cybersecurity Crossword Puzzles
Crossword#10 2023-07-11
Across
- - Storing and accessing data and applications remotely over the internet.
- - technology to manage business processes and operations.
- - Conducting business transactions online.
- - Creating virtual versions of computer hardware and software to increase efficiency and reduce costs.
- - Working remotely using technology to communicate and collaborate.
- - Using technology to automate routine tasks and processes.
Down
- - Protecting computer systems and networks from unauthorized access or attacks.
- - technology to manage interactions with customers.
- - computer system thatcan perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making.
- - Using data and statistical analysis to inform decision-making.
10 Clues: - Conducting business transactions online. • - technology to manage interactions with customers. • - technology to manage business processes and operations. • - Using technology to automate routine tasks and processes. • - Using data and statistical analysis to inform decision-making. • - Working remotely using technology to communicate and collaborate. • ...
Information and Network Security 2023-09-08
Across
- coded message
- Cause loss of message confidentiality
- A security principle that ensures data is accessible only to those authorized to view or modify it.
- A secret combination of characters used to authenticate a user's identity
- A type of malware that spreads by duplicating itself and infecting other programs
- This Ciphers these hide the message by rearranging the letter order
- The practice of protecting computer systems and networks from digital attacks.
Down
- Causes loss of message integrity
- Plain text message may be hidden in image or sound It is not encryption
- Is most difficult attack to find out
10 Clues: coded message • Causes loss of message integrity • Is most difficult attack to find out • Cause loss of message confidentiality • This Ciphers these hide the message by rearranging the letter order • Plain text message may be hidden in image or sound It is not encryption • A secret combination of characters used to authenticate a user's identity • ...
Techy Word Search Challenge 2024-04-16
Across
- Information stored and processed by computers, like numbers, text, or images.
- Writing instructions for a computer using a programming language.
- Machines that can move, sense, and interact with their environment.
- The physical parts of a computer that you can touch and see.
- A global network that connects computers worldwide.
Down
- Protecting computers, networks, and data from cyberattacks.
- Instructions for a computer's next move in a game.
- Intelligence: Computers that can learn, reason, and make decisions like humans.
- Programs that make computers work, like games, word processors, or music players.
- Turning information into a secret code to keep it safe from hackers.
10 Clues: Instructions for a computer's next move in a game. • A global network that connects computers worldwide. • Protecting computers, networks, and data from cyberattacks. • The physical parts of a computer that you can touch and see. • Writing instructions for a computer using a programming language. • ...
October Crossword - Cyber Security 2022-02-07
Across
- software designed to prevent, detect, and remove malware
- cyberattack that tries already compromised usernames and passwords in other sites
- username and ... should be complex
- any crime committed electronically
- pretending to be someone and accessing their information
Down
- fake messages from a seemingly trusted source designed to convince you to reveal information and give unauthorized access
- ensures that you are the only one who has access to your account
- campaign launched in 2010 by the Department of Homeland Security
- any software intended to damage, disable, or give someone unauthorized access
- agency that informs and educates about cybersecurity
10 Clues: username and ... should be complex • any crime committed electronically • agency that informs and educates about cybersecurity • software designed to prevent, detect, and remove malware • pretending to be someone and accessing their information • ensures that you are the only one who has access to your account • ...
technology crossword 2023-06-07
Across
- it is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure,
- it is a method of representing data in a visual,
- it represents text, computer processor instructions
- it is an American multinational technology company
- it is the most important processor in a given computer.
Down
- it is a mobile operating system
- it is a mapping from some domain
- it allows developers to directly manipulate its underlying data structures:...
- is a method of transmitting and receiving messages using electronic devices.
- it is a collection of discrete values that convey information,
10 Clues: it is a mobile operating system • it is a mapping from some domain • it is a method of representing data in a visual, • it is an American multinational technology company • it represents text, computer processor instructions • it is the most important processor in a given computer. • it is a collection of discrete values that convey information, • ...
Tugas-Jaringan Komputer dan Internet 2024-01-11
Across
- sistem kebijakan internal yang digunakan organisasi untuk mengelola, mengakses, dan mengamankan data perusahaan.
- pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain
- Perangkat yang digunakan manusia untuk memudahkan kehidupannya
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
Down
- menentukan kecepatan, tegangan, besaran fisik dan juga mengalirkan bit antara perangkat
- praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- Bus Topologi yang menyerupai rel kereta api dinamakan
- Aspek teknik ada berapa
- Personal Area Network singkatan dari
- bagian bawah pada website Anda dan selalu tampil di setiap halaman situs layaknya header
10 Clues: Aspek teknik ada berapa • Personal Area Network singkatan dari • Bus Topologi yang menyerupai rel kereta api dinamakan • Perangkat yang digunakan manusia untuk memudahkan kehidupannya • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • pengaturan yang dilakukan komputer agar dapat terhubung satu sama lain • ...
Claims Board Fun Friday 9/13 2024-09-12
Across
- Company which will bring 2 astronauts who are stuck in International Space Station
- Text messages to trick individuals to reveal personal information
- Cybersecurity form with major outage impacting Microsoft apps
- Attaches itself to clean files and spreads to other files
- Deceives via phone calls
- Use phone calls to trick individuals to reveal personal details
- Movie name referred by Google CEO during his meetings
Down
- Publishes latest tech news and Tech CEOs start their day going through this site
- Caused by Solar Storms
- Every action has an outcome and none other than you are responsible for it f
10 Clues: Caused by Solar Storms • Deceives via phone calls • Movie name referred by Google CEO during his meetings • Attaches itself to clean files and spreads to other files • Cybersecurity form with major outage impacting Microsoft apps • Use phone calls to trick individuals to reveal personal details • Text messages to trick individuals to reveal personal information • ...
Cybersecurity 2023-08-23
Cybersecurity Terminology Puzzle (participation 3) 2023-01-27
Across
- software that is harmful
- software that checks for malware
- internet access at starbucks
- scrambling data in unreadable
- attacks seeking out personal info
- software that tracks you
- shield for data
- tech savy criminals stealing private information
- improving security tools for cloud infrastructure
- multiple attackers preventing legitimate users
Down
- tricking users to click an image
- altered image creating false reality
- malware that makes you pay
- malware pretending to be useful
- designs, builds, and tests security systems
- malware that displays adverts
- network pro learning hacking techniques
- online harassment that intimidates victims
18 Clues: shield for data • software that is harmful • software that tracks you • malware that makes you pay • internet access at starbucks • scrambling data in unreadable • malware that displays adverts • malware pretending to be useful • tricking users to click an image • software that checks for malware • attacks seeking out personal info • altered image creating false reality • ...
Teka Teki Techco 2024-05-16
Across
- Istilah untuk volume data besar yang diproses untuk informasi.
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Istilah untuk volume data besar yang diproses untuk informasi. • Program perangkat lunak yang dirancang untuk melakukan tugas tertentu. • ...
Cybersecurity Crossword 2023-06-08
Across
- a computer security term for an isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
- a type of malicious software designed to disrupt a victim’s computer, server, or network.
- A chain of Internet-connected devices centrally controlled by a hacker
Down
- the process of disguising data so it’s impossible to decipher without authorization
- a type of email that you’ve technically solicited but may serve little to no purpose to you.
- tools that ask people to verify they are human and not robots
6 Clues: tools that ask people to verify they are human and not robots • A chain of Internet-connected devices centrally controlled by a hacker • the process of disguising data so it’s impossible to decipher without authorization • a type of malicious software designed to disrupt a victim’s computer, server, or network. • ...
Eldorado Anniversary 2023-09-23
Across
- What is Eldorado's zip code?
- What percentage score is required to pass the Workplace Readiness Exam?
- How many wrestling state championships has Eldorado won?
- What is the magnet coordinator's telephone extension?
- How many free CTE college credits can a student earn for completing the Cybersecurity program of study?
- What was the last year Eldorado had a second campus?
- What year did Mrs. Brockett graduate from Eldorado?
- What year was Eldorado Magnet launched?
- What year did Eldorado open a second campus?
Down
- What year did the first class graduate?
- What year did Eldorado open
- What are the last four digits of the schools telephone number?
- How many principals have served Eldorado
- How many classes of seniors have graduated from EHS?
- What is the street address of EHS?
- At its largest capacity, EHS housed over how many students?
- How many students was Eldorado designed to accommodate
- What year did Eldorado receive the MSA School of Distinction Award?
- How old is Eldorado
19 Clues: How old is Eldorado • What year did Eldorado open • What is Eldorado's zip code? • What is the street address of EHS? • What year did the first class graduate? • What year was Eldorado Magnet launched? • How many principals have served Eldorado • What year did Eldorado open a second campus? • What year did Mrs. Brockett graduate from Eldorado? • ...
TEKNOLOGI 2024-11-19
Across
- Teknologi elektronik yang dapat dipakai seperti jam pintar
- Teknologi dan praktik untuk melindungi sistem dan data dari ancaman
- OPTIC Teknologi transmisi data menggunakan kabel serat kaca
- Teknologi yang menghubungkan perangkat fisik ke internet
- Teknologi identifikasi berdasarkan ciri fisik manusia
- Mata uang digital yang menggunakan teknologi kriptografi untuk keamanan
- Teknologi untuk mengelola dan menganalisis data berukuran sangat besar
- Teknologi komputasi yang menggunakan prinsip mekanika kuantum
- Teknologi yang menciptakan versi virtual dari perangkat keras atau sistem operasi
- Serangkaian langkah yang digunakan untuk menyelesaikan masalah dalam teknologi
Down
- Teknologi basis data terdesentralisasi yang digunakan untuk menyimpan transaksi
- Teknologi yang menggabungkan dunia nyata dengan elemen virtual
- Kendaraan udara tanpa awak yang dikendalikan dari jarak jauh
- Layanan penyimpanan dan pemrosesan data melalui internet
- Ilmu yang mempelajari desain dan aplikasi robot
- Teknologi yang bekerja pada skala atom dan molekul
- Teknologi jaringan seluler generasi kelima yang sangat cepat
- Proses pengamanan data dengan mengubahnya menjadi kode
- HOME Sistem rumah pintar yang terhubung dengan teknologi otomatisasi
19 Clues: Ilmu yang mempelajari desain dan aplikasi robot • Teknologi yang bekerja pada skala atom dan molekul • Teknologi identifikasi berdasarkan ciri fisik manusia • Proses pengamanan data dengan mengubahnya menjadi kode • Layanan penyimpanan dan pemrosesan data melalui internet • Teknologi yang menghubungkan perangkat fisik ke internet • ...
Cybersecurity 2024-10-07
Across
- A 4 step method used for checking suspicious emails before taking any action.
- Occurs when someone accidentally causes harm, such as by clicking on a malicious link.
Down
- Software intentionally designed to cause disruption to a computer, server, client, or network.
- Highly personalized and targets a specific individual, often using details like their name, position, or projects they're involved in to appear more legitimate.
4 Clues: A 4 step method used for checking suspicious emails before taking any action. • Occurs when someone accidentally causes harm, such as by clicking on a malicious link. • Software intentionally designed to cause disruption to a computer, server, client, or network. • ...
