cybersecurity Crossword Puzzles

Intro Cybersecurity Puzzle 2 2021-09-15

Intro Cybersecurity Puzzle 2 crossword puzzle
Across
  1. Acronym for a _____ model typically used for troubleshooting communication with TCP protocol
  2. Another form of single sign on, initially supported by Twitter and Google
  3. Biometrics is an example of something you _____
  4. single sign-on authentication, think three headed dog
  5. A key fob is an example of something you _____
  6. A Command Prompt command used to test the ability of the source computer to reach a specified destination computer
  7. Robot Network
  8. Acronym for Industrial Control Systems Supervisory Software
  9. Acronym for the expectations between the service provider and the customer and describes the products or services to be delivered
Down
  1. The infected computer in a network of computers with infected malware
  2. Your location to sign in is an example of somewhere you _____
  3. the process of converting a given key into another value. If they are the same this is known as collision.
  4. An emerging technology used in cryptocurrency
  5. Acronym for "Smart Devices" over the internet
  6. Your password is an example of something you _____
  7. Acronym for Anything as a service
  8. The acronym for the masterbot centralization

17 Clues: Robot NetworkAcronym for Anything as a serviceThe acronym for the masterbot centralizationAn emerging technology used in cryptocurrencyAcronym for "Smart Devices" over the internetA key fob is an example of something you _____Biometrics is an example of something you _____Your password is an example of something you _____...

Cybersecurity Fundamentals Chapter 5 2022-10-27

Cybersecurity Fundamentals Chapter 5 crossword puzzle
Across
  1. an efficient way to store, retrieve, and analyze data.
  2. table relationship must remain consistent.
  3. a set of rules defined by the user which does not belong to one of the other categories.
  4. use to make hashing more secure.
  5. strengthens hashing algorithm by using additional secret key as input to the hash function.
  6. a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
  7. checks that data falls within the parameters defined by the database designer.
  8. all data stored in a column must follow the same format.
  9. hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
  1. refers to the accuracy, consistency, and reliability of data stored in a
  2. developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
  3. the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
  4. provide the same functionality as handwritten signature for electronics documents.
  5. all rows must have a unique identifier called primary key.
  6. equivalent to an electronic passport.
  7. standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.

16 Clues: use to make hashing more secure.equivalent to an electronic passport.table relationship must remain consistent.an efficient way to store, retrieve, and analyze data.all data stored in a column must follow the same format.all rows must have a unique identifier called primary key....

The Voice: October 7th, 2024 2024-10-07

The Voice: October 7th, 2024 crossword puzzle
Across
  1. Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
  2. What _____ look like in Canada today.
  3. Limited spots left for this event!
  4. October is what awareness month?
Down
  1. One of the highlighted members this week.
  2. Since 2012, the Chamber has advocated for improved what?
  3. EcoBrooks _____ Award.

7 Clues: EcoBrooks _____ Award.October is what awareness month?Limited spots left for this event!What _____ look like in Canada today.One of the highlighted members this week.Since 2012, the Chamber has advocated for improved what?Going to represent Canada internationally Finalist for 2024 Constantinus International Award.

Cyber Security Puzzle 2024-10-21

Cyber Security Puzzle crossword puzzle
Across
  1. term used for various pop-up advertisements that show up on your computer or mobile device.
  2. a malware designed to deny a user or organization access to files on their computer
  3. what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
  1. specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
  2. the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
  3. refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  4. what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
  5. A worm in cybersecurity is a type of malicious software that spreads across computer networks
  6. A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user

9 Clues: a malware designed to deny a user or organization access to files on their computerterm used for various pop-up advertisements that show up on your computer or mobile device.A worm in cybersecurity is a type of malicious software that spreads across computer networks...

Zine Crossword 2022-04-16

Zine Crossword crossword puzzle
Across
  1. Considered to be the first hacker
  2. The website on which anonymous would plan their attacks
  3. The film that produced the famous hacking mask
Down
  1. The protection of information on the internet
  2. One of the colors of the three types of hackers
  3. The headwear associated with hacking
  4. A form of harm done on the internet
  5. Famous hacking group

8 Clues: Famous hacking groupConsidered to be the first hackerA form of harm done on the internetThe headwear associated with hackingThe protection of information on the internetThe film that produced the famous hacking maskOne of the colors of the three types of hackersThe website on which anonymous would plan their attacks

AI in education 2024-06-05

AI in education crossword puzzle
Across
  1. Protection of personal information.
  2. Lack of neutrality, prejudice.
  3. Guidelines or principles governing proper conduct.
  4. Actions taken to use something wrongly or inappropriately.
  5. The quality of being honest and having strong moral principles.
  6. The state of being clear and open.
Down
  1. The protection of data from unauthorized access or corruption.
  2. The state of being answerable or responsible.
  3. Practices designed to ensure secure data and systems.
  4. The practice of keeping information secret to prevent unauthorized access.

10 Clues: Lack of neutrality, prejudice.The state of being clear and open.Protection of personal information.The state of being answerable or responsible.Guidelines or principles governing proper conduct.Practices designed to ensure secure data and systems.Actions taken to use something wrongly or inappropriately....

Comms & Media Crossword - October Edition 2022-10-04

Comms & Media Crossword - October Edition crossword puzzle
Across
  1. This company was recently in news for launching 5G Lab-as-a-service ​
  2. Leading telecom equipment provider, & our client
  3. Virtual representation of a real-world physical system​
  4. One of the most important digital challenges today​
  5. Continuous Expenditure that companies incur
Down
  1. Satoshi Nakamoto was the pioneer behind this technology​
  2. Software based technology used in Telecom
  3. This company launched India’s 1st multiplex in Metaverse
  4. Telecom players fight for this
  5. boAt had a K-pop concert on this platform​

10 Clues: Telecom players fight for thisSoftware based technology used in TelecomboAt had a K-pop concert on this platform​Continuous Expenditure that companies incurLeading telecom equipment provider, & our clientOne of the most important digital challenges today​Virtual representation of a real-world physical system​...

Ransomware 2021-09-23

Ransomware crossword puzzle
Across
  1. Convert information into a code
  2. Protects against threat online
  3. Software created for malicious purposes
  4. New Ransomware Variant
Down
  1. A technique used by hackers to obtain sensitive information
  2. Protecting networks, devices and data from unauthorized access

6 Clues: New Ransomware VariantProtects against threat onlineConvert information into a codeSoftware created for malicious purposesA technique used by hackers to obtain sensitive informationProtecting networks, devices and data from unauthorized access

Knowledge Exchange Christmas Quiz 2023-12-05

Knowledge Exchange Christmas Quiz crossword puzzle
Across
  1. Intranet location to learn more about IT initiatives.
  2. Santa's helpers.
  3. Last IT Tuesday topic
Down
  1. At Savannah, we have a culture of continuous ....
  2. The Centre of is where you can find further information on continuous improvement
  3. Guides Santas Sleigh
  4. The Snowman with a corncob pipe and button nose.

7 Clues: Santa's helpers.Guides Santas SleighLast IT Tuesday topicThe Snowman with a corncob pipe and button nose.At Savannah, we have a culture of continuous ....Intranet location to learn more about IT initiatives.The Centre of is where you can find further information on continuous improvement

Tecnologia de la Informacion 2023-05-06

Tecnologia de la Informacion crossword puzzle
Across
  1. Implica en los trabajos en tecnología de la información
  2. La TI admite muchas funciones comerciales y ayuda a?
  3. Una de las carreras que abarca la TI
  4. Es un tipo de tecnología de información
  5. Sigla de la tecnología de información
  6. Las empresas globales utilizan la tecnología de información para?
Down
  1. ¿Qué es la tecnología de la información?
  2. ¿La tecnología de información es responsable de?
  3. ¿Porqué es necesaria la tecnología de la información?

9 Clues: Una de las carreras que abarca la TISigla de la tecnología de informaciónEs un tipo de tecnología de información¿Qué es la tecnología de la información?¿La tecnología de información es responsable de?La TI admite muchas funciones comerciales y ayuda a?¿Porqué es necesaria la tecnología de la información?...

CODING VOCABULARY 2023-02-03

CODING VOCABULARY crossword puzzle
Across
  1. NUMBER SYSTEM USED BY COMPUTERS MADE UP OF 1'S AND 2'S
  2. ANY CHARACTER OR OBJECT USED IN BLOCK CODING
  3. A FREE PROGRAMMING LANGUAGE
  4. MONEY GIVEN TO A HACKER FOR FINDING A WEAKNESS
  5. ASKING IF A CONDITION IS MET
  6. SET OF LOGICAL STEPS CARRIED OUT IN ORDER
  7. OPEN SOURCE PROGAMMING LANGUAGE USING BLOCK CODING DEVELOPED BY MIT
  8. FINDING WEAKNESSES IN DIGITAL DEVICES
  9. IDENTIFY AND REMOVE ERRORS FROM COMPUTER PROGRAMS
Down
  1. PROTECTING SENSITIVE DIGITAL INFORMATION
  2. TOOL USED TO VIEW AND TEMPORARILY CHANGE SOURCE CODE
  3. MACHINE PROCESSED SIMULATION OF HUMAN INTELLIGENCE
  4. DATA ENTERED BY A USER
  5. INSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO
  6. NAMES USED TO HOLD ONE OR MORE VALUES
  7. THE WAY SOMETHING IS WRITTEN

16 Clues: DATA ENTERED BY A USERA FREE PROGRAMMING LANGUAGEASKING IF A CONDITION IS METTHE WAY SOMETHING IS WRITTENNAMES USED TO HOLD ONE OR MORE VALUESFINDING WEAKNESSES IN DIGITAL DEVICESPROTECTING SENSITIVE DIGITAL INFORMATIONSET OF LOGICAL STEPS CARRIED OUT IN ORDERANY CHARACTER OR OBJECT USED IN BLOCK CODINGINSTRUCTIONS THAT TELL A COMPUTER WHAT TO DO...

INFORMATION GOVERNANCE SUMMER FUN 2017-08-08

INFORMATION GOVERNANCE SUMMER FUN crossword puzzle
Across
  1. Coming soon,in May 2018!
  2. New term under GDPR
  3. Increasing threat for us all
  4. Have you filled the new role required under GDPR?
  5. Process which becomes a legal requirement under GDPR
Down
  1. Part of important review by NDG 2016
  2. Mustn't forget this important law for patients
  3. What could happen to to you in 2018 if you steal personal data
  4. Part of revised definition for sensitive personal data under GDPR

9 Clues: New term under GDPRComing soon,in May 2018!Increasing threat for us allPart of important review by NDG 2016Mustn't forget this important law for patientsHave you filled the new role required under GDPR?Process which becomes a legal requirement under GDPRWhat could happen to to you in 2018 if you steal personal data...

