cybersecurity Crossword Puzzles
cyber security 2024-10-25
Across
- Injection Hacker: Attempts to break into a system by manipulating data input.
- Acts as a security barrier, inspecting every request and filtering threats.
- Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- Specialist Protects a company from cyber threats.
Down
- Creates harmful software to damage the network.
- Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- The process of converting information or data into a code to prevent unauthorized access.
- Tries to steal information by impersonating a trusted entity.
10 Clues: Creates harmful software to damage the network. • Specialist Protects a company from cyber threats. • Tries to steal information by impersonating a trusted entity. • Acts as a security barrier, inspecting every request and filtering threats. • Injection Hacker: Attempts to break into a system by manipulating data input. • ...
Safety Crossword 2022-10-20
Across
- aerosols, nail polish and cooking oils are all highly ________
- if you see someone doing something unsafe on the job, you should use your _________________
- an unplanned event that did not result in injury, illness or damage, but had the potential to do so
- protection for your hands
- the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
Down
- offers a way for all employees to confirm their dedication to positive safety behavior each year
- a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
- when you are on a boat, canoe, or kayak, make sure you always wear a __________
- a tornado _______ means a tornado has been spotted or a radar has picked one up
- regulatory agency that inspects and examines workplaces
- you can help prevent back problems by having good _______
- you should check the batteries of your smoke detector _______
- protection for your eyes
- protection for your head
14 Clues: protection for your eyes • protection for your head • protection for your hands • regulatory agency that inspects and examines workplaces • you can help prevent back problems by having good _______ • you should check the batteries of your smoke detector _______ • aerosols, nail polish and cooking oils are all highly ________ • ...
AI ETHICS 2022-02-16
Across
- This estimates that by 2030, 30% of all jobs will be automated.
- The presence of security cameras everywhere has created issues in regards to _________ and inspection.
- This is one of the major concerns of companies, especially in the governmental and financial services sector.
Down
- The industrial and _________ revolution has changed society.
- Fake news mixed into accurate and ______based news is considered the biggest threat to democracy.
- _______safety and the reduction of crime rates are the greatest justifiers for the use of this technology.
6 Clues: The industrial and _________ revolution has changed society. • This estimates that by 2030, 30% of all jobs will be automated. • Fake news mixed into accurate and ______based news is considered the biggest threat to democracy. • The presence of security cameras everywhere has created issues in regards to _________ and inspection. • ...
Meridian: 6 Pillars 2022-12-19
Across
- This pillar delivers specialized tools for managing workflows and processes.
- This pillar transforms any sized utility into an analytical powerhouse. Use these tools to create smart solutions driven by data.
- This pillar provides omni-channel communication solutions designed especially for utilities.
- This pillar keeps office crews, field crews, and their technology on the same page.
Down
- This pillar includes our core CIS, FIS, and GIS suites that offer the functionality your utility needs to easily and efficiently run your organization.
- This pillar helps you maintain constant vigilance against potential threats.
6 Clues: This pillar delivers specialized tools for managing workflows and processes. • This pillar helps you maintain constant vigilance against potential threats. • This pillar keeps office crews, field crews, and their technology on the same page. • This pillar provides omni-channel communication solutions designed especially for utilities. • ...
Skyworks Cybersecurity Awareness Month 2024-04-26
Across
- Cyber attack that tricks people into revealing sensitive information through email, texts, or phone calls
- The practice of protecting systems, networks, and programs from digital attacks
- a person who uses computers to gain unauthorized access to data
Down
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- the process or action of verifying the identity of a user or process
- who is responsible for the security of an organization?
6 Clues: who is responsible for the security of an organization? • a person who uses computers to gain unauthorized access to data • the process or action of verifying the identity of a user or process • The practice of protecting systems, networks, and programs from digital attacks • ...
CSAM20 Week 1 2020-09-02
Across
- A malicious software program used to record every key stroke made on keyboards, giving hackers the ability to determine account information.
- Social engineering and scams are designed to trick users into giving up their _____ information.
- A network type publicly open to everyone, including hackers.
- Who sings the famous song, Eye of the Tiger?
- Fraudulent use of a person's confidential identifying information is known as _____ theft.
- Another word used for "malicious software".
Down
- The art of protecting software, hardware and data on computer systems and networks against malicious activity.
- A malicious software disguised as a legitimate program.
- Phishing involves attachments or illegitimate website links sent via _____ that consist of malware or impersonates credible sources in attempt to receive confidential information.
- An unwanted software that steals your internet usage data and confidential information, watching your every move.
10 Clues: Another word used for "malicious software". • Who sings the famous song, Eye of the Tiger? • A malicious software disguised as a legitimate program. • A network type publicly open to everyone, including hackers. • Fraudulent use of a person's confidential identifying information is known as _____ theft. • ...
ADSI Terms Sebastian Salazar 2022-02-11
Across
- A system of words, letters, or signs used to create programs, apps or web pages.
- person who writes computer programs.
- The rules that programming languages have for typing their codes right.
- collection of instructions that connect the hardware and tell a computer how to work.
- is the global system of interconnected computer networks.
- the part of an application that performs an essential task not apparent to the user.
Down
- Is the application of processes and controls with technologies to protect systems, networks, programs, devices and data from crackers or bad hackers.
- An image or set of images which displays the functional elements of a website, information system or an app.
- an organized collection of structured information, or data, typically stored electronically in a computer system.
- A computer program designed to help people perform an activity.
10 Clues: person who writes computer programs. • is the global system of interconnected computer networks. • A computer program designed to help people perform an activity. • The rules that programming languages have for typing their codes right. • A system of words, letters, or signs used to create programs, apps or web pages. • ...
types of hazards 2024-01-11
Across
- Risks associated with slips, trips, and falls in the office space.
- The threat of violence or harm in the workplace, including bullying and harassment.
- Potential dangers related to the use of electrical equipment or wiring in the office.
- Issues related to inadequate lighting, ventilation, or air quality in the office.
Down
- Hazardous situations that may result from poor ergonomic design of office furniture or equipment.
- The risk of exposure to harmful microorganisms or infectious diseases within the office.
- A sudden and unexpected event that can cause harm or damage in the office environment.
- The risk of data breaches, unauthorized access, or loss of sensitive information in the office.
- Exposure to harmful substances, such as chemicals or allergens, present in the office environment.
- The risk of fire, whether from faulty wiring, electronic devices, or other sources in the office.
10 Clues: Risks associated with slips, trips, and falls in the office space. • Issues related to inadequate lighting, ventilation, or air quality in the office. • The threat of violence or harm in the workplace, including bullying and harassment. • Potential dangers related to the use of electrical equipment or wiring in the office. • ...
Safety Crossword 2022-10-20
Across
- you should check the batteries of your smoke detector _______
- infectious microorganisms in human blood that can cause disease in humans
- offers a way for all employees to confirm their dedication to positive safety behavior each year
- what does PPE stand for?
- when you are on a boat, canoe, or kayak, make sure you always wear a __________
- an unplanned event that did not result in injury, illness or damage, but had the potential to do so
- you can help prevent back problems by having good _______
- protection for your head
Down
- regulatory agency that inspects and examines workplaces
- a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
- a tornado _______ means a tornado has been spotted or a radar has picked one up
- aerosols, nail polish and cooking oils are all highly ________
- protection for your hands
- the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
- protection for your eyes
- if you see someone doing something unsafe on the job, you should use your _________________
16 Clues: what does PPE stand for? • protection for your eyes • protection for your head • protection for your hands • regulatory agency that inspects and examines workplaces • you can help prevent back problems by having good _______ • you should check the batteries of your smoke detector _______ • aerosols, nail polish and cooking oils are all highly ________ • ...
Safety Crossword 2022-10-20
Across
- regulatory agency that inspects and examines workplaces
- an unplanned event that did not result in injury, illness or damage, but had the potential to do so
- you can help prevent back problems by having good _______
- aerosols, nail polish and cooking oils are all highly ________
- a tornado _______ means a tornado has been spotted or a radar has picked one up
- you should check the batteries of your smoke detector _______
- a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
- offers a way for all employees to confirm their dedication to positive safety behavior each year
- the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
- what does PPE stand for?
Down
- protection for your hands
- if you see someone doing something unsafe on the job, you should use your _________________
- when you are on a boat, canoe, or kayak, make sure you always wear a __________
- protection for your head
- protection for your eyes
- infectious microorganisms in human blood that can cause disease in humans
16 Clues: protection for your head • protection for your eyes • what does PPE stand for? • protection for your hands • regulatory agency that inspects and examines workplaces • you can help prevent back problems by having good _______ • you should check the batteries of your smoke detector _______ • aerosols, nail polish and cooking oils are all highly ________ • ...
Business Continuity Awareness Week 2022 2022-07-04
Across
- One of major paradigm shift in the workforce.
- What is the latest overseas company that has completed their BCMS Implementation as per the latest post in BCM's Yammer page?
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- to build a success for program in microsimulations.
- The biggest threat to Cybersecurity is human _______.
- Involvement and enthusiasm in resilience
- The capacity to recover quickly from difficulties.
Down
- Acknowledge new _________ in addition to the opportunities that hybrid world provides businesses and employees.
- In order to prepare for cyber resilience, speed and agility are required.
- A thing made by combining two different elements.
- Group CMT Members’ ‘Rose Among the Thorns’
- What app can WOWriors get more information about Business Continuity and Organisational Resilience from UMW Office 365?
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture.
- What is the third UMW Group BCM risk events.
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities.
- One of hybrid Pros and Cons is reliance on home utilities and ___________.
16 Clues: Involvement and enthusiasm in resilience • Group CMT Members’ ‘Rose Among the Thorns’ • What is the third UMW Group BCM risk events. • One of major paradigm shift in the workforce. • A thing made by combining two different elements. • The capacity to recover quickly from difficulties. • to build a success for program in microsimulations. • ...
Cybersecurity Fundamental Chapter 3 Part 2 2022-10-18
Across
- looking over one's shoulder to get their pin or access code.
- records or logs the keystrokes of the user of the system.
- action of pretending to be someone else
- intercepting communication between computers to steal information crossing the network.
- examines all network traffic as it passes through their Network Interface Card (NIC).
- criminal tags along with an authorized person to gain entry into a secured location.
- use short message service (sms) to send fake text messages
- impersonation attack, and it takes advantage of a trusted relationship between two systems.
- involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
Down
- one man's trash is another man's treasure
- non-technical means for a criminal to gather information on a target.
- an attacker requests personal information from a party in exchange for something like a gift.
- a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
- posing as a IRAS employee, told the victim that they own money to IRAS.
- attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
- application that behave in an annoying or undesirable manner.
16 Clues: action of pretending to be someone else • one man's trash is another man's treasure • records or logs the keystrokes of the user of the system. • use short message service (sms) to send fake text messages • looking over one's shoulder to get their pin or access code. • application that behave in an annoying or undesirable manner. • ...
Cybersecurity 2024-05-16
Cybersecurity Fundamentals Chapter 4 Part 2 2022-10-25
Across
- uses at least two methods of verification.
- restricts the actions that a subject can perform on an object.
- keeps something from happening.
- conceals data in another file such as a graphic, audio, or other text file.
- return to restore back to a state of Confidentially, integrity and availability.
- passwords, passphases, or pins are examples of something that the user knows.
- opposite of a reward.
Down
- use and practice of data masking and steganography techniques.
- counteracts something that is undesirable.
- smart cards and security key fobs are examples of something that users have in their possession.
- replaces data with authentic looking values to apply anonymity to the data records.
- to make up for something.
- unique physical characteristics, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
- uses access control lists (ACLs) to help determine whether to grant access.
- derives from substitution set from the same column of data that a user wants to mask.
- is the act or process of noticing or discovering something.
16 Clues: opposite of a reward. • to make up for something. • keeps something from happening. • counteracts something that is undesirable. • uses at least two methods of verification. • is the act or process of noticing or discovering something. • use and practice of data masking and steganography techniques. • restricts the actions that a subject can perform on an object. • ...
Cybersecurity Fundamental Chapter 3 Part 2 2022-10-18
Across
- looking over one's shoulder to get their pin or access code.
- records or logs the keystrokes of the user of the system.
- action of pretending to be someone else
- intercepting communication between computers to steal information crossing the network.
- examines all network traffic as it passes through their Network Interface Card (NIC).
- criminal tags along with an authorized person to gain entry into a secured location.
