cybersecurity Crossword Puzzles
Key Words From Offline Is the New Luxury 2024-06-18
Across
- Something that is incredibly important, but constantly in danger due to increased online risks; Our ______
- What electronic devices often are; as opposed to a tool
- An example of a cybersecurity threat that has been growing in abundance in recent years
- The acronym for a common fear people have when they are away from their devices
Down
- A place where there is no internet or cell service, according to the documentary
- What the "white spots" app shows you in its immersive AR experience; internet/cell ______
- What is Happening to Society as a result of the expansion of internet access
- Staying ______ is one of the best ways to help prevent and avoid cyber attacks
8 Clues: What electronic devices often are; as opposed to a tool • What is Happening to Society as a result of the expansion of internet access • Staying ______ is one of the best ways to help prevent and avoid cyber attacks • The acronym for a common fear people have when they are away from their devices • ...
FITAVocab.HBM 2013-05-15
Across
- presentation software program similar to Keynote and Powerpoint, but more abstract
- a file created by a software application
- Example: Windows
- rules and behaviors made to keep individuals safe when online
- an opening in a computer that allows to have more plug-ins
- part of the computer that processes everything
- main circuit board of a computer
- protecting information on computer systems/networks
- Example: printer
- legal means of protecting an author's work
- file format made by WORD that has a smaller chance of getting a virus
- digital, online, accesible on the digital world
- selection of editing and drawing/art tools on your computer
- file format made by Microsoft that can't be viewed by all programs
Down
- a file that serves as a starting place for a new document
- a software that runs on your computer
- the short term memory of a computer
- to start up a computer
- collection of data stored in one unit
- code of positive conduct online
- a piece of equipment that provides input and output for the computer
- a web-based program that saves your photos, docs, and music
- data transmission
- Example: keyboard
- file format made by ADOBE that is viewable by all programs
25 Clues: Example: Windows • Example: printer • data transmission • Example: keyboard • to start up a computer • code of positive conduct online • main circuit board of a computer • the short term memory of a computer • a software that runs on your computer • collection of data stored in one unit • a file created by a software application • legal means of protecting an author's work • ...
cyber crime 2024-11-07
Across
- - Engineering technique used to manipulate people into revealing confidential information.
- - Software designed to detect and prevent computer viruses and other malware.
- - Type of cyberattack that overwhelms a network with traffic, causing denial of service.
- - Device or software that filters network traffic to block unauthorized access.
- - Encoding information so only authorized parties can access it.
- - Individual or group that hacks for political or social causes.
- - Concealing messages or information within other non-suspicious files.
- - Automated program that performs tasks; can be used in botnets for malicious purposes.
- - Software that allows unauthorized access to a computer while hiding its presence.
- - Software that gathers user information without their knowledge.
Down
- - Hacker who sometimes violates laws or ethical standards without malicious intent.
- - Malicious code that attaches itself to legitimate files and spreads.
- - Malicious software disguised as a legitimate program.
- - Breach exposing sensitive information to unauthorized parties.
- - A software vulnerability that is unknown to the vendor, often exploited by hackers.
- - Measures taken to protect a computer or network from unauthorized access or attack.
- - A hacker who breaks into computer systems with malicious intent.
- - Malware that locks or encrypts files until a ransom is paid.
- - Unwanted and unsolicited messages, usually sent in bulk by email.
- - Software that records keystrokes to capture sensitive information like passwords.
20 Clues: - Malicious software disguised as a legitimate program. • - Malware that locks or encrypts files until a ransom is paid. • - Breach exposing sensitive information to unauthorized parties. • - Encoding information so only authorized parties can access it. • - Individual or group that hacks for political or social causes. • ...
GZ MAG 6 2020-11-06
Across
- softens the dirt within the pores.
- prejudice directed against a person or people groups on the basis of their membership in a particular racial or ethnic group.
- a chemical that improves a person's mood.
- one of the worst things you could apply to your face.
- showing the hole essence of what you are trying to show to the audience.
- putting yourself in a place where people can see how you work.
Down
- practice of defending computers, mobile devices, electronic systems, networks, and data from malicious or cyber-attacks.
- a store with style that inspires young people to feel confident about themselves when dressing up.
- refers to a change or shift along with a curve on a graph of price versus quantity.
- artistry a way to express yourself, boost your confidence, and show it off.
10 Clues: softens the dirt within the pores. • a chemical that improves a person's mood. • one of the worst things you could apply to your face. • putting yourself in a place where people can see how you work. • showing the hole essence of what you are trying to show to the audience. • artistry a way to express yourself, boost your confidence, and show it off. • ...
Jaringan Komputer Cindy 2024-01-15
Across
- faktor yang memastikan setiap sistem komputer atau jaringan harus memastikan bahwa pihak, objek, dan informasi yang berkomunikasi di dalamnya adalah benar adalah..
- topologi dengan seluruh komputer yang berada dalam jaringan dihubungan satu sama lainnya secara langsung (point to point) disebut topologi..
- perangkat komputer atau perangkat TIK lainnya yang terkoneksi satu sama lain disebut..
- alat yang menghubungkan workstation, server, atau perangkat lainnya menggunakan kabel jaringan adalah..
- mode komunikasi antara pengirim dan penerima yang bersifat satu arah disebut mode..
Down
- aspek teknis yang mengatur biaya merupakan aspek teknis..
- jaringan yang menghubungkan dua perangkat komputer persib akan atau lebih pada cakupan yang relatif dekat adalah..
- singkatan dari model open system inter connection adalah..
- upaya perlindungan terhadap keamanan data dan informasi dari berbagai serangan siber adalah..
- garis pertahanan pertama dalam keamanan sistem komputer dan database merupakan fungsi dari..
10 Clues: aspek teknis yang mengatur biaya merupakan aspek teknis.. • singkatan dari model open system inter connection adalah.. • mode komunikasi antara pengirim dan penerima yang bersifat satu arah disebut mode.. • perangkat komputer atau perangkat TIK lainnya yang terkoneksi satu sama lain disebut.. • ...
SUNY Canton Crossword 2020-04-01
Across
- / One of the two newest additions to the Athletics Program
- / Criminal Justice _____ Photography
- / Sports Management
- / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
- / Flame-cooked at the Corner
- / Relieve stress in the _____ Room
- / The Library
- / Dr. Szafran
- / Campus _____ Garden
- / BIOL 209
- / Catch a movie on campus
- / Three _____ Design
- / Team based hero shooter
- / No longer Underground Lounge
- / MATH 141
- / House of Engineering
- / Fifty Years on the _____
- / When you're looking for something to do
Down
- / David R. _____ Award
- / Where to find International Student Initiatives
- / SUNY Canton has _____ traditional athletic teams
- / First Year _____ Program
- / Student Service Center
- / SGA holds bi-weekly Budget and _____ meetings
- / Renewable energy
- / An older mascot
- / Early _____
- / Dorm
- / Computer focused criminal justice
- / You can find SGA and CAB in this office
- / Physical _____
- / Funeral services career opportunity
- / The Annual Steel _____ Competition
- / Join the College _____ Board to bring your event ideas to life
- / Roos House
- / Headliner at Spring 2019 concert
- / _____ Competency Badge
- / 90 hours of supervised clinical experiences
- / Our favorite Macropod
- / The _____ flag can be found hanging proudly in Roos House and the Campus Center
40 Clues: / Dorm • / BIOL 209 • / MATH 141 • / Roos House • / Early _____ • / The Library • / Dr. Szafran • / Physical _____ • / An older mascot • / Renewable energy • / Sports Management • / Three _____ Design • / Campus _____ Garden • / David R. _____ Award • / House of Engineering • / Our favorite Macropod • / Student Service Center • / _____ Competency Badge • / Catch a movie on campus • ...
Media and Technology 2023-11-28
Across
- - Promoting products or services using digital channels like social media and email.
- - A mobile phone with advanced features like internet access and app capabilities.
- - A digital audio or video file that is available for streaming or downloading.
- - Online platforms for sharing content and connecting with others.
- - Storing and accessing data and programs over the internet instead of a computer's hard drive.
- - Analyzing large sets of data to discover patterns and information.
- - Overlaying digital information onto the real world through technology.
- - Measures taken to protect computer systems and networks from cyber attacks.
- - A seminar conducted over the internet.
- - Sending multimedia content in a continuous stream.
Down
- - Buying and selling goods and services over the internet.
- - The process of converting data into a code to prevent unauthorized access.
- - The simulation of human intelligence in computers.
- - Computer-generated simulation of a three-dimensional image or environment.
- - Playing electronic games, often on a computer or console.
- - Content that spreads rapidly on the internet.
- (Internet of Things) - Interconnected devices that can communicate and exchange data.
- - Bullying that takes place using electronic communication.
- - Small digital images used to express an idea or emotion in electronic communication.
- - A set of rules followed by a computer to solve problems or perform tasks.
20 Clues: - A seminar conducted over the internet. • - Content that spreads rapidly on the internet. • - The simulation of human intelligence in computers. • - Sending multimedia content in a continuous stream. • - Buying and selling goods and services over the internet. • - Playing electronic games, often on a computer or console. • ...
RiddleRealm 2024-02-16
Across
- Testing to ensure existing functionalities still work after changes.
- Storage and retrieval system that uses keys for efficient data access.
- Base-2 number system used in computing.
- Quick check to verify basic functionalities are working.
- Subset of artificial intelligence where systems learn and improve from data.
- Sequence of steps to test a specific functionality.
- AI-powered program designed to simulate conversation with users.
- Document detailing discovered issues during testing.
- Rules governing the structure of code.
- Likes to chase mice
- A versatile programming language known for its platform independence.
- The practice of identifying and removing defects or errors in software
- The process of performing tasks without human intervention, often used in testing.
- Flying mammal
Down
- Protection of computer systems, networks, and data from cyber threats.
- A pre-built structure for developing software.
- Confirming that the software meets specified requirements.
- Software component relied upon by another.
- Interface for interacting with software components.
- Interconnected network of devices communicating and sharing data.
- Step-by-step procedure for solving a problem.
- Detailed instructions for executing a specific test.
- Decentralized and distributed ledger technology.
- Has a trunk
- Large marsupial
- A distributed version control system widely used in software development.
- A set of instructions that performs a specific task in programming.
27 Clues: Has a trunk • Flying mammal • Large marsupial • Likes to chase mice • Rules governing the structure of code. • Base-2 number system used in computing. • Software component relied upon by another. • Step-by-step procedure for solving a problem. • A pre-built structure for developing software. • Decentralized and distributed ledger technology. • ...
Future trends 2024-07-08
Across
- Electronic devices worn on the body
- Technology based on biology
- Urban areas that use technology to improve efficiency and quality of life
- Technology that simulates human intelligence
- Virtual-reality space where users can interact
- Manipulation of matter on an atomic or molecular scale
- Power generated by nuclear fusion
- Extremely large data sets analyzed computationally
- Decentralized ledger technology used in cryptocurrencies
- Study of genomes
- Digital or virtual currency using cryptography for security
- Proposed high-speed transportation system
- Energy from sources that are naturally replenishing
- Technology used to improve financial services
- Methods of storing energy for later use
- Self-driving vehicles and robots
Down
- A subset of AI that involves computers learning from data
- Technology involving the design and application of robots
- Simulated experience that can be similar to or different from the real world
- Protection of internet-connected systems
- Medical treatment involving the alteration of genes
- Advanced computing using quantum-mechanical phenomena
- Currency available only in digital form
- Network of physical objects connected to the internet
- Unmanned aerial vehicles used for various purposes
- Technology in education
- Vehicles powered by electricity
- Fifth-generation mobile network
- Wearable mobile machine that allows for limb movement
- Delivery of healthcare services via telecommunications technology
30 Clues: Study of genomes • Technology in education • Technology based on biology • Vehicles powered by electricity • Fifth-generation mobile network • Self-driving vehicles and robots • Power generated by nuclear fusion • Electronic devices worn on the body • Currency available only in digital form • Methods of storing energy for later use • Protection of internet-connected systems • ...
Trade school vs 4 year College 2024-02-26
Across
- what is one of the hardest trade school
- he structure of laws, rules and agencies designed to hold criminals
- you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- what trade jobs pat the most
5 Clues: what trade jobs pat the most • what is one of the hardest trade school • he structure of laws, rules and agencies designed to hold criminals • you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .. • ...
FITDVocab.MY 2013-05-15
Across
- the VDU
- the tower
- opposite of pause
- also known as KB
- it eats cheese
- apps
- wireless fidelity
- without wires it can be 3g or 4g
- national cyber security alliance
- what is google
- connect without wires
- in the sky
- to search for search engines
- also known as TB
- visual display unit
- it is what comes before byte
- a printer
- keep your password secret
- random access memory
- folder
- a blank sheet you can type on
- not by hand
- where you put your flash drive
- to restart your computer
- light admitting diode
- the internet world
Down
- a symbol to represent your company
- enter instructions into a computer
- a keyboard
- CD drive
- a virus on your computer
- also known as GB
- internet service provider
- liquid crystal display
- online police
- a phone
- a catchy phrase to go with a logo
- online bullying
- the brain of the computer
- where you stick your headphones into
- extension cord operating systems
- old school with WIFI
- bigger than a bit
- the creator
- a packet of paper to advertise your company
- also know as MB
- computer processing unit
- service set identifier
48 Clues: apps • folder • the VDU • a phone • CD drive • the tower • a printer • a keyboard • in the sky • the creator • not by hand • online police • it eats cheese • what is google • online bullying • also know as MB • also known as KB • also known as GB • also known as TB • opposite of pause • wireless fidelity • bigger than a bit • the internet world • visual display unit • old school with WIFI • random access memory • ...
