cybersecurity Crossword Puzzles

All Things Cybersecurity 2021-03-31

All Things Cybersecurity crossword puzzle
Across
  1. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. Small files that Web sites put on your computer hard disk drive when you first visit.
  3. Algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
  4. Someone who seeks and exploits weaknesses in a computer system or computer network.
Down
  1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  2. The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  3. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  4. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  5. An attempt by hackers to damage or destroy a computer network or system.
  6. A local or restricted communications network, especially a private network created using World Wide Web software.

10 Clues: An attempt by hackers to damage or destroy a computer network or system.Someone who seeks and exploits weaknesses in a computer system or computer network.Small files that Web sites put on your computer hard disk drive when you first visit....

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. Software used to protect against viruses and malware.
  2. A program that replicates itself and spreads to other computers.
  3. An organization that identifies security flaws in software.
  4. An encrypted connection between a web browser and a server.
  5. A technique to deceive individuals into providing sensitive information.
  6. A type of attack that floods a network to disrupt its operation.
Down
  1. A system that verifies a user's identity through a unique physical characteristic.
  2. A secret code that only authorized parties should be able to read.
  3. The practice of keeping software up to date to protect against vulnerabilities.
  4. A sequence of characters used to authenticate identity or access.

10 Clues: Software used to protect against viruses and malware.An organization that identifies security flaws in software.An encrypted connection between a web browser and a server.A program that replicates itself and spreads to other computers.A type of attack that floods a network to disrupt its operation....

Basic cybersecurity terms 2024-07-29

Basic cybersecurity terms crossword puzzle
Across
  1. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
  2. The process of converting information or data into a code, especially to prevent unauthorized access.
  3. A security process that verifies the identity of a user or device attempting to access a system.
  4. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  2. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  5. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

10 Clues: A security process that verifies the identity of a user or device attempting to access a system.Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity Basics #1 2024-09-17

Cybersecurity Basics #1 crossword puzzle
Across
  1. The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
  2. Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
  3. Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
  4. Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
  1. Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
  2. Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
  3. A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
  4. A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
  5. To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
  6. To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.

10 Clues: Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only....

Technological Progress 2024-03-09

Technological Progress crossword puzzle
Across
  1. Meeting present needs without compromising future resources
  2. Transmitting information over a distance by electronic means
  3. The use of living systems and organisms to develop products
  4. The use of machines to perform tasks without human intervention
  5. The process of introducing new ideas or methods
Down
  1. Protecting computers and networks from theft or damage
  2. Designing, constructing, and using robots
  3. A secure, shared digital ledger for recording transactions
  4. A set of rules to solve problems or perform computations

9 Clues: Designing, constructing, and using robotsThe process of introducing new ideas or methodsProtecting computers and networks from theft or damageA set of rules to solve problems or perform computationsA secure, shared digital ledger for recording transactionsMeeting present needs without compromising future resources...

CYBER SECURITY 2023-12-27

CYBER SECURITY crossword puzzle
Across
  1. Software update designed to fix security vulnerabilities.
  2. Interconnected computers facilitating communication and data exchange.
  3. Measures to protect computer systems from attacks.
  4. Hint: Verifying the identity of a user through passwords or biometrics.
  5. Secret code for user access.
  6. Deceptive emails or websites aiming to steal data.
  7. breach Unauthorized access leading to the exposure of sensitive information.
Down
  1. Software designed to harm or exploit computer systems.
  2. Software designed to detect and remove malicious programs.
  3. Converts sensitive information into a secret code.
  4. Unauthorized access or breach into a system.
  5. Deliberate exploitation of computer systems for malicious purposes.
  6. Acts as a digital barrier to unauthorized access.
  7. Requires two forms of identification for access.
  8. Hint: Weakness in a system that could be exploited by attackers.

15 Clues: Secret code for user access.Unauthorized access or breach into a system.Requires two forms of identification for access.Acts as a digital barrier to unauthorized access.Converts sensitive information into a secret code.Measures to protect computer systems from attacks.Deceptive emails or websites aiming to steal data....

DTIN- Final Crossword Part 2 2024-03-21

DTIN- Final Crossword Part 2 crossword puzzle
Across
  1. Type of digital currency that uses cryptography
  2. Methodology promoting continuous iteration of development
  3. Style of education through electronic and online media
  4. Network of physical objects connected to the internet
  5. Field involving analysis of raw data to draw conclusions
  6. Platforms for social interaction and content sharing
  7. Term for currency available only in digital form
  8. Large and complex data sets that are difficult to process
  9. Delivery of computing services over the internet
Down
  1. Decentralized ledger technology behind cryptocurrencies
  2. Simulated experience that can be similar to or different from the real world
  3. Protection of internet-connected systems from cyber threats
  4. Mobile phone with advanced features and connectivity
  5. Record of one's internet usage and online activities
  6. AI subset involving algorithms that learn over time

15 Clues: Type of digital currency that uses cryptographyTerm for currency available only in digital formDelivery of computing services over the internetAI subset involving algorithms that learn over timeMobile phone with advanced features and connectivityRecord of one's internet usage and online activitiesPlatforms for social interaction and content sharing...

Cybersecurity e I.A. 2024-05-23

Cybersecurity e I.A. crossword puzzle
Across
  1. riconoscimento online
  2. parola d'accesso
  3. "pescare" dati finanziari e codici di accesso di un utente
  4. veniva definito "virus per computer"
  5. attività criminale tramite dispositivi digitali
Down
  1. anche detto Anti-Malware
  2. Tra LAN e WAN
  3. tratta di scritture nascoste
  4. punto debole di un sistema
  5. manovra offensiva contro sistemi informatici

10 Clues: Tra LAN e WANparola d'accessoriconoscimento onlineanche detto Anti-Malwarepunto debole di un sistematratta di scritture nascosteveniva definito "virus per computer"manovra offensiva contro sistemi informaticiattività criminale tramite dispositivi digitali"pescare" dati finanziari e codici di accesso di un utente

Cybersecurity Revision Quiz 2024-10-20

Cybersecurity Revision Quiz crossword puzzle
Across
  1. This is when someone watches over your shoulder to see your private details.
  2. This protects information by turning it into a secret code.
  3. This is when someone is mean or rude online just to upset others.
  4. This is a way to unlock devices using fingerprints or face scans (B________).
Down
  1. This is a sneaky program that spies on your computer activity.
  2. This is someone you can talk to if you're worried about something online. (two words)
  3. This looks like a gift but secretly harms your computer.
  4. This is when someone tricks you into giving personal information.
  5. This is something that all uses need. It is hard to guess and keeps your account safe. (two words)
  6. This software protects your computer from harmful viruses.

10 Clues: This looks like a gift but secretly harms your computer.This software protects your computer from harmful viruses.This protects information by turning it into a secret code.This is a sneaky program that spies on your computer activity.This is when someone tricks you into giving personal information....

CSA Terms 2022-01-13

CSA Terms crossword puzzle
Across
  1. A cybersecurity control framework for cloud computing, used as a tool for the systematic assessment of a cloud implementation
  2. A credential and training program that fills the gap in the market for technical education for cloud IT auditing
  3. A cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
  4. A cloud service model that provides resource pools of virtualized infrastructure, such as compute, network, or storage pools
  5. A program designed to help customers assess and select a CSP through a three-step program of self-assessment, third-party audit, and continuous monitoring
Down
  1. A certificate that is widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
  2. A tool that offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
  3. Union's agency dedicated to achieving a high common level of cybersecurity across Europe
  4. An on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies
  5. A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted

10 Clues: Union's agency dedicated to achieving a high common level of cybersecurity across EuropeA credential and training program that fills the gap in the market for technical education for cloud IT auditingA cloud computing model where a third-party provider delivers hardware and software tools to users over the internet...

Introduction to Cybersecurity 2021-07-13

Introduction to Cybersecurity crossword puzzle
Across
  1. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
  2. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
  3. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
  4. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
  5. MALICIOUS SOFTWARE.
Down
  1. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
  2. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
  3. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
  4. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  5. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.

10 Clues: MALICIOUS SOFTWARE.A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBESOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID....

Introduction to Cybersecurity 2021-07-13

Introduction to Cybersecurity crossword puzzle
Across
  1. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  2. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
  3. MALICIOUS SOFTWARE.
  4. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
  5. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
Down
  1. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
  2. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
  3. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
  4. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
  5. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.

10 Clues: MALICIOUS SOFTWARE.A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBESOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES....

Cybersecurity Week 1 2021-10-05

Cybersecurity Week 1 crossword puzzle
Across
  1. Short for malicious software designed to obtain information from a computer without the user's consent
  2. Protection of information assets within internetworked information systems
  3. Ensures the timely and reliable access and use of information systems
  4. Full use of a vulnerability for the benefit of an attacker
Down
  1. Protection of information from authorized access and disclosure
  2. A protected string of characters that authenticate a computer user to a system
  3. the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
  4. The protection of information from unauthorized modification
  5. A system or combination of systems that enforces a boundary between two or more networks
  6. An individual who attempts to gain unauthorized access to a computer system

10 Clues: Full use of a vulnerability for the benefit of an attackerThe protection of information from unauthorized modificationProtection of information from authorized access and disclosureEnsures the timely and reliable access and use of information systemsProtection of information assets within internetworked information systems...

Cybersecurity Crossword Puzzle 2023-05-25

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Term for sexually explicit material available on the internet
  2. Software designs to damage or gain unauthorized access to a computer system
  3. Act of sending deceptive emails to trick individuals
  4. Every aspect of protecting an organization and its employees and assets against cyber threats
  5. Process of gaining unauthorized access to computer systems
Down
  1. One of the internet abuse effects for teenagers
  2. Act of deliberately using digital communication to harass or intimidate someone
  3. Software designed to protect against malicious software
  4. Practice of protecting information by converting it into a secret code
  5. A secret word or phrase that must be used to gain admission

10 Clues: One of the internet abuse effects for teenagersAct of sending deceptive emails to trick individualsSoftware designed to protect against malicious softwareProcess of gaining unauthorized access to computer systemsA secret word or phrase that must be used to gain admissionTerm for sexually explicit material available on the internet...