- use short message service (sms) to send fake text messages
- impersonation attack, and it takes advantage of a trusted relationship between two systems.
- involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
Down
- one man's trash is another man's treasure
- non-technical means for a criminal to gather information on a target.
- an attacker requests personal information from a party in exchange for something like a gift.
- a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
- posing as a IRAS employee, told the victim that they own money to IRAS.
- attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
- application that behave in an annoying or undesirable manner.
16 Clues: action of pretending to be someone else • one man's trash is another man's treasure • records or logs the keystrokes of the user of the system. • use short message service (sms) to send fake text messages • looking over one's shoulder to get their pin or access code. • application that behave in an annoying or undesirable manner. • ...
Cybersecurity Awareness Month 2024 Crossword Puzzle 2024-08-26
Across
- Although the keyboard shortcut for copying information is Ctrl + C, the shortcut for pasting information is not Ctrl + P (that's a shortcut for printing). Instead, the shortcut letter for pasting is closer to the shortcuts for copying and cutting. What letter is used to to paste information when clicked synchronously with Ctrl
- technology that enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy (acronym).
- Seven-letter branded software standard created by Apple that enables a car radio or touchscreen to be a display and a controller for an iOS device
- The name of the security company founded in 2006 by two Harvard Business School students who couldn't find a security company designed to help renters? The couple was interested in the field after multiple friends in Cambridge had experienced break-ins. By 2014, the company has raised more than $50 million in venture capital.
- 6-letter term for a group of computers that is networked together and used by hackers to steal information
- Contract Management process used to review and sign all Start Early
- A user identity and access management solution piloted in Start Early that allows users to seamlessly do Single Sign-On (SSO)
- Users are responsible for creating and maintaining the confidentiality of the password associated with their unique user ID
- A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common cyberattack on the internet
Down
- Most common delivery method for viruses
- In 1988, the Morris Worm was created (and released) just to see whether it could be pulled off. As it spread via the Internet, mayhem (and a criminal conviction) followed. It was the first major example of which “highly infectious” computer security threat
- What colorful apparel is also a two-word term for a computer security expert who engages in “ethical hacking” to help expose and fix security flaws within a company’s information system
- On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers
- Delicious computer term did web browser programmer Lou Montulli coin to refer to information that is sent from the browser to the web server
- If you have an iPhone and send a text to another iPhone user via iMessage, the bubbles look blue. If you send a text to an Android user, the bubble is green because it’s being sent as which kind of message?
- According to Michael Scott, there have been eight "IT guys," including Lozenge, Shorts, and Nick, at what fictional company on "The Office?"
16 Clues: Most common delivery method for viruses • Contract Management process used to review and sign all Start Early • 6-letter term for a group of computers that is networked together and used by hackers to steal information • Users are responsible for creating and maintaining the confidentiality of the password associated with their unique user ID • ...
Cybersecurity Fundamental Chapter 6 Part 2 2022-10-27
Across
- in conjunction with one or more other routers attached to a lan.
- updates and backup location periodically and in the most bandwidth conservative options.
- it requires less bandwidth and sites can be further apart because latency is less of an issue.
- allow for faster recovery if someone maliciously or unintentionally reformats flash memory or erases the startup configuration file.
- detection systems monitor the traffic on a network.
- a cisco ios technology that provides statistics on packets flowing through a cisco router or multilayer switch.
- labor events, social-political events, material events and utilities disruptions.
Down
- allows network access for authorized users with compliant systems.
- ability to react to problems in one of its components while still functioning.
- provide high network availability by providing first-hop routing redundancy.
- protects data traffic from a failed router or circuit, while also allowing load balancing between a group of redundant routers.
- it can detect and immediately address a network problem.
- requires high bandwidth and locations must be close together to reduce latency.
- investigate the cause of the incident and ask questions to better understand the nature of the threat.
- a network protocol that provides for redundancy.
- discovering the incident.
16 Clues: discovering the incident. • a network protocol that provides for redundancy. • detection systems monitor the traffic on a network. • it can detect and immediately address a network problem. • in conjunction with one or more other routers attached to a lan. • allows network access for authorized users with compliant systems. • ...
Cyber security 2022-09-07
Across
- An annoying malware that spams you with ads
- a collection of malware infested computers that form a network to attack
- An important process that verifies a user is really who they are; many different ways this can be done
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
Down
- When raw data is put into context and has meaning, the data transforms into _____
- A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
- I am not a robot
8 Clues: I am not a robot • An annoying malware that spams you with ads • a collection of malware infested computers that form a network to attack • When raw data is put into context and has meaning, the data transforms into _____ • Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing. • ...
Code Word 2021-12-02
Across
- The process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company
- Measures designed to protect your computer, device or network from cybercrime.
- It refers to unsolicited email messages sent for marketing purposes
- Any type of illegal activity that is undertaken (or relies heavily) on a computer.
- A software program that allows you to surf the web.
Down
- Reduction of the size of a file.
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- It is responsible for performing calculations and tasks that make programs work.
- A set of computers on a network that are managed as a unit.
- Wireless communications technology intended to replace cables
- A piece of code or data created by a web server and stored on a user's computer.
12 Clues: Reduction of the size of a file. • A software program that allows you to surf the web. • A set of computers on a network that are managed as a unit. • Wireless communications technology intended to replace cables • It refers to unsolicited email messages sent for marketing purposes • Measures designed to protect your computer, device or network from cybercrime. • ...
Information Governance 2022-05-05
Across
- Information assets generated by or managed for the organization have a reasonable guarantee of authenticity and reliability
- involves protecting that information by preventing, detecting, and responding to cyber attacks
- Evidence of a business activity
- The process of safeguarding important information from corruption, compromise or loss
- The process of adhering to policies and decisions
- Ensuring timely and reliable access to and use of information
- Delegated responsibility for information management to appropriate individuals
Down
- The final stage in the records lifecycle, resulting in destruction of temporary records or the transfer of permanent records to the Digital Archives
- Maintaining information assets for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements
- Ability of an organization to make its stakeholders accessible to the information needed to make decisions
- A measure of the extent to which an entity is threatened by a potential circumstance or event
- The electronic aspect of identifying, collecting and producing information in response to a request for production in a lawsuit or investigation
12 Clues: Evidence of a business activity • The process of adhering to policies and decisions • Ensuring timely and reliable access to and use of information • Delegated responsibility for information management to appropriate individuals • The process of safeguarding important information from corruption, compromise or loss • ...
Cyber Security Awareness Month 2024-10-15
Across
- An initial phase of a cyber attack where information about a target system, network, or organization is gathered.
- A method of faking an identity to gain access.
- The process of converting encrypted data back to its original form.
- A code or technique used to take advantage of a vulnerability.
- A security event where unauthorized individuals gain access to a secure computer system, network, or database.
- The process of verifying the identity of a user, device, or system before granting access to resources.
- A type of malware designed to erase its tracks after executing its malicious actions.
- The framework of policies and procedures that ensure cybersecurity practices are in line with organizational goals.
Down
- The name for a number used only once in a cryptographic communication to prevent replay attacks.
- The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis.
- The act of pretending to be someone else for malicious purposes.
- A form of spear phishing that targets high-profile individuals, like executives.
12 Clues: A method of faking an identity to gain access. • A code or technique used to take advantage of a vulnerability. • The act of pretending to be someone else for malicious purposes. • The process of converting encrypted data back to its original form. • A form of spear phishing that targets high-profile individuals, like executives. • ...
Information Technology Puzzle 34 - Computer Security 2022-02-10
Across
- This is everyone's responsibility at CommScope
- Only install these from trusted sources on mobile devices
- Avoid these scams by being beware of suspicious emails and phone calls
- This application installed on your computer will defend your data and files against attack by screening out viruses, hackers and other software that is malicious
- This makes security unique to each site, and is critical for keeping hackers out of our data and files
Down
- This type of security for your devices is just as important as their technical security
- Always use this when storing or transmitting sensitive data
- This software works to keep viruses, malware, ransomware and so on from entering your computer or device and corrupting your data and files
8 Clues: This is everyone's responsibility at CommScope • Only install these from trusted sources on mobile devices • Always use this when storing or transmitting sensitive data • Avoid these scams by being beware of suspicious emails and phone calls • This type of security for your devices is just as important as their technical security • ...
2-Factor Authentication 2024-06-04
Across
- a type of 2FA where a voice will ask you to press a key or say your name to identify yourself
- what two-factor authentication is trying to protect
- a type of 2FA where a message is sent directly to your phone so you can confirm/deny that you are trying to sign in
- 2FA protects information from these people
- the purpose of two-factor authentication
- a type of 2FA where a message is sent to a trusted phone number (this is the most common method)
Down
- used by 2FA to create more efficient and secure passwords
- an identity and access security method that requires two forms of identification to access certain data and information
8 Clues: the purpose of two-factor authentication • 2FA protects information from these people • what two-factor authentication is trying to protect • used by 2FA to create more efficient and secure passwords • a type of 2FA where a voice will ask you to press a key or say your name to identify yourself • ...
Why is Cybersecurity Necessary? 2023-01-27
Across
- Set of defined actions to take in accordance with established policy.
- Minimum requirements from federal and state agencies and insurance companies to keep consumer data and critical infrastructure safe from cyber attacks.
- Set of actions taken after a cyber event has occurred.
- Information systems that include computers, mobile phones, tablets, security cameras, and any device that communicates over the internet, etc.
Down
- Cybersecurity programs must be established, maintained, and is not a set it and forget it matter.
- Bad actors, customers, contractors, employees, partners, visitors, and even individuals in your household.
- Technical and non-technical measures to know that you have been compromised.
- People, processes, and technologies to keep information and information systems safe from alteration, destruction, and exploitation.
8 Clues: Set of actions taken after a cyber event has occurred. • Set of defined actions to take in accordance with established policy. • Technical and non-technical measures to know that you have been compromised. • Cybersecurity programs must be established, maintained, and is not a set it and forget it matter. • ...
Cyber security 2023-11-28
Across
- Desktop is also known as.
- Hiding one piece of data with in another.
- The crime that related to computers and networks.
- A piece of malware that can replicate itself in order to spread the infection to other connected computer without human interaction.
- Secretly watches computer activity.
- Phishing is malware that asks for ______ details.
- Any program, website, or file that is defined to damage or gain unauthorized access to a device.
- The practice of protecting systems, networks and programs from digital attacks.
Down
- Someone who breaks into a computer system.
- URLs that mislead the user into down leading a virus and visiting a harmful website.
- Illegal production of copyrighted material is often referred as ____.
- Information is also known as.
- A form of malware that deliberately prevent u from accessing files in ur computer,until they are decrypted using at a cost.
- Type of bullying that takes place online.
- ____ is the ability to act in a safe and responsible manner on the internet and other connected environments.
- An online threat that hides itself in computers and mobile device.
- Software that protects computer from virus related harm.
- Copying the data without the permission of owner of the computer/computers system/ computer network.
18 Clues: Desktop is also known as. • Information is also known as. • Secretly watches computer activity. • Hiding one piece of data with in another. • Type of bullying that takes place online. • Someone who breaks into a computer system. • The crime that related to computers and networks. • Phishing is malware that asks for ______ details. • ...
Ai 2024-04-06
Across
- A system modeled after the human brain used in deep learning
- reality A stimulated experience that can be similar or different from the real world
- A technology that overlays digital information into the real world
- The field of Ai that trains machines to intercept and make decisions based on visual data
- The practice of protecting computer systems and networks from digital attacks
- Extremely large data sets that could be analyzed to revel patterns and trends
- A set of rules or steps used by computers to solve a problem
- The use of technology to preform tasks without human assistance
- A type of machine leaning where the model is trained on labeled data
Down
- A type of Ai that allows computers to lean from data
- learning A subset of machine learning inspired by the structure and function of the brain
- A computer program that is design to stimulate conversation with human users
- Information processed or stored by a computer
- The branch of technology that deals with the design, construction and operation of robots
14 Clues: Information processed or stored by a computer • A type of Ai that allows computers to lean from data • A system modeled after the human brain used in deep learning • A set of rules or steps used by computers to solve a problem • The use of technology to preform tasks without human assistance • A technology that overlays digital information into the real world • ...