2021 TBI Holiday Crossword Puzzle 2021-12-17
Across
- They work for Santa.
- A holiday drink that is traditionally made with milk, cream, sugar, and egg.
- TBI changed from a “master agent” to a______?(Two Words)
- A circular band of foliage, typically hung for decoration.
- The podcast hosted by the training team.(Three Words)
- A snowman with a name.
- October is ____________ awareness month.
- A holiday film about Buddy leaving the North Pole to find his dad in New York.
- TBI's team of solution architects and engineers.(Two Words)
- Reindeer name that is also a kitchen cleanser.
- What is the name of the TBI app?
Down
- A piece of clothing hung over the fireplace for Santa Claus.
- The destination of TBI’s 2021 Presidents Club Trip.
- A festive holiday treat that you assemble and decorate with frosting and candy.(Two Words)
- The town the Grinch stole Christmas from.
- The popular Christmas ballet.
- How many years is TBI celebrating in business?
- What is the name of TBI’s DEI employee resource group?
- They pull Santa’s sleigh.
- Lucy wanted this for Christmas in A Charlie Brown Christmas.(Two Words)
- What is the name of the dog that appears in TBI training videos teaching us about best practices with Dave Polakowski?
- First company to use Santa in advertising.(Three Words)
22 Clues: They work for Santa. • A snowman with a name. • They pull Santa’s sleigh. • The popular Christmas ballet. • What is the name of the TBI app? • The town the Grinch stole Christmas from. • October is ____________ awareness month. • How many years is TBI celebrating in business? • Reindeer name that is also a kitchen cleanser. • ...
SUNY Canton Crossword 2020-04-01
Across
- / Three _____ Design
- / Funeral services career opportunity
- / Dr. Szafran
- / SGA holds bi-weekly Budget and _____ meetings
- / Computer focused criminal justice
- / Roos House
- / Join the College _____ Board to bring your event ideas to life
- / Team based hero shooter
- / An older mascot
- / You can find SGA and CAB in this office
- / House of Engineering
- / Flame-cooked at the Corner
- / Renewable energy
- / SUNY Canton has _____ traditional athletic teams
- / One of the two newest additions to the Athletics Program
- / Headliner at Spring 2019 concert
- / No longer Underground Lounge
- / Early _____
- / Our favorite Macropod
- / David R. _____ Award
- / Where to find International Student Initiatives
Down
- / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
- / _____ Competency Badge
- / When you're looking for something to do
- / Criminal Justice _____ Photography
- / MATH 141
- / Sports Management
- / The Annual Steel _____ Competition
- / Catch a movie on campus
- / The Library
- / BIOL 209
- / Fifty Years on the _____
- / The _____ flag can be found hanging proudly in Roos House and the Campus Center
- / 90 hours of supervised clinical experiences
- / Physical _____
- / Relieve stress in the _____ Room
- / Dorm
- / First Year _____ Program
- / Campus _____ Garden
- / Student Service Center
40 Clues: / Dorm • / MATH 141 • / BIOL 209 • / Roos House • / Dr. Szafran • / The Library • / Early _____ • / Physical _____ • / An older mascot • / Renewable energy • / Sports Management • / Three _____ Design • / Campus _____ Garden • / House of Engineering • / David R. _____ Award • / Our favorite Macropod • / _____ Competency Badge • / Student Service Center • / Catch a movie on campus • ...
SUNY Canton Crossword 2020-04-01
Across
- / BIOL 209
- / Headliner at Spring 2019 concert
- / When you're looking for something to do
- / The _____ flag can be found hanging proudly in Roos House and the Campus Center
- / Dr. Szafran
- / Funeral services career opportunity
- / Campus _____ Garden
- / 90 hours of supervised clinical experiences
- / Criminal Justice _____ Photography
- / House of Engineering
- / An older mascot
- / Join the College _____ Board to bring your event ideas to life
- / Computer focused criminal justice
- / Dorm
- / Roos House
- / SGA holds bi-weekly Budget and _____ meetings
- / Student Service Center
- / Renewable energy
- / Our favorite Macropod
- / Fifty Years on the _____
Down
- / Catch a movie on campus
- / No longer Underground Lounge
- / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
- / Physical _____
- / Three _____ Design
- / The Annual Steel _____ Competition
- / One of the two newest additions to the Athletics Program
- / David R. _____ Award
- / MATH 141
- / Relieve stress in the _____ Room
- / Where to find International Student Initiatives
- / The Library
- / First Year _____ Program
- / Early _____
- / SUNY Canton has _____ traditional athletic teams
- / _____ Competency Badge
- / Team based hero shooter
- / Sports Management
- / Flame-cooked at the Corner
- / You can find SGA and CAB in this office
40 Clues: / Dorm • / BIOL 209 • / MATH 141 • / Roos House • / Dr. Szafran • / The Library • / Early _____ • / Physical _____ • / An older mascot • / Renewable energy • / Sports Management • / Three _____ Design • / Campus _____ Garden • / David R. _____ Award • / House of Engineering • / Our favorite Macropod • / _____ Competency Badge • / Student Service Center • / Catch a movie on campus • ...
Loyola Trivia 2024-05-02
Across
- Nationally recognized club at Loyola that has travelled across the world for competitions
- Varsity sport with the most MIAA Championships
- Turf field for Football and Lacrosse games
- most popular lunch item off the menu
- name of our school mascot, which means a Spanish gentlemen
- name of the retreat that our Juniors and Seniors complete
- Number of hours of Christian Service students complete in order to graduate
- Non-athletic activity with the most trophies at Loyola
- word that our students use to describe their connection with each other
- Name of turf field that is used for our middle school games soccer and lacrosse games
- Where our most recent foreign exchange program was based
- Annual football game played against our rival school on Thanksgiving morning
Down
- Name of the saint for whom the school was founded
- the order of Catholic priests also known as the Society of Jesus
- our school colors
- Latin phrase and Jesuit philosophy which means “Care for the whole person”
- Four letters which stand for a Latin phrase meaning “For the Greater Glory of God”
- 5 minute guided meditation played over the speakers every day
- Motto at Loyola Blakefield
- Name of turf field with lights for Rugby, Lacrosse, Football, and Soccer games
20 Clues: our school colors • Motto at Loyola Blakefield • most popular lunch item off the menu • Turf field for Football and Lacrosse games • Varsity sport with the most MIAA Championships • Name of the saint for whom the school was founded • Non-athletic activity with the most trophies at Loyola • Where our most recent foreign exchange program was based • ...
WORDS RELATED TO TECHNOLOGY 2024-06-05
Across
- - Materials used in electronic devices.
- - Electronic devices worn on the body.
- - Electronic device for processing data.
- - Internet-based storage and computing services.
- - Organized collection of data.
- -(Internet of Things Network of physical devices connected to the Internet.
- -(Artificial Intelligence)Simulation of human intelligence by machines.
- - Global network connecting millions of computers.
- - Buying and selling of goods online.
- - Large and complex data sets.
- - Digital or virtual currency using cryptography.
- - Manipulation of matter on an atomic scale.
- - Step-by-step procedure for calculations.
- - Process of converting information into code.
- - Group of interconnected computers.
Down
- - Computer that provides data to other computers.
- - Advanced computing using quantum-mechanical phenomena.
- - Unmanned aerial vehicles.
- - Mobile device with advanced features.
- - Protection of computer systems from theft or damage.
- - Programs and operating information used by a computer.
- - Overlaying digital information on the real world.
- - Physical components of a computer.
- - Technology enabling systems to operate without human intervention.
- - Technology dealing with the design and operation of robots.
- - Measuring and analyzing human body characteristics.
- - Distributed ledger technology.
- Printing - Creating a physical object from a digital model.
- - Type of AI that allows computers to learn from data.
- -(Virtual Reality)Computer-generated simulation of a 3D environment.
30 Clues: - Unmanned aerial vehicles. • - Large and complex data sets. • - Organized collection of data. • - Distributed ledger technology. • - Physical components of a computer. • - Group of interconnected computers. • - Buying and selling of goods online. • - Electronic devices worn on the body. • - Mobile device with advanced features. • - Materials used in electronic devices. • ...
Science and Technology in the 2000s 2023-03-24
Across
- Mobile devices used for communication and accessing the Internet
- Electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Websites and applications that enable users to create and share content or to participate in social networking.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks
Down
- The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Tech company best known for its extensive search engine and other products
- Among the most popular mobile phone distributor
- Largest online shopping/delivery company
8 Clues: Largest online shopping/delivery company • Among the most popular mobile phone distributor • Mobile devices used for communication and accessing the Internet • Tech company best known for its extensive search engine and other products • Websites and applications that enable users to create and share content or to participate in social networking. • ...
Robots and Technology 2023-09-18
Across
- Writing instructions in a programming language to create software and apps.
- Printing A technology that creates three-dimensional objects from digital models.
- An electronic device that processes data and performs tasks using programs.
- A set of steps or rules that computers follow to solve problems or make decisions.
- A mobile phone with advanced features like internet access and apps.
- A global network that connects computers and allows information sharing.
- The physical components of computers and electronic devices.
- Measures and practices to protect computer systems and data from threats.
- The use of technology and machines to perform tasks without human intervention.
Down
- Reality (VR) Technology that creates a computer-generated environment for users to interact with.
- An unmanned aircraft that can be controlled remotely or autonomously.
- Programs and instructions that run on computers and other devices.
- Intelligence (AI) Technology that enables machines to think, learn, and make decisions like humans.
- A machine designed to carry out tasks autonomously or under remote control.
- The application of scientific knowledge to create tools, devices, and systems.
15 Clues: The physical components of computers and electronic devices. • Programs and instructions that run on computers and other devices. • A mobile phone with advanced features like internet access and apps. • An unmanned aircraft that can be controlled remotely or autonomously. • A global network that connects computers and allows information sharing. • ...
puzzle corner 8 2024-09-23
Across
- High-speed storage located close to the CPU to improve processing speed.
- Malicious software that disguises itself as legitimate to trick users.
- A device that forwards data packets between computer networks
- A security system that monitors and controls incoming and outgoing network traffic
- The process of analyzing large sets of data to discover patterns and trends.
- The maximum amount of data that can be transmitted over a network in a given amount of time
- The standard markup language used to create web pages
Down
- A data type with only two possible values: true or false.
- The practice of protecting systems, networks, and programs from digital attacks
- The delay between a user's action and a system's response in a network.
- Supply A component that provides electrical power to a computer
- The practice of using remote servers hosted on the internet to store, manage, and process data
- A common method for connecting devices in a wired local area network (LAN).
- A large, powerful computer used for bulk data processing in organizations.
- A physical location where people can access the internet using Wi-Fi.
15 Clues: The standard markup language used to create web pages • A data type with only two possible values: true or false. • A device that forwards data packets between computer networks • Supply A component that provides electrical power to a computer • A physical location where people can access the internet using Wi-Fi. • ...
Trade school vs 4 year College 2024-02-26
Across
- what is one of the hardest trade school
- he structure of laws, rules and agencies designed to hold criminals
- you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- what trade jobs pat the most
5 Clues: what trade jobs pat the most • what is one of the hardest trade school • he structure of laws, rules and agencies designed to hold criminals • you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .. • ...
Trade school vs 4 year College 2024-02-26
Across
- what is one of the hardest trade school
- he structure of laws, rules and agencies designed to hold criminals
- you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- what trade jobs pat the most
5 Clues: what trade jobs pat the most • what is one of the hardest trade school • he structure of laws, rules and agencies designed to hold criminals • you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .. • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- Schneider Electric cloud-based file collaboration space to store and share company files.
- An employee must press this button, when he/she receives the suspicious mail.
- Mobile device application that secures users network connectivity and protect a device from malware.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- For Schneider Electric's technical support to complete customer service, contact _____.
- Specific agreement and setup that allow an employee to connect a personal device.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service, contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
Tech Week Test 2024-04-29
Across
- A program that enables a computer to perform specific tasks.
- Step-by-step procedure for solving a problem.
- Manipulation of matter on an atomic, molecular, and supramolecular scale.
- Authentication techniques based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- Collection of structured information stored in a computer system.
- Process of converting information into a code to prevent unauthorized access.
- Creation of a virtual version of something, such as an operating system or server.
Down
- Wireless networking technology that allows devices to connect to the internet without using cables.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- Mobile phone with advanced features, such as internet connectivity and app support.
- Internet-based computing that provides shared resources and data storage on demand.
- Software application used to access and view websites on the internet.
- Measures taken to protect computer systems and data from unauthorized access or attacks.
- Simulation of human intelligence processes by machines, especially computer systems.
- A security system that monitors and controls incoming and outgoing network traffic.
15 Clues: Step-by-step procedure for solving a problem. • A program that enables a computer to perform specific tasks. • Collection of structured information stored in a computer system. • Software application used to access and view websites on the internet. • Manipulation of matter on an atomic, molecular, and supramolecular scale. • ...
