cybersecurity Crossword Puzzles
Kaien 8Gamma 2023-01-19
Across
- it is created when that data has been processed and becomes meaningful.
- a secret word that must be used to gain admission to a place.
- number a number that you dial on the telephone to reach a particular person, business, and more.
- media a collective term of website that focus on communication and more.
- a panel of keys that operate a computer or typewriter.
Down
- it is the practice of protecting system, networks, and programs from digital attacks.
- a device where people use to communicate when ever they want.
- a social media that was created by Mark Zuckerberg.
- a app that you could search anything.
- it is the raw facts and figures.
10 Clues: it is the raw facts and figures. • a app that you could search anything. • a social media that was created by Mark Zuckerberg. • a panel of keys that operate a computer or typewriter. • a device where people use to communicate when ever they want. • a secret word that must be used to gain admission to a place. • ...
IT and Tech 2023-10-03
Across
- Management Strategies and practices for attracting, developing, and retaining skilled individuals within an organization.
- The evaluation or appraisal of someone or something.
- The practice of recruiting highly skilled individuals for specialized positions.
- Measures taken to protect computer systems, networks, and data from cyber threats.
Down
- Solutions Services or strategies for finding and hiring suitable employees.
- The process of integrating a new employee into a company.
- The practice of analyzing and interpreting complex data sets to inform decision-making.
7 Clues: The evaluation or appraisal of someone or something. • The process of integrating a new employee into a company. • Solutions Services or strategies for finding and hiring suitable employees. • The practice of recruiting highly skilled individuals for specialized positions. • Measures taken to protect computer systems, networks, and data from cyber threats. • ...
Women's Engineering Day 2024-06-24
Across
- Making sure everyone gets a seat at the table.
- What is AWS's managed service for creating machine learning models?
- A network of smart gadgets chatting and sharing secrets.
- Application store for IOS
- A jolt of creativity that sparks new ideas.
- The magical code that breathes life into machines.
- A shared and immutable ledger that facilitates the process of recording transactions and tracking assets in a business network
- What is the practice of deploying software updates without downtime called?
- What is AWS's container orchestration service?
Down
- What is the practice of breaking down applications into smaller, manageable services?
- Combining the wonders of nature with cutting-edge tech.
- The dream that fuels your journey to success.
- What is the term for a lightweight, standalone, and executable package that includes everything needed to run a piece of software?
- Apple's intelligent personal assistant
- A quest to create thinking machines that rival human wits.
- A kaleidoscope of different voices and perspectives.
- The guardians of the digital realm, defending against cyber villains.
- Crafting metal companions that move and think on their own.
18 Clues: Application store for IOS • Apple's intelligent personal assistant • A jolt of creativity that sparks new ideas. • The dream that fuels your journey to success. • Making sure everyone gets a seat at the table. • What is AWS's container orchestration service? • The magical code that breathes life into machines. • A kaleidoscope of different voices and perspectives. • ...
Industrial Internet Puzzle 2016-07-27
Across
- The number of forces shaping the industrial internet
- World’s first industrial operating system
- The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words)
- Headquarters for GE Digital (2 words)
Down
- The division of GE Digital dedicated to address potential vulnerabilities by protecting industrial assets (2 words)
- Current CEO for GE Digital (2 words)
- A virtual model of each physical production asset (2 words)
- Another force of the industrial internet that deals with increasing system intelligence through embedded software (2 words)
- One force shaping the industrial internet that has to do with transforming massive volumes into information into intelligence (2 words)
9 Clues: Current CEO for GE Digital (2 words) • Headquarters for GE Digital (2 words) • World’s first industrial operating system • The number of forces shaping the industrial internet • A virtual model of each physical production asset (2 words) • The aspect of GE Digital focused on leaning out the entire new product introduction cycle (2 words) • ...
Risk Culture Awareness 2022-01-19
Across
- Process and risk owners are in which line of defense?
- the chance that an outcome or investment's actual gains will differ from an expected outcome or return
- level of risk that an organization is prepared to accept
- A mitigation strategy to eliminate the risk exposure to come into existence
- Risk department that reviews and provides an independent opinion to the business on lending proposals
Down
- this function represents the third line of defense
- The practice of protecting systems and information from digital attacks
- risk of loss resulting from ineffective or failed internal processes, people, systems
- A measure of the level of risk an organization is willing to accept
9 Clues: this function represents the third line of defense • Process and risk owners are in which line of defense? • level of risk that an organization is prepared to accept • A measure of the level of risk an organization is willing to accept • The practice of protecting systems and information from digital attacks • ...
PSB CCF CROSSWORD PUZZLE 2020-06-24
Across
- Third part of SC’s mission - give (someone) the power or drive to do something.
- IES, IET, IPRS
- SC, CSC, Dance Club, Music Club, Photog, SAC
- SC initiated, amazing three-times a year, event
- First part of SC’s mission - provide (someone or something) the means to do something.
Down
- First part of student life’s tagline
- CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
- PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
- Second part of student life’s tagline
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
- A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- Keep it lit!
- Second part of SC’s mission - participate or become involved in.
13 Clues: Keep it lit! • IES, IET, IPRS • First part of student life’s tagline • Second part of student life’s tagline • SC, CSC, Dance Club, Music Club, Photog, SAC • CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA • SC initiated, amazing three-times a year, event • Second part of SC’s mission - participate or become involved in. • ...
Cyber Crossword Puzzle 2023-10-05
Across
- Never write these down on a sticky note or a whiteboard.
- Never open these in email unless you already expected them from the sender.
- _____ is a level of data classification.
- Lock your _____ and your mobile phone anytime they are not in use.
- Files with sensitive information should always be kept in a _____ file room or drawer.
- Alway install _____ to your computer or mobile phone. Don't click "Remind me later."
Down
- _____ is when an unauthorized person follows you into a secure location.
- Report all possible cyber _____ to the IT Service Desk.
- An email scam that that targets unsuspecting users to give up information.
- Measures taken to protect your or your organization's information from cyber attack
- An unauthorized person that tries to gain access to your computer.
- Stay _____ and be on the lookout for security threats or incidents.
- Always keep a _____ workspace that is free of confidential information.
13 Clues: _____ is a level of data classification. • Report all possible cyber _____ to the IT Service Desk. • Never write these down on a sticky note or a whiteboard. • An unauthorized person that tries to gain access to your computer. • Lock your _____ and your mobile phone anytime they are not in use. • Stay _____ and be on the lookout for security threats or incidents. • ...
Cyber security 2021-03-20
Media texnologiyalar kundalik hayotda 2024-10-22
Across
- Internet va raqamli ma'lumotlarni himoya qilish, kiber hujumlardan himoyalanish va xavfsizlikni ta'minlash
- Axborot va ma'lumotlarni tarqatish vositalari
- Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya
- Search Engine Optimization Veb saytlarni qidiruv tizimlarida yuqori o'rinlarda ko'rsatish uchun amalga oshiriladigan jarayon
- Reality Foydalanuvchiga to'liq immersiv tajriba beruvchi kompyuter tomonidan yaratilgan muhit
- tarmoqlarda muayyan sohada ta'sirga ega bo'lgan shaxs brendni targ'ib qilishda yordam beradi
- Data Katta hajmdagi ma'lumotlar ularni tahlil qilish va ishlatish orqali foydali ma'lumotlarni olish
Down
- content Foydalanuvchilar tomonidan yaratilgan kontent brendlar tomonidan foydalaniladi
- Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar
- marketing Mahsulot yoki xizmatni ijtimoiy tarmoqlar orqali tez tarqatish uchun yaratilgan marketing strategiyasi
- computing Internet orqali ma'lumotlarni saqlash va ularga kirish imkonini beruvchi texnologiya
- tarmoqlar Foydalanuvchilarga axborot almashish va muloqot qilish imkonini beruvchi platformalar
- Kontentni internet orqali jonli tarzda real-time tomosha qilish yoki tinglash imkoniyatini beruvchi texnologiya
- media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar
- Shaxsiy fikrlar g'oyalar yoki ma'lumotlarni qiziqarli tarzda taqdim etadigan veb-sayt
15 Clues: Axborot va ma'lumotlarni tarqatish vositalari • Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya • media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar • Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar • ...
PSB CCF CROSSWORD PUZZLE 2020-06-24
Across
- Third part of SC’s mission - give (someone) the power or drive to do something.
- PSB Academy’s branch for training students in life sciences, sport science, engineering and cybersecurity.
- SC, CSC, Dance Club, Music Club, Photog, SAC
- CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
- First part of SC’s mission - provide (someone or something) the means to do something.
- IES, IET, IPRS
- First part of student life’s tagline
Down
- SC initiated, amazing three-times a year, event
- Keep it lit!
- From radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- Second part of student life’s tagline
- Second part of SC’s mission - participate or become involved in.
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
13 Clues: Keep it lit! • IES, IET, IPRS • First part of student life’s tagline • Second part of student life’s tagline • SC, CSC, Dance Club, Music Club, Photog, SAC • SC initiated, amazing three-times a year, event • CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA • Second part of SC’s mission - participate or become involved in. • ...
PSB CCF CROSSWORD PUZZLE 2020-06-24
Across
- SC initiated, amazing three-times a year, event
- Keep it lit!
- A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- Second part of SC’s mission - participate or become involved in.
- Third part of SC’s mission - give (someone) the power or drive to do something.
- PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
- Second part of student life’s tagline
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
- IES, IET, IPRS
- SC, CSC, Dance Club, Music Club, Photog, SAC
- CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
- First part of SC’s mission - provide (someone or something) the means to do something.
- First part of student life’s tagline
13 Clues: Keep it lit! • IES, IET, IPRS • First part of student life’s tagline • Second part of student life’s tagline • SC, CSC, Dance Club, Music Club, Photog, SAC • SC initiated, amazing three-times a year, event • CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA • Second part of SC’s mission - participate or become involved in. • ...
PSB CCF CROSSWORD PUZZLE 2020-06-24
Across
- Third part of SC’s mission - give (someone) the power or drive to do something.
- IES, IET, IPRS
- SC, CSC, Dance Club, Music Club, Photog, SAC
- SC initiated, amazing three-times a year, event
- First part of SC’s mission - provide (someone or something) the means to do something.
Down
- First part of student life’s tagline
- CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
- PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
- Second part of student life’s tagline
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
- A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- Keep it lit!
- Second part of SC’s mission - participate or become involved in.
13 Clues: Keep it lit! • IES, IET, IPRS • First part of student life’s tagline • Second part of student life’s tagline • SC, CSC, Dance Club, Music Club, Photog, SAC • CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA • SC initiated, amazing three-times a year, event • Second part of SC’s mission - participate or become involved in. • ...
ccf 2020-06-24
Across
- SC initiated, amazing three-times a year, event
- Keep it lit!
- From radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- Second part of SC’s mission - participate or become involved in.
- Third part of SC’s mission - give (someone) the power or drive to do something.
- PSB Academy’s branch for training students in life sciences, sport science, engineering and cybersecurity.
- Second part of STA’s tagline
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
- IES, IET, IPRS
- SC, CSC, Dance Club, Music Club, Photog, SAC
- CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
- First part of SC’s mission - provide (someone or something) the means to do something.
- First part of STA’s tagline
13 Clues: Keep it lit! • IES, IET, IPRS • First part of STA’s tagline • Second part of STA’s tagline • SC, CSC, Dance Club, Music Club, Photog, SAC • SC initiated, amazing three-times a year, event • CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA • Second part of SC’s mission - participate or become involved in. • ...
Cyber Threat Landscape 2024-04-04
Across
- Pretending to be an employee that forgot their password
- Type of phishing scam that involves an email with phone number to call
- Using digital ads to deliver malware
- Cybercriminals send emails claiming to be from a reputable source
- Sending text messages containing malicious link
- Type of phishing attack that targets specific people or organizations through malicious emails
- Software designed to disrupt a device's normal operations without the user's knowledge
Down
- Type of authentication that uses multi-step account log in process that requires more than just a password
- Type of malware that prevents users from accessing their device and data
- Defrauding people over the phone
- Cybersecurity thret using QR codes to trick users
- Manipulated video, photo or audio recording that used AI to make it appear real
- Type of scam that an email appears to be sent for legitimate request
13 Clues: Defrauding people over the phone • Using digital ads to deliver malware • Sending text messages containing malicious link • Cybersecurity thret using QR codes to trick users • Pretending to be an employee that forgot their password • Cybercriminals send emails claiming to be from a reputable source • ...