Online security 2019-12-03
Across
- This mode is more secure than public
- When you save your information within an external drive is called a:
- When you research online you should visit only _____ to avoid risks
Down
- Being aware of your online protection
- Have one and keep it updated to avoid malware and other online risks
- Needed to access devices
6 Clues: Needed to access devices • This mode is more secure than public • Being aware of your online protection • When you research online you should visit only _____ to avoid risks • Have one and keep it updated to avoid malware and other online risks • When you save your information within an external drive is called a:
vocab 2024-10-13
Across
- Because of all the ___ I still haven't got my visa
- although
- My clothes always ___ a bit after being in the washing machine
- working in a way that does not waste a resource, productive
- I got into a car ___ accident on the way, which is why I was late
- a field in IT where the main goal is protection from digital attacks
- After giving that 3 hour lecture, my ___ really hurt
- before
Down
- many of the company's employees were ___ after AI replaced them
- It's not nice to make ___ about someone based on their looks
- a state/feeling of uncontrolled excitement/behaviour.
- I've been waiting for that ___ for months, I really need the extra money
- something happening at the same time
- sometimes a synonym for "also"
- successful in achieving the results that you want
15 Clues: before • although • sometimes a synonym for "also" • something happening at the same time • successful in achieving the results that you want • Because of all the ___ I still haven't got my visa • After giving that 3 hour lecture, my ___ really hurt • a state/feeling of uncontrolled excitement/behaviour. • working in a way that does not waste a resource, productive • ...
Technology words 2023-05-10
Across
- where your teachers assign you work to do for classes
- where a global system hooks up to networks
- a long communication without wires
- where you can watch videos for classes or for fun
- where you can send mail digitally to workers, teachers or student
- where it can be instructed by hardware
- when something is transmitting information by various types
Down
- it is designed to protect your computers and other devices from bugs ands hackers
- where you can look up answers or look for evidence
- where you can create a web browser
- where you can make a presentation
- where you create a bar graph, line graph, or a pie chart
- where scientists design and build machines
- where it widely describes wide range of technology's
- where you can hook up to internet and use your technology better
15 Clues: where you can make a presentation • where you can create a web browser • a long communication without wires • where it can be instructed by hardware • where a global system hooks up to networks • where scientists design and build machines • where you can watch videos for classes or for fun • where you can look up answers or look for evidence • ...
STATION X 2023 2023-03-02
Across
- For students pursuing a Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______ Centre for hands-on-learning.
- The 1800-seater ______Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- The diplomas offered in the School of Design & Environment focuses on ________.
- The Diploma in Early Childhood Development & Education (ECDE) is conducted by the National Institute of Early Childhood_______ in collaboration with Ngee Ann Polytechnic at the NIEC (NP) campus.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- Ngee Ann Polytechnic is an award-winning smart and ______campus.
- Located at the Atrium, there is a 24/7 unmanned ______.
- If a student is interested in cybersecurity, they should pursue a Diploma in Cybersecurity & Digital ______ from the School of InfoComm Technology.
- Common _____ Programme is a new programme offered in the School of Film & Media Studies.
- Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.
- Students are able to pursue a minor via the ______Learning Pathway Programme.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
Down
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass ______.
- Radio ______ located at Ngee Ann Polytechnic’s Atrium is Singapore’s first campus radio station.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic’s Diploma in ______ offers specialisation in Architecture and Product Innovation.
- Ngee Ann Polytechnic has 3 canteens in total:______, Makan Place and Food Club.
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Ngee Ann Polytechnic’s Diploma in _______ Engineering from the School of Engineering offers specialisations in Power Engineering and Clean Energy Management.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
20 Clues: Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic is an award-winning smart and ______campus. • Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______. • Students are able to pursue a minor via the ______Learning Pathway Programme. • The diplomas offered in the School of Design & Environment focuses on ________. • ...
Teka Teki Techco 2024-05-16
Across
- Istilah untuk volume data besar yang diproses untuk informasi.
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Istilah untuk volume data besar yang diproses untuk informasi. • Program perangkat lunak yang dirancang untuk melakukan tugas tertentu. • ...
LOGIC LATTICE 2024-02-16
Across
- Measures taken to protect computer systems and networks from unauthorized access or attacks.
- Software used to access and view websites on the internet.
- The manipulation of matter on an atomic or molecular scale.
Down
- Digital or virtual currency that uses cryptography for security.
- A structured set of data stored electronically.
- Software that is embedded into hardware devices.
- A security system that monitors and controls incoming and outgoing network traffic.
- Programs and applications that run on computers and other devices.
- The process of converting data into a code to prevent unauthorized access.
- A step-by-step procedure for solving a problem.
10 Clues: A structured set of data stored electronically. • A step-by-step procedure for solving a problem. • Software that is embedded into hardware devices. • Software used to access and view websites on the internet. • The manipulation of matter on an atomic or molecular scale. • Digital or virtual currency that uses cryptography for security. • ...
Technology 2024-02-18
Across
- I'm a thinking machine, processing data tirelessly. What device am I?
- Intangible, yet I control what you see. What type of program am I?
- I move without being alive. What field of technology am I?
- Following steps, I solve problems. What logical process am I?
- Constant change, perpetual improvement. What technological concept am I?
Down
- I complement reality. What technology am I?
- I write instructions for machines. What technological skill am I?
- I guard against digital threats. What specialized area am I?
- I connect the world. What network am I?
- I store information. What logical structure am I?
10 Clues: I connect the world. What network am I? • I complement reality. What technology am I? • I store information. What logical structure am I? • I move without being alive. What field of technology am I? • I guard against digital threats. What specialized area am I? • Following steps, I solve problems. What logical process am I? • ...
Cybersecurity Vocab 2022-03-10
Cybersecurity Concepts 2023-10-11
Across
- assets of the computer system should be accessible only by authorized parties
- A set of circumstances that has the potential to cause loss or harm
- A weakness in the system
Down
- assets can be modified only by authorized parties or in authorized ways
- authorized parties should not be prevented from accessing objects to which they have legitimate access
- An action, device, procedure, or technique that eliminates/reduces a vulnerability and/or to counter threats
6 Clues: A weakness in the system • A set of circumstances that has the potential to cause loss or harm • assets can be modified only by authorized parties or in authorized ways • assets of the computer system should be accessible only by authorized parties • authorized parties should not be prevented from accessing objects to which they have legitimate access • ...
Cybersecurity crosswords 2024-10-18
Across
- A person who uses technical skills to gain unauthorized access to systems.
- Protecting information from unauthorized access or harm.
- Facts and statistics collected for analysis or reference.
Down
- A group of connected computers that can share data and resources.
- To make something more current or improve it, often related to software.
- The ability to enter or use a system, network, or resource.
6 Clues: Protecting information from unauthorized access or harm. • Facts and statistics collected for analysis or reference. • The ability to enter or use a system, network, or resource. • A group of connected computers that can share data and resources. • To make something more current or improve it, often related to software. • ...
Phishing A technique used to trick someone to reveal sensitive information 2024-05-10
Across
- A type of attack that floods a network or server with excess traffic
- The process of converting data into unreadable format to prevent unauthorized access
- The practice of preventing systems from digital attacks
- A technique used to trick someone to reveal sensitive information
Down
- A unique string of characters used for authentication
- Software designed to block unauthorized access
- A technique used to gain unauthorized access to a system by guessing passwords
- A secret code that must be entered to enter a system or account
- A malicious program that self replicates and spreads to other systems
- Unauthorized access to data or systems
- A deceptive email scam targeting personal information
11 Clues: Unauthorized access to data or systems • Software designed to block unauthorized access • A unique string of characters used for authentication • A deceptive email scam targeting personal information • The practice of preventing systems from digital attacks • A secret code that must be entered to enter a system or account • ...
STATION X 2023 2023-03-02
Across
- For students pursuing a Diploma in Optometry from the School of Health Sciences, Ngee Ann Polytechnic has an ______ Centre for hands-on-learning.
- The 1800-seater ______Centre in Ngee Ann Polytechnic is where major events like graduation ceremonies and RED Camp are held at.
- The diplomas offered in the School of Design & Environment focuses on ________.
- The Diploma in Early Childhood Development & Education (ECDE) is conducted by the National Institute of Early Childhood_______ in collaboration with Ngee Ann Polytechnic at the NIEC (NP) campus.
- Students who pursue the Diploma in Business Studies get to choose from 4 specialisation options in Year 2: ________, Human Capital Management, Entrepreneurship and Business Sustainability & Digitalisation.
- Ngee Ann Polytechnic is an award-winning smart and ______campus.
- Located at the Atrium, there is a 24/7 unmanned ______.
- If a student is interested in cybersecurity, they should pursue a Diploma in Cybersecurity & Digital ______ from the School of InfoComm Technology.
- Common _____ Programme is a new programme offered in the School of Film & Media Studies.
- Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______.
- Students are able to pursue a minor via the ______Learning Pathway Programme.
- ______is a 10,000 sq ft campus incubator space in Ngee Ann Polytechnic (NP) jointly launched in collaboration with United Overseas Bank (UOB).
Down
- This diploma is the first and most established media course in Singapore with notable alumni such as Sonia Chew and Gerald Koh. It is the Diploma in Mass ______.
- Radio ______ located at Ngee Ann Polytechnic’s Atrium is Singapore’s first campus radio station.
- A location in Ngee Ann Polytechnic with a snazzy digital playground, where students can find a recording studio, Wii stations, digital editing studios and a fully equipped jamming studio.
- Ngee Ann Polytechnic’s Diploma in ______ offers specialisation in Architecture and Product Innovation.
- Ngee Ann Polytechnic has 3 canteens in total:______, Makan Place and Food Club.
- _______Academy in Ngee Ann Polytechnic is an exciting lab where NP students go to try out their new product ideas and develop prototypes.
- Ngee Ann Polytechnic’s Diploma in _______ Engineering from the School of Engineering offers specialisations in Power Engineering and Clean Energy Management.
- The Diploma in _______ Science will allow you to gain a head start in translational research and healthcare data analytics through the exclusive one-year Integrated Clinical Training Programme with SGH.
20 Clues: Located at the Atrium, there is a 24/7 unmanned ______. • Ngee Ann Polytechnic is an award-winning smart and ______campus. • Ngee Ann Polytechnic has a new Minor offering. It is the Minor in _______. • Students are able to pursue a minor via the ______Learning Pathway Programme. • The diplomas offered in the School of Design & Environment focuses on ________. • ...
Cybersecurity 2023-03-25
Across
- A security measure designed to verify an individual`s authorization to access a computer or security information
Down
- Discovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access
- A collection of computers subject to centralized remote control by an outside party, usually without the knowledge of the owners, using surreptitiously installed software robots. The robots are spread by trojan horses and viruses. The botnets can be used to launch denial-of-service attacks and transmit spam
- Small FBI Cyber Action Teams made up of computer analysts, forensic investigators and malicious-code experts ready to travel anywhere in the world where a cyber intrusion occurred
4 Clues: A security measure designed to verify an individual`s authorization to access a computer or security information • Discovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access • ...
Cybersecurity 2021-02-12
4 Clues: a code used to keep information safe • a kind of virus that is also a animal • a person trying to get your private information • a way people get money from you by sending you a scam email
Compliance and Ethics 2021-11-29
Across
- attempt by individual or private interest group to lawfully influence government decision
- An official inspection of an individual's or organization's accounts
- guideline of ethical practices that a company expects its employees to follow
Down
- Unwelcome act of physical contact or advances
- conforming to a rule i.e policy, standard or law
- Computer Security
- Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others
- anything of value given as attempt to influence a decision to acquire improper advantage
8 Clues: Computer Security • Unwelcome act of physical contact or advances • conforming to a rule i.e policy, standard or law • An official inspection of an individual's or organization's accounts • guideline of ethical practices that a company expects its employees to follow • Use of force, threat, or coercion to abuse, intimidate, or aggressively dominate others • ...
