cybersecurity Crossword Puzzles
Cybersecurity Awareness Month Crossword Puzzle 2021-10-01
Across
- When someone or a cyber-criminal take advantage of you by using information commonly available through social media, information sharing, or a conversation.
- Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
- Fake messages from a seemingly trusted or reputable source designed to convince you to reveal information, give unauthorized access to a system, commit financial transactions, or click on a link.
- A type of program used for automating tasks on the internet.
Down
- To properly secure systems, cellphones, tablets, computers, data, information, and passwords is to S____G_____ your device.
- Any software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.
- Happens when someone uses another person's name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- If not careful, giving up name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, or passwords can lead to loss of what?
- Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms.
9 Clues: A type of program used for automating tasks on the internet. • Malware designed to make data or hardware inaccessible to the victim until a ransom is paid. • Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms. • ...
Cybersecurity Week 2 2022-09-27
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems.
- A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state.
Down
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system.
- A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
5 Clues: A type of malicious software designed to block access to a computer system until a sum of money is paid. • A ____ firewall is also known as an access control list (ACL),it does not store information on the connection state. • A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system. • ...
Cybersecurity Week 4 2022-09-27
Across
- This is a popular network protocol analyzer, or an application that captures packets from a network connection.
- This is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
Down
- ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
- _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
- 95% of all firewalls fail due to this
5 Clues: 95% of all firewalls fail due to this • _____ scanning is a common technique hackers use to discover open doors or weak points in a network. • This is a popular network protocol analyzer, or an application that captures packets from a network connection. • ...
Cybersecurity Week 1 2022-09-27
Across
- A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
- ___ trust network access is a set of technologies and functionalities that enable secure access to internal applications and remote users
- A ___ access security broker is a security policy enforcement point positioned between enterprise users and ____ service providers.
Down
- Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
- A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic
5 Clues: A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic • A ___ access security broker is a security policy enforcement point positioned between enterprise users and ____ service providers. • ...
estelles's cybersecurity crossword 2021-02-12
5 Clues: you need to Verify • account to make sure noone can get in • when someone try's to trick you into giving your info • someone who got into your account with out permission • when YOU got into someones account with out permission
Cybersecurity Vocab Words 2021-12-14
Across
- an attack in which an attacker is positioned between two communicating parties in order to intercept and/or after data traveling between them
- an attack that exploits mathematical in encryption algorithms
- is an attack model for cryptanalysis where the attacker has access to both the plaintext
- a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
Down
- is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme
5 Clues: an attack that exploits mathematical in encryption algorithms • is an attack model for cryptanalysis where the attacker has access to both the plaintext • a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system • ...
Cybersecurity Crossword Puzzle 2023-08-03
Across
- The team that facilitates collaboration between red and blue teams
- A tool that monitors network traffic for potential security breaches
Down
- A team that simulates cyber attacks to find vulnerabilities
- The team responsible for defending against cyber threats
- The act of tricking individuals into revealing sensitive information
5 Clues: The team responsible for defending against cyber threats • A team that simulates cyber attacks to find vulnerabilities • The team that facilitates collaboration between red and blue teams • The act of tricking individuals into revealing sensitive information • A tool that monitors network traffic for potential security breaches
FIT-D 2013-05-15
Across
- monitor
- an internet host
- to restart or start up a computer
- responsibility online
- the presidents have to say it
- wireless internet
- National Center Super coming applications
- long term, main memory
- a saying or catchphrase on a company
- The act of promotion
- similar to modem
- a readable file
- light emitting diode
- location for cd in a laptop
- cord that gives you internet
- combines results from searchengines
- google, bing
- optical,mechanical
- cable is an example
- earphones, printer
- signals of info online
Down
- another word for internet
- plug in on the side of computer
- a symbol or picture for a company
- Blank sheet to draw,type on etc.
- 8 bits of info
- connection to other devices
- how you behave online
- stuff that goes into the computer, keyboard
- a booklet for advertisement
- plug-in for headphones
- more usb ports
- a item that is portable such as a phone
- 4g and 3g
- ipod, iphone, computer...hard
- short term memory
- central processing unit
- stuff that is downloadable....soft____
- easybib
- apps
- to protect your info online
- internet service provider
- "brain of computer"
- a sheet of paper that lists your life success
- a thing that allows you to make a symbol or words yours
- Largest storage available
- liquid crystal display
- a mark for a brand
- object on computer that you can save stuff to
49 Clues: apps • monitor • easybib • 4g and 3g • google, bing • 8 bits of info • more usb ports • a readable file • an internet host • similar to modem • wireless internet • short term memory • optical,mechanical • a mark for a brand • earphones, printer • "brain of computer" • cable is an example • The act of promotion • light emitting diode • how you behave online • responsibility online • plug-in for headphones • ...
Technology Crossword 2023-06-07
Across
- the most important processor in a given computer.
- a collection of discrete values that convey information.
- any software intentionally designed to cause disruption to a computer, server, client, or computer network
- a coding format for digital audio
- small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
- a method of representing data in a visual, machine-readable form.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- An American multinational technology company headquartered in Cupertino, California.
- a mapping from some domain (for example, a range of integers) to bits.
- is a bitmap image format
Down
- the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure.
- a mobile operating system primarily developed by Googl
- a proprietary audio/video interface for transmitting uncompressed video data.
- a form of computer memory that can be read and changed in any order
- a digital multimedia container format most commonly used to store video and audio
- a hardware or software component that stores data so that future requests for that data can be served faster.
- a method of transmitting and receiving messages using electronic devices.
- a representation of numbers using only two digits.
- a file format developed by Adobe in 1992 to present documents.
20 Clues: is a bitmap image format • a coding format for digital audio • the most important processor in a given computer. • a representation of numbers using only two digits. • a mobile operating system primarily developed by Googl • a collection of discrete values that convey information. • a file format developed by Adobe in 1992 to present documents. • ...
CodeCrissCross 2024-03-14
Across
- Collaborative approach to software development and IT operations aimed at automating and streamlining the software delivery process
- Security system that monitors and controls incoming and outgoing network traffic
- Device that forwards data packets between computer networks
- High-level programming language primarily used for adding interactivity to web pages, often employed in front-end development alongside HTML and CSS
- Remote storage and computing services accessed over the internet
- uidelines that provide a foundation for developing software applications
- Flexible software development methodology emphasizing collaboration and adaptability
- The specific rules and structure governing the composition of statements in a programming language, often encountered when writing 'Hello, World!' programs
- Process of replacing manual tasks with computer-controlled systems
- Subset of artificial intelligence that enables computers to learn and improve from experience without being explicitly programmed
Down
- Practices and technologies designed to protect computer systems and data from unauthorized access, theft, or damage
- Multinational technology corporation known for developing software products such as Windows operating system, Microsoft Office suite, and Azure cloud services
- Technology that allows multiple operating systems or applications to run on a single physical server
- Large volumes of structured and unstructured data that require advanced processing techniques for analysis
- Detailed procedure or set of conditions to be followed for testing a specific aspect
- Collection of interconnected devices
- Programs and applications used to operate computers and perform specific tasks
- Structured collection of data stored electronically
- Simulation of human intelligence processes by computer systems
- Process of finding and fixing errors or bugs in software code
20 Clues: Collection of interconnected devices • Structured collection of data stored electronically • Device that forwards data packets between computer networks • Process of finding and fixing errors or bugs in software code • Simulation of human intelligence processes by computer systems • Remote storage and computing services accessed over the internet • ...
POLS Crossword Puzzle 2024-10-05
Across
- Actors are compelled to select outcomes that benefit one party while negatively affecting another.
- When two or more actors implement policies that improve well-being of at least one more actor without affecting any other.
- The personality, perceptions, choices, and activities of individual decision-makers and individual participants provide an explanation.
- States will build international relations around international law and institutions.
- Premeditated threat or use of violence against noncombatant targets by individuals or groups to obtain a political or social objective.
Down
- States try to influence the behavior of other actors by bargaining, negotiating, taking a specific action or refraining from such an action.
- The withdrawal of customary trade and financial relations for foreign - and security-policy purposes.
- An assemblage of units, object, or parts united by some form of regular interaction.
- Focuses on the international character of states as the most important feature of international relations.
- Art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality.
- Struggle for power, war is inevitable, bargaining and coercion, where cooperation is rare.
- An armed conflict that occurs between organized actors within a state and and that meets some minimum threshold for severity.
12 Clues: An assemblage of units, object, or parts united by some form of regular interaction. • States will build international relations around international law and institutions. • Struggle for power, war is inevitable, bargaining and coercion, where cooperation is rare. • ...
TechSphere Crossword puzzle 2024-01-29
Across
- Process of encoding information to make it secure.
- Study and practice of techniques for secure communication in the presence of third parties.
- Authentication techniques based on unique biological characteristics such as fingerprints or retinal scans.
- Practice of protecting systems, networks, and programs from digital attacks.
- Secret code used to gain access to a computer, network, or service.
- Malicious software that encrypts files and demands payment for their release.
- Process of confirming the truth of an attribute of a single piece of data.
- Software update designed to fix problems with, or improve a computer program or its supporting data.
- Malicious software that replicates itself and spreads to other computers.
Down
- Incident where sensitive, protected, or confidential information is accessed or disclosed without authorization.
- Weakness in a system's defenses that can be exploited by a threat.
- Network of private computers infected with malicious software and controlled as a group.
- Person who uses technical knowledge to gain unauthorized access to computer systems.
- Security system designed to prevent unauthorized access to or from a private network.
- Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
- Malicious software disguised as legitimate software.
- Software intended to damage or disable computers and computer systems.
- Software designed to detect and remove computer viruses and other malicious software.
- Attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
- Secure network connection that allows users to access the internet privately.
- Interconnected group of computers and other devices capable of exchanging data.
- Unsolicited or undesired electronic messages, typically advertising.
22 Clues: Process of encoding information to make it secure. • Malicious software disguised as legitimate software. • Weakness in a system's defenses that can be exploited by a threat. • Secret code used to gain access to a computer, network, or service. • Unsolicited or undesired electronic messages, typically advertising. • ...
Tech Puzzle 2023-03-02
Across
- What protects your computer from hackers?
- What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
- What is a document sent with with an email message called?
- An interrupt triggered by a software.
- A chatbot developed by openAI and launched in November 2022
- What technology was used in avengers end game?
- Which technology is used in Brahmastra movie?
- What is temporarily stored on your computer?
- A software program that allows you to surf the web.
- ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- Visual display unit is also called _____________
- An incredibly powerful tool used to get meaning out of vast amounts of data
Down
- Primary memory is also known as _______ memory.
- The initial program that runs when a computer is powered up or rebooted.
- _______ is the way of sending messages over the Internet.
- Smallest unit of measurement in computing
- What is the #1 social media app?
- _________ protects your computer from viruses and hackers
- Give one example of a game that used unity and C#
- ________________ hyperlink is a saved link to a particular web page.
- Protection of computer system and information from harm theft and unauthorised use.
- _______________ reality is the integration of digital information with live video.
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- _______is considered as one of the universal gates.
- The primary component of a computer that acts as its “control center.”
25 Clues: What is the #1 social media app? • An interrupt triggered by a software. • What protects your computer from hackers? • Smallest unit of measurement in computing • What is temporarily stored on your computer? • Which technology is used in Brahmastra movie? • What technology was used in avengers end game? • Primary memory is also known as _______ memory. • ...
Tech Puzzle 2023-03-02
Across
- What protects your computer from hackers?
- What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
- What is a document sent with with an email message called?
- An interrupt triggered by a software.
- A chatbot developed by openAI and launched in November 2022
- What technology was used in avengers end game?
- Which technology is used in Brahmastra movie?
- What is temporarily stored on your computer?
- A software program that allows you to surf the web.
- ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- Visual display unit is also called _____________
- An incredibly powerful tool used to get meaning out of vast amounts of data
Down
- Primary memory is also known as _______ memory.
- The initial program that runs when a computer is powered up or rebooted.
- _______ is the way of sending messages over the Internet.
- Smallest unit of measurement in computing
- What is the #1 social media app?
- _________ protects your computer from viruses and hackers
- Give one example of a game that used unity and C#
- ________________ hyperlink is a saved link to a particular web page.
- Protection of computer system and information from harm theft and unauthorised use.
- _______________ reality is the integration of digital information with live video.
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- _______is considered as one of the universal gates.
- The primary component of a computer that acts as its “control center.”
25 Clues: What is the #1 social media app? • An interrupt triggered by a software. • What protects your computer from hackers? • Smallest unit of measurement in computing • What is temporarily stored on your computer? • Which technology is used in Brahmastra movie? • What technology was used in avengers end game? • Primary memory is also known as _______ memory. • ...
Network and Security 2024-07-24
Across
- A secret word or phrase that is used to access a computer system or service.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Code that is embedded into the hardware of a computer.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- programs that automatically execute tasks as ordered by creator
- form of cryptocurrency
- Stands for the National Security Agency
- The method of obtaining user information through fraudulent communications targeted directly at people.
- two words. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior
- Text that can be read by the human eye
- creating a fake identity on social network account
- A weakness in a computer system or network that can be exploited by attackers.
- any action that makes a computer system vulnerable
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
- Customizable additions to software for extra functionality
- an error, flaw, failure, or fault
20 Clues: form of cryptocurrency • an error, flaw, failure, or fault • Text that can be read by the human eye • Stands for the National Security Agency • creating a fake identity on social network account • any action that makes a computer system vulnerable • Code that is embedded into the hardware of a computer. • Customizable additions to software for extra functionality • ...
Online Safety Word Bank 2021-06-03
Across
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this (paragraph 4)
- these are the usernames or passwords you use to access a website (paragraph 6)
- these fake sites imitate official ones with the intent to collect your personal information (paragraph 6)
- a software designed to detect or destroy viruses (paragraph 9)
- it is the address of a specific webpage or file on the internet (paragraph 6)
- the information processed and stored by electronic devices (paragraph 2)
Down
- people who commit crimes by means of computers or the internet (paragraph 6)
- the deceitful practice of sending emails pretending to be from legitimate companies for you to reveal personal information, such as passwords and credit card numbers (paragraph 8)
- a software designed to stop the normal functioning of computers (paragraph 7)
- it contains a group of computers that can be accessed and administered with a common set of rules defined a by a company or institution (paragraph 4)
- it is a form of security that allows or blocks traffic based on a set of security rules (paragraph 3)
- a digital replication of something real (paragraph 2)
12 Clues: a digital replication of something real (paragraph 2) • a software designed to detect or destroy viruses (paragraph 9) • the information processed and stored by electronic devices (paragraph 2) • people who commit crimes by means of computers or the internet (paragraph 6) • a software designed to stop the normal functioning of computers (paragraph 7) • ...
