cybersecurity Crossword Puzzles
C CROSSWORD 2014-02-26
Across
- a common
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- for a party arranged at
- The squad diffused the bomb and saved everyone . They all came back home .
Down
- annoyed to see the party hall empty.The members realized that
- location. When reached, the invitees were
- The enrolled members of "CYBERSECURITY CLUB" were called
- they all had received a prank call.
- Twice to their surprise they found a paper unknowingly left
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
Scsu 2023-08-11
Across
- refers to act of hiding the ip address to miss lead the target
- refers to the act of monitoring user commanicetion without consent
- insuring the infomation staya in it origanal from and present modified over a network
- attack is techingave used by attackers
Down
- insuring that your system stays available to pletform its metendet funetion when required
- securing your information only authoritht person will be access
- unsolicited bulk mails
- zombies computer
- a small software design to hide files
- a protection of your cyber or digital assets or information system from attackrs
10 Clues: zombies computer • unsolicited bulk mails • a small software design to hide files • attack is techingave used by attackers • refers to act of hiding the ip address to miss lead the target • securing your information only authoritht person will be access • refers to the act of monitoring user commanicetion without consent • ...
Crossword - LCCI and Lilly 2021-11-25
Across
- New e-commerce added in LCCI's R&R platform
- Who heads commercial services in LCCI
- platform where you can submit bills for reimbursement
- what is the name of the building in Embassy Tech village that LCCI occupies
- critical foundation of Lilly’s ethics and compliance program
Down
- Which month was LCCI started in Bangalore
- how many employees were there at the start of LCCI
- Learning portal sponsored by LCCI for its employees
- Lilly unites caring with discovery to create medicines that make life better for people around the world.
- when was the cybersecurity month
10 Clues: when was the cybersecurity month • Who heads commercial services in LCCI • Which month was LCCI started in Bangalore • New e-commerce added in LCCI's R&R platform • how many employees were there at the start of LCCI • Learning portal sponsored by LCCI for its employees • platform where you can submit bills for reimbursement • ...
C CROSSWORD 2014-02-26
Across
- location. When reached, the invitees were
- they all had received a prank call.
- annoyed to see the party hall empty.The members realized that
- The enrolled members of "CYBERSECURITY CLUB" were called
- Twice to their surprise they found a paper unknowingly left
Down
- by someone which had "BLACK FRUIT RIPE AT 10". The team decrypted and shouted runaway.
- They called the bomb squad and explained the bomb blast planned at 10' clk,
- for a party arranged at
- The squad diffused the bomb and saved everyone . They all came back home .
- a common
10 Clues: a common • for a party arranged at • they all had received a prank call. • location. When reached, the invitees were • The enrolled members of "CYBERSECURITY CLUB" were called • Twice to their surprise they found a paper unknowingly left • annoyed to see the party hall empty.The members realized that • ...
technology 2024-07-18
Across
- - An electronic device for storing and processing data.
- - Programs and operating information used by a computer.
- - A global network connecting millions of computers.
- - An organized collection of data, generally stored and accessed electronically.
Down
- - A mobile phone with advanced features.
- - The practice of protecting systems, networks, and programs from digital attacks.
- - An input device with keys used to type characters.
- - A process or set of rules to be followed in problem-solving operations.
- - The branch of technology dealing with the design and application of robots.
- - A small electronic device or tool.
10 Clues: - A small electronic device or tool. • - A mobile phone with advanced features. • - An input device with keys used to type characters. • - A global network connecting millions of computers. • - An electronic device for storing and processing data. • - Programs and operating information used by a computer. • ...
Digital Media crossword puzzle. 2023-09-14
5 Clues: ur chatting • playing games • subway surfers • so u don’t get hacked • A social media app based on chatting with friends cybersecurity a way of protecting you from hackers
CURRENT ISSUE PUZZLE 2023-03-18
Across
- Factor affecting generation gap
- Security human resource technology
- Key point of talent management
Down
- Cultural difference in the workplace
- Someone uses a computer system or network in a bad way to get secret information or cause harm to the system
- Bully but virtual
- Unauthorized interception of phone conversations with the aim of listening in on what is being said.
7 Clues: Bully but virtual • Key point of talent management • Factor affecting generation gap • Security human resource technology • Cultural difference in the workplace • Unauthorized interception of phone conversations with the aim of listening in on what is being said. • ...
ICT: You & Your Data 2023-01-17
Across
- you should always keep your __________ to youself.
- all the social media company have this policy.
- one of social media company owned by Mark Zuckerberg
Down
- created when that data has been processed and becomes meaningful.
- Any company might hold your ___________ information that you have in your account.
- a practive of protecting systems,networks & programs from digital attacks.
- raw facts and figures.
- We should __________ our password once a month.
- You have the ________ to find out what information the government & other organisations store about you.
9 Clues: raw facts and figures. • all the social media company have this policy. • We should __________ our password once a month. • you should always keep your __________ to youself. • one of social media company owned by Mark Zuckerberg • created when that data has been processed and becomes meaningful. • ...
Information and Cyber Security 2022-10-21
Across
- 560,000 pieces of … are detected every day
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Anti- ...
- These attacks typically target a CEO, CFO, or any CXX
- UK cyber crime has … in the past 5 years
Down
- What type of attacks are on the rise
- What BHSF does to train colleagues to look out for phishing attacks
- The key to securing your accounts
- Time it takes a hacker to brute force a 6 character password
- The term used for a broad range of malicious activities accomplished through human interactions
- Virtual Private …
- Hackers demanded this company cancel the planned release of a film
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
Information and Cyber Security 2022-10-21
Across
- Hackers demanded this company cancel the planned release of a film
- The key to securing your accounts
- The combination of something you have, something you know, and something you are to gain access
- Be ...
- Virtual Private …
Down
- The term used for a broad range of malicious activities accomplished through human interactions
- Anti- ...
- What BHSF does to train colleagues to look out for phishing attacks
- What type of attacks are on the rise
- One of the biggest cybersecurity breaches so far
- An attack that uses text messaging or short message service (SMS)
- These attacks typically target a CEO, CFO, or any CXX
- 560,000 pieces of … are detected every day
- UK cyber crime has … in the past 5 years
- Time it takes a hacker to brute force a 6 character password
15 Clues: Be ... • Anti- ... • Virtual Private … • The key to securing your accounts • What type of attacks are on the rise • UK cyber crime has … in the past 5 years • 560,000 pieces of … are detected every day • One of the biggest cybersecurity breaches so far • These attacks typically target a CEO, CFO, or any CXX • Time it takes a hacker to brute force a 6 character password • ...
Cyber Aware 2022-11-17
Across
- an email that attempts to gain sensitive data or credentials
- software that compromises the operation of a system by performing an unauthorized function or process
- hacker with criminal intent
- activity or process where information systems are protected from unauthorized use
Down
- a person who uses computers to gain unauthorized access to data
- a dishonest scheme
- disclosure of sensitive information outside organization
- an observable occurrence in an information system or network
8 Clues: a dishonest scheme • hacker with criminal intent • disclosure of sensitive information outside organization • an email that attempts to gain sensitive data or credentials • an observable occurrence in an information system or network • a person who uses computers to gain unauthorized access to data • ...
Technology 2024-06-05
Across
- Made by humans, not natural (10 letters).
- Pertaining to atomic energy or reactions (7 letters).
- Tools or devices needed for a specific task (9 letters).
- To look through information on the internet casually (6 letters)
- A place on a website to type keywords for finding information (9 letters)
Down
- Relating to technology that uses computers or electronic devices (7 letters).
- To create something new that didn't exist before (6 letters).
- A place where scientific experiments are conducted (10 letters).
- Protecting computers and networks from attacks (12 letters).
9 Clues: Made by humans, not natural (10 letters). • Pertaining to atomic energy or reactions (7 letters). • Tools or devices needed for a specific task (9 letters). • Protecting computers and networks from attacks (12 letters). • To create something new that didn't exist before (6 letters). • A place where scientific experiments are conducted (10 letters). • ...
Homeland Security 2024-03-18
Across
- What department within Homeland Security deals with transportation security
- How many departments did the Homeland Security Act of 2002 combine
- What type of security does Homeland Security deal with when relating to the internet
- Acronym for department of homeland security
- What department within Homeland Security deals with emergency management
Down
- What is one Geographical Aspect Homeland Security Protects
- What kind of events does Homeland Security prepare for
- How would opposers of Homeland Security describe its strategy
- What Homeland Security was made to defend against
9 Clues: Acronym for department of homeland security • What Homeland Security was made to defend against • What kind of events does Homeland Security prepare for • What is one Geographical Aspect Homeland Security Protects • How would opposers of Homeland Security describe its strategy • How many departments did the Homeland Security Act of 2002 combine • ...
PTS INFORMATIKA 2023-09-27
Across
- Kemampuan untuk memecah masalah menjadi bagian yang lebih kecil.
- Praktik menyimpan data di lokasi yang berbeda sebagai tindakan keamanan.
- Model bisnis yang melibatkan penjualan produk dan layanan secara online.
- Praktik dan teknologi yang melindungi sistem komputer dari ancaman.
- Jaringan global yang menghubungkan jaringan komputer.
- Langkah-langkah terstruktur untuk menyelesaikan masalah.
Down
- Model komputasi yang menggabungkan sumber daya dari banyak
- Situs web yang memungkinkan pengguna berbagi informasi secara online.
- Model komputasi yang memungkinkan akses ke sumber daya melalui PATTERNRECOGNITION Kemampuan untuk mengidentifikasi pola dalam data atau masalah.
9 Clues: Jaringan global yang menghubungkan jaringan komputer. • Langkah-langkah terstruktur untuk menyelesaikan masalah. • Model komputasi yang menggabungkan sumber daya dari banyak • Kemampuan untuk memecah masalah menjadi bagian yang lebih kecil. • Praktik dan teknologi yang melindungi sistem komputer dari ancaman. • ...
