cybersecurity Crossword Puzzles
Cybersecurity Crossword 2024-10-30
Across
- Hardware or software designed to prevent unauthorized access to or from a private network.
- National Cyber Security Awareness month is observed during _______ month
- Cross-layered detection and response that collects and correlates data across multiple security layers
Down
- Set of algorithms and architectures capable of tasks like learning, reasoning, problem-solving, perception, and language understanding.
- Malicious software designed to block access to a computer system until a sum of money is paid.
5 Clues: National Cyber Security Awareness month is observed during _______ month • Hardware or software designed to prevent unauthorized access to or from a private network. • Malicious software designed to block access to a computer system until a sum of money is paid. • ...
Cybersecurity 2 2022-09-27
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
- A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
- A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid
5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid • A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state. • A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system. • ...
Cybersecurity Jargons 2024-10-18
Across
- private network that creates a secure and encrypted connection over the internet between a user’s device and a remote server.
- a network of compromised computers, often referred to as "zombies," controlled remotely by a malicious actor
- is a type of malware that replicates itself to spread to other computers.
Down
- malicious software that encrypts the victim's data, rendering it inaccessible until a ransom is paid, usually in cryptocurrency.
- process of converting information or data into a code, especially to prevent unauthorized access.
5 Clues: is a type of malware that replicates itself to spread to other computers. • process of converting information or data into a code, especially to prevent unauthorized access. • a network of compromised computers, often referred to as "zombies," controlled remotely by a malicious actor • ...
COMPUTER SCIENCE 2022-12-13
Across
- string of commands or directions used by different programming languages
- is the hardware component used to store data that is actively being used by a processor
- an area of computer science that is concerned with the intersection of social behavior and computational systems.
- maximum rate of data transfer across a given path.
Down
- is the process of protecting data from unauthorized users or hackers.
- The other Components of HCI for System Functionality aside from Hardware and Software
- simply specific procedures used to solve computational problems.
- computer program that transforms computer code written in one programming language (the source language) into another programming language
- a programming error that causes unexpected glitches or problems for a program’s end user.
- an abbreviation for “binary digit,”
10 Clues: an abbreviation for “binary digit,” • maximum rate of data transfer across a given path. • simply specific procedures used to solve computational problems. • is the process of protecting data from unauthorized users or hackers. • string of commands or directions used by different programming languages • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 1 2022-10-06
Across
- What is the best way to maintain privacy between two parties?
- Necessary when the circumstances of an incident require more details
- This horse can stampede your security defence for the bad guy and make you look sheepish too!
- When someone sends an e-mail with a link a bogus website is called
Down
- What is the weakest link in cybersecurity?
- What type of calls are made by social engineers
- ___ was the first personal computer virus?
- A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- Our company may _________ your internet usage
10 Clues: What is the weakest link in cybersecurity? • ___ was the first personal computer virus? • Our company may _________ your internet usage • What type of calls are made by social engineers • What is the best way to maintain privacy between two parties? • When someone sends an e-mail with a link a bogus website is called • ...
Cyber Security Awareness Month Crossword Puzzle - Week 1 2022-10-06
Across
- What is the weakest link in cybersecurity?
- ___ was the first personal computer virus?
- A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- Necessary when the circumstances of an incident require more details
- Our company may _________ your internet usage
Down
- is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- What is the best way to maintain privacy between two parties?
- When someone sends an e-mail with a link a bogus website is called
- This horse can stampede your security defence for the bad guy and make you look sheepish too!
- What type of calls are made by social engineers
10 Clues: What is the weakest link in cybersecurity? • ___ was the first personal computer virus? • Our company may _________ your internet usage • What type of calls are made by social engineers • What is the best way to maintain privacy between two parties? • When someone sends an e-mail with a link a bogus website is called • ...
Camouflaged text 2023-08-01
Across
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- uicydata;104.18.12.126
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- A remote code execution flaw in Nginx web server.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Artificial Intelligence 2023-11-20
Across
- The use of technology to perform tasks without human intervention.
- An expert at programming and solving problems with a computer
- To set in motion; make active or more active.
- Capable of operating independently without human control.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The systematic process of assessment and planning employed to prevent a developmental problem.
Down
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- Not functioning in a previously intended way
- The design, construction, and operation of robots to perform tasks in the real world.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
The Digital Reflection 2024-02-11
Across
- Pertaining to the online world as opposed to the physical.
- Information processed or stored by a computer, used in AI to understand user behaviors.
- How individuals are recognized or known in their social contexts, heavily influenced by digital interactions.
- A person utilizing information technology in order to engage in society, politics, and government participation.
- A process or set of rules followed by computers in problem-solving operations.
Down
- Platforms where users create, share content or participate in social networking.
- The quality of being genuine or true in the digital representation of oneself.
- The simulation of human intelligence in machines.
- The state of being free from public attention in the digital age.
- Measures taken to protect electronic information from unauthorized access.
10 Clues: The simulation of human intelligence in machines. • Pertaining to the online world as opposed to the physical. • The state of being free from public attention in the digital age. • Measures taken to protect electronic information from unauthorized access. • The quality of being genuine or true in the digital representation of oneself. • ...
Workplace Readiness Crossword (Computer Solution) 2024-09-10
Across
- includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network;
- a particular method of reasoning or argumentation
- a systematic series of actions directed to some end
- presence; the act of attending
- a belief in work as a moral good
- pretending to be someone you trust or a system you work with
- the skill of making a determination, as to a problem, or doubt, by making a judgement
- examine and judge carefully
Down
- the protection of information systems against unauthorized access (e.g., hacking, identity theft).
- a process of reasoning or a series of reasons
- the act of motivating
- malware that spreads by users from an infected device to the rest of the devices on a network/system
- book, article, person, or other resource consulted for information
- believable; reliable
- data converted into a meaningful and useful context
- the unethical distribution of mass digital messages.
- prompt; on-time
17 Clues: prompt; on-time • believable; reliable • the act of motivating • examine and judge carefully • presence; the act of attending • a belief in work as a moral good • a process of reasoning or a series of reasons • a particular method of reasoning or argumentation • a systematic series of actions directed to some end • data converted into a meaningful and useful context • ...
AI Crossword Puzzle 2024-10-17
Across
- The process of automatically recognizing patterns in large data sets (6 letters).
- The technique of using past data to predict future outcomes (9 letters).
- A popular programming language for AI development (6 letters).
- The full form of "AI" (14 letters).
Down
- AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis (8 letters).
- Through this technique AI models can learn the underlying patterns and create realistic and novel outputs (12 letters).
- A branch of AI focused on the interaction between computers and human language (3 letters).
- A large data repository that is queried for insights (9 letters).
8 Clues: The full form of "AI" (14 letters). • A popular programming language for AI development (6 letters). • A large data repository that is queried for insights (9 letters). • The technique of using past data to predict future outcomes (9 letters). • The process of automatically recognizing patterns in large data sets (6 letters). • ...
Cyber Security - Chapter 1 2020-02-12
Across
- State Sponsored Hackers
- attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities
- The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include: Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
- The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
- attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- is the collection of technologies that enable the connection of various devices to the Internet.
- is the result of data sets that are large and complex, making traditional data processing applications inadequate.
- attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems
- Cyber Intelligence: InfraGard is an example of wide spread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Down
- Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
- Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- The Honeynet project is an example of creating Early Warning Systems. The project provides a HoneyMap which displays real-time visualization of attacks.
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
15 Clues: State Sponsored Hackers • This group of criminals breaks into computers or networks to gain access for various reasons. • is the collection of technologies that enable the connection of various devices to the Internet. • Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards. • ...
CyberWeek 2023-10-15
Across
- The orange phish hook you can use to alert IT to spam in your email from Know Be 4
- Email that falsely claims to be from a legitimate source, usually with a threat or request for information
- Junk email
- Online harassment
- Altered audio/video to trick users into gaining access to a system
- A type of technology used to keep intruders out
- Cybersecurity awareness month
- Puts the “m” in MFA
- Coding used to protect sensitive data
- Where do you store infected files on your computer
Down
- A sequence of words used for authentication (hint: not a password)
- Software that allows a user to remain anonymous while using the internet. This will mask your location and encrypting traffic.
- cheat your way into someone’s network
- The company FASNY uses to encrypt your email
- Short for bring your own device
- A malicious deep web program that holds your information hostage
- Your digital ______ is a collection of information you leave on the internet that can’t be removed by deleting or setting it as private.
17 Clues: Junk email • Online harassment • Puts the “m” in MFA • Cybersecurity awareness month • Short for bring your own device • cheat your way into someone’s network • Coding used to protect sensitive data • The company FASNY uses to encrypt your email • A type of technology used to keep intruders out • Where do you store infected files on your computer • ...
Technical Crossword 2024-05-01
Across
- An OS is a system _____ that acts as an intermediatery between computer user and computer hardware
- Converting high level code into machine code
- Technique is cybersecurity to hide information inside a picture
- Language often used for building web applications
- A means of encoding text in which each symbol is represented by 16 bits.
- Platform independent and interpreted programming language
- test made to check the machine's response whether it is natural (acting humanly)
Down
- A digital circuit capable of holding a single digit.
- In symmetric key cryptography same key can be used by the sender and receiver for _____ of the message.
- To increase voltage momentarily in tubelight we use ____
- protocol used in transferring files between computer or a network
- layer in the OSI model responsible for routing packets across network.
- name of the default shell in Linux operating system
- A form of high speed internet access
- In python how do you denote single line comment
- ___memory is the fastest system memory.
- Made of materials such as carbon which inhibits the flow of current
17 Clues: A form of high speed internet access • ___memory is the fastest system memory. • Converting high level code into machine code • In python how do you denote single line comment • Language often used for building web applications • name of the default shell in Linux operating system • A digital circuit capable of holding a single digit. • ...
Cybersecurity Fundamentals Chapter 4 2024-06-05
Across
- Also known as public-key encryption, it uses a pair of keys – a public key for encryption and a private key for decryption.
- The study of analyzing information systems to understand hidden aspects of the systems.
