cybersecurity Crossword Puzzles
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
Electricity back 2023-05-30
Across
- Measures the voltage in a circuit
- Measurement of electrical power
- Power lines connecting power supplies to homes in a large area
- A place to plug in a device
- Power used by a device
- Makes your hair stand up, gives a shock
- Online protection
Down
- Too much power at one time
- Transfers electricity from one circuit to another with more or less power
- Portable power supply, can power a remote
- Anything that makes power, like a generator or a battery
- Protects us from electric shocks
- Measures the current in a circuit
- Adjusts the power in a circuit
- Happens again and again
15 Clues: Online protection • Power used by a device • Happens again and again • Too much power at one time • A place to plug in a device • Adjusts the power in a circuit • Measurement of electrical power • Protects us from electric shocks • Measures the voltage in a circuit • Measures the current in a circuit • Makes your hair stand up, gives a shock • ...
soca 2023-03-13
Across
- Type Gryphons plan & organize ______-___-___ competitions
- ______ organized the SOC Open House.
- SEED hosts the ___-___-Series
- SOCC’s _____ department is in charge of planning events
- Programming competition only for freshmen
- SOCA is In charge of ________ relations
- Gryphons aims to promote ________ to students that are passionate about IT
- SOCC is in charge of maintaining and building ________ relations
Down
- SPAI is part of the AI Singapore Student ________
- SPAI attended and presented at the ____ Conference.
- SOCA’s ________ department is the first point of contact with outside organizations.
- SEED stands for Sharing, _______, Enriching, Development
- Gryphon’s Mascot
- SPAI created its own Project _____.
- SOCC organized Freshman Orientation ______
15 Clues: Gryphon’s Mascot • SEED hosts the ___-___-Series • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations • Programming competition only for freshmen • SOCC organized Freshman Orientation ______ • SPAI is part of the AI Singapore Student ________ • SPAI attended and presented at the ____ Conference. • ...
Technology 2024-01-26
Across
- Smallest unity of information
- Small electronic devices that make your life easier.
- Electronic devices that you can wear as accessories.
- About conersing analog information to a digital ones.
- Intenet of things.
- To protect systems or data from cybernetics attacks.
- Programmable machine to automate processes
Down
- The smallest technology.
- It's used to talk to someone that is far from you.
- A process or set of rules that solve a specific problem.
- Msurament and analysis about unique physical of everyone.
- Aereal no tipulated devices
- Can make tridimensional images to crate optical illusions.
- Generally, the not physical about a computer.
- It's used to protect data encoding the information.
15 Clues: Intenet of things. • The smallest technology. • Aereal no tipulated devices • Smallest unity of information • Programmable machine to automate processes • Generally, the not physical about a computer. • It's used to talk to someone that is far from you. • It's used to protect data encoding the information. • Small electronic devices that make your life easier. • ...
BACO Conference Team Builder 2024-11-20
Across
- – The process of identifying and analyzing risks.
- – Violation of a law, duty, or agreement.
- – Abbreviation for Foreign Corrupt Practices Act.
- – Consequences for failing to follow regulations.
- – Recording and documenting compliance breaches.
- – Procedures to ensure proper operation of systems.
- – A professional responsible for managing compliance.
- – Protecting systems and data from cyber threats.
Down
- – Measures to prevent illicit financial activities.
- – A group responsible for overseeing ethical practices.
- – An in-house review of processes and systems.
- – The act of making information known.
- – Adherence to moral and ethical principles.
- – A set of rules outlining acceptable behaviors.
- – Relating to rules issued by governing bodies.
15 Clues: – The act of making information known. • – Violation of a law, duty, or agreement. • – Adherence to moral and ethical principles. • – An in-house review of processes and systems. • – Relating to rules issued by governing bodies. • – Recording and documenting compliance breaches. • – A set of rules outlining acceptable behaviors. • ...
Technology Terminology 2022-09-26
Across
- Imaginary creatures that cause unexplained technology problems
- IT protection.
- Computer that manages access to centralized resource.
Down
- American multinational technology corporation based in Washington.
- Location of multiple centralized IT resources.
- Tool used to send and receive data across shared or public networks.
- Data "rains" from here.
- Interconnected people or technology.
8 Clues: IT protection. • Data "rains" from here. • Interconnected people or technology. • Location of multiple centralized IT resources. • Computer that manages access to centralized resource. • Imaginary creatures that cause unexplained technology problems • American multinational technology corporation based in Washington. • ...
CYBER AWARENESS 2024-11-02
Across
- A group of experts dedicated to responding to computer security incidents.
- The practice of protecting computer systems and networks from digital attacks.
- The process of converting data into an unreadable format to protect it from unauthorized access.
- Acronym for the process of collecting and analyzing publicly available information to gain insights.
- The unauthorized access to computer systems or networks.
- A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
- Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
- A security system that monitors and controls network traffic.
- The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
- Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
- Malicious software designed to harm computer systems or networks.
- A network of compromised computers controlled by an attacker.
Down
- Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
- Malware that encrypts a victim's data and demands a ransom for its decryption.
- Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
- The likelihood of a threat exploiting a vulnerability and causing harm.
- A weakness in a system or network that can be exploited by attackers.
- A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
- The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
- Web A part of the internet that is not indexed by search engines and requires special software to access.
- A group of information security experts who respond to malware attacks or other computer security incidents.
- Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
- Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
- Illegal activities committed using computer networks or devices.
24 Clues: The unauthorized access to computer systems or networks. • A security system that monitors and controls network traffic. • A network of compromised computers controlled by an attacker. • Illegal activities committed using computer networks or devices. • Malicious software designed to harm computer systems or networks. • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
Fundamentals of CYbersecurity 2023-01-22
Across
- secrecy of the information
- Involves a computer or computer network
- Warning for malicious activity
- control Role management and rule management
- Weakness in information system
Down
- assurance that the information received is exact and accurate
- enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
- Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
- Attempt to gain unauthorized access
- Virtual component world
- security triads
- identify the user or system or the entity
12 Clues: security triads • Virtual component world • secrecy of the information • Warning for malicious activity • Weakness in information system • Attempt to gain unauthorized access • Involves a computer or computer network • identify the user or system or the entity • control Role management and rule management • assurance that the information received is exact and accurate • ...
Cybersecurity Awareness Month 2023-09-21
Across
- ____ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the use
- Secure your home wi-fi network with ____ password to prevent unauthorized access
- Do not open email attachment or click on ____ from an unknown or unsolicited sources
- Regularly ____ your important data to prevent data loss in case of cyberattack
- Always ____ any suspicious activity or security incident to security team immediately
- Be cautious about oversharing ___ information online as it could be used for social engineering attacks
- Email scam or attempt to trick you into giving your password or personal information
Down
- ____ is something you should always change and never share with anyone else.
- Never uninstall ____ software that is designed to destroy computer viruses
- Do not leave your ____ unattended
- Regularly review and adjust your ___ settings on social media and online accounts
- Always use ____ websites/Appstore's when downloading apps to reduce risk of malware
12 Clues: Do not leave your ____ unattended • Never uninstall ____ software that is designed to destroy computer viruses • ____ is something you should always change and never share with anyone else. • Regularly ____ your important data to prevent data loss in case of cyberattack • Secure your home wi-fi network with ____ password to prevent unauthorized access • ...
Cybersecurity & Data Protection 2022-11-16
Across
- One of the acronyms in the data breach response plan CARE framework.
- I am one possible cause of a data breach
- It is phising with text messages
- Stop and think before you download
- I identify, assess and address personal data protection risks specific to SCC.
- I run like scam ads
- I process personal data on behalf of SCC
Down
- These should not be left around the office
- Do this over email links to display URL
- A malicious software. You cannot access your files unless you pay a ransom
- I file incident reports to PDPC if necessary.
- Who you gonna call when a data breach is suspected or confirmed?
12 Clues: I run like scam ads • It is phising with text messages • Stop and think before you download • Do this over email links to display URL • I am one possible cause of a data breach • I process personal data on behalf of SCC • These should not be left around the office • I file incident reports to PDPC if necessary. • ...
CyberSecurity Awareness 2021 2021-10-15
Across
- the art of manipulating, influencing or deceiving you in order to gain control over your computer system.
- considered one or the best places to work
- subject matter of the most clicked on email from our 11/14/21 phish campaign
- October is Awareness Month for this
- disruptive, unsolicited messages (such as emails, text messages, or Internet postings) especially commercial messages, sent to a large number of recipients or posted in a large number of places.
