cybersecurity Crossword Puzzles
Intro Cybersecurity Puzzle 2 2021-09-15
Across
- Acronym for a _____ model typically used for troubleshooting communication with TCP protocol
- Another form of single sign on, initially supported by Twitter and Google
- Biometrics is an example of something you _____
- single sign-on authentication, think three headed dog
- A key fob is an example of something you _____
- A Command Prompt command used to test the ability of the source computer to reach a specified destination computer
- Robot Network
- Acronym for Industrial Control Systems Supervisory Software
- Acronym for the expectations between the service provider and the customer and describes the products or services to be delivered
Down
- The infected computer in a network of computers with infected malware
- Your location to sign in is an example of somewhere you _____
- the process of converting a given key into another value. If they are the same this is known as collision.
- An emerging technology used in cryptocurrency
- Acronym for "Smart Devices" over the internet
- Your password is an example of something you _____
- Acronym for Anything as a service
- The acronym for the masterbot centralization
17 Clues: Robot Network • Acronym for Anything as a service • The acronym for the masterbot centralization • An emerging technology used in cryptocurrency • Acronym for "Smart Devices" over the internet • A key fob is an example of something you _____ • Biometrics is an example of something you _____ • Your password is an example of something you _____ • ...
Cybersecurity Fundamentals Chapter 5 2022-10-27
Across
- an efficient way to store, retrieve, and analyze data.
- table relationship must remain consistent.
- a set of rules defined by the user which does not belong to one of the other categories.
- use to make hashing more secure.
- strengthens hashing algorithm by using additional secret key as input to the hash function.
- a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
- checks that data falls within the parameters defined by the database designer.
- all data stored in a column must follow the same format.
- hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
- refers to the accuracy, consistency, and reliability of data stored in a
- developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
- the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
- provide the same functionality as handwritten signature for electronics documents.
- all rows must have a unique identifier called primary key.
- equivalent to an electronic passport.
- standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.
16 Clues: use to make hashing more secure. • equivalent to an electronic passport. • table relationship must remain consistent. • an efficient way to store, retrieve, and analyze data. • all data stored in a column must follow the same format. • all rows must have a unique identifier called primary key. • ...
The Voice: October 7th, 2024 2024-10-07
Across
- Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
- What _____ look like in Canada today.
- Limited spots left for this event!
- October is what awareness month?
Down
- One of the highlighted members this week.
- Since 2012, the Chamber has advocated for improved what?
- EcoBrooks _____ Award.
7 Clues: EcoBrooks _____ Award. • October is what awareness month? • Limited spots left for this event! • What _____ look like in Canada today. • One of the highlighted members this week. • Since 2012, the Chamber has advocated for improved what? • Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
Cyber Security Puzzle 2024-10-21
Across
- term used for various pop-up advertisements that show up on your computer or mobile device.
- a malware designed to deny a user or organization access to files on their computer
- what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
- specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
- the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
- refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
- A worm in cybersecurity is a type of malicious software that spreads across computer networks
- A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user
9 Clues: a malware designed to deny a user or organization access to files on their computer • term used for various pop-up advertisements that show up on your computer or mobile device. • A worm in cybersecurity is a type of malicious software that spreads across computer networks • ...
Zine Crossword 2022-04-16
Across
- Considered to be the first hacker
- The website on which anonymous would plan their attacks
- The film that produced the famous hacking mask
Down
- The protection of information on the internet
- One of the colors of the three types of hackers
- The headwear associated with hacking
- A form of harm done on the internet
- Famous hacking group
8 Clues: Famous hacking group • Considered to be the first hacker • A form of harm done on the internet • The headwear associated with hacking • The protection of information on the internet • The film that produced the famous hacking mask • One of the colors of the three types of hackers • The website on which anonymous would plan their attacks
AI in education 2024-06-05
Across
- Protection of personal information.
- Lack of neutrality, prejudice.
- Guidelines or principles governing proper conduct.
- Actions taken to use something wrongly or inappropriately.
- The quality of being honest and having strong moral principles.
- The state of being clear and open.
Down
- The protection of data from unauthorized access or corruption.
- The state of being answerable or responsible.
- Practices designed to ensure secure data and systems.
- The practice of keeping information secret to prevent unauthorized access.
10 Clues: Lack of neutrality, prejudice. • The state of being clear and open. • Protection of personal information. • The state of being answerable or responsible. • Guidelines or principles governing proper conduct. • Practices designed to ensure secure data and systems. • Actions taken to use something wrongly or inappropriately. • ...
Comms & Media Crossword - October Edition 2022-10-04
Across
- This company was recently in news for launching 5G Lab-as-a-service
- Leading telecom equipment provider, & our client
- Virtual representation of a real-world physical system
- One of the most important digital challenges today
- Continuous Expenditure that companies incur
Down
- Satoshi Nakamoto was the pioneer behind this technology
- Software based technology used in Telecom
- This company launched India’s 1st multiplex in Metaverse
- Telecom players fight for this
- boAt had a K-pop concert on this platform
10 Clues: Telecom players fight for this • Software based technology used in Telecom • boAt had a K-pop concert on this platform • Continuous Expenditure that companies incur • Leading telecom equipment provider, & our client • One of the most important digital challenges today • Virtual representation of a real-world physical system • ...
Ransomware 2021-09-23
6 Clues: New Ransomware Variant • Protects against threat online • Convert information into a code • Software created for malicious purposes • A technique used by hackers to obtain sensitive information • Protecting networks, devices and data from unauthorized access
Knowledge Exchange Christmas Quiz 2023-12-05
7 Clues: Santa's helpers. • Guides Santas Sleigh • Last IT Tuesday topic • The Snowman with a corncob pipe and button nose. • At Savannah, we have a culture of continuous .... • Intranet location to learn more about IT initiatives. • The Centre of is where you can find further information on continuous improvement
Tecnologia de la Informacion 2023-05-06
Across
- Implica en los trabajos en tecnología de la información
- La TI admite muchas funciones comerciales y ayuda a?
- Una de las carreras que abarca la TI
- Es un tipo de tecnología de información
- Sigla de la tecnología de información
- Las empresas globales utilizan la tecnología de información para?
Down
- ¿Qué es la tecnología de la información?
- ¿La tecnología de información es responsable de?
- ¿Porqué es necesaria la tecnología de la información?
9 Clues: Una de las carreras que abarca la TI • Sigla de la tecnología de información • Es un tipo de tecnología de información • ¿Qué es la tecnología de la información? • ¿La tecnología de información es responsable de? • La TI admite muchas funciones comerciales y ayuda a? • ¿Porqué es necesaria la tecnología de la información? • ...
CODING VOCABULARY 2023-02-03
Across
- NUMBER SYSTEM USED BY COMPUTERS MADE UP OF 1'S AND 2'S
- ANY CHARACTER OR OBJECT USED IN BLOCK CODING
- A FREE PROGRAMMING LANGUAGE
- MONEY GIVEN TO A HACKER FOR FINDING A WEAKNESS
- ASKING IF A CONDITION IS MET
- SET OF LOGICAL STEPS CARRIED OUT IN ORDER
- OPEN SOURCE PROGAMMING LANGUAGE USING BLOCK CODING DEVELOPED BY MIT
- FINDING WEAKNESSES IN DIGITAL DEVICES
- IDENTIFY AND REMOVE ERRORS FROM COMPUTER PROGRAMS
Down
- PROTECTING SENSITIVE DIGITAL INFORMATION
- TOOL USED TO VIEW AND TEMPORARILY CHANGE SOURCE CODE
- MACHINE PROCESSED SIMULATION OF HUMAN INTELLIGENCE
- DATA ENTERED BY A USER
- INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO
- NAMES USED TO HOLD ONE OR MORE VALUES
- THE WAY SOMETHING IS WRITTEN
16 Clues: DATA ENTERED BY A USER • A FREE PROGRAMMING LANGUAGE • ASKING IF A CONDITION IS MET • THE WAY SOMETHING IS WRITTEN • NAMES USED TO HOLD ONE OR MORE VALUES • FINDING WEAKNESSES IN DIGITAL DEVICES • PROTECTING SENSITIVE DIGITAL INFORMATION • SET OF LOGICAL STEPS CARRIED OUT IN ORDER • ANY CHARACTER OR OBJECT USED IN BLOCK CODING • INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO • ...
INFORMATION GOVERNANCE SUMMER FUN 2017-08-08
Across
- Coming soon,in May 2018!
- New term under GDPR
- Increasing threat for us all
- Have you filled the new role required under GDPR?
- Process which becomes a legal requirement under GDPR
Down
- Part of important review by NDG 2016
- Mustn't forget this important law for patients
- What could happen to to you in 2018 if you steal personal data
- Part of revised definition for sensitive personal data under GDPR
9 Clues: New term under GDPR • Coming soon,in May 2018! • Increasing threat for us all • Part of important review by NDG 2016 • Mustn't forget this important law for patients • Have you filled the new role required under GDPR? • Process which becomes a legal requirement under GDPR • What could happen to to you in 2018 if you steal personal data • ...
