by social engineers to gain access to a building or other protected area.
  7. 123456 and MyDOB01012010 are examples of what kind of Password?
Down
  1. the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity.
  2. subject matter of the most clicked on email from our 11/07/21 phish campaign
  3. misspelled words and a sense of urgency for you to take a questionable action an email, are be considered to be recognizable what?
  4. type of phishing that is a small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.
  5. MyCowRanAwayToTheMoon is an example of a

12 Clues: October is Awareness Month for thisMyCowRanAwayToTheMoon is an example of aconsidered one or the best places to work123456 and MyDOB01012010 are examples of what kind of Password?subject matter of the most clicked on email from our 11/07/21 phish campaignsubject matter of the most clicked on email from our 11/14/21 phish campaign...

Enterprise manual 2022-06-21

Enterprise manual crossword puzzle
Across
  1. CYBERSECURITY
  2. DATA PRIVACY
Down
  1. HIGH VALUE TECHNICAL INFORMATON
  2. COMPANY LEGAL MATTERS
  3. CATERPILLAR CONFIDENTIAL INFORMATION

5 Clues: DATA PRIVACYCYBERSECURITYCOMPANY LEGAL MATTERSHIGH VALUE TECHNICAL INFORMATONCATERPILLAR CONFIDENTIAL INFORMATION

crossword #1 2023-03-15

crossword #1 crossword puzzle
Across
  1. Change: Long-term change in global climate patterns.
  2. Practical application of scientific knowledge.
  3. Acquisition of knowledge and skills.
  4. Physical and mental wellbeing.
  5. Protection of computer systems and data.
  6. Meeting present needs without compromising future generations.
Down
  1. Integration and interaction among people, companies, and governments worldwide.
  2. Setting up a business and taking financial risks for profit.
  3. Media: Online platforms for creating and sharing content.
  4. Intelligence: Machines that think and learn like humans.
  5. Inclusion of people from different backgrounds.

11 Clues: Physical and mental wellbeing.Acquisition of knowledge and skills.Protection of computer systems and data.Practical application of scientific knowledge.Inclusion of people from different backgrounds.Change: Long-term change in global climate patterns.Intelligence: Machines that think and learn like humans....

Kuis Audit TI 2024-03-04

Kuis Audit TI crossword puzzle
Across
  1. sistem manajemen audit yang digunakan Itjen
  2. Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK
  3. pengendalian proses hanya melihat input dan output
  4. Salah satu area audit TIK
Down
  1. Memastikan keselarasan bisnis dan TIK
  2. pengendalian yang dilakukan oleh manusia tanpa bantuan mesin
  3. Audit TIK terintegrasi yang dilakukan secara bersamaan
  4. Audit TIK terintegrasi yang dilakukan secara berurutan
  5. Auditor harus ... yang artinya memiliki kemampuan untuk melakukan tugas audit
  6. singkatan dari pengendalian aplikasi
  7. Pengujian secara sistematis untuk memberikan keyakinan terbatas

11 Clues: Salah satu area audit TIKsingkatan dari pengendalian aplikasiMemastikan keselarasan bisnis dan TIKsistem manajemen audit yang digunakan Itjenpengendalian proses hanya melihat input dan outputAudit TIK atas pelaksanaan tusi yang memanfaatkan TIKAudit TIK terintegrasi yang dilakukan secara bersamaan...

Vanessa and Jinsik <3 2024-09-06

Vanessa and Jinsik <3 crossword puzzle
Across
  1. How many months have Vanessa and Jinsik been together?
  2. How many people are in the wedding party?
  3. Where do Vanessa and Jinsik live?
  4. How did Vanessa and Jinsik meet?
  5. How old is Vanessa?
  6. Where did Jinsik propose?
Down
  1. What does Jinsik do for work?
  2. Where are Vanessa and Jinsik going for their honeymoon?
  3. How old is Jinsik?
  4. What holiday did Vanessa and Jinsik first spend together?
  5. How many kids do Vanessa and Jinsik want?

11 Clues: How old is Jinsik?How old is Vanessa?Where did Jinsik propose?What does Jinsik do for work?How did Vanessa and Jinsik meet?Where do Vanessa and Jinsik live?How many people are in the wedding party?How many kids do Vanessa and Jinsik want?How many months have Vanessa and Jinsik been together?Where are Vanessa and Jinsik going for their honeymoon?...

Group 1 - CSE 167 2022-11-16

Group 1 - CSE 167 crossword puzzle
Across
  1. What's the weakest element in Cybersecurity
  2. The fake folder that acts as bait for hackers.
  3. The I in the CIA Triad
  4. The A in the CIA Triad
  5. All companies should have a ____ framework
Down
  1. The C in the CIA Triad
  2. An area that a hacker can use for their benefit
  3. Websites identify
  4. A type of key to use in Asymmetric encryption
  5. How to make a message secret.
  6. A copy of data that could be lost

11 Clues: Websites identifyThe C in the CIA TriadThe I in the CIA TriadThe A in the CIA TriadHow to make a message secret.A copy of data that could be lostAll companies should have a ____ frameworkWhat's the weakest element in CybersecurityA type of key to use in Asymmetric encryptionThe fake folder that acts as bait for hackers....

R&D India Market Place 2022-11-09

R&D India Market Place crossword puzzle
Across
  1. own your_______
  2. ____ is at the core of our purpose, culture and business.
  3. Reducing the operational carbon emissions in our supply chain
  4. chairman and CEO
  5. one of our core values
  6. internal tool for mobility, projects and mentorships
Down
  1. IoT, mobility, sensing, cloud, analytics and cybersecurity to deliver Innovation at Every Level.
  2. We are Globally recognised for____
  3. one of our 6 long term commitments

9 Clues: own your_______chairman and CEOone of our core valuesWe are Globally recognised for____one of our 6 long term commitmentsinternal tool for mobility, projects and mentorships____ is at the core of our purpose, culture and business.Reducing the operational carbon emissions in our supply chain...

crossword! 2024-02-03

crossword! crossword puzzle
Across
  1. Usually consists of 8 bits
  2. Invisible barrier for women advancing in the workplace
  3. left no crumbs
  4. Mentor applications are due on the _
  5. Film about under-recognized Black women at NASA who were a key part of its success
  6. Most commonly-used programming language
Down
  1. practice of protecting systems, networks, and programs from digital attacks
  2. Purdue's first women-centric hackathon ;)
  3. When women are generally paid less than men
  4. women in _

10 Clues: women in _left no crumbsUsually consists of 8 bitsMentor applications are due on the _Most commonly-used programming languagePurdue's first women-centric hackathon ;)When women are generally paid less than menInvisible barrier for women advancing in the workplacepractice of protecting systems, networks, and programs from digital attacks...

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. Unethical practice of gaining unauthorized access to computer systems.
  2. Act of impersonating a legitimate entity to deceive individuals or gain access.
  3. A type of computer memory.
  4. A small portable computer.
Down
  1. Securing computer systems against unauthorized access.
  2. A popular operating system.
  3. The brain of a computer.
  4. Term for gaining access to a secure network through.
  5. Malicious software used to gain unauthorised access to computer systems.
  6. Desired outcomes.

10 Clues: Desired outcomes.The brain of a computer.A type of computer memory.A small portable computer.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems....

PROFESI DAN PELUANG USAHA DI BIDANG TKJT 2023-11-17

PROFESI DAN PELUANG USAHA DI BIDANG TKJT crossword puzzle
Across
  1. Orang yang merancang dan mengembangkan perangkat lunak.
  2. Orang yang ahli dalam merancang rangkaian listrik.
  3. Bisnis yang fokus pada pengembangan aplikasi mobile.
  4. Bisnis yang menyediakan layanan keamanan jaringan.
  5. Orang yang spesialis dalam keamanan informasi.
Down
  1. Bisnis yang menyediakan solusi perangkat lunak ERP.
  2. Orang yang bekerja dengan perangkat keras komputer.
  3. Bisnis yang menyediakan solusi penyimpanan data.
  4. Bisnis yang menyediakan layanan cloud computing.
  5. Orang yang ahli dalam analisis data besar.

10 Clues: Orang yang ahli dalam analisis data besar.Orang yang spesialis dalam keamanan informasi.Bisnis yang menyediakan solusi penyimpanan data.Bisnis yang menyediakan layanan cloud computing.Orang yang ahli dalam merancang rangkaian listrik.Bisnis yang menyediakan layanan keamanan jaringan.Bisnis yang menyediakan solusi perangkat lunak ERP....