Cyber Safe Seniors Crossword Puzzle 2024-03-09
Across
- Short for “malicious software”
- The measures taken to protect electronic data
- A string of characters that allows access to a computer system or service
- The practice of making fraudulent phone calls or leaving voice messages
Down
- Software designed to detect and destroy computer viruses
- A person who engages in criminal activity by means of computers or the internet
- The fraudulent practice of sending emails purporting to be from reputable companies
- Malware which changes, corrupts, or destroys information (think disease)
8 Clues: Short for “malicious software” • The measures taken to protect electronic data • Software designed to detect and destroy computer viruses • The practice of making fraudulent phone calls or leaving voice messages • Malware which changes, corrupts, or destroys information (think disease) • A string of characters that allows access to a computer system or service • ...
OSHEC Crossword 2023-08-16
Across
- Download PDF – First word of ‘Abstract’ - Article Name: Influence of Educational Robots on Learning Performance of Learners Majoring in Computer Science.
- Last word of ‘Background’ - Article Name: The accuracy of artificial intelligence used for non-melanoma skin cancer diagnoses: a meta-analysis.
- Last word of first point of ‘Key Takeaways’- Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
- Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
- Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
Down
- Second word of ‘Introduction’ - Article Name: Social Media Adoption, Usage And Impact In Business-To-Business (B2B) Context: A State-Of-The-Art Literature Review.
- Last word, before ‘footnotes’ - Article Name: Global Mental Health Services and the Impact of Artificial Intelligence-Powered Large Language Models.
- Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Training in Sociology and Public Health an Essential in Medical Education.
- Fill in the blank -Literature, Film and ________ (Look at the Sub-headings) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.
- Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.
10 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs. • Last word of first point of ‘Key Takeaways’- Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture. • ...
SECURITY AWARENESS EASTER EGG HUNT 2024-04-09
Across
- A secret word or phrase allows access to a computer system, email or services
- The process for educating employees about cybersecurity best practices
- A divison of Distributors that supplies a wide range of brands, generics, OTC, medical supplies, etc
- Your companies name
- One of the affiliated companies that provide banking services
Down
- One of the affiliated companies that deals with the production of our powdered and liquid goods
- One of the affiliated companies that supply customers with goods
- Malicious software that infects and damages computer
- Electronic messages sent and received over a computer network
9 Clues: Your companies name • Malicious software that infects and damages computer • Electronic messages sent and received over a computer network • One of the affiliated companies that provide banking services • One of the affiliated companies that supply customers with goods • The process for educating employees about cybersecurity best practices • ...
Get Secure 2019-08-26
Across
- protection of information systems from damage or crime
- bad connection during online calls
- create a password
- a device that consists of a part that fits over a person's ears and a part into which the person can speak, used for communicating without using the hands
- connection to a network from a place that is far away
Down
- get into a network
- a package of software products sold together, usually having a similar look and common installation
- rules that help to protect a system
- the applications that a company uses for work
9 Clues: create a password • get into a network • bad connection during online calls • rules that help to protect a system • the applications that a company uses for work • connection to a network from a place that is far away • protection of information systems from damage or crime • ...
Success 101 2024-10-04
Across
- You should go to this school if you want to be a YouTuber
- This career is supported at academies at both Hampton and Kecoughtan
- Academy of ___and Public Safety supports future fire fighters
- A short speech that you should give when networking
- The school with the academy for future teachers
- If you want to be an actor, join this academy
- Perfect shirt for a job interview
- Attend this academy if you want to be a chef
- My Future, My ______
Down
- Perfect pants for a job interview
- This academy is like a private school within a school
- This high school has an academy that supports nursing
- This academy is for future lawyers
- The academy that all 9th graders are in
- Academy of Cybersecurity, Engineering, and _____
- A future welder in the shipyard should attend this school
- A group project focused on changing the community
- It is possible to graduate high school with this type of college degree
18 Clues: My Future, My ______ • Perfect pants for a job interview • Perfect shirt for a job interview • This academy is for future lawyers • The academy that all 9th graders are in • Attend this academy if you want to be a chef • If you want to be an actor, join this academy • The school with the academy for future teachers • Academy of Cybersecurity, Engineering, and _____ • ...
Jenis Profesi 2024-08-08
Across
- menguasai bahasa pemrograman dan terampil menggunakannya
- seseorang pembuat konten kreatif
- orang yang mengajar dan menyediakan pendidikan untuk orang lain
- seseorang yang meneliti informasi menggunakan alat analisis data
- berkaitan erat dengan penemuan-penemuan baru
- orang yang ahli dalam merancang, mendesain, dan melaksanakan pengawasan konstruksi bangunan, serta tentang izin guna praktek arsitektur
- mengawasi, menghitung, dan membuat laporan keuangan sebuah instansi
- pengusaha adalah orang yang memiliki visi bisnis dan memilih membuka usaha sendiri
Down
- menciptakan animasi untuk kebutuhan televisi, film, video game, atau media digital lainnya
- bertanggung jawab dalam membangun hubungan baik antara perusahaan dan pelanggan atau masyarakat
- melindungi sistem, jaringan, serta data dari serangan cyber
- profesional di bidang kuliner
- membangun, menguji, dan menggunakan machine-learning algorithm untuk membuat facial recognition system
- ndividu yang mempunyai pengaruh besar di media sosial
- bertugas mengendalikan pesawat
- maha guru
- seseorang yang ahli bisnis berhubungan dengan pengaruh keuangan, risiko, dan hal-hal lainnya yang bisa mengakibatkan ketidakpastian dalam suatu bisnis
- berkaitan erat dengan keamanan dan ketertiban negaranya
18 Clues: maha guru • profesional di bidang kuliner • bertugas mengendalikan pesawat • seseorang pembuat konten kreatif • berkaitan erat dengan penemuan-penemuan baru • ndividu yang mempunyai pengaruh besar di media sosial • menguasai bahasa pemrograman dan terampil menggunakannya • berkaitan erat dengan keamanan dan ketertiban negaranya • ...
Technology in Supply Chain Management 2023-05-01
Across
- Highly skilled IT professionals, process engineers,and the appropriate technologies.
- technologies combine data management, communications, decision support, and processing capabilities.
- technologies create greater connectivity and speed flow.
- support systems provide computing power to make higher-quality decisions faster.
- Privacy As companies gather more and more data about customers, they must protect the data and not misuse it.
Down
- technologies provide 24/7 resource availability.
- Protection against online threats.
7 Clues: Protection against online threats. • technologies provide 24/7 resource availability. • technologies create greater connectivity and speed flow. • support systems provide computing power to make higher-quality decisions faster. • Highly skilled IT professionals, process engineers,and the appropriate technologies. • ...
Vocabulary revision 1 2024-10-30
Across
- a small device or tool that has a specific use
- money given to a student to help pay for their education
- the act of leaving to start a journey
- having strong feelings or enthusiasm for something you love
- information that is stored in computers
- the protection of computers and networks from being attacked
Down
- the money you pay for education at a college or university
- to revise one day before an exam
- the flight that takes place within your country
- free time used for relaxation
- the place you are travelling to
- to complete studies at a school, college, or university
- a person who does something for fun; not a professional
- a talk given by a professor to a group of students about a subject
- a place where people go for vacations and fun, for example, for skiing
- to love something or someone very much
- a person who uses computers to find or change information, without permission
- strong and lasting a long time without breaking
18 Clues: free time used for relaxation • the place you are travelling to • to revise one day before an exam • the act of leaving to start a journey • to love something or someone very much • information that is stored in computers • a small device or tool that has a specific use • the flight that takes place within your country • strong and lasting a long time without breaking • ...
Cybersecurity Fundamentals Chapter 4 2022-10-25
Across
- uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- use one key to encrypt data and a different key to decrypt data.
- to encrypt and decrypt messages.
- encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
- science of making and breaking secret codes.
- a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
Down
- algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- has a fixed block size of 128, 192 or 256 bits.
- implementing cryptography into a web browser.
- a protocol that provides a secure remote access connection to network devices.
- way to store and transmit data so only the intended recipient can read or process it.
- fundamental component of ipsec virtual private networks (vpn).
12 Clues: to encrypt and decrypt messages. • science of making and breaking secret codes. • implementing cryptography into a web browser. • has a fixed block size of 128, 192 or 256 bits. • fundamental component of ipsec virtual private networks (vpn). • use one key to encrypt data and a different key to decrypt data. • ...
Puzzle OSHEC 2023-08-31
Across
- Fill in the blank from PDF – ‘Identifying and relating with people from similar circumstances to them seems to be an important factor for their ____________.’ - Article Name: Multilingual publication practices in the social sciences and humanities at a Polish university: choices and pressures.
- Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs.
- Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP)
Down
- Last word of the first point of ‘Key Takeaways’ - Article name: Robotic Revision of Hepaticojejunostomy for Benign Biliary Stricture.
- Fill in the blank – ‘CODA: _________ WE TEACH BY’ (Look at the end of the article) - Article Name: Schools as Factories: The Limits of a Metaphor.
- Fill in the blank - He needs to have a ___________understanding (Look at the points) - Article Name: Diversity, Equity, and Inclusion: Moving from Performance to Transformation Through the Arts and Humanities.
6 Clues: Download PDF – First word of ‘Abstract - Article Name: Aligning Cybersecurity in Higher Education with Industry Needs. • Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP) • ...
Cybersecurity decoded 1x1 2 2020-07-30
12 Clues: Distant labor • childhood game • the iron giant • Troy's downfall • Not canned food • code's evil twin • type of cleanliness • sugar comes in these • Dr's are messy with this • they come out after the rain • used to fix jeans... or software • Fake mustache, trench coat, sunglasses
Science and technology C1 2024-03-01
Across
- the development and use of a new idea or method
- becoming very popular very quickly on the internet
- protecttive measures taken against the criminal access of electronic data
- very modern
- to obtain a more powerful or feature-rich computer or electronic device
- a person who is enthusiastic about new technology
- involving or causing a complete or dramatic change and improvement
Down
- a person who fears or dislikes new technology, especially computers, and does not want to use it
- a small mechanical or electronic device or too
- not in use any more, having been replaced by something better
- a piece of electrical equipment, such as a kettle or toaster, that uses less advanced technology
- to suddenly stop working
12 Clues: very modern • to suddenly stop working • a small mechanical or electronic device or too • the development and use of a new idea or method • a person who is enthusiastic about new technology • becoming very popular very quickly on the internet • not in use any more, having been replaced by something better • ...
The Wedding Crossword 2021-03-28
Across
- What is Liam's favourite game?
- Where did Liam and Ais go on their first date?
- What did Ais want to be when she grew up?
- Liam and Ais went to the Six Nations in Dublin to see Ireland play what team?
- What is Ais's Godmother's surname?
- Where did Liam and Ais meet for the very first time?
- What TV computer nerd inspired Ais to consider studying cybersecurity and forensics?
- An Irish fairy known for being talkative and mischievous
- Liam and Ais share their favourite cake - what is it?
- Where did Liam and Ais live in Cork?
Down
- One of the destinations on the honeymoon
- Liam and Ais's favourite place to visit in Koln.
- Where did Liam go to the Gaelteacht?
- What is Ais's favourite game?
- Ais and Liam got back into Formula One last year - what's their favourite team?
- What is Liam's Godmother's surname?
- Ais's childhood cat is famous at the local vet for what?
- What is the name of Liam's personal pandemic hairdresser?