Mr Robot 2022-11-15

Mr Robot crossword puzzle
Across
  1. prevent attacks by blocking malicious traffic
  2. unwanted files or programs that can cause harm to a computer
  3. private information being kept secret
  4. people who seek to exploit weaknesses in software
  5. a set of characters that allows access to a system
  6. software designed to detect and destroy viruses
Down
  1. flaws in software
  2. the art of protecting networks, devices, and data from attacks
  3. type of email use to steal information about you

9 Clues: flaws in softwareprivate information being kept secretprevent attacks by blocking malicious trafficsoftware designed to detect and destroy virusestype of email use to steal information about youpeople who seek to exploit weaknesses in softwarea set of characters that allows access to a system...

Fundamentals of Computing Terms 2020-09-21

Fundamentals of Computing Terms crossword puzzle
Across
  1. A harmful computer program that creates glitches
  2. transferring data from the internet to a device
  3. a small graphic that represents a file/application
  4. A widely-accepted cyber security measure
  5. the protection of computer systems/networks
  6. an interface for connecting peripheral devices
  7. an output device that displays info from CPU
  8. uses pictures and words to represent ideas, etc.
  9. a piece of equipment outside the computer
  10. software that is pre-programmed for user
Down
  1. the blocking of data access for ransom
  2. program that you run on a computer/phone
  3. an input device that allows user to click graphics
  4. 8 bites of info represented in 1 character
  5. the brain of the computer
  6. Temporary memory
  7. smallest piece of info in the computer
  8. items that you can touch, I.E, tablet, etc.
  9. transferring data to the internet
  10. a unit of storage that is about 1 mil bytes
  11. the network of physical objects

21 Clues: Temporary memorythe brain of the computerthe network of physical objectstransferring data to the internetthe blocking of data access for ransomsmallest piece of info in the computerprogram that you run on a computer/phoneA widely-accepted cyber security measuresoftware that is pre-programmed for usera piece of equipment outside the computer...

Executive Branch 2023-06-02

Executive Branch crossword puzzle
Across
  1. The state prison or correction centers
  2. Government handles Urban issues such as substandard and deteriorating housing
  3. Ensures America's environmental and nuclear ______
  4. Promote student achievement and ______
  5. Promote the economic and social well-being of children and families
  6. Enhance the health and well-being of all Americans
Down
  1. Operates and maintains systems for the nation's finace
  2. Uphold the rule and law and protect civil rights
  3. Manages public lands and minerals
  4. Provides military forces and protects the United States
  5. Provides job and employment
  6. Promotes job creation and economic growth
  7. Offers education and rehabilitation services for Veterans
  8. Helps Americans start, build and grow businesses
  9. Responsible for terrorism and cybersecurity
  10. We provide leadership on food, agriculture and natural resources
  11. Defending the United States through control and exploitation of air and space
  12. Emergency services and first responders such as law enforcement
  13. Managing state toll factions
  14. Protect and promote the U.S security

20 Clues: Provides job and employmentManaging state toll factionsManages public lands and mineralsProtect and promote the U.S securityThe state prison or correction centersPromote student achievement and ______Promotes job creation and economic growthResponsible for terrorism and cybersecurityUphold the rule and law and protect civil rights...

KeyW Crossword 2017-01-18

KeyW Crossword crossword puzzle
Across
  1. When at work, what must you always carry
  2. Applying statistical analysis to data which has a geographical or spatial aspect
  3. KeyW non-profit organization abbreviated
  4. KeyW's best location
  5. What is the name of our newsletter
  6. KeyW CEO
  7. Time sheet
  8. What is the surname of KeyW's founder
  9. What type of bird is our mascot
Down
  1. KeyW's colors
  2. What month was KeyW founded
  3. What is the name of our mascot
  4. Radio Detection and Ranging
  5. How many buildings does the Severn location have
  6. Protection of networks, computers, programs, and data from attack
  7. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  8. Parrot Ball location
  9. How many miles connect Key West to Florida main land
  10. Which food truck offers the best cheese steaks
  11. What color is our KeyW van

20 Clues: KeyW CEOTime sheetKeyW's colorsKeyW's best locationParrot Ball locationWhat color is our KeyW vanWhat month was KeyW foundedRadio Detection and RangingWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderWhen at work, what must you always carry...

science-and-technology 2 2023-11-25

science-and-technology 2 crossword puzzle
Across
  1. Device that speeds up charged particles.
  2. The path of an object around a celestial body.
  3. Managing temperature and weather conditions.
  4. Computer-generated simulation of a three-dimensional environment.
  5. Design and construction of new biological parts.
  6. Device that converts hydrogen into electricity.
  7. Study of ionized gases (plasma).
Down
  1. Protection of computer systems from theft or damage.
  2. Altering genes in an organism's DNA.
  3. Relating to electric and magnetic fields.
  4. Elementary particle and a fundamental constituent of matter.
  5. Study of extremely low temperatures.
  6. Manipulation of matter on a molecular or atomic scale.
  7. Electromagnetic radiation with longer wavelengths than visible light.
  8. Long-term alteration in Earth's climate.
  9. Small rocky object orbiting the sun.
  10. Application of biological principles to medicine.
  11. Programs and applications for computers.
  12. Thread-like structure of DNA in the nucleus.
  13. Ability of machines to learn from data.

20 Clues: Study of ionized gases (plasma).Altering genes in an organism's DNA.Study of extremely low temperatures.Small rocky object orbiting the sun.Ability of machines to learn from data.Device that speeds up charged particles.Long-term alteration in Earth's climate.Programs and applications for computers.Relating to electric and magnetic fields....

Technology Crossword 2024-05-29

Technology Crossword crossword puzzle
Across
  1. AI
  2. a computer that works like a human brain
  3. a form of a monitarilly valuable item
  4. Something that is a threat to us non physically
  5. this is a watch or VR headset
  6. Something that can be invaded
  7. an orbit of artifical stars in a pattern
  8. a form of tourism that is very expensive and not many have a chance to go.
  9. Exploring the largest part of earth
  10. Advanced Computing
Down
  1. Finger print or face id
  2. a form of engineering
  3. A form of travel out of this world
  4. Threat of Unemployment
  5. Analysis of data
  6. Something seen as a toy for some but fly
  7. having people colonize a close planet
  8. Something almost everyone uses
  9. many people have these devices
  10. a way of making sure that you get what you need to get well

20 Clues: AIAnalysis of dataAdvanced Computinga form of engineeringThreat of UnemploymentFinger print or face idthis is a watch or VR headsetSomething that can be invadedSomething almost everyone usesmany people have these devicesA form of travel out of this worldExploring the largest part of eartha form of a monitarilly valuable item...

EQUATE - Cybersecurity 2023-05-30

EQUATE - Cybersecurity crossword puzzle
Across
  1. file included with an email that may carry risks
  2. Unwanted bulk emails
  3. Something to look for when verifying an email
Down
  1. Website or email address identifier
  2. Malicious assault on computer systems or networks.
  3. Microsoft-developed email client for managing email accounts
  4. Deceptive emails aiming to extract personal data

7 Clues: Unwanted bulk emailsWebsite or email address identifierSomething to look for when verifying an emailDeceptive emails aiming to extract personal datafile included with an email that may carry risksMalicious assault on computer systems or networks.Microsoft-developed email client for managing email accounts

EQUATE - Cybersecurity 2023-05-30

EQUATE - Cybersecurity crossword puzzle
Across
  1. file included with an email that may carry risks
  2. Unwanted bulk emails
  3. Something to look for when verifying an email
Down
  1. Website or email address identifier
  2. Malicious assault on computer systems or networks.
  3. Microsoft-developed email client for managing email accounts
  4. Deceptive emails aiming to extract personal data

7 Clues: Unwanted bulk emailsWebsite or email address identifierSomething to look for when verifying an emailDeceptive emails aiming to extract personal datafile included with an email that may carry risksMalicious assault on computer systems or networks.Microsoft-developed email client for managing email accounts

Cybersecurity Month 2023-09-27

Cybersecurity Month crossword puzzle
Across
  1. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
  2. The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
  3. Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
  1. A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
  2. A form of malware used by hackers to spy on you and your computer activities
  3. Any technology, be it software or hardware, used to keep intruders out
  4. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications

7 Clues: Any technology, be it software or hardware, used to keep intruders outA form of malware used by hackers to spy on you and your computer activitiesCoding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

ACC 2022-09-27

ACC crossword puzzle
Across
  1. We waive any right of recovery we may have
  2. platform used to log calls
  3. ensures small business owners are protected from the ongoing threats of Cybersecurity breaches
  4. our ABI know it all
  5. are excluded for both Property and Liability (BOP and CPP) coverage including Inland Marine.
Down
  1. contains a collection of additional coverages and increased limits for certain coverages
  2. an inspection required in the state of NY
  3. optional coverage maximizes limits
  4. provides coverages at no cost
  5. Option for liability limit
  6. script used to answer a call

11 Clues: our ABI know it allplatform used to log callsOption for liability limitscript used to answer a callprovides coverages at no costoptional coverage maximizes limitsan inspection required in the state of NYWe waive any right of recovery we may havecontains a collection of additional coverages and increased limits for certain coverages...

ict 2024-07-02

ict crossword puzzle
Across
  1. Number system with two digits, 0 and 1, used by computers.
  2. Security system that monitors and controls network traffic.
  3. Process of converting information into a secure form.
  4. Organized collection of data.
  5. Intelligence: Simulation of human intelligence by machines.
Down
  1. Device connected to a computer (e.g., printer, mouse).
  2. Technique of creating virtual versions of computer resources.
  3. Protection of computer systems from digital attacks
  4. Finding and fixing errors or bugs in software code.
  5. Step-by-step procedure for solving a problem.
  6. System: Software that manages computer hardware and software resources.

11 Clues: Organized collection of data.Step-by-step procedure for solving a problem.Protection of computer systems from digital attacksFinding and fixing errors or bugs in software code.Process of converting information into a secure form.Device connected to a computer (e.g., printer, mouse).Number system with two digits, 0 and 1, used by computers....