Network security 2022-07-18
Across
- type of malicious code or software that looks legitimate but can take control of your computer
- an online scam similar to phishing, where a website's traffic is manipulated, and confidential information is stolen.
- Groups of criminals who unite to carry out cyber attacks in support of political causes.
- Also known as “white hats,” ethical hackers are security experts that perform these security assessments
- type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
- The practice of protecting systems, networks, and programs from digital attacks
Down
- “Flags” are secrets purposely placed by companies or hackers. Planting the flag itself refers to placing these flags
- the practice of using a software program or hardware device (keylogger ) to record all keystrokes on a computer keyboard, either overtly as a surveillance tool or covertly as spyware
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- malware that employs encryption to hold a victim's information at ransom
- any program or file that is intentionally harmful to a computer, network or server.
- A person who breaks into a computer system
12 Clues: A person who breaks into a computer system • malware that employs encryption to hold a victim's information at ransom • The practice of protecting systems, networks, and programs from digital attacks • any program or file that is intentionally harmful to a computer, network or server. • ...
Cybersecurity Fundamental Chapter 3 Part 3 2022-10-19
Across
- occurs when data goes beyond the limits.
- access point install on a secure network without explicit authorization.
- pieces of software install by users to provide extended capabilities
- security protocol that attempted to provide a wireless local area network with the same level of security as a wired lan.
- attacker copies the victim's information from his/her devices
- attacker send authorized messages to another bluetooth device
- one way to store data at the website is to use a database.
Down
- vulnerability found in web applications.
- allow cybercriminals to execute malicious code and take control of a system with privileges of the user running the application remotely.
- wireless signals are susceptible to electromagnetic interfaces
- operate through an interpreter, the JVM.
- susceptible to attack and an attacker cannot recover the key by observing the traffic.
12 Clues: vulnerability found in web applications. • occurs when data goes beyond the limits. • operate through an interpreter, the JVM. • one way to store data at the website is to use a database. • attacker copies the victim's information from his/her devices • attacker send authorized messages to another bluetooth device • ...
27 2024-01-08
Across
- Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device. (Note: Repeated for variety.)
- Artificially manipulated media that may depict events that never occurred or present fictionalized versions of real events.
- The use of largely automatic equipment in a system of operation. (Note: Repeated for variety.)
- The activity of exploiting genetic material experimentally without regard to ethical considerations. (Note: Repeated for variety.)
- The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
Down
- A virtual reality space where users can interact with a computer-generated environment.
- The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
- Economy A labor market characterized by the prevalence of short-term, flexible jobs.
- A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
- Physical or emotional exhaustion, often due to prolonged stress or overwork.
- Tech Technology designed to enhance the relationship between citizens and government.
- Literacy The ability to use and understand digital technologies, communication tools, and networks.
12 Clues: Physical or emotional exhaustion, often due to prolonged stress or overwork. • Economy A labor market characterized by the prevalence of short-term, flexible jobs. • Tech Technology designed to enhance the relationship between citizens and government. • A virtual reality space where users can interact with a computer-generated environment. • ...
Principles of IT Terms 2023-08-23
Across
- components of a computer system, such as the central processing unit (CPU), memory, storage devices, and input/output devices.
- process of converting data into a code to prevent unauthorized access.
- Computing/Storing and accessing data and programs over the internet rather than on local computers.
- Technology/The use of computers, networks, software, and other technologies to manage and process information.
- structured collection of data that can be easily accessed, managed, and updated.
- Experience (UX):** The overall experience and satisfaction that a user has while interacting with a product or system.
- Interface (UI):** The visual and interactive elements that allow users to interact with software or hardware.
- and selling goods and services over the internet.
Down
- and applications that run on computer hardware to perform specific tasks.
- and fixing errors or bugs in software code.
- collection of connected devices and communication pathways that allow them to share resources and information.
- instructions in a programming language to create software applications or automate tasks.
- System/Software that manages computer hardware and provides services for other software applications.
- standard language for creating web pages and web applications.
- and measures to protect computer systems, networks, and data from cyber threats.
- Citizenship/The responsible and ethical use of technology, including online behavior, digital etiquette, and privacy considerations.
- Analytics/The process of examining and interpreting data to gain insights and make informed decisions.
- step-by-step procedure or formula for solving a problem or completing a task.
18 Clues: and fixing errors or bugs in software code. • and selling goods and services over the internet. • standard language for creating web pages and web applications. • process of converting data into a code to prevent unauthorized access. • and applications that run on computer hardware to perform specific tasks. • ...
Compliance & Security Week 2023-11-16
Across
- It's like your underwear; don't share it with anyone and change it at least every 90 days
- Nasty software that can have a bad impact on your device or network
- What is HIPAA's (and DDID's) minimum training requirement for employees
- Unwanted emails or messages that usually try to sell you something
- What department (or Shane) should you report a suspected HIPAA breach to
- Universal Serial Bus, or a flash drive that you should never stick in a work computer
- What HIPAA rule protects individual rights
- A type of malicious software designed to block access until a sum of money is paid
Down
- Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
- The Health Act passed to protect individual's medical/dental records and other PHI
- A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
- Every aspect of protecting an organization and its employees/assets against cyber threats
- How should you send an email to outside recipients that contains PHI
- What is the acronym that identifies individual's information such as name, birthdate, and SSN
- The additional ways DDID uses to stop hackers getting into our system, even if they know your password
- An email that tricks you into clicking on a link or opening an attachment
- Using a device to gain unauthorized access to data in a system
17 Clues: What HIPAA rule protects individual rights • Using a device to gain unauthorized access to data in a system • Unwanted emails or messages that usually try to sell you something • Nasty software that can have a bad impact on your device or network • How should you send an email to outside recipients that contains PHI • ...
Trends 2021 2021-01-11
Across
- Acronym for the current industry revolution.
- Term referring to new way for employees, starting with the acronym WFH
- Increasing cry amongst internet and social media users to protect their data _______.
- South Africa will receive 1 million doses of this from India at the end of January to combat Covid 19
- Customers continue to have high service expectations and have become smarter and more impatient. Companies must deliver on this (hint Cx)
- One of the larger international streaming partners available in South Africa
- A new standard currently being deployed in Radio Access Networks to reduce vendor lock in.
- A constant state of the unknown making it difficult to predict the future. Opposite of certainty.
- AWS, Google, Microsoft all offer this service where everything is hosted in the ______
- What comes after 4G? Vodacom and MTN launched it in 2020.
Down
- Umbrella tech term top of the IT agenda to ensure integrity and safety of network
- A freemium video and conferencing based tool which exploded in growth and subscriptions in 2020
- Two common words for new age term for machine learning often shortened to two letters
- Something most people make up in the beginning of January, but most broken later in the year
- New technology trend which is “smart” and happening closer to the source or locality (hint on the "----" of my seat)
15 Clues: Acronym for the current industry revolution. • What comes after 4G? Vodacom and MTN launched it in 2020. • Term referring to new way for employees, starting with the acronym WFH • One of the larger international streaming partners available in South Africa • Umbrella tech term top of the IT agenda to ensure integrity and safety of network • ...
Puzzle No. 2 2022-09-06
Across
- A string of characters used to verify the identity of a user during the authentication process.
- A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
- Ensuring that authorized users have access to information and associated assets when required.
- Sentence-like format of password which is strong but easier to remember.
- Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
- You should not write down your password in this type of physical medium.
Down
- A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
- Ensuring that information is accessible only to those authorized to have access.
- Safeguarding the accuracy and completeness of information.
- Complete the sentence: ________ is everyone’s responsibility.
- A weakness in your security policy, implementation, design, and controls.
- These fix general software problems and provide new security patches where criminals might get in.
- A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
- An event that will cause harm to you or your asset.
- Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
15 Clues: An event that will cause harm to you or your asset. • Safeguarding the accuracy and completeness of information. • Complete the sentence: ________ is everyone’s responsibility. • Sentence-like format of password which is strong but easier to remember. • You should not write down your password in this type of physical medium. • ...
The hardest crossword puzzle EVERRR 2022-11-16
Across
- Someone fraudulently trying to gain access to an unauthorized system.
- Any security practice put in place to mitigate a security event or incident from occurring.
- Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
- Most useful tool in cybersecurity, pretty much.
- The practice of utilizing trial and error to guess credentials.
- Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
- Copies of data
- A condiment
- describes a minor disruption to the digital landscape that is thought to be unintentional
Down
- A data file through which the identity, authenticity and reliability of a website or web application is established.
- Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
- A possibility of being attacked or harmed
- responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
- A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.
15 Clues: A condiment • Copies of data • A possibility of being attacked or harmed • Most useful tool in cybersecurity, pretty much. • The practice of utilizing trial and error to guess credentials. • Someone fraudulently trying to gain access to an unauthorized system. • Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of? • ...
Privacy Cross Word 2024-01-12
Across
- A state of being in solitude or separated from the environment or society, commonly used in contexts like quarantine or solitary confinement.
- The action of making new or secret information known, especially in legal or corporate settings.
- An act of breaking or failing to observe a law, agreement, or code of conduct, often referring to security systems.
Down
- Unsolicited and typically irrelevant or inappropriate messages sent over the Internet, usually to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
- The quality of being able to be used or obtained;
- A secret word or phrase that must be used to gain admission to something, typically a cornerstone of digital security.
- An instance of intruding, especially illegally or without permission, into a system or place, often in the context of privacy or cybersecurity.
7 Clues: The quality of being able to be used or obtained; • The action of making new or secret information known, especially in legal or corporate settings. • An act of breaking or failing to observe a law, agreement, or code of conduct, often referring to security systems. • ...
Financial Risk Management 2024-07-15
Across
- risk -, demonstrating how commodity price volatility can impact the global economy.
- risk -can enhance resilience through redundant systems
- Risk -proactive legal compliance measures.
- Risk -This can lead to forced selling at unfavourable prices, potentially triggering margin calls
- Risk -This contributed to the crisis by forcing banks to sell assets at fire-sale prices
- Risk -Companies can mitigate this through regular safety inspections
- risk - The investor may have to accept a significant price discount or spread their sales
- Risk -This could lead to increased loan defaults, requiring higher loan loss provisions and potentially impacting the bank's capital adequacy and profitability
- Risk -highlighting the importance of understanding creditor priorities.
- Risk -This can lead to ETF prices deviating from their underlying asset values, potentially causing losses
- rate risk -This risk affects longer-duration bonds more severely than shorter-duration bonds
Down
- risk-To mitigate this, institutions can implement robust cybersecurity
- risk - Investors can mitigate this through diversification, hedging strategies, and maintaining a long-term investment horizon.
- Risk -The higher yields compensate investors for the increased risk of default associated with these lower-rated bonds.
- Risk -The bank could manage this through careful due diligence, ongoing monitoring, securing collateral, and potentially syndicating the loan
- Risk -potentially forcing some investors to sell and causing bond prices to fall.
- risk-This highlights how currency fluctuations can impact international investments.
- Risk -This can force the REIT to seek alternative funding sources, potentially at higher costs
- risk-This risk affects the entire market and is difficult to diversify away, as it impacts all sectors
- risk-. Banks can implement strict compliance procedures to mitigate the risk
20 Clues: Risk -proactive legal compliance measures. • risk -can enhance resilience through redundant systems • Risk -Companies can mitigate this through regular safety inspections • risk-To mitigate this, institutions can implement robust cybersecurity • Risk -highlighting the importance of understanding creditor priorities. • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- Contain tracking information for an individual email
- Fraud like Phishing, but it comes as a text message or SMS
- It is a deceptive scheme or trick used to cheat someone out of something
- It is merely an email trying to convince you to do something
- It is a phone scam designed to get your personal information by impersonating
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- Threat that involves sending email messages with a fake sender address
- It is just like Phishing but it only targets specific individuals within an organization
Down
- It is news or knowledge received or given
- Help protect computer systems against cyber-attacks or unauthorized access
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- It is a type of email attack where bad people are trying to steal your precious information
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- Unsolicited bulk messages normally from people trying to sell something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: It is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • ...
Unit 6 Vocab Crossword 2021-09-28
Across
- offensive maneuver that targets computer information systems, computer networks, infrastructures
- the practice of protecting critical systems and sensitive information from digital attacks
- is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization
- are criminals who break into computer networks with malicious intent.
- slang term used to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems
- the use of computer-based technique such as hacking as a form of civil disobedience
- a relatively unskilled individual who uses scripts or programs
- prevents someone watching your connection from knowing what websites you visit
- parts of the World Wide Web whose contents are not indexed by standard web search-engines.
- is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle
Down
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- allows developers to discover and resolve bugs before the general public is aware of such bug
- a path or means by which an attacker or hacker can gain access to a computer or network server
- the gaining of unauthorized access to data in a system or computer.
- open-source software for enabling anonymous communication.
15 Clues: open-source software for enabling anonymous communication. • a relatively unskilled individual who uses scripts or programs • the gaining of unauthorized access to data in a system or computer. • are criminals who break into computer networks with malicious intent. • prevents someone watching your connection from knowing what websites you visit • ...
ICT 2019-11-25
Across
- A letter or note that you can send electronically
- You may request one of these if you wish to know that your e-mail has arrived safely
- The software application used to store all of the records of crimes and victims
- The person who the e-mail is from
- An e-mail can transmit one of these in an attachment
- Devices such as mobile phones, laptops, personal computers (PCs), printers, digital cameras, and video game consoles, can connect to each other and exchange information using Bluetooth protocol for wireless communication. Bluetooth can only be used for relatively short distances (a few metres).
- Acronym for the Police National Computer
- MSN is a method of ....-time communication
Down
- This type of junk e-mail is now becoming a major problem
- In order to send an e-mail, a person needs to have their own e-mail .......
- This type of conference enables people to see and hear one another
- This enables two people to hold a conversation
- An illicit attempt to trick individuals into handing over personal, confidential information.
- Important for cybersecurity, a Firewall is a hardware- or software-based system used as an interface between the internet and a (home or corporate) computer system, that monitors and filters incoming and outgoing traffic and block malware attacks.
- A paper based method of communication
15 Clues: The person who the e-mail is from • A paper based method of communication • Acronym for the Police National Computer • MSN is a method of ....-time communication • This enables two people to hold a conversation • A letter or note that you can send electronically • An e-mail can transmit one of these in an attachment • ...
iACE Crossword Puzzle 3 2021-11-09
Across
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
- An official inspection of an individual’s or organization’s accounts.
Down
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Unacceptable or improper behaviour, especially by an employee or professional person.
- Wrongful or criminal deception intended to result in financial or personal gain.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain. • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
Dampak Sosial Informatika 2024-05-16
Across
- Istilah yang mengacu pada upaya untuk melindungi komputer, jaringan, dan data dari serangan, kerusakan, atau akses yang tidak sah.