Digital Awareness 2024-10-21
Across
- A harmful software that replicates itself to spread to other computers
- The act of protecting personal information online
- A program designed to damage or disrupt systems
Down
- A global system of interconnected computer networks
- A unique string of characters used to access a computer or network
- Unsolicited email, often sent in bulk
- A software application for accessing information on the web
7 Clues: Unsolicited email, often sent in bulk • A program designed to damage or disrupt systems • The act of protecting personal information online • A global system of interconnected computer networks • A software application for accessing information on the web • A unique string of characters used to access a computer or network • ...
MIC Quiz 2 2023-04-26
Across
- A community for employees seeking resources and events that will help them develop more mindful and resilient habits.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
Down
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
MP 2 Exam Review 2023-12-07
Across
- provides power to the main internal parts of a computer
- connects all the inside components of a computer
- Controls who or what can enter a space
- temporary form of memory which holds data whilst the computer is switched on
Down
- stores data when somebody saves their work
- security measures that protect people and property from harm
- a machine that works with information
- Protecting computer systems from digital and physical attack
- small files used by web servers to save browsing information
9 Clues: a machine that works with information • Controls who or what can enter a space • stores data when somebody saves their work • connects all the inside components of a computer • provides power to the main internal parts of a computer • security measures that protect people and property from harm • Protecting computer systems from digital and physical attack • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
Computer Science 2024-03-21
Across
- Analyse de données
- Contrôle de version
- Apprentissage profond
- Interface utilisateur (IU)
- Algorithmes
- Système d'exploitation (SE)
- Développement web
- Cryptage
- Décryptage
- Réalité augmentée (RA)
- Matériel informatique
- Vision par ordinateur
- Expérience utilisateur (UX)
- Algorithme
- Réalité virtuelle (RV)
- Langage de programmation
- Robotique
- Base de données
- Apprentissage automatique
- Intelligence artificielle (IA)
- Structure de données
- Internet des objets (IdO)
- Architecture logicielle
Down
- Informatique quantique
- Technologie de l'information (TI)
- Développement de logiciels
- Compilateur
- Cybersécurité
- Informatique en nuage
- Arrière plan
- Frontal
- development Développement d'applications mobiles
- Génie logiciel
- Graphisme informatique
- Exploration de données
- Réseaux neuronaux artificiels
- networks Réseaux neuronaux
- Débogage
- Programmation
- Réseau
40 Clues: Réseau • Frontal • Cryptage • Débogage • Robotique • Décryptage • Algorithme • Compilateur • Algorithmes • Cybersécurité • Arrière plan • Programmation • Génie logiciel • Base de données • Développement web • Analyse de données • Contrôle de version • Structure de données • Apprentissage profond • Informatique en nuage • Matériel informatique • Vision par ordinateur • Informatique quantique • Graphisme informatique • ...
All About John Paul 2024-02-09
Across
- The science of God
- What you study in astronomy
- The name of a pope
- The national language of Belize
- The skill of persuading people
- Your first step in becoming a JP student
- Place where you bathe on the OLA
- What’s big and blue at JPII
- A game where queens are stronger than kings
- The part of you that is physical
- What you sit around during the OLA
- A book you use to teach people the Catholic faith
- What God called Himself when Moses asked
Down
- The love of wisdom
- ____ Leadership Adventure
- You go on a mission trip to ____ others
- The part of you that is invisible
- The concentration where you learn finance
- The language that Spanish is based on
- Where Jesus is on campus
- The concentration with math and science
- The kind of education that makes you free
- The name of the campus dog
- How you study cybersecurity at JPII
- The current president of the student body
25 Clues: The love of wisdom • The science of God • The name of a pope • Where Jesus is on campus • ____ Leadership Adventure • The name of the campus dog • What you study in astronomy • What’s big and blue at JPII • The skill of persuading people • The national language of Belize • Place where you bathe on the OLA • The part of you that is physical • The part of you that is invisible • ...
TJ's Crossword 2024-05-29
Across
- What color is my new RIT sweatshirt?
- How many brothers do I have?
- What is my youngest brother's name?
- Who is my favorite person in the world?
- What's my favorite color?
- What is my oldest cousin's name?
- Who do I want to make out aggressively with?
- What is the name of the golf course I work at?
- What kind of car do I have?
- what day of the month is my birthday?
- What is the name of my highschool?
- The name of the resteraunt we ate at was Finch ____.
- What town is my real house in?
- What was I on when I bit a hole through my tongue?
Down
- What is my mom's name?
- What is going to be my major in college?
- What is my oldest brother's name?
- What is the name of the lake I live at during the summer?
- What is my middle name?
- What color are my eyes?
- What do I eat every Friday night?
- Who is the most attractive person in the world?
- What is my dad's name?
- What street is my real house on?
24 Clues: What is my mom's name? • What is my dad's name? • What is my middle name? • What color are my eyes? • What's my favorite color? • What kind of car do I have? • How many brothers do I have? • What town is my real house in? • What is my oldest cousin's name? • What street is my real house on? • What is my oldest brother's name? • What do I eat every Friday night? • ...
Facets of Public Safety 2024-08-09
Across
- political process that focuses on the design of the land.
- practice of safeguarding buyers of goods and services.
- not guilty of a crime or offense.
- specialized state agencies.
- way in which safety in a workplace is managed.
- All government-owned, operated, and maintained infrastructure.
- organizations that ensure public safety, security, and health
- improving the health of people
Down
- culpable of or responsible for a specified wrongdoing.
- criminal law system
- is the managerial function charged with creating the framework.
- protect life and property through transporting.
- handling, preparation, and storage of food in ways that prevent foodborne illness.
- prevention of and protection from events
- field of health care concerned about well-beings.
- being protected against the criminal or unauthorized use of electronic data.
- federal law enforcement agency.
- the action of interrogating or the process of being interrogated.
- the aggregate of people living together in a more or less ordered community.
- organizations that deal with accidents and urgent problems.
- the policy or action of using vigorous campaigning to bring about political or social change.
21 Clues: criminal law system • specialized state agencies. • improving the health of people • federal law enforcement agency. • not guilty of a crime or offense. • prevention of and protection from events • way in which safety in a workplace is managed. • protect life and property through transporting. • field of health care concerned about well-beings. • ...
militer 2024-08-25
Across
- / A marksman who specializes in shooting targets from a distance.
- / A soldier who operates armored fighting vehicles.
- / A language expert in the military.
- / A religious leader who provides spiritual support.
- / Foot soldiers who engage in combat.
- / A soldier who gathers information about the enemy.
- / A person who serves in the army.
- / A person who repairs vehicles and machinery.
- / A person who plots the course for a vehicle or aircraft.
- / A specialist in protecting military computer systems.
Down
- / A pilot who flies military aircraft.
- / A soldier who operates large-caliber guns.
- / A person who works on a ship in the navy.
- / A soldier trained to parachute into operations.
- / A specialist in construction and repair in the military.
- / A military personnel trained to provide first aid.
- / A person who manages military supplies and transportation.
- / Military personnel who gather and analyze information.
- / A person who operates aircraft in the military.
- / A member of the U.S. Marine Corps.
20 Clues: / A person who serves in the army. • / A language expert in the military. • / A member of the U.S. Marine Corps. • / Foot soldiers who engage in combat. • / A pilot who flies military aircraft. • / A person who works on a ship in the navy. • / A soldier who operates large-caliber guns. • / A person who repairs vehicles and machinery. • ...
Tech Talk 2024-03-23
Across
- Computer systems that can mimick human's brain
- An organized set of data that is stored in a computer and can be looked at and used in various ways
- Machines that can perform certain tasks automatically
- A machine with appearance and behaviors resembling a human
- Malicious code that is hidden in a computer software
- Graphics processing unit
- Physical parts of a computer
- A field related to protecting computers from online attacks
- Can be plug in many devices
Down
- A place you can visit without leaving your chair
- Math behind problem-solving
- Protects your computer from attacks
- Getting a file from the internet
- An AI-made video, image or recording that represents fake events, fake appearance or fake voices of a person
- Global network of computers
- The brain of a computer
16 Clues: The brain of a computer • Graphics processing unit • Math behind problem-solving • Global network of computers • Can be plug in many devices • Physical parts of a computer • Getting a file from the internet • Protects your computer from attacks • Computer systems that can mimick human's brain • A place you can visit without leaving your chair • ...
Cybersecurity Unit 1 Lesson 2 2022-12-02
Across
- Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
- A small local area network of computers and devices.
- Software that can stop malware from entering a network, computer, or device.
- Stores data that is in use.
- Software that runs on your computer, looking for many different types of malware from many different sources.
- Small text-based bits of information about your browser that a web server saves.
- Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
- All data on a computer.
- The arrangement of the various elements of a network.
- Executable files that are run by users.
- The systematic way to find specific web addresses and web pages.
Down
- A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
- A weakness in a system that allows an attacker to gain unauthorized access.
- A special kind of file that contains other files.
- A file that contains a collection of other files.
- Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
- Computer shared by multiple users across a network.
- An application file that is currently executing (also called running) in the operating system.
- An agreed-upon method for communication.
19 Clues: All data on a computer. • Stores data that is in use. • Executable files that are run by users. • An agreed-upon method for communication. • A special kind of file that contains other files. • A file that contains a collection of other files. • Computer shared by multiple users across a network. • A small local area network of computers and devices. • ...
Some U.S. Power Numbers 2014-06-25
Across
- Separation into three groups
- Sub-elements of a larger mechanism
- Where outage information is often posted
- Sealed from use for a period of time
- A financial product that pays for covered events
- A type of evaluation
- What can happen to frozen pipes
- Inner workings framework
- A formal inquiry
- Someone who buys accounts receivables
- Storage site
- To send on an errand or assignment
- Food gone bad
- A vehicle capable of transporting gas or liquids
Down
- A term for a loss of power
- A term for the press, radio and other news outlets
- The World Wide Web
- A term covering the network of electrical connections
- Computer security
- A way down – or up
- Phone solicitators
- Term for lines carrying electrical power
- A popular social media tool
- Someone authorized to speak for the organization
- Step 2 of 5
- Dangerous
- Information Technology
- A technique for securing and protecting data files
- Type of gaseous fuel
29 Clues: Dangerous • Step 2 of 5 • Storage site • Food gone bad • A formal inquiry • Computer security • The World Wide Web • A way down – or up • Phone solicitators • A type of evaluation • Type of gaseous fuel • Information Technology • Inner workings framework • A term for a loss of power • A popular social media tool • Separation into three groups • What can happen to frozen pipes • ...