- The science of encrypting and decrypting information to protect data confidentiality.
- The process of converting plaintext into ciphertext to prevent unauthorized access.
- The process of managing cryptographic keys in a cryptosystem, including their generation, exchange, storage, use, and destruction.
- A type of encryption where the same key is used for both encryption and decryption.
Down
- Techniques used to regulate who can view or use resources in a computing environment.
- The practice of deliberately creating misleading or confusing information to hide the true meaning of the data.
- An algorithm used to perform encryption or decryption.
- The reverse process of encryption, where ciphertext is converted back into readable plaintext using a key.
10 Clues: An algorithm used to perform encryption or decryption. • The process of converting plaintext into ciphertext to prevent unauthorized access. • A type of encryption where the same key is used for both encryption and decryption. • Techniques used to regulate who can view or use resources in a computing environment. • ...
Cybersecurity ITF+ Module 1.1 2023-11-09
Across
- When information is stored and processed
- System that processes, stores, and transfers information
- System that manipulates data based on a set of instructions
- a computer that supports other computers
- device with same function as PC but is handheld
Down
- Hardware that is connected to the computer
- a computer that integrates all components into a single case
- the system memory
- retrieves instructions or data from memory and processes it
- computer programming
10 Clues: the system memory • computer programming • When information is stored and processed • a computer that supports other computers • Hardware that is connected to the computer • device with same function as PC but is handheld • System that processes, stores, and transfers information • System that manipulates data based on a set of instructions • ...
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- any software program in which advertising banners are displayed while the program is running.
- door a method, often secret, of bypassing normal authentication in a product.
- threat refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- someone who seeks and exploits weaknesses in a computer system or computer network.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- an attempt by hackers to damage or destroy a computer network or system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Artificial Intelligence 2023-11-19
Across
- To set in motion; make active or more active.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The use of technology to perform tasks without human intervention.
- The systematic process of assessment and planning employed to prevent a developmental problem.
- Not functioning in a previously intended way
- Capable of operating independently without human control.
Down
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- An expert at programming and solving problems with a computer
- The design, construction, and operation of robots to perform tasks in the real world.
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
travis cyber 2023-10-08
Across
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- Pertaining to the security challenges and measures for smartphones and tablets.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
Cybersecurity & Internet Safety for Kids 2024-02-18
Across
- The use of technology to harass, intimidate, or harm others online.
- Tricky online deception.
- The process of converting information into a secret code to prevent unauthorized access.
- Options on your devices or apps that you can customize, such as privacy, security, and permissions to keep your information safe online.
- When someone tries to trick you into sharing personal information, like passwords or credit card numbers, by pretending to be someone you trust.
- Unknown person online.
- A security system that helps protect your computer or network from unauthorized access by blocking certain types of internet traffic.
Down
- When you add a location to your posts or pictures online.
- Polite behavior on the Internet.
- Software designed to detect and remove viruses and other types of malware from your computer or device.
- A type of malware that can copy itself and spread to other devices, causing harm to your computer or device.
- A secret word or phrase that you create to protect your online accounts from unauthorized access.
- Short for "malicious software," it refers to harmful software that can damage your computer or steal your information.
- Keeping personal information safe and not sharing it with strangers online.
14 Clues: Unknown person online. • Tricky online deception. • Polite behavior on the Internet. • When you add a location to your posts or pictures online. • The use of technology to harass, intimidate, or harm others online. • Keeping personal information safe and not sharing it with strangers online. • ...
The Identity Crossword 2022-01-28
Across
- A country which is placing facial recognition technology in lamp posts.
- Face recognition, fingerprints, DNA are classified as an individuals?
- In 2018/19 _____ crime and misuse cost the Australian economy an estimated $3.1 billion.
- We need to ensure we maintain an individuals _____ when dealing with their biometrics.
- A company who recently breached the privacy act for misusing individuals biometrics without consent.
- If we do not act now to regulate biometric use, companies may further _____ this technology.
Down
- We need to ensure that we are _____ when making decisions when using biometrics.
- Digital Identity name of Denmark.
- We want biometrics to be used?
- The application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
10 Clues: We want biometrics to be used? • Digital Identity name of Denmark. • Face recognition, fingerprints, DNA are classified as an individuals? • A country which is placing facial recognition technology in lamp posts. • We need to ensure that we are _____ when making decisions when using biometrics. • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 1 2022-10-06
Across
- what is the weakest link in cybersecurity?
- ___ was the first personal computer virus?
- A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- Necessary when the circumstances of an incident require more details
- Our company may _________ your internet usage
Down
- is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- What is the best way to maintain privacy between two parties?
- When someone sends an e-mail with a link a bogus website is called
- This horse can stampede your security defence for the bad guy and make you look sheepish too!
- What type of calls are made by social engineers
10 Clues: what is the weakest link in cybersecurity? • ___ was the first personal computer virus? • Our company may _________ your internet usage • What type of calls are made by social engineers • What is the best way to maintain privacy between two parties? • When someone sends an e-mail with a link a bogus website is called • ...
CIEL1 Cybersecurity Crossword 2024-03-13
Across
- Intercepts traffic as it is sent over the network to collect names, passwords and other information.
- What using when we prove we be a real sender.
- which application use for see the different trams who circulate with the PC.
Down
- Sending an email seems reliable to obtain sensitive information on the target.
- What is a name of the cyber criminal.
- Transmits malicious scripts using clickable content sent to the target's browser.
- Held hostage until she agrees to pay the attacker a ransom.
7 Clues: What is a name of the cyber criminal. • What using when we prove we be a real sender. • Held hostage until she agrees to pay the attacker a ransom. • which application use for see the different trams who circulate with the PC. • Sending an email seems reliable to obtain sensitive information on the target. • ...
Artificial intelligence crossword 2024-04-23
Across
- number of informed search method in AI
- component of artificial intelligence
- AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis.
Down
- _____ is the ability to learn and solve problems. This definition is taken from webster’s Dictionary.
- _____ test is used to determine whether or not a computer can think intelligently like humans
5 Clues: component of artificial intelligence • number of informed search method in AI • _____ test is used to determine whether or not a computer can think intelligently like humans • _____ is the ability to learn and solve problems. This definition is taken from webster’s Dictionary. • ...
Find the Cybersecurity Terms 2022-10-01
Across
- Legitimate promotional email that you’ve technically solicited, though it may serve little to no purpose to you.
- Cybercriminals stealing login credentials to access an email account, which can later be used to commit fraud, send phishing emails, steal data, and beyond.
- An isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
- Acronym. Currently the most expensive type of cybercrime, evading traditional email security systems
- A data transmission error when pieces of data don’t make it to their intended destination.
Down
- A type of phishing attack aimed at high-level executives at an organization
- A trial-and-error method of finding correct login credentials.
- Type of attack; a threat vector that targets a specific group of users by compromising a website they frequently visit.
- Acronym. A cloud security checkpoint between users and cloud providers.
- A method to send emails with a forged sender address, often used to deliver spam and phishing attacks
10 Clues: A trial-and-error method of finding correct login credentials. • Acronym. A cloud security checkpoint between users and cloud providers. • A type of phishing attack aimed at high-level executives at an organization • A data transmission error when pieces of data don’t make it to their intended destination. • ...
Test Your Cybersecurity Knowledge 2024-07-24
Across
- authorization to perform some action on a system
- automated recognition of individuals based on their biological and behavioral characteristics
- guarding against improper information modification or destruction
- A string of characters to verify access authorization
Down
- assurance that information is not disclosed to unauthorized individuals or processes
- confidentiality mode that transforms usable data into an unreadable form
- scam to deceive people into revealing sensitive information
- collection of values assigned to base measures, derived measures, and/or indicators
- probability that a particular security threat will exploit a system vulnerability
- software specifically designed to disrupt, damage, or gain unauthorized access to a computer system
10 Clues: authorization to perform some action on a system • A string of characters to verify access authorization • scam to deceive people into revealing sensitive information • guarding against improper information modification or destruction • confidentiality mode that transforms usable data into an unreadable form • ...
REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16
Across
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- an attempt by hackers to damage or destroy a computer network or system.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- designed to detect and destroy computer viruses.
- global system of interconnected computer networks that use the Internet protocol suite.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- any software program in which advertising banners are displayed while the program is running.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- door a method, often secret, of bypassing normal authentication in a product.
- a standalone malware computer program that replicates itself in order to spread to other computers.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
AI Crossword Puzzle 2024-10-17
Across
- The technique of using past data to predict future outcomes (9 letters).
- Through this technique AI models can learn the underlying patterns and create realistic and novel outputs (12 letters).
- A popular programming language for AI development (6 letters).
- The process of automatically recognizing patterns in large data sets (6 letters).
- AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis (8 letters).
Down
- The full form of "AI" (14 letters).
- A large data repository that is queried for insights (9 letters).
- A branch of AI focused on the interaction between computers and human language (3 letters).
8 Clues: The full form of "AI" (14 letters). • A popular programming language for AI development (6 letters). • A large data repository that is queried for insights (9 letters). • The technique of using past data to predict future outcomes (9 letters). • The process of automatically recognizing patterns in large data sets (6 letters). • ...
AI Crossword Puzzle 2024-10-17
Across
- A large data repository that is queried for insights (8 letters).
- The technique of using past data to predict future outcomes (9 letters).
- The process of automatically recognizing patterns in large data sets (6 letters).
- The full form of "AI" (14 letters).
Down
- AI is used for _____ purposes, facial recognition, intrusion detection, and cybersecurity threat analysis (8 letters).
- A popular programming language for AI development (6 letters).
- A branch of AI focused on the interaction between computers and human language (3 letters).
- Through this technique AI models can generate content based on patterns learned from large data (12 letters).
8 Clues: The full form of "AI" (14 letters). • A popular programming language for AI development (6 letters). • A large data repository that is queried for insights (8 letters). • The technique of using past data to predict future outcomes (9 letters). • The process of automatically recognizing patterns in large data sets (6 letters). • ...