- Praktik membagi informasi pribadi atau rahasia secara tidak sah atau tidak etis di internet.
- of information Fenomena di mana informasi yang diposting online dapat bertahan selama periode yang lama dan memiliki dampak jangka panjang pada individu atau kelompok.
- misconduct Istilah untuk perilaku tidak pantas atau tidak etis di internet, seperti pelecehan atau penipuan online.
- Kejahatan yang melibatkan penggunaan teknologi informasi, seperti pencurian identitas dan penipuan online.
- divide Istilah untuk kesenjangan antara individu atau kelompok yang memiliki akses dan keterampilan teknologi informasi dan yang tidak memiliki akses atau keterampilan tersebut.
Down
- addiction Fenomena di mana seseorang menghabiskan terlalu banyak waktu di internet, mengakibatkan kurangnya interaksi sosial di dunia nyata.
- Istilah yang mengacu pada upaya untuk melindungi komputer, jaringan, dan data dari serangan, kerusakan, atau akses yang tidak sah.
- Penggunaan teknologi informasi untuk menyebarkan informasi yang bersifat memprovokasi, menyesatkan, atau menipu untuk tujuan tertentu.
- social interaction Istilah yang mengacu pada interaksi sosial melalui platform atau aplikasi digital, seperti media sosial atau pesan instan.
10 Clues: Praktik membagi informasi pribadi atau rahasia secara tidak sah atau tidak etis di internet. • Kejahatan yang melibatkan penggunaan teknologi informasi, seperti pencurian identitas dan penipuan online. • misconduct Istilah untuk perilaku tidak pantas atau tidak etis di internet, seperti pelecehan atau penipuan online. • ...
The IoT - Crossword 2021-04-19
Across
- an event that makes it very difficult or changes the way things or a system usually works.
- things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
Down
- the part of a car that contains some of the controls used for driving and the devices for measuring speed and distance
- to make a process in a factory or office operate by machines or computers, in order to reduce the amount of work done by humans and the time taken to do the work
- a subject or problem that people are thinking and talking about
- someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
- an object or machine that has been invented for a particular purpose
- having the abilities needed to do an activity or job well
8 Clues: having the abilities needed to do an activity or job well • a subject or problem that people are thinking and talking about • an object or machine that has been invented for a particular purpose • an event that makes it very difficult or changes the way things or a system usually works. • ...
iACE Crossword Puzzle 3 2021-11-09
Across
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
- An official inspection of an individual’s or organization’s accounts.
Down
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Unacceptable or improper behaviour, especially by an employee or professional person.
- Wrongful or criminal deception intended to result in financial or personal gain.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain. • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
IT_KD 2023-12-04
Across
- A networking device that directs data traffic between different computer networks.
- A high-level programming language known for its readability and versatility.
- The process of identifying and fixing errors or bugs in software code.
- A widely-used programming language that adds interactivity and dynamic content to web pages.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A structured collection of data organized for efficient retrieval, storage, and management, typically using tables and relationships.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- The delivery of computing services, including storage, processing power, and software, over the internet.
- The standard markup language for creating web pages and web applications.
- A set of rules and tools for building software applications, enabling them to communicate with each other.
- A step-by-step set of instructions or rules to solve a specific problem or perform a particular task.
- A computer or system that provides resources, services, or data to other computers, known as clients, in a network.
- The process of converting information into a code to secure it from unauthorized access or use.
- A pre-built structure or set of tools that provides a foundation for software development, making it easier to create and manage applications.
- Any software intentionally designed to harm or exploit computer systems, including viruses, worms, and ransomware.
15 Clues: The process of identifying and fixing errors or bugs in software code. • The standard markup language for creating web pages and web applications. • A high-level programming language known for its readability and versatility. • A networking device that directs data traffic between different computer networks. • ...
Technology Terminologies 2023-04-28
Across
- The process of designing, writing, testing, and maintaining computer programs.
- A programming language used to create interactive web pages and web applications.
- The process of encoding data in a way that can only be accessed by authorized parties.
- The process of creating a virtual version of something, such as a computer system or network.
- A set of instructions written in a programming language that a computer can execute.
- A programming language used to manage and manipulate relational databases.
- A collection of data that can be accessed, managed, and updated by a computer.
- The language used to create web pages and define their structure and content.
- A step-by-step process for solving a problem or completing a task.
Down
- The practice of protecting computer systems and networks from digital attacks, theft, and damage.
- A group of interconnected devices and computers that can communicate and share resources.
- The practice of securing communication and data through techniques such as encryption and decryption.
- The part of a website or application that the user interacts with directly.
- A collection of programs and data that perform a specific task or set of tasks on a computer.
- Data that describes other data, such as information about a file's format, size, or author.
- A set of practices that combines software development and IT operations to streamline software delivery.
- A security system that monitors and controls incoming and outgoing network traffic.
- The latest version of HTML, used to create modern web pages and applications.
- Refers to the design and user experience of software or applications.
19 Clues: A step-by-step process for solving a problem or completing a task. • Refers to the design and user experience of software or applications. • A programming language used to manage and manipulate relational databases. • The part of a website or application that the user interacts with directly. • ...
Technology 2021-03-23
Across
- circulated rapidly and widely from one internet user to another.
- use of social media to stay connected with friends, family etc.. (two words)
- software application for accessing the World Wide Web (2 words)
- protecting computer systems and networks from information disclosure, theft of, or damage to hardware or software.
- 3-D image formed by the interference of light beams from a laser or other light source.
- communication over a distance by cable, telegraph, telephone, or broadcasting.
- computer program made to simulate conversation with human users over the internet
- a detection system that uses radio waves to determine the range, angle, or velocity of objects.
- sports competition using video games
- aircraft without a human pilot on board.
Down
- simulation of human intelligence in machines programmed to think like humans and mimic their action (2 words)
- a computer based technology which allows the sharing of ideas, thoughts, and information through virtual networks and communities.(2 words)
- easy to use or understand.
- amplifying device which fits on the ear, worn by a partially deaf person.(2 words)
- a digital currency that can be used to buy goods and services
- a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation.
- home setup where appliances can be controlled remotely from anywhere with an internet connection using a mobile or other networked device. (2 words)
- a person who fears, dislikes, or avoids new technology.
- outdated computer hardware, software, technology, services or practices that are no longer used
19 Clues: easy to use or understand. • sports competition using video games • aircraft without a human pilot on board. • a person who fears, dislikes, or avoids new technology. • a digital currency that can be used to buy goods and services • software application for accessing the World Wide Web (2 words) • circulated rapidly and widely from one internet user to another. • ...
How E-Marketplaces Work 2024-01-05
Across
- Indirect taxation on the consumption of goods and services, applicable to certain transactions on e-marketplaces.
- Guidelines and rules established by e-marketplaces to regulate user behavior, transactions, and overall platform usage.
- Software that allows different applications to communicate and share data on e-marketplaces.
- An online platform facilitating the exchange of goods and services between buyers and sellers.
- Marketing efforts aimed at increasing visibility and sales, often involving discounts, offers, and special deals on e-marketplaces.
- Measures to protect e-marketplaces from online threats, ensuring safe transactions and user data.
- The transportation of products from sellers to buyers, including the methods, costs, and delivery times on e-marketplaces.
Down
- The process of buying or selling within an e-marketplace, involving payment and product/service delivery.
- The management of the movement of goods, including shipping, tracking, and delivery in e-marketplaces.
- Charges imposed by e-marketplaces on sellers for using their platform, often including listing fees, transaction fees, and subscription fees.
- The process by which customers can send back products they are dissatisfied with or that are damaged on e-marketplaces.
- A personal or business profile on an e-marketplace, enabling users to manage transactions, listings, and preferences.
- Refers to products classified as hazardous materials, with specific regulations and restrictions for shipping on e-marketplaces.
13 Clues: Software that allows different applications to communicate and share data on e-marketplaces. • An online platform facilitating the exchange of goods and services between buyers and sellers. • Measures to protect e-marketplaces from online threats, ensuring safe transactions and user data. • ...
Crossword 3 2024-07-25
Across
- A type of cybersecurity analysis that focuses on the likelihood and potential impact of risks.
- A type of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
- A security concept that ensures that data is only accessible to those with authorized access.
- A type of software that is specifically designed to detect, stop, and remove viruses and other kinds of malicious software.
- A security protocol that ensures privacy between communicating applications and their users on the internet.
- A type of firewall that filters traffic between a trusted and an untrusted network.
- A type of security audit that evaluates the security of a system or network by simulating an attack from a malicious source.
Down
- A security measure that involves hiding internal IP addresses.
- A method used to verify the integrity and authenticity of a message, software, or digital document.
- A security model that enforces strict access controls and compartmentalization.
- A set of rules that govern the actions computers take to secure data and is often used in conjunction with firewalls.
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- A type of security threat that is disguised as legitimate software.
13 Clues: A security measure that involves hiding internal IP addresses. • A type of security threat that is disguised as legitimate software. • A security model that enforces strict access controls and compartmentalization. • A type of firewall that filters traffic between a trusted and an untrusted network. • ...
iACE Crossword Puzzle 3 2021-11-08
Across
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- An official inspection of an individual’s or organization’s accounts.
- ________risk refer to the risk of fraudulent activities committed by internal and/or external parties.
Down
- Unacceptable or improper behaviour, especially by an employee or professional person.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- Wrongful or criminal deception intended to result in financial or personal gain
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
CSA CROSSWORD #1 2022-01-07
Across
- industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency
- form of cloud computing that provides virtualized computing resources over the internet.
- cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers
- a free, publicly accessible registry in which cloud service providers (CSPs) can publish their CSA-related assessments
- This credential leverages CSA’s cloud expertise and ISACA’s traditional audit expertise, combining our know-how and expertise to develop and deliver the best possible solution for cloud auditing education
Down
- cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
- Centre of expertise for cyber security in Europe
- widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud
- way of delivering applications over the Internet.Instead of installing and maintaining software, you simply access it via the Internet, freeing yourself from complex software and hardware management.
- cybersecurity control framework for cloud computing
10 Clues: Centre of expertise for cyber security in Europe • cybersecurity control framework for cloud computing • form of cloud computing that provides virtualized computing resources over the internet. • cloud computing model where a third-party provider delivers hardware and software tools to users over the internet • ...
October's Blackink Crossword 2024-09-24
Across
- network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- process of converting information or data into a code to prevent unauthorized access.
- type of malicious software designed to block access to a computer system until a sum of money is paid.
- maximum rate of data transfer across a given path, measured in bits per second (bps).
- method of grouping data that is transmitted over a digital network into packets, which are then sent independently and reassembled at the destination.
- A service that encrypts your internet traffic and protects your online identity by creating a private network from a public internet connection.
- A cybersecurity technology that monitors end-user devices to detect and respond to cyber threats.
Down
- A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
- delay before a transfer of data begins following an instruction for its transfer, often measured in milliseconds (ms).
- A method of trying to gather personal information using deceptive e-mails and websites.
10 Clues: process of converting information or data into a code to prevent unauthorized access. • maximum rate of data transfer across a given path, measured in bits per second (bps). • A method of trying to gather personal information using deceptive e-mails and websites. • ...
Cyber Law 2021-09-04
Across
- It refers to the technologies, process and practices designed to protect networks, devices, app and data from any kind of cyber attack.
- regulatory arbitrage in Cyberspace (that is applying to the Internet) is a focal point for two opposing schools of thought, the Cyberlibertarians and
- 'citizen of the internet' can be called__
- which communication is a permanent telephone connection between two points set up by a telecommunication common carrier
- It refers to the adoption or increase in use of computer technology by an organization,Industry etc.
Down
- It can be thought of as a global electronic village with instantaneous communication and no geographical barriers
- The essence of this approach is that cyberspace is a distinct new space and that it can (or should) not be regulated by the state.
- you have your computer, you really don't need much additional hardware to connect to the internet. The primary piece of hardware you need is a
- it allows perfect freedom of expression, which in the physical world has been tempered by even the most liberal of regime
- It is a conversion of data,document and processes from analog to digital
10 Clues: 'citizen of the internet' can be called__ • It is a conversion of data,document and processes from analog to digital • It refers to the adoption or increase in use of computer technology by an organization,Industry etc. • It can be thought of as a global electronic village with instantaneous communication and no geographical barriers • ...
Puzzle - 3 2022-10-10
Across
- The core of a computer's operating system that houses the most essential functions of the computer
- is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
- the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
- a type of malware that is aimed to infect and harm a file, a system or a network
- a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
Down
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- Customizable additions to software for extra functionality
- string of characters used to verify the identity of an user during the authentication process
- a program that can automatically perform some simple repeated task to reach a pursued goal.
10 Clues: Customizable additions to software for extra functionality • a type of malware that is aimed to infect and harm a file, a system or a network • a program that can automatically perform some simple repeated task to reach a pursued goal. • string of characters used to verify the identity of an user during the authentication process • ...
CW_1 2022-10-11
Across
- Comprised of any number and variety of interconnected devices
- a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- weaknesses in software programs that can be exploited by hackers to compromise computers.
- string of characters used to verify the identity of a n user during the authentication process
- the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
Down
- software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- a network security system that filters unsanctioned incoming and outgoing traffic.
- a type of malware that is aimed to infect and harm a file, a system or a network
10 Clues: Comprised of any number and variety of interconnected devices • a type of malware that is aimed to infect and harm a file, a system or a network • a network security system that filters unsanctioned incoming and outgoing traffic. • weaknesses in software programs that can be exploited by hackers to compromise computers. • ...
ADSI Juan Pablo Robayo 2022-02-11
Across
- the practice of tricking Internet users (as through the use of deceptive email messages or websites)
- thing made for a particular purpose, especially a piece of mechanical or electronic equipment. For example an keyboard.
- is a programming language commonly used in web development.
- refers to a system of connected computers and other devices such as printers that exchange data with each other.
Down
- when talking about transferring data or information from a main computer source to another device or transferring information from the cloud.
- a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems
- is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- is defined as a framework with a set of best practices for delivering efficient IT support services.
- mean making a copy of data and files to protect them against accidental loss.
- is a framework within which people can address complex adaptive problems, while productively and creatively delivering products of the highest possible value.
10 Clues: is a programming language commonly used in web development. • mean making a copy of data and files to protect them against accidental loss. • the practice of tricking Internet users (as through the use of deceptive email messages or websites) • is defined as a framework with a set of best practices for delivering efficient IT support services. • ...
Modules 18 to 20 Crossword 2023-03-31
Across
- Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data.
- A weakness in a system or its design that could be exploited by a threat actor.
- BYOD means Bring Your Own ____
- This is a set of standardized schema for specifying, capturing, characterizing, and communicating events and properties of network operations that supports many cybersecurity functions.