Cybersecurity Hex Crossword 2023-11-03

Cybersecurity Hex Crossword crossword puzzle
Across
  1. 43 4C 41 53 53
  2. 43 52 4F 53 53 57 4F 52 44
  3. 50 48 4F 4E 45
  4. 4C 49 46 45
Down
  1. 4C 41 50 54 4F 50 0A
  2. 4D 41 54 48
  3. 54 45 53 54
  4. 43 59 42 45 52
  5. 53 43 48 4F 4F 4C
  6. 46 55 4E

10 Clues: 46 55 4E4D 41 54 4854 45 53 544C 49 46 4543 4C 41 53 5343 59 42 45 5250 48 4F 4E 4553 43 48 4F 4F 4C4C 41 50 54 4F 50 0A43 52 4F 53 53 57 4F 52 44

TPWD Cybersecurity Awareness 2024-10-08

TPWD Cybersecurity Awareness crossword puzzle
Across
  1. A fake email designed to trick users into giving up personal information
  2. A way to verify a person's identity online
  3. A malicious software designed to harm a computer
  4. A software update that fixes vulnerabilities in a program
  5. Software that blocks harmful content from reaching your computer
Down
  1. A security breach that involves unauthorized access to data
  2. A security feature that requires more than one form of verification
  3. A network of infected computers controlled by a hacker
  4. The practice of protecting information from unauthorized access
  5. A set of guidelines for handling sensitive data

10 Clues: A way to verify a person's identity onlineA set of guidelines for handling sensitive dataA malicious software designed to harm a computerA network of infected computers controlled by a hackerA software update that fixes vulnerabilities in a programA security breach that involves unauthorized access to data...

Foundations of Cybersecurity 2024-11-20

Foundations of Cybersecurity crossword puzzle
Across
  1. This device inspects and filters network traffic
  2. the process of converting data into a code
  3. the process of verifying an identity before granting access
  4. the process of encoding information so that only the person that the message was intended for can read it
Down
  1. the practice of sending fake emails
  2. a network of compromised computers that are controlled by a single attacker
  3. a weakness within a computer system
  4. software that is designed to disrupt or damage access to a computer
  5. a type of malicious software that secretly gathers a user's personal data
  6. a type of malware that encrypts a victim's files or locks their device, and then demands payment

10 Clues: the practice of sending fake emailsa weakness within a computer systemthe process of converting data into a codeThis device inspects and filters network trafficthe process of verifying an identity before granting accesssoftware that is designed to disrupt or damage access to a computer...

PAW 2024 Crossword Puzzle 2024-05-17

PAW 2024 Crossword Puzzle crossword puzzle
Across
  1. Check twice that all information is the correct information for the correct person _____ to releasing it.
  2. When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
  3. If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
  4. Always verify the source of an email ___________ clicking open any links.
  5. The patient must be informed of the purpose of the _________, use, or disclosure of their personal health information.
  6. When faxing, ensure that the fax _____-sheet is free of any personal health information.
  7. All access to personal health information must be for a ____ -related need-to-know.
  8. A patient may not only request confidential status for privacy reasons but may also require it for ______ reasons.
  9. If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
Down
  1. ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
  2. Loss of _____ by patients and families may be one of the consequences of a privacy breach.
  3. When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
  4. Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors, including curiosity and a concern about the well-being about others.
  5. All access to personal health information must be limited to what is _________ to perform your job duties.
  6. Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
  7. If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
  8. A strong passphrase should be at least four words and ___________ characters in length.
  9. If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.
  10. Consent must be _________, whether it is written or verbal.

19 Clues: Consent must be _________, whether it is written or verbal.Always verify the source of an email ___________ clicking open any links.All access to personal health information must be for a ____ -related need-to-know.A strong passphrase should be at least four words and ___________ characters in length....

Cybersecurity Decoded 2 2020-07-30

Cybersecurity Decoded 2 crossword puzzle
Across
  1. childhood game
  2. Not canned food
  3. used to fix jeans... or software
  4. Dr's are known to have the messiest ones
  5. the iron giant
  6. Fake mustache, trench coat, sunglasses
Down
  1. they come out after the rain
  2. type of cleanliness
  3. sugar comes in these
  4. Troy's downfall

10 Clues: childhood gamethe iron giantNot canned foodTroy's downfalltype of cleanlinesssugar comes in thesethey come out after the rainused to fix jeans... or softwareFake mustache, trench coat, sunglassesDr's are known to have the messiest ones

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. A technique to deceive individuals into providing sensitive information.
  2. Software used to protect against viruses and malware.
  3. A sequence of characters used to authenticate identity or access.
  4. A program that replicates itself and spreads to other computers.
  5. An encrypted connection between a web browser and a server.
Down
  1. The practice of keeping software up to date to protect against vulnerabilities.
  2. A system that verifies a user's identity through a unique physical characteristic.
  3. A secret code that only authorized parties should be able to read.
  4. A type of attack that floods a network to disrupt its operation.
  5. An organization that identifies security flaws in software.

10 Clues: Software used to protect against viruses and malware.An organization that identifies security flaws in software.An encrypted connection between a web browser and a server.A type of attack that floods a network to disrupt its operation.A program that replicates itself and spreads to other computers....

Cybersecurity e I.A. 2024-05-23

Cybersecurity e I.A. crossword puzzle
Across
  1. riconoscimento online
  2. parola d'accesso
  3. "pescare" dati finanziari e codici di accesso di un utente
  4. veniva definito "virus per computer"
  5. attività criminale tramite dispositivi digitali
Down
  1. anche detto Anti-Malware
  2. Tra LAN e WAN
  3. tratta di scritture nascoste
  4. punto debole di un sistema
  5. manovra offensiva contro sistemi informatici

10 Clues: Tra LAN e WANparola d'accessoriconoscimento onlineanche detto Anti-Malwarepunto debole di un sistematratta di scritture nascosteveniva definito "virus per computer"manovra offensiva contro sistemi informaticiattività criminale tramite dispositivi digitali"pescare" dati finanziari e codici di accesso di un utente

Cybersecurity Intro Vocabulary 2023-09-07

Cybersecurity Intro Vocabulary crossword puzzle
Across
  1. the avenue or path the hacker uses to commit the attack
  2. usually operates outside the law
  3. a hacker who is generally ethical and law-abiding.
  4. the act of circumventing or breaking past security boundaries.
Down
  1. process of protecting a system against unintended or malicious changes or use
  2. a malicious software code that is unleashed and attempts to perform its destructive content
  3. an attempt to steal, damage, or destroy data or a computer system
  4. a person who engages in hacking
  5. They do no harm, but they don't ask permission
  6. hacking into a phone system

10 Clues: hacking into a phone systema person who engages in hackingusually operates outside the lawThey do no harm, but they don't ask permissiona hacker who is generally ethical and law-abiding.the avenue or path the hacker uses to commit the attackthe act of circumventing or breaking past security boundaries....

Cybersecurity Awareness Puzzle 2023-09-20

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. ______ is a type of phishing that uses voice calls to manipulate a target.
  2. Type of malware that threatens to expose information unless a payment is made.
  3. Cyber defense agency that is hosting National Cybersecurity Awareness Month.
  4. Social engineering tactic that research is done on the victim to personalize the attack.
  5. Cybercrime tactic that disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
Down
  1. A new social engineering attack involves QR codes and is a form of a *ishing attacks.
  2. According to SANS 2023 Security Awareness Report: Managing Human Risk, social __________ related attacks are the number one top risk to an organization.
  3. Amazon devices, Ring doorbells, Fitbit watches, and smart tvs are ________ devices and require software updates to maintain safety.
  4. A ________ manager is best the way to create and maintain strong passwords.
  5. In 2023, this brand name was abused the most in phishing attacks.

10 Clues: In 2023, this brand name was abused the most in phishing attacks.______ is a type of phishing that uses voice calls to manipulate a target.A ________ manager is best the way to create and maintain strong passwords.Cyber defense agency that is hosting National Cybersecurity Awareness Month....

C for Cybersecurity 2022-10-08

C for Cybersecurity crossword puzzle
Across
  1. violation detected!
  2. do you have one installed on your system yet?
  3. A proper request always has a ...
  4. **across might come in handy here
  5. spotting threats on the go
Down
  1. feature that works 24 x 7 (6,2)
  2. explore solutions on your own **(2,Down)
  3. might as well be maleficent
  4. is always a target, keep it safe!
  5. delegate this work, please

10 Clues: violation detected!delegate this work, pleasespotting threats on the gomight as well be maleficentfeature that works 24 x 7 (6,2)is always a target, keep it safe!A proper request always has a ...**across might come in handy hereexplore solutions on your own **(2,Down)do you have one installed on your system yet?

Cybersecurity Decoded 1 2020-07-30

Cybersecurity Decoded 1 crossword puzzle
Across
  1. childhood game
  2. the iron giant
  3. used to fix jeans... or software
  4. Not canned food
  5. Dr's are known to have the messiest ones
Down
  1. they come out after the rain
  2. type of cleanliness
  3. Troy's downfall
  4. sugar comes in these
  5. Fake mustache, trench coat, sunglasses

10 Clues: childhood gamethe iron giantTroy's downfallNot canned foodtype of cleanlinesssugar comes in thesethey come out after the rainused to fix jeans... or softwareFake mustache, trench coat, sunglassesDr's are known to have the messiest ones

Cybersecurity First Principles 2016-06-14

Cybersecurity First Principles crossword puzzle
Across
  1. less complicated, less problems
  2. multiple layers of defense protect information
  3. to simplify and decrease the number of ways the software can be exploited
  4. privilege level which limits what access people have to your resources
Down
  1. any attempt to prevent people from being able to see information
  2. keeping information worlds from colliding
  3. keeping processes separated prevents the failure of one process from negatively impacting another
  4. resources - hardware, system objects, or processes - must be separated and used as intended
  5. able to be inserted or removed from a project
  6. summarizing or explaining in a way that can be easily understood

10 Clues: less complicated, less problemskeeping information worlds from collidingable to be inserted or removed from a projectmultiple layers of defense protect informationany attempt to prevent people from being able to see informationsummarizing or explaining in a way that can be easily understood...

Cybersecurity crossword puzzle 2023-12-14

Cybersecurity crossword puzzle crossword puzzle
Across
  1. A system that verifies a user's identity through a unique physical characteristic.
  2. A sequence of characters used to authenticate identity or access.
  3. An encrypted connection between a web browser and a server.
  4. An organization that identifies security flaws in software.
  5. A type of attack that floods a network to disrupt its operation.
Down
  1. Software used to protect against viruses and malware.
  2. A technique to deceive individuals into providing sensitive information.
  3. A program that replicates itself and spreads to other computers.
  4. A secret code that only authorized parties should be able to read.
  5. The practice of keeping software up to date to protect against vulnerabilities.