Mr Robot 2022-11-15
Across
- prevent attacks by blocking malicious traffic
- unwanted files or programs that can cause harm to a computer
- private information being kept secret
- people who seek to exploit weaknesses in software
- a set of characters that allows access to a system
- software designed to detect and destroy viruses
Down
- flaws in software
- the art of protecting networks, devices, and data from attacks
- type of email use to steal information about you
9 Clues: flaws in software • private information being kept secret • prevent attacks by blocking malicious traffic • software designed to detect and destroy viruses • type of email use to steal information about you • people who seek to exploit weaknesses in software • a set of characters that allows access to a system • ...
Fundamentals of Computing Terms 2020-09-21
Across
- A harmful computer program that creates glitches
- transferring data from the internet to a device
- a small graphic that represents a file/application
- A widely-accepted cyber security measure
- the protection of computer systems/networks
- an interface for connecting peripheral devices
- an output device that displays info from CPU
- uses pictures and words to represent ideas, etc.
- a piece of equipment outside the computer
- software that is pre-programmed for user
Down
- the blocking of data access for ransom
- program that you run on a computer/phone
- an input device that allows user to click graphics
- 8 bites of info represented in 1 character
- the brain of the computer
- Temporary memory
- smallest piece of info in the computer
- items that you can touch, I.E, tablet, etc.
- transferring data to the internet
- a unit of storage that is about 1 mil bytes
- the network of physical objects
21 Clues: Temporary memory • the brain of the computer • the network of physical objects • transferring data to the internet • the blocking of data access for ransom • smallest piece of info in the computer • program that you run on a computer/phone • A widely-accepted cyber security measure • software that is pre-programmed for user • a piece of equipment outside the computer • ...
Executive Branch 2023-06-02
Across
- The state prison or correction centers
- Government handles Urban issues such as substandard and deteriorating housing
- Ensures America's environmental and nuclear ______
- Promote student achievement and ______
- Promote the economic and social well-being of children and families
- Enhance the health and well-being of all Americans
Down
- Operates and maintains systems for the nation's finace
- Uphold the rule and law and protect civil rights
- Manages public lands and minerals
- Provides military forces and protects the United States
- Provides job and employment
- Promotes job creation and economic growth
- Offers education and rehabilitation services for Veterans
- Helps Americans start, build and grow businesses
- Responsible for terrorism and cybersecurity
- We provide leadership on food, agriculture and natural resources
- Defending the United States through control and exploitation of air and space
- Emergency services and first responders such as law enforcement
- Managing state toll factions
- Protect and promote the U.S security
20 Clues: Provides job and employment • Managing state toll factions • Manages public lands and minerals • Protect and promote the U.S security • The state prison or correction centers • Promote student achievement and ______ • Promotes job creation and economic growth • Responsible for terrorism and cybersecurity • Uphold the rule and law and protect civil rights • ...
KeyW Crossword 2017-01-18
Across
- When at work, what must you always carry
- Applying statistical analysis to data which has a geographical or spatial aspect
- KeyW non-profit organization abbreviated
- KeyW's best location
- What is the name of our newsletter
- KeyW CEO
- Time sheet
- What is the surname of KeyW's founder
- What type of bird is our mascot
Down
- KeyW's colors
- What month was KeyW founded
- What is the name of our mascot
- Radio Detection and Ranging
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- Parrot Ball location
- How many miles connect Key West to Florida main land
- Which food truck offers the best cheese steaks
- What color is our KeyW van
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
science-and-technology 2 2023-11-25
Across
- Device that speeds up charged particles.
- The path of an object around a celestial body.
- Managing temperature and weather conditions.
- Computer-generated simulation of a three-dimensional environment.
- Design and construction of new biological parts.
- Device that converts hydrogen into electricity.
- Study of ionized gases (plasma).
Down
- Protection of computer systems from theft or damage.
- Altering genes in an organism's DNA.
- Relating to electric and magnetic fields.
- Elementary particle and a fundamental constituent of matter.
- Study of extremely low temperatures.
- Manipulation of matter on a molecular or atomic scale.
- Electromagnetic radiation with longer wavelengths than visible light.
- Long-term alteration in Earth's climate.
- Small rocky object orbiting the sun.
- Application of biological principles to medicine.
- Programs and applications for computers.
- Thread-like structure of DNA in the nucleus.
- Ability of machines to learn from data.
20 Clues: Study of ionized gases (plasma). • Altering genes in an organism's DNA. • Study of extremely low temperatures. • Small rocky object orbiting the sun. • Ability of machines to learn from data. • Device that speeds up charged particles. • Long-term alteration in Earth's climate. • Programs and applications for computers. • Relating to electric and magnetic fields. • ...
Technology Crossword 2024-05-29
Across
- AI
- a computer that works like a human brain
- a form of a monitarilly valuable item
- Something that is a threat to us non physically
- this is a watch or VR headset
- Something that can be invaded
- an orbit of artifical stars in a pattern
- a form of tourism that is very expensive and not many have a chance to go.
- Exploring the largest part of earth
- Advanced Computing
Down
- Finger print or face id
- a form of engineering
- A form of travel out of this world
- Threat of Unemployment
- Analysis of data
- Something seen as a toy for some but fly
- having people colonize a close planet
- Something almost everyone uses
- many people have these devices
- a way of making sure that you get what you need to get well
20 Clues: AI • Analysis of data • Advanced Computing • a form of engineering • Threat of Unemployment • Finger print or face id • this is a watch or VR headset • Something that can be invaded • Something almost everyone uses • many people have these devices • A form of travel out of this world • Exploring the largest part of earth • a form of a monitarilly valuable item • ...
EQUATE - Cybersecurity 2023-05-30
Across
- file included with an email that may carry risks
- Unwanted bulk emails
- Something to look for when verifying an email
Down
- Website or email address identifier
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • Website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • file included with an email that may carry risks • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
EQUATE - Cybersecurity 2023-05-30
Across
- file included with an email that may carry risks
- Unwanted bulk emails
- Something to look for when verifying an email
Down
- Website or email address identifier
- Malicious assault on computer systems or networks.
- Microsoft-developed email client for managing email accounts
- Deceptive emails aiming to extract personal data
7 Clues: Unwanted bulk emails • Website or email address identifier • Something to look for when verifying an email • Deceptive emails aiming to extract personal data • file included with an email that may carry risks • Malicious assault on computer systems or networks. • Microsoft-developed email client for managing email accounts
Cybersecurity Month 2023-09-27
Across
- A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
- Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
- A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
- A form of malware used by hackers to spy on you and your computer activities
- Any technology, be it software or hardware, used to keep intruders out
- Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications
7 Clues: Any technology, be it software or hardware, used to keep intruders out • A form of malware used by hackers to spy on you and your computer activities • Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
ACC 2022-09-27
Across
- We waive any right of recovery we may have
- platform used to log calls
- ensures small business owners are protected from the ongoing threats of Cybersecurity breaches
- our ABI know it all
- are excluded for both Property and Liability (BOP and CPP) coverage including Inland Marine.
Down
- contains a collection of additional coverages and increased limits for certain coverages
- an inspection required in the state of NY
- optional coverage maximizes limits
- provides coverages at no cost
- Option for liability limit
- script used to answer a call
11 Clues: our ABI know it all • platform used to log calls • Option for liability limit • script used to answer a call • provides coverages at no cost • optional coverage maximizes limits • an inspection required in the state of NY • We waive any right of recovery we may have • contains a collection of additional coverages and increased limits for certain coverages • ...
ict 2024-07-02
Across
- Number system with two digits, 0 and 1, used by computers.
- Security system that monitors and controls network traffic.
- Process of converting information into a secure form.
- Organized collection of data.
- Intelligence: Simulation of human intelligence by machines.
Down
- Device connected to a computer (e.g., printer, mouse).
- Technique of creating virtual versions of computer resources.
- Protection of computer systems from digital attacks
- Finding and fixing errors or bugs in software code.
- Step-by-step procedure for solving a problem.
- System: Software that manages computer hardware and software resources.
11 Clues: Organized collection of data. • Step-by-step procedure for solving a problem. • Protection of computer systems from digital attacks • Finding and fixing errors or bugs in software code. • Process of converting information into a secure form. • Device connected to a computer (e.g., printer, mouse). • Number system with two digits, 0 and 1, used by computers. • ...
