cybersecurity Crossword Puzzles
Cyber Security 2024-09-20
Across
- – An event or occurrence that disrupts normal operations, often involving security threats.
- – The act of breaking into a system, network, or data storage illegally.
- – Free from danger or threat; used to describe a well-protected system.
- – A copy of data stored separately to restore the original in case of data loss.
- – Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- – Unauthorized access or entry into a computer system or network.
- – A secret word or phrase used to gain access to a computer system or service.
- – Software specifically designed to disrupt, damage, or gain unauthorized access to systems.
- – The process of verifying the identity of a user or system.
Down
- – The process of converting data into a code to prevent unauthorized access.
- – Adherence to laws, regulations, and standards, especially in cybersecurity.
- – A type of malicious software that replicates itself and spreads to other systems.
- – A network security system that monitors and controls incoming and outgoing network traffic.
- – Malicious software designed to gather information about a person or organization without their knowledge.
- – Strong and reliable, often used to describe a system that can withstand attacks or failures.
15 Clues: – The process of verifying the identity of a user or system. • – Unauthorized access or entry into a computer system or network. • – Free from danger or threat; used to describe a well-protected system. • – The act of breaking into a system, network, or data storage illegally. • – The process of converting data into a code to prevent unauthorized access. • ...
Cybersecurity Lesson 3 & 4 Key Terms Crossword 2022-08-31
Across
- could be text-based works, computer programs, musical compositions, graphical creations and sound recordings.
- is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
- Malicious code that secretly watches your computer activity and sends the information over the Internet which can secretly capture your keystrokes (including passwords) and compromise your identity.
- means that when you update your status, check-in to a location or post a photo, these things are being saved and tracked, both by the companies that provide the services and probably by your browser.
- is important for creating strong passwords.
- exposes you and your computer to cybersecurity vulnerabilities are known as viruses, malware, scams and identity theft.
- the ability to use a copyrighted work's words, images, or ideas in a small, non-commercial way, or in a parody without paying for it.
- enables an author to distribute their copyrighted work freely also offer the right to use, share and add to work from these authors.
Down
- works that are not copyrighted for any of a number of reasons.
- is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
- Fake e-mail message appearing to be from a trusted business, social network or other contact.
- Malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer and spread by human actions such as sharing infected files.
- is the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
- is using someone else’s work and passing it off as your own.
- keeping your personal information safe and personal.
- protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account.
- Programs that look useful, but actually cause damage to your computer.
- downloading songs and movies from the Internet without permission or payment is an illegal use of copyrighted material.
- special types of viruses that can travel from computer to computer without human action, is self-replicating and can multiply until it uses up the computer's resources.
- URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware.
- are formal ways of giving credit to people for their work.
21 Clues: is important for creating strong passwords. • keeping your personal information safe and personal. • are formal ways of giving credit to people for their work. • is using someone else’s work and passing it off as your own. • works that are not copyrighted for any of a number of reasons. • Programs that look useful, but actually cause damage to your computer. • ...
Introduction to Cybersecurity New Year's Challenge 101 2024-01-01
Across
- Information that can be shared but only with your or your parents permission.
- Information can be shared but not with everybody.
- A tool that helps make sure you only see things on the internet that are safe for kids.
- Things that are just for you and not for sharing on the internet, like your password.
- It means keeping things a secret, especially your personal information like where you live or your full name.
- It's a massive, invisible web that lets you visit websites from all over the world right from your home.
- It's like sending a letter, but it's done on the computer and the person you're sending to gets it right away.
- It's like a secret code that lets you open a locked door, but instead, you're getting into your online games or learning apps.
- It's a place on the internet where you can read, watch videos, play games, and learn new things.
- It's like a smart TV you can type on and use to play games and learn new things.
- Just like picking a toy from a store shelf and bringing it home, but you're picking a game or a picture from the internet and putting it on your computer.
- It's just like the keyboard on a piano but instead of making music, this one is used to type words and numbers.
- It's like talking to a friend in person, but you're typing words on a computer instead.
- It's the name you use when you play games or learn online, so you don't have to use your real name.
- It's like a superhero shield that protects your computer from bad guys.
Down
- Being careful on the internet and not talking to strangers or sharing personal information like your address.
- It's the part of a computer or TV where the pictures and words show up.
- When you take a picture or write a story on your computer and then put it on the internet for others to see.
- A nasty bug that can make a computer sick, much like how a cold bug can make you sick.
- It's when someone tries to pretend they're you on the internet. They might try to take your password or other personal information.
- A small device you can move around to control what happens on your computer screen.
- A person who tries to break into computers and websites without permission, like a burglar, but online.
- Just like junk mail you get in your mailbox, but this comes in your email.
- Do not share this information (Social Security number, passwords). Very private.
- This is when someone uses the internet to be mean or tease someone else. It's important to tell an adult if this happens.
- It's like medicine for your computer. It helps to remove viruses and keeps your computer healthy.
26 Clues: Information can be shared but not with everybody. • It's the part of a computer or TV where the pictures and words show up. • It's like a superhero shield that protects your computer from bad guys. • Just like junk mail you get in your mailbox, but this comes in your email. • Information that can be shared but only with your or your parents permission. • ...
Cybersecurity Fundamental Chapter 3 Part 2 2022-10-18
Across
- a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
- one man's trash is another man's treasure
- use short message service (sms) to send fake text messages
- attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
- application that behave in an annoying or undesirable manner.
- impersonation attack, and it takes advantage of a trusted relationship between two systems.
- criminal tags along with an authorized person to gain entry into a secured location.
Down
- looking over one's shoulder to get their pin or access code.
- an attacker requests personal information from a party in exchange for something like a gift.
- intercepting communication between computers to steal information crossing the network.
- action of pretending to be someone else
- non-technical means for a criminal to gather information on a target.
- involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
- examines all network traffic as it passes through their Network Interface Card (NIC).
- records or logs the keystrokes of the user of the system.
15 Clues: action of pretending to be someone else • one man's trash is another man's treasure • records or logs the keystrokes of the user of the system. • use short message service (sms) to send fake text messages • looking over one's shoulder to get their pin or access code. • application that behave in an annoying or undesirable manner. • ...
ciao6 2022-02-03
Across
- : è un testo crittografato trasformato da testo non crittografato utilizzando un algoritmo di crittografia
- : truffa informatica effettuata inviando un'e-mail con il logo contraffatto di un istituto di credito, in cui si invita il destinatario a fornire dati riservati.
- :rappresenta la sicurezza informatica
Down
- : è l’espressione con cui ci si riferisce ai contenuti criptati e non liberamente accessibili collocati nelle darknet, reti oscure e “parallele” accessibili solo tramite configurazioni specifiche e specifiche autorizzazioni d’accesso.
- : testo in chiaro in inglese
- : è il processo di codifica delle informazioni
- : è la porzione del World Wide Web che è prontamente disponibile al grande pubblico e ricercabile con i motori di ricerca web standard
7 Clues: : testo in chiaro in inglese • :rappresenta la sicurezza informatica • : è il processo di codifica delle informazioni • : è un testo crittografato trasformato da testo non crittografato utilizzando un algoritmo di crittografia • ...
OA ISM SECURITY CROSSWORD 2023-08-24
Across
- A person who attempts to gain unauthorized access to computer systems.
- The quality of data being accurate, consistent, and unaltered.
- The process of converting data into a code to prevent unauthorized access.
- A piece of code capable of self-replicating and causing damage to a computer system.
- Faking the source of data to appear as if it's coming from a trusted source.
- The state of keeping information private and only accessible to authorized parties.
- A network security device that monitors and controls incoming and outgoing traffic.
- Ensuring that computer systems and data are accessible when needed.
Down
- Software intended to harm or exploit computer systems and data.
- Measures taken to secure computer systems from threats and vulnerabilities.
- A type of cyber attack where fraudulent emails are used to deceive individuals into revealing sensitive information.
- (Virtual Private Network): A technology that provides secure and private connections over public networks.
- Malicious software that encrypts a user's data and demands payment to restore access.
- Software that collects information from a computer or network without the user's knowledge.
- Engineering: Manipulating individuals to divulge confidential information or perform actions unknowingly.
- A secret combination of characters used to access a system or data.
- The potential for loss or harm in the context of cybersecurity.
17 Clues: The quality of data being accurate, consistent, and unaltered. • Software intended to harm or exploit computer systems and data. • The potential for loss or harm in the context of cybersecurity. • A secret combination of characters used to access a system or data. • Ensuring that computer systems and data are accessible when needed. • ...
fintech 2024-03-05
Across
- digitally distributed, decentralized, public ledger that exists across a network
- type of technology that is considered environmentally friendly based on its production process or its supply chain
- the practice of protecting systems, networks, and programs from digital attacks
Down
- utilization of technology, for example, big data and artificial intelligence(AI), to offer an alternative to conventional wealth management firms
- the use of technology innovations to bring in savings and efficiency to the insurance industry model
- management of regulatory monitoring, reporting, and compliance within the financial industry through technology
- any payments that involve technology, such as paying bus fare with a QR code or tapping a mobile phone on a credit card reader
7 Clues: the practice of protecting systems, networks, and programs from digital attacks • digitally distributed, decentralized, public ledger that exists across a network • the use of technology innovations to bring in savings and efficiency to the insurance industry model • ...
MHI - Crossword 2024-08-27
Across
- Abbreviation for the digital version of a patient's medical history
- The ability of different health information systems to work together within and across organizational boundaries
- Largest hospital network and health research organizationin Canada
- An online platform that gives patients access to their health information and the ability to communicate with healthcare providers
- Last Name of MHI Program Director
- An independent, not-for-profit corporation dedicated to AI research
- The use of telecommunications technology to provide clinical healthcare from a distance
- The simulation of human intelligence in machines, often used in predictive analytics (2 words)
Down
- The practice of protecting systems, networks, and programs from digital attacks in the healthcare industry
- A MHI Prof is the founder of this company that creates digital health solutions
- UofT website where you can find your transcript
- State of physical, emotional, and mental exhaustion often experienced by healthcare professionals due to prolonged stress
- Permission given by a patient to share their personal health information with others.
- The largest academic science and health science library in Canada
- The social media platform used mainly for networking
- The institution that the MHI Program falls under
- The sequence of processes through which a piece of work passes from initiation to completion in healthcare settings
17 Clues: Last Name of MHI Program Director • UofT website where you can find your transcript • The institution that the MHI Program falls under • The social media platform used mainly for networking • The largest academic science and health science library in Canada • Largest hospital network and health research organizationin Canada • ...
Technology and AI vocabulary 2024-05-29
Across
- The science of making machines that can think like humans.
- A portable and wearable electronic device in form of a watch that can do things not related to showing the time.
- The practice of protecting systems, networks and programs from digital attacks.
- A machine that does tasks without the help of a person.
- A mobile electronic device that work as a computer but is small enough to fit in a person's hand.
- It is basically the Internet. More specifically, it is to all the things that you have remotely and unlimited access over the internet.
Down
- An electronic device that can store and process information.
- A person that has the ability to influence the behaviour or opinions of others.
- A flying robot that can be remotely controlled or fly autonomously.
- A set of steps used to solve a specific problem.
- A computer program that simulates and processes human conversation (either written or spoken), allowing humans to interact with digital devices as if they were communicating with a real person.
- A technology that allows devices to communicate with each other without cables.
- Small, portable personal computer.
13 Clues: Small, portable personal computer. • A set of steps used to solve a specific problem. • A machine that does tasks without the help of a person. • The science of making machines that can think like humans. • An electronic device that can store and process information. • A flying robot that can be remotely controlled or fly autonomously. • ...
Cross Word Questions for Q1 Newsletter 2023-07-17
Across
- How many escalators were/are going to be replaced serving he Flushing Line platform and Lexington Avenue mezzanine?
- How many people celebrated their milestone anniversary?
- From the Employee Spotlight corner, which Employee wants his next big trip to be Japan?
- What was the topic of Quarter 1’s Tech Tip?
- Which storm caused significant damage to the New York City area prompting Long Island Railroad/Metropolitan Transportation Authority to construct floodwalls around existing rail yards?
- What brand of ice cream was served at the Build Your Own Sunday event?
- Which employee has been in the engineering field for over 40 years?
- Which award was given to the entire company?
Down
- Who do you reach out to if you are interested in volunteering with Naik?
- If you are in the NY office and need a break, where can you find an array of games to help break up the day?
- What is Sweety’s baby’s first name?
- From the HR corner, what is the third top health issue that impacts women?
- What month did Meet Desai get married?
13 Clues: What is Sweety’s baby’s first name? • What month did Meet Desai get married? • What was the topic of Quarter 1’s Tech Tip? • Which award was given to the entire company? • How many people celebrated their milestone anniversary? • Which employee has been in the engineering field for over 40 years? • ...
Puzzle - 4 2022-10-10
Across
- used by attackers to gain access to a computer or a network.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- when someone uses a social network to create an account with a fake identity to deceit a concrete person.
- Security as a Service
- A combination of the words "robot" and "network"
Down
- a type of malware that is aimed to infect and harm a file, a system or a network
- A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- S/w that automatically displays / downloads material when user is offline
- a malicious code that is designed to harm computers and systems.