KeyW Crossword 2017-01-19

KeyW Crossword crossword puzzle
Across
  1. Radio Detection and Ranging
  2. KeyW non-profit organization abbreviated
  3. KeyW's colors
  4. What is the name of our newsletter
  5. How many bridges connect Key West to Florida main land
  6. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  7. What is the name of our mascot
  8. Parrot Ball location
  9. What color is our KeyW van
  10. What type of bird is our mascot
Down
  1. When at work, what must you always carry
  2. Protection of networks, computers, programs, and data from attack
  3. KeyW's best location
  4. Time sheet
  5. KeyW CEO
  6. What is the surname of KeyW's founder
  7. Which food truck offers the best cheese steaks
  8. Applying statistical analysis to data which has a geographical or spatial aspect
  9. What month was KeyW founded
  10. How many buildings does the Severn location have

20 Clues: KeyW CEOTime sheetKeyW's colorsKeyW's best locationParrot Ball locationWhat color is our KeyW vanRadio Detection and RangingWhat month was KeyW foundedWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderWhen at work, what must you always carry...

cpsc4240 2024-10-31

cpsc4240 crossword puzzle
Across
  1. legal license that allows you to use and edit a product
  2. protecting systems and networks from digital attacks
  3. type of attack that can be caused by a nuke
  4. linuxdef
  5. number that determines process priority
  6. each one has a unique PID
  7. leaked the docs
  8. command to add user
  9. command to open this user is su
  10. command to control log settings
  11. partition that allows for temp storage
  12. link that points to another file
Down
  1. only letting users access what they need
  2. feature that logs metadata
  3. read write execute
  4. having many security layers
  5. system that has both ipv4 and ipv6
  6. file that discards all data written to it
  7. type of link that creates a direct copy
  8. file that stores password hashes
  9. sets file permission upon create
  10. process that creates child
  11. command to run a privileged command
  12. attaching a filesystem to another

24 Clues: linuxdefleaked the docsread write executecommand to add usereach one has a unique PIDfeature that logs metadatahaving many security layersprocess that creates childcommand to open this user is sucommand to control log settingsfile that stores password hashessets file permission upon createlink that points to another file...

test 2022-07-15

test crossword puzzle
Across
  1. Music festival they attended -
  2. Michael proposed in ___ beach -
  3. European country michael lived in -
  4. How they met
  5. On the way to Big Sur they stopped at an ___ farm -
  6. Day of the week they attend life group -
  7. City of the music festival they attended -
  8. Basketball team michael supports -
  9. Sammi’s side hustle -
  10. How we are honoring sammis dad at the wedding -
  11. Month they met -
  12. City they took their engagement photos -
  13. Sauce michael hates -
Down
  1. State michael was raised in -
  2. Industry sammi works in -
  3. Sammis favorite flowers -
  4. Sammis bridal shower was a ___ party -
  5. Brand of sammi’s car -
  6. Type of dance sammi did growing up -
  7. Destination of first plane ride together -
  8. Type of engineer Michael is -
  9. Year they met -
  10. Color of michaels bathroom before they painted it -
  11. Location of their first post together on IG -
  12. Engagement ring shape -

25 Clues: How they metYear they met -Month they met -Sammi’s side hustle -Sauce michael hates -Brand of sammi’s car -Engagement ring shape -Industry sammi works in -Sammis favorite flowers -State michael was raised in -Type of engineer Michael is -Music festival they attended -Michael proposed in ___ beach -Basketball team michael supports -...

Cisco 2022-11-30

Cisco crossword puzzle
Across
  1. intentional tampering
  2. machine within a machine
  3. machine for printing text onto paper
  4. information non-consensually given to the public
  5. something on many screens
  6. output device that displays images
  7. place of sale
  8. official procedure
  9. common handheld device
  10. faster protocol
  11. thick rope of wire
  12. putting something into another forcefully
  13. an autonomous device
  14. device that often works with mice
  15. IO device that displays images
  16. IO device for computer
Down
  1. negative or not good
  2. our fearless leader
  3. slower protocol
  4. protection of systems
  5. to engineer
  6. company
  7. can be divided into vlans
  8. attack strategy
  9. connects networks
  10. our country
  11. a form of social engineering
  12. something often worn by humans
  13. IO device for computers
  14. a type of robot
  15. encoded message
  16. device
  17. aspect of human lift
  18. a type of person

34 Clues: devicecompanyto engineerour countryplace of saleslower protocolattack strategyfaster protocola type of robotencoded messagea type of personconnects networksofficial procedurethick rope of wireour fearless leadernegative or not goodan autonomous deviceaspect of human liftintentional tamperingprotection of systemscommon handheld device...

Executive Branch 2023-06-02

Executive Branch crossword puzzle
Across
  1. The state prison or correction centers
  2. Government handles Urban issues such as substandard and deteriorating housing
  3. Ensures America's environmental and nuclear ______
  4. Promote student achievement and ______
  5. Promote the economic and social well-being of children and families
  6. Enhance the health and well-being of all Americans
Down
  1. Operates and maintains systems for the nation's finace
  2. Uphold the rule and law and protect civil rights
  3. Manages public lands and minerals
  4. Provides military forces and protects the United States
  5. Provides job and employment
  6. Promotes job creation and economic growth
  7. Offers education and rehabilitation services for Veterans
  8. Helps Americans start, build and grow businesses
  9. Responsible for terrorism and cybersecurity
  10. We provide leadership on food, agriculture and natural resources
  11. Defending the United States through control and exploitation of air and space
  12. Emergency services and first responders such as law enforcement
  13. Managing state toll factions
  14. Protect and promote the U.S security

20 Clues: Provides job and employmentManaging state toll factionsManages public lands and mineralsProtect and promote the U.S securityThe state prison or correction centersPromote student achievement and ______Promotes job creation and economic growthResponsible for terrorism and cybersecurityUphold the rule and law and protect civil rights...

Crossword Puzzle 2023-12-12

Crossword Puzzle crossword puzzle
Across
  1. Coordinated anti-terrorism effort
  2. Diplomatic negotiation process
  3. Mutual defense pact
  4. Emotional response to stress or danger
  5. Country with aggressive territorial claims in the West Philippine Sea
  6. Protection against cyber threats
  7. Manipulation of information to influence opinions
  8. Policies aimed at reducing gender-based disparities
  9. Targeting of adversary's decision-making processes
  10. Island in the West Philippine Sea claimed by multiple countries
  11. Localized peace talks with insurgent groups
Down
  1. Common mental health condition characterized by persistent sadness
  2. Act of risking one's life to save others
  3. Joint military exercises
  4. Replacement of old weaponry with newer, more advanced systems
  5. Primary fighter aircraft used by the Air Force
  6. Country's plan for protecting itself from external threats
  7. Large warship equipped for open-sea combat
  8. Strategy to address the root causes of insurgency
  9. International court ruling on the West Philippine Sea dispute
  10. Declaration of the government to end insurgency

21 Clues: Mutual defense pactJoint military exercisesDiplomatic negotiation processProtection against cyber threatsCoordinated anti-terrorism effortEmotional response to stress or dangerAct of risking one's life to save othersLarge warship equipped for open-sea combatLocalized peace talks with insurgent groupsPrimary fighter aircraft used by the Air Force...

NEWSLETTER 2023-11-13

NEWSLETTER crossword puzzle
Across
  1. The activity, you do to get to places.
  2. Another word for young people....
  3. Ghana’s Winter.
  4. I want for Christmas is......
  5. The invisible line that divides the earth into two equal parts.
  6. Picture on social media.
  7. Your identity summarized onto one thing.
  8. Plans for the New Year.
  9. Program used to harm computers.
  10. Color associated with the New Year.
  11. MIDG end-of-year package for employees.
  12. Popular hangout zone in Accra.
  13. ....is responsible for the safety and manner on the internet and other connection.
Down
  1. Merry Christmas
  2. Baby Crocodile
  3. .....is the most showed movie during Christmas movie in Ghana.
  4. Margins ID Group is made up of four....
  5. .... flies when you’re having fun.
  6. Sits atop the Christmas tree.
  7. Pronto’s location.
  8. A machine that can be used to write, connect to the writer, the internet and play games.
  9. Identity theft is an example of...
  10. A letter sent on the internet.
  11. What makes you, you.

24 Clues: Baby CrocodileMerry ChristmasGhana’s Winter.Pronto’s location.What makes you, you.Plans for the New Year.Picture on social media.I want for Christmas is......Sits atop the Christmas tree.A letter sent on the internet.Popular hangout zone in Accra.Program used to harm computers.Another word for young people........ flies when you’re having fun....

Computer Science 2024-10-25

Computer Science crossword puzzle
Across
  1. password an easily guessed password
  2. Protecting your systems
Down
  1. a memorized secret with a sequence of words
  2. device A technique someone uses to remember
  3. password A password that is strong
  4. random password Make up your own password

6 Clues: Protecting your systemspassword an easily guessed passwordpassword A password that is stronga memorized secret with a sequence of wordsrandom password Make up your own passworddevice A technique someone uses to remember

Quality Month Quiz 2022-11-04

Quality Month Quiz crossword puzzle
Across
  1. a type of cybersecurity attack that attempts to steal your information
  2. Plays A VITAL ROLE IN YOUR APPRAISAL
  3. Skill / Knowledge to do a process
  4. Property of accuracy and completeness
  5. are implemented to mitigate the identified risks
  6. Action to eliminate the cause of a nonconformity and to prevent recurrence
Down
  1. Tailgating is also termed as
  2. Portrays the hierarchy in organisation / function
  3. plan to achieve a long-term or overall objective
  4. Non-fulfilment of a requirement
  5. A weakness of an asset or control that could potentially be exploited by one or more threats
  6. How many Quality Management Principle in QMS

12 Clues: Tailgating is also termed asNon-fulfilment of a requirementSkill / Knowledge to do a processPlays A VITAL ROLE IN YOUR APPRAISALProperty of accuracy and completenessHow many Quality Management Principle in QMSplan to achieve a long-term or overall objectiveare implemented to mitigate the identified risks...

internet safety 2023-04-19

internet safety crossword puzzle
Across
  1. a part of a computer system or network which is designed to block unwanted access
  2. like a cold for your computer
  3. the state of being protected against the criminal use of electronic data
  4. bulling done over the internet
  5. a person or thing that hacks
  6. a world wide computer network
  7. websites and apps that let users create and share content EX.Snapchat
Down
  1. a piece of information needed to log in to the internet
  2. the state of being free from public attention
  3. be careful what you make public
  4. information made available by a website
  5. facts given to learn about someone or something

12 Clues: a person or thing that hackslike a cold for your computera world wide computer networkbulling done over the internetbe careful what you make publicinformation made available by a websitethe state of being free from public attentionfacts given to learn about someone or somethinga piece of information needed to log in to the internet...