KeyW Crossword 2017-01-19
Across
- Radio Detection and Ranging
- KeyW non-profit organization abbreviated
- KeyW's colors
- What is the name of our newsletter
- How many bridges connect Key West to Florida main land
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- What is the name of our mascot
- Parrot Ball location
- What color is our KeyW van
- What type of bird is our mascot
Down
- When at work, what must you always carry
- Protection of networks, computers, programs, and data from attack
- KeyW's best location
- Time sheet
- KeyW CEO
- What is the surname of KeyW's founder
- Which food truck offers the best cheese steaks
- Applying statistical analysis to data which has a geographical or spatial aspect
- What month was KeyW founded
- How many buildings does the Severn location have
20 Clues: KeyW CEO • Time sheet • KeyW's colors • KeyW's best location • Parrot Ball location • What color is our KeyW van • Radio Detection and Ranging • What month was KeyW founded • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • When at work, what must you always carry • ...
cpsc4240 2024-10-31
Across
- legal license that allows you to use and edit a product
- protecting systems and networks from digital attacks
- type of attack that can be caused by a nuke
- linuxdef
- number that determines process priority
- each one has a unique PID
- leaked the docs
- command to add user
- command to open this user is su
- command to control log settings
- partition that allows for temp storage
- link that points to another file
Down
- only letting users access what they need
- feature that logs metadata
- read write execute
- having many security layers
- system that has both ipv4 and ipv6
- file that discards all data written to it
- type of link that creates a direct copy
- file that stores password hashes
- sets file permission upon create
- process that creates child
- command to run a privileged command
- attaching a filesystem to another
24 Clues: linuxdef • leaked the docs • read write execute • command to add user • each one has a unique PID • feature that logs metadata • having many security layers • process that creates child • command to open this user is su • command to control log settings • file that stores password hashes • sets file permission upon create • link that points to another file • ...
test 2022-07-15
Across
- Music festival they attended -
- Michael proposed in ___ beach -
- European country michael lived in -
- How they met
- On the way to Big Sur they stopped at an ___ farm -
- Day of the week they attend life group -
- City of the music festival they attended -
- Basketball team michael supports -
- Sammi’s side hustle -
- How we are honoring sammis dad at the wedding -
- Month they met -
- City they took their engagement photos -
- Sauce michael hates -
Down
- State michael was raised in -
- Industry sammi works in -
- Sammis favorite flowers -
- Sammis bridal shower was a ___ party -
- Brand of sammi’s car -
- Type of dance sammi did growing up -
- Destination of first plane ride together -
- Type of engineer Michael is -
- Year they met -
- Color of michaels bathroom before they painted it -
- Location of their first post together on IG -
- Engagement ring shape -
25 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • Basketball team michael supports - • ...
Cisco 2022-11-30
Across
- intentional tampering
- machine within a machine
- machine for printing text onto paper
- information non-consensually given to the public
- something on many screens
- output device that displays images
- place of sale
- official procedure
- common handheld device
- faster protocol
- thick rope of wire
- putting something into another forcefully
- an autonomous device
- device that often works with mice
- IO device that displays images
- IO device for computer
Down
- negative or not good
- our fearless leader
- slower protocol
- protection of systems
- to engineer
- company
- can be divided into vlans
- attack strategy
- connects networks
- our country
- a form of social engineering
- something often worn by humans
- IO device for computers
- a type of robot
- encoded message
- device
- aspect of human lift
- a type of person
34 Clues: device • company • to engineer • our country • place of sale • slower protocol • attack strategy • faster protocol • a type of robot • encoded message • a type of person • connects networks • official procedure • thick rope of wire • our fearless leader • negative or not good • an autonomous device • aspect of human lift • intentional tampering • protection of systems • common handheld device • ...
Executive Branch 2023-06-02
Across
- The state prison or correction centers
- Government handles Urban issues such as substandard and deteriorating housing
- Ensures America's environmental and nuclear ______
- Promote student achievement and ______
- Promote the economic and social well-being of children and families
- Enhance the health and well-being of all Americans
Down
- Operates and maintains systems for the nation's finace
- Uphold the rule and law and protect civil rights
- Manages public lands and minerals
- Provides military forces and protects the United States
- Provides job and employment
- Promotes job creation and economic growth
- Offers education and rehabilitation services for Veterans
- Helps Americans start, build and grow businesses
- Responsible for terrorism and cybersecurity
- We provide leadership on food, agriculture and natural resources
- Defending the United States through control and exploitation of air and space
- Emergency services and first responders such as law enforcement
- Managing state toll factions
- Protect and promote the U.S security
20 Clues: Provides job and employment • Managing state toll factions • Manages public lands and minerals • Protect and promote the U.S security • The state prison or correction centers • Promote student achievement and ______ • Promotes job creation and economic growth • Responsible for terrorism and cybersecurity • Uphold the rule and law and protect civil rights • ...
Crossword Puzzle 2023-12-12
Across
- Coordinated anti-terrorism effort
- Diplomatic negotiation process
- Mutual defense pact
- Emotional response to stress or danger
- Country with aggressive territorial claims in the West Philippine Sea
- Protection against cyber threats
- Manipulation of information to influence opinions
- Policies aimed at reducing gender-based disparities
- Targeting of adversary's decision-making processes
- Island in the West Philippine Sea claimed by multiple countries
- Localized peace talks with insurgent groups
Down
- Common mental health condition characterized by persistent sadness
- Act of risking one's life to save others
- Joint military exercises
- Replacement of old weaponry with newer, more advanced systems
- Primary fighter aircraft used by the Air Force
- Country's plan for protecting itself from external threats
- Large warship equipped for open-sea combat
- Strategy to address the root causes of insurgency
- International court ruling on the West Philippine Sea dispute
- Declaration of the government to end insurgency
21 Clues: Mutual defense pact • Joint military exercises • Diplomatic negotiation process • Protection against cyber threats • Coordinated anti-terrorism effort • Emotional response to stress or danger • Act of risking one's life to save others • Large warship equipped for open-sea combat • Localized peace talks with insurgent groups • Primary fighter aircraft used by the Air Force • ...
NEWSLETTER 2023-11-13
Across
- The activity, you do to get to places.
- Another word for young people....
- Ghana’s Winter.
- I want for Christmas is......
- The invisible line that divides the earth into two equal parts.
- Picture on social media.
- Your identity summarized onto one thing.
- Plans for the New Year.
- Program used to harm computers.
- Color associated with the New Year.
- MIDG end-of-year package for employees.
- Popular hangout zone in Accra.
- ....is responsible for the safety and manner on the internet and other connection.
Down
- Merry Christmas
- Baby Crocodile
- .....is the most showed movie during Christmas movie in Ghana.
- Margins ID Group is made up of four....
- .... flies when you’re having fun.
- Sits atop the Christmas tree.
- Pronto’s location.
- A machine that can be used to write, connect to the writer, the internet and play games.
- Identity theft is an example of...
- A letter sent on the internet.
- What makes you, you.
24 Clues: Baby Crocodile • Merry Christmas • Ghana’s Winter. • Pronto’s location. • What makes you, you. • Plans for the New Year. • Picture on social media. • I want for Christmas is...... • Sits atop the Christmas tree. • A letter sent on the internet. • Popular hangout zone in Accra. • Program used to harm computers. • Another word for young people.... • .... flies when you’re having fun. • ...
Computer Science 2024-10-25
6 Clues: Protecting your systems • password an easily guessed password • password A password that is strong • a memorized secret with a sequence of words • random password Make up your own password • device A technique someone uses to remember
Quality Month Quiz 2022-11-04
Across
- a type of cybersecurity attack that attempts to steal your information
- Plays A VITAL ROLE IN YOUR APPRAISAL
- Skill / Knowledge to do a process
- Property of accuracy and completeness
- are implemented to mitigate the identified risks
- Action to eliminate the cause of a nonconformity and to prevent recurrence
Down
- Tailgating is also termed as
- Portrays the hierarchy in organisation / function
- plan to achieve a long-term or overall objective
- Non-fulfilment of a requirement
- A weakness of an asset or control that could potentially be exploited by one or more threats
- How many Quality Management Principle in QMS
12 Clues: Tailgating is also termed as • Non-fulfilment of a requirement • Skill / Knowledge to do a process • Plays A VITAL ROLE IN YOUR APPRAISAL • Property of accuracy and completeness • How many Quality Management Principle in QMS • plan to achieve a long-term or overall objective • are implemented to mitigate the identified risks • ...
internet safety 2023-04-19
Across
- a part of a computer system or network which is designed to block unwanted access
- like a cold for your computer
- the state of being protected against the criminal use of electronic data
- bulling done over the internet
- a person or thing that hacks
- a world wide computer network
- websites and apps that let users create and share content EX.Snapchat
Down
- a piece of information needed to log in to the internet
- the state of being free from public attention
- be careful what you make public
- information made available by a website
- facts given to learn about someone or something
12 Clues: a person or thing that hacks • like a cold for your computer • a world wide computer network • bulling done over the internet • be careful what you make public • information made available by a website • the state of being free from public attention • facts given to learn about someone or something • a piece of information needed to log in to the internet • ...
Digital media literacy 2023-09-14
Across
- a setting you turn on to camouflage yourself from internet scammers
- this is where you install games and streaming services
- a streaming service that is very well known
- people that lure people into giving them there bank details
- a way of protecting you from hackers
Down
- a website in which you order from and it’s delivered to your door
- an answer to all your questions
- watch videos from your favourite content creator
- tweet tweet
- a social media app with a blue logo
- a corporation run by bill gates
- some the would be powered by electricity
12 Clues: tweet tweet • an answer to all your questions • a corporation run by bill gates • a social media app with a blue logo • a way of protecting you from hackers • some the would be powered by electricity • a streaming service that is very well known • watch videos from your favourite content creator • this is where you install games and streaming services • ...