Unit 4 Cybersecurity 2022-03-02
7 Clues: a more thorough hotfix • quick fix for a software problem • proprietary journaling file system • a device that acts as a file server • securing devices by reducing the exposure • network of high speed storage used by servers • firewall command to block or allow certain user
Cybersecurity Awareness Crossword 2022-09-10
Across
- malware designed to deny a user or organization access to files on their computer
- security exploit in which an infected USB charging station is used to compromise connected devices
- social________ is a manipulation technique that exploits human error to gain private information, access, or valuables
Down
- provides the first line of defence against unauthorized access to your computer and personal information
- is an attack that attempts to steal your money or your identity via email
- is an attack that attempts to steal your money or your identity via voice call
- _____ theft happens when someone impersonates people to commit fraud
7 Clues: _____ theft happens when someone impersonates people to commit fraud • is an attack that attempts to steal your money or your identity via email • is an attack that attempts to steal your money or your identity via voice call • malware designed to deny a user or organization access to files on their computer • ...
STEM Careers 2023-05-12
Across
- helps prevent, diagnose, and treat heath problems in animals
- engineer who designs and tests electrical equipment
- engineer who designs and builds tools and systems that provide us with clean water
- studies the atmosphere and how it affects the rest of the environment
- engineer who helps plan transportation systems like railways or traffic patterns
- engineer who makes tech for aircraft, defense systems, and space exploration
- studies behaviors and habitats of wild animals
- helps people ensure they are eating the right diet
Down
- engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
- safeguards a company's computer systems and networks
- studies how living things inherit traits through genes
- engineer who Involved in production of energy through natural resources
- studies physical properties of Earth
- treats injury and illness, checks symptoms and provides solutions
- keeps and inspect financial records for their employers
- studies water and the water cycle to predict drought or prevent pollution
- engineer who uses science of light to create tools such as lasers and fiber optics
- engineer who uses engineering to solve problems in medicine
- engineer who designs city structures such as bridges, buildings, and water systems
19 Clues: studies physical properties of Earth • studies behaviors and habitats of wild animals • helps people ensure they are eating the right diet • engineer who designs and tests electrical equipment • safeguards a company's computer systems and networks • studies how living things inherit traits through genes • keeps and inspect financial records for their employers • ...
Computer apps crossword 2022-04-29
Across
- The spacing required for MLA format is…
- Characters that you can unlock on blooket are…
- an online way to keep personal information safe is…
- What are you creating while on google cites.
- A page that is on your website but is a part of another page is a…
- The last thing you should add before sending an email is your…
- A device issued to students so they can complete homework and other projects
- What is it called when you change the background color and font on a presentation?
- The first thing to add before typing an email is a…
- An app to cite your sources
Down
- What app does all of your work get saved on (2 words)
- Coping information that isn’t yours without citing it is…
- You can use math on this app and it will solve
- The way works cited pages are organized
- A program used for presentations is…
- The number of different game modes on blooket
- Docs, Sheets, Slides, Forms, and Sites are all owned by…
- A program you can use to send out information and get multiple responses back is…
- You use blooket for this before tests
19 Clues: An app to cite your sources • A program used for presentations is… • You use blooket for this before tests • The way works cited pages are organized • The spacing required for MLA format is… • What are you creating while on google cites. • The number of different game modes on blooket • You can use math on this app and it will solve • ...
Teka Teki Cyber Security 2023-10-22
Across
- Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu
- Jenis ancaman cyber yang paling sering ditemui yaitu
- Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle.
Down
- Serangkaian tindakan yang dilakukan untuk melindungi sistem komputer, jaringan, dan data dari serangan akses ilegal disebut
- Malware yg secara diam - diam merekam apa yg dilakukan pengguna, sehingga penjahat dunia maya dapat menggunkan informasinya disebut
- Selalu update _______________ untuk mengatasi ancaman cyber.
- Program yang mereplikasi diri, menempel pada file bersih dan menyebar ke seluruh sistem komputer
- Jika memperoleh email yang seolah - olah berasal dari perusahaan sah dan meminta informasi pribadi, maka itu termasuk jenis ____
8 Clues: Jenis ancaman cyber yang paling sering ditemui yaitu • Selalu update _______________ untuk mengatasi ancaman cyber. • Salah satu solusi keamanan untuk melindungi perangkat dari serangan hacker yaitu • Penggunaan jaringan _____________ di tempat umum rentan dengan serangan man in the middle. • ...
CyF Chapter 8 2023-10-20
Across
- services hosted by a cloud provider, service provider, or internet provider.
- all of the services used by an organization including HVAC, water, and fire detection.
- collection of devices interconnected using cables or airwaves.
- the little voice in the background guiding a cybersecurity specialist as to what he/she should or should not do, regardless of whether it is legal.
Down
- any desktop computer, laptop, tablet, or smartphone that connects to the network.
- all of the critical systems, applications, and data.
- law prohibit undesired behaviors.
- includes the users who access the organization's information system.
8 Clues: law prohibit undesired behaviors. • all of the critical systems, applications, and data. • collection of devices interconnected using cables or airwaves. • includes the users who access the organization's information system. • services hosted by a cloud provider, service provider, or internet provider. • ...
CyberSecurity Awareness Month Crossword Puzzle - Week 1 2022-10-06
Across
- what is the weakest link in cybersecurity?
- ___ was the first personal computer virus?
- A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- Necessary when the circumstances of an incident require more details
- Our company may _________ your internet usage
Down
- is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- What is the best way to maintain privacy between two parties?
- When someone sends an e-mail with a link a bogus website is called
- This horse can stampede your security defence for the bad guy and make you look sheepish too!
- What type of calls are made by social engineers
10 Clues: what is the weakest link in cybersecurity? • ___ was the first personal computer virus? • Our company may _________ your internet usage • What type of calls are made by social engineers • What is the best way to maintain privacy between two parties? • When someone sends an e-mail with a link a bogus website is called • ...
Camouflaged text 2023-08-01
Across
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- A remote code execution flaw in Nginx web server.
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- uicydata;104.18.12.126
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Artificial Intelligence 2023-11-19
Across
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
- An expert at programming and solving problems with a computer
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- The design, construction, and operation of robots to perform tasks in the real world.
- A computer program designed to simulate conversation with human users, especially over the Internet.
Down
- The systematic process of assessment and planning employed to prevent a developmental problem.
- Not functioning in a previously intended way
- Capable of operating independently without human control.
- The use of technology to perform tasks without human intervention.
- To set in motion; make active or more active.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
asdfasdfa 2023-10-08
Across
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
Down
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Pertaining to the security challenges and measures for smartphones and tablets.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
Digital Safety 2024-10-14
Across
- using appropriate language, refraining from excessive capitalization and avoiding offensive or inappropriate content.
- be cautious about sharing personal details
- Develop critical thinking skills to evaluate the credibility and accuracy of online information. Be cautious of misinformation and fake news, and verify information from reliable sources before sharing it
- Be mindful of the content you share, comment on, or engage with, as it can have long-term consequences.
- Maintain a healthy balance between your online and offline life.
Down
- being mindful of the impact your posts and comments can have on other
- protection from digital attacks
- Do not use or distribute copyrighted material without proper permission or attribution.
- navigate the online world effectively.
- just as you would in face-to-face interactions
10 Clues: protection from digital attacks • navigate the online world effectively. • be cautious about sharing personal details • just as you would in face-to-face interactions • Maintain a healthy balance between your online and offline life. • being mindful of the impact your posts and comments can have on other • ...
technology 2023-06-07
Across
- is a file format developed by Adobe in 1992 to present documents
- is a method of representing data in a visual, machine-readable form
- is a type of computer program that, when executed, replicates itself by modifying other computer programs
- are small blocks of data created by a web serve
- is any software intentionally designed to cause disruption to a computer
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain
- is a bitmap image format that was developed by a team at the online services provider
- is a form of computer memory that can be read and changed in any order
- is a commonly used method of lossy compression for digital images
- is a mobile operating system.
Down
- is an American multinational technology company
- is a hardware or software component that stores data
- is a hardware or software component that stores data
- is a collection of discrete values that convey information
- represents text, computer processor instructions
- is the protection of computer systems and networks
- is a coding format for digital audio
- is a method of transmitting and receiving messages using electronic devices
- is a proprietary audio/video interface for transmitting uncompressed video data
20 Clues: is a mapping from some domain • is a mobile operating system. • is a coding format for digital audio • is an American multinational technology company • are small blocks of data created by a web serve • represents text, computer processor instructions • is the protection of computer systems and networks • is a hardware or software component that stores data • ...
Cyber & Digital Safety 2024-11-10
Across
- Australian agency providing tools and support for staying safe online.
- Settings that help control who can view your information online.
- An online trick designed to steal money or personal information.
- Notifying a trusted adult or platform about inappropriate content or behaviour.
- An extra layer of security for protecting online accounts.
- When someone uses your personal information to impersonate you.
- Capturing an image of your screen, sometimes used to save evidence.
- A counseling service providing support for kids in need of help.
- Pretending to be someone else online to deceive or manipulate others.
- Measures to protect devices and networks from digital threats.
Down
- Bullying or harassment that takes place online or through digital devices.
- The trail of data you leave online, like posts and searches.
- When someone builds trust with a minor online to exploit or harm them.
- The sharing of someone's private images without consent.
- Websites that are reliable and safe for information or purchases.
- Treating others well online and avoiding hurtful actions.
- False information spread online, often by mistake.
- The amount of time spent on devices with screens, like phones or tablets.
- Someone who supports others positively online, especially against bullying.
19 Clues: False information spread online, often by mistake. • The sharing of someone's private images without consent. • Treating others well online and avoiding hurtful actions. • An extra layer of security for protecting online accounts. • The trail of data you leave online, like posts and searches. • Measures to protect devices and networks from digital threats. • ...