Information Security in Artificial intelligence 2023-11-27
Across
- The branch of artificial intelligence that enables computer systems to improve their performance through experience
- Physiological or behavioral characteristics of an individual used for authentication
- The practice of protecting networks and computer systems from digital attacks
- The process of algorithmically transforming information to hide its content
- A form of communication used to send and receive electronic messages
- Relates to the concept of protecting personal information from being improperly collected, processed or shared
- A computational model that mimics the structure of the human brain and is used for learning and decision-making in artificial intelligence
Down
- A complex neural network technique that simulates the human learning process
- A person who breaks into a computer system or network
- A set of instructions used in artificial intelligence to solve problems and perform tasks
- Malicious software that can damage a computer or steal data
- Information for machine learning and analytics
- A security system used to prevent unauthorized access to a network system
- A communication channel connecting computers to each other
- Weaknesses in system security that can be exploited
15 Clues: Information for machine learning and analytics • Weaknesses in system security that can be exploited • A person who breaks into a computer system or network • A communication channel connecting computers to each other • Malicious software that can damage a computer or steal data • A form of communication used to send and receive electronic messages • ...
Tech Week Test 2024-04-29
Across
- A program that enables a computer to perform specific tasks.
- Step-by-step procedure for solving a problem.
- Manipulation of matter on an atomic, molecular, and supramolecular scale.
- Authentication techniques based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- Collection of structured information stored in a computer system.
- Process of converting information into a code to prevent unauthorized access.
- Creation of a virtual version of something, such as an operating system or server.
Down
- Wireless networking technology that allows devices to connect to the internet without using cables.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- Mobile phone with advanced features, such as internet connectivity and app support.
- Internet-based computing that provides shared resources and data storage on demand.
- Software application used to access and view websites on the internet.
- Measures taken to protect computer systems and data from unauthorized access or attacks.
- Simulation of human intelligence processes by machines, especially computer systems.
- A security system that monitors and controls incoming and outgoing network traffic.
15 Clues: Step-by-step procedure for solving a problem. • A program that enables a computer to perform specific tasks. • Collection of structured information stored in a computer system. • Software application used to access and view websites on the internet. • Manipulation of matter on an atomic, molecular, and supramolecular scale. • ...
technology 2016-05-17
Across
- is temporarily stored on your computer.
- computing, does not eliminate servers
- method by which users access and save or "pull down" software or other files to their own computers
- is a document sent with an email message
- refers to the part of an application that performs an essential task not apparent to the user.
- card, a video adapter
- electronic mail is a way of sending messages over the internet
- A software program that allows you to surf the web
Down
- smallest unit of measurement in computing.
- refers to measures designed to protect your computer
- refers to a website's text and information, as opposed to its design and structure
- a wireless communications technology intended to replace cables.
- microprocessor that performs many functions and calculations that make your computer run
- reality, is the integration of digital information with live video
- a saved link to a particular Web page
- company of the type of touch screen phone most of the world uses today
- a conventional method of transmitting data
- driver, a small program that allows a peripheral device such as a printer or scanner to connect to your PC
- Acrobat Reader, is software that allows you to view a PDF document
- to load and initialise the operating system on a computer.
20 Clues: card, a video adapter • computing, does not eliminate servers • a saved link to a particular Web page • is temporarily stored on your computer. • is a document sent with an email message • smallest unit of measurement in computing. • a conventional method of transmitting data • A software program that allows you to surf the web • ...
technology 2016-05-17
Across
- company of the type of touch screen phone most of the world uses today
- card, a video adapter
- a conventional method of transmitting data
- computing, does not eliminate servers
- is a document sent with an email message
- a wireless communications technology intended to replace cables.
- A software program that allows you to surf the web
- a saved link to a particular Web page
- driver, a small program that allows a peripheral device such as a printer or scanner to connect to your PC
- refers to a website's text and information, as opposed to its design and structure
Down
- reality, is the integration of digital information with live video
- microprocessor that performs many functions and calculations that make your computer run
- Acrobat Reader, is software that allows you to view a PDF document
- refers to measures designed to protect your computer
- to load and initialise the operating system on a computer.
- refers to the part of an application that performs an essential task not apparent to the user.
- electronic mail is a way of sending messages over the internet
- method by which users access and save or "pull down" software or other files to their own computers
- is temporarily stored on your computer.
- smallest unit of measurement in computing.
20 Clues: card, a video adapter • computing, does not eliminate servers • a saved link to a particular Web page • is temporarily stored on your computer. • is a document sent with an email message • a conventional method of transmitting data • smallest unit of measurement in computing. • A software program that allows you to surf the web • ...
Digital Tech 2021-08-23
Across
- It is the data that is stored inside the computer.
- Allows other devices to connect to the computer and vice versa.
- Stores all the digital content. Can be internal and external.
- A form of coding using dots and dashes.
- Settings that allow your personal data and social media accounts to be private.
- A trace you leave behind after posting something on social media.
- Computer language. This language helps programmers develop algorithms.
- Cooling process unit
- Source of charge and power for the device.
- Random access memory
- Units of information, most often numeric, which are collected through surveys.
Down
- An address that identifies your device on a local network.
- It is the physical part of a computer, the machinery or equipment.
- Video graphics card
- Connects the computer from one spot. Without the motherboard, the computer won’t be able to communicate or work with each other.
- A form of communication, used to send signals, instructions, and messages through encrypted language.
- Online security used to protect your data.
- A worldwide infrastructure.
- Used to transmit power and data.
- A set of instructions that computers follow. A good analogy of it would be a recipe it says what needs to be done, step by step.
20 Clues: Video graphics card • Cooling process unit • Random access memory • A worldwide infrastructure. • Used to transmit power and data. • A form of coding using dots and dashes. • Online security used to protect your data. • Source of charge and power for the device. • It is the data that is stored inside the computer. • An address that identifies your device on a local network. • ...
Loyola Blakefield Crossword Puzzle 2024-08-13
Across
- Number of hours of Christian service students must complete to graduate
- Name of the landmark front field that hosts football and lacrosse games
- Name of the turf field with lights for rugby, lacrosse, football, and soccer games
- Nationally recognized club at Loyola that has traveled across the world for competitions
- Location of our most recent foreign exchange program
- Motto at Loyola Blakefield
- Our school colors
- Annual football game played against our rival school on Thanksgiving morning
- Name of the saint for whom the school was founded
- Non-athletic activity with the most trophies at LoyolaNon-athletic activity with the most trophies at Loyola
Down
- Latin phrase and Jesuit philosophy meaning "Care for the whole person"
- 5-minute guided meditation played over the speakers every day
- Name of the popular retreat that our juniors and seniors complete
- Word that our students use to describe their connection with each other
- Name of the turf field used for our middle school soccer and lacrosse games
- Name of our school mascot, which means "Spanish gentleman"
- The order of Catholic priests also known as the Society of Jesus
- Most popular lunch item on the menu
- Four letters that stand for a Latin phrase meaning "For the Greater Glory of God"
- Varsity sport with the most MIAA championships
20 Clues: Our school colors • Motto at Loyola Blakefield • Most popular lunch item on the menu • Varsity sport with the most MIAA championships • Name of the saint for whom the school was founded • Location of our most recent foreign exchange program • Name of our school mascot, which means "Spanish gentleman" • 5-minute guided meditation played over the speakers every day • ...
Vocab Words in Computer Science 2023-10-24
Across
- a step-by-step procedure or set of rules for solving a problem or performing a computation
- a text or arithmetic expression with true or false value.
- opposite of cloud storage
- an abbreviation for common gateway interface.
- the process of protecting data from unauthorized users or hackers.
- stands for the Central Processing Unit
- allows for the changing of the settings, appearance and behavior of a program
- refers to the rules that dictate the structure of a language
- a set of similar data that saves in a sequential form
- Short for file allocation table
Down
- a programming language used primarily for web development
- a physical component that allows two devices to share data over a wired connection
- an error in the programming of software or an application.
- a computer program that supports the main system on a computer when it starts up
- commonly abbreviated as I/O
- the hardware component used to store data that is actively being used by a processor
- stands for transmission control protocol/internet protocol.
- a collection of interconnected devices or systems that can communicate and share resources
- a single point within a digital image.
- a number system that uses only two symbols
20 Clues: opposite of cloud storage • commonly abbreviated as I/O • Short for file allocation table • stands for the Central Processing Unit • a single point within a digital image. • a number system that uses only two symbols • an abbreviation for common gateway interface. • a set of similar data that saves in a sequential form • ...
SUNY Canton Crossword 2020-04-01
Across
- / Renewable energy
- / The Annual Steel _____ Competition
- / Criminal Justice _____ Photography
- / Dr. Szafran
- / Computer focused criminal justice
- / One of the two newest additions to the Athletics Program
- / Student Service Center
- / _____ Competency Badge
- / Our favorite Macropod
- / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
- / Three _____ Design
- / Dorm
- / David R. _____ Award
- / Physical _____
- / MATH 141
- / 90 hours of supervised clinical experiences
Down
- / Flame-cooked at the Corner
- / Team based hero shooter
- / The _____ flag can be found hanging proudly in Roos House and the Campus Center
- / Fifty Years on the _____
- / Where to find International Student Initiatives
- / SUNY Canton has _____ traditional athletic teams
- / Roos House
- / Relieve stress in the _____ Room
- / Sports Management
- / SGA holds bi-weekly Budget and _____ meetings
- / The Library
- / Early _____
- / An older mascot
- / First Year _____ Program
- / Headliner at Spring 2019 concert
- / House of Engineering
- / BIOL 209
- / When you're looking for something to do
- / Join the College _____ Board to bring your event ideas to life
- / No longer Underground Lounge
- / Funeral services career opportunity
- / Campus _____ Garden
- / You can find SGA and CAB in this office
- / Catch a movie on campus
40 Clues: / Dorm • / BIOL 209 • / MATH 141 • / Roos House • / The Library • / Dr. Szafran • / Early _____ • / Physical _____ • / An older mascot • / Renewable energy • / Sports Management • / Three _____ Design • / Campus _____ Garden • / House of Engineering • / David R. _____ Award • / Our favorite Macropod • / Student Service Center • / _____ Competency Badge • / Team based hero shooter • ...
SUNY Canton Crossword 2020-04-01
Across
- / Three _____ Design
- / Funeral services career opportunity
- / Dr. Szafran
- / SGA holds bi-weekly Budget and _____ meetings
- / Computer focused criminal justice
- / Roos House
- / Join the College _____ Board to bring your event ideas to life
- / Team based hero shooter
- / An older mascot
- / You can find SGA and CAB in this office
- / House of Engineering
- / Flame-cooked at the Corner
- / Renewable energy
- / SUNY Canton has _____ traditional athletic teams
- / One of the two newest additions to the Athletics Program
- / Headliner at Spring 2019 concert
- / No longer Underground Lounge
- / Early _____
- / Our favorite Macropod
- / David R. _____ Award
- / Where to find International Student Initiatives
Down
- / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
- / _____ Competency Badge
- / When you're looking for something to do
- / Criminal Justice _____ Photography
- / MATH 141
- / Sports Management
- / The Annual Steel _____ Competition
- / Catch a movie on campus
- / The Library
- / BIOL 209
- / Fifty Years on the _____
- / The _____ flag can be found hanging proudly in Roos House and the Campus Center
- / 90 hours of supervised clinical experiences
- / Physical _____
- / Relieve stress in the _____ Room
- / Dorm
- / First Year _____ Program
- / Campus _____ Garden
- / Student Service Center
40 Clues: / Dorm • / MATH 141 • / BIOL 209 • / Roos House • / Dr. Szafran • / The Library • / Early _____ • / Physical _____ • / An older mascot • / Renewable energy • / Sports Management • / Three _____ Design • / Campus _____ Garden • / House of Engineering • / David R. _____ Award • / Our favorite Macropod • / _____ Competency Badge • / Student Service Center • / Catch a movie on campus • ...
FITCvocab.GJK 2013-05-15
Across
- Flat disc used to store data
- one page document about your life
- protection of info. on the Internet
- Serves information to other computers
- 1000 bytes
- a slot where you can put head phones
- Internet/Online
- internet rules to keep you safe
- An official catch phrase of a company or brand
- Stands for ISP
- who is asking? what are they asking? Why do they want it?
- 1000 kilobytes
- Slots for hardware
- for connecting keyboards and mouses
- don't plagiarize
- Service set identification name signed to wifi networks
Down
- Data stored in a computers memory
- EX.headphones
- 1000 Gigabytes
- Stands for CPU
- Official picture of a company
- Piece of written matter
- Long term memory
- Search engine that take you to other search engines
- Selection of editing tools
- Stands for RAM
- front of the program
- rich text format
- Smallest piece of information
- Visual display used in devices
- DSL,Cable
- protect users form people phising
- program stored on internet servers
- No wire
- EX.mouse
- how you act online
- The second smallest device that stores information(8 Bits)
- 1000 megabytes
- Wireless Fidelity
- one canvas you can put anything on
- Document
41 Clues: No wire • EX.mouse • Document • DSL,Cable • 1000 bytes • EX.headphones • 1000 Gigabytes • Stands for CPU • Stands for RAM • Stands for ISP • 1000 kilobytes • 1000 megabytes • Internet/Online • Long term memory • rich text format • don't plagiarize • Wireless Fidelity • how you act online • Slots for hardware • front of the program • Piece of written matter • Selection of editing tools • ...