Cryptography Crossword Puzzle 2020-06-15
Across
- a type of cipher that's based on A's and B's and sounds like a breakfast food
- a job that you can do once you learn a lot about cryptography
- the art of writing and solving coded messages
- a type of cipher that uses symbols to represent letters and sounds like an animal
- when you take a normal message and put it into code
- another word for a secret coded message
Down
- a type of cipher that replaces regular letters with scrambled letters
- the first cipher ever made and sounds like a healthy lunch food
- the field that protects against electronic attacks
- when you solve a coded message and and find the true meaning
- a tool we use to solve and create coded messages and sounds like a job
- the regular alphabet you use everyday
12 Clues: the regular alphabet you use everyday • another word for a secret coded message • the art of writing and solving coded messages • the field that protects against electronic attacks • when you take a normal message and put it into code • when you solve a coded message and and find the true meaning • a job that you can do once you learn a lot about cryptography • ...
Risk Culture Awareness 2022-01-19
Across
- level of risk that an organization is prepared to accept
- Risk department that reviews and provides an independent opinion to the business on lending proposals
- Process and risk owners are in which line of defense?
- A measure of the level of risk an organization is willing to accept
Down
- The practice of protecting systems and information from digital attacks
- A mitigation strategy to eliminate the risk exposure to come into existence
- this function represents the third line of defense
- risk of loss resulting from ineffective or failed internal processes, people, systems
- the chance that an outcome or investment's actual gains will differ from an expected outcome or return
9 Clues: this function represents the third line of defense • Process and risk owners are in which line of defense? • level of risk that an organization is prepared to accept • A measure of the level of risk an organization is willing to accept • The practice of protecting systems and information from digital attacks • ...
Get secure 2019-08-26
Across
- something that you wear during conference calls
- you need to follow them in order not to be hacked
- you use applications from it for in-company communication, data editing, etc.
- you use it if you decide to check your email when you are not in the office
Down
- you need to do this to log in to corporate systems
- you need to do it to start working with a system
- it helps us to be sure that our online data is protected
- something you may have during a call if the internet connection is bad
- you use them for taking vacation days, reporting, creating expense reports
9 Clues: something that you wear during conference calls • you need to do it to start working with a system • you need to follow them in order not to be hacked • you need to do this to log in to corporate systems • it helps us to be sure that our online data is protected • something you may have during a call if the internet connection is bad • ...
Malwarebytes 2022-10-13
Across
- Apple's personal computer
- programs that include rogue advertising, toolbars and pop-ups
- a code made up of an array of black and white squares, used a lot during the Covid Pandemic
- best cybersecurity in the world
- malicious software that keeps your files hostage while requesting money
- undesired email communication, often sent out in bulk
- security mechanism that analyses all the traffic that enters and exits your network
- compressed file
- small pieces of information that a web browser generates (also great with chocolate chips)
- removed malicious files found by Malwarebytes are placed in this safe location
Down
- browser that's used the most
- malicious program that disguises itself inside real looking files and downloads
- group of computers under the same admin
- malicious software that tries to gather information and pass it on to another entity
- malicious software
- malware that's attached to another program and replicates and spreads itself
- provides secure connection to the internet by encrypting your traffic. (also great to use for watching foreign tv)
- the full link to a website
- company that provides users with internet services
- blocks advertisements
- fake or false warning
21 Clues: compressed file • malicious software • blocks advertisements • fake or false warning • Apple's personal computer • the full link to a website • browser that's used the most • best cybersecurity in the world • group of computers under the same admin • company that provides users with internet services • undesired email communication, often sent out in bulk • ...
Wraiths & Words: A Haunted Mansion Challenge 2023-09-21
Across
- Found in the graveyard
- Creepy statues
- Deceptive email pr@ctice
- Cybersecurity measure
- Malicious software
- Network of infected computers
- Mansion staff member
- En7ry k3y
- Mansion's signature tune (3 wds)
- Home of 999 happy haunts
- KN2G64TBM5SSAZTPOIQGCIDIMVQWILBAMFRWG33SMRUW4ZZAORXSA5DIMUQEQYLVNZ2GKZBAJVQW443JN5XA====
- Extra layer of security
- Voiced of several characters in the Haunted Mansion
- Haunted Mansion's musical instrument
- Changing image in Haunted Mansion
- What three ghosts do
- Protection software
- To take advantage of a security flaw
- Mansion decor
- Unauthorized computer user
Down
- Taunt at the Haunted Mansion (2wds)
- 55 6e 77 61 6e 74 65 64 20 65 6d 61 69 6c
- Where portraits lengthen (2 wds)
- Unauthorized access
- 73 110 116 101 114 110 101 116 32 105 100 101 110 116 105 102 105 99 97 116 105 111 110
- Boo!
- U2VhbmNlLWhvbGRpbmcgbWVkaXVtIGF0IEhhdW50ZWQgTWFuc2lvbg==
- Digital offensive
- Mansion's grand
- Mansion finale
- S3lf-r3plicating
- Haunted Mansion newspaper column
- Security weak point
- Malicious software demanding payment
- Mansion ride vehicle
- To fix a flaw
- Authentication via physical traits
- Contacting the dead
- Web tracking item
- Haunted Mansion location with a bride
40 Clues: Boo! • En7ry k3y • To fix a flaw • Mansion decor • Creepy statues • Mansion finale • Mansion's grand • S3lf-r3plicating • Digital offensive • Web tracking item • Malicious software • Unauthorized access • Security weak point • Contacting the dead • Protection software • Mansion staff member • Mansion ride vehicle • What three ghosts do • Cybersecurity measure • Found in the graveyard • ...
Cyber World (Internet) 2023-06-12
Across
- Malicious software that replicates itself and infects computer systems.
- The process of encoding information to protect its confidentiality.
- The practice of protecting computers, servers, and networks from digital threats.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
- Criminal activities conducted through the internet, such as fraud, hacking, or identity theft.
- A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
- A network of infected computers, often controlled by a hacker, used for malicious activities.
- A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
- A person who uses technical skills to gain unauthorized access to computer systems.
- A security measure that protects computer networks from unauthorized access.
10 Clues: The process of encoding information to protect its confidentiality. • Malicious software that replicates itself and infects computer systems. • A security measure that protects computer networks from unauthorized access. • The practice of protecting computers, servers, and networks from digital threats. • ...
Computers and Technology 2023-09-14
Across
- A machine that can be programmed to perform tasks automatically.
- A portable device with a touchscreen, like an iPad.
- Media Online platforms where people can connect, share, and communicate.
- An online page or site where you can find information, like social media.
- Reality A technology that immerses you in a computer-generated 3D environment.
- Game Electronic games played on a computer or gaming console.
- A mobile phone that can also connect to the internet and run apps.
- Protecting computer systems and data from theft or damage.
Down
- The physical components of a computer, like the keyboard and screen.
- Programs and applications that run on a computer or device.
- Creating new ideas, products, or technologies to improve
- Electronic messages sent and received through the internet.
- A machine that processes information and performs tasks, like a PC or laptop.
- A global network that connects computers and allows you to access information.
- Writing instructions for computers to create software and websites.
15 Clues: A portable device with a touchscreen, like an iPad. • Creating new ideas, products, or technologies to improve • Protecting computer systems and data from theft or damage. • Programs and applications that run on a computer or device. • Electronic messages sent and received through the internet. • Game Electronic games played on a computer or gaming console. • ...
IT Insights 2023-10-25
Across
- Electronic letters you send and receive through the Internet
- Acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
- Aerial term used to describe online data storage
- Team name used for St. Clair College athletic teams
- This device has rules to control the flow of data into and out of a network
- Branch of IT responsible for protecting networks and data from external attack
- Where you can find your course materials, and collaborate with your instructor
- A program that you use to access websites on the Internet
- Harmful software that can infect your computer and cause problems
Down
- St. Clair College emblem
- A web site where you can ask a question and it provides matches(ie. Google, Bing)
- A global network of connected computers where you can find information, watch videos, and communicate with others
- Where you can find your student timetable, transcript, etc.(abbrev.)
- Term used for organized, competitive computer gaming
- A network connection without wires
15 Clues: St. Clair College emblem • A network connection without wires • Aerial term used to describe online data storage • Team name used for St. Clair College athletic teams • Term used for organized, competitive computer gaming • A program that you use to access websites on the Internet • Electronic letters you send and receive through the Internet • ...
Scientific terms 2024-09-25
Across
- The study of the nervous system.
- The practice of protecting computer systems and networks from cyberattacks.
- Intelligence The simulation of human intelligence in machines that can learn and solve problems.
- The application of computer science to biology, especially in the analysis of biological data.
- The study of genes and heredity.
- The complete set of genetic material of an organism.
- A well-substantiated explanation of an aspect of the natural world based on observation, experimentation, and reasoning.
Down
- The study of the physics of the universe.
- A proposed explanation for a phenomenon that can be tested through experimentation
- The design of products and processes inspired by nature.
- The design and construction of robots, often used to automate tasks.
- A set of rules or instructions to solve a problem or perform a task.
- The manipulation of matter on an atomic and molecular scale.
- The brain's ability to change and adapt throughout life.
- The use of living organisms to create products or processes.
15 Clues: The study of the nervous system. • The study of genes and heredity. • The study of the physics of the universe. • The complete set of genetic material of an organism. • The design of products and processes inspired by nature. • The brain's ability to change and adapt throughout life. • The manipulation of matter on an atomic and molecular scale. • ...
Virus Crossword 2017-11-28
Across
- Malware that replicates itself.
- A service used to send digital letters to people at specific addresses.
- A program that protects against viruses.
- A secret word or phrase that must be used to gain admission to something.
- Something that is added to an email and can contain a virus.
- Viruses that are hidden in advertisements that ask to download software.
- The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- To affect a computer with a virus.
Down
- A program that can be installed.
- An unwanted
- A program that hides by posing as a program it is not.
- A computer that is targeted and given a virus to.
- A virus that floods a network.
- Software that is intended to damage or disable computers or computer systems.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
15 Clues: An unwanted • A virus that floods a network. • Malware that replicates itself. • A program that can be installed. • To affect a computer with a virus. • A program that protects against viruses. • A computer that is targeted and given a virus to. • A program that hides by posing as a program it is not. • Something that is added to an email and can contain a virus. • ...
Camp Gateway Crossword Puzzle 2021-07-21
Across
- (n) a large area covered with trees and undergrowth
- (n) space in which to work.
- (n) an experience or activity
- (n) the state or fact of continuing to live or exist, typically in spite of an accident, ordeal, or difficult circumstances.
- (n) what you sleep under when you go camping
- (n) another word for the great outdoors
- (n)the process of increasing
- (n) the necessary items for a particular purpose
- (n) the interconnection via the internet of computing devices embedded in everyday things — allowing them to send and receive data
Down
- (n) shows the direction of magnetic north and bearings from it.
- (n) a state of focus
- (n) the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- (n) the activity of going for long walks, especially in the country or woods
- (n) a newly established business.
- (n) 3 letters for "remote" work
15 Clues: (n) a state of focus • (n) space in which to work. • (n)the process of increasing • (n) an experience or activity • (n) 3 letters for "remote" work • (n) a newly established business. • (n) another word for the great outdoors • (n) what you sleep under when you go camping • (n) the necessary items for a particular purpose • (n) a large area covered with trees and undergrowth • ...
IT 2023-11-27
Across
- The use of largely automatic equipment in a system of operation.
- programs follow a step-by-step ______ to perform tasks efficiently."
- mechanics explores the fundamental properties and behavior of subatomic particles."
- A set of instructions for solving a problem, often used in computer programming.
- holds promise for advancements in medicine, electronics, and materials science."
- The design, construction, operation, and use of robots.
Down
- The practice of protecting computer systems, networks, and data from digital attacks.
- Relating to the branch of physics dealing with the behavior of very small particles.
- The introduction of new ideas, methods, or products.
- Information that is collected and stored, often used for analysis and decision-making.