Business Ethics/Cyber Security 2023-09-19
Across
- practice of protecting critical systems
- work place manners
- the number of steps in the decision making process
- this person wanted to test the size of the internet by creating a program that duplicated itself
Down
- exchange of information between a sender and receiver
- these hackers send an email or text with a link to click
- guidelines for how a business should conduct themselves
- positive internet behavior
- a policy users must agree to follow in order to gain internet access
- a set of moral principles
- the most common form of communication in a business
- these hackers ask for money
12 Clues: work place manners • a set of moral principles • positive internet behavior • these hackers ask for money • practice of protecting critical systems • the number of steps in the decision making process • the most common form of communication in a business • exchange of information between a sender and receiver • guidelines for how a business should conduct themselves • ...
TDD 2023-09-19
Across
- Think before you _____.
- One of the common internet search engine used nowadays.
- Do not share your account ______ to anyone.
- We should avoid sharing any _______ news without validating the sources.
- #1 popular social media. CEO – Mark Zuckerberg
Down
- ______ has been recognized as Cybersecurity awareness month.
- One of Amcor values.
- _______ make human sick as well as computer.
- Operating System
- Short form of wireless network.
- ____ your laptop when you are stepping away. You need a key to unlock it.
- They are referred as small insects in mother nature. IT referred them as errors in computer program/system.
12 Clues: Operating System • One of Amcor values. • Think before you _____. • Short form of wireless network. • Do not share your account ______ to anyone. • _______ make human sick as well as computer. • #1 popular social media. CEO – Mark Zuckerberg • One of the common internet search engine used nowadays. • ______ has been recognized as Cybersecurity awareness month. • ...
ch1-2-3 2021-09-25
Across
- quality of dealing with ideas rather than events
- malicious software
- track online activity and capture data
- study of what is right or wrong in human conduct
- a way to discover and fix a problem in a system
- process to protect individual and organization
Down
- the beliefs of the individuals or groups as to what is wrong and right
- replicates itself independently in a network
- automatically delivers advertisements
- holds a computer system captive until payment is made
- the degree to which something is able or fit to be used
- usually spreads by USB drives, emails or network shares
12 Clues: malicious software • automatically delivers advertisements • track online activity and capture data • replicates itself independently in a network • process to protect individual and organization • a way to discover and fix a problem in a system • quality of dealing with ideas rather than events • study of what is right or wrong in human conduct • ...
Cybersecurity Crossword 2021-11-14
Across
- Proving your identity
- Encrypting files and holding them hostage for money
Down
- A horse with a surprise
- software designed to corrupt or steal information
- Pretending to be someone you are not to extract information out of someone
- A denial of service attack targets this
- a brute force attack takes a long time to work on this
7 Clues: Proving your identity • A horse with a surprise • A denial of service attack targets this • software designed to corrupt or steal information • Encrypting files and holding them hostage for money • a brute force attack takes a long time to work on this • Pretending to be someone you are not to extract information out of someone
Cybersecurity Crossword 2023-07-25
Across
- Unauthorized individuals gaining physical access through closely following authorized personnel
- A form of business risk resulting from cyberattacks or data breache
Down
- Suspicious emails
- Another word for tailgating
- Unexpected behavior exhibited by software applications, such as crashes could be caused by
- Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
- could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.
7 Clues: Suspicious emails • Another word for tailgating • A form of business risk resulting from cyberattacks or data breache • Unexpected behavior exhibited by software applications, such as crashes could be caused by • Unauthorized individuals gaining physical access through closely following authorized personnel • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Anson Khoo Kai Loon 8G 2023-01-19
Across
- People use this to study online during the pandemic.
- To protect others from looking in your phone.
- protects you from networks & programs digital attacks.
- We can use ________ to communicate with others all around the world.
- You can send a ______ to your friends to play with.
Down
- A website that people use to buy something online.
- A website that people use to search.
- You need to press _______ to shut your computer/laptop.
- Made by Mark Zuckerberg.
- Its use in almost all electronic devices.
- An old website that people use to search something.
11 Clues: Made by Mark Zuckerberg. • A website that people use to search. • Its use in almost all electronic devices. • To protect others from looking in your phone. • A website that people use to buy something online. • An old website that people use to search something. • You can send a ______ to your friends to play with. • People use this to study online during the pandemic. • ...
Cybersecurity Crossword Puzzle 2023-11-10
Across
- A champion of cybersecurity
- The process of identifying a users identity
- Changing the IP address of an email so it appears to come from a trusted source
- Malicious software used to damage or infect a system
- A means of attack, a vulnerability
- Technology used to keep hackers out of a system
Down
- Coding to protect information
- Malware that hijacks a system in return for payment
- Malware that corrupts a system, then spreads to other systems
- Practice of posing as someone legitimate to gain access
10 Clues: A champion of cybersecurity • Coding to protect information • A means of attack, a vulnerability • The process of identifying a users identity • Technology used to keep hackers out of a system • Malware that hijacks a system in return for payment • Malicious software used to damage or infect a system • Practice of posing as someone legitimate to gain access • ...
STEM in the News 2023-09-26
Across
- regulates anyone who stores, transmits, or possesses cardholder data
- Rules created for keeping things under control
- The act of staying safe online
- Using or creating ways to use services for malicious purposes
- Regulates use and transfer of Healthcare data
Down
- Moving something from one place to another
- An online exploit of a service or information
- Handles the storing, handling, and transmission of digital data
- Created by the EU to protect their citizens online
- Online or relating to a computer
10 Clues: The act of staying safe online • Online or relating to a computer • Moving something from one place to another • An online exploit of a service or information • Regulates use and transfer of Healthcare data • Rules created for keeping things under control • Created by the EU to protect their citizens online • ...
Theme: Technology 2024-07-24
Across
- An organized collection of data
- A machine capable of carrying out complex actions automatically
- A global network connecting millions of private public academic and government networks
- A process or set of rules to be followed in calculations or other problem-solving operations
- The programs and other operating information used by a computer
Down
- The practice of protecting systems networks and programs from digital attacks
- A mobile phone with advanced features
- A portable personal computer
- An unmanned aerial vehicle
- Abbreviation for Artificial Intelligence
10 Clues: An unmanned aerial vehicle • A portable personal computer • An organized collection of data • A mobile phone with advanced features • Abbreviation for Artificial Intelligence • A machine capable of carrying out complex actions automatically • The programs and other operating information used by a computer • ...
Technological Impacts on Business & Commerce 2023-05-03
Across
- Radio Frequency Identification
- Global Positioning System
- A type of social media used by many businesses
- An immersive, interactive, computer-generated experience
- A type of mobile technology
- A common type of online payment system.
- Bullying someone online
- Technologies that require little to no human involvement to operate
- Computers that mimic human cognitive abilities
Down
- Customizing goods or services to consumers needs and preferences
- Safeguarding computer systems and networks
- The network of real-world things that exchange data form one another
- The network of businesses involved in product distribution
- Natural Language Processing
- The exchange of goods and services electronically
- Providing for the needs of this generation without compromising the needs for future generations
- A type of skill that is essential for ICT.
17 Clues: Bullying someone online • Global Positioning System • Natural Language Processing • A type of mobile technology • Radio Frequency Identification • A common type of online payment system. • Safeguarding computer systems and networks • A type of skill that is essential for ICT. • A type of social media used by many businesses • Computers that mimic human cognitive abilities • ...
AI Lesson 2023-03-06
Across
- A type of machine learning that is modeled after the structure and function of the human brain
- data __________
- e.g. Siri, Alexa
- using machines to perform tasks that are normally done by humans
- e.g. fingerprints, facial recognition software
- the design, construction, operation and use of robots
- AI that learns about knowledge that humans know naturally
Down
- using firewalls and antivirus software to prevent computers from being attacked
- using large datasets to find patterns and insights
- AI that learns and improves from experience by itself
- a household that uses internet-connected devices to control appliances
- feeling/emotion
- a set of instructions that complete a task
13 Clues: data __________ • feeling/emotion • e.g. Siri, Alexa • a set of instructions that complete a task • e.g. fingerprints, facial recognition software • using large datasets to find patterns and insights • AI that learns and improves from experience by itself • the design, construction, operation and use of robots • AI that learns about knowledge that humans know naturally • ...
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- A popular operating system.
- Securing computer systems against unauthorized access.
- Unethical practice of gaining unauthorized access to computer systems.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
Down
- Desired outcomes.
- Malicious software used to gain unauthorised access to computer systems.
- Term for gaining access to a secure network through.
7 Clues: Desired outcomes. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • Malicious software used to gain unauthorised access to computer systems. • ...
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- Unethical practice of gaining unauthorized access to computer systems.
- A popular operating system.
- Desired outcomes.
- Term for gaining access to a secure network through.
Down
- Securing computer systems against unauthorized access.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
- Malicious software used to gain unauthorised access to computer systems.
7 Clues: Desired outcomes. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • Malicious software used to gain unauthorised access to computer systems. • ...
Computer Studies 9/10 Crossword 2024-05-21
Across
- A high-level programming language often used for web development.
- The physical components of a computer system.
- A software application used to access the web.
- An interconnected group of computers.
- The smallest unit of digital information.
- The primary storage device in a computer.
- A sequence of characters.
- A temporary storage that provides fast access to data.
- A set of instructions that a computer follows to perform a task.
- The standard language for creating web pages.
Down
- The main circuit board of a computer.
- A named collection of related data.
- Basic unit of data in computing.
- A global system of interconnected computer networks.
