cybersecurity Crossword Puzzles

Cybersecurity Awareness Month Crossword Puzzle 2021-10-01

Cybersecurity Awareness Month Crossword Puzzle crossword puzzle
Across
  1. When someone or a cyber-criminal take advantage of you by using information commonly available through social media, information sharing, or a conversation.
  2. Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
  3. Fake messages from a seemingly trusted or reputable source designed to convince you to reveal information, give unauthorized access to a system, commit financial transactions, or click on a link.
  4. A type of program used for automating tasks on the internet.
Down
  1. To properly secure systems, cellphones, tablets, computers, data, information, and passwords is to S____G_____ your device.
  2. Any software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.
  3. Happens when someone uses another person's name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  4. If not careful, giving up name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, or passwords can lead to loss of what?
  5. Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms.

9 Clues: A type of program used for automating tasks on the internet.Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms....

Cybersecurity Week 2 2022-09-27

Cybersecurity Week 2 crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
  2. A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
  1. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
  2. A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.

5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid.A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system....

Cybersecurity Week 4 2022-09-27

Cybersecurity Week 4 crossword puzzle
Across
  1. This is a popular network protocol analyzer, or an application that captures packets from a network connection.
  2. This is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
Down
  1. ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
  2. _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
  3. 95% of all firewalls fail due to this

5 Clues: 95% of all firewalls fail due to this_____ scanning is a common technique hackers use to discover open doors or weak points in a network.This is a popular network protocol analyzer, or an application that captures packets from a network connection....

Cybersecurity Week 1 2022-09-27

Cybersecurity Week 1 crossword puzzle
Across
  1. A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
  2. ___ trust network access is a set of technologies and functionalities that enable secure access to internal applications and remote users
  3. A ___ access security broker is a security policy enforcement point positioned between enterprise users and ____ service providers.
Down
  1. Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
  2. A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic

5 Clues: A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network trafficA ___ access security broker is a security policy enforcement point positioned between enterprise users and ____ service providers....

estelles's cybersecurity crossword 2021-02-12

estelles's cybersecurity crossword crossword puzzle
Across
  1. someone who got into your account with out permission
  2. account to make sure noone can get in
Down
  1. you need to Verify
  2. when someone try's to trick you into giving your info
  3. when YOU got into someones account with out permission

5 Clues: you need to Verifyaccount to make sure noone can get inwhen someone try's to trick you into giving your infosomeone who got into your account with out permissionwhen YOU got into someones account with out permission

Cybersecurity Vocab Words 2021-12-14

Cybersecurity Vocab Words crossword puzzle
Across
  1. an attack in which an attacker is positioned between two communicating parties in order to intercept and/or after data traveling between them
  2. an attack that exploits mathematical in encryption algorithms
  3. is an attack model for cryptanalysis where the attacker has access to both the plaintext
  4. a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
Down
  1. is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme

5 Clues: an attack that exploits mathematical in encryption algorithmsis an attack model for cryptanalysis where the attacker has access to both the plaintexta weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system...

Cybersecurity Crossword Puzzle 2023-08-03

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. The team that facilitates collaboration between red and blue teams
  2. A tool that monitors network traffic for potential security breaches
Down
  1. A team that simulates cyber attacks to find vulnerabilities
  2. The team responsible for defending against cyber threats
  3. The act of tricking individuals into revealing sensitive information

5 Clues: The team responsible for defending against cyber threatsA team that simulates cyber attacks to find vulnerabilitiesThe team that facilitates collaboration between red and blue teamsThe act of tricking individuals into revealing sensitive informationA tool that monitors network traffic for potential security breaches

FIT-D 2013-05-15

FIT-D crossword puzzle
Across
  1. monitor
  2. an internet host
  3. to restart or start up a computer
  4. responsibility online
  5. the presidents have to say it
  6. wireless internet
  7. National Center Super coming applications
  8. long term, main memory
  9. a saying or catchphrase on a company
  10. The act of promotion
  11. similar to modem
  12. a readable file
  13. light emitting diode
  14. location for cd in a laptop
  15. cord that gives you internet
  16. combines results from searchengines
  17. google, bing
  18. optical,mechanical
  19. cable is an example
  20. earphones, printer
  21. signals of info online
Down
  1. another word for internet
  2. plug in on the side of computer
  3. a symbol or picture for a company
  4. Blank sheet to draw,type on etc.
  5. 8 bits of info
  6. connection to other devices
  7. how you behave online
  8. stuff that goes into the computer, keyboard
  9. a booklet for advertisement
  10. plug-in for headphones
  11. more usb ports
  12. a item that is portable such as a phone
  13. 4g and 3g
  14. ipod, iphone, computer...hard
  15. short term memory
  16. central processing unit
  17. stuff that is downloadable....soft____
  18. easybib
  19. apps
  20. to protect your info online
  21. internet service provider
  22. "brain of computer"
  23. a sheet of paper that lists your life success
  24. a thing that allows you to make a symbol or words yours
  25. Largest storage available
  26. liquid crystal display
  27. a mark for a brand
  28. object on computer that you can save stuff to

49 Clues: appsmonitoreasybib4g and 3ggoogle, bing8 bits of infomore usb portsa readable filean internet hostsimilar to modemwireless internetshort term memoryoptical,mechanicala mark for a brandearphones, printer"brain of computer"cable is an exampleThe act of promotionlight emitting diodehow you behave onlineresponsibility onlineplug-in for headphones...

Technology Crossword 2023-06-07

Technology Crossword crossword puzzle
Across
  1. the most important processor in a given computer.
  2. a collection of discrete values that convey information.
  3. any software intentionally designed to cause disruption to a computer, server, client, or computer network
  4. a coding format for digital audio
  5. small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
  6. a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
  7. a method of representing data in a visual, machine-readable form.
  8. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  9. An American multinational technology company headquartered in Cupertino, California.
  10. a mapping from some domain (for example, a range of integers) to bits.
  11. is a bitmap image format
Down
  1. the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure.
  2. a mobile operating system primarily developed by Googl
  3. a proprietary audio/video interface for transmitting uncompressed video data.
  4. a form of computer memory that can be read and changed in any order
  5. a digital multimedia container format most commonly used to store video and audio
  6. a hardware or software component that stores data so that future requests for that data can be served faster.
  7. a method of transmitting and receiving messages using electronic devices.
  8. a representation of numbers using only two digits.
  9. a file format developed by Adobe in 1992 to present documents.

20 Clues: is a bitmap image formata coding format for digital audiothe most important processor in a given computer.a representation of numbers using only two digits.a mobile operating system primarily developed by Googla collection of discrete values that convey information.a file format developed by Adobe in 1992 to present documents....

CodeCrissCross 2024-03-14

CodeCrissCross crossword puzzle
Across
  1. Collaborative approach to software development and IT operations aimed at automating and streamlining the software delivery process
  2. Security system that monitors and controls incoming and outgoing network traffic
  3. Device that forwards data packets between computer networks
  4. High-level programming language primarily used for adding interactivity to web pages, often employed in front-end development alongside HTML and CSS
  5. Remote storage and computing services accessed over the internet
  6. uidelines that provide a foundation for developing software applications
  7. Flexible software development methodology emphasizing collaboration and adaptability
  8. The specific rules and structure governing the composition of statements in a programming language, often encountered when writing 'Hello, World!' programs
  9. Process of replacing manual tasks with computer-controlled systems
  10. Subset of artificial intelligence that enables computers to learn and improve from experience without being explicitly programmed
Down
  1. Practices and technologies designed to protect computer systems and data from unauthorized access, theft, or damage
  2. Multinational technology corporation known for developing software products such as Windows operating system, Microsoft Office suite, and Azure cloud services
  3. Technology that allows multiple operating systems or applications to run on a single physical server
  4. Large volumes of structured and unstructured data that require advanced processing techniques for analysis
  5. Detailed procedure or set of conditions to be followed for testing a specific aspect
  6. Collection of interconnected devices
  7. Programs and applications used to operate computers and perform specific tasks
  8. Structured collection of data stored electronically
  9. Simulation of human intelligence processes by computer systems
  10. Process of finding and fixing errors or bugs in software code

20 Clues: Collection of interconnected devicesStructured collection of data stored electronicallyDevice that forwards data packets between computer networksProcess of finding and fixing errors or bugs in software codeSimulation of human intelligence processes by computer systemsRemote storage and computing services accessed over the internet...

POLS Crossword Puzzle 2024-10-05

POLS Crossword Puzzle crossword puzzle
Across
  1. Actors are compelled to select outcomes that benefit one party while negatively affecting another.
  2. When two or more actors implement policies that improve well-being of at least one more actor without affecting any other.
  3. The personality, perceptions, choices, and activities of individual decision-makers and individual participants provide an explanation.
  4. States will build international relations around international law and institutions.
  5. Premeditated threat or use of violence against noncombatant targets by individuals or groups to obtain a political or social objective.
Down
  1. States try to influence the behavior of other actors by bargaining, negotiating, taking a specific action or refraining from such an action.
  2. The withdrawal of customary trade and financial relations for foreign - and security-policy purposes.
  3. An assemblage of units, object, or parts united by some form of regular interaction.
  4. Focuses on the international character of states as the most important feature of international relations.
  5. Art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality.
  6. Struggle for power, war is inevitable, bargaining and coercion, where cooperation is rare.
  7. An armed conflict that occurs between organized actors within a state and and that meets some minimum threshold for severity.

12 Clues: An assemblage of units, object, or parts united by some form of regular interaction.States will build international relations around international law and institutions.Struggle for power, war is inevitable, bargaining and coercion, where cooperation is rare....

TechSphere Crossword puzzle 2024-01-29

TechSphere Crossword puzzle crossword puzzle
Across
  1. Process of encoding information to make it secure.
  2. Study and practice of techniques for secure communication in the presence of third parties.
  3. Authentication techniques based on unique biological characteristics such as fingerprints or retinal scans.
  4. Practice of protecting systems, networks, and programs from digital attacks.
  5. Secret code used to gain access to a computer, network, or service.
  6. Malicious software that encrypts files and demands payment for their release.
  7. Process of confirming the truth of an attribute of a single piece of data.
  8. Software update designed to fix problems with, or improve a computer program or its supporting data.
  9. Malicious software that replicates itself and spreads to other computers.
Down
  1. Incident where sensitive, protected, or confidential information is accessed or disclosed without authorization.
  2. Weakness in a system's defenses that can be exploited by a threat.
  3. Network of private computers infected with malicious software and controlled as a group.
  4. Person who uses technical knowledge to gain unauthorized access to computer systems.
  5. Security system designed to prevent unauthorized access to or from a private network.
  6. Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
  7. Malicious software disguised as legitimate software.
  8. Software intended to damage or disable computers and computer systems.
  9. Software designed to detect and remove computer viruses and other malicious software.
  10. Attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
  11. Secure network connection that allows users to access the internet privately.
  12. Interconnected group of computers and other devices capable of exchanging data.
  13. Unsolicited or undesired electronic messages, typically advertising.

22 Clues: Process of encoding information to make it secure.Malicious software disguised as legitimate software.Weakness in a system's defenses that can be exploited by a threat.Secret code used to gain access to a computer, network, or service.Unsolicited or undesired electronic messages, typically advertising....

Tech Puzzle 2023-03-02

Tech Puzzle crossword puzzle
Across
  1. What protects your computer from hackers?
  2. What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
  3. What is a document sent with with an email message called?
  4. An interrupt triggered by a software.
  5. A chatbot developed by openAI and launched in November 2022
  6. What technology was used in avengers end game?
  7. Which technology is used in Brahmastra movie?
  8. What is temporarily stored on your computer?
  9. A software program that allows you to surf the web.
  10. ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
  11. Visual display unit is also called _____________
  12. An incredibly powerful tool used to get meaning out of vast amounts of data
Down
  1. Primary memory is also known as _______ memory.
  2. The initial program that runs when a computer is powered up or rebooted.
  3. _______ is the way of sending messages over the Internet.
  4. Smallest unit of measurement in computing
  5. What is the #1 social media app?
  6. _________ protects your computer from viruses and hackers
  7. Give one example of a game that used unity and C#
  8. ________________ hyperlink is a saved link to a particular web page.
  9. Protection of computer system and information from harm theft and unauthorised use.
  10. _______________ reality is the integration of digital information with live video.
  11. Terminates the loop statement and transfers execution to the statement immediately following the loop.
  12. _______is considered as one of the universal gates.
  13. The primary component of a computer that acts as its “control center.”

25 Clues: What is the #1 social media app?An interrupt triggered by a software.What protects your computer from hackers?Smallest unit of measurement in computingWhat is temporarily stored on your computer?Which technology is used in Brahmastra movie?What technology was used in avengers end game?Primary memory is also known as _______ memory....

Tech Puzzle 2023-03-02

Tech Puzzle crossword puzzle
Across
  1. What protects your computer from hackers?
  2. What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
  3. What is a document sent with with an email message called?
  4. An interrupt triggered by a software.
  5. A chatbot developed by openAI and launched in November 2022
  6. What technology was used in avengers end game?
  7. Which technology is used in Brahmastra movie?
  8. What is temporarily stored on your computer?
  9. A software program that allows you to surf the web.
  10. ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
  11. Visual display unit is also called _____________
  12. An incredibly powerful tool used to get meaning out of vast amounts of data
Down
  1. Primary memory is also known as _______ memory.
  2. The initial program that runs when a computer is powered up or rebooted.
  3. _______ is the way of sending messages over the Internet.
  4. Smallest unit of measurement in computing
  5. What is the #1 social media app?
  6. _________ protects your computer from viruses and hackers
  7. Give one example of a game that used unity and C#
  8. ________________ hyperlink is a saved link to a particular web page.
  9. Protection of computer system and information from harm theft and unauthorised use.
  10. _______________ reality is the integration of digital information with live video.
  11. Terminates the loop statement and transfers execution to the statement immediately following the loop.
  12. _______is considered as one of the universal gates.
  13. The primary component of a computer that acts as its “control center.”

25 Clues: What is the #1 social media app?An interrupt triggered by a software.What protects your computer from hackers?Smallest unit of measurement in computingWhat is temporarily stored on your computer?Which technology is used in Brahmastra movie?What technology was used in avengers end game?Primary memory is also known as _______ memory....

Network and Security 2024-07-24

Network and Security crossword puzzle
Across
  1. A secret word or phrase that is used to access a computer system or service.
  2. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  3. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  4. Code that is embedded into the hardware of a computer.
  5. The programs and other operating systems used by a computer.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. programs that automatically execute tasks as ordered by creator
  8. form of cryptocurrency
  9. Stands for the National Security Agency
  10. The method of obtaining user information through fraudulent communications targeted directly at people.
  11. two words. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
  1. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior
  2. Text that can be read by the human eye
  3. creating a fake identity on social network account
  4. A weakness in a computer system or network that can be exploited by attackers.
  5. any action that makes a computer system vulnerable
  6. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  7. Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
  8. Customizable additions to software for extra functionality
  9. an error, flaw, failure, or fault

20 Clues: form of cryptocurrencyan error, flaw, failure, or faultText that can be read by the human eyeStands for the National Security Agencycreating a fake identity on social network accountany action that makes a computer system vulnerableCode that is embedded into the hardware of a computer.Customizable additions to software for extra functionality...

Online Safety Word Bank 2021-06-03

Online Safety Word Bank crossword puzzle
Across
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this (paragraph 4)
  2. these are the usernames or passwords you use to access a website (paragraph 6)
  3. these fake sites imitate official ones with the intent to collect your personal information (paragraph 6)
  4. a software designed to detect or destroy viruses (paragraph 9)
  5. it is the address of a specific webpage or file on the internet (paragraph 6)
  6. the information processed and stored by electronic devices (paragraph 2)
Down
  1. people who commit crimes by means of computers or the internet (paragraph 6)
  2. the deceitful practice of sending emails pretending to be from legitimate companies for you to reveal personal information, such as passwords and credit card numbers (paragraph 8)
  3. a software designed to stop the normal functioning of computers (paragraph 7)
  4. it contains a group of computers that can be accessed and administered with a common set of rules defined a by a company or institution (paragraph 4)
  5. it is a form of security that allows or blocks traffic based on a set of security rules (paragraph 3)
  6. a digital replication of something real (paragraph 2)

12 Clues: a digital replication of something real (paragraph 2)a software designed to detect or destroy viruses (paragraph 9)the information processed and stored by electronic devices (paragraph 2)people who commit crimes by means of computers or the internet (paragraph 6)a software designed to stop the normal functioning of computers (paragraph 7)...