18 Clues: What is Ais's favourite game? • What is Liam's favourite game? • What is Ais's Godmother's surname? • What is Liam's Godmother's surname? • Where did Liam go to the Gaelteacht? • Where did Liam and Ais live in Cork? • One of the destinations on the honeymoon • What did Ais want to be when she grew up? • Where did Liam and Ais go on their first date? • ...
Technology CW 2023-06-07
Across
- a proprietary audio/video interface for transmitting uncompressed video data
- the protection of computer systems and networks
- a method of transmitting and receiving messages using electronic devices.
- a file format developed by Adobe in 1992 to present documents
- a hardware or software component that stores data
- data using a two-symbol system.
- a file format developed by Adobe in 1992 to present documents
- a coding format for digital audio
- a mapping from some domain (for example, a range of integers)
- a humanoid robot or synthetic organism designed to imitate a human
Down
- blocks of data created by a web server
- a file format developed by Adobe in 1992 to present documents
- a bitmap image format that was developed by a team at the online services provider
- a collection of discrete values that convey information
- the most important processor in a given computer.
- a commonly used method of lossy compression for digital images
- an American multinational technology company
- a digital multimedia container format most commonly used to store video and audio
- a method of representing data
- any software intentionally designed to cause disruption to a computer
20 Clues: a method of representing data • data using a two-symbol system. • a coding format for digital audio • blocks of data created by a web server • an American multinational technology company • the protection of computer systems and networks • the most important processor in a given computer. • a hardware or software component that stores data • ...
CSAM 2023 2023-07-10
complete_rmt_22 2022-02-09
Across
- The role responsible for maintaining product roadmap
- The abbreviation for Innovation management.
- The meaning of RTE
- Creator of the Software Design plan
- The process of setting up an information pool, market segmentation, market sizing, customer analysis, competitor analysis, trend & technology analysis, internal analysis.
- The experience distilled from a project that should be actively taken into account in future projects in the context of KM.
- Role responsible for qualification of software
- Abbreviation for product management process
- Abbreviation for Scaled Agile Framenwork
- The time needed from creation of the problem to the resolution of the problem, i.e. rejection or the implementation and acceptance of a change.(2 words)
- Cybersecurity work result that gives a conclusive statement about the status of the cybersecurity-related quotation, concept, implementation, verification and validation activities within a project.
- Software Requirements Analysis process in ASPICE
- The meaning of swc
- Short name for workshops where a team reflects the way it works and identifies potentials for improvement.(plural)
- Abbreviation of Software Detailed Designs
- Abbreviation used for Cybersecurity Engineering process.
- Standard for road vehicles functional safety
- The prerequisite identified as necessary for a user, or a user group, to achieve a goal, within a specific context of use.
- Object oriented programming language lunched in 1995
- The abbreviation of Automotive Software Performance Improvement and Capability dEtermination
- The abbreviation of the business development process.
- The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles.
- The document that defines the safety strategy in the project
- The IEEE-STD-610 defines it as “An activity that ensures that an end product stakeholder’s true needs and expectations are met.”
- The abbreviation for the work result "Software Quality Assurance Plan", defined by IEEE 730.
- Record of the an exact result of a performed integration step.
- Abbreviation for a requirement management plan
- Role responsible for identification and analysis of market-specific trends & technologies.
- The inspection of selected processes in selected instances (projects, products, locations, …) and that identifies weaknesses in terms of compliance and risk
- The highest-level backlog in SAFe
- The process of identifying (current and future) business critical knowledge areas as well as capturing, developing, sharing, and effectively using organizational knowledge.
- The coordinator that helps the program achieve the program goals.
- Attribute of a change request derived from risk, impact, affected customers, upcoming release schedules, etc.
- The workresult work result defining the pricing in line with the market, in responsibility of the business development manager.
- Any potential failure identified in internal reviews, testing, etc.
- The infrastructure used by the project defined in the configuration management plan.
- Problem resolution management process in ASPICE
- Type of testing performed to expose defects in the interfaces and in the interactions between integrated components or systems.
- The task that tracks the program progress against the program goals and to identify potential deviations in time.
- Role responsible to create the cybersecurity concept.
Down
- Work result with the purpose to provide basic information about the expected outcome of the incubator project.
- Important event in the history or development of something or someone
- Abbreviation of Software integration and integration test process.
- An individual or organization having a right, share, claim, or interest in a system or in its possession of characteristics that meet their needs and expectations. (ISO12207)
- The abbreviation for the features and high-level requirements
- Software integration and integration test process in ASPICE.
- The set of five criteria that a product name must fulfill in order to become a product brand.
- Abbreviation of User Experience Engineering process.
- Work result that is treated as a single entity in the configuration management process.
- The abbreviation of system test process
- Role responsible for evaluating the received new product ideas and giving feedback to the Employee (accept for further development, or reject).
- Task in portfolio management with the purpose to mitigate risks of double work in research and development and to use the scarce resources optimally.
- A software component, that contains one or more software components (units and/or other compositions)that makes hierarchical structures in the architectural design possible.
- A series of actions taken in order to achieve a certain result
- The abbreviation of software test process
- The role responsible to drive new business ideas, identify its business potential, and create new business models
- Standard used as reference for defining the User Experience Engineering process
- The abbreviation used for Problem Resolution Management process
- Work results that triggers the change management activities according to the change request management plan
- The name of the qualified set of frozen configuration items is
- The process established to maintain the integrity of all work results of a process or project and make them available to parties concerned.
- Role with skills that is independent of the project and performs process audits and assessments.
- Role responsible for deciding whether a change is to be applied.
- Smallest piece of software
- The strategy that provides the work result is to provide guidance for innovation activities in the next 5 years.
- The IEEE-STD-610 defines it as “A test of a system to prove that it meets all its specified requirements at a particular stage of its development.”
- Abbreviation of program management process
- A cross-functional group of 5-11 individuals who define, build, test, and deliver an increment of value in a short time box.
- Role responsible to plan, measure, act on and report the project.
- The abbreviation of Portfolio management process
- Implemented by planned activities, or divided into sub-goals
- The ordered list of features or enablers on a high level (e.g. epics), part of a program.
- A collection of projects which are connected by joint goals to obtain benefits not available from managing the projects individually.
- Abbreviation of Software Architectural Design
- Prioritization of software units to provide the information what is to be done in which order
- The fictitious yet realistic representations of users of a system, including details like their mental models, limitations in cognition or physical mobility.
- The list of the available product lines, products and product items with the corresponding license types and prices.
- The abbreviation for the work result "software project management plan", which is also defined by IEEE 1058
- Abbreviation for Subject Matter Expert.
- Abbreviation used for change request management process
80 Clues: The meaning of RTE • The meaning of swc • Smallest piece of software • The highest-level backlog in SAFe • Creator of the Software Design plan • The abbreviation of system test process • Abbreviation for Subject Matter Expert. • Abbreviation for Scaled Agile Framenwork • The abbreviation of software test process • Abbreviation of Software Detailed Designs • ...
azure-data-oro-idc-day-of-learning-november 2022-11-24
Across
- Meaning of ORO?
- India's most attractive employer brand by Randstad
- Microsoft had announced a Metaverse partnership with which organization
- In which year, ORO team is formed - Two Thousand….?
- A lightweight markup language used to create Azure's public documentation
- Who wrote ORO team song?
- Internal portal used for joining various distribution and security groups
- Fully managed, high-performance, big data analytics platform that performs real-time analysis on large volumes of data streaming from applications, websites and IoT devices
Down
- Microsoft Program that drives the culture of innovation, collaboration, creativity and experimentation
- Number of years since IDC was established
- - FIFA world cup 2022 is played in which country?
- Initiative of Microsoft India and the Data Security Council of India (DSCI) for cybersecurity
- Tool used in Microsoft to manage livesite incidents
13 Clues: Meaning of ORO? • Who wrote ORO team song? • Number of years since IDC was established • - FIFA world cup 2022 is played in which country? • India's most attractive employer brand by Randstad • In which year, ORO team is formed - Two Thousand….? • Tool used in Microsoft to manage livesite incidents • ...
Cyber Security Threads 2024-10-01
Across
- An attack that floods a network with excessive traffic, disrupting services
- Ensures that data is accurate and has not been tampered with
- Falsifying data to deceive systems or users
- The ability of a system to recover quickly from disruptions or attacks
- Ensures that systems are accessible and functional when needed
Down
- Ensures that information is accessible only to those authorized to access it
- The process of converting information into a secret code
- A model that describes the stages of a cyberattack ( 2 words )
- A weakness in a system that can be exploited by attackers
- A type of malware disguised as legitimate software
- A potential danger or harmful event in cybersecurity
- A security system that monitors and controls network traffic
- An attempt to exploit a system or network
13 Clues: An attempt to exploit a system or network • Falsifying data to deceive systems or users • A type of malware disguised as legitimate software • A potential danger or harmful event in cybersecurity • The process of converting information into a secret code • A weakness in a system that can be exploited by attackers • ...
CyberSecurity Awareness Month 2024 2024-05-03
Across
- Regularly released enhancements to software or applications that fix vulnerabilities and provide new features.
- A security attack in which the user is tricked into downloading malware, spyware, or other harmful software onto their mobile device via SMS text messages.
- A secret combination of characters used to access an account or device.
- An enhanced security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity.
- A type of barcode that can be scanned to access information quickly, often used with smartphones.
Down
- A method of phishing where the fraudster uses phone calls to lure victims into divulging personal information.
- Technology that simulates human intelligence processes through automated algorithms.
- Engineering Tactics that manipulate individuals into giving up confidential information, often by exploiting human psychological weaknesses.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Synthetic media in which a person in an existing image or video is replaced with someone else's likeness, often using advanced machine learning techniques.
- A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity in digital communication.
12 Clues: A secret combination of characters used to access an account or device. • Technology that simulates human intelligence processes through automated algorithms. • Software designed to disrupt, damage, or gain unauthorized access to a computer system. • A type of barcode that can be scanned to access information quickly, often used with smartphones. • ...
FOC - Cybersecurity - Unit 6 2024-11-15
Across
- Involves one key for both encryption and decryption
- A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
- Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
- Information about an individual that identifies, links, relates, or describes them
- A process of encoding messages to keep them secret, so only "authorized" parties can read it
Down
- A wireless access point that gives unauthorized access to secure networks
- Protects a computing system against infection
- Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
- A process that reverses encryption, taking a secret message and reproducing the original plain text
- Software intended to damage a computing system or to take partial control over its operation
- The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
12 Clues: Protects a computing system against infection • Involves one key for both encryption and decryption • A wireless access point that gives unauthorized access to secure networks • Information about an individual that identifies, links, relates, or describes them • Software intended to damage a computing system or to take partial control over its operation • ...
Security Awareness Week - Shrewsbury 2013-08-29
5 Clues: A more secure form of password • The term used to describe IT Security • Caterpillar's method of classifying confidential data • A computer virus designed to spread itself to other computers • The act of manipulating people into divulging confidential information
Machine Learning Crossword #11 2020-05-24
Across
- Bharti Airtel recently acquires 10% stake in this early-stage startup
- Accenture recently acquired this Ahmedabad based analytics company
- Intel capital invested $900M in this mobility startup
- INDIAN VOICE AI STARTUP RAISES $5.1 MN FROM EXFINITY VENTURES AND KALAARI CAPITAL
Down
- an agritech startup raises $5.9M in Series A round to further enhance its AI-based offerings
- This RPA startup RAISES $120 MILLION just last month
- Apple has purchased virtual reality startup
- Microsoft will pay $165 million for the acquisition of this Israeli cybersecurity company
8 Clues: Apple has purchased virtual reality startup • This RPA startup RAISES $120 MILLION just last month • Intel capital invested $900M in this mobility startup • Accenture recently acquired this Ahmedabad based analytics company • Bharti Airtel recently acquires 10% stake in this early-stage startup • ...