FITE 2013-05-16
Across
- symbol for a company
- personal conduct online
- document or file made with a preset format
- one thousand terabytes
- a thousand bytes
- one thousand megabytes
- one thousand brontobytes
- search engine that checks all search engines
- wireless home network
- one thousand exabytes
- close up preview of a template
- one thousand petabytes
- protection of information computer/networks
- any type of internet hosting service
- appearence of a document
- port that connects the mouse or keyboard to PC
- one thousand yottabytes
Down
- arrangement of data for a computer
- Ex: mouse, flash drive
- one thousand zetabytes
- software used to search data
- one thousand gigabytes
- one million bytes
- a device that has a lot of data storage
- zoomable presentation program
- computer screen
- network name
- Ex:comcast,verizon
- Ex: monitor, printer
- eight bytes
- rules to keep people safe online
- smallest unit of data
- plug your flashdrive into
- Ex: headphones, speakers
- a short memorable phrase for advertising
35 Clues: eight bytes • network name • computer screen • a thousand bytes • one million bytes • Ex:comcast,verizon • symbol for a company • Ex: monitor, printer • wireless home network • one thousand exabytes • smallest unit of data • Ex: mouse, flash drive • one thousand zetabytes • one thousand gigabytes • one thousand terabytes • one thousand megabytes • one thousand petabytes • personal conduct online • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
ITSM Challenge 2 2024-05-21
Across
- Alteration to improve IT services.
- Ensuring uninterrupted IT service.
- Activity that creates a service definition.
- Daily management of IT services.
- Temporary endeavor to achieve a goal.
- Type of Change Request that is too urgent to wait for the next CAB meeting for approval to implement.
- Type of Change Request that is medium risk or higher, requires custom planning, and must be approved for implementation.
- Framework for managing IT services.
Down
- Phase of implementing changes into operations.
- Protection against digital threats.
- Formal demand for IT service.
- Secured data storage or transmission.
- Long-term plan for IT service improvement or actions taken to determine the need for new services.
- An unexpected disruption in service.
- Rollout of IT services or IT updates to production.
- Root cause of recurring incidents.
- Best practice framework for IT service management.
- Authorized deployment of IT components.
- Type of Change Request that is low risk, repeatable, well-known, and preapproved
- Centralized project management office.
20 Clues: Formal demand for IT service. • Daily management of IT services. • Alteration to improve IT services. • Ensuring uninterrupted IT service. • Root cause of recurring incidents. • Protection against digital threats. • Framework for managing IT services. • An unexpected disruption in service. • Secured data storage or transmission. • Temporary endeavor to achieve a goal. • ...
RU ITEC411 - Crime and Security 2023-10-17
Across
- A concealed entry point in communication systems
- Enhanced account security using multiple steps(acronym)
- This law places restrictive measures on information.
- Covert software that gathers user data
- Retail corporation affected by a major data breach in 2007.
- Legislation protecting intellectual property.
- Proving one's identity
- A United States federal law that governs unauthorized access to computer systems and data
- Deceptive cybersecurity trap for hackers.
- Activist use of hacking for social or political causes
- This activity involves gaining entry to computer systems or networks without permission, often for malicious purposes.
Down
- False statements harming one's reputation.
- False spoken statements harming reputation.
- This process transforms information into a coded form to protect it from unauthorized access
- Using unique physical features for identification
- Malicious software that replicates and infects
- system is used in retail to process transactions, record sales, and manage inventory(acronym.
- Ethical hacking for security assessment.
- Deceptive online tactic to steal personal information
- U.S. law for wiretaps and law enforcement access
20 Clues: Proving one's identity • Covert software that gathers user data • Ethical hacking for security assessment. • Deceptive cybersecurity trap for hackers. • False statements harming one's reputation. • False spoken statements harming reputation. • Legislation protecting intellectual property. • Malicious software that replicates and infects • ...
Technology 2024-02-29
Across
- Temporary storage of frequently accessed data for faster retrieval.
- Open-source machine learning framework developed by Google.
- Security barrier preventing unauthorized access to a network.
- Protection against digital threats and unauthorized access.
- UI toolkit for building natively compiled applications for mobile, web, and desktop.
- Securing data by converting it into a coded format.
- Modern programming language for Android app development.
- Agile framework for managing and developing products.
- Framework for distributed storage and processing of big data.
- Open-source automation server for building, testing, and deploying software.
Down
- Versatile, object-oriented programming language.
- Identification using unique biological traits like fingerprints.
- Platform for automating application deployment and scaling.
- Collaboration between development and operations teams for efficient software delivery.
- High-level programming language known for readability and versatility.
- Remote storage and computing services accessed over the internet.
- Flexible and iterative approach to project management.
- JavaScript library for building user interfaces.
- Open-source operating system kernel.
- Software intermediary enabling communication between different applications.
20 Clues: Open-source operating system kernel. • Versatile, object-oriented programming language. • JavaScript library for building user interfaces. • Securing data by converting it into a coded format. • Agile framework for managing and developing products. • Flexible and iterative approach to project management. • Modern programming language for Android app development. • ...
Crossword puzzle 2024-04-30
Across
- Online moral principles.
- Tech-enabled capability.
- Online harassment.
- Tech proficiency.
- Digital image.
- Tech competency.
- Personal info fraud.
- Network security barrier.
- Online self-representation.
- Digital illegal activities.
- Personal recognition.
- Digital data secrecy.
- Data protection.
- Personal info protection.
- Malicious program blocker.
- Protection measures.
- Access authentication code.
- Data transfer to web.
- Harmful software.
- Global web network.
- Responsible online behavior.
- Fraudulent schemes.
- Effective digital info use.
- Online conduct regulations.
- Secure data encoding.
- Digital threat knowledge.
Down
- Personal online journals.
- Analytical reasoning.
- Secure web browsing.
- Malicious digital assault.
- Digital threat protection.
- Digital education.
- Identity verification.
- Digital threat potential.
- Digital security measures.
- Online activity traces.
- Web navigation software.
- Digital education platform.
- Info safeguarding measures.
- Tech access gap.
- Unauthorized info access.
- thinking: Logical analysis.
- Malicious intrusion.
- Personal info protection.
- Internet precaution.
- Defense against digital threats.
- Online data secrecy.
- Digital safety practices.
- Deceptive data theft tactics.
- Digital communication.
50 Clues: Digital image. • Tech competency. • Tech access gap. • Data protection. • Tech proficiency. • Harmful software. • Online harassment. • Digital education. • Global web network. • Fraudulent schemes. • Secure web browsing. • Personal info fraud. • Malicious intrusion. • Protection measures. • Internet precaution. • Online data secrecy. • Analytical reasoning. • Personal recognition. • ...
MIC Quiz 2 2023-04-25
Across
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
Down
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
- A community for technical employees who identify as women to create a positive impact in the lives of women and girls in STEM fields.
15 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
Computing Practice Tutorial Worksheet #3 2024-09-16
5 Clues: A person who builds websites • The language computers understand • Someone who analyzes data for a living • A job that involves protecting information • An important attribute for catching mistakes
Wedding Sip & Solve Crossword 2022-09-27
Across
- Favorite planet?
- What sport did Patrick play in high school?
- Where was Sasha born?
- What does Patrick actually do?
- What were S&P doing when Patrick proposed?
- First American town where Sasha lived after moving from Russia?
- What state did Patrick grow up in?
- What is the name of the black dog running around this party?
- How many states have S&P lived in together?
- What brand of the van did S&P Drive across the country?
- Favorite National Park?
- Sasha’s favorite organ in the human body?
- Elopement Location?
- Town in Oregon where S&P lived?
- Patrick’s Spirit Animal?
Down
- What did Sasha study in college?
- S&P’s favorite musician currently?
- Patrick’s major in college?
- First friend that Sasha made in the US? (hint: guest of the wedding party)
- Where did Sasha & Patrick meet?
- Sasha’s spirit animal?
- Who was adopted first?
- How many years have S&P been together?
- What is the name of the goldendoodle running around here?
- Patrick’s favorite tree?
- Sasha’s favorite tree?
- Favorite hobby to do together?
27 Clues: Favorite planet? • Elopement Location? • Where was Sasha born? • Sasha’s spirit animal? • Who was adopted first? • Sasha’s favorite tree? • Favorite National Park? • Patrick’s favorite tree? • Patrick’s Spirit Animal? • Patrick’s major in college? • What does Patrick actually do? • Favorite hobby to do together? • Where did Sasha & Patrick meet? • Town in Oregon where S&P lived? • ...
Cyber Security 2020-11-07
Across
- A code to send a secret message
- Short for “Sending Particularly Annoying Messages.”
- protecting digital devices against attacks
- smaller pieces of info sent through the internet
- Copying a file from one computer to another
- software that secretly collects info about you
- info about you cause of online activity
- A name you type so you can use a computer
Down
- an attacker uses a list of words as potential passwords
- A secret word that allows you access
- software made to damage your computer or network
- cyberattack from hacker w/ bad links
- when an attacker tries many
- a place where data stops along the way
- A person who secretly gets access to a computer Network A system of computers that are connected
- data that describe another piece of data
- cyberattack where hacker pretends to know you
- A system of symbols used to create a secret message
- passwords in hopes of guessing correctly
- A system of rules and correct steps to follow
20 Clues: when an attacker tries many • A code to send a secret message • A secret word that allows you access • cyberattack from hacker w/ bad links • a place where data stops along the way • info about you cause of online activity • data that describe another piece of data • passwords in hopes of guessing correctly • A name you type so you can use a computer • ...
Mileidy & Elliot 2023-05-19
Across
- Mileidy's birthday month
- What did Elliot study in college?
- The state Elliot grew up in
- The new family name
- The wedding dessert
- The state Elliot was born in
- Their first big adventure together
- Wedding dinner
- What is the Man of Honor's name?