WeWork Noble House Community 2022-06-25

WeWork Noble House Community crossword puzzle
Across
  1. Solving the world's 1 gigaton refrigerant problem
  2. Pioneer of global content service and distribution
  3. Offering lead generation services from B2B telemarketing to inside sales
  4. Supporting diverse clean energy entrepreneurs to thrive
Down
  1. #DemiMasaDepan #MakingEducationAffordable
  2. Consumer intelligence platform specializing in mobile advertising
  3. SaaS platform that makes cybersecurity accessible to all
  4. Logistics service provider
  5. Language learning platform, mainly Chinese
  6. Consumer electronics company, well-known for its technologically advanced smartwatch

10 Clues: Logistics service provider#DemiMasaDepan #MakingEducationAffordableLanguage learning platform, mainly ChineseSolving the world's 1 gigaton refrigerant problemPioneer of global content service and distributionSupporting diverse clean energy entrepreneurs to thriveSaaS platform that makes cybersecurity accessible to all...

mari 2024-05-20

mari crossword puzzle
Across
  1. a decentralized digital currency
  2. the application of conceptual knowledge for
  3. a wide range of criminal activity that are
  4. providing the appearance of smth without reality
  5. practice and study of techniques for secure
  6. the process of writing computer software code
Down
  1. study and experimentation of algorithmic process
  2. a public distributed ledger of lists of records
  3. protection of computer systems and networks
  4. collection of accounts in which accounting
  5. a potential for vulnerabilities to turn into
  6. a digital currency designated to work as
  7. a device that can make and receive calls over
  8. the minimum amount of any physical entity involved
  9. the opposite of natural

15 Clues: the opposite of naturala decentralized digital currencya digital currency designated to work ascollection of accounts in which accountinga wide range of criminal activity that areprotection of computer systems and networksthe application of conceptual knowledge forpractice and study of techniques for secure...

ISSN Day 2 2024-09-09

ISSN Day 2 crossword puzzle
Across
  1. Entry-level certification for IT technicians (2 words)
  2. Career path for someone with CCNA (2 words)
  3. Network certification from Cisco (acronym)
  4. Type of device covered in A+ certification, besides computers
Down
  1. Career path for someone with A+ (2 words)
  2. Network topic covered in CCNA
  3. Security topic covered in Security+ certification
  4. Cybersecurity certification from CompTIA
  5. Operating system topic covered in A+ certification

9 Clues: Network topic covered in CCNACybersecurity certification from CompTIACareer path for someone with A+ (2 words)Network certification from Cisco (acronym)Career path for someone with CCNA (2 words)Security topic covered in Security+ certificationOperating system topic covered in A+ certificationEntry-level certification for IT technicians (2 words)...

cybersecurity 2023-03-03

cybersecurity crossword puzzle
Across
  1. The practice of protecting computer systems from theft, damage, and unauthorized access. (11)
  2. A software program designed to prevent unauthorized access to a computer system. (8)
Down
  1. A type of attack that attempts to overwhelm a system with traffic. (4)
  2. A type of cyber attack that attempts to obtain sensitive information by tricking users. (6)
  3. A type of encryption that uses two keys to encrypt and decrypt data. (3)

5 Clues: A type of attack that attempts to overwhelm a system with traffic. (4)A type of encryption that uses two keys to encrypt and decrypt data. (3)A software program designed to prevent unauthorized access to a computer system. (8)A type of cyber attack that attempts to obtain sensitive information by tricking users. (6)...

Cybersecurity 2023-05-11

Cybersecurity crossword puzzle
Across
  1. A process that proves the identity of the user
  2. The art of writing or solving codes
  3. A cyberattack carried out by creating a fake website, or compromising/ corrupting a real one, in order to gather information or data on visitors
Down
  1. The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it
  2. A cyberattack carried out by sending emails to large numbers of people asking for sensitive information

5 Clues: The art of writing or solving codesA process that proves the identity of the userThe process of encoding or scrambling data to prevent unauthorized people from opening or accessing itA cyberattack carried out by sending emails to large numbers of people asking for sensitive information...

Cybersecurity 2024-04-23

Cybersecurity crossword puzzle
Across
  1. Persoon die ongeoorloofd toegang probeert te krijgen tot een netwerk of computer
  2. Software die bestanden infecteert en zich zelf kan vermenigvuldigen
  3. Poging tot het achterhalen van persoonlijke gegevens
Down
  1. Verzamelnaam voor malafide software
  2. Ongevraagde mail

5 Clues: Ongevraagde mailVerzamelnaam voor malafide softwarePoging tot het achterhalen van persoonlijke gegevensSoftware die bestanden infecteert en zich zelf kan vermenigvuldigenPersoon die ongeoorloofd toegang probeert te krijgen tot een netwerk of computer

Cittadinanza digitale 2021-11-15

Cittadinanza digitale crossword puzzle
Across
  1. bullismo in rete
  2. la sicurezza informatica
  3. insieme di regole per il buon comportamento su internet
Down
  1. il pirata del sistema informatico
  2. colui che infetta i file
  3. parola segreta legata a un account
  4. rete di computer che possono comunicare tra loro

7 Clues: bullismo in retecolui che infetta i filela sicurezza informaticail pirata del sistema informaticoparola segreta legata a un accountrete di computer che possono comunicare tra loroinsieme di regole per il buon comportamento su internet

Smart System 2021-06-08

Smart System crossword puzzle
Across
  1. maintenance of systems
  2. smart system incorporate functions of sensing, actuation and?
  3. application that involves wireless sensors
  4. example of smart system - monitoring
Down
  1. application of tackling with climate change
  2. #1 cons of the smart system
  3. application improving quality of life

7 Clues: maintenance of systems#1 cons of the smart systemexample of smart system - monitoringapplication improving quality of lifeapplication that involves wireless sensorsapplication of tackling with climate changesmart system incorporate functions of sensing, actuation and?

CTE Pathway Lake Highlands HS 2022-11-16

CTE Pathway Lake Highlands HS crossword puzzle
Across
  1. Computer Science Magnet Pathway (Level 3)
  2. Manufacturing Technology Magnet Pathway (Level 1)
  3. Digital Communications -AV Production Pathway (Level 2)
Down
  1. Legal Studies Magnet Pathway (Level 1)
  2. Cybersecurity Magnet Pathway (Level 4)
  3. Robotics Pathway (Level 4)
  4. Culinary Arts Magnet Pathway (Level 3)

7 Clues: Robotics Pathway (Level 4)Legal Studies Magnet Pathway (Level 1)Cybersecurity Magnet Pathway (Level 4)Culinary Arts Magnet Pathway (Level 3)Computer Science Magnet Pathway (Level 3)Manufacturing Technology Magnet Pathway (Level 1)Digital Communications -AV Production Pathway (Level 2)

High School Pathways 2024-04-26

High School Pathways crossword puzzle
Across
  1. Take courses to become a teacher
  2. Take courses about wildlife, plants and animals
  3. Finish 2 years of your Bachelor's Degree
  4. Take courses on building, carpentry work
Down
  1. Take courses in computer technology
  2. Course towards medical fields
  3. Earn a welding certificate

7 Clues: Earn a welding certificateCourse towards medical fieldsTake courses to become a teacherTake courses in computer technologyFinish 2 years of your Bachelor's DegreeTake courses on building, carpentry workTake courses about wildlife, plants and animals

Network Components 2022-10-27

Network Components crossword puzzle
Across
  1. a device used at the customer premises to terminate a dial-up Integrated Services Digital Network line and connect it to a computer or a local area network
  2. a transmitter and a receiver of signals, such as analog or digital
  3. a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
  4. a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals
  5. is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
  1. networking devices that connect networks
  2. a network node used in telecommunications that connects two networks with different transmission protocols together
  3. a hardware component responsible for relaying data from a computer network to the destination endpoint

8 Clues: networking devices that connect networksa transmitter and a receiver of signals, such as analog or digitala transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signalsa hardware component responsible for relaying data from a computer network to the destination endpoint...

Smart System 2021-06-08

Smart System crossword puzzle
Across
  1. maintenance of systems
  2. #1 cons of the smart system
  3. application improving quality of life
Down
  1. application of tackling with climate change
  2. application that involves wireless sensors
  3. smart system incorporate functions of sensing, actuation and?
  4. example of smart system - monitoring

7 Clues: maintenance of systems#1 cons of the smart systemexample of smart system - monitoringapplication improving quality of lifeapplication that involves wireless sensorsapplication of tackling with climate changesmart system incorporate functions of sensing, actuation and?

security 2021-08-18

security crossword puzzle
Across
  1. I am testin gthis out
  2. a color I like
  3. director cybersecurity
Down
  1. a way to protect data
  2. a way to look at the sun
  3. a way to protect users

6 Clues: a color I likea way to protect dataI am testin gthis outa way to protect usersdirector cybersecuritya way to look at the sun

disguise 2024-09-22

disguise crossword puzzle
Across
  1. Has a trunk
  2. Likes to chase mice
Down
  1. Man's best friend
  2. Large marsupial
  3. Flying mammal

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cybersecurity Fundamental Chapter 6 2022-10-27

Cybersecurity Fundamental Chapter 6 crossword puzzle
Across
  1. protect data and information.
  2. writes data across multiple drives
  3. can actually improve availability.
  4. a system or component that is continuously operational for a given length of time.
  5. as part of an it asset management system, an organization specifies the acceptable it assets that meets its objectives.
  6. access to data and information reduces the possibility of a threat.
Down
  1. the most comprehensive protection.
  2. detects data errors
  3. assigns all resources of an organization into a group based on common characteristics.
  4. the weak links in the chain that can cause disruption of the organization's operations.
  5. analysis the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
  6. changing the controls and procedures at different layers.
  7. involves reducing the severity of the loss or the likelihood of the loss from occurring.
  8. combines multiple physical hard disk drives into single logical units to provide data redundancy and improve performance.
  9. ensures system availability in the event of a component failure.
  10. systems and services are available 99.999% of the time.
  11. store duplicate data on second drive.