- The practice of protecting computers and data from unauthorized access.
- A device for entering data into a computer.
- To find and correct errors in a program.
- A way of sending information over the internet securely.
- The "brain" of the computer.
- An error in a program.
20 Clues: An error in a program. • A sequence of characters. • The "brain" of the computer. • Basic unit of data in computing. • A named collection of related data. • The main circuit board of a computer. • An interconnected group of computers. • To find and correct errors in a program. • The smallest unit of digital information. • The primary storage device in a computer. • ...
Andy & George’s Wedding Crossword 2024-05-28
Across
- What school did George go to?
- What is our favourite number?
- What was our wedding present from Bob & Wendy?
- How many years have we been together?
- What school did Andy go to?
- Where did George go to uni?
- Where did we first meet?
- Where do we live?
- Where did Andy go to uni?
- On what street was their first flat?
- What is George’s middle name?
Down
- What’s Andy’s favourite flavour of icecream?
- What colour is the diamond in George’s ring?
- Where does George work?
- What industry does Andy work in?
- What did Andy study at uni?
- What name is George saved under in Andy’s phone?
- What’s Andy’s coffee order?
- Where did we get engaged?
- What is Andy’s favourite hobby?
- What’s George’s favourite film?
- What was our first dog called?
- What colour are George’s eyes?
- What is Andy’s middle name?
24 Clues: Where do we live? • Where does George work? • Where did we first meet? • Where did we get engaged? • Where did Andy go to uni? • What did Andy study at uni? • What school did Andy go to? • Where did George go to uni? • What’s Andy’s coffee order? • What is Andy’s middle name? • What school did George go to? • What is our favourite number? • What is George’s middle name? • ...
Cybersecurity Crossword 2022-05-19
Across
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- establishes a secure connection between you and the internet
- the practice of protecting critical systems and sensitive information from digital attacks.
Down
- a set of instructions, data or programs used to operate computers and execute specific tasks
- a standalone malware computer program that replicates itself in order to spread to other computers
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- a computer program that can copy itself and infect a computer without permission or knowledge of the user
7 Clues: establishes a secure connection between you and the internet • the practice of protecting critical systems and sensitive information from digital attacks. • a set of instructions, data or programs used to operate computers and execute specific tasks • a standalone malware computer program that replicates itself in order to spread to other computers • ...
Cybersecurity crossword 2023-03-17
Across
- Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
- Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
- Find a synonym of preempt
Down
- What is the naming convention for ecrime category ?
- What is 84 minutes the average time for ?
- What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
- Which type of accounts are mainly targeted by adversaries ?
7 Clues: Find a synonym of preempt • What is 84 minutes the average time for ? • What is the naming convention for ecrime category ? • Which type of accounts are mainly targeted by adversaries ? • Which tool can reveal hidden relationships and identify attack paths within an AD environment ? • ...
CYBERSECURITY PUZZLE 2023-09-13
7 Clues: Do not visit • Shady..do not click! • Dishonest offer online • Don't ever share this to strangers! • Always change this throughout accounts! • Be careful when doing this on social media! • Publishing someone's private information on the internet
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Crossword 2023-11-10
Across
- What type of hacker exploits systems for personal gain and bad intention
- What is used to hide messages so only authorized people can understand?
- What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
- Using deceptive measures to manipulate someone in disclosing personal information
- Data, information , device anything that is of value
- Acquiring unauthorized access to system or data
- An incident where attackers steal information without authorization?
7 Clues: Acquiring unauthorized access to system or data • Data, information , device anything that is of value • An incident where attackers steal information without authorization? • What is used to hide messages so only authorized people can understand? • What type of hacker exploits systems for personal gain and bad intention • ...
Cyber Safety 2023-03-27
Across
- Sites such as Snapchat, tiktok etc...
- simulation of the real thing
- To stop a computer from reaching something on the internet.
- An attempt to trick people into visiting malicious websites.
Down
- Measures taken to protect a computer
- When a child abuser tries to start a relationship online.
- Repeated behavior that is intended to cause psychological or emotional harm.
- A word or series of letters, numbers and characters.
- Computer program designed to damage files
- Person who uses computer to gain unauthorized access to data.
10 Clues: simulation of the real thing • Measures taken to protect a computer • Sites such as Snapchat, tiktok etc... • Computer program designed to damage files • A word or series of letters, numbers and characters. • When a child abuser tries to start a relationship online. • To stop a computer from reaching something on the internet. • ...
HACKING TERMS 2023-11-13
Across
- Software designed to harm or exploit computer systems
- A deliberate attempt to exploit computer systems or networks.
- A reward offered for discovering and reporting software bugs
- A secret word or phrase used for authentication.
- A series of instructions for a computer to execute.
- Protective measures against digital threats
Down
- Ethical hackers working to improve security
- The right to keep personal information and activities confidential.
- A weakness or flaw in a system that can be exploited.
- The process of converting information into a code for security.
10 Clues: Ethical hackers working to improve security • Protective measures against digital threats • A secret word or phrase used for authentication. • A series of instructions for a computer to execute. • Software designed to harm or exploit computer systems • A weakness or flaw in a system that can be exploited. • ...
Tech Terms 2023-12-01
Across
- - Software for accessing and navigating the internet. (7)
- - Step-by-step procedure for solving a problem. (8)
- Reality - Computer-generated environment that simulates reality. (13)
- - Secret code to access a protected system. (8)
- - Transfer files from the internet to a computer. (8)
Down
- - Measures to protect computer systems from theft or damage. (12)
- - Security system that prevents unauthorized access. (8)
- - Process of converting data into a code to secure it. (10)
- - Portable device with touchscreen features. (10)
- - Writing instructions for a computer program. (6)
10 Clues: - Secret code to access a protected system. (8) • - Portable device with touchscreen features. (10) • - Writing instructions for a computer program. (6) • - Step-by-step procedure for solving a problem. (8) • - Transfer files from the internet to a computer. (8) • - Security system that prevents unauthorized access. (8) • ...
TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET 2024-01-11
Across
- Lapisan OSI ke 3
- topologi jaringan berbentuk bintang
- Meningkatkan komunikasi antar pengguna, baik secara langsung maupun tidak langsung adalah manfaat dari
- Data yang tersimpan pada device karyawan dapat disimpan lebih aman secara terpusat dengan menggunakan
- salah satu prinsip keamanan jaringan
Down
- mekanisme pertukaran data
- kegiatan tata kelola data
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Salah satu macam jenis jaringan komputer
10 Clues: Lapisan OSI ke 3 • mekanisme pertukaran data • kegiatan tata kelola data • topologi jaringan berbentuk bintang • salah satu prinsip keamanan jaringan • Salah satu macam jenis jaringan komputer • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet) • ...
KeyW Crossword 2017-01-19
Across
- What is the name of our mascot
- Parrot Ball location
- KeyW's colors
- What month was KeyW founded
- What color is our KeyW van
- KeyW's best location
- How many buildings does the Severn location have
- Protection of networks, computers, programs, and data from attack
- Applying statistical analysis to data which has a geographical or spatial aspect
- Time sheet
- What type of bird is our mascot
- Which food truck offers the best cheese steaks
Down
- What is the surname of KeyW's founder
- The branch of science and technology concerned with design, building, and use of engines, machines, and structures
- What is the name of our newsletter
- Radio Detection and Ranging
- How many miles connect Key West to Florida main land
- KeyW non-profit organization abbreviated
- KeyW CEO
- When at work, what must you always carry
20 Clues: KeyW CEO • Time sheet • KeyW's colors • Parrot Ball location • KeyW's best location • What color is our KeyW van • What month was KeyW founded • Radio Detection and Ranging • What is the name of our mascot • What type of bird is our mascot • What is the name of our newsletter • What is the surname of KeyW's founder • KeyW non-profit organization abbreviated • ...
Wedding 2024-06-08
Across
- What Stacey used to refer Michael to when they first started dating
- Where did Michael and Stacey meet
- Michael’s birthday month
- Michael and Stacey’s anniversary month (hint: Maid of Honour’s birth month)
- The number of years the couple is together
- Honeymoon destination
- Their favourite season
- How many years did Michael live overseas for (hint: bribe Father of Groom)
- What the groom has for breakfast everyday
- Michael’s job industry
- Number of their siblings all together
- Stacey’s favourite food (hint: ask father of bride)
- Michael’s middle name
- Who’s the better cook
Down
- Mr & Mrs _____
- City where Michael was born
- Michael’s favourite drink
- Where did Michael propose
- Brand of Michael’s car
- Flavour of the wedding cake
- Stacey’s birthday month
- Favourite AFL team (hint: ask Best Man)
- Stacey’s best friend
- How long has Stacey been in Australia for
- The age gap between the bride and the groom
25 Clues: Mr & Mrs _____ • Stacey’s best friend • Honeymoon destination • Michael’s middle name • Who’s the better cook • Brand of Michael’s car • Their favourite season • Michael’s job industry • Stacey’s birthday month • Michael’s birthday month • Michael’s favourite drink • Where did Michael propose • City where Michael was born • Flavour of the wedding cake • Where did Michael and Stacey meet • ...