Network security 2022-07-18

Network security crossword puzzle
Across
  1. type of malicious code or software that looks legitimate but can take control of your computer
  2. an online scam similar to phishing, where a website's traffic is manipulated, and confidential information is stolen.
  3. Groups of criminals who unite to carry out cyber attacks in support of political causes.
  4. Also known as “white hats,” ethical hackers are security experts that perform these security assessments
  5. type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  6. The practice of protecting systems, networks, and programs from digital attacks
Down
  1. “Flags” are secrets purposely placed by companies or hackers. Planting the flag itself refers to placing these flags
  2. the practice of using a software program or hardware device (keylogger ) to record all keystrokes on a computer keyboard, either overtly as a surveillance tool or covertly as spyware
  3. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
  4. malware that employs encryption to hold a victim's information at ransom
  5. any program or file that is intentionally harmful to a computer, network or server.
  6. A person who breaks into a computer system

12 Clues: A person who breaks into a computer systemmalware that employs encryption to hold a victim's information at ransomThe practice of protecting systems, networks, and programs from digital attacksany program or file that is intentionally harmful to a computer, network or server....

Cybersecurity Fundamental Chapter 3 Part 3 2022-10-19

Cybersecurity Fundamental Chapter 3 Part 3 crossword puzzle
Across
  1. occurs when data goes beyond the limits.
  2. access point install on a secure network without explicit authorization.
  3. pieces of software install by users to provide extended capabilities
  4. security protocol that attempted to provide a wireless local area network with the same level of security as a wired lan.
  5. attacker copies the victim's information from his/her devices
  6. attacker send authorized messages to another bluetooth device
  7. one way to store data at the website is to use a database.
Down
  1. vulnerability found in web applications.
  2. allow cybercriminals to execute malicious code and take control of a system with privileges of the user running the application remotely.
  3. wireless signals are susceptible to electromagnetic interfaces
  4. operate through an interpreter, the JVM.
  5. susceptible to attack and an attacker cannot recover the key by observing the traffic.

12 Clues: vulnerability found in web applications.occurs when data goes beyond the limits.operate through an interpreter, the JVM.one way to store data at the website is to use a database.attacker copies the victim's information from his/her devicesattacker send authorized messages to another bluetooth device...

27 2024-01-08

27 crossword puzzle
Across
  1. Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device. (Note: Repeated for variety.)
  2. Artificially manipulated media that may depict events that never occurred or present fictionalized versions of real events.
  3. The use of largely automatic equipment in a system of operation. (Note: Repeated for variety.)
  4. The activity of exploiting genetic material experimentally without regard to ethical considerations. (Note: Repeated for variety.)
  5. The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
Down
  1. A virtual reality space where users can interact with a computer-generated environment.
  2. The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
  3. Economy A labor market characterized by the prevalence of short-term, flexible jobs.
  4. A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
  5. Physical or emotional exhaustion, often due to prolonged stress or overwork.
  6. Tech Technology designed to enhance the relationship between citizens and government.
  7. Literacy The ability to use and understand digital technologies, communication tools, and networks.

12 Clues: Physical or emotional exhaustion, often due to prolonged stress or overwork.Economy A labor market characterized by the prevalence of short-term, flexible jobs.Tech Technology designed to enhance the relationship between citizens and government.A virtual reality space where users can interact with a computer-generated environment....

Principles of IT Terms 2023-08-23

Principles of IT Terms crossword puzzle
Across
  1. components of a computer system, such as the central processing unit (CPU), memory, storage devices, and input/output devices.
  2. process of converting data into a code to prevent unauthorized access.
  3. Computing/Storing and accessing data and programs over the internet rather than on local computers.
  4. Technology/The use of computers, networks, software, and other technologies to manage and process information.
  5. structured collection of data that can be easily accessed, managed, and updated.
  6. Experience (UX):** The overall experience and satisfaction that a user has while interacting with a product or system.
  7. Interface (UI):** The visual and interactive elements that allow users to interact with software or hardware.
  8. and selling goods and services over the internet.
Down
  1. and applications that run on computer hardware to perform specific tasks.
  2. and fixing errors or bugs in software code.
  3. collection of connected devices and communication pathways that allow them to share resources and information.
  4. instructions in a programming language to create software applications or automate tasks.
  5. System/Software that manages computer hardware and provides services for other software applications.
  6. standard language for creating web pages and web applications.
  7. and measures to protect computer systems, networks, and data from cyber threats.
  8. Citizenship/The responsible and ethical use of technology, including online behavior, digital etiquette, and privacy considerations.
  9. Analytics/The process of examining and interpreting data to gain insights and make informed decisions.
  10. step-by-step procedure or formula for solving a problem or completing a task.

18 Clues: and fixing errors or bugs in software code.and selling goods and services over the internet.standard language for creating web pages and web applications.process of converting data into a code to prevent unauthorized access.and applications that run on computer hardware to perform specific tasks....

Compliance & Security Week 2023-11-16

Compliance & Security Week crossword puzzle
Across
  1. It's like your underwear; don't share it with anyone and change it at least every 90 days
  2. Nasty software that can have a bad impact on your device or network
  3. What is HIPAA's (and DDID's) minimum training requirement for employees
  4. Unwanted emails or messages that usually try to sell you something
  5. What department (or Shane) should you report a suspected HIPAA breach to
  6. Universal Serial Bus, or a flash drive that you should never stick in a work computer
  7. What HIPAA rule protects individual rights
  8. A type of malicious software designed to block access until a sum of money is paid
Down
  1. Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
  2. The Health Act passed to protect individual's medical/dental records and other PHI
  3. A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
  4. Every aspect of protecting an organization and its employees/assets against cyber threats
  5. How should you send an email to outside recipients that contains PHI
  6. What is the acronym that identifies individual's information such as name, birthdate, and SSN
  7. The additional ways DDID uses to stop hackers getting into our system, even if they know your password
  8. An email that tricks you into clicking on a link or opening an attachment
  9. Using a device to gain unauthorized access to data in a system

17 Clues: What HIPAA rule protects individual rightsUsing a device to gain unauthorized access to data in a systemUnwanted emails or messages that usually try to sell you somethingNasty software that can have a bad impact on your device or networkHow should you send an email to outside recipients that contains PHI...

Trends 2021 2021-01-11

Trends 2021 crossword puzzle
Across
  1. Acronym for the current industry revolution.
  2. Term referring to new way for employees, starting with the acronym WFH
  3. Increasing cry amongst internet and social media users to protect their data _______.
  4. South Africa will receive 1 million doses of this from India at the end of January to combat Covid 19
  5. Customers continue to have high service expectations and have become smarter and more impatient. Companies must deliver on this (hint Cx)
  6. One of the larger international streaming partners available in South Africa
  7. A new standard currently being deployed in Radio Access Networks to reduce vendor lock in.
  8. A constant state of the unknown making it difficult to predict the future. Opposite of certainty.
  9. AWS, Google, Microsoft all offer this service where everything is hosted in the ______
  10. What comes after 4G? Vodacom and MTN launched it in 2020.
Down
  1. Umbrella tech term top of the IT agenda to ensure integrity and safety of network
  2. A freemium video and conferencing based tool which exploded in growth and subscriptions in 2020
  3. Two common words for new age term for machine learning often shortened to two letters
  4. Something most people make up in the beginning of January, but most broken later in the year
  5. New technology trend which is “smart” and happening closer to the source or locality (hint on the "----" of my seat)

15 Clues: Acronym for the current industry revolution.What comes after 4G? Vodacom and MTN launched it in 2020.Term referring to new way for employees, starting with the acronym WFHOne of the larger international streaming partners available in South AfricaUmbrella tech term top of the IT agenda to ensure integrity and safety of network...

Puzzle No. 2 2022-09-06

Puzzle No. 2 crossword puzzle
Across
  1. A string of characters used to verify the identity of a user during the authentication process.
  2. A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
  3. Ensuring that authorized users have access to information and associated assets when required.
  4. Sentence-like format of password which is strong but easier to remember.
  5. Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
  6. You should not write down your password in this type of physical medium.
Down
  1. A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
  2. Ensuring that information is accessible only to those authorized to have access.
  3. Safeguarding the accuracy and completeness of information.
  4. Complete the sentence: ________ is everyone’s responsibility.
  5. A weakness in your security policy, implementation, design, and controls.
  6. These fix general software problems and provide new security patches where criminals might get in.
  7. A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
  8. An event that will cause harm to you or your asset.
  9. Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.

15 Clues: An event that will cause harm to you or your asset.Safeguarding the accuracy and completeness of information.Complete the sentence: ________ is everyone’s responsibility.Sentence-like format of password which is strong but easier to remember.You should not write down your password in this type of physical medium....

The hardest crossword puzzle EVERRR 2022-11-16

The hardest crossword puzzle EVERRR crossword puzzle
Across
  1. Someone fraudulently trying to gain access to an unauthorized system.
  2. Any security practice put in place to mitigate a security event or incident from occurring.
  3. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
  4. Most useful tool in cybersecurity, pretty much.
  5. The practice of utilizing trial and error to guess credentials.
  6. Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
  7. Copies of data
  8. A condiment
  9. describes a minor disruption to the digital landscape that is thought to be unintentional
Down
  1. A data file through which the identity, authenticity and reliability of a website or web application is established.
  2. Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
  3. A possibility of being attacked or harmed
  4. responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
  5. A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
  6. A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.

15 Clues: A condimentCopies of dataA possibility of being attacked or harmedMost useful tool in cybersecurity, pretty much.The practice of utilizing trial and error to guess credentials.Someone fraudulently trying to gain access to an unauthorized system.Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?...

Privacy Cross Word 2024-01-12

Privacy Cross Word crossword puzzle
Across
  1. A state of being in solitude or separated from the environment or society, commonly used in contexts like quarantine or solitary confinement.
  2. The action of making new or secret information known, especially in legal or corporate settings.
  3. An act of breaking or failing to observe a law, agreement, or code of conduct, often referring to security systems.
Down
  1. Unsolicited and typically irrelevant or inappropriate messages sent over the Internet, usually to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
  2. The quality of being able to be used or obtained;
  3. A secret word or phrase that must be used to gain admission to something, typically a cornerstone of digital security.
  4. An instance of intruding, especially illegally or without permission, into a system or place, often in the context of privacy or cybersecurity.

7 Clues: The quality of being able to be used or obtained;The action of making new or secret information known, especially in legal or corporate settings.An act of breaking or failing to observe a law, agreement, or code of conduct, often referring to security systems....

Financial Risk Management 2024-07-15

Financial Risk Management crossword puzzle
Across
  1. risk -, demonstrating how commodity price volatility can impact the global economy.
  2. risk -can enhance resilience through redundant systems
  3. Risk -proactive legal compliance measures.
  4. Risk -This can lead to forced selling at unfavourable prices, potentially triggering margin calls
  5. Risk -This contributed to the crisis by forcing banks to sell assets at fire-sale prices
  6. Risk -Companies can mitigate this through regular safety inspections
  7. risk - The investor may have to accept a significant price discount or spread their sales
  8. Risk -This could lead to increased loan defaults, requiring higher loan loss provisions and potentially impacting the bank's capital adequacy and profitability
  9. Risk -highlighting the importance of understanding creditor priorities.
  10. Risk -This can lead to ETF prices deviating from their underlying asset values, potentially causing losses
  11. rate risk -This risk affects longer-duration bonds more severely than shorter-duration bonds
Down
  1. risk-To mitigate this, institutions can implement robust cybersecurity
  2. risk - Investors can mitigate this through diversification, hedging strategies, and maintaining a long-term investment horizon.
  3. Risk -The higher yields compensate investors for the increased risk of default associated with these lower-rated bonds.
  4. Risk -The bank could manage this through careful due diligence, ongoing monitoring, securing collateral, and potentially syndicating the loan
  5. Risk -potentially forcing some investors to sell and causing bond prices to fall.
  6. risk-This highlights how currency fluctuations can impact international investments.
  7. Risk -This can force the REIT to seek alternative funding sources, potentially at higher costs
  8. risk-This risk affects the entire market and is difficult to diversify away, as it impacts all sectors
  9. risk-. Banks can implement strict compliance procedures to mitigate the risk

20 Clues: Risk -proactive legal compliance measures.risk -can enhance resilience through redundant systemsRisk -Companies can mitigate this through regular safety inspectionsrisk-To mitigate this, institutions can implement robust cybersecurityRisk -highlighting the importance of understanding creditor priorities....

Chapter 2- TYPES OF ATTACKS 2022-09-10

Chapter 2- TYPES OF ATTACKS crossword puzzle
Across
  1. Contain tracking information for an individual email
  2. Fraud like Phishing, but it comes as a text message or SMS
  3. It is a deceptive scheme or trick used to cheat someone out of something
  4. It is merely an email trying to convince you to do something
  5. It is a phone scam designed to get your personal information by impersonating
  6. Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
  7. Threat that involves sending email messages with a fake sender address
  8. It is just like Phishing but it only targets specific individuals within an organization
Down
  1. It is news or knowledge received or given
  2. Help protect computer systems against cyber-attacks or unauthorized access
  3. A link that direct you to a fake login page, in the hope that you might enter your credentials
  4. Exclusively targets high-ranking individuals such as your BOSS within an organization
  5. A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
  6. It is a type of email attack where bad people are trying to steal your precious information
  7. It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
  8. Unsolicited bulk messages normally from people trying to sell something
  9. An act of pretending to be another person for the purpose of commiting fraud

17 Clues: It is news or knowledge received or givenContain tracking information for an individual emailFraud like Phishing, but it comes as a text message or SMSIt is merely an email trying to convince you to do somethingThreat that involves sending email messages with a fake sender address...

Unit 6 Vocab Crossword 2021-09-28

Unit 6 Vocab Crossword crossword puzzle
Across
  1. offensive maneuver that targets computer information systems, computer networks, infrastructures
  2. the practice of protecting critical systems and sensitive information from digital attacks
  3. is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization
  4. are criminals who break into computer networks with malicious intent.
  5. slang term used to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems
  6. the use of computer-based technique such as hacking as a form of civil disobedience
  7. a relatively unskilled individual who uses scripts or programs
  8. prevents someone watching your connection from knowing what websites you visit
  9. parts of the World Wide Web whose contents are not indexed by standard web search-engines.
  10. is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle
Down
  1. a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  2. allows developers to discover and resolve bugs before the general public is aware of such bug
  3. a path or means by which an attacker or hacker can gain access to a computer or network server
  4. the gaining of unauthorized access to data in a system or computer.
  5. open-source software for enabling anonymous communication.

15 Clues: open-source software for enabling anonymous communication.a relatively unskilled individual who uses scripts or programsthe gaining of unauthorized access to data in a system or computer.are criminals who break into computer networks with malicious intent.prevents someone watching your connection from knowing what websites you visit...

ICT 2019-11-25

ICT crossword puzzle
Across
  1. A letter or note that you can send electronically
  2. You may request one of these if you wish to know that your e-mail has arrived safely
  3. The software application used to store all of the records of crimes and victims
  4. The person who the e-mail is from
  5. An e-mail can transmit one of these in an attachment
  6. Devices such as mobile phones, laptops, personal computers (PCs), printers, digital cameras, and video game consoles, can connect to each other and exchange information using Bluetooth protocol for wireless communication. Bluetooth can only be used for relatively short distances (a few metres).
  7. Acronym for the Police National Computer
  8. MSN is a method of ....-time communication
Down
  1. This type of junk e-mail is now becoming a major problem
  2. In order to send an e-mail, a person needs to have their own e-mail .......
  3. This type of conference enables people to see and hear one another
  4. This enables two people to hold a conversation
  5. An illicit attempt to trick individuals into handing over personal, confidential information.
  6. Important for cybersecurity, a Firewall is a hardware- or software-based system used as an interface between the internet and a (home or corporate) computer system, that monitors and filters incoming and outgoing traffic and block malware attacks.
  7. A paper based method of communication

15 Clues: The person who the e-mail is fromA paper based method of communicationAcronym for the Police National ComputerMSN is a method of ....-time communicationThis enables two people to hold a conversationA letter or note that you can send electronicallyAn e-mail can transmit one of these in an attachment...

iACE Crossword Puzzle 3 2021-11-09

iACE Crossword Puzzle 3 crossword puzzle
Across
  1. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
  2. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
  3. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
  4. ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
  5. An official inspection of an individual’s or organization’s accounts.
Down
  1. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
  2. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
  3. ________ risk refer to the risk of inadequate employment practices and resource management.
  4. Unacceptable or improper behaviour, especially by an employee or professional person.
  5. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: An official inspection of an individual’s or organization’s accounts.Wrongful or criminal deception intended to result in financial or personal gain.Unacceptable or improper behaviour, especially by an employee or professional person.________ risk refer to the risk of inadequate employment practices and resource management....