- The gemstone in both Mileidy's and Elliot's rings
- Mileidy's favorite drink
- The wedding is hosted at the _____ Castle
- What town are we in, right now?
- Mileidy's favorite season
- Mileidy's favorite flower
Down
- The town they met in
- How many brothers does Mileidy have?
- Their favorite holiday
- Elliot's favorite drink
- College they met at
- The town they live in
- What is the Best Man's name?
- Elliot's favorite color
- The month they began dating
- Elliot's middle name
- Mileidy's childhood dog
- Month of the wedding
- Color of Elliot's suit
- How many tattoos does Elliot have?
- What month did they get engaged?
30 Clues: Wedding dinner • The new family name • The wedding dessert • College they met at • The town they met in • Elliot's middle name • Month of the wedding • The town they live in • Their favorite holiday • Color of Elliot's suit • Elliot's favorite drink • Elliot's favorite color • Mileidy's childhood dog • Mileidy's birthday month • Mileidy's favorite drink • Mileidy's favorite season • ...
Tech crossword. 2024-04-03
Across
- Set of instructions.
- Security loop hole.
- The computer programs.
- Small computer/tech.
- Information sharing.
- Network security.
- AI.
- Yet another markup language.
- Device for prosesing data.
- Main operating system of a computer.
- The inner parts of a computer.
- Cross-site scripting.
- Language for websites.
- Universal Serial Bus.
- Online protection.
- Development of a computer.
Down
- Mashines following a set a rules/code to work/move.
- Biological measurements .
- Melting plastic in a mashine to from shapes given to it by a computer.
- A way to communicate to the computer.
- A procedure or rules that should be carried out if need be.
- Larger storage unit.
- Person to computer interaction.
- Unit of storage for a computer.
- The main system software.
- Secure communication.
- Online storage.
- Headset for video game usage, or surgary.
- A place for online storage.
- Wireless Fidelity.
30 Clues: AI. • Online storage. • Network security. • Wireless Fidelity. • Online protection. • Security loop hole. • Set of instructions. • Larger storage unit. • Small computer/tech. • Information sharing. • Secure communication. • Cross-site scripting. • Universal Serial Bus. • The computer programs. • Language for websites. • Biological measurements . • The main system software. • ...
cybercrime 2024-11-09
Across
- Testing Breaking into a system to test its defenses legally
- Attacks aimed at disrupting or disabling a network
- Financial theft through hacking or scams
- Protecting data and systems from cyber attacks
- Virus or worm code hidden within a seemingly harmless program
- Common scam emails that trick people into sharing private info
- Passwords, PINs, and fingerprints used for digital security
- Illegal access to systems without permission
- Fake sites mimicking real ones to steal information
Down
- Software designed to harm or exploit computers
- Law-breaking activities online
- Tracking software that monitors user activity without consent
- Protecting children from inappropriate online content
- Method of verifying identity online, often in two steps
- Theft Stealing another person’s identity to impersonate them online
- The backbone of online communications targeted by cybercriminals
- Program that spreads across computers, copying itself
- Fake messages asking for sensitive information
- Act of unauthorized copying or using someone's content
- Criminals who exploit security weaknesses online
20 Clues: Law-breaking activities online • Financial theft through hacking or scams • Illegal access to systems without permission • Software designed to harm or exploit computers • Protecting data and systems from cyber attacks • Fake messages asking for sensitive information • Criminals who exploit security weaknesses online • Attacks aimed at disrupting or disabling a network • ...
Blikken jubileum NWO Woord van het jaar 2024-01-22
Across
- Open deur voor hackers.
- Iedereen mag mee doen met deze cursus
- De beste plek om je auto schoon te maken van heel Scandinavië
- Surft snel weg in de auto
- Sesamstraatbewoner zonder bekakte r ontmoet presentatrice van Lingo
- Hard rock samenwerkingsverband van Steve Harris en Bruce Dickinson?
- Timmerman met een Ierse opa
- Wordt vaak geserveerd met kletskoek
- Wordt hierop verband gewikkeld?
- Partijtje van complottheoristen?
- Wordt hierop het nieuwe functiehuis gebouwd?
- Conclaaf in de lerarenkamer
- Tijd om in beweging te komen?
- Dit vormden de zeven dwergen
- Werken aan een suffe klus.
Down
- Geeft energie aan financiële zaken.
- Terughoudendheid is op zijn plaats op kantoor
- Internetpolitie
- Oproepen tot rekenen moet je tijdig in de agenda zetten.
- Allen die naar de dierentuin gaan
- Tegemoetkoming voor het winnende boontje
- Dit jaar door USV Hercules aan Ajax opgelegd, niet duurzaam
- Rustgevende hobby op de computer?
- Kwaal bij aanvragers in de NWA en het KIC?
- Familie van de airbag en de kniebeschermer.
25 Clues: Internetpolitie • Open deur voor hackers. • Surft snel weg in de auto • Werken aan een suffe klus. • Timmerman met een Ierse opa • Conclaaf in de lerarenkamer • Dit vormden de zeven dwergen • Tijd om in beweging te komen? • Wordt hierop verband gewikkeld? • Partijtje van complottheoristen? • Allen die naar de dierentuin gaan • Rustgevende hobby op de computer? • ...
4.1 Application 2023-07-07
Across
- Month of the Presidential Inauguration
- The cabinet department responsible for farming, food, and forestry
- The process by which the United States elects the president
- An annual message delivered by the president to Congress
- The head of the executive branch
- Main group of advisors to the president
- The cabinet department responsible for foreign affairs
- Minimum age to be president of the US
- The cabinet department responsible for creating policies and programs related to education in the US
- The building where the president resides
Down
- Length of presidential term
- If a federal official commits a crime, this may happen
- The chamber of Congress responsible for approving presidential appointments
- The cabinet department responsible for monitoring terrorism, cybersecurity, and border security
- The cabinet department responsible for US nuclear infrastructure
- First in line of presidential succession
- The branch responsible for enforcing laws
- The department responsible for maintaining national parks
- Amoun of votes needed to win the electoral college
- The cabinet department responsible for national defense
20 Clues: Length of presidential term • The head of the executive branch • Minimum age to be president of the US • Month of the Presidential Inauguration • Main group of advisors to the president • First in line of presidential succession • The building where the president resides • The branch responsible for enforcing laws • Amoun of votes needed to win the electoral college • ...
charlotte's computer apps review 2022-05-02
Across
- Protects your computer from cyber attacks
- Where all of your stuff is stored.
- An app that you use functions in.
- The page at the very end of something to show where you got your information
- What app do you make a poster or card on?
- Teacher.
- What app do you use to communicate with teachers or other students during school time?
- Mean people that try to steal your information online
- An app used to make your works cited page.
- Copying other people's words is known as _____
Down
- This class.
- An app that makes it easy to present your ideas.
- Something that is really bad in Ms. Burghorns class
- You can make videos or podcasts on _____.
- Something supplied by the school so we can do all of this.
- An app used to make a survey.
- What is the default size margin?
- Format for English essays
- Quick access to websites or apps.
- What app can you write essays and papers in.
20 Clues: Teacher. • This class. • Format for English essays • An app used to make a survey. • What is the default size margin? • An app that you use functions in. • Quick access to websites or apps. • Where all of your stuff is stored. • Protects your computer from cyber attacks • You can make videos or podcasts on _____. • What app do you make a poster or card on? • ...
TEKA TEKI SILANG EKONOMI DIGITAL 2024-10-26
Across
- contoh aplikasi di ekonomi digital dalam bidang Transportasi
- tersambung ke internet (daring)
- pembeli tidak perlu berhari-hari untuk belanja langsung ke Cina
- sesuatu yang berupa teks, gambar, video serta identitas yang tersimpan di internet
- standar kode QR nasional untuk pembayaran di Indonesia
- perusahaan atau perorangan yang menyediakan barang untuk dijual ke konsumen
- kegiatan produksi, distribusi, konsumsi
- peraturan dan undang undang dalam perlindungan konsumen
- menggunakan teknologi dan jaringan internet dalam menyimpan data dan memproses data
- banyaknya persaingan dalam ekonomi digital
- ciri utama ekonomi digital
Down
- keamanan data di internet
- kecerdasan buatan
- web atau aplikasi yang memungkinkan pembeli untuk mencari, memesan, dan membayar produk secara digital
- ponsel yang telah menunjang penggunaan berbagai aplikasi digital
- konsumen membeli jersey ke penjual tanpa perantara
- contoh aplikasi di ekonomi digital dalam bidang bisnis
- contoh aplikasi di ekonomi digital dalam bidang kesehatan
- contoh aplikasi di ekonomi digital dalam bidang perbankan
- kemampuan memahami dan menggunakan teknologi digital secara efektif
20 Clues: kecerdasan buatan • keamanan data di internet • ciri utama ekonomi digital • tersambung ke internet (daring) • kegiatan produksi, distribusi, konsumsi • banyaknya persaingan dalam ekonomi digital • konsumen membeli jersey ke penjual tanpa perantara • contoh aplikasi di ekonomi digital dalam bidang bisnis • standar kode QR nasional untuk pembayaran di Indonesia • ...
cybercrime 2024-11-09
Across
- Virus or worm code hidden within a seemingly harmless program
- Theft Stealing another person’s identity to impersonate them online
- Fake messages asking for sensitive information
- Protection Protecting children from inappropriate online content
- Act of unauthorized copying or using someone's content
- Fake sites mimicking real ones to steal information
- Passwords, PINs, and fingerprints used for digital security
- Protecting data and systems from cyber attacks
- Software designed to harm or exploit computers
- Common scam emails that trick people into sharing private info
- Attacks aimed at disrupting or disabling a network
Down
- Financial theft through hacking or scams
- Law-breaking activities online
- The backbone of online communications targeted by cybercriminals
- Method of verifying identity online, often in two steps
- Tracking software that monitors user activity without consent
- Criminals who exploit security weaknesses online
- Testing Breaking into a system to test its defenses legally
- Program that spreads across computers, copying itself
- Illegal access to systems without permission
20 Clues: Law-breaking activities online • Financial theft through hacking or scams • Illegal access to systems without permission • Fake messages asking for sensitive information • Protecting data and systems from cyber attacks • Software designed to harm or exploit computers • Criminals who exploit security weaknesses online • Attacks aimed at disrupting or disabling a network • ...