Trends in Healthcare 2020-09-10
Across
- is the protection of internet-connected systems including hardware, software, and databases from cyber attacks
- general direction in which something is changing
- prevents illness and disease
- everyone with the same ____________ related group is in one payment group as a method of cost containment
- recycling and turning off electronics are examples of energy _______________
- ________ management techniques include therapy, massage, breathing techniques, and yoga
- physical, social, intellectual, spiritual, occupational, emotional, financial, and environmental make up the 8 dimensions of this
- less expensive than inpatient care
- _______ health allows patient to be in the comfort of his or her own home and allows patient to leave from hospital much sooner
Down
- the protection or promotion of the interests of consumers
- health related ___________ are one of the main reasons for high costs of healthcare
- refers to the practice of caring for patients remotely using video and audio technology
- _________ medicine promotes physical, social, emotional, intellectual, and spiritual well-being
- the process of combining a number of facilities into a single branch or network
- baby ___________ created an increased need for geriatric medicine
- improves mood, physical and mental wellness, stamina, immune function and releases endorphins
16 Clues: prevents illness and disease • less expensive than inpatient care • general direction in which something is changing • the protection or promotion of the interests of consumers • baby ___________ created an increased need for geriatric medicine • recycling and turning off electronics are examples of energy _______________ • ...
Business Continuity Awareness Week 2022 2022-07-04
Across
- What is the latest overseas company that has completed their BCMS Implementation as per the latest post in BCM's Yammer page?
- to build a success for program in microsimulations.
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities.
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture.
- One of hybrid Pros and Cons is reliance on home utilities and ___________.
- A thing made by combining two different elements.
- The capacity to recover quickly from difficulties.
Down
- Involvement and enthusiasm in resilience
- What app can WOWriors get more information about Business Continuity and Organisational Resilience from UMW Office 365?
- Acknowledge new _________ in addition to the opportunities that hybrid world provides businesses and employees.
- What is the third UMW Group BCM risk events.
- In order to prepare for cyber resilience, speed and agility are required.
- Group CMT Members’ ‘Rose Among the Thorns’
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes?
- The biggest threat to Cybersecurity is human _______.
- One of major paradigm shift in the workforce.
16 Clues: Involvement and enthusiasm in resilience • Group CMT Members’ ‘Rose Among the Thorns’ • What is the third UMW Group BCM risk events. • One of major paradigm shift in the workforce. • A thing made by combining two different elements. • The capacity to recover quickly from difficulties. • to build a success for program in microsimulations. • ...
Safety Crossword 2022-10-20
Across
- you should check the batteries of your smoke detector _______
- infectious microorganisms in human blood that can cause disease in humans
- regulatory agency that inspects and examines workplaces
- a safety procedure that ensures equipment and heavy machinery are properly shut off and unable to turn back on before the required repairs and maintenance have been completed
- offers a way for all employees to confirm their dedication to positive safety behavior each year
- the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks
- when you are on a boat, canoe, or kayak, make sure you always wear a __________
- if you see someone doing something unsafe on the job, you should use your _________________
Down
- aerosols, nail polish and cooking oils are all highly ________
- an unplanned event that did not result in injury, illness or damage, but had the potential to do so
- what does PPE stand for?
- protection for your hands
- protection for your eyes
- a tornado _______ means a tornado has been spotted or a radar has picked one up
- protection for your head
- you can help prevent back problems by having good _______
16 Clues: what does PPE stand for? • protection for your eyes • protection for your head • protection for your hands • regulatory agency that inspects and examines workplaces • you can help prevent back problems by having good _______ • you should check the batteries of your smoke detector _______ • aerosols, nail polish and cooking oils are all highly ________ • ...
Internet 2023-05-06
Across
- A secret word you use to sign in to your account
- Protecting your computer from bad things on the internet
- A symbol (#) used on social media to talk about the same thing
- The APP you use to look at websites on the internet
- A tool that helps you find things on the internet
- When someone tries to trick you into giving them your personal information on the internet
- A fun thing to do on the internet (two words)
- When you put something from your computer or phone onto the internet
- Unwanted emails or messages that try to sell you something
Down
- A way for computers and phones to connect to the internet without using wires
- A name you use to log in to your account on a website
- When someone uses the internet to be mean to someone else
- A place on the internet where you can find information about something
- When you take something from the internet and save it on your computer or phone
- Websites like Facebook and Instagram where you can connect with people
- The address you type in to go to a website
16 Clues: The address you type in to go to a website • A fun thing to do on the internet (two words) • A secret word you use to sign in to your account • A tool that helps you find things on the internet • The APP you use to look at websites on the internet • A name you use to log in to your account on a website • Protecting your computer from bad things on the internet • ...
IT Crossword 2019-07-23
Across
- A network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
- The practice of protecting systems, networks, and programs from digital attacks.
- The fact of obeying a particular law or rule, or of acting according to an agreement:
- Repair the damage to something in an improvised way
- The company with 20 years of experience that helps you with your IT issues
- A person who uses computers to gain unauthorized access to data
Down
- A collection of data or computer instructions that tell the computer how to work
- The quality or state of being exposed to the possibility of being attacked or harmed
- A means to support and help you deal with any issues/incidents in your organization
- A copy of a file or other item of data made in case the original is lost or damaged
- Conduct an examination
- A group or system of interconnected people or things.
12 Clues: Conduct an examination • Repair the damage to something in an improvised way • A group or system of interconnected people or things. • A person who uses computers to gain unauthorized access to data • The company with 20 years of experience that helps you with your IT issues • A collection of data or computer instructions that tell the computer how to work • ...
Digitalization 2019-05-25
Across
- any one of the ten written numbers 0 to 9
- relating to or like a robot
- the act of watching a person or a place, esp. a person believed to be involved with criminal activity or a place where criminals gather
- the newest information that people connected to a central computer system can see, when the information changes regularly
- to get work done by making a contract with another company to do it, often in another country, rather than in your own company
- a quick way to start or use a computer program
- the use of machines or computers instead of people to do a job, especially in a factory or office
Down
- a person who finds something interesting on the Internet and makes it go viral
- the main storage area for new incoming email messages
- ways of protecting computer systems against threats such as viruses
- a photographic copy of an early plan for a building or machine
- someone who makes money using illegal methods, especially by tricking people
12 Clues: relating to or like a robot • any one of the ten written numbers 0 to 9 • a quick way to start or use a computer program • the main storage area for new incoming email messages • a photographic copy of an early plan for a building or machine • ways of protecting computer systems against threats such as viruses • ...
Cybersecurity 2023-05-26
022.03a - What Can You Do Online? 2024-09-23
4 Clues: The responsible use of technology and behavior online • The act of purchasing goods or services over the internet • The practice of protecting systems, networks, and programs from digital attacks • Websites and apps that allow users to create and share content or participate in social networking
Compliance Training 10/10/22 2022-10-04
Across
- a type of test ran to test the effectiveness of the Firm's network and data security, runs alongside of penetration testing
- the act of removing or retiring Firm devices
- an event requiring the notification of Senior Management, includes cybersecurity and/or disaster recovery
- prohibits the acceptance of cash and requires OFAC screening
- signed contract outlining services provided
- trading that is completed in the last hour of the day, less than 4% of account value, or consists of shares held for greater than 90 days
- the only Firm-approved social media platform
- A Client's dissatisfaction if written and asks for rectification
- physical or electronic access and/or control of Client assets
- composed of the Firm's Form CRS, ADV Part 2A and 2B
Down
- a specific Person subject the Firm's COE, includes regular, temporary, full-time, part-time employees, intern(s), and certain independent contractors
- defined by the SEC as someone older than 62
- actual or hypothetical results presented to clients
- Individual's personal profile, part of NPI
- fees paid by the Client, done monthly in advance based on prior month-end closing value
- how data is organized according to sensitivity
- lack or hard-wired connection; access must be password-protected; public access is prohibited
- a word or passphrase used to secure logins
18 Clues: Individual's personal profile, part of NPI • a word or passphrase used to secure logins • defined by the SEC as someone older than 62 • signed contract outlining services provided • the act of removing or retiring Firm devices • the only Firm-approved social media platform • how data is organized according to sensitivity • ...
Cybersecurity Awareness Puzzle 2023-03-24
Across
- A secret code that protects your online account
- The act of accessing someone else's online account without their permission
- A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
- Malicious software that can damage or disrupt a computer system
- A measure taken to protect a computer system or network from cyber attacks
Down
- A security feature that confirms the identity of a user before allowing access to a system or account
6 Clues: A secret code that protects your online account • Malicious software that can damage or disrupt a computer system • A measure taken to protect a computer system or network from cyber attacks • The act of accessing someone else's online account without their permission • ...
Unit 1 What is cybersecurity? 2021-09-27
Across
- protocols for encrypting or decrypting information in order to protect computer systems, networks and data from cyber attacks
- assurance that systems and data are accessible by authorized users when and where needed
- the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data
- the protection of information from people who are not authorized to view it
Down
- the study of computational thinking which describes a step by step process
- a widely accepted security measure that should be guaranteed in every secure system
- the usage of deceptive emails and websites to maliciously gather personal information
- identify theft, stealing money, stealing private information controlling private computers
- ensures that information is protected from unauthorized or unintentional alteration
9 Clues: the study of computational thinking which describes a step by step process • the protection of information from people who are not authorized to view it • a widely accepted security measure that should be guaranteed in every secure system • ensures that information is protected from unauthorized or unintentional alteration • ...
TECHNOLOGY 2024-09-15
Across
- Many companies invest heavily in __________ to protect sensitive information from hackers.
- Data __________helps companies make better decisions by interpreting large amounts of information.
- With advancements in __________, factories now produce goods with minimal human intervention.
- As technology progresses, many jobs that once required __________ are now being done by machines.
- Excessive __________ can lead to eye strain and affect your sleep patterns, especially if you use your phone before bed.
Down
- __________ messaging has made communication faster and more efficient, allowing people to chat in real-time.
- People spend hours on __________ every day, sharing their experiences and connecting with friends.
- smartphone is an example of an __________ device that most people use every day for communication and entertainment.
- In the age of the internet, digital __________ is a growing concern as personal data is often collected by various websites and apps.
9 Clues: Many companies invest heavily in __________ to protect sensitive information from hackers. • With advancements in __________, factories now produce goods with minimal human intervention. • As technology progresses, many jobs that once required __________ are now being done by machines. • ...
GenCyber Cybersecurity Concepts 2022-06-08
Cybersecurity Crossword Puzzle 2023-10-19
Across
- is a security technology that requires multiple methods of ___________ to verify a user’s identity before allowing login. Authentication
- can you turn your debit card off in digital banking? Manage cards
- may send unsolicited Emails, pretending to be a financial institution or a company, asking you to click a link to update or confirm your personal or login information. Phishing
Down
- companies or organizations will never ask you to divulge any _________ information over email. Personal
- is the name of our P2P product? SPIN
- can you view when your last login to digital banking was? Recent Logins
- can you change your Security Questions in digital banking? My Profile
- is our cyber insurance carrier? Beazley
8 Clues: is the name of our P2P product? SPIN • is our cyber insurance carrier? Beazley • can you turn your debit card off in digital banking? Manage cards • can you change your Security Questions in digital banking? My Profile • can you view when your last login to digital banking was? Recent Logins • ...
Cyber Security and Laws 2022-10-17
Across
- subscription fraud can be achieved by sending "----- " requests to subscribers via the SS7 / GTP protocols
- EDI internet transmission protocols include ----- File Transfer Protocol (SFTP),
- Cyber ------ is use of the Internet or other electronic means to track someone
- The International Organization for ------- is referred as ISO
- EDI, which stands for electronic data interchange, is the intercompany ----------- of business documents in a standard format.
- GLBA is a United States federal law that requires ------ institutions to explain how they share and protect their customers’ private information
- is just one of the many frauds on the Internet, trying to fool people into parting with their money
Down
- PCI DSS is an acronym for “----- Card Industry Data Security Standard.”
- Counteracting cybercrime is ------------- , a technique used to protect computers, networks, programs, and data from exploitation.
- The ----- System 7 (SS7) industry standard and set of protocols were developed in 1975
- refers to the use of a computer to commit a crime
- is the legal process by which an arbiter or judge reviews evidence and argumentation.
12 Clues: refers to the use of a computer to commit a crime • The International Organization for ------- is referred as ISO • PCI DSS is an acronym for “----- Card Industry Data Security Standard.” • Cyber ------ is use of the Internet or other electronic means to track someone • EDI internet transmission protocols include ----- File Transfer Protocol (SFTP), • ...
expanding rights of various populations 2024-01-30
Across
- A woman is an adult female human
- "Second-generation" Japanese Americans born as the children of the issei.