Dampak Sosial Informatika 2024-05-16

Dampak Sosial Informatika crossword puzzle
Across
  1. Istilah yang mengacu pada upaya untuk melindungi komputer, jaringan, dan data dari serangan, kerusakan, atau akses yang tidak sah.
  2. Praktik membagi informasi pribadi atau rahasia secara tidak sah atau tidak etis di internet.
  3. of information Fenomena di mana informasi yang diposting online dapat bertahan selama periode yang lama dan memiliki dampak jangka panjang pada individu atau kelompok.
  4. misconduct Istilah untuk perilaku tidak pantas atau tidak etis di internet, seperti pelecehan atau penipuan online.
  5. Kejahatan yang melibatkan penggunaan teknologi informasi, seperti pencurian identitas dan penipuan online.
  6. divide Istilah untuk kesenjangan antara individu atau kelompok yang memiliki akses dan keterampilan teknologi informasi dan yang tidak memiliki akses atau keterampilan tersebut.
Down
  1. addiction Fenomena di mana seseorang menghabiskan terlalu banyak waktu di internet, mengakibatkan kurangnya interaksi sosial di dunia nyata.
  2. Istilah yang mengacu pada upaya untuk melindungi komputer, jaringan, dan data dari serangan, kerusakan, atau akses yang tidak sah.
  3. Penggunaan teknologi informasi untuk menyebarkan informasi yang bersifat memprovokasi, menyesatkan, atau menipu untuk tujuan tertentu.
  4. social interaction Istilah yang mengacu pada interaksi sosial melalui platform atau aplikasi digital, seperti media sosial atau pesan instan.

10 Clues: Praktik membagi informasi pribadi atau rahasia secara tidak sah atau tidak etis di internet.Kejahatan yang melibatkan penggunaan teknologi informasi, seperti pencurian identitas dan penipuan online.misconduct Istilah untuk perilaku tidak pantas atau tidak etis di internet, seperti pelecehan atau penipuan online....

The IoT - Crossword 2021-04-19

The IoT - Crossword crossword puzzle
Across
  1. an event that makes it very difficult or changes the way things or a system usually works.
  2. things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
Down
  1. the part of a car that contains some of the controls used for driving and the devices for measuring speed and distance
  2. to make a process in a factory or office operate by machines or computers, in order to reduce the amount of work done by humans and the time taken to do the work
  3. a subject or problem that people are thinking and talking about
  4. someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
  5. an object or machine that has been invented for a particular purpose
  6. having the abilities needed to do an activity or job well

8 Clues: having the abilities needed to do an activity or job wella subject or problem that people are thinking and talking aboutan object or machine that has been invented for a particular purposean event that makes it very difficult or changes the way things or a system usually works....

iACE Crossword Puzzle 3 2021-11-09

iACE Crossword Puzzle 3 crossword puzzle
Across
  1. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
  2. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
  3. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
  4. ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
  5. An official inspection of an individual’s or organization’s accounts.
Down
  1. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
  2. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
  3. ________ risk refer to the risk of inadequate employment practices and resource management.
  4. Unacceptable or improper behaviour, especially by an employee or professional person.
  5. Wrongful or criminal deception intended to result in financial or personal gain.

10 Clues: An official inspection of an individual’s or organization’s accounts.Wrongful or criminal deception intended to result in financial or personal gain.Unacceptable or improper behaviour, especially by an employee or professional person.________ risk refer to the risk of inadequate employment practices and resource management....

IT_KD 2023-12-04

IT_KD crossword puzzle
Across
  1. A networking device that directs data traffic between different computer networks.
  2. A high-level programming language known for its readability and versatility.
  3. The process of identifying and fixing errors or bugs in software code.
  4. A widely-used programming language that adds interactivity and dynamic content to web pages.
  5. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  6. A structured collection of data organized for efficient retrieval, storage, and management, typically using tables and relationships.
  7. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. The delivery of computing services, including storage, processing power, and software, over the internet.
  2. The standard markup language for creating web pages and web applications.
  3. A set of rules and tools for building software applications, enabling them to communicate with each other.
  4. A step-by-step set of instructions or rules to solve a specific problem or perform a particular task.
  5. A computer or system that provides resources, services, or data to other computers, known as clients, in a network.
  6. The process of converting information into a code to secure it from unauthorized access or use.
  7. A pre-built structure or set of tools that provides a foundation for software development, making it easier to create and manage applications.
  8. Any software intentionally designed to harm or exploit computer systems, including viruses, worms, and ransomware.

15 Clues: The process of identifying and fixing errors or bugs in software code.The standard markup language for creating web pages and web applications.A high-level programming language known for its readability and versatility.A networking device that directs data traffic between different computer networks....

Technology Terminologies 2023-04-28

Technology Terminologies crossword puzzle
Across
  1. The process of designing, writing, testing, and maintaining computer programs.
  2. A programming language used to create interactive web pages and web applications.
  3. The process of encoding data in a way that can only be accessed by authorized parties.
  4. The process of creating a virtual version of something, such as a computer system or network.
  5. A set of instructions written in a programming language that a computer can execute.
  6. A programming language used to manage and manipulate relational databases.
  7. A collection of data that can be accessed, managed, and updated by a computer.
  8. The language used to create web pages and define their structure and content.
  9. A step-by-step process for solving a problem or completing a task.
Down
  1. The practice of protecting computer systems and networks from digital attacks, theft, and damage.
  2. A group of interconnected devices and computers that can communicate and share resources.
  3. The practice of securing communication and data through techniques such as encryption and decryption.
  4. The part of a website or application that the user interacts with directly.
  5. A collection of programs and data that perform a specific task or set of tasks on a computer.
  6. Data that describes other data, such as information about a file's format, size, or author.
  7. A set of practices that combines software development and IT operations to streamline software delivery.
  8. A security system that monitors and controls incoming and outgoing network traffic.
  9. The latest version of HTML, used to create modern web pages and applications.
  10. Refers to the design and user experience of software or applications.

19 Clues: A step-by-step process for solving a problem or completing a task.Refers to the design and user experience of software or applications.A programming language used to manage and manipulate relational databases.The part of a website or application that the user interacts with directly....

Technology 2021-03-23

Technology crossword puzzle
Across
  1. circulated rapidly and widely from one internet user to another.
  2. use of social media to stay connected with friends, family etc.. (two words)
  3. software application for accessing the World Wide Web (2 words)
  4. protecting computer systems and networks from information disclosure, theft of, or damage to hardware or software.
  5. 3-D image formed by the interference of light beams from a laser or other light source.
  6. communication over a distance by cable, telegraph, telephone, or broadcasting.
  7. computer program made to simulate conversation with human users over the internet
  8. a detection system that uses radio waves to determine the range, angle, or velocity of objects.
  9. sports competition using video games
  10. aircraft without a human pilot on board.
Down
  1. simulation of human intelligence in machines programmed to think like humans and mimic their action (2 words)
  2. a computer based technology which allows the sharing of ideas, thoughts, and information through virtual networks and communities.(2 words)
  3. easy to use or understand.
  4. amplifying device which fits on the ear, worn by a partially deaf person.(2 words)
  5. a digital currency that can be used to buy goods and services
  6. a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation.
  7. home setup where appliances can be controlled remotely from anywhere with an internet connection using a mobile or other networked device. (2 words)
  8. a person who fears, dislikes, or avoids new technology.
  9. outdated computer hardware, software, technology, services or practices that are no longer used

19 Clues: easy to use or understand.sports competition using video gamesaircraft without a human pilot on board.a person who fears, dislikes, or avoids new technology.a digital currency that can be used to buy goods and servicessoftware application for accessing the World Wide Web (2 words)circulated rapidly and widely from one internet user to another....

How E-Marketplaces Work 2024-01-05

How E-Marketplaces Work crossword puzzle
Across
  1. Indirect taxation on the consumption of goods and services, applicable to certain transactions on e-marketplaces.
  2. Guidelines and rules established by e-marketplaces to regulate user behavior, transactions, and overall platform usage.
  3. Software that allows different applications to communicate and share data on e-marketplaces.
  4. An online platform facilitating the exchange of goods and services between buyers and sellers.
  5. Marketing efforts aimed at increasing visibility and sales, often involving discounts, offers, and special deals on e-marketplaces.
  6. Measures to protect e-marketplaces from online threats, ensuring safe transactions and user data.
  7. The transportation of products from sellers to buyers, including the methods, costs, and delivery times on e-marketplaces.
Down
  1. The process of buying or selling within an e-marketplace, involving payment and product/service delivery.
  2. The management of the movement of goods, including shipping, tracking, and delivery in e-marketplaces.
  3. Charges imposed by e-marketplaces on sellers for using their platform, often including listing fees, transaction fees, and subscription fees.
  4. The process by which customers can send back products they are dissatisfied with or that are damaged on e-marketplaces.
  5. A personal or business profile on an e-marketplace, enabling users to manage transactions, listings, and preferences.
  6. Refers to products classified as hazardous materials, with specific regulations and restrictions for shipping on e-marketplaces.

13 Clues: Software that allows different applications to communicate and share data on e-marketplaces.An online platform facilitating the exchange of goods and services between buyers and sellers.Measures to protect e-marketplaces from online threats, ensuring safe transactions and user data....

Crossword 3 2024-07-25

Crossword 3 crossword puzzle
Across
  1. A type of cybersecurity analysis that focuses on the likelihood and potential impact of risks.
  2. A type of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
  3. A security concept that ensures that data is only accessible to those with authorized access.
  4. A type of software that is specifically designed to detect, stop, and remove viruses and other kinds of malicious software.
  5. A security protocol that ensures privacy between communicating applications and their users on the internet.
  6. A type of firewall that filters traffic between a trusted and an untrusted network.
  7. A type of security audit that evaluates the security of a system or network by simulating an attack from a malicious source.
Down
  1. A security measure that involves hiding internal IP addresses.
  2. A method used to verify the integrity and authenticity of a message, software, or digital document.
  3. A security model that enforces strict access controls and compartmentalization.
  4. A set of rules that govern the actions computers take to secure data and is often used in conjunction with firewalls.
  5. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  6. A type of security threat that is disguised as legitimate software.

13 Clues: A security measure that involves hiding internal IP addresses.A type of security threat that is disguised as legitimate software.A security model that enforces strict access controls and compartmentalization.A type of firewall that filters traffic between a trusted and an untrusted network....

iACE Crossword Puzzle 3 2021-11-08

iACE Crossword Puzzle 3 crossword puzzle
Across
  1. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
  2. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
  3. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
  4. An official inspection of an individual’s or organization’s accounts.
  5. ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
Down
  1. Unacceptable or improper behaviour, especially by an employee or professional person.
  2. ________ risk refer to the risk of inadequate employment practices and resource management.
  3. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
  4. Wrongful or criminal deception intended to result in financial or personal gain
  5. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.

10 Clues: An official inspection of an individual’s or organization’s accounts.Wrongful or criminal deception intended to result in financial or personal gainUnacceptable or improper behaviour, especially by an employee or professional person.________ risk refer to the risk of inadequate employment practices and resource management....

CSA CROSSWORD #1 2022-01-07

CSA CROSSWORD #1 crossword puzzle
Across
  1. industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
  2. form of cloud computing that provides virtualized computing resources over the internet.
  3. cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers
  4. a free, publicly accessible registry in which cloud service providers (CSPs) can publish their CSA-related assessments
  5. This credential leverages CSA’s cloud expertise and ISACA’s traditional audit expertise, combining our know-how and expertise to develop and deliver the best possible solution for cloud auditing education
Down
  1. cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
  2. Centre of expertise for cyber security in Europe
  3. widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
  4. way of delivering applications over the Internet.Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management.
  5. cybersecurity control framework for cloud computing

10 Clues: Centre of expertise for cyber security in Europecybersecurity control framework for cloud computingform of cloud computing that provides virtualized computing resources over the internet.cloud computing model where a third-party provider delivers hardware and software tools to users over the internet...

October's Blackink Crossword 2024-09-24

October's Blackink Crossword crossword puzzle
Across
  1. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. process of converting information or data into a code to prevent unauthorized access.
  3. type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. maximum rate of data transfer across a given path, measured in bits per second (bps).
  5. method of grouping data that is transmitted over a digital network into packets, which are then sent independently and reassembled at the destination.
  6. A service that encrypts your internet traffic and protects your online identity by creating a private network from a public internet connection.
  7. A cybersecurity technology that monitors end-user devices to detect and respond to cyber threats.
Down
  1. A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  2. delay before a transfer of data begins following an instruction for its transfer, often measured in milliseconds (ms).
  3. A method of trying to gather personal information using deceptive e-mails and websites.

10 Clues: process of converting information or data into a code to prevent unauthorized access.maximum rate of data transfer across a given path, measured in bits per second (bps).A method of trying to gather personal information using deceptive e-mails and websites....

Cyber Law 2021-09-04

Cyber Law crossword puzzle
Across
  1. It refers to the technologies, process and practices designed to protect networks, devices, app and data from any kind of cyber attack.
  2. regulatory arbitrage in Cyberspace (that is applying to the Internet) is a focal point for two opposing schools of thought, the Cyberlibertarians and
  3. 'citizen of the internet' can be called__
  4. which communication is a permanent telephone connection between two points set up by a telecommunication common carrier
  5. It refers to the adoption or increase in use of computer technology by an organization,Industry etc.
Down
  1. It can be thought of as a global electronic village with instantaneous communication and no geographical barriers
  2. The essence of this approach is that cyberspace is a distinct new space and that it can (or should) not be regulated by the state.
  3. you have your computer, you really don't need much additional hardware to connect to the internet. The primary piece of hardware you need is a
  4. it allows perfect freedom of expression, which in the physical world has been tempered by even the most liberal of regime
  5. It is a conversion of data,document and processes from analog to digital

10 Clues: 'citizen of the internet' can be called__It is a conversion of data,document and processes from analog to digitalIt refers to the adoption or increase in use of computer technology by an organization,Industry etc.It can be thought of as a global electronic village with instantaneous communication and no geographical barriers...

Puzzle - 3 2022-10-10

Puzzle - 3 crossword puzzle
Across
  1. The core of a computer's operating system that houses the most essential functions of the computer
  2. is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
  3. the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
  4. a type of malware that is aimed to infect and harm a file, a system or a network
  5. a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
Down
  1. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
  3. Customizable additions to software for extra functionality
  4. string of characters used to verify the identity of an user during the authentication process
  5. a program that can automatically perform some simple repeated task to reach a pursued goal.

10 Clues: Customizable additions to software for extra functionalitya type of malware that is aimed to infect and harm a file, a system or a networka program that can automatically perform some simple repeated task to reach a pursued goal.string of characters used to verify the identity of an user during the authentication process...

CW_1 2022-10-11

CW_1 crossword puzzle
Across
  1. Comprised of any number and variety of interconnected devices
  2. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
  3. weaknesses in software programs that can be exploited by hackers to compromise computers.
  4. string of characters used to verify the identity of a n user during the authentication process
  5. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  6. A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
Down
  1. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
  2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. a network security system that filters unsanctioned incoming and outgoing traffic.
  4. a type of malware that is aimed to infect and harm a file, a system or a network

10 Clues: Comprised of any number and variety of interconnected devicesa type of malware that is aimed to infect and harm a file, a system or a networka network security system that filters unsanctioned incoming and outgoing traffic.weaknesses in software programs that can be exploited by hackers to compromise computers....