- The second line of defense. It is a checkpoint device that performs additional filtering and tracks the state of the connections.
Down
- Any potential danger to an asset.
- This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector.
- This can be established using username and password combinations, challenge and response questions, token cards, and other methods.
- A security company that offers sevices to help enterprises secure their networks. It uses a three-pronged approach combining security intelligence, security expertise, and technology.
- Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made.
10 Clues: BYOD means Bring Your Own ____ • Any potential danger to an asset. • A weakness in a system or its design that could be exploited by a threat actor. • This enables the real-time exchange of cyber threat indicators between the U.S. Federal Government and the private sector. • ...
Datafication and Digital Trust 2022-11-09
Across
- Information _________ is the right to have some control over how your personal information is collected and used.
- The method by which information is converted into secret code that hides the information's true meaning
- Data as processed, stored, or transmitted by a computer
- A privacy ________ is a statement or a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a customer or client's privacy
- Common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel
Down
- Intrusive software that is designed to damage and destroy computers and computer systems
- The practice of deploying people, policies, processes, and technologies to protect organizations, their critical systems, and sensitive information from digital attacks
- When somebody sends an e-mail with a link to a bogus website it is called ___________
- An organized collection of structured information, or data, typically stored electronically in a computer system
- Smallest unit of data
10 Clues: Smallest unit of data • Data as processed, stored, or transmitted by a computer • When somebody sends an e-mail with a link to a bogus website it is called ___________ • Intrusive software that is designed to damage and destroy computers and computer systems • ...
Puzzle - 2 2022-10-10
Across
- encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
- weaknesses in software programs that can be exploited by hackers to compromise computers.
- a type of internet fraud that seeks to acquire a user’s credentials by deception.
Down
- the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
- the process of decoding cipher text to plain text, so it is readable by humans.
- a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
- a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
- Cryptocurrency, a form of electronic cash
10 Clues: Cryptocurrency, a form of electronic cash • the process of decoding cipher text to plain text, so it is readable by humans. • a type of internet fraud that seeks to acquire a user’s credentials by deception. • weaknesses in software programs that can be exploited by hackers to compromise computers. • ...
Puzzle - 6 2022-10-10
Across
- extends a private network across a public network and enables users to send and receive data across shared or public networks
- a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- Breach of a system's security policy in order to affect its integirty or availability
- any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
Down
- a process of maintaining data confidentiality by converting plain data into a secret code with the help of an encryption algorithm.
- name commonly given to unsolicited email.
- contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.
- a type of self-replicating malware that, when infected on a computer, is aimed to spread across the network to infect others.
- Good guys in the world of cybercrime. Hackers who use their skills and talents for good
10 Clues: name commonly given to unsolicited email. • Breach of a system's security policy in order to affect its integirty or availability • Good guys in the world of cybercrime. Hackers who use their skills and talents for good • contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed. • ...
CW-2 2023-09-15
Across
- which cmd is used to display the contents of a text file in the terminal
- a term for a software application that allows users to access and navigate the WWW to view websites and web pages
- a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
- in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
- a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)
- the core component of an operating system that manages hardware resources
Down
- in linux, what cmd is used to change the ownership of files and directories
- a term for a computer program or hardware device that provides a specific service or functionality to other software applications
- in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
- what do you type into a web browser to visit a websit
10 Clues: what do you type into a web browser to visit a websit • which cmd is used to display the contents of a text file in the terminal • the core component of an operating system that manages hardware resources • in linux, what cmd is used to change the ownership of files and directories • ...
phish 2024-03-21
Across
- What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
- What type of malicious software disguises itself as legitimate software to gain access to a computer system?
- What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
- What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
Down
- What process in cybersecurity involves encoding data to protect it from unauthorized access?
- What are the software updates released to fix vulnerabilities and improve security in computer systems?
- What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
- A software that is designed to detect and destroy computer viruses.
- What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
- What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?
10 Clues: A software that is designed to detect and destroy computer viruses. • What process in cybersecurity involves encoding data to protect it from unauthorized access? • What are the software updates released to fix vulnerabilities and improve security in computer systems? • ...
phish 2024-03-21
Across
- What term refers to the technique of creating synthetic media, often involving manipulated images or videos, using advanced machine learning algorithms?
- What is the term for a list of entities, such as IP addresses or websites, that are blocked or denied access due to being identified as malicious or unauthorized?
- What term describes the isolation of potentially harmful files or software to prevent them from spreading within a computer network?
- What type of malicious software disguises itself as legitimate software to gain access to a computer system?
- What technology involves the identification and authentication of individuals based on unique biological characteristics such as fingerprints or iris patterns?
Down
- What unique numerical label is assigned to each device connected to a computer network for identification and communication purposes?
- What are the software updates released to fix vulnerabilities and improve security in computer systems?
- What process in cybersecurity involves encoding data to protect it from unauthorized access?
- What is the term for a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
- A software that is designed to detect and destroy computer viruses.
10 Clues: A software that is designed to detect and destroy computer viruses. • What process in cybersecurity involves encoding data to protect it from unauthorized access? • What are the software updates released to fix vulnerabilities and improve security in computer systems? • ...
iACE Crossword Puzzle 3 2021-11-09
Across
- A firm’s _________ risk profile can be impacted due to vulnerability of its area of operations to changing climate.
- The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- Unacceptable or improper behaviour, especially by an employee or professional person.
- An official inspection of an individual’s or organization’s accounts.
Down
- _____________ refers to adherence to policies, plans, procedures, laws, regulations, contracts, or other requirements.
- ________ risk refer to the risk of inadequate employment practices and resource management.
- Do not take personal data outside of AIA premises without permission from your manager. Sending personal data to your personal email account or unauthorized third parties is strictly ________.
- _______ is the process in which bad guys try to trick you into giving out sensitive information or taking a potentially dangerous action, like clicking on a link or downloading an infected attachment.
- Wrongful or criminal deception intended to result in financial or personal gain.
- Person or persons who are entitled to the benefit of any trust arrangement such as insurance contract.
10 Clues: An official inspection of an individual’s or organization’s accounts. • Wrongful or criminal deception intended to result in financial or personal gain. • Unacceptable or improper behaviour, especially by an employee or professional person. • ________ risk refer to the risk of inadequate employment practices and resource management. • ...
The central technologies to digital transformation 2023-12-15
Across
- practice of protecting critical systems and sensitive information from digital attacks
- provides a secure and transparent way to record and verify transactions. It is commonly associated with cryptocurrencies but has broader applications, such as supply chain management and secure data sharing.
- involves the use of software robots to automate repetitive and rule-based tasks. It helps streamline business processes, reduce errors, and increase operational efficiency.
- technology enhances user experiences by creating immersive virtual environments
- provides faster and more reliable connectivity, enabling the seamless operation of applications that require high data transfer speeds
- enable systems to learn from data and make intelligent decisions.
Down
- involves processing data closer to the source of generation rather than relying solely on centralized cloud servers.
- involves connecting physical devices to the internet, allowing them to collect and exchange data
- enable the processing and analysis of large volumes of data to derive insights and make informed business decisions.
- provides scalable and flexible resources, allowing organizations to store and access data, run applications, and deploy services without the need for on-premises infrastructure
10 Clues: enable systems to learn from data and make intelligent decisions. • technology enhances user experiences by creating immersive virtual environments • practice of protecting critical systems and sensitive information from digital attacks • involves connecting physical devices to the internet, allowing them to collect and exchange data • ...
Corporate Compliance and Ethics Week 2023 2023-10-30
Across
- What you must do if you suspect that someone is doing anything that violates the Compliance and Ethics code and our Standards of Conduct.
- The acronym for the policy that ensures and protects a patient's electronic health record (EHR).
- The acronym for our "Safety and Compliance" reporting system.
- The practice of protecting systems, networks and programs from digital attacks.
- The fraudulent practice of sending emails purporting to be from a reputable company in order to trick someone into sharing their personal information.
Down
- Following the rules. It means we try to understand and comply with all the laws and policies that apply to our duties at Community.
- A system of moral principles dealing with values with respect to the rightness and wrongness of certain actions and to the goodness and badness of motives and ends of such actions.
- Who is responsible for compliance at Community Health System.
- A type of email that covers a range of protective measures and creates a secure connection between a dedicated web server and browser.
- Another name for your CHS system username and password.
10 Clues: Another name for your CHS system username and password. • Who is responsible for compliance at Community Health System. • The acronym for our "Safety and Compliance" reporting system. • The practice of protecting systems, networks and programs from digital attacks. • ...
CW-2 2023-09-15
Across
- a term for a software application that allows users to access and navigate the WWW to view websites and web pages
- in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
- what do you type into a web browser to visit a websit
- a term for a computer program or hardware device that provides a specific service or functionality to other software applications
- in linux, what cmd is used to change the ownership of files and directories
Down
- the core component of an operating system that manages hardware resources
- a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
- in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
- which cmd is used to display the contents of a text file in the terminal
- a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)
10 Clues: what do you type into a web browser to visit a websit • which cmd is used to display the contents of a text file in the terminal • the core component of an operating system that manages hardware resources • in linux, what cmd is used to change the ownership of files and directories • ...
Dark Web Saga 2024-02-04
Across
- Clicks and beeps, a language I speak, what am I, a gadget for the tech geek?
- I learn and adapt, with circuits in tow, a mind of wires, in the tech's shadow.
- In circuits, I compute without a hitch, a brain of metal and silicon which is which?
- With keys at my command, I type and code, a writer's ally on the digital road. What am I, in the coding abode?
- A web of connections, wires in a dance, transmitting data at a rapid advance. What am I, in the networking expanse?
- A language, zeroes and ones, the foundation of code, where the digital journey begins. What am I, in the coding bins?
Down
- In the coding labyrinth, where symbols align, a programmer's toolkit, where solutions shine. What am I, in the coding design?
- Pixels and screens, a visual delight, bringing images to life, in the digital light. What am I, in the visual height?
- With keys and codes, I lock and secure, a guardian of data, making breaches obscure.
- I hide in the shadows, a secret unknown, where the internet's darker side is shown.
10 Clues: Clicks and beeps, a language I speak, what am I, a gadget for the tech geek? • I learn and adapt, with circuits in tow, a mind of wires, in the tech's shadow. • I hide in the shadows, a secret unknown, where the internet's darker side is shown. • With keys and codes, I lock and secure, a guardian of data, making breaches obscure. • ...
TECH 2024-07-08
Across
- A decentralized and distributed digital ledger technology that records transactions across multiple computers in a way that is secure, transparent, and resistant to tampering.
- Source: Software or technology that is released with a license that allows anyone to inspect, modify, and distribute its source code.
- A set of rules or instructions designed to solve a specific problem or accomplish a task in computing.
- The practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and data breaches
Down
- The process of converting data into a code to prevent unauthorized access, especially during transmission over networks.
- Digital or virtual currencies that use cryptography for security and operate independently of a central authority, such as Bitcoin or Ethereum.
6 Clues: A set of rules or instructions designed to solve a specific problem or accomplish a task in computing. • The practice of protecting systems, networks, and programs from digital attacks, unauthorized access, and data breaches • The process of converting data into a code to prevent unauthorized access, especially during transmission over networks. • ...
Puzzle - 7 2022-10-10
Across
- a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
- a regular system update released by developers to fix bugs and other software vulnerabilities
- the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- a list of permitted items that are automatically let through whatever gate is being used.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
Down
- a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
- State of being safe / free from danger or threat
- a basic access control mechanism that allows elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system, except those explicitly mentioned which are denied access.
- software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- The programs and other operating information used by a computer
10 Clues: State of being safe / free from danger or threat • The programs and other operating information used by a computer • a list of permitted items that are automatically let through whatever gate is being used. • a regular system update released by developers to fix bugs and other software vulnerabilities • ...
Puzzle - 11 2022-10-10
Across
- a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
- an isolated environment on a network that mimics end-user operating environments.
- Comprised of any number and variety of interconnected devices
Down
- the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- Breach of a system's security policy in order to affect its integrity or availability
- any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
- string of characters used to verify the identity of an user during the authentication process
10 Clues: Comprised of any number and variety of interconnected devices • an isolated environment on a network that mimics end-user operating environments. • Breach of a system's security policy in order to affect its integrity or availability • string of characters used to verify the identity of an user during the authentication process • ...
corps of signals 2023-01-11
Across
- the use of radio waves to transmit and receive information, a primary means of communication for the corps of signals
- a military branch that specializes in communications, responsible for providing and maintaining the communication systems and networks used by a military force.
- the use of speech to convey information, one of the primary means of communication for the corps of signals
- communications: the use of satellites to transmit and receive information, a key capability of the corps of signals
- a group of interconnected devices and systems that can exchange information and share resources
- the practice of protecting communication systems, networks and data from unauthorized access or attack
Down
- ios or smartphones, to communicate, an essential capability for the corps of signals
- a communication facility that receives a signal from one source and retransmits it on to another, used by the corps of signals to extend the range of communication networks.
- the process of converting plain text into a coded form to protect the information from unauthorized access
- the use of light-carrying fibers to transmit information, a technology used by the corps of signals for high-speed data transfer
10 Clues: ios or smartphones, to communicate, an essential capability for the corps of signals • a group of interconnected devices and systems that can exchange information and share resources • the practice of protecting communication systems, networks and data from unauthorized access or attack • ...
altafiber Security Awareness 2022-08-29
Across
- Your ____ is like your underwear; don't share it with your friends, and change it often.
- Personal Identifiable Information
- _________ software helps prevent and eliminate viruses and other malware from infecting your computer.
- ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one.
- A distinct subset of the internet with addresses sharing a common suffix or under the control of a particular organization or individual.
- A weakness in a program or system that can be exploited
- A layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's login
- The process of changing plain text to cipher text using an algorithm
- Logical or physical device used to filter network traffic
Down
- Email _____ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity.
- United States Federal Agency that specializes in cybersecurity
- National Institute of Standards and Technology
- The form of malware that encrypted Colonial Pipeline files in 2021.
- An email that tricks you into giving up your passphrase, password or clicking on a malicious link
- Cyber Security Awareness Month
- A Virtual Private Network connection that establishes a secure connection between you and the internet.
- Malicious software or commands that take advantage of a system’s vulnerabilities. Common forms include: viruses, trojans, worms and ransomware
- Similar to a password except you use a string of words and it gives you access to your computer.
18 Clues: Cyber Security Awareness Month • Personal Identifiable Information • National Institute of Standards and Technology • A weakness in a program or system that can be exploited • Logical or physical device used to filter network traffic • United States Federal Agency that specializes in cybersecurity • The form of malware that encrypted Colonial Pipeline files in 2021. • ...