- Highly trained professionals who operate aircraft during flights
- A member of an air force or air arm of a nation's armed forces.
- A cybersecurity professional who uses encryption codes to protect data and other sensitive information.
- Putting a person in prison or other kind of detention, generally in wartime
Down
- The biggest and deadliest war in history, involving more than 30 countries.
- A means of presenting information to commanders, staffs, or other designated audiences.
- An iconic poster of a female factory worker flexing her muscle, exhorting other women to join the World War II effort with the declaration that "We Can Do It!"
- Second most populous of all Native American peoples in the United States
- Containing or having everything that is needed within itself.
- The action of separating people, historically on the basis of race and/or gender.
12 Clues: A woman is an adult female human • Containing or having everything that is needed within itself. • A member of an air force or air arm of a nation's armed forces. • Highly trained professionals who operate aircraft during flights • Second most populous of all Native American peoples in the United States • ...
Security Bytes - March 2024 2024-02-28
Across
- A person who uses computers to gain unauthorised access to data.
- A network device that forwards data packets between computer networks
- Security techniques that use biological data for authentication.
- An encryption-based Internet security protocol
- A number of internet connected devices each of which is running one or more bots
Down
- a piece of software designed to update a computer program or its supporting data to fix or improve it.
- No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
- Software designed to detect and destroy computer viruses
- A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
- Highlighted policy in march security bytes newsletter
- A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
- The practice of protecting systems, networks and programs from digital attacks
12 Clues: An encryption-based Internet security protocol • Highlighted policy in march security bytes newsletter • Software designed to detect and destroy computer viruses • A person who uses computers to gain unauthorised access to data. • Security techniques that use biological data for authentication. • ...
Secure networking in the cloud 2024-03-26
Across
- is a segmented piece of a larger network
- a device used to connect two different networks, especially a connection to the internet
- a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- not physically existing as such but made by software to appear to do so
- the measure of a system's ability to increase or decrease in performance and cost in response to changes
Down
- a business or company
- it represents the network interface configuration for a virtual machine
- two or more computers that are linked in order to share resources
- is a border and it can be physical, or abstract
- a connection between two pieces of electronic equipment, or between a person and a computer
- a computer network security system that restricts internet traffic in to, out of, or within a private network
12 Clues: a business or company • is a segmented piece of a larger network • is a border and it can be physical, or abstract • two or more computers that are linked in order to share resources • not physically existing as such but made by software to appear to do so • it represents the network interface configuration for a virtual machine • ...
STEM Vocabulary: Digital Citizenship 2024-03-18
Across
- The skill of evaluating information and sources for accuracy, credibility, and relevance.
- The responsible and ethical use of technology and the internet.
- Harassment, threats, or negative behavior toward others on the internet or through digital devices.
- The quality and complexity of a password, which affects its vulnerability to hacking.
- Controls and options that allow individuals to manage the information they share online and who can access it.
Down
- The set of rules and norms for respectful behavior when communicating online.
- Copying or using someone else's work, ideas, or content without proper attribution or permission.
- A security process that requires users to provide two different authentication methods to access an account, enhancing security.
- The trail of information and data left behind by a person's online activities.
- The ability to use digital tools and technology effectively and responsibly.
- Measures and practices to protect digital devices, networks, and data from online threats.
- Individuals who seek to harm others through online interactions.
12 Clues: The responsible and ethical use of technology and the internet. • Individuals who seek to harm others through online interactions. • The ability to use digital tools and technology effectively and responsibly. • The set of rules and norms for respectful behavior when communicating online. • ...
WHO Identifies Risk 2024-07-02
Across
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
Down
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
WHO Identifies Risk 2024-07-02
Across
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
Down
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
The Cybersecurity Crossword 2023-08-20
Across
- Science of encryption and decryption
- A network security device that works based on predetermined security rules
Down
- Converting data into code to prevent unauthorized access
- Software designed to exploit computers
- Tricking individuals for private information using deceptive websites/e-mails
- Software that encrypts data and demands ransom in exchange for decryption key
6 Clues: Science of encryption and decryption • Software designed to exploit computers • Converting data into code to prevent unauthorized access • A network security device that works based on predetermined security rules • Tricking individuals for private information using deceptive websites/e-mails • ...
Malware 2022-12-06
Across
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- a computer program used to prevent, detect, and remove malware.
- malicious software designed to block access to a computer system until a sum of money is paid.
- records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
- the protection of computer systems and networks from attacks from malicious software.
- malware that misleads users of its true intent.
- the psychological manipulation of people into performing actions or giving out confidential information.
- can propagate or self-replicate from one computer to another without human activation after breaching a system.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
9 Clues: malware that misleads users of its true intent. • a computer program used to prevent, detect, and remove malware. • the protection of computer systems and networks from attacks from malicious software. • malicious software designed to block access to a computer system until a sum of money is paid. • ...
Information and Communication Technology 2023-02-23
Across
- - The practice of protecting computer systems and networks from digital attacks.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Programs and applications that run on a computer or mobile device.
- - Software designed to harm computer systems or steal data.
- system - The software that manages a computer's basic functions, such as memory and file systems.
- computing - A model for delivering computing resources over the internet.
- - An input device used for moving the cursor on a computer screen.
- - A device used for processing data and running programs.
- - The process of designing and writing code for software applications.
- - An output device that prints text and images on paper.
Down
- - An input device used for typing text and commands.
- - A type of malicious software that can damage or disrupt computer systems.
- - A structured collection of data that is stored and organized in a computer.
- - A global network of interconnected computer networks.
- - A device that connects multiple devices to a network and directs traffic between them.
- - A device that connects a computer to the internet.
- - The process of converting data into a code to prevent unauthorized access.
- - The physical components of a computer system, such as the CPU, hard drive, and motherboard.
- - A step-by-step procedure for solving a problem or accomplishing a task.
- - An output device that displays images and text.
20 Clues: - An output device that displays images and text. • - An input device used for typing text and commands. • - A device that connects a computer to the internet. • - A global network of interconnected computer networks. • - An output device that prints text and images on paper. • - A device used for processing data and running programs. • ...
Safety Crossword Challenge 2022-05-04
Across
- practice runs for tornado and fire
- name of our MTA Safety Trainer (2 words)
- protect your noggin' with this (2 words)
- appendix F in the ERP includes locations of this (2 words)
- it is your ______ to work safely and report hazards
- do not do this to fire extinguisher locations
- creating a good fit between an employee and what they do is the main concept of this
- two types of CPR, traditional with breaths and ___ (2 words)
- virus caused by mosquitoes (2 words)
- overloading this warehouse equipment can be very dangerous
Down
- this hazard can be truly shocking
- occurs when you use or lose more fluid than you take in
- safety data sheet section number for Fire Fighting Measures
- where you can access PR safety manual, ERP, and safety data sheets easily
- practice of protecting systems, networks and programs from digital attacks
- what to do should you catch on fire (3 words)
- member of PR's safety committee who reports to duty at all 3 locations (2 words)
- in sunscreen, what the F stands for in SPF
- a document you refer to if you have been exposed to a hazardous chemical (abbreviated)
- the first S in the acronym PASS stands for
- announce this if activating paging system for active shooter (two words)
- disease caused by deer ticks
22 Clues: disease caused by deer ticks • this hazard can be truly shocking • practice runs for tornado and fire • virus caused by mosquitoes (2 words) • name of our MTA Safety Trainer (2 words) • protect your noggin' with this (2 words) • in sunscreen, what the F stands for in SPF • the first S in the acronym PASS stands for • what to do should you catch on fire (3 words) • ...
Information and Technology Crossword 2023-10-25
Across
- How reliable a source is for facts and truth
- well known electric car company founded by Elon Musk
- where either humans take over or the car itself hand over to the driver Generated roughly one
- protection of all an organizations’ important info including human speech against unauthorized access
- The company that created voter profiles out of Facebook users’ data
- Attempt to acquire sensitive data through a fraudulent solicitation in an email or website posing as reputable site
- The process of determining the meanings behind patterns, and finding ways to integrate them into certain programs
- self-driving vehicles
- What percent of high schoolers realized that a seemingly credible website on climate change was run by the fossil fuel industry
- The process of revealing patterns from sets of information gathered from users of certain programs
Down
- Fake information
- the approach that people attempt the trolly problem
- deliberate attempt to breach the info of a system of an individual or organization
- Something that can be determined through the use of many social media platforms
- technology or practice for preventing cyber attacks
- crash a server with traffic
- verifiable source
- The process of scrubbing useless data from large datasets
- where both the driver and the car jointly produces driving
- News Slang for false information spread by certain sources
20 Clues: Fake information • verifiable source • self-driving vehicles • crash a server with traffic • How reliable a source is for facts and truth • the approach that people attempt the trolly problem • technology or practice for preventing cyber attacks • well known electric car company founded by Elon Musk • The process of scrubbing useless data from large datasets • ...
Cyber Crosswords 2024-06-19
Across
- A secret word or phrase used to gain access to a computer system (8 letters)
- A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
- The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
- Software that is designed to detect and destroy computer viruses (9 letters)
- The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
- The practice of protecting systems, networks, and programs from digital attacks (10 letters)
- A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
- An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
- Unsolicited email, often used for advertising or phishing (4 letters)
9 Clues: Unsolicited email, often used for advertising or phishing (4 letters) • Software that is designed to detect and destroy computer viruses (9 letters) • A secret word or phrase used to gain access to a computer system (8 letters) • The practice of protecting systems, networks, and programs from digital attacks (10 letters) • ...
Cybersecurity Awareness Puzzle 2023-03-24
Across
- A secret code that protects your online account
- The act of accessing someone else's online account without their permission
- A type of cyber attack where criminals trick users into giving away sensitive information such as passwords or credit card numbers
- Malicious software that can damage or disrupt a computer system
- A measure taken to protect a computer system or network from cyber attacks
Down
- A security feature that confirms the identity of a user before allowing access to a system or account
6 Clues: A secret code that protects your online account • Malicious software that can damage or disrupt a computer system • A measure taken to protect a computer system or network from cyber attacks • The act of accessing someone else's online account without their permission • ...
Cybersecurity Awareness Crossword 2024-03-14
Across
- A string of characters that allows access to a computer system or service.
- A set of practices users take to improve their online security.
- A type of scam that involves a victim to be tricked by a fake online identity, blinded by love.
Down
- A type of scam that uses email or websites to trick victims.
- Malicious activities done using or targeting digital systems or a network.
- A security method that requires two forms of identification to access resources and data.
6 Clues: A type of scam that uses email or websites to trick victims. • A set of practices users take to improve their online security. • Malicious activities done using or targeting digital systems or a network. • A string of characters that allows access to a computer system or service. • ...
GenCyber Cybersecurity Concepts 2022-06-08
What is cybersecurity? 2024-07-03
6 Clues: Potential danger • Malicious software • Protection from cyberattacks • Secret word or phrase for access • Attempt to gain unauthorized access • Deceptive email designed to steal information
WHO Identifies Risk 2024-07-02
Across
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
Down
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
038 - Digital Literacy 2024-10-20
Across
- the practice of protecting systems, networks, and programs from digital attacks.
- a person who uses digital technology responsibly and effectively.
- the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
Down
- the trail of data you create while using the internet.
- the ability to use, understand, and create digital content safely and effectively.
5 Clues: the trail of data you create while using the internet. • a person who uses digital technology responsibly and effectively. • the practice of protecting systems, networks, and programs from digital attacks. • the ability to use, understand, and create digital content safely and effectively. • ...
FITDVocab.LCP 2013-05-15
Across
- A paper you need when applying for a job.
- Phising, spam, passwords are all in the category of _______.
- The computers short term memory or RAM.
- Another way to say ____drive.
- The way you behave online.
- When you need to turn on your computer.
- The first and smallest size of storage.
- Google, Bing, and Yahoo!
- What ISP stands for.
- The way things are arranged.
- A place where you plug in your headphones.
- Phones are a type of _________.
- An already made design for a doc.
- A picture or symbol that represents a company.
- The computers main storage device.
Down
- The safe and responsible use of information online.
- A pamphlet.
- What CPU stands for.
- 8 bits
- Commercials and Ads are a type of it.
- The heart of the computer.
- How well one program works with another.
- The screen
- What WIFI stands for.
- What LCD stands for.
- A word used to describe anything online.