Cybersecurity Crossword Challenge 2024-09-08
Across
- Software that secretly monitors user activity and collects personal information.
- A technique where a fake email or website is used to look like a trusted source.
- Software designed to harm or exploit any device it infects.
- When sensitive information is exposed due to a cyberattack or leak.
- A scam where attackers trick you into sharing personal information.
- A network security system that monitors and controls incoming and outgoing traffic.
Down
- Malware that locks your files and demands payment.
- A tool that encrypts your internet connection, often used for secure browsing.
- The process of scrambling data to keep it secure from unauthorized access.
9 Clues: Malware that locks your files and demands payment. • Software designed to harm or exploit any device it infects. • When sensitive information is exposed due to a cyberattack or leak. • A scam where attackers trick you into sharing personal information. • The process of scrambling data to keep it secure from unauthorized access. • ...
Cybersecurity Best Practices 2024-11-08
Across
- A security practice of regularly backing up important data.
- A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock.
- A security measure that protects against unauthorized access to a network.
- A security practice of regularly updating software and systems.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible
Down
- A malicious software.
- A technique used to trick someone into revealing sensitive information.
- A security measure that prevents unauthorized access to data & systems.
- A security measure that hides data to make it unreadable.
9 Clues: A malicious software. • A security measure that hides data to make it unreadable. • A security practice of regularly backing up important data. • A security practice of regularly updating software and systems. • A technique used to trick someone into revealing sensitive information. • A security measure that prevents unauthorized access to data & systems. • ...
Cybersecurity Fundamental Chapter 1 2022-11-29
Across
- Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database.
- group of criminals breaks into computers or networks to gain access for various reasons.
- Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- The Honeynet project is an example of creating Early Warning Systems.
Down
- great businesses have been created by collecting and harnessing the power of data and data analytics.
- InfraGard is an example of wide spread sharing of cyber intelligence.
- hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- hackers who rally and protest against different political and social ideas. cyber-criminals These are black hat hackers who are either self-employed or working for large cybercrime organizations.
- Business large and small have recognized the power of big data and data analytics.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
13 Clues: InfraGard is an example of wide spread sharing of cyber intelligence. • The Honeynet project is an example of creating Early Warning Systems. • Business large and small have recognized the power of big data and data analytics. • group of criminals breaks into computers or networks to gain access for various reasons. • ...
CyberSecurity: Ch. 7 2022-11-30
Across
- unsolicited email sent to large groups
- one who accesses internet without permission
- malicious software
- acts involving a computing device on the internet
Down
- blocks unauthorized access
- connect to wifi without owner's permission
- a small text file to store personal info
- software that tracks your activity without your knowledge
- a collection of zombie computers
9 Clues: malicious software • blocks unauthorized access • a collection of zombie computers • unsolicited email sent to large groups • a small text file to store personal info • connect to wifi without owner's permission • one who accesses internet without permission • acts involving a computing device on the internet • software that tracks your activity without your knowledge
Cybersecurity Fundamentals Chapter 5 2024-06-05
Across
- Digital certificates are used to establish the identity of an entity (person, organization, or device) in online communications.
- Verifies that the data entered into a system conforms to expected formats and types, helping prevent common database attacks that involve injecting malformed data
- Methods and processes to ensure that data remains accurate, consistent, and reliable throughout its lifecycle.
- **: Identifies patterns in data that do not conform to expected behavior.
- Cryptographic methods used to validate the authenticity and integrity of a message, software, or digital document.
- The processes and rules applied to maintain the integrity of data within a database.
- Maintains the consistency of relationships between tables.
Down
- Mechanisms to ensure correct data entry into systems.
- Checks that data falls within specified parameters, ensuring completeness, accuracy, and consistency.
- Custom rules defined by users to meet specific data integrity requirements that are not covered by the other types of integrity rules
- Ensures that each row in a table has a unique identifier, typically a primary key, which uniquely identifies each entity in the table
- Ensures that data in a column adheres to a defined set of valid values.
- Techniques used to ensure data integrity by converting data into a fixed-length hash value.
13 Clues: Mechanisms to ensure correct data entry into systems. • Maintains the consistency of relationships between tables. • Ensures that data in a column adheres to a defined set of valid values. • **: Identifies patterns in data that do not conform to expected behavior. • The processes and rules applied to maintain the integrity of data within a database. • ...
Net work componets 2022-10-27
Across
- What is an ISDN adapter?
- In a network environment, a transceiver gets its name from being both a transmitter and a receiver of signals, such as analog or digital.
- A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
- Description A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- A firewall is defined as a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
- A bridge is a network device that connects multiple LANs
- Services Digital Network (ISDN) provides you with a digital connection that allows you to communicate by using any combination of voice, data, and video, among other multimedia applications.
- A network switch connects devices (such as computers, printers, wireless access points) in a network to each other, and allows them to 'talk' by exchanging data packets
- Open, global specification that enables users of wireless devices to access and interact with wireless information services and applications.
9 Clues: What is an ISDN adapter? • A bridge is a network device that connects multiple LANs • A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together. • In a network environment, a transceiver gets its name from being both a transmitter and a receiver of signals, such as analog or digital. • ...
Get Familiar with IEEE's Technology Predictions for 2024 2024-02-10
Across
- Success Rank >10, Maturity Grade C/D (Middle word)
- Success Grade C+, Maturity Rank 18
- Maturity Grade C/D,Success Rank >20 (Last word)
- Success Grade B-, Market Adoption Rank 13 (Last word)
Down
- Commercial Adoption Horizon >3.36 years, Success Grade B (Last word)
- Commercial Adoption Horizon <2.98 years, Maturity Grade B- (Last word)
- Commercial Adoption Horizon Rank 11, Impact to Humanity Rank 10
- Market Adoption Grade B, Maturity Rank 1 (First word)
8 Clues: Success Grade C+, Maturity Rank 18 • Maturity Grade C/D,Success Rank >20 (Last word) • Success Rank >10, Maturity Grade C/D (Middle word) • Market Adoption Grade B, Maturity Rank 1 (First word) • Success Grade B-, Market Adoption Rank 13 (Last word) • Commercial Adoption Horizon Rank 11, Impact to Humanity Rank 10 • ...
GRC 2024-10-14
5 Clues: things you must follow (GRC) • data in the form of digits (Data Department) • something risky or harmful (Risk Department) • protects your online accounts (Cybersecurity) • keeping people safe (Health and Safety Department)
Season4Sharing Scavenger Hunt! 2020-12-08
Across
- Our CFO's Last Name
- Service Makes Individuals’ Lives Easier
- Last Name of Nobel Prize Winner interviewed by Jean English during Ignite20
- Nikesh announced our intent to acquire this company in Nov 11, 2020
- A world where each day is safer and more secure than the one before
Down
- First name of one of our founders
- One of our NGFW competitors
- It is the name of our of our main brands
- Where has James McGregor worked the longest?
- On this month, Palo Alto Networks became a public company in the NYSE Stock Market
- To be the cybersecurity partner of choice, protecting our digital way of life
- Palo Alto Networks Stock Symbol
12 Clues: Our CFO's Last Name • One of our NGFW competitors • Palo Alto Networks Stock Symbol • First name of one of our founders • Service Makes Individuals’ Lives Easier • It is the name of our of our main brands • Where has James McGregor worked the longest? • Nikesh announced our intent to acquire this company in Nov 11, 2020 • ...
Programs of Study 2023-08-08
5 Clues: Digital protection under STEM. • A Program of study under Regional. • How many programs of study in CTE? • Nursing is under which Program of Study? • What Program of study is Culinay Arts under?
Module 8 EDM-250 2023-08-16
5 Clues: National Flood Insurance Program • 1990's program called Project _____ • after 9/11 changed from all-hazard to ____ • Critical emerging hazard w/ critical impacts • lack of leadership is the most _____ issue in EM
Module 8 EDM-250 2023-10-17
5 Clues: National Flood Insurance Program • 1990's program called Project _____ • after 9/11 changed from all-hazard to ____ • Critical emerging hazard w/ critical impacts • lack of leadership is the most _____ issue in EM
Cybersecurity Crossword Puzzle 2023-05-15
Across
- It is important to keep a clean desktop. You should store your files on your instead of your desktop to ensure your files are backup and protected.
- is malicious software, or malware, that prevents you from accessing your files, systems, or netowkrs and demands you pay a ransomw for their return.
- -factor authentication is a second layer of security that protects our networks from cyber-attack.
- Alert Button We report phishing by using the
- threat is when authorized access is used intentionally or unitentionally to harm Intermountain Health or any of it's subsidiary companies.
Down
- is a combination of 'deep learning' and 'fake'.this is a synthetic media that has been digitally manipulated to replace one person's likeness convincingly with that of another.
- Rule requires appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
- such as curiosity, urgency, greed, and fear are used in phishing emails.
- can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data.
9 Clues: Alert Button We report phishing by using the • such as curiosity, urgency, greed, and fear are used in phishing emails. • -factor authentication is a second layer of security that protects our networks from cyber-attack. • can be described as a crime employing both social engineering and technical subterfuge to steal personal and professional data. • ...
Cybersecurity Awareness Month 2024-05-06
Across
- The practice of accessing a computer or network without authorization.
- Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
- A technique used to verify the identity of a user by requiring two different forms of authentication.
- A unique string of characters used to authenticate a user's identity.
Down
- A program designed to prevent unauthorized access to or from a private network.
- Malicious software designed to gain unauthorized access to a computer system.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- A piece of software designed to block access to a computer system until a sum of money is paid.
- A method of protecting sensitive data by converting it into an unreadable format.
9 Clues: A unique string of characters used to authenticate a user's identity. • The practice of accessing a computer or network without authorization. • Malicious software designed to gain unauthorized access to a computer system. • A program designed to prevent unauthorized access to or from a private network. • ...
Internet Security Crossword puzzle 2022-10-24
Across
- Who can communicate and control servers if their computers get an infection?
- What is the main thing Malware tries to attack?