ADSI Juan Pablo Robayo 2022-02-11

ADSI Juan Pablo Robayo crossword puzzle
Across
  1. the practice of tricking Internet users (as through the use of deceptive email messages or websites)
  2. thing made for a particular purpose, especially a piece of mechanical or electronic equipment. For example an keyboard.
  3. is a programming language commonly used in web development.
  4. refers to a system of connected computers and other devices such as printers that exchange data with each other.
Down
  1. when talking about transferring data or information from a main computer source to another device or transferring information from the cloud.
  2. a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems
  3. is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  4. is defined as a framework with a set of best practices for delivering efficient IT support services.
  5. mean making a copy of data and files to protect them against accidental loss.
  6. is a framework within which people can address complex adaptive problems, while productively and creatively delivering products of the highest possible value.

10 Clues: is a programming language commonly used in web development.mean making a copy of data and files to protect them against accidental loss.the practice of tricking Internet users (as through the use of deceptive email messages or websites)is defined as a framework with a set of best practices for delivering efficient IT support services....

Modules 18 to 20 Crossword 2023-03-31

Modules 18 to 20 Crossword crossword puzzle
Across
  1. Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
  2. A weakness in a system or its design that could be exploited by a threat actor.
  3. BYOD means Bring Your Own ____
  4. This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.
  5. The second line of defense. It is a checkpoint device that performs additional filtering and tracks the state of the connections.
Down
  1. Any potential danger to an asset.
  2. This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
  3. This can be established using username and password combinations, challenge and response questions, token cards, and other methods.
  4. A security company that offers sevices to help enterprises secure their networks. It uses a three-pronged approach combining security intelligence, security expertise, and technology.
  5. Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.

10 Clues: BYOD means Bring Your Own ____Any potential danger to an asset.A weakness in a system or its design that could be exploited by a threat actor.This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector....

Datafication and Digital Trust 2022-11-09

Datafication and Digital Trust crossword puzzle
Across
  1. Information _________ is the right to have some control over how your personal information is collected and used.
  2. The method by which information is converted into secret code that hides the information's true meaning
  3. Data as processed, stored, or transmitted by a computer
  4. A privacy ________ is a statement or a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a customer or client's privacy
  5. Common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel
Down
  1. Intrusive software that is designed to damage and destroy computers and computer systems
  2. The practice of deploying people, policies, processes, and technologies to protect organizations, their critical systems, and sensitive information from digital attacks
  3. When somebody sends an e-mail with a link to a bogus website it is called ___________
  4. An organized collection of structured information, or data, typically stored electronically in a computer system
  5. Smallest unit of data

10 Clues: Smallest unit of dataData as processed, stored, or transmitted by a computerWhen somebody sends an e-mail with a link to a bogus website it is called ___________Intrusive software that is designed to damage and destroy computers and computer systems...

Puzzle - 2 2022-10-10

Puzzle - 2 crossword puzzle
Across
  1. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
  4. weaknesses in software programs that can be exploited by hackers to compromise computers.
  5. a type of internet fraud that seeks to acquire a user’s credentials by deception.
Down
  1. the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
  2. the process of decoding cipher text to plain text, so it is readable by humans.
  3. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
  4. a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
  5. Cryptocurrency, a form of electronic cash

10 Clues: Cryptocurrency, a form of electronic cashthe process of decoding cipher text to plain text, so it is readable by humans.a type of internet fraud that seeks to acquire a user’s credentials by deception.weaknesses in software programs that can be exploited by hackers to compromise computers....

Puzzle - 6 2022-10-10

Puzzle - 6 crossword puzzle
Across
  1. extends a private network across a public network and enables users to send and receive data across shared or public networks
  2. a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
  3. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  4. Breach of a system's security policy in order to affect its integirty or availability
  5. any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
Down
  1. a process of maintaining data confidentiality by converting plain data into a secret code with the help of an encryption algorithm.
  2. name commonly given to unsolicited email.
  3. contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.
  4. a type of self-replicating malware that, when infected on a computer, is aimed to spread across the network to infect others.
  5. Good guys in the world of cybercrime. Hackers who use their skills and talents for good

10 Clues: name commonly given to unsolicited email.Breach of a system's security policy in order to affect its integirty or availabilityGood guys in the world of cybercrime. Hackers who use their skills and talents for goodcontains items that are temporarily blocked (or temporarily allowed) until an additional step is performed....

CW-2 2023-09-15

CW-2 crossword puzzle
Across
  1. which cmd is used to display the contents of a text file in the terminal
  2. a term for a software application that allows users to access and navigate the WWW to view websites and web pages
  3. a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
  4. in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
  5. a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)
  6. the core component of an operating system that manages hardware resources
Down
  1. in linux, what cmd is used to change the ownership of files and directories
  2. a term for a computer program or hardware device that provides a specific service or functionality to other software applications
  3. in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
  4. what do you type into a web browser to visit a websit

10 Clues: what do you type into a web browser to visit a websitwhich cmd is used to display the contents of a text file in the terminalthe core component of an operating system that manages hardware resourcesin linux, what cmd is used to change the ownership of files and directories...

phish 2024-03-21

phish crossword puzzle
Across
  1. What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
  2. What type of malicious software disguises itself as legitimate software to gain access to a computer system?
  3. What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
  4. What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
Down
  1. What process in cybersecurity involves encoding data to protect it from unauthorized access?
  2. What are the software updates released to fix vulnerabilities and improve security in computer systems?
  3. What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
  4. A software that is designed to detect and destroy computer viruses.
  5. What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
  6. What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?

10 Clues: A software that is designed to detect and destroy computer viruses.What process in cybersecurity involves encoding data to protect it from unauthorized access?What are the software updates released to fix vulnerabilities and improve security in computer systems?...

phish 2024-03-21

phish crossword puzzle
Across
  1. What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?
  2. What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
  3. What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
  4. What type of malicious software disguises itself as legitimate software to gain access to a computer system?
  5. What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
Down
  1. What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
  2. What are the software updates released to fix vulnerabilities and improve security in computer systems?
  3. What process in cybersecurity involves encoding data to protect it from unauthorized access?
  4. What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
  5. A software that is designed to detect and destroy computer viruses.

10 Clues: A software that is designed to detect and destroy computer viruses.What process in cybersecurity involves encoding data to protect it from unauthorized access?What are the software updates released to fix vulnerabilities and improve security in computer systems?...

iACE Crossword Puzzle 3 2021-11-09

iACE Crossword Puzzle 3 crossword puzzle
Across
  1. A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
  2. The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
  3. Unacceptable or improper behaviour, especially by an employee or professional person.
  4. An official inspection of an individual’s or organization’s accounts.
Down
  1. _____________ refers to adherence to policies, plans, procedures, laws, regulations, contracts, or other requirements.
  2. ________ risk refer to the risk of inadequate employment practices and resource management.
  3. Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
  4. _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
  5. Wrongful or criminal deception intended to result in financial or personal gain.
  6. Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.

10 Clues: An official inspection of an individual’s or organization’s accounts.Wrongful or criminal deception intended to result in financial or personal gain.Unacceptable or improper behaviour, especially by an employee or professional person.________ risk refer to the risk of inadequate employment practices and resource management....

The central technologies to digital transformation 2023-12-15

The central technologies to digital transformation crossword puzzle
Across
  1. practice of protecting critical systems and sensitive information from digital attacks
  2. provides a secure and transparent way to record and verify transactions. It is commonly associated with cryptocurrencies but has broader applications, such as supply chain management and secure data sharing.
  3. involves the use of software robots to automate repetitive and rule-based tasks. It helps streamline business processes, reduce errors, and increase operational efficiency.
  4. technology enhances user experiences by creating immersive virtual environments
  5. provides faster and more reliable connectivity, enabling the seamless operation of applications that require high data transfer speeds
  6. enable systems to learn from data and make intelligent decisions.
Down
  1. involves processing data closer to the source of generation rather than relying solely on centralized cloud servers.
  2. involves connecting physical devices to the internet, allowing them to collect and exchange data
  3. enable the processing and analysis of large volumes of data to derive insights and make informed business decisions.
  4. provides scalable and flexible resources, allowing organizations to store and access data, run applications, and deploy services without the need for on-premises infrastructure

10 Clues: enable systems to learn from data and make intelligent decisions.technology enhances user experiences by creating immersive virtual environmentspractice of protecting critical systems and sensitive information from digital attacksinvolves connecting physical devices to the internet, allowing them to collect and exchange data...

Corporate Compliance and Ethics Week 2023 2023-10-30

Corporate Compliance and Ethics Week 2023 crossword puzzle
Across
  1. What you must do if you suspect that someone is doing anything that violates the Compliance and Ethics code and our Standards of Conduct.
  2. The acronym for the policy that ensures and protects a patient's electronic health record (EHR).
  3. The acronym for our "Safety and Compliance" reporting system.
  4. The practice of protecting systems, networks and programs from digital attacks.
  5. The fraudulent practice of sending emails purporting to be from a reputable company in order to trick someone into sharing their personal information.
Down
  1. Following the rules. It means we try to understand and comply with all the laws and policies that apply to our duties at Community.
  2. A system of moral principles dealing with values with respect to the rightness and wrongness of certain actions and to the goodness and badness of motives and ends of such actions.
  3. Who is responsible for compliance at Community Health System.
  4. A type of email that covers a range of protective measures and creates a secure connection between a dedicated web server and browser.
  5. Another name for your CHS system username and password.

10 Clues: Another name for your CHS system username and password.Who is responsible for compliance at Community Health System.The acronym for our "Safety and Compliance" reporting system.The practice of protecting systems, networks and programs from digital attacks....

CW-2 2023-09-15

CW-2 crossword puzzle
Across
  1. a term for a software application that allows users to access and navigate the WWW to view websites and web pages
  2. in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
  3. what do you type into a web browser to visit a websit
  4. a term for a computer program or hardware device that provides a specific service or functionality to other software applications
  5. in linux, what cmd is used to change the ownership of files and directories
Down
  1. the core component of an operating system that manages hardware resources
  2. a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
  3. in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
  4. which cmd is used to display the contents of a text file in the terminal
  5. a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)

10 Clues: what do you type into a web browser to visit a websitwhich cmd is used to display the contents of a text file in the terminalthe core component of an operating system that manages hardware resourcesin linux, what cmd is used to change the ownership of files and directories...

Dark Web Saga 2024-02-04

Dark Web Saga crossword puzzle
Across
  1. Clicks and beeps, a language I speak, what am I, a gadget for the tech geek?
  2. I learn and adapt, with circuits in tow, a mind of wires, in the tech's shadow.
  3. In circuits, I compute without a hitch, a brain of metal and silicon which is which?
  4. With keys at my command, I type and code, a writer's ally on the digital road. What am I, in the coding abode?
  5. A web of connections, wires in a dance, transmitting data at a rapid advance. What am I, in the networking expanse?
  6. A language, zeroes and ones, the foundation of code, where the digital journey begins. What am I, in the coding bins?
Down
  1. In the coding labyrinth, where symbols align, a programmer's toolkit, where solutions shine. What am I, in the coding design?
  2. Pixels and screens, a visual delight, bringing images to life, in the digital light. What am I, in the visual height?
  3. With keys and codes, I lock and secure, a guardian of data, making breaches obscure.
  4. I hide in the shadows, a secret unknown, where the internet's darker side is shown.

10 Clues: Clicks and beeps, a language I speak, what am I, a gadget for the tech geek?I learn and adapt, with circuits in tow, a mind of wires, in the tech's shadow.I hide in the shadows, a secret unknown, where the internet's darker side is shown.With keys and codes, I lock and secure, a guardian of data, making breaches obscure....

TECH 2024-07-08

TECH crossword puzzle
Across
  1. A decentralized and distributed digital ledger technology that records transactions across multiple computers in a way that is secure, transparent, and resistant to tampering.
  2. Source: Software or technology that is released with a license that allows anyone to inspect, modify, and distribute its source code.
  3. A set of rules or instructions designed to solve a specific problem or accomplish a task in computing.
  4. The practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and data breaches
Down
  1. The process of converting data into a code to prevent unauthorized access, especially during transmission over networks.
  2. Digital or virtual currencies that use cryptography for security and operate independently of a central authority, such as Bitcoin or Ethereum.

6 Clues: A set of rules or instructions designed to solve a specific problem or accomplish a task in computing.The practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and data breachesThe process of converting data into a code to prevent unauthorized access, especially during transmission over networks....

Puzzle - 7 2022-10-10

Puzzle - 7 crossword puzzle
Across
  1. a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
  2. a regular system update released by developers to fix bugs and other software vulnerabilities
  3. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  4. a list of permitted items that are automatically let through whatever gate is being used.
  5. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
Down
  1. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
  2. State of being safe / free from danger or threat
  3. a basic access control mechanism that allows elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system, except those explicitly mentioned which are denied access.
  4. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
  5. The programs and other operating information used by a computer

10 Clues: State of being safe / free from danger or threatThe programs and other operating information used by a computera list of permitted items that are automatically let through whatever gate is being used.a regular system update released by developers to fix bugs and other software vulnerabilities...

Puzzle - 11 2022-10-10

Puzzle - 11 crossword puzzle
Across
  1. a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
  2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
  4. an isolated environment on a network that mimics end-user operating environments.
  5. Comprised of any number and variety of interconnected devices
Down
  1. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  2. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  3. Breach of a system's security policy in order to affect its integrity or availability
  4. any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
  5. string of characters used to verify the identity of an user during the authentication process

10 Clues: Comprised of any number and variety of interconnected devicesan isolated environment on a network that mimics end-user operating environments.Breach of a system's security policy in order to affect its integrity or availabilitystring of characters used to verify the identity of an user during the authentication process...

corps of signals 2023-01-11

corps of signals crossword puzzle
Across
  1. the use of radio waves to transmit and receive information, a primary means of communication for the corps of signals
  2. a military branch that specializes in communications, responsible for providing and maintaining the communication systems and networks used by a military force.
  3. the use of speech to convey information, one of the primary means of communication for the corps of signals
  4. communications: the use of satellites to transmit and receive information, a key capability of the corps of signals
  5. a group of interconnected devices and systems that can exchange information and share resources
  6. the practice of protecting communication systems, networks and data from unauthorized access or attack
Down
  1. ios or smartphones, to communicate, an essential capability for the corps of signals
  2. a communication facility that receives a signal from one source and retransmits it on to another, used by the corps of signals to extend the range of communication networks.
  3. the process of converting plain text into a coded form to protect the information from unauthorized access
  4. the use of light-carrying fibers to transmit information, a technology used by the corps of signals for high-speed data transfer

10 Clues: ios or smartphones, to communicate, an essential capability for the corps of signalsa group of interconnected devices and systems that can exchange information and share resourcesthe practice of protecting communication systems, networks and data from unauthorized access or attack...

altafiber Security Awareness 2022-08-29

altafiber Security Awareness crossword puzzle
Across
  1. Your ____ is like your underwear; don't share it with your friends, and change it often.
  2. Personal Identifiable Information
  3. _________ software helps prevent and eliminate viruses and other malware from infecting your computer.
  4. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one.
  5. A distinct subset of the internet with addresses sharing a common suffix or under the control of a particular organization or individual.
  6. A weakness in a program or system that can be exploited
  7. A layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's login
  8. The process of changing plain text to cipher text using an algorithm
  9. Logical or physical device used to filter network traffic
Down
  1. Email _____ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity.
  2. United States Federal Agency that specializes in cybersecurity
  3. National Institute of Standards and Technology
  4. The form of malware that encrypted Colonial Pipeline files in 2021.
  5. An email that tricks you into giving up your passphrase, password or clicking on a malicious link
  6. Cyber Security Awareness Month
  7. A Virtual Private Network connection that establishes a secure connection between you and the internet.
  8. Malicious software or commands that take advantage of a system’s vulnerabilities. Common forms include: viruses, trojans, worms and ransomware
  9. Similar to a password except you use a string of words and it gives you access to your computer.

18 Clues: Cyber Security Awareness MonthPersonal Identifiable InformationNational Institute of Standards and TechnologyA weakness in a program or system that can be exploitedLogical or physical device used to filter network trafficUnited States Federal Agency that specializes in cybersecurityThe form of malware that encrypted Colonial Pipeline files in 2021....