- an error, flaw, failure or fault in a computer program or system that causes an unintended code interaction
10 Clues: Security as a Service • A combination of the words "robot" and "network" • used by attackers to gain access to a computer or a network. • a malicious code that is designed to harm computers and systems. • S/w that automatically displays / downloads material when user is offline • a type of malware that is aimed to infect and harm a file, a system or a network • ...
Ethics & Compliance Week 2022 2022-08-26
Across
- Conforming to a rule, such as a specification, policy, standard or law.
- The practice of protecting systems, networks and programs from digital attacks.
- Protects the patient’s right to privacy of health information and what appropriate safeguards are required to protect this information.
- Wrongful or criminal deception intended to result in financial or personal gain.
Down
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Moral principles that govern a person’s behavior or the conducting of an activity.
- The act, process of power of exercising authority or control in an organizational setting
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Making choices that are consistent with each other and with the stated and operative values one espouses.
- Taking responsibility for one's actions.
10 Clues: Taking responsibility for one's actions. • Conforming to a rule, such as a specification, policy, standard or law. • The practice of protecting systems, networks and programs from digital attacks. • Wrongful or criminal deception intended to result in financial or personal gain. • ...
Chapter 2 Vocabulary 2023-09-06
Across
- China produces the most goods in the world. This means that they have a very strong ______
- China sells the US the most electronic exports in the world. Electronic exports are considered ____
- I use the school bus every morning to get to school. The School bus is a _____
- Customers of Apple are insisting they make more units for sale, this is called _____
- I am going to spend money on gas instead of food, this is called a _____
- Apple has only made 5,000 units of a product, this is called _____
Down
- Resources Everything from farmers to buildings are considered _______
- Instead of buying food, you would use that money to buy expensive clothes, which is a _____
- I want to start a cybersecurity company, this would mean that I want to become an ______
- Instead of buying expensive clothes, you would use that money to buy groceries, which is a ____
10 Clues: Apple has only made 5,000 units of a product, this is called _____ • Resources Everything from farmers to buildings are considered _______ • I am going to spend money on gas instead of food, this is called a _____ • I use the school bus every morning to get to school. The School bus is a _____ • ...
Crossword 2024-09-17
Across
- A decentralized digital ledger that records transactions across many computers.
- Practices designed to protect networks, devices, and data from unauthorized access or attacks.
- The latest generation of cellular network technology, providing faster speeds and low latency.
- A subset of artificial intelligence where computers learn from data without being explicitly programmed.
- An immersive experience that simulates a physical environment using computer technology.
Down
- A new form of computing that uses quantum bits, or qubits, to perform calculations faster than classical computers.
- A technology that allows users to access and store data and applications over the internet rather than on local servers.
- A model where data is processed near the source of data generation, reducing latency.Down:
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations.
- Machines designed to perform tasks that typically require human intelligence, such as speech recognition and decision-making.
10 Clues: A decentralized digital ledger that records transactions across many computers. • An immersive experience that simulates a physical environment using computer technology. • A model where data is processed near the source of data generation, reducing latency.Down: • ...
CYBER SECURITY PUZZLE 2022-02-17
Across
- malware that employs encryption to hold a victim's information at ransom.
- weaknesses in a system that gives threats the opportunity to compromise assets.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- intrusive software that is designed to damage and destroy computers and computer systems
- threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- type of malicious code or software that looks legitimate but can take control of your computer.
8 Clues: malware that employs encryption to hold a victim's information at ransom. • weaknesses in a system that gives threats the opportunity to compromise assets. • uses trial-and-error to guess login info, encryption keys, or find a hidden web page. • intrusive software that is designed to damage and destroy computers and computer systems • ...
Lane Degree Programs 2022-06-01
Across
- Begin your education here and maybe in the future you'll be building bridges or designing cities
- Learn this hospitality art in the Renaissance Room
- Lane provides a hands on learning environment for folks who love a beautiful smile
- Analyze movies and develop critical thinking in this area of study
- Inflation? Price Gauging? These students might be able to explain what's going on with your wallet
- If your teacher is Camilla Mortensen what might you be studying?
- Get out your beakers and head to building 16 with your lab coat
- Travel the world without ever leaving your desk
- Channel your inner Freud and start analyzing
Down
- Learn to fly and maintain airplanes in this discipline
- Learn to fuse metals together, maybe be in a Flashdance remake
- In the age of computers this job is more important than ever to keep us safe
- Love numbers and finance? Learn your assets, losses, and cash flows with this degree
- Take this language class to feel closer to the indigenous people of the Willamette Valley
- In building 5 you can see these students glide through the space. Maybe you'll see a future ballet star.
15 Clues: Channel your inner Freud and start analyzing • Travel the world without ever leaving your desk • Learn this hospitality art in the Renaissance Room • Learn to fly and maintain airplanes in this discipline • Learn to fuse metals together, maybe be in a Flashdance remake • Get out your beakers and head to building 16 with your lab coat • ...
technology 2023-05-08
Across
- perceiving, synthesizing, and inferring information
- describes a wide range of technologies that reduce human intervention in processes
- the activity of electronically buying or selling
- a set of computer programs and associated documentation and data
- the use of computers to create,process, store, retrieve and exchange all kinds of data and information.
Down
- includes the physical parts of a computer
- is the protection of computer systems and networks from attack by malicious actors
- a family of wireless network protocols based on the IEEE 802.11 family of standards
- the transfer of information between two or more points without the use of an electrical conductor.
- a database is an organized collection of data stored and accessed electronically.
- the global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
- is the most important processor in a given computer.
- a device that accepts information (in the form of digitalized data)
- a scientific and engineering discipline that studies and applies the principles of physics to design, create, and operate devices that manipulate electrons and other charged particles.
- the application of scientific knowledge for practical purposes, especially in industry.
15 Clues: includes the physical parts of a computer • the activity of electronically buying or selling • perceiving, synthesizing, and inferring information • is the most important processor in a given computer. • a set of computer programs and associated documentation and data • a device that accepts information (in the form of digitalized data) • ...
ByteCross 2024-07-18
Across
- A sequence of steps that an AI system follows to solve a problem.
- A statistical model used to make predictions or decisions without being explicitly programmed to perform the task
- An AI planning problem involving an agent navigating a cave to avoid pits and a dangerous creature
- A popular programming language for data analysis and machine learning
- The process of extracting useful information from large datasets
- The ability of a machine to imitate intelligent human behavior
- A subset of AI that involves neural networks with many layers
Down
- A problem-solving method used by AI to find solutions in a large search space.
- A set of inputs and outputs used to train an AI model.
- A software tool used for data visualization and analysis in R.
- A type of network inspired by the human brain, used in deep learning
- The process of cleaning, transforming, and modeling data to discover useful information
- The branch of AI that deals with the simulation of intelligent behavior in computers
- A framework or tool used for developing and training machine learning models
- The practice of protecting systems and networks from digital attacks
15 Clues: A set of inputs and outputs used to train an AI model. • A subset of AI that involves neural networks with many layers • A software tool used for data visualization and analysis in R. • The ability of a machine to imitate intelligent human behavior • The process of extracting useful information from large datasets • ...
WHO Identifies Risk 2024-07-02
Across
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
Down
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
#2 (Un) Riddle 2021-04-21
Across
- is a cryptocurrency invented in 2008 by an unknown person or group of people using the name Satoshi Nakamoto
- case that struck down S 66A of IT Act, 2000
- a technology capable of matching a human face from a digital image or a video frame against a database of faces
- A global company in news over its privacy policy concerns
Down
- spyware developed by the Israeli firm NSO Group
- Indian Cybersecurity Company founded by Kailash and Sanjay Katkar
- refers to events related to the formatting and storage of calendar data for dates beginning in the year 2000 (Use Words only)
- provides the infrastructure to help support the delivery of government IT services and the delivery of some of the initiatives of Digital India
- malware that encrypts a victim's files and extorts money to access the data
- CJEU recognised this right in the famous case of Google Spain v AEPD and Mario Costeja González (Use acronym)
10 Clues: case that struck down S 66A of IT Act, 2000 • spyware developed by the Israeli firm NSO Group • A global company in news over its privacy policy concerns • Indian Cybersecurity Company founded by Kailash and Sanjay Katkar • malware that encrypts a victim's files and extorts money to access the data • ...
CYBER CROSSWORD 2021-09-05
Across
- A critical requirement for the sharing of digital text
- An independent U.S. government agency that oversees all interstate and international communications.
- The integration of two or more different technologies in a single device or system
- an economy that is based on digital computing technologies
- literacy the ability to use computer technologies effectively and to understand the implications of your actions
Down
- The code is creating the environment that then forms Cyberspace.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- Device that raise a number of security concerns because they create links between your computer and the outside world
- the use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
10 Clues: A critical requirement for the sharing of digital text • an economy that is based on digital computing technologies • The code is creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
CYBERLAW CROSSWORD 2021-09-05
Across
- Device that raise a number of security concerns because they create links between your computer and the outside world
- an economy that is based on digital computing technologies
- The code used in creating the environment that then forms Cyberspace.
- the use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- the ability to use computer technologies effectively and to understand the implications of your actions
Down
- The integration of two or more different technologies in a single device or system
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
- An independent U.S. government agency that oversees all interstate and international communications.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- A critical requirement for the sharing of digital text
10 Clues: A critical requirement for the sharing of digital text • an economy that is based on digital computing technologies • The code used in creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- A software that is designed to detect and destroy compute viruses.
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- A piece of digital information generated by a web server and saved in your computer after visiting a website
Down
- A network using which things can communicate with each other using internet as means of communication between them.
- An attempt by hackers to damage or destroy a computer network or system.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
CISO Crossword Quiz - 0924 2024-07-25
Across
- Cyber Attackers intercept communication illegally and steal sensitive data in transit
- The computer system that is a host to the malware agent of the botnet or to the malware agent itself
- A Security incident in which a malicious threat actor gains access to systems without authorization
- The process of monitoring and capturing all data packets passing through a given network
- The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files
- A software program designed to take advantage of a flaw in a network, typically for malicious purposes
- The action or process of spoiling the appearance of a website in a cyber attack
Down
- A social engineering technique which cybercriminal use to disguises themselves as a known/trusted source
- Related to information security, confidentiality is the opposite to _______
- A cybersecurity strategy which allows only pre-approved or trusted users, entities, or actions to operate on a system or network
10 Clues: Related to information security, confidentiality is the opposite to _______ • The action or process of spoiling the appearance of a website in a cyber attack • Cyber Attackers intercept communication illegally and steal sensitive data in transit • The process of monitoring and capturing all data packets passing through a given network • ...
Compliance & Ethics Week 2022 2022-09-28
Across
- Taking responsibility for one's actions.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Conforming to a rule, such as specification, policy, standard or law.
- Making choices that are consistent with each other and with the stated and operative values one espouses.
- The act, process of power of exercising authority or control in an organizational setting.
Down
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Wrongful or criminal deception intended to result in financial or personal gain.
- The practice of protecting systems, networks and programs form digital attacks.
- Protects the patient's right to privacy of health information and what appropriate safeguards are required to protect the information.
- Moral principles that govern a person's behavior or the conducting of an activity.
10 Clues: Taking responsibility for one's actions. • Conforming to a rule, such as specification, policy, standard or law. • The practice of protecting systems, networks and programs form digital attacks. • Wrongful or criminal deception intended to result in financial or personal gain. • Moral principles that govern a person's behavior or the conducting of an activity. • ...
Forensic Investigation and Incident Response 2022-09-26
Across
- It is a technique used to consistently trick an adversary during a cyber-attack.
- Identify and track the origin of data, software, and/or hardware elements.
- Process of physical or logical separation or isolation of communications based on trustworthiness and criticality.
- Fuses and analyzes monitoring data and preliminary analysis results from various sources with external threat intel.
- Identifying critical assets that could be at risk – what could go wrong?
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- the ability for an organization to address strategic, financial, operational, and information (cyber) risk.
- info that can be of vital importance to the outcome of legal proceedings or investigations.
- Understanding the potential impacts of cyber threats were they to materialize is important.
- process to ensure the needed logs data is collected and stored for an appropriate amount of time.
10 Clues: Identifying critical assets that could be at risk – what could go wrong? • Identify and track the origin of data, software, and/or hardware elements. • It is a technique used to consistently trick an adversary during a cyber-attack. • info that can be of vital importance to the outcome of legal proceedings or investigations. • ...
RBI HISTORY 2024-09-16
Across
- (National Centre for Financial Education): Works to promote financial literacy and education across India.
- (Indian Financial Technology and Allied Services): Provides critical technology infrastructure for the Indian financial sector.
- RBI Research institution
- (National Housing Bank): Regulates and promotes housing finance institutions in India.
- (National Bank for Agriculture and Rural Development): Focuses on agriculture and rural development finance in India.
Down
- (Reserve Bank Information Technology Private Limited): Handles IT and cybersecurity needs for the Reserve Bank of India.
- The Reserve Bank of India also promoted a public limited company on January 14, 1971, named the
- to extend facilities for an equity type investment to small investors and also mobilize resources and channel them into investments so as to facilitate the growth of the economy.
- (Bharatiya Reserve Bank Note Mudran Private Limited): RBI's subsidiary responsible for printing Indian currency notes.