- What type of internet hack uses fake sources of emails?
- What can Malware use to send more viruses?
Down
- What is an alternative to internet security?
- Who can collect your user credentials?
- What can Malware steal if it gets into your device?
7 Clues: Who can collect your user credentials? • What can Malware use to send more viruses? • What is an alternative to internet security? • What is the main thing Malware tries to attack? • What can Malware steal if it gets into your device? • What type of internet hack uses fake sources of emails? • ...
Attack and Risk Vectors 2023-08-17
Across
- like pretending to be a legitimate website
- harmful software
- or holding a PC or operation station hostage
- a cybercriminal's path to breach a computer system or network
- tricking people into revealing sensitive information, often through deceptive emails or fake websites?
Down
- send fake emails
- the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.
7 Clues: send fake emails • harmful software • like pretending to be a legitimate website • or holding a PC or operation station hostage • a cybercriminal's path to breach a computer system or network • tricking people into revealing sensitive information, often through deceptive emails or fake websites? • ...
Puzzle #31 2023-02-05
Across
- - the protection of computers and networks from digital threats
- - information that can be processed by a computer
- - a collection of structured data
- - a computer that requests resources from a server
- - a set of instructions used to perform a specific task
- reality - a simulated environment that can be experienced through computer devices
Down
- computing - using remote servers over the internet to store, process, and manage data
- - a security system that monitors and controls incoming and outgoing network traffic
- - the process of converting data into a code to protect it
- intelligence - the development of computer systems to perform tasks that normally require human intelligence
- - a computer that provides shared resources
11 Clues: - a collection of structured data • - a computer that provides shared resources • - information that can be processed by a computer • - a computer that requests resources from a server • - a set of instructions used to perform a specific task • - the process of converting data into a code to protect it • ...
SMART CITIES 2022-02-15
Across
- The transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
- T in ciTies
- SMART is the ___ use of resources in an efficient & effective way
- a person who is among the first to explore or settle a new country or area
- E in citiEs
- C in Cities
- facts and statistics collected together for reference or analysis
Down
- 2nd I in citIes
- S in citieS
- A global network which facilitates communication and sharing of information online
- the protection of computer systems and networks from cyber threats
- 1st I in cIties
- Reuse discarded objects or material in such a way as to create a product of higher quality or value than the original
13 Clues: S in citieS • T in ciTies • E in citiEs • C in Cities • 2nd I in citIes • 1st I in cIties • SMART is the ___ use of resources in an efficient & effective way • facts and statistics collected together for reference or analysis • the protection of computer systems and networks from cyber threats • a person who is among the first to explore or settle a new country or area • ...
"Algorithm Enigma: A Technology and AI Crossword" 2023-07-01
Across
- an ai art generator
- image recognition api by microsoft
- A friendly AI assistant that can chat with you and answer questions.
- programming language commonly used in machine learning
- Using AI to create convincing fake videos or images
- When AI becomes self-aware and starts thinking like a human.
- father of artificial intelligence
Down
- personalized news app that curates articles using ai algorithms
- An AI art generator that takes you on a creative adventure.
- Recipe for solving a problem in the digital world.
- co-founder of DeepMind
- Machines that can do tasks on their own, like helpful little friends
- deep learning framework popular for computer vision tasks
- Protecting against digital threats with AI-powered defense systems.
- Letting machines do the work, so you can sit back and relax.
15 Clues: an ai art generator • co-founder of DeepMind • father of artificial intelligence • image recognition api by microsoft • Recipe for solving a problem in the digital world. • Using AI to create convincing fake videos or images • programming language commonly used in machine learning • deep learning framework popular for computer vision tasks • ...
Chapter 3 : Digital Culture and Society 2024-04-01
Across
- - Health services provided through digital platforms.
- Z - Demographic cohort known for its deep engagement with digital technology.
- Dependency - Overreliance on digital devices affecting daily life.
- - Digital method of making payments, like PayPal or Apple Pay.
- Media - Platforms for networking and communication online.
- - Measures to protect against unauthorized digital attacks.
- Privacy - Protection of personal information in the digital age.
Down
- Learning - Educational approach combining online and face-to-face methods.
- Society - A society transformed by the integration of advanced technologies.
- Shopping - Buying goods or services via the internet.
- Navigation - Technology used for determining one’s location and finding routes.
- Tech - Devices used for tracking health and activity.
- - Country recognized for its advanced digital society.
- - Method of watching TV and movies over the internet.
- Work - Employment model where tasks are completed outside a traditional office.
15 Clues: - Health services provided through digital platforms. • Shopping - Buying goods or services via the internet. • Tech - Devices used for tracking health and activity. • - Method of watching TV and movies over the internet. • - Country recognized for its advanced digital society. • Media - Platforms for networking and communication online. • ...
TTS INFOR 2024-11-22
Across
- Salah satu bentuk pelanggaran UU ITE.
- Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
- Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
- Proses pembuatan konten digital seperti video, gambar, atau musik.
- Bagian dari sistem komputer yang berfungsi untuk memproses data.
- Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
- Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
- Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
- Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
- Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
- Protokol yang digunakan untuk menghubungkan perangkat ke internet.
- Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
- Istilah lain untuk keamanan jaringan.
- Jenis konten digital yang paling banyak diakses melalui internet.
14 Clues: Salah satu bentuk pelanggaran UU ITE. • Istilah lain untuk keamanan jaringan. • Cara mengelola kata sandi agar tetap aman dan sulit ditebak. • Bagian dari sistem komputer yang berfungsi untuk memproses data. • Perangkat lunak yang digunakan untuk mengelola jaringan komputer. • Jenis konten digital yang paling banyak diakses melalui internet. • ...
Technology Vocabulary 2024-11-12
Across
- A collection of data organized for easy access.
- The practice of protecting computers and data from unauthorized access.
- Programs and operating systems that tell the hardware what to do
- Converting data into a secret code for security
Down
- The physical parts of a computer
- The ability of a computer to perform tasks needing human intelligence
- A way of representing information using only two digits, 0 and 1.
- Writing instructions in a language a computer can understand
8 Clues: The physical parts of a computer • A collection of data organized for easy access. • Converting data into a secret code for security • Writing instructions in a language a computer can understand • Programs and operating systems that tell the hardware what to do • A way of representing information using only two digits, 0 and 1. • ...
chin kai er-8Gamma 2023-01-19
Across
- information you have in your account
- raw fact and figures
- is the practice systems network and program from digital-attacks
Down
- usually aimed at accessing ,changing , or destroying sensitive information
- are created when that data has been processed and become meaningful.
- the social media company owned by mark Zuckerberg
6 Clues: raw fact and figures • information you have in your account • the social media company owned by mark Zuckerberg • is the practice systems network and program from digital-attacks • are created when that data has been processed and become meaningful. • usually aimed at accessing ,changing , or destroying sensitive information
Cybersecurity Awareness Month 2024-05-07
Across
- The practice of accessing a computer or network without authorization.
- Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
- A technique used to verify the identity of a user by requiring two different forms of authentication.
- A unique string of characters used to authenticate a user's identity.
Down
- A program designed to prevent unauthorized access to or from a private network.
- Malicious software designed to gain unauthorized access to a computer system.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- A piece of software designed to block access to a computer system until a sum of money is paid.
- A method of protecting sensitive data by converting it into an unreadable format.
9 Clues: A unique string of characters used to authenticate a user's identity. • The practice of accessing a computer or network without authorization. • Malicious software designed to gain unauthorized access to a computer system. • A program designed to prevent unauthorized access to or from a private network. • ...
Cybersecurity Fundamentals Chapter 7 2022-10-27
Across
- tool used to protect data stored in the forms of files.
- prevent rogue access point, it is also known as two-way authentication.
- transforms data using a complicated algorithm to make it unreadable.
- the stages of an information systems attack.
- consist of permissions that limits folder or file access for an individual or for a group of users.
- one of the most effective ways of protecting against data lost.
- protects computers and mobile devices using reputable software
Down
- patches are codes that manufacturers provide to prevent a newly discovered virus or worm from making successful attack.
- locks physically protecting computer equipment.
- uses radio wave to identify and track objects.
- it freezes the hard disk partition, does not save any changes that the user makes.
- idle timeout and screen lock.
- copies the contents of the computer's hard disk to an image file.
13 Clues: idle timeout and screen lock. • the stages of an information systems attack. • uses radio wave to identify and track objects. • locks physically protecting computer equipment. • tool used to protect data stored in the forms of files. • protects computers and mobile devices using reputable software • one of the most effective ways of protecting against data lost. • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- This security tool identified and removes malicious programs
- The individuals who control access to people, data, and systems
- This attack occurs when cybercriminals research and track which sites employees visit the most
- What should you do when a workstation or device is no longer in use
- Any scenario that triggers emotions should also trigger your __________
Down
- Stealing money is the main goal behind this type of malware
- Failure to run these equals failure to patch security vulnerabilities
- You can help fight cybercrime by becoming a ________________
- ____are the last line of defense
- Kwiktrip's password policy requires that coworkers change their passwords _____days
- The future of security is____,not machines
- This attack occurs when someone sneaks into a secured area behind someone else
- This dangerous attack targets specific people or organization, often with custom made email or messages
- These are designed to maintain the security of everyone associated with an organization
14 Clues: ____are the last line of defense • The future of security is____,not machines • Stealing money is the main goal behind this type of malware • You can help fight cybercrime by becoming a ________________ • This security tool identified and removes malicious programs • The individuals who control access to people, data, and systems • ...
Online Safety 2020-10-16
Across
- used to protect your data on the internet.
- someone who gains unauthorized access to data
- slang for Facebook sabotage.
- a way to exchange messages over the internet.
- information stored on computers.
Down
- sending emails impersonating a company to get personal information and bank details.
- someone who uses the internet to bully people.
- something that keeps your account protected that only you know, they be in the form of bio metrics, letters and numbers.
8 Clues: slang for Facebook sabotage. • information stored on computers. • used to protect your data on the internet. • someone who gains unauthorized access to data • a way to exchange messages over the internet. • someone who uses the internet to bully people. • sending emails impersonating a company to get personal information and bank details. • ...