Terminologies Related to RA 10175 2023-10-26
Across
- instruction, communication with, storing data in, retrieving data from
- an electronic, magnetic, optical, electrochemical, or other data processing
- keeping of data that already exists in a stored form
- refers to any information contained in the form of computer data
- gathering and receiving information
- listening to, recording, monitoring or surveillance of the content of communications
- refers to the DOJ – Office of Cybercrime
- either the Cybercrime Investigation and Coordinating Center
- transmission of information through information and communication technology
- comprehensive plan of actions designed to improve the security and enhance cyber resilience
Down
- National Bureau of Investigation and the Philippine National Police
- collection of tools, policies, risk management approaches and actions
- representation of information, knowledge, facts, concepts or instructions which are being prepared
- refers to any computer data other than the content of the communication
- person who created or is the origin of the assailed electronic statement
- a person who hosts or who proposes to host internet content
- modification or change, in form or substance, of an existing computer data or program
- a set of instructions executed by the computer to achieve intended results
- any representation of facts, information, or concepts in a form suitable for processing in a computer system
- mathematical algorithm produced against digital information
20 Clues: gathering and receiving information • refers to the DOJ – Office of Cybercrime • keeping of data that already exists in a stored form • a person who hosts or who proposes to host internet content • either the Cybercrime Investigation and Coordinating Center • mathematical algorithm produced against digital information • ...
Loyola Crossword 2024-07-02
Across
- Annual football game played against our rival school on Thanksgiving morning
- Varsity sport with the most MIAA Championships
- Name of turf field with lights for Rugby, Lacrosse, Football, and Soccer games
- 5 minute guided meditation played over the speakers every day
- Non-athletic activity with the most trophies at Loyola
- name of our school mascot, which means a Spanish gentlemen
- Nationally recognized club at Loyola that has travelled across the world for competitions
- Where our most recent foreign exchange program was based
- Name of landmark front field which hosts football and lacrosse games
- Name of the saint for whom the school was founded
- our school colors
Down
- name of popular retreat that our Juniors and Seniors complete
- the order of Catholic priests also known as the Society of Jesus
- Four letters which stand for a Latin phrase meaning “For the Greater Glory of God”
- Motto at Loyola Blakefield
- Name of turf field that is used for our middle school games soccer and lacrosse games
- Latin phrase and Jesuit philosophy which means “Care for the whole person”
- Number of hours of Christian Service students complete in order to graduate
- most popular lunch item off the menu
- word that our students use to describe their connection with each other
20 Clues: our school colors • Motto at Loyola Blakefield • most popular lunch item off the menu • Varsity sport with the most MIAA Championships • Name of the saint for whom the school was founded • Non-athletic activity with the most trophies at Loyola • Where our most recent foreign exchange program was based • name of our school mascot, which means a Spanish gentlemen • ...
cyber crime 2024-11-07
Across
- - Engineering technique used to manipulate people into revealing confidential information.
- - Software designed to detect and prevent computer viruses and other malware.
- - Type of cyberattack that overwhelms a network with traffic, causing denial of service.
- - Device or software that filters network traffic to block unauthorized access.
- - Encoding information so only authorized parties can access it.
- - Individual or group that hacks for political or social causes.
- - Concealing messages or information within other non-suspicious files.
- - Automated program that performs tasks; can be used in botnets for malicious purposes.
- - Software that allows unauthorized access to a computer while hiding its presence.
- - Software that gathers user information without their knowledge.
Down
- - Hacker who sometimes violates laws or ethical standards without malicious intent.
- - Malicious code that attaches itself to legitimate files and spreads.
- - Malicious software disguised as a legitimate program.
- - Breach exposing sensitive information to unauthorized parties.
- - A software vulnerability that is unknown to the vendor, often exploited by hackers.
- - Measures taken to protect a computer or network from unauthorized access or attack.
- - A hacker who breaks into computer systems with malicious intent.
- - Malware that locks or encrypts files until a ransom is paid.
- - Unwanted and unsolicited messages, usually sent in bulk by email.
- - Software that records keystrokes to capture sensitive information like passwords.
20 Clues: - Malicious software disguised as a legitimate program. • - Malware that locks or encrypts files until a ransom is paid. • - Breach exposing sensitive information to unauthorized parties. • - Encoding information so only authorized parties can access it. • - Individual or group that hacks for political or social causes. • ...
Cybersecurity Lesson 1 & 2 Key Terms 2022-08-31
Across
- is exchange of suggestive messages or images via mobile phone texting.
- many social networking web sites require you to set up.
- are the settings on social networks that allow users to control who sees what they post, and they can either be adjusted post by post, or set to a default setting.
- is a person or people that stand for others that are being bullied either by directly telling bullies to stop, or by reporting what they saw/heard to a responsible adult.
- someone who intentionally targets people for harm using online chat rooms or social media.
- is a detailed report, usually about a person.
- people online that often try to obtain information about you.
- is bullying that takes place using electronic technology.
- on the internet is a technical measure intended to restrict access to information.
Down
- means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the company that provide the services and probably by your browser.
- is a site or online community where people with like experiences or interests communicate with each other and share information and resources.
- can be anything from cyberbullying to actual physical harm, if the wrong people get your information.
- keeping your personal information safe and personal.
- is the action of subjecting someone to aggressive pressure or intimidation.
- is the ability to act in a safe and responsible way on the internet and other connected environments.
- where you connect with other players and can chat with them either by voice or by text.
- a person who witness someone getting bullied but does nothing to stop it.
17 Clues: is a detailed report, usually about a person. • keeping your personal information safe and personal. • many social networking web sites require you to set up. • is bullying that takes place using electronic technology. • people online that often try to obtain information about you. • is exchange of suggestive messages or images via mobile phone texting. • ...
Trade school vs 4 year College 2024-02-26
Across
- what is one of the hardest trade school
- he structure of laws, rules and agencies designed to hold criminals
- you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- what trade jobs pat the most
5 Clues: what trade jobs pat the most • what is one of the hardest trade school • he structure of laws, rules and agencies designed to hold criminals • you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .. • ...
FSA 1 2021-02-03
Across
- THE AMOUNT THAT A BORROWER CAN BORROW FOR A SECURED LOAN IS USUALLY ____ THAN AN UNSECURED LOAN
- INTEREST RATES USED BY BANKS WHEN LENDING UNSECURED FUNDS TO EACH OTHER
- A PLATFORM THAT CAN ALLOW BUSINESSES TO POOL MONEY FROM A VARIETY OF SOURCES
- THE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGIN
- THIS FORM OF LOGOUT CLOSES A USER’S ACCESS AFTER A FEW MINUTES OF INACTIVITY
- THE TYPE OF LOAN THAT THE BORROWER DOES NOT NEED TO PLEDGE AN ASSET AS COLLATERAL
- A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWN
- AN EXAMPLE OF WHICH IS A SIX-DIGIT CODE SENT TO A CUSTOMER’S CELL PHONE FOR ADDITIONAL SECURITY
- DURING A SLUMP, THE GOVERNMENT CAN ____ THE INTEREST RATE TO ENCOURAGE SPENDING
Down
- FOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION
- A FORM OF AUTHENTICATION THAT RELIES ON RETINA SCANS, THUMBPRINTS OR FACIAL RECOGNITION
- THE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITY
- HAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOME
- THE MARKET VALUE OF AL GOODS AND SERVICES PRODUCED WITHIN THE COUNTRY
- MAS IS SINGAPORE’S _____ BANK.
- THE ORGANIZATION TO REGISTER YOUR BUSINESS WITH
- A CYBER-SECURITY DEVICE AND CONFIGURATION TO BLOCK ATTACKS
17 Clues: MAS IS SINGAPORE’S _____ BANK. • A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWN • THE ORGANIZATION TO REGISTER YOUR BUSINESS WITH • THE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGIN • HAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOME • THE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITY • FOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION • ...
Mixed 2021-11-06
Across
- created by computer technology and appearing to exist but not existing in the physical world
- a situation in which different elements are equal or in the correct proportions
- Used to describe something very unique
- barrier that acts as a security system to protect computer systems and networks from outside connections and untrusted networks
Down
- An expression to show surprise, disgust, anger
- the central principle or part of a policy, system,etc, which other things depend on
- to add to something in a way that improves it or makes it more attractive
- to make a record of the address of a web page on your computer so that you can find it again easily
- unable to think about or pay attention to something;unable to concentrate
9 Clues: Used to describe something very unique • An expression to show surprise, disgust, anger • to add to something in a way that improves it or makes it more attractive • unable to think about or pay attention to something;unable to concentrate • a situation in which different elements are equal or in the correct proportions • ...
National Cyber Security Awareness Month 2017-08-09
Across
- A cryptographic algorithm for encryption and decryption.
- Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack?
- What is the term for electronic mail?
- Abbreviation for a physical address; a numeric value that uniquely identifies that network device from every other device on the planet.
Down
- What is the term to describe connecting multiple separate networks together?
- The term used for attacks that try to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer?
- What is the abbreviation for the University's Technology group on-campus?
- What is it called when someone encrypts your files and asks for money to decrypt them?
- What is the basic communication language or protocol of the Internet?
9 Clues: What is the term for electronic mail? • A cryptographic algorithm for encryption and decryption. • What is the basic communication language or protocol of the Internet? • What is the abbreviation for the University's Technology group on-campus? • What is the term to describe connecting multiple separate networks together? • ...
Trade school vs 4 year College 2024-02-26
Across
- what is one of the hardest trade school
- he structure of laws, rules and agencies designed to hold criminals
- you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- what trade jobs pat the most
5 Clues: what trade jobs pat the most • what is one of the hardest trade school • he structure of laws, rules and agencies designed to hold criminals • you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .. • ...
CROSSWORD PUZZLE!! 2024-05-16
Across
- This is platform, object-oriented programming language.
- This covers all technical means used to handle information and aid communication.
- It specifies accessibility to changing variables, methods, and classes.
- A style or method of cooking, especially as characteristics of a particular country, region, or establishment.
- This is an issue that can have significant impact on the individual's mental and emotional well being.
- This can be frustrating to people.
Down
- A compulsive need to spend a lot of time in the internet.
- The various of methods used to prepare food.
- A variable that has been allocated "Statically"; This only declares with a "static" keyword.
- An illness caused by bacteria or other toxins in food.
- A list of dishes available in a restaurant.
- This is a type of access modifier that allows access inside the class, subclass, or other classes of the same package as the modifier.
- It is a global computer network.
- Having to do cooking in the kitchen.
- This is the practice of protecting systems, networks, and programs from digital attacks.
15 Clues: It is a global computer network. • This can be frustrating to people. • Having to do cooking in the kitchen. • A list of dishes available in a restaurant. • The various of methods used to prepare food. • An illness caused by bacteria or other toxins in food. • This is platform, object-oriented programming language. • ...
MIL SET B 2023-10-22
Across
- that takes place online
- Refers to listening to, recording, monitoring or surveillance of the content of communications
- Refers to the collection of tools, policies, risk management approaches, actions, training, best practices
- The access to the whole or any part of a computer system without right.
- Refers to a set of instructions executed by the computer to achieve intended results.
Down
- refers to the process of harvesting bank details
- The input, alteration, or deletion of any computer data
- the common outlet of self-expression and creativityThe access to the whole or any part of a computer system without right.
- the excessive use of computers to the extent that it interferes with daily life.
- Refers to a representation of information, knowledge, facts, concepts
- refers to pedophiles using the Internet as a means to contact children
- The acquisition of a domain name over the internet
- Refers to a computer or computer network
- The willful engagement of any lascivious exhibition of sexual organs or sexual activity
- The unauthorized input, alteration, or deletion of computer data
15 Clues: that takes place online • Refers to a computer or computer network • refers to the process of harvesting bank details • The acquisition of a domain name over the internet • The input, alteration, or deletion of any computer data • The unauthorized input, alteration, or deletion of computer data • Refers to a representation of information, knowledge, facts, concepts • ...
CROSSWORD 2024-10-09
Across
- A service that creates a secure connection over the internet.
- The process of addressing and managing the aftermath of a security breach or cyberattack.
- A cryptographic key that can be shared openly and is used for encryption.
- The process of replacing sensitive data with unique identification symbols.
- An incident where unauthorized access to data occurs.
- A network security device that monitors and filters incoming and outgoing traffic.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
- Best practices and steps to maintain cybersecurity and protect personal information.
- The process of converting encrypted data back into its original form.
- A targeted attempt to steal sensitive information by masquerading as a trusted entity.
- The study of methods to break encryption or analyze cryptographic systems.
- A weakness in a system that can be exploited by attackers.
- Software designed to detect and remove malware from computers.
- A method for restricting access to resources to authorized users only.
- The practice of hiding information within another medium, such as images or text.
15 Clues: An incident where unauthorized access to data occurs. • A weakness in a system that can be exploited by attackers. • A service that creates a secure connection over the internet. • Software designed to detect and remove malware from computers. • The process of converting encrypted data back into its original form. • ...
Chapter 3 2024-09-11
4 Clues: What does BYOD stand for? • What should organizations implement to secure themselves from attacks? • What organization is mentioned as a resource for cybersecurity guidance? • What type of attack floods a target with data requests to make a site unavailable?