10 Clues: Software used to protect against viruses and malware.An encrypted connection between a web browser and a server.An organization that identifies security flaws in software.A program that replicates itself and spreads to other computers.A type of attack that floods a network to disrupt its operation....

Cybersecurity Awareness Crossword 2024-02-08

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. A program that hurts your computer and tries to split itself among other computers\
  2. Synonym for password
  3. Something you need to improve password security
  4. Searching for private information through the trash
  5. An email pretending to be from a trusted person or organization for nefarious reasons
  6. First word in the acronym "VPN"
  7. The percent of Americans who use the same password
Down
  1. Super common password worldwide
  2. The act of looking over someone's shoulder to steal information
  3. A dishonest scheme

10 Clues: A dishonest schemeSynonym for passwordSuper common password worldwideFirst word in the acronym "VPN"Something you need to improve password securityThe percent of Americans who use the same passwordSearching for private information through the trashThe act of looking over someone's shoulder to steal information...

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

School Safety 2022-11-28

School Safety crossword puzzle
Across
  1. a reason for doing something
  2. national threat assessment center
  3. a statement with intention to inflict, pain, injury, or other hostile action on someone or something
Down
  1. protecting school networks from hackers
  2. document that outlines how a school will prepare, respond and recover
  3. a network security device
  4. a person who carries out a harmful, illegal or immoral act
  5. violence directed at a student, group, or location

8 Clues: a network security devicea reason for doing somethingnational threat assessment centerprotecting school networks from hackersviolence directed at a student, group, or locationa person who carries out a harmful, illegal or immoral actdocument that outlines how a school will prepare, respond and recover...

Crossword Puzzle 2024-06-26

Crossword Puzzle crossword puzzle
Across
  1. Popular brand for laptops and other tech devices, known for its ThinkPad series.
  2. Brand recognized for its audio-visual and computer connectivity products.
  3. Brand known for producing high-quality bags, cases, and other accessories.
  4. Who are we?
Down
  1. Mighty leader in sales Team.
  2. Brand specializing in interactive displays and collaboration technology.
  3. Brand famous for its cybersecurity solutions.
  4. Brand known for its Galaxy series of smartphones.

8 Clues: Who are we?Mighty leader in sales Team.Brand famous for its cybersecurity solutions.Brand known for its Galaxy series of smartphones.Brand specializing in interactive displays and collaboration technology.Brand recognized for its audio-visual and computer connectivity products....

Financial literacy 2024-05-10

Financial literacy crossword puzzle
Across
  1. Protection from hacking
  2. First name of the person who is on the cover of our magazine
  3. Scholarships based on athletic or academic achievements
  4. ____ percent go to needs in the 50-30-20 rule.
  5. way to save money
Down
  1. _____ Change; problem for insurance
  2. Go ____ if you've reached the sixth step to home buying
  3. _______ Score; only get to check this a certain amount of times per year

8 Clues: way to save moneyProtection from hacking_____ Change; problem for insurance____ percent go to needs in the 50-30-20 rule.Go ____ if you've reached the sixth step to home buyingScholarships based on athletic or academic achievementsFirst name of the person who is on the cover of our magazine...

Security Awareness 2024-04-16

Security Awareness crossword puzzle
Across
  1. Testing environment.
  2. Protect sensitive information from being leaked by users.
  3. "M" Computer security company.
  4. Most common six-letter word that is used for passwords that doesn't require numbers. or punctuation
  5. Most common cyberattack on internet.
Down
  1. Social __ when actors trick others into revealing sensitive info.
  2. An attack where a person allows themselves to be identified as someone else.
  3. As cybersecurity threats grow, sites include this increased security feature.

8 Clues: Testing environment."M" Computer security company.Most common cyberattack on internet.Protect sensitive information from being leaked by users.Social __ when actors trick others into revealing sensitive info.An attack where a person allows themselves to be identified as someone else....

Cybersecurity Workforce Framework 2020-10-28

Cybersecurity Workforce Framework crossword puzzle
Across
  1. and Operate, Specialized denial and deception operations
  2. and Development, provide leadership, management, direction, an/or development
  3. Provision, Conceptualize, design, and build secure IT systems
Down
  1. and Defend, Identification, analysis and mitigation of threats
  2. Examine cyber events and/or crimes of IT systems
  3. Review and evaluate incoming cybersecurity information
  4. and maintain, Provide support, administration and maintenance

7 Clues: Examine cyber events and/or crimes of IT systemsReview and evaluate incoming cybersecurity informationand Operate, Specialized denial and deception operationsProvision, Conceptualize, design, and build secure IT systemsand Defend, Identification, analysis and mitigation of threatsand maintain, Provide support, administration and maintenance...

Test Puzzle 2021-09-09

Test Puzzle crossword puzzle
Across
  1. highest mountain in the world
  2. What is our country name
  3. type of a cybersecurity act
Down
  1. surname of Global IT CIO
  2. poorest country in the world

5 Clues: surname of Global IT CIOWhat is our country nametype of a cybersecurity actpoorest country in the worldhighest mountain in the world

Weke 15 Vocabulary Quiz 2024-07-06

Weke 15 Vocabulary Quiz crossword puzzle
Across
  1. Protecting computers and networks from attacks or damage.
  2. Changing information into a secret code to keep it safe.
  3. Making something suitable for a particular place or culture.
  4. Discussing something to reach an agreement.
  5. A person who designs, builds, or fixes machines or structures.
  6. Abilities or expertise in doing something well.
  7. "_____ breach". When private information is accessed without permission.
Down
  1. "_____ Skills". The ability to examine things carefully and understand them.
  2. Keeping information private and not sharing it with others.

9 Clues: Discussing something to reach an agreement.Abilities or expertise in doing something well.Changing information into a secret code to keep it safe.Protecting computers and networks from attacks or damage.Keeping information private and not sharing it with others.Making something suitable for a particular place or culture....

Tech and Parenting 2023-12-08

Tech and Parenting crossword puzzle
Across
  1. Time spent in front of screens like computers or phones.
  2. Someone with expertise in technology
  3. Features to restrict or monitor access.
Down
  1. Excessive and compulsive smartphone use.
  2. Protection against digital attacks and theft
  3. A break from digital devices for well-being

6 Clues: Someone with expertise in technologyFeatures to restrict or monitor access.Excessive and compulsive smartphone use.A break from digital devices for well-beingProtection against digital attacks and theftTime spent in front of screens like computers or phones.

Exploring Business Unit 1 Review 2023-09-24

Exploring Business Unit 1 Review crossword puzzle
Across
  1. The set of moral principles by which people conduct themselves
  2. A set of guidelines for maintaining ethics in the workplace
Down
  1. Describes good Internet behavior
  2. The exchange of information between sender and receiver
  3. You get an email or text, its urgent
  4. Attackers ask for $$ or Crypto
  5. The most common form of written communication
  6. The practice of protecting critical systems and sensitive information from digital attacks

8 Clues: Attackers ask for $$ or CryptoDescribes good Internet behaviorYou get an email or text, its urgentThe most common form of written communicationThe exchange of information between sender and receiverA set of guidelines for maintaining ethics in the workplaceThe set of moral principles by which people conduct themselves...

Financial literacy 2024-05-10

Financial literacy crossword puzzle
Across
  1. Protection from hacking
  2. First name of the person who is on the cover of our magazine
  3. Scholarships based on athletic or academic achievements
  4. ____ percent go to needs in the 50-30-20 rule.
  5. way to save money
Down
  1. _____ Change; problem for insurance
  2. Go ____ if you've reached the sixth step to home buying
  3. _______ Score; only get to check this a certain amount of times per year

8 Clues: way to save moneyProtection from hacking_____ Change; problem for insurance____ percent go to needs in the 50-30-20 rule.Go ____ if you've reached the sixth step to home buyingScholarships based on athletic or academic achievementsFirst name of the person who is on the cover of our magazine...

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

STATION X 2023 2023-03-02

STATION X 2023 crossword puzzle
Across
  1. The Diploma in Early Childhood Development & Education (ECDE) course is conducted by the National Institute of Early Childhood_________.
  2. For students pursuing Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______Centre for hands-on-learning.
  3. Ngee Ann Polytechnic is a _____ campus with classrooms including state-of-the-art wireless touchscreen projectors and communication tools.
  4. Ngee Ann Polytechnic has its own radio station: Radio _______.
  5. Students are able to pursue a minor via the ______ Learning Pathway Programme.
  6. Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______.
  7. The 1800-seater _____Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
  8. Common____Programme is now a new programme offered in the School of Film & Media Studies.
  9. The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
  10. Ngee Ann Polytechnic’s Diploma in _____ offers specialisation in Architecture and Product Innovation.
  11. This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass_______.
Down
  1. Ngee Ann Polytechnic is a Poly For Budding _________.
  2. The School of Design & Environment diplomas has a focus on _______.
  3. If a student is interested in cybersecurity, they should pursue Diploma in Cybersecurity & Digital_____from the School of InfoComm Technology.
  4. Located at the Atrium, there is a 24/7 unmanned ______.
  5. ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
  6. _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
  7. Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
  8. A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
  9. Ngee Ann Polytechnic has 3 canteens in total: _____, Makan Place and Food Club.

20 Clues: Ngee Ann Polytechnic is a Poly For Budding _________.Located at the Atrium, there is a 24/7 unmanned ______.Ngee Ann Polytechnic has its own radio station: Radio _______.The School of Design & Environment diplomas has a focus on _______.Ngee Ann Polytechnic has a new Minor offering. It is a Minor in _______....

YTS Kitchen Tour 2024-03-08

YTS Kitchen Tour crossword puzzle
Across
  1. Your Technology Support provided IT team
  2. The easiest way to add phsyical security
  3. Hours support is available to our customers
  4. YTS is a Cisco Meraki partner to install this in your office
  5. #1 Concern of businesses today that costs over $300,000 per incident
  6. A common project YTS can handle for our customers
Down
  1. YTS provides Zoom certified staff to handle setting this up
  2. Level of service YTS provides to all customers
  3. How to prevent phsyical access to unauthorized people

9 Clues: Your Technology Support provided IT teamThe easiest way to add phsyical securityHours support is available to our customersLevel of service YTS provides to all customersA common project YTS can handle for our customersHow to prevent phsyical access to unauthorized peopleYTS provides Zoom certified staff to handle setting this up...