TTS INFORMATIKA 2024-11-22
Across
- Salah satu bentuk pelanggaran UU ITE.
- Cara mengelola kata sandi agar tetap aman dan sulit ditebak.
- Perangkat keras yang berfungsi sebagai pusat pengendali dalam sistem komputer.
- Proses pembuatan konten digital seperti video, gambar, atau musik.
- Bagian dari sistem komputer yang berfungsi untuk memproses data.
- Proses pemilihan jalur terbaik untuk mengirimkan data dalam jaringan komputer.
- Undang-undang yang mengatur tentang informasi dan transaksi elektronik di Indonesia.
Down
- Tindakan pencegahan yang dilakukan untuk melindungi sistem komputer dari akses yang tidak sah.
- Pengaruh positif dan negatif teknologi informasi terhadap kehidupan sosial.
- Perangkat lunak yang digunakan untuk mengelola jaringan komputer.
- Protokol yang digunakan untuk menghubungkan perangkat ke internet.
- Contoh serangan cyber yang bertujuan untuk melumpuhkan suatu sistem.
- Istilah lain untuk keamanan jaringan.
- Jenis konten digital yang paling banyak diakses melalui internet.
14 Clues: Salah satu bentuk pelanggaran UU ITE. • Istilah lain untuk keamanan jaringan. • Cara mengelola kata sandi agar tetap aman dan sulit ditebak. • Bagian dari sistem komputer yang berfungsi untuk memproses data. • Perangkat lunak yang digunakan untuk mengelola jaringan komputer. • Jenis konten digital yang paling banyak diakses melalui internet. • ...
Cyber Security! 2023-10-20
Across
- Viruses, Spyware, Malicious Softwares
- encoding data, by converting the original representation of the information
- Cybercriminals sending malicious emails.
Down
- results in confidential, sensitive information being exposed
- a string of characters that allows access to a computer system or service which is usually of short length
- protection from malicious attacks
- attacker encrypts the victim’s data and threatens to publish data unless a ransom is paid
7 Clues: protection from malicious attacks • Viruses, Spyware, Malicious Softwares • Cybercriminals sending malicious emails. • results in confidential, sensitive information being exposed • encoding data, by converting the original representation of the information • attacker encrypts the victim’s data and threatens to publish data unless a ransom is paid • ...
Digital literacy 2024-08-10
Across
- - The practice of protecting information from unauthorized access.
- - Technology used to secure online transactions and protect data.
- - Online platforms where people can share updates and interact.
- - A global network of interconnected computers and servers.
Down
- - The measure of how well personal information is protected online.
- - A collection of related web pages accessible through the internet.
- - The ability to use digital tools and technologies effectively.
- - A type of software used to access and view web pages.
- - Software used for specific tasks like creating documents or spreadsheets.
- - Data that provides context about other data.
- - The process of organizing and finding information online.
- - A system used to manage and organize digital documents.
12 Clues: - Data that provides context about other data. • - A type of software used to access and view web pages. • - A system used to manage and organize digital documents. • - The process of organizing and finding information online. • - A global network of interconnected computers and servers. • - Online platforms where people can share updates and interact. • ...
Cyber Safety 2024-03-05
Across
- A secret combination of words or numbers that allows a user to access an online service
- an attempt to trick a person into giving away money or information by pretending to be a well-known company
- harm inflicted through text, emails, or online sites
- online etiquette - being nice and respectful to others online
- software that displays unwanted advertising on your computer
- someone who gains unauthorized access to people's computers
- software designed to damage a computer of phone
- searching through websites freely
- a dishonest scheme to get information or money
- self-replicating program that attacks a computer system
Down
- short form for “world wide web"
- leaving offensive messages on the internet
- computer equipment, machines, and parts
- an internet-related crime
- when someone tracks, lures, or harasses people online
- a security system used to block malicious threats to your computer
- any action that’s taken to protect computers and prevent online crime
- a shorter word for internet
- unwanted emails or junk mail
19 Clues: an internet-related crime • a shorter word for internet • unwanted emails or junk mail • short form for “world wide web" • searching through websites freely • computer equipment, machines, and parts • leaving offensive messages on the internet • a dishonest scheme to get information or money • software designed to damage a computer of phone • ...
Computer Ethics Crossword 2024-04-05
Across
- A shorter word for "Internet"
- An attempt to trick a person into giving away money or information by pretending to be a well-known company
- A secret combination of words or numbers that allows a user to access an online service
- Short form for "World Wide Web"
- Harm inflicted through text, emails, or online sites
- Any action that's taken to protect and prevent online crime
- When someone tracks, lures, or harasses people online
- Software designed to damage a computer or phone
- A security system used to block threats to your computer
Down
- An internet-related crime
- Online etiquette-being nice and respectful to others online
- Leaving offensive messages on the internet
- Unwanted emails or junk mail
- Software that displays unwanted advertising on your computer
- Searching through websites freely
- Self-replicating software program that attacks a computer system
- A dishonest scheme to get information or money
- Computer equipment, machines, and parts
- Someone who gains unauthorized access to people's computers
19 Clues: An internet-related crime • Unwanted emails or junk mail • A shorter word for "Internet" • Short form for "World Wide Web" • Searching through websites freely • Computer equipment, machines, and parts • Leaving offensive messages on the internet • A dishonest scheme to get information or money • Software designed to damage a computer or phone • ...
Cybersecurity Awareness 2021-09-24
Cybersecurity Awareness 2021-09-24
Cybersecurity Awareness 2024-08-09
Cybersecurity Threats 2024-03-21
Across
- Games Some games might encourage to make in-app purchases
- in the Middle Attacker intercepts or manipulates the communication between two parties without their knowledge or consent.
- Websites avoid clicking on pop-up ads or links from unknown sources.
- Unauthorized individuals trying to gain access to computer systems
Down
- Disrupt the normal functioning of a targeted system
- Engineering Tricks the users into providing an entry point for malware.
6 Clues: Disrupt the normal functioning of a targeted system • Games Some games might encourage to make in-app purchases • Unauthorized individuals trying to gain access to computer systems • Websites avoid clicking on pop-up ads or links from unknown sources. • Engineering Tricks the users into providing an entry point for malware. • ...
Nasalization of SEIRIM 2021-10-29
6 Clues: Name for a Chinese astronaut • Theme style for the new SEIRIM design • Minutes away from Nasa where Stephen grew up • Website where Stephen got most of his design examples • New service from SEIRIM that keeps client companies safe • Design asset type which is source of the name "Nasalization"
July 15 2024-07-15
6 Clues: A method of encoding data • Language for Managing Database • A temporary storage area used to quickly access data • The process of finding and fixing errors in a program • The practice of protecting systems from digital attacks • A visual way to represent the flow of data in a program
Senior Cybersecurity Words to Know 2024-01-04
Across
- An area of the computer's memory that only one program can acess
- Removing any unnecessary information
- A current or former employee who has access to a company's data or network and could be part of an attack
- A piece of message or data transmitted through the internet
- address A series of numbers unique to a device
- Giving as few people as necessary access to digital content
Down
- Anything that is stored on a computer.
- The protection of digital devices against attacks
- A black and white code that contains data
- A box that conducts electricity and prevents electromagnetic charges
- A wireless access point that provides internet access
- Keeping information from being seen by certain users
12 Clues: Removing any unnecessary information • Anything that is stored on a computer. • A black and white code that contains data • address A series of numbers unique to a device • The protection of digital devices against attacks • Keeping information from being seen by certain users • A wireless access point that provides internet access • ...
DBMS and GIT commands 2023-03-09
Across
- A process of securely logging into a computer system or network
- A type of NoSQL database management system
- A technique used to protect computer networks and systems
- A type of application designed to run on cloud infrastructure
Down
- A security practice that involves protecting sensitive information from unauthorized access or disclosure
- A design pattern used in software development that emphasizes loose coupling between components
- A type of database management system
- A version control system commonly used in software development
- A tool used in software development to automate the building and testing of code
- Object-oriented programming paradigm
10 Clues: A type of database management system • Object-oriented programming paradigm • A type of NoSQL database management system • A technique used to protect computer networks and systems • A type of application designed to run on cloud infrastructure • A version control system commonly used in software development • ...
Tugas-Jaringan Komputer dan Internet 2024-01-11
Across
- sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
- pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
- Perangkat yang digunakan manusia untuk memudahkan kehidupannya
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
- menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Bus Topologi yang menyerupai rel kereta api dinamakan
- Aspek teknik ada berapa
- Personal Area Network singkatan dari
- bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header
10 Clues: Aspek teknik ada berapa • Personal Area Network singkatan dari • Bus Topologi yang menyerupai rel kereta api dinamakan • Perangkat yang digunakan manusia untuk memudahkan kehidupannya • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain • ...
Tugas-Jaringan Komputer dan Internet 2024-01-11
Across
- sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
- pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
- Perangkat yang digunakan manusia untuk memudahkan kehidupannya
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
- menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Bus Topologi yang menyerupai rel kereta api dinamakan
- Aspek teknik ada berapa
- Personal Area Network singkatan dari
- bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header
10 Clues: Aspek teknik ada berapa • Personal Area Network singkatan dari • Bus Topologi yang menyerupai rel kereta api dinamakan • Perangkat yang digunakan manusia untuk memudahkan kehidupannya • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain • ...
Making Science Work and knowing STEM 2024-09-06
Across
- the original model of something from which later forms are developed
- a type of machine through which liquid or gas flows and turns a special wheel with blades in order to produce power
- The study of the brain
- A new or dramatic discovery or advancement
- Important or noticeable
- The study of space and the universe
- A new process or device
Down
- a test done in order to learn something or to discover if something works or is true
- ways of protecting computer systems against threats such as viruses
- to study something in a systematic and careful way
10 Clues: The study of the brain • Important or noticeable • A new process or device • The study of space and the universe • A new or dramatic discovery or advancement • to study something in a systematic and careful way • ways of protecting computer systems against threats such as viruses • the original model of something from which later forms are developed • ...