Jaringan komputer dan internet (stefani) 2024-01-13
Across
- pada jaringan memudahkan proses hubungan antarkomputer, sehingga informasi yang disalurkan bisa diakses dengan baik
- perangkat komputasi yang saling terhubung serta dapat bertukar data dan berbagi sumber daya satu sama lain
- metodologi yang memastikan agar data berada dalam kondisi yang tepat untuk mendukung inisiatif dan operasi bisnis
- metode atau cara yang digunakan agar bisa menghubungkan satu komputer dengan komputer lainnya
Down
- termasuk salah satu dari aspek teknis jaringan komputer
- merupakan sebuah praktik untuk melindungi sistem teknologi dan perangkat seperti komputer, seluler, server, sistem elektronik dan data suatu perusahaan
- salah satu tipe jaringan komputer yang paling umum ditemukan
- jaringan komputer yang andal juga bergantung pada kualitas data yang tersedia
- perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal
- layer yang bertanggung jawab mempersiapkan data agar digunakan program tertentu
10 Clues: termasuk salah satu dari aspek teknis jaringan komputer • salah satu tipe jaringan komputer yang paling umum ditemukan • perangkat yang menghubungkan jaringan lokal dengan jaringan eksternal • jaringan komputer yang andal juga bergantung pada kualitas data yang tersedia • layer yang bertanggung jawab mempersiapkan data agar digunakan program tertentu • ...
sif 2024-04-11
Across
- A distributed database that maintains a continuously growing list of ordered record called blocks
- Communication over a distance by cable, telegraph, telephone, or broadcasting
- The science of making machines that can think like humans
- The act of bringing together smaller components are information stored in different subsystems into a single functional unit
Down
- A set of commands that must be followed for a computer to perform calculations
- The practice of protecting systems, networks and programs from digital attacks
- To convert something to a computer generated simulation of reality
- computing The delivery of hosted computing services and IT resources over the internet
- A new idea, method or device
- A security method that scrambles data so it is only read by using a key
10 Clues: A new idea, method or device • The science of making machines that can think like humans • To convert something to a computer generated simulation of reality • A security method that scrambles data so it is only read by using a key • Communication over a distance by cable, telegraph, telephone, or broadcasting • ...
technology and innovation vocabulary for IELTS (3) www.atomicielts.com 2024-09-01
Across
- to go -----; spreading quickly and widely on the internet (5)
- -------; extremely large sets of information that are analysed to find trends or patterns (3,4)
- cybersecurity is protecting --------- and data from theft or damage (9)
- data ----------; converting data into a code to keep it secure (10)
- ---- interface (UI); how a person interacts with a computer or device (4)
- a digital service or website that supports interactions or activities (8)
Down
- ----- computing; using the internet to store and access data and programs (5)
- websites or apps where people share content and communicate (5,5)
- internet of ------ (IoT); a network of devices connected to the internet that can communicate with each other (6)
- ------- creation; making digital material, like videos or articles, to share online (7)
10 Clues: to go -----; spreading quickly and widely on the internet (5) • websites or apps where people share content and communicate (5,5) • data ----------; converting data into a code to keep it secure (10) • cybersecurity is protecting --------- and data from theft or damage (9) • ---- interface (UI); how a person interacts with a computer or device (4) • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
CSE 167 2022-11-16
Across
- copies of data that can be used to replace the original
- is a method of gaining unauthorized access to a network or computer system
- The use of multiple layers of security techniques to help rescue the chance of successful attacks
- in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
- allows you to encrypt and sign your data and communications
- An attack that tricks people in believing they are someone else
- Confidentiality,Integrity,Availability
- Study of techniques for secure communication in the presenter of third parties
- Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
- attack that involves trying all possible private keys
10 Clues: Confidentiality,Integrity,Availability • attack that involves trying all possible private keys • copies of data that can be used to replace the original • allows you to encrypt and sign your data and communications • An attack that tricks people in believing they are someone else • is a method of gaining unauthorized access to a network or computer system • ...
test 2023-10-08
Across
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
Down
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Pertaining to the security challenges and measures for smartphones and tablets.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
OpenText Cybersecurity Portfolio 2023-09-11
7 Clues: Threat Detection • Digital Forensics • Backup and Recovery • Data Protection and Privacy • Endpoint and Email Security • Application and API Security • Identity and Access Management
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- a method, often secret, of bypassing normal authentication in a product.
- any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- an attempt by hackers to damage or destroy a computer network or system.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- are small files that Web sites put on your computer hard disk drive when you first visit.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- any software program in which advertising banners are displayed while the program is running.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
19 Clues: designed to detect and destroy computer viruses. • a method, often secret, of bypassing normal authentication in a product. • an attempt by hackers to damage or destroy a computer network or system. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Ida's Cybersecurity Crossword 2021-02-12
Across
- your files become encrypted.
- gathers information on a person and how they use their computer.
- infects your computer through email spam or instant text messages.
Down
- whether you are online or offline, it will display pop-ups or ads.
- appears as a useful or fun application (like a new game) where the hacker can use the game to perform malicious actions on your computer.
- needs to be downloaded as a part of another file to infect your computer.
- used to verify who is entering the account and is used to secure your account from hackers.
7 Clues: your files become encrypted. • gathers information on a person and how they use their computer. • whether you are online or offline, it will display pop-ups or ads. • infects your computer through email spam or instant text messages. • needs to be downloaded as a part of another file to infect your computer. • ...
Cybersecurity Crossword Puzzle 2024-09-07
Across
- Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
- Type of software that secretly gathers information from a user's computer without their consent.
- Simulated attack on a system to test its security defenses, often referred to as "pen testing."
- Network security device that monitors and filters incoming and outgoing traffic based on predefined rules.
Down
- Process of converting information into a secret code to prevent unauthorized access.
- Software vulnerability unknown to the software maker, leaving it open for attack until patched.
- Deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity, often through email.
7 Clues: Process of converting information into a secret code to prevent unauthorized access. • Malicious software designed to harm, exploit, or otherwise compromise a computer or network. • Software vulnerability unknown to the software maker, leaving it open for attack until patched. • ...
Fun Friday 2023-02-09
Across
- sending emails purporting to be from reputable companies to induce you to reveal personal information
- cybersecurity attack carried out over mobile text messaging
- depositing funds thru this device to inflate your balance
- phone calls purporting to be from reputable companies in order to reveal personal information
- Congratulations you have won the publishers clearinghouse!
- consumers respond to an online solicitation for “easy money” and provide a debit card for withdrawal of fake check deposits
- making multiple deposits between institutions to move funds and withdraw money
Down
- device to help catch fraudulent IDs
- obtaining information or ID to establish a fake identity
- scam where you meet someone online, build up a love interest, and request funds from them
- pretending to be something else in an attempt to gain a victim's confidence & steal data
- the process of identifying the person in front of you
- a check to compare to the one that is being presented to you
- warning you can set up to notify you of suspicious activity
14 Clues: device to help catch fraudulent IDs • the process of identifying the person in front of you • obtaining information or ID to establish a fake identity • depositing funds thru this device to inflate your balance • Congratulations you have won the publishers clearinghouse! • cybersecurity attack carried out over mobile text messaging • ...
The Digital World 2023-11-15
Across
- anyone who uses a digital device or accesses the internet is called.
- technology is similar to WiFi.
- WiFi connection uses invisible waves to send and receive information over small distances.
- can be added before any word to mean the word has to do with the world of computers and digital things.
- WiFi is used to connect devices to the.
Down
- connection a smartphone can connect to a car’s speaker system or to a portable speaker through.
- set of ideas and guidelines that keep us safe while using digital devices.
- number of different ways to connect into the digital world.
- world invisible space where computers talk to one another called cyberspace, is not a physical place.
- what makes the digital world so interesting.
10 Clues: technology is similar to WiFi. • WiFi is used to connect devices to the. • what makes the digital world so interesting. • number of different ways to connect into the digital world. • anyone who uses a digital device or accesses the internet is called. • set of ideas and guidelines that keep us safe while using digital devices. • ...
what are the main industries that uses AI ? 2022-11-08
4 Clues: / actually we are in this industry! • / something has to do with financials 💰 • / they take care of you physically and mentally 💟 • / when you hear this industry's name you immediately imagine hackers 👩🏻💻
Executive Departments 2022-02-10
Across
- to enhance the health and well-being of all Americans
- assists U.S. communities in providing fair and equal housing
- counterterrorism, cybersecurity, aviation security, border security, port security, maritime security
- responsible for formulating and recommending domestic and international financial, economic, and tax policy
- oversees the management and distribution of the federal budget for education initiatives
- to enforce the law and defend the interests of the United States according to the law
- foster, promote, and develop the welfare of the wage earners
- to ensure America's security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions
- promotes job creation and economic growth by ensuring fair trade
Down
- responsible for planning and coordinating federal transportation projects
- to enforce the law and defend the interests of the United States according to the law
- the principal defense policymaker and adviser
- in charge of coordinating agricultural research, extension and teaching activity
- advises the president and leads the nation in foreign policy issues
- responsible for administering veteran benefits, memorials/cemeteries, and health care
15 Clues: the principal defense policymaker and adviser • to enhance the health and well-being of all Americans • assists U.S. communities in providing fair and equal housing • foster, promote, and develop the welfare of the wage earners • promotes job creation and economic growth by ensuring fair trade • advises the president and leads the nation in foreign policy issues • ...
QAP 2.0 : Brain Teaser 2020-11-02
Across
- New Process DQP/DQI/DQF created that was presented in recent Summit are related to
- In GIA, what does 'G' stands for
- New doc added to DQP 45-000 related to software requirement
- One of the approvers for Biocomp Protocol
- One of the mandatory approvers for engineering assessment for V&V.
Down
- Latest version for DQP 25-003 will be
- This contains information like Ref number, UDI, LOT number, temperature condition, mfg site details, sterility implant/instrument type and name, etc.
- Recently added to the list of Countries accepting eIFU. (hint: the country with the largest postal network)
- Initial Clinical Evaluation Plan is initiated at PR?
- A 14 digit number used to uniquely identify the trade item
- CUN are the part of which document
- Risk Management Board is required in which DR?