- (Industrial Development Bank of India): Established to provide credit and financial facilities for industrial development in India.
10 Clues: RBI Research institution • (National Housing Bank): Regulates and promotes housing finance institutions in India. • The Reserve Bank of India also promoted a public limited company on January 14, 1971, named the • (National Centre for Financial Education): Works to promote financial literacy and education across India. • ...
Sa 2017-11-28
Across
- The branch of logic dealing with analysis.
- Is a program that, when installed on your computer, enables unauthorized people to access it and sometimes to send spam from it.
- Security against electronic attacks.
- Is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
- One who uses programming skills to gain illegal access to a computer network or file.
- Is the small amount of information that a website copies to the hard drive, which helps that website identify you the next time you visit.
- The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.
Down
- An expression of an intention to inflict pain, injury or evil.
- Crime committed using computer networks.
- Is a public, worldwide network of computers and computer networks. It facilitates the World Wide Web, email, instant messaging, chat rooms, and many online services such as banking.
- Relating to or resembling a digit.
- Is set to protect access to personal or professional info.
- To set upon with violent force.
- A personal identification number - commonly assigned to bank customers.
- Web page address.
15 Clues: Web page address. • To set upon with violent force. • Relating to or resembling a digit. • Security against electronic attacks. • Crime committed using computer networks. • The branch of logic dealing with analysis. • Is set to protect access to personal or professional info. • An expression of an intention to inflict pain, injury or evil. • ...
ISTA MAGAZINE CROSSWORD 2024-02-03
Across
- - The systematic analysis of data to gain insights and make informed decisions.
- - Programs and instructions that control the operation of a computer system.
- - A device that directs data traffic between computer networks.
- - The creation of a virtual version of a resource, such as an operating system or server.
- - The process of converting information into a code to secure it from unauthorized access.
- - A global network connecting millions of computers, making information and resources accessible.
- - Physical components of a computer system, such as the central processing unit and peripherals.
- - A network of remote servers used to store and manage data, accessible via the internet.
Down
- - The point of interaction between a user and a computer system or device.
- - A structured collection of data, often stored and managed electronically.
- - Measures taken to protect computer systems and data from unauthorized access or attacks.
- - A step-by-step procedure for solving a problem, often used in programming.
- - A system of interconnected computers and devices that communicate with each other.
- - A computer or system that manages network resources and provides services to other computers.
- - A barrier designed to prevent unauthorized access to or from a private network.
15 Clues: - A device that directs data traffic between computer networks. • - The point of interaction between a user and a computer system or device. • - A structured collection of data, often stored and managed electronically. • - A step-by-step procedure for solving a problem, often used in programming. • ...
techbyte 2024-07-18
Across
- A problem-solving method used by AI to find solutions in a large search space.
- The process of cleaning, transforming, and modeling data to discover useful information
- A type of network inspired by the human brain, used in deep learning
- A framework or tool used for developing and training machine learning models
- The practice of protecting systems and networks from digital attacks
- The ability of a machine to imitate intelligent human behavior
Down
- A subset of AI that involves neural networks with many layers
- A popular programming language for data analysis and machine learning
- A statistical model used to make predictions or decisions without being explicitly programmed to perform the task
- A software tool used for data visualization and analysis in R.
- The branch of AI that deals with the simulation of intelligent behavior in computers
- An AI planning problem involving an agent navigating a cave to avoid pits and a dangerous creature
- The process of extracting useful information from large datasets
- A set of inputs and outputs used to train an AI model.
- A sequence of steps that an AI system follows to solve a problem.
15 Clues: A set of inputs and outputs used to train an AI model. • A subset of AI that involves neural networks with many layers • A software tool used for data visualization and analysis in R. • The ability of a machine to imitate intelligent human behavior • The process of extracting useful information from large datasets • ...
ADSI - Luis Castañeda 2022-06-06
Across
- What is the practice of protecting digital information and systems called?.
- It is the basic component of a web page.
- It is an object-oriented programming language and is the most widely used.
- are words used exclusively by a programming language.
- In the entity relationship model, what geometric figure represents the relationship between two entities?.
- what is the name of the database manager that has a dolphin in its logo.
- similar to the programming language but without so much rigidity.
- Is the representation of a qualitative or quantitative variable to which a value is assigned.
- It is a set of rules that must be followed to write a code.
Down
- It is the way to communicate with the computer to tell it what we want to do.
- what is the name of the database that is displayed in rows and columns.
- is the element that refers to changeable values of a program.
- What are the acronyms in Spanish for the entity relationship model?.
- what is the programming language that has the name of a snake.
- It is in charge of collecting the data and connecting them with each other.
15 Clues: It is the basic component of a web page. • are words used exclusively by a programming language. • It is a set of rules that must be followed to write a code. • what is the programming language that has the name of a snake. • is the element that refers to changeable values of a program. • similar to the programming language but without so much rigidity. • ...
Introduction to Cybersecurity New Year's Challenge 102 2024-01-01
Across
- A way to send messages between computers instantly.
- A level in the TLP system where information can be shared, but only with permission.
- The part of a computer where you see information and pictures.
- When someone steals your personal information, like your name, Social Security number, or bank account number, to commit fraud or other crimes.
- A system that connects computers all over the world.
- A program that finds and removes viruses on a computer.
- A special name that identifies you on a computer system or website.
- A tool that lets you point and click on things on the computer.
- When someone uses the internet, a cell phone, or other device to send or post text or images intended to hurt or embarrass another person.
- A machine that helps us store and work with data.
- A level in the TLP system where information can't be shared and is very private.
- When your personal details are kept safe on the internet.
Down
- A level in the TLP system where information can be shared, but not with everybody.
- A tool in search engines that blocks bad content.
- Someone who breaks into computers or networks without permission.
- A bad program that can hurt your computer without you knowing.
- A level in the TLP system where information can be shared with anyone.
- Unwanted emails, often trying to sell things.
- A system used for sharing information safely and keeping the source of the information safe.
- A part of the computer that keeps bad things out.
- A place on the internet where you can find information, images, or videos.
- A tool that lets you type words, numbers, and symbols into a computer.
- A system for sending messages from one computer to another.
- A secret word or phrase that lets you use a computer or website.
- When you send a file from your computer to somewhere on the internet.
- When you get a file from the internet onto your computer.
26 Clues: Unwanted emails, often trying to sell things. • A tool in search engines that blocks bad content. • A part of the computer that keeps bad things out. • A machine that helps us store and work with data. • A way to send messages between computers instantly. • A system that connects computers all over the world. • A program that finds and removes viruses on a computer. • ...
WHO Identifies Risk 2024-07-02
Across
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
Down
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
Total Defence Day 2022 2022-01-20
Across
- The Total Defence song "There's a Part for _ _ _ _ _ _ _ _" was written in 1984
- Civil Defence provides for the _ _ _ _ _ _ and basic needs of the whole community so that life may go on as normally as possible during emergencies.
- _ _ _ _ _ _ _ _ Defence is about having an SAF that is able to deter aggression
Down
- Digital Defence is the new sixth pillar of Total Defence. It requires Singaporean to practice good _ _ _ _ _ - _ _ _ _ _ _ _ _
- Learning life-saving skills such as _ _ _ can prepare you to help others in an emergency
- You should call 995 for _ _ _ _ _ _ _ _ _ and 1777 for non-emergency
- _ _ _ _ _ defence day is commemorated on 15th February. the day colonial Singapore surrendered to Japan in 1942 during World War II
7 Clues: You should call 995 for _ _ _ _ _ _ _ _ _ and 1777 for non-emergency • The Total Defence song "There's a Part for _ _ _ _ _ _ _ _" was written in 1984 • _ _ _ _ _ _ _ _ Defence is about having an SAF that is able to deter aggression • Learning life-saving skills such as _ _ _ can prepare you to help others in an emergency • ...
WotD 2023-11-05
Across
- Capable of being maintained or continued over the long term without harming the environment or depleting resources.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- To bring about a complete change in something, typically in a significant and dramatic way.
Down
- The use of largely automatic equipment and systems in various processes, reducing the need for human intervention.
- Introducing or using new ideas, methods, or equipment.
5 Clues: Introducing or using new ideas, methods, or equipment. • To bring about a complete change in something, typically in a significant and dramatic way. • The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access. • ...
WHO Identifies Risk 2024-07-02
Across
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
Down
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
WHO Identifies Risk 2024-07-02
Across
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
Down
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
CYBER SECURITY PUZZLE 2022-02-17
Across
- malware that employs encryption to hold a victim's information at ransom.
- weaknesses in a system that gives threats the opportunity to compromise assets.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- intrusive software that is designed to damage and destroy computers and computer systems
- threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- type of malicious code or software that looks legitimate but can take control of your computer.
8 Clues: malware that employs encryption to hold a victim's information at ransom. • weaknesses in a system that gives threats the opportunity to compromise assets. • uses trial-and-error to guess login info, encryption keys, or find a hidden web page. • intrusive software that is designed to damage and destroy computers and computer systems • ...
CS Month Week 3 2023-09-14
Across
- Your _______ is like your underwear: don’t share it with your friends and change it often.
- A person skilled in computer programming and system manipulation, often referring to both ethical and malicious individuals.
- Malware that records keystrokes on a computer, capturing sensitive information like passwords and credit card details.
Down
- Cybersecurity ________: A structured approach that defines guidelines and best practices for securing information systems.
- _______ Force – password attack method where many passwords are submitted with the hopes of guessing the correct one.
- Personally Identifiable Information
- ______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
- ________-factor Authentication: A security method that requires users to provide multiple forms of verification to access an account or system, enhancing security beyond passwords.
8 Clues: Personally Identifiable Information • Your _______ is like your underwear: don’t share it with your friends and change it often. • _______ Force – password attack method where many passwords are submitted with the hopes of guessing the correct one. • ...
Computer virus 2023-11-07
Across
- Is a type of malware that attaches to another program (like a document)
- Refers to all-encompassing threat protection designed to stop old-fashioned viruses as well as today’s malware threats
- Refers to early forms of cybersecurity software focused on stopping computer viruses
Down
- Aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats
- marksWhen people talk about “getting a virus” on their computer, they usually mean some form of malware—it could be a virus, computer worm, Trojan, ransomware or some other harmful thing.
- Not all ____are computer viruses
6 Clues: Not all ____are computer viruses • Is a type of malware that attaches to another program (like a document) • Refers to early forms of cybersecurity software focused on stopping computer viruses • Aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats • ...
Total Defence Day 2024-01-18
Across
- Being sensitive and u___________ towards the cultures and traditions of others is how we build up Social Defence.
- Civil Defence provides for the safety and basic needs during e_________ so that life can go on as per normal.
- Good c____________ habits such as not revealing passwords and personal information is a good way to play our part in Digital Defence.
Down
- Taking care of the e_________ is one way to play our part in Economic Defence.
- Psychological Defence - To keep Singapore strong and special by being u________.
- Singaporeans have a p______ to play in Total Defence.
- Total Defence Day seeks to remind people of the s_________ endured by our forefathers.
- Military Defence is about building up a strong and formidable force to p_________ the country.
8 Clues: Singaporeans have a p______ to play in Total Defence. • Taking care of the e_________ is one way to play our part in Economic Defence. • Psychological Defence - To keep Singapore strong and special by being u________. • Total Defence Day seeks to remind people of the s_________ endured by our forefathers. • ...
Lesson 2 2024-02-13
Across
- The art of writing or solving codes to secure digital information.
- The practice of protecting computers, networks, programs, and data from unauthorized access or attacks, which often relies on cryptographic methods.
- The process of converting information into a code to prevent unauthorized access.
Down
- A fundamental aspect of cryptography aimed at protecting the confidentiality of digital communications and information.
- A technique for ensuring data integrity by converting information into a fixed-size string of characters.
5 Clues: The art of writing or solving codes to secure digital information. • The process of converting information into a code to prevent unauthorized access. • A technique for ensuring data integrity by converting information into a fixed-size string of characters. • ...
Technology 2023-06-07
Across
- represents text, computer processor instructions, or any other data using a two-symbol system
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network
- is a commonly used method of lossy compression for digital images
- is a mobile operating system
- is the most important processor in a given computer.
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain
- are small blocks of data created by a web server
Down
- is the protection of computer systems and networks
- is a method of transmitting and receiving messages using electronic devices
- is a hardware or software component
- is an American multinational technology company
- is a collection of discrete values that convey information
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data
- is a file format developed by Adobe
- is a bitmap image format that was developed by a team at the online services provider CompuServe
- is a form of computer memory that can be read and changed in any order
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
19 Clues: is a mobile operating system • is a mapping from some domain • is a hardware or software component • is a file format developed by Adobe • is an American multinational technology company • are small blocks of data created by a web server • is the protection of computer systems and networks • is the most important processor in a given computer. • ...
Technology 2024-11-14
Across
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- considered as a unit of memory size
- a unique name that identifies a website or other internet resource
- the state of being protected against the criminal or unauthorized use of electronic data
Down
- the machines, wiring, and other physical components of a computer or other electronic system
- the programs and other operating information used by a computer
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- small text files that websites send to a user's browser to store information about the user and their browsing activity
- the process of looking up information either on the Internet or in books
- a range of frequencies within a given band, in particular that used for transmitting a signal
- the process of converting information or data into a code, especially to prevent unauthorized access
11 Clues: considered as a unit of memory size • the programs and other operating information used by a computer • a unique name that identifies a website or other internet resource • the process of looking up information either on the Internet or in books • the state of being protected against the criminal or unauthorized use of electronic data • ...