- a method used by social engineers to gain access to a building or other protected area.
- 123456 and MyDOB01012010 are examples of what kind of Password?
Down
- the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity.
- subject matter of the most clicked on email from our 11/07/21 phish campaign
- misspelled words and a sense of urgency for you to take a questionable action an email, are be considered to be recognizable what?
- type of phishing that is a small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.
- MyCowRanAwayToTheMoon is an example of a
12 Clues: October is Awareness Month for this • MyCowRanAwayToTheMoon is an example of a • considered one or the best places to work • 123456 and MyDOB01012010 are examples of what kind of Password? • subject matter of the most clicked on email from our 11/07/21 phish campaign • subject matter of the most clicked on email from our 11/14/21 phish campaign • ...
Enterprise manual 2022-06-21
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
Kuis Audit TI 2024-03-04
Across
- sistem manajemen audit yang digunakan Itjen
- Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK
- pengendalian proses hanya melihat input dan output
- Salah satu area audit TIK
Down
- Memastikan keselarasan bisnis dan TIK
- pengendalian yang dilakukan oleh manusia tanpa bantuan mesin
- Audit TIK terintegrasi yang dilakukan secara bersamaan
- Audit TIK terintegrasi yang dilakukan secara berurutan
- Auditor harus ... yang artinya memiliki kemampuan untuk melakukan tugas audit
- singkatan dari pengendalian aplikasi
- Pengujian secara sistematis untuk memberikan keyakinan terbatas
11 Clues: Salah satu area audit TIK • singkatan dari pengendalian aplikasi • Memastikan keselarasan bisnis dan TIK • sistem manajemen audit yang digunakan Itjen • pengendalian proses hanya melihat input dan output • Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK • Audit TIK terintegrasi yang dilakukan secara bersamaan • ...
Vanessa and Jinsik <3 2024-09-06
Across
- How many months have Vanessa and Jinsik been together?
- How many people are in the wedding party?
- Where do Vanessa and Jinsik live?
- How did Vanessa and Jinsik meet?
- How old is Vanessa?
- Where did Jinsik propose?
Down
- What does Jinsik do for work?
- Where are Vanessa and Jinsik going for their honeymoon?
- How old is Jinsik?
- What holiday did Vanessa and Jinsik first spend together?
- How many kids do Vanessa and Jinsik want?
11 Clues: How old is Jinsik? • How old is Vanessa? • Where did Jinsik propose? • What does Jinsik do for work? • How did Vanessa and Jinsik meet? • Where do Vanessa and Jinsik live? • How many people are in the wedding party? • How many kids do Vanessa and Jinsik want? • How many months have Vanessa and Jinsik been together? • Where are Vanessa and Jinsik going for their honeymoon? • ...
Group 1 - CSE 167 2022-11-16
Across
- What's the weakest element in Cybersecurity
- The fake folder that acts as bait for hackers.
- The I in the CIA Triad
- The A in the CIA Triad
- All companies should have a ____ framework
Down
- The C in the CIA Triad
- An area that a hacker can use for their benefit
- Websites identify
- A type of key to use in Asymmetric encryption
- How to make a message secret.
- A copy of data that could be lost
11 Clues: Websites identify • The C in the CIA Triad • The I in the CIA Triad • The A in the CIA Triad • How to make a message secret. • A copy of data that could be lost • All companies should have a ____ framework • What's the weakest element in Cybersecurity • A type of key to use in Asymmetric encryption • The fake folder that acts as bait for hackers. • ...
R&D India Market Place 2022-11-09
Across
- own your_______
- ____ is at the core of our purpose, culture and business.
- Reducing the operational carbon emissions in our supply chain
- chairman and CEO
- one of our core values
- internal tool for mobility, projects and mentorships
Down
- IoT, mobility, sensing, cloud, analytics and cybersecurity to deliver Innovation at Every Level.
- We are Globally recognised for____
- one of our 6 long term commitments
9 Clues: own your_______ • chairman and CEO • one of our core values • We are Globally recognised for____ • one of our 6 long term commitments • internal tool for mobility, projects and mentorships • ____ is at the core of our purpose, culture and business. • Reducing the operational carbon emissions in our supply chain • ...
crossword! 2024-02-03
Across
- Usually consists of 8 bits
- Invisible barrier for women advancing in the workplace
- left no crumbs
- Mentor applications are due on the _
- Film about under-recognized Black women at NASA who were a key part of its success
- Most commonly-used programming language
Down
- practice of protecting systems, networks, and programs from digital attacks
- Purdue's first women-centric hackathon ;)
- When women are generally paid less than men
- women in _
10 Clues: women in _ • left no crumbs • Usually consists of 8 bits • Mentor applications are due on the _ • Most commonly-used programming language • Purdue's first women-centric hackathon ;) • When women are generally paid less than men • Invisible barrier for women advancing in the workplace • practice of protecting systems, networks, and programs from digital attacks • ...
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- Unethical practice of gaining unauthorized access to computer systems.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
- A type of computer memory.
- A small portable computer.
Down
- Securing computer systems against unauthorized access.
- A popular operating system.
- The brain of a computer.
- Term for gaining access to a secure network through.
- Malicious software used to gain unauthorised access to computer systems.
- Desired outcomes.
10 Clues: Desired outcomes. • The brain of a computer. • A type of computer memory. • A small portable computer. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • ...
PROFESI DAN PELUANG USAHA DI BIDANG TKJT 2023-11-17
Across
- Orang yang merancang dan mengembangkan perangkat lunak.
- Orang yang ahli dalam merancang rangkaian listrik.
- Bisnis yang fokus pada pengembangan aplikasi mobile.
- Bisnis yang menyediakan layanan keamanan jaringan.
- Orang yang spesialis dalam keamanan informasi.
Down
- Bisnis yang menyediakan solusi perangkat lunak ERP.
- Orang yang bekerja dengan perangkat keras komputer.
- Bisnis yang menyediakan solusi penyimpanan data.
- Bisnis yang menyediakan layanan cloud computing.
- Orang yang ahli dalam analisis data besar.
10 Clues: Orang yang ahli dalam analisis data besar. • Orang yang spesialis dalam keamanan informasi. • Bisnis yang menyediakan solusi penyimpanan data. • Bisnis yang menyediakan layanan cloud computing. • Orang yang ahli dalam merancang rangkaian listrik. • Bisnis yang menyediakan layanan keamanan jaringan. • Bisnis yang menyediakan solusi perangkat lunak ERP. • ...
WeWork Noble House Community 2022-06-25
Across
- Solving the world's 1 gigaton refrigerant problem
- Pioneer of global content service and distribution
- Offering lead generation services from B2B telemarketing to inside sales
- Supporting diverse clean energy entrepreneurs to thrive
Down
- #DemiMasaDepan #MakingEducationAffordable
- Consumer intelligence platform specializing in mobile advertising
- SaaS platform that makes cybersecurity accessible to all
- Logistics service provider
- Language learning platform, mainly Chinese
- Consumer electronics company, well-known for its technologically advanced smartwatch
10 Clues: Logistics service provider • #DemiMasaDepan #MakingEducationAffordable • Language learning platform, mainly Chinese • Solving the world's 1 gigaton refrigerant problem • Pioneer of global content service and distribution • Supporting diverse clean energy entrepreneurs to thrive • SaaS platform that makes cybersecurity accessible to all • ...
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
ISSN Day 2 2024-09-09
Across
- Entry-level certification for IT technicians (2 words)
- Career path for someone with CCNA (2 words)
- Network certification from Cisco (acronym)
- Type of device covered in A+ certification, besides computers
Down
- Career path for someone with A+ (2 words)
- Network topic covered in CCNA
- Security topic covered in Security+ certification
- Cybersecurity certification from CompTIA
- Operating system topic covered in A+ certification
9 Clues: Network topic covered in CCNA • Cybersecurity certification from CompTIA • Career path for someone with A+ (2 words) • Network certification from Cisco (acronym) • Career path for someone with CCNA (2 words) • Security topic covered in Security+ certification • Operating system topic covered in A+ certification • Entry-level certification for IT technicians (2 words) • ...
cybersecurity 2023-03-03
Across
- The practice of protecting computer systems from theft, damage, and unauthorized access. (11)
- A software program designed to prevent unauthorized access to a computer system. (8)
Down
- A type of attack that attempts to overwhelm a system with traffic. (4)
- A type of cyber attack that attempts to obtain sensitive information by tricking users. (6)
- A type of encryption that uses two keys to encrypt and decrypt data. (3)
5 Clues: A type of attack that attempts to overwhelm a system with traffic. (4) • A type of encryption that uses two keys to encrypt and decrypt data. (3) • A software program designed to prevent unauthorized access to a computer system. (8) • A type of cyber attack that attempts to obtain sensitive information by tricking users. (6) • ...