Crosswords 2024-07-16
Across
- plan for successful digital transformation
- immediate data analysis
- large sets of data analyzed for insights
- combining data from different sources
- management of the flow of goods and services
- successful digital use by employees
- system that integrates various business processes
- virtual model of a physical object or system
- protection in digital business environments
- network of interconnected devices
- system for managing customer relationships
- accuracy and reliability of data
Down
- digital change impacting business processes
- redesigning business processes for improvement
- use of technology to perform tasks
- analysis of data for business insights
- based ERP solutions
- process of adopting ERP systems
- technology enhancing supply chain transparency
- integration of artificial intelligence in business
- isolated data storage within an organization
- improved by ERP systems
- analytics for customer engagement
- considerations in using AI and big data
- user experience in digital product design
25 Clues: based ERP solutions • immediate data analysis • improved by ERP systems • process of adopting ERP systems • accuracy and reliability of data • analytics for customer engagement • network of interconnected devices • use of technology to perform tasks • successful digital use by employees • combining data from different sources • analysis of data for business insights • ...
Introduction to Cyber Security 2023-09-08
Across
- protects the wireless internet
- signature sent with email to acknowledge that it was verified
- security is broken and data was stolen
- verifying a user's identity
- a verification for servers to see what can send an email
- foreign foreign software designed to harm a computer
- protocol that protects internet communication
- securing data from outside threats
- programs used when running a PC
Down
- latest version of security for wireless internet
- allows your website to be published online
- using radio waves to connect between nodes in a network
- frauding as a trusted source to steal information
- protection from cyber threats
- making a copy of a data/file
- disguising themself to steal information
- malware to deny a user of their data
- using means necessary to access someone else's device
- communication through the use of electronic devices over networks
- a protection against fake email addresses that are disguised to be real ones
20 Clues: verifying a user's identity • making a copy of a data/file • protection from cyber threats • protects the wireless internet • programs used when running a PC • securing data from outside threats • malware to deny a user of their data • security is broken and data was stolen • disguising themself to steal information • allows your website to be published online • ...
Maura & Spencer 2023-05-19
Across
- Spencer's favorite basketball player
- Where they moved after college
- The name of their cat
- Favorite "Fast Food"
- Brides Favorite Alcoholic Drink
- Spencer's Favorite Hobby
- Where did Maura & Spencer travel to this year
- Who gave out their phone number first?
- Where do they live
- Maura and Spencers First Born
- Maura's favorite Disney Movie
- How many years will they be together in September?
- Maura's middle name
- Maura's Job
Down
- Maura's Favorite Color
- What social media platform did Spencer use to slide in Maura's DM's
- Where did Maura go after DC
- Maura's Favorite Hobby
- Where Maura and Spencer met
- Where did Spencer propose?
- Spencer's Favorite Color
- What month did they get engaged
- The last addition to Maura & Spencers family
- Grooms Favorite Alcoholic Drink
- Spencers Job
- What was Maura's sport growing up
- Spencer's middle name
27 Clues: Maura's Job • Spencers Job • Where do they live • Maura's middle name • Favorite "Fast Food" • The name of their cat • Spencer's middle name • Maura's Favorite Color • Maura's Favorite Hobby • Spencer's Favorite Color • Spencer's Favorite Hobby • Where did Spencer propose? • Where did Maura go after DC • Where Maura and Spencer met • Maura and Spencers First Born • ...
FITAVocab.lo 2013-05-15
Across
- code of positive conduct one uses such as plagiarism, copyright, etc.
- rules and behaviors designed to keep individuals safe online
- a search engine that goes through all the search engines.
- speed of machine
- short term memory for your computer
- a
Down
- a website that protects young people from cyber bullies
- protecting information on computer systems/networks
- a program that allows you to search information on the internet.
- a combining form meaning "computer," "computer network," or "virtual reality," used in the formation of compound words.
10 Clues: a • speed of machine • short term memory for your computer • protecting information on computer systems/networks • a website that protects young people from cyber bullies • a search engine that goes through all the search engines. • rules and behaviors designed to keep individuals safe online • a program that allows you to search information on the internet. • ...
Tugas - Jaringan komputer dan internet 2024-01-11
Across
- aspek teknis pada jaringan komputer
- nama lain jaringan komputer
- Jenis jaringan komputer
- aspek utama keamanan jaringan
- yang bertugas untuk mengawasi, menganalisis dan mengecek segala hal mulai dari komputer, perangkat penyimpanan data, jaringan sampai database adalah
- topologi jaringan yang lebih sederhana yaitu
Down
- Dengan perangkat yang terkoneksi, maka pengguna dapat saling berkomunikasi untuk bertukar data dan informasi merupakan salah satu fungsi
- server komponen jaringan komputer
- lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu
- Network interface card
10 Clues: Network interface card • Jenis jaringan komputer • nama lain jaringan komputer • aspek utama keamanan jaringan • server komponen jaringan komputer • aspek teknis pada jaringan komputer • topologi jaringan yang lebih sederhana yaitu • lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu • ...
Cybersecurity101 2022-11-16
Across
- malware that is secretly spying on you and stealing your data
- act of discovering open wifi networks by driving around
- malware that encrypts your files and system demanding payment
- practice of socially engineering high value individuals of an organization
- agency responsible for strengthening cybersecurity posture in the US
- brute force technique to discover files, domains, etc.
Down
- method of a threat actor uses to return into your network/device
- phishing over the phone
- common public-key encryption algorithm
- most common threat vector for social engineering
- phishing over text
- MITRE framework for tactics techniques and procedures
12 Clues: phishing over text • phishing over the phone • common public-key encryption algorithm • most common threat vector for social engineering • MITRE framework for tactics techniques and procedures • brute force technique to discover files, domains, etc. • act of discovering open wifi networks by driving around • malware that is secretly spying on you and stealing your data • ...
SCAI Feasting with Faculty 2023-11-02
Across
- Location where data is stored in a computer's memory.
- The study of breaking codes and ciphers.
- Software designed to harm or infiltrate a computer.
- Low-level human-readable code for computers.
- Investigating digital evidence for legal purposes.
- Small storage areas inside the computer's CPU.
- Measures to keep your computer and data safe online.
Down
- Making data unreadable to unauthorized users.
- A secure way to verify the sender of a message.
- Moving information from one place to another.
- A digital barrier that protects your network from threats.
- A command that tells the computer what to do.
12 Clues: The study of breaking codes and ciphers. • Low-level human-readable code for computers. • Making data unreadable to unauthorized users. • Moving information from one place to another. • A command that tells the computer what to do. • Small storage areas inside the computer's CPU. • A secure way to verify the sender of a message. • ...
End Users and Cybersecurity 2023-10-13
Across
- 85% of people posting puppy photos are trying to _____ you
- _____ are connected to the internet
- ensure that the correct information is relayed to the right destination across the network
- _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
- network of connections between people, things, data, and processes
- shortened URLs
Down
- variant of malware
- person who uses IT products or services
- occurs when an end user receives an illegitimate message or email
- providing education to end users can mitigate cybersecurity _____
- almost every employee has access to this
- help protect your internet connection and privacy online
12 Clues: shortened URLs • variant of malware • _____ are connected to the internet • person who uses IT products or services • almost every employee has access to this • help protect your internet connection and privacy online • 85% of people posting puppy photos are trying to _____ you • occurs when an end user receives an illegitimate message or email • ...
HP GPO Crossword puzzle 2022-06-22
Across
- Helps move stock for HP
- Document that explains input output and process
- Safeguarding the digital world
- Converts screen to paper
- Introducing new methods, ideas, or products
Down
- Making sure your future generations are comfortable
- The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible
7 Clues: Helps move stock for HP • Converts screen to paper • Safeguarding the digital world • Introducing new methods, ideas, or products • Document that explains input output and process • Making sure your future generations are comfortable • The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible
Compliance Week - Day 1 Puzzle 2022-10-09
Across
- Intimidation of an individual after reporting an allegation of misconduct.
- When PHI is exposed, a _______ of the patient's privacy has been committed.
- Never share your ________ with anyone.
- The ____ is an anonymous way to report a compliance concern. (707.825.1027)
- Health insurance portability & accountability act.
Down
- Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others.
- Computer security
- It is our job to _______ our clients health record.
- Verify this for every client every time (3 words)
- An official inspection of an individual's or organization's accounts.
- Protected health information.
11 Clues: Computer security • Protected health information. • Never share your ________ with anyone. • Verify this for every client every time (3 words) • Health insurance portability & accountability act. • It is our job to _______ our clients health record. • An official inspection of an individual's or organization's accounts. • ...
NCSAM 2024-08-27
Cyber-Attacks 2022-01-13
Across
- a spoof or look-alike website
- the most common way hackers gain entry to a company's computer network
- personally identifiable information
- everyone's responsibility to protect company information and assets
Down
- an add on to enhance function of browser
- software that locks up a computer system and then demands a payment to unlock it
- software designed to harm computer
- fraudulent emails designed to obtain PII
8 Clues: a spoof or look-alike website • software designed to harm computer • personally identifiable information • an add on to enhance function of browser • fraudulent emails designed to obtain PII • everyone's responsibility to protect company information and assets • the most common way hackers gain entry to a company's computer network • ...