Information Governance 2022-05-05
Across
- Ensuring timely and reliable access to and use of information
- Evidence of a business activity
- Information assets generated by or managed for the organization have a reasonable guarantee of authenticity and reliability
- The process of adhering to policies and decisions
- Delegated responsibility for information management to appropriate individuals
- A measure of the extent to which an entity is threatened by a potential circumstance or event
Down
- The final stage in the records lifecycle, resulting in destruction of temporary records or the transfer of permanent records to the Digital Archives
- The process of safeguarding important information from corruption, compromise or loss cybersecurity involves protecting that information by preventing, detecting, and responding to cyber attacks
- Ability of an organization to make its stakeholders accessible the information needed to make decisions
- Maintaining information assets for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements
- The electronic aspect of identifying, collecting and producing information in response to a request for production in a lawsuit or investigation
11 Clues: Evidence of a business activity • The process of adhering to policies and decisions • Ensuring timely and reliable access to and use of information • Delegated responsibility for information management to appropriate individuals • A measure of the extent to which an entity is threatened by a potential circumstance or event • ...
Information Governance 2022-05-05
Across
- Ensuring timely and reliable access to and use of information
- Evidence of a business Activity
- Information assets generated by or managed for the organization have a reasonable guarantee of authenticity and reliability
- The process of adhering to policies and decisions
- Delegated responsibility for information management to appropriate individuals
- A measure of the extent to which an entity is threatened by a potential circumstance or event
Down
- The final stage in the records lifecycle, resulting in destruction of temporary records or the transfer of permanent records to the Digital Archives
- The process of safeguarding important information from corruption, compromise or loss cybersecurity involves protecting that information by preventing, detecting, and responding to cyber attacks
- Ability of an organization to make its stakeholders accessible the information needed to make decisions
- Maintaining information assets for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements
- The electronic aspect of identifying, collecting and producing information in response to a request for production in a lawsuit or investigation
11 Clues: Evidence of a business Activity • The process of adhering to policies and decisions • Ensuring timely and reliable access to and use of information • Delegated responsibility for information management to appropriate individuals • A measure of the extent to which an entity is threatened by a potential circumstance or event • ...
Information Governance 2022-05-05
Across
- Ensuring timely and reliable access to and use of information
- Evidence of a business activity
- Information assets generated by or managed for the organization have a reasonable guarantee of authenticity and reliability
- The process of adhering to policies and decisions
- Delegated responsibility for information management to appropriate individuals
- A measure of the extent to which an entity is threatened by a potential circumstance or event
Down
- The final stage in the records lifecycle, resulting in destruction of temporary records or the transfer of permanent records to the Digital Archives
- The process of safeguarding important information from corruption, compromise or loss cybersecurity involves protecting that information by preventing, detecting, and responding to cyber attacks
- Ability of an organization to make its stakeholders accessible the information needed to make decisions
- Maintaining information assets for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements
- The electronic aspect of identifying, collecting and producing information in response to a request for production in a lawsuit or investigation
11 Clues: Evidence of a business activity • The process of adhering to policies and decisions • Ensuring timely and reliable access to and use of information • Delegated responsibility for information management to appropriate individuals • A measure of the extent to which an entity is threatened by a potential circumstance or event • ...
Cybersecurity Awareness 2023-10-10
Across
- Is the short form for “malicious software”,
- is when someone or something pretends to be something else to gain a victim's trust, get access to a system, steal data, or spread malware.
Down
- An exploit is a code or program developed to find and take advantage of a security flaw
- The ability and opportunity to obtain knowledge of classified information.
4 Clues: Is the short form for “malicious software”, • The ability and opportunity to obtain knowledge of classified information. • An exploit is a code or program developed to find and take advantage of a security flaw • is when someone or something pretends to be something else to gain a victim's trust, get access to a system, steal data, or spread malware.
Cybersecurity Awarness/ Safty in the digital world 2024-01-31
Across
- سلوك التهديد من خلال الوسائل الإلكترونية مثل الرسائل النصية
- أمر ضروري لبقاء برامج مكافحة الفيروسات فعالة ضد التهديدات الجديدة والمتطورة
- جميع التقنيات التي تهدف إلى إقناع هدف ما بالكشف عن معلومات محددة أو القيام بعمل محدد لأسباب غير مشروعة(Two Words)
- Facebook, Twitter, Instagram..Are?(Two Words)
- عملية أخذ نص عادي وجعله غير قابل للقراءة
- اختراق الأجهزة والشبكات الرقمية من خلال الوصول غير المصرح به إلى الحساب أو نظام الكمبيوتر
- رسالة بريد إلكتروني احتيالية يُزعم أنها من شركة حسنة السمعة تحاول الحصول على معلومات شخصية
- الأجهزة أو البرامج المصممة لمنع الوصول غير المصرح به إلى شبكةخاصة
- أداة أمنية تعمل على إنشاء اتصال آمن ومشفر بينك وبين الإنترنت
- ضمان إمكانية الوصول إلى الأنظمة والبيانات من قبل المستخدمين المصرح لهم عند الحاجة
Down
- يلعب دورًا حاسمًا في حماية أنظمة الكمبيوتر من التهديدات الضارة
- وهي منع الضرر وحماية الأجهزة والأنظمة الإلكترونية بما في ذلك المعلومات الواردة فيها، لضمان توافرها وسلامتها وتوثيقها وسريتها وعدم فقدانها(Two words)
- برامج الكمبيوتر الضارة مثل الفيروسات والديدان وأحصنة طروادة التي يستخدمها المتسللون للوصول إلى جهاز الكمبيوتر الخاص بك والتسبب في تدميره.
- قيام المستخدم بمشاركة معلومات عن نفسه عمدًا(Two Words)
- حماية معلومات النظام أو العمليات من التعديل المتعمد أو العرضي
- يجب أن تتكون من حروف كبيرة وصغيرة وأرقام وأحرف خاصة
- منع الكشف عن المعلومات الحساسة من الأشخاص والموارد والعمليات غير المصرح لهم
- خلل أو ضعف في نظام الكمبيوتر يمكن استغلاله لانتهاك أمن النظام
- نوع من البرامج الضارة المصممة لمنع الوصول إلى نظام الكمبيوتر حتى يتم دفع مبلغ من المال
19 Clues: عملية أخذ نص عادي وجعله غير قابل للقراءة • Facebook, Twitter, Instagram..Are?(Two Words) • يجب أن تتكون من حروف كبيرة وصغيرة وأرقام وأحرف خاصة • قيام المستخدم بمشاركة معلومات عن نفسه عمدًا(Two Words) • سلوك التهديد من خلال الوسائل الإلكترونية مثل الرسائل النصية • أداة أمنية تعمل على إنشاء اتصال آمن ومشفر بينك وبين الإنترنت • ...
Business Continuity Awareness Week 2022 2022-07-04
Across
- One of major paradigm shift in the workforce.
- What is the latest overseas company that has completed their BCMS Implementation as per the latest post in BCM's Yammer page?
- The biggest threat to Cybersecurity is human _______
- In order to prepare for cyber resilience, speed and agility are required.
- The capacity to recover quickly from difficulties
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities
- One of hybrid Pros and Cons is reliance on home utilities and ___________
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
- What is the third UMW Group BCM risk events
Down
- Group CMT Members’ ‘Rose Among the Thorns’
- __________clearly to build a success for program in microsimulations.
- Acknowledge new _________ in addition to the opportunities that hybrid world provides businesses and employees.
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes
- A thing made by combining two different elements
- What app can WOWriors get more information about Business Continuity and Organisational Resilience from UMW Office 365?
- Involvement and enthusiasm in resilience
16 Clues: Involvement and enthusiasm in resilience • Group CMT Members’ ‘Rose Among the Thorns’ • What is the third UMW Group BCM risk events • One of major paradigm shift in the workforce. • A thing made by combining two different elements • The capacity to recover quickly from difficulties • The biggest threat to Cybersecurity is human _______ • ...
CYBERSECURITY - PHISHING 2021-12-01
Across
- phishing emails may contain _____ to Malicious websites
- Email scam or attempt to trick you into giving your password or personal information
Down
- consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
- Someone who seeks and exploits weaknesses in a computer system or computer network.
4 Clues: phishing emails may contain _____ to Malicious websites • Someone who seeks and exploits weaknesses in a computer system or computer network. • Email scam or attempt to trick you into giving your password or personal information • consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
THE BIG C PROGRAM 2020-07-11
Across
- One of the Big C focus account who recently appointed Sanker Parameswaran as an Additional Director (Independent and Non-Executive) of the Company
- Which sector has highest number of focus accounts under the Big C programme?
- Periodic reviews at RC leadership level will measure this
- A different service group(Non RC) from which 15 accounts have been considered under the Big C program.
- Identify the RC focus solution under the Big C program.
- This sector contributed to 26% of the RC NFR
- How many accounts are covered under the Big C program?
Down
- One of the key asks from the RC PD Group
- Mention the number of RC focus accounts covered under the Big C Program.
- One of the objectives of the Big C programme - Building deeper ______________ Relationships
- One of the five focus sectors covered under the Big C program.
- Data privacy is the focus solution for this sector –
- Name the big C focus account covered under Consumer Markets sector.
- Under this programme how many non RC accounts do we ensure presense in?
- In which month did Akhilesh launch Super 100s? (An initiative under Big C program where 100 chosen RC M/AD will lead the development of Big C – 100 selected clients)
15 Clues: One of the key asks from the RC PD Group • This sector contributed to 26% of the RC NFR • Data privacy is the focus solution for this sector – • How many accounts are covered under the Big C program? • Identify the RC focus solution under the Big C program. • Periodic reviews at RC leadership level will measure this • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-04-01
Across
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
- How many blackheads does Bob have? [1]
- One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- The type of notice incorporating links to where more detail can be found [2]
- the person in charge of ensuring the company complies with the PDPA [1]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- where can the exceptions to the Access Obligation be found? [1]
- What is the case setting out privacy notices can be used as the basis for consent? [2]
Down
- The form setting out a companies' purposes for CUD of PD [2]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
- the nature of the PDPA [2]
- Is there a difference between privacy notice and privacy policy? [1]
- What is the citation of Re Social Metric Pte Ltd? [2]
- Voluntary certification [3]
14 Clues: the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-03-31
Across
- The type of notice incorporating links to where more detail can be found [2]
- where can the exceptions to the Access Obligation be found? [1]
- Is there a difference between privacy notice and privacy policy? [1]
- Voluntary certification [3]
- The form setting out a companies' purposes for CUD of PD [2]
- the person in charge of ensuring the company complies with the PDPA [1]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
Down
- What is the case setting out privacy notices can be used as the basis for consent? [2]
- What is the citation of Re Social Metric Pte Ltd? [2]
- the nature of the PDPA [2]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
- One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- How many blackheads does Bob have? [1]
14 Clues: the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-03-31
Across
- What is the citation of Re Social Metric Pte Ltd? [2]
- Is there a difference between privacy notice and privacy policy? [1]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- where can the exceptions to the Access Obligation be found? [1]
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
- the nature of the PDPA [2]
- The form setting out a companies' purposes for CUD of PD [2]
Down
- What is the case setting out privacy notices can be used as the basis for consent? [2]
- Voluntary certification [3]
- How many blackheads does Bob have? [1]
- : One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- The type of notice incorporating links to where more detail can be found [2]
- the PDPA [1]
14 Clues: the PDPA [1] • the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-03-31
Across
- What is the case setting out privacy notices can be used as the basis for consent? [2]
- Voluntary certification [3]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- where can the exceptions to the Access Obligation be found? [1]
- Is there a difference between privacy notice and privacy policy? [1]
Down
- the person in charge of ensuring the company complies with the PDPA [1]
- the nature of the PDPA [2]
- What is the citation of Re Social Metric Pte Ltd? [2]
- The form setting out a companies' purposes for CUD of PD [2]
- How many blackheads does Bob have? [1]
- The type of notice incorporating links to where more detail can be found [2]
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
- One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
14 Clues: the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
Joon XXXXXXXXi 8G: Social engineering 2023-02-02
Across
- AN ATTACK DESIGNED TO STEAL A VICTIM'S PASSWORD OR OTHER SENSITIVE DATA.
- A SET OF METHODS USED BY CYBERCRIMINALS TO DECEIVE INDIVIDUALS INTO HANDING OVER INFORMATION THAT THEY CAN USE FOR FRAUDULENT PURPOSES.
Down
- CYBER_________
- AN ATTACK IN WHICH THE PERPETRATOR INVENTS A SCENARIO IN ORDER TO CONVINCE THE VICTIM TO GIVE THEM DATA OR MONEY.