Technology 2021-10-28
Across
- part of computer system or network that is designed to block unauthorized access by permitting outward communication
- video adapter
- error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.
- exclusive right as recognized in each country to publish and sell artistic and literacy materials
- measures to protect of computer
- not eliminate the servers
- a saved link to a particular web page
Down
- the heart of operating system
- conventional method of transmitting data
- part of application that performs a task not known to a user
- a software system that links top on screen to related info n graphics which are typically accessed by point and click method
- collection of physical part of comp system
12 Clues: video adapter • not eliminate the servers • the heart of operating system • measures to protect of computer • a saved link to a particular web page • conventional method of transmitting data • collection of physical part of comp system • part of application that performs a task not known to a user • ...
Cyber Security Crossword 2024-01-16
Across
- A malicious program that infects computers without user knowledge or permission.
- Using malicious code injected on an unsuspecting site to exploit visitors' competing resources.
- Malicious party attacking a company.
- A cybersecurity term that describes recently discovered exploits, suggesting the company has just realized the exploit exists and has zero days to fix it.
- attack that affects availability of a resource.
- A botnet is a network of private computers infected with malicious software.
Down
- Secret expression required to gain access to a computing system.
- Attack type.
- Excessive push notifications leading to unwanted response.
- authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them
- Data Leakage due to well-crafted AI prompt.
- Firewall type that protects Web-based Applications.
12 Clues: Attack type. • Malicious party attacking a company. • Data Leakage due to well-crafted AI prompt. • attack that affects availability of a resource. • Firewall type that protects Web-based Applications. • Excessive push notifications leading to unwanted response. • Secret expression required to gain access to a computing system. • ...
Talk To Me in Cybersecurity 2021-09-16
Across
- Three aspects of management that, when well-coordinated, ensure a company and its people behave ethically, run the business effectively, mitigate risks appropriately and comply with internal policies and external regulations
- A formal and approved list of users who have defined access rights to an asset
- Attempts to disrupt normal traffic of a targeted server, service or network to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources
- Software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
- A technology and business process designed to detect and prevent violations to corporate policies regarding the use, storage, and transmission of sensitive data
- Surveillance software that can record every keystroke made on a computer’s keyboard
- The practice of testing a computer system or network to find vulnerabilities that cybercriminals could exploit
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Represents a rapidly growing class of non-traditional computing devices that are connected to the internet to drive some sort of intelligent operation
- The psychological manipulation of people into performing actions or divulging confidential information
- Computer program used to prevent, detect, and remove malware
Down
- The U.S. federal agency responsible for developing and maintaining the “Framework for Improving Critical Infrastructure Cybersecurity,” a collection of voluntary guidelines to help organizations manage their information security risks
- Software used to monitor, log, provide alerts and analyze security events to support threat detection and incident response
- Refers to a company security policy that allows for employees’ personal devices to be used in business
- Devices or software designed to find and prevent malicious activity on corporate networks
- Actions a company takes to manage the aftermath of a security breach or cyberattack
- A type of authentication method where the proof of a user’s identity is gained by different independent sources
17 Clues: Computer program used to prevent, detect, and remove malware • A formal and approved list of users who have defined access rights to an asset • Surveillance software that can record every keystroke made on a computer’s keyboard • Actions a company takes to manage the aftermath of a security breach or cyberattack • ...
Cybersecurity Unit 1 Lesson 1 2022-12-02
Across
- Changes your directory
- A set of steps to accomplish a task.
- A set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.
- Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
- Guidelines that team members develop in order to be followed when working together.
- A system that can distinguish between a human and an automated program.
- Shows the contents of your directory
- A process that converts human-readable text or data into a coded form.
Down
- A team of individuals working together to investigate cyber events and anomalies.
- A collection of rules detailing appropriate student behavior.
- Software that is intended to do harm or damage.
- The trail that you leave behind when you engage in online experiences.
- To guess or discover, especially a password.
- Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
- To confirm your identity using knowledge know only to you or information interpreted by you.
- An attempt to discover information, especially passwords, through trial and error.
- Irrelevant or inappropriate messaging sent through email to a large number of recipients, also known as junk mail.
17 Clues: Changes your directory • A set of steps to accomplish a task. • Shows the contents of your directory • To guess or discover, especially a password. • Software that is intended to do harm or damage. • A collection of rules detailing appropriate student behavior. • The trail that you leave behind when you engage in online experiences. • ...
Unit 1: Intro to IT 2023-12-20
Across
- Two-dimensional bar code that contains an encoded web or e-mail address.
- Working for a company from home using IT.
- Software that resides in the cloud that is accessed by users without downloading or installing.
- Gap between those with access to technology and those who do not.
- Storage that is cloud-based.
- Type of computer found inside of other devices.
- Involves storing and retrieving data from Internet-based spaces.
Down
- How efficiently and quickly a person completes tasks.
- Branch of IT that protects computer systems.
- Method of searching through huge amounts of data to find patterns.
- Amount of data that can travel on a communication system.
- Includes all the work done with computers.
- View of the live world that has been enhanced with graphics, sounds, or other outputs.
- Type of e-book that contains integrated multimedia features.
14 Clues: Storage that is cloud-based. • Working for a company from home using IT. • Includes all the work done with computers. • Branch of IT that protects computer systems. • Type of computer found inside of other devices. • How efficiently and quickly a person completes tasks. • Amount of data that can travel on a communication system. • ...
IT_Tóth Dániel Károly 2023-12-24
Across
- The field concerned with protecting computer systems and data.
- Software application designed for use on mobile devices.
- The process of determining the structure and functionality of a program.
- The activity of writing or designing a computer program.
- (!Internet of Things!) The network of physical devices capable of communicating over the internet.
- services provided electronically, such as online banking or e-commerce.
- A structured storage system that allows efficient data management.
- Designing the user interface and user experience for software.
- A computer providing specialized services to other computers or devices.
Down
- Large volumes of data used for analytical purposes.
- Computing resources and services accessible over the internet.
- Language A set of rules and instructions interpreted by a computer.
- A sequence of steps to perform a computer task.
- An iterative and incremental development method in software design.
- A system of interconnected computers or devices.
15 Clues: A sequence of steps to perform a computer task. • A system of interconnected computers or devices. • Large volumes of data used for analytical purposes. • Software application designed for use on mobile devices. • The activity of writing or designing a computer program. • The field concerned with protecting computer systems and data. • ...
26. Technology 2023-09-09
Across
- A handheld device that combines a phone with computing functions.
- A machine designed to carry out tasks autonomously or under human control.
- A machine that processes information and performs tasks.
- A simulated environment created by computer technology.
- Global Positioning System, used for location and navigation.
- The process of encoding information to secure it from unauthorized access.
- A global network that connects computers and devices worldwide.
- Information that can be stored, processed, and analyzed.
Down
- Machines and software that can think and learn like humans.
- The measurement and analysis of unique physical or behavioral characteristics for identification.
- The physical components of computers and electronic devices.
- Programs and applications that run on computers and devices.
- Measures taken to protect computer systems and data from cyber threats.
- The creation of three-dimensional objects from digital designs.
14 Clues: A simulated environment created by computer technology. • A machine that processes information and performs tasks. • Information that can be stored, processed, and analyzed. • Machines and software that can think and learn like humans. • The physical components of computers and electronic devices. • Programs and applications that run on computers and devices. • ...
Cybersecurity Fundamental Chapter 1 2023-10-03
Across
- who rally and protest against different political and social ideas.
- unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- collection of technologies that enable the connection of various devices to the Internet.
- break into networks or computer systems to discover weaknesses in-order to improve the security of these weakness.
- Organizations like Google, Linkedin, Amazon provide important services and opportunity for their customers.
- great businesses have been created by collecting and harnessing the power of data and data analytics.
Down
- who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
- Their targets are foreign governments, terrorist groups, and corporations.
- hackers who are either self-employed or working for large cybercrime organizations.
- may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- result of data sets that are large and complex, making traditional data processing applications inadequate.
12 Clues: who rally and protest against different political and social ideas. • Their targets are foreign governments, terrorist groups, and corporations. • hackers who are either self-employed or working for large cybercrime organizations. • collection of technologies that enable the connection of various devices to the Internet. • ...
Cybersecurity Lesson 1-3 2023-09-21
Across
- automatically tags any pictures you take with the location of where you took it
- the freedom to be left alone
- formal ways of giving credit to people for their work
- everything you do online
- a detailed report
- untrue, defamatory statements that are written.
- short for internet etiquette
- the exclusive right to make copies
Down
- includes works that are not copyrighted for any of a number of reasons; example: titles, names, ideas, and facts own
- stands up for people, either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult
- someone who intentionally targets people for harm using online chat rooms or social media
- the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody
12 Clues: a detailed report • everything you do online • the freedom to be left alone • short for internet etiquette • the exclusive right to make copies • untrue, defamatory statements that are written. • formal ways of giving credit to people for their work • automatically tags any pictures you take with the location of where you took it • ...
Brain-Box Challenge 2024-09-28
Across
- The ability to connect systems and devices for seamless communication.
- A flexible project management approach focusing on iterative progress.
- A plan of action designed to achieve long-term goals.
- A decentralized, digital ledger for recording transactions securely.
- The person whose experience is central to digital transformation.
- A significant change caused by new technologies or innovations.
- Raw information collected for analysis and decision-making.
- A system that uses algorithms to learn from data and improve.
- The use of technology to perform tasks without human intervention
- The process of creating new ideas or products that drive change.
Down
- The systematic analysis of data for insights and trends.
- Measures taken to protect systems from digital attacks.
- The ability to grow and handle increased demand efficiently.
- A platform for storing and accessing data over the internet.
- The process of using digital technologies to change business models.
15 Clues: A plan of action designed to achieve long-term goals. • Measures taken to protect systems from digital attacks. • The systematic analysis of data for insights and trends. • Raw information collected for analysis and decision-making. • The ability to grow and handle increased demand efficiently. • A platform for storing and accessing data over the internet. • ...
Strategic Planning 2023-06-19
Across
- An obstacle excutives face the team does not agree with proposed strategy
- Businesses may need to address market volatility, cybersecurity, legal and regulatory compliance, and supply chain disruptions
- When the blame game starts and people become defensive
- Businesses struggle with uncertanties such as market volatility, technological advancements, and regulatory shifts.
Down
- Businesses may face due financial, human, and technological limits
- Lost in translation
- New strategies often face ______ from employees
- When businesses get lost in the sematics of defining their vision, missions, and values
8 Clues: Lost in translation • New strategies often face ______ from employees • When the blame game starts and people become defensive • Businesses may face due financial, human, and technological limits • An obstacle excutives face the team does not agree with proposed strategy • When businesses get lost in the sematics of defining their vision, missions, and values • ...
computing 2022-02-09
Across
- software that would be most appropriate to use to send an attached document to lots of people at the same time
- wired networks send data along ------
- the law protects the control you have over the things that you create
Down
- it is an electronic communication to bully others
- it is the worldwide network of computers
- protection of information systems from unauthorized access or modification to information
- a device that connects multiple devices together
- networks send and receive messages in small units of data known as ------
8 Clues: wired networks send data along ------ • it is the worldwide network of computers • a device that connects multiple devices together • it is an electronic communication to bully others • the law protects the control you have over the things that you create • networks send and receive messages in small units of data known as ------ • ...