Cybersecurity Crosswords 2023-11-14
Across
- Do not open emails or email attachments if you do not know the__.
- If you receive offensive material or threatening emails, report to the------team.
- Never send a ______ of yourself to strangers on the Internet.
- A program that replicates itself to other devices.
Down
- When someone send an email with a link to a bogus website it is called.
- Software used to protect form virus.
- Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.
7 Clues: Software used to protect form virus. • A program that replicates itself to other devices. • Never send a ______ of yourself to strangers on the Internet. • Do not open emails or email attachments if you do not know the__. • When someone send an email with a link to a bogus website it is called. • ...
Cybersecurity Techniques 2024-11-06
Across
- A protocol designed to provide privacy and security over the internet by encapsulating traffic
- The latest security protocol for Wi-Fi, enhancing protections against attacks.
- An advanced Linux technology used for monitoring and packet observability in real-time.
- A term related to busting common misconceptions in the open and secure cyberspace.
Down
- Data collected from devices or systems for monitoring and analysis, used in intelligent security
- Malicious software designed to infiltrate or damage computer systems.
- The practice of collecting, analyzing, and preserving digital evidence.
7 Clues: Malicious software designed to infiltrate or damage computer systems. • The practice of collecting, analyzing, and preserving digital evidence. • The latest security protocol for Wi-Fi, enhancing protections against attacks. • A term related to busting common misconceptions in the open and secure cyberspace. • ...
SecuritySquares-Advanced 2023-03-03
Across
- 01101100 01101111 01110111 01100101 01110011 00001010
- A piece of code put in to fix an error
- Unique string of numbers that identifies a device connected to a network
- Intent to do harm
- The second in CIA triad
- When an attacker tricks users into clicking on hidden elements
- A characteristic or distinctive pattern that can be searched for
- Rivest-Shamir-Adleman
- Pay or else
- A type of media manipulation
Down
- A White hat hacker
- Converting enciphered text to plain text
- Unique identifier assigned to a NIC
- The use of mathematical techniques to provide security services
- A scam without a rod and reel but with voice mail
- The process of uncovering trends and patterns in large amounts of data
- Information Technology Infrastructure Library
- The process for overseeing the cybersecurity teams
18 Clues: Pay or else • Intent to do harm • A White hat hacker • Rivest-Shamir-Adleman • The second in CIA triad • A type of media manipulation • Unique identifier assigned to a NIC • A piece of code put in to fix an error • Converting enciphered text to plain text • Information Technology Infrastructure Library • A scam without a rod and reel but with voice mail • ...
Information Security 2022-09-29
Across
- A type of malware that records every single press of the keyboard that you make
- A key only used by one individual to decrypt
- A key that can be used by anyone to encrypt messages
- Gaining unauthorised access to or control of a computer system
- A trap for cybersecurity criminals
- Bullying that takes place online
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
- Special viruses that move from computer to computer without human action
- Impersonation of email address or device to gain unauthorized access to information or systems
- Copy of data
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information
- A weaknesses in computers
- scrambled data
- Ethical hacking in order to find any cybersecurity weaknesses
- Raw data that is put into context and has meaning
Down
- core of an operating system
- General term for programs that gains access to your system for unethical reasons
- Email that contains a message with a suspicious link designed to steal personal information
- annoying malware that spams you with ads
- Software that protects computers from virus related harm
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
- Malicious code typically disguised as a legitimate program
- To take advantage of a system's weakness
- I am not a robot
- Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
- Secretly watches computer activity
- Collection of malware infested computers that form a network to attack
- Electronic messages sent through the internet
- Readable data
- Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- An internal security team that defends against both real attackers and Red Teams
32 Clues: Copy of data • Readable data • scrambled data • I am not a robot • A weaknesses in computers • core of an operating system • Bullying that takes place online • A trap for cybersecurity criminals • Secretly watches computer activity • annoying malware that spams you with ads • To take advantage of a system's weakness • A key only used by one individual to decrypt • ...
30 2023-06-06
Across
- - Online storage and computing services
- - Uniform Resource Locator, the address of a web page
- - Measures to protect computer systems and data from digital threats
- - Buying and selling goods or services online
- - Component that stores electrical energy
- - Conductive material for transmitting electricity
- - Device that changes the voltage of an electrical current
Down
- - Device that stores and provides electrical energy
- - Electrical socket for connecting devices to the power supply
- - Safety device that breaks the circuit when current exceeds a certain level
- - Complete path for electrical current
- - Device used to control the flow of electrical current
- - Component that restricts the flow of electricity
13 Clues: - Complete path for electrical current • - Online storage and computing services • - Component that stores electrical energy • - Buying and selling goods or services online • - Component that restricts the flow of electricity • - Conductive material for transmitting electricity • - Device that stores and provides electrical energy • ...
Isa usando un crusigrama 2020-08-21
Across
- te protege de el coronavirus y lo usas al tener contacto con la gente
- para enmarcar una foto
- hace que estes prevenido de lo que le pueden hacer a la computadora
- infectan archivos y destruyen datos de tu computadora
- donde guardas mucho informacion, fotos y muchas cosas tuyas
- para no dañarte los ojos al tomar sol
Down
- una enfermedad que genero una pandemia
- es donde esta tu rutina y te la recuerda al mirarlo
- para emprolijarte el pelo
- te despierta o te recuerda algo
10 Clues: para enmarcar una foto • para emprolijarte el pelo • te despierta o te recuerda algo • para no dañarte los ojos al tomar sol • una enfermedad que genero una pandemia • es donde esta tu rutina y te la recuerda al mirarlo • infectan archivos y destruyen datos de tu computadora • donde guardas mucho informacion, fotos y muchas cosas tuyas • ...
Team - AllSafe 2022-03-27
Across
- Data that can identify a specific individual
- What's common between Aetnaand cyber security? (Clue: Important to save money)
- Compliance standard to safeguard health information
- An off-site attack surface (Clud: Most SaaS platforms use this service)
- a person who exposes information that is deemed illegal/private (Clue: cybersecurity researcher who alerted CVS of the breach)
Down
- A social engineering attack
- Risk assessment of vendors, suppliers, partners, contractors, or service providers
- Head of information security program
- Method to reduce human error
- Electronically-stored health information
10 Clues: A social engineering attack • Method to reduce human error • Head of information security program • Electronically-stored health information • Data that can identify a specific individual • Compliance standard to safeguard health information • An off-site attack surface (Clud: Most SaaS platforms use this service) • ...
WeWork 109NBR - Know Your Neighbours! 2024-08-30
Across
- Singaporean home cleaning service provider
- European cybersecurity company
- Their software helps you to manage (real estate) properties
- Barbie and Hot Wheels toy company
Down
- Has an exhibition at the Funan Underground Pedestrian Link @ B2, owner of hit series ‘The King’s Avatar’
- Sea creature or digital marketing platform?
- Yuu rewards club creator (hint: check Apple/Google Play store)
- Temasek founded AI-powered computer vision application
- Global banking company, good for currency exchange
- Payments platform for Boost, McDonalds and Dunkin Donuts
10 Clues: European cybersecurity company • Barbie and Hot Wheels toy company • Singaporean home cleaning service provider • Sea creature or digital marketing platform? • Global banking company, good for currency exchange • Temasek founded AI-powered computer vision application • Payments platform for Boost, McDonalds and Dunkin Donuts • ...
Info - security 2017-11-27
Across
- be attentive
- lure someone
- name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
- protect networks, computers, programs and data from attack
- should not be shared
- monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- designed to detect and destroy computer viruses
- exploit weaknesses to gain access
- malicious software designed to block access to a computer system until a sum of money is paid.
- protects personal data published via the Internet
10 Clues: be attentive • lure someone • should not be shared • exploit weaknesses to gain access • designed to detect and destroy computer viruses • protects personal data published via the Internet • protect networks, computers, programs and data from attack • malicious software designed to block access to a computer system until a sum of money is paid. • ...
Profesi dan peluang usaha di bidang tkjt 2023-11-17
Across
- seseorang yang ahli dalam membuat animasi
- seseorang yang mengembangkan sebuah aplikasi atau sistem pada komputer
- DBA termasuk singkatan dari
- bentuk perlindungan terhadap sistem yang terhubung ke internet
- melakukan instalasi dan konfigurasi adalah tugas?
Down
- seseorang yang ahli dalam bidang perfilm an atau video
- menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?
- seseorang yang ahli dalam mengedit video lalu menguploadnya ke sosial media disebut
- orang yang membuat poster,logo, disebut?
- peluang usaha yang membantu orang lain dan orang lain melakukan pembayaran terlebih dahulu
10 Clues: DBA termasuk singkatan dari • orang yang membuat poster,logo, disebut? • seseorang yang ahli dalam membuat animasi • melakukan instalasi dan konfigurasi adalah tugas? • seseorang yang ahli dalam bidang perfilm an atau video • bentuk perlindungan terhadap sistem yang terhubung ke internet • menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang? • ...
Crossword #7 2023-11-07
Across
- A Brazilian type of music that will be performed by the Connection Trio.
- Production of this play has been delayed due to a COVID outbreak.
- The conference in which Marshall athletics compete
- A magic dragon.