17 Clues: detects data errorsprotect data and information.the most comprehensive protection.writes data across multiple drivescan actually improve availability.store duplicate data on second drive.systems and services are available 99.999% of the time.changing the controls and procedures at different layers....

Vocabulary 2024-10-17

Vocabulary crossword puzzle
Across
  1. For higher cybersecurity, you need a better ... (Passwort).
  2. Most of the times, there is no ... (Zeuge/Zeugin) to cybercrime.
  3. schützen/beschützen
  4. Most crimes involve hacking into the individual's computer to ... (stehlen) credit card information.
  5. Sometimes there is no ... (Beweis) of the cyberattack.
  6. beliebig
  7. The company got ... (gehackt).
  8. Hackers use the internet as their ... (Waffe).
  9. They use information to ... (erpressen) people.
Down
  1. The ... (Opfer) often doesn't recognize hackers as criminals.
  2. Hackers' ... (Verbrechen) are often invisible.
  3. The ... (Verdächtige/r) was probably from the UK.
  4. This ... (illegale) activity is costing the global economy a lot of money.
  5. Schadsoftware
  6. Sicherheit
  7. It sometimes can be really difficult to catch a ... (Kriminelle/r).

16 Clues: beliebigSicherheitSchadsoftwareschützen/beschützenThe company got ... (gehackt).Hackers' ... (Verbrechen) are often invisible.Hackers use the internet as their ... (Waffe).They use information to ... (erpressen) people.The ... (Verdächtige/r) was probably from the UK.Sometimes there is no ... (Beweis) of the cyberattack....

Cybersecurity 2020-08-21

Cybersecurity crossword puzzle
Across
  1. They are small files that some websites save on your computer. This little files store information about you, such as username, but they cannot spy on you.
  2. the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements.
  3. it is the practice of protecting systems, networks and programs from digital attacks.
Down
  1. an electronic device to store and process data, in the way that the user wishes.
  2. Los virus son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario lo desee. Estos tienen la intención de destruir o modificar los archivos o datos almacenados en tu computadora.

5 Clues: an electronic device to store and process data, in the way that the user wishes.it is the practice of protecting systems, networks and programs from digital attacks.the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements....

CYBERSECURITY 2021-09-28

CYBERSECURITY crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cybersecurity 2019-11-30

Cybersecurity crossword puzzle
Across
  1. : A malware that spies on your online activities and captures information from your computer, e.g. your web browsing habits, email messages, login credentials, banking and credit card details. It does all this without your knowledge.
  2. : “VPN” is short for “virtual p______ network”
  3. : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware.
Down
  1. : Short for “malicious software”
  2. : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”.

5 Clues: : Short for “malicious software”: “VPN” is short for “virtual p______ network”: “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”.: P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware....

CyberSecurity 2020-08-21

CyberSecurity crossword puzzle
Across
  1. Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos
  2. es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
Down
  1. es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
  2. Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad.
  3. Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro.

5 Clues: Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenosPrograma informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad....

Cybersecurity 2020-08-21

Cybersecurity crossword puzzle
Across
  1. Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales.
  2. Programa informático que controla el acceso de una computadoraa la red y de elementos de la red a la computadora, por motivos de seguridad, evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
  3. Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir archivos o datos almacenados en tu computador.
Down
  1. Es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
  2. Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos.

5 Clues: Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos.Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales....

CyberSecurity 2021-09-24

CyberSecurity crossword puzzle
Across
  1. Should be strong and not shred with anyone
  2. The protection of information from unauthorized access
Down
  1. something of either tangible or intangible value that is worth protecting
  2. Ensures the timely and Reliable access to and use if information systems
  3. the combination of the probability of an event and its consequence

5 Clues: Should be strong and not shred with anyoneThe protection of information from unauthorized accessthe combination of the probability of an event and its consequenceEnsures the timely and Reliable access to and use if information systemssomething of either tangible or intangible value that is worth protecting

Compliance Newsletter, Vol 1. April 2021 2021-03-26

Compliance Newsletter, Vol 1.  April 2021 crossword puzzle
Across
  1. Covid conference room
  2. Ticker symbol for Apex Clearing Holdings
  3. Outside Brokerage Accounts are required to be disclosed via ________ Compliance Technologies
  4. Sum of money paid by a company to its shareholders
  5. Written ________ Procedures
  6. Protects against the criminal or unauthorized use of electronic data
  7. A Series 4 Exam covers this specific area
  8. Securities ________ Protection Corporation
  9. The acknowledgement of understanding and abidance to policies, procedures or training
  10. ________ Oxley Act of 2002
Down
  1. Being in accordance with established guidelines or regulations
  2. Special Purpose ________ Company
  3. People who have material nonpublic information about a company
  4. The Firm's new Deputy CCO
  5. State where Apex Clearing is based
  6. Know Your ________
  7. Vendor for Firm Element Training
  8. Driving for Uber is an example of an Outside ________ Activity
  9. Handles the licensing and regulation of broker-dealers

19 Clues: Know Your ________Covid conference roomThe Firm's new Deputy CCO________ Oxley Act of 2002Written ________ ProceduresSpecial Purpose ________ CompanyVendor for Firm Element TrainingState where Apex Clearing is basedTicker symbol for Apex Clearing HoldingsA Series 4 Exam covers this specific areaSecurities ________ Protection Corporation...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Licensed amateur radio operator
  2. Entries due NLT 11/2
  3. Test Monthly
  4. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 10/23
  2. By David C. Graham
  3. Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  4. Chad's Favorite sports team?
  5. Do your Part.#BeCyberSmart
  6. Home of the 14th Flying Training Wing of Air Education and Training Command

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training CommandSatisfaction should also be measured and monitored to insure all needs and expectations are met....

cyber security 2022-05-05

cyber security crossword puzzle
Across
  1. a type of malware that modifies information on a computer
  2. virtual private network
  3. distributed denial of service
  4. someone who enters a technological divice illegaly
  5. attacker uses malici=ous codes to take the victims information
  6. a type of software allowing an attacker to take over a computer
Down
  1. set of programs that allow a computer to perform the task
  2. a technique allowing the hacker to imporsonate
  3. protection of technological devices
  4. malicious softwares

10 Clues: malicious softwaresvirtual private networkdistributed denial of serviceprotection of technological devicesa technique allowing the hacker to imporsonatesomeone who enters a technological divice illegalya type of malware that modifies information on a computerset of programs that allow a computer to perform the task...

Technology 2023-07-06

Technology crossword puzzle
Across
  1. Identification used by a person with access to a computer
  2. Another word for the top-notch support that we provide our users.
  3. A smaller computer that runs on ChromeOS
  4. A systematic approach to solving a problem
  5. What kids use to spell bad words
  6. A person that is learning
Down
  1. Sound
  2. Enables storing data and files on the internet
  3. The practice of protecting systems and networks from digital attacks
  4. Intelligence demonstrated by computers

10 Clues: SoundA person that is learningWhat kids use to spell bad wordsIntelligence demonstrated by computersA smaller computer that runs on ChromeOSA systematic approach to solving a problemEnables storing data and files on the internetIdentification used by a person with access to a computerAnother word for the top-notch support that we provide our users....

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Entries due NLT 11/2
  2. Home of the 14th Flying Training Wing of Air Education and Training Command
  3. By David C. Graham
  4. Entries due NLT 10/23
  5. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Do your Part.#BeCyberSmart
  2. Quality Management Principles
  3. Test Monthly

8 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartQuality Management PrinciplesHome of the 14th Flying Training Wing of Air Education and Training CommandTo be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees

Hacktivism Vocabulary Crossword 2 2023-05-09

Hacktivism Vocabulary Crossword 2 crossword puzzle
Across
  1. protecting an organization and its employees against cyber threats
  2. a person or thing likely to cause damage or danger
  3. a hacker with bad intentions
Down
  1. an attempt by hackers to damage or destroy a computer network or system
  2. a legal hacker hired by a company or government
  3. reveal
  4. take something that is not yours
  5. to search

8 Clues: revealto searcha hacker with bad intentionstake something that is not yoursa legal hacker hired by a company or governmenta person or thing likely to cause damage or dangerprotecting an organization and its employees against cyber threatsan attempt by hackers to damage or destroy a computer network or system

Parole Cybercrociate 2021-04-23

Parole Cybercrociate crossword puzzle
Across
  1. Un particolare tipo di dato personale
  2. Nuovo social network fondato nel 2020
  3. Città che è una eccellenza mondiale nella Cybersecurity
  4. La casata rappresentata da un lupo nella serie "Trono di Spade"
  5. Il pizzo digitale
  6. Truffa che sfrutta la tecnologia VoiP
  7. Una delle tre dimensioni di sicurezza del dato
Down
  1. Probabilità per impatto
  2. E' una criptovaluta
  3. Il nome del processore ARM per Mac di Apple
  4. Rete di computer composta da dispositivi infettati da un malware “zombie”
  5. Numero di basi giuridiche previste dal GDPR per la liceità di un trattamento di dati personali

12 Clues: Il pizzo digitaleE' una criptovalutaProbabilità per impattoUn particolare tipo di dato personaleNuovo social network fondato nel 2020Truffa che sfrutta la tecnologia VoiPIl nome del processore ARM per Mac di AppleUna delle tre dimensioni di sicurezza del datoCittà che è una eccellenza mondiale nella Cybersecurity...