Cybersecurity 2023-05-11
Across
- A process that proves the identity of the user
- The art of writing or solving codes
- A cyberattack carried out by creating a fake website, or compromising/ corrupting a real one, in order to gather information or data on visitors
Down
- The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it
- A cyberattack carried out by sending emails to large numbers of people asking for sensitive information
5 Clues: The art of writing or solving codes • A process that proves the identity of the user • The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it • A cyberattack carried out by sending emails to large numbers of people asking for sensitive information • ...
Cybersecurity 2024-04-23
5 Clues: Ongevraagde mail • Verzamelnaam voor malafide software • Poging tot het achterhalen van persoonlijke gegevens • Software die bestanden infecteert en zich zelf kan vermenigvuldigen • Persoon die ongeoorloofd toegang probeert te krijgen tot een netwerk of computer
Cittadinanza digitale 2021-11-15
7 Clues: bullismo in rete • colui che infetta i file • la sicurezza informatica • il pirata del sistema informatico • parola segreta legata a un account • rete di computer che possono comunicare tra loro • insieme di regole per il buon comportamento su internet
Smart System 2021-06-08
7 Clues: maintenance of systems • #1 cons of the smart system • example of smart system - monitoring • application improving quality of life • application that involves wireless sensors • application of tackling with climate change • smart system incorporate functions of sensing, actuation and?
CTE Pathway Lake Highlands HS 2022-11-16
7 Clues: Robotics Pathway (Level 4) • Legal Studies Magnet Pathway (Level 1) • Cybersecurity Magnet Pathway (Level 4) • Culinary Arts Magnet Pathway (Level 3) • Computer Science Magnet Pathway (Level 3) • Manufacturing Technology Magnet Pathway (Level 1) • Digital Communications -AV Production Pathway (Level 2)
High School Pathways 2024-04-26
7 Clues: Earn a welding certificate • Course towards medical fields • Take courses to become a teacher • Take courses in computer technology • Finish 2 years of your Bachelor's Degree • Take courses on building, carpentry work • Take courses about wildlife, plants and animals
Network Components 2022-10-27
Across
- a device used at the customer premises to terminate a dial-up Integrated Services Digital Network line and connect it to a computer or a local area network
- a transmitter and a receiver of signals, such as analog or digital
- a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
- a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals
- is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- networking devices that connect networks
- a network node used in telecommunications that connects two networks with different transmission protocols together
- a hardware component responsible for relaying data from a computer network to the destination endpoint
8 Clues: networking devices that connect networks • a transmitter and a receiver of signals, such as analog or digital • a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals • a hardware component responsible for relaying data from a computer network to the destination endpoint • ...
Smart System 2021-06-08
7 Clues: maintenance of systems • #1 cons of the smart system • example of smart system - monitoring • application improving quality of life • application that involves wireless sensors • application of tackling with climate change • smart system incorporate functions of sensing, actuation and?
security 2021-08-18
disguise 2024-09-22
Cybersecurity Fundamental Chapter 6 2022-10-27
Across
- protect data and information.
- writes data across multiple drives
- can actually improve availability.
- a system or component that is continuously operational for a given length of time.
- as part of an it asset management system, an organization specifies the acceptable it assets that meets its objectives.
- access to data and information reduces the possibility of a threat.
Down
- the most comprehensive protection.
- detects data errors
- assigns all resources of an organization into a group based on common characteristics.
- the weak links in the chain that can cause disruption of the organization's operations.
- analysis the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
- changing the controls and procedures at different layers.
- involves reducing the severity of the loss or the likelihood of the loss from occurring.
- combines multiple physical hard disk drives into single logical units to provide data redundancy and improve performance.
- ensures system availability in the event of a component failure.
- systems and services are available 99.999% of the time.
- store duplicate data on second drive.
17 Clues: detects data errors • protect data and information. • the most comprehensive protection. • writes data across multiple drives • can actually improve availability. • store duplicate data on second drive. • systems and services are available 99.999% of the time. • changing the controls and procedures at different layers. • ...
Vocabulary 2024-10-17
Across
- For higher cybersecurity, you need a better ... (Passwort).
- Most of the times, there is no ... (Zeuge/Zeugin) to cybercrime.
- schützen/beschützen
- Most crimes involve hacking into the individual's computer to ... (stehlen) credit card information.
- Sometimes there is no ... (Beweis) of the cyberattack.
- beliebig
- The company got ... (gehackt).
- Hackers use the internet as their ... (Waffe).
- They use information to ... (erpressen) people.
Down
- The ... (Opfer) often doesn't recognize hackers as criminals.
- Hackers' ... (Verbrechen) are often invisible.
- The ... (Verdächtige/r) was probably from the UK.
- This ... (illegale) activity is costing the global economy a lot of money.
- Schadsoftware
- Sicherheit
- It sometimes can be really difficult to catch a ... (Kriminelle/r).
16 Clues: beliebig • Sicherheit • Schadsoftware • schützen/beschützen • The company got ... (gehackt). • Hackers' ... (Verbrechen) are often invisible. • Hackers use the internet as their ... (Waffe). • They use information to ... (erpressen) people. • The ... (Verdächtige/r) was probably from the UK. • Sometimes there is no ... (Beweis) of the cyberattack. • ...
Cybersecurity 2020-08-21
Across
- They are small files that some websites save on your computer. This little files store information about you, such as username, but they cannot spy on you.
- the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements.
- it is the practice of protecting systems, networks and programs from digital attacks.
Down
- an electronic device to store and process data, in the way that the user wishes.
- Los virus son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario lo desee. Estos tienen la intención de destruir o modificar los archivos o datos almacenados en tu computadora.
5 Clues: an electronic device to store and process data, in the way that the user wishes. • it is the practice of protecting systems, networks and programs from digital attacks. • the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements. • ...
CYBERSECURITY 2021-09-28
Cybersecurity 2019-11-30
Across
- : A malware that spies on your online activities and captures information from your computer, e.g. your web browsing habits, email messages, login credentials, banking and credit card details. It does all this without your knowledge.
- : “VPN” is short for “virtual p______ network”
- : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware.
Down
- : Short for “malicious software”
- : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”.
5 Clues: : Short for “malicious software” • : “VPN” is short for “virtual p______ network” • : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”. • : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware. • ...
CyberSecurity 2020-08-21
Across
- Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos
- es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
Down
- es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
- Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad.
- Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro.
5 Clues: Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos • Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad. • ...
Cybersecurity 2020-08-21
Across
- Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales.
- Programa informático que controla el acceso de una computadoraa la red y de elementos de la red a la computadora, por motivos de seguridad, evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
- Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir archivos o datos almacenados en tu computador.
Down
- Es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
- Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos.
5 Clues: Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos. • Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales. • ...
CyberSecurity 2021-09-24
Across
- Should be strong and not shred with anyone
- The protection of information from unauthorized access
Down
- something of either tangible or intangible value that is worth protecting
- Ensures the timely and Reliable access to and use if information systems
- the combination of the probability of an event and its consequence
5 Clues: Should be strong and not shred with anyone • The protection of information from unauthorized access • the combination of the probability of an event and its consequence • Ensures the timely and Reliable access to and use if information systems • something of either tangible or intangible value that is worth protecting
Compliance Newsletter, Vol 1. April 2021 2021-03-26
Across
- Covid conference room
- Ticker symbol for Apex Clearing Holdings
- Outside Brokerage Accounts are required to be disclosed via ________ Compliance Technologies
- Sum of money paid by a company to its shareholders
- Written ________ Procedures
- Protects against the criminal or unauthorized use of electronic data
- A Series 4 Exam covers this specific area
- Securities ________ Protection Corporation
- The acknowledgement of understanding and abidance to policies, procedures or training
- ________ Oxley Act of 2002
Down
- Being in accordance with established guidelines or regulations
- Special Purpose ________ Company
- People who have material nonpublic information about a company
- The Firm's new Deputy CCO
- State where Apex Clearing is based
- Know Your ________
- Vendor for Firm Element Training
- Driving for Uber is an example of an Outside ________ Activity
- Handles the licensing and regulation of broker-dealers
19 Clues: Know Your ________ • Covid conference room • The Firm's new Deputy CCO • ________ Oxley Act of 2002 • Written ________ Procedures • Special Purpose ________ Company • Vendor for Firm Element Training • State where Apex Clearing is based • Ticker symbol for Apex Clearing Holdings • A Series 4 Exam covers this specific area • Securities ________ Protection Corporation • ...