SyberSafety 2021-05-19

SyberSafety crossword puzzle
Across
  1. Something that protects your data on online sites
  2. Being protected against the criminal or unauthorized use of electronic data
  3. An e-mail that has has malware attachments
  4. use of a computer as an instrument to further illegal ends
Down
  1. crime of obtaining the personal or financial information of another person
  2. Nefarious people _ _ _ _ into your computer
  3. malicious software

7 Clues: malicious softwareAn e-mail that has has malware attachmentsNefarious people _ _ _ _ into your computerSomething that protects your data on online sitesuse of a computer as an instrument to further illegal endscrime of obtaining the personal or financial information of another person...

ISSN Day 2 2024-10-08

ISSN Day 2 crossword puzzle
Across
  1. A key skill in IT that involves protecting data
  2. Foundational certification for cybersecurity professionals
  3. Entry-level certification for IT technicians
  4. A type of device that A+ covers
Down
  1. A role that involves helping users with tech problems
  2. Focuses on network fundamentals and infrastructure
  3. unique identifying number assigned to every device connected to the interne

7 Clues: A type of device that A+ coversEntry-level certification for IT techniciansA key skill in IT that involves protecting dataFocuses on network fundamentals and infrastructureA role that involves helping users with tech problemsFoundational certification for cybersecurity professionals...

Joon Xi 8 GAMMA 2023-01-19

Joon Xi 8 GAMMA crossword puzzle
Across
  1. Raw facts and figures. (not data)
  2. Device that everyone bring to school.
  3. A group or system of interconnected people or things.
  4. Is a practice of protecting system, network, and program from digital attack.
Down
  1. Transfer your data to a _______ organisation.
  2. Used fairly, openly, in ______ with the law.
  3. All the social media company have this policy.

7 Clues: Raw facts and figures. (not data)Device that everyone bring to school.Used fairly, openly, in ______ with the law.Transfer your data to a _______ organisation.All the social media company have this policy.A group or system of interconnected people or things.Is a practice of protecting system, network, and program from digital attack.

Cybersecurity Awareness Month - 2023 2023-10-17

Cybersecurity Awareness Month - 2023 crossword puzzle
Across
  1. an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single session
  2. one of the biggest ransomware attacks
  3. an unwanted software designed to throw advertisements up on your screen, most often within a web browser
  4. a set of changes to a computer program or its supporting data designed to update, fix, or improve
  5. a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks
  6. is an authentication method that requires the user to provide two or more verification factors to gain access
Down
  1. a malware that misleads users of its true intent by disguising itself as a standard program
  2. a software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user
  3. designed to detect and destroy computer viruses
  4. validating the user identity
  5. will you stop clicking phishing links?
  6. a self-replicating virus that does not alter files but resides in active memory and duplicates itself
  7. a type of characters that you should use in your passwords
  8. harmful software

14 Clues: harmful softwarevalidating the user identityone of the biggest ransomware attackswill you stop clicking phishing links?designed to detect and destroy computer virusesa type of characters that you should use in your passwordsa malware that misleads users of its true intent by disguising itself as a standard program...

CSE167 Terminology 2022-04-28

CSE167 Terminology crossword puzzle
Across
  1. a conventional encryption method that used a single key encryption
  2. when information kept private and secure
  3. the state of information while it is encrypted
  4. the state of information before it is encrypted
  5. the art of protecting information and information systems
  6. provides verification of identity
Down
  1. when systems are available to those who need them
  2. type of attack that bad actors use to gain information commonly through emails
  3. an encryption method that utilizes a public/private key
  4. two words which is a form of manipulation that bad actors use to gain unauthorized access
  5. records the identities and actives
  6. when the data is not modified

12 Clues: when the data is not modifiedprovides verification of identityrecords the identities and activeswhen information kept private and securethe state of information while it is encryptedthe state of information before it is encryptedwhen systems are available to those who need theman encryption method that utilizes a public/private key...

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

computer security 2021-10-15

computer security crossword puzzle
Across
  1. a study of design of computer equipment
  2. a person who has intention to destroy data
  3. a malicious code which sends out info to hacker
  4. a act of illegal listening to network channel
  5. a system of to protect safeguard network
  6. a secured layer of protocol to encrypt data
  7. a cause of system failure
  8. a computer health issue causing strain in hand
Down
  1. act of tricking user into revealing their info
  2. a person who access computer illegally
  3. a malicious act to slow down service of server
  4. act of making copy of files safely and secure
  5. act of stealing or faking information for hiding
  6. a malicious program which steals data from user
  7. a field of study on computer security
  8. a data protection act law in countries
  9. a program which copies itself repeateadly
  10. moral obligation to use computer with care

18 Clues: a cause of system failurea field of study on computer securitya person who access computer illegallya data protection act law in countriesa study of design of computer equipmenta system of to protect safeguard networka program which copies itself repeateadlymoral obligation to use computer with carea person who has intention to destroy data...

Data Privacy and Cybersecurity 2022-08-15

Data Privacy and Cybersecurity crossword puzzle
Across
  1. This 2020 ballot initiative amended 2 down
  2. This type of document guides an organization's response after a data privacy and security incident
  3. A law firm that guides an organization through a data privacy and security incident
  4. A key "best practice" to implement to mitigate the chance of a successful data privacy and security incident
  5. This European Union law served as the basis for the creation of 2 down
  6. Ransomware is a type of ___ that or other malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files until a ransom is paid
  7. A financial product offered to organizations that can provide immense value in preparing for, and responding to, data privacy and security incidents
  8. An attack that involves targeting, impersonating or taking over business’ email accounts to gain access to critical business information or extract money
Down
  1. Number of comprehensive consumer privacy laws in the United States
  2. The United States' first state-specific consumer privacy law
  3. A third-party ___ incident where sensitive data from an organization is not stolen directly from it, but through one of its third-party vendors
  4. Unauthorized activity on an organization’s digital network
  5. The Advisen 2022 "Cyber Law Firm of the Year"
  6. This year's Cybersecurity Awareness Month theme - "See ___ in Cyber"

14 Clues: This 2020 ballot initiative amended 2 downThe Advisen 2022 "Cyber Law Firm of the Year"Unauthorized activity on an organization’s digital networkThe United States' first state-specific consumer privacy lawNumber of comprehensive consumer privacy laws in the United StatesThis year's Cybersecurity Awareness Month theme - "See ___ in Cyber"...

Cybersecurity Fundamentals Chapter 8 2022-11-08

Cybersecurity Fundamentals Chapter 8 crossword puzzle
Across
  1. US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
  2. poorly enforced security policies, no awareness of security
  3. the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
  4. open source linux security distribution.
  5. disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
  6. a method of testing the areas of weakness in systems by using various malicious techniques.
  7. includes the users who access the organization's information system.
Down
  1. assess computer, computer systems, networks, or applications for weakness.
  2. a non-profit organization that brings together industry, academia and government to address advance cyber threats.
  3. a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
  4. laws prohibit undesired behaviors.
  5. intercept and log network traffic
  6. provides free analysis and warning service to internet users and organizations.
  7. help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.

14 Clues: intercept and log network trafficlaws prohibit undesired behaviors.open source linux security distribution.poorly enforced security policies, no awareness of securityincludes the users who access the organization's information system.assess computer, computer systems, networks, or applications for weakness....

Test IT Crossword 2022-02-14

Test IT Crossword crossword puzzle
Across
  1. Facebook is dead, long live ____
  2. Wasn't a known threat back in 2018, now the bane of businesses.
  3. Often said to be the weakest link in cybersecurity
  4. People are still using ____? What is this, 1983?
  5. Citrix recently announced a merger with this unlikely company
Down
  1. You can find this in every hard disk
  2. Feature that's arguably the best thing about blockchain
  3. AWS headquarters is located here
  4. Sounds like a wholesome activity, but could get you in serious online trouble

9 Clues: AWS headquarters is located hereFacebook is dead, long live ____You can find this in every hard diskPeople are still using ____? What is this, 1983?Often said to be the weakest link in cybersecurityFeature that's arguably the best thing about blockchainCitrix recently announced a merger with this unlikely company...

Malware 2023-03-15

Malware crossword puzzle
Across
  1. A person that wants to take files and important information
  2. A field in IT that keeps data secured and safe
  3. Important information that could be used to impersonate someone else
  4. Many different forms of harmful software
  5. A malicious Software that needs a host in order to work
  6. A system that can be used for work, games, and to hack.
Down
  1. Malicious software designed to imitate normal software
  2. Undiscovered attack
  3. Software to steal data and attempt to sell it back to the user
  4. Raises permissions to access data
  5. Does not need host in order to cause problems and spread

11 Clues: Undiscovered attackRaises permissions to access dataMany different forms of harmful softwareA field in IT that keeps data secured and safeMalicious software designed to imitate normal softwareA malicious Software that needs a host in order to workA system that can be used for work, games, and to hack....

DPAC 2024-07-04

DPAC crossword puzzle
Across
  1. Balancing environmental and economic needs
  2. Organizing resources for efficiency
  3. Protecting systems from digital threats
  4. A fundamental resource essential for powering various activities
Down
  1. Converting processes into digital formats

5 Clues: Organizing resources for efficiencyProtecting systems from digital threatsConverting processes into digital formatsBalancing environmental and economic needsA fundamental resource essential for powering various activities

computer security 2021-10-15

computer security crossword puzzle
Across
  1. a study of design of computer equipment
  2. a person who has intention to destroy data
  3. a malicious code which sends out info to hacker
  4. a act of illegal listening to network channel
  5. a system of to protect safeguard network
  6. a secured layer of protocol to encrypt data
  7. a cause of system failure
  8. a computer health issue causing strain in hand
Down
  1. act of tricking user into revealing their info
  2. a person who access computer illegally
  3. a malicious act to slow down service of server
  4. act of making copy of files safely and secure
  5. act of stealing or faking information for hiding
  6. a malicious program which steals data from user
  7. a field of study on computer security
  8. a data protection act law in countries
  9. a program which copies itself repeateadly
  10. moral obligation to use computer with care

18 Clues: a cause of system failurea field of study on computer securitya person who access computer illegallya data protection act law in countriesa study of design of computer equipmenta system of to protect safeguard networka program which copies itself repeateadlymoral obligation to use computer with carea person who has intention to destroy data...