Digital media literacy 2023-09-14

Digital media literacy crossword puzzle
Across
  1. a setting you turn on to camouflage yourself from internet scammers
  2. this is where you install games and streaming services
  3. a streaming service that is very well known
  4. people that lure people into giving them there bank details
  5. a way of protecting you from hackers
Down
  1. a website in which you order from and it’s delivered to your door
  2. an answer to all your questions
  3. watch videos from your favourite content creator
  4. tweet tweet
  5. a social media app with a blue logo
  6. a corporation run by bill gates
  7. some the would be powered by electricity

12 Clues: tweet tweetan answer to all your questionsa corporation run by bill gatesa social media app with a blue logoa way of protecting you from hackerssome the would be powered by electricitya streaming service that is very well knownwatch videos from your favourite content creatorthis is where you install games and streaming services...

Business Ethics/Cyber Security 2023-09-19

Business Ethics/Cyber Security crossword puzzle
Across
  1. practice of protecting critical systems
  2. work place manners
  3. the number of steps in the decision making process
  4. this person wanted to test the size of the internet by creating a program that duplicated itself
Down
  1. exchange of information between a sender and receiver
  2. these hackers send an email or text with a link to click
  3. guidelines for how a business should conduct themselves
  4. positive internet behavior
  5. a policy users must agree to follow in order to gain internet access
  6. a set of moral principles
  7. the most common form of communication in a business
  8. these hackers ask for money

12 Clues: work place mannersa set of moral principlespositive internet behaviorthese hackers ask for moneypractice of protecting critical systemsthe number of steps in the decision making processthe most common form of communication in a businessexchange of information between a sender and receiverguidelines for how a business should conduct themselves...

TDD 2023-09-19

TDD crossword puzzle
Across
  1. Think before you _____.​
  2. One of the common internet search engine used nowadays.
  3. Do not share your account ______ to anyone.​
  4. We should avoid sharing any _______ news without validating the sources.​
  5. #1 popular social media. CEO – Mark Zuckerberg​
Down
  1. ______ has been recognized as Cybersecurity awareness month.
  2. One of Amcor values.
  3. _______ make human sick as well as computer.​
  4. Operating System
  5. Short form of wireless network.​
  6. ____ your laptop when you are stepping away. You need a key to unlock it.​
  7. They are referred as small insects in mother nature. IT referred them as errors in computer program/system.​

12 Clues: Operating SystemOne of Amcor values.Think before you _____.​Short form of wireless network.​Do not share your account ______ to anyone.​_______ make human sick as well as computer.​#1 popular social media. CEO – Mark Zuckerberg​One of the common internet search engine used nowadays.______ has been recognized as Cybersecurity awareness month....

ch1-2-3 2021-09-25

ch1-2-3 crossword puzzle
Across
  1. quality of dealing with ideas rather than events
  2. malicious software
  3. track online activity and capture data
  4. study of what is right or wrong in human conduct
  5. a way to discover and fix a problem in a system
  6. process to protect individual and organization
Down
  1. the beliefs of the individuals or groups as to what is wrong and right
  2. replicates itself independently in a network
  3. automatically delivers advertisements
  4. holds a computer system captive until payment is made
  5. the degree to which something is able or fit to be used
  6. usually spreads by USB drives, emails or network shares

12 Clues: malicious softwareautomatically delivers advertisementstrack online activity and capture datareplicates itself independently in a networkprocess to protect individual and organizationa way to discover and fix a problem in a systemquality of dealing with ideas rather than eventsstudy of what is right or wrong in human conduct...

Cybersecurity Crossword 2021-11-14

Cybersecurity Crossword crossword puzzle
Across
  1. Proving your identity
  2. Encrypting files and holding them hostage for money
Down
  1. A horse with a surprise
  2. software designed to corrupt or steal information
  3. Pretending to be someone you are not to extract information out of someone
  4. A denial of service attack targets this
  5. a brute force attack takes a long time to work on this

7 Clues: Proving your identityA horse with a surpriseA denial of service attack targets thissoftware designed to corrupt or steal informationEncrypting files and holding them hostage for moneya brute force attack takes a long time to work on thisPretending to be someone you are not to extract information out of someone

Cybersecurity Crossword 2023-07-25

Cybersecurity Crossword crossword puzzle
Across
  1. Unauthorized individuals gaining physical access through closely following authorized personnel
  2. A form of business risk resulting from cyberattacks or data breache
Down
  1. Suspicious emails
  2. Another word for tailgating
  3. Unexpected behavior exhibited by software applications, such as crashes could be caused by
  4. Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
  5. could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.

7 Clues: Suspicious emailsAnother word for tailgatingA form of business risk resulting from cyberattacks or data breacheUnexpected behavior exhibited by software applications, such as crashes could be caused byUnauthorized individuals gaining physical access through closely following authorized personnel...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Anson Khoo Kai Loon 8G 2023-01-19

Anson Khoo Kai Loon  8G crossword puzzle
Across
  1. People use this to study online during the pandemic.
  2. To protect others from looking in your phone.
  3. protects you from networks & programs digital attacks.
  4. We can use ________ to communicate with others all around the world.
  5. You can send a ______ to your friends to play with.
Down
  1. A website that people use to buy something online.
  2. A website that people use to search.
  3. You need to press _______ to shut your computer/laptop.
  4. Made by Mark Zuckerberg.
  5. Its use in almost all electronic devices.
  6. An old website that people use to search something.

11 Clues: Made by Mark Zuckerberg.A website that people use to search.Its use in almost all electronic devices.To protect others from looking in your phone.A website that people use to buy something online.An old website that people use to search something.You can send a ______ to your friends to play with.People use this to study online during the pandemic....

Cybersecurity Crossword Puzzle 2023-11-10

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A champion of cybersecurity
  2. The process of identifying a users identity
  3. Changing the IP address of an email so it appears to come from a trusted source
  4. Malicious software used to damage or infect a system
  5. A means of attack, a vulnerability
  6. Technology used to keep hackers out of a system
Down
  1. Coding to protect information
  2. Malware that hijacks a system in return for payment
  3. Malware that corrupts a system, then spreads to other systems
  4. Practice of posing as someone legitimate to gain access

10 Clues: A champion of cybersecurityCoding to protect informationA means of attack, a vulnerabilityThe process of identifying a users identityTechnology used to keep hackers out of a systemMalware that hijacks a system in return for paymentMalicious software used to damage or infect a systemPractice of posing as someone legitimate to gain access...

STEM in the News 2023-09-26

STEM in the News crossword puzzle
Across
  1. regulates anyone who stores, transmits, or possesses cardholder data
  2. Rules created for keeping things under control
  3. The act of staying safe online
  4. Using or creating ways to use services for malicious purposes
  5. Regulates use and transfer of Healthcare data
Down
  1. Moving something from one place to another
  2. An online exploit of a service or information
  3. Handles the storing, handling, and transmission of digital data
  4. Created by the EU to protect their citizens online
  5. Online or relating to a computer

10 Clues: The act of staying safe onlineOnline or relating to a computerMoving something from one place to anotherAn online exploit of a service or informationRegulates use and transfer of Healthcare dataRules created for keeping things under controlCreated by the EU to protect their citizens online...

Theme: Technology 2024-07-24

Theme: Technology crossword puzzle
Across
  1. An organized collection of data
  2. A machine capable of carrying out complex actions automatically
  3. A global network connecting millions of private public academic and government networks
  4. A process or set of rules to be followed in calculations or other problem-solving operations
  5. The programs and other operating information used by a computer
Down
  1. The practice of protecting systems networks and programs from digital attacks
  2. A mobile phone with advanced features
  3. A portable personal computer
  4. An unmanned aerial vehicle
  5. Abbreviation for Artificial Intelligence

10 Clues: An unmanned aerial vehicleA portable personal computerAn organized collection of dataA mobile phone with advanced featuresAbbreviation for Artificial IntelligenceA machine capable of carrying out complex actions automaticallyThe programs and other operating information used by a computer...

Technological Impacts on Business & Commerce 2023-05-03

Technological Impacts on Business & Commerce crossword puzzle
Across
  1. Radio Frequency Identification
  2. Global Positioning System
  3. A type of social media used by many businesses
  4. An immersive, interactive, computer-generated experience
  5. A type of mobile technology
  6. A common type of online payment system.
  7. Bullying someone online
  8. Technologies that require little to no human involvement to operate
  9. Computers that mimic human cognitive abilities
Down
  1. Customizing goods or services to consumers needs and preferences
  2. Safeguarding computer systems and networks
  3. The network of real-world things that exchange data form one another
  4. The network of businesses involved in product distribution
  5. Natural Language Processing
  6. The exchange of goods and services electronically
  7. Providing for the needs of this generation without compromising the needs for future generations
  8. A type of skill that is essential for ICT.

17 Clues: Bullying someone onlineGlobal Positioning SystemNatural Language ProcessingA type of mobile technologyRadio Frequency IdentificationA common type of online payment system.Safeguarding computer systems and networksA type of skill that is essential for ICT.A type of social media used by many businessesComputers that mimic human cognitive abilities...

AI Lesson 2023-03-06

AI Lesson crossword puzzle
Across
  1. A type of machine learning that is modeled after the structure and function of the human brain
  2. data __________
  3. e.g. Siri, Alexa
  4. using machines to perform tasks that are normally done by humans
  5. e.g. fingerprints, facial recognition software
  6. the design, construction, operation and use of robots
  7. AI that learns about knowledge that humans know naturally
Down
  1. using firewalls and antivirus software to prevent computers from being attacked
  2. using large datasets to find patterns and insights
  3. AI that learns and improves from experience by itself
  4. a household that uses internet-connected devices to control appliances
  5. feeling/emotion
  6. a set of instructions that complete a task

13 Clues: data __________feeling/emotione.g. Siri, Alexaa set of instructions that complete a taske.g. fingerprints, facial recognition softwareusing large datasets to find patterns and insightsAI that learns and improves from experience by itselfthe design, construction, operation and use of robotsAI that learns about knowledge that humans know naturally...

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. A popular operating system.
  2. Securing computer systems against unauthorized access.
  3. Unethical practice of gaining unauthorized access to computer systems.
  4. Act of impersonating a legitimate entity to deceive individuals or gain access.
Down
  1. Desired outcomes.
  2. Malicious software used to gain unauthorised access to computer systems.
  3. Term for gaining access to a secure network through.

7 Clues: Desired outcomes.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems.Malicious software used to gain unauthorised access to computer systems....

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. Unethical practice of gaining unauthorized access to computer systems.
  2. A popular operating system.
  3. Desired outcomes.
  4. Term for gaining access to a secure network through.
Down
  1. Securing computer systems against unauthorized access.
  2. Act of impersonating a legitimate entity to deceive individuals or gain access.
  3. Malicious software used to gain unauthorised access to computer systems.