- The manipulation of matter on an atomic or molecular scale.
- invest in research and development to drive ______ and stay ahead in the market."
- is a field that combines engineering and technology to create intelligent machines."
- implement ______ to streamline production processes and increase efficiency."
- growing reliance on digital technologies highlights the importance of strong ______ measures."
- rely on accurate and reliable ______ to draw meaningful conclusions."
16 Clues: The introduction of new ideas, methods, or products. • The design, construction, operation, and use of robots. • The manipulation of matter on an atomic or molecular scale. • The use of largely automatic equipment in a system of operation. • programs follow a step-by-step ______ to perform tasks efficiently." • ...
Media texnologiyalar kundalik hayotda 2024-10-22
Across
- Internet va raqamli ma'lumotlarni himoya qilish, kiber hujumlardan himoyalanish va xavfsizlikni ta'minlash
- Axborot va ma'lumotlarni tarqatish vositalari
- Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya
- Search Engine Optimization Veb saytlarni qidiruv tizimlarida yuqori o'rinlarda ko'rsatish uchun amalga oshiriladigan jarayon
- Reality Foydalanuvchiga to'liq immersiv tajriba beruvchi kompyuter tomonidan yaratilgan muhit
- tarmoqlarda muayyan sohada ta'sirga ega bo'lgan shaxs brendni targ'ib qilishda yordam beradi
- Data Katta hajmdagi ma'lumotlar ularni tahlil qilish va ishlatish orqali foydali ma'lumotlarni olish
Down
- content Foydalanuvchilar tomonidan yaratilgan kontent brendlar tomonidan foydalaniladi
- Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar
- marketing Mahsulot yoki xizmatni ijtimoiy tarmoqlar orqali tez tarqatish uchun yaratilgan marketing strategiyasi
- computing Internet orqali ma'lumotlarni saqlash va ularga kirish imkonini beruvchi texnologiya
- tarmoqlar Foydalanuvchilarga axborot almashish va muloqot qilish imkonini beruvchi platformalar
- Kontentni internet orqali jonli tarzda real-time tomosha qilish yoki tinglash imkoniyatini beruvchi texnologiya
- media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar
- Shaxsiy fikrlar g'oyalar yoki ma'lumotlarni qiziqarli tarzda taqdim etadigan veb-sayt
15 Clues: Axborot va ma'lumotlarni tarqatish vositalari • Reality Haqiqiy dunyo va raqamli ma'lumotlarni birlashtiruvchi texnologiya • media Raqamli formatda yaratilgan va tarqatiladigan media ijtimoiy tarmoqlar • Audio yoki video formatda tayyorlangan internet orqali tarqatiladigan dasturlar • ...
Information Technology Careers & Terms 2023-10-05
Across
- This career is is the creative driver responsible for bringing a game to life
- A professional who uses programming languages to communicate with computers and software and make them perform certain tasks
- A technology professional who works on, builds and creates software, websites, applications and other systems
- An organized collection of data stored and accessed electronically
- A place where people can share information and communicate from all over the world
- The programs and other operating information used by a computer
Down
- A person who writes computer programs
- An electronic device for storing and processing data
- The physical parts of a computer, such as the CPU and RAM
- This career protects computers from malicious attacks
- Two or more computers that are linked in order to share resources
- Sometimes called systems architects, this career studies an organization's current computer systems and procedures
12 Clues: A person who writes computer programs • An electronic device for storing and processing data • This career protects computers from malicious attacks • The physical parts of a computer, such as the CPU and RAM • The programs and other operating information used by a computer • Two or more computers that are linked in order to share resources • ...
Smart System 2021-06-30
Across
- A maintenance technique that estimates when maintenance should be performed
- Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients.
- Application that involves wireless sensor and RFID technology,
Down
- Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
- A sensor that detects movement
- Smart system application that reduces global emission
- Modification of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
7 Clues: A sensor that detects movement • Smart system application that reduces global emission • Application that involves wireless sensor and RFID technology, • A maintenance technique that estimates when maintenance should be performed • Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients. • ...
Chapter 11- RISK 2022-09-10
Across
- It is a situation that involves danger
- It is the decision of no inverting on security not even if the system is vulnerable
- It is the risk during the transmission or movement of information from one computer to another
- It is the possibility of something unwelcome or unpleasant happening
Down
- It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
- It is information resting in a hard drive, server
- It is the action of assessing someone or something
7 Clues: It is a situation that involves danger • It is information resting in a hard drive, server • It is the action of assessing someone or something • It is the possibility of something unwelcome or unpleasant happening • It is the decision of no inverting on security not even if the system is vulnerable • ...
Malware Monthly June 2022 2022-07-06
Across
- Russian backed group attacking Lithuania
- This countries government was hit hard by Conti's "big finale"
- What tab in the Nebula interface allows you to monitor and export data?
- Automatically identify these with OneView
- Cybersecurity vendors identified an increase of ????% in the use of Microsoft Excel macros compared to the fourth quarter 2021.
Down
- One of the gangs empowered by the fall of Conti.
- Type of software scan used to identify vulnerabilities in OneView
- DNS Blocking default setting on security categories
- Process used by scammers to steal credit card numbers and credentials in fake Instagram plot.
- One of the gangs empowered by the fall of Conti.
- This, thought dead, botnet is back and was the top global threat of April, according to Check Point.
- One of the gangs empowered by the fall of Conti.
- Lithuania blocked shipments of goods to this Russian enclave
- Type of Instagram account created by scammers to fool friends of the victim into interacting with it.
14 Clues: Russian backed group attacking Lithuania • Automatically identify these with OneView • One of the gangs empowered by the fall of Conti. • One of the gangs empowered by the fall of Conti. • One of the gangs empowered by the fall of Conti. • DNS Blocking default setting on security categories • Lithuania blocked shipments of goods to this Russian enclave • ...
Security - Hard 2023-11-28
Across
- practice of intentionally and ethically hacking into systems to discover vulnerabilities
- cryptographic protocol providing secure key exchange over an untrusted network, often used in VPNs
- security model emphasizing the importance of confidentiality, integrity, and availability of information
- type of attack involves capturing and analyzing network traffic to obtain sensitive information
- attack that employs multiple methods simultaneously
- type of malware changes its appearance and characteristics to evade detection
Down
- process of hiding information within another file or message
- cybersecurity principle ensuring that data is accurate, complete, and unaltered
- practice of disguising data traffic to make it look like normal traffic
- Linux user's favorite game
- cryptographic process verifying the integrity of data and ensures it has not been altered during transmission
- type of malware disguises itself as legitimate software to trick users into installing it
12 Clues: Linux user's favorite game • attack that employs multiple methods simultaneously • process of hiding information within another file or message • practice of disguising data traffic to make it look like normal traffic • type of malware changes its appearance and characteristics to evade detection • ...
Secure Your Screen Crossword Puzzle 2023-09-19
Across
- Personal ______ is any ______ that can be used to identify an individual, either on its own or in combination with other _______.
- A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
- A social _____ is someone who tries to manipulate or trick others into providing sensitive information or taking certain actions.
- Do Your Part to be Security ______
- Avoid sharing personal ____ information online.
- If you suspect a phishing email, you should ____ to cybersecurity.
Down
- Avoid Connecting to ____ WIFI.
- A type of phishing attack where malware are embedded in __ codes
- An easy tool to keep track of passwords
- Passwords with longer ______ are more difficult to crack.
- Text Message from someone pretending to be our CEO asking for a gift card
- Only download company ______ software
12 Clues: Avoid Connecting to ____ WIFI. • Do Your Part to be Security ______ • Only download company ______ software • An easy tool to keep track of passwords • Avoid sharing personal ____ information online. • Passwords with longer ______ are more difficult to crack. • A type of phishing attack where malware are embedded in __ codes • ...
Women in STEM Trivia 2018-03-02
Across
- Last name of the first female CEO for Duke Energy
- Phebe Novakovic worked for this branch of the government
- This is the nation's largest utility company
- Sempra Energy is based in this city
- Popular acronym for fields related to math, science, technology, and engineering
- Nobel Prize equivalent of Computer Science
- Last name of CEO for IBM
- Adriana Karaboutis holds this position at National Grid
- Women make up 22% of this specific engineering field
Down
- General Dynamics is this kind of federal contractor
- Marissa Mayer was given this many job offers after graduating from Stanford University
- Marissa Mayer is the CEO of this major company
- Novakovic pushed General Dynamics into the direction of this type of security
- Brittany Wenger was this age when she designed her Artificial Brain to help detect breast cancer
- The name of the computer that IBM created
- Rometty has degrees in both computer science and this type of engineering
- First company Marissa Mayer chose to work for
- First word of the abbreviated company title PG&E
- This natural vegetation supplied a useful chemical for Ellen Kendall's water filter
- Company that worked with wearable technology to help patients and health-care providers
20 Clues: Last name of CEO for IBM • Sempra Energy is based in this city • The name of the computer that IBM created • Nobel Prize equivalent of Computer Science • This is the nation's largest utility company • First company Marissa Mayer chose to work for • Marissa Mayer is the CEO of this major company • First word of the abbreviated company title PG&E • ...
Electricity 2023-05-30
Across
- If it's high, power is high
- Tells us how much power we get related to voltage and resistance
- Stops electricity from flowing, rubber
- Power lines connecting power supplies to homes in a large area
- Electricity in one direction
- A path for electricity to flow
- Anything that makes power, like a generator or a battery
- Electricity in two directions, going back and forth
- Measures the current in a circuit
- Too much power at one time
- Happens again and again
- Electricity that is flowing, light is on
- Adjusts the power in a circuit
- Power from water
- Portable power supply, can power a remote
- No power or power loss
Down
- Protects us from electric shocks
- Measures the voltage in a circuit
- Power used by a device
- Allows electricity to flow, metal
- Power from earth's heat
- If it's high, power is low
- Online protection
- Transfers electricity from one circuit to another with more or less power
- Makes your hair stand up, gives a shock
- Makes power, makes electricity
- A place to plug in a device
- Measurement of electrical power
28 Clues: Power from water • Online protection • Power used by a device • No power or power loss • Power from earth's heat • Happens again and again • If it's high, power is low • Too much power at one time • If it's high, power is high • A place to plug in a device • Electricity in one direction • A path for electricity to flow • Makes power, makes electricity • Adjusts the power in a circuit • ...
Unit 5 and 10 Vocab 2023-09-02
Across
- Whether somthing is appropriate morally
- How trustworthy an individual is
- Too much
- To have or show a good judgement of something
- "Not supported or proven by evidence"
- Computing services on the internet
- "The use of largely automatic equipment in a system of manufacturing or other production process"
- A process or set of rules for computer to do somethng
- Making inappropriate materials not crearly visible
Down
- "Adaptation of a system, process, etc. to be operated with the use of computers and the internet"
- To prove an individual with teir physical characteristic
- "A tendency to be too ready to believe that something is real or true"
- Not being "observed" by people that the individual did't allow to
- "rapid increase in numbers"
- New things that have never been created before
- The scurity of technological devices, software and information online
- How responsible an individual is
- Using an exaggerated wordign to attract public's interest; often lead to inaccuracy of information
- To rely on something
- To have a strong attraction for technology espeacially new technologies
- "honest and having strong moral principles; moral uprightness"
- Giving or understanding a wrong information
- Fake
23 Clues: Fake • Too much • To rely on something • "rapid increase in numbers" • How trustworthy an individual is • How responsible an individual is • Computing services on the internet • "Not supported or proven by evidence" • Whether somthing is appropriate morally • Giving or understanding a wrong information • To have or show a good judgement of something • ...
Technology vocabulary 2023-12-15
Across
- a secret word used to access a computer system
- engine a program that searches for information on the internet
- a portable computer with a touchscreen
- a mobile phone with more features
- a regularly updated website or webpage on a specific topic
- an input device with keys used to type
- wireless technology that allows devices to connect
- malicious software that replicates and spreads causing harm
- a global network connecting computers
- to make something current or bring up to date
- media online platforms to connect with others
- real-time communication between users over the internet
Down
- a pointing device used to interact with a computer
- the physical components of a computer
- programs and application that run on a electronic device
- computer system that protect data, networks, etc.