Cyber Safety 2024-04-15
Across
- A secret combination of words or numbers that allows a user to access an online service
- an attempt to trick a person into giving away money or information by pretending to be a well-known company
- harm inflicted through text, emails, or online sites
- online etiquette - being nice and respectful to others online
- software that displays unwanted advertising on your computer
- someone who gains unauthorized access to people's computers
- software designed to damage a computer of phone
- searching through websites freely
- a dishonest scheme to get information or money
- self-replicating program that attacks a computer system
Down
- short form for “world wide web"
- leaving offensive messages on the internet
- computer equipment, machines, and parts
- an internet-related crime
- when someone tracks, lures, or harasses people online
- a security system used to block malicious threats to your computer
- any action that’s taken to protect computers and prevent online crime
- a shorter word for internet
- unwanted emails or junk mail
19 Clues: an internet-related crime • a shorter word for internet • unwanted emails or junk mail • short form for “world wide web" • searching through websites freely • computer equipment, machines, and parts • leaving offensive messages on the internet • a dishonest scheme to get information or money • software designed to damage a computer of phone • ...
Claims Board Friday Fun 9/13 2024-09-13
Across
- Movie name referred by Google CEO during his meetings
- Attaches itself to clean files and spreads to other files
- 14 year old scientist created specialized soap to treat cancer
- Publishes latest tech news and Tech CEOs start their day going through this site
- Use phone calls to trick individuals to reveal personal details
- Urgency of a work item to be worked upon
- Cybersecurity form with major outage impacting Microsoft apps
Down
- Bug not directly related to the code
- Effective way of writing User stories
- Company which will bring 2 astronauts who are stuck in International Space Station
- Every action has an outcome and none other than you are responsible for it
- Deceives via emails
- Level of Impact
- Caused by Solar Storms
- Text messages to trick individuals to reveal personal information
15 Clues: Level of Impact • Deceives via emails • Caused by Solar Storms • Bug not directly related to the code • Effective way of writing User stories • Urgency of a work item to be worked upon • Movie name referred by Google CEO during his meetings • Attaches itself to clean files and spreads to other files • Cybersecurity form with major outage impacting Microsoft apps • ...
Cybersecurity 2023-03-26
Cybersecurity 2023-09-13
Across
- A spear phishing attack to be precise with the objective being to trick employees into taking harmful actions, typically sending money to the attacker.
Down
- Sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.
- A 4 step method used for checking suspicious emails to make sure they are not a phishing email.
4 Clues: A 4 step method used for checking suspicious emails to make sure they are not a phishing email. • A spear phishing attack to be precise with the objective being to trick employees into taking harmful actions, typically sending money to the attacker. • ...
Computer Ethics Crossword 2022-10-11
Across
- A shorter word for "Internet"
- An attempt to trick a person into giving away money or information by pretending to be a well-known company
- A secret combination of words or numbers that allows a user to access an online service
- Short form for "World Wide Web"
- Harm inflicted through text, emails, or online sites
- Any action that's taken to protect and prevent online crime
- When someone tracks, lures, or harasses people online
- Software designed to damage a computer or phone
- A security system used to block threats to your computer
Down
- An internet-related crime
- Online etiquette-being nice and respectful to others online
- Leaving offensive messages on the internet
- Unwanted emails or junk mail
- Software that displays unwanted advertising on your computer
- Searching through websites freely
- Self-replicating software program that attacks a computer system
- A dishonest scheme to get information or money
- Computer equipment, machines, and parts
- Someone who gains unauthorized access to people's computers
19 Clues: An internet-related crime • Unwanted emails or junk mail • A shorter word for "Internet" • Short form for "World Wide Web" • Searching through websites freely • Computer equipment, machines, and parts • Leaving offensive messages on the internet • A dishonest scheme to get information or money • Software designed to damage a computer or phone • ...
Virus- Alexis Goodney 2018-11-15
Across
- an unwanted piece of software that does something to your computer
- a person who uses computers to gain unauthorized info
- messages distributed to recipients via a network
- collection of data instructions that tells a computer what to do
- good hacker who hacks to find out how a companies system is faulty
- protection of computer systems
Down
- blocking servers, clogging up networks so they can't get to real costumers
- a strategy that pretends to be something it isn't
- violates security for personal gain
- something that enters your network's system then duplicates itself and spreads via the network
- programming instructions
- the attempt to obtain personal information by disguising yourself as a reliable company
- a reason why someone might send you a virus
- software intended to disable computers
- a type of computer virus
15 Clues: programming instructions • a type of computer virus • protection of computer systems • violates security for personal gain • software intended to disable computers • a reason why someone might send you a virus • messages distributed to recipients via a network • a strategy that pretends to be something it isn't • a person who uses computers to gain unauthorized info • ...
Technology words 2023-05-10
Across
- where your teachers assign you work to do for classes
- where a global system hooks up to networks
- a long communication without wires
- where you can watch videos for classes or for fun
- where you can send mail digitally to workers, teachers or student
- where it can be instructed by hardware
- when something is transmitting information by various types
Down
- it is designed to protect your computers and other devices from bugs ands hackers
- where you can look up answers or look for evidence
- where you can create a web browser
- where you can make a presentation
- where you create a bar graph, line graph, or a pie chart
- where scientists design and build machines
- where it widely describes wide range of technology's
- where you can hook up to internet and use your technology better
15 Clues: where you can make a presentation • where you can create a web browser • a long communication without wires • where it can be instructed by hardware • where a global system hooks up to networks • where scientists design and build machines • where you can watch videos for classes or for fun • where you can look up answers or look for evidence • ...
tech crossword 2023-06-07
Across
- a type of computer memory where data is stored
- it is a mobile operating system
- a malicous software that may cause disruption to your computer and leak private information online
- it is any sequence of one or more symbols
- small blocks of data created by a server
- a system that protects the Internet from cyber attacks
- a program that once is executed, would cause major damage to the computer
Down
- a digital representation of text and data
- a collection of data duplicating original values
- a mapping for some domain to bits
- one of the largest technology companies
- an image that is used for representing data
- a hardware used for transmitting digital video and audio from one device to another
- a moving digital image
- a method of transmitting and receiving messages using electronic devices
15 Clues: a moving digital image • it is a mobile operating system • a mapping for some domain to bits • one of the largest technology companies • small blocks of data created by a server • a digital representation of text and data • it is any sequence of one or more symbols • an image that is used for representing data • a type of computer memory where data is stored • ...
NotPetya Crossword. 2023-10-19
Across
- forename of the person who created this crossword
- modified version of Petya
- damaging process NotPetya did to files
- name of the country that was most affected by the NotPetya ransomware attack.
- year that the NotPetya ransomware attack occurred.
- abbreviation of the Russian organization that created it
- what class are we in?
Down
- behaves more like a ______ malware rather than ransomware
- while NotPetya may have been targeted at Ukraine, what was the bigger "group" that was affected
- shipping company majorly affected by NotPetya
- the file was more a ______ than a killswitch
- name of the cybercriminal group believed to be responsible for the NotPetya ransomware attack.
- how long after the outbreak did the police raid the headquarters?
- amount of billions that NotPetya is estimated to have caused in damages.
14 Clues: what class are we in? • modified version of Petya • damaging process NotPetya did to files • the file was more a ______ than a killswitch • shipping company majorly affected by NotPetya • forename of the person who created this crossword • year that the NotPetya ransomware attack occurred. • abbreviation of the Russian organization that created it • ...
Functions of the departments 2021-10-11
Across
- Responsible for assigning employees (workers) or vehicles to customers.
- Responsible for making the product
- Responsible for the office/building and any repairs.
- Responsible for the management of the flow of things between the point of origin and the point of consumption in order to meet requirements of customers or corporations.
- Responsible of server configurations, routing protocols, network configurations and storage environments.
Down
- Responsible for keeping a connection with different departments
- Responsible for selling the product/service.
- work with organizations to keep their computer information systems secure.
- Responsible for the company's computers and proper function of the equipment.
- Responsible for payments, bills and expenses.
- Responsible for hiring new staff
11 Clues: Responsible for hiring new staff • Responsible for making the product • Responsible for selling the product/service. • Responsible for payments, bills and expenses. • Responsible for the office/building and any repairs. • Responsible for keeping a connection with different departments • Responsible for assigning employees (workers) or vehicles to customers. • ...
Unit 5 Vocabulary 2023-09-03
Across
- A set of processes that are to be followed in order to complete an operation; a method to do something.
- Usage of automatic equipment (i.e machines) to automate a process.
- Protection of electronic data from criminals or unauthorized usage.
- An excessive amount; too much.
- Recognition of individuals from biological measurements or physical appearance.
Down
- The action of creating a new idea, product, etc.
- The state of being dependent.
- Rapid growth or reproduction of something.
- Using a network of servers to store data and information on the internet rather than a single computer.
- Being enthusiastic about technology or new advancements in technology.
- Adaptation to the usage of computers and internet.
11 Clues: The state of being dependent. • An excessive amount; too much. • Rapid growth or reproduction of something. • The action of creating a new idea, product, etc. • Adaptation to the usage of computers and internet. • Usage of automatic equipment (i.e machines) to automate a process. • Protection of electronic data from criminals or unauthorized usage. • ...
Q1 Crssword 2023-04-25
Across
- ____ First - deliver problem resolution and exceed customer expectations
- Product that extends patching to protect over 350 third party apps
- Software-defined secondary storage solution
- Firm who provided an audit of the systems management appliance source code
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Company who’s slogan Where Next Meets Now?
- Information Systems Management abbreviation
Down
- Cloud ready enterprise backup software
- Practice of defending computers, networks and data from malicious attacks
- This product released Query Insights, which allows customers to gain visibility into the performance of SQL statements
- Month of the Sales Kickoff Meeting 2023
- Celebrating its 25th anniversary
- ___ Thompson, President and GM
- Abbreviation, primarily covering the erwin portfolio and Toad data point
14 Clues: ___ Thompson, President and GM • Celebrating its 25th anniversary • Cloud ready enterprise backup software • Month of the Sales Kickoff Meeting 2023 • Company who’s slogan Where Next Meets Now? • Software-defined secondary storage solution • Information Systems Management abbreviation • Product that extends patching to protect over 350 third party apps • ...