RAPA - Have you been paying attention? 2023-05-24

RAPA - Have you been paying attention? crossword puzzle
Across
  1. how does Jordan get so swole (8)
  2. the action of obtaining something (11)
  3. the source of news for anything RAPA related (4,5,2)
  4. instrument that Erdem plays (6)
  5. coreys coffee order (trading card) (3,5)
  6. what does Bryce like to paint in his free time (9,9)
  7. free coffees (3,3)
  8. where has Sheila spent the past 5 years working (8,9)
  9. what sport did Siobhan and Richard play (5,6)
Down
  1. what does Josh like to ride in his free time (9)
  2. expose (someone or something valued) to danger, harm, or loss (4)
  3. what Pacific Island did Matt go to for a holiday with his family (5)
  4. one of Gibbo's past jobs (11)
  5. the state of having no protection from something harmful (8)
  6. an official financial inspection (5)
  7. where we are for retreat (11)
  8. how many years has Lucy been cooking for? (6)
  9. cybersecurity tv drama (3,6,3)

18 Clues: free coffees (3,3)one of Gibbo's past jobs (11)where we are for retreat (11)cybersecurity tv drama (3,6,3)instrument that Erdem plays (6)how does Jordan get so swole (8)an official financial inspection (5)the action of obtaining something (11)coreys coffee order (trading card) (3,5)how many years has Lucy been cooking for? (6)...

Cybersecurity Awareness Crossword Puzzle Week 2 2023-10-11

Cybersecurity Awareness Crossword Puzzle Week 2 crossword puzzle
Across
  1. A bot-challenging security feature for online interactions.
  2. Code to fix or enhance software.
  3. Captures keystrokes to gather sensitive information.
  4. Security solution to analyze and detect threats in real-time from diverse data and events.
  5. Collaboration integrating security, automation, and shared responsibility in software development.
  6. Harmful software for gathering information without consent.
  7. A stealthy malware granting unauthorized system access while concealing actions.
  8. Network of devices used for malware distribution, and cyber-attacks.
Down
  1. Email attachments from unknown senders.
  2. A way to bypass authentication, used for unauthorized access or malicious intent.
  3. The most common word used for brute force.
  4. Safeguard sensitive files and communications.
  5. Isolated environment to analyze software behavior.
  6. A U.S. federal agency promoting cybersecurity standards and innovation.

14 Clues: Code to fix or enhance software.Email attachments from unknown senders.The most common word used for brute force.Safeguard sensitive files and communications.Isolated environment to analyze software behavior.Captures keystrokes to gather sensitive information.A bot-challenging security feature for online interactions....

Super U! 2024-09-19

Super U! crossword puzzle
Across
  1. I cannot ... because I’m afraid of water.
  2. I cannot ... poetry because I lack creativity.
  3. I cannot ... because I always burn the food.
  4. I can ... websites because I have a good sense of user experience.
  5. I cannot ... a bike because I have poor balance.
  6. I cannot ... the piano because I have no musical talent.
  7. I can ... because I understand logic structures well.
  8. I cannot ... because I have no rhythm.
  9. I cannot ... because my hands are unsteady.
Down
  1. I can ... networks because I understand cybersecurity protocols.
  2. I cannot ... fast because I have weak legs.
  3. I cannot ... math because numbers confuse me.
  4. I cannot ... soccer because I have no coordination.
  5. I can ... animations because I have a sharp eye for detail.
  6. I can ... videos because I’m good with digital tools.

15 Clues: I cannot ... because I have no rhythm.I cannot ... because I’m afraid of water.I cannot ... fast because I have weak legs.I cannot ... because my hands are unsteady.I cannot ... because I always burn the food.I cannot ... math because numbers confuse me.I cannot ... poetry because I lack creativity.I cannot ... a bike because I have poor balance....

bbb 2023-04-28

bbb crossword puzzle
Across
  1. requires less memory
  2. measure of correctness that is achieved in true prediction.
  3. Identifying similar groups of data in a dataset is called
  4. ls called blind algorithms
  5. if there is a relationship between the input variable and the output variable
Down
  1. machine learning models are trained without labelled data sets
  2. maps any given percept sequence to an action
  3. One of the AI application
  4. is a tabular summary of the number of correct and incorrect predictions made by a classifier
  5. measures how often the classifier makes the correct prediction

10 Clues: requires less memoryOne of the AI applicationls called blind algorithmsmaps any given percept sequence to an actionIdentifying similar groups of data in a dataset is calledmeasure of correctness that is achieved in true prediction.machine learning models are trained without labelled data sets...

C CROSSWORD 2014-02-26

C CROSSWORD crossword puzzle
Across
  1. The enrolled members of "CYBERSECURITY CLUB" were called
  2. they all had received a prank call.
  3. annoyed to see the party hall empty.The members realized that
  4. location. When reached, the invitees were
  5. The squad diffused the bomb and saved everyone . They all came back home .
  6. a common
Down
  1. for a party arranged at
  2. They called the bomb squad and explained the bomb blast planned at 10' clk,
  3. by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
  4. Twice to their surprise they found a paper unknowingly left

10 Clues: a commonfor a party arranged atthey all had received a prank call.location. When reached, the invitees wereThe enrolled members of "CYBERSECURITY CLUB" were calledTwice to their surprise they found a paper unknowingly leftannoyed to see the party hall empty.The members realized that...

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
  3. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  4. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
  1. Jenis Informasi yang merupakan informasi pengetahuan umum
  2. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  3. Prinsip Keamanan Informasi agar akurat
  4. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  5. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  6. Perangkat lunak yang diciptakan untuk merusak sistem computer

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

Technology 2023-08-24

Technology crossword puzzle
Across
  1. Wireless technology that enables data transfer between devices.
  2. Online method of watching videos or listening to audio without downloading i.e., real time digital content.
  3. Secret combination used to access digital accounts.
Down
  1. Mathematical recipe used to solve complex tasks efficiently.
  2. Process of creating instructions for computers to execute tasks.
  3. Practices and technologies used to safeguard digital information from attacks.
  4. Global navigation system that provides location and navigation information.
  5. Malicious software that spreads and infects digital systems.
  6. Computer-based systems that mimic human intelligence.
  7. Money capital of India.

10 Clues: Money capital of India.Secret combination used to access digital accounts.Computer-based systems that mimic human intelligence.Mathematical recipe used to solve complex tasks efficiently.Malicious software that spreads and infects digital systems.Wireless technology that enables data transfer between devices....

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

soal 4.0 2023-10-24

soal 4.0 crossword puzzle
Across
  1. salah satu teknologi di industri 4.0 yang sangat berguna saat ini
  2. Alat Iot yang kegunaanya memudahkan dirumah
  3. Teknologi inti dari Industri 4.0
  4. Sistem dari cyber security yang berguna untuk mengontrol lalu lintas jaringan
  5. Data besar yang kompleks yang dianalisis dalam industri 4.0
  6. Singkatan dari salah satu layanan cloud computing yang bisa diakses dengan menggunakan perangkat lunak melalui internet
Down
  1. Teknologi yang memberikan pelayanan secara luas dan akses internet dimanapun berada
  2. Alat atau kebijakan yang berguna untuk melindungi lingkungan cyber
  3. Praktik yang membangun citra atau reputasi agar dikenali dalam berbagai aspek
  4. Revolusi industri saat ini

10 Clues: Revolusi industri saat iniTeknologi inti dari Industri 4.0Alat Iot yang kegunaanya memudahkan dirumahData besar yang kompleks yang dianalisis dalam industri 4.0salah satu teknologi di industri 4.0 yang sangat berguna saat iniAlat atau kebijakan yang berguna untuk melindungi lingkungan cyber...

Globalisation 2023-03-08

Globalisation crossword puzzle
Across
  1. I __ __ __ __ __ security software to protect against harmful cyberattacks.
  2. With the increase in foreign culture, local culture might be l __ __ __.
  3. H __ __ __ __ __ __ are people who illegally gain access to other people's computer systems.
  4. the interconnectedness of societies.
  5. C__ __ __ __ __ __ __ __ __ __ __ __ protects computers and electronic devices from cyberattacks.
Down
  1. I__ __ __ __ __ __ __ __ __ __ __ in technology contributes to Globalisation.
  2. Better economic situation can lead to b__ __ __ __ __ quality of life.
  3. Globalisation leads to economic, c__ __ __ __ __ __ __ and security impacts.
  4. Globalisation has i__ __ __ __ __ __ __ __ security threats.
  5. M__ __ __ __ __ phones have allowed us to connect with people faster.
  6. F __ __ __ __ __ __ culture has spread throughout the world, such as K-pop.
  7. G__ __ __ __ __ of Multinational Corporations (MNCs) is a factor that drives Globalisation.

12 Clues: the interconnectedness of societies.Globalisation has i__ __ __ __ __ __ __ __ security threats.M__ __ __ __ __ phones have allowed us to connect with people faster.Better economic situation can lead to b__ __ __ __ __ quality of life.With the increase in foreign culture, local culture might be l __ __ __....

Cyber Security Puzzle 2024-10-22

Cyber Security Puzzle crossword puzzle
Across
  1. The process of verifying the identity of a user
  2. A method of disguising data to protect it
  3. A device that helps protect networks by filtering traffic
  4. A breach where sensitive data is accessed unlawfully
  5. A malicious email designed to trick recipients
  6. A protocol used to send emails securely
Down
  1. A common form of malware that locks files
  2. A program that scans for vulnerabilities in systems
  3. A common cybersecurity measure that involves using complex passwords
  4. Software that detects and removes malware
  5. A type of attack where multiple systems are used to overwhelm a target
  6. A legal framework for data protection in the EU

12 Clues: A protocol used to send emails securelyA common form of malware that locks filesA method of disguising data to protect itSoftware that detects and removes malwareA malicious email designed to trick recipientsThe process of verifying the identity of a userA legal framework for data protection in the EU...

Кәмшат 2024-11-19

Кәмшат crossword puzzle
Across
  1. A cloud computing environment designed specifically for one organization?
  2. An infrastructure-as-a-service model?
  3. What is the process of software allocation of computer resources called?
  4. Protecting data and systems from cyber attacks?
  5. The process of automatically adjusting resources based on user demand?
Down
  1. Google's cloud storage service?
  2. A collection of key resources such as networks, servers, hardware?
  3. Special coding process to protect data?
  4. A software-as-a-service model?
  5. What is the process of protecting data from unauthorized access called?
  6. What is the level of service available to users?
  7. A service for hosting websites and applications on the Internet?

12 Clues: A software-as-a-service model?Google's cloud storage service?An infrastructure-as-a-service model?Special coding process to protect data?Protecting data and systems from cyber attacks?What is the level of service available to users?A service for hosting websites and applications on the Internet?...