- MDCG is a Guidance on? (hint: its software process requirement)
- It is a combination of the probability of occurrence of harm and the severity of that harm
14 Clues: In GIA, what does 'G' stands for • CUN are the part of which document • Latest version for DQP 25-003 will be • One of the approvers for Biocomp Protocol • Risk Management Board is required in which DR? • Initial Clinical Evaluation Plan is initiated at PR? • A 14 digit number used to uniquely identify the trade item • ...
Tech Week Day 3 2024-05-08
Across
- Immersive technology that creates a simulated environment.
- Processing data closer to the source or "edge" of the network, reducing latency and bandwidth usage.
- Distributed ledger technology used for secure and transparent transactions.
- Electric car company founded by Elon Musk.
- Subset of AI that allows systems to learn and improve from experience without being explicitly programmed.
- Search engine and technology company known for its web services and products.
- Measures taken to protect computer systems and data from unauthorized access or attacks.
Down
- Digital or virtual currency that uses cryptography for security and operates independently of a central authority.
- Large volumes of structured and unstructured data that can be analyzed for insights.
- Cryptocurrency created by an unknown person or group of people using the name Satoshi Nakamoto.
- Markup language used for creating web pages.
- Private aerospace manufacturer and space transportation company founded by Elon Musk.
- Simulation of human intelligence processes by machines, especially computer systems.
- Technology that overlays digital information onto the real world.
14 Clues: Electric car company founded by Elon Musk. • Markup language used for creating web pages. • Immersive technology that creates a simulated environment. • Technology that overlays digital information onto the real world. • Distributed ledger technology used for secure and transparent transactions. • ...
Cyber Security 2021-10-29
Across
- Malicious software that infects a user's computer and changes how is operates
- User's data is held hostage until a payment is made
- Malicious cyber activity that causes disruption to others or to gain financially by fraudulent means
- Hidden software that records a user's information secretly for a third-party
- The practice of protecting internet-connected systems from digital attacks
- A an email disguised as a legitimate source that tricks users into offering up personal information
Down
- Is protecting of information from malicious damage and unauthorized access
- A kind of software used to prevent, scan, detect and delete viruses from a computer
- A form of malware that is self-replicating infecting a computer and can spread across its network
9 Clues: User's data is held hostage until a payment is made • Is protecting of information from malicious damage and unauthorized access • The practice of protecting internet-connected systems from digital attacks • Hidden software that records a user's information secretly for a third-party • ...
Crossword Edition 4 2020-04-22
Across
- solutions do not require software installation, thus they are more accessible
- protocol is used by the IoT device to send a periodic update to a cloud server running AWS IoT services
- the protocol used to communicate temperature data to Cloud-based applications for trend analysis
- is one of the IoT trend in manufacturing that needs an increased attention
Down
- name one of the Smart parking sensor
- type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service
- promises of ultra-low latency,ultra-high reliability and very high speed and connectivity
- Iot device invented for Safe Social Distancing
- temperature sensors that enables the cities to provide better health monitoring and services to communities
9 Clues: name one of the Smart parking sensor • Iot device invented for Safe Social Distancing • is one of the IoT trend in manufacturing that needs an increased attention • solutions do not require software installation, thus they are more accessible • promises of ultra-low latency,ultra-high reliability and very high speed and connectivity • ...
Voting 2023-05-14
Across
- protecting information, equipment, devices, computer, computer resource etc.
- Mode in which documents may be sent for postal ballot
- date not earlier than seven days before the date of general meeting for determining the eligibility to vote by electronic means or in the general meeting;
- Mode in which documents may be sent for postal ballot
- Method of voting
- A Resolution passed by postal ballot shall not be rescinded otherwise than by a _____
- After general notice, ___ must be sent for e-voting
Down
- facility of casting votes by a member using an electronic voting system from a place other than venue of general meeting;
- a person who shall maintain register regarding voting
- The notice of the postal ballot shall also be placed on the _____
- Method of voting
- Mode in which documents may be sent for postal ballot
- credential required to vote electronically
- Enterprise to which s.108 does not apply
- National Securities Depository Limited, the Central Depository Services (India) Limited or any other entity approved by the Ministry of Corporate Affairs
15 Clues: Method of voting • Method of voting • Enterprise to which s.108 does not apply • credential required to vote electronically • After general notice, ___ must be sent for e-voting • a person who shall maintain register regarding voting • Mode in which documents may be sent for postal ballot • Mode in which documents may be sent for postal ballot • ...
BMA 4103: Group 2 2024-10-27
Across
- Dodd-Frank Act are to enhance regulation and promoting _________ .
- this is what usually happens when companies face pressure to adopt internationally recognized standards.
- enables board to address complex issue effectively and uphold accountability and transparency.
- disguising the origins of illegally obtained money to be legitimate
- practice of protecting systems, networks and programs from digital attack.
- SOX Act helps protect investors from _________ financial reporting by corporation.
- the board should focus on creating sustainable value and be accountable to shareholders for its performance.
- ongoing assessment of organization’s performance and adherence to government standards.
Down
- the process through which shareholders exercise through voting rights on ESG.
- refers to the process of having an independent party review to verify the info reported by the company.
- it imposes governance standards that influence local companies seeking to attract foreign investment or list in abroad.
- this particularly focused on preventing the excessive risk taking that contributed to the financial crisis.
12 Clues: Dodd-Frank Act are to enhance regulation and promoting _________ . • disguising the origins of illegally obtained money to be legitimate • practice of protecting systems, networks and programs from digital attack. • the process through which shareholders exercise through voting rights on ESG. • ...
ADSI Sebastian David Bautista Rivera 2022-06-01
Across
- reserved words, symbols and characters.
- request for information and/or data for a database.
- set of ordered, successive and perfectly defined instructions.
- language used to manage databases.
- information base that stores and is used by a program.
- tool to style web pages.
- programming language used in the data science and artificial intelligence environment.
Down
- the objective is to reduce the chances of errors in the operation of a program when it is used by the end user.
- editor de código, un compilador, un depurador y un constructor de interfaz gráfica
- to manage and plan products and projects.
- It is responsible for the privacy and data protection of companies and organizations to deal with cyber-attacks.
- Visual part, that the user sees and with which he interacts.
- es el nombre único que recibe un sitio web en internet.
- problem in the code that causes it not to run correctly.
- service that provides storage of information, images, video, or any content accessible via the Web.
- Is used especially for web development and is Html compatible.
16 Clues: tool to style web pages. • language used to manage databases. • reserved words, symbols and characters. • to manage and plan products and projects. • request for information and/or data for a database. • information base that stores and is used by a program. • es el nombre único que recibe un sitio web en internet. • ...
Common STEM Concepts 2022-12-16
Across
- Universal force of attraction acting between all matter, originally developed by Newton
- 2 words, computer systems able to perform tasks that usually require human intelligence
- Basic unit of a chemical element, building blocks of molecules
- Chemical in which life on Earth is reliant, atomic number 6
- Protection of computer systems from attacks or unauthorized use
- The ability to retain information or representation of past experiences
Down
- Statistical function that shows the possible values for a variable & how often they occur
- Darwin's theory, change in species over time
- 2 words, branch of mathematics in that deals with properties and relationships of numbers
- The process by which plants use sunlight to make food
- Carrier molecule of genetic information
- Branch of mathematics in which letters are used to represent numbers in equations and formulas
- Likelihood of the outcome of a certain event
- Study of heredity
- Thought process, includes all conscious and unconscious processes by which knowledge is gained
- Einstein's theory that all motion must be defined relative to a frame of reference and that space and time are relative concepts
16 Clues: Study of heredity • Carrier molecule of genetic information • Darwin's theory, change in species over time • Likelihood of the outcome of a certain event • The process by which plants use sunlight to make food • Chemical in which life on Earth is reliant, atomic number 6 • Basic unit of a chemical element, building blocks of molecules • ...
Public Sector Cybersecurity Acronym Crossword 2024-06-07
Across
- The World’s Identity Company
- Third-party company that manages an organization's IT infrastructure and end-user systems
- U.S. DoD combat support agency
- A "smart" card that is the standard identification for government employees used to enable physical access to buildings and access to DoD computers
- System to manage identity authorization for external parties
- An authentication method that allows users to securely authenticate with multiple applications by using one set of credentials
Down
- Amazon Web Services
- Multi-step account login process
- Team of IT security professionals that protect the organization by monitoring and investigating cyber threats.
- Program provides federal agencies with a suite of capabilities that enable network security officials to continuously monitor cybersecurity risks in real-time
- The national coordinator for critical infrastructure security and resilience
- Security and business discipline to help the right people access the right assets at the right time while keeping unauthorized access and fraud at bay
12 Clues: Amazon Web Services • The World’s Identity Company • U.S. DoD combat support agency • Multi-step account login process • System to manage identity authorization for external parties • The national coordinator for critical infrastructure security and resilience • Third-party company that manages an organization's IT infrastructure and end-user systems • ...
Technology 2023-06-12
Across
- Physical parts of a computer or electronic device that you can touch and see
- Reality (VR) Computer-generated simulation of a three-dimensional environment for an immersive experience
- Collection of web pages that can be accessed on the internet
- Programs and applications that run on a computer or electronic device
- Writing instructions or commands for a computer program
- Intelligence (AI) Creating intelligent machines that can think and learn like humans
- Mechanical device that can perform tasks automatically or be controlled by humans
Down
- Creating and developing computer programs by giving instructions to the computer
- Relating to using technology to process and display information in numbers
- Measures taken to protect computer systems and data from unauthorized access
- A group of computers or devices connected together to share information
- Short for "application," a program or tool designed for a specific purpose
- Introducing new ideas, methods, or technologies to create something better
- Electronic machine used to store, process, and retrieve information
- Information that is stored and processed by a computer
- Worldwide network of computers that allows communication and access to information
16 Clues: Information that is stored and processed by a computer • Writing instructions or commands for a computer program • Collection of web pages that can be accessed on the internet • Electronic machine used to store, process, and retrieve information • Programs and applications that run on a computer or electronic device • ...