Challenging Indian Tech & Innovation Crossword 2024-10-10
Across
- A startup that’s revolutionizing the Indian agritech sector with AI-driven predictive analytics for farming
- This Indian multinational technology company is the world's largest provider of IT consulting services
- An Indian unicorn startup specializing in online education, now expanding globally with gamified learning solutions
- The first Indian startup to be listed on NASDAQ, specializing in AI-powered customer engagement platforms
- India’s leading tech unicorn in ride-sharing, now venturing into electric vehicles
- This Indian tech company developed a super app in the post-pandemic era, offering a wide range of services, including payments and healthcare
- An Indian renewable energy company that’s making headlines for being the largest in the world by installed capacity
- An Indian tech company focused on blockchain and AI for managing supply chain transparency in industries like pharma and logistics
Down
- An Indian company that developed an AI-based cybersecurity platform, now offering services across more than 30 countries
- India’s largest IT company by market capitalization, known for pioneering automation and AI-based IT solutions
- This Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystem
- A major player in India’s space technology, this private company built India’s first privately developed rocket
- The largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services
- This company is leading India’s AI-based conversational chatbot innovations, widely used by financial institutions
14 Clues: India’s leading tech unicorn in ride-sharing, now venturing into electric vehicles • This Indian FinTech company transformed bill payments and is the backbone of India’s UPI ecosystem • The largest B2B marketplace for Indian SMEs, providing cloud-based solutions and e-commerce services • ...
FITAVocab.TC 2013-05-16
Across
- programs that you can download
- ethical uses of or on a computer or the web
- circuit board
- something that shows off a a business and shows people what it is about
- crediting a persons work
- extra docking system
- the security of or on a computer
- a paid internet access
- central processing unit
- a companies "slogan"
- a type of layout
- a format of a program on your computer
- a combination of many search engines
- a program that allows you to create documents
- the thing at the top of the screen
- a port to get wifi
- storing space
- liquid crystal display
- an illegal way of taking credit for somebody's invention
- light emitting diode
- National Cyber Security Alliance
- what you have on you desktop already
Down
- a term that describes safety o the computer or on the web
- decision tool
- a place where you can virtually go and search on the web
- a system that allows you to connect to other peoples devices over wifi or cellular data
- cd port
- an adjective that describes cyber in a way that is someway pixel ly
- the old fashion watch "not digital"
- things that you can buy to play or enjoy on
- confusing
- a term that describes the web and computers
- a virtually folder where you can save your documents, files
- your work
- a user that is online
- a device that can go anywhere
- a thing of the computer that allows you to move around on the screen or click
- memory card
38 Clues: cd port • confusing • your work • memory card • decision tool • circuit board • storing space • a type of layout • a port to get wifi • extra docking system • a companies "slogan" • light emitting diode • a user that is online • a paid internet access • liquid crystal display • central processing unit • crediting a persons work • a device that can go anywhere • programs that you can download • ...
RU ITEC411 (Professional Ethics and Responsibilities - Chapter 9)) 2023-11-30
Across
- Crafting interfaces that dynamically adjust based on user behavior, preferences, or contextual factors.
- Inadequate or incomplete planning, leading to constraints, hurried decisions, or compromises in later project stages.
- Conducting meetings between people in different locations using video and audio connections.
- Ethical hacking practice where cybersecurity professionals legally attempt to identify system vulnerabilities to enhance security.
- The act of leaving out specific individuals or groups, often unintentionally, from a particular context or system.
- The science or practice of encoding information to prevent unauthorized access, especially in information security.
- Altering or eradicating identifiable information from datasets to safeguard individuals' privacy while retaining overall data utility.
- Pre-set configurations or settings automatically applied in a system or software if not explicitly specified.
- The process of identifying and rectifying inaccuracies or inconsistencies in data to improve its quality.
- Designing systems with separate, interchangeable parts, enhancing flexibility and ease of maintenance.
Down
- Employing data and algorithms to create models that predict future outcomes or behaviors.
- The process of selectively omitting or censoring sensitive information from a document or dataset, often for privacy or security reasons.
- Repeating tests post-modifications to ensure previously functioning aspects have not been adversely affected.
- The commitment to complying with established standards, specifications, or regulations.
- Catering to a specific segment or group with unique preferences or needs.
- The deliberate act of making something obscure or unclear, often used to protect intellectual property or hinder reverse engineering.
- Alternative problem-solving methods employed when conventional approaches fail.
- The capability of being customized or adapted to suit individual preferences or needs.
- Losing interest or focus during discussions, indicating a lack of engagement or understanding.
- A systematic approach or set of procedures for solving a problem or accomplishing a task.
20 Clues: Catering to a specific segment or group with unique preferences or needs. • Alternative problem-solving methods employed when conventional approaches fail. • The capability of being customized or adapted to suit individual preferences or needs. • The commitment to complying with established standards, specifications, or regulations. • ...
Literasi Digital 2024-08-13
Across
- salah satu Pillar literasi digital
- aplikasi mengirim pesan di handpone
- proses meyakinkan penggunaan layanan digital dengan aman
- Informasi yang tidak sengaja salah/akurat
- kata lain keamanan siber
- perangkat dalam komputer
- dunia bisnis
- salah satu perangkat lunak password manager
- alamat web address bar peramban
- lisensi dimana seluruh hak cipta terhadap perangkat lunak telah dilepaskan
- web penjelajah internet terus menerus
- kecakapan media digital
- singkatan dari Software of a service
- sistem menggunakan perangkat keras
- fitur yang dikembangkan oleh peramban
- mencari halaman dengan judul tertentu
- mencari konten yang muncul di alamat domain
- situs web
- bidang lain informatika
- lisensi perdaganga
- pembaruan perangkat lunak
- kata kunci khusus yang digunakan dalam pencarian
Down
- provokasi di media sosia
- tantangan era literasi digita
- lisensi publik umum
- literasi yang mencari dan memahami yang ditemukan
- informasi yang dikumpulkan oleh web crawler
- kata lain dari browser
- elektronik kepanjangan dari TE
- kata kunci pengaman handphone
- mesin pencari khusus anak²
- penyadap media sosial
- perangkat kedua dalam komputer
- perangkat lunak yang digunakan untuk mengakses informasi di internet
- tempat jasa SAS beroperasi
- profesi bidangn informatika
- sebutan komputer di Amerika Serikat
- teknologi informasi dan komunikasi
- fitur pencarian yang terus meningkat
- Engine mesin pencari
- lisensi yang boleh menggunakan perangkat lebih
- gak atas kekayaan intelektua
- kata lain lisensi gratis
- Informasi yang tidak benar
- Audio konten yang berupa suara yang bisa didedidengarkan
- manager pengelola kata sandi supaya aman
- jaringan komunikasi
- dasar kajian data
- intelektual hasil buah pikir dari perangkat lunak
- salah satu perilaku yang harus diterapkan dalam budaya digital
- yayasan perangkat lunak bebas
51 Clues: situs web • dunia bisnis • dasar kajian data • lisensi perdaganga • lisensi publik umum • jaringan komunikasi • Engine mesin pencari • penyadap media sosial • kata lain dari browser • kecakapan media digital • bidang lain informatika • provokasi di media sosia • kata lain keamanan siber • perangkat dalam komputer • kata lain lisensi gratis • pembaruan perangkat lunak • mesin pencari khusus anak² • ...
Current Events Final Exam 2024-05-08
Across
- - Competitive video gaming.
- - Able to be maintained long-term. (Often refers to environmental practices)
- - Application software for a smartphone or computer.
- - Protecting computer systems from attacks.
- - Spreading quickly on social media.
- - A virtual world users can access and interact with.
- - Audio program series distributed online.
- - Digital currency secured by cryptography.
- - Playing video games.
- - Energy sources that can be replenished, like solar or wind power.
- - Unmanned aerial vehicles used for various purposes.
- - Delivering content online in real-time.
- - Creating three-dimensional objects from a digital file.
- - Billionaire entrepreneur behind companies like Tesla and SpaceX.
- (AGI) - Hypothetical AI with human-like intelligence.
- - Online seminar or presentation.
Down
- - A large-scale disaster or event. (Can be metaphorical)
- - Science, Technology, Engineering, and Math education.
- - An additional dose of the COVID-19 vaccine given to maintain immunity.
- - Long-term shift in weather patterns.
- - Virtual reality, a simulated experience.
- - Object orbiting Earth used for communication or observation.
- - Storing and accessing data through the internet.
- - Online platforms for social connection and content sharing.
- (AI) - Machines that mimic human cognitive functions.
- - Large and complex sets of data used for analysis.
- - False or misleading information presented as news.
- (IoT) - Network of physical devices connected to the internet.
- - Non-fungible token, a unique digital asset.
- - Autonomous vehicle that operates without a driver.
- - Person with a large online following who promotes products.
- (EV) - Vehicle powered by electricity.
- - Mobile phone with advanced features.
- - The field of designing and building robots.
- - Automated vacuum cleaner.
- - Using biology to create new products or processes.
36 Clues: - Playing video games. • - Competitive video gaming. • - Automated vacuum cleaner. • - Online seminar or presentation. • - Spreading quickly on social media. • - Long-term shift in weather patterns. • (EV) - Vehicle powered by electricity. • - Mobile phone with advanced features. • - Delivering content online in real-time. • - Virtual reality, a simulated experience. • ...
Post Cold War 2024-10-01
Across
- The practice of protecting computer systems and networks from unauthorized access or attacks.
- A long-term shift in global temperatures and weather patterns caused by human activity.
- A political movement claiming to represent the voice of ordinary people against elites.
- The process of increasing interconnection between countries through trade, culture, and technology.
- 2015 international treaty aimed at reducing global greenhouse gas emissions.
- U.S.-led global military campaign launched after the 9/11 attacks.
- A series of coordinated terrorist attacks in 2001 that reshaped global security policies.
- The practice of using resources responsibly to ensure future generations can meet their needs.
- A conflict in which countries impose tariffs on each other, as seen between the U.S. and China.
Down
- Assistance provided during crises such as natural disasters, conflicts, or famines.
- Initiative China’s global infrastructure development strategy aimed at increasing its global influence.
- The rapid development of the internet and social media since the 1990s.
- The disintegration of this superpower in 1991 marked the end of the Cold War.
- Political and economic union of 27 European countries, facing challenges like Brexit.
- Laws regulating how people can enter and live in a country, often debated in the context of security and economics.
- Online platforms that have transformed global communication and activism, such as Facebook and Twitter.
- The use of violence, especially against civilians, to achieve political goals.
- The United Kingdom’s decision to leave the European Union in 2016.
- Country whose rapid economic and political rise has challenged U.S. global dominance.
- Political ideology focused on promoting the interests of one's country, often at the expense of global cooperation.
20 Clues: The United Kingdom’s decision to leave the European Union in 2016. • U.S.-led global military campaign launched after the 9/11 attacks. • The rapid development of the internet and social media since the 1990s. • 2015 international treaty aimed at reducing global greenhouse gas emissions. • ...
Literasi digital 2024-08-20
Across
- menandai kata kunci atau topik
- kejahatan yang melibatkan penggunaan komputer
- menandai lokasi geografis dalam foto
- sebuah metode untuk memanipulasi orang
- mengambil file dari internet
- perangkat lunak yang di ciptakan untuk merusak sistem komputer
- sebuah vidio yang berfokus pada cerita
- upaya untuk mencuri informasi sensitif
- melindungi sistem komputer dan jaringan dari ancaman
- suatu konten yang cepat menyebar
- sebuah antar muka untuk menghubungkan aplikasi
- pengguna internet yang sengaja membuat komentar provokatif
- metadata
- teknologi yang memadukan dunia
- istilah untuk mengurangi penggunaan teknologi
- sebuah gambar kecil atau simbol
- sebuah format untuk menyediakan konten
- penggunaan teknologi digital untuk menghina
- catatan online atau jurnal yang sering di update
- sebuah jenis kode matriks
- pengguna internet yang memiliki banyak follower
- representasi grafis atau karakter
- informasi yang memberikan deskripsi
Down
- tempat untuk berbagi pendapat
- menyaksikan konten vidio secara langsung
- memanen data pribadi
- yang digunakan untuk melindungi jaringan
- platfrom media sosial yang paling umum
- kiriman pesan kepada banyak orang tanpa izin
- sebuah metode keamanan identitas akun
- menyimpan data secara online dalam serfer
- platfrom yang sering di gunakan untuk melakukan vidio konvergensi
- digital yang meninggalkan jejak aktivitas online
- proses merubah informasi menjadi kode
- situs web yang memungkinkan pengguna untuk mengedit
- sebuah kelemahan atau cela yang dapat diserang
- kesenjangan akses terhadap teknologi digital
- penggunaan teknologi digital untuk menghina
- sebuah unit infomasi
- layanan untuk menyimpan data online
- menyimpan prefensi menggunakan
- generasi yang tumbuh Dengan teknologi
- topik yang sedang populer
- menyimpan dan menyediakan data
- sebuah alamat web
- program yang dapat menggandakan dirinya sendiri dan menyebar ke komputer lain
- untuk menampilkan konten
- strategi untuk meningkatkan visibilitas website
- sebuah perangkat lunak atau parangkat keras
- perangkat lunak yang berinteraksi dengan pengguna
50 Clues: metadata • sebuah alamat web • memanen data pribadi • sebuah unit infomasi • untuk menampilkan konten • topik yang sedang populer • sebuah jenis kode matriks • mengambil file dari internet • tempat untuk berbagi pendapat • menandai kata kunci atau topik • menyimpan prefensi menggunakan • menyimpan dan menyediakan data • teknologi yang memadukan dunia • sebuah gambar kecil atau simbol • ...
CYBER FEST CROSSWORD 2024-10-18
Across
- Software designed to detect, prevent, and remove malware and other harmful software.
- Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
- A secret string of characters used to verify the identity of a user.
- An attempt by hackers to damage or disrupt a computer system or network.
- Ensuring that an organization meets regulatory and legal requirements for security practices.
- Software that secretly monitors and collects personal information from a computer.
- A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
- The process of verifying the identity of a user or device before granting access to a system.
Down
- Related to computers, information technology, or virtual reality, often used in the context of online environments.
- The process of converting data into a secret code to protect it from unauthorized access.
- A weakness in software, hardware, or procedures that could be exploited to cause harm.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
- Any software intentionally designed to cause damage to a computer, server, or network.
- A person who uses computers to gain unauthorized access to data.
- A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.
16 Clues: A person who uses computers to gain unauthorized access to data. • A secret string of characters used to verify the identity of a user. • An attempt by hackers to damage or disrupt a computer system or network. • Software that secretly monitors and collects personal information from a computer. • ...