Challenging Indian Tech & Innovation Crossword 2024-10-10

Challenging Indian Tech & Innovation Crossword crossword puzzle
Across
  1. A startup that’s revolutionizing the Indian agritech sector with AI-driven predictive analytics for farming
  2. This Indian multinational technology company is the world's largest provider of IT consulting services
  3. An Indian unicorn startup specializing in online education, now expanding globally with gamified learning solutions
  4. The first Indian startup to be listed on NASDAQ, specializing in AI-powered customer engagement platforms
  5. India’s leading tech unicorn in ride-sharing, now venturing into electric vehicles
  6. This Indian tech company developed a super app in the post-pandemic era, offering a wide range of services, including payments and healthcare
  7. An Indian renewable energy company that’s making headlines for being the largest in the world by installed capacity
  8. An Indian tech company focused on blockchain and AI for managing supply chain transparency in industries like pharma and logistics
Down
  1. An Indian company that developed an AI-based cybersecurity platform, now offering services across more than 30 countries
  2. India’s largest IT company by market capitalization, known for pioneering automation and AI-based IT solutions
  3. This Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystem
  4. A major player in India’s space technology, this private company built India’s first privately developed rocket
  5. The largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services
  6. This company is leading India’s AI-based conversational chatbot innovations, widely used by financial institutions

14 Clues: India’s leading tech unicorn in ride-sharing, now venturing into electric vehiclesThis Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystemThe largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services...

FITAVocab.TC 2013-05-16

FITAVocab.TC crossword puzzle
Across
  1. programs that you can download
  2. ethical uses of or on a computer or the web
  3. circuit board
  4. something that shows off a a business and shows people what it is about
  5. crediting a persons work
  6. extra docking system
  7. the security of or on a computer
  8. a paid internet access
  9. central processing unit
  10. a companies "slogan"
  11. a type of layout
  12. a format of a program on your computer
  13. a combination of many search engines
  14. a program that allows you to create documents
  15. the thing at the top of the screen
  16. a port to get wifi
  17. storing space
  18. liquid crystal display
  19. an illegal way of taking credit for somebody's invention
  20. light emitting diode
  21. National Cyber Security Alliance
  22. what you have on you desktop already
Down
  1. a term that describes safety o the computer or on the web
  2. decision tool
  3. a place where you can virtually go and search on the web
  4. a system that allows you to connect to other peoples devices over wifi or cellular data
  5. cd port
  6. an adjective that describes cyber in a way that is someway pixel ly
  7. the old fashion watch "not digital"
  8. things that you can buy to play or enjoy on
  9. confusing
  10. a term that describes the web and computers
  11. a virtually folder where you can save your documents, files
  12. your work
  13. a user that is online
  14. a device that can go anywhere
  15. a thing of the computer that allows you to move around on the screen or click
  16. memory card

38 Clues: cd portconfusingyour workmemory carddecision toolcircuit boardstoring spacea type of layouta port to get wifiextra docking systema companies "slogan"light emitting diodea user that is onlinea paid internet accessliquid crystal displaycentral processing unitcrediting a persons worka device that can go anywhereprograms that you can download...

RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) 2023-11-30

RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) crossword puzzle
Across
  1. Crafting interfaces that dynamically adjust based on user behavior, preferences, or contextual factors.
  2. Inadequate or incomplete planning, leading to constraints, hurried decisions, or compromises in later project stages.
  3. Conducting meetings between people in different locations using video and audio connections.
  4. Ethical hacking practice where cybersecurity professionals legally attempt to identify system vulnerabilities to enhance security.
  5. The act of leaving out specific individuals or groups, often unintentionally, from a particular context or system.
  6. The science or practice of encoding information to prevent unauthorized access, especially in information security.
  7. Altering or eradicating identifiable information from datasets to safeguard individuals' privacy while retaining overall data utility.
  8. Pre-set configurations or settings automatically applied in a system or software if not explicitly specified.
  9. The process of identifying and rectifying inaccuracies or inconsistencies in data to improve its quality.
  10. Designing systems with separate, interchangeable parts, enhancing flexibility and ease of maintenance.
Down
  1. Employing data and algorithms to create models that predict future outcomes or behaviors.
  2. The process of selectively omitting or censoring sensitive information from a document or dataset, often for privacy or security reasons.
  3. Repeating tests post-modifications to ensure previously functioning aspects have not been adversely affected.
  4. The commitment to complying with established standards, specifications, or regulations.
  5. Catering to a specific segment or group with unique preferences or needs.
  6. The deliberate act of making something obscure or unclear, often used to protect intellectual property or hinder reverse engineering.
  7. Alternative problem-solving methods employed when conventional approaches fail.
  8. The capability of being customized or adapted to suit individual preferences or needs.
  9. Losing interest or focus during discussions, indicating a lack of engagement or understanding.
  10. A systematic approach or set of procedures for solving a problem or accomplishing a task.

20 Clues: Catering to a specific segment or group with unique preferences or needs.Alternative problem-solving methods employed when conventional approaches fail.The capability of being customized or adapted to suit individual preferences or needs.The commitment to complying with established standards, specifications, or regulations....

Literasi Digital 2024-08-13

Literasi Digital crossword puzzle
Across
  1. salah satu Pillar literasi digital
  2. aplikasi mengirim pesan di handpone
  3. proses meyakinkan penggunaan layanan digital dengan aman
  4. Informasi yang tidak sengaja salah/akurat
  5. kata lain keamanan siber
  6. perangkat dalam komputer
  7. dunia bisnis
  8. salah satu perangkat lunak password manager
  9. alamat web address bar peramban
  10. lisensi dimana seluruh hak cipta terhadap perangkat lunak telah dilepaskan
  11. web penjelajah internet terus menerus
  12. kecakapan media digital
  13. singkatan dari Software of a service
  14. sistem menggunakan perangkat keras
  15. fitur yang dikembangkan oleh peramban
  16. mencari halaman dengan judul tertentu
  17. mencari konten yang muncul di alamat domain
  18. situs web
  19. bidang lain informatika
  20. lisensi perdaganga
  21. pembaruan perangkat lunak
  22. kata kunci khusus yang digunakan dalam pencarian
Down
  1. provokasi di media sosia
  2. tantangan era literasi digita
  3. lisensi publik umum
  4. literasi yang mencari dan memahami yang ditemukan
  5. informasi yang dikumpulkan oleh web crawler
  6. kata lain dari browser
  7. elektronik kepanjangan dari TE
  8. kata kunci pengaman handphone
  9. mesin pencari khusus anak²
  10. penyadap media sosial
  11. perangkat kedua dalam komputer
  12. perangkat lunak yang digunakan untuk mengakses informasi di internet
  13. tempat jasa SAS beroperasi
  14. profesi bidangn informatika
  15. sebutan komputer di Amerika Serikat
  16. teknologi informasi dan komunikasi
  17. fitur pencarian yang terus meningkat
  18. Engine mesin pencari
  19. lisensi yang boleh menggunakan perangkat lebih
  20. gak atas kekayaan intelektua
  21. kata lain lisensi gratis
  22. Informasi yang tidak benar
  23. Audio konten yang berupa suara yang bisa didedidengarkan
  24. manager pengelola kata sandi supaya aman
  25. jaringan komunikasi
  26. dasar kajian data
  27. intelektual hasil buah pikir dari perangkat lunak
  28. salah satu perilaku yang harus diterapkan dalam budaya digital
  29. yayasan perangkat lunak bebas

51 Clues: situs webdunia bisnisdasar kajian datalisensi perdagangalisensi publik umumjaringan komunikasiEngine mesin pencaripenyadap media sosialkata lain dari browserkecakapan media digitalbidang lain informatikaprovokasi di media sosiakata lain keamanan siberperangkat dalam komputerkata lain lisensi gratispembaruan perangkat lunakmesin pencari khusus anak²...

Current Events Final Exam 2024-05-08

Current Events Final Exam crossword puzzle
Across
  1. - Competitive video gaming.
  2. - Able to be maintained long-term. (Often refers to environmental practices)
  3. - Application software for a smartphone or computer.
  4. - Protecting computer systems from attacks.
  5. - Spreading quickly on social media.
  6. - A virtual world users can access and interact with.
  7. - Audio program series distributed online.
  8. - Digital currency secured by cryptography.
  9. - Playing video games.
  10. - Energy sources that can be replenished, like solar or wind power.
  11. - Unmanned aerial vehicles used for various purposes.
  12. - Delivering content online in real-time.
  13. - Creating three-dimensional objects from a digital file.
  14. - Billionaire entrepreneur behind companies like Tesla and SpaceX.
  15. (AGI) - Hypothetical AI with human-like intelligence.
  16. - Online seminar or presentation.
Down
  1. - A large-scale disaster or event. (Can be metaphorical)
  2. - Science, Technology, Engineering, and Math education.
  3. - An additional dose of the COVID-19 vaccine given to maintain immunity.
  4. - Long-term shift in weather patterns.
  5. - Virtual reality, a simulated experience.
  6. - Object orbiting Earth used for communication or observation.
  7. - Storing and accessing data through the internet.
  8. - Online platforms for social connection and content sharing.
  9. (AI) - Machines that mimic human cognitive functions.
  10. - Large and complex sets of data used for analysis.
  11. - False or misleading information presented as news.
  12. (IoT) - Network of physical devices connected to the internet.
  13. - Non-fungible token, a unique digital asset.
  14. - Autonomous vehicle that operates without a driver.
  15. - Person with a large online following who promotes products.
  16. (EV) - Vehicle powered by electricity.
  17. - Mobile phone with advanced features.
  18. - The field of designing and building robots.
  19. - Automated vacuum cleaner.
  20. - Using biology to create new products or processes.

36 Clues: - Playing video games.- Competitive video gaming.- Automated vacuum cleaner.- Online seminar or presentation.- Spreading quickly on social media.- Long-term shift in weather patterns.(EV) - Vehicle powered by electricity.- Mobile phone with advanced features.- Delivering content online in real-time.- Virtual reality, a simulated experience....

Post Cold War 2024-10-01

Post Cold War crossword puzzle
Across
  1. The practice of protecting computer systems and networks from unauthorized access or attacks.
  2. A long-term shift in global temperatures and weather patterns caused by human activity.
  3. A political movement claiming to represent the voice of ordinary people against elites.
  4. The process of increasing interconnection between countries through trade, culture, and technology.
  5. 2015 international treaty aimed at reducing global greenhouse gas emissions.
  6. U.S.-led global military campaign launched after the 9/11 attacks.
  7. A series of coordinated terrorist attacks in 2001 that reshaped global security policies.
  8. The practice of using resources responsibly to ensure future generations can meet their needs.
  9. A conflict in which countries impose tariffs on each other, as seen between the U.S. and China.
Down
  1. Assistance provided during crises such as natural disasters, conflicts, or famines.
  2. Initiative China’s global infrastructure development strategy aimed at increasing its global influence.
  3. The rapid development of the internet and social media since the 1990s.
  4. The disintegration of this superpower in 1991 marked the end of the Cold War.
  5. Political and economic union of 27 European countries, facing challenges like Brexit.
  6. Laws regulating how people can enter and live in a country, often debated in the context of security and economics.
  7. Online platforms that have transformed global communication and activism, such as Facebook and Twitter.
  8. The use of violence, especially against civilians, to achieve political goals.
  9. The United Kingdom’s decision to leave the European Union in 2016.
  10. Country whose rapid economic and political rise has challenged U.S. global dominance.
  11. Political ideology focused on promoting the interests of one's country, often at the expense of global cooperation.

20 Clues: The United Kingdom’s decision to leave the European Union in 2016.U.S.-led global military campaign launched after the 9/11 attacks.The rapid development of the internet and social media since the 1990s.2015 international treaty aimed at reducing global greenhouse gas emissions....

Literasi digital 2024-08-20

Literasi digital crossword puzzle
Across
  1. menandai kata kunci atau topik
  2. kejahatan yang melibatkan penggunaan komputer
  3. menandai lokasi geografis dalam foto
  4. sebuah metode untuk memanipulasi orang
  5. mengambil file dari internet
  6. perangkat lunak yang di ciptakan untuk merusak sistem komputer
  7. sebuah vidio yang berfokus pada cerita
  8. upaya untuk mencuri informasi sensitif
  9. melindungi sistem komputer dan jaringan dari ancaman
  10. suatu konten yang cepat menyebar
  11. sebuah antar muka untuk menghubungkan aplikasi
  12. pengguna internet yang sengaja membuat komentar provokatif
  13. metadata
  14. teknologi yang memadukan dunia
  15. istilah untuk mengurangi penggunaan teknologi
  16. sebuah gambar kecil atau simbol
  17. sebuah format untuk menyediakan konten
  18. penggunaan teknologi digital untuk menghina
  19. catatan online atau jurnal yang sering di update
  20. sebuah jenis kode matriks
  21. pengguna internet yang memiliki banyak follower
  22. representasi grafis atau karakter
  23. informasi yang memberikan deskripsi
Down
  1. tempat untuk berbagi pendapat
  2. menyaksikan konten vidio secara langsung
  3. memanen data pribadi
  4. yang digunakan untuk melindungi jaringan
  5. platfrom media sosial yang paling umum
  6. kiriman pesan kepada banyak orang tanpa izin
  7. sebuah metode keamanan identitas akun
  8. menyimpan data secara online dalam serfer
  9. platfrom yang sering di gunakan untuk melakukan vidio konvergensi
  10. digital yang meninggalkan jejak aktivitas online
  11. proses merubah informasi menjadi kode
  12. situs web yang memungkinkan pengguna untuk mengedit
  13. sebuah kelemahan atau cela yang dapat diserang
  14. kesenjangan akses terhadap teknologi digital
  15. penggunaan teknologi digital untuk menghina
  16. sebuah unit infomasi
  17. layanan untuk menyimpan data online
  18. menyimpan prefensi menggunakan
  19. generasi yang tumbuh Dengan teknologi
  20. topik yang sedang populer
  21. menyimpan dan menyediakan data
  22. sebuah alamat web
  23. program yang dapat menggandakan dirinya sendiri dan menyebar ke komputer lain
  24. untuk menampilkan konten
  25. strategi untuk meningkatkan visibilitas website
  26. sebuah perangkat lunak atau parangkat keras
  27. perangkat lunak yang berinteraksi dengan pengguna

50 Clues: metadatasebuah alamat webmemanen data pribadisebuah unit infomasiuntuk menampilkan kontentopik yang sedang populersebuah jenis kode matriksmengambil file dari internettempat untuk berbagi pendapatmenandai kata kunci atau topikmenyimpan prefensi menggunakanmenyimpan dan menyediakan datateknologi yang memadukan duniasebuah gambar kecil atau simbol...

CYBER FEST CROSSWORD 2024-10-18

CYBER FEST CROSSWORD crossword puzzle
Across
  1. Software designed to detect, prevent, and remove malware and other harmful software.
  2. Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
  3. A secret string of characters used to verify the identity of a user.
  4. An attempt by hackers to damage or disrupt a computer system or network.
  5. Ensuring that an organization meets regulatory and legal requirements for security practices.
  6. Software that secretly monitors and collects personal information from a computer.
  7. A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
  8. The process of verifying the identity of a user or device before granting access to a system.
Down
  1. Related to computers, information technology, or virtual reality, often used in the context of online environments.
  2. The process of converting data into a secret code to protect it from unauthorized access.
  3. A weakness in software, hardware, or procedures that could be exploited to cause harm.
  4. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
  6. Any software intentionally designed to cause damage to a computer, server, or network.
  7. A person who uses computers to gain unauthorized access to data.
  8. A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.

16 Clues: A person who uses computers to gain unauthorized access to data.A secret string of characters used to verify the identity of a user.An attempt by hackers to damage or disrupt a computer system or network.Software that secretly monitors and collects personal information from a computer....

ICT Crossword 2023-03-28

ICT Crossword crossword puzzle
Across
  1. The learning process of new skills necessary to complete a different role; move onto a new role within their current company.
  2. A cyber attack intended to redirect a website's traffic to another fake site
  3. A wireless computer network that links two or more devices using wireless communication to form a local area network.
  4. The safe and responsible use of technology.
  5. A type of malware that attaches to another program and can replicate and spread to other computers.
  6. The replacement of skilled people with technology that require people who can operate that only need fewer skills.
  7. What is a private computer network within an organization
  8. Allows two staff members to share the responsibilities of one full-time position.
  9. A person who uses computers to gain unauthorized access to data
Down
  1. A telecommunications network that extends over a large geographic area.
  2. Phone calls that induce you to reveal personal information.
  3. Unsolicited messages sent in bulk by email.
  4. Information relating to an identified or identifiable individual.
  5. A meeting held by people who are talking to each other over the internet
  6. A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  7. What is a global network of interconnected computer networks
  8. A phishing cybersecurity attack carried out over mobile text messaging
  9. A collection of devices connected together in one physical location.
  10. What is usually considered as working fewer than 35 hours, or 30 hours, per week.
  11. An attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate.