7 Clues: Desired outcomes.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems.Malicious software used to gain unauthorised access to computer systems....

Computer Studies 9/10 Crossword 2024-05-21

Computer Studies 9/10 Crossword crossword puzzle
Across
  1. A high-level programming language often used for web development.
  2. The physical components of a computer system.
  3. A software application used to access the web.
  4. An interconnected group of computers.
  5. The smallest unit of digital information.
  6. The primary storage device in a computer.
  7. A sequence of characters.
  8. A temporary storage that provides fast access to data.
  9. A set of instructions that a computer follows to perform a task.
  10. The standard language for creating web pages.
Down
  1. The main circuit board of a computer.
  2. A named collection of related data.
  3. Basic unit of data in computing.
  4. A global system of interconnected computer networks.
  5. The practice of protecting computers and data from unauthorized access.
  6. A device for entering data into a computer.
  7. To find and correct errors in a program.
  8. A way of sending information over the internet securely.
  9. The "brain" of the computer.
  10. An error in a program.

20 Clues: An error in a program.A sequence of characters.The "brain" of the computer.Basic unit of data in computing.A named collection of related data.The main circuit board of a computer.An interconnected group of computers.To find and correct errors in a program.The smallest unit of digital information.The primary storage device in a computer....

Andy & George’s Wedding Crossword 2024-05-28

Andy & George’s Wedding Crossword crossword puzzle
Across
  1. What school did George go to?
  2. What is our favourite number?
  3. What was our wedding present from Bob & Wendy?
  4. How many years have we been together?
  5. What school did Andy go to?
  6. Where did George go to uni?
  7. Where did we first meet?
  8. Where do we live?
  9. Where did Andy go to uni?
  10. On what street was their first flat?
  11. What is George’s middle name?
Down
  1. What’s Andy’s favourite flavour of icecream?
  2. What colour is the diamond in George’s ring?
  3. Where does George work?
  4. What industry does Andy work in?
  5. What did Andy study at uni?
  6. What name is George saved under in Andy’s phone?
  7. What’s Andy’s coffee order?
  8. Where did we get engaged?
  9. What is Andy’s favourite hobby?
  10. What’s George’s favourite film?
  11. What was our first dog called?
  12. What colour are George’s eyes?
  13. What is Andy’s middle name?

24 Clues: Where do we live?Where does George work?Where did we first meet?Where did we get engaged?Where did Andy go to uni?What did Andy study at uni?What school did Andy go to?Where did George go to uni?What’s Andy’s coffee order?What is Andy’s middle name?What school did George go to?What is our favourite number?What is George’s middle name?...

Cybersecurity Crossword 2022-05-19

Cybersecurity Crossword crossword puzzle
Across
  1. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  2. establishes a secure connection between you and the internet
  3. the practice of protecting critical systems and sensitive information from digital attacks.
Down
  1. a set of instructions, data or programs used to operate computers and execute specific tasks
  2. a standalone malware computer program that replicates itself in order to spread to other computers
  3. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  4. a computer program that can copy itself and infect a computer without permission or knowledge of the user

7 Clues: establishes a secure connection between you and the internetthe practice of protecting critical systems and sensitive information from digital attacks.a set of instructions, data or programs used to operate computers and execute specific tasksa standalone malware computer program that replicates itself in order to spread to other computers...

Cybersecurity crossword 2023-03-17

Cybersecurity crossword crossword puzzle
Across
  1. Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
  2. Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
  3. Find a synonym of preempt
Down
  1. What is the naming convention for ecrime category ?
  2. What is 84 minutes the average time for ?
  3. What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
  4. Which type of accounts are mainly targeted by adversaries ?

7 Clues: Find a synonym of preemptWhat is 84 minutes the average time for ?What is the naming convention for ecrime category ?Which type of accounts are mainly targeted by adversaries ?Which tool can reveal hidden relationships and identify attack paths within an AD environment ?...

CYBERSECURITY PUZZLE 2023-09-13

CYBERSECURITY PUZZLE crossword puzzle
Across
  1. Shady..do not click!
  2. Do not visit
  3. Don't ever share this to strangers!
  4. Dishonest offer online
Down
  1. Publishing someone's private information on the internet
  2. Always change this throughout accounts!
  3. Be careful when doing this on social media!

7 Clues: Do not visitShady..do not click!Dishonest offer onlineDon't ever share this to strangers!Always change this throughout accounts!Be careful when doing this on social media!Publishing someone's private information on the internet

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crossword 2023-11-10

Cybersecurity Crossword crossword puzzle
Across
  1. What type of hacker exploits systems for personal gain and bad intention
  2. What is used to hide messages so only authorized people can understand?
  3. What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
  1. Using deceptive measures to manipulate someone in disclosing personal information
  2. Data, information , device anything that is of value
  3. Acquiring unauthorized access to system or data
  4. An incident where attackers steal information without authorization?

7 Clues: Acquiring unauthorized access to system or dataData, information , device anything that is of valueAn incident where attackers steal information without authorization?What is used to hide messages so only authorized people can understand?What type of hacker exploits systems for personal gain and bad intention...

Cyber Safety 2023-03-27

Cyber Safety crossword puzzle
Across
  1. Sites such as Snapchat, tiktok etc...
  2. simulation of the real thing
  3. To stop a computer from reaching something on the internet.
  4. An attempt to trick people into visiting malicious websites.
Down
  1. Measures taken to protect a computer
  2. When a child abuser tries to start a relationship online.
  3. Repeated behavior that is intended to cause psychological or emotional harm.
  4. A word or series of letters, numbers and characters.
  5. Computer program designed to damage files
  6. Person who uses computer to gain unauthorized access to data.

10 Clues: simulation of the real thingMeasures taken to protect a computerSites such as Snapchat, tiktok etc...Computer program designed to damage filesA word or series of letters, numbers and characters.When a child abuser tries to start a relationship online.To stop a computer from reaching something on the internet....

HACKING TERMS 2023-11-13

HACKING TERMS crossword puzzle
Across
  1. Software designed to harm or exploit computer systems
  2. A deliberate attempt to exploit computer systems or networks.
  3. A reward offered for discovering and reporting software bugs
  4. A secret word or phrase used for authentication.
  5. A series of instructions for a computer to execute.
  6. Protective measures against digital threats
Down
  1. Ethical hackers working to improve security
  2. The right to keep personal information and activities confidential.
  3. A weakness or flaw in a system that can be exploited.
  4. The process of converting information into a code for security.

10 Clues: Ethical hackers working to improve securityProtective measures against digital threatsA secret word or phrase used for authentication.A series of instructions for a computer to execute.Software designed to harm or exploit computer systemsA weakness or flaw in a system that can be exploited....

Tech Terms 2023-12-01

Tech Terms crossword puzzle
Across
  1. - Software for accessing and navigating the internet. (7)
  2. - Step-by-step procedure for solving a problem. (8)
  3. Reality - Computer-generated environment that simulates reality. (13)
  4. - Secret code to access a protected system. (8)
  5. - Transfer files from the internet to a computer. (8)
Down
  1. - Measures to protect computer systems from theft or damage. (12)
  2. - Security system that prevents unauthorized access. (8)
  3. - Process of converting data into a code to secure it. (10)
  4. - Portable device with touchscreen features. (10)
  5. - Writing instructions for a computer program. (6)

10 Clues: - Secret code to access a protected system. (8)- Portable device with touchscreen features. (10)- Writing instructions for a computer program. (6)- Step-by-step procedure for solving a problem. (8)- Transfer files from the internet to a computer. (8)- Security system that prevents unauthorized access. (8)...

TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET 2024-01-11

TTS INFORMATIKA TUGAS - JARINGAN KOMPUTER DAN INTERNET crossword puzzle
Across
  1. Lapisan OSI ke 3
  2. topologi jaringan berbentuk bintang
  3. Meningkatkan komunikasi antar pengguna, baik secara langsung maupun tidak langsung adalah manfaat dari
  4. Data yang tersimpan pada device karyawan dapat disimpan lebih aman secara terpusat dengan menggunakan
  5. salah satu prinsip keamanan jaringan
Down
  1. mekanisme pertukaran data
  2. kegiatan tata kelola data
  3. perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)
  4. praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
  5. Salah satu macam jenis jaringan komputer

10 Clues: Lapisan OSI ke 3mekanisme pertukaran datakegiatan tata kelola datatopologi jaringan berbentuk bintangsalah satu prinsip keamanan jaringanSalah satu macam jenis jaringan komputerperangkat yang menghubungkan jaringan lokal dengan jaringan eksternal (seperti internet)...

KeyW Crossword 2017-01-19

KeyW Crossword crossword puzzle
Across
  1. What is the name of our mascot
  2. Parrot Ball location
  3. KeyW's colors
  4. What month was KeyW founded
  5. What color is our KeyW van
  6. KeyW's best location
  7. How many buildings does the Severn location have
  8. Protection of networks, computers, programs, and data from attack
  9. Applying statistical analysis to data which has a geographical or spatial aspect
  10. Time sheet
  11. What type of bird is our mascot
  12. Which food truck offers the best cheese steaks
Down
  1. What is the surname of KeyW's founder
  2. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  3. What is the name of our newsletter
  4. Radio Detection and Ranging
  5. How many miles connect Key West to Florida main land
  6. KeyW non-profit organization abbreviated
  7. KeyW CEO
  8. When at work, what must you always carry

20 Clues: KeyW CEOTime sheetKeyW's colorsParrot Ball locationKeyW's best locationWhat color is our KeyW vanWhat month was KeyW foundedRadio Detection and RangingWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderKeyW non-profit organization abbreviated...

Wedding 2024-06-08

Wedding crossword puzzle
Across
  1. What Stacey used to refer Michael to when they first started dating
  2. Where did Michael and Stacey meet
  3. Michael’s birthday month
  4. Michael and Stacey’s anniversary month (hint: Maid of Honour’s birth month)
  5. The number of years the couple is together
  6. Honeymoon destination
  7. Their favourite season
  8. How many years did Michael live overseas for (hint: bribe Father of Groom)
  9. What the groom has for breakfast everyday
  10. Michael’s job industry
  11. Number of their siblings all together
  12. Stacey’s favourite food (hint: ask father of bride)
  13. Michael’s middle name
  14. Who’s the better cook
Down
  1. Mr & Mrs _____
  2. City where Michael was born
  3. Michael’s favourite drink
  4. Where did Michael propose
  5. Brand of Michael’s car
  6. Flavour of the wedding cake
  7. Stacey’s birthday month
  8. Favourite AFL team (hint: ask Best Man)
  9. Stacey’s best friend
  10. How long has Stacey been in Australia for
  11. The age gap between the bride and the groom

25 Clues: Mr & Mrs _____Stacey’s best friendHoneymoon destinationMichael’s middle nameWho’s the better cookBrand of Michael’s carTheir favourite seasonMichael’s job industryStacey’s birthday monthMichael’s birthday monthMichael’s favourite drinkWhere did Michael proposeCity where Michael was bornFlavour of the wedding cakeWhere did Michael and Stacey meet...