Did you read it? 2020-10-16
Across
- Licensed amateur radio operator
- Entries due NLT 11/2
- Test Monthly
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 10/23
- By David C. Graham
- Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Chad's Favorite sports team?
- Do your Part.#BeCyberSmart
- Home of the 14th Flying Training Wing of Air Education and Training Command
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
cyber security 2022-05-05
Across
- a type of malware that modifies information on a computer
- virtual private network
- distributed denial of service
- someone who enters a technological divice illegaly
- attacker uses malici=ous codes to take the victims information
- a type of software allowing an attacker to take over a computer
Down
- set of programs that allow a computer to perform the task
- a technique allowing the hacker to imporsonate
- protection of technological devices
- malicious softwares
10 Clues: malicious softwares • virtual private network • distributed denial of service • protection of technological devices • a technique allowing the hacker to imporsonate • someone who enters a technological divice illegaly • a type of malware that modifies information on a computer • set of programs that allow a computer to perform the task • ...
Technology 2023-07-06
Across
- Identification used by a person with access to a computer
- Another word for the top-notch support that we provide our users.
- A smaller computer that runs on ChromeOS
- A systematic approach to solving a problem
- What kids use to spell bad words
- A person that is learning
Down
- Sound
- Enables storing data and files on the internet
- The practice of protecting systems and networks from digital attacks
- Intelligence demonstrated by computers
10 Clues: Sound • A person that is learning • What kids use to spell bad words • Intelligence demonstrated by computers • A smaller computer that runs on ChromeOS • A systematic approach to solving a problem • Enables storing data and files on the internet • Identification used by a person with access to a computer • Another word for the top-notch support that we provide our users. • ...
Did you read it? 2020-10-16
Across
- Entries due NLT 11/2
- Home of the 14th Flying Training Wing of Air Education and Training Command
- By David C. Graham
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Do your Part.#BeCyberSmart
- Quality Management Principles
- Test Monthly
8 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Quality Management Principles • Home of the 14th Flying Training Wing of Air Education and Training Command • To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Hacktivism Vocabulary Crossword 2 2023-05-09
Across
- protecting an organization and its employees against cyber threats
- a person or thing likely to cause damage or danger
- a hacker with bad intentions
Down
- an attempt by hackers to damage or destroy a computer network or system
- a legal hacker hired by a company or government
- reveal
- take something that is not yours
- to search
8 Clues: reveal • to search • a hacker with bad intentions • take something that is not yours • a legal hacker hired by a company or government • a person or thing likely to cause damage or danger • protecting an organization and its employees against cyber threats • an attempt by hackers to damage or destroy a computer network or system
Parole Cybercrociate 2021-04-23
Across
- Un particolare tipo di dato personale
- Nuovo social network fondato nel 2020
- Città che è una eccellenza mondiale nella Cybersecurity
- La casata rappresentata da un lupo nella serie "Trono di Spade"
- Il pizzo digitale
- Truffa che sfrutta la tecnologia VoiP
- Una delle tre dimensioni di sicurezza del dato
Down
- Probabilità per impatto
- E' una criptovaluta
- Il nome del processore ARM per Mac di Apple
- Rete di computer composta da dispositivi infettati da un malware “zombie”
- Numero di basi giuridiche previste dal GDPR per la liceità di un trattamento di dati personali
12 Clues: Il pizzo digitale • E' una criptovaluta • Probabilità per impatto • Un particolare tipo di dato personale • Nuovo social network fondato nel 2020 • Truffa che sfrutta la tecnologia VoiP • Il nome del processore ARM per Mac di Apple • Una delle tre dimensioni di sicurezza del dato • Città che è una eccellenza mondiale nella Cybersecurity • ...
Cybersecurity Awareness Month Crossword 2018-09-28
Across
- A form of malware that replicates across computer systems by infecting another piece of software
- Software that runs on the endpoint and prevents malware from accessing the system
- An appliance that sits between your network and the Internet and scans all data passes through
- An attempt by cybersecurity expert to hack into your network and identify any holes in your cybersecurity
- These bad actors may or may not be hackers. Their purpose is to acquire and use stolen information or attack users solely for gain.
- When an attacker sends emails that appear to be legitimate but have links to pharming sites or attachments that contain malware
- Encrypts either a portion or entire computer system and presents the user with a ransom note on how to pay and receive a decryption tool
- These spread across computer systems but self-replicates rather than infecting other software
- A network of hijacked computers a hacker uses for attacking other networks, sending spam or performing calculations such as cryptocurrency mining or cracking stolen passwords
Down
- Any software intended to damage, disable or take control of a computer system without the owner’s consent
- This practice encompasses techniques used by bad actors to trick a person into providing them key information needed for a scheme.
- A hacker that sees their activity as political activism
- Skilled computer users that seek to discover flaws in computer systems that allow them to access part of a system without proper authorization
- A series of software tools that enable an attacker to take control of an operating system at the root level
- A highly targeted phishing attack with information typically acquired through social engineering
- This is a series of numbers, letters, and characters that safeguard accounts. It should be easy to remember but hard to guess
- The process of encoding information so that only authorized individuals can access it
17 Clues: A hacker that sees their activity as political activism • Software that runs on the endpoint and prevents malware from accessing the system • The process of encoding information so that only authorized individuals can access it • These spread across computer systems but self-replicates rather than infecting other software • ...
Technology and Society 2024-09-02
Across
- A virtual representation of a person
- A digital platform for sharing and connecting
- A type of software that protects against malware
- A device used for communication and information
- The practice of protecting systems, networks
- The global network connecting millions of computers
Down
- The use of technology to perform tasks without human intervention
- A digital currency
- The buying and selling of goods and services over the internet.
- Online theft of personal information
10 Clues: A digital currency • A virtual representation of a person • Online theft of personal information • The practice of protecting systems, networks • A digital platform for sharing and connecting • A device used for communication and information • A type of software that protects against malware • The global network connecting millions of computers • ...
Did you read it? 2020-10-16
Across
- Licensed amateur radio operator
- Entries due NLT 11/2
- Test Monthly
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 10/23
- By David C. Graham
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Chad's Favorite sports team?
- Do your Part.#BeCyberSmart
- Home of the 14th Flying Training Wing of Air Education and Training Command
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
DigitalGuard: Protecting Your Online Footprint 2023-09-18
Across
- You need this to unlock your online world securely
- Doing the right thing in the digital world
- Defending against online threats
- Platforms like Facebook and Twitter for online networking
- Online harassment that hurts.
Down
- Protecting your personal space in the digital realm
- The process of converting data into a secret code
- Fraudulent attempts to obtain sensitive information
- Your online trail of likes, posts, and searches
- -An extra layer of security for online accounts
10 Clues: Online harassment that hurts. • Defending against online threats • Doing the right thing in the digital world • Your online trail of likes, posts, and searches • -An extra layer of security for online accounts • The process of converting data into a secret code • You need this to unlock your online world securely • Protecting your personal space in the digital realm • ...
CyberFun 2024-03-18
Across
- Keeping personal information safe from unauthorized access
- A protective barrier for your computer or network
- Unwanted and unsolicited emails
- An attempt to damage or disrupt computer systems
- A system of interconnected computers
- Measures taken to protect computer systems from theft or damage
Down
- A harmful software that can damage your computer
- A secret code to access your accounts online
- I want to _____ my GF/BF account
- Illegal activities conducted using the internet
10 Clues: Unwanted and unsolicited emails • I want to _____ my GF/BF account • A system of interconnected computers • A secret code to access your accounts online • Illegal activities conducted using the internet • A harmful software that can damage your computer • An attempt to damage or disrupt computer systems • A protective barrier for your computer or network • ...
Cybersecurity Fundamentals - Chapter 3 2022-10-18
Across
- to make malicious website appear higher in search engine result.
- software that enables a criminal to obtain information about user's computer activities.
- an attack that targes high profile targets within an organization.
- impersonation of a legitimate website
- the program or code introduced by a criminal who has compromised a system
- malicious program that uses a trigger to awaken the malicious code
- malicious code that replicates by independently exploiting vulnerabilities.