- A catchy sentence that represents a company.
- Any type of device that puts info into your computer.
- Compartments that allow things to be connected to it.
- Any type of device that takes information out of your computer.
- The font or parts of your doc that you can customize.
- A wireless earpiece device.
- A blank sheet like Prezi.
33 Clues: 8 bits • The screen • A pamphlet. • What CPU stands for. • What LCD stands for. • What ISP stands for. • What WIFI stands for. • Google, Bing, and Yahoo! • A blank sheet like Prezi. • The heart of the computer. • The way you behave online. • A wireless earpiece device. • The way things are arranged. • Another way to say ____drive. • Phones are a type of _________. • ...
Trade School vs 4yr College Crossword Lab 2024-02-29
Across
- the activity or business of promoting and selling products or services
- to relieve stress and conditions associated with it, such as tension headaches
- the process of ensuring that an aircraft is safe and reliable for flight through regular inspections, repairs, and replacements
- the process of planning, organizing, directing, and controlling the activities of a business or organization to achieve its goals and objectives
- the data related to a person's medical history
- heating, ventilation, and air conditioning
- the study of machines, equipment, technology and systems
- an interconnected set of components used to collect, store, process and transmit data and digital information
- the personnel of a business or organization
- a trained person whose job is to improve the appearance of a customer's face, hair, or skin using makeup and beauty treatments
Down
- the study or use of systems
- the system that prescribes the fate of the criminal
- a mechanic who services and repairs automobiles
- takes patients' vital signs, such as their blood pressure
- (metal pieces or parts) by heating the surfaces to the point of melting using a blowtorch
- Commercial Driver's License
- the practice of protecting systems, networks, and programs from digital attacks
- the preparation, cooking, plating, presentation, and service of food
- the process of recording, classifying and summarizing financial transactions
- handles several important tasks within the dentist's office
20 Clues: the study or use of systems • Commercial Driver's License • heating, ventilation, and air conditioning • the personnel of a business or organization • the data related to a person's medical history • a mechanic who services and repairs automobiles • the system that prescribes the fate of the criminal • the study of machines, equipment, technology and systems • ...
Criminology and Crime Prevention 2024-03-17
Across
- A device that alerts to danger, often used in theft prevention.
- The process of being victimized or the condition in which a person or entity is victimized.
- Acronym for designing urban environments to reduce crime.
- A group of people living in the same place, involved in crime prevention efforts.
- Measures and technologies used to protect computers and networks from crime.
- Law enforcement officers' act of circulating an area to prevent and detect crime.
- A strategy to prevent crime through the threat of punishment.
- A localized community within a larger town or city, focus of policing strategies.
- Actions taken to stop something from happening, in this case, crime.
Down
- Observing subjects to prevent or solve crimes.
- The responsibility of a person or entity to protect others from crime.
- The act of maintaining law and order in communities.
- Specific actions or strategies designed to achieve a policing or crime prevention objective.
- Pertaining to electronic technology, often related to cybercrime.
- A person who commits an illegal act.
- Information or objects that are used in court to prove a crime.
- The study of crime, criminal behavior, and the criminal justice system.
- The principle of fairness and the ideal of moral equity.
- Relating to the surroundings in which crime can occur or be prevented.
- The potential for encountering harm or loss.
20 Clues: A person who commits an illegal act. • The potential for encountering harm or loss. • Observing subjects to prevent or solve crimes. • The act of maintaining law and order in communities. • The principle of fairness and the ideal of moral equity. • Acronym for designing urban environments to reduce crime. • ...
FITCVocab.hj 2013-05-15
Across
- 1000 megabytes
- primary circuit board
- EX: Google
- mouse with ball
- how you act online
- what ISP stands for
- peripheral you drag across a flat surface
- program stored an internet server
- pocket sized computing device
- 1000 gigabytes
- catch phrase
- behavior to keep you safe online
- "mouse" for laptops
- one page document about your life
- front of the program
- what cpu stands for
- abbreviation for document
- predesigned document
- the oath the president has to say during inauguration
- mouse with laser
- protection of information on the internet
- file format that can be viewed on any computer
- 1000 bytes
- 1000 kilobytes
Down
- selection of editing tools
- no wire
- device that sends and receives signals
- ports where you put flash-drives
- wireless fidelity
- internet and online
- search engine that searches other search engines
- what ram stands for
- service set identification
- smallest piece of information
- what SSID stands for
- serves information to other computers on a network
- piece of written matter
- what rtf stands for
- graphic symbol for a company
- 8 bits
- one canvas you can put anything on
- able to occur together without conflict
- computer screen
- where you put headphones
- long term memory
45 Clues: 8 bits • no wire • EX: Google • 1000 bytes • catch phrase • 1000 megabytes • 1000 gigabytes • 1000 kilobytes • mouse with ball • computer screen • long term memory • mouse with laser • wireless fidelity • how you act online • internet and online • what ram stands for • what ISP stands for • what rtf stands for • "mouse" for laptops • what cpu stands for • what SSID stands for • front of the program • ...
E BLOCK TECH Michael Rizza 2013-05-16
Across
- a little bit more memory then a byte
- Geting increased in you group
- the hardware that is in you keyboard
- the way you arrange your file
- The lowest storage unit
- how you act online
- The ability of putting something into something else
- a more advanced search engine
- Without wires
- Your sybol for you company
- National Cyber Security Alliance
- wired internet
- Copying someone elses item
- Screen
- A typed document
- an oath that the president has to say
- The ability of taking something out of something else
- Liquid crystal display
- Photo file
- zoomable online presitation program
- A typed document of your skills
Down
- Claiming something yours
- memory storage
- your saying for your company
- the act of being secure online
- the heart of the computer
- Wireless Internet
- Security online
- How you edit your format
- Display Unit
- a small box that shows you how your document looks
- A searching website
- Random memory
- comcast
- what font,text size,bold,etc.
- Internet
- Largest unit of data
- TB
- the wiring in your computer
- A piece of folded paper that advertises something
- the theme you pick for you document
- to startup something
- a file that stores music
- Operating system
- A peripheral that controls your mouse
45 Clues: TB • Screen • comcast • Internet • Photo file • Display Unit • Random memory • Without wires • memory storage • wired internet • Security online • A typed document • Operating system • Wireless Internet • how you act online • A searching website • Largest unit of data • to startup something • Liquid crystal display • The lowest storage unit • Claiming something yours • How you edit your format • ...
terms 2023-02-15
Across
- identity theft
- exclusive rights
- a way to change the flow of the code
- a loop to repeat code a fixed number of times
- the programs that can be ran on a computer
- a problem when using a while loop where you forget one action at the beginning or end
- a world or karel word is a grid where karel lives
- code you put inside an if statement or while-loop
- the physical components of a computer
- a computer security specialist
- attempt to find computer security vulnerabilities for personal financial gain
- teaching new commands to karel
Down
- protection of computers
- the version that already knows how to turn right and turn around
- lets us repeat code as long as somethings true
- a device that makes calculations
- network of physical devices
- lets you ask a question to the program and only run code if its true
- saying the function
- the part of the funtion that contains the commands
- bullying online
- a command is an instruction you can give karel
- a way to repeat code
- a naming convention where the first letter is lowercase
- not subject to copyright
- threatens to publish data
- control structure that lets us do either one section of code or another depending on a test
- using charts
- managing complexity by abstracting away information and detail
29 Clues: using charts • identity theft • bullying online • exclusive rights • saying the function • a way to repeat code • protection of computers • not subject to copyright • threatens to publish data • network of physical devices • a computer security specialist • teaching new commands to karel • a device that makes calculations • a way to change the flow of the code • ...
Vocabulary Unit 5-10 2023-09-03
Across
- Reliability
- Rapid increase in numbers
- the use of exciting or shocking stories or language at the expense of accuracy, in order to provoke public interest or excitement.
- tendency to believe things too quickly or easily
- A precise sequence of instructions for processes that can be executed by a computer
- a practical joke; a trick
- Honesty
- Our love affair with technology; enthusiasm for technology
- Having to do with morals, values, right and wrong
- To ban or cover some of the information
- An improvement of an existing technological product, system, or method of doing something.
- A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually
- A technique that is used to make a process automatic.
Down
- Incorporating misleading information into one's memory of an event
- not supported or proven by evidence
- Protection of computer systems, networks, and data from digital attacks.
- A new idea, method, or device
- having or revealing keen insight and good judgment
- A technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
- working the body harder than it is normally worked
- the quality of being believable or trustworthy
- the use of digital technologies to change a business model and provide new revenue or value
- Willingness to take credit and blame for actions.
- the right of people not to reveal information about themselves
24 Clues: Honesty • Reliability • Rapid increase in numbers • a practical joke; a trick • A new idea, method, or device • not supported or proven by evidence • To ban or cover some of the information • the quality of being believable or trustworthy • tendency to believe things too quickly or easily • Having to do with morals, values, right and wrong • ...
it 2024-10-07
Across
- / Provides tech support to end-users.
- / Manages and processes health data through technology.
- / Designs and develops computer hardware.
- / Creates animations for various media formats.
- / Writes and tests code for software applications.
- / Manages cloud computing services.
- / Provides hardware and software support.
- / Protects systems and data from cyber threats.
- / Leads and oversees an organization’s IT strategy.
- / Assesses the security and reliability of IT systems.
- / Finds and hires IT professionals for companies.
- / Interprets data to help businesses make decisions.
- / Conducts investigations to advance IT knowledge.
- / Designs and manages complex database systems.
- / Manages and maintains websites.
- / Tests software for bugs and performance issues.
Down
- / Tests systems for vulnerabilities, ethically.
- / Designs the user interface of digital products.
- / Creates apps for various platforms.
- / Manages and maintains computer networks.
- / Builds and develops software programs.
- / Designs and builds communication networks.
- / Improves user experience in products or services.
- / Analyzes and resolves tech issues for companies.
- / Handles and processes large datasets.
- / Manages and coordinates IT services.
- / Studies the theoretical foundations of computing.
- / Designs and creates websites.
- / Plans and implements computer networks.
- / Analyzes complex data to gain insights.
- / Develops, tests, and maintains software.
- / Examines and improves information systems.
- / Designs and implements systems for business operations.
- / Specializes in securing communications through encryption.
34 Clues: / Designs and creates websites. • / Manages and maintains websites. • / Manages cloud computing services. • / Provides tech support to end-users. • / Creates apps for various platforms. • / Manages and coordinates IT services. • / Handles and processes large datasets. • / Builds and develops software programs. • / Designs and develops computer hardware. • ...
Globalisasi dan masyarakat digital 2024-10-24
Across
- Apa istilah untuk transaksi jual-beli barang atau jasa yang dilakukan melalui internet
- fenomena ketika budaya lokal terpengaruh budaya asing
- Perpindahan massal penduduk dari desa ke kota besar disebut
- jaringan global yang menghubungkan komputer dan perangkat di seluruh dunia
- Kelompok penentang globalisasi menganggap perdagangan bebas terkait dengan kapitalisme, menjadi tantangan di bidang
- Globalisasi menghilangkan hambatan perdagangan antarnegara, menciptakan kesejahteraan. Ini pandangan globalisasi bagi kelompok masyarakat
- Sistem ekonomi di mana pasar bebas menentukan produksi dan harga barang tanpa intervensi negara
- Proses integrasi ekonomi, budaya, dan teknologi di seluruh dunia yang mempengaruhi cara masyarakat berinteraksi disebut
- Tindakan kejahatan dengan mencuri informasi pribadi di internet disebut
- Istilah untuk pengaruh budaya asing yang diadopsi dan mengubah gaya hidup masyarakat lokal
Down
- Apa istilah untuk penyebaran produk, merek, dan tren yang sama di berbagai negara
- Perubahan perilaku masyarakat akibat kemajuan teknologi disebut
- Jenis keamanan yang melindungi data dan informasi pribadi di dunia maya
- Masyarakat yang terhubung secara global melalui teknologi informasi disebut
- Apa istilah untuk perusahaan yang memiliki cabang dan beroperasi di berbagai negara
- Berkembangnya internet mempermudah akses informasi bagi masyarakat di seluruh dunia. Hal ini merupakan dampak globalisasi di bidang
- Fenomena masuknya tenaga kerja asing yang bisa mengancam pekerjaan lokal disebut
- Salah satu risiko yang dihadapi dalam masyarakat
- proses berbagi informasi dan ide melalui media sosial
- Fenomena penyebaran informasi palsu atau menyesatkan melalui internet disebut
20 Clues: Salah satu risiko yang dihadapi dalam masyarakat • fenomena ketika budaya lokal terpengaruh budaya asing • proses berbagi informasi dan ide melalui media sosial • Perpindahan massal penduduk dari desa ke kota besar disebut • Perubahan perilaku masyarakat akibat kemajuan teknologi disebut • Jenis keamanan yang melindungi data dan informasi pribadi di dunia maya • ...