Crosswords 2024-07-16

Crosswords crossword puzzle
Across
  1. plan for successful digital transformation
  2. immediate data analysis
  3. large sets of data analyzed for insights
  4. combining data from different sources
  5. management of the flow of goods and services
  6. successful digital use by employees
  7. system that integrates various business processes
  8. virtual model of a physical object or system
  9. protection in digital business environments
  10. network of interconnected devices
  11. system for managing customer relationships
  12. accuracy and reliability of data
Down
  1. digital change impacting business processes
  2. redesigning business processes for improvement
  3. use of technology to perform tasks
  4. analysis of data for business insights
  5. based ERP solutions
  6. process of adopting ERP systems
  7. technology enhancing supply chain transparency
  8. integration of artificial intelligence in business
  9. isolated data storage within an organization
  10. improved by ERP systems
  11. analytics for customer engagement
  12. considerations in using AI and big data
  13. user experience in digital product design

25 Clues: based ERP solutionsimmediate data analysisimproved by ERP systemsprocess of adopting ERP systemsaccuracy and reliability of dataanalytics for customer engagementnetwork of interconnected devicesuse of technology to perform taskssuccessful digital use by employeescombining data from different sourcesanalysis of data for business insights...

Introduction to Cyber Security 2023-09-08

Introduction to Cyber Security crossword puzzle
Across
  1. protects the wireless internet
  2. signature sent with email to acknowledge that it was verified
  3. security is broken and data was stolen
  4. verifying a user's identity
  5. a verification for servers to see what can send an email
  6. foreign foreign software designed to harm a computer
  7. protocol that protects internet communication
  8. securing data from outside threats
  9. programs used when running a PC
Down
  1. latest version of security for wireless internet
  2. allows your website to be published online
  3. using radio waves to connect between nodes in a network
  4. frauding as a trusted source to steal information
  5. protection from cyber threats
  6. making a copy of a data/file
  7. disguising themself to steal information
  8. malware to deny a user of their data
  9. using means necessary to access someone else's device
  10. communication through the use of electronic devices over networks
  11. a protection against fake email addresses that are disguised to be real ones

20 Clues: verifying a user's identitymaking a copy of a data/fileprotection from cyber threatsprotects the wireless internetprograms used when running a PCsecuring data from outside threatsmalware to deny a user of their datasecurity is broken and data was stolendisguising themself to steal informationallows your website to be published online...

Maura & Spencer 2023-05-19

Maura & Spencer crossword puzzle
Across
  1. Spencer's favorite basketball player
  2. Where they moved after college
  3. The name of their cat
  4. Favorite "Fast Food"
  5. Brides Favorite Alcoholic Drink
  6. Spencer's Favorite Hobby
  7. Where did Maura & Spencer travel to this year
  8. Who gave out their phone number first?
  9. Where do they live
  10. Maura and Spencers First Born
  11. Maura's favorite Disney Movie
  12. How many years will they be together in September?
  13. Maura's middle name
  14. Maura's Job
Down
  1. Maura's Favorite Color
  2. What social media platform did Spencer use to slide in Maura's DM's
  3. Where did Maura go after DC
  4. Maura's Favorite Hobby
  5. Where Maura and Spencer met
  6. Where did Spencer propose?
  7. Spencer's Favorite Color
  8. What month did they get engaged
  9. The last addition to Maura & Spencers family
  10. Grooms Favorite Alcoholic Drink
  11. Spencers Job
  12. What was Maura's sport growing up
  13. Spencer's middle name

27 Clues: Maura's JobSpencers JobWhere do they liveMaura's middle nameFavorite "Fast Food"The name of their catSpencer's middle nameMaura's Favorite ColorMaura's Favorite HobbySpencer's Favorite ColorSpencer's Favorite HobbyWhere did Spencer propose?Where did Maura go after DCWhere Maura and Spencer metMaura and Spencers First Born...

FITAVocab.lo 2013-05-15

FITAVocab.lo crossword puzzle
Across
  1. code of positive conduct one uses such as plagiarism, copyright, etc.
  2. rules and behaviors designed to keep individuals safe online
  3. a search engine that goes through all the search engines.
  4. speed of machine
  5. short term memory for your computer
  6. a
Down
  1. a website that protects young people from cyber bullies
  2. protecting information on computer systems/networks
  3. a program that allows you to search information on the internet.
  4. a combining form meaning "computer," "computer network," or "virtual reality," used in the formation of compound words.

10 Clues: aspeed of machineshort term memory for your computerprotecting information on computer systems/networksa website that protects young people from cyber bulliesa search engine that goes through all the search engines.rules and behaviors designed to keep individuals safe onlinea program that allows you to search information on the internet....

Tugas - Jaringan komputer dan internet 2024-01-11

Tugas - Jaringan komputer dan internet crossword puzzle
Across
  1. aspek teknis pada jaringan komputer
  2. nama lain jaringan komputer
  3. Jenis jaringan komputer
  4. aspek utama keamanan jaringan
  5. yang bertugas untuk mengawasi, menganalisis dan mengecek segala hal mulai dari komputer, perangkat penyimpanan data, jaringan sampai database adalah
  6. topologi jaringan yang lebih sederhana yaitu
Down
  1. Dengan perangkat yang terkoneksi, maka pengguna dapat saling berkomunikasi untuk bertukar data dan informasi merupakan salah satu fungsi
  2. server komponen jaringan komputer
  3. lapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu
  4. Network interface card

10 Clues: Network interface cardJenis jaringan komputernama lain jaringan komputeraspek utama keamanan jaringanserver komponen jaringan komputeraspek teknis pada jaringan komputertopologi jaringan yang lebih sederhana yaitulapisan informasi yang memiliki fungsi mengendalikan alur komunikasi antara dua perangkat yaitu...

Cybersecurity101 2022-11-16

Cybersecurity101 crossword puzzle
Across
  1. malware that is secretly spying on you and stealing your data
  2. act of discovering open wifi networks by driving around
  3. malware that encrypts your files and system demanding payment
  4. practice of socially engineering high value individuals of an organization
  5. agency responsible for strengthening cybersecurity posture in the US
  6. brute force technique to discover files, domains, etc.
Down
  1. method of a threat actor uses to return into your network/device
  2. phishing over the phone
  3. common public-key encryption algorithm
  4. most common threat vector for social engineering
  5. phishing over text
  6. MITRE framework for tactics techniques and procedures

12 Clues: phishing over textphishing over the phonecommon public-key encryption algorithmmost common threat vector for social engineeringMITRE framework for tactics techniques and proceduresbrute force technique to discover files, domains, etc.act of discovering open wifi networks by driving aroundmalware that is secretly spying on you and stealing your data...

SCAI Feasting with Faculty 2023-11-02

SCAI Feasting with Faculty crossword puzzle
Across
  1. Location where data is stored in a computer's memory.
  2. The study of breaking codes and ciphers.
  3. Software designed to harm or infiltrate a computer.
  4. Low-level human-readable code for computers.
  5. Investigating digital evidence for legal purposes.
  6. Small storage areas inside the computer's CPU.
  7. Measures to keep your computer and data safe online.
Down
  1. Making data unreadable to unauthorized users.
  2. A secure way to verify the sender of a message.
  3. Moving information from one place to another.
  4. A digital barrier that protects your network from threats.
  5. A command that tells the computer what to do.

12 Clues: The study of breaking codes and ciphers.Low-level human-readable code for computers.Making data unreadable to unauthorized users.Moving information from one place to another.A command that tells the computer what to do.Small storage areas inside the computer's CPU.A secure way to verify the sender of a message....

End Users and Cybersecurity 2023-10-13

End Users and Cybersecurity crossword puzzle
Across
  1. 85% of people posting puppy photos are trying to _____ you
  2. _____ are connected to the internet
  3. ensure that the correct information is relayed to the right destination across the network
  4. _____ refer to physical items such as devices, consumer products, and gadgets that generate data.
  5. network of connections between people, things, data, and processes
  6. shortened URLs
Down
  1. variant of malware
  2. person who uses IT products or services
  3. occurs when an end user receives an illegitimate message or email
  4. providing education to end users can mitigate cybersecurity _____
  5. almost every employee has access to this
  6. help protect your internet connection and privacy online

12 Clues: shortened URLsvariant of malware_____ are connected to the internetperson who uses IT products or servicesalmost every employee has access to thishelp protect your internet connection and privacy online85% of people posting puppy photos are trying to _____ youoccurs when an end user receives an illegitimate message or email...

HP GPO Crossword puzzle 2022-06-22

HP GPO Crossword puzzle crossword puzzle
Across
  1. Helps move stock for HP
  2. Document that explains input output and process
  3. Safeguarding the digital world
  4. Converts screen to paper
  5. Introducing new methods, ideas, or products
Down
  1. Making sure your future generations are comfortable
  2. The practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible

7 Clues: Helps move stock for HPConverts screen to paperSafeguarding the digital worldIntroducing new methods, ideas, or productsDocument that explains input output and processMaking sure your future generations are comfortableThe practice of making information, activities, and/or environments sensible, meaningful, and usable for as many people as possible

Compliance Week - Day 1 Puzzle 2022-10-09

Compliance Week - Day 1 Puzzle crossword puzzle
Across
  1. Intimidation of an individual after reporting an allegation of misconduct.
  2. When PHI is exposed, a _______ of the patient's privacy has been committed.
  3. Never share your ________ with anyone.
  4. The ____ is an anonymous way to report a compliance concern. (707.825.1027)
  5. Health insurance portability & accountability act.
Down
  1. Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others.
  2. Computer security
  3. It is our job to _______ our clients health record.
  4. Verify this for every client every time (3 words)
  5. An official inspection of an individual's or organization's accounts.
  6. Protected health information.

11 Clues: Computer securityProtected health information.Never share your ________ with anyone.Verify this for every client every time (3 words)Health insurance portability & accountability act.It is our job to _______ our clients health record.An official inspection of an individual's or organization's accounts....