Innovative Digital Platform 2023-05-24
Across
- “Fast changing _____” is the biggest challenge for this pillar.
- This pillar is about “_____” the way we work.
- What are the two drivers of this pillar? (3 words)
- According to the inspiration blog about business, what should be a priority when leverage innovative digital platforms? (2 words)
Down
- Where does Sebastian like spending his free time?
- Ricky ____ would play Sebastian in the film of his life.
- What would Sebastian do if he could?
- What kind of technology excites Sebastian most about this pillar?
- What do we need to drive right business decisions?
- Data _____ is becoming more and more important in maximising business value.
- What should we spend five minutes a day doing, to enable the strategy?
11 Clues: What would Sebastian do if he could? • This pillar is about “_____” the way we work. • Where does Sebastian like spending his free time? • What do we need to drive right business decisions? • What are the two drivers of this pillar? (3 words) • Ricky ____ would play Sebastian in the film of his life. • “Fast changing _____” is the biggest challenge for this pillar. • ...
Digital Technology Words 1 2024-05-08
Across
- The method a digital system uses to store and manipulate data.
- Raw, unorganised facts and figures.
- performed
- Really being what it seems to be, genuine.
- The protection provided to the creators of original works that offers a legal framework for the control and reproduction or transmission of their creations.
- A method or system of computing or calculating.
Down
- Data with a high degree of organisation, such that it can easily be analysed and processed using algorithms.
- protection of internet-connected systems, including hardware, software and data, from cyberattacks.
- A step-by-step procedure required to solve a problem.
- An instruction in a computer program or algorithm that causes different actions to
- Free from errors
11 Clues: performed • Free from errors • Raw, unorganised facts and figures. • Really being what it seems to be, genuine. • A method or system of computing or calculating. • A step-by-step procedure required to solve a problem. • The method a digital system uses to store and manipulate data. • An instruction in a computer program or algorithm that causes different actions to • ...
Technology 2023-06-29
Across
- Using technology to simulate a three-dimensional environment
- Protecting computers, networks, and data from unauthorized access
- A portable device with a touch screen for browsing and entertainment
- Watching or listening to media content over the internet in real-time
- Online platforms for connecting and sharing content with others
- A global network that connects computers and allows information sharing
Down
- A machine that can perform various tasks and run different programs
- Electronic mail used for sending messages and files online
- Designing, building, and programming robots for various purposes
- A collection of web pages accessible through the internet
- Electronic games played on a computer or gaming console
- Creating three-dimensional objects by layering materials
- Writing instructions for computers to create software and websites
- A portable computer that you can use for writing, doing homework, or watching movies
- A mobile device that can make calls, send messages, and run apps
15 Clues: Electronic games played on a computer or gaming console • Creating three-dimensional objects by layering materials • A collection of web pages accessible through the internet • Electronic mail used for sending messages and files online • Using technology to simulate a three-dimensional environment • Online platforms for connecting and sharing content with others • ...
App Rationalisation Crossword 2024-02-14
Across
- Phase 1 of EXO apps is called ______ Win.
- What is Work Order 1.0 for the process of apps' decommissioning?
- The site to raise tickets for decommissioning.
- Apps Optimisation could help to reduce _________ cost (Maintenance, subscriptio & hardware cost) at OPU.
- One of the EXO apps focus is to ________ on - premise applications to PETRONAS cloud.
- What is the name of the new apps optimization project initiated by GD?
Down
- Phase 2 of EXO apps is called __________ Enhancement.
- ____ decommissioning involves the removal of both infra and application components.
- Main data source for app rationalization.
- ______________ functions is when 2 or more apps share similar functionality.
- Apps that are not in the scope of the PDSB decommission team.
- Idle applications & servers increase the likelihood of __________________________ attack.
- Consists of the decommissioning of server, database, storage, and network components.
- How many work orders are in the process of decommissioning apps?
- Dashboard to view Downstream Application
15 Clues: Dashboard to view Downstream Application • Phase 1 of EXO apps is called ______ Win. • Main data source for app rationalization. • The site to raise tickets for decommissioning. • Phase 2 of EXO apps is called __________ Enhancement. • Apps that are not in the scope of the PDSB decommission team. • What is Work Order 1.0 for the process of apps' decommissioning? • ...
Alexa Say Wha? 2023-10-09
5 Clues: The work that we do. • This will need to be remediated. • 22, 53, and 80 are common examples. • You can find this snack at most shopping malls. • You can find this aquatic friend on the Nemo ride at Epcot.
TECHNO CROSSWORD 2024-11-12
Across
- People use this to connect, share photos, and send messages online.
- Devices that measure body temperature.
- The process of protecting devices from online attacks.
- Used to watch movies, shows, and news.
- A device that helps people take clear pictures or videos.
- Used for making calls and sending texts.
- A machine that can be programmed to do tasks by itself.
Down
- Portable devices used by students to access learning material.
- A flying device controlled by remote, often used to take pictures from above.
- Games played on consoles, computers, or mobile devices.
- An assistant on phones that talks back and helps with tasks.
- This device lets you see and hear people far away in real time.
- A place where you can find a lot of information on any topic.
13 Clues: Devices that measure body temperature. • Used to watch movies, shows, and news. • Used for making calls and sending texts. • The process of protecting devices from online attacks. • Games played on consoles, computers, or mobile devices. • A machine that can be programmed to do tasks by itself. • A device that helps people take clear pictures or videos. • ...
Technology 2021-10-28
Across
- a saved link to a particular web page
- the heart of operating system
- measures to protect of computer
- does not eliminate the servers
- collection of physical part of comp system
Down
- exclusive right as recognized in each country to publish and sell artistic and literacy materials
- video adapter
- conventional method of transmitting data
- a software system that links top on screen to related info n graphics which are typically accessed by point and click method
- part of application that performs a task not known to a user
- part of computer system or network that is designed to block unauthorized access by permitting outward communication
- error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result.
12 Clues: video adapter • the heart of operating system • does not eliminate the servers • measures to protect of computer • a saved link to a particular web page • conventional method of transmitting data • collection of physical part of comp system • part of application that performs a task not known to a user • ...
IT Crossword 2021-10-28
Across
- a saved link to a particular web page.
- the heart of operating system.
- measures to protect of computer.
- does not eliminate the servers.
- collection of physical part of comp system.
Down
- exclusive right as recognized in each country to publish and sell artistic and literacy materials.
- video adapter.
- conventional method of transmitting data.
- a software system that links top on screen to related info n graphics which are typically accessed by point and click method
- part of application that performs a task not known to a user.
- part of computer system or network that is designed to block unauthorized access by permitting outward communication.
- error flaw failure in a computer program or system that causes it to produce incorrect or unexpected result
12 Clues: video adapter. • the heart of operating system. • does not eliminate the servers. • measures to protect of computer. • a saved link to a particular web page. • conventional method of transmitting data. • collection of physical part of comp system. • part of application that performs a task not known to a user. • ...
Cyberpuzzle 2023-08-08
Across
- Substitute_ with numbers, punctuation marks or symbols when creating your password
- Phishing attempt directed at specific individuals or companies
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Kind of software used to prevent, scan, detect and delete viruses from a computer
- Physical security breach in which an unauthorised person follows an authorised individual to enter a secured premise
- Cybersecurity Awareness Month
- Mandatory to wear inside the organisation and to remove outside
Down
- Action to do when I receive a suspicious email
- When available, use stronger_for an added layer of security
- Type of malware that disrupts computers, servers, and other devices
- Phishing attack deployed via SMS message
- Defensive technology designed to keep the bad guys out
12 Clues: Cybersecurity Awareness Month • Phishing attack deployed via SMS message • Action to do when I receive a suspicious email • Defensive technology designed to keep the bad guys out • When available, use stronger_for an added layer of security • Phishing attempt directed at specific individuals or companies • ...
Cyber ethics terms 2021-08-25
Across
- unauthorized use or reproduction of another's work
- legal right, given to an originator
- a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law
- correct or acceptable way of communicating on the internet
- moral principles
- a document stipulating constraints and practices that a user must agree to for access
- a doctrine in the law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder
Down
- the philosophic study of ethics pertaining to computers
- all rights associated with intangible assets owned by a person or company
- criminal activities carried out by means of computers or the internet
- bullying that is cyber
- tricking someone on the web
- allows the creator protection from theft of their idea
- abusive message posted on the internet
14 Clues: moral principles • bullying that is cyber • tricking someone on the web • legal right, given to an originator • abusive message posted on the internet • unauthorized use or reproduction of another's work • allows the creator protection from theft of their idea • the philosophic study of ethics pertaining to computers • ...
Racheal Tan Kai Luo - 8 Gamma 2023-01-19
Across
- a personal data that social media will collect from you
- raw facts and figures
- Cyberattacks are usually aimed at _____ normal business processes
Down
- practice of protecting systems , network and program from digital attacks
- you have the right to ______ your data
- ____ must be used for specific and stated reason
6 Clues: raw facts and figures • you have the right to ______ your data • ____ must be used for specific and stated reason • a personal data that social media will collect from you • Cyberattacks are usually aimed at _____ normal business processes • practice of protecting systems , network and program from digital attacks
Cybersecurity Vocabulary Crossword 2022-03-07
Across
- transforming plaintext or cleartext into ciphertext
- planning and maintaining organization safe in cyberspace.
- used to prove one's identity, or authorize access to a resource.
- malicious or ethical person who has knowledge and skill in analyzing program code or a computer system.
Down
- practice of sending fraudulent messages that appear to come from a reputable source.
- attaches itself with host file and replicates.
- unwanted or unsolicited communications typically received via e-mail
7 Clues: attaches itself with host file and replicates. • transforming plaintext or cleartext into ciphertext • planning and maintaining organization safe in cyberspace. • used to prove one's identity, or authorize access to a resource. • unwanted or unsolicited communications typically received via e-mail • ...
Resolving Conflict and Building Peace 2021-04-19
Across
- The building of strong and positive relationships between countries in order to maintain peace and prevent conflicts from occurring
- The practice of protecting computers, mobile devices, electronic systems, networks and data from attacks
- The power or authority to rule
- to keep a careful watch for possible danger or difficulties
- The protection of something from harm
- In a pleasant and friendly way
Down
- To be able to understand how someone feels
- Discussing an issue in order to find a solution that is acceptable to all
- The intentional use of force or violence by individuals or groups to cause fear and intimidate others
- A disagreement between two or more parties
- To find a solution to a problem or disagreement
11 Clues: The power or authority to rule • In a pleasant and friendly way • The protection of something from harm • To be able to understand how someone feels • A disagreement between two or more parties • To find a solution to a problem or disagreement • to keep a careful watch for possible danger or difficulties • ...
CIS 178 Participation 3 Security crossword 2023-04-21
Digital system & Computer science 2022 2022-10-18
Across
- software that collectes information on a computer without the user knowing about it
- protection of systems and datas on computer sciences
- web language used to build web pages and executed client side
- measure of the amount of data that can be transfered on a network
- the default or front page of a web site
- site like ecosia or google used to find information on the internet
Down
- said of the network used at home or in a small company
- a group or system of interconnected devices or people
- to put programs or inforamtion from a computer to the internet
- a connection without cables
10 Clues: a connection without cables • the default or front page of a web site • protection of systems and datas on computer sciences • a group or system of interconnected devices or people • said of the network used at home or in a small company • web language used to build web pages and executed client side • to put programs or inforamtion from a computer to the internet • ...
Social media scams! Identify! 2021-08-11
Across
- pretending to be someone else online.
- social media app, red, orange, yellow and purple background with a camera as its icon
- protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- examples are phishing, impersonation.