TEKA-TEKI SILANG INFORMATIKA KELAS IX (2) 2024-11-05
Across
- Tanda pagar (#) yang digunakan untuk mengategorikan postingan di media sosial
- Tombol yang digunakan untuk menyukai atau memberikan tanda setuju pada suatu postingan
- Video blog, seringkali berisi konten pribadi atau tutorial
- Aplikasi yang digunakan untuk membuat presentasi dengan slide
- Situs web pribadi yang berisi tulisan-tulisan atau artikel secara teratur
- Program komputer yang digunakan untuk membuat dokumen seperti surat atau laporan
- Jaringan sosial yang fokus pada berbagi foto dan video singkat
- Praktik untuk melindungi sistem teknologi dan data dari ancaman digital, seperti kejahatan siber
- Format file dokumen yang umum digunakan (singkatan)
Down
- perangkat keras yang digunakan untuk mengontrol kursor di layar komputer
- Surat elektronik atau electronic mail yang merupakan cara untuk mengirim dan menerima pesan secara digital melalui jaringan internet
- Orang yang membuat dan mengunggah video ke YouTube atau platform serupa
- kegiatan yang dilakukan untuk mendapatkan akses tidak sah ke sistem atau jaringan komputer
- Program pengolah lembar kerja untuk mengelola data dalam bentuk tabel
- Platform online yang memungkinkan pengguna untuk berbagi informasi dan berinteraksi dengan orang lain
- Platform online yang memungkinkan pengguna untuk berkolaborasi pada dokumen secara bersamaan
- Orang yang membuat dan mengelola sebuah blog
- Platform berbagi video terbesar di dunia
- Bahasa pemrograman visual yang dirancang untuk membantu anak-anak dan pemula belajar pemrograman
- perangkat keras yang berfungsi untuk menampilkan data visual dari komputer, seperti gambar, teks, video, dan grafik
20 Clues: Platform berbagi video terbesar di dunia • Orang yang membuat dan mengelola sebuah blog • Format file dokumen yang umum digunakan (singkatan) • Video blog, seringkali berisi konten pribadi atau tutorial • Aplikasi yang digunakan untuk membuat presentasi dengan slide • Jaringan sosial yang fokus pada berbagi foto dan video singkat • ...
REV Cybersecurity Awareness Crossword Puzzle # 3 2019-10-16
Across
- address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
- injection type of input validation attack where SQL code is inserted into application queries to manipulate the database.
- approval, permission, or empowerment for someone or something to do something.
- basic communication language or "protocol" of the Internet.
- sequence of eight bits.
- code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
- encrypted form of the message being sent.
- Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network.
- repudiation prove that a user sent a message and the message has not been altered.
Down
- stripping one layer's headers and passing the rest of the packet up to next higher layer.
- force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
- gaining unauthorized logical access to sensitive data by circumventing a system's protections.
- process of confirming the correctness of the claimed identity.
- hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
- e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.
15 Clues: sequence of eight bits. • encrypted form of the message being sent. • basic communication language or "protocol" of the Internet. • process of confirming the correctness of the claimed identity. • approval, permission, or empowerment for someone or something to do something. • repudiation prove that a user sent a message and the message has not been altered. • ...
MIC Quiz 2 2023-04-25
Across
- A community for Black-identifying employees at Cisco to cultivate career growth, community involvement, and business excellence.
- A community that provides a space to connect, inspire, and transform the experience for families and children with special needs.
- A community for employees who have been touched by Alzheimer’s disease to help bring awareness and raise funds for research.
- A community dedicated to attracting, developing, retaining, and celebrating talented employees who identify as women at Cisco.
- A community for LatinX-identifying employees to experience personal and professional growth through inspirational leadership, coaching, and giving back.
- A community for Cisconians to learn about different faith systems and advocate for policy that’s sensitive to the needs of people with faith.
- A community for LGBTQ+ Cisconians and allies to network and drive inclusion in Cisco and local communities.
- A community for those who have been affected by diabetes to find support through education, resources, and raising funds for valuable research.
- A community that connects diverse aspiring inventors who identify as women at Cisco with experienced patent holders through a mentoring process.
- A community for employees seeking resources and events that will help them develop more mindful and resilient habits.
- A community for employees at Cisco who have been impacted by Cancer to share their experiences and foster a supportive space.
- A community for Cisconians who identify as women to achieve their full potential in Cybersecurity through education, mentoring, and networking opportunities.
- A community for technical employees who identify as women to create a positive impact in the lives of women and girls in STEM fields.
- A community that connects Cisconians with the tools and resources to drive social and environmental change at work and in their homes.
Down
- A community that empowers Cisco employees and partners to challenge employment and education inequalities for people with disabilities.
- A community for Cisco employees who are caregivers to adults to share experiences, advice, and support.
- A community for Filipino-identifying employees to pursue professional development, mentoring, and help attract and retain Filipino talent at Cisco.
- A community for employees who identify as women in Supply Chain to share work and life experiences and encourage professional growth.
- A community where Pan-Asian-identifying employees come together to amplify cultural pride, advocate for Pan-Asian talent, and propel social justice.
- A community for Cisco’s new and early-in-career talent to come together, network, and share resources.
- A community open to all Cisco employees who want to connect and help foster an inclusive culture.
- A community for women in Finance striving to elevate their performance though global development opportunities, mentoring circles, and insightful events.
- A community for Veterans to find valuable resources, mentoring, career guidance, and support transitioning out of the military and into Cisco.
- A community providing leaders and influencers who identify as men with the tools and education to drive inclusiveness for under-represented groups.
24 Clues: A community open to all Cisco employees who want to connect and help foster an inclusive culture. • A community for Cisco’s new and early-in-career talent to come together, network, and share resources. • A community for Cisco employees who are caregivers to adults to share experiences, advice, and support. • ...
RI&S BD&S Crossword Puzzle 2021-03-30
Across
- Common word in USGIS, GS&S and S3
- Any ______. Any challenge.
- "Formal agreement" + "car"
- The future of ______ and defense.
- "&" formal name for the symbol
- Last name of former VP of BD&S
- DE&I motto
- "light from the gods"
- "the second" in spanish
- Advanced _______ & Technology
- An RI&S strategic imperative: Secure market _______
- Global Solutions & ______
- Challenge ________
- The R in ISRS
- Enterprise Raytheon _______ Manager
- The opposite words of mechanical peacetime haphazards
- Common word in CAMS, EWS and ISRS
Down
- Former SAS headquarters (city)
- RTX just had its' first on 4.3.21.
- What is Rosslyn, Virginia (for RI&S)?
- Function led by the former BDE of ISRS (acronym, letters only)
- The first C in C2.
- The second C in C2
- Delivers trusted networking solutions for Joint All Domain Operations. (RI&S PL, acronym)
- The value: We act with integrity and do the right thing.
- A type of win.
- Span the enterprise and drive our actions, behaviors and _________.
- The first word of the BD&S mission statement.
- RI&S Product Line with alliteration
- Not a competitive win
- A safer, more _______ world.
- ________, Training and Services
- An enterprise wide RTX meeting (hint: there is one coming up on May 5)
- Function home of BD Ops and Customer Engagement
- The "I" in USGIS
- Bye bye Skype. Hello Microsoft _______.
36 Clues: DE&I motto • The R in ISRS • A type of win. • The "I" in USGIS • The first C in C2. • The second C in C2 • Challenge ________ • Not a competitive win • "light from the gods" • "the second" in spanish • Global Solutions & ______ • Any ______. Any challenge. • "Formal agreement" + "car" • A safer, more _______ world. • Advanced _______ & Technology • Former SAS headquarters (city) • ...
TOPIC 8 2024-05-02
Across
- What technology provides high-speed internet access through cable television lines?
- What are programs and operating information used by a computer?
- What refers to buying and selling goods or services over the internet?
- What are materials that do not conduct electricity?
- What technology uses unique biological characteristics for authentication?
- What refers to the physical components of a computer system?
- What are private networks that can only be accessed by authorized users?
- What material has electrical conductivity between a conductor and an insulator?
- What connects computers and other devices to share resources and information?
Down
- What is the process of combining multiple signals into one signal?
- What focuses on protecting computer systems from theft or damage to their hardware, software, or electronic data?
- What technology delivers computing services over the Internet?
- What technology overlays digital information on the real world?
- What is a decentralized and distributed digital ledger used for secure transactions?
- What are private networks that allow access to specific external users?
- What is a type of artificial intelligence that enables systems to learn from data?
- What technology uses lasers to read and write data on discs?
- What process converts information into a code to prevent unauthorized access?
- What concerns the protection of sensitive information from unauthorized access?
- What allows users to access data and information from anywhere using mobile devices?
20 Clues: What are materials that do not conduct electricity? • What technology uses lasers to read and write data on discs? • What refers to the physical components of a computer system? • What technology delivers computing services over the Internet? • What technology overlays digital information on the real world? • ...
TEKA-TEKI SILANG INFORMATIKA KELAS IX 2024-10-30
Across
- Platform online yang memungkinkan pengguna untuk berkolaborasi pada dokumen secara bersamaan
- Tombol yang digunakan untuk menyukai atau memberikan tanda setuju pada suatu postingan
- Program untuk mengelola data dalam bentuk tabel
- Video blog, seringkali berisi konten pribadi atau tutorial
- Situs web pribadi yang berisi tulisan-tulisan atau artikel secara teratur
- Program komputer yang digunakan untuk membuat dokumen seperti surat atau laporan
- Platform berbagi video terbesar di dunia
- Orang yang membuat dan mengelola sebuah blog
- Jaringan sosial yang fokus pada berbagi foto dan video singkat
- Bahasa pemrograman visual yang dirancang untuk membantu anak-anak dan pemula belajar pemrograman
- Tanda pagar (#) yang digunakan untuk mengategorikan postingan di media sosial
Down
- perangkat keras yang digunakan untuk mengontrol kursor di layar komputer
- Format file dokumen yang umum digunakan (singkatan)
- Aplikasi yang digunakan untuk membuat presentasi dengan slide
- Praktik untuk melindungi sistem teknologi dan data dari ancaman digital, seperti kejahatan siber
- kegiatan yang dilakukan untuk mendapatkan akses tidak sah ke sistem atau jaringan komputer
- perangkat keras yang berfungsi untuk menampilkan data visual dari komputer, seperti gambar, teks, video, dan grafik
- Surat elektronik atau electronic mail yang merupakan cara untuk mengirim dan menerima pesan secara digital melalui jaringan internet
- Orang yang membuat dan mengunggah video ke YouTube atau platform serupa
- Platform online yang memungkinkan pengguna untuk berbagi informasi dan berinteraksi dengan orang lain
20 Clues: Platform berbagi video terbesar di dunia • Orang yang membuat dan mengelola sebuah blog • Program untuk mengelola data dalam bentuk tabel • Format file dokumen yang umum digunakan (singkatan) • Video blog, seringkali berisi konten pribadi atau tutorial • Aplikasi yang digunakan untuk membuat presentasi dengan slide • ...
Intro to Cybersecurity CA #2 2024-10-23
Across
- Linux command used to search a file for keywords
- Base 16 system
- Changing the order of items
- Brain of the computer; determines what software can run on device
- Encryption method; pre-shared password is only used once
Down
- Subsitution cipher based on multiple alphabets using system to switch between
- Precise set of instructions on how to scramble/unscramble data
- Hiding messages in an image
- Displays absolute path of directory
- Sends message to destination device
- group of 2 or more computing devices connected to each other, giving access to the same data
11 Clues: Base 16 system • Hiding messages in an image • Changing the order of items • Displays absolute path of directory • Sends message to destination device • Linux command used to search a file for keywords • Encryption method; pre-shared password is only used once • Precise set of instructions on how to scramble/unscramble data • ...
REV CyberSecurity Awareness Crossword Puzzle # 1 2019-10-16
Across
- e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website.
- type of input validation attack where SQL code is inserted into application queries to manipulate the database.