- a software application used to access websites
- word short for the word 'application'
- to transfer data to your device
- to transfer data from the internet
- an electronic device that starts with a 'c'
- a collection of webpages available through internet
- to end a session on a website or computer
- electronic mail
- a unique name used to identify an individual on a computer
25 Clues: electronic mail • to transfer data to your device • a mobile phone with more features • to transfer data from the internet • the physical components of a computer • word short for the word 'application' • a global network connecting computers • a portable computer with a touchscreen • an input device with keys used to type • to end a session on a website or computer • ...
FITE: Vocab. DB 2013-05-16
Across
- how safe your computer is online
- iphone
- how safe you are online
- the brain of the computer
- something you use to find info
- how you connect to the internet
- screen
- something you use like a monitor so you can see stuff in the computer
- comcast
- the wiring inside a computer
- wireless internet
- touch pad
- where headphones go
- apps for computer
- wired internet
Down
- online server
- dsl cable
- a catchy phrase used by companies
- short term memory or ram on a computer
- attachments for a computer
- brings up different search engine info
- something you send to a business to get a job
- how you act online
- the heart of the computer
- non wired internet
- something you type on
- places in the computer for flash drives
- the speed inside your computer
- microsoft word
- place for a cd on a computer
- something you use to put stuff into the computer
- an emblem for a company
- something that catches your eye to make you interested in a company
- a place to keep things
- flash drive slot
- tall modem (box) for desktop computer
36 Clues: iphone • screen • comcast • dsl cable • touch pad • online server • microsoft word • wired internet • flash drive slot • wireless internet • apps for computer • how you act online • non wired internet • where headphones go • something you type on • a place to keep things • how safe you are online • an emblem for a company • the brain of the computer • the heart of the computer • attachments for a computer • ...
Mr. Singer's Technology Crossword 2023-02-04
Across
- - A path for electricity to flow
- - a device that forwards data between networks
- - A collection of related data
- - Software that manages the resources of a computer
- - Information that is stored and processed by a computer
- - A visual way of interacting with a computer
- - A global network of connected devices
- - The last name of your technology teacher
- - Software that translates code into machine language
- - A type of networking protocol used to connect devices
- - A language used to create websites
- - A virtual place to store and access data and programs over the Internet
Down
- - The central processing unit, or "brain," of a computer
- - A unit of measurement for digital information
- - Data that is entered into a computer
- - Measures taken to protect against online threats
- - Finding and fixing errors in code
- - A brand of 3D design software
- - A coding platform that utilizes blocks instead of text
- - A set of steps for solving a problem or achieving a goal
- - A program that can harm a computer or steal information
- - A security system that blocks unauthorized access to a network
- - A system of numbers using only two digits, 0 and 1
23 Clues: - A collection of related data • - A brand of 3D design software • - A path for electricity to flow • - Finding and fixing errors in code • - A language used to create websites • - Data that is entered into a computer • - A global network of connected devices • - The last name of your technology teacher • - A visual way of interacting with a computer • ...
IT Networking Terms 2023-09-07
Across
- a set of computers sharing resources provided by nodes
- an independent U.S.A agency that is a part of the government and enforces consumer protection
- hardware such as computers an
- the process of a fraudulent scheme
- a U.S agency that promotes American innovation
- a government agency that supports small businesses
- a person who is hired for a salary that is also not at an executive level
- the center of your network that serves as the main connecting point for all of your devices
- converting data into a code
- electronics that allow you to access the internet like smartphones, laptops and tablets
- an an encrypted security protocol that protects internet traffic on wireless networks
Down
- the ability to have physical access to a computer system
- the process of copying files over to a secondary loin case in case of equipment failure
- a federal executive department that is responsible for public security
- a layered approach to protecting data and applications
- a container for storing data on a computer
- practice of protecting data from hackers
- programs used by a computer
- a structure used to build software on
- a string of special characters used to allow access to a computer service
20 Clues: programs used by a computer • converting data into a code • hardware such as computers an • the process of a fraudulent scheme • a structure used to build software on • practice of protecting data from hackers • a container for storing data on a computer • a U.S agency that promotes American innovation • a government agency that supports small businesses • ...
THE INTERNET 2023-09-19
Across
- Secret code to access protected online accounts?
- The device that connects a computer to the internet?
- The term for online storage and computing resources accessible via the internet?
- Transferring files from the internet to a device?
- Method of watching/listening to media content online in real-time?
- Wireless technology that allows internet access?
- Action of looking for information on the web?
- The term for online platforms for connecting with others?
- Symbol used to categorize and search for topics on social media?
- the harmful behavior of using the internet to harass others?
Down
- The process of converting data into a code to secure it during transmission?
- Security system that blocks unauthorized access to a network?
- The practice of protecting computer systems and networks from online threats?
- An online seminar/presentation conducted over the internet?
- Electronic communication system for sending messages over the internet?
- Software used to access and view web pages?
- A collection of web pages accessible via the internet?
- Device that directs internet traffic to various devices in a network?
- A unique address used to locate a website on the web?
- The term for content that spreads rapidly across the internet?
20 Clues: Software used to access and view web pages? • Action of looking for information on the web? • Secret code to access protected online accounts? • Wireless technology that allows internet access? • Transferring files from the internet to a device? • The device that connects a computer to the internet? • A unique address used to locate a website on the web? • ...
Famous Entrepreneurs 2024-02-14
Across
- Caused Chanel to temporarily close her business
- One of Microsoft's goals
- Tesla faced these types of challenges
- Age of Warren Buffet when he made his 1st investment
- The percentage that Nike owns of the shoe industry
- Premier League football club formally owned by Roman Arkadyevich
- Founder of Chanel (first name)
- A deal with ____ led Microsoft to release the Windows Operating System
- Bill Gates attended this university
- The former name of Marvel
- Africa, Elon Musk was born in (2 words)
- Original name for Nike (3 words)
- Dr. Dre partnered with this fashion brand
Down
- Phil _____ founder of Nike
- Founder of Beats headphones (2 words)
- Fast fashion brands create these based on Chanel designs (2 words)
- Steve ____ is the co-founder of Apple
- Stan Lee created the _____ Four with his friend
- Roman Arkadyevich was raised by his______
- Company co-founded by Musk focused on artificial intelligence
- Warren Buffet was born in Omaha,___________
- Jobs developed Apple because he could not_____ a personal computer
- The 2008 Financial _____ was a big challenge for Buffet
- Stan Lee is the founder of this company
- Jimmy ______: Partner with Dr. Dre for Beats
25 Clues: One of Microsoft's goals • The former name of Marvel • Phil _____ founder of Nike • Founder of Chanel (first name) • Original name for Nike (3 words) • Bill Gates attended this university • Steve ____ is the co-founder of Apple • Tesla faced these types of challenges • Founder of Beats headphones (2 words) • Stan Lee is the founder of this company • ...
Criminal Justice Careers 2024-05-07
Across
- An investigator who collects information to solve crimes
- This type of officer works to prevent the distribution and use of illegal drugs
- Maintains order in courtrooms
- This agent monitors US borders for illegal activity
- Those responsible for managing wildlife are fish and game...
- This type of psychologist studies human behavior in connection with crime
- Use their knowledge of insects to help in investigations
- A person who advises and represents another in legal matters
- Study skeletal remains to help in investigations
Down
- People who want to protect the US from digital attacks should go into...
- This type of officer supervises and maintains order in prisons
- Support victims of crime
- Provide investigators with a psychological/physical description of a suspect
- This investigator collects evidence at crime scenes
- Enforce laws and protect citizens by patrolling and responding to crimes
- Assists attorneys
- Preside over trials
- A person who investigates financial statements to look for fraud is a forensic...
- Enforces laws and monitors safety on roads and highways
- This type of officer supervises convicted criminals who have been given an alternative sentence
- An individual who works in the FBI to protect the US from organized crime, terrorism and more
21 Clues: Assists attorneys • Preside over trials • Support victims of crime • Maintains order in courtrooms • Study skeletal remains to help in investigations • This investigator collects evidence at crime scenes • This agent monitors US borders for illegal activity • Enforces laws and monitors safety on roads and highways • An investigator who collects information to solve crimes • ...
Scientific Discoveries and Inventions 13 2024-11-03
Across
- "The study of landforms and the processes that shape them."
- "The protection of digital data and systems from cyber attacks."
- "A particle representing a quantum of light or other electromagnetic radiation."
- "The preservation of humans at low temperatures for possible revival."
- "The breakdown of organic substances by natural organisms."
- "The science of creating three-dimensional images with laser technology."
- "The removal of tissue for diagnostic examination."
- "An unstable isotope that decays, emitting radiation."
- "The ability to meet current needs without compromising future resources."
Down
- "The study of life in the universe beyond Earth."
- "The study of the mechanics of living organisms and their movements."
- "The scientific study of animal biology."
- "The branch of biology dealing with hormones and glands."
- "The science of designing equipment to fit the human body."
- "A parasitic disease caused by Toxoplasma gondii, often in animals."
- "The study of electronic properties of materials at low temperatures."
- "Organelles known as the 'powerhouses' of cells, producing energy."
- "A method of growing plants in a water-based solution, without soil."
- "A technique that modifies genes to treat or prevent disease."
- "A force that makes a body follow a curved path toward the center."
20 Clues: "The scientific study of animal biology." • "The study of life in the universe beyond Earth." • "The removal of tissue for diagnostic examination." • "An unstable isotope that decays, emitting radiation." • "The branch of biology dealing with hormones and glands." • "The study of landforms and the processes that shape them." • ...
Thinklogic 2021-09-13
CIS 178 Participation Cybersecurity Joseph Certuche 2023-07-13
Across
- short for malicious
- act of listening in
- duplicate copy of data
- to describe any fraudulent business
- screen out hackers, viruses, and worms
- humans can get it too.
- monitors a victim's online activity
- to ensure and confirm identity
- decoy system to attract attackers
- overlay on a legitimate page
- software program that montitors computer
- capture keystrokes
Down
- high-profile business attack
- Generates revenue for its developer
- face swapped or digitally altered
- online advertising to deliver malware
- technique for acquiring sensitive data
- error, fault or flaw
- type of malicious software
- flaw in the system
- encyption technology
21 Clues: flaw in the system • capture keystrokes • short for malicious • act of listening in • error, fault or flaw • encyption technology • duplicate copy of data • humans can get it too. • type of malicious software • high-profile business attack • overlay on a legitimate page • to ensure and confirm identity • face swapped or digitally altered • decoy system to attract attackers • ...
CYB 2024-05-07
Across
- the term used for various pop-up advertisements that show up on your computer or mobile device
- malware that holds a victim's data unless the victim pays a ransom to the attacker
- malware, that spreads between computers and causes damage to data and software
- malicious software that spies on the victim
Down
- malware that downloads onto a computer disguised as a legitimate program
- the practice of protecting systems, networks, and programs from digital attacks
- a type of malware that can automatically self-replicate without human interaction
7 Clues: malicious software that spies on the victim • malware that downloads onto a computer disguised as a legitimate program • malware, that spreads between computers and causes damage to data and software • the practice of protecting systems, networks, and programs from digital attacks • ...
PSB CCF CROSSWORD PUZZLE 2020-06-24
Across
- SC initiated, amazing three-times a year, event
- Keep it lit!
- A campus radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres, our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- Second part of SC’s mission - participate or become involved in.
- Third part of SC’s mission - give (someone) the power or drive to do something.
- PSB Academy’s campus for training students in life sciences, sport science, engineering and cybersecurity.
- Second part of student life’s tagline
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
Down
- IES, IET, IPRS
- SC, CSC, Dance Club, Music Club, Photog, SAC
- CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA
- First part of SC’s mission - provide (someone or something) the means to do something.
- First part of student life’s tagline
13 Clues: Keep it lit! • IES, IET, IPRS • First part of student life’s tagline • Second part of student life’s tagline • SC, CSC, Dance Club, Music Club, Photog, SAC • SC initiated, amazing three-times a year, event • CSA, GSC, MAPIA, KC, Myanmar Student Club, SASA • Second part of SC’s mission - participate or become involved in. • ...
Crossword Puzzle 2021-10-26
Across
- How many Level 1 DGS on Golf?
- What is the first name of the new OIM on Golf?