20 Clues: Unsolicited messages sent in bulk by email.The safe and responsible use of technology.What is a private computer network within an organizationPhone calls that induce you to reveal personal information.What is a global network of interconnected computer networksA person who uses computers to gain unauthorized access to data...

Cyber Security 2024-08-29

Cyber Security crossword puzzle
Across
  1. Jenis malware yang mengunci file atau sistem komputer dan meminta tebusan untuk membukanya kembalihakakses hak seorang pengguna untuk masuk ke dalam sebuah sistem, jaringan, atau aplikasi komputer secara legal
  2. tindak kejahatan yang memanfaatkan teknologi komputer dan jaringan internet untuk melakukan peretasan, pencurian data dan tindak kriminal digital lainnya
  3. Jenis malware yang merekam aktivitas pengguna di komputer
  4. Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna
  5. Serangan siber yang mencuri informasi pribadi dengan meniru situs web yang sah
  6. jenis malware yang akan menampilkan iklan atau jendela pop-up yang tidak diinginkan di layar perangkat yang terinfeksi
  7. proses/metode untuk mengubah bentuk data menjadi kode/teks yang sulit dimengerti atau dibaca oleh pihak yang tidak memiliki akses
  8. Serangan siber yang bertujuan untuk mencuri data sensitif seperti nomor kartu kredit
  9. Proses mengembalikan sistem komputer ke keadaan semula setelah terjadi serangan siber
Down
  1. Teknik manipulasi psikologis untuk mendapatkan informasi sensitif
  2. proses pengecekan identitas pengguna atau perangkat yang meminta akses ke dalam sistem, jaringan, atau sumber daya informasi
  3. proses menentukan tingkat atau jenis akses yang diberikan kepada pengguna atau perangkat yang telah diautentikasi
  4. Perangkat lunak berbahaya yang dirancang untuk menyusup ke sistem komputer tanpa sepengetahuan pengguna
  5. Proses mengamankan informasi dan sistem komputer dari akses, penggunaan, pengungkapan, gangguan, modifikasi, atau penghancuran yang tidak sah
  6. Serangan siber yang bertujuan untuk membuat suatu layanan atau sumber daya tidak dapat diakses
  7. Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer
  8. Perangkat lunak yang digunakan untuk mengamankan jaringan komputer dari akses yang tidak sah
  9. Serangan siber yang menargetkan kelemahan pada perangkat lunak atau sistem operasi
  10. Jenis malware yang menyebarkan dirinya melalui email atau lampiran
  11. Jenis malware yang mereplikasi diri sendiri dan menyebar ke sistem komputer lain

20 Clues: Jenis malware yang merekam aktivitas pengguna di komputerTeknik manipulasi psikologis untuk mendapatkan informasi sensitifJenis malware yang menyebarkan dirinya melalui email atau lampiranJenis malware yang menyamarkan diri sebagai program yang baik dan bergunaPerangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer...

Technology Crossword 2024-04-11

Technology Crossword crossword puzzle
Across
  1. a device used to only capture photos and videos
  2. a device that sends out signals wirelessly
  3. a nonhuman technology
  4. they produce sounds so you can listen to music or audio out loud
  5. a machine used for sending and receiving documents
  6. a display screen that shows the converted code
  7. a device used to watch movies and shows
  8. a lighting system commonly used on gaming computers
  9. you can wear them on your head a listen to music
  10. a tool used to type words
  11. portable device used for communication
  12. a device used for playing video games
  13. a device able to track things
  14. the practice of protecting computers and serves form online threats and viruses
Down
  1. the main circuit board of a computer
  2. a computer component that helps render and display images and videos
  3. a computer component that helps cool down parts of a computer
  4. a portable power source for electronic devices
  5. reality a technology that lets you escape to a different world
  6. a type of coding used in Mr.Kannani's class
  7. a flying device able to record videos
  8. a device used to do school work, watch videos, and play games
  9. a handheld object that is used to control objects on a computer screen
  10. a device that prints documents and images
  11. a technology that allows wireless communication between devices over a great distance
  12. the "brain" of the computer
  13. a fancy term used for online shopping
  14. a camera that goes on a monitor
  15. a technology that allows wireless communication between devices over a short distance
  16. a type of computer memory

30 Clues: a nonhuman technologya tool used to type wordsa type of computer memorythe "brain" of the computera device able to track thingsa camera that goes on a monitorthe main circuit board of a computera flying device able to record videosa fancy term used for online shoppinga device used for playing video gamesportable device used for communication...

Chapter 8 - Errors, Failures, and Risks 2024-11-19

Chapter 8 - Errors, Failures, and Risks crossword puzzle
Across
  1. A data structure that allows for pushing and popping elements in a last-in-first-out order.
  2. An organized collection of data that can be accessed and updated electronically.
  3. System used to confirm whether a job applicant is legally authorized to work.
  4. A repeated error caused by an error in the system or program.
  5. Abbreviation for the US deferral agency for public security including immigration, cybersecurity, and disaster prevention.
  6. A software and computer program error that causes incorrect behavior.
  7. The process of planning, decision making and putting a system into effect.
  8. The process of identifying and fixing errors in systems.
  9. A displayed description to help the programmer/operator know the issue the program is having.
  10. Reliance on computer systems and technology for essential functions.
  11. The concept where everyday devices are embedded with software and communication technologies to connect and exchange data over the internet.
  12. A check within a program that sees whether a given output or input falls within a logical range of what is acceptable.
  13. A variable in computer programming storing true or false (0 or 1) for a condition in the program.
Down
  1. Including duplicate components of systems in software to ensure reliability.
  2. Process of identifying, analyzing, and evaluating potential risks in a system to ensure safety in the technology.
  3. A mistake where the incorrect data is entered into a system.
  4. A variable exceeding the storage capacity of memory it was allocated for.
  5. A device that can operate in two different modes.
  6. A computer controlled radiation therapy machine that caused several incidences with radiation overdoses to patients.
  7. The name of Hong Kong’s international airport that experienced system failures.

20 Clues: A device that can operate in two different modes.The process of identifying and fixing errors in systems.A mistake where the incorrect data is entered into a system.A repeated error caused by an error in the system or program.Reliance on computer systems and technology for essential functions....

FITAVocab.kr 2013-05-15

FITAVocab.kr crossword puzzle
Across
  1. a saying or group of words representing a business, store, etc
  2. 1000 kilobytes
  3. Ram, memory
  4. a formal induction into office
  5. when you think who what and why when someone is talking to you online
  6. to start a computer by turning it off and then back on
  7. a port where you plug in an internet cable
  8. a character
  9. WIFI
  10. how you protect yourself online
  11. ex: dogpile and mamma.com
  12. circuit board
  13. ISP, a company that offers access to the internet and email
  14. NCSA
  15. CPU, how fast it is
  16. a pattern serving as a guide in mechanical work, something to get you going
  17. credit
  18. an image representing a business, store, etc
  19. DSL and cable are options
Down
  1. 8 bits
  2. SSID
  3. a brief written account about personal, educational, and professional qualifications and experience
  4. how you act online
  5. LED, lightbulb
  6. a right to copy and license a piece of work
  7. an arrangement or plan, how it looks
  8. ex: speaker
  9. a port for plugging in flash-drives
  10. a continuous stream of information
  11. ex: google, yahoo
  12. being safe online
  13. 1000 bytes
  14. 3G and 4G are options
  15. LCD, display
  16. a wireless networking technology that uses short-wave radio frequencies to connect wireless electronic devices
  17. the totality of a computer and the devices connected to it
  18. a port for plugging in headphones
  19. 1000 gigabytes
  20. an electronic receiver for a PS2 cable usually used to plug in a keyboard or mouse
  21. an promise presidents say
  22. gaming ports
  23. ex: mouse
  24. 1000 megabytes
  25. uses ones and zeros to transmit information
  26. the arrangement of data

45 Clues: SSIDWIFINCSA8 bitscreditex: mouse1000 bytesRam, memorya characterex: speakerLCD, displaygaming portscircuit board1000 kilobytesLED, lightbulb1000 gigabytes1000 megabytesex: google, yahoobeing safe onlinehow you act onlineCPU, how fast it is3G and 4G are optionsthe arrangement of dataex: dogpile and mamma.coman promise presidents say...

Technology Crossword 2023-06-07

Technology Crossword crossword puzzle
Across
  1. represents text, computer processor instructions, or any other data using a two-symbol system.
  2. is the most important processor in a given computer.
  3. is the protection of computer systems and networks from attack by malicious actors.
  4. is a form of computer memory that can be read and changed in any orde.
  5. is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
  6. is a file format developed by Adobe in 1992 to present document
  7. is a digital multimedia container format most commonly used to store video and audi.
  8. is a collection of discrete values that convey informatio.
  9. is a method of representing data in a visual, machine-readable form
Down
  1. is an American multinational technology company
  2. is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
  3. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  4. are small blocks of data created by a web server.
  5. is a bitmap image format that was developed by a team at the online services provider CompuServe.
  6. is a mobile operating system
  7. is a hardware or software component that stores data so that future requests for that data can be served faster
  8. is a mapping from some domain (for example, a range of integers) to bits.
  9. is a method of transmitting and receiving messages using electronic devices.
  10. is any software intentionally designed to cause disruption to a computer, server, client, or computer network.
  11. is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source devic.

20 Clues: is a mobile operating systemis an American multinational technology companyare small blocks of data created by a web server.is the most important processor in a given computer.is a collection of discrete values that convey informatio.is a file format developed by Adobe in 1992 to present document...

Unit 8 Key Terms 2023-04-27

Unit 8 Key Terms crossword puzzle
Across
  1. taken to achieve this.
  2. a place of refuge or safety.
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the
  4. a term typically used to describe international, supranational, and global resource domains in
  5. a tax or duty paid on a particular class of imports or exports.
  6. the system.
  7. to do so.
  8. fiscal policy to stimulate the economy.
  9. sum of money provided by the government or a public body
  10. economically stimulus refers to attempts to use monetary policy
  11. a system of recording information in a way that makes it difficult or impossible to change, hack, or
  12. common-pool resources are found.
  13. the profession, activity or skill of managing international relations, typically
Down
  1. the state of being equal especially in status, rights and opportunities.
  2. a video of a person in which their face or body has been digitally altered so that they appear to be
  3. to reveal personal information, such as passwords and credit card numbers
  4. else, typically used maliciously or to spread false information
  5. money paid regularly at a particular rate for the use of money lent.
  6. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce
  7. sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual
  8. to influence a country's economy.
  9. businesses.
  10. controlling the overall supply of money that is available to the nation's banks, its consumers, and
  11. a set of tools that a nation's central bank has available to promote sustainable economic growth
  12. the use of government revenue collection and
  13. a countries representative abroad.
  14. existing or occurring within a particular country
  15. assist an industry or business in order to remain competitive.

28 Clues: to do so.businesses.the system.taken to achieve this.a place of refuge or safety.common-pool resources are found.to influence a country's economy.a countries representative abroad.fiscal policy to stimulate the economy.the use of government revenue collection andexisting or occurring within a particular country...

TECH CONNECT 2023-08-30

TECH CONNECT crossword puzzle
Across
  1. Writing and structuring code that computers can execute to perform desired functions.
  2. Programs and applications that run on computers or devices, enabling various tasks.
  3. A set of rules defining how data is transmitted and received across a network.
  4. A interconnected system that allows devices to communicate and share resources.
  5. Implementing systems or processes that operate with minimal human intervention.
  6. The point of interaction between a user and a device or software application.
  7. Writing instructions that computers can understand to perform specific tasks.
  8. Measures to protect digital systems and information from unauthorized access or attacks.
  9. A remote network of servers for storing, managing, and processing data over the internet.
  10. A powerful computer that stores and manages data and resources for other devices.
  11. Intelligence, The ability of machines to simulate human cognitive functions.
Down
  1. Deliberate actions to compromise or disrupt digital systems, often for malicious purposes.
  2. Using technology to streamline and execute tasks without human intervention.
  3. The global network connecting computers and devices, facilitating information exchange.
  4. Identifying and removing errors or issues in software code.
  5. The process of introducing new ideas, methods, or technologies to improve existing systems.
  6. Combining different components or systems to work together seamlessly.
  7. Often in the form of facts, figures, or statistics, used for analysis.
  8. Examination of data to extract meaningful insights and make informed decisions.
  9. Converting data into a code to prevent unauthorized access.
  10. Short for "application," referring to software designed for specific tasks or purposes.
  11. The process of designing, creating, and refining software, systems, or products.
  12. Physical components of computers and devices that enable software to function.
  13. The person interacting with a device, system, or software application.
  14. A set of step-by-step instructions for solving a problem or completing a task.

25 Clues: Identifying and removing errors or issues in software code.Converting data into a code to prevent unauthorized access.Combining different components or systems to work together seamlessly.Often in the form of facts, figures, or statistics, used for analysis.The person interacting with a device, system, or software application....

IT and How Computers Work 2023-07-05

IT and How Computers Work crossword puzzle
Across
  1. this type of memory is permanent and saved on the hard drive
  2. job-specific high-speed wire used to communicate the processor with other components
  3. overseer of the CPU
  4. information that gets returned by the computer
  5. A machine that can quickly complete a vast number of extremely simple tasks.
  6. this type of bus carries data back and forth
  7. Stores data which is virtual information only accessible with a computer
  8. arithmetic and logic operations are processed here
  9. data we give to our computers
  10. printed circuit board that houses important hardware components via ports
  11. 0's and 1's
  12. used to store either temporary or permanent information
  13. limited space, high-speed memory that the CPU can use for quick processing
  14. comprised of the translation of input and the instructions given for output
Down
  1. this type of bus carries a specific address in memory and are unidirectional
  2. A way for computers all around the world to communicate with each other
  3. Making sure the information is communicated and stored safely and securely – only the right people should have access to it
  4. type of input device
  5. "brain of the computer"
  6. physical outlet used to connect outside, IO (Input/Output) devices to a computer.
  7. Are organized sets of instructions that utilize the computer’s hardware to complete predefined tasks.
  8. responsible for the long-term, or secondary storage of data and programs
  9. type of output device
  10. fast and temporary memory
  11. a mouse being clicked
  12. this type of bus carries the control signals to the other components and are unidirectional
  13. the use of technology to organize, store, share, and process information.

27 Clues: 0's and 1'soverseer of the CPUtype of input devicetype of output devicea mouse being clicked"brain of the computer"fast and temporary memorydata we give to our computersthis type of bus carries data back and forthinformation that gets returned by the computerarithmetic and logic operations are processed here...

Public Safety 2024-08-09

Public Safety crossword puzzle
Across
  1. a person whose job is to extinguish fires
  2. the action of evacuating a person or a place
  3. a state in which the laws and rules regulating the public behavior of members of a community are observed and authority is obeyed
  4. responsible for the prevention and detection of crime and the maintenance of public order
  5. an established or official way of doing something
  6. freedom from disturbance
  7. the system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties
  8. the action of keeping something harmful under control or within limits
  9. a danger or risk
  10. the action of protecting, or the state of being protected
  11. an act of saving or being saved from danger or distress
Down
  1. a person trained to give emergency medical care to people who are injured or ill, typically in a setting outside of a hospital
  2. the action of stopping something from happening or arising
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  4. the act of compelling observance of or compliance with a law, rule, or obligation
  5. rule or directive made and maintained by an authority
  6. the state of being free from danger or threat
  7. one of a set of explicit or understood regulations or principles governing conduct within a particular activity or sphere
  8. protected from or not exposed to danger or risk; not likely to be harmed or lost
  9. the basic physical and organizational structures and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise

20 Clues: a danger or riskfreedom from disturbancea person whose job is to extinguish firesthe action of evacuating a person or a placethe state of being free from danger or threatan established or official way of doing somethingrule or directive made and maintained by an authorityan act of saving or being saved from danger or distress...