School of Engineering History 2024-01-11
Across
- The town on Long Island where the school once had a campus
- The artist who created the red sculpture in front of Starbucks in the MetroTech Commons
- The high-flying club that was established in 1929
- The "Father of Polymer Science"
- He developed our school's first courses in cybersecurity
- An alum who became the first African-American woman ever to head a Fortune 500 company
- Engineering honor society
- What the Bridge St. African Wesleyan Methodist Church became
Down
- Last name of the math professors who calculated pi to more than 8 billion digits
- An NSF Award that has been won by many young, tenure-track faculty
- The foamy formula alum Joseph L. Owades developed
- Last name of the professor who built what was then the world’s most advanced hypersonic wind tunnel
- Henry C. Goldmark was awarded a presidential medal for his work on this project
- The company that first mass-produced penicillin thank to a formula developed by an alum
- Microwave expert
- The group that designated the Polymer Research Institute as a National Historic Chemical Landmark
- In 2017 alum Paolo Nespoli spent more than four months here
17 Clues: Microwave expert • Engineering honor society • The "Father of Polymer Science" • The foamy formula alum Joseph L. Owades developed • The high-flying club that was established in 1929 • He developed our school's first courses in cybersecurity • The town on Long Island where the school once had a campus • In 2017 alum Paolo Nespoli spent more than four months here • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
- Mobile device application that secures users network connectivity and protect a device from malware.
- For Schneider Electric's technical support to complete customer service,contact _____.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- An employee must press this button, when he/she receives the suspicious mail.
- Specific agreement and setup that allow an employee to connect a personal device.
- Schneider Electric cloud-based file collaboration space to store and share company files.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service,contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Mobile device application that secures users network connectivity and protect a device from malware.
- For Schneider Electric's technical support to complete customer service,contact _____.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- Specific agreement and setup that allow an employee to connect a personal device.
- An employee must press this button, when he/she receives the suspicious mail.
- Schneider Electric cloud-based file collaboration space to store and share company files.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service,contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
Cyber Security CrossWord Puzzel 2021-03-02
Across
- Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
- _______________ is any crime perpetrated using computers and networks.
- A__________ monitored a network, blocking dangerous content such as viruses.
- _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
- Viruses, trojans and worms are examples of __________________________.
- An ethical hacker.
- Your favorite teacher.
- A statement of an intention to inflict harm or damage .
Down
- Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
- Your favorite class.
- __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
- The exposure to the possibility of the attacked or harmed.
- Actual action that causes harm or damage.
- A blend between an ethical hacker and a cracker.
- __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
- An action taken to counteract the threat.
- ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.
17 Clues: An ethical hacker. • Your favorite class. • Your favorite teacher. • Actual action that causes harm or damage. • An action taken to counteract the threat. • A blend between an ethical hacker and a cracker. • A statement of an intention to inflict harm or damage . • The exposure to the possibility of the attacked or harmed. • ...
ICT Crossword - Social Media and Digital Ethics 2021-05-19
Across
- an attacker uses a number of computers to target a server
- starting arguments online and losing control is known as
- harass, threaten, and embarrass others using the internet
- once a new technology is planned out, experts in that field are brought it to point out any vulnerabilities that they can see.
- devices that give us the ability to change ourselves genetically
- is a system of connected devices that transfer data over a network
- using another person’s sexually explicit images to blackmail them
- a set of rules of how to behave online
- software used to protect against system intrusion
- the term used to describe that what is posted on the internet stays on there forever
Down
- accessing a system through its weaknesses and without permission
- online websites or applications to share content
- a field in technology that people are exploring in order to make sense of the world and thus make better choices.
- attempts by spammers to trick you into giving out personal information
- the general term used to describe online security measures
15 Clues: a set of rules of how to behave online • online websites or applications to share content • software used to protect against system intrusion • starting arguments online and losing control is known as • an attacker uses a number of computers to target a server • harass, threaten, and embarrass others using the internet • ...
MIL SET B 2023-10-22
Across
- The access to the whole or any part of a computer system without right.
- bullying that takes place online
- The acquisition of a domain name over the internet
- The willful engagement of any lascivious exhibition of sexual organs or sexual activity
- Refers to a set of instructions executed by the computer to achieve intended results.
Down
- Refers to a representation of information, knowledge, facts, concepts
- Refers to listening to, recording, monitoring or surveillance of the content of communications
- the common outlet of self-expression and creativityThe access to the whole or any part of a computer system without right.
- the excessive use of computers to the extent that it interferes with daily life.
- Refers to the collection of tools, policies, risk management approaches, actions, training, best practices
- refers to the process of harvesting bank details
- The input, alteration, or deletion of any computer data
- Refers to a computer or computer network
- The unauthorized input, alteration, or deletion of computer data
- refers to pedophiles using the Internet as a means to contact children
15 Clues: bullying that takes place online • Refers to a computer or computer network • refers to the process of harvesting bank details • The acquisition of a domain name over the internet • The input, alteration, or deletion of any computer data • The unauthorized input, alteration, or deletion of computer data • ...
Digital Citizenship Puzzle 2024-01-29
Across
- Tricks some people use to get your private info. Be careful.
- Being polite and nice when talking to others or playing games online.
- People you know and talk to on the computer. Add only friends you know in real life.
- Getting things from the internet onto your computer or tablet.
- Special controls that help you choose who can see your information online.
- Being mean to others on the internet. Always be kind and friendly.
- A place on the computer where you can find info or play games.
- Asking and getting approval before doing something online.
- Your special name when you play games or talk online.
Down
- The trail of things you do online. Be careful what you share.
- Protecting your computer and personal info from online bad stuff.
- Being careful and making good choices when using the internet.
- A secret code to keep your online stuff safe, like a hidden key.
- The time you spend looking at screens, like computers or tablets.
- Putting things from your computer or tablet onto the internet.
15 Clues: Your special name when you play games or talk online. • Asking and getting approval before doing something online. • Tricks some people use to get your private info. Be careful. • The trail of things you do online. Be careful what you share. • Getting things from the internet onto your computer or tablet. • ...
Programming 1 Vocab Review (Modules 16 -17) 2023-04-27
Across
- a standard, perspective, or set of ideas
- is the numeric representation of a character
- to make (a coded or unclear message) intelligible
- a shift cipher, one of the easiest and most well known encryption systems
- the practice of protecting critical systems and sensitive information from digital attacks
- a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication
- the practice of hiding a secret message in something that is not secret
Down
- numeric representation using only the digits 1 and 0
- a software program that lets you do things
- a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
- a program that manages the hardware and software on the computer
- a random string of bits created explicitly for scrambling and unscrambling data
- software that allows a computer to communicate with external devices
- computer programming language written in either binary (2) or hexadecimal (16)
- to convert (information or data) into a cipher or code, especially to prevent unauthorized access
15 Clues: a standard, perspective, or set of ideas • a software program that lets you do things • is the numeric representation of a character • to make (a coded or unclear message) intelligible • numeric representation using only the digits 1 and 0 • a program that manages the hardware and software on the computer • ...
Cyber Security 2021-10-07
Across
- ethics being authorized to attempt to gain unauthorized access to a computer,
- scramble,
- the practice of encoding information so only authorized people can read it,
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit care numbers,
- the practice of protecting systems networks, and programs from digital attacks,
- footprint a data trail you unintentionally leave online,
- hat hackers have permission to hack a system to discover the systems vulnerabilities,
Down
- the practice of solving and writing encryptions,
- a type of malicious software designed to block access to a computer system until a sum of money is paid,
- hacking to promote a political agenda or social change,
- a form of protection for intellectual property usually applying to artistic works,
- the use of electronic communication to bully a person,
- literacy having the ability to find information evaluate information credibility and use information effectively,
13 Clues: scramble, • the practice of solving and writing encryptions, • the use of electronic communication to bully a person, • hacking to promote a political agenda or social change, • footprint a data trail you unintentionally leave online, • the practice of encoding information so only authorized people can read it, • ...
lets go 2022-05-11
Cybersecurity Vocab - (no spaces) 2021-08-25
Across
- The rights given to a person over the creations of their mind
- The use of ethics within computer/information technologies
- the act of obtaining to or respecting proper morals
- The correct or acceptable way of using the internet
- A document that legalizes the use of certain unlicensed digital items without consequence.
- the act of using an electronic device to break someone down and hurt them
Down
- A form of protection by the US government that keeps people from stealing other's works.
- governs a person's use of the internet
- The unauthorized use or reproduction of another’s work.
9 Clues: governs a person's use of the internet • the act of obtaining to or respecting proper morals • The correct or acceptable way of using the internet • The unauthorized use or reproduction of another’s work. • The use of ethics within computer/information technologies • The rights given to a person over the creations of their mind • ...
Cybersecurity Fundamentals Chapter 3 2024-06-03
Across
- A type of malware that attaches itself to a legitimate executable files and requires user initiation to spread and activate.
- A program that remains dormant until triggered by a specific event to execute its harmful actions.
- Software design to disrupt, damage, or gain unauthorized access to computer systems.
- Malware that encrypts a victim's data and demands payment to restore access.
- Disguise itself as a legitimate or desired operation, requiring user interaction to execute its malicious payload.
Down
- Techniques used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
- A weakness in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause damage.
- An offensive action targeting computer systems, networks, or devices with the intent to disrupt, damage, or gain unauthorized access.
- Malicious software that replicates itself and spreads independently in networks, without needing a host program.
9 Clues: Malware that encrypts a victim's data and demands payment to restore access. • Software design to disrupt, damage, or gain unauthorized access to computer systems. • A program that remains dormant until triggered by a specific event to execute its harmful actions. • ...
2022 Stay Aware Event 2022-03-02
Across
- This practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- __________ and access management is a framework of policies and technologies used to ensure that the right users have the appropriate access to technology resources.
- Memorized secret consisting of a sequence of words or other text that a person uses to authenticate their identity and would be difficult for someone else to guess.
- Type of social engineering where scammers send text messages pretending to be from reputable companies to entice individuals to reveal personal information, such as passwords or credit card numbers.
- A virtual _______ _______ is an encrypted connection over the Internet from a device to a network.
- A term for additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.
- A term for hackers that break into the network to steal information that would be used to harm the owner or the users without their consent and is completely illegal.
- An acronym for a centralized function/team at Lowe’s allowing people, processes, and technology to continuously monitor and improve the security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents.
- Shoulder ________ is a criminal practice using direct observation techniques, such as looking over someone's shoulder, to try to steal someone’s personal information.
- The ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption.
Down
- ____ ______ authentication is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are such as something they have (e.g., bank card), something they know (e.g., PIN number) and/or something they are (e.g., biometrics).
- A security violation where sensitive, protected, or confidential data is copied, viewed, stolen, or used by an unauthorized individual, and can cause great financial loss and other repercussions.
- Software that is secretly installed into an information system without the knowledge of the system user or owner.
- This aims to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A type of malicious code or software that looks legitimate but can take control of your computer and is designed to damage, disrupt, steal, or (in general) inflict some other harmful action on your data or network.
- __________ __________ baselines are standards for all systems in the network and enable Lowe’s to implement systems in an efficient and standardized manner.
- An unauthorized user who attempts to or gains access to an information system.
- Highly targeted phishing attack aimed at senior executives masquerading as a legitimate email.
- Refrain from inserting unknown or unidentifiable ___________ ______ into your Lowe’s devices unless you are an approved user.
20 Clues: An unauthorized user who attempts to or gains access to an information system. • Highly targeted phishing attack aimed at senior executives masquerading as a legitimate email. • A malicious application or script that can be used to take advantage of a computer’s vulnerability. • ...
OT InfoSec 2024 2024-09-30
Across
- MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE.
- A TYPE OF MALWARE THAT DENIES A USER'S ACCESS TO A SYSTEM OR DATA UNTIL A SUM OF MONEY IS PAID.
- A ROUTINE FIX FOR A COMPUTER PROGRAM.
- THIS ACRONYM IS A DEVICE THAT EXAMINES WEB TRAFFIC AND CAN PREVENT ATTACKS EXPLOITING WEB APPLICATION VULNERABILITIES.
- FLOW OR WEAKNESS IN AN INFORMATION SYSTEM THAT COULD BE EXPLOITED.
- A CLASS OF MALICIOUS SOFTWARE, OR MALWARE, THAT CIRCULATES BETWEEN COMPUTERS AND CAUSES DAMAGE TO DATA AND SOFTWARE.
- YUBIKEY IS AN EXAMPLE OF A HARDWARE _______
- THIS COLORFUL ACROMYN MEANS TROUBLE ON A WINDOWS SYSTEM.
- A STRING OF CHARACTERS USED TO AUTHENTICATE AN IDENTITY.
- THE POTENTIAL FOR LOSING VALUABLE INFORMATION.
- THE INTENTIONAL OR UNINTENTIONAL RELEASE OF SECURE OR PRIVATE/CONFIDENTIAL INFORMATION TO AN UNTRUSTED ENVIRONMENT (2 WORDS).
- I LOVE ROCK MUSIC AND SPENDING TIME WITH FRIENDS. (WHICH SECURITY TEAM MEMBER AM I?).
- A SELF-REPLICATING MALICIOUS PROGRAM.
- AN ETHICAL SECURITY HACKER THAT USES THEIR SKILLS FOR GOOD.
- A CONTROLLED PRIVATE NETWORK THAT ALLOWS ACCESS TO PARTNERS, VENDORS AND SUPPLIERS, OR AN AUTHORIZED SET OF CUSTOMERS.
- ACCOUNT LOGIN PROCESS THAT REQUIRES USERS TO ENTER MORE INFORMATION THAN JUST A PASSWORD.