Cybersecurity Awareness Month Crossword 2018-09-28

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A form of malware that replicates across computer systems by infecting another piece of software
  2. Software that runs on the endpoint and prevents malware from accessing the system
  3. An appliance that sits between your network and the Internet and scans all data passes through
  4. An attempt by cybersecurity expert to hack into your network and identify any holes in your cybersecurity
  5. These bad actors may or may not be hackers. Their purpose is to acquire and use stolen information or attack users solely for gain.
  6. When an attacker sends emails that appear to be legitimate but have links to pharming sites or attachments that contain malware
  7. Encrypts either a portion or entire computer system and presents the user with a ransom note on how to pay and receive a decryption tool
  8. These spread across computer systems but self-replicates rather than infecting other software
  9. A network of hijacked computers a hacker uses for attacking other networks, sending spam or performing calculations such as cryptocurrency mining or cracking stolen passwords
Down
  1. Any software intended to damage, disable or take control of a computer system without the owner’s consent
  2. This practice encompasses techniques used by bad actors to trick a person into providing them key information needed for a scheme.
  3. A hacker that sees their activity as political activism
  4. Skilled computer users that seek to discover flaws in computer systems that allow them to access part of a system without proper authorization
  5. A series of software tools that enable an attacker to take control of an operating system at the root level
  6. A highly targeted phishing attack with information typically acquired through social engineering
  7. This is a series of numbers, letters, and characters that safeguard accounts. It should be easy to remember but hard to guess
  8. The process of encoding information so that only authorized individuals can access it

17 Clues: A hacker that sees their activity as political activismSoftware that runs on the endpoint and prevents malware from accessing the systemThe process of encoding information so that only authorized individuals can access itThese spread across computer systems but self-replicates rather than infecting other software...

Technology and Society 2024-09-02

Technology and Society crossword puzzle
Across
  1. A virtual representation of a person
  2. A digital platform for sharing and connecting
  3. A type of software that protects against malware
  4. A device used for communication and information
  5. The practice of protecting systems, networks
  6. The global network connecting millions of computers
Down
  1. The use of technology to perform tasks without human intervention
  2. A digital currency
  3. The buying and selling of goods and services over the internet.
  4. Online theft of personal information

10 Clues: A digital currencyA virtual representation of a personOnline theft of personal informationThe practice of protecting systems, networksA digital platform for sharing and connectingA device used for communication and informationA type of software that protects against malwareThe global network connecting millions of computers...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Licensed amateur radio operator
  2. Entries due NLT 11/2
  3. Test Monthly
  4. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 10/23
  2. By David C. Graham
  3. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  4. Chad's Favorite sports team?
  5. Do your Part.#BeCyberSmart
  6. Home of the 14th Flying Training Wing of Air Education and Training Command

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

DigitalGuard: Protecting Your Online Footprint 2023-09-18

DigitalGuard: Protecting Your Online Footprint crossword puzzle
Across
  1. You need this to unlock your online world securely
  2. Doing the right thing in the digital world
  3. Defending against online threats
  4. Platforms like Facebook and Twitter for online networking
  5. Online harassment that hurts.
Down
  1. Protecting your personal space in the digital realm
  2. The process of converting data into a secret code
  3. Fraudulent attempts to obtain sensitive information
  4. Your online trail of likes, posts, and searches
  5. -An extra layer of security for online accounts

10 Clues: Online harassment that hurts.Defending against online threatsDoing the right thing in the digital worldYour online trail of likes, posts, and searches-An extra layer of security for online accountsThe process of converting data into a secret codeYou need this to unlock your online world securelyProtecting your personal space in the digital realm...

CyberFun 2024-03-18

CyberFun crossword puzzle
Across
  1. Keeping personal information safe from unauthorized access
  2. A protective barrier for your computer or network
  3. Unwanted and unsolicited emails
  4. An attempt to damage or disrupt computer systems
  5. A system of interconnected computers
  6. Measures taken to protect computer systems from theft or damage
Down
  1. A harmful software that can damage your computer
  2. A secret code to access your accounts online
  3. I want to _____ my GF/BF account
  4. Illegal activities conducted using the internet

10 Clues: Unwanted and unsolicited emailsI want to _____ my GF/BF accountA system of interconnected computersA secret code to access your accounts onlineIllegal activities conducted using the internetA harmful software that can damage your computerAn attempt to damage or disrupt computer systemsA protective barrier for your computer or network...

Cybersecurity Fundamentals - Chapter 3 2022-10-18

Cybersecurity Fundamentals - Chapter 3 crossword puzzle
Across
  1. to make malicious website appear higher in search engine result.
  2. software that enables a criminal to obtain information about user's computer activities.
  3. an attack that targes high profile targets within an organization.
  4. impersonation of a legitimate website
  5. the program or code introduced by a criminal who has compromised a system
  6. malicious program that uses a trigger to awaken the malicious code
  7. malicious code that replicates by independently exploiting vulnerabilities.
  8. malware that carries out malicious operation under the guise of a desired operation.
  9. a malicious executable code attached to another executable file.
  10. known as junk mail
Down
  1. highly targeted phishing attack, that send customized emails to a specific person or individual.
  2. holds a computer system, or the data it contains, captive until the target makes a payment.
  3. alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
  4. a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
  5. persuades the user to take specific action based on fear
  6. displays annoying pop-ups to generate revenue for its authors.
  7. using voice communication technology and records message that appears legitimate.

17 Clues: known as junk mailimpersonation of a legitimate websitepersuades the user to take specific action based on feardisplays annoying pop-ups to generate revenue for its authors.to make malicious website appear higher in search engine result.a malicious executable code attached to another executable file....

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
  2. Entries due NLT 10/23
  3. Do your Part.#BeCyberSmart
  4. Quality Management Principles
Down
  1. Entries due NLT 11/2
  2. Test Monthly
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. By David C. Graham

8 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartQuality Management PrinciplesHome of the 14th Flying Training Wing of Air Education and Training CommandTo be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees

SCIENCE AND TECHNOLOGY 2024-03-29

SCIENCE AND TECHNOLOGY crossword puzzle
Across
  1. Protection of computer systems from theft or damage.
  2. The study of living organisms.
  3. Intelligence Teaching computers to think and learn.
  4. introducing new ideas or methods.
  5. A series of steps to accomplish a task.
Down
  1. Energy Energy derived from naturally replenished resources like sunlight, wind, or water.
  2. Connecting computers or devices to communicate.
  3. Study of heredity and variation in living organisms.
  4. Distinctive features or traits.
  5. A community of living organisms and their environment.
  6. Using machines to perform tasks.
  7. Genetic material containing instructions for living organisms' development and traits.

12 Clues: The study of living organisms.Distinctive features or traits.Using machines to perform tasks.introducing new ideas or methods.A series of steps to accomplish a task.Connecting computers or devices to communicate.Study of heredity and variation in living organisms.Protection of computer systems from theft or damage....

Getting to Know Darnnell 2024-08-31

Getting to Know Darnnell crossword puzzle
Across
  1. French city Darnnell visited for official duty
  2. Proud native of DC
  3. Short for Darnnell's DC high school, McKinley
  4. Darnnell's bachelor’s degree from Strayer University
  5. Where Darnnell worked in cybersecurity
  6. Cruise destination Darnnell visited on Royal Caribbean
  7. Darnnell wrote books, including *Victorious!*
  8. She served during Operation Desert Storm
  9. Darnnell's graduation honor with a 4.0 GPA
  10. City Darnnell toured for Underground Railroad history
Down
  1. Key role Darnnell played in guiding teams and projects
  2. Military operation where she served
  3. Hawaiian island Darnnell visited in 2023
  4. Focused on preventing global threats; her role at DOJ
  5. Historical figure’s birthplace Darnnell visited
  6. The cornerstone of Darnnell's strength
  7. Central to Darnnell's heart and soul
  8. Language Darnnell’s learning on Duo lingo
  9. International police organization she worked with
  10. Operating system Darnnell once specialized in

20 Clues: Proud native of DCMilitary operation where she servedCentral to Darnnell's heart and soulThe cornerstone of Darnnell's strengthWhere Darnnell worked in cybersecurityHawaiian island Darnnell visited in 2023She served during Operation Desert StormLanguage Darnnell’s learning on Duo lingoDarnnell's graduation honor with a 4.0 GPA...