Crossword 2024-04-18
Across
- the programs and other operating information used by a computer
- he protection of computer systems and networks from attacks by malicious actors
- team focus is on phone networks, recording calls and call center
- a request for information
- set of data processing elements connected in series, the output of one element is the input of another
- (abbrev)determines stakeholder needs and drives strategy for IT team
- objectively analyze desired processes and outcomes, advise on correct combo of IT systems
Down
- position focus is to support teams on IT floor to produce efficiently and effectively
- the systems put in place to operate and manage IT services and environments
- a structured set of data held in a computer
- creates/develops training materials for IT
- team focused on keeping monitors, computers and general physical technology in working order
- maximum rate of data transfer across a given path
- (abbrev) much of the job involves attempting to "break" code
- subset of programming entailing logical reasoning, analysis, and planning a sequence of instructions
- (abbrev) computer systems able to perform tasks such as visual perception, speech recognition, decision-making
16 Clues: a request for information • creates/develops training materials for IT • a structured set of data held in a computer • maximum rate of data transfer across a given path • (abbrev) much of the job involves attempting to "break" code • the programs and other operating information used by a computer • team focus is on phone networks, recording calls and call center • ...
STEM Vocabulary: Digital Citizenship 2024-03-18
Across
- Check to make sure your account is on "Friends Only" under the _____ section.
- Use your _____ skills to make wise decisions by evaluating information.
- It is necessary in 2024 to have _____ because we are in the age of technology.
- When someone is experiencing harassment online, it is considered ________.
- Microsoft makes me use _____ when signing in to ensure my identity and prevent hacking.
- Timmy copied my entire essay and was written up for _____.
Down
- _____ are individuals who want to harm others online.
- I must be mindful of my _____ because anything on the Internet can be found.
- Aadi is very interested in _____ because he cares deeply for protecting people from data leaks.
- My _____ is the responsibility to use my technology ethically.
- It is important to have maximum _____ to ensure that your account is protected.
- Please use the correct decorum and _____ when speaking to others on the Internet.
12 Clues: _____ are individuals who want to harm others online. • Timmy copied my entire essay and was written up for _____. • My _____ is the responsibility to use my technology ethically. • Use your _____ skills to make wise decisions by evaluating information. • When someone is experiencing harassment online, it is considered ________. • ...
Global Outage 2024-08-27
Across
- a way of working, especially with a piece of software, that avoids a particular problem but does not actually solve the problem
- measures that are taken to protect against the criminal use of electronic data
- easy to do or to understand
- not harmful or dangerous
- having a good knowledge and understanding of modern technology, especially computers
- use something effectively
- a quantity of work that should have been done already, but has not yet been done
Down
- well known for being bad or evil
- the act of starting a computer, smartphone, etc. again immediately after you have switched it of
- prevent an aircraft from taking off
- a situation in which it is difficult for something to continue in the normal way
- a person who suffers or a thing that is destroyed when something else takes
- manage to achieve something with difficulty, or in a hurry, without much control
- a period of time when the supply of electricity, etc. is not working
14 Clues: not harmful or dangerous • easy to do or to understand • use something effectively • well known for being bad or evil • prevent an aircraft from taking off • a period of time when the supply of electricity, etc. is not working • a person who suffers or a thing that is destroyed when something else takes • ...
TECNO CROSSWORD 2024-11-12
Across
- A small part of a computer that stores information.
- This device lets you see and hear people far away in real time.
- An assistant on phones that talks back and helps with tasks.
- A flying device controlled by remote, often used to take pictures from above.
- A device that helps people take clear pictures or videos.
- A large group of computers connected to share resources.
- A tiny device that powers and runs electronic items.
- A small device used to make calls, send texts, and access apps.
- Media People use this to connect, share photos, and send messages online.
Down
- The process of protecting devices from online attacks.
- Reality This type of "reality" is created by computers to make you feel like you’re somewhere else.
- Game A type of game played on a computer, phone, or console.
- A place where you can search for information on any topic.
- A machine that can be programmed to do tasks by itself.
14 Clues: A small part of a computer that stores information. • A tiny device that powers and runs electronic items. • The process of protecting devices from online attacks. • A machine that can be programmed to do tasks by itself. • A large group of computers connected to share resources. • A device that helps people take clear pictures or videos. • ...
EY Digital Movement 2018-11-22
Across
- what is the word used to describe keeping data safe from hackers?
- What word is often today in the context of the digitization and innovation of payment transactions?
Down
- These two words describe the extraction of actionable and valuable information from big data.
- You are now in University of _
- Fill in the blank: Long _ of Careers
5 Clues: You are now in University of _ • Fill in the blank: Long _ of Careers • what is the word used to describe keeping data safe from hackers? • These two words describe the extraction of actionable and valuable information from big data. • What word is often today in the context of the digitization and innovation of payment transactions?
Definisi Keselamatan Siber 2024-06-17
Across
- Program yang mereplikasi dirinya untuk merebak ke komputer lain.
- Seseorang yang menggunakan komputer untuk mendapatkan akses tanpa kebenaran ke data.
Down
- Amalan melindungi sistem, rangkaian, dan program daripada serangan digital.
- Perisian berniat jahat yang direka untuk merosakkan, mengganggu, atau mendapatkan akses tanpa kebenaran kepada sistem komputer.
- Kaedah serangan di mana seorang penyerang menipu individu untuk mendedahkan maklumat sulit.
5 Clues: Program yang mereplikasi dirinya untuk merebak ke komputer lain. • Amalan melindungi sistem, rangkaian, dan program daripada serangan digital. • Seseorang yang menggunakan komputer untuk mendapatkan akses tanpa kebenaran ke data. • Kaedah serangan di mana seorang penyerang menipu individu untuk mendedahkan maklumat sulit. • ...
Monthly Cybersecurity Crossword (May, 2020) 2020-04-30
Across
- The team responsible for securing the hardware and software technology for the global distribution centers.
- How often McKesson employees are sent training phishing campaigns each quarter.
- Term used for suspicious emails
- Where you access McKesson approved software for Windows machines to download to your machine.
Down
- Engineering team which supports any device that communicates with our network.
- the type of access which refers to connecting to an asset using a wireless network.
- The program which raises awareness of the latest threats through cybersecurity awareness and advocacy
- The tool used as the main connection point of the Sentinels program.
- the team acting as the front line of defense for the protection of McKesson patients and employees from cyber threats.
9 Clues: Term used for suspicious emails • The tool used as the main connection point of the Sentinels program. • Engineering team which supports any device that communicates with our network. • How often McKesson employees are sent training phishing campaigns each quarter. • the type of access which refers to connecting to an asset using a wireless network. • ...
Inspiring Facilities & Innovative Equipment 2021-01-05
Across
- Last name of ACTE’s Administrator of the year, Jean
- What keynote speaker and issue contributor Kevin J. Fleming seeks to redefine in his book
- ACTE conference being hosted virtually for the first time ever in February 2021
- State in which Grace Godfrey teaches agricultural science using CASE
- One of five virtual internship types offered by Professional Prep Academy
- Previous name of Wendell Krinn Technical High School
Down
- The A in STEAM
- Last name of ACTE’s recent Champion for CTE Award winner, Joseph P.
- One of four pillars of the online classroom, according to Rasha ElSahel Elhage
- Deb Moore & Kevin English want CTE educators to be this, in Classroom Connection
- Defined by Theo Pappas as “to give power to, to enable, to realize promise and recognition, to make stronger and to elevate confidence”
- ACTE hosted its CareerTech VISION 2020 in this format
12 Clues: The A in STEAM • Last name of ACTE’s Administrator of the year, Jean • Previous name of Wendell Krinn Technical High School • ACTE hosted its CareerTech VISION 2020 in this format • Last name of ACTE’s recent Champion for CTE Award winner, Joseph P. • State in which Grace Godfrey teaches agricultural science using CASE • ...
Technology - Oct'23 2023-11-06
Across
- Orchestrates containerized applications, managing scaling and load balancing in deployment.
- Protects digital systems from threats with firewalls, encryption, and audits.
- Merges biology and data science to analyze biological data, particularly in genomics and proteomics.
- Utilizes a distributed ledger for secure, transparent, and immutable transactions.
- Automated machines with AI, sensors, and actuators used in manufacturing and healthcare.
- Enhances security and identity verification through unique traits like fingerprints and facial recognition.
- Combines development and operations, emphasizing automation and collaboration for streamlined software deployment.
Down
- Manipulates matter at the nanoscale, enabling precision engineering with applications in medicine and materials.
- Isolate software applications for streamlined development and deployment, often using Docker.
- AI-powered virtual assistants providing automated responses in chat for customer support and more.
- Framework for big data processing, splitting data for parallel analysis and storage.
- Creates 3D visual representations using interference patterns, applied in art, medical imaging, and security.
12 Clues: Protects digital systems from threats with firewalls, encryption, and audits. • Utilizes a distributed ledger for secure, transparent, and immutable transactions. • Framework for big data processing, splitting data for parallel analysis and storage. • Automated machines with AI, sensors, and actuators used in manufacturing and healthcare. • ...
Social Issues 2023-03-06
Across
- a population with an increased proportion of elderly
- the practice of protecting systems, networks, and programs from digital attacks
- the movement of people from one country or place of residence, to settle in another
- the inability to read and write
- discrimination against an individual on the basis of their skin color, race or ethnicity
- a state of lacking financial resources and essentials for a certain standard of living
- the problem of long-term shifts in temperatures and weather patterns
- the basic rights and freedoms that belong to every person in the world
Down
- the social phenomenon in which people are not treated equally on the basis of gender
- a form of dishonesty or criminal offense undertaken by a person entrusted in a position of authority
- the condition of people unable to find any work
- a situation in which too many people or animals live in a certain area
12 Clues: the inability to read and write • the condition of people unable to find any work • a population with an increased proportion of elderly • the problem of long-term shifts in temperatures and weather patterns • a situation in which too many people or animals live in a certain area • the basic rights and freedoms that belong to every person in the world • ...