- What is the current color code for lifting gears?
- What do you call a gradual physiological adaptation that improves an individual’s ability to tolerate heat stress?
- How many Golden Rules to live by:
- In what month do we celebrate Cybersecurity awareness?
Down
- How many years LTI free is Golf?
- Plastic waste shall be disposed into ... bin
- An apparatus used for moving patients who require medical care
- Three elements that are required to start a fire: oxygen, heat, and ...
- How many consecutive shifts can personal isolation can be used for?
- How many alternative muster stations available in G-Loc?
- Portable, life-saving devices designed to treat people experiencing sudden cardiac arrest, a medical condition in which the heart suddenly and unexpectedly stops beating
13 Clues: How many Level 1 DGS on Golf? • How many years LTI free is Golf? • How many Golden Rules to live by: • Plastic waste shall be disposed into ... bin • What is the first name of the new OIM on Golf? • What is the current color code for lifting gears? • In what month do we celebrate Cybersecurity awareness? • How many alternative muster stations available in G-Loc? • ...
Cybersecurity/Web Design - use your KNOWLEDGE PLANNER 2019-11-05
Across
- to help protect a computer network from unauthorised access
- Hacking’ - Testing a computer systems to find security vulnerabilities
- is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
- group of people at which the website is aimed e.g. teenage girls
- test that a human can pass but a computer program cannot
- reason for which the website has been created e.g. to entertain
- to scramble information so that it can be sent safely over the Internet
- attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
Down
- by reproducing itself or infecting other programs by modifying them.
- a secret word to unlock a device – must include numbers/special characters
- Testing
- Audience
- a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
- to use and understand
- preferred way to present/layout digital material
15 Clues: Testing • Audience • to use and understand • preferred way to present/layout digital material • test that a human can pass but a computer program cannot • to help protect a computer network from unauthorised access • reason for which the website has been created e.g. to entertain • group of people at which the website is aimed e.g. teenage girls • ...
The internet 2023-06-19
Across
- media Online platforms for people to connect, communicate, and share content
- Sending data or files from a device to the internet or another user
- Protecting devices, networks, and data from digital threats, like hackers and viruses
- Method of sending messages electronically between people
- Collection of related webpages accessed with a browser
- Receiving data or files from the internet and saving them on a device
- Regularly updated website or web page featuring personal or informational content
Down
- Technology allowing devices to connect wirelessly to the internet or a network
- Program used to access and view websites on the World Wide Web
- game Interactive entertainment played together or against others using the internet
- engine Tool that helps find information, images, or websites using keywords
- Transmitting video or audio content allowing users to watch or listen without downloading
- Unique address of a website on the internet, often starting with "www"
13 Clues: Collection of related webpages accessed with a browser • Method of sending messages electronically between people • Program used to access and view websites on the World Wide Web • Sending data or files from a device to the internet or another user • Receiving data or files from the internet and saving them on a device • ...
Cyber Crossword Puzzle 2023-10-05
Across
- Stay _____ and be on the lookout for security threats or incidents.
- An email scam that that targets unsuspecting users to give up information.
- Measures taken to protect your or your organization's information from cyber attack
- Never write these down on a sticky note or a whiteboard.
Down
- An unauthorized person that tries to gain access to your computer.
- Never open these in email unless you already expected them from the sender.
- _____ is a level of data classification.
- _____ is when an unauthorized person follows you into a secure location.
- Lock your _____ and your mobile phone anytime they are not in use.
- Report all possible cyber _____ to the IT Service Desk.
- Files with sensitive information should always be kept in a _____ file room or drawer.
- Always keep a _____ workspace that is free of confidential information.
- Alway install updates to your computer or mobile phone. Don't click "Remind me later."
13 Clues: _____ is a level of data classification. • Report all possible cyber _____ to the IT Service Desk. • Never write these down on a sticky note or a whiteboard. • An unauthorized person that tries to gain access to your computer. • Lock your _____ and your mobile phone anytime they are not in use. • Stay _____ and be on the lookout for security threats or incidents. • ...
Cyber/Digital Literacy 2024-11-06
Across
- example of computer virus
- of malware that can make copies of itself and spread automatically across computers in a network.
- has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness.
Down
- -Refers to the trail of data you leave when using the internet.
- is use protect your personal information
- Who's actively participate in cyberspace and the online community offered through the internet
- Type of crime that uses computers or networks harm.
7 Clues: example of computer virus • is use protect your personal information • Type of crime that uses computers or networks harm. • -Refers to the trail of data you leave when using the internet. • Who's actively participate in cyberspace and the online community offered through the internet • ...
Internet 2023-07-05
Across
- A digital message sent electronically to communicate with others.
- Safety Guidelines and precautions to ensure safe and responsible internet use.
- Gaming Playing games with other people over the internet.
- To transfer data or files from the internet to your computer.
- Measures taken to protect computers, networks, and data from unauthorized access or attacks.
- Media Websites and applications that allow people to connect and share content online.
- A global network that connects computers and allows communication and access to information.
Down
- A collection of web pages that can be accessed on the internet.
- To communicate with others in real time using text messages on the internet.
- Connected to or available through the internet.
- A wireless technology that allows devices to connect to the internet without using cables.
- A program used to access and navigate websites on the internet.
- Playing audio or video content directly from the internet without downloading it.
- Engine A tool that helps you find information on the internet.
- To transfer data or files from your computer to the internet.
15 Clues: Connected to or available through the internet. • Gaming Playing games with other people over the internet. • To transfer data or files from the internet to your computer. • To transfer data or files from your computer to the internet. • Engine A tool that helps you find information on the internet. • ...
Principles of Cybersecurity Chapter 5 Vocabulary 2023-03-07
Across
- Voice-based phishing in which the hacker calls the user impersonating someone else
- Use of SMS messages as the means of reach- ing victims.
- Phishing attack targeting individuals with a high net worth or with high status also called whaling.
- Process of providing a new employee with all information he or she needs on the company, business processes, security policies, and other related material.
- Device with bars or other obstruction to alternately block an entryway and allow only one per- son to pass at a time.
- Physical access control system that uses two sets of interlocking doors the fi rst set of doors must close before the second set can be opened
- ee-shaped wall usually made of concrete to prevent vehicles from passing can be moved into and out of place with heavy equipment. (
- Phishing attack targeting specifi c indi- viduals who may not be wealthy or prominent.
- An entry is embedded in the victim’s local DNS cache that redirects a legitimate URL to an incorrect IP address.
- Document created by the owner of the network containing information on proper usage of the network and related asset
- Any data that can be used to pinpoint a specific person
- Process of closing an employee’s accounts and records when he or she leaves the company
- Electromagnetic signals given off by all electronic equipment
- Vertical cylinder permanently installed to pre- vent vehicles from passing may be retractable to either allow or deny passage
- Technique in which server racks are placed in rows with cold air entering the room on one side and hot air exiting the room on the other side
Down
- Attempting to obtain personal information through fake e-mails that appear to be real
- Barrier placed around wires to block electromagnetic interference from affecting the electri- cal signals in the wires
- System in which video cameras transmit signals to a centralized moni- toring location, but the signals are not publically broad- cast also known as video surveillance
- Secured room in which servers and net- working equipment are installed.
- Involves setting up a website that looks legitimate and credible, but is used to steal personal information entered by users
- Responsibilities are divided so no single individual has complete control over a process or task
- Facility specifi cally designed to store and manage vast quantities of data considerably larger than a server room.
- Specifi cation developed by the National Security Agency (NSA) that deals with methods for spying using electromagnetic radiation and methods to prevent such activities.
- DNS solution that cre- ates a special DNS record to verify the validity of an e-mail sende
- Attack in which hackers embed mali- cious code in websites often visited by specifi c individ- uals, departments, or all employees of a company
- An unauthorized person walking into a facility with or right behind authorized people to appear as if with them
- The type of fire based on the fuel that feeds the fire.
27 Clues: Use of SMS messages as the means of reach- ing victims. • Any data that can be used to pinpoint a specific person • The type of fire based on the fuel that feeds the fire. • Electromagnetic signals given off by all electronic equipment • Secured room in which servers and net- working equipment are installed. • ...
25 key words that represent Cybersecurity 2023-09-07
Across
- Any technology, be it software or hardware, used to keep intruders out.
- Software package that performs a specific function directly for a person who is intended to use a computer system.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible
- A scam where a hacker poses as a legitimate business or organization
- Using multiple hosts and users, hackers bombard a website with a tidal wave of requests
- A set of instructions, or a system of rules, written in a particular programming language
- A computer program that can copy itself and infect a computer without permission
- A mode in the computer that stores data on servers in different locations
- Two or more computers connected together to share resources
- A method of connecting a series of computers and devices in a private encrypted network,
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
- A form of malware that hijacks your system and encrypts your files
- A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches
- While someone is tricked into clicking on one object on a web page when they want to click on another,
Down
- A means of attack on a computer system
- A technique to prevent unauthorized users from accessing sensitive data
- Smallest unit of a digital image
- A set of rules governing the format of data sent via the internet or local network.
- The capacity a network can transfer data
- Allows devices to communicate with each other
- Coding used to protect your information from hackers.
- The result of a hacker successfully breaking into a system
- A form of malware used by hackers to spy on you and your computer activities.
- Any attempt to breach a logical environment's security boundary
- a misleading computer program that looks innocent, but in fact allows the hacker into your system
25 Clues: Smallest unit of a digital image • A means of attack on a computer system • The capacity a network can transfer data • Allows devices to communicate with each other • Coding used to protect your information from hackers. • The result of a hacker successfully breaking into a system • Two or more computers connected together to share resources • ...
CyberSecurity Awareness 2023-09-28
5 Clues: malicious software • state of keeping private • act of breaking or failing • takes advantage of a vulnerability • cybercriminal disguises themselves as a trusted source
Viruses - Maria DiMeglio 2018-11-15
Across
- a type of virus that is disguised as something else
- people who hack into a company's network to find and help resolve problems in the company's cybersecurity
- a way a scammer can get your personal information through fake websites and/or fraud emails or texts
- a way to message someone electronically
- a monitor is an example of this; isn't affected by viruses
- email virus that held a seemingly innocent message, but sent itself to the top 50 people in the victim's address book
- makes copies of itself in order to spread through a network
Down
- a virus intended to do harm
- floods a network with fake traffic
- a type of virus in which a person or group of people encrypt someone else's files and asks for money in exchange for restoring them
- what software is made of
- software that can prevent virus attacks
- the first virus intended to do damage in the real world
- unwanted software, not necessarily harmful
- a virus is a type of this
15 Clues: what software is made of • a virus is a type of this • a virus intended to do harm • floods a network with fake traffic • software that can prevent virus attacks • a way to message someone electronically • unwanted software, not necessarily harmful • a type of virus that is disguised as something else • the first virus intended to do damage in the real world • ...
Digital Citizenship Vocabulary 2024-03-05
Across
- Knowing how to use digital technology safely and effectively.
- Using someone else's work in a legal and fair way, like for school projects.
- How you present yourself online through usernames, profiles, etc.
- Protecting your computer and information from digital attacks and hackers.
- Being able to find and use information online in a smart and responsible way.
- Using two different ways to prove who you are before accessing accounts online.
- Following rules for good behavior and respect when using the internet.
Down
- The trail of information you leave behind when using the internet.
- Tricky headlines or links designed to get you to click on them.
- Keeping personal information safe and not sharing it with others online.
- Bullying or hurting others online.
- How others see you based on what you do and say online.
- Your freedoms and protections when using digital technology.
- Tricking people into giving personal information by pretending to be someone else online.
- Things people create, like art or writing, that they own the rights to.
15 Clues: Bullying or hurting others online. • How others see you based on what you do and say online. • Your freedoms and protections when using digital technology. • Knowing how to use digital technology safely and effectively. • Tricky headlines or links designed to get you to click on them. • How you present yourself online through usernames, profiles, etc. • ...