Wedding 2024-06-08

Wedding crossword puzzle
Across
  1. Brand of Michael’s car
  2. Michael’s job industry
  3. The number of years the couple is together
  4. Michael’s middle name
  5. Where did Michael and Stacey meet
  6. What the groom has for breakfast everyday
  7. How long has Stacey been in Australia for
  8. Stacey’s favourite food (hint: ask father of bride)
  9. City where Michael was born
  10. Honeymoon destination
  11. Mr & Mrs _____
  12. The age gap between the bride and the groom
  13. Number of their siblings all together
Down
  1. Flavour of the wedding cake
  2. Where did Michael propose
  3. Michael’s birthday month
  4. Who’s the better cook
  5. Their favourite season
  6. Michael and Stacey’s dating anniversary month (hint: Maid of Honour’s birth month)
  7. How many years did Michael live overseas for (hint: bribe Father of Groom)
  8. Favourite AFL team (hint: ask Best Man)
  9. Michael’s favourite drink
  10. Stacey’s best friend
  11. Stacey’s birthday month

24 Clues: Mr & Mrs _____Stacey’s best friendWho’s the better cookMichael’s middle nameHoneymoon destinationTheir favourite seasonBrand of Michael’s carMichael’s job industryStacey’s birthday monthMichael’s birthday monthWhere did Michael proposeMichael’s favourite drinkFlavour of the wedding cakeCity where Michael was bornWhere did Michael and Stacey meet...

Technology Words 2024-10-09

Technology Words crossword puzzle
Across
  1. Computer Camera
  2. Used to type
  3. You call people on it
  4. Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  5. Communicate with others vocally
  6. Coded software
  7. Analyze and solve problems
  8. Prevents viruses
  9. Provides entertainment
  10. Something that you can transfer digital info to
  11. Stores information
  12. Another word for apps
Down
  1. Gain unauthorized access
  2. Random Access Memory
  3. Decode a code
  4. Also an animal
  5. Requires a router
  6. Protects from cyber attacks
  7. The use of computer technology
  8. Remote connection
  9. Communication technology tool
  10. Central Processing Unit
  11. Look through the web
  12. Creates apps/websites
  13. Find locations
  14. Amount of data your internet connection can handle
  15. Accessed from a browser
  16. Protects your computer from virus
  17. Convert data into a code
  18. Social feed

30 Clues: Social feedUsed to typeDecode a codeAlso an animalCoded softwareFind locationsComputer CameraPrevents virusesRequires a routerRemote connectionStores informationRandom Access MemoryLook through the webYou call people on itCreates apps/websitesAnother word for appsProvides entertainmentCentral Processing UnitAccessed from a browser...

Northwood and NUIAS 2024-10-02

Northwood and NUIAS crossword puzzle
Across
  1. Built Tough
  2. Who runs the Auto Show?
  3. What is the name of the Automotive Roundtable at 9 am on October 5th?
  4. The protection of computers and computer systems
  5. What number is this year's Auto Show?
  6. Ford's newest active driving assistance system
  7. The collection of multi-million dollar hypercars
Down
  1. America's _____ University
  2. What is both a degree at Northwood and a section of the Auto Show
  3. Liberty and ____ for all
  4. What does the "I" in NUIAS stand for
  5. What does the "M" in CAMS stand for?

12 Clues: Built ToughWho runs the Auto Show?Liberty and ____ for allAmerica's _____ UniversityWhat does the "I" in NUIAS stand forWhat does the "M" in CAMS stand for?What number is this year's Auto Show?Ford's newest active driving assistance systemThe protection of computers and computer systemsThe collection of multi-million dollar hypercars...

cyber threat actors, attacks & motivations 2023-12-18

cyber threat actors, attacks & motivations crossword puzzle
Across
  1. Where to report a a cybersecurity incident at RDA
  2. It's something RDA is known for, but in the social form
  3. Homophone of a much loved pass time
  4. Supported by a government
  5. Australian Government agency that houses the ACSC
  6. Cybercrime that involves encryption and blackmail
  7. The name of the cipher you may or may not have succeeded in solving
  8. Furtum identitatis
Down
  1. A brute force technique used by cybercriminals
  2. An important aspect of security as a capability that isn't cyber
  3. Morris distributed this via the internet in 1988
  4. Something you must protect in the digital age
  5. A characteristic of cybercriminal groups
  6. Cybercriminal motivated by ideology
  7. A leading motivator for cybercriminals
  8. Malicious software used to establish remote access
  9. It's everyone's responsibility

17 Clues: Furtum identitatisSupported by a governmentIt's everyone's responsibilityHomophone of a much loved pass timeCybercriminal motivated by ideologyA leading motivator for cybercriminalsA characteristic of cybercriminal groupsSomething you must protect in the digital ageA brute force technique used by cybercriminals...

TIAA - SMT Crossword 2024-09-19

TIAA - SMT Crossword crossword puzzle
Across
  1. One of 5 Latin American countries that celebrates their independence on sept 15
  2. TIAA strategic partner
  3. First name of a T3CON presenter
Down
  1. TIAA office location that is closing
  2. Female associates and allies BRG
  3. CS&T Drive24 initiative
  4. agile, cybersecurity, data, AI and emerging tech

7 Clues: TIAA strategic partnerCS&T Drive24 initiativeFirst name of a T3CON presenterFemale associates and allies BRGTIAA office location that is closingagile, cybersecurity, data, AI and emerging techOne of 5 Latin American countries that celebrates their independence on sept 15

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Test Monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Test Monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Legal terminology 2019-11-19

Legal terminology crossword puzzle
Across
  1. Electronic currency.
  2. Check the safety on the internet.
  3. People with good computer knowledge and skills.
  4. A variety of data that is rapidly increasing.
  5. Computer systems, programs and data are free from threats.
  6. reality This project is the technology between reality and the virtual world.
Down
  1. Use of electronic devices to destroy, change, or steal information.
  2. Bullying and Malignant, Insulting.
  3. User avatar in a virtual world or game.
  4. Scam through the internet

10 Clues: Electronic currency.Scam through the internetCheck the safety on the internet.Bullying and Malignant, Insulting.User avatar in a virtual world or game.A variety of data that is rapidly increasing.People with good computer knowledge and skills.Computer systems, programs and data are free from threats....

Montreat College 2023-05-24

Montreat College crossword puzzle
Across
  1. What is it's school colors?
  2. What sport am I going to this college for?
  3. What is our Mascot?
  4. What is the mascots name?
  5. What is the name of Montreats honors college?
Down
  1. Which famous preacher was married in the chapel on campus?
  2. This major has been gaining a lot of popularity at Montreat.
  3. Where is Montreat Located?
  4. What popular American sport is not offered here?
  5. What is the name of Montreats popular lake?

10 Clues: What is our Mascot?What is the mascots name?Where is Montreat Located?What is it's school colors?What sport am I going to this college for?What is the name of Montreats popular lake?What is the name of Montreats honors college?What popular American sport is not offered here?Which famous preacher was married in the chapel on campus?...

Meet UAlbany 2023-07-26

Meet UAlbany crossword puzzle
Across
  1. Nonprofit who manages the UAlbany ID Card Office
  2. The last C in CEHC stands for
  3. Online platform for mandatory compliance trainings
  4. UAlbany's free safety app for your smartphone
  5. The number of libraries on the UAlbany Uptown Campus
  6. The Great Dane
  7. Renowned American architect and designer of main campus
  8. Symbol of commitment to Latina/o student success
Down
  1. Name of the weekly which facilitates discussions on ecological literacy and funding opportunities
  2. College of Arts &
  3. Office responsible for preservation, modernization, and construction that enable the University at Albany to achieve its objectives
  4. Colonial, Dutch, State, and Indigenous
  5. TAS stands for? Hint: $$

13 Clues: The Great DaneCollege of Arts &TAS stands for? Hint: $$The last C in CEHC stands forColonial, Dutch, State, and IndigenousUAlbany's free safety app for your smartphoneNonprofit who manages the UAlbany ID Card OfficeSymbol of commitment to Latina/o student successOnline platform for mandatory compliance trainings...