- I HAVE A FAMILY OF SIX AND I'M A GRANDPA (WHICH SECURITY TEAM MEMBER AM I?).
Down
- THE ACT OF PUBLISHING SOMEONE’S PERSONAL, CONFIDENTIAL INFORMATION ON THE INTERNET, OFTEN WITH MALICIOUS INTENT.
- UNAUTHORIZED USER WITH MALICIOUS INTENT.
- WORLD FAMOUS HACKER WHO CLAIMED TO BE ABLE TO ISSUE NUCLEAR LAUNCH CODES VIA WHISTLING.
- THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).
- A LIST OF PEOPLE, ORGANIZATIONS, IP ADDRESSES, OR COUNTRIES THAT ARE BLOCKED OR EXCLUDED BY OTHERS BECAUSE THEY ARE ALLEGED TO HAVE ENGAGED IN UNACCEPTABLE, OR UNETHICAL BEHAVIOR/ACTIVITIES.
- CYBER ATTACK IN WHICH THE ATTACKER FLOODS A SERVER WITH INTERNET TRAFFIC TO PREVENT USERS FROM ACCESSING CONNECTED ONLINE SERVICES AND SITES.
- MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
- WHEN I'M NOT WORKING OR WRITING CODE, I LOVE TO PLAY MUSICAL INSTRUMENTS. (WHICH SECURITY TEAM MEMBER AM I?)
- THE PROTECTION OF DIGITAL INFORMATION, AS WELL AS THE INTEGRITY OF THE INFRASTRUCTURE HOUSING AND TRANSMITTING DIGITAL INFORMATION.
- A MECHANISM FOR CREATING A SECURE CONNECTION BETWEEN A COMPUTING DEVICE AND A COMPUTER NETWORK.
- I AM A FOODIE, AND MY FAVORITE FOOTBALL TEAM IS HOCKEY! (WHICH SECURITY TEAM MEMBER AM I?).
- CURRENT HEAD OF THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA).
- ANY SOFTWARE OR APPLICATION THAT DISPLAYS UNSOLICITED ADVERTISEMENTS ON YOUR COMPUTER/BROWSER.
- MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
- ATTEMPTING TO TRICK PEOPLE INTO REVEALING SENSITIVE INFORMATION, OFTEN BY USING EMAILS OR FAKE WEBSITES THAT LOOK LIKE THEY ARE FROM TRUSTED SOURCES.
- A PROCESS USED TO IDENTIFY A HUMAN PERSON ENTERING DATA (I AM NOT A ROBOT).
33 Clues: A ROUTINE FIX FOR A COMPUTER PROGRAM. • A SELF-REPLICATING MALICIOUS PROGRAM. • UNAUTHORIZED USER WITH MALICIOUS INTENT. • YUBIKEY IS AN EXAMPLE OF A HARDWARE _______ • THE VAST UNDERBELLY OF THE INTERNET (2 WORDS). • THE POTENTIAL FOR LOSING VALUABLE INFORMATION. • MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE. • ...
Networking and the Internet 2022-06-27
Across
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- The process of transferring data between two or more digital devices
- Facts and statistics collected together for refences or analysis.
- A global computer network consisting of multiple interconnected networks.
- The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
- The ability of computers and the Internet to consistently perform to the expectations of their designed function.
- The speed and resource usage involved in collecting, manipulating, and analyzing data.
- The preservation of accuracy and consistency of a data set over the course of its analysis.
- A numerical label assigned to each computing device on a network.
- A series of interconnected computers and devices that share resources and exchange data with each other.
- The rate at which data is communicated from the Internet to a computer and vice versa.
11 Clues: A numerical label assigned to each computing device on a network. • Facts and statistics collected together for refences or analysis. • The process of transferring data between two or more digital devices • A global computer network consisting of multiple interconnected networks. • ...
Women in Forensics 2021-01-17
Across
- US Navy’s chief cryptanalyst who served during World War I and World War II.
- a women led startup providing security solutions for strong 2FA using U2F, OTP, PIV,etc.
- largest initiative to increase women’s participation in the cyber field in Europe.
- the first woman to speak at DEFCON, the world’s greatest hacker conference.
- India’s first woman cybercrime investigator
- a DSCI led initiative to enhance cyber security education for girls in India
Down
- a spread spectrum modulation technique derived from chirp spread spectrum (CSS) technology
- a security Camp supported by the NSA being largest girls-only residential camp in the country.
- a non profit organization which launched a program "100 Women in 100 Days" to uplift girls in cyber security
- a process in data cloning that spreads the data across the available drives in chunks.
- percentage of women in cybersecurity according to report by Frost and Sullivan in 2013.
11 Clues: India’s first woman cybercrime investigator • the first woman to speak at DEFCON, the world’s greatest hacker conference. • US Navy’s chief cryptanalyst who served during World War I and World War II. • a DSCI led initiative to enhance cyber security education for girls in India • ...
Cyber Security 2024-11-13
Across
- An unauthorised user who attempts to or gain access to a network
- A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
- Securing your online accounts with an extra layer of protection is called ____________________ authentication
- Computer programs that can block, detect, and remove viruses and other malware
Down
- A mechanism to create a secure connection between a computer and the network
- The unauthorised disclosure or unwanted exposure of confidential information
- The protection of digital information, as well as the integrity of the infrastructure
- Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
- Faking the sender’s email address to gain access to a secure network
9 Clues: An unauthorised user who attempts to or gain access to a network • Faking the sender’s email address to gain access to a secure network • A mechanism to create a secure connection between a computer and the network • The unauthorised disclosure or unwanted exposure of confidential information • ...
Road Security Crosswords 2023-05-09
Across
- Technique or code that takes advantage of a vulnerability.
- Who uses skills to exploit systems or networks.
- Is a technique used to assess the security of web applications by simulating attacks in real-time.
- A potential harm or negative consequences that arise from vulnerabilities and threats.
- Weakness or flaw that can be exploited.
- The practice of protecting computer systems, networks, and data from digital threats or unauthorized access.
- Malicious software that aims to damage or compromise systems.
- A disruptive event that compromises the security or integrity.
- A structured approach to developing software with a focus on security.
- A type of security testing that analyzes application source code for vulnerabilities.
Down
- A non-profit organization dedicated to improving software security through open resources and information.
- The process of evaluating and analyzing potential risks and vulnerabilities.
- Condition or circumstance that can cause harm or damage.
- Individuals within an organization who promote and advocate for security practices and help drive a culture of security awareness.
- Confidential or hidden information that is not widely known or shared
- A security assessment that identifies vulnerabilities in computer systems and networks.
- The process of reducing or minimizing the impact or severity.
17 Clues: Weakness or flaw that can be exploited. • Who uses skills to exploit systems or networks. • Condition or circumstance that can cause harm or damage. • Technique or code that takes advantage of a vulnerability. • Malicious software that aims to damage or compromise systems. • The process of reducing or minimizing the impact or severity. • ...
Networking and the Internet 2022-06-27
Across
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- The process of transferring data between two or more digital devices
- Facts and statistics collected together for reference or analysis.
- A global computer network consisting of multiple interconnected networks.
- The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
- The ability of computers and the Internet to consistently perform to the expectations of their designed function.
- The speed and resource usage involved in collecting, manipulating, and analyzing data.
- The preservation of accuracy and consistency of a data set over the course of its analysis.
- A numerical label assigned to each computing device on a network.
- A series of interconnected computers and devices that share resources and exchange data with each other.
- The rate at which data is communicated from the Internet to a computer and vice versa.
11 Clues: A numerical label assigned to each computing device on a network. • Facts and statistics collected together for reference or analysis. • The process of transferring data between two or more digital devices • A global computer network consisting of multiple interconnected networks. • ...
IT Roles & Responsibilities 2023-02-16
Across
- This group keeps company and user data secure and takes preventative measures to reduce harm in the event of a breach
- This person builds databases that logically store information and are also responsible for data recovery efforts and back ups
- This group troubleshoots and resolves technical issues
- This person manages and prioritizes the product backlog, translates product managers' strategies to development tasks, and learning the customers' requirements
- This person collects and interprets data sets in order to solve a problem
- This person develops, codes and maintains software systems
- This person conducts daily calls and helps the team by removing obstacles
Down
- This person is the liaison between business and IT
- This person tests new and existing programs to identify and help remove bugs, glitches, and other issues
- This person creates the overall technical vision for a specific solution to a business problem
- This person plays the lead role in planning, executing, monitoring, and closing projects
11 Clues: This person is the liaison between business and IT • This group troubleshoots and resolves technical issues • This person develops, codes and maintains software systems • This person collects and interprets data sets in order to solve a problem • This person conducts daily calls and helps the team by removing obstacles • ...
AV Lesson 5 2024-03-10
Across
- The act of compelling observance of or compliance with a law or rule.
- Existing or occurring in a digital environment, often simulated or computer-generated.
- Designed to be easily understood and operated by ordinary people.
- A penalty or coercive measure imposed to ensure compliance with a law or rule.
- To bring legal action against someone, typically in a court of law.
Down
- To introduce new methods or ideas, especially to promote change or improvement.
- To make a process or system operate automatically, reducing the need for human intervention.
- The practice of protecting computer systems, networks, and programs from digital attacks.
- The status of being a member of a particular country and having the rights and duties associated with it.
- Transmitting signals without the need for physical connection, typically using radio waves.
- To officially require or authorize something, often by law or command.
11 Clues: Designed to be easily understood and operated by ordinary people. • To bring legal action against someone, typically in a court of law. • The act of compelling observance of or compliance with a law or rule. • To officially require or authorize something, often by law or command. • A penalty or coercive measure imposed to ensure compliance with a law or rule. • ...
URS Security Crossword 2014-02-18
Across
- Your Assistant FSO is E._______.
- The ____________ (DSS) supports national security and the warfighter through security oversight and education missions.
- Initial and _________ security briefings must be completed by all URS personnel.
- Your FSO is M. _____.
- All visitors must check in through reception and receive a ______.
- ________is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in electronic communication.
- Report all suspicious activity to your ______.
Down
- ________ is the act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation.
- OPSEC stands for __________.
- You should always make your passwords complex. Use a combination of numbers, symbols & _________.
- __________ describes the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.
11 Clues: Your FSO is M. _____. • OPSEC stands for __________. • Your Assistant FSO is E._______. • Report all suspicious activity to your ______. • All visitors must check in through reception and receive a ______. • Initial and _________ security briefings must be completed by all URS personnel. • ...
Chapter 2 Vocabulary 2023-09-06
Across
- I want to start a cybersecurity company, this would mean that I want to become an ______
- Resources Everything from farmers to buildings are considered _______
- Customers of Apple are insisting they make more units for sale, this is called _____
- China sells the US the most electronic exports in the world. Electronic exports are considered ____
- I use the school bus every morning to get to school. The School bus is a _____
- I am going to spend money on gas instead of food, this is called a _____
Down
- Instead of buying expensive clothes, you would use that money to buy groceries, which is a ____
- China produces the most goods in the world. This means that they have a very strong ______
- Instead of buying food, you would use that money to buy expensive clothes, which is a _____
- Apple has only made 5,000 units of a product, this is called _____
- The people who buy products are called ____
11 Clues: The people who buy products are called ____ • Apple has only made 5,000 units of a product, this is called _____ • Resources Everything from farmers to buildings are considered _______ • I am going to spend money on gas instead of food, this is called a _____ • I use the school bus every morning to get to school. The School bus is a _____ • ...
Q1 '24 Crossword 2024-04-04
Across
- One of our oldest litigations which was resolved in Q1
- Paul conducted a lunch-n-learn on this type of trading
- RC’s first mitigation plan of this type was published by Anne
- Christine & Lydvine have finalized a new bank of clauses to assist in these type of negotiations
- International Data Privacy Day happens in this month
- The office in this location is nearly complete
- Our upcoming CLE conducted by the Wilson team is a discussion of these type of reporting rules
- The new system rolled out in Q1, supported by Legal Procurement
- Cathleen rolled out a refreshed severance pay plan of this type
Down
- A delicious celebration of this was held on March 14
- The topic of our upcoming CLE conducted by the Orrick team
- Privacy is considered one of these when it comes to Trustworthy AI
- One of the firms with which Ops negotiated a 10% discount
- The IP team has developed a Registration Policy for these
- Sunny is working on RC’s Class A Certificate Application in this country
- Nikki & Jose are working to launch version 2.0 of this program
- One of RC India’s first customer agreements negotiated by Mandakini
- Jay & Allison conducted one of these on Export for our lunch-n-learn series
- AnneSophie’s favorite snack
19 Clues: AnneSophie’s favorite snack • The office in this location is nearly complete • A delicious celebration of this was held on March 14 • International Data Privacy Day happens in this month • One of our oldest litigations which was resolved in Q1 • Paul conducted a lunch-n-learn on this type of trading • One of the firms with which Ops negotiated a 10% discount • ...
Technology Vocabulary 2023-09-08
Across
- The physical components of a computer system.
- Programs that run on computers and devices.
- (Hypertext Markup Language) The standard language for creating web pages.
- (Basic Input/Output System) Software that initializes and controls hardware during computer startup.
- A global network that connects computers and information.
- A security system that protects a network from unauthorized access.
- A mobile device with advanced computing capabilities.
- Software used to access and view websites on the internet.
- A structured collection of data organized for easy retrieval.
- Computing Storing and accessing data and programs over the internet.
- Measures taken to protect computer systems and data from theft or damage.