4 Clues: CYBER_________ • AN ATTACK DESIGNED TO STEAL A VICTIM'S PASSWORD OR OTHER SENSITIVE DATA. • AN ATTACK IN WHICH THE PERPETRATOR INVENTS A SCENARIO IN ORDER TO CONVINCE THE VICTIM TO GIVE THEM DATA OR MONEY. • A SET OF METHODS USED BY CYBERCRIMINALS TO DECEIVE INDIVIDUALS INTO HANDING OVER INFORMATION THAT THEY CAN USE FOR FRAUDULENT PURPOSES.
Digital safety awareness 2022-11-29
Across
- something you access with a username and password
- prevent someone from contacting you
- a computer that is under the control of a malicious hacker without the knowledge of the computer owner
- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer
- using a computer to gain unauthorized access to data in a system
- a trail of data you create while using the Internet
- a secret word or phrase that allows access to a phone, computer system or service
- taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- messages that try to trick you into providing sensitive information
- email that is not wanted
Down
- a program that is designed to harm a computer by deleting data
- event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data
- when a person is harassed, humiliated, or tormented online
- steps taken to protect a computer or computer system against unauthorized access or attack
- something that lasts forever
- malicious software designed to collect and transmit private information
- test commonly used by websites to verify the user is a real human and not a bot
- a type of software designed to block access to a computer system until a certain amount of money is paid
18 Clues: email that is not wanted • something that lasts forever • prevent someone from contacting you • something you access with a username and password • a trail of data you create while using the Internet • when a person is harassed, humiliated, or tormented online • a program that is designed to harm a computer by deleting data • ...
Computer Science Terms 2024-08-26
Across
- This is when you press the button on your computer or mouse.
- When a computer thinks for itself.
- This is used in coding when there is a repeating pattern.
- A string of commands or directions used by programmings languages.
- This is an instruction that you give to your computer.
- A statement that is either true or false [ex. front_is_wter()]
- This is the thing that a computer does after you give it an instruction.
Down
- This is the process of finding and fixing the bugs in your computer code.
- This is a giant network of computers that allows people all over the world to share information and communicate with each other.
- This is a way for computers and devices to talk to each other that is wireless.
- A piece of code that helps computer to make a decision.
- This is like a tightly locked door that protects our computers.
- A set of instructions that tell a computer to do.
- Thes is a storage place somewhere far away, which you access using the internet.
- This is a secret language made up of millions of zeroes and ones.
- When there is a glitch in the system and the code wont work it there might be a?
- This is information that is stored on a computer
- A single, simple instruction that a coder can give a computer.
18 Clues: When a computer thinks for itself. • This is information that is stored on a computer • A set of instructions that tell a computer to do. • This is an instruction that you give to your computer. • A piece of code that helps computer to make a decision. • This is used in coding when there is a repeating pattern. • ...
3.6 Fundamentals of Networks Part 2 2021-11-22
Across
- When organisations employ specialists to simulate potential attacks on their system. It is used to identify possible weaknesses in their cyber security.
- Uses parts of a person to identify them and allow them access.
- When hackers send emails or texts to people claiming to be from a well-known business.
- Can see what a user is doing and sends that info back to the hacker.
- When someone pretends to be someone else to persuade the victim to share information.
- Sends an email to verify a users identity.
- What term is used for protecting networks, data, programs and computers against damage cyber attacks and unauthorised access.
- Simulates an external cyber attack. The person carrying out the attack will not be given any credentials, but they will have to carry out the attack in any way they can.
- A method of hacking where a user is directed to a fake version of a website.
Down
- The term used when data is transferred into a code that cannot be hacked.
- Watching over someones shoulder.
- Engineering Using people to gain private information or access to networks.
- Simulates a malicious insider who has knowledge of the system.
- USB drive or SD card
- Common way of preventing hackers accessing information.
- Simulates a person who has access to the target.
16 Clues: USB drive or SD card • Watching over someones shoulder. • Sends an email to verify a users identity. • Simulates a person who has access to the target. • Common way of preventing hackers accessing information. • Uses parts of a person to identify them and allow them access. • Simulates a malicious insider who has knowledge of the system. • ...
Trends in Healthcare Crossword Puzzle 2019-09-16
Across
- everyone with the same ____________ is in one payment group as a method of cost containment
- general direction in which something is developing or changing
- refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other
- is the protection of internet-connected systems, including hardware, software and data, from cyberattacks
- health related ____________ are one of the main reasons for high costs of healthcare
- therapy, massage, breathing techniques and yoga are all examples of ______ management
- less expensive than inpatient care
Down
- prevents illness and disease
- recycling and turning off electronics are examples of energy _______________
- improves mood, overall physical and mental wellness, improves stamina, immune system function, and releases endorphins
- the action or process of combining a number of things into a single more effective or coherent whole
- physical, social, intellectual, spiritual, emotional, occupational, financial, and environmental are all examples of this
- the protection or promotion of the interests of consumers.
- baby ________ are individuals born between 1946 and 1964, which has created an increased population of aging adults and increased need for geriatric medicine
- _________ medicine promotes physical, emotional, social, intellectual, and spiritual well-being
- home _________ allows patient to be in the comfort of his or her own home
16 Clues: prevents illness and disease • less expensive than inpatient care • the protection or promotion of the interests of consumers. • general direction in which something is developing or changing • home _________ allows patient to be in the comfort of his or her own home • recycling and turning off electronics are examples of energy _______________ • ...
A Little SaaS-y 2024-07-16
Across
- Processes involved in ensuring that a company can continue operating during and after a disaster or disruptive event.
- Popular accounting SaaS application.
- CMS, CRM, automations and more business-critical data is stored and used by many sales and marketing teams.
- One Single Platform to Protect Your SaaS Data Footprint.
- Software program or suite of programs that performs specific functions or tasks for users.
- The copy of important information and files stored separately to protect against data loss, corruption, or damage.
- Any software designed to harm, exploit, or compromise the functionality, security, or data of a computer, network, or device.
- A single instance of a software application that serves multiple customers.
Down
- When SaaS apps are used throughout the organization without centralized management, it is referred to as SaaS ____.
- the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Developers heavily rely on this app for project management, bug tracking, and more.
- To convert information or data into a code, especially to prevent unauthorized access.
- A contract between an MSP and their customer that defines the level of service expected.
- The amount of time a SaaS application is available and operational.
- Software as a service
- The individual or organization that uses the SaaS application.
16 Clues: Software as a service • Popular accounting SaaS application. • One Single Platform to Protect Your SaaS Data Footprint. • The individual or organization that uses the SaaS application. • The amount of time a SaaS application is available and operational. • A single instance of a software application that serves multiple customers. • ...
crossword 2023-02-04
Across
- What device can make and receive phone calls without a traditional phone line?
- What is a device that senses and tracks an individual's movements?
- What is a set of instructions for a computer to perform a specific task?
Down
- What is the practice of securing IoT devices and networks from cyber threats called?
- What is the term used for a device that switches network traffic between different computer networks based on the network address of the data?
5 Clues: What is a device that senses and tracks an individual's movements? • What is a set of instructions for a computer to perform a specific task? • What device can make and receive phone calls without a traditional phone line? • What is the practice of securing IoT devices and networks from cyber threats called? • ...
Lesson 3 2024-02-13
Across
- The process of verifying the identity of individuals or entities in digital interactions.
- The goal of keeping information private and secure from unauthorized access.
Down
- A general term emphasizing the overall aim of protecting digital data from harm or unauthorized access, encompassing aspects of cybersecurity but with a broader, more inclusive appeal.
- The practice of keeping information hidden or unexposed to unauthorized entities, emphasizing the broader goal of confidentiality.
- The objective of maintaining the accuracy and trustworthiness of data.
5 Clues: The objective of maintaining the accuracy and trustworthiness of data. • The goal of keeping information private and secure from unauthorized access. • The process of verifying the identity of individuals or entities in digital interactions. • ...
Love (fraud) is in the air 2024-02-06
Across
- Email messages that claim to be from a reputable business or organization and deceives individuals into disclosing private personal information
- The "S" in MISP
- "______" is software that my grant a scammer remote access to a computer and collects personal information from member device without their knowledge
- A favorite sweet treat of choice enjoyed by many during this holiday
- Criminals begin “_________ scams” by romancing unknowing victims-to-be, gaining their trust and making promises of love and new lives together.
- A classic flower that symbolizes love
Down
- The "I" in MISP
- "_____________" is the act of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
- A symbol of Valentine’s day - identified by a baby / angel holding a bow and arrow
- The holiday celebrated on February 14th - "________'s Day"
- These are scam attempts that come via text message
- Valentine’s Day revolves around showing "_____" for those you are close to
- The "M" in MISP
- "________" is when Scammers create a "false" or "shadow copy" of a real website, email or phone number which is indistinguishable from the real thing.
14 Clues: The "I" in MISP • The "S" in MISP • The "M" in MISP • A classic flower that symbolizes love • These are scam attempts that come via text message • The holiday celebrated on February 14th - "________'s Day" • A favorite sweet treat of choice enjoyed by many during this holiday • Valentine’s Day revolves around showing "_____" for those you are close to • ...
Trends in Healthcare Crossword Puzzle 2019-09-16
Across
- prevents illness and disease
- recycling and turning off electronics are examples of energy _______________
- refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other
- _________ medicine promotes physical, emotional, social, intellectual, and spiritual well-being
- baby ________ are individuals born between 1946 and 1964, which has created an increased population of aging adults and increased need for geriatric medicine
- home _________ allows patient to be in the comfort of his or her own home
- the action or process of combining a number of things into a single more effective or coherent whole
Down
- less expensive than inpatient care
- everyone with the same ____________ is in one payment group as a method of cost containment
- improves mood, overall physical and mental wellness, improves stamina, immune system function, and releases endorphins
- the protection or promotion of the interests of consumers.
- therapy, massage, breathing techniques and yoga are all examples of ______ management
- is the protection of internet-connected systems, including hardware, software and data, from cyberattacks
- health related ____________ are one of the main reasons for high costs of healthcare
- physical, social, intellectual, spiritual, emotional, occupational, financial, and environmental are all examples of this
- general direction in which something is developing or changing
16 Clues: prevents illness and disease • less expensive than inpatient care • the protection or promotion of the interests of consumers. • general direction in which something is developing or changing • home _________ allows patient to be in the comfort of his or her own home • recycling and turning off electronics are examples of energy _______________ • ...
Science and Technology Terms 2023-05-05
Across
- - A type of AI that allows machines to learn and improve from experience without being explicitly programmed.
- - Facts or statistics gathered for analysis or reference.
- - The branch of technology that deals with the design, construction, operation, and application of robots.
- - Global system of interconnected computer networks.
- - The process of converting information or data into a code to prevent unauthorized access.
- - A system of signals, letters, or symbols used to represent information.
- - The use of living organisms, cells, or biological processes to develop products or services.
- - Relating to or based on quantum mechanics.
Down
- - A computer-generated simulation of a 3D environment that can be interacted with in a seemingly real way.
- - The study and application of extremely small things.
- - The delivery of computing services—including servers, storage, databases, networking, software, and analytics—over the Internet.
- - The practice of protecting computer systems and networks from digital attacks.
- - A set of rules or procedures used for solving a problem or accomplishing a task.
- - Large sets of structured and unstructured data that can be analyzed to reveal patterns, trends, and associations.
- - The standard markup language used for creating web pages and web applications.
- - A system that uses satellite signals to determine the precise location of a device.
16 Clues: - Relating to or based on quantum mechanics. • - Global system of interconnected computer networks. • - The study and application of extremely small things. • - Facts or statistics gathered for analysis or reference. • - A system of signals, letters, or symbols used to represent information. • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-03-31
Across
- The type of notice incorporating links to where more detail can be found [2]
- How many blackheads does Bob have? [1]
- The form setting out a companies' purposes for CUD of PD [2]
- What is the case setting out privacy notices can be used as the basis for consent? [2]
- Voluntary certification [3]
- What is the citation of Re Social Metric Pte Ltd? [2]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
Down
- where can the exceptions to the Access Obligation be found? [1]
- the nature of the PDPA [2]
- the person in charge of ensuring the company complies with the PDPA [1]
- One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- Is there a difference between privacy notice and privacy policy? [1]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
14 Clues: the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
CROSSWORD INTEGRATION on ICT 2024-09-29
Across
- This is a deceptive method used to steal sensitive information by pretending to be a trustworthy source
- It refers to the physical components of a computerthat you can touch and see
- These devices display or output data from a computer
- This software helps manage a company's interactions with current and potential customers
- This is harmful software designed to damage or disrupt systems
- It involves organizing and maintaining data processes efficiently
- This type of software helps users perform specific tasks like writing or calculating
- This is a set of instructions that tells a computer how to perform tasks
- It involves protecting computers and networks from unauthorized access or attacks
- It integrates core business processes into a single system
Down
- This allows users to store and access data over the internet instead of local hardware
- These devices allow users to enter data into a computer
- It manages the hardware and software resources of a computer system
- This is a security system that controls the incoming and outgoing network traffic
- It refers to the unauthorized access or manipulation of computer systems
- It secures access to systems or information using a secret combination of characters
- This includes all technologies used to handle telecommunications, broadcasting, and information systems
- It involves encoding information so that only authorized parties can understand it
18 Clues: These devices display or output data from a computer • These devices allow users to enter data into a computer • It integrates core business processes into a single system • This is harmful software designed to damage or disrupt systems • It involves organizing and maintaining data processes efficiently • ...