- approval, permission, or empowerment for someone or something to do something.
- basic communication language or "protocol" of the Internet.
- TCP/IP protocol specifying the transfer of text or binary files across the network.
- gaining unauthorized logical access to sensitive data by circumventing a system's protections.
Down
- encrypted form of the message being sent.
- process of confirming the correctness of the claimed identity.
- prove that a user sent a message and the message has not been altered.
- software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse).
- sequence of eight bits.
- pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1).
- stripping one layer's headers and passing the rest of the packet up to next higher layer.
- hidden, self-replicating section of computer software that inserts itself and becomes part of the another program.
- cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
15 Clues: sequence of eight bits. • encrypted form of the message being sent. • basic communication language or "protocol" of the Internet. • process of confirming the correctness of the claimed identity. • prove that a user sent a message and the message has not been altered. • approval, permission, or empowerment for someone or something to do something. • ...
REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16
Across
- stripping one llayer's headers and passing the rest of the packet up to next higher layer
- sequence of eight bits
- e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
- approval, permission, or empowerment for someone or something to do something
- hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
- repudiation prove that a user sent a message and the message has not been altered
- basic communication language or "protocol" of the Internet
- Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network
- injection type of input validation attack where SQL code is inserted into application queries to manipulate the database
Down
- address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1)
- gaining unauthorized logical access to sensitive data by circumventing a system's protections
- process of confirming the correctness of the claimed identity
- code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse)
- encrypted form of the message being sent
- force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one
15 Clues: sequence of eight bits • encrypted form of the message being sent • basic communication language or "protocol" of the Internet • process of confirming the correctness of the claimed identity • approval, permission, or empowerment for someone or something to do something • repudiation prove that a user sent a message and the message has not been altered • ...
CYBERLAW CROSSWORD 2021-09-05
Across
- Device that raise a number of security concerns because they create links between your computer and the outside world
- An economy that is based on digital computing technologies
- The code used in creating the environment that then forms Cyberspace.
- The use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- The ability to use computer technologies effectively and to understand the implications of your actions
Down
- The integration of two or more different technologies in a single device or system
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
- An independent U.S. government agency that oversees all interstate and international communications.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- A critical requirement for the sharing of digital text
10 Clues: A critical requirement for the sharing of digital text • An economy that is based on digital computing technologies • The code used in creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- A piece of digital information generated by a web server and saved in your computer after visiting a website
- A network using which things can communicate with each other using internet as means of communication between them.
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
Down
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- An attempt by hackers to damage or destroy a computer network or system.
- A software that is designed to detect and destroy compute viruses.
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
CAES Security Week 2024-01-29
Across
- This network security system acts as a barrier, controlling and monitoring incoming and outgoing traffic.
- Enhances security by requiring users to provide two different authentication factors, often something they know and something they have.
- The process of converting information into a code to secure it from unauthorized access.
- Weaknesses or flaws in a system’s security that could be exploited by attackers.
- A broad term for malicious software, including viruses, worms, and ransomware, designed to harm or exploit computer systems.
- Cyber attackers often use deceptive emails or messages in an attempt to trick individuals into revealing sensitive information through this method.
Down
- Software updates designed to fix security vulnerabilities and improve overall system performance.
- Unauthorized access or breach into a system, network, or device.
- The process of verifying the identity of a user, device, or system, typically through passwords or biometrics.
- The art of writing or solving codes; used in cybersecurity to secure communication through encryption.
10 Clues: Unauthorized access or breach into a system, network, or device. • Weaknesses or flaws in a system’s security that could be exploited by attackers. • The process of converting information into a code to secure it from unauthorized access. • Software updates designed to fix security vulnerabilities and improve overall system performance. • ...
26 2024-01-08
Across
- The activity of exploiting genetic material experimentally without regard to ethical considerations.
- Commercial transactions conducted electronically on the Internet.
- Change Long-term change in the average weather patterns that have come to define Earth's local, regional, and global climates. (Note: Repeated for variety.)
- Including all or everyone; not excluding any particular group or individual.
- A step-by-step procedure or formula for solving a problem or accomplishing a task.
- The remote diagnosis and treatment of patients by means of telecommunications technology.
- A digital or virtual form of currency that uses cryptography for security.
Down
- Work Working from a location other than the central office, often from home.
- The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
- A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
- Reality An artificial environment created with the help of computer technology, often including simulated physical presence.
- A digital or virtual form of currency that uses cryptography for security. (Note: Repeated for variety.)
12 Clues: Commercial transactions conducted electronically on the Internet. • A digital or virtual form of currency that uses cryptography for security. • Work Working from a location other than the central office, often from home. • Including all or everyone; not excluding any particular group or individual. • ...
Jaringan Komputer dan Internet Elda 2024-01-14
Across
- kerangka kerja konseptual yang membagi fungsi komunikasi jaringan menjadi tujuh lapisan
- perangkat yang menghubungkan perangkat lain dalam jaringan tanpa memperhatikan alamat tujuan
- suatu sistem yang saling berhubungan antara satu dengan lainnya sehingga dapat saling berbagi informasi, program-program, penggunaan bersama perangkat keras
- salah satu aspek jaringan komputer yang berfungsi berbagi sumber daya atau resource sharing seharusnya dapat dilakukan tanpa terkendala jarak
- salah satu contoh Transmission Control Protocol/Internet Protocol (TCP/IP) yang umumnya dipakai dalam model client-server mencakup banyak protokol lintas lapisa
- layer bertanggung jawab mempersiapkan data agar digunakan program tertentu
Down
- pengumpulan proses, kebijakan, peran, metrik, dan standar yang memastikan penggunaan informasi secara efektif
- salah satu jenis topologi jaringan yang digunakan untuk menghubungkan sebuah komputer dengan komputer lainnya dalam sebuah rangkaian yang berbentuk melingkar seperti cincin
- pengaman siber merupakan praktik melindungi komputer
- salah satu jaringan yang berfungsi untuk menghubungkan perangkat jaringan dalam jangkauan yang relatif kecil
10 Clues: pengaman siber merupakan praktik melindungi komputer • layer bertanggung jawab mempersiapkan data agar digunakan program tertentu • kerangka kerja konseptual yang membagi fungsi komunikasi jaringan menjadi tujuh lapisan • perangkat yang menghubungkan perangkat lain dalam jaringan tanpa memperhatikan alamat tujuan • ...
Superb Security Crossword Challenge 2020-05-07
Across
- An unpatched laptop is … to an attack or how you feel when you finish watching “The Notebook”
- The highest level of privilege which can be exposed (Windows)
- Unlawful data exposure
- …..engineering refers to the method attackers use to manipulate people into sharing sensitive information
- Converts passwords to unreadable strings or a good way to prepare potatoes
- What makes your laptop/PC sick
- Cybersecurity is our shared...
- …..identifiable information is any data that could potentially identify a specific individual
- Bad junk emails
- European privacy law
- Bad for your laptop/PC, but helpful to aerate the garden
Down
- Everyone has these and they are unique to each person
- Malware that misleads users of its true intent, or a big wooden horse
- Technology that extends a private network across a public network
- Should contain a minimum of 9 characters using a combination of upper case letters, lower case letters, numbers, and special characters.
- A guy in a hoodie, in his mom’s basement, trying to access your personal data
- Tool for stealing credit cards
- Ransomware that affected NHS in 2017, or what you want to do when you realize you might have this malware
- A malicious program designed to record which keys are being pressed on a computer keyboard
- Don't click on….within emails from an unknown or untrusted source.
20 Clues: Bad junk emails • European privacy law • Unlawful data exposure • Tool for stealing credit cards • What makes your laptop/PC sick • Cybersecurity is our shared... • Everyone has these and they are unique to each person • Bad for your laptop/PC, but helpful to aerate the garden • The highest level of privilege which can be exposed (Windows) • ...
FITE Vocab: Hailey Hobbs 2013-05-16
Across
- to cite or quote a reference
- one thousand exabytes
- one million bytes
- close up preview of a template
- one thousand megabytes
- communications sent without wires or cables
- LCD
- eight bytes
- large circuit board
- symbol for a company
- computer software used to search data
- network name
- port that connects the mouse or keyboard to PC
- Ex: monitor, printer
- a thousand bytes
- appearence of a document
- plug your flashdrive into
- wireless home network
- wired internet
- one thousand brontobytes
Down
- zoomable presentation program
- arrangement of data for a computer
- a device that has a lot of data storage
- protection of information computer/networks
- one thousand gigabytes
- smallest unit of data
- one thousand petabytes
- computer screen
- anything you can create something on
- LAD
- search engine that checks all search engines
- Ex:comcast,verizon
- one thousand terabytes
- Ex: flash drive,earbuds
- one thousand zetabytes
- document or file made with a preset format
- personal conduct online
- rules to keep people safe online
- any type of internet hosting service
- ceremonial induction into office
- Ex: mouse, flash drive
- one thousand yottabytes
- a short memorable phrase for advertising
- a way to save a file in adobe
- Ex: headphones, speakers
45 Clues: LAD • LCD • eight bytes • network name • wired internet • computer screen • a thousand bytes • one million bytes • Ex:comcast,verizon • large circuit board • symbol for a company • Ex: monitor, printer • one thousand exabytes • smallest unit of data • wireless home network • one thousand gigabytes • one thousand petabytes • one thousand megabytes • one thousand terabytes • one thousand zetabytes • ...
The 2023 Learning & Development Crossword 2023-11-28
Across
- How you prioritize personal and professional activities in your life.
- A human-centered approach to problem solving.
- measures your ability to identify, understand, and manage your emotions and the emotions of others.
- Communication that is delivered by way of visual aids.
- type of malware attack used by thieves to kidnap your data or files and hold them hostage until you pay them a ransom.
- The established set of attitudes held by someone.
- Acting in a way that makes others view you as trustworthy, respectful, accountable competent, and effective.
- Communication that takes the form of anything you write or type.
- A more senior, successful, or skilled professional who regularly provides guidance and gives you advice based on their own experience and expertise.
- measures someone's ability to adapt.
Down
- Exploratory, spontaneous, and unrestricted.
- Brings your attention to the here and now.
- Computer systems that can learn and adapt without direct human intervention.
- Initiation, planning, execution, and closure.
- the art of protecting networks, devices, and data from unauthorized access
- efficiently accomplishing tasks that bring you closer to your goals
- Communication that uses spoken word or language.
- Capability of a machine to imitate intelligent human behavior through automation of various types of tasks.
- Method of trying to gather personal information using deceptive e-mails and websites.
- Communication that includes facial expressions, posture, eye contact, etc.
20 Clues: measures someone's ability to adapt. • Brings your attention to the here and now. • Exploratory, spontaneous, and unrestricted. • A human-centered approach to problem solving. • Initiation, planning, execution, and closure. • Communication that uses spoken word or language. • The established set of attitudes held by someone. • ...
crossword on words related to AI 2024-10-21
Across
- The process of converting information into a code to prevent unauthorized access.
- Protection of internet-connected systems from cyberattacks
Down
- A pioneering network that laid the groundwork for the internet by connecting universities and research labs.
- Remote servers used to store data and run applications over the internet.
4 Clues: Protection of internet-connected systems from cyberattacks • Remote servers used to store data and run applications over the internet. • The process of converting information into a code to prevent unauthorized access. • A pioneering network that laid the groundwork for the internet by connecting universities and research labs.
PHW Compliance Week 2024-10-08
Across
- 2. You should call the _____________ to report a suspected or known violation.
- 3. Wrongful or criminal deception intended to result in financial or personal gain.
- 14. Any possible ______________ event should be reported to the compliance team as soon as it is discovered.
- 13. Compliance _____________ is my favorite time of the year!
- 4. The Compliance program is supported by _____________ and Procedures.
- 9. Abusive, Offensive or Discriminatory remarks are what type of abuse?
- 8. PHW will strictly prohibit and will not tolerate any form of ___________ or bullying.
- 7. All _______________ are responsible for the information in the Code of Conduct and Compliance Program and will be held accountable for failing to comply.
Down
- 6. An official inspection of an individual’s or organization’s accounts.
- 15. You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the __________ home page.
- 1. The _________________ Officer is responsible for implementing and supporting the effectiveness of the Compliance Program.
- 5. Computer Security.
- 10. All employees are required to complete these in Centene University by the assigned due dates.
- 12. Sending an email securely means it has been _____________________.