Down
- Code (Quick Response Code) A two-dimensional barcode used to store information for quick access.
- The process of converting data into a coded form to secure it.
- Software designed to harm, disrupt, or gain unauthorized access to computers.
- Positioning System) A satellite-based navigation system for determining location.
- Cache Temporary storage of web pages to speed up loading times.
- A wired network technology commonly used for internet connections.
- A step-by-step procedure for solving a problem or task.
- System Software that manages computer hardware and provides services.
- Resource Locator) The web address used to locate a specific resource on the internet.
20 Clues: Programs that run on computers and devices. • The physical components of a computer system. • A mobile device with advanced computing capabilities. • A step-by-step procedure for solving a problem or task. • A global network that connects computers and information. • Software used to access and view websites on the internet. • ...
TERMINOLOGIES RELATED TO RA 10175 2023-10-25
Across
- gathering and receiving information
- transmission of information through information and communication technology
- a set of instructions executed by the computer to achieve intended results
- digital information that may be used as evidence in a case
- refers to the computer systems, and/or networks, whether physical or virtual
- person who created or is the origin of the assailed electronic statement
- collection of tools, policies, risk management approaches and actions
- an electronic, magnetic, optical, electrochemical, or other data processing
- a person who hosts or who proposes to host internet content
- an exact bit-by-bit copy of a data carrier
Down
- either the Cybercrime Investigation and Coordinating Center
- modification or change, in form or substance, of an existing computer data or program
- representation of information, knowledge, facts, concepts or instructions which are being prepared
- mathematical algorithm produced against digital information
- keeping of data that already exists in a stored form
- listening to, recording, monitoring or surveillance of the content of communications
- refers to evidence, the use of which is sanctioned by existing rules of evidence
- any representation of facts, information, or concepts in a form suitable for processing in a computer system
- willful engagement, maintenance, control or operation, directly or indirectly
19 Clues: gathering and receiving information • an exact bit-by-bit copy of a data carrier • keeping of data that already exists in a stored form • digital information that may be used as evidence in a case • either the Cybercrime Investigation and Coordinating Center • mathematical algorithm produced against digital information • ...
Threat Intelligence (Medium) 2023-06-01
Across
- A type of cyberattack that uses deception to trick individuals into revealing sensitive information.
- A software vulnerability that is known and can be exploited by attackers.
- The process of analyzing and evaluating threats to identify potential risks and vulnerabilities.
- A malicious software that disguises itself as legitimate software to gain unauthorized access or cause harm.
- The process of gathering and analyzing information to identify and mitigate potential threats.
Down
- An individual or group that conducts unauthorized activities to gain access to computer systems.
- A technique used to deceive individuals or systems by pretending to be a trusted entity.
- The process of identifying, categorizing, and prioritizing potential threats or vulnerabilities.
- A set of predefined rules or criteria used to identify potential threats or suspicious activities.
- An attack in which multiple compromised devices are used to flood a network or website with traffic.
- A comprehensive plan designed to detect, respond to, and recover from cybersecurity incidents.
11 Clues: A software vulnerability that is known and can be exploited by attackers. • A technique used to deceive individuals or systems by pretending to be a trusted entity. • A comprehensive plan designed to detect, respond to, and recover from cybersecurity incidents. • The process of gathering and analyzing information to identify and mitigate potential threats. • ...
26 2024-01-08
Across
- Work Working from a location other than the central office, often from home.
- Disturbance or problems that interrupt an event, activity, or process.
- A digital or virtual form of currency that uses cryptography for security.
- A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
- The activity of exploiting genetic material experimentally without regard to ethical considerations.
- The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
Down
- Commercial transactions conducted electronically on the Internet.
- A step-by-step procedure or formula for solving a problem or accomplishing a task.
- Reality An artificial environment created with the help of computer technology, often including simulated physical presence.
- The remote diagnosis and treatment of patients by means of telecommunications technology.
- Change Long-term change in the average weather patterns that have come to define Earth's local, regional, and global climates. (Note: Repeated for variety.)
- Including all or everyone; not excluding any particular group or individual.
12 Clues: Commercial transactions conducted electronically on the Internet. • Disturbance or problems that interrupt an event, activity, or process. • A digital or virtual form of currency that uses cryptography for security. • Work Working from a location other than the central office, often from home. • ...
ciao 2022-02-03
Across
- : is encrypted text transformed from clear text using a configuration algorithm
- : computer scam carried out by sending an e-mail with the counterfeit logo of a credit institution, in which the recipient is invited to provide confidential data.
- :represents information security
Down
- : is the expression used to refer to encrypted and not freely accessible content located on darknets, dark and "parallel" networks accessible only through specific configurations and specific access authorizations.
- : decrypted, simple, clean text
- : it is the process of encoding information
- : is the portion of the World Wide Web that is readily available to the general public and searchable with standard web search engines
7 Clues: : decrypted, simple, clean text • :represents information security • : it is the process of encoding information • : is encrypted text transformed from clear text using a configuration algorithm • : is the portion of the World Wide Web that is readily available to the general public and searchable with standard web search engines • ...
Do you know these automation terms? 2021-10-12
Across
- Precautions to guard against crime on the internet
- The ability of the automation software to communicate and work with other programs and technology
Down
- the precise instructions telling the computer how to do a task or manipulate data.
- A series of tasks or processes that take a given job from start to completion.
- Initials for combination of hardware and software used for industrial automation.
5 Clues: Precautions to guard against crime on the internet • A series of tasks or processes that take a given job from start to completion. • Initials for combination of hardware and software used for industrial automation. • the precise instructions telling the computer how to do a task or manipulate data. • ...
RISK 101 2023-01-31
Across
- Platform for capturing incidents
- is the third line of defense
- where our production servers are located
- chatbot in RMP that can respond to your risk queries
- is the anonymous reporting
- is the uncertainty that objectives will not be met
Down
- is short for risk and self control assessment
- is a type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
- risk is the risk of financial or reputational loss that can result from lack of awareness or misunderstanding of, ambiguity in, or reckless indifference to, the way law and regulation apply to your business, its relationships, processes, products and services
- risk is the risk of loss suffered as a result of the inadequacy of, or failure in, internal processes, people and/or systems or from external events.
10 Clues: is the anonymous reporting • is the third line of defense • Platform for capturing incidents • where our production servers are located • is short for risk and self control assessment • is the uncertainty that objectives will not be met • chatbot in RMP that can respond to your risk queries • ...
Total Defence Day 2022 2022-01-20
Across
- The Total Defence song "There's a Part for _ _ _ _ _ _ _ _" was written in 1984
- Digital Defence is the new sixth pillar of Total Defence. It requires Singaporean to practice good _ _ _ _ _ - _ _ _ _ _ _ _ _
Down
- Civil Defence provides for the _ _ _ _ _ _ and basic needs of the whole community so that life may go on as normally as possible during emergencies.
- Learning life-saving skills such as _ _ _ can prepare you to help others in an emergency
- You should call 995 for _ _ _ _ _ _ _ _ _ and 1777 for non-emergency
- _ _ _ _ _ _ _ _ Defence is about having an SAF that is able to deter aggression
6 Clues: You should call 995 for _ _ _ _ _ _ _ _ _ and 1777 for non-emergency • The Total Defence song "There's a Part for _ _ _ _ _ _ _ _" was written in 1984 • _ _ _ _ _ _ _ _ Defence is about having an SAF that is able to deter aggression • Learning life-saving skills such as _ _ _ can prepare you to help others in an emergency • ...
Imp. of Misuse and Cybersecurity 2020-12-03
Across
- involve the use of websites and email messages that try to trick you into entering your personal information
- battery which supplies equipment with electricity during power outage
- monitors incoming and outgoing network traffic based on a set of security rules
- internally produced software
Down
- involves trying to electronically break into a system without authorization
- hardware device keystroke loggers implanted in the keyboard
- spreading both beneficial and harmful material using computer systems
- preserves file that you no longer need
- damage can occur when there is a planned attempt to bypass all legitimate access restrictions
- making copies of files
- an electronic threat that does not require a host program
- receiving lots of junk email
12 Clues: making copies of files • receiving lots of junk email • internally produced software • preserves file that you no longer need • an electronic threat that does not require a host program • hardware device keystroke loggers implanted in the keyboard • spreading both beneficial and harmful material using computer systems • ...
Digital Citizenship and Cyber Hygiene Vocabulary 2022-09-20
Across
- How companies use your data
- Identity theft, stealing money, stealing private information, controlling private computers.
- A type of cyber-attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- Attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.
Down
- Protection of computer systems, networks, and data from digital attacks.
- The information about a particular person that exists on the Internet as a result of their online activity.
- A computer security specialist who breaks into protected systems and networks to test and assess their security
- The use of electronic communication to bully a person
- Legal document outlining how a company can collect and use your data
10 Clues: How companies use your data • The use of electronic communication to bully a person • Legal document outlining how a company can collect and use your data • Protection of computer systems, networks, and data from digital attacks. • Identity theft, stealing money, stealing private information, controlling private computers. • ...
Information Technology enabled services 2024-06-09
Across
- Temporary storage for frequently used data (like a computer's short-term memory).
- A network of interconnected virtual worlds (like a universe built on computers).
- Rules that govern communication between devices (like a language for computers to talk).
- The trail of data you leave behind online (like your footsteps on the digital world).
- An automated program that performs tasks online (like a tireless digital assistant).
Down
- Protecting information systems from cyberattacks (like building a fort for your data).
- Software program that understands voice commands and helps you with tasks (like a digital genie).
- Software with freely available code that anyone can modify (like a recipe everyone can share and improve).
- The secret code that unlocks encrypted data (like the key to a treasure chest).
- Software that sorts unwanted emails from important ones (like a digital trash can).
10 Clues: The secret code that unlocks encrypted data (like the key to a treasure chest). • A network of interconnected virtual worlds (like a universe built on computers). • Temporary storage for frequently used data (like a computer's short-term memory). • Software that sorts unwanted emails from important ones (like a digital trash can). • ...
types of hazards 2024-01-11
Across
- A sudden and unexpected event that can cause harm or damage in the office environment.
- Hazardous situations that may result from poor ergonomic design of office furniture or equipment.
- The risk of data breaches, unauthorized access, or loss of sensitive information in the office.
- The threat of violence or harm in the workplace, including bullying and harassment.
Down
- The risk of fire, whether from faulty wiring, electronic devices, or other sources in the office.
- Issues related to inadequate lighting, ventilation, or air quality in the office.
- Potential dangers related to the use of electrical equipment or wiring in the office.
- Risks associated with slips, trips, and falls in the office space.
- Exposure to harmful substances, such as chemicals or allergens, present in the office environment.
- The risk of exposure to harmful microorganisms or infectious diseases within the office.
10 Clues: Risks associated with slips, trips, and falls in the office space. • Issues related to inadequate lighting, ventilation, or air quality in the office. • The threat of violence or harm in the workplace, including bullying and harassment. • Potential dangers related to the use of electrical equipment or wiring in the office. • ...
types of hazards 2024-01-11
Across
- The threat of violence or harm in the workplace, including bullying and harassment.
- Exposure to harmful substances, such as chemicals or allergens, present in the office environment.
- The risk of exposure to harmful microorganisms or infectious diseases within the office.
- Risks associated with slips, trips, and falls in the office space.
- Hazardous situations that may result from poor ergonomic design of office furniture or equipment.
Down
- Issues related to inadequate lighting, ventilation, or air quality in the office.
- The risk of data breaches, unauthorized access, or loss of sensitive information in the office.
- Potential dangers related to the use of electrical equipment or wiring in the office.
- The risk of fire, whether from faulty wiring, electronic devices, or other sources in the office.
- A sudden and unexpected event that can cause harm or damage in the office environment.
10 Clues: Risks associated with slips, trips, and falls in the office space. • Issues related to inadequate lighting, ventilation, or air quality in the office. • The threat of violence or harm in the workplace, including bullying and harassment. • Potential dangers related to the use of electrical equipment or wiring in the office. • ...
UNIT 5.9 Management Information Systems 2024-08-14
Across
- a method of industrial management designed to increase efficiency and productivity
- is a leading global vendor of computer software
- protecting computer networks from hacks
- Covers the entire spectrum of analyzing data to derive insights and support decision-making.
- a process used by businesses to identify and summarize patterns within data by using software to look for patterns in large batches of data.
- refers to data centres on the internet.
Down
- something of an averall term for 'smart' technologies that are aware of and can learn from their environments to assist or support human decision-making.
- a simulation of a complete environment where the user can interact with.
- occurs when individuals or businesses undertake illegal online activities
- refers to large, complex data sets whose size or type is beyond the ability of traditional relational databases to capture
10 Clues: protecting computer networks from hacks • refers to data centres on the internet. • is a leading global vendor of computer software • a simulation of a complete environment where the user can interact with. • occurs when individuals or businesses undertake illegal online activities • ...
QUIZ #2 -MEDIA AND INFORMATION LITERACY 2024-08-18
Across
- It is known as the information age.
- It refers to the person and their responsible and ethical use of technology and online resources.
- It is the ability to identify, locate, evaluate, and effectively use information.
- It refers to an act concerning to safe space inside the internet including cyberbullying.
- It is a Legal regulation governing online behavior.
Down
- It is the ability to use digital technologies and internet resources.
- It is an act concerning to use of online material without the permission of the owner.
- It is the ability to access, analyze, evaluate, and create media in various forms.