Cyber Security 2023-11-07

Cyber Security crossword puzzle
Across
  1. Logs and Event Management provided in JICA Project
  2. Set of rules, policies and operations that a company uses to achieve its business goals
  3. Compliance is act of following rules, laws and regulations
  4. Network Monitoring system short form
  5. Term that Deals with Organization secret data
  6. Operates continuously and Data visible 24*7
  7. Next Generation Firewall brand provided in JICA Project
Down
  1. Term used to define Weakness
  2. Keeping Information and Communication Private
  3. Terms used for Logging all the user activity
  4. Keeping Organizational information accurate and free of errors
  5. Authorizing a Person to perform certain activity
  6. cybersecurity standards for OT technology
  7. Role Based Access Control

14 Clues: Role Based Access ControlTerm used to define WeaknessNetwork Monitoring system short formcybersecurity standards for OT technologyOperates continuously and Data visible 24*7Terms used for Logging all the user activityKeeping Information and Communication PrivateTerm that Deals with Organization secret data...

CIS 178 Participation 3 Security 2023-07-17

CIS 178 Participation 3 Security crossword puzzle
Across
  1. computers or devices infected with malicious software
  2. collects and transmits sensitive information
  3. form of bullying that occurs online
  4. spreads from one computer to another
  5. virtual private network, secure online service
  6. "advertising-supported software" designed to display unwanted advertisements
  7. malicious software
  8. intrudes on a device remotely
  9. protecting digital assets
  10. development/use of computer systems/networks to store information.
  11. tricks users into clicking a disguised link
Down
  1. application designed to monitor network traffic
  2. disguises itself as a legitimate program or software
  3. uses bait to lure unsuspecting victims
  4. uses fingerprints, facial recognition, etc. to log into a device
  5. encrypts user's files or locks computer until a ransom is paid
  6. media manipulation, alter images/video for fake perception
  7. actions aimed to infiltrate computer networks.
  8. method of scrambling data for authorized users
  9. fake, disguised, bogus

20 Clues: malicious softwarefake, disguised, bogusprotecting digital assetsintrudes on a device remotelyform of bullying that occurs onlinespreads from one computer to anotheruses bait to lure unsuspecting victimstricks users into clicking a disguised linkcollects and transmits sensitive informationvirtual private network, secure online service...

Computer Science 2023-05-05

Computer Science crossword puzzle
Across
  1. another word for virus
  2. A software that can do problem solving and learn on it's own
  3. Bill Gate's corporation
  4. Way to stop seeing ads
  5. Software to access the internet
  6. Owner of Tesla
  7. Lots of computers joined together through signals sending data
  8. The code that the nazis communicated through
  9. A software that infects your computer secretly
  10. A collection of code
  11. Code made out of 0s and 1s
Down
  1. The person who created the Universal Turing Machine
  2. A visual display which shows the code on a computer
  3. Small device that is pushed across a small area to do different actions
  4. A software addon
  5. Stops viruses from infecting your pc
  6. What you're using
  7. What you use to type
  8. What a computer uses to operate
  9. Another software that is very HOT
  10. Owner of apple

21 Clues: Owner of TeslaOwner of appleA software addonWhat you're usingWhat you use to typeA collection of codeanother word for virusWay to stop seeing adsBill Gate's corporationCode made out of 0s and 1sSoftware to access the internetWhat a computer uses to operateAnother software that is very HOTStops viruses from infecting your pc...

Classwork Crossword Puzzle 2021-09-20

Classwork Crossword Puzzle crossword puzzle
Across
  1. average per year
  2. median of cybersecurity engineer
  3. the second-longest river
Down
  1. circumference of mars
  2. critically endangered species

5 Clues: average per yearcircumference of marsthe second-longest rivercritically endangered speciesmedian of cybersecurity engineer

Challenges Related to Community Safety in the Philippines 2024-02-29

Challenges Related to Community Safety in the Philippines crossword puzzle
Across
  1. Safety, The Philippines has one of the highest rates of road accidents and fatalities in Southeast Asia. This due to factors such as poor road infrastructure, reckless driving, and inadequate enforcement of traffic laws.
  2. Disasters, The Philippines is prone to __________ such as typhoons, earthquakes, and volcanic eruptions and it can result to significant loss of life, property damage, and also hinder economic development.
  3. and Violence, This is a major challenge in the Philippines includes robbery, as well as more serious crimes such as drug trafficking, terrorism, and political violence.
  4. is responsible for fire prevention, suppression, and investigation.
  5. is the primary law enforcement agency in the country.
  6. Awareness, This includes educating the public on disaster preparedness, crime prevention, road safety and cybersecurity as well as encouraging community participation in maintaining peace and order.
Down
  1. the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or
  2. is responsible for disaster preparedness, response, and recovery.
  3. With the increasing use of digital technologies in the Philippines has experienced a rise in cybercrime, including online scams, identity theft, and hacking.
  4. implements crime prevention programs and campaigns, such as the Barangay Peacekeeping Action Team (BPAT).

10 Clues: is the primary law enforcement agency in the country.is responsible for disaster preparedness, response, and recovery.is responsible for fire prevention, suppression, and investigation.the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or...

AI Cyberspace 2024-10-15

AI Cyberspace crossword puzzle
Across
  1. Political factors influencing behavior in cybersecurity
  2. Measures to protect against cyber threats.
  3. AI enabling systems to learn from data.
  4. Total points vulnerable to cyber attacks.
Down
  1. Actions in cyberspace for security or attack.
  2. Actions to exploit vulnerabilities in systems.
  3. Intelligence Machines simulating human intelligence processes.

7 Clues: AI enabling systems to learn from data.Total points vulnerable to cyber attacks.Measures to protect against cyber threats.Actions in cyberspace for security or attack.Actions to exploit vulnerabilities in systems.Political factors influencing behavior in cybersecurityIntelligence Machines simulating human intelligence processes.

Career Options 2022-11-11

Career Options crossword puzzle
Across
  1. A person trained to give guidance on personal, social, or psychological problems.
  2. Joins two pieces of metal together.
  3. Types include voice, screen, stage or character.
  4. People in these jobs work to protect our communities.
  5. Protects computer systems, networks and data.
  6. Transports goods all over the country.
  7. Repairs and maintains machinery, motors, etc.
Down
  1. A scientist who studies fossils.
  2. Health of the human body.
  3. Jobs in this field include coaches, announcers and recruiters.
  4. Performs beauty treatment regimens on hair, skin and nails.
  5. Invent, design and maintain machines, structures and data systems.
  6. Defends the U.S.and its allies.
  7. Set up situations in which students can learn effectively.

14 Clues: Health of the human body.Defends the U.S.and its allies.A scientist who studies fossils.Joins two pieces of metal together.Transports goods all over the country.Protects computer systems, networks and data.Repairs and maintains machinery, motors, etc.Types include voice, screen, stage or character....

Computer Science Crossword 2024-03-21

Computer Science Crossword crossword puzzle
Across
  1. The main page of a website.
  2. A security system that controls incoming and outgoing network traffic.
  3. A small file saved by websites to remember user information.
  4. Wireless internet connection.
  5. A step-by-step procedure for calculations.
  6. A program used to navigate the internet.
  7. A list of commands executed by a program or scripting engine.
Down
  1. A scam to steal personal information via email.
  2. Information processed or stored by a computer.
  3. Finding and fixing errors in code.
  4. Protection for computer systems and networks.
  5. A way of representing data using only two digits, 0 and 1.
  6. The ability to read and write.
  7. The address of a web page.

14 Clues: The address of a web page.The main page of a website.Wireless internet connection.The ability to read and write.Finding and fixing errors in code.A program used to navigate the internet.A step-by-step procedure for calculations.Protection for computer systems and networks.Information processed or stored by a computer....

Blue Print 2024-09-11

Blue Print crossword puzzle
Across
  1. Person who flies airplanes for a job
  2. Person who promotes products or brands online
  3. Animal expert who might work at a wildlife park
  4. Person who creates new computer and console games
  5. Cook who prepares food for big events
  6. Therapist who teaches exercises to heal injuries
  7. Creator of dance routines for shows or videos
  8. Writer who reports on the latest clothing trends
Down
  1. Computer expert who protects against online threats
  2. Someone who runs for office to make laws
  3. Designer of bridges, roads, and buildings
  4. Problem-solver who works to protect nature
  5. Person in charge of making movies
  6. Sound expert who helps make songs in a studio

14 Clues: Person in charge of making moviesPerson who flies airplanes for a jobCook who prepares food for big eventsSomeone who runs for office to make lawsDesigner of bridges, roads, and buildingsProblem-solver who works to protect natureSound expert who helps make songs in a studioPerson who promotes products or brands online...

E-Commerce Crossword 2024-04-19

E-Commerce Crossword crossword puzzle
Across
  1. digital shopping cart used to hold items before purchase
  2. online advertisements targeted to specific users
  3. short for "electronic commerce"
  4. process of securely storing and transmitting customer data
  5. mobile app used to browse and purchase products online
  6. process of fulfilling an online order by delivering it
  7. process of returning a purchased item online
Down
  1. detailed description of a product listed online
  2. positive online review left by a satisfied customer
  3. online marketplace where sellers and buyers connect
  4. discounts offered online to attract customers
  5. secure online payment method using a credit card
  6. person who influences buying decisions through online reviews
  7. images used online to showcase products

14 Clues: short for "electronic commerce"images used online to showcase productsprocess of returning a purchased item onlinediscounts offered online to attract customersdetailed description of a product listed onlineonline advertisements targeted to specific userssecure online payment method using a credit card...