September Edition Crossword 2024-09-24

September Edition Crossword crossword puzzle
Across
  1. 10-month-old Palestinian boy paralyzed from polio after vaccines have grown inaccessible in Gaza.
  2. This nation has been instrumental in mediating negotiations over repatriation between Germany and Afghanistan.
  3. This French political party accused the election of being "stolen" after Michel Barnier was named President.
  4. A form of peaceful protest which has grown increasingly popular amongst college students protesting the war in Gaza.
  5. Consolidated Analysis Center, Incorporated is a cybersecurity contractor for this department.
  6. First name of an American Turkish citizen shot by Israeli soldiers on September 6th, whilst protesting West Bank settlements.
  7. A town in Burkina Faso which was the most recent target of violent attacks by JNIM.
  8. Former Defense Department official under Biden who advised Vice President Harris' debate preparations.
  9. Surname of the Supreme Allied Commander of NATO.
Down
  1. A term used to describe Venezuela's overreliance on oil leading to a historic economic collapse.
  2. This Chinese investment program has led to complicated ties with Myanmar.
  3. Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete.
  4. This Japanese steel company is looking to merge with U.S. steel in a decision to heavily impact voting in the 2024 Presidential election.
  5. Campus News Editor Madeline Rowe interned with this former congressman.
  6. A defendant in the Department of Justice's case against Hamas and who heads Hamas' diaspora office.
  7. A recent rise in this political phenomenon threatens long-term stability and economic performance.
  8. This technology introduces a new threat to the cyber landscape as false media can be used for foreign intervention.
  9. Former vice president of Google's ad platform.
  10. This Long Island doctor died from anaphylactic shock at a Disney resort restaurant.
  11. This statute in international law reaffirms the authority of the International Criminal Court.

20 Clues: Former vice president of Google's ad platform.Surname of the Supreme Allied Commander of NATO.Campus News Editor Madeline Rowe interned with this former congressman.This Chinese investment program has led to complicated ties with Myanmar.Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete....

SCIENCE AND TECHNOLOGY 2024-10-25

SCIENCE AND TECHNOLOGY crossword puzzle
Across
  1. The force that pulls objects toward each other, especially toward the Earth.
  2. The technology used to design and create robots.
  3. The science of building and using tiny structures at a molecular scale.
  4. The basic building block of all living organisms.
  5. The study of matter, energy, and the forces that act on them.
  6. The act of introducing something new, often advancing technology or science.
  7. A proposed explanation made based on limited evidence, to be tested.
  8. Facts or statistics collected for analysis or reference.
  9. The power needed to do work, from sources like fuel, electricity, or the sun.
  10. Something made by humans rather than occurring naturally.
  11. A place where scientists conduct experiments and research.
  12. The study of genes and heredity in living organisms.
  13. A branch of physics studying the behavior of particles on the smallest scales.
  14. A language or set of instructions used to program computers.
  15. The study of stars, planets, and outer space.
Down
  1. A path through which electric current flows.
  2. The molecule that carries genetic information in living organisms.
  3. An imitation of a real-world process for study or training purposes.
  4. A new idea or method that improves how things are done.
  5. The protection of computer systems from digital attacks.
  6. A small piece of matter, like an atom or molecule.
  7. A test done to discover or prove something.
  8. Microscopic organisms, some of which can cause diseases.
  9. A device that orbits Earth or another planet, used for communication or research.
  10. A set of rules or instructions for solving a problem, often used in computing.
  11. A collection of data organized for easy access and analysis.
  12. A small infectious agent that can multiply in living cells.
  13. The process by which species change over time through natural selection.
  14. The use of machines and technology to operate without human intervention.

29 Clues: A test done to discover or prove something.A path through which electric current flows.The study of stars, planets, and outer space.The technology used to design and create robots.The basic building block of all living organisms.A small piece of matter, like an atom or molecule.The study of genes and heredity in living organisms....

Bureaucracy and Foreign Policy 2024-10-03

Bureaucracy and Foreign Policy crossword puzzle
Across
  1. Department that oversees agencies in charge of counterterrorism, cybersecurity, and immigration
  2. The method of influencing someone, usually a country, to behave in a certain way
  3. Department that leads the country’s foreign policy
  4. A government’s set of strategies and goals for dealing with other nations
  5. Allows both groups to meet their interests
  6. Handles significant areas of concern for the federal government (Foreign Affairs, Defense, Transportation, etc.)
  7. Large, complex administrative structure that handles the everyday business of an organization
  8. Provides the President with the support and services he needs to govern effectively
  9. Department that oversees and advises the president on military action
  10. Violent attacks against civilians
  11. The President oversees the miliatry as ________-in-chief.
  12. Government officials who live in foreign countries and represent their government
  13. A type of agency such as the CIA, NSA, and DIA
Down
  1. The heads of independent agencies are confirmed by what?
  2. Type of aid where money and resources go to help people with emergency responses to natural disasters, a lack of food, or the outbreak of deadly diseases
  3. An agreement between countries
  4. Type of aid that helps develop other nations
  5. Congress holds the power of the _________—they control how government money is raised and spent
  6. The federal bureaucracy is part of the ___________ branch.
  7. Congress sets general guidelines in laws but allows the bureaucracy to make further policy decisions through ___________ authority.
  8. Economics method to stop trade and assistance to a specific country
  9. Mutually beneficial relationship between an agency, congressional committee, and interest group.
  10. When the U.S. only threatens (key word threatens) to use military forces against another country
  11. Network of public officials, lobbyists, mass media, think tanks, etc., who promote a particular issue

24 Clues: An agreement between countriesViolent attacks against civiliansAllows both groups to meet their interestsType of aid that helps develop other nationsA type of agency such as the CIA, NSA, and DIADepartment that leads the country’s foreign policyThe heads of independent agencies are confirmed by what?...

SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10

SAFETY AND ETHICS CROSSWORD PUZZLE crossword puzzle
Across
  1. a set of data that describes and gives information about other data.
  2. The information about a particular person that exists on the Internet as a result of their online activity
  3. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
  4. domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
  5. attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  6. the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
  7. the use of electronic communication to bully a person
  8. Protection of computer systems, networks, and data from digital attacks.
  9. The protection of information from people who are not authorized to view it.
Down
  1. a computer security specialist who breaks into protected systems and networks to test and assess their security
  2. A widely-accepted security measure that should be guaranteed in every secure system
  3. having the ability to find information, evaluate information credibility, and use information effectively
  4. is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  5. protecting your data online
  6. Identity theft, stealing money, stealing private information, controlling private computers.
  7. how company’s use your data
  8. The assurance that systems and data are accessible by authorized users when and where needed
  9. Aims at ensuring that information is protected from unauthorized or unintentional alteration

18 Clues: protecting your data onlinehow company’s use your datathe use of electronic communication to bully a persona set of data that describes and gives information about other data.Protection of computer systems, networks, and data from digital attacks.The protection of information from people who are not authorized to view it....

Safety and Ethics Puzzle 2024-01-10

Safety and Ethics Puzzle crossword puzzle
Across
  1. a set of data that describes and gives information about other data.
  2. The information about a particular person that exists on the Internet as a result of their online activity
  3. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
  4. domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
  5. attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  6. the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
  7. the use of electronic communication to bully a person
  8. Protection of computer systems, networks, and data from digital attacks.
  9. The protection of information from people who are not authorized to view it.
Down
  1. a computer security specialist who breaks into protected systems and networks to test and assess their security
  2. A widely-accepted security measure that should be guaranteed in every secure system
  3. having the ability to find information, evaluate information credibility, and use information effectively
  4. is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  5. protecting your data online
  6. Identity theft, stealing money, stealing private information, controlling private computers.
  7. how company’s use your data
  8. The assurance that systems and data are accessible by authorized users when and where needed
  9. Aims at ensuring that information is protected from unauthorized or unintentional alteration

18 Clues: protecting your data onlinehow company’s use your datathe use of electronic communication to bully a persona set of data that describes and gives information about other data.Protection of computer systems, networks, and data from digital attacks.The protection of information from people who are not authorized to view it....

UNIT 1 - REVISION 2024-10-14

UNIT 1 - REVISION crossword puzzle
Across
  1. Consisting of more than one component or instance, used to describe redundant systems or data sets.
  2. Based on or following established practices or standards, often referring to traditional methods or widely accepted technologies.
  3. Moving or extending in a direction parallel to the surface or side.
  4. A device used to inject or withdraw fluid, often found in medical or laboratory environments.
  5. Expressing much in few words, especially in communication or technical documentation.
  6. Hydraulic fracturing, a method to extract oil or gas from the earth by breaking rock layers with fluid pressure.
  7. The distance between successive peaks of a wave, often related to light or sound.
  8. Having equal value, function, or meaning in a technical context, such as electrical or mechanical equivalence.
  9. To make impure by exposure to or addition of unwanted substances, relevant in contexts like data or chemical purity.
Down
  1. Inactive but capable of becoming active
  2. Focused or aligned along a specific direction, often used in antenna or signal technologies.
  3. Capable of being controlled or directed, often used in relation to antennas or vehicles.
  4. The delay before a transfer of data begins following an instruction, commonly in network or computing systems.
  5. To fail to notice or account for, often referring to missing critical details in analysis.
  6. Featuring new methods or ideas that introduce improvement or change in technology or processes.
  7. Comprising light or radiation of a single wavelength or color.
  8. To pose a risk or potential harm, often in cybersecurity or environmental contexts.
  9. To increase the strength of a signal, sound, or electrical current.

18 Clues: Inactive but capable of becoming activeComprising light or radiation of a single wavelength or color.Moving or extending in a direction parallel to the surface or side.To increase the strength of a signal, sound, or electrical current.The distance between successive peaks of a wave, often related to light or sound....

Technology 2023-06-14

Technology crossword puzzle
Across
  1. A technology that creates a computer-generated environment, simulating a realistic experience.
  2. A machine that can store, process, and retrieve information, and perform various tasks.
  3. The process of creating instructions for computers to follow, often using programming languages.
  4. Measures and practices to protect computer systems and networks from unauthorized access or attacks.
  5. A mobile phone that can also perform functions similar to a computer, such as internet browsing.
  6. The development of computer systems that can perform tasks that would normally require human intelligence.
  7. Information that is stored and processed by computers, often in the form of numbers or text.
  8. The physical components of a computer or electronic device, such as the processor or screen.
Down
  1. The use of remote servers to store, manage, and process data over the internet, rather than locally.
  2. The process of converting information into a secret code to prevent unauthorized access.
  3. Relating to information that is stored and processed in a digital format, such as digital photos or music.
  4. The branch of technology that deals with the design, construction, and operation of robots.
  5. The process of transmitting or receiving multimedia content, such as videos or music, over the internet.
  6. A global network that connects computers and allows people to access and share information.
  7. Programs or applications that run on a computer or smartphone, providing specific functionalities.
  8. The act of playing electronic games, often on a computer or gaming console.

16 Clues: The act of playing electronic games, often on a computer or gaming console.A machine that can store, process, and retrieve information, and perform various tasks.The process of converting information into a secret code to prevent unauthorized access.The branch of technology that deals with the design, construction, and operation of robots....

CNB Employee Community Banking Month Crossword 2023-04-18

CNB Employee Community Banking Month Crossword crossword puzzle
Across
  1. KnowBe4 allows us to offer free ____________ training to all our customers.
  2. The Videos section of our website features Customer ______________. They’re also featured on our YouTube channel.
  3. CNB currently has _____________________ branch locations through Ohio.
  4. In 1920, Citizens National Bank opened its doors and gave everyone an ___________ in appreciation for stopping by.
  5. Each year, CNB offices host Community Shred Day on the last _____________ of April.
  6. CNB was recently named one of the Top 50 Community Banks in the _______________.
  7. Customers may enter in person or ____________ to win a Community Gift Basket, which includes items from each of our markets, valued at more than $150.
  8. The CNB ____________ Club was re-introduced this year, offering the opportunity for employees to donate resources and time to charity.
  9. Our Financial _________________ Sweepstakes runs through May 31st and offers the chance to win $2000 for using bill payment products.
  10. If someone is interested in retirement accounts or investment opportunities, they can speak with someone from Citizens ____________ Management Group.
Down
  1. The Executive Newsletter is geared towards ___________________, providing information for owners and managers.
  2. Both the Free Checking and Go ________________ Account can be opened completely online through our website.
  3. In 2022, CNB ____________ more than $180,000 to local schools and organizations.
  4. Our _____________________ newsletter offers personal finance information and info about CNB.
  5. We offer many financial ___________________, including mortgage, investment, loan/credit card, on our website under the Resources tab.
  6. CNB Visa Credit Card customers can earn 5x points through the end of June at Home ____________ stores, such as Lowe’s.

16 Clues: CNB currently has _____________________ branch locations through Ohio.KnowBe4 allows us to offer free ____________ training to all our customers.In 2022, CNB ____________ more than $180,000 to local schools and organizations.CNB was recently named one of the Top 50 Community Banks in the _______________....

Cybersecurity Fundamental Chapter 8 Part 2 2024-06-05

Cybersecurity Fundamental Chapter 8 Part 2 crossword puzzle
Across
  1. The process of distributing and applying updates to software to fix known vulnerabilities.
  2. The practice of protecting information by mitigating information risks, ensuring the confidentiality, integrity, and availability of data.
  3. The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
  4. The process of addressing and managing the aftermath of a security breach or cyberattack.
  5. Adhering to regulations, standards, and best practices designed to protect information systems and data.
Down
  1. A proactive system that detects and prevents identified threats from infiltrating a network
  2. The act of scanning a network to discover active devices, open ports, and potential vulnerabilities.
  3. An incident where information is accessed without authorization, leading to potential exposure or theft of sensitive data.
  4. Technology used to screen and exclude access to certain types of content deemed inappropriate or harmful.
  5. The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
  6. A system that monitors network traffic for suspicious activity and potential threats
  7. The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources.

12 Clues: A system that monitors network traffic for suspicious activity and potential threatsThe process of addressing and managing the aftermath of a security breach or cyberattack.The process of distributing and applying updates to software to fix known vulnerabilities....

internet basics 2024-01-18

internet basics crossword puzzle
Across
  1. A global network of interconnected computers that enables the sharing of information and resources.
  2. Media: Online platforms that enable users to create and share content, communicate, and connect with others.
  3. To transfer data from a local device to a remote server over the internet.
  4. A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
  5. Electronic mail that allows users to send and receive messages and files over the internet.
  6. A
  7. The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
  8. To transfer data from a remote server to a local device over the internet.
Down
  1. Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
  2. Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
  3. The buying and selling of goods and services over the internet.
  4. Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
  5. A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
  6. Engine: A program that allows users to search for information on the internet by entering keywords or phrases.

14 Clues: AThe buying and selling of goods and services over the internet.To transfer data from a local device to a remote server over the internet.To transfer data from a remote server to a local device over the internet.Electronic mail that allows users to send and receive messages and files over the internet....

FITDVocab.MS 2013-05-15

FITDVocab.MS crossword puzzle
Across
  1. Where you would plug in games, keyboard, and a mouse
  2. Where you would plug in a flash drive
  3. The way things are arranged
  4. A brief description of your self you would fill out in you were applying for a job or a school
  5. Upgrade your computer
  6. A picture owned by a company
  7. An app that you can download
  8. 1,000 zettabytes
  9. Parts that let you control your computer
  10. Protect information and networks
  11. Screen
  12. A cloud based software the uses one canvas instead of traditional slides
  13. a port that allows a computer to connect to a network
  14. 8 bits
  15. 1,000 exabytes
  16. Is the newer and more common type of clock
  17. The shape or size of a document or something you can customize
  18. 1,000 petabytes
  19. a port for headphones
  20. Is the older type of clock
  21. Service Set Identifier
  22. 1,000 megabytes
Down
  1. A readable file
  2. A selection of drawing or editing tools on a program
  3. A phrase or word owned by a company
  4. An object on a computer that stores data or docs.
  5. An already made design for a document
  6. PC-Windows/Mac-Osx
  7. A device that is mobile
  8. device that makes it possible to transmission of data
  9. A place you can save docs and use anywhere
  10. 1,000 gigabytes
  11. 1,000 kilobytes
  12. Way you behave online
  13. 1,000 yottabytes
  14. Rules and behavior to keep your computer safe
  15. 1,000 brontobytes
  16. Heart of the computer
  17. 1,000 terabytes
  18. Central Processing Unit
  19. Long term memory
  20. Short term memory
  21. Comcast
  22. 1,000 bytes
  23. wireless Fidelity
  24. The first and smallest data storage

46 Clues: Screen8 bitsComcast1,000 bytes1,000 exabytesA readable file1,000 gigabytes1,000 kilobytes1,000 terabytes1,000 petabytes1,000 megabytes1,000 zettabytes1,000 yottabytesLong term memory1,000 brontobytesShort term memorywireless FidelityPC-Windows/Mac-OsxUpgrade your computerWay you behave onlineHeart of the computera port for headphones...