Down
- the name of this project!
- information or an opinion about an identified individual.
- online impersonators use these.
- a current medium of exchange in the form of coins and banknotes.
- goods to be bought and sold dont forget to get some on the way out!
- an app with the synonym of "Fraud" prevention. Please support our cause by downloading it thanks!
10 Clues: the name of this project! • online impersonators use these. • pretending to be someone else online. • examples are phishing, impersonation. • information or an opinion about an identified individual. • a current medium of exchange in the form of coins and banknotes. • goods to be bought and sold dont forget to get some on the way out! • ...
tentang ai runway gen 3 alpha 2024-10-30
Across
- Secara garis besar apa yang dapat di lakukan oleh Runway Gen-3 Alpha AI?
- Apa yang di gunakan Runway Gen-3 Alpha untuk menjaga data pengguna?
- Apakah Runway Gen-3 Alpha ramah?
- Setiap aplikasi Ai memiliki urutan cara kerja yang biasanya disebut?
- Apa yang membedakan Runway Gen-3 Alpha dari software editing video tradisional?
- Apa saja aplikasi praktis dari Runway Gen-3 Alpha dalam industri film?
Down
- batasan atau tantangan yang dihadapi pengguna saat menggunakan Runway Gen-3 Alpha?
- Apa yang Runway Gen-3 Alpha tawarkan agar bisa disesuaikan dengan kebutuhan spesifik mereka?
- Apa itu Runway Gen-3 Alpha?
- apa perbedaan utamanya dibandingkan dengan versi sebelumnya?
10 Clues: Apa itu Runway Gen-3 Alpha? • Apakah Runway Gen-3 Alpha ramah? • apa perbedaan utamanya dibandingkan dengan versi sebelumnya? • Apa yang di gunakan Runway Gen-3 Alpha untuk menjaga data pengguna? • Setiap aplikasi Ai memiliki urutan cara kerja yang biasanya disebut? • Apa saja aplikasi praktis dari Runway Gen-3 Alpha dalam industri film? • ...
test 2022-07-15
Across
- Year they met -
- On the way to Big Sur they stopped at an ___ farm -
- European country michael lived in -
- City they will live in after the wedding -
- City of the music festival they attended -
- Sammi’s side hustle -
- City they took their engagement photos -
- Destination of first plane ride together -
- Amusement park they had annual passes to -
- How they met
- Sammis bridal shower was a ___ party -
- Location of their first post together on IG -
- Industry sammi works in -
Down
- Music festival they attended -
- Michael proposed in ___ beach -
- Color of michaels bathroom before they painted it -
- Type of engineer Michael is -
- City sammi did her internship in -
- How we are honoring sammis dad at the wedding -
- Type of dance sammi did growing up -
- State michael was raised in -
- Basketball team michael supports -
- Attends ___ ___ community church -
- Where they ate on their first date -
- Sauce michael hates -
- Brand of sammi’s car -
- Engagement ring shape -
- Day of the week they attend life group -
- Sammis favorite flowers -
- Month they met -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Sammis favorite flowers - • Industry sammi works in - • Type of engineer Michael is - • State michael was raised in - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
test 2022-07-15
Across
- How we are honoring sammis dad at the wedding -
- Sammis bridal shower was a ___ party -
- Engagement ring shape -
- Music festival they attended -
- Sauce michael hates -
- City sammi did her internship in -
- Day of the week they attend life group -
- Sammi’s side hustle -
- Basketball team michael supports -
- Location of their first post together on IG -
- Type of engineer Michael is -
- Brand of sammi’s car -
- Where they ate on their first date -
- Year they met -
- Michael proposed in ___ beach -
- Month they met -
Down
- Amusement park they had annual passes to -
- European country michael lived in -
- Destination of first plane ride together -
- On the way to Big Sur they stopped at an ___ farm -
- Color of michaels bathroom before they painted it -
- State michael was raised in -
- Industry sammi works in -
- City they will live in after the wedding -
- City they took their engagement photos -
- Type of dance sammi did growing up -
- How they met
- Attends ___ ___ community church -
- Sammis favorite flowers -
- City of the music festival they attended -
30 Clues: How they met • Year they met - • Month they met - • Sauce michael hates - • Sammi’s side hustle - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
Ryan & Allison 2023-01-01
Across
- Ryan's age
- You could bribe Ryan with (state)
- High School Ryan graduated from
- Where they got engaged
- City Allison grew up in
- Where they met
- College Ryan & Allison attended
- Years they've been together
- Allison's favorite dessert
- Ryan's Middle Name
- Allison's profession
- Ryan's Zodiac Sign
- Number of nephews
- Allison's Mother's name
- Allison's first job
- First concert they went to together
- Number of Neices
- City Ryan grew up in
- Allison's eye color
- Allison's Dad's name
Down
- Ryan's profession
- Ryan's favorite color
- Month they got engaged
- Furthest state they have visited together
- Allison's biggest fear
- Job they worked together
- Highschool Allison graduated from
- Allison's Zodiac Sign
- You could bribe Allison with
- Ryan's favorite genre of movies or books
- They each have ____ sister(s)
- Ryan's Dad's name
- Ryan's Mother's Name
- Allison's age
- Brand of car Ryan has
- Ryan's favorite outdoor activity
- Ryan's eye color
- Ryan's favorite Indian dish
- Ryan & Allison Dog
- First out-of-state trip together
- Allison's Middle Name
41 Clues: Ryan's age • Allison's age • Where they met • Ryan's eye color • Number of Neices • Ryan's profession • Ryan's Dad's name • Number of nephews • Ryan's Middle Name • Ryan's Zodiac Sign • Ryan & Allison Dog • Allison's first job • Allison's eye color • Allison's profession • Ryan's Mother's Name • City Ryan grew up in • Allison's Dad's name • Ryan's favorite color • Allison's Zodiac Sign • ...
FIT E: A Lot O Words 2013-05-16
Across
- 1,000 petabytes
- 1,000 zetabytes
- catchy phrase for a business
- cpu
- 1,000 yottabytes
- lcd
- 1,000 megabytes
- the heart of the computer
- search engine that uses other search engines for their results
- place where the mother board is
- mouse or flashdrive
- your protection from hackers online
- isp
- printer or monitor
- smallest unit data
- portable storage for files and documents
- port where you connect the ethernet cable
- screen
- 1,000 bytes
Down
- angry birds or temple run
- behavior online
- 1,000 gigabytes
- 1,000 brontobytes
- ncsa
- to start up
- 1,000 exabytes
- 3g and 4g
- zoomable online presentation
- 1,000 kilobytes
- 8 bits
- led
- word
- 1,000 terabytes
- ram
- phone
- three types: optical, mechanical, and touch pad
- used to improve or add on to a game played on computers
- who what why
- the system that operates the computer
- dsl and cable
- port where you connect your flashdrive
- google or yahoo
- your privacy online
- wireless internet access
- nike swoosh
45 Clues: cpu • led • lcd • ram • isp • ncsa • word • phone • 8 bits • screen • 3g and 4g • to start up • nike swoosh • 1,000 bytes • who what why • dsl and cable • 1,000 exabytes • behavior online • 1,000 gigabytes • 1,000 petabytes • 1,000 zetabytes • 1,000 kilobytes • 1,000 terabytes • 1,000 megabytes • google or yahoo • 1,000 yottabytes • 1,000 brontobytes • printer or monitor • smallest unit data • mouse or flashdrive • your privacy online • ...
Computer Apps Review 2022-05-02
Across
- what google app would you use to make a survey
- What are the google doc margins
- The main part of an email is called the ___.
- When you steal someone else's work it is called _____
- What is mrs.brughorns favorite font?
- what google app would you use to make a website
- A google app that gives you directions to a location
- How do you sight your sources in a google doc?
- You use this to use google
Down
- We use cybersecurity to protect us from___
- what google app would you use to make a presentation
- _____ docs
- The school issues you this at the beginning of the year
- An app to make videos
- what google app would you use to write an essay
- Where does all the work you do on a google app go?
- When wringing an email you need to have ______ etiquette
- _______ is a type of essay format
- This google app can help with math.
- When sending an email the ___ line tells the receiver what the email is about
20 Clues: _____ docs • An app to make videos • You use this to use google • What are the google doc margins • _______ is a type of essay format • This google app can help with math. • What is mrs.brughorns favorite font? • We use cybersecurity to protect us from___ • The main part of an email is called the ___. • what google app would you use to make a survey • ...
Computer Virus 2024-07-01
Across
- - An attempt to acquire sensitive information by posing as a trustworthy entity.
- - The act of securing data by converting it into a code.
- - Software that collects personal information without consent.
- - Process of a system being affected by malware.
- - Software intended to harm a computer or user.
- - Making copies of data to prevent loss.
- - Place where infected files are held to prevent harm.
- - Type of malware that encrypts files, demanding payment for their release.
- - Malicious software designed to damage or disrupt systems.
Down
- - The state of being guarded against malware and cyber threats.
- - A program that detects, prevents, and removes malicious software.
- - Potential source of harm to a computer system.
- - A security system that controls incoming and outgoing network traffic.
- - Unauthorized intrusion into a computer or network.
- - Practices to defend computers from digital threats.
- - The process of analyzing a computer to detect malware.
- - Program that seems legitimate but is used to deceive users and cause harm.
- - Process of installing the latest security patches and software fixes.
- - Unwanted software designed to throw advertisements.
- - A self-replicating program that spreads without human intervention.
20 Clues: - Making copies of data to prevent loss. • - Software intended to harm a computer or user. • - Potential source of harm to a computer system. • - Process of a system being affected by malware. • - Unauthorized intrusion into a computer or network. • - Practices to defend computers from digital threats. • - Unwanted software designed to throw advertisements. • ...
it-words 2022-11-08
Across
- communication over a distance by cable, telegraph or telephone
- a person who uses or operates something, especially a computer or other machine
- WWW
- copy (data) from one computer system to another, typically over the internet
- the state of being protected against the criminal or unauthorized use of electronic data or the measures taken to achieve this
- networked computing facilities providing remote data storage and processing services via the internet
- the activity of buying and selling, especially on a large scale
Down
- program instructions
- you have to press it to turn on the computer
- the programs and other operating information used by a computer
- Excel table with one word
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- modern technology's synonym
- input device with which you can write text
- the "soul" of the computer
15 Clues: WWW • program instructions • Excel table with one word • the "soul" of the computer • modern technology's synonym • input device with which you can write text • you have to press it to turn on the computer • communication over a distance by cable, telegraph or telephone • the programs and other operating information used by a computer • ...
Risk Culture Awareness 2022-01-18
Across
- your ability and willingness to stomach a decline in the value of your investments.
- risk of loss resulting from ineffective or failed internal processes, people, systems
- not part of operational risk
- chance of something happening
- level of risk that an organization is prepared to accept in pursuit of its objectives, before action is deemed necessary to reduce the risk.
- there are three lines of them
Down
- reputational harm stemming from a cyberattack or breach within an organization's network
- you are part of this line
- represents the third line
- the elimination of hazards, activities and exposures that can negatively affect an organization and its assets
10 Clues: you are part of this line • represents the third line • not part of operational risk • chance of something happening • there are three lines of them • your ability and willingness to stomach a decline in the value of your investments. • risk of loss resulting from ineffective or failed internal processes, people, systems • ...
Tech'22 2022-01-07
Across
- ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
- A unique and non-interchangeable unit of data stored on a blockchain.
- A network of 3D virtual worlds focused on social connection.