Managers and Managing Crossword Puzzle 2016-01-16

Managers and Managing Crossword Puzzle crossword puzzle
Across
  1. It's a totally crazy business environment out there today
  2. Achieving goals
  3. A name for direct reports that should no longer be used
  4. What we're using to learn right now
  5. Perhaps the biggest threat to the control function
  6. Manager starts acting like the rules don't apply to him
  7. Term or name that doesn't apply to not-for-profit organizations
  8. What many first-level managers prefer rather than thinking
  9. A common title for a first-line manager, Team ________
Down
  1. The management role that helps direct reports improve their performance / coaching
  2. Dividing up the work that needs to be done
  3. Worker whose boss is your direct report
  4. Accomplishment with minimum effort
  5. Usually the most important type of skill for middle managers

14 Clues: Achieving goalsAccomplishment with minimum effortWhat we're using to learn right nowWorker whose boss is your direct reportDividing up the work that needs to be donePerhaps the biggest threat to the control functionA common title for a first-line manager, Team ________A name for direct reports that should no longer be used...

Mrs Dadd's Bonanza 2023-01-19

Mrs Dadd's Bonanza crossword puzzle
Across
  1. Re-using components instead of throwing them away
  2. The processes and technologies designed to protect networks, computers and programs from attack, damage or unauthorised access
  3. Electronic waste
  4. Tricking people into breaking security procedures
  5. Watching people enter passwords or PINS
  6. Designed to protect creators of books, software, etc from having their work illegally copied
  7. Misinformation which is spread
Down
  1. Stealing data as it is passed across a network
  2. Short for malicious software
  3. Describes the technology that is carried inside the body
  4. One who breaks a systems integrity maliciously
  5. The moral principles which govern attitudes and behaviour
  6. A method of obscuring data so it cannot be read if it is intercepted
  7. One who is intensely interested in a computer system

14 Clues: Electronic wasteShort for malicious softwareMisinformation which is spreadWatching people enter passwords or PINSStealing data as it is passed across a networkOne who breaks a systems integrity maliciouslyRe-using components instead of throwing them awayTricking people into breaking security procedures...

Cybersecurity Crossword Puzzle Asher Knowles 2023-01-25

Cybersecurity Crossword Puzzle Asher Knowles crossword puzzle
Across
  1. Overloading server to force shutdown
  2. looks innocent is malware
  3. Test's computers and server security
  4. Used to protect information
  5. Malware that tracks people’s activity
  6. Stands for internet protocol
  7. Faking Importance to hack someone
  8. Malicious software that damages systems
  9. tricking into clicking a fake
  10. hackers use to remote access
Down
  1. Bring your own device
  2. hacker who causes harm
  3. infected network of computers
  4. Malware that reproduces and spreads
  5. Process to access restricted things
  6. when many computers are connected
  7. used for private encrypted networking
  8. Means of attack on systems
  9. Tech to keep intruders out
  10. Tech to detect/remove viruses

20 Clues: Bring your own devicehacker who causes harmlooks innocent is malwareMeans of attack on systemsTech to keep intruders outUsed to protect informationStands for internet protocolhackers use to remote accessinfected network of computersTech to detect/remove virusestricking into clicking a fakewhen many computers are connected...

CIS 178 - Participation 3- Cybersecurity 2023-01-25

CIS 178 - Participation 3- Cybersecurity crossword puzzle
Across
  1. attacks seeking personal info
  2. virtual shield for data
  3. process of verifying user identity
  4. everyday objects connected to internet/network
  5. software that records keystrokes
  6. lots of attackers preventing legitimate users
  7. taking advantage of system flaw
  8. vulnerable points attackers gain entrance
  9. provides apps updated code
  10. appears harmless but is malicious
Down
  1. processing data for legal use
  2. allows secure remote connection
  3. decoding cypher to readable text
  4. programs that lure/trap hackers
  5. malware that makes you pay
  6. trying high volume of passwords combos
  7. commonly used for illegal internet activity
  8. method that scrambles data
  9. hacker gains access to data
  10. malware collects private information

20 Clues: virtual shield for datamalware that makes you paymethod that scrambles dataprovides apps updated codehacker gains access to dataprocessing data for legal useattacks seeking personal infoallows secure remote connectionprograms that lure/trap hackerstaking advantage of system flawdecoding cypher to readable textsoftware that records keystrokes...

Cybersecurity Awareness Month Crossword Puzzle 2024-09-30

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. address for accessing websites
  2. software used for destruction
  3. thief through computerized means
  4. software to monitor computerized information
  5. ID with magnetic access chip
  6. off personal computer storage
  7. lying about your location
  8. holds data hostage
  9. security tactics
  10. level for information security
  11. unsolicited meat banter
  12. strength in the security structure
Down
  1. weak point in security
  2. used to harm your computer
  3. the simplest part of security
  4. a code for keeping secrets
  5. needed for accessing secure information
  6. blocks out unauthorized access
  7. data to identify a person
  8. casting cyber bait

20 Clues: security tacticsholds data hostagecasting cyber baitweak point in securityunsolicited meat banterlying about your locationdata to identify a personused to harm your computera code for keeping secretsID with magnetic access chipsoftware used for destructionthe simplest part of securityoff personal computer storageaddress for accessing websites...

Digital media literacy 2023-09-14

Digital media literacy crossword puzzle
Across
  1. a folder for keeping all your data and work
  2. a electronic device that lets u have access to the internet on a keyboard
  3. to send something to lots of people
  4. to make something your so people cant copy you
  5. a way of protecting you from hackers
  6. a way of attracting someone to your business
Down
  1. A way of messaging your fiends and sending pics
  2. facts and statistics collected together for reference
  3. a way of infecting a device
  4. a way of watching videos of whatever you want
  5. a way of talking to lots of people about your life
  6. a internet page based on a famous person/subject

12 Clues: a way of infecting a deviceto send something to lots of peoplea way of protecting you from hackersa folder for keeping all your data and worka way of attracting someone to your businessa way of watching videos of whatever you wantto make something your so people cant copy youA way of messaging your fiends and sending pics...

IT Trivia 2022-07-18

IT Trivia crossword puzzle
Across
  1. ... word, excel, powerpoint, office
  2. measures taken to protect devices, networks, and data from unauthorized access and criminal use
  3. a program that is dedicated to managing network resources
  4. the vaccine for computers
  5. not physical but...
  6. an output device that produces a tangible copy of alphanumeric or graphic data
  7. one of the primary input devices used with a computer
Down
  1. the standard way to connect computers on a network over a wired connection
  2. a piece of code which can corrupt a system or destroy data
  3. Jerry
  4. the button you press when you make an error
  5. what we hate to see in our emails
  6. the practice of tricking internet users through deception into revealing personal information

13 Clues: Jerrynot physical but...the vaccine for computerswhat we hate to see in our emails... word, excel, powerpoint, officethe button you press when you make an errorone of the primary input devices used with a computera program that is dedicated to managing network resourcesa piece of code which can corrupt a system or destroy data...

Gruppo 2 2016-05-24

Gruppo 2 crossword puzzle
Across
  1. Tipo di comunicazione senza fili
  2. Modifica di un software per rimuovere la protezione
  3. Programma informatico eseguito su un PC
  4. Applicazione per il recupero, la presentazione e la navigazione di pagine web
  5. Forma di attivismo Internet che identifica utenti o comunità online che agiscono anonimamente
  6. Attività di intercettazione passiva dei dati che transitano in una rete informatica
Down
  1. Linguaggio per la scrittura delle pagine Web
  2. Tipo di attacco informatico che impiega in la falsificazione dell'identità
  3. Insieme dei sistemi e dei servizi di protezione informatica (inglese)
  4. Diritto di autore

10 Clues: Diritto di autoreTipo di comunicazione senza filiProgramma informatico eseguito su un PCLinguaggio per la scrittura delle pagine WebModifica di un software per rimuovere la protezioneInsieme dei sistemi e dei servizi di protezione informatica (inglese)Tipo di attacco informatico che impiega in la falsificazione dell'identità...

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  2. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  3. Prinsip Keamanan Informasi agar akurat
Down
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Perangkat lunak yang diciptakan untuk merusak sistem computer
  3. Jenis Informasi yang merupakan informasi pengetahuan umum
  4. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  5. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
  6. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  7. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

executive branch 2023-07-09

executive branch crossword puzzle
Across
  1. binding agreements between nations and become part of international law
  2. Right to reject decisions
  3. Advisory body is made up of 15 executive departments
  4. A diplomat sent by a country
  5. responsible for counterterrorism, cybersecurity, aviation security etc...
Down
  1. promoting economic prosperity and ensuring the financial security of the United States
  2. Leader of the U.S.
  3. Chief Executive Officer
  4. a judge who has been chosen by the President of the United States to work in a federal appeals court
  5. provide the military forces needed to deter war and to protect the security of our country

10 Clues: Leader of the U.S.Chief Executive OfficerRight to reject decisionsA diplomat sent by a countryAdvisory body is made up of 15 executive departmentsbinding agreements between nations and become part of international lawresponsible for counterterrorism, cybersecurity, aviation security etc......

Scsu 2023-08-11

Scsu crossword puzzle
Across
  1. refers to act of hiding the ip address to miss lead the target
  2. refers to the act of monitoring user commanicetion without consent
  3. insuring the infomation staya in it origanal from and present modified over a network
  4. attack is techingave used by attackers
Down
  1. insuring that your system stays available to pletform its metendet funetion when required
  2. securing your information only authoritht person will be access
  3. unsolicited bulk mails
  4. zombies computer
  5. a small software design to hide files
  6. a protection of your cyber or digital assets or information system from attackrs

10 Clues: zombies computerunsolicited bulk mailsa small software design to hide filesattack is techingave used by attackersrefers to act of hiding the ip address to miss lead the targetsecuring your information only authoritht person will be accessrefers to the act of monitoring user commanicetion without consent...

Module 1 Test 2023-09-08

Module 1 Test crossword puzzle
Across
  1. attack that will publish or withhold data unless money is paid
  2. this triad is widely accepted security measure
  3. using phone calls and voicemails to gain personal information
  4. using deceptive emails to gain personal information
  5. protection from unauthorized people making changes
Down
  1. Identity theft, stealing money, stealing private information, controlling private computers
  2. protection of computer systems, networks, and data from digital attacks
  3. with "of things" means that so much of our devices are connect to the internet
  4. assurance that systems and data will be able to be accessed
  5. protection from people not authorized to view

10 Clues: protection from people not authorized to viewthis triad is widely accepted security measureprotection from unauthorized people making changesusing deceptive emails to gain personal informationassurance that systems and data will be able to be accessedusing phone calls and voicemails to gain personal information...