Down
- Men's soccer faces this team this week.
- Education of this will be a part of the 4th Avenue Innovation Center
- A low battery will need a ________
- No.0 on the men's basketball team.
- Declared war on Hamas leading to unrest on campuses across the nation
- Science, Technology,Engineering and Mathematics.
10 Clues: A magic dragon. • A low battery will need a ________ • No.0 on the men's basketball team. • Men's soccer faces this team this week. • Science, Technology,Engineering and Mathematics. • The conference in which Marshall athletics compete • Production of this play has been delayed due to a COVID outbreak. • ...
Cybersecurity Awareness Crossword (2018) 2018-07-29
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Information Security is a _______ issue.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
- _______ before you click or forward.
Down
- _______ your data regularly and periodically check that you are able to restore them.
- Use a _______ password different from the passwords you use to access other sites.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Cybersecurity is _______'s responsibility.
- You should always keep your software and anti-virus definitions up-to-_______.
- Do not provide your _______ email account to social networks.
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Always use _______ factor authentication where available.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Cybersecurity Awareness Month Crossword 2023-09-18
Across
- A security process that requires users to provide two different authentication factors before gaining access.
- Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
- Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
- An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
- Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
- A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
- An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
- An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
- The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
- The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
- The process of examining network traffic to identify anomalies and potential security threats.
- Software designed to detect, prevent, and remove malicious software from a computer or network.
- A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
- A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.
15 Clues: The process of examining network traffic to identify anomalies and potential security threats. • Software designed to detect, prevent, and remove malicious software from a computer or network. • The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality. • ...
Knowledge Adventure Crossword Puzzle 2023-06-18
Across
- Measures to protect digital information.
- A reference to a source of information
- Online location with webpages.
- Connected to or available on the internet.
Down
- A structured collection of data accessible in various formats
- A significant word or term used in searching for information)
- A software program used to search for information on the interne
- Content that includes various forms of media.
- Legal protection for original creative works to prevent unauthorized use or copying.
9 Clues: Online location with webpages. • A reference to a source of information • Measures to protect digital information. • Connected to or available on the internet. • Content that includes various forms of media. • A structured collection of data accessible in various formats • A significant word or term used in searching for information) • ...
Cybersecurity Awareness Month Crossword Puzzle 2022-09-15
7 Clues: A message sent on Twitter. • A network for online picture sharing. • A platform founded by Mark Zuckerburg. • The fastest growing social media platform. • An act that can be made by a Facebook user. • A self portrait taken by using the front camera. • Technology Field concerned with social media privacy.
'Digital' Crossword 2019-07-07
Across
- Highly digitized and connected production facility that relies on smart manufacturing
- Interconnected Digital Technologies for better customer experience
- ASTM F2792
- Systematic computational analysis of data or statistics
- Network of Internet connected objects able to collect and exchange data
- Digital version of a physical asset and/or process
- Integration of digital information with live video or the user's environment in real time
- Network of remote servers hosted on the Internet to store, manage, and process data
- Small autonomous services that work together
Down
- Simulated Intelligence in machines
- Massive Volume of Data inundated daily
- Robotic Process Automation
- Processing Quantum Bits of Data
- Techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- Digital records of transaction
15 Clues: ASTM F2792 • Robotic Process Automation • Digital records of transaction • Processing Quantum Bits of Data • Simulated Intelligence in machines • Massive Volume of Data inundated daily • Small autonomous services that work together • Digital version of a physical asset and/or process • Systematic computational analysis of data or statistics • ...
Planet of Nico 2021-12-09
Across
- it's our secret word
- your favorite youtuber
- they keep you happy as long as you feed them with water
- our happiest place in the world
- the most beautiful instrument
- juan's best friend that eats a lot of croquettes
- basically what you do everyday
Down
- you love making them whenever you have the most beautiful view
- it's the most delicious kind of sandwich in the world
- you go there to clean your mind for a while
- you can sometimes eat it with some bubble tea
- it's the most handsome and smart man in the world
- you love doing this and it makes you learn a lot
- they're fluffy and they need belly pets
14 Clues: it's our secret word • your favorite youtuber • the most beautiful instrument • basically what you do everyday • our happiest place in the world • they're fluffy and they need belly pets • you go there to clean your mind for a while • you can sometimes eat it with some bubble tea • juan's best friend that eats a lot of croquettes • ...
SBU TBP Crossword 10/5 2022-10-04
Across
- Species with the most genetic similarity to humans.
- Series of educational lectures hosted by Tau Beta Pi.
- Protection against unauthorized electronic data access.
- Process of converting data into a code for protection.
Down
- Mathematical function without "in-between" values.
- Longest bone in the human body.
- A structure consisting of beams connected in triangular shapes.
- ____'s constant gives the relationship between the energy and frequency of a photon.
- Third most common element in the universe.
9 Clues: Longest bone in the human body. • Third most common element in the universe. • Mathematical function without "in-between" values. • Species with the most genetic similarity to humans. • Series of educational lectures hosted by Tau Beta Pi. • Process of converting data into a code for protection. • Protection against unauthorized electronic data access. • ...
TBP FL-D 10/23 2023-10-23
Across
- Type of current produced by solar panels.
- The c in E=mc^2.
- Amount of heat required to raise temperature by 1 degree Celsius.
Down
- Type of engineer responsible for harnessing electricity.
- This cat may or may not be alive.
- Building with the most popular bathroom on UCF campus.
- Plastic polymer that can be recycled and reformed into another shape
- The cybersecurity team that works to defend an organization.
- Support structure that uses triangles.
9 Clues: The c in E=mc^2. • This cat may or may not be alive. • Support structure that uses triangles. • Type of current produced by solar panels. • Building with the most popular bathroom on UCF campus. • Type of engineer responsible for harnessing electricity. • The cybersecurity team that works to defend an organization. • ...
Thinklogic 2021-09-13
Cybersecurity Fundamentals Chapter 4 2022-10-25
Across
- policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
- fundamental component of ipsec virtual private networks (vpn).
- actual barriers deployed to prevent direct contact with systems.
- way to store and transmit data so only the intended recipient can read or process it.
- to encrypt and decrypt messages.
- has a fixed block size of 128, 192 or 256 bits.
- use one key to encrypt data and a different key to decrypt data.
- implementing cryptography into a web browser.
- encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
- hardware and software solutions used to manage access resources and systems.
- a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
- algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- science of making and breaking secret codes.
- uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- a protocol that provides a secure remote access connection to network devices.
15 Clues: to encrypt and decrypt messages. • science of making and breaking secret codes. • implementing cryptography into a web browser. • has a fixed block size of 128, 192 or 256 bits. • fundamental component of ipsec virtual private networks (vpn). • actual barriers deployed to prevent direct contact with systems. • ...
Cybersecurity Awareness Month - 2024 2024-10-09
Across
- - When somebody sends an e-mail with a link to a bogus website it is called
- - Destroying the cause of security incident with powerful process or technique is which stage of incident response
- - Protecting the data against unauthorized access or disclosure is
- - Its a type of malware that disguises itself as legitimate code.
- Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
- - This can slow down your computer AND watch everywhere you go on the internet
- - Data that is used to Identify specific individual
- - Impact of Threat exploiting a vulnerability is known as
Down
- - The control that you have over your personal information and how that information is used
- - A globally accepted and recognized standard for cyber security is
- - Three principles of ISMS are Confidentiality, ____ and Availability
- - Critical security component that determines what resources a user can access and what actions they can perform
- - An event that impacts the organization and requires a response and recovery.
- -PII Bank information falls under which category of data classification.
- - Unique sets of characters used to authenticate user identity and protect personal data or system access.
15 Clues: - Data that is used to Identify specific individual • - Impact of Threat exploiting a vulnerability is known as • - Its a type of malware that disguises itself as legitimate code. • - Protecting the data against unauthorized access or disclosure is • - A globally accepted and recognized standard for cyber security is • ...
Easy Cyber Security 2021-11-28
Across
- the topic is
- not fishing but
- I should open every attachment I get
- Bad software that infects your computer is called ______
- the people who attack us are called ______
Down
- A ____ breech is when a criminal steals confidential information
- you can't use your computer until you pay because you have _______
- I should always use a ______ password
- you get an email from someone you don't know asking you to open an attachment it is a
9 Clues: the topic is • not fishing but • I should open every attachment I get • I should always use a ______ password • the people who attack us are called ______ • Bad software that infects your computer is called ______ • A ____ breech is when a criminal steals confidential information • you can't use your computer until you pay because you have _______ • ...
Rush Health Cybersecurity 2020-02-24
Across
- Malicious software that is implanted into a computer to disable, infect or allow to be remotely controlled by a hacker.
- Type of attack to steal username and password
- Type of unwanted emails
- a standalone malware computer program that replicates itself in order to spread to other computers
- Someone that does harm to a computer
- Scrambling information so that only those with the keys can read it
Down
- Type of malware that requires a ransom to remove the malware.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- Something that can harm your computer
10 Clues: Type of unwanted emails • Someone that does harm to a computer • Something that can harm your computer • Type of attack to steal username and password • Type of malware that requires a ransom to remove the malware. • Scrambling information so that only those with the keys can read it • ...