- 11. FWA stands for Fraud, ____________ and Abuse.
15 Clues: 5. Computer Security. • 11. FWA stands for Fraud, ____________ and Abuse. • 13. Compliance _____________ is my favorite time of the year! • 12. Sending an email securely means it has been _____________________. • 4. The Compliance program is supported by _____________ and Procedures. • 9. Abusive, Offensive or Discriminatory remarks are what type of abuse? • ...
Compliance week 2024-10-28
Across
- Abusive, Offensive or Discriminatory remarks are what type of abuse?
- PHW will strictly prohibit and will not tolerate any form of ____ or bullying.
- Compliance ______ is my favorite time of the year!
- The compliance program is supported by _____ and Procedures.
- The _______ Officer is responsible for implementing and supporting the effectiveness of the compliance program.
- Protecting systems and data from digital attacks
- Sending and email securely means it has been ______
- You should call the ____ to report a suspected or known violation.
Down
- Any Possible _____ event should be reported to the compliance team as soon as it is discovered
- All ______ are responsible for the information in the Code of Conduct and Compliance Program and will be responsible for failing to comply
- FWA stands for Fraud,_____ and Abuse.
- All employees are required to complete these in Centene University by the assigned due dates.
- An official inspection of an individual's or organization's accounts.
- You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the _____ home page.
- Wrongful or criminal deception intended to result in financial or personal gain
15 Clues: FWA stands for Fraud,_____ and Abuse. • Protecting systems and data from digital attacks • Compliance ______ is my favorite time of the year! • Sending and email securely means it has been ______ • The compliance program is supported by _____ and Procedures. • You should call the ____ to report a suspected or known violation. • ...
Cyber security 2022-09-07
Across
- An important process that verifies a user is really who they are; many different ways this can be done
- I am not a robot
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
- a collection of malware infested computers that form a network to attack
- A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
Down
- Full name of DoS attack
- An annoying malware that spams you with ads
- When raw data is put into context and has meaning, the data transforms into _____
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
10 Clues: I am not a robot • Full name of DoS attack • An annoying malware that spams you with ads • a collection of malware infested computers that form a network to attack • When raw data is put into context and has meaning, the data transforms into _____ • Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing. • ...
The Need for Cybersecurity - Chapter 1 2023-08-14
Across
- esfuerzo continuo para proteger los sistemas en red conectados a Internet y para proteger todos los datos del uso no autorizado o daño
- confidentiality, integrity, y availability
- el término que indica exactitud, consistencia y confiabilidad de los datos
- códigos de comportamiento que a veces, pero no siempre, son impuestos por leyes
- una gran red de objetos físicos que incluye sensores y equipos
- un conflicto basado en Internet que involucra la penetración de sistemas informáticos y redes de otras naciones
Down
- el acceso a los datos está restringido solo al personal autorizado
- International Multilateral Partnership Against Cyber Threats
- el término que describe los servicios y datos que se mantienen bien y se puede acceder a ellos todo el tiempo
- un programa de malware diseñado para dañar la planta de enriquecimiento nuclear de Irán, un programa que es un ejemplo de un ataque patrocinado por el estado
10 Clues: confidentiality, integrity, y availability • International Multilateral Partnership Against Cyber Threats • una gran red de objetos físicos que incluye sensores y equipos • el acceso a los datos está restringido solo al personal autorizado • el término que indica exactitud, consistencia y confiabilidad de los datos • ...
Security Awareness crossword puzzle 2018-05-07
Across
- _______ your data regularly and periodically check that you are able to restore them.
- Do not provide your _______ email account to social networks.
- _______ your computer when left unattended.
- This can slow down your computer and watch everywhere you go on the Internet.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Always use _______ factor authentication where available.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Use a _______ password different from the passwords you use to access other sites.
Down
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- You should always keep your software and anti-virus definitions up-to-_______.
- Cybersecurity is _______'s responsibility.
- Information Security is a _______ issue.
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- _______ before you click or forward.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
CyberQuiz 2024-02-05
Across
- Software that detects and removes malicious programs on a computer
- Cyber attack attempting to discover a password or cryptographic key by trying all possible combinations
- System designed to mimic a vulnerable resource to attract and monitor cyber attacks
- Malware that encrypts user data, demanding payment for decryption
- Secret or hidden access point in a system, often used to bypass normal authentication
- Code or sequence of commands exploiting a system vulnerability for unauthorized access
Down
- Activity where an attacker pretends to be someone else or manipulates information to appear from a trusted source
- Cyber attack aiming to obtain sensitive information by posing as a trustworthy source
- Weakness or flaw in a system that could be exploited for unauthorized access
- A sequence of characters used for authentication to access a system or account
- Hidden part of the internet associated with illicit activities and anonymity
- Team Group of specialists simulating attacks on a system or network to identify vulnerabilities
- Security system that monitors and controls network traffic
- Team Defensive cybersecurity team responsible for protecting a system or network.
- Network of compromised computers controlled by a single entity for malicious activities
15 Clues: Security system that monitors and controls network traffic • Malware that encrypts user data, demanding payment for decryption • Software that detects and removes malicious programs on a computer • Weakness or flaw in a system that could be exploited for unauthorized access • Hidden part of the internet associated with illicit activities and anonymity • ...
Puzzle - 8 2022-10-10
Across
- Badguys in the world of cybercrime. Hackers with criminal intentions
- a program that can automatically perform some simple repeated task to reach a pursued goal.
- A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- a type of internet fraud that seeks to acquire a user’s credentials by deception.
- A combination of the words "robot" and "network"
Down
- the process of verifying the identity of a user or piece of information and the veracity of information provided.
- Cryptocurrency, a form of electronic cash
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- Completely Automated Public Turing test to tell Computers and Humans Apart
- malware that spies on the computer to collect information about a product, a company, a person
10 Clues: Cryptocurrency, a form of electronic cash • A combination of the words "robot" and "network" • Badguys in the world of cybercrime. Hackers with criminal intentions • Completely Automated Public Turing test to tell Computers and Humans Apart • a type of internet fraud that seeks to acquire a user’s credentials by deception. • ...
Forensic Investigation and Incident Response 2022-09-26
Across
- Identifying critical assets that could be at risk – what could go wrong?
- Understanding the potential impacts of cyber threats were they to materialize is important.
- process to ensure the needed logs data is collected and stored for an appropriate amount of time.
- the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
- Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
Down
- Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
- Identify and track the origin of data, software, and/or hardware elements.
- info that can be of vital importance to the outcome of legal proceedings or investigations.
- It is a technique used to consistently trick an adversary during a cyber-attack.
10 Clues: Identifying critical assets that could be at risk – what could go wrong? • Identify and track the origin of data, software, and/or hardware elements. • It is a technique used to consistently trick an adversary during a cyber-attack. • Understanding the potential impacts of cyber threats were they to materialize is important. • ...
Fundamental Concept Related to ICT 2024-09-28
Across
- computing the delivery of computing services (e.g., servers, storage, databases, networking) over the internet ("the cloud")
- Intelligence (AI) the simulation of human intelligence processes by machines, particularly computer systems.
- an organized collection of data that is stored and accessed electronically from a computer system.
- a global system of interconnected computer networks that use the TCP/IP protocol to communicate between devices.
- the physical components of a computer s(e.g., monitor, keyboard, CPU).
- the process of connecting multiple computing devices together to share resources and information.
Down
- programs and applications that run on a computer or other digital devices, instructing them how to perform tasks.
- information that is processed or stored by a computer, often in digital form.
- Literacy the ability to use information and communication technologies to find, evaluate, create, and communicate information.
- the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
10 Clues: the physical components of a computer s(e.g., monitor, keyboard, CPU). • information that is processed or stored by a computer, often in digital form. • the process of connecting multiple computing devices together to share resources and information. • an organized collection of data that is stored and accessed electronically from a computer system. • ...
Cybersecurity Month Puzzle 1 DAS Cybersecurity Tools 2024-10-01
6 Clues: The state's SIEM, where logs are sent to. • The state's secure web gateway and URL filter. • The state's vulnerability management solution. • The state's antivirus and antimalware solition. • Encrypts the data on a users desktop or laptop. • The security solution built into all Windows workstations.
Security Awareness crossword puzzle 2018-05-07
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- _______ your data regularly and periodically check that you are able to restore them.
- _______ before you click or forward.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- Cybersecurity is _______'s responsibility.
- Always use _______ factor authentication where available.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
Down
- You should always keep your software and anti-virus definitions up-to-_______.
- Use a _______ password different from the passwords you use to access other sites.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Information Security is a _______ issue.
- Do not provide your _______ email account to social networks.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Information Security 2023-12-18
Across
- A secret word or phrase that must be used to gain access to a system or service.
- A technique that falsifies the identity or location of a sender or receiver.
- A deliberate attempt to compromise or damage a system, network, or program.
- The process of protecting data by secret code.
- A cybercriminal who breaks into systems
- A part of the internet that is hidden from regular search engines and requires special software to access.
- A software program that enters a computer system without the owner’s knowledge or consent.
Down
- The practice of protecting systems, networks, and programs from digital attacks.
- A type of malware that infects and replicates itself on other files or programs
- A small computer defect that causes errors or failures.
- A small piece of data stored on a user’s browser that tracks their preferences or activities.
- A fraudulent attempt to obtain sensitive information by impersonating a legitimate entity.
- A type of malware that encrypts the victim’s data and demands payment for its decryption.
- Unsolicited or unwanted messages sent over the internet, usually for advertising purposes.
- A system that prevents unauthorized access to a network or device.
15 Clues: A cybercriminal who breaks into systems • The process of protecting data by secret code. • A small computer defect that causes errors or failures. • A system that prevents unauthorized access to a network or device. • A deliberate attempt to compromise or damage a system, network, or program. • ...
Cyber Security 2024-09-20
Across
- – An event or occurrence that disrupts normal operations, often involving security threats.
- – The act of breaking into a system, network, or data storage illegally.
- – Free from danger or threat; used to describe a well-protected system.
- – A copy of data stored separately to restore the original in case of data loss.
- – Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- – Unauthorized access or entry into a computer system or network.
- – A secret word or phrase used to gain access to a computer system or service.
- – Software specifically designed to disrupt, damage, or gain unauthorized access to systems.
- – The process of verifying the identity of a user or system.
Down
- – The process of converting data into a code to prevent unauthorized access.
- – Adherence to laws, regulations, and standards, especially in cybersecurity.
- – A type of malicious software that replicates itself and spreads to other systems.
- – A network security system that monitors and controls incoming and outgoing network traffic.
- – Malicious software designed to gather information about a person or organization without their knowledge.
- – Strong and reliable, often used to describe a system that can withstand attacks or failures.
15 Clues: – The process of verifying the identity of a user or system. • – Unauthorized access or entry into a computer system or network. • – Free from danger or threat; used to describe a well-protected system. • – The act of breaking into a system, network, or data storage illegally. • – The process of converting data into a code to prevent unauthorized access. • ...
Cybersecurity Lesson 3 & 4 Key Terms Crossword 2022-08-31
Across
- could be text-based works, computer programs, musical compositions, graphical creations and sound recordings.
- is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
- Malicious code that secretly watches your computer activity and sends the information over the Internet which can secretly capture your keystrokes (including passwords) and compromise your identity.
- means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the companies that provide the services and probably by your browser.
- is important for creating strong passwords.
- exposes you and your computer to cybersecurity vulnerabilities are known as viruses, malware, scams and identity theft.
- the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody without paying for it.
- enables an author to distribute their copyrighted work freely also offer the right to use, share and add to work from these authors.
Down
- works that are not copyrighted for any of a number of reasons.
- is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
- Fake e-mail message appearing to be from a trusted business, social network or other contact.
- Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer and spread by human actions such as sharing infected files.
- is the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
- is using someone else’s work and passing it off as your own.
- keeping your personal information safe and personal.
- protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account.
- Programs that look useful, but actually cause damage to your computer.
- downloading songs and movies from the Internet without permission or payment is an illegal use of copyrighted material.
- special types of viruses that can travel from computer to computer without human action, is self-replicating and can multiply until it uses up the computer's resources.
- URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
- are formal ways of giving credit to people for their work.
21 Clues: is important for creating strong passwords. • keeping your personal information safe and personal. • are formal ways of giving credit to people for their work. • is using someone else’s work and passing it off as your own. • works that are not copyrighted for any of a number of reasons. • Programs that look useful, but actually cause damage to your computer. • ...