Network Security Crossword 2022-07-21
Across
- any piece of software, malicious or not, that displays advertisements on a computer.
- malware that threatens to publish the victims personal data, block access to the computer, unless a ransom is paid.
- malicious software that aims to gather information about a person or organisation.
- a cyberattack that redirects a website’s traffic to another, fake site by installing malware on the computer.
- software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
- A person who gains unauthorised access to computer files or networks in order to further social or political ends.
Down
- The practice of protecting system, networks and programs from digital attacks
- A person who uses computers to gain unauthorised access to data.
- malware that replicates itself in order to spread to other computers.
- logging what keys people have tapped on the keyboard
- programs which users are tricked into installing under the pretence that they are legitimate and useful.
- A computer program which is hidden within another program (the ‘host’ program). the virus code is only run when the host program is executed.
12 Clues: logging what keys people have tapped on the keyboard • A person who uses computers to gain unauthorised access to data. • malware that replicates itself in order to spread to other computers. • The practice of protecting system, networks and programs from digital attacks • malicious software that aims to gather information about a person or organisation. • ...
25 2024-01-05
Across
- The activity of setting up a business or businesses, taking on financial risks in the hope of profit.
- The practice of protecting systems, networks, and programs from digital attacks.
- The use of living systems and organisms to develop or make useful products.
- Data Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations.
- The use of largely automatic equipment in a system of operation.
- Capable of being decomposed by bacteria or other living organisms.
Down
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- Working from home, making use of the Internet, email, and the telephone.
- The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
- The ability to be maintained over the long term without harming the environment. (Note: Repeated for variety.)
- Capable of being maintained or continued over the long term.
- Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device.
12 Clues: Capable of being maintained or continued over the long term. • The use of largely automatic equipment in a system of operation. • Capable of being decomposed by bacteria or other living organisms. • Working from home, making use of the Internet, email, and the telephone. • The use of living systems and organisms to develop or make useful products. • ...
Cross Word Puzzle - Cyber Security 2023-10-12
Across
- the gaining of unauthorised access to data in a system or computer
- a type of software program created to protect information technology systems and individual computers from malicious software or malware
- the practice of protecting systems, networks and programs from digital attacks
- a type of malware that spreads between computers and damages data and software
- a string of characters that allows access to a computer system or service
- software that is specifically designed to disrupt, damage or gain unauthorised access to a computer
- malware that misleads users of its true intent by disguising itself as a standard program
Down
- the protection of personal data from those who should not have access to it
- individuals or teams of people who use technology to commit malicious activities on digital systems or networks
- the actual person or organisation who is directly affected by the hacker's use of stolen data or information
- a security system designed to prevent unauthorised access into or out of a computer network
- a system that connects two or more computer devices for transmitting and sharing information
12 Clues: the gaining of unauthorised access to data in a system or computer • a string of characters that allows access to a computer system or service • the protection of personal data from those who should not have access to it • the practice of protecting systems, networks and programs from digital attacks • ...
CROSSWORD LEVEL-2 2023-07-16
Across
- A technique used to solve a problem or make a decision based on experience and intuition rather than systematic analysis.
- of Things Network of interconnected physical devices and objects
- The practice of secure communication through techniques such as encryption and decryption.
- The practice of protecting computer systems, networks, and data from unauthorized access, damage, or theft.
- A computational model inspired by the structure and functioning of the human brain, used for pattern recognition and machine learning tasks.
- A step-by-step procedure for solving a problem
- Manipulation of matter at the atomic or molecular scale
Down
- Measurement and analysis of unique biological characteristics
- A branch of computer science that utilizes principles from quantum mechanics to perform complex computations.
- Computing Utilizes quantum mechanics principles to perform complex computations
- learning A subset of artificial intelligence that enables computer systems to learn and improve from experience without being explicitly programmed.
- Digital form of currency secured by cryptography
- The process of creating a virtual version of a resource, such as a server, operating system, or network.
- Reality Immersive technology that creates a simulated environment
- The ability of multiple tasks or processes to execute simultaneously in a shared environment.
- Protection of computer systems from theft, damage, or disruption
- A network security system that monitors and controls incoming and outgoing network traffic.
- Reality Technology that overlays digital information onto the real world
- Extremely large and complex data sets that require advanced tools and techniques to analyze and extract meaningful insights.
- Learning Enables systems to learn and improve from experience without explicit programming
20 Clues: A step-by-step procedure for solving a problem • Digital form of currency secured by cryptography • Manipulation of matter at the atomic or molecular scale • Measurement and analysis of unique biological characteristics • of Things Network of interconnected physical devices and objects • Protection of computer systems from theft, damage, or disruption • ...
Test your Knowledge of IEEE's Initiatives 2022-06-10
Across
- Launched in 2019 to position IEEE at the center of Digital Transformation
- Launched in 2014 to provide the go-to online presence for security and privacy (S&P) professionals
- Conceptualized and led under the direction of Wanda Reder, former President of the IEEE Power & Energy Society, in 2011
Down
- Initially launched in December 2016 to reflect IEEE's contribution to current and future generations of networking
- Launched in 2019 as IEEE's leading community for all projects and activities on quantum technologies
- Connects IEEE members with other organizations and agencies that foster global efforts to share knowledge and discoveries in neuroscience and neural engineering
- Initiative approved effective January 1, 2018 by the IEEE Future Directions Committee
7 Clues: Launched in 2019 to position IEEE at the center of Digital Transformation • Initiative approved effective January 1, 2018 by the IEEE Future Directions Committee • Launched in 2014 to provide the go-to online presence for security and privacy (S&P) professionals • ...
Crossword for Examen de Mesa2 2023-06-27
Across
- It is a digital ledger of transactions that is duplicated and distributed across the network of computer systems.(10)
- It refers to the set of instructions, or a system of rules, written in a particular programming language.(4)
- A generic term describing all kinds of computer programs, applications and operating systems.(8)
- It is an interdisciplinary science with multiple approaches in machine learning.(2)
- It is the science and engineering that focuses on the design and manufacture of extremely small devices .(14)
- It allows us to describe how information will be displayed on web pages.(4)
- Robot vision that allow gather information about its environment.(6)
Down
- Concurrent execution of two or more tasks by a processor.(12)
- It is the process of protecting the computer systems, networks, devices, and programs.(13)
- It is the fundamental part of an OS responsible of management and file access .(6)
- Its role is to respond with maximum relevance to questions asked by internet users .(7)
- Converts a program to a language that the computer understands.(8)
12 Clues: Concurrent execution of two or more tasks by a processor.(12) • Converts a program to a language that the computer understands.(8) • Robot vision that allow gather information about its environment.(6) • It allows us to describe how information will be displayed on web pages.(4) • ...
COLLINS PROCTOR FITC 2013-05-15
Across
- a program like power point just instead of slides, it is all on one canvas
- games or tools you can download
- a blank sheet ready to be typed on
- downloadable program
- a paper that says all your accomplishments
- without a wire
- Wireless internet
- programs that you can install
- a stored documents
- a mini computer (phone, ipod, etc.)
- not giving out personal info online
- internet
- a document that is hard to edit
- a pan flip giving info about a company
- what you use t move the arrow
- an online storing software
- the art of selling and advertising products
- A pledge the president has to give
- a preset layout
- the smallest amount of data
- a plug in device
- bumping up a level
- a phrase resembles a company
- a plug in for speakers, earbuds, etc.
Down
- the second smallest bit of data
- another name for a screen
- presenting products in a good way
- being safe online
- an internet hot spot
- something you put in a computer
- an internet program that allows you to find website
- able to interact with other things
- a computer
- light emitting diode
- claiming rights to a name
- they way you act online
- Something you take out of a computer
- the hart of the computer
- a shortened word for document
- a sign that resembles a company
40 Clues: internet • a computer • without a wire • a preset layout • a plug in device • being safe online • Wireless internet • a stored documents • bumping up a level • downloadable program • an internet hot spot • light emitting diode • they way you act online • the hart of the computer • another name for a screen • claiming rights to a name • an online storing software • the smallest amount of data • ...
How Safe Are You? 2017-12-05
Across
- Do not use your ___ while driving
- Before proceeding at a crosswalk you should ______
- One of three actions that cause twenty percent of workplace injuries.
- is a good way to relieve stress.
- One of the most common safety incidents that occur both at work and at home.
- Has a cushion and is rounded with a "waterfall" front
- How long does it take for your car temperature to reach 104* when the outside temperature is 70*
- When to wear bright colored clothing.
- The study of people's efficiency in their working environment
- Health inspectors recommend not eating in a food establishment with a grading score of __________ percent or less.
- Be cautious...Be seen...to be_______
- One symptom of a stroke.
Down
- Adults should get no less than ______ hours of sleep each day.
- Before starting an exercise program you should contact your__________
- Kids should never be allowed to play with
- Storing a username and password puts you at risk of _________
- No ____ no talking while walking
- Definition: Poor blood flow to the brain results in cell death.
- When you are not in your car you are considered a
- Lack of sleep, fatigue, weight changes and sadness are signs of __________
- Provides support to your lower back
- Definition: A pedestrian crossing a roadway at any point other than a crosswalk.
- Do not put your ___ in the back of a truck.
- When exercising warm up and cool down for how many minutes
24 Clues: One symptom of a stroke. • No ____ no talking while walking • is a good way to relieve stress. • Do not use your ___ while driving • Provides support to your lower back • Be cautious...Be seen...to be_______ • When to wear bright colored clothing. • Kids should never be allowed to play with • Do not put your ___ in the back of a truck. • ...
March 2024 Crossword 2024-03-25
Across
- Peruvian arms bust linked to assassination of former president of this South American country.
- Street name of de facto Haitian leader.
- This Doctor delivered the keynote address to SHUNA's 25th annual MUN Conference.
- This condition may cause mass deaths in Gaza as famine levels rise.
- Featured band at Crocus City Hall the night of fatal attack.
- This controversial Senator received much criticism for using a tragic story in campaign against Biden-era immigration policy.
- Former Honduran president Hernandez has been accused of conspiring with this infamous drug lord, among others.
- The most recent nation to join the North Atlantic Trade Organization.
- This is the team principal of Formula 1 racing's most dominant team.
Down
- President of Sudan ousted in 2018 coup.
- Last name of Stabucks CEO.
- Iraeli Ambassador to the United Nations.
- This rebel group maintains control over much of Yemen, acting as a de facto government.
- This is one financial services company that supports payment processing for small and chain businesses.
- Seton Hall's UDSA visited this institute to explore Cyber Stability.
- It is traditional to announce a ceasefire during this international event as a sign of goodwill.
- The Department of Defense wants to tackle this field in the 2025 Fiscal Year.
- President Biden is balancing this many major foreign policy crises.
- Staff writer Ashley Skladany interned here.
- France has just enshrined this right into law.
- This generation is one of the major proponents of 'Girl Math'.
21 Clues: Last name of Stabucks CEO. • President of Sudan ousted in 2018 coup. • Street name of de facto Haitian leader. • Iraeli Ambassador to the United Nations. • Staff writer Ashley Skladany interned here. • France has just enshrined this right into law. • Featured band at Crocus City Hall the night of fatal attack. • ...
Tech Terms 2024-04-11
Across
- A small application with limited functionality
- Time delay in a system
- Not physically existing but made to appear so by software
- The discovery and communication of meaningful patterns in data
- The programs and other operating information used by a computer
- A unit of information equal to one sextillion bytes
- A device that forwards data packets
- A set of rules governing the exchange of data
- A unit of information equal to one trillion bytes
- A unit of information equal to one billion bytes
- A point of interaction between components
- A step-by-step procedure for calculations
- A group of interconnected computers
- An area of control or a sphere of knowledge
- The core of an operating system
- A hardware or software component that stores data
- A high-level programming language
- Relating to the smallest possible unit of any physical property
Down
- The practice of protecting systems and networks from digital attacks
- A standard for the short-range wireless interconnection
- A unit of information equal to one septillion bytes
- A network security system
- Software with source code that anyone can inspect
- The process of converting information into code
- The address of a web page
- Data transmission capacity, measured in bits
- A reference in a document to another section or page
- Software designed to disrupt or damage a computer system
- A markup language for documents containing structured information
- A structured set of data held in a computer
30 Clues: Time delay in a system • A network security system • The address of a web page • The core of an operating system • A high-level programming language • A device that forwards data packets • A group of interconnected computers • A point of interaction between components • A step-by-step procedure for calculations • An area of control or a sphere of knowledge • ...