ICT Crossword 2023-03-28
Across
- The learning process of new skills necessary to complete a different role; move onto a new role within their current company.
- A cyber attack intended to redirect a website's traffic to another fake site
- A wireless computer network that links two or more devices using wireless communication to form a local area network.
- The safe and responsible use of technology.
- A type of malware that attaches to another program and can replicate and spread to other computers.
- The replacement of skilled people with technology that require people who can operate that only need fewer skills.
- What is a private computer network within an organization
- Allows two staff members to share the responsibilities of one full-time position.
- A person who uses computers to gain unauthorized access to data
Down
- A telecommunications network that extends over a large geographic area.
- Phone calls that induce you to reveal personal information.
- Unsolicited messages sent in bulk by email.
- Information relating to an identified or identifiable individual.
- A meeting held by people who are talking to each other over the internet
- A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- What is a global network of interconnected computer networks
- A phishing cybersecurity attack carried out over mobile text messaging
- A collection of devices connected together in one physical location.
- What is usually considered as working fewer than 35 hours, or 30 hours, per week.
- An attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate.
20 Clues: Unsolicited messages sent in bulk by email. • The safe and responsible use of technology. • What is a private computer network within an organization • Phone calls that induce you to reveal personal information. • What is a global network of interconnected computer networks • A person who uses computers to gain unauthorized access to data • ...
Cyber Security 2024-08-29
Across
- Jenis malware yang mengunci file atau sistem komputer dan meminta tebusan untuk membukanya kembalihakakses hak seorang pengguna untuk masuk ke dalam sebuah sistem, jaringan, atau aplikasi komputer secara legal
- tindak kejahatan yang memanfaatkan teknologi komputer dan jaringan internet untuk melakukan peretasan, pencurian data dan tindak kriminal digital lainnya
- Jenis malware yang merekam aktivitas pengguna di komputer
- Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna
- Serangan siber yang mencuri informasi pribadi dengan meniru situs web yang sah
- jenis malware yang akan menampilkan iklan atau jendela pop-up yang tidak diinginkan di layar perangkat yang terinfeksi
- proses/metode untuk mengubah bentuk data menjadi kode/teks yang sulit dimengerti atau dibaca oleh pihak yang tidak memiliki akses
- Serangan siber yang bertujuan untuk mencuri data sensitif seperti nomor kartu kredit
- Proses mengembalikan sistem komputer ke keadaan semula setelah terjadi serangan siber
Down
- Teknik manipulasi psikologis untuk mendapatkan informasi sensitif
- proses pengecekan identitas pengguna atau perangkat yang meminta akses ke dalam sistem, jaringan, atau sumber daya informasi
- proses menentukan tingkat atau jenis akses yang diberikan kepada pengguna atau perangkat yang telah diautentikasi
- Perangkat lunak berbahaya yang dirancang untuk menyusup ke sistem komputer tanpa sepengetahuan pengguna
- Proses mengamankan informasi dan sistem komputer dari akses, penggunaan, pengungkapan, gangguan, modifikasi, atau penghancuran yang tidak sah
- Serangan siber yang bertujuan untuk membuat suatu layanan atau sumber daya tidak dapat diakses
- Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer
- Perangkat lunak yang digunakan untuk mengamankan jaringan komputer dari akses yang tidak sah
- Serangan siber yang menargetkan kelemahan pada perangkat lunak atau sistem operasi
- Jenis malware yang menyebarkan dirinya melalui email atau lampiran
- Jenis malware yang mereplikasi diri sendiri dan menyebar ke sistem komputer lain
20 Clues: Jenis malware yang merekam aktivitas pengguna di komputer • Teknik manipulasi psikologis untuk mendapatkan informasi sensitif • Jenis malware yang menyebarkan dirinya melalui email atau lampiran • Jenis malware yang menyamarkan diri sebagai program yang baik dan berguna • Perangkat lunak yang digunakan untuk mendeteksi dan menghapus virus komputer • ...
Technology Crossword 2024-04-11
Across
- a device used to only capture photos and videos
- a device that sends out signals wirelessly
- a nonhuman technology
- they produce sounds so you can listen to music or audio out loud
- a machine used for sending and receiving documents
- a display screen that shows the converted code
- a device used to watch movies and shows
- a lighting system commonly used on gaming computers
- you can wear them on your head a listen to music
- a tool used to type words
- portable device used for communication
- a device used for playing video games
- a device able to track things
- the practice of protecting computers and serves form online threats and viruses
Down
- the main circuit board of a computer
- a computer component that helps render and display images and videos
- a computer component that helps cool down parts of a computer
- a portable power source for electronic devices
- reality a technology that lets you escape to a different world
- a type of coding used in Mr.Kannani's class
- a flying device able to record videos
- a device used to do school work, watch videos, and play games
- a handheld object that is used to control objects on a computer screen
- a device that prints documents and images
- a technology that allows wireless communication between devices over a great distance
- the "brain" of the computer
- a fancy term used for online shopping
- a camera that goes on a monitor
- a technology that allows wireless communication between devices over a short distance
- a type of computer memory
30 Clues: a nonhuman technology • a tool used to type words • a type of computer memory • the "brain" of the computer • a device able to track things • a camera that goes on a monitor • the main circuit board of a computer • a flying device able to record videos • a fancy term used for online shopping • a device used for playing video games • portable device used for communication • ...
Chapter 8 - Errors, Failures, and Risks 2024-11-19
Across
- A data structure that allows for pushing and popping elements in a last-in-first-out order.
- An organized collection of data that can be accessed and updated electronically.
- System used to confirm whether a job applicant is legally authorized to work.
- A repeated error caused by an error in the system or program.
- Abbreviation for the US deferral agency for public security including immigration, cybersecurity, and disaster prevention.
- A software and computer program error that causes incorrect behavior.
- The process of planning, decision making and putting a system into effect.
- The process of identifying and fixing errors in systems.
- A displayed description to help the programmer/operator know the issue the program is having.
- Reliance on computer systems and technology for essential functions.
- The concept where everyday devices are embedded with software and communication technologies to connect and exchange data over the internet.
- A check within a program that sees whether a given output or input falls within a logical range of what is acceptable.
- A variable in computer programming storing true or false (0 or 1) for a condition in the program.
Down
- Including duplicate components of systems in software to ensure reliability.
- Process of identifying, analyzing, and evaluating potential risks in a system to ensure safety in the technology.
- A mistake where the incorrect data is entered into a system.
- A variable exceeding the storage capacity of memory it was allocated for.
- A device that can operate in two different modes.
- A computer controlled radiation therapy machine that caused several incidences with radiation overdoses to patients.
- The name of Hong Kong’s international airport that experienced system failures.
20 Clues: A device that can operate in two different modes. • The process of identifying and fixing errors in systems. • A mistake where the incorrect data is entered into a system. • A repeated error caused by an error in the system or program. • Reliance on computer systems and technology for essential functions. • ...
FITAVocab.kr 2013-05-15
Across
- a saying or group of words representing a business, store, etc
- 1000 kilobytes
- Ram, memory
- a formal induction into office
- when you think who what and why when someone is talking to you online
- to start a computer by turning it off and then back on
- a port where you plug in an internet cable
- a character
- WIFI
- how you protect yourself online
- ex: dogpile and mamma.com
- circuit board
- ISP, a company that offers access to the internet and email
- NCSA
- CPU, how fast it is
- a pattern serving as a guide in mechanical work, something to get you going
- credit
- an image representing a business, store, etc
- DSL and cable are options
Down
- 8 bits
- SSID
- a brief written account about personal, educational, and professional qualifications and experience
- how you act online
- LED, lightbulb
- a right to copy and license a piece of work
- an arrangement or plan, how it looks
- ex: speaker
- a port for plugging in flash-drives
- a continuous stream of information
- ex: google, yahoo
- being safe online
- 1000 bytes
- 3G and 4G are options
- LCD, display
- a wireless networking technology that uses short-wave radio frequencies to connect wireless electronic devices
- the totality of a computer and the devices connected to it
- a port for plugging in headphones
- 1000 gigabytes
- an electronic receiver for a PS2 cable usually used to plug in a keyboard or mouse
- an promise presidents say
- gaming ports
- ex: mouse
- 1000 megabytes
- uses ones and zeros to transmit information
- the arrangement of data
45 Clues: SSID • WIFI • NCSA • 8 bits • credit • ex: mouse • 1000 bytes • Ram, memory • a character • ex: speaker • LCD, display • gaming ports • circuit board • 1000 kilobytes • LED, lightbulb • 1000 gigabytes • 1000 megabytes • ex: google, yahoo • being safe online • how you act online • CPU, how fast it is • 3G and 4G are options • the arrangement of data • ex: dogpile and mamma.com • an promise presidents say • ...
Technology Crossword 2023-06-07
Across
- represents text, computer processor instructions, or any other data using a two-symbol system.
- is the most important processor in a given computer.
- is the protection of computer systems and networks from attack by malicious actors.
- is a form of computer memory that can be read and changed in any orde.
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
- is a file format developed by Adobe in 1992 to present document
- is a digital multimedia container format most commonly used to store video and audi.
- is a collection of discrete values that convey informatio.
- is a method of representing data in a visual, machine-readable form
Down
- is an American multinational technology company
- is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- are small blocks of data created by a web server.
- is a bitmap image format that was developed by a team at the online services provider CompuServe.
- is a mobile operating system
- is a hardware or software component that stores data so that future requests for that data can be served faster
- is a mapping from some domain (for example, a range of integers) to bits.
- is a method of transmitting and receiving messages using electronic devices.
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source devic.
20 Clues: is a mobile operating system • is an American multinational technology company • are small blocks of data created by a web server. • is the most important processor in a given computer. • is a collection of discrete values that convey informatio. • is a file format developed by Adobe in 1992 to present document • ...
Unit 8 Key Terms 2023-04-27
Across
- taken to achieve this.
- a place of refuge or safety.
- the state of being protected against the criminal or unauthorized use of electronic data, or the
- a term typically used to describe international, supranational, and global resource domains in
- a tax or duty paid on a particular class of imports or exports.
- the system.
- to do so.
- fiscal policy to stimulate the economy.
- sum of money provided by the government or a public body
- economically stimulus refers to attempts to use monetary policy
- a system of recording information in a way that makes it difficult or impossible to change, hack, or
- common-pool resources are found.
- the profession, activity or skill of managing international relations, typically
Down
- the state of being equal especially in status, rights and opportunities.
- a video of a person in which their face or body has been digitally altered so that they appear to be
- to reveal personal information, such as passwords and credit card numbers
- else, typically used maliciously or to spread false information
- money paid regularly at a particular rate for the use of money lent.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce
- sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual
- to influence a country's economy.
- businesses.
- controlling the overall supply of money that is available to the nation's banks, its consumers, and
- a set of tools that a nation's central bank has available to promote sustainable economic growth
- the use of government revenue collection and
- a countries representative abroad.
- existing or occurring within a particular country
- assist an industry or business in order to remain competitive.
28 Clues: to do so. • businesses. • the system. • taken to achieve this. • a place of refuge or safety. • common-pool resources are found. • to influence a country's economy. • a countries representative abroad. • fiscal policy to stimulate the economy. • the use of government revenue collection and • existing or occurring within a particular country • ...
TECH CONNECT 2023-08-30
Across
- Writing and structuring code that computers can execute to perform desired functions.
- Programs and applications that run on computers or devices, enabling various tasks.
- A set of rules defining how data is transmitted and received across a network.
- A interconnected system that allows devices to communicate and share resources.
- Implementing systems or processes that operate with minimal human intervention.
- The point of interaction between a user and a device or software application.
- Writing instructions that computers can understand to perform specific tasks.
- Measures to protect digital systems and information from unauthorized access or attacks.
- A remote network of servers for storing, managing, and processing data over the internet.
- A powerful computer that stores and manages data and resources for other devices.
- Intelligence, The ability of machines to simulate human cognitive functions.
Down
- Deliberate actions to compromise or disrupt digital systems, often for malicious purposes.
- Using technology to streamline and execute tasks without human intervention.
- The global network connecting computers and devices, facilitating information exchange.
- Identifying and removing errors or issues in software code.
- The process of introducing new ideas, methods, or technologies to improve existing systems.
- Combining different components or systems to work together seamlessly.
- Often in the form of facts, figures, or statistics, used for analysis.
- Examination of data to extract meaningful insights and make informed decisions.
- Converting data into a code to prevent unauthorized access.
- Short for "application," referring to software designed for specific tasks or purposes.
- The process of designing, creating, and refining software, systems, or products.
- Physical components of computers and devices that enable software to function.
- The person interacting with a device, system, or software application.
- A set of step-by-step instructions for solving a problem or completing a task.
25 Clues: Identifying and removing errors or issues in software code. • Converting data into a code to prevent unauthorized access. • Combining different components or systems to work together seamlessly. • Often in the form of facts, figures, or statistics, used for analysis. • The person interacting with a device, system, or software application. • ...
IT and How Computers Work 2023-07-05
Across
- this type of memory is permanent and saved on the hard drive
- job-specific high-speed wire used to communicate the processor with other components
- overseer of the CPU
- information that gets returned by the computer
- A machine that can quickly complete a vast number of extremely simple tasks.
- this type of bus carries data back and forth
- Stores data which is virtual information only accessible with a computer
- arithmetic and logic operations are processed here
- data we give to our computers
- printed circuit board that houses important hardware components via ports
- 0's and 1's
- used to store either temporary or permanent information
- limited space, high-speed memory that the CPU can use for quick processing
- comprised of the translation of input and the instructions given for output
Down
- this type of bus carries a specific address in memory and are unidirectional
- A way for computers all around the world to communicate with each other
- Making sure the information is communicated and stored safely and securely – only the right people should have access to it
- type of input device
- "brain of the computer"
- physical outlet used to connect outside, IO (Input/Output) devices to a computer.
- Are organized sets of instructions that utilize the computer’s hardware to complete predefined tasks.
- responsible for the long-term, or secondary storage of data and programs
- type of output device
- fast and temporary memory
- a mouse being clicked
- this type of bus carries the control signals to the other components and are unidirectional
- the use of technology to organize, store, share, and process information.
27 Clues: 0's and 1's • overseer of the CPU • type of input device • type of output device • a mouse being clicked • "brain of the computer" • fast and temporary memory • data we give to our computers • this type of bus carries data back and forth • information that gets returned by the computer • arithmetic and logic operations are processed here • ...