Incident Response Plan 2024-05-22
Across
- Organizations can detect incidents through security_______tools
- typically includes a summary of the incident, impact assessment, timeline of events, and response actions taken.
- ________________ is the process of restoring and returning affected systems and devices back to normal operation securely.
- Incident Response____________ oversees and coordinates the response to an incident and is the primary decision-maker.
- ____________involves removing the threat from all affected systems.
- A ________________is an alert that inaccurately indicates malicious activity
- A ____________ incident is any attempted or successful unauthorized access, use, disclosure, or modification, or destruction of
Down
- __________ is vital for coordinating response efforts, informing stakeholders, and maintaining transparency with external
- Incident ______________ is the methodology an organization uses to respond to and manage a cyberattack or breach.
- Learned Key stages include Preparation, Identification, Containment, Eradication, Recovery, and__________.
- ______ correctly identifies actual malicious activity.
- _______include having tools and processes in place and training personnel on their roles during containment.
12 Clues: ______ correctly identifies actual malicious activity. • Organizations can detect incidents through security_______tools • ____________involves removing the threat from all affected systems. • A ________________is an alert that inaccurately indicates malicious activity • ...
On Demand Technologies 2021-08-04
Across
- A technology that deals with the study and applications of data
- A trending technology that changed the connectivity between different gadgets and appliances through various censors
- a simulation of human intelligence in machines
- a subset of AI which allows machines learn and work with less human intervention
Down
- A technology that deals with the protection of data,internet and virtual assets
- A technology that is helping in the reach of applications (apps) to many users
- A technology that is being used to change the traditional way of data presentation
- a technology in demand which is changing the traditional data storage method
- This uses simulation and real-world capturing together. An extension to across(5)
- a technology that creates a real-world replica in simulation.
- A technology that is based on decentralised digital ledgers and also a cornerstone for cryprtocurrencies
11 Clues: a simulation of human intelligence in machines • a technology that creates a real-world replica in simulation. • A technology that deals with the study and applications of data • a technology in demand which is changing the traditional data storage method • A technology that is helping in the reach of applications (apps) to many users • ...
Oral Histories - Technology, Machines, & The Future 2024-02-15
Across
- The practice of protecting systems, networks, and programs from digital attacks
- Energy derived from natural resources
- A speech spoken aloud by one person only
- Historical information gathered through spoken narratives
- The delivery or passing of something elsewhere
- The use of control systems and technology to automate processes
- Another term for story
- The act of asking questions of someone in a formal or informal setting
- Cultural knowledge, beliefs, customs, stories, and history told through spoken communication rather than through written texts
Down
- Shared beliefs, values, customs, traditions, behaviors, and artifacts that characterize a particular group of people or society.
- The deliberate modification of the characteristics of an organism by manipulating its genetic material
- A computer-generated simulation of an environment that can be interacted with in a seemingly real or physical way by a person
- Keep intact for the future
- The simulation of human intelligence processes by machines
- A traditional story often telling of the origins of things, places, people...
- The manipulation of matter on an atomic, molecular, and supramolecular scale
- Someone that tells a story, for a listener
- The interdisciplinary branch of engineering and science that deals with the design, construction, operation, and use of robots
18 Clues: Another term for story • Keep intact for the future • Energy derived from natural resources • A speech spoken aloud by one person only • Someone that tells a story, for a listener • The delivery or passing of something elsewhere • Historical information gathered through spoken narratives • The simulation of human intelligence processes by machines • ...
ETSI crossword 2023-05-24
Across
- The partnership project shaping the future of mobile telecommunications.
- The first word of the first column on page 5 of Enjoy April 2023 edition.
- You can hardly live without it and it's your best friend on holidays.
- The next evolutionary step in computing, leveraging the principles of advanced physics.
- We are the _______ people.
- The youngest don’t know it, but they know 5G, the latest generations.
- Agreement, the basis of all ETSI technical work
- Network of interconnected devices that communicate and exchange data.
- An RFID technology to enable you to pay on your mobile phone.
Down
- We're already working on the 6th one for telecommunications.
- You call this service as your last resort before your laptop crashes.
- If it's not strong enough, your ICT system might be in trouble.
- The capacity of machines to try to imitate human intelligence.
- You’re reading it!
- E= Mc2 and the name of the second ETSI building.
- The current mobile telecommunications technology offers blazing-fast data transfer speeds and significantly lower latency than 4G.
- Wireless communication protocol for cordless telephones and voice data transmissions.
- The ancestor of chat, still widely used today, an ETSI standard.
18 Clues: You’re reading it! • We are the _______ people. • Agreement, the basis of all ETSI technical work • E= Mc2 and the name of the second ETSI building. • We're already working on the 6th one for telecommunications. • An RFID technology to enable you to pay on your mobile phone. • The capacity of machines to try to imitate human intelligence. • ...
Cybersecurity Lesson 1 & 2 Key Terms 2022-08-31
Across
- are the settings on social networks that allow users to control who sees what they post, and they can either be adjusted post by post, or set to a default setting.
- where you connect with other players and can chat with them either by voice or by text.
- people online that often try to obtain information about you.
- a person who witness someone getting bullied but does nothing to stop it.
- is short for “internet etiquette” and are the rules for interacting politely online
- can be anything from cyberbullying to actual physical harm, if the wrong people get your information.
- is a person or people that stand for others that are being bullied either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult.
- on the internet is a technical measure intended to restrict access to information.
- means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the company that provide the services and probably by your browser.
Down
- is exchange of suggestive messages or images via mobile phone texting.
- is the ability to act in a safe and responsible way on the internet and other connected environments.
- someone who intentionally targets people for harm using online chat rooms or social media.
- is the action of subjecting someone to aggressive pressure or intimidation.
- is a site or online community where people with like experiences or interests communicate with each other and share information and resources.
- is bullying that takes place using electronic technology.
- keeping your personal information safe and personal.
- many social networking web sites require you to set up.
- is a detailed report, usually about a person.
18 Clues: is a detailed report, usually about a person. • keeping your personal information safe and personal. • many social networking web sites require you to set up. • is bullying that takes place using electronic technology. • people online that often try to obtain information about you. • is exchange of suggestive messages or images via mobile phone texting. • ...
WTB Cybersecurity Awareness Month Crossword Puzzle 2023-09-28
18 Clues: See question 9. • See question 8. • See question 1. • See question 7. • See question 6. • See question 4. • See question 5. • See question 3. • See question 2. • See question 10. • See question 12. • See question 14. • See question 16. • See question 18. • See question 13. • See question 11. • See question 15. • See question 17.
Cybersecurity crossword puzzle 2024-06-14
Across
- Measures to protect computer systems from unauthorized access or attacks
- A person who uses computers to gain unauthorized access to data
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
- The protection of internet-connected systems, including hardware, software, and data
- A secret word or phrase used to gain access to a computer system
- The state of being free from being observed or disturbed by other people
6 Clues: A person who uses computers to gain unauthorized access to data • A secret word or phrase used to gain access to a computer system • The state of being free from being observed or disturbed by other people • Measures to protect computer systems from unauthorized access or attacks • ...
Smart System 2021-06-30
Across
- Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
- Application that involves wireless sensor and RFID technology,
- Smart system application that lead to better diagnostic tools, to better treatment and quality of life for patients.
Down
- A maintenance technique that estimates when maintenance should be performed
- Maintenance of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
- A sensor that detects movement sensor that detects
- Smart system application that reduces global emission
7 Clues: A sensor that detects movement sensor that detects • Smart system application that reduces global emission • Application that involves wireless sensor and RFID technology, • A maintenance technique that estimates when maintenance should be performed • ...
Digital Citizenship 2023-10-26
Across
- Tools and settings that allow parents to monitor and manage their children's online activities.
- The persona an individual presents online, including profiles and usernames.
- The use of digital technologies to harass, threaten, or intimidate others.
- The trail of data and information left behind by an individual's online activities.
- Rules and norms governing polite behavior on the internet, often referred to as "netiquette."
Down
- Practices and measures to ensure one's safety while using the internet.
- Ensuring that all individuals have equal access to digital resources and opportunities.
- Ethical principles and values applied to online interactions and decisions.
- Measures and practices to protect digital devices, networks, and data from threats and attacks.
- False or misleading information circulated on the internet, often with the intent to deceive.
- Groups or networks of people who interact and share common interests or goals on the internet.
11 Clues: Practices and measures to ensure one's safety while using the internet. • The use of digital technologies to harass, threaten, or intimidate others. • Ethical principles and values applied to online interactions and decisions. • The persona an individual presents online, including profiles and usernames. • ...
IS Security and the Dark Side of IT 2023-10-05
Across
- Adherence to rules, regulations, or policies to ensure proper behavior or operations.
- Measures taken to protect computer systems and data from theft, damage, or unauthorized access.
- Strategies and processes used to identify, assess, and mitigate potential risks.
- The act of coercing someone by threatening to reveal embarrassing or damaging information.
- A difficulty or problem that requires creative solutions or efforts to overcome.
- The hidden part of the internet where illegal activities often occur.
Down
- A set of rules or guidelines that govern behavior or decision-making within an organization.
- A breach or infringement of a rule, law, or policy.
- Protective measures taken to safeguard against potential threats.
- Individuals within an organization who have access to sensitive information.
- Measures taken to protect against threats, ensuring the safety and integrity of systems, data, and assets.
11 Clues: A breach or infringement of a rule, law, or policy. • Protective measures taken to safeguard against potential threats. • The hidden part of the internet where illegal activities often occur. • Individuals within an organization who have access to sensitive information. • Strategies and processes used to identify, assess, and mitigate potential risks. • ...
Romance scam 2024-02-16
Across
- The practice of protecting computer systems, networks, and programs from digital attacks, theft, or damage.
- A person engaged in fraudulent activities, such as scams or deceit.
- The action of threatening to reveal embarrassing or damaging information about someone unless they do something, usually pay money.
- To identify or discover something, often used in the context of finding fraudulent activities.