Black Hat 2024 2024-07-23

Black Hat 2024 crossword puzzle
Across
  1. Malware attack
  2. Project _____ is Talos' cross-team effort to help protect Ukraine's power grid
  3. The slogan "Our job is your defense." belongs to which Cisco Security team?
  4. Online scam to steal personal information
  5. One of the largest and most infamous ransomware attacks
  6. Bring your Security stack together with...
Down
  1. Name of the international cybersecurity event that was founded in 1997?
  2. Can be used to create code, text, music, videos, photos...
  3. Talos is now further enriched by the acquisition of..
  4. Not the next generation of something. The first generation of something new

10 Clues: Malware attackOnline scam to steal personal informationBring your Security stack together with...Talos is now further enriched by the acquisition of..One of the largest and most infamous ransomware attacksCan be used to create code, text, music, videos, photos...Name of the international cybersecurity event that was founded in 1997?...

Digital literacy 2024-08-07

Digital literacy crossword puzzle
Across
  1. What you want to avoid online
  2. A downloadable application that can be used on phones and other devices
  3. What you need to access your account
  4. Protecting yourself online
  5. A secure way to use the internet
  6. A random email sent to trick you into giving away information
Down
  1. Software added to your device without permission for malicious purposes
  2. When you use another device to confirm your identity when signing on
  3. A portable device that is larger than a phone but smaller than a computer
  4. What you may want from social media

10 Clues: Protecting yourself onlineWhat you want to avoid onlineA secure way to use the internetWhat you may want from social mediaWhat you need to access your accountA random email sent to trick you into giving away informationWhen you use another device to confirm your identity when signing on...

Cybersecurity Awareness Month 2023 2023-08-29

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. The individuals who control access to people, data, and systems
  2. Kwiktrip's password policy requires that coworkers change their passwords __days
  3. You can help fight cybercrime by becoming a __________
  4. What is the common hacking method
  5. These are designed to maintain the security of everyone associated with an organization
  6. This attack occurs when cybercriminals research and track which sites employees visit the most
Down
  1. _____are the last line of defense
  2. Failure to run these equals failure to patch security vulnerabilities
  3. This security tool identified and removes malicious programs
  4. This dangerous attack targets specific people or organization, often with custom made email or messages
  5. Stealing money is the main goal behind this type of malware
  6. Any scenario that triggers emotions should also trigger your ______
  7. This attack occurs when someone sneaks into a secured area behind someone else
  8. What should you do when a workstation or device is no longer in use
  9. The future of security is_____, not machines

15 Clues: _____are the last line of defenseWhat is the common hacking methodThe future of security is_____, not machinesYou can help fight cybercrime by becoming a __________Stealing money is the main goal behind this type of malwareThis security tool identified and removes malicious programsThe individuals who control access to people, data, and systems...

Cybersecurity Fundamental Chapter 1 2022-11-03

Cybersecurity Fundamental Chapter 1 crossword puzzle
Across
  1. attacks that originate from within an organization.
  2. the honeynet project.
  3. unethical criminals who violate computer and network security for personal gain, or for malicious reason, such as attacking networks.
  4. breaks into network or computer systems to discover weakness in order to improve the security of these systems.
  5. infragard is an example of widespread sharing of cyber intelligent.
  6. groups of criminals break into computers or networks to gain access for various reason.
  7. who rally and protest against different political and social ideas
  8. external threats from amateurs or skills attackers can exploit vulnerabilities in network devices.
Down
  1. somewhere between white and black hat attackers.
  2. grey hat hackers who attempt to discover exploits and report them to vendor, and sometimes for prizes or rewards.
  3. hobbyists mostly limited to pranks and vandalism, have little or no skills.
  4. nation common vulnerabilities and exposures (CVE) database.
  5. black hat hackers who are either self-employed or working for large cybercrime organizations.
  6. the standard provides a framework for implementing cybersecurity measures within an organization.

14 Clues: the honeynet project.somewhere between white and black hat attackers.attacks that originate from within an organization.nation common vulnerabilities and exposures (CVE) database.who rally and protest against different political and social ideasinfragard is an example of widespread sharing of cyber intelligent....

2024 International Privacy Week 2023-12-18

2024 International Privacy Week crossword puzzle
Across
  1. What can be used to make inferences about your socioeconomic status, demographic information and preferences
  2. MCA stands for
  3. Take _____ of your data!
  4. Your name, birthdate, and SSN
Down
  1. NCA stands for
  2. Your right to keep your person and your information to yourself
  3. Focused on preventing and solving threats (i.e., hacking, malware, online scams)
  4. The week-long event for spreading awareness about online privacy
  5. The month Data Privacy Week occurs
  6. Rules, guidelines, and your own personal choices about who has access to your data, and how much access they have

10 Clues: NCA stands forMCA stands forTake _____ of your data!Your name, birthdate, and SSNThe month Data Privacy Week occursYour right to keep your person and your information to yourselfThe week-long event for spreading awareness about online privacyFocused on preventing and solving threats (i.e., hacking, malware, online scams)...

Cluster 1 Day 5 Consolidation 2023-10-12

Cluster 1 Day 5 Consolidation crossword puzzle
Across
  1. Our hardship program is call?
  2. Missing or incorrect mobile numbers, once corrected we send a whot?
  3. Someone authorised on an account is called a .... person?
  4. The traffic lights in SAP next to the mobile and email are called?
  5. What is the resource with the newspaper icon in KIT called?
Down
  1. Accounts with a Code Word, you will need to transfer to Res+...?
  2. What is the compliance elearn for internet protection called?
  3. What is Qi's English name?
  4. AGL deals in retail and ...?
  5. What team does Elizabeth support in the Rugby?
  6. Who takes care of the poles and wires in the electricity network?
  7. BPP stands for Best ..... Procedure?
  8. What is the name of Caitlyn's dog?

13 Clues: What is Qi's English name?AGL deals in retail and ...?Our hardship program is call?What is the name of Caitlyn's dog?BPP stands for Best ..... Procedure?What team does Elizabeth support in the Rugby?Someone authorised on an account is called a .... person?What is the resource with the newspaper icon in KIT called?...

Cybersecurity Awareness Month - 2022 2022-09-29

Cybersecurity Awareness Month - 2022 crossword puzzle
Across
  1. A person who circumvents information security, often with malicious intent
  2. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  3. Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
  4. Event that has been determined to have an impact on the organization prompting the need for response and recovery.
  5. Fake messages from a seemingly trusted or reputable source designed to convince you to take some sort of action
  6. A made-up scenario developed by threat actors for the purpose of stealing a victim's personal data
  7. Data or other information which otherwise identifies an individual in a way that is reasonably likely to enable identification of a specific person (hint: abbreviation)
  8. A set of instructions, data or programs used to operate computers and execute specific tasks
Down
  1. Any crime which is committed electronically
  2. Security process that requires more than one method of authentication from independent sources to verify the user’s identity (hint: abbreviation)
  3. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  4. Someone who is deceived or cheated by the dishonesty of others
  5. The computer's tangible components or delivery systems that store and run the written instructions
  6. software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.

14 Clues: Any crime which is committed electronicallySomeone who is deceived or cheated by the dishonesty of othersA person who circumvents information security, often with malicious intentMalware designed to make data or hardware inaccessible to the victim until a ransom is paid....

Elephas - Cybersecurity Awareness Month 2024-10-18

Elephas - Cybersecurity Awareness Month crossword puzzle
Across
  1. Common type of cyberattack where the hacker encrypts your files and demands payment.
  2. This form of attack tries to trick you into giving personal information via fake websites or emails.
  3. A software that fights off malicious viruses and malware.
  4. The process of verifying someone's identity.
Down
  1. A person who attempts to gain unauthorized access to your system.
  2. A harmful program disguised as legitimate software.
  3. A malicious code that spreads from computer to computer.
  4. A type of phishing attack done over text messages.
  5. A ____ test is performed to identify vulnerabilities in a system.
  6. A phishing attack done over the phone.
  7. Multi-Factor Authentication is shortened to this.
  8. Protection against unauthorized changes to data.
  9. A strong, complex one helps protect your accounts.
  10. The backbone of secure communication online, abbreviated as SSL.

14 Clues: A phishing attack done over the phone.The process of verifying someone's identity.Protection against unauthorized changes to data.Multi-Factor Authentication is shortened to this.A type of phishing attack done over text messages.A strong, complex one helps protect your accounts.A harmful program disguised as legitimate software....

BRAINWARE SOAL SEMI FINAL 2024-09-10

BRAINWARE SOAL SEMI FINAL crossword puzzle
Across
  1. merancang tampilan visual dan menu navigasi pada website
  2. Mendesain Merancang analisis suatu program
  3. Melindungi sistem keamanan jaringan
Down
  1. Mempersiapkan dan menyortir dokumen sebelum dimasukkan komputer
  2. Memfasilitasi kegiatan pembelajaran

5 Clues: Memfasilitasi kegiatan pembelajaranMelindungi sistem keamanan jaringanMendesain Merancang analisis suatu programmerancang tampilan visual dan menu navigasi pada websiteMempersiapkan dan menyortir dokumen sebelum dimasukkan komputer

Cyber Risk Crossword Puzzle 2020-08-19

Cyber Risk Crossword Puzzle crossword puzzle
Across
  1. Assessment approach based on numbers.
  2. A plan that addresses the impact level of the availability objective.
  3. The first step in a process that defines the impact levels of the CIA.
  4. An attempted security violation.
  5. Weakness in an information system.
  6. The acronym of a framework that manages risk.
  7. A measurement of extent of a threat.
  8. Unauthorized modification.
  9. Any person with authorized access to a system.
Down
  1. Assessment approach based on non-numerical values.
  2. The practice of protecting HW, SW, and data.
  3. Unauthorized disclosure.
  4. Reliable and timely access to resources.
  5. The practice of using email or fake websites to do something malicious.
  6. A successful security violation.
  7. Technical artifacts or events that suggest an attack is imminent.
  8. Event with the potential to impact an organization.
  9. The acronym of an analysis that is a key step in planning for key mission components of an IS.

18 Clues: Unauthorized disclosure.Unauthorized modification.An attempted security violation.A successful security violation.Weakness in an information system.A measurement of extent of a threat.Assessment approach based on numbers.Reliable and timely access to resources.The practice of protecting HW, SW, and data.The acronym of a framework that manages risk....