- malware that carries out malicious operation under the guise of a desired operation.
- a malicious executable code attached to another executable file.
- known as junk mail
Down
- highly targeted phishing attack, that send customized emails to a specific person or individual.
- holds a computer system, or the data it contains, captive until the target makes a payment.
- alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
- a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
- persuades the user to take specific action based on fear
- displays annoying pop-ups to generate revenue for its authors.
- using voice communication technology and records message that appears legitimate.
17 Clues: known as junk mail • impersonation of a legitimate website • persuades the user to take specific action based on fear • displays annoying pop-ups to generate revenue for its authors. • to make malicious website appear higher in search engine result. • a malicious executable code attached to another executable file. • ...
Did you read it? 2020-10-16
Across
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
- Entries due NLT 10/23
- Do your Part.#BeCyberSmart
- Quality Management Principles
Down
- Entries due NLT 11/2
- Test Monthly
- Home of the 14th Flying Training Wing of Air Education and Training Command
- By David C. Graham
8 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Quality Management Principles • Home of the 14th Flying Training Wing of Air Education and Training Command • To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
SCIENCE AND TECHNOLOGY 2024-03-29
Across
- Protection of computer systems from theft or damage.
- The study of living organisms.
- Intelligence Teaching computers to think and learn.
- introducing new ideas or methods.
- A series of steps to accomplish a task.
Down
- Energy Energy derived from naturally replenished resources like sunlight, wind, or water.
- Connecting computers or devices to communicate.
- Study of heredity and variation in living organisms.
- Distinctive features or traits.
- A community of living organisms and their environment.
- Using machines to perform tasks.
- Genetic material containing instructions for living organisms' development and traits.
12 Clues: The study of living organisms. • Distinctive features or traits. • Using machines to perform tasks. • introducing new ideas or methods. • A series of steps to accomplish a task. • Connecting computers or devices to communicate. • Study of heredity and variation in living organisms. • Protection of computer systems from theft or damage. • ...
Getting to Know Darnnell 2024-08-31
Across
- French city Darnnell visited for official duty
- Proud native of DC
- Short for Darnnell's DC high school, McKinley
- Darnnell's bachelor’s degree from Strayer University
- Where Darnnell worked in cybersecurity
- Cruise destination Darnnell visited on Royal Caribbean
- Darnnell wrote books, including *Victorious!*
- She served during Operation Desert Storm
- Darnnell's graduation honor with a 4.0 GPA
- City Darnnell toured for Underground Railroad history
Down
- Key role Darnnell played in guiding teams and projects
- Military operation where she served
- Hawaiian island Darnnell visited in 2023
- Focused on preventing global threats; her role at DOJ
- Historical figure’s birthplace Darnnell visited
- The cornerstone of Darnnell's strength
- Central to Darnnell's heart and soul
- Language Darnnell’s learning on Duo lingo
- International police organization she worked with
- Operating system Darnnell once specialized in
20 Clues: Proud native of DC • Military operation where she served • Central to Darnnell's heart and soul • The cornerstone of Darnnell's strength • Where Darnnell worked in cybersecurity • Hawaiian island Darnnell visited in 2023 • She served during Operation Desert Storm • Language Darnnell’s learning on Duo lingo • Darnnell's graduation honor with a 4.0 GPA • ...
Wedding 2024-06-08
Across
- Brand of Michael’s car
- Michael’s job industry
- The number of years the couple is together
- Michael’s middle name
- Where did Michael and Stacey meet
- What the groom has for breakfast everyday
- How long has Stacey been in Australia for
- Stacey’s favourite food (hint: ask father of bride)
- City where Michael was born
- Honeymoon destination
- Mr & Mrs _____
- The age gap between the bride and the groom
- Number of their siblings all together
Down
- Flavour of the wedding cake
- Where did Michael propose
- Michael’s birthday month
- Who’s the better cook
- Their favourite season
- Michael and Stacey’s dating anniversary month (hint: Maid of Honour’s birth month)
- How many years did Michael live overseas for (hint: bribe Father of Groom)
- Favourite AFL team (hint: ask Best Man)
- Michael’s favourite drink
- Stacey’s best friend
- Stacey’s birthday month
24 Clues: Mr & Mrs _____ • Stacey’s best friend • Who’s the better cook • Michael’s middle name • Honeymoon destination • Their favourite season • Brand of Michael’s car • Michael’s job industry • Stacey’s birthday month • Michael’s birthday month • Where did Michael propose • Michael’s favourite drink • Flavour of the wedding cake • City where Michael was born • Where did Michael and Stacey meet • ...
Technology Words 2024-10-09
Across
- Computer Camera
- Used to type
- You call people on it
- Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Communicate with others vocally
- Coded software
- Analyze and solve problems
- Prevents viruses
- Provides entertainment
- Something that you can transfer digital info to
- Stores information
- Another word for apps
Down
- Gain unauthorized access
- Random Access Memory
- Decode a code
- Also an animal
- Requires a router
- Protects from cyber attacks
- The use of computer technology
- Remote connection
- Communication technology tool
- Central Processing Unit
- Look through the web
- Creates apps/websites
- Find locations
- Amount of data your internet connection can handle
- Accessed from a browser
- Protects your computer from virus
- Convert data into a code
- Social feed
30 Clues: Social feed • Used to type • Decode a code • Also an animal • Coded software • Find locations • Computer Camera • Prevents viruses • Requires a router • Remote connection • Stores information • Random Access Memory • Look through the web • You call people on it • Creates apps/websites • Another word for apps • Provides entertainment • Central Processing Unit • Accessed from a browser • ...
Northwood and NUIAS 2024-10-02
Across
- Built Tough
- Who runs the Auto Show?
- What is the name of the Automotive Roundtable at 9 am on October 5th?
- The protection of computers and computer systems
- What number is this year's Auto Show?
- Ford's newest active driving assistance system
- The collection of multi-million dollar hypercars
Down
- America's _____ University
- What is both a degree at Northwood and a section of the Auto Show
- Liberty and ____ for all
- What does the "I" in NUIAS stand for
- What does the "M" in CAMS stand for?
12 Clues: Built Tough • Who runs the Auto Show? • Liberty and ____ for all • America's _____ University • What does the "I" in NUIAS stand for • What does the "M" in CAMS stand for? • What number is this year's Auto Show? • Ford's newest active driving assistance system • The protection of computers and computer systems • The collection of multi-million dollar hypercars • ...
cyber threat actors, attacks & motivations 2023-12-18
Across
- Where to report a a cybersecurity incident at RDA
- It's something RDA is known for, but in the social form
- Homophone of a much loved pass time
- Supported by a government
- Australian Government agency that houses the ACSC
- Cybercrime that involves encryption and blackmail
- The name of the cipher you may or may not have succeeded in solving
- Furtum identitatis
Down
- A brute force technique used by cybercriminals
- An important aspect of security as a capability that isn't cyber
- Morris distributed this via the internet in 1988
- Something you must protect in the digital age
- A characteristic of cybercriminal groups
- Cybercriminal motivated by ideology
- A leading motivator for cybercriminals
- Malicious software used to establish remote access
- It's everyone's responsibility
17 Clues: Furtum identitatis • Supported by a government • It's everyone's responsibility • Homophone of a much loved pass time • Cybercriminal motivated by ideology • A leading motivator for cybercriminals • A characteristic of cybercriminal groups • Something you must protect in the digital age • A brute force technique used by cybercriminals • ...
TIAA - SMT Crossword 2024-09-19
7 Clues: TIAA strategic partner • CS&T Drive24 initiative • First name of a T3CON presenter • Female associates and allies BRG • TIAA office location that is closing • agile, cybersecurity, data, AI and emerging tech • One of 5 Latin American countries that celebrates their independence on sept 15
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Test Monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Test Monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Legal terminology 2019-11-19
Across
- Electronic currency.
- Check the safety on the internet.
- People with good computer knowledge and skills.
- A variety of data that is rapidly increasing.
- Computer systems, programs and data are free from threats.
- reality This project is the technology between reality and the virtual world.
Down
- Use of electronic devices to destroy, change, or steal information.
- Bullying and Malignant, Insulting.
- User avatar in a virtual world or game.
- Scam through the internet
10 Clues: Electronic currency. • Scam through the internet • Check the safety on the internet. • Bullying and Malignant, Insulting. • User avatar in a virtual world or game. • A variety of data that is rapidly increasing. • People with good computer knowledge and skills. • Computer systems, programs and data are free from threats. • ...