IT Insights 2023-10-24
Across
- A program that you use to access websites on the Internet
- acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
- where you can find our course materials, and collaborate with your instructor
- aerial term used to describe online data storage
- a web site where you can ask a question and it provides matches
- team name used for St. Clair College athletic teams
- St. Clair College emblem
Down
- term used for organized, competitive computer gaming
- this device has rules to control the flow of data into and out of a network
- a global network of connected computers where you can find information, watch videos, and communicate with others
- branch of IT responsible for protecting networks and data from external attack
- harmful software that can infect your computer and cause problems
- electronic letters you send and receive through the Internet
- a network connection without wires
- where you can find your timetable, transcript, etc.(abbrev.)
15 Clues: St. Clair College emblem • a network connection without wires • aerial term used to describe online data storage • team name used for St. Clair College athletic teams • term used for organized, competitive computer gaming • A program that you use to access websites on the Internet • electronic letters you send and receive through the Internet • ...
August Newsletter Crossword 2024-07-30
Across
- Systems Engineering is updating JIRA, JAMA, and Plan0View Projects for what purpose?
- To meet the IT Team, please visit them where?
- What is the last name of the 4th person in the first column of the August Birthdays?
- Who is the AP Team working with to complete network laydown?
- What kind of safety concern is the result of debris puncturing a tire?
Down
- How much money can you earn by participating in Healthyroads JT4 Wellness Incentive Program? (Spelled Out)
- Who is the newest hire on our JT4 security team?
- Upon publication, new PMIs should be coordinated with whom?
- The 11DOS JT4 Team is helping the 11DOS by lending our expertise in what kind of planning?
- Who is the first TROC RCO?
- The 11th Annual Golf Tournament is what kind of start?
- Which employee just finished HARRIER maintenance training?
12 Clues: Who is the first TROC RCO? • To meet the IT Team, please visit them where? • Who is the newest hire on our JT4 security team? • The 11th Annual Golf Tournament is what kind of start? • Which employee just finished HARRIER maintenance training? • Upon publication, new PMIs should be coordinated with whom? • Who is the AP Team working with to complete network laydown? • ...
GAMER ARMY CROSSWORD 2024-06-05
Across
- Floating Robot that buzzes when it flys in the air
- action on someone who puts things together.
- a thing done by skills or courages
- A headset you wear that makes you see a world a person made that you can walk into.
- take something or someone to an other place.
- a place on particular issues can be exchanged
- High definition on internet That has hyperspeed of power.
Down
- Being protected by an electronic face that watches.
- A person who unlawful violences to the civilians
- Two halves of a school year in high school.
- a Player name or person who plays that player.
- A sign that shows peace or other signs that are called… to bring to their own country.
- A thing you did that makes you popular and become a worlds and most… actor or person
- One problem happen to another problem that turn into a huge problem called.
- something that is visible and not completely border.
15 Clues: a thing done by skills or courages • Two halves of a school year in high school. • action on someone who puts things together. • take something or someone to an other place. • a place on particular issues can be exchanged • a Player name or person who plays that player. • A person who unlawful violences to the civilians • ...
Cyber-security 2021-01-17
Across
- refers to the security of a computer or computer system
- authentication mechanisms, access channels and systems all have to work properly
- demands a ransom from you to get things back on track.
- result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
- ensure that information is hidden from people unauthorised to access it.
- modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
- helps hackers spy on systems and their users.
- self-replicating and spreads without end-user action, causing real devastation.
- ensuring that data has not been tampered with and, therefore, can be trusted.
- are attempts to expose users to unwanted, potentially malicious advertising.
- malicious instructions that appear as legitimate programs.
11 Clues: helps hackers spy on systems and their users. • demands a ransom from you to get things back on track. • refers to the security of a computer or computer system • malicious instructions that appear as legitimate programs. • ensure that information is hidden from people unauthorised to access it. • ...
FC Times Crossword 2019-01-30
Across
- The street name of FC's new Palo Alto office
- The conference Joanne and Steve spoke at in 2018
- This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
- The New York Times said this company will emerge as the leading residential solar installer in the US
- Steve's book, The Way to Design, was released in what format in late 2018?
- On-demand vet service in the FC portfolio
Down
- Foundation led this meditation company's series A
- Bolt Thread's Microsilk fabric is made by
- In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
- Foundation's newest unicorn
- What FC company raised $155 million in 2018 and expanded into Europe?
11 Clues: Foundation's newest unicorn • Bolt Thread's Microsilk fabric is made by • On-demand vet service in the FC portfolio • The street name of FC's new Palo Alto office • The conference Joanne and Steve spoke at in 2018 • Foundation led this meditation company's series A • What FC company raised $155 million in 2018 and expanded into Europe? • ...
FC Times Crossword 2019-01-30
Across
- The street name of FC's new Palo Alto office
- Bolt Thread's Microsilk fabric is made by
- In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
- What FC company raised $155 million in 2018 and expanded into Europe?
- Foundation led this meditation company's series A
Down
- Steve's book, The Way to Design, was released in what format in late 2018?
- Foundation's newest unicorn
- The New York Times said this company will emerge as the leading residential solar installer in the US
- This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
- The conference Joanne and Steve spoke at in 2018
- On-demand vet service in the FC portfolio
11 Clues: Foundation's newest unicorn • Bolt Thread's Microsilk fabric is made by • On-demand vet service in the FC portfolio • The street name of FC's new Palo Alto office • The conference Joanne and Steve spoke at in 2018 • Foundation led this meditation company's series A • What FC company raised $155 million in 2018 and expanded into Europe? • ...
FC Times Crossword 2019-01-30
Across
- The conference Joanne and Steve spoke at in 2018
- In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
- Foundation led this meditation company's series A
- Foundation's newest unicorn
- On-demand vet service in the FC portfolio
Down
- The New York Times said this company will emerge as the leading residential solar installer in the US
- The street name of FC's new Palo Alto office
- This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
- Steve's book, The Way to Design, was released in what format in late 2018?
- Bolt Thread's Microsilk fabric is made by
- What FC company raised $155 million in 2018 and expanded into Europe?
11 Clues: Foundation's newest unicorn • Bolt Thread's Microsilk fabric is made by • On-demand vet service in the FC portfolio • The street name of FC's new Palo Alto office • The conference Joanne and Steve spoke at in 2018 • Foundation led this meditation company's series A • What FC company raised $155 million in 2018 and expanded into Europe? • ...
Crossword Puzzle 2021-02-07
Across
- FoP that support client to address interruptions like those presented by COVID-19
- A secure collaborative innovation management platform
- FoP that assist clients to stay up-to-date with security and privacy leading practices and compliance requirements.
- FoP that captures emerging market demands
Down
- FoP that help clients control and optimize costs
- Our global strategy and ambition to deliver long-term value to clients, people and society.
6 Clues: FoP that captures emerging market demands • FoP that help clients control and optimize costs • A secure collaborative innovation management platform • FoP that support client to address interruptions like those presented by COVID-19 • Our global strategy and ambition to deliver long-term value to clients, people and society. • ...
Cybersecurity Awareness Month 2024 Crossword 2024-09-19
Across
- The Hightower Approved Generative AI tool.
- When you should report suspicious activity or behavior to your Cybersecurity team.
- How often you should reboot your work and personal devices.
Down
- A type of email sent by malicious actors.
- An update for Software or applications that is deployed to fix a security issue or weakness.
- Malicious software that is intended to cause harm to a device or entire network
6 Clues: A type of email sent by malicious actors. • The Hightower Approved Generative AI tool. • How often you should reboot your work and personal devices. • Malicious software that is intended to cause harm to a device or entire network • When you should report suspicious activity or behavior to your Cybersecurity team. • ...
Vocabulary Power 3 Chapters 13-15 2024-10-17
Across
- The ___ reason for the meeting was to discuss budget cuts for the upcoming quarter.
- He missed several deadlines, and ___, the client decided to terminate the contract.
- The charity aims to ___ awareness of mental health issues through social media campaigns.
- She was ___ to accept the job offer because it required relocating to another country.
- Cybersecurity falls under the ___ of the IT department in most companies.
Down
- Climate change has had a ___ impact on the global ecosystem.
- Many people ___ their success to hard work and perseverance.
- The new shopping mall will ___ a large portion of the town’s commercial area.
- The investigative journalist sought to ___ corruption within the government.
- In this project, your ___ will be to manage the team's schedule and deliverables.
- After months of negotiations, the company finally agreed to ___ the confidential documents.
- Strict deadlines often ___ creativity in high-pressure work environments.
12 Clues: Climate change has had a ___ impact on the global ecosystem. • Many people ___ their success to hard work and perseverance. • Strict deadlines often ___ creativity in high-pressure work environments. • Cybersecurity falls under the ___ of the IT department in most companies. • The investigative journalist sought to ___ corruption within the government. • ...
Technology 2023-09-28
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
IT vocabulary 2023-09-07
Across
- A short-range wireless connection. Usually used for devices like headphones
- When deleted items are restored to their previous state
- When things such as updates are done automatically
- A code of numbers or letters that allow for login
- What companies use to expose you to their products
- Allows devices to connect without a physical connection
- The components that make a device
- A connection of different devices to each other
- The amount of space you have for data
- Restoring data from a previous backup
Down
- The screen where the information is displayed from a computer
- Saving all the data on a device so it can be restored at a later date
- The term for programs on devices
- A process that brings a program to a more up to date state
- Using multiple
- A computer that provides resources, data, services, or programs to other computers,over a network.
- Your security for systems online
- The term to describe information of any sort on a device
- A program that blocks your access to a system until a sum of money is paid
- Its like mail, but online
20 Clues: Using multiple • Its like mail, but online • The term for programs on devices • Your security for systems online • The components that make a device • The amount of space you have for data • Restoring data from a previous backup • A connection of different devices to each other • A code of numbers or letters that allow for login • ...
español 2024-05-14
Across
- calculator
- to fix
- to look for
- mouse
- to function (to work)
- to print
- to watch
- cybersecurity
- TV
- to send a text
- GPS navigation
- study of technology and computers
- tablet
- to turn off/to switch off
- autonomous vehicles
- monitor
- to send
- everyday objects
- fast
- social media
- empty
- keyboard
- to turn on
- to save
- uncharged
- ipad
- the internet
- dead
- to open
- to print
- to upload
- channel
- internet / navegar en la red - internet/web surfing
- headphones
- internet of things
- laptop
- screen
- to download
Down
- full
- cyber threat
- to erase/to delete
- lack of privacy
- devices
- charged
- remote control
- cyberbullying
- password
- sustainable technology
- @
- identity theft
- email address
- file
- internet connection
- printer
- artificial intelligence
- to send and email
- website
- robots
- charger
- home page/main page
- text message
- instagram profile
- to put (to put/turn on)
- to close
- the wifi
- the cloud
- program
- to record
- slow
- cell phone
71 Clues: @ • TV • full • file • fast • ipad • dead • slow • email • mouse • empty • to fix • tablet • robots • laptop • screen • devices • charged • printer • website • monitor • to send • charger • to save • to open • channel • program • password • to print • to watch • keyboard • to close • to print • the wifi • uncharged • to upload • the cloud • to record • calculator • to turn on • headphones • cell phone • to look for • to download • cyber threat • social media • text message • ...
Public Safety 2024-08-08
Across
- A serious injury to a body.
- Helping someone who is in cardiac arrest
- The continuous observation of a place, person, or group.
- Responder, The people who arrive first to arrive to an emergency.
- Casualty Incident, Healthcare systems and full because of a large number of casualties in a short period of time.
- Support, Services that are provided to people who are a victim of a crime.
- A biological substance that presents a threat to public safety
- Alert, Old person goes missing.
- Destroying property with fire
- Command System, The control of an emergency response team.
- People who protect online networks from digital attacks.
Down
- A device that uses electricity to restore the hearts normal rhythm.
- Safety, The practice of ensuring safety in the workplace.
- Health, The science of protecting a communities health.
- Assessment, Identifying where the weak points are in your project.
- Legislative process for dividing land into zones for the citizens.
- Shooter, A person attempting to kill people in a confined space with a fire arm
- Being ready to respond anytime.
- alert, Child goes missing.
- Assessment, Analyzing the possible issues that could negatively impact a project.
20 Clues: alert, Child goes missing. • A serious injury to a body. • Destroying property with fire • Being ready to respond anytime. • Alert, Old person goes missing. • Helping someone who is in cardiac arrest • Health, The science of protecting a communities health. • The continuous observation of a place, person, or group. • ...