FITDVocab.TS 2013-05-15
Across
- a presentation creator
- A portable electronic device
- the place where you plug in your flash drive
- geo=world
- an online server that stores files and documents
- brain of your computer
- something that holds your data on your computer
- Internet service provider
- the way you behave online
- A dedicated computer set up for one or more purposes
- protection of information and networks
- promoting your product
- the computer screen or monitor
- A hardware input device
- The place on your computer where you put in CDs
- a device connected to the computer
- used to enter instructions into a computer
- electronic
- computer wiring
- online or having to do with the internet
- putting data into a computer
- service set identifier
- 3g 4g
- commonly used to connect to local networks
- Data sent out of the computer
Down
- wireless fidelity
- legally owning something
- Mountain Lion OSX
- heart of the computer
- guidelines for a document
- smartphone screen
- encoded computer instructions
- 8 of them equal a byte
- Computer apps
- restart your computer to refresh it
- a brief history of your background
- getting people to by your product
- 1000 bytes
- the place where you plug in your headphones
- extension cord
- short term memory
- a small object that stores all of your data
- DSL Cable
- long term memory
- a hands free communicating device
45 Clues: 3g 4g • geo=world • DSL Cable • 1000 bytes • electronic • Computer apps • extension cord • computer wiring • long term memory • wireless fidelity • Mountain Lion OSX • smartphone screen • short term memory • heart of the computer • a presentation creator • brain of your computer • 8 of them equal a byte • promoting your product • service set identifier • A hardware input device • legally owning something • ...
TECHNOLOGY VOCABULARY 2021-02-11
Across
- the application of scientific discoveries for practical purposes, especially in industry.
- suppressing or stopping certain information being available to the public.
- an image, video or piece of information that becomes very popular very quickly on the internet.
- the programmes and other operating information used by a computer and related devices.
- important development or discovery.
- a person who fears or dislikes new technology especially computers, and does not want to use it.
- to develop towards an improved or more advanced state.
- a person who is enthusiastic about new technology.
Down
- a very small piece of silicon with electronic circuits on it that can hold large quantities of information or perform mathematical and logical operations.
- out of date; old-fashioned.
- the effect of something.
- portable computer.
- a small mechanical or electronic device or tool, often ingenious, novel or fun as well as being useful.
- a book published in digital form and read on a computer or other dedicated electronic device.
- – a thing made or adapted for a particular purpose especially a piece of mechanical or electronic equipment. It is usually quite small.
- a person who illegally gains access to a computer system to steal information or tamper with the system.
- typically a piece of electrical equipment, such as a kettle or toaster, that uses less advanced technology.
- the measures taken to protect against the criminal or unauthorised access of electronic data.
- the process of developing something.
- using or involving advanced technology.
20 Clues: portable computer. • the effect of something. • out of date; old-fashioned. • important development or discovery. • the process of developing something. • using or involving advanced technology. • a person who is enthusiastic about new technology. • to develop towards an improved or more advanced state. • ...
Survival Game 2021-01-05
Across
- What was the original name for Windows
- Reorganising a business to reduce capacity and increase efficiency
- Which major file hosting service is blocked/banned in China
- Obtaining the materials and parts needed to produce a product
- This technique is very greedy but helps us to find our shortest way
- Which engineer sketched plans for one of the earliest known robots
- How do you greet a piece of wood? Think Operations!
- What tech-related day is celebrated on the 30th of November
- A small square can tell a lot about you if you scan it well
- Computer Industries are an example of ------------------------- manufacturing
- A measure of the success of an operation in converting inputs to outputs
Down
- The term implies that disparate computers, information databases, and communications networks are integrated
- What do you say when you are trying to find your home? Think Operations!
- The level of activity or output that an operation (facility or organization) can achieve in a given period of time under normal working conditions
- to implement an appropriate level of cybersecurity across the supply chain of the defense industrial base
- The direction and scope of an organization over the long term
- a process of generating and manipulating product designs through computer software
- Set of security policies to screen incoming and outgoing messages
- Basic connectivity test between two TCP/IP network devices
- standard that establishes concrete information security standards for use by data centers and other organizations
20 Clues: What was the original name for Windows • How do you greet a piece of wood? Think Operations! • Basic connectivity test between two TCP/IP network devices • Which major file hosting service is blocked/banned in China • What tech-related day is celebrated on the 30th of November • A small square can tell a lot about you if you scan it well • ...
TSA Middle School Events 2024-08-18
Across
- Students design, build, and race solar-powered model cars in this event.
- A knowledge-based competition focused on questions related to technology.
- In this event, students design eco-friendly homes that operate off the electrical grid.
- A hands-on event where students work with electrical circuits and systems.
- Teams apply mechanical engineering principles to solve real-world problems.
- A middle school competition where students create computer programs to solve problems.
- An event that challenges students to explore innovations in the medical field.
- Students create products efficiently using mass production techniques in this competition.
- Students design, build, and fly model aircraft in this competition.
- In this event, students design and race CO2-powered cars.
Down
- Teams create animated videos to explain STEM concepts and ideas.
- An event where students create technical drawings using computer-aided design software.
- Students learn and apply knowledge about internet security and online safety in this event.
- A competition where students demonstrate knowledge of STEM careers and job-seeking skills.
- Students create interactive video games to solve a specific challenge or tell a story.
- Teams work together to analyze crime scenes and solve forensic puzzles.
- A TSA event focusing on the use of technology in biology and life sciences.
- A team-based competition where students solve real-world problems under time constraints.
- A competition where students design a complex machine to perform a simple task.
- A competition where students capture and edit digital photographs to meet a specific theme.
20 Clues: In this event, students design and race CO2-powered cars. • Teams create animated videos to explain STEM concepts and ideas. • Students design, build, and fly model aircraft in this competition. • Teams work together to analyze crime scenes and solve forensic puzzles. • Students design, build, and race solar-powered model cars in this event. • ...
civil law in the digital age 2024-03-12
Across
- A decentralized digital ledger that records transactions.
- dispute resolution Methods of resolving disputes using technology.
- The buying and selling of goods and services via the internet.
- A formal written law passed by a legislature.
- A right granted for an invention.
- Legal responsibility for one’s actions.
- The process of identifying, preserving, collecting, and producing electronically stored information.
- Technology that mimics human intelligence processes.
- The act of ensuring compliance with laws.
- Monetary compensation awarded for harm.
- An electronic method of signing documents.
- Laws enacted by government.
- property Creations of the mind protected by law.
- A statement that describes how personal information is collected, used, and shaed.
- The party who brings a lawsuit.
Down
- The practice of protecting systems from digital attacks.
- An agreement enforceable by law.
- Small pieces of data stored on a user’s device.
- Protection of original works.
- A legal case that establishes a principle or rule.
- Civil wrong not arising from contract.
- Rules and guidelines for using digital platforms.
- The authority to decide cases in court.
- Laws designed to protect personal data.
- A recognizable sign or expression used by a business.
- The principle that internet service providers should treat all data on the internet equally.
- names Internet addresses used to identify websites.
- The party against whom a lawsuit is brought.
- The right to keep personal information confidential.
- The process of taking legal action.
30 Clues: Laws enacted by government. • Protection of original works. • The party who brings a lawsuit. • An agreement enforceable by law. • A right granted for an invention. • The process of taking legal action. • Civil wrong not arising from contract. • The authority to decide cases in court. • Laws designed to protect personal data. • Legal responsibility for one’s actions. • ...
civil law in the digital age 2024-03-12
Across
- A decentralized digital ledger that records transactions.
- dispute resolution Methods of resolving disputes using technology.
- The buying and selling of goods and services via the internet.
- A formal written law passed by a legislature.
- A right granted for an invention.
- Legal responsibility for one’s actions.
- The process of identifying, preserving, collecting, and producing electronically stored information.
- Technology that mimics human intelligence processes.
- The act of ensuring compliance with laws.
- Monetary compensation awarded for harm.
- An electronic method of signing documents.
- Laws enacted by government.
- property Creations of the mind protected by law.
- A statement that describes how personal information is collected, used, and shaed.
- The party who brings a lawsuit.
Down
- The practice of protecting systems from digital attacks.
- An agreement enforceable by law.
- Small pieces of data stored on a user’s device.
- Protection of original works.
- A legal case that establishes a principle or rule.
- Civil wrong not arising from contract.
- Rules and guidelines for using digital platforms.
- The authority to decide cases in court.
- Laws designed to protect personal data.
- A recognizable sign or expression used by a business.
- The principle that internet service providers should treat all data on the internet equally.
- names Internet addresses used to identify websites.
- The party against whom a lawsuit is brought.
- The right to keep personal information confidential.
- The process of taking legal action.
30 Clues: Laws enacted by government. • Protection of original works. • The party who brings a lawsuit. • An agreement enforceable by law. • A right granted for an invention. • The process of taking legal action. • Civil wrong not arising from contract. • The authority to decide cases in court. • Laws designed to protect personal data. • Legal responsibility for one’s actions. • ...
Grade 5 2024-10-21
Across
- Websites where you can watch videos or listen to music.
- Finding out if information is false.
- A process or set of rules for solving a problem.
- The process of converting information into a code to keep it safe.
- Tricking people into giving personal information.
- Controlling the information you leave online.
- Checking if someone is really who they say they are.
- Online accounts pretending to be someone else.
- When information is stolen from a company or website.
Down
- Tools to work with others over the internet.
- Spending too much time on social media.
- Responsible use of technology and the internet.
- Managing how long you use a device.
- Rules you agree to before using a website.
- A security step that uses two methods to log in.
- A trick to get you to share personal information.
- A system to block unauthorized access to a network.
- Protecting devices and networks from attacks.
- A tool to keep your internet activity private.
- Items bought within an app.
- Passwords that are hard to guess.
- Dangers of using Wi-Fi networks that are not secure.
- Being online without sharing your identity.
- Small files saved on your computer to track websites you visit.
- A tool to stop ads from showing on websites.
25 Clues: Items bought within an app. • Passwords that are hard to guess. • Managing how long you use a device. • Finding out if information is false. • Spending too much time on social media. • Rules you agree to before using a website. • Being online without sharing your identity. • Tools to work with others over the internet. • A tool to stop ads from showing on websites. • ...
Nested Drone Crossword Puzzle 2024-11-11
Across
- - Aerodyne’s AI-driven analytics platform.
- - Company with a drone achieving over 21 hours of flight.
- - Service using drones for disaster response and firefighting.
- - Technology for self-guided take-off, landing, and charging.
- - Notice published to address air risk in drone operations.
- - Component managing drone operations on the ground.
- - Drone type allowing flexible and mobile operation.
- - Communication center essential for safe drone navigation.
- - Autonomous drone system for return to base.
- - Chinese company specializing in drone charging.
- - Company offering solutions like Monitoring and Cargo Hubs.
- - Berlin-based company producing charging pads for drones.
- - Field benefiting from drones for inventory checks.
- - Network type enhancing data transmission for drones.
- - Real-time data exchange with ATC during drone missions.
- - Charging system designed for DJI drones.
Down
- - Company model achieving 27+ hours of flight.
- - Industry using drones for site surveying and mapping.
- - Device reducing ground risk in emergencies.
- - Security application using drones for awareness and detection.
- - Management system where drones monitor congestion.
- - Traditional inspection method, costly compared to drones.
- - Foreign airspace control issues faced in early drone programs.
- - Safer area recommendation for drone flights.
- - Inspection task performed by drones in long-distance monitoring.
- - Early USAF drone technology program from the 1970s.
- - Sector monitoring turbines and power lines with drones.
- - Critical challenge in drone technology adoption.
- - Drone configuration offering limited flexibility but continuous flight.
- - Cloud-based platform in Aerodyne's drone solutions.
30 Clues: - Aerodyne’s AI-driven analytics platform. • - Charging system designed for DJI drones. • - Device reducing ground risk in emergencies. • - Autonomous drone system for return to base. • - Company model achieving 27+ hours of flight. • - Safer area recommendation for drone flights. • - Chinese company specializing in drone charging. • ...
Social Engineering Attacks 2023-08-14
Across
- A type of social engineering attack in which the attacker promises the victim a favor in exchange for information or other benefits (Latin for "something for something"
- Used in the cybersecurity industry to describe the practice of searching through the trash for useful information
- Uses the promise of an item or good to entice victims
- A physical security breach whereby an unauthorized person follows an authorized individual into a secured premise
- A cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software
Down
- Used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.
- Sending fake emails from what seems to be a legitimate source
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
8 Clues: Uses the promise of an item or good to entice victims • Sending fake emails from what seems to be a legitimate source • Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system • Used in the cybersecurity industry to describe the practice of searching through the trash for useful information • ...
FIT E: Vocab Word Quest 2013-05-16
Across
- protection for any published worked
- 1000 yottabyte
- 1000 terabyte
- Ex: DSL, Cable
- Ex:Comcast
- a program the allows you to interact with the computer
- Ex: google
- way to save a file created in word
- responsible rules and behavior to keep you save
- 1000 exabyte
- 1000 zetabyte
- RAM
- personal conduct online
- computer screen
- Ex: optical, mechanical, touch pad
- a short memorable phrase used in advertising
- 1000 kilobyte
- 1000 bytes
- two programs that can work together
- eight bits
- a online, zoomable presentation program
- 1000 megabyte
- allows equipment to handle information that continuously changes
- the process of powering on a computer
Down
- the overall appearance of a document
- a symbol or other design adopted by an organization to identify its product
- the smallest amount of data
- the overall way of how a computer is setup
- CPU
- LCD
- LED
- RTF
- NCSA
- 1000 petabyte
- Ex: mouse, flash drive
- heart of the computer
- 1000 brontobyte
- a close up or preview of a template
- protection of information on computer/networks
- Ex: printer, monitor
- the overall layout of a document
- a brief summery of ones work experience
- an electronic signal that is sent as binary digits
- a way to save a file in adobe
- 1000 gigabyte
- a standard for the short-range wireless interconnection of cellular phones, computers, and other electronic devices
- a pre developed format
47 Clues: CPU • LCD • LED • RTF • RAM • NCSA • Ex:Comcast • Ex: google • 1000 bytes • eight bits • 1000 exabyte • 1000 terabyte • 1000 petabyte • 1000 zetabyte • 1000 kilobyte • 1000 gigabyte • 1000 megabyte • 1000 yottabyte • Ex: DSL, Cable • 1000 brontobyte • computer screen • Ex: printer, monitor • heart of the computer • Ex: mouse, flash drive • a pre developed format • personal conduct online • the smallest amount of data • ...