Public Safety 2024-08-09
Across
- a person whose job is to extinguish fires
- the action of evacuating a person or a place
- a state in which the laws and rules regulating the public behavior of members of a community are observed and authority is obeyed
- responsible for the prevention and detection of crime and the maintenance of public order
- an established or official way of doing something
- freedom from disturbance
- the system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties
- the action of keeping something harmful under control or within limits
- a danger or risk
- the action of protecting, or the state of being protected
- an act of saving or being saved from danger or distress
Down
- a person trained to give emergency medical care to people who are injured or ill, typically in a setting outside of a hospital
- the action of stopping something from happening or arising
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the act of compelling observance of or compliance with a law, rule, or obligation
- rule or directive made and maintained by an authority
- the state of being free from danger or threat
- one of a set of explicit or understood regulations or principles governing conduct within a particular activity or sphere
- protected from or not exposed to danger or risk; not likely to be harmed or lost
- the basic physical and organizational structures and facilities (e.g. buildings, roads, power supplies) needed for the operation of a society or enterprise
20 Clues: a danger or risk • freedom from disturbance • a person whose job is to extinguish fires • the action of evacuating a person or a place • the state of being free from danger or threat • an established or official way of doing something • rule or directive made and maintained by an authority • an act of saving or being saved from danger or distress • ...
September Edition Crossword 2024-09-24
Across
- 10-month-old Palestinian boy paralyzed from polio after vaccines have grown inaccessible in Gaza.
- This nation has been instrumental in mediating negotiations over repatriation between Germany and Afghanistan.
- This French political party accused the election of being "stolen" after Michel Barnier was named President.
- A form of peaceful protest which has grown increasingly popular amongst college students protesting the war in Gaza.
- Consolidated Analysis Center, Incorporated is a cybersecurity contractor for this department.
- First name of an American Turkish citizen shot by Israeli soldiers on September 6th, whilst protesting West Bank settlements.
- A town in Burkina Faso which was the most recent target of violent attacks by JNIM.
- Former Defense Department official under Biden who advised Vice President Harris' debate preparations.
- Surname of the Supreme Allied Commander of NATO.
Down
- A term used to describe Venezuela's overreliance on oil leading to a historic economic collapse.
- This Chinese investment program has led to complicated ties with Myanmar.
- Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete.
- This Japanese steel company is looking to merge with U.S. steel in a decision to heavily impact voting in the 2024 Presidential election.
- Campus News Editor Madeline Rowe interned with this former congressman.
- A defendant in the Department of Justice's case against Hamas and who heads Hamas' diaspora office.
- A recent rise in this political phenomenon threatens long-term stability and economic performance.
- This technology introduces a new threat to the cyber landscape as false media can be used for foreign intervention.
- Former vice president of Google's ad platform.
- This Long Island doctor died from anaphylactic shock at a Disney resort restaurant.
- This statute in international law reaffirms the authority of the International Criminal Court.
20 Clues: Former vice president of Google's ad platform. • Surname of the Supreme Allied Commander of NATO. • Campus News Editor Madeline Rowe interned with this former congressman. • This Chinese investment program has led to complicated ties with Myanmar. • Former partner of Olympian Rebecca Cheptegei suspected of murdering athlete. • ...
SCIENCE AND TECHNOLOGY 2024-10-25
Across
- The force that pulls objects toward each other, especially toward the Earth.
- The technology used to design and create robots.
- The science of building and using tiny structures at a molecular scale.
- The basic building block of all living organisms.
- The study of matter, energy, and the forces that act on them.
- The act of introducing something new, often advancing technology or science.
- A proposed explanation made based on limited evidence, to be tested.
- Facts or statistics collected for analysis or reference.
- The power needed to do work, from sources like fuel, electricity, or the sun.
- Something made by humans rather than occurring naturally.
- A place where scientists conduct experiments and research.
- The study of genes and heredity in living organisms.
- A branch of physics studying the behavior of particles on the smallest scales.
- A language or set of instructions used to program computers.
- The study of stars, planets, and outer space.
Down
- A path through which electric current flows.
- The molecule that carries genetic information in living organisms.
- An imitation of a real-world process for study or training purposes.
- A new idea or method that improves how things are done.
- The protection of computer systems from digital attacks.
- A small piece of matter, like an atom or molecule.
- A test done to discover or prove something.
- Microscopic organisms, some of which can cause diseases.
- A device that orbits Earth or another planet, used for communication or research.
- A set of rules or instructions for solving a problem, often used in computing.
- A collection of data organized for easy access and analysis.
- A small infectious agent that can multiply in living cells.
- The process by which species change over time through natural selection.
- The use of machines and technology to operate without human intervention.
29 Clues: A test done to discover or prove something. • A path through which electric current flows. • The study of stars, planets, and outer space. • The technology used to design and create robots. • The basic building block of all living organisms. • A small piece of matter, like an atom or molecule. • The study of genes and heredity in living organisms. • ...
Bureaucracy and Foreign Policy 2024-10-03
Across
- Department that oversees agencies in charge of counterterrorism, cybersecurity, and immigration
- The method of influencing someone, usually a country, to behave in a certain way
- Department that leads the country’s foreign policy
- A government’s set of strategies and goals for dealing with other nations
- Allows both groups to meet their interests
- Handles significant areas of concern for the federal government (Foreign Affairs, Defense, Transportation, etc.)
- Large, complex administrative structure that handles the everyday business of an organization
- Provides the President with the support and services he needs to govern effectively
- Department that oversees and advises the president on military action
- Violent attacks against civilians
- The President oversees the miliatry as ________-in-chief.
- Government officials who live in foreign countries and represent their government
- A type of agency such as the CIA, NSA, and DIA
Down
- The heads of independent agencies are confirmed by what?
- Type of aid where money and resources go to help people with emergency responses to natural disasters, a lack of food, or the outbreak of deadly diseases
- An agreement between countries
- Type of aid that helps develop other nations
- Congress holds the power of the _________—they control how government money is raised and spent
- The federal bureaucracy is part of the ___________ branch.
- Congress sets general guidelines in laws but allows the bureaucracy to make further policy decisions through ___________ authority.
- Economics method to stop trade and assistance to a specific country
- Mutually beneficial relationship between an agency, congressional committee, and interest group.
- When the U.S. only threatens (key word threatens) to use military forces against another country
- Network of public officials, lobbyists, mass media, think tanks, etc., who promote a particular issue
24 Clues: An agreement between countries • Violent attacks against civilians • Allows both groups to meet their interests • Type of aid that helps develop other nations • A type of agency such as the CIA, NSA, and DIA • Department that leads the country’s foreign policy • The heads of independent agencies are confirmed by what? • ...
SAFETY AND ETHICS CROSSWORD PUZZLE 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
Safety and Ethics Puzzle 2024-01-10
Across
- a set of data that describes and gives information about other data.
- The information about a particular person that exists on the Internet as a result of their online activity
- A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- domain Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
- attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
- the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
- the use of electronic communication to bully a person
- Protection of computer systems, networks, and data from digital attacks.
- The protection of information from people who are not authorized to view it.
Down
- a computer security specialist who breaks into protected systems and networks to test and assess their security
- A widely-accepted security measure that should be guaranteed in every secure system
- having the ability to find information, evaluate information credibility, and use information effectively
- is a type of cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
- protecting your data online
- Identity theft, stealing money, stealing private information, controlling private computers.
- how company’s use your data
- The assurance that systems and data are accessible by authorized users when and where needed
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
18 Clues: protecting your data online • how company’s use your data • the use of electronic communication to bully a person • a set of data that describes and gives information about other data. • Protection of computer systems, networks, and data from digital attacks. • The protection of information from people who are not authorized to view it. • ...
UNIT 1 - REVISION 2024-10-14
Across
- Consisting of more than one component or instance, used to describe redundant systems or data sets.
- Based on or following established practices or standards, often referring to traditional methods or widely accepted technologies.
- Moving or extending in a direction parallel to the surface or side.
- A device used to inject or withdraw fluid, often found in medical or laboratory environments.
- Expressing much in few words, especially in communication or technical documentation.
- Hydraulic fracturing, a method to extract oil or gas from the earth by breaking rock layers with fluid pressure.
- The distance between successive peaks of a wave, often related to light or sound.
- Having equal value, function, or meaning in a technical context, such as electrical or mechanical equivalence.
- To make impure by exposure to or addition of unwanted substances, relevant in contexts like data or chemical purity.
Down
- Inactive but capable of becoming active
- Focused or aligned along a specific direction, often used in antenna or signal technologies.
- Capable of being controlled or directed, often used in relation to antennas or vehicles.
- The delay before a transfer of data begins following an instruction, commonly in network or computing systems.
- To fail to notice or account for, often referring to missing critical details in analysis.
- Featuring new methods or ideas that introduce improvement or change in technology or processes.
- Comprising light or radiation of a single wavelength or color.
- To pose a risk or potential harm, often in cybersecurity or environmental contexts.
- To increase the strength of a signal, sound, or electrical current.
18 Clues: Inactive but capable of becoming active • Comprising light or radiation of a single wavelength or color. • Moving or extending in a direction parallel to the surface or side. • To increase the strength of a signal, sound, or electrical current. • The distance between successive peaks of a wave, often related to light or sound. • ...
Technology 2023-06-14
Across
- A technology that creates a computer-generated environment, simulating a realistic experience.
- A machine that can store, process, and retrieve information, and perform various tasks.
- The process of creating instructions for computers to follow, often using programming languages.
- Measures and practices to protect computer systems and networks from unauthorized access or attacks.
- A mobile phone that can also perform functions similar to a computer, such as internet browsing.
- The development of computer systems that can perform tasks that would normally require human intelligence.
- Information that is stored and processed by computers, often in the form of numbers or text.
- The physical components of a computer or electronic device, such as the processor or screen.
Down
- The use of remote servers to store, manage, and process data over the internet, rather than locally.
- The process of converting information into a secret code to prevent unauthorized access.
- Relating to information that is stored and processed in a digital format, such as digital photos or music.
- The branch of technology that deals with the design, construction, and operation of robots.
- The process of transmitting or receiving multimedia content, such as videos or music, over the internet.
- A global network that connects computers and allows people to access and share information.
- Programs or applications that run on a computer or smartphone, providing specific functionalities.
- The act of playing electronic games, often on a computer or gaming console.
16 Clues: The act of playing electronic games, often on a computer or gaming console. • A machine that can store, process, and retrieve information, and perform various tasks. • The process of converting information into a secret code to prevent unauthorized access. • The branch of technology that deals with the design, construction, and operation of robots. • ...
CNB Employee Community Banking Month Crossword 2023-04-18
Across
- KnowBe4 allows us to offer free ____________ training to all our customers.
- The Videos section of our website features Customer ______________. They’re also featured on our YouTube channel.
- CNB currently has _____________________ branch locations through Ohio.
- In 1920, Citizens National Bank opened its doors and gave everyone an ___________ in appreciation for stopping by.
- Each year, CNB offices host Community Shred Day on the last _____________ of April.
- CNB was recently named one of the Top 50 Community Banks in the _______________.
- Customers may enter in person or ____________ to win a Community Gift Basket, which includes items from each of our markets, valued at more than $150.
- The CNB ____________ Club was re-introduced this year, offering the opportunity for employees to donate resources and time to charity.
- Our Financial _________________ Sweepstakes runs through May 31st and offers the chance to win $2000 for using bill payment products.
- If someone is interested in retirement accounts or investment opportunities, they can speak with someone from Citizens ____________ Management Group.
Down
- The Executive Newsletter is geared towards ___________________, providing information for owners and managers.
- Both the Free Checking and Go ________________ Account can be opened completely online through our website.
- In 2022, CNB ____________ more than $180,000 to local schools and organizations.
- Our _____________________ newsletter offers personal finance information and info about CNB.
- We offer many financial ___________________, including mortgage, investment, loan/credit card, on our website under the Resources tab.
- CNB Visa Credit Card customers can earn 5x points through the end of June at Home ____________ stores, such as Lowe’s.
16 Clues: CNB currently has _____________________ branch locations through Ohio. • KnowBe4 allows us to offer free ____________ training to all our customers. • In 2022, CNB ____________ more than $180,000 to local schools and organizations. • CNB was recently named one of the Top 50 Community Banks in the _______________. • ...
Cybersecurity Fundamental Chapter 8 Part 2 2024-06-05
Across
- The process of distributing and applying updates to software to fix known vulnerabilities.
- The practice of protecting information by mitigating information risks, ensuring the confidentiality, integrity, and availability of data.
- The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
- The process of addressing and managing the aftermath of a security breach or cyberattack.
- Adhering to regulations, standards, and best practices designed to protect information systems and data.
Down
- A proactive system that detects and prevents identified threats from infiltrating a network
- The act of scanning a network to discover active devices, open ports, and potential vulnerabilities.
- An incident where information is accessed without authorization, leading to potential exposure or theft of sensitive data.
- Technology used to screen and exclude access to certain types of content deemed inappropriate or harmful.
- The process of evaluating and choosing among alternatives in a manner consistent with ethical principles.
- A system that monitors network traffic for suspicious activity and potential threats
- The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources.
12 Clues: A system that monitors network traffic for suspicious activity and potential threats • The process of addressing and managing the aftermath of a security breach or cyberattack. • The process of distributing and applying updates to software to fix known vulnerabilities. • ...
internet basics 2024-01-18
Across
- A global network of interconnected computers that enables the sharing of information and resources.
- Media: Online platforms that enable users to create and share content, communicate, and connect with others.
- To transfer data from a local device to a remote server over the internet.
- A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
- Electronic mail that allows users to send and receive messages and files over the internet.
- A
- The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
- To transfer data from a remote server to a local device over the internet.
Down
- Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
- Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
- The buying and selling of goods and services over the internet.
- Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
- A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
- Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
14 Clues: A • The buying and selling of goods and services over the internet. • To transfer data from a local device to a remote server over the internet. • To transfer data from a remote server to a local device over the internet. • Electronic mail that allows users to send and receive messages and files over the internet. • ...
FITDVocab.MS 2013-05-15
Across
- Where you would plug in games, keyboard, and a mouse
- Where you would plug in a flash drive
- The way things are arranged
- A brief description of your self you would fill out in you were applying for a job or a school
- Upgrade your computer
- A picture owned by a company
- An app that you can download
- 1,000 zettabytes
- Parts that let you control your computer
- Protect information and networks
- Screen
- A cloud based software the uses one canvas instead of traditional slides
- a port that allows a computer to connect to a network
- 8 bits
- 1,000 exabytes
- Is the newer and more common type of clock
- The shape or size of a document or something you can customize
- 1,000 petabytes
- a port for headphones
- Is the older type of clock
- Service Set Identifier
- 1,000 megabytes
Down
- A readable file
- A selection of drawing or editing tools on a program
- A phrase or word owned by a company
- An object on a computer that stores data or docs.