- Everything as a service
Down
- _______ automation: orchestrated use of multiple technologies, tools or platforms
- Refers to all the cryptocurrencies other than Bitcoin.
- __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
- ____3: New age internet.
- The combination of video games and decentralized finance.
- Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.
10 Clues: Everything as a service • ____3: New age internet. • Refers to all the cryptocurrencies other than Bitcoin. • The combination of video games and decentralized finance. • A network of 3D virtual worlds focused on social connection. • A unique and non-interchangeable unit of data stored on a blockchain. • ...
Tech'22 2022-01-07
Across
- ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
- A unique and non-interchangeable unit of data stored on a blockchain.
- A network of 3D virtual worlds focused on social connection.
- Everything as a service
Down
- _______ automation: orchestrated use of multiple technologies, tools or platforms including AI for automation
- Refers to all the cryptocurrencies other than Bitcoin.
- __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
- ____3: New age internet.
- The combination of video games and decentralized finance.
- Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.
10 Clues: Everything as a service • ____3: New age internet. • Refers to all the cryptocurrencies other than Bitcoin. • The combination of video games and decentralized finance. • A network of 3D virtual worlds focused on social connection. • A unique and non-interchangeable unit of data stored on a blockchain. • ...
Cyber Security Awareness Month 2022-09-22
Across
- Always hover over these in emails before you click them.
- You can send all suspicious emails to this email address so the security team can review them for you.
- These emails entice you to click an unsafe link or attachment.
- This is cybersecurity awareness month.
- Always tell this person if an incident occurs
Down
- Never leave you company computer or phone like this
- This is a password that contains a long string of words that are easy to remember but hard to guess
- Never share this with anyone
- This can infect your computer when you download unsafe software
- Always get approval from this department before downloading any software
10 Clues: Never share this with anyone • This is cybersecurity awareness month. • Always tell this person if an incident occurs • Never leave you company computer or phone like this • Always hover over these in emails before you click them. • These emails entice you to click an unsafe link or attachment. • This can infect your computer when you download unsafe software • ...
Embracing the Digital Tapestry 2024-02-11
Across
- The act of introducing new ideas, devices, or methods.
- Digital or virtual currency secured by cryptography.
- The ability to understand and share the feelings of another in the context of digital interactions.
- The state or condition of being free from public attention in the digital realm.
- A global system of interconnected computer networks.
Down
- Simulation of human intelligence in machines for performing complex tasks.
- Online platforms that enable users to create, share content, or participate in social networking.
- A decentralized ledger of all transactions across a network.
- The era marked by rapid technological advancements and global connectivity.
- Protective measures and technologies used to safeguard information and systems.
10 Clues: Digital or virtual currency secured by cryptography. • A global system of interconnected computer networks. • The act of introducing new ideas, devices, or methods. • A decentralized ledger of all transactions across a network. • Simulation of human intelligence in machines for performing complex tasks. • ...
technical 2024-07-29
Across
- This language is known for its simplicity and is named after a type of snake.
- The practice of protecting systems and networks from digital attacks.
- A widely used operating system developed by Microsoft.
- Management This acronym refers to a type of database that organizes data into tables.
- The method used to connect multiple devices in a network.
- A diagram used to visually represent the flow of a program.
Down
- A common tool used to prevent unauthorized access to a network.
- The physical components of a computer system.
- This term refers to a device that stores data using magnetic disks.
- The process of writing and maintaining the source code of software.
10 Clues: The physical components of a computer system. • A widely used operating system developed by Microsoft. • The method used to connect multiple devices in a network. • A diagram used to visually represent the flow of a program. • A common tool used to prevent unauthorized access to a network. • This term refers to a device that stores data using magnetic disks. • ...
4424 2024-04-05
Across
- New K-State guard from Michigan.
- K-State requires all students to complete _____ training by April 30.
- The College of Modern Language is encouraging _____ to its students.
- _____ Songs of Spring to listen to this season.
Down
- The Aggieville _____ brings in hundreds of cattle to Manhattan this weekend.
- A new _____ light master plan will make Manhattan roads safer.
- Had four RBI against Missouri State.
- Carla Bernat skyrocketed to tied-23rd to make the Saturday _____ at Augusta National Women’s Amateur.
- K-State baseball faces off against No. 25 ____, starting Friday.
- Campus Compass: _____ Counseling and Psychological Services offers therapists, therapy programs and more to support students.
10 Clues: New K-State guard from Michigan. • Had four RBI against Missouri State. • _____ Songs of Spring to listen to this season. • A new _____ light master plan will make Manhattan roads safer. • K-State baseball faces off against No. 25 ____, starting Friday. • The College of Modern Language is encouraging _____ to its students. • ...
Crucigrama: Estándares de Auditoría 2024-08-17
Across
- Estándar de seguridad de datos para proteger las transacciones con tarjetas de pago.
- Ley de EE. UU. que establece estándares para la contabilidad y la auditoría.
- Marco para la gestión del riesgo y el control interno.
- Norma para la gestión de la continuidad del negocio.
- Publica el Cybersecurity Framework, un marco para mejorar la ciberseguridad.
- Ley de EE. UU. para la protección de la información médica.
Down
- Reglamento europeo para la protección de datos personales.
- Un estándar internacional para la gestión de la seguridad de la información.
- Marco de referencia para la gobernanza y gestión de TI.
- Conjunto de prácticas para la gestión de servicios de TI.
10 Clues: Norma para la gestión de la continuidad del negocio. • Marco para la gestión del riesgo y el control interno. • Marco de referencia para la gobernanza y gestión de TI. • Conjunto de prácticas para la gestión de servicios de TI. • Reglamento europeo para la protección de datos personales. • Ley de EE. UU. para la protección de la información médica. • ...
Harley's Computer Apps. Crossword 2022-04-29
Across
- a review game website that allows you to earn cash and buy upgrades
- Making sure your safe on the internet
- First thing we learned about
- Application that allows you to organize your information on a spreadsheet
- You can make your own website using this
- A citation Machine
- allows you to make a picture or text move or spin, etc.
- You can gather data from people who you share this with
- The brand of computers students use in PCM schools
- Company that owns sheets, docs, slides, etc.
Down
- the illegal act of using someone else's content without properly citing it
- Not letting people know about your personal life
- Application that allows you to make and share slides with people
- Application that allows you to create and edit videos for class
- what you always end your sentences in
- What gives slides their overall color and font
- Shortest unit of the school year
- what shape are the blocks from blooket
- How to do math using sheets
- The most commonly used game website for reviewing
20 Clues: A citation Machine • How to do math using sheets • First thing we learned about • Shortest unit of the school year • what you always end your sentences in • Making sure your safe on the internet • what shape are the blocks from blooket • You can make your own website using this • Company that owns sheets, docs, slides, etc. • What gives slides their overall color and font • ...
test 2022-07-15
Across
- Brand of sammi’s car -
- Basketball team michael supports -
- City they will live in after the wedding -
- How they met
- Location of their first post together on IG -
- Industry sammi works in -
- Color of michaels bathroom before they painted it -
- Sammi’s side hustle -
- State michael was raised in -
- Sauce michael hates -
- Music festival they attended -
- Month they met -
- Destination of first plane ride together -
- Engagement ring shape -
- Type of dance sammi did growing up -
- Sammis bridal shower was a ___ party -
- Michael proposed in ___ beach -
Down
- Sammis favorite flowers -
- Year they met -
- Attends ___ ___ community church -
- Type of engineer Michael is -
- European country michael lived in -
- Amusement park they had annual passes to -
- On the way to Big Sur they stopped at an ___ farm -
- City sammi did her internship in -
- City they took their engagement photos -
- Where they ate on their first date -
- Day of the week they attend life group -
- How we are honoring sammis dad at the wedding -
- City of the music festival they attended -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Sammis favorite flowers - • Industry sammi works in - • Type of engineer Michael is - • State michael was raised in - • Music festival they attended - • Michael proposed in ___ beach - • Basketball team michael supports - • ...
test 2022-07-15
Across
- City sammi did her internship in -
- Engagement ring shape -
- Sammi’s side hustle -
- How we are honoring sammis dad at the wedding -
- Where they ate on their first date -
- Sauce michael hates -
- Type of dance sammi did growing up -
- Industry sammi works in -
- Day of the week they attend life group -
- Sammis favorite flowers -
- Attends ___ ___ community church -
- Location of their first post together on IG -
- Year they met -
- Month they met -
- City they will live in after the wedding -
Down
- Amusement park they had annual passes to -
- City they took their engagement photos -
- Music festival they attended -
- Destination of first plane ride together -
- Color of michaels bathroom before they painted it -
- Basketball team michael supports -
- Brand of sammi’s car -
- State michael was raised in -
- European country michael lived in -
- Type of engineer Michael is -
- Sammis bridal shower was a ___ party -
- Michael proposed in ___ beach -
- On the way to Big Sur they stopped at an ___ farm -
- How they met
- City of the music festival they attended -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
Computer Virus 2024-09-09
Across
- - An attempt to acquire sensitive information by posing as a trustworthy entity.
- - The act of securing data by converting it into a code.
- - Software that collects personal information without consent.
- - Process of a system being affected by malware.
- - Software intended to harm a computer or user.
- - Making copies of data to prevent loss.
- - Place where infected files are held to prevent harm.
- - Type of malware that encrypts files, demanding payment for their release.
- - Malicious software designed to damage or disrupt systems.
Down
- - The state of being guarded against malware and cyber threats.
- - A program that detects, prevents, and removes malicious software.
- - Potential source of harm to a computer system.
- - A security system that controls incoming and outgoing network traffic.
- - Unauthorized intrusion into a computer or network.
- - Practices to defend computers from digital threats.
- - The process of analyzing a computer to detect malware.
- - Program that seems legitimate but is used to deceive users and cause harm.
- - Process of installing the latest security patches and software fixes.
- - Unwanted software designed to throw advertisements.
- - A self-replicating program that spreads without human intervention.
20 Clues: - Making copies of data to prevent loss. • - Software intended to harm a computer or user. • - Potential source of harm to a computer system. • - Process of a system being affected by malware. • - Unauthorized intrusion into a computer or network. • - Practices to defend computers from digital threats. • - Unwanted software designed to throw advertisements. • ...
Unit III Crossword II 2024-10-15
Across
- Act of creating fraudulent digital signatures under the IT Act.
- Technique for securing data as per IT Act guidelines.
- Area where the IT Act has the power to enforce laws.
- Illegal content covered under Section 67.
- Term for records, documents, or data as defined in the IT Act.
- Legal action taken for offenses under the IT Act.
- Crime involving computers or networks under the IT Act.
- Authority to decide penalties for cyber offenses.
- Access without permission, covered under multiple sections.
Down
- Protection of information infrastructure under Section 70.
- Authority responsible for issuing digital signatures.
- Cybercrime involving fraudulent emails for personal data theft.
- Entity facilitating online services regulated under the Act.
- Changes or updates made to the IT Act, such as in 2008.
- Manipulation of computer source code, Section 65.
- Violation or illegal activity defined under the IT Act.
- Duty to protect sensitive data, highlighted in Section 72.
- Unauthorized access to computer systems as per Section 66.
- Type of signature recognized by the IT Act for authentication.
- Legal consequences for violating the IT Act.
20 Clues: Illegal content covered under Section 67. • Legal consequences for violating the IT Act. • Manipulation of computer source code, Section 65. • Legal action taken for offenses under the IT Act. • Authority to decide penalties for cyber offenses. • Area where the IT Act has the power to enforce laws. • Authority responsible for issuing digital signatures. • ...