- It is a general term for the set of rules and guidelines governing respectful and effective communication on the internet.
- It refers to an act securing that online information is safe from harmful use of others.
10 Clues: It is known as the information age. • It is a Legal regulation governing online behavior. • It is the ability to use digital technologies and internet resources. • It is the ability to identify, locate, evaluate, and effectively use information. • It is the ability to access, analyze, evaluate, and create media in various forms. • ...
Digital literacy keywords 2024-09-17
Across
- Effective use of digital platforms (email, social media, messaging apps) for communication.
- Using technology to solve problems, fix technical issues, and try new digital tools for specific tasks.
- Understanding the impact of sharing personal information online and managing privacy settings on digital platforms.
- Evaluating digital content for credibility, bias, and intent, and identifying and addressing misinformation, disinformation, and fake news.
- Awareness of the lasting impact of online activities, including social media posts, search histories, and other traces left online.
- Ability to use different technological tools and applications (e.g. computers, smart devices, software programmes.
- Understanding how to protect personal data, privacy, and digital identity.
Down
- Ability to find, evaluate, and use digital information effectively.
- Ability to analyze, evaluate, and produce digital media, including text, images, and videos.
- Understanding the ethical and legal consequences of digital actions, like respecting copyrights and behaving responsibly online.
10 Clues: Ability to find, evaluate, and use digital information effectively. • Understanding how to protect personal data, privacy, and digital identity. • Effective use of digital platforms (email, social media, messaging apps) for communication. • Ability to analyze, evaluate, and produce digital media, including text, images, and videos. • ...
Top 10 Challenges in Healthcare Today 2024-11-11
Across
- The pandemic increased cases of depression, anxiety, and substance use disorders, straining mental health services.
- COVID-19 highlighted the need for resilient healthcare infrastructure to handle future crises.
- Shortages of RNs, technicians, and specialists strain the healthcare system, especially in rural areas.
- Barriers like high costs and lack of insurance prevent access to essential preventive services.
- Changing reimbursement models challenge providers to balance finances with quality care.
Down
- Systemic barriers create gaps in health outcomes, particularly among marginalized populations.
- Healthcare is a prime target for cyberattacks due to the sensitivity of patient data.
- Advances in digital health and AI improve care but require strong data management and security.
- Increasing expenses for labor, supplies, and services create financial pressure on healthcare organizations.
- An older population requires extensive resources for managing chronic diseases and long-term care.
10 Clues: Healthcare is a prime target for cyberattacks due to the sensitivity of patient data. • Changing reimbursement models challenge providers to balance finances with quality care. • Systemic barriers create gaps in health outcomes, particularly among marginalized populations. • ...
Cybersecurity Fundamentals Chapter 4 Part 2 2022-10-25
Across
- uses at least two methods of verification.
- restricts the actions that a subject can perform on an object.
- keeps something from happening.
- conceals data in another file such as a graphic, audio, or other text file.
- return to restore back to a state of Confidentially, integrity and availability.
- passwords, passphases, or pins are examples of something that the user knows.
- opposite of a reward.
Down
- use and practice of data masking and steganography techniques.
- counteracts something that is undesirable.
- smart cards and security key fobs are examples of something that users have in their possession.
- replaces data with authentic looking values to apply anonymity to the data records.
- to make up for something.
- unique physical characteristics, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
- uses access control lists (ACLs) to help determine whether to grant access.
- derives from substitution set from the same column of data that a user wants to mask.
- is the act or process of noticing or discovering something.
16 Clues: opposite of a reward. • to make up for something. • keeps something from happening. • counteracts something that is undesirable. • uses at least two methods of verification. • is the act or process of noticing or discovering something. • use and practice of data masking and steganography techniques. • restricts the actions that a subject can perform on an object. • ...
Encapsualtion 2024-03-17
Across
- Overriding in Object-Oriented Programming
- In this system a patient class could encapsulate the patient's personal information etc
- Plays a crucial role in securing sensitive information and preventing unauthorized acess
Down
- Allows a subclass to provide a specific implementation of method thats is already provided by its superclass
- A class may be created to encapsulate the account details such as account number balance and transaction history
5 Clues: Overriding in Object-Oriented Programming • In this system a patient class could encapsulate the patient's personal information etc • Plays a crucial role in securing sensitive information and preventing unauthorized acess • Allows a subclass to provide a specific implementation of method thats is already provided by its superclass • ...
Digital/Cyber Literacy 2023-07-11
Across
- The growths of the Internet gave rise to many important services accessible to anyone with a connection, such as digital communication
- refers to the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection.
Down
- the set of competencies required for full participation in society that includes knowledge, skills, and behaviors
- refers to the act of staying safe online.
- the practice of protecting systems, networks and programs from digital attacks.
- refers to being responsible when using the internet
6 Clues: refers to the act of staying safe online. • refers to being responsible when using the internet • the practice of protecting systems, networks and programs from digital attacks. • the set of competencies required for full participation in society that includes knowledge, skills, and behaviors • ...
Cyber security 2023-04-21
Across
- verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer
- facts provided or learned about something or someone.
- malware that replicates and transfers itself to other computers via a network
Down
- The authorization given to users that enables them to access specific resources on the network,
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
- someone who hacks into your account
- information that has been translated into a form that is efficient for movement or processing
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
8 Clues: someone who hacks into your account • facts provided or learned about something or someone. • malware that replicates and transfers itself to other computers via a network • information that has been translated into a form that is efficient for movement or processing • ...
ATL Crossword 2023-10-16
Across
- A term for a situation in which a system or network is completely isolated from other networks for security.
- A type of cybersecurity threat that mimics legitimate software but is malicious in nature.
- A group of computers controlled by an attacker to carry out tasks without the user's knowledge.
- A type of malware named after a deceptive ancient Greek tactic.
Down
- A form of authentication that relies on a physical attribute, like a fingerprint or iris scan.
- A set of rules or configurations that dictate which network traffic is allowed or blocked.
- A common form of cyber attack involving massive amounts of traffic to overwhelm a target system.
- A type of malware that can spread autonomously through networks.
8 Clues: A type of malware named after a deceptive ancient Greek tactic. • A type of malware that can spread autonomously through networks. • A set of rules or configurations that dictate which network traffic is allowed or blocked. • A type of cybersecurity threat that mimics legitimate software but is malicious in nature. • ...
SN33003FP Chapter 2 Crossword 2024-07-03
Across
- Prevents disclosure of information to unauthorized people, also known as privacy
- Defines security objectives, behavioral rules, and system requirements to secure assets
- Provides technical direction for implementing and configuring technology to fulfill policy directives
- Relates to organization's cybersecurity policies, procedures, and guidelines set by upper management
- Focuses on protecting all states of data: at rest or in storage, in transit, or in process
- The goals to protect cyberspace, including confidentiality, integrity, and availability (CIA Triad)
- Data being sent from one device to another
Down
- Making security awareness part of employee onboarding and ongoing training
- Software, hardware, network, and cloud-based tools used to safeguard an organization's assets
- Accuracy, consistency, and trustworthiness of data throughout its lifecycle
- Ensures access to information systems and services at all times
- Data during input, modification, computation, or output stages
- Identifies expertise required for protection, including technology, policies/procedures/guidelines, and people
- Stored data retained on storage devices when not actively used
14 Clues: Data being sent from one device to another • Data during input, modification, computation, or output stages • Stored data retained on storage devices when not actively used • Ensures access to information systems and services at all times • Making security awareness part of employee onboarding and ongoing training • ...
Safety Crossword 2022-10-20
Across
- what does PPE stand for?
- a tornado _______ means a tornado has been spotted or a radar has picked one up
- regulatory agency that inspects and examines workplaces
- when you are on a boat, canoe, or kayak, make sure you always wear a __________
- if you see someone doing something unsafe on the job, you should use your _________________
- infectious microorganisms in human blood that can cause disease in humans
- you can help prevent back problems by having good _______
- protection for your head
Down
- an unplanned event that did not result in injury, illness or damage, but had the potential to do so
- offers a way for all employees to confirm their dedication to positive safety behavior each year
- a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
- the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
- you should check the batteries of your smoke detector _______
- protection for your hands
- aerosols, nail polish and cooking oils are all highly ________
- protection for your eyes
16 Clues: what does PPE stand for? • protection for your eyes • protection for your head • protection for your hands • regulatory agency that inspects and examines workplaces • you can help prevent back problems by having good _______ • you should check the batteries of your smoke detector _______ • aerosols, nail polish and cooking oils are all highly ________ • ...
Cyber Security Month 2023 2023-09-01
Across
- Processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- The ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans
- An important process that verifies a user is really who they are; many was this can be done
- An example would be an email from a Nigerian prince asking you for your personal details including bank details to you can receive millions of dollars
- An attack that hijacks your system and denies you access until you send money
- Characteristics used to identify a person
- The form of encryption that requires two different credentials
- Malware hidden as an attachment or free download
Down
- The state of being free from danger for threat
- Bullying that takes place online
- Type of cyber attack where a person is tricked into give information via a text message
- Digital currency, preference for hackers
- A person who tries to gain unauthorised access to a network or computer system.
- When a hacker successfully exploits a device and gains access to files and data
- An annoying malware that spams you with ads
- A fraudulent or deceptive act or operation
16 Clues: Bullying that takes place online • Digital currency, preference for hackers • Characteristics used to identify a person • A fraudulent or deceptive act or operation • An annoying malware that spams you with ads • The state of being free from danger for threat • Malware hidden as an attachment or free download • ...
Advance Adjectives 2024-02-10
Across
- The antique watch, passed down through generations, was not only ______ but also held sentimental value for the family.
- After a long hike, the hikers enjoyed a ______ dip in the cool mountain stream.
- The new sports car boasted a ______ design, turning heads as it sped down the highway.
- The student's apartment was small but well-organized, making clever use of ______ furniture to maximize space.
- The antique store showcased a collection of ______ clothing and accessories from the 1920s.
Down
- The suburban neighborhood was known for its ______ streets, lined with tall, green trees.
- The children's book was filled with ______ illustrations of talking animals and enchanted landscapes.
- The company invested in a ______ cybersecurity system to protect sensitive customer data from potential threats.
8 Clues: After a long hike, the hikers enjoyed a ______ dip in the cool mountain stream. • The new sports car boasted a ______ design, turning heads as it sped down the highway. • The suburban neighborhood was known for its ______ streets, lined with tall, green trees. • The antique store showcased a collection of ______ clothing and accessories from the 1920s. • ...
Co-Worker Crossword 2022-10-04
Across
- I was a competitive figure skater until I was 17, and I also know how to play the piano.
- If you see a suit and tie, it is probably I!
- I am an avid ice fisherman
- From 1989 until now I have worked at a total of 6 businesses, all of which were similar positions to what I do now!
- I am responsible for Ortho's IT functions and cybersecurity. I have also run four Chicago Marathons and one Ultra-Marathon!
Down
- I am the liasion between Customer Service and IT. A jack of all trades, you could say.
- I was born in Idaho
- I am a pilot and have a black belt in CRM.
8 Clues: I was born in Idaho • I am an avid ice fisherman • I am a pilot and have a black belt in CRM. • If you see a suit and tie, it is probably I! • I am the liasion between Customer Service and IT. A jack of all trades, you could say. • I was a competitive figure skater until I was 17, and I also know how to play the piano. • ...
Computer science 2024-04-17
Across
- A processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- The process of identifying someone's or something's identity
- The large system of connected computers around the world that allows people to share information and communicate with each other
- An Internet Protocol that allocates numbers to router servers, or anything connected to the Internet
Down
- A piece of audio or video that has been altered and changed to make it seem authentic or credible
- The delivery of computing servers, storage, databases, networking, software, analytics, and intelligence
- A network of computers used to carry out cyberattacks on other systems
- A means to support network communication using radio waves rather than cables
8 Clues: The process of identifying someone's or something's identity • A network of computers used to carry out cyberattacks on other systems • A means to support network communication using radio waves rather than cables • A piece of audio or video that has been altered and changed to make it seem authentic or credible • ...
cyber security 2024-10-25
Across
- Injection Hacker: Attempts to break into a system by manipulating data input.
- Acts as a security barrier, inspecting every request and filtering threats.
- Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- Specialist: Protects a company from cyber threats.
Down
- Developer: Creates harmful software to damage the network.
- Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- The process of converting information or data into a code to prevent unauthorized access.
- Scammer: Tries to steal information by impersonating a trusted entity.
10 Clues: Specialist: Protects a company from cyber threats. • Developer: Creates harmful software to damage the network. • Scammer: Tries to steal information by impersonating a trusted entity. • Acts as a security barrier, inspecting every request and filtering threats. • Injection Hacker: Attempts to break into a system by manipulating data input. • ...
cyber security 2024-10-25
Across
- Injection Hacker: Attempts to break into a system by manipulating data input.
- Acts as a security barrier, inspecting every request and filtering threats.
- Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- Specialist Protects a company from cyber threats.
Down
- Creates harmful software to damage the network.
- Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- The process of converting information or data into a code to prevent unauthorized access.
- Tries to steal information by impersonating a trusted entity.
10 Clues: Creates harmful software to damage the network. • Specialist Protects a company from cyber threats. • Tries to steal information by impersonating a trusted entity. • Acts as a security barrier, inspecting every request and filtering threats. • Injection Hacker: Attempts to break into a system by manipulating data input. • ...