- An already made design for a document
- PC-Windows/Mac-Osx
- A device that is mobile
- device that makes it possible to transmission of data
- A place you can save docs and use anywhere
- 1,000 gigabytes
- 1,000 kilobytes
- Way you behave online
- 1,000 yottabytes
- Rules and behavior to keep your computer safe
- 1,000 brontobytes
- Heart of the computer
- 1,000 terabytes
- Central Processing Unit
- Long term memory
- Short term memory
- Comcast
- 1,000 bytes
- wireless Fidelity
- The first and smallest data storage
46 Clues: Screen • 8 bits • Comcast • 1,000 bytes • 1,000 exabytes • A readable file • 1,000 gigabytes • 1,000 kilobytes • 1,000 terabytes • 1,000 petabytes • 1,000 megabytes • 1,000 zettabytes • 1,000 yottabytes • Long term memory • 1,000 brontobytes • Short term memory • wireless Fidelity • PC-Windows/Mac-Osx • Upgrade your computer • Way you behave online • Heart of the computer • a port for headphones • ...
FIT_ Vocab.MGB 2013-05-16
Across
- the heart of a computer
- a plan or design
- zoomable online presentation program
- a written document of what experience you have
- the right to make copies
- things you download onto your computer, phone, or pad
- protection of information on the internet
- it sends the user requests for other search engines
- a navigation tool that you use to go on websites
- a three folded pamphlet that tells about a company
- a file format that is meant for pictures
- somewhere where you can see the format of a doc
- things that have to do with a computer
- an internet provider
- a template that you can type on easily
- the act to induct into office
- a motto or something a company says to get your attention
- wireless internet
- something you plug into your computer
- to restart your computer
- flash drive mouse keyboard
- a name, symbol, or trademark
- a program that controls a display for the user
- random memory for your computer
- smallest unit of data on a computer
Down
- the arrangement of data on a document
- someone who sells space for websites
- a file having a present format
- the setup of a computer
- wired internet
- Google Bing! Yahoo
- something you can create on
- the rules or behavior to keep you safe online
- how to act online
- a online memory storing device that can be accessed anywhere
- iphone droid blackberry
- to tell people about someone's product or service
- the main processing unit
- a device that shows information
- wireless networking tech
- to help a company grow
- word excel powerpoint
- a company that helps keep you safe online
43 Clues: wired internet • a plan or design • how to act online • wireless internet • Google Bing! Yahoo • an internet provider • word excel powerpoint • to help a company grow • the heart of a computer • the setup of a computer • iphone droid blackberry • the right to make copies • the main processing unit • to restart your computer • wireless networking tech • flash drive mouse keyboard • ...
Tech puzzle 2023-03-02
Across
- Primary memory is also known as _______ memory.
- What is a document sent with with an email message called?
- ________________ hyperlink is a saved link to a particular web page.
- Which technology is used in Brahmastra movie?
- Visual display unit is also called _____________
- Protection of computer system and information from harm theft and unauthorised use.
- _______is considered as one of the universal gates.
- The primary component of a computer that acts as its “control center.”
- An incredibly powerful tool used to get meaning out of vast amounts of data
- The initial program that runs when a computer is powered up or rebooted.
- ___________ computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- What’s the name of Tony Stark’s computer that features advanced artificial intelligence?
Down
- A chatbot developed by openAI and launched in November 2022
- _________ protects your computer from viruses and hackers
- _______________ reality is the integration of digital information with live video.
- What is temporarily stored on your computer?
- What technology was used in avengers end game?
- go Give one example of a game that used unity and C#
- A software program that allows you to surf the web.
- _______ is the way of sending messages over the Internet.
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- What is the #1 social media app?
- What protects your computer from hackers?
- call An interrupt triggered by a software.
- Smallest unit of measurement in computing
25 Clues: What is the #1 social media app? • What protects your computer from hackers? • Smallest unit of measurement in computing • call An interrupt triggered by a software. • What is temporarily stored on your computer? • Which technology is used in Brahmastra movie? • What technology was used in avengers end game? • Primary memory is also known as _______ memory. • ...
UPC 2023-04-23
Across
- The act of buying or selling goods or services online
- The process of protecting computer systems and networks from unauthorized access
- A software program used to create and edit digital images
- The amount of money required to start or operate a business
- A person who starts and runs a business
- The act of selling goods or services to another country
- A written agreement between two or more parties
- The process of promoting a product or service through paid advertising
- The difference between a company's assets and liabilities
- A software program that performs a specific task
- A type of authentication that uses a physical characteristic of the user, such as a fingerprint or iris scan
Down
- A type of legal protection for creative works
- A type of software used to create and edit spreadsheets
- A system of record-keeping and financial reporting for businesses
- A programming language used to create web pages and web applications
- A system used to store and organize data
- The process of bringing a new product or service to market
- The process of converting raw materials into finished goods
- A network of computers that allows users to share resources and information
- A type of software that provides security for a computer network
- The process of finding and fixing errors in code
- The total amount of money a company has made from its operations
- A type of software that translates computer code into machine-readable instructions
- The act of purchasing goods or services from another country
- A program that protects a computer from viruses and other malicious software
25 Clues: A person who starts and runs a business • A system used to store and organize data • A type of legal protection for creative works • A written agreement between two or more parties • The process of finding and fixing errors in code • A software program that performs a specific task • The act of buying or selling goods or services online • ...
AP Computer Science Review 2021-05-24
Across
- manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation
- the use of a computer to represent the dynamic responses of one system by the behavior of another system modeled after it.
- a whole number
- a technique that attempts to trick a user into providing personal information
- data about data.
- software intended to damage a computing system or to take partial control over its operation
- a detailed yet readable description of what a computer program or algorithm must do.
- measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
- the delay between a user's action and a web application's response to that action
- the process of decoding data.
- is the practice of obtaining input or information from a large number of people via the Internet.
- study of securing (or encrypting) information such that it is inaccessible by third parties.
Down
- transmission of data from one computer to another, or from one device to another.
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- the ability to limit access to information to a certain set of users.
- either true or false.
- a base-16 number system.
- the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
- the process of encoding data to prevent unauthorized access.
- a network of servers that track the IP addresses of different domain names like “example.com”
- a base-2 number system.
21 Clues: a whole number • data about data. • either true or false. • a base-2 number system. • a base-16 number system. • the process of decoding data. • the process of encoding data to prevent unauthorized access. • the ability to limit access to information to a certain set of users. • a technique that attempts to trick a user into providing personal information • ...
BRIANA & MATTHEW 2022-05-26
Across
- city where Briana’s first project as Construction PM was located
- Name of restaurant the couple went to on their first date (note: they ate in the car because they were running late to the movie)
- The ______: the nickname given to the house in which Matthew lived during his junior year of college
- name Matthew called Briana until they started dating
- winter sport Matthew helped to teach Briana
- TV show the couple has watched at least 7 times through
- City where the couple got engaged; beach town Briana visited with her dad during summers
- City in which Matthew lived at the time the couple adopted their eldest dog
- Briana’s nickname for Matthew
- acronym of the college Briana attended for undergraduate and Matthew attended for graduate
- college Matthew attended for his undergraduate degree
- city the couple first officially lived together
- Full name of the couple’s eldest dog
- city the couple currently live in
- matthew’s eye color
Down
- type of engineering Briana studied in college
- The couple’s favorite football team
- Sport Briana played in high school
- Matthew’s undergraduate degree was for _____ _____ engineering
- City in Arizona where both Briana and Matthew lived when they met
- name of the junior high school the couple attended together
- During college, Briana worked at this LA landmark as a research library and archives assistant
- State in which Matthew was born and lived until the family moved to Arizona
- mascot of the high school the couple attended together
- Sport Matthew played in high school and college
- Name of the couple’s youngest dog
- matthew’s favorite cuisine
- number of countries they have visited together (US not included)
- briana’s eye color
29 Clues: briana’s eye color • matthew’s eye color • matthew’s favorite cuisine • Briana’s nickname for Matthew • Name of the couple’s youngest dog • city the couple currently live in • Sport Briana played in high school • The couple’s favorite football team • Full name of the couple’s eldest dog • winter sport Matthew helped to teach Briana • ...
Customer Service Week Crossword 2023-10-03
Across
- Closing a _________ closes all the children.
- a holiday for us but not for financial institutions
- email address for notification intended for all employees
- __________ Expertise Efficiency. Every day. Every time.
- set your Non-Ready code to this 15 minutes prior to leaving to complete any end of day tasks.
- Teams channel for technical and non-technical information that everyone should be aware of
- actions you take to resolve an issue that should be documented in the ticket
- Not-Ready code to be used for time spent investigating an open ticket while the customer is not on the phone
- takes calls during non-staffed hours
- updates to major system outages should be sent at least _________
- The ________ Email Report Template is used to document suspicious emails reported by users.
- used for instant messaging
- ticket management tool used by the Support Center
Down
- _________ Downtime procedures should be followed for outages of any major system in the BEPC environment.
- the on-call contact should be notified off issues needing immediate attention even during _________ hours.
- An engineering contact during non-staffed hours
- call center front end used by Support Center to take calls
- considered a major system in the BEPC environment
- If it’s not in the _______, it didn’t happen.
- a problem with a major system impacting multiple users or departments
- required monthly cybersecurity training
- SysAid template to be used for any caller who reports to Jolene Johnson
- subject line tag for notifications that application or system has resumed normal operations
- “Done” is never an acceptable one.
- Send a ticket to ________ Support if no SA group exists for that software.
25 Clues: used for instant messaging • “Done” is never an acceptable one. • takes calls during non-staffed hours • required monthly cybersecurity training • Closing a _________ closes all the children. • If it’s not in the _______, it didn’t happen. • An engineering contact during non-staffed hours • considered a major system in the BEPC environment • ...
hi 2022-09-28
Across
- A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
- A generic term encompassing decode and decipher
- Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
- Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
- The service provider for CrowdStrike's internal training courses
- The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
- Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
- CrowdStrike's CEO and co-founder; abbr
- The property of being accessible and usable upon demand
- Computer compromised with malicious code; used by a threat actor to perform remote commands
- Hosting city of Fal.Con; abbr
- Someone who uses a social network to create an account with a fake identity to deceive an individual
- Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
- As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
- System of prevention and recovery from potential threats to a business; abbr
- As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- An unauthorized user who attempts to or gains access to an information system
- Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
- CrowdStrike's annual cybersecurity convention; "___.Con"
- Software that compromises the operation of a system by performing an unauthorized function or process
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
- Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
- A way to take advantage of a vulnerability in software
- A cybersecurity company
- The generic term encompassing encipher and encode
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- The process of verifying the identity or other attributes of an entity
Down
- Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
- A denial of service technique that uses numerous systems to perform the attack simultaneously
- A recognizable, distinguishing pattern; typically used to sign documents
- Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
- Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
- Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
- Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
- ___-Party Information
- Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
- A capability to limit network traffic between networks and/or information systems
- Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
- In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
- The process of transforming plaintext into ciphertext
- Type of analysis that determines what levels of impact to a system are tolerable; abbr
- Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- CrowdStrike threat hunting team
- Intranet webpage for all things CrowdStrike-related; abbr
- Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
- Cryptographic network protocol for operating network services securely over an unsecured network; abbr
- A dishonest scheme; a fraud
- CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
- Short form for "cryptography"
- When someone uses a social network to create an account with a fake identity to deceive a concrete person
- The process of transforming ciphertext into its original plaintext
- Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
- Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
- Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
- Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms
61 Clues: ___-Party Information • A cybersecurity company • A dishonest scheme; a fraud • Hosting city of Fal.Con; abbr • Short form for "cryptography" • CrowdStrike threat hunting team • CrowdStrike's CEO and co-founder; abbr • A generic term encompassing decode and decipher • The generic term encompassing encipher and encode • The process of transforming plaintext into ciphertext • ...
FITDVocabulary.lm 2013-05-15
Across
- the way you behave online
- the design of a document
- things that your computer needs
- computer plug-ins
- selling of a company
- rtf
- LCD
- campaigning for a company
- a more modern version of power point
- doc.
- standards that a product must meet
- how secure you and your computer is while online
- a giant search engine
- ipad, cellphone
- a website with tips that help keep you safer while online
- what a president says when elected
- ISP
- an area where you plug in a cord to give you internet access
- a booklet representing a company
- a sign/symbol that represents a business
- credit for an author or writer
- a form you turn into a business
- where you put your CD's
- additional hardware for a computer (needed for gamers)
- an online flash drive
Down
- web
- LED
- the second smallest form of storage
- a device that gives out
- a computer's short term memory
- where you plug in your headphones
- wireless internet
- an internet hosting service that lets people and organizations have internet
- a tool that allows you to have access to the internet
- the smallest form of storage
- start up
- a device that gives in
- an option for a document's layout
- extra things for a computer
- VDU
- CPU
- word, pages
- "talking up" a company
- a service that is able to be downloaded for pleasure
- being safe online
- a patent on writing
- brain of the computer
- a catch phrase that helps you remember a business
50 Clues: web • LED • pdf • rtf • LCD • ISP • VDU • CPU • doc. • google • start up • word, pages • ipad, cellphone • computer plug-ins • wireless internet • being safe online • a patent on writing • selling of a company • a giant search engine • brain of the computer • an online flash drive • a device that gives in • "talking up" a company • a device that gives out • where you put your CD's • the design of a document • ...
RU ITEC411-Crime and Security 2022-10-16
Across
- gaining unauthorized access to data in a system or computer
- software that allow future access to a computer system by bypassing the normal layers of security.
- can infect computers but does not need to attach itself to a program and is designed to exploit specific system flaws.
- biological characteristics unique to an individual
- criminal activity that involves the use of a computer r a network
- person that uses their technical knowledge to break into a computer system or network by no standard means.
- irrelevant or inappropriate messages sent in bulk to recepients
- malware that can monitor or record victim's activities on a computer or mobile phone
- group of internet connected devices each of which runs one or more bots.
- use of computers or computer network techniques such as hacking to promote political agenda
- the assurance that private data will remain private
Down
- sending fraudulent text messages on purpose appearing to come from reputable and legit companies
- the assurance that data will not change without authorization
- malware that blocks access to data or threatens to publish it unless a ransom is paid.
- recording devices inside credit card readers to collect credit card numbers and PINs.
- converting information into secret code that hides the meaning of the information
- protection of computer systems and networks from information theft or hardware damage.
- the way in which thieves collect personal data by luring the victims to fake websites
- sending deceiving emails in order to obtain sensitive personal information from the victim
- malicious computer worm that targets a specific type of control system
- software designed intentionally to be intrusive and destructive to a computer or network
- software that attaches itself to other software and spreads when someone runs an infected program.
22 Clues: biological characteristics unique to an individual • the assurance that private data will remain private • gaining unauthorized access to data in a system or computer • the assurance that data will not change without authorization • irrelevant or inappropriate messages sent in bulk to recepients • criminal activity that involves the use of a computer r a network • ...