Montreat College 2023-05-24
Across
- What is it's school colors?
- What sport am I going to this college for?
- What is our Mascot?
- What is the mascots name?
- What is the name of Montreats honors college?
Down
- Which famous preacher was married in the chapel on campus?
- This major has been gaining a lot of popularity at Montreat.
- Where is Montreat Located?
- What popular American sport is not offered here?
- What is the name of Montreats popular lake?
10 Clues: What is our Mascot? • What is the mascots name? • Where is Montreat Located? • What is it's school colors? • What sport am I going to this college for? • What is the name of Montreats popular lake? • What is the name of Montreats honors college? • What popular American sport is not offered here? • Which famous preacher was married in the chapel on campus? • ...
Meet UAlbany 2023-07-26
Across
- Nonprofit who manages the UAlbany ID Card Office
- The last C in CEHC stands for
- Online platform for mandatory compliance trainings
- UAlbany's free safety app for your smartphone
- The number of libraries on the UAlbany Uptown Campus
- The Great Dane
- Renowned American architect and designer of main campus
- Symbol of commitment to Latina/o student success
Down
- Name of the weekly which facilitates discussions on ecological literacy and funding opportunities
- College of Arts &
- Office responsible for preservation, modernization, and construction that enable the University at Albany to achieve its objectives
- Colonial, Dutch, State, and Indigenous
- TAS stands for? Hint: $$
13 Clues: The Great Dane • College of Arts & • TAS stands for? Hint: $$ • The last C in CEHC stands for • Colonial, Dutch, State, and Indigenous • UAlbany's free safety app for your smartphone • Nonprofit who manages the UAlbany ID Card Office • Symbol of commitment to Latina/o student success • Online platform for mandatory compliance trainings • ...
Cyber Security 2023-11-07
Across
- Logs and Event Management provided in JICA Project
- Set of rules, policies and operations that a company uses to achieve its business goals
- Compliance is act of following rules, laws and regulations
- Network Monitoring system short form
- Term that Deals with Organization secret data
- Operates continuously and Data visible 24*7
- Next Generation Firewall brand provided in JICA Project
Down
- Term used to define Weakness
- Keeping Information and Communication Private
- Terms used for Logging all the user activity
- Keeping Organizational information accurate and free of errors
- Authorizing a Person to perform certain activity
- cybersecurity standards for OT technology
- Role Based Access Control
14 Clues: Role Based Access Control • Term used to define Weakness • Network Monitoring system short form • cybersecurity standards for OT technology • Operates continuously and Data visible 24*7 • Terms used for Logging all the user activity • Keeping Information and Communication Private • Term that Deals with Organization secret data • ...
CIS 178 Participation 3 Security 2023-07-17
Across
- computers or devices infected with malicious software
- collects and transmits sensitive information
- form of bullying that occurs online
- spreads from one computer to another
- virtual private network, secure online service
- "advertising-supported software" designed to display unwanted advertisements
- malicious software
- intrudes on a device remotely
- protecting digital assets
- development/use of computer systems/networks to store information.
- tricks users into clicking a disguised link
Down
- application designed to monitor network traffic
- disguises itself as a legitimate program or software
- uses bait to lure unsuspecting victims
- uses fingerprints, facial recognition, etc. to log into a device
- encrypts user's files or locks computer until a ransom is paid
- media manipulation, alter images/video for fake perception
- actions aimed to infiltrate computer networks.
- method of scrambling data for authorized users
- fake, disguised, bogus
20 Clues: malicious software • fake, disguised, bogus • protecting digital assets • intrudes on a device remotely • form of bullying that occurs online • spreads from one computer to another • uses bait to lure unsuspecting victims • tricks users into clicking a disguised link • collects and transmits sensitive information • virtual private network, secure online service • ...
Computer Science 2023-05-05
Across
- another word for virus
- A software that can do problem solving and learn on it's own
- Bill Gate's corporation
- Way to stop seeing ads
- Software to access the internet
- Owner of Tesla
- Lots of computers joined together through signals sending data
- The code that the nazis communicated through
- A software that infects your computer secretly
- A collection of code
- Code made out of 0s and 1s
Down
- The person who created the Universal Turing Machine
- A visual display which shows the code on a computer
- Small device that is pushed across a small area to do different actions
- A software addon
- Stops viruses from infecting your pc
- What you're using
- What you use to type
- What a computer uses to operate
- Another software that is very HOT
- Owner of apple
21 Clues: Owner of Tesla • Owner of apple • A software addon • What you're using • What you use to type • A collection of code • another word for virus • Way to stop seeing ads • Bill Gate's corporation • Code made out of 0s and 1s • Software to access the internet • What a computer uses to operate • Another software that is very HOT • Stops viruses from infecting your pc • ...
Classwork Crossword Puzzle 2021-09-20
Challenges Related to Community Safety in the Philippines 2024-02-29
Across
- Safety, The Philippines has one of the highest rates of road accidents and fatalities in Southeast Asia. This due to factors such as poor road infrastructure, reckless driving, and inadequate enforcement of traffic laws.
- Disasters, The Philippines is prone to __________ such as typhoons, earthquakes, and volcanic eruptions and it can result to significant loss of life, property damage, and also hinder economic development.
- and Violence, This is a major challenge in the Philippines includes robbery, as well as more serious crimes such as drug trafficking, terrorism, and political violence.
- is responsible for fire prevention, suppression, and investigation.
- is the primary law enforcement agency in the country.
- Awareness, This includes educating the public on disaster preparedness, crime prevention, road safety and cybersecurity as well as encouraging community participation in maintaining peace and order.
Down
- the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or
- is responsible for disaster preparedness, response, and recovery.
- With the increasing use of digital technologies in the Philippines has experienced a rise in cybercrime, including online scams, identity theft, and hacking.
- implements crime prevention programs and campaigns, such as the Barangay Peacekeeping Action Team (BPAT).
10 Clues: is the primary law enforcement agency in the country. • is responsible for disaster preparedness, response, and recovery. • is responsible for fire prevention, suppression, and investigation. • the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or • ...
AI Cyberspace 2024-10-15
Across
- Political factors influencing behavior in cybersecurity
- Measures to protect against cyber threats.
- AI enabling systems to learn from data.
- Total points vulnerable to cyber attacks.
Down
- Actions in cyberspace for security or attack.
- Actions to exploit vulnerabilities in systems.
- Intelligence Machines simulating human intelligence processes.
7 Clues: AI enabling systems to learn from data. • Total points vulnerable to cyber attacks. • Measures to protect against cyber threats. • Actions in cyberspace for security or attack. • Actions to exploit vulnerabilities in systems. • Political factors influencing behavior in cybersecurity • Intelligence Machines simulating human intelligence processes.
Career Options 2022-11-11
Across
- A person trained to give guidance on personal, social, or psychological problems.
- Joins two pieces of metal together.
- Types include voice, screen, stage or character.
- People in these jobs work to protect our communities.
- Protects computer systems, networks and data.
- Transports goods all over the country.
- Repairs and maintains machinery, motors, etc.
Down
- A scientist who studies fossils.
- Health of the human body.
- Jobs in this field include coaches, announcers and recruiters.
- Performs beauty treatment regimens on hair, skin and nails.
- Invent, design and maintain machines, structures and data systems.
- Defends the U.S.and its allies.
- Set up situations in which students can learn effectively.
14 Clues: Health of the human body. • Defends the U.S.and its allies. • A scientist who studies fossils. • Joins two pieces of metal together. • Transports goods all over the country. • Protects computer systems, networks and data. • Repairs and maintains machinery, motors, etc. • Types include voice, screen, stage or character. • ...
Computer Science Crossword 2024-03-21
Across
- The main page of a website.
- A security system that controls incoming and outgoing network traffic.
- A small file saved by websites to remember user information.
- Wireless internet connection.
- A step-by-step procedure for calculations.
- A program used to navigate the internet.
- A list of commands executed by a program or scripting engine.
Down
- A scam to steal personal information via email.
- Information processed or stored by a computer.
- Finding and fixing errors in code.
- Protection for computer systems and networks.
- A way of representing data using only two digits, 0 and 1.
- The ability to read and write.
- The address of a web page.
14 Clues: The address of a web page. • The main page of a website. • Wireless internet connection. • The ability to read and write. • Finding and fixing errors in code. • A program used to navigate the internet. • A step-by-step procedure for calculations. • Protection for computer systems and networks. • Information processed or stored by a computer. • ...