FIT_ Vocab.MGB 2013-05-16

FIT_ Vocab.MGB crossword puzzle
Across
  1. the heart of a computer
  2. a plan or design
  3. zoomable online presentation program
  4. a written document of what experience you have
  5. the right to make copies
  6. things you download onto your computer, phone, or pad
  7. protection of information on the internet
  8. it sends the user requests for other search engines
  9. a navigation tool that you use to go on websites
  10. a three folded pamphlet that tells about a company
  11. a file format that is meant for pictures
  12. somewhere where you can see the format of a doc
  13. things that have to do with a computer
  14. an internet provider
  15. a template that you can type on easily
  16. the act to induct into office
  17. a motto or something a company says to get your attention
  18. wireless internet
  19. something you plug into your computer
  20. to restart your computer
  21. flash drive mouse keyboard
  22. a name, symbol, or trademark
  23. a program that controls a display for the user
  24. random memory for your computer
  25. smallest unit of data on a computer
Down
  1. the arrangement of data on a document
  2. someone who sells space for websites
  3. a file having a present format
  4. the setup of a computer
  5. wired internet
  6. Google Bing! Yahoo
  7. something you can create on
  8. the rules or behavior to keep you safe online
  9. how to act online
  10. a online memory storing device that can be accessed anywhere
  11. iphone droid blackberry
  12. to tell people about someone's product or service
  13. the main processing unit
  14. a device that shows information
  15. wireless networking tech
  16. to help a company grow
  17. word excel powerpoint
  18. a company that helps keep you safe online

43 Clues: wired interneta plan or designhow to act onlinewireless internetGoogle Bing! Yahooan internet providerword excel powerpointto help a company growthe heart of a computerthe setup of a computeriphone droid blackberrythe right to make copiesthe main processing unitto restart your computerwireless networking techflash drive mouse keyboard...

Tech puzzle 2023-03-02

Tech puzzle crossword puzzle
Across
  1. Primary memory is also known as _______ memory.
  2. What is a document sent with with an email message called?
  3. ________________ hyperlink is a saved link to a particular web page.
  4. Which technology is used in Brahmastra movie?
  5. Visual display unit is also called _____________
  6. Protection of computer system and information from harm theft and unauthorised use.
  7. _______is considered as one of the universal gates.
  8. The primary component of a computer that acts as its “control center.”
  9. An incredibly powerful tool used to get meaning out of vast amounts of data
  10. The initial program that runs when a computer is powered up or rebooted.
  11. ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
  12. What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
Down
  1. A chatbot developed by openAI and launched in November 2022
  2. _________ protects your computer from viruses and hackers
  3. _______________ reality is the integration of digital information with live video.
  4. What is temporarily stored on your computer?
  5. What technology was used in avengers end game?
  6. go Give one example of a game that used unity and C#
  7. A software program that allows you to surf the web.
  8. _______ is the way of sending messages over the Internet.
  9. Terminates the loop statement and transfers execution to the statement immediately following the loop.
  10. What is the #1 social media app?
  11. What protects your computer from hackers?
  12. call An interrupt triggered by a software.
  13. Smallest unit of measurement in computing

25 Clues: What is the #1 social media app?What protects your computer from hackers?Smallest unit of measurement in computingcall An interrupt triggered by a software.What is temporarily stored on your computer?Which technology is used in Brahmastra movie?What technology was used in avengers end game?Primary memory is also known as _______ memory....

UPC 2023-04-23

UPC crossword puzzle
Across
  1. The act of buying or selling goods or services online
  2. The process of protecting computer systems and networks from unauthorized access
  3. A software program used to create and edit digital images
  4. The amount of money required to start or operate a business
  5. A person who starts and runs a business
  6. The act of selling goods or services to another country
  7. A written agreement between two or more parties
  8. The process of promoting a product or service through paid advertising
  9. The difference between a company's assets and liabilities
  10. A software program that performs a specific task
  11. A type of authentication that uses a physical characteristic of the user, such as a fingerprint or iris scan
Down
  1. A type of legal protection for creative works
  2. A type of software used to create and edit spreadsheets
  3. A system of record-keeping and financial reporting for businesses
  4. A programming language used to create web pages and web applications
  5. A system used to store and organize data
  6. The process of bringing a new product or service to market
  7. The process of converting raw materials into finished goods
  8. A network of computers that allows users to share resources and information
  9. A type of software that provides security for a computer network
  10. The process of finding and fixing errors in code
  11. The total amount of money a company has made from its operations
  12. A type of software that translates computer code into machine-readable instructions
  13. The act of purchasing goods or services from another country
  14. A program that protects a computer from viruses and other malicious software

25 Clues: A person who starts and runs a businessA system used to store and organize dataA type of legal protection for creative worksA written agreement between two or more partiesThe process of finding and fixing errors in codeA software program that performs a specific taskThe act of buying or selling goods or services online...

AP Computer Science Review 2021-05-24

AP Computer Science Review crossword puzzle
Across
  1. manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation
  2. the use of a computer to represent the dynamic responses of one system by the behavior of another system modeled after it.
  3. a whole number
  4. a technique that attempts to trick a user into providing personal information
  5. data about data.
  6. software intended to damage a computing system or to take partial control over its operation
  7. a detailed yet readable description of what a computer program or algorithm must do.
  8. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
  9. the delay between a user's action and a web application's response to that action
  10. the process of decoding data.
  11. is the practice of obtaining input or information from a large number of people via the Internet.
  12. study of securing (or encrypting) information such that it is inaccessible by third parties.
Down
  1. transmission of data from one computer to another, or from one device to another.
  2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. the ability to limit access to information to a certain set of users.
  4. either true or false.
  5. a base-16 number system.
  6. the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
  7. the process of encoding data to prevent unauthorized access.
  8. a network of servers that track the IP addresses of different domain names like “example.com”
  9. a base-2 number system.

21 Clues: a whole numberdata about data.either true or false.a base-2 number system.a base-16 number system.the process of decoding data.the process of encoding data to prevent unauthorized access.the ability to limit access to information to a certain set of users.a technique that attempts to trick a user into providing personal information...

BRIANA & MATTHEW 2022-05-26

BRIANA & MATTHEW crossword puzzle
Across
  1. city where Briana’s first project as Construction PM was located
  2. Name of restaurant the couple went to on their first date (note: they ate in the car because they were running late to the movie)
  3. The ______: the nickname given to the house in which Matthew lived during his junior year of college
  4. name Matthew called Briana until they started dating
  5. winter sport Matthew helped to teach Briana
  6. TV show the couple has watched at least 7 times through
  7. City where the couple got engaged; beach town Briana visited with her dad during summers
  8. City in which Matthew lived at the time the couple adopted their eldest dog
  9. Briana’s nickname for Matthew
  10. acronym of the college Briana attended for undergraduate and Matthew attended for graduate
  11. college Matthew attended for his undergraduate degree
  12. city the couple first officially lived together
  13. Full name of the couple’s eldest dog
  14. city the couple currently live in
  15. matthew’s eye color
Down
  1. type of engineering Briana studied in college
  2. The couple’s favorite football team
  3. Sport Briana played in high school
  4. Matthew’s undergraduate degree was for _____ _____ engineering
  5. City in Arizona where both Briana and Matthew lived when they met
  6. name of the junior high school the couple attended together
  7. During college, Briana worked at this LA landmark as a research library and archives assistant
  8. State in which Matthew was born and lived until the family moved to Arizona
  9. mascot of the high school the couple attended together
  10. Sport Matthew played in high school and college
  11. Name of the couple’s youngest dog
  12. matthew’s favorite cuisine
  13. number of countries they have visited together (US not included)
  14. briana’s eye color

29 Clues: briana’s eye colormatthew’s eye colormatthew’s favorite cuisineBriana’s nickname for MatthewName of the couple’s youngest dogcity the couple currently live inSport Briana played in high schoolThe couple’s favorite football teamFull name of the couple’s eldest dogwinter sport Matthew helped to teach Briana...

Customer Service Week Crossword 2023-10-03

Customer Service Week Crossword crossword puzzle
Across
  1. Closing a _________ closes all the children.
  2. a holiday for us but not for financial institutions
  3. email address for notification intended for all employees
  4. __________ Expertise Efficiency. Every day. Every time.
  5. set your Non-Ready code to this 15 minutes prior to leaving to complete any end of day tasks.
  6. Teams channel for technical and non-technical information that everyone should be aware of
  7. actions you take to resolve an issue that should be documented in the ticket
  8. Not-Ready code to be used for time spent investigating an open ticket while the customer is not on the phone
  9. takes calls during non-staffed hours
  10. updates to major system outages should be sent at least _________
  11. The ________ Email Report Template is used to document suspicious emails reported by users.
  12. used for instant messaging
  13. ticket management tool used by the Support Center
Down
  1. _________ Downtime procedures should be followed for outages of any major system in the BEPC environment.
  2. the on-call contact should be notified off issues needing immediate attention even during _________ hours.
  3. An engineering contact during non-staffed hours
  4. call center front end used by Support Center to take calls
  5. considered a major system in the BEPC environment
  6. If it’s not in the _______, it didn’t happen.
  7. a problem with a major system impacting multiple users or departments
  8. required monthly cybersecurity training
  9. SysAid template to be used for any caller who reports to Jolene Johnson
  10. subject line tag for notifications that application or system has resumed normal operations
  11. “Done” is never an acceptable one.
  12. Send a ticket to ________ Support if no SA group exists for that software.

25 Clues: used for instant messaging“Done” is never an acceptable one.takes calls during non-staffed hoursrequired monthly cybersecurity trainingClosing a _________ closes all the children.If it’s not in the _______, it didn’t happen.An engineering contact during non-staffed hoursconsidered a major system in the BEPC environment...

hi 2022-09-28

hi crossword puzzle
Across
  1. A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
  2. A generic term encompassing decode and decipher
  3. Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
  4. Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
  5. The service provider for CrowdStrike's internal training courses
  6. The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
  7. Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
  8. CrowdStrike's CEO and co-founder; abbr
  9. The property of being accessible and usable upon demand
  10. Computer compromised with malicious code; used by a threat actor to perform remote commands
  11. Hosting city of Fal.Con; abbr
  12. Someone who uses a social network to create an account with a fake identity to deceive an individual
  13. Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  14. Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
  15. As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
  16. System of prevention and recovery from potential threats to a business; abbr
  17. As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
  18. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
  19. String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  20. An unauthorized user who attempts to or gains access to an information system
  21. Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
  22. CrowdStrike's annual cybersecurity convention; "___.Con"
  23. Software that compromises the operation of a system by performing an unauthorized function or process
  24. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
  25. Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
  26. A way to take advantage of a vulnerability in software
  27. A cybersecurity company
  28. The generic term encompassing encipher and encode
  29. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  30. The process of verifying the identity or other attributes of an entity
Down
  1. Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
  2. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
  3. A denial of service technique that uses numerous systems to perform the attack simultaneously
  4. A recognizable, distinguishing pattern; typically used to sign documents
  5. Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
  6. Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
  7. Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
  8. Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
  9. ___-Party Information
  10. Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
  11. A capability to limit network traffic between networks and/or information systems
  12. Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
  13. General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
  14. In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
  15. The process of transforming plaintext into ciphertext
  16. Type of analysis that determines what levels of impact to a system are tolerable; abbr
  17. Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
  18. The assurance that the confidentiality of, and access to, certain information about an entity is protected
  19. CrowdStrike threat hunting team
  20. Intranet webpage for all things CrowdStrike-related; abbr
  21. Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
  22. Cryptographic network protocol for operating network services securely over an unsecured network; abbr
  23. A dishonest scheme; a fraud
  24. CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
  25. Short form for "cryptography"
  26. When someone uses a social network to create an account with a fake identity to deceive a concrete person
  27. The process of transforming ciphertext into its original plaintext
  28. Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
  29. Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
  30. Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
  31. Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms

61 Clues: ___-Party InformationA cybersecurity companyA dishonest scheme; a fraudHosting city of Fal.Con; abbrShort form for "cryptography"CrowdStrike threat hunting teamCrowdStrike's CEO and co-founder; abbrA generic term encompassing decode and decipherThe generic term encompassing encipher and encodeThe process of transforming plaintext into ciphertext...

FITDVocabulary.lm 2013-05-15

FITDVocabulary.lm crossword puzzle
Across
  1. the way you behave online
  2. the design of a document
  3. things that your computer needs
  4. computer plug-ins
  5. selling of a company
  6. rtf
  7. LCD
  8. campaigning for a company
  9. a more modern version of power point
  10. doc.
  11. standards that a product must meet
  12. how secure you and your computer is while online
  13. a giant search engine
  14. ipad, cellphone
  15. a website with tips that help keep you safer while online
  16. what a president says when elected
  17. ISP
  18. an area where you plug in a cord to give you internet access
  19. a booklet representing a company
  20. a sign/symbol that represents a business
  21. credit for an author or writer
  22. a form you turn into a business
  23. where you put your CD's
  24. additional hardware for a computer (needed for gamers)
  25. an online flash drive
Down
  1. web
  2. LED
  3. the second smallest form of storage
  4. a device that gives out
  5. a computer's short term memory
  6. pdf
  7. where you plug in your headphones
  8. google
  9. wireless internet
  10. an internet hosting service that lets people and organizations have internet
  11. a tool that allows you to have access to the internet
  12. the smallest form of storage
  13. start up
  14. a device that gives in
  15. an option for a document's layout
  16. extra things for a computer
  17. VDU
  18. CPU
  19. word, pages
  20. "talking up" a company
  21. a service that is able to be downloaded for pleasure
  22. being safe online
  23. a patent on writing
  24. brain of the computer
  25. a catch phrase that helps you remember a business

50 Clues: webLEDpdfrtfLCDISPVDUCPUdoc.googlestart upword, pagesipad, cellphonecomputer plug-inswireless internetbeing safe onlinea patent on writingselling of a companya giant search enginebrain of the computeran online flash drivea device that gives in"talking up" a companya device that gives outwhere you put your CD'sthe design of a document...

RU ITEC411-Crime and Security 2022-10-16

RU ITEC411-Crime and Security crossword puzzle
Across
  1. gaining unauthorized access to data in a system or computer
  2. software that allow future access to a computer system by bypassing the normal layers of security.
  3. can infect computers but does not need to attach itself to a program and is designed to exploit specific system flaws.
  4. biological characteristics unique to an individual
  5. criminal activity that involves the use of a computer r a network
  6. person that uses their technical knowledge to break into a computer system or network by no standard means.
  7. irrelevant or inappropriate messages sent in bulk to recepients
  8. malware that can monitor or record victim's activities on a computer or mobile phone
  9. group of internet connected devices each of which runs one or more bots.
  10. use of computers or computer network techniques such as hacking to promote political agenda
  11. the assurance that private data will remain private
Down
  1. sending fraudulent text messages on purpose appearing to come from reputable and legit companies
  2. the assurance that data will not change without authorization
  3. malware that blocks access to data or threatens to publish it unless a ransom is paid.
  4. recording devices inside credit card readers to collect credit card numbers and PINs.
  5. converting information into secret code that hides the meaning of the information
  6. protection of computer systems and networks from information theft or hardware damage.
  7. the way in which thieves collect personal data by luring the victims to fake websites
  8. sending deceiving emails in order to obtain sensitive personal information from the victim
  9. malicious computer worm that targets a specific type of control system
  10. software designed intentionally to be intrusive and destructive to a computer or network
  11. software that attaches itself to other software and spreads when someone runs an infected program.

22 Clues: biological characteristics unique to an individualthe assurance that private data will remain privategaining unauthorized access to data in a system or computerthe assurance that data will not change without authorizationirrelevant or inappropriate messages sent in bulk to recepientscriminal activity that involves the use of a computer r a network...