NCSAM 2024-08-27

NCSAM crossword puzzle
Across
  1. duh
  2. duh2
  3. duh3
Down
  1. duh4

4 Clues: duhduh4duh2duh3

Cyber-Attacks 2022-01-13

Cyber-Attacks crossword puzzle
Across
  1. a spoof or look-alike website
  2. the most common way hackers gain entry to a company's computer network
  3. personally identifiable information
  4. everyone's responsibility to protect company information and assets
Down
  1. an add on to enhance function of browser
  2. software that locks up a computer system and then demands a payment to unlock it
  3. software designed to harm computer
  4. fraudulent emails designed to obtain PII

8 Clues: a spoof or look-alike websitesoftware designed to harm computerpersonally identifiable informationan add on to enhance function of browserfraudulent emails designed to obtain PIIeveryone's responsibility to protect company information and assetsthe most common way hackers gain entry to a company's computer network...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Techniques 2024-11-06

Cybersecurity Techniques crossword puzzle
Across
  1. A protocol designed to provide privacy and security over the internet by encapsulating traffic
  2. The latest security protocol for Wi-Fi, enhancing protections against attacks.
  3. An advanced Linux technology used for monitoring and packet observability in real-time.
  4. A term related to busting common misconceptions in the open and secure cyberspace.
Down
  1. Data collected from devices or systems for monitoring and analysis, used in intelligent security
  2. Malicious software designed to infiltrate or damage computer systems.
  3. The practice of collecting, analyzing, and preserving digital evidence.

7 Clues: Malicious software designed to infiltrate or damage computer systems.The practice of collecting, analyzing, and preserving digital evidence.The latest security protocol for Wi-Fi, enhancing protections against attacks.A term related to busting common misconceptions in the open and secure cyberspace....

SecuritySquares-Advanced 2023-03-03

SecuritySquares-Advanced crossword puzzle
Across
  1. 01101100 01101111 01110111 01100101 01110011 00001010
  2. A piece of code put in to fix an error
  3. Unique string of numbers that identifies a device connected to a network
  4. Intent to do harm
  5. The second in CIA triad
  6. When an attacker tricks users into clicking on hidden elements
  7. A characteristic or distinctive pattern that can be searched for
  8. Rivest-Shamir-Adleman
  9. Pay or else
  10. A type of media manipulation
Down
  1. A White hat hacker
  2. Converting enciphered text to plain text
  3. Unique identifier assigned to a NIC
  4. The use of mathematical techniques to provide security services
  5. A scam without a rod and reel but with voice mail
  6. The process of uncovering trends and patterns in large amounts of data
  7. Information Technology Infrastructure Library
  8. The process for overseeing the cybersecurity teams

18 Clues: Pay or elseIntent to do harmA White hat hackerRivest-Shamir-AdlemanThe second in CIA triadA type of media manipulationUnique identifier assigned to a NICA piece of code put in to fix an errorConverting enciphered text to plain textInformation Technology Infrastructure LibraryA scam without a rod and reel but with voice mail...

Information Security 2022-09-29

Information Security crossword puzzle
Across
  1. A type of malware that records every single press of the keyboard that you make
  2. A key only used by one individual to decrypt
  3. A key that can be used by anyone to encrypt messages
  4. Gaining unauthorised access to or control of a computer system
  5. A trap for cybersecurity criminals
  6. Bullying that takes place online
  7. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
  8. Special viruses that move from computer to computer without human action
  9. Impersonation of email address or device to gain unauthorized access to information or systems
  10. Copy of data
  11. Hacking to try and champion a cause, e.g. climate change, rather than to steal information
  12. A weaknesses in computers
  13. scrambled data
  14. Ethical hacking in order to find any cybersecurity weaknesses
  15. Raw data that is put into context and has meaning
Down
  1. core of an operating system
  2. General term for programs that gains access to your system for unethical reasons
  3. Email that contains a message with a suspicious link designed to steal personal information
  4. annoying malware that spams you with ads
  5. Software that protects computers from virus related harm
  6. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
  7. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
  8. Malicious code typically disguised as a legitimate program
  9. To take advantage of a system's weakness
  10. I am not a robot
  11. Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
  12. Secretly watches computer activity
  13. Collection of malware infested computers that form a network to attack
  14. Electronic messages sent through the internet
  15. Readable data
  16. Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  17. An internal security team that defends against both real attackers and Red Teams

32 Clues: Copy of dataReadable datascrambled dataI am not a robotA weaknesses in computerscore of an operating systemBullying that takes place onlineA trap for cybersecurity criminalsSecretly watches computer activityannoying malware that spams you with adsTo take advantage of a system's weaknessA key only used by one individual to decrypt...

30 2023-06-06

30 crossword puzzle
Across
  1. - Online storage and computing services
  2. - Uniform Resource Locator, the address of a web page
  3. - Measures to protect computer systems and data from digital threats
  4. - Buying and selling goods or services online
  5. - Component that stores electrical energy
  6. - Conductive material for transmitting electricity
  7. - Device that changes the voltage of an electrical current
Down
  1. - Device that stores and provides electrical energy
  2. - Electrical socket for connecting devices to the power supply
  3. - Safety device that breaks the circuit when current exceeds a certain level
  4. - Complete path for electrical current
  5. - Device used to control the flow of electrical current
  6. - Component that restricts the flow of electricity

13 Clues: - Complete path for electrical current- Online storage and computing services- Component that stores electrical energy- Buying and selling goods or services online- Component that restricts the flow of electricity- Conductive material for transmitting electricity- Device that stores and provides electrical energy...

Isa usando un crusigrama 2020-08-21

Isa usando un crusigrama crossword puzzle
Across
  1. te protege de el coronavirus y lo usas al tener contacto con la gente
  2. para enmarcar una foto
  3. hace que estes prevenido de lo que le pueden hacer a la computadora
  4. infectan archivos y destruyen datos de tu computadora
  5. donde guardas mucho informacion, fotos y muchas cosas tuyas
  6. para no dañarte los ojos al tomar sol
Down
  1. una enfermedad que genero una pandemia
  2. es donde esta tu rutina y te la recuerda al mirarlo
  3. para emprolijarte el pelo
  4. te despierta o te recuerda algo

10 Clues: para enmarcar una fotopara emprolijarte el pelote despierta o te recuerda algopara no dañarte los ojos al tomar soluna enfermedad que genero una pandemiaes donde esta tu rutina y te la recuerda al mirarloinfectan archivos y destruyen datos de tu computadoradonde guardas mucho informacion, fotos y muchas cosas tuyas...

Team - AllSafe 2022-03-27

Team - AllSafe crossword puzzle
Across
  1. Data that can identify a specific individual
  2. What's common between Aetnaand cyber security? (Clue: Important to save money)
  3. Compliance standard to safeguard health information
  4. An off-site attack surface (Clud: Most SaaS platforms use this service)
  5. a person who exposes information that is deemed illegal/private (Clue: cybersecurity researcher who alerted CVS of the breach)
Down
  1. A social engineering attack
  2. Risk assessment of vendors, suppliers, partners, contractors, or service providers
  3. Head of information security program
  4. Method to reduce human error
  5. Electronically-stored health information

10 Clues: A social engineering attackMethod to reduce human errorHead of information security programElectronically-stored health informationData that can identify a specific individualCompliance standard to safeguard health informationAn off-site attack surface (Clud: Most SaaS platforms use this service)...

WeWork 109NBR - Know Your Neighbours! 2024-08-30

WeWork 109NBR - Know Your Neighbours! crossword puzzle
Across
  1. Singaporean home cleaning service provider
  2. European cybersecurity company
  3. Their software helps you to manage (real estate) properties
  4. Barbie and Hot Wheels toy company
Down
  1. Has an exhibition at the Funan Underground Pedestrian Link @ B2, owner of hit series ‘The King’s Avatar’
  2. Sea creature or digital marketing platform?
  3. Yuu rewards club creator (hint: check Apple/Google Play store)
  4. Temasek founded AI-powered computer vision application
  5. Global banking company, good for currency exchange
  6. Payments platform for Boost, McDonalds and Dunkin Donuts

10 Clues: European cybersecurity companyBarbie and Hot Wheels toy companySingaporean home cleaning service providerSea creature or digital marketing platform?Global banking company, good for currency exchangeTemasek founded AI-powered computer vision applicationPayments platform for Boost, McDonalds and Dunkin Donuts...

Info - security 2017-11-27

Info - security crossword puzzle
Across
  1. be attentive
  2. lure someone
  3. name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
  4. protect networks, computers, programs and data from attack
  5. should not be shared
  6. monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. designed to detect and destroy computer viruses
  2. exploit weaknesses to gain access
  3. malicious software designed to block access to a computer system until a sum of money is paid.
  4. protects personal data published via the Internet

10 Clues: be attentivelure someoneshould not be sharedexploit weaknesses to gain accessdesigned to detect and destroy computer virusesprotects personal data published via the Internetprotect networks, computers, programs and data from attackmalicious software designed to block access to a computer system until a sum of money is paid....

Profesi dan peluang usaha di bidang tkjt 2023-11-17

Profesi dan peluang usaha di bidang tkjt crossword puzzle
Across
  1. seseorang yang ahli dalam membuat animasi
  2. seseorang yang mengembangkan sebuah aplikasi atau sistem pada komputer
  3. DBA termasuk singkatan dari
  4. bentuk perlindungan terhadap sistem yang terhubung ke internet
  5. melakukan instalasi dan konfigurasi adalah tugas?
Down
  1. seseorang yang ahli dalam bidang perfilm an atau video
  2. menganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?
  3. seseorang yang ahli dalam mengedit video lalu menguploadnya ke sosial media disebut
  4. orang yang membuat poster,logo, disebut?
  5. peluang usaha yang membantu orang lain dan orang lain melakukan pembayaran terlebih dahulu

10 Clues: DBA termasuk singkatan dariorang yang membuat poster,logo, disebut?seseorang yang ahli dalam membuat animasimelakukan instalasi dan konfigurasi adalah tugas?seseorang yang ahli dalam bidang perfilm an atau videobentuk perlindungan terhadap sistem yang terhubung ke internetmenganalisa, menyusun, dan menerapkan sistem termasuk tugas seorang?...

Crossword #7 2023-11-07

Crossword #7 crossword puzzle
Across
  1. A Brazilian type of music that will be performed by the Connection Trio.
  2. Production of this play has been delayed due to a COVID outbreak.
  3. The conference in which Marshall athletics compete
  4. A magic dragon.
Down
  1. Men's soccer faces this team this week.
  2. Education of this will be a part of the 4th Avenue Innovation Center
  3. A low battery will need a ________
  4. No.0 on the men's basketball team.
  5. Declared war on Hamas leading to unrest on campuses across the nation
  6. Science, Technology,Engineering and Mathematics.