Week 1 Crossword Puzzle 2022-01-13
Across
- alternative access to a system for malware, sometimes an entry point by someone who leaves a company, or used to re-establish a connection
- A data handling regulation only found in CANADA
- The 'A' in the CIA Triade
- Vulnerability + Threat =
- A script _______ is also known as a green hat hacker or someone who is new to programming little experience
- Using a voice channel to conduct phishing
- Organization that publishes cybersecurity frameworks
- Psychological control discouraging an attack
- A regulation applicable to Europe
- A control such as a gateway or fence
Down
- information that we may have received can be absolutely attributed to somebody. There’s no way that they can take it back.
- The 'C' in the CIA Triade
- fancy word for information gathering, can be active or passive
- "hacking the human"
- Acronym for a military/state or crime syndicates with lot of resources to attack
- provides a common basis for the coordination of standards development for the purpose of systems interconnection
- Hacker with a political agenda
- Can be polymorphic and is usually memory resident
- Acronym for information that is freely available for information gathering
- The 'I' in the CIA Triade
20 Clues: "hacking the human" • Vulnerability + Threat = • The 'C' in the CIA Triade • The 'A' in the CIA Triade • The 'I' in the CIA Triade • Hacker with a political agenda • A regulation applicable to Europe • A control such as a gateway or fence • Using a voice channel to conduct phishing • Psychological control discouraging an attack • A data handling regulation only found in CANADA • ...
JG informaatika ristsõna 2023-01-20
Across
- Bolt asutaja(d) (ainult perekonnanimi)
- Rämpspost teisesõnaga
- Missugune amet (lühend) korraldab küberturvalisuse ennetustegevusi Eestis
- Cybernetica poolt loodud IT terminoloogia leksikon (lühend)
- E-kirjale lisatud teksti-, pildi- vm fail
- Ruudukestest koosneva mustrina esitatud maatrikskood
- Interneti osa, kus toimub peamine kuritegelik tegevus
- Inglise keeles riistvara
- Eesti suurim rahvusvaheline robootika festival
- Isik, kes murrab luba küsimata sisse mõnda süsteemi
- Tehisintellekti ingl lühend
- Inglise keelse IT termini AI lühendi vaste eesti keeles
- Jõhvis avatud tehnoloogiakool
- Emotsioonimärkide eesti keelne nimetus :)
- Täpne samm-sammuline, kuid mitte tingimata formaalne juhend millegi tegemiseks
- Ohtlik programm, mis võib levitada end ise ja kutsuda esile soovimatuid sündmusi või arvuti kokkujooksmist
- Tuntuim tehisintellekti tööriist
- Kood, milles informatsioon on esitatud kahendsüsteemis
Down
- Programmikoodi koostamine, testimine ja parandamine
- Inglise keeles küberturvalisus
- Veebilehtede anonüümne sirvimisrežiim, mis ei salvesta kasutaja sirvimisajalugu
- Inglise keeles tarkvara
- IT pikk nimetus
- Sotsiaalvõrgustik, mis loodi 2004. aastal
- Tasuta, nutikas kaheastmeline isikutuvastus
- Internetikeskkonnas toimuv tegevus, näitekst teise inimese nimele tehtud libakontod, sõimamine ja ähvardamine foorumites, võõraste piltide ülesriputamine ja moonutamine
- Tuntuim krüptoraha
- Missuguse ülikooli kolledž asub Kohtla-Järvel (lühend)
- Ussi nimeline programmerimiskeel
- Rakendusprogramm internetis liikumiseks ja veebilehtede kuvamiseks
30 Clues: IT pikk nimetus • Tuntuim krüptoraha • Rämpspost teisesõnaga • Inglise keeles tarkvara • Inglise keeles riistvara • Tehisintellekti ingl lühend • Jõhvis avatud tehnoloogiakool • Inglise keeles küberturvalisus • Ussi nimeline programmerimiskeel • Tuntuim tehisintellekti tööriist • Bolt asutaja(d) (ainult perekonnanimi) • Sotsiaalvõrgustik, mis loodi 2004. aastal • ...
Cybersecurity Puzzle 2021-11-04
Across
- A defensive technology designed to keep the bad guys out.
- Technology that allows us to store and access files or services remotely via the internet.
- A group of computers, printers and devices that are interconnected and governed as a whole.
Down
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- A set of programs that tells computers how to perform a set of tasks.
5 Clues: A defensive technology designed to keep the bad guys out. • A set of programs that tells computers how to perform a set of tasks. • Technology that allows us to store and access files or services remotely via the internet. • A group of computers, printers and devices that are interconnected and governed as a whole. • ...
Cybersecurity Definitions 2024-06-16
Across
- Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- An attack method where a perpetrator deceives individuals into divulging confidential information.
- The practice of protecting systems, networks, and programs from digital attacks.
Down
- A program that replicates itself to spread to other computers.
- A person who uses computers to gain unauthorized access to data.
5 Clues: A program that replicates itself to spread to other computers. • A person who uses computers to gain unauthorized access to data. • The practice of protecting systems, networks, and programs from digital attacks. • Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. • ...
Science and Technology 2023-10-31
Across
- - A professional who designs and builds technology.
- - Science of living organisms.
- - Medical imaging using radiation.
- - Transmitting information over long distances.
- - Field of creating and programming robots.
- - Protection of computer systems from attacks.
- - Device for processing and storing data.
- - Study of the environment and ecosystems.
- - Study of matter, energy, and the fundamental forces of nature.
- - Study of flight and aircraft design.
- - Instrument for magnifying small objects.
- - Smallest unit of a chemical compound.
Down
- - Use of living organisms in technology.
- - Study of the atmosphere and weather.
- - Creating genetically identical organisms.
- - Related to the smallest units of energy.
- - Manipulating matter on a nanoscale.
- - Study of heredity and DNA.
- - Famous physicist known for the theory of relativity.
- - Study of extremely small structures.
- - Study of celestial objects and the universe.
- - Vehicle designed for travel in outer space.
- - Study of the composition of matter.
- - Optical device for observing distant objects.
- - Pertaining to circuits and devices using electricity.
- - Substance with a distinct molecular composition.
- - Object orbiting a celestial body.
- - Device that emits a focused beam of light.
- - Substance to stimulate immunity to disease.
- - A step-by-step problem-solving procedure.
30 Clues: - Study of heredity and DNA. • - Science of living organisms. • - Medical imaging using radiation. • - Object orbiting a celestial body. • - Manipulating matter on a nanoscale. • - Study of the composition of matter. • - Study of the atmosphere and weather. • - Study of extremely small structures. • - Study of flight and aircraft design. • ...
Science and Technology 2023-10-31
Across
- - Famous physicist known for the theory of relativity.
- - Creating genetically identical organisms.
- - Study of flight and aircraft design.
- - Protection of computer systems from attacks.
- - Device that emits a focused beam of light.
- - Science of living organisms.
- - Study of the composition of matter.
- - Medical imaging using radiation.
- - Vehicle designed for travel in outer space.
- - Device for processing and storing data.
- - Study of the atmosphere and weather.
- - Transmitting information over long distances.
- - Study of extremely small structures.
- - Substance to stimulate immunity to disease.
- - Study of the environment and ecosystems.
- - Pertaining to circuits and devices using electricity.
- - Object orbiting a celestial body.
Down
- - Study of celestial objects and the universe.
- - Related to the smallest units of energy.
- - Use of living organisms in technology.
- - Smallest unit of a chemical compound.
- - Instrument for magnifying small objects.
- - A step-by-step problem-solving procedure.
- - Field of creating and programming robots.
- - Substance with a distinct molecular composition.
- - Study of matter, energy, and the fundamental forces of nature.
- - Optical device for observing distant objects.
- - Manipulating matter on a nanoscale.
- - A professional who designs and builds technology.
- - Study of heredity and DNA.
30 Clues: - Study of heredity and DNA. • - Science of living organisms. • - Medical imaging using radiation. • - Object orbiting a celestial body. • - Study of the composition of matter. • - Manipulating matter on a nanoscale. • - Study of flight and aircraft design. • - Study of the atmosphere and weather. • - Study of extremely small structures. • ...
Informatika 2024-08-26
Across
- Malware yang dapat memantau dan merekam aktivitas pengguna komputer atau perangkat selular.
- Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data
- Orang yang menjalankan atau membuat program sebuah komputer
- Peretasan
- Kejahatan dunia maya dimana biasanya target dihubungi melalui surel, telepon, atau pesan teks oleh seseorang yang menyamar dari lembaga sah untuk mengelabui target untuk memberikan data sensitif.
- Peretas topi hitam
- Badan Siber dan Sandi Negara
- Pusat Koordinasi Tim Tanggap Darurat Komputer
Down
- Keamanan informasi Internet
- MAlware yang tampak seperti aplikasi perangkat lunak jinak, tetapi perangkat lunak ini membawa komponen yang jahat didalamnya.
- Gerakan aktivis/hacktivist internasional yang tersebar dan dikenal luas karena berbagai serangan dunia maya terhadap beberapa lembaga pemerintah, perusahaan, dan organisasi bisnis lainnya.
- Asal kata data dari bahasa latin
- Sifat data yang berarti menggambarkan sesuatu
- Era peretasan 1, preretas disebut...
- Program komputer yang mampu menyalin dirinya sendiri ke komputer lain.
- Sifat data yang berupa numerik (angka)
- Usaha untuk memikat pengguna internet untuk masuk ke situs web palsu.
- Salah satu media sosial yang berlogo kamera.
- Akronim Robot dan network.
- Objek untuk mengontrol akses ke informasi atau sumber daya lain.
- Salahsatu sifat informasi
21 Clues: Peretasan • Peretas topi hitam • Salahsatu sifat informasi • Akronim Robot dan network. • Keamanan informasi Internet • Badan Siber dan Sandi Negara • Asal kata data dari bahasa latin • Era peretasan 1, preretas disebut... • Sifat data yang berupa numerik (angka) • Salah satu media sosial yang berlogo kamera. • Sifat data yang berarti menggambarkan sesuatu • ...
Technology 2023-09-30
Across
- Writing instructions for computers to execute specific tasks.
- Programs and applications that run on a computer.
- Devices with internet connectivity and the ability to interact with other devices or systems.
- Structured collection of data organized for efficient retrieval and management.
- Use of biological systems, organisms, or cells to develop products or technologies.
- Use of computers and software for various applications.
- Global system of interconnected computer networks.
- Study and manipulation of matter on an atomic and molecular scale.
- Creating physical objects from a digital model using successive layering of materials.
Down
- Step-by-step instructions for solving a particular problem or task.
- Technology that overlays digital information onto the real world.
- Development of computer systems that can perform tasks requiring human intelligence.
- Design, construction, operation, and use of robots.
- Protection of computer systems, networks, and data from theft or damage.
- Use of largely automatic equipment in a system of operation.
- Delivery of computing services over the internet.
- Physical components of a computer system.
- Computer-generated simulation of a three-dimensional environment.
- Transmission of information over a distance using electronic means.
- Unmanned aerial vehicles operated remotely or autonomously.
20 Clues: Physical components of a computer system. • Programs and applications that run on a computer. • Delivery of computing services over the internet. • Global system of interconnected computer networks. • Design, construction, operation, and use of robots. • Use of computers and software for various applications. • ...
Computer Science History and Cybersecurity 2021-03-08
Across
- hashing is the foundation of this technology that has been used to implement crypto-currencies
- Park once the top-secret home of the World War Two Codebreakers
- cipher that is easily broken using brute force
- was the U.S. Navy's Combat Intelligence Unit, called OP–20–G
- designed to translate content with the intent of translating it back
- German cipher during WWII
Down
- Japanese naval code during WWII
- bncd (single shift cipher, decrypt for answer)
- one of the founders of Computer Science who worked as a code-breaker in England during WWII
- designed to translate content with NO intent of translating it back
- early computers were _________ and hot!
- first naval battle of WWII where code breaking played a major role
- both the sender and the receiver must have this for encryption to work
- decisive naval battle of WWII where code breaking played a major role
14 Clues: German cipher during WWII • Japanese naval code during WWII • early computers were _________ and hot! • bncd (single shift cipher, decrypt for answer) • cipher that is easily broken using brute force • was the U.S. Navy's Combat Intelligence Unit, called OP–20–G • Park once the top-secret home of the World War Two Codebreakers • ...