Down
- To stop something from happening, in this case, stopping romance scams before they occur.
- The act of intentionally misleading or tricking someone.
- Malicious software designed to harm or exploit computer systems.
7 Clues: The act of intentionally misleading or tricking someone. • Malicious software designed to harm or exploit computer systems. • A person engaged in fraudulent activities, such as scams or deceit. • To stop something from happening, in this case, stopping romance scams before they occur. • ...
Edider Puzzle 3 2024-01-26
Across
- A modern urban planning approach that integrates digital technologies in energy, transportation, and services.
- Technological control used to increase efficiency and reliability in energy systems.
- Energy obtained from renewable, environmentally friendly sources.
- The use of advanced algorithms to make the best or most effective use of resources, especially applied in energy systems.
- An electric grid equipped with communication and automatic control technologies to optimize energy supply and consumption.
- The process of increasing the size and capacity of energy systems.
Down
- Methods used to extract information from large data sets, increasingly important in energy systems.
- The amount of carbon dioxide emitted by an individual, organization, or product.
- A crucial area for ensuring the safety and integrity of digital energy systems.
- Techniques and methods applied for more efficient use of energy resources.
10 Clues: Energy obtained from renewable, environmentally friendly sources. • The process of increasing the size and capacity of energy systems. • Techniques and methods applied for more efficient use of energy resources. • A crucial area for ensuring the safety and integrity of digital energy systems. • ...
cyber security 2024-10-25
Across
- Tries to steal information by impersonating a trusted entity.
- Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- Specialist Protects a company from cyber threats.
- A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- Creates harmful software to damage the network.
Down
- The process of converting information or data into a code to prevent unauthorized access.
- An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- Acts as a security barrier, inspecting every request and filtering threats.
- Attempts to break into a system by manipulating data input.
10 Clues: Creates harmful software to damage the network. • Specialist Protects a company from cyber threats. • Attempts to break into a system by manipulating data input. • Tries to steal information by impersonating a trusted entity. • Acts as a security barrier, inspecting every request and filtering threats. • ...
Cyber Awareness 2023-05-05
Across
- Using technology to bully or harass someone online
- A secret code that you use to protect your online accounts
- A person who uses their computer skills to gain unauthorized access to systems or networks
- A type of malware that can harm your computer and steal your personal information
Down
- The practice of protecting computers, networks, and online systems from unauthorized access or attack
- Unsolicited emails or messages that are sent to a large number of people
6 Clues: Using technology to bully or harass someone online • A secret code that you use to protect your online accounts • Unsolicited emails or messages that are sent to a large number of people • A type of malware that can harm your computer and steal your personal information • ...
New words 2024-06-14
Across
- Measures taken to protect a computer or computer system against unauthorized access or attack.
- Individuals who exploit others online for their own gain.
- The act of ignoring someone in favor of using a smartphone.
Down
- A condition characterized by an over-reliance on digital devices.
- The amount of time spent using a device such as a computer, television, or games console.
- The information about a person that exists on the internet as a result of their online activity.
6 Clues: Individuals who exploit others online for their own gain. • The act of ignoring someone in favor of using a smartphone. • A condition characterized by an over-reliance on digital devices. • The amount of time spent using a device such as a computer, television, or games console. • ...
Imp. of Misuse and Cybersecurity 2020-12-03
Across
- monitors incoming and outgoing network traffic based on a set of security rules
- damage can occur when there is a planned attempt to bypass all legitimate access restrictions
- an unauthorized attempt to access a system, device and/or network via the Internet
- receiving lots of junk email
- a person gains unauthorized access to financial accounts and changed the details of those accounts to their advantage
Down
- stolen information is later used to conduct cash transfers or online purchases without the owner knowing
- internally produced software
- focuses on stopping threats that attempt to access a computer or other systems in the network
- spreading both beneficial and harmful material using computer systems
- involve the use of websites and email messages that try to trick you into entering your personal information
10 Clues: internally produced software • receiving lots of junk email • spreading both beneficial and harmful material using computer systems • monitors incoming and outgoing network traffic based on a set of security rules • an unauthorized attempt to access a system, device and/or network via the Internet • ...
Survival Game 2020-12-30
Across
- To browse the Internet
- Set of security policies to screen incoming and outgoing messages
- computer Industries are an example of ---------- manufacturing
- A program that accesses and displays files and other data available on the internet and other networks
- refers to equipment that is operated through the use of digital information rather than human input
Down
- Moving certain operations to another county, either by relocating affected operations to facilities in another country or by outsourcing the operations to a foreign supplier.
- Reorganising a business to reduce capacity and increase efficiency
- The term implies that disparate computers, information databases, and communications networks are integrated
- A measure of the success of an operation in converting inputs to outputs.
- to implement an appropriate level of cybersecurity across the supply chain of the defense industrial base
10 Clues: To browse the Internet • Set of security policies to screen incoming and outgoing messages • Reorganising a business to reduce capacity and increase efficiency • computer Industries are an example of ---------- manufacturing • A measure of the success of an operation in converting inputs to outputs. • ...
internet dangers 2021-03-15
Across
- computer program that replicates itself in order to spread to other computers.
- a malicious piece of computer code designed to spread from device to device.
- collection of instructions and data that tell the computer how to work
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
Down
- attack will send multiple requests to the attacked web resource – with the aim of exceeding the website's
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- the protection of computer systems and networks from information disclosure,
- aimed at causing the network connection to fail.
- any malware which misleads users of its true intent
- messages transmitted and received by digital computers through a network
10 Clues: aimed at causing the network connection to fail. • any malware which misleads users of its true intent • collection of instructions and data that tell the computer how to work • messages transmitted and received by digital computers through a network • the protection of computer systems and networks from information disclosure, • ...
chpt 5 2021-07-13
Across
- Mapping of _____ controls for each risk identified for an asset.
- Risk ______ is the first step towards risk management.
- Managing cybersecurity risks is not just a job for which department?
- This describes the highest level of damage possible when an accident occurs from a particular hazard
- Who can carry out generalized assessments when experiencing budget or time constraints?
Down
- What do you need to create for all current applications, tools, and utilities?
- Apart from Systemic, what is the other form of vulnerability?
- Which factor is not normally considered in risk control?
- ______ of potential risks reduces the surprises that come along the way during the course of a project and thus helps improving strategies for achieving goals effectively.
- Under risk assessment, the first thing you need to do is take ____of what you are analysing.
10 Clues: Risk ______ is the first step towards risk management. • Which factor is not normally considered in risk control? • Apart from Systemic, what is the other form of vulnerability? • Mapping of _____ controls for each risk identified for an asset. • Managing cybersecurity risks is not just a job for which department? • ...
IEM October SM Crossword 2022-10-28
Across
- About 90% of account data breaches happen because of ______.
- IEM was a _____ level NEMA Sponsor.
- October is National ________ Awareness Month, an annual campaign launched by CISA in 2004.
- Team IEM has been named a 2022 Best Place to work in _____ for the 8th Consecutive Year.
Down
- Team IEM participated in the Great ______ to practice earthquake preparedness.
- The simple act of washing your _____ with soap and water can stop the spread of germs, prevent diseases, and save lives.
- The U.S. ______ celebrated its 247th birthday this month.
- IEMer who was honored with the NIBS Distinguished Service Award.
- Over 4 billion people around the world have access to the _______.
- IEMer who was a featured subject matter expert in the webinar “Elopement: Preparedness and Response for People with Dementia and Autism”
10 Clues: IEM was a _____ level NEMA Sponsor. • The U.S. ______ celebrated its 247th birthday this month. • About 90% of account data breaches happen because of ______. • IEMer who was honored with the NIBS Distinguished Service Award. • Over 4 billion people around the world have access to the _______. • ...
Technology 2023-02-06
Across
- (a simulated experience that can be similar to or completely different from the real world)
- (a type of computing that uses quantum-mechanical phenomena, such as superposition and entanglement)
- (the branch of engineering that deals with the design, construction, and use of robots)
- (the simulation of human intelligence in machines)
Down
- (the protection of internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access)
- (a technology that superimposes digital information onto the real world)
- (the delivery of computing resources over the internet)
- (a decentralized and distributed digital ledger used to record transactions)
- (a network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and network connectivity)
- (large and complex data sets that are difficult to process using traditional data processing techniques)
10 Clues: (the simulation of human intelligence in machines) • (the delivery of computing resources over the internet) • (a technology that superimposes digital information onto the real world) • (a decentralized and distributed digital ledger used to record transactions) • (the branch of engineering that deals with the design, construction, and use of robots) • ...
Teka-Teki Silang 2 2024-09-15
Across
- Suatu bagian di dalam komputer dimana data atau instruksi program bisa disimpan atau dipulihkan.
- Untuk menyalin atau memindahkan program atau informasi ke dalam memori komputer, terutama dari internet atau komputer yang lebih besar.
- Reloading atau updating apa yang sedang ditampilkan atau disimpan.
- Tidak membutuhkan kabel untuk membuat koneksi atau untuk berkomunikasi.
- Teknologi apa saja, latihan, dan peraturan untuk menghindari serangan siber atau mengurangi dampaknya.
Down
- Bahasa pemrograman dengan level tinggi, salah satu bahasa pemrograman yang paling populer saat ini.
- Satu set papan tombol di komputer atau mesin tik yang anda tekan agar dapat berfungsi.
- Peralatan yang memproduksi listrik yang menyediakan tenaga untuk peralatan elektronik, mobil, dan lain-lain.
- Kode yang mengidentifikasi dimana sepotong/sepenggal informasi disimpan.
- Salah satu cara untuk menyimpan angka, huruf, dan simbol untuk bertukar informasi di antara sistem komputer.
10 Clues: Reloading atau updating apa yang sedang ditampilkan atau disimpan. • Tidak membutuhkan kabel untuk membuat koneksi atau untuk berkomunikasi. • Kode yang mengidentifikasi dimana sepotong/sepenggal informasi disimpan. • Satu set papan tombol di komputer atau mesin tik yang anda tekan agar dapat berfungsi. • ...