Cyber quiz 2022-09-12
Across
- a cyber attacker who uses software and other methods to steal information
- An error, flaw, failure, or fault in a computer program.
- Programs that automatically execute tasks as ordered by the creator
- Cryptocurrency, a form of electronic cash
- any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Attaching a phone number or email address to an account for heightened security
- secret word or phrase that is used to access a computer system
- Confirmation of someone's identity using a password or fingerprint
- previously unknown, bug, flaw, or backdoor in software can lead to attacks and damage.
- allows you to create a secure connection to another network using the internet.
- programs and other operating systems used by a computer.
Down
- protecting computers, networks, programs, and data from unauthorized access
- taking advantage of human trust to gain access to private information
- An alternative way to access software typically unauthorized.
- The physical and tangible parts of a computer
- typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded they can piggybank onto programs to corrupt data or do other damage.
- Creating a fake identity on a social network account to target a specific victim
- Hacking that is meant to do minimal damage
- string of numbers used to identify each computer using the internet on a network.
- predate viruses and have infected systems since mainframes were the only computers in existence. capable of self-replication
20 Clues: Cryptocurrency, a form of electronic cash • Hacking that is meant to do minimal damage • The physical and tangible parts of a computer • An error, flaw, failure, or fault in a computer program. • programs and other operating systems used by a computer. • An alternative way to access software typically unauthorized. • ...
Fundamentals 2021-12-10
Across
- microprocessor that helps your computer run
- address of a site on the web
- unsolicited email messages sent in bulk
- handles instructions on the computer
- uses pictures and words to represent ideas
- program to navigate the world wide web
- measures are taken to protect computer
- permanent store that holds files when off
- connecting computers on a wired connection
- system for communicating without wires
- number of pixels to create the screen image
- programming language to standard HTML pages
- collection of eight bits
- physical component of computer system
- file sent to your computer by a website
- information created or shared on a computer
- page that a browser first opens
Down
- illegal activity on a computer
- performs calculations for programs to work
- type of storage that changes
- computer that handles data requests
- complete programs that perform a function
- small flexible disk used for storing data
- switch a computer off and on again
- number of hardware connected to a CPU
- part of a program that causes problems
- wireless technology that allow communication
- computer software that restricts data
- standard connection for attaching devices
- network of computers
- maximum amount of data that can travel
- set of computers managed as a unit
- instructions that tell a computer what to do
- memory used to make a computer work faster
- software that operates a PC
- software program that develops to harm
- temporary storage used by a computer
37 Clues: network of computers • collection of eight bits • software that operates a PC • type of storage that changes • address of a site on the web • illegal activity on a computer • page that a browser first opens • switch a computer off and on again • set of computers managed as a unit • computer that handles data requests • handles instructions on the computer • ...
Current Events Crossword 2021-06-17
Across
- Current Vice President of the US
- A holiday celebrating the emancipation of slaves
- Highest court in the US, determines constitutionality of laws or actions
- Oversimplified image or idea of a person, thing or group
- Current president of Russia
- Individual or groups permanently moving to another country, current “hot” issue
- Country that started and held the first G7 meeting
- Athletic event held every 4 years. Will be in Tokyo this summer
- Creates antibodies and provides immunity against diseases
- Current president of the United States
- The capital of the United States of America
- Rising of temperatures throughout the world causing concern
Down
- Prime Minister of England
- Current leader of North Korea and the Workers Party
- An individual who works to influence policy on behalf of a certain organization
- Term given to US policy meant to improve health care for all, also known as Affordable Care Act
- Palestinian Islamic organization currently fighting against Israel
- Political ideology usually associated with the Republican party
- Protection against criminal attacks of electronic data or programs
- First NFL team to win 6 Super Bowls
- An increase in prices and/or a reduction in value of money and spending power
- A disease prevalent or spreading over the globe
- Tennis tournament held in London England on grass courts
- Information that is biased or misleading to promote a point of view
- Everyone’s favorite US state, adored and loved by everyone
- Political ideology usually associated with the Democratic party
26 Clues: Prime Minister of England • Current president of Russia • Current Vice President of the US • First NFL team to win 6 Super Bowls • Current president of the United States • The capital of the United States of America • A disease prevalent or spreading over the globe • A holiday celebrating the emancipation of slaves • Country that started and held the first G7 meeting • ...
civil law in the digital age 2024-03-12
Across
- A decentralized digital ledger that records transactions.
- dispute resolution Methods of resolving disputes using technology.
- The buying and selling of goods and services via the internet.
- A formal written law passed by a legislature.
- A right granted for an invention.
- Legal responsibility for one’s actions.
- The process of identifying, preserving, collecting, and producing electronically stored information.
- Technology that mimics human intelligence processes.
- The act of ensuring compliance with laws.
- Monetary compensation awarded for harm.
- An electronic method of signing documents.
- Laws enacted by government.
- property Creations of the mind protected by law.
- A statement that describes how personal information is collected, used, and shaed.
- The party who brings a lawsuit.
Down
- The practice of protecting systems from digital attacks.
- An agreement enforceable by law.
- Small pieces of data stored on a user’s device.
- Protection of original works.
- A legal case that establishes a principle or rule.
- Civil wrong not arising from contract.
- Rules and guidelines for using digital platforms.
- The authority to decide cases in court.
- Laws designed to protect personal data.
- A recognizable sign or expression used by a business.
- The principle that internet service providers should treat all data on the internet equally.
- names Internet addresses used to identify websites.
- The party against whom a lawsuit is brought.
- The right to keep personal information confidential.
- The process of taking legal action.
30 Clues: Laws enacted by government. • Protection of original works. • The party who brings a lawsuit. • An agreement enforceable by law. • A right granted for an invention. • The process of taking legal action. • Civil wrong not arising from contract. • The authority to decide cases in court. • Laws designed to protect personal data. • Legal responsibility for one’s actions. • ...
Unit 7 Project 2024-11-09
Across
- Enforces the law and ensures fair legal practices in the U.S.
- Focuses on signals intelligence and cybersecurity.
- Responds to and coordinates disaster relief efforts.
- Oversees national housing policies and urban development programs.
- Ensures the safety of consumer products and prevents hazards.
- Oversees energy production, including nuclear energy and energy efficiency.
- Regulates vehicle safety standards and reduces road traffic accidents.
- Protects employees' rights to organize and join unions.
- Manages immigration processes, including citizenship and visa applications.
- Leads U.S. space exploration and scientific research beyond Earth.
- Administers tax collection and enforces tax laws.
- Ensures safe working conditions by setting workplace safety standards.
- Investigates crimes involving firearms, explosives, and illegal substances.
- Secures transportation systems, particularly airports and air travel.
- Provides services and benefits to military veterans.
Down
- Protects the U.S. from terrorism and natural disasters.
- Manages national parks and preserves natural and cultural resources.
- Enforces federal laws against workplace discrimination.
- Oversees the nation’s transportation systems, including highways and airways.
- Gathers foreign intelligence and conducts covert operations.
- Protects public health by controlling disease outbreaks.
- Protects the environment and regulates pollution.
- Investigates federal crimes and ensures national security.
- Manages government buildings, supplies, and services.
- Oversees public health, social services, and medical research.
- Supports small businesses with loans, contracts, and counseling.
- Preserves U.S. historical documents and records.
- Manages mail delivery across the United States.
- Regulates food, drugs, and medical devices for safety.
29 Clues: Manages mail delivery across the United States. • Preserves U.S. historical documents and records. • Protects the environment and regulates pollution. • Administers tax collection and enforces tax laws. • Focuses on signals intelligence and cybersecurity. • Responds to and coordinates disaster relief efforts. • Provides services and benefits to military veterans. • ...
CS Month Week 2 2023-09-14
Across
- _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
- _________ Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network.
- The process of verifying the identity of a user, system, or device to grant access to resources.
Down
- _______ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
- _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
- ______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
- Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.
- ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.
8 Clues: Malware that encrypts a victim’s data and demands payment (ransom) for its decryption. • The process of verifying the identity of a user, system, or device to grant access to resources. • ______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident. • ...
Cybersecurity Fundamental Chapter 1 Part 2 2022-11-29
Across
- is a continuous computer hack that occurs under the radar against a specific object.
- The collection of technologies that enable the connection of various devices to the Internet.
- amateurs or skilled attackers can exploit vulnerabilities in networked devices, or can use social engineering, such as trickery, to gain access.
Down
- In the past, employees typically used company-issued computers connected to a corporate LAN.
- recognize the threat that data poses if used against people.
- They may also have knowledge of security countermeasures, policies and higher levels of administrative privileges.
- The result of data sets that are large and complex, making traditional data processing applications inadequate.
7 Clues: recognize the threat that data poses if used against people. • is a continuous computer hack that occurs under the radar against a specific object. • In the past, employees typically used company-issued computers connected to a corporate LAN. • The collection of technologies that enable the connection of various devices to the Internet. • ...
25 2024-01-05
Across
- Working from home, making use of the Internet, email, and the telephone.
- The use of living systems and organisms to develop or make useful products.
- The activity of setting up a business or businesses, taking on financial risks in the hope of profit.
- Capable of being maintained or continued over the long term.
- Capable of being decomposed by bacteria or other living organisms.
Down
- The ability to be maintained over the long term without harming the environment. (Note: Repeated for variety.)
- The practice of protecting systems, networks, and programs from digital attacks.
- Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- Media Websites and applications that enable users to create and share content or participate in social networking.
- The use of largely automatic equipment in a system of operation.
- Data Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations.
12 Clues: Capable of being maintained or continued over the long term. • The use of largely automatic equipment in a system of operation. • Capable of being decomposed by bacteria or other living organisms. • Working from home, making use of the Internet, email, and the telephone. • The use of living systems and organisms to develop or make useful products. • ...
Digitalization 4 2024-04-18
Across
- things that someone cares about or is involved in, often related to personal preferences or investments.
- tools or mechanisms used to exert force or influence on objects or situations, often used to create change or achieve goals.
- to use something to gain an advantage or achieve a goal, especially in business or negotiations.
- currently holding a particular position or office, especially in politics or business.
- growing at an extremely rapid rate, often doubling in size or value over a short period of time.
- to take or keep money or profits for oneself, especially in a secretive or dishonest way.
Down
- no longer fashionable, useful, or relevant due to being outdated or obsolete.
- interrupted or disturbed the normal operation or progress of something, often causing chaos or confusion.
- measures taken to protect computer systems and networks from cyber attacks or unauthorized access.
- the ability to move quickly and easily, both physically and mentally, often associated with flexibility and adaptability.
- extremely strong, secure, or reliable, often used to describe agreements or guarantees.
- the ability to work successfully or be effective, especially in terms of being financially sustainable.
12 Clues: no longer fashionable, useful, or relevant due to being outdated or obsolete. • currently holding a particular position or office, especially in politics or business. • extremely strong, secure, or reliable, often used to describe agreements or guarantees. • to take or keep money or profits for oneself, especially in a secretive or dishonest way. • ...
Cyber Security 2022-07-07
Across
- The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
- A cyber attack intended to redirect a website's traffic to another, fake site.
- A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
- Observing a person's private information over their shoulder eg cashpoint machine PINs.
- A computer program or system intended to distinguish human from machine input
- A form of identification and authentication which relies on comparing scans of e.g. your face
7 Clues: A computer program or system intended to distinguish human from machine input • A cyber attack intended to redirect a website's traffic to another, fake site. • Observing a person's private information over their shoulder eg cashpoint machine PINs. • A form of identification and authentication which relies on comparing scans of e.g. your face • ...
The Quest for the Day! 2024-08-19
Across
- A term for ‘actual place’. (5 letters)
- One of 5 main components of Good Manufacturing Practice (GMP). (8 letters)
- The practice of protecting digital assets against cybercriminals, including measures such as network security, penetration testing or workforce education. (13 letters)
- Abbreviation for materials management procedure whereby the oldest lots are processed and distributed first. (4 letters)
- An Event requiring an investigation as it may affect the quality of the product, process, equipment or quality management system. (9 letters)
Down
- A term that describe data must be clear and readable. (7 letters)
- One of Thermo Fisher core value on be determined to achieve outcomes with efficiency, high quality, and enthusiasm for success. (9 letters)
- A formal declaration by pharmaceutical companies ensuring their products meet regulatory and quality standards. (9 letters)
8 Clues: A term for ‘actual place’. (5 letters) • A term that describe data must be clear and readable. (7 letters) • One of 5 main components of Good Manufacturing Practice (GMP). (8 letters) • Abbreviation for materials management procedure whereby the oldest lots are processed and distributed first. (4 letters) • ...