Internet Safety Crossword 2023-04-20

Internet Safety Crossword crossword puzzle
Across
  1. a part of a computer system or network which is made to block unwanted access
  2. the state of being free from public attention
  3. a piece of information needed to log in to websites
  4. information made available by a website
  5. never share personal information online
  6. unwanted messages
  7. bulling done over the internet
  8. facts given about something or someone
Down
  1. someone that hacks
  2. websites and apps that enable users to create and share content EX.SnapChat
  3. a world wide computer network
  4. the state of being protected against the criminal use of electronic data
  5. like a cold for your computer
  6. be careful what you make public

14 Clues: unwanted messagessomeone that hacksa world wide computer networklike a cold for your computerbulling done over the internetbe careful what you make publicfacts given about something or someoneinformation made available by a websitenever share personal information onlinethe state of being free from public attention...

Online Child Safety 2013-05-14

Online Child Safety crossword puzzle
Across
  1. a person who access internet files either legally or illegally
  2. software that allows parents to control what their children do online
  3. an unsolicited email or junk mail
  4. Malicious hardware and code
  5. any software or technique used to prevent online crime
Down
  1. an interactive forum where you can talk in real time
  2. unsolicited adds on your computer
  3. a hostile strongly worded message that may contain obscene language
  4. scam that involves a fraudulent e-mail
  5. An adult internet user who exploits children or teens
  6. online site where people can post information about themselves
  7. rules/manners of inline usage
  8. a sexual message sent to someone
  9. virtual sexual encounters
  10. The Communications Decency Act

15 Clues: virtual sexual encountersMalicious hardware and coderules/manners of inline usageThe Communications Decency Acta sexual message sent to someoneunsolicited adds on your computeran unsolicited email or junk mailscam that involves a fraudulent e-mailan interactive forum where you can talk in real time...

Technology 2023-09-15

Technology crossword puzzle
Across
  1. - Prefix for environments simulated by computers.
  2. - A global network connecting computers and devices.
  3. - Unmanned aerial vehicles used for various purposes.
  4. - A mobile device with advanced features.
  5. - Prefix for intelligence created by machines.
  6. - Wireless technology for short-range data exchange.
  7. - The study of designing and building robots.
  8. - Programs and applications used on computers.
Down
  1. - Authentication based on unique physical characteristics.
  2. - Measures to protect computer systems and data.
  3. - A small, specialized electronic device.
  4. - The process of converting data into a code to secure it.
  5. - Storage and computing resources accessed over the internet.
  6. - A set of rules for solving a problem or performing a task.
  7. - Using technology to perform tasks without human intervention.

15 Clues: - A small, specialized electronic device.- A mobile device with advanced features.- The study of designing and building robots.- Prefix for intelligence created by machines.- Programs and applications used on computers.- Measures to protect computer systems and data.- Prefix for environments simulated by computers....

FOP 2023-04-01

FOP crossword puzzle
Across
  1. SOCA’s ________ department is the first point of contact with outside organizations.
  2. DISM’s SIG.
  3. Gryphons plan & organize ______-___-___ competitions.
  4. SPAI attended and presented at the ____ Conference.
  5. SEED hosts the ___-___-Series.
  6. SOCA is In charge of ________ relations.
  7. ______ organized the SOC Open House.
Down
  1. Gryphons aims to promote ________ to students that are passionate about it.
  2. SPAI created its own Project _____.
  3. SPAI is part of the AI Singapore Student ____ Group.
  4. SEED stands for Sharing, _______, Enriching, Development.
  5. SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events.
  6. SOCC is in charge of maintaining and building ________ relations.
  7. League Programming competition only for freshmen.
  8. SOCC organized Freshman Orientation ______.

15 Clues: DISM’s SIG.SEED hosts the ___-___-Series.SPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relations.SOCC organized Freshman Orientation ______.League Programming competition only for freshmen.SPAI attended and presented at the ____ Conference.SPAI is part of the AI Singapore Student ____ Group....

Fundamentals of Computing: McKown 2022-10-26

Fundamentals of Computing: McKown crossword puzzle
Across
  1. Series of code that completes a specific task
  2. First Digital Computer
  3. Being mean directly or indirectly to an individual or group online
  4. Father of the computer
  5. .mp3 file type
  6. Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
  7. RAM Memory - Short Term
  8. Device used to display data to the user from the computer
  9. Single unit of the binary language
  10. First computer programmers
  11. 8 bits
Down
  1. Where all of the of compentants of a computer connect to or live
  2. Device used to give the computer data from the user
  3. The brain of the computer
  4. Industry that works to secure computers and computer networks as a whole
  5. Series of commands
  6. CodeHS Programming Dog
  7. Computer language

18 Clues: 8 bits.mp3 file typeComputer languageSeries of commandsFirst Digital ComputerFather of the computerCodeHS Programming DogRAM Memory - Short TermThe brain of the computerFirst computer programmersSingle unit of the binary languageSeries of code that completes a specific taskDevice used to give the computer data from the user...

Phishing Crossword 2023-10-14

Phishing Crossword crossword puzzle
Across
  1. an email that tricks people
  2. commonly hunted by fisherman
  3. a way scams try to reach you
  4. a sense that a scammer creates when rushing you
Down
  1. a fake email address
  2. The process of verifying a claimed identity of a user or device
  3. protects against online threats

7 Clues: a fake email addressan email that tricks peoplecommonly hunted by fishermana way scams try to reach youprotects against online threatsa sense that a scammer creates when rushing youThe process of verifying a claimed identity of a user or device

work 2024-03-22

work crossword puzzle
Across
  1. Novel ideas and creativity.
  2. Administration and control of technological resources.
  3. Organization and oversight of tasks to achieve objectives.
  4. Advanced academic qualification.
  5. Examination and interpretation of information.
  6. Protection of digital systems and data.
  7. Long-term planning for achieving goals.
Down
  1. Investigation into government or organizational policies.
  2. Acronym for a specific department or field.
  3. Digital Academy Educational institution focusing on technology.
  4. Rules and guidelines governing behavior or activities.
  5. Possibly an acronym for a certain system or process.
  6. Techniques and processes for conducting studies.
  7. Sustainable use of ocean resources for economic growth.
  8. Government framework for science, technology, and innovation.
  9. Conference or meeting on a national scale.
  10. Legal rights over creations of the mind.
  11. Mandates Responsibilities of a certain organization.
  12. 2024 Event showcasing science, technology, and innovation in a specific year.

19 Clues: Novel ideas and creativity.Advanced academic qualification.Protection of digital systems and data.Long-term planning for achieving goals.Legal rights over creations of the mind.Conference or meeting on a national scale.Acronym for a specific department or field.Examination and interpretation of information....

Unit 4 Cybersecurity 2022-03-02

Unit 4 Cybersecurity crossword puzzle
Across
  1. a check for a secure BIOS operation
  2. when an information system receives protection from a pre-existing security controls
  3. software built into a piece of hardware
  4. securing devices by reducing the exposure
Down
  1. a more thorough hotfix
  2. quick fix for a software problem
  3. firewall command to block or allow certain user
  4. a device that acts as a file server
  5. proprietary journaling file system
  6. a guide for efficiency of a network
  7. network of high speed storage used by servers

11 Clues: a more thorough hotfixquick fix for a software problemproprietary journaling file systema check for a secure BIOS operationa device that acts as a file servera guide for efficiency of a networksoftware built into a piece of hardwaresecuring devices by reducing the exposurenetwork of high speed storage used by servers...

National Cybersecurity Month 2022-09-16

National Cybersecurity Month crossword puzzle
Across
  1. SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
  2. A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
  3. AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
  4. A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
  5. A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
  1. COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
  2. THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
  3. MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
  4. A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
  5. USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
  6. EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING

11 Clues: SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONINGA SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEMCOMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTERMEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK...

Cybersecurity Crossword Puzzle 2023-04-17

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
  2. access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
  3. It is a software or hardware which is used to filter network traffic based on rules.
  4. It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
  5. Is a software that operates on different OS which is used to prevent malicious software.
  6. security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
  1. Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
  2. Is an action or event that might compromise the security.
  3. It is a malicious software that installs on your computer without your consent for a bad purpose.
  4. security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
  5. Is an assault on the system security that is delivered by a person or a machine to a system.

11 Clues: Is an action or event that might compromise the security.It is a software or hardware which is used to filter network traffic based on rules.Is a software that operates on different OS which is used to prevent malicious software.Is an assault on the system security that is delivered by a person or a machine to a system....