National Cybersecurity Awareness Month Crossword 2018-09-21
Across
- Report suspicious emails by using the “Report to CyberSafe” _____ in the Outlook toolbar
- Avoid using _____ WiFi hotspots and charging station USB ports
- When creating a _____ , use special characters and numbers, and consider using a passphrase, or a unique set of words, to make it easier for you to remember
- Emails from external or non-USPS senders will automatically display [_____] in the subject line
- Cybersecurity is our shared _____
- Lock your _____ and mobile phone when not in use
- Don't click on _____ within emails from an unknown or untrusted source
- Never use your USPS _____ address for non-work purposes (e.g. social media, online shopping, listserv subscriptions)
Down
- Don't open or download _____ from unknown or suspicious senders
- If you need to charge a device, plug into an _____. Never connect your personal or work devices to USPS computers or equipment
- _____ over hyperlinks to reveal the destination before clicking
- The keyphrase #_____# can be added to the subject line of an email to encrypt the contents when sending to an external recipient
- When traveling abroad for personal travel, _____ bring your USPS mobile device or computer
- _____ is an attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity
14 Clues: Cybersecurity is our shared _____ • Lock your _____ and mobile phone when not in use • Avoid using _____ WiFi hotspots and charging station USB ports • Don't open or download _____ from unknown or suspicious senders • _____ over hyperlinks to reveal the destination before clicking • Don't click on _____ within emails from an unknown or untrusted source • ...
Cybersecurity Awareness Month Crossword Puzzle! 2024-10-08
Across
- A secret word or phrase to access an account.
- Misleading content designed to get you to click on a link.
- A small piece of code that fixes security vulnerabilities in software.
- When unauthorized access is gained to a system or data.
- A type of malicious software that replicates and spreads on its own.
- Software that secretly gathers information from your device.
- A method of converting data into a secure format that cannot be read without a key.
- New software version with improvements and bug fixes.
- Software designed to harm or exploit your computer.
Down
- Software that detects and removes harmful programs from your computer.
- A copy of important data kept in case the original is lost or damaged.
- A scam to trick you into revealing personal information.
- A security barrier that monitors and controls incoming and outgoing network traffic.
- Unwanted and unsolicited emails or messages.
14 Clues: Unwanted and unsolicited emails or messages. • A secret word or phrase to access an account. • Software designed to harm or exploit your computer. • New software version with improvements and bug fixes. • When unauthorized access is gained to a system or data. • A scam to trick you into revealing personal information. • ...
Tan Su Kyi - 8 Gamma 2023-01-19
Across
- An app where you use to communicate and call with your friend.
- We should _________ our password once a year.
- You have the _________ to find out what information the government & other organisations store about you.
Down
- It is a practice of protecting systems, networks & programs from digital attacks.
- Created when that data has been processed and become meaningful.
- A social media app that you can connect with friends, family and other people you know.
- Any company might hold your ________ information that you have in your account.
7 Clues: We should _________ our password once a year. • An app where you use to communicate and call with your friend. • Created when that data has been processed and become meaningful. • Any company might hold your ________ information that you have in your account. • It is a practice of protecting systems, networks & programs from digital attacks. • ...
Incident Response 2018-10-03
Across
- A _ _ _ _ _ _ is a copy of an electronic record, maintained to protect the information from loss and often compressed to
- An Internet scam that targets unsuspecting users through email
- space.
- A cybersecurity _ _ _ _ _ _ _ _ is considered to be any event that threatens the confidentiality, integrity or availability of an
Down
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- information resources.
- If you receive a suspicious email, the best thing to do is to _ _ _ _ _ _ the message
7 Clues: space. • information resources. • An Internet scam that targets unsuspecting users through email • If you receive a suspicious email, the best thing to do is to _ _ _ _ _ _ the message • A type of malware designed to block access to a computer system or data until a sum of money is paid • ...
Pilot Puzzle Program 2022-02-11
Across
- A sector of safety that is not related to outdoor work (hint: digital)
- given by FM prior to performing non-exempt work
- same _____ falls are a hazard anywhere
- common PPE when working with any kind of sample
- ___ drills happen regularly to be prepared in the event of an evacuation
- this is a requirement when working in a CA or RA
- a 360 ___ is essential after returning to your vehicle
- Always know where the closest ___ is in case there is a building emergency
Down
- the biggest safety concern working in a nuclear plant
- historically marked across sites using lollypops
- fire extinguishers needs to have a full maintenance inspection every ___ months
- a required document to be briefed to when in a CA or RA
- hazard that changes depending on seasons
- always know where the closest ___ is in case someone has a cardiac event
- briefing held during warm months
- required to be written and discussed prior to beginning work to cover hazards
- You always should conduct a ___ before starting a new job or when conditions change
17 Clues: briefing held during warm months • same _____ falls are a hazard anywhere • hazard that changes depending on seasons • given by FM prior to performing non-exempt work • common PPE when working with any kind of sample • historically marked across sites using lollypops • this is a requirement when working in a CA or RA • ...
IT Companies 2024-04-20
Across
- A multinational technology corporation that develops, manufactures, licenses, supports, and sells computer software, consumer electronics, and personal computers
- one of the most popular company that sell premium phone
- profound and often rapid change or transformation that occurs within a society, system, or organization
- company that create first phone
Down
- Part of IT department, that control security part of IT companies
- IT GIGANT that have theyself browser, search system
- one of the companies of the largest oligarch, which is responsible for the wireless network in all parts of the world
7 Clues: company that create first phone • IT GIGANT that have theyself browser, search system • one of the most popular company that sell premium phone • Part of IT department, that control security part of IT companies • profound and often rapid change or transformation that occurs within a society, system, or organization • ...
Digital Literacy Crossword 2024-10-09
Across
- The exchange of information or ideas between people.
- A group of people who watch, listen to, or engage with a presentation or performance.
- Wrongful deception intended to result in financial or personal gain.
- The ability to enter or use something.
- Individuals or organisations that support an event or activity, usually financially.
- A compulsive dependence on a substance or behaviour, often harmful.
- A state of being comfortable, healthy, or happy.
- The right to keep personal information confidential and free from public scrutiny.
Down
- A particular way of viewing or considering something.
- The size, extent, or importance of something.
- A display or demonstration of information to an audience.
- A dishonest scheme or trick to deceive people, usually for money.
- An approximate calculation or judgment regarding a quantity or value.
- Measures taken to protect computers and networks from digital attacks.
- The act of communicating or engaging with others.
- A list of items to be discussed or acted upon, often in a meeting.
- A software application used to view and navigate the internet.
17 Clues: The ability to enter or use something. • The size, extent, or importance of something. • A state of being comfortable, healthy, or happy. • The act of communicating or engaging with others. • The exchange of information or ideas between people. • A particular way of viewing or considering something. • A display or demonstration of information to an audience. • ...
Daily Vocab for Cybersecurity 2022-02-01
Across
- Type of URL hijacking
- Phishing done through text messages.
- Voice phishing through the phone or a voicemail.
Down
- When you gather information on the victim.
- Redirection from a legit website to a bogus one.
- Phishing with inside information.
- Spearing the CEO.
- _________ information is extracting information from the victim.
- Lying to get information.
- Dumpster ________ is when you gather personal information from things that people have thrown out from their trash.
10 Clues: Spearing the CEO. • Type of URL hijacking • Lying to get information. • Phishing with inside information. • Phishing done through text messages. • When you gather information on the victim. • Redirection from a legit website to a bogus one. • Voice phishing through the phone or a voicemail. • _________ information is extracting information from the victim. • ...
ICT Processes and Cybersecurity 2022-11-10
Across
- Makes systems access easier
- ERP module for logging all support tickets
- Verifying the identity of a user
- A type of social engineering
- Log ticket here without ERP credentials
Down
- Secret word or phrase
- Cyber security protects them
- Redirecting unresolved service request
- Type of priority of a service request
- Only for emergency service requests
10 Clues: Secret word or phrase • Makes systems access easier • Cyber security protects them • A type of social engineering • Verifying the identity of a user • Only for emergency service requests • Type of priority of a service request • Redirecting unresolved service request • Log ticket here without ERP credentials • ERP module for logging all support tickets
Cybersecurity Awareness Month Crossword! 2023-09-25
Across
- software designed to disrupt, damage or gain unauthorized access to a computer system
- a process to identify who should to have access to a system
- malicious software designed to block access to computer system until money is paid
- an electronic device used for processing and storing information
- an input device used with a computer
- a network security controller and monitor
Down
- cyberattack tactic designed to scare someone into visiting a spoofed or infected website
- the process of converting information or data into a code to prevent unauthorized access
- 2 or more computers connected together to share resources
- emails sent appearing to be from legitimate sources designed to trick the receiver into giving out information
10 Clues: an input device used with a computer • a network security controller and monitor • 2 or more computers connected together to share resources • a process to identify who should to have access to a system • an electronic device used for processing and storing information • malicious software designed to block access to computer system until money is paid • ...
Cybersecurity 2 2022-09-27
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
- A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
- A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage
- A type of malicious software designed to block access to a computer system until a sum of money is paid
5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid • A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state. • A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system • ...
Cybersecurity 2 2022-09-27
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
- A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
- A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid. • A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state. • A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system. • ...
CyberSecurity CrossWord 2023-07-29
CyberSecurity Awareness 2023-09-28
5 Clues: malicious software • state of keeping private • act of breaking or failing • takes advantage of a vulnerability • cybercriminal disguises themselves as a trusted source
Cybersecurity Principles 2023-12-14
Across
- This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine.
- This principle is achieved through cryptographic methods which prevents a person or entity from denying having performed a particular action related to data for proof of obligation, intent, or commitment; or for proof of ownership.
Down
- This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required.
- This principle covers the assurance of data privacy. Only the intended and authorized recipients: people, processes or devices, may read the data. Disclosure to unauthorized entities, such as using unauthorized network sniffing is a confidentiality violation.
- This principle provides an assurance of data non-alteration. This is having assurance that the information has not been altered in transmission, from origin to reception. This principle is compromised when information is corrupted or altered, willfully or accidentally, before it is read by its intended recipient.
5 Clues: This principle is the assurance that the data, transactions, communications or documents (electronic or physical) are genuine. • This principle is the assurance of timely and reliable access to data services for authorized users. It ensures that information or resources are accessible when required. • ...
CyberSecurity Crossword 2024-10-28
Across
- We have to ____ over a hyperlink that's displayed in the email message
- Malware attack that capture all keyboard inputs
Down
- Malware received from emails typically encrypts files and documents on the target machines
- What do you call an email that looks legitimate but is actually a scam?
- Attackers perform ____ to clone our faces, creating videos and pictures that mimic our identity
5 Clues: Malware attack that capture all keyboard inputs • We have to ____ over a hyperlink that's displayed in the email message • What do you call an email that looks legitimate but is actually a scam? • Malware received from emails typically encrypts files and documents on the target machines • ...
First Principles of Cybersecurity 2019-10-15
Across
- hiding data from people who don't need to have access to it
- using mulitple strategies to protect something
- making sure that only the necessary people have access
- reducin the number of weaknesses in something
- labeling objects based on how they can be used and by whom
- removing any clutter and only displaying the important information
Down
- making designs as simple and intuitive as possible
- keeping things separate based on categories
- making it easy to swap one part out for another
- only doing one thing at a time
10 Clues: only doing one thing at a time • keeping things separate based on categories • reducin the number of weaknesses in something • using mulitple strategies to protect something • making it easy to swap one part out for another • making designs as simple and intuitive as possible • making sure that only the necessary people have access • ...
information technology 2023-10-28
Across
- is the process of designing, creating, testing, and maintaining software applications
- is a branch of IT that protects computer systems and data from unauthorized access
- is the study of computers and computing technology
Down
- is the process of creating and maintaining websites
- refers to the practice of connecting computer systems and other devices
5 Clues: is the study of computers and computing technology • is the process of creating and maintaining websites • refers to the practice of connecting computer systems and other devices • is a branch of IT that protects computer systems and data from unauthorized access • is the process of designing, creating, testing, and maintaining software applications