10 Clues: A magic dragon.A low battery will need a ________No.0 on the men's basketball team.Men's soccer faces this team this week.Science, Technology,Engineering and Mathematics.The conference in which Marshall athletics competeProduction of this play has been delayed due to a COVID outbreak....

Cybersecurity Awareness Crossword (2018) 2018-07-29

Cybersecurity Awareness Crossword (2018) crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. Information Security is a _______ issue.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  5. This can slow down your computer and watch everywhere you go on the Internet.
  6. _______ your computer when left unattended.
  7. _______ before you click or forward.
Down
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  4. Cybersecurity is _______'s responsibility.
  5. You should always keep your software and anti-virus definitions up-to-_______.
  6. Do not provide your _______ email account to social networks.
  7. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  8. Always use _______ factor authentication where available.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Cybersecurity Awareness Month Crossword 2023-09-18

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A security process that requires users to provide two different authentication factors before gaining access.
  2. Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
  3. Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
  4. An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
  5. Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
  6. A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
  7. A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
  8. An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
  1. An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
  2. The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
  3. The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
  4. The process of examining network traffic to identify anomalies and potential security threats.
  5. Software designed to detect, prevent, and remove malicious software from a computer or network.
  6. A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
  7. A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.

15 Clues: The process of examining network traffic to identify anomalies and potential security threats.Software designed to detect, prevent, and remove malicious software from a computer or network.The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality....

Knowledge Adventure Crossword Puzzle 2023-06-18

Knowledge Adventure Crossword Puzzle crossword puzzle
Across
  1. Measures to protect digital information.
  2. A reference to a source of information
  3. Online location with webpages.
  4. Connected to or available on the internet.
Down
  1. A structured collection of data accessible in various formats
  2. A significant word or term used in searching for information)
  3. A software program used to search for information on the interne
  4. Content that includes various forms of media.
  5. Legal protection for original creative works to prevent unauthorized use or copying.

9 Clues: Online location with webpages.A reference to a source of informationMeasures to protect digital information.Connected to or available on the internet.Content that includes various forms of media.A structured collection of data accessible in various formatsA significant word or term used in searching for information)...

Cybersecurity Awareness Month Crossword Puzzle 2022-09-15

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. Technology Field concerned with social media privacy.
  2. A message sent on Twitter.
  3. A platform founded by Mark Zuckerburg.
Down
  1. A self portrait taken by using the front camera.
  2. A network for online picture sharing.
  3. The fastest growing social media platform.
  4. An act that can be made by a Facebook user.

7 Clues: A message sent on Twitter.A network for online picture sharing.A platform founded by Mark Zuckerburg.The fastest growing social media platform.An act that can be made by a Facebook user.A self portrait taken by using the front camera.Technology Field concerned with social media privacy.

'Digital' Crossword 2019-07-07

'Digital' Crossword crossword puzzle
Across
  1. Highly digitized and connected production facility that relies on smart manufacturing
  2. Interconnected Digital Technologies for better customer experience
  3. ASTM F2792
  4. Systematic computational analysis of data or statistics
  5. Network of Internet connected objects able to collect and exchange data
  6. Digital version of a physical asset and/or process
  7. Integration of digital information with live video or the user's environment in real time
  8. Network of remote servers hosted on the Internet to store, manage, and process data
  9. Small autonomous services that work together
Down
  1. Simulated Intelligence in machines
  2. Massive Volume of Data inundated daily
  3. Robotic Process Automation
  4. Processing Quantum Bits of Data
  5. Techniques of protecting computers, networks, programs and data from unauthorized access or attacks
  6. Digital records of transaction

15 Clues: ASTM F2792Robotic Process AutomationDigital records of transactionProcessing Quantum Bits of DataSimulated Intelligence in machinesMassive Volume of Data inundated dailySmall autonomous services that work togetherDigital version of a physical asset and/or processSystematic computational analysis of data or statistics...

Planet of Nico 2021-12-09

Planet of Nico crossword puzzle
Across
  1. it's our secret word
  2. your favorite youtuber
  3. they keep you happy as long as you feed them with water
  4. our happiest place in the world
  5. the most beautiful instrument
  6. juan's best friend that eats a lot of croquettes
  7. basically what you do everyday
Down
  1. you love making them whenever you have the most beautiful view
  2. it's the most delicious kind of sandwich in the world
  3. you go there to clean your mind for a while
  4. you can sometimes eat it with some bubble tea
  5. it's the most handsome and smart man in the world
  6. you love doing this and it makes you learn a lot
  7. they're fluffy and they need belly pets

14 Clues: it's our secret wordyour favorite youtuberthe most beautiful instrumentbasically what you do everydayour happiest place in the worldthey're fluffy and they need belly petsyou go there to clean your mind for a whileyou can sometimes eat it with some bubble teajuan's best friend that eats a lot of croquettes...

SBU TBP Crossword 10/5 2022-10-04

SBU TBP Crossword 10/5 crossword puzzle
Across
  1. Species with the most genetic similarity to humans.
  2. Series of educational lectures hosted by Tau Beta Pi.
  3. Protection against unauthorized electronic data access.
  4. Process of converting data into a code for protection.
Down
  1. Mathematical function without "in-between" values.
  2. Longest bone in the human body.
  3. A structure consisting of beams connected in triangular shapes.
  4. ____'s constant gives the relationship between the energy and frequency of a photon.
  5. Third most common element in the universe.

9 Clues: Longest bone in the human body.Third most common element in the universe.Mathematical function without "in-between" values.Species with the most genetic similarity to humans.Series of educational lectures hosted by Tau Beta Pi.Process of converting data into a code for protection.Protection against unauthorized electronic data access....

TBP FL-D 10/23 2023-10-23

TBP FL-D 10/23 crossword puzzle
Across
  1. Type of current produced by solar panels.
  2. The c in E=mc^2.
  3. Amount of heat required to raise temperature by 1 degree Celsius.
Down
  1. Type of engineer responsible for harnessing electricity.
  2. This cat may or may not be alive.
  3. Building with the most popular bathroom on UCF campus.
  4. Plastic polymer that can be recycled and reformed into another shape
  5. The cybersecurity team that works to defend an organization.
  6. Support structure that uses triangles.

9 Clues: The c in E=mc^2.This cat may or may not be alive.Support structure that uses triangles.Type of current produced by solar panels.Building with the most popular bathroom on UCF campus.Type of engineer responsible for harnessing electricity.The cybersecurity team that works to defend an organization....

Thinklogic 2021-09-13

Thinklogic crossword puzzle
Across
  1. DX
  2. CX
Down
  1. Salesguy
  2. Search Engine

4 Clues: DXCXSalesguySearch Engine

Cybersecurity Fundamentals Chapter 4 2022-10-25

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
  2. fundamental component of ipsec virtual private networks (vpn).
  3. actual barriers deployed to prevent direct contact with systems.
  4. way to store and transmit data so only the intended recipient can read or process it.
  5. to encrypt and decrypt messages.
  6. has a fixed block size of 128, 192 or 256 bits.
  7. use one key to encrypt data and a different key to decrypt data.
  8. implementing cryptography into a web browser.
  9. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
  1. hardware and software solutions used to manage access resources and systems.
  2. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
  3. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  4. science of making and breaking secret codes.
  5. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
  6. a protocol that provides a secure remote access connection to network devices.

15 Clues: to encrypt and decrypt messages.science of making and breaking secret codes.implementing cryptography into a web browser.has a fixed block size of 128, 192 or 256 bits.fundamental component of ipsec virtual private networks (vpn).actual barriers deployed to prevent direct contact with systems....

Cybersecurity Awareness Month - 2024 2024-10-09

Cybersecurity Awareness Month - 2024 crossword puzzle
Across
  1. - When somebody sends an e-mail with a link to a bogus website it is called
  2. - Destroying the cause of security incident with powerful process or technique is which stage of incident response
  3. - Protecting the data against unauthorized access or disclosure is
  4. - Its a type of malware that disguises itself as legitimate code.
  5. Control - Data security process that enables organizations to manage who is authorized to use/process/store data and resources.
  6. - This can slow down your computer AND watch everywhere you go on the internet
  7. - Data that is used to Identify specific individual
  8. - Impact of Threat exploiting a vulnerability is known as
Down
  1. - The control that you have over your personal information and how that information is used
  2. - A globally accepted and recognized standard for cyber security is
  3. - Three principles of ISMS are Confidentiality, ____ and Availability
  4. - Critical security component that determines what resources a user can access and what actions they can perform
  5. - An event that impacts the organization and requires a response and recovery.
  6. -PII Bank information falls under which category of data classification.
  7. - Unique sets of characters used to authenticate user identity and protect personal data or system access.

15 Clues: - Data that is used to Identify specific individual- Impact of Threat exploiting a vulnerability is known as- Its a type of malware that disguises itself as legitimate code.- Protecting the data against unauthorized access or disclosure is- A globally accepted and recognized standard for cyber security is...

Easy Cyber Security 2021-11-28

Easy Cyber Security crossword puzzle
Across
  1. the topic is
  2. not fishing but
  3. I should open every attachment I get
  4. Bad software that infects your computer is called ______
  5. the people who attack us are called ______
Down
  1. A ____ breech is when a criminal steals confidential information
  2. you can't use your computer until you pay because you have _______
  3. I should always use a ______ password
  4. you get an email from someone you don't know asking you to open an attachment it is a

9 Clues: the topic isnot fishing butI should open every attachment I getI should always use a ______ passwordthe people who attack us are called ______Bad software that infects your computer is called ______A ____ breech is when a criminal steals confidential informationyou can't use your computer until you pay because you have _______...

Rush Health Cybersecurity 2020-02-24

Rush Health Cybersecurity crossword puzzle
Across
  1. Malicious software that is implanted into a computer to disable, infect or allow to be remotely controlled by a hacker.
  2. Type of attack to steal username and password
  3. Type of unwanted emails
  4. a standalone malware computer program that replicates itself in order to spread to other computers
  5. Someone that does harm to a computer
  6. Scrambling information so that only those with the keys can read it
Down
  1. Type of malware that requires a ransom to remove the malware.
  2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  3. any software program in which advertising banners are displayed while the program is running.
  4. Something that can harm your computer

10 Clues: Type of unwanted emailsSomeone that does harm to a computerSomething that can harm your computerType of attack to steal username and passwordType of malware that requires a ransom to remove the malware.Scrambling information so that only those with the keys can read it...