Luka's Cybersecurity Quizz 2024-03-20

Luka's Cybersecurity Quizz crossword puzzle
Across
  1. Something that protect a network
  2. Symetrical encryption
  3. Keep a message unmodified
  4. Someone who doing hacking for there ethic
  5. Garanty that a message come from one person
  6. Something that encrypt or deencrypt a message
Down
  1. The possibility to access data
  2. Something that will damage your pc or things on it
  3. Privacy of a message
  4. A type of attack on a network
  5. Asymetrical encryption

11 Clues: Privacy of a messageSymetrical encryptionAsymetrical encryptionKeep a message unmodifiedA type of attack on a networkThe possibility to access dataSomething that protect a networkSomeone who doing hacking for there ethicGaranty that a message come from one personSomething that encrypt or deencrypt a message...

CYBERSECURITY AWARENESS - C40 2024-10-22

CYBERSECURITY AWARENESS - C40 crossword puzzle
Across
  1. The process of analyzing systems for vulnerabilities (8 LETTERS)
  2. A program that replicates itself to spread malware (4 LETTERS)
  3. A security method where each user has specific privileges (6 LETTERS)
  4. Cybercriminals often use this method to monitor network activity (8 LETTERS)
  5. Using multiple types of information to verify identity (14 LETTERS)
  6. Security strategy that requires users to change this regularly (8 LETTERS)
Down
  1. Common method used to protect sensitive data (10 LETTERS)
  2. Fake emails claiming to be from trusted sources (8 LETTERS)
  3. A phrase longer than a password for added security (9 LETTERS)
  4. Network of infected computers controlled remotely (6 LETTERS)
  5. Program designed to prevent unauthorized access (8 LETTERS)

11 Clues: Common method used to protect sensitive data (10 LETTERS)Fake emails claiming to be from trusted sources (8 LETTERS)Program designed to prevent unauthorized access (8 LETTERS)Network of infected computers controlled remotely (6 LETTERS)A phrase longer than a password for added security (9 LETTERS)...

4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02

4.1 Computer Vulnerability - Crossword Puzzle crossword puzzle
Across
  1. The protection of information and systems from cyberattacks
  2. A threat originating from within an organization
  3. The overall protection of computer systems and data
  4. A weakness in a computer system that can be exploited
  5. The transfer of information between devices
Down
  1. The act of stealing or manipulating data
  2. Unintentional harm caused to data or systems
  3. A threat originating from the internet
  4. The practice of illegally gaining access to a computer system

9 Clues: A threat originating from the internetThe act of stealing or manipulating dataThe transfer of information between devicesUnintentional harm caused to data or systemsA threat originating from within an organizationThe overall protection of computer systems and dataA weakness in a computer system that can be exploited...

MEKATRONIK T3 2024-05-24

MEKATRONIK T3 crossword puzzle
Across
  1. merupakan satu teras utama revolusi industri 4.0
  2. satu sistem susunan dan sambungan fizikal komponen dalam satu litar
  3. merupakan contoh bagi sistem kawalan
  4. LITAR merupakan salah satu aspek penning dalam product mekatronik
  5. merupakan salah satu ujian kefungsian
  6. ..........manufacturing Hialeah pembuatan bah mental
Down
  1. berfungsi membekalkan arus bagi membolehkan peranti berfungsi
  2. ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
  3. ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
  4. jurutera jepun yang memperkenalkan konsep mekatronik

10 Clues: merupakan contoh bagi sistem kawalanmerupakan salah satu ujian kefungsianmerupakan satu teras utama revolusi industri 4.0..........manufacturing Hialeah pembuatan bah mentaljurutera jepun yang memperkenalkan konsep mekatronikberfungsi membekalkan arus bagi membolehkan peranti berfungsi...

AUDITOR 4.0 TRENDS AND CHALLENGES 2023-06-06

AUDITOR 4.0 TRENDS AND CHALLENGES crossword puzzle
Across
  1. Use of technologies to improve accuracy.
  2. Another word for difficulties experienced.
  3. Increasing use of online and cloud based tools increases this item.
Down
  1. One of the benefits of ESG reporting.
  2. Whats new in the industry?
  3. New technology used by companies for financial reporting.
  4. Profession being explored.

7 Clues: Whats new in the industry?Profession being explored.One of the benefits of ESG reporting.Use of technologies to improve accuracy.Another word for difficulties experienced.New technology used by companies for financial reporting.Increasing use of online and cloud based tools increases this item.

Cybersecurity Awareness Month 2023-09-20

Cybersecurity Awareness Month crossword puzzle
Across
  1. Personally Identifiable Information
  2. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
  3. Type of malware that threatens to expose information unless a payment is made
  4. Health Insurance Portability and Accountability Act
  5. An email that tricks you into giving up your passphrase
Down
  1. A weakness in a program or system that can be exploited
  2. Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
  3. CWRU classifies information as: public, internal-use, and _______
  4. Install operating system security ________ regularly
  5. The process of changing plain text to cipher text using an algorithm
  6. A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems

11 Clues: Personally Identifiable InformationHealth Insurance Portability and Accountability ActInstall operating system security ________ regularlyA weakness in a program or system that can be exploitedAn email that tricks you into giving up your passphraseCWRU classifies information as: public, internal-use, and _______...

pasar uang dan ekonomi digital 2024-02-28

pasar uang dan ekonomi digital crossword puzzle
Across
  1. sektor pendukung ekonomi digital
  2. contoh E-Commerce yang ada di Indonesia
  3. sumber pendanaan dalam pasar uang yang berupa utang dagang
  4. karakteristik pasar uang
  5. peluang bisnis ekonomi digital
Down
  1. pekerjaan masyarakat Indonesia dengan adanya media online
  2. masih menjadi ancaman bagi sebagian besar pengguna internet di Indonesia
  3. ekonomi digital sangat efisien
  4. salah satu memanfaatkan ekonomi digital adalah membuat
  5. karakteristik ekonomi digiral yang membuat orang tidak bertemu langsungh
  6. kegiatan pinjam meminjam dana antara satu bank dengan bank lainnya untuk jangka waktu yang pendek
  7. berperan sebagai perantara di antara pelaku dalam Pasar Uang
  8. salah satu fungsi pasar uang
  9. instrumen pasar uang yang diteritkan Bank Umum
  10. pelaku utama dalam pasar uang yang menjaga kestabilan moneter dan harga

15 Clues: karakteristik pasar uangsalah satu fungsi pasar uangekonomi digital sangat efisienpeluang bisnis ekonomi digitalsektor pendukung ekonomi digitalcontoh E-Commerce yang ada di Indonesiainstrumen pasar uang yang diteritkan Bank Umumsalah satu memanfaatkan ekonomi digital adalah membuatpekerjaan masyarakat Indonesia dengan adanya media online...

Cybersecurity Fundamental Chapter 2 2022-11-24

Cybersecurity Fundamental Chapter 2 crossword puzzle
Across
  1. a type of storage device retains the data when no user or process is using it.
  2. cyber criminals can capture, save and steal data in-transit.
  3. uses removable media to physically move data from one computer to another.
  4. procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
  5. devices, and product available to protect information systems and fend off cyber criminals.
  6. verifies the identify of a user to prevent unauthorized access.
  7. uses cable to transmit data.
Down
  1. verifies determine which resources users can access, along with the operations that users can perform.
  2. is the principle used to describe the need to maintain availability of information systems and services at all times.
  3. involves sending information from one device to another.
  4. cyber criminals can use rogue or unauthorized devices to interrupt data availability.
  5. cyber criminals can intercept and alter data in-transit.
  6. aware and knowledgeable about their world and the dangers that threaten their world.
  7. keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
  8. prevents the disclosure of information to unauthorize people, resource and processes.
  9. uses the airways to transmit data.

16 Clues: uses cable to transmit data.uses the airways to transmit data.involves sending information from one device to another.cyber criminals can intercept and alter data in-transit.cyber criminals can capture, save and steal data in-transit.verifies the identify of a user to prevent unauthorized access....

Privacy & Security 2022-11-01

Privacy & Security crossword puzzle
Across
  1. a malware designed to deny a user or organization access to files on their computer
  2. the art of protecting networks, devices, and data from unauthorized access
  3. process of identifying a user’s identity
  4. the right to be let alone
Down
  1. common examples are viruses & trojans
  2. coding protecting information from hackers
  3. (2 words) information about an individual
  4. compromise of security
  5. a set of policies and procedures for systematically managing an organization's sensitive data
  6. international organization for standardization

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses & trojansprocess of identifying a user’s identity(2 words) information about an individualcoding protecting information from hackersinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Should be tested monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: By David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Should be tested monthlyDo your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Privacy & Security 2023-12-20

Privacy & Security crossword puzzle
Across
  1. coding protecting information from hackers
  2. the right to be let alone
  3. a malware designed to deny a user or organization access to files on their computer
  4. the art of protecting networks, devices, and data from unauthorized access
Down
  1. (2 words) information about an individual
  2. common examples are viruses and trojans
  3. the process of identifying a user's identity
  4. international organization for standardization
  5. compromise of security
  6. a set of policies and procedures for systematically managing an organization's sensitive data

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses and trojans(2 words) information about an individualcoding protecting information from hackersthe process of identifying a user's identityinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...