Blue Print 2024-09-11
Across
- Person who flies airplanes for a job
- Person who promotes products or brands online
- Animal expert who might work at a wildlife park
- Person who creates new computer and console games
- Cook who prepares food for big events
- Therapist who teaches exercises to heal injuries
- Creator of dance routines for shows or videos
- Writer who reports on the latest clothing trends
Down
- Computer expert who protects against online threats
- Someone who runs for office to make laws
- Designer of bridges, roads, and buildings
- Problem-solver who works to protect nature
- Person in charge of making movies
- Sound expert who helps make songs in a studio
14 Clues: Person in charge of making movies • Person who flies airplanes for a job • Cook who prepares food for big events • Someone who runs for office to make laws • Designer of bridges, roads, and buildings • Problem-solver who works to protect nature • Sound expert who helps make songs in a studio • Person who promotes products or brands online • ...
E-Commerce Crossword 2024-04-19
Across
- digital shopping cart used to hold items before purchase
- online advertisements targeted to specific users
- short for "electronic commerce"
- process of securely storing and transmitting customer data
- mobile app used to browse and purchase products online
- process of fulfilling an online order by delivering it
- process of returning a purchased item online
Down
- detailed description of a product listed online
- positive online review left by a satisfied customer
- online marketplace where sellers and buyers connect
- discounts offered online to attract customers
- secure online payment method using a credit card
- person who influences buying decisions through online reviews
- images used online to showcase products
14 Clues: short for "electronic commerce" • images used online to showcase products • process of returning a purchased item online • discounts offered online to attract customers • detailed description of a product listed online • online advertisements targeted to specific users • secure online payment method using a credit card • ...
Internet Safety Crossword 2023-04-20
Across
- a part of a computer system or network which is made to block unwanted access
- the state of being free from public attention
- a piece of information needed to log in to websites
- information made available by a website
- never share personal information online
- unwanted messages
- bulling done over the internet
- facts given about something or someone
Down
- someone that hacks
- websites and apps that enable users to create and share content EX.SnapChat
- a world wide computer network
- the state of being protected against the criminal use of electronic data
- like a cold for your computer
- be careful what you make public
14 Clues: unwanted messages • someone that hacks • a world wide computer network • like a cold for your computer • bulling done over the internet • be careful what you make public • facts given about something or someone • information made available by a website • never share personal information online • the state of being free from public attention • ...
Online Child Safety 2013-05-14
Across
- a person who access internet files either legally or illegally
- software that allows parents to control what their children do online
- an unsolicited email or junk mail
- Malicious hardware and code
- any software or technique used to prevent online crime
Down
- an interactive forum where you can talk in real time
- unsolicited adds on your computer
- a hostile strongly worded message that may contain obscene language
- scam that involves a fraudulent e-mail
- An adult internet user who exploits children or teens
- online site where people can post information about themselves
- rules/manners of inline usage
- a sexual message sent to someone
- virtual sexual encounters
- The Communications Decency Act
15 Clues: virtual sexual encounters • Malicious hardware and code • rules/manners of inline usage • The Communications Decency Act • a sexual message sent to someone • unsolicited adds on your computer • an unsolicited email or junk mail • scam that involves a fraudulent e-mail • an interactive forum where you can talk in real time • ...
Technology 2023-09-15
Across
- - Prefix for environments simulated by computers.
- - A global network connecting computers and devices.
- - Unmanned aerial vehicles used for various purposes.
- - A mobile device with advanced features.
- - Prefix for intelligence created by machines.
- - Wireless technology for short-range data exchange.
- - The study of designing and building robots.
- - Programs and applications used on computers.
Down
- - Authentication based on unique physical characteristics.
- - Measures to protect computer systems and data.
- - A small, specialized electronic device.
- - The process of converting data into a code to secure it.
- - Storage and computing resources accessed over the internet.
- - A set of rules for solving a problem or performing a task.
- - Using technology to perform tasks without human intervention.
15 Clues: - A small, specialized electronic device. • - A mobile device with advanced features. • - The study of designing and building robots. • - Prefix for intelligence created by machines. • - Programs and applications used on computers. • - Measures to protect computer systems and data. • - Prefix for environments simulated by computers. • ...
FOP 2023-04-01
Across
- SOCA’s ________ department is the first point of contact with outside organizations.
- DISM’s SIG.
- Gryphons plan & organize ______-___-___ competitions.
- SPAI attended and presented at the ____ Conference.
- SEED hosts the ___-___-Series.
- SOCA is In charge of ________ relations.
- ______ organized the SOC Open House.
Down
- Gryphons aims to promote ________ to students that are passionate about it.
- SPAI created its own Project _____.
- SPAI is part of the AI Singapore Student ____ Group.
- SEED stands for Sharing, _______, Enriching, Development.
- SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events.
- SOCC is in charge of maintaining and building ________ relations.
- League Programming competition only for freshmen.
- SOCC organized Freshman Orientation ______.
15 Clues: DISM’s SIG. • SEED hosts the ___-___-Series. • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations. • SOCC organized Freshman Orientation ______. • League Programming competition only for freshmen. • SPAI attended and presented at the ____ Conference. • SPAI is part of the AI Singapore Student ____ Group. • ...
Fundamentals of Computing: McKown 2022-10-26
Across
- Series of code that completes a specific task
- First Digital Computer
- Being mean directly or indirectly to an individual or group online
- Father of the computer
- .mp3 file type
- Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
- RAM Memory - Short Term
- Device used to display data to the user from the computer
- Single unit of the binary language
- First computer programmers
- 8 bits
Down
- Where all of the of compentants of a computer connect to or live
- Device used to give the computer data from the user
- The brain of the computer
- Industry that works to secure computers and computer networks as a whole
- Series of commands
- CodeHS Programming Dog
- Computer language
18 Clues: 8 bits • .mp3 file type • Computer language • Series of commands • First Digital Computer • Father of the computer • CodeHS Programming Dog • RAM Memory - Short Term • The brain of the computer • First computer programmers • Single unit of the binary language • Series of code that completes a specific task • Device used to give the computer data from the user • ...
Phishing Crossword 2023-10-14
7 Clues: a fake email address • an email that tricks people • commonly hunted by fisherman • a way scams try to reach you • protects against online threats • a sense that a scammer creates when rushing you • The process of verifying a claimed identity of a user or device
work 2024-03-22
Across
- Novel ideas and creativity.
- Administration and control of technological resources.
- Organization and oversight of tasks to achieve objectives.
- Advanced academic qualification.
- Examination and interpretation of information.
- Protection of digital systems and data.
- Long-term planning for achieving goals.
Down
- Investigation into government or organizational policies.
- Acronym for a specific department or field.
- Digital Academy Educational institution focusing on technology.
- Rules and guidelines governing behavior or activities.
- Possibly an acronym for a certain system or process.
- Techniques and processes for conducting studies.
- Sustainable use of ocean resources for economic growth.
- Government framework for science, technology, and innovation.
- Conference or meeting on a national scale.
- Legal rights over creations of the mind.
- Mandates Responsibilities of a certain organization.
- 2024 Event showcasing science, technology, and innovation in a specific year.
19 Clues: Novel ideas and creativity. • Advanced academic qualification. • Protection of digital systems and data. • Long-term planning for achieving goals. • Legal rights over creations of the mind. • Conference or meeting on a national scale. • Acronym for a specific department or field. • Examination and interpretation of information. • ...
Unit 4 Cybersecurity 2022-03-02
Across
- a check for a secure BIOS operation
- when an information system receives protection from a pre-existing security controls
- software built into a piece of hardware
- securing devices by reducing the exposure
Down
- a more thorough hotfix
- quick fix for a software problem
- firewall command to block or allow certain user
- a device that acts as a file server
- proprietary journaling file system
- a guide for efficiency of a network
- network of high speed storage used by servers
11 Clues: a more thorough hotfix • quick fix for a software problem • proprietary journaling file system • a check for a secure BIOS operation • a device that acts as a file server • a guide for efficiency of a network • software built into a piece of hardware • securing devices by reducing the exposure • network of high speed storage used by servers • ...
National Cybersecurity Month 2022-09-16
Across
- SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
- A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
- AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
- A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
- A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
- COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
- THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
- MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
- A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
- USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
- EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING
11 Clues: SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING • A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM • COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER • MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK • ...
Cybersecurity Crossword Puzzle 2023-04-17
Across
- Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
- access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
- It is a software or hardware which is used to filter network traffic based on rules.