STEM Careers 2023-12-13

STEM Careers crossword puzzle
Across
  1. Designs and oversees the construction of infrastructure like roads and bridges.
  2. Analyzes and develops software applications for specific user needs.
  3. Works on the molecular or atomic scale for various applications.
  4. Designs algorithms for computational problems.
  5. Designs solutions for environmental issues like pollution.
  6. Focuses on celestial bodies' formation and evolution.
Down
  1. Focuses on developing technologies for sustainable energy sources.
  2. Focuses on developing new materials for various applications.
  3. Involves analyzing biological data using computational methods.
  4. Focuses on preventing unauthorized access to computer systems.
  5. Uses statistical techniques to extract insights from data.
  6. Designs medical devices and diagnostic tools.
  7. Responsible for designing computer hardware components.
  8. Develops manufacturing processes and new materials.
  9. Involves studying the behavior of subatomic particles.
  10. Studies the interactions between organisms and their environment.
  11. Studies the Earth's crust, rocks, and land formations.
  12. Uses mathematical and statistical techniques to extract insights from data.

18 Clues: Designs medical devices and diagnostic tools.Designs algorithms for computational problems.Develops manufacturing processes and new materials.Focuses on celestial bodies' formation and evolution.Involves studying the behavior of subatomic particles.Studies the Earth's crust, rocks, and land formations....

computer security 2021-10-15

computer security crossword puzzle
Across
  1. a study of design of computer equipment
  2. a person who has intention to destroy data
  3. a malicious code which sends out info to hacker
  4. a act of illegal listening to network channel
  5. a system of to protect safeguard network
  6. a secured layer of protocol to encrypt data
  7. a cause of system failure
  8. a computer health issue causing strain in hand
Down
  1. act of tricking user into revealing their info
  2. a person who access computer illegally
  3. a malicious act to slow down service of server
  4. act of making copy of files safely and secure
  5. act of stealing or faking information for hiding
  6. a malicious program which steals data from user
  7. a field of study on computer security
  8. a data protection act law in countries
  9. a program which copies itself repeateadly
  10. moral obligation to use computer with care

18 Clues: a cause of system failurea field of study on computer securitya person who access computer illegallya data protection act law in countriesa study of design of computer equipmenta system of to protect safeguard networka program which copies itself repeateadlymoral obligation to use computer with carea person who has intention to destroy data...

SOF GLSS SCAVENGER HUNT 2023-09-05

SOF GLSS SCAVENGER HUNT crossword puzzle
Across
  1. Acronym for MFC's Quality Policy
  2. First word under Lockheed Martin Delivers found on the SOF Learning Dashboard
  3. The first program listed on the Programs dropdown
  4. The number of PED violations in 2023 (Hint: Cybersecurity)
  5. Click on this tab to find the JPS Library
  6. The first commitment listed on the SOF GLSS ESH Policy
  7. The next mandatory IT update starting in October
Down
  1. Quality Month
  2. Next day off on the Holiday Calendar
  3. JPS 1-102
  4. Last name of our Quality Sr. Manager
  5. 4th item found on the Command Media Menu on the portal
  6. The international standard that governs our systems relating to quality
  7. First link listed on the "ESH links" on the ESH Bulletin Board
  8. Found in the SOF GLSS Creed, our every day commitment to our customer

15 Clues: JPS 1-102Quality MonthAcronym for MFC's Quality PolicyNext day off on the Holiday CalendarLast name of our Quality Sr. ManagerClick on this tab to find the JPS LibraryThe next mandatory IT update starting in OctoberThe first program listed on the Programs dropdown4th item found on the Command Media Menu on the portal...

TFCU 2022-03-01

TFCU crossword puzzle
Across
  1. What is the name of the building on Pullman?
  2. Who is the VP of Mortgages?
  3. How many dedicated educators established TFCU in 1936?
  4. On February 18th 2022, TFCU had a groundbreaking for which branch?
  5. Who is our Executive Assistant?
  6. Who or what department is at ext. 2670?
  7. What insurance do we offer that covers the difference between what the vehicle is worth vs. what is still owed?
  8. What is the name of our core system?
Down
  1. Which holiday was recently added?
  2. Who ensures our membership for up to $250,000?
  3. What all team meeting is scheduled for April 13th?
  4. What does TLC stand for?
  5. What CPD course is due in October?
  6. What system do we utilize to request time off?
  7. What service may the members use to make loan payments?

15 Clues: What does TLC stand for?Who is the VP of Mortgages?Who is our Executive Assistant?Which holiday was recently added?What CPD course is due in October?What is the name of our core system?Who or what department is at ext. 2670?What is the name of the building on Pullman?Who ensures our membership for up to $250,000?...

CIS 120 Cybersecurity Crossword Puzzle 2023-02-21

CIS 120 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. software that is constantly updating
  2. software/hardware keep intruders out
  3. text read by human eye
  4. transform ciphertext into original plaintext
  5. test distinguishes between human/robot
  6. security mechanism determining who's authorized
  7. intent to cause mischief/theft
  8. code imbedded into computer hardware
  9. technique to click bad url
  10. physical parts of a computer
  11. core of computers operating system
Down
  1. trap or decoy for attackers
  2. coding used to protect information
  3. connect computers to encrypted network
  4. attempt to violate security perimeter
  5. language to create/control website content
  6. shield users against computer damage
  7. term for unauthorized computer attacker
  8. malicious software to damage systems
  9. an error in computer program

20 Clues: text read by human eyetechnique to click bad urltrap or decoy for attackersan error in computer programphysical parts of a computerintent to cause mischief/theftcoding used to protect informationcore of computers operating systemsoftware that is constantly updatingsoftware/hardware keep intruders outshield users against computer damage...

Cybersecurity Unit 4 Terminology Crossword 2023-04-21

Cybersecurity Unit 4 Terminology Crossword crossword puzzle
Across
  1. The operation finds the remainder of a division. For example, 5 mod 2 is 1 (5 divided by 2 has a remainder of1) and 38 mod 4 is 2 (38 divided by 4 has a remainder of 2).
  2. It is an encryption method where the sender and receiver share a single private key (such as a number, word, or phrase) to use in the encryption algorithm. Also called shared key and symmetric key encryption, the same key is used in both the encryption and decryption process.
  3. A cipher in which each letter in an alphabet is replaced with a different character or symbol.
  4. It is easy to do, but hard to undo.
  5. It is an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. Also called asymmetric key encryption, the keys are combined mathematically to create one key used in the encryption/decryption algorithm
  6. The encrypted message generated by a cipher
  7. A section of a Volume that's formatted for the operating system to use as storage areas. Data used for different purposes are often stored in separate partitions, for example, operating system software versus user data.
  8. Data that is being transferred between applications, between hosts, or around the network
  9. A file that contains other data and acts like a drive. It can be mounted (connected to) or unmounted (removed from) a drive letter, giving administrators greater control when making the data available to users.
  10. A string of characters used as a parameter that determines the output of an encryption algorithm.
  11. the practice of concealing messages within other data, such as text or images.
Down
  1. The last bit (the right-most bit) in a byte.
  2. It is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime.
  3. It is information or data that is valuable to an investigation of a crime involving a computer.
  4. Sometimes called a logical volume or logical drive, the accessible storage area on a hard disk or disks. A logical volume can span multiple disks but doesn't have to.
  5. Data that is stored somewhere
  6. A digital cash system that uses cryptography to secure the exchange financial transactions.
  7. an algorithm used for encryption or decryption
  8. The science and art of delivering a message securely and confidentially.
  9. Also called hashing, it is a computational process that converts data of varying size to a fixed-size. In cryptographic hash functions, the data is converted using a one-way function so the process cannot be reversed.
  10. A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
  11. The original message that needs to be encrypted
  12. Data that is being manipulated by an application
  13. The physical drives inside of a computer.

24 Clues: Data that is stored somewhereIt is easy to do, but hard to undo.The physical drives inside of a computer.The encrypted message generated by a cipherThe last bit (the right-most bit) in a byte.an algorithm used for encryption or decryptionThe original message that needs to be encryptedData that is being manipulated by an application...

Cybersecurity Awareness Month Crossword Puzzle 2022-09-23

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. See Question 10
  2. See Question 7
  3. See Question 16
  4. See Question 22
  5. See Question 21
  6. See Question 11
  7. See Question 23
  8. See Question 6
  9. See Question 9
  10. See Question 3
  11. See Question 13
  12. See Question 2
Down
  1. See Question 12
  2. See Question 18
  3. See Question 24
  4. See Question 19
  5. See Question 8
  6. See Question 25
  7. See Question 1
  8. See Question 14
  9. See Question 4
  10. See Question 17
  11. See Question 15
  12. See Question 20
  13. See Question 5

25 Clues: See Question 7See Question 8See Question 1See Question 4See Question 6See Question 9See Question 5See Question 3See Question 2See Question 12See Question 18See Question 24See Question 19See Question 10See Question 16See Question 25See Question 22See Question 14See Question 21See Question 17See Question 11See Question 15See Question 20...

CROSSWORD ANGEL VILLAMIL 2022-05-04

CROSSWORD ANGEL VILLAMIL crossword puzzle
Across
  1. It is the practice of defending an organization from risks, threats and vulnerabilities.
  2. set of programs that allow the computer to perform different tasks.
  3. Facts collected about a topic or item.
  4. A set of activities that follow a sequence.
Down
  1. Physical elements that make up a computer.
  2. is the combination of the data.
  3. is a global computer network.

7 Clues: is a global computer network.is the combination of the data.Facts collected about a topic or item.Physical elements that make up a computer.A set of activities that follow a sequence.set of programs that allow the computer to perform different tasks.It is the practice of defending an organization from risks, threats and vulnerabilities.

C CROSSWORD 2014-02-26

C CROSSWORD crossword puzzle
Across
  1. a common
  2. They called the bomb squad and explained the bomb blast planned at 10' clk,
  3. by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
  4. for a party arranged at
  5. The squad diffused the bomb and saved everyone . They all came back home .
Down
  1. annoyed to see the party hall empty.The members realized that
  2. location. When reached, the invitees were
  3. The enrolled members of "CYBERSECURITY CLUB" were called
  4. they all had received a prank call.
  5. Twice to their surprise they found a paper unknowingly left

10 Clues: a commonfor a party arranged atthey all had received a prank call.location. When reached, the invitees wereThe enrolled members of "CYBERSECURITY CLUB" were calledTwice to their surprise they found a paper unknowingly leftannoyed to see the party hall empty.The members realized that...