- It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
- Is a software that operates on different OS which is used to prevent malicious software.
- security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
- Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
- Is an action or event that might compromise the security.
- It is a malicious software that installs on your computer without your consent for a bad purpose.
- security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- Is an assault on the system security that is delivered by a person or a machine to a system.
11 Clues: Is an action or event that might compromise the security. • It is a software or hardware which is used to filter network traffic based on rules. • Is a software that operates on different OS which is used to prevent malicious software. • Is an assault on the system security that is delivered by a person or a machine to a system. • ...
Luka's Cybersecurity Quizz 2024-03-20
Across
- Something that protect a network
- Symetrical encryption
- Keep a message unmodified
- Someone who doing hacking for there ethic
- Garanty that a message come from one person
- Something that encrypt or deencrypt a message
Down
- The possibility to access data
- Something that will damage your pc or things on it
- Privacy of a message
- A type of attack on a network
- Asymetrical encryption
11 Clues: Privacy of a message • Symetrical encryption • Asymetrical encryption • Keep a message unmodified • A type of attack on a network • The possibility to access data • Something that protect a network • Someone who doing hacking for there ethic • Garanty that a message come from one person • Something that encrypt or deencrypt a message • ...
CYBERSECURITY AWARENESS - C40 2024-10-22
Across
- The process of analyzing systems for vulnerabilities (8 LETTERS)
- A program that replicates itself to spread malware (4 LETTERS)
- A security method where each user has specific privileges (6 LETTERS)
- Cybercriminals often use this method to monitor network activity (8 LETTERS)
- Using multiple types of information to verify identity (14 LETTERS)
- Security strategy that requires users to change this regularly (8 LETTERS)
Down
- Common method used to protect sensitive data (10 LETTERS)
- Fake emails claiming to be from trusted sources (8 LETTERS)
- A phrase longer than a password for added security (9 LETTERS)
- Network of infected computers controlled remotely (6 LETTERS)
- Program designed to prevent unauthorized access (8 LETTERS)
11 Clues: Common method used to protect sensitive data (10 LETTERS) • Fake emails claiming to be from trusted sources (8 LETTERS) • Program designed to prevent unauthorized access (8 LETTERS) • Network of infected computers controlled remotely (6 LETTERS) • A phrase longer than a password for added security (9 LETTERS) • ...
4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02
Across
- The protection of information and systems from cyberattacks
- A threat originating from within an organization
- The overall protection of computer systems and data
- A weakness in a computer system that can be exploited
- The transfer of information between devices
Down
- The act of stealing or manipulating data
- Unintentional harm caused to data or systems
- A threat originating from the internet
- The practice of illegally gaining access to a computer system
9 Clues: A threat originating from the internet • The act of stealing or manipulating data • The transfer of information between devices • Unintentional harm caused to data or systems • A threat originating from within an organization • The overall protection of computer systems and data • A weakness in a computer system that can be exploited • ...
MEKATRONIK T3 2024-05-24
Across
- merupakan satu teras utama revolusi industri 4.0
- satu sistem susunan dan sambungan fizikal komponen dalam satu litar
- merupakan contoh bagi sistem kawalan
- LITAR merupakan salah satu aspek penning dalam product mekatronik
- merupakan salah satu ujian kefungsian
- ..........manufacturing Hialeah pembuatan bah mental
Down
- berfungsi membekalkan arus bagi membolehkan peranti berfungsi
- ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
- ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
- jurutera jepun yang memperkenalkan konsep mekatronik
10 Clues: merupakan contoh bagi sistem kawalan • merupakan salah satu ujian kefungsian • merupakan satu teras utama revolusi industri 4.0 • ..........manufacturing Hialeah pembuatan bah mental • jurutera jepun yang memperkenalkan konsep mekatronik • berfungsi membekalkan arus bagi membolehkan peranti berfungsi • ...
AUDITOR 4.0 TRENDS AND CHALLENGES 2023-06-06
Across
- Use of technologies to improve accuracy.
- Another word for difficulties experienced.
- Increasing use of online and cloud based tools increases this item.
Down
- One of the benefits of ESG reporting.
- Whats new in the industry?
- New technology used by companies for financial reporting.
- Profession being explored.
7 Clues: Whats new in the industry? • Profession being explored. • One of the benefits of ESG reporting. • Use of technologies to improve accuracy. • Another word for difficulties experienced. • New technology used by companies for financial reporting. • Increasing use of online and cloud based tools increases this item.
Cybersecurity Awareness Month 2023-09-20
Across
- Personally Identifiable Information
- ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
- Type of malware that threatens to expose information unless a payment is made
- Health Insurance Portability and Accountability Act
- An email that tricks you into giving up your passphrase
Down
- A weakness in a program or system that can be exploited
- Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
- CWRU classifies information as: public, internal-use, and _______
- Install operating system security ________ regularly
- The process of changing plain text to cipher text using an algorithm
- A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems
11 Clues: Personally Identifiable Information • Health Insurance Portability and Accountability Act • Install operating system security ________ regularly • A weakness in a program or system that can be exploited • An email that tricks you into giving up your passphrase • CWRU classifies information as: public, internal-use, and _______ • ...
pasar uang dan ekonomi digital 2024-02-28
Across
- sektor pendukung ekonomi digital
- contoh E-Commerce yang ada di Indonesia
- sumber pendanaan dalam pasar uang yang berupa utang dagang
- karakteristik pasar uang
- peluang bisnis ekonomi digital
Down
- pekerjaan masyarakat Indonesia dengan adanya media online
- masih menjadi ancaman bagi sebagian besar pengguna internet di Indonesia
- ekonomi digital sangat efisien
- salah satu memanfaatkan ekonomi digital adalah membuat
- karakteristik ekonomi digiral yang membuat orang tidak bertemu langsungh
- kegiatan pinjam meminjam dana antara satu bank dengan bank lainnya untuk jangka waktu yang pendek
- berperan sebagai perantara di antara pelaku dalam Pasar Uang
- salah satu fungsi pasar uang
- instrumen pasar uang yang diteritkan Bank Umum
- pelaku utama dalam pasar uang yang menjaga kestabilan moneter dan harga
15 Clues: karakteristik pasar uang • salah satu fungsi pasar uang • ekonomi digital sangat efisien • peluang bisnis ekonomi digital • sektor pendukung ekonomi digital • contoh E-Commerce yang ada di Indonesia • instrumen pasar uang yang diteritkan Bank Umum • salah satu memanfaatkan ekonomi digital adalah membuat • pekerjaan masyarakat Indonesia dengan adanya media online • ...
Cybersecurity Fundamental Chapter 2 2022-11-24
Across
- a type of storage device retains the data when no user or process is using it.
- cyber criminals can capture, save and steal data in-transit.
- uses removable media to physically move data from one computer to another.
- procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
- devices, and product available to protect information systems and fend off cyber criminals.
- verifies the identify of a user to prevent unauthorized access.
- uses cable to transmit data.
Down
- verifies determine which resources users can access, along with the operations that users can perform.
- is the principle used to describe the need to maintain availability of information systems and services at all times.
- involves sending information from one device to another.
- cyber criminals can use rogue or unauthorized devices to interrupt data availability.
- cyber criminals can intercept and alter data in-transit.
- aware and knowledgeable about their world and the dangers that threaten their world.
- keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
- prevents the disclosure of information to unauthorize people, resource and processes.
- uses the airways to transmit data.
16 Clues: uses cable to transmit data. • uses the airways to transmit data. • involves sending information from one device to another. • cyber criminals can intercept and alter data in-transit. • cyber criminals can capture, save and steal data in-transit. • verifies the identify of a user to prevent unauthorized access. • ...
Privacy & Security 2022-11-01
Across
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
- process of identifying a user’s identity
- the right to be let alone
Down
- common examples are viruses & trojans
- coding protecting information from hackers
- (2 words) information about an individual
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
- international organization for standardization
10 Clues: compromise of security • the right to be let alone • common examples are viruses & trojans • process of identifying a user’s identity • (2 words) information about an individual • coding protecting information from hackers • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Should be tested monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Should be tested monthly • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Privacy & Security 2023-12-20
Across
- coding protecting information from hackers
- the right to be let alone
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
Down
- (2 words) information about an individual
- common examples are viruses and trojans
- the process of identifying a user's identity
- international organization for standardization
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
10 Clues: compromise of security • the right to be let alone • common examples are viruses and trojans • (2 words) information about an individual • coding protecting information from hackers • the process of identifying a user's identity • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...