cybersecurity Crossword Puzzles
Tech puzzle 2023-02-26
Across
- A software program that allows you to surf the web
- reality ____________ reality is the integration of digital information with live video
- Give one example of a game that used unity and C#
- What protects your computer from hackers
- Primary memory is also known as _______ memory
- the primary component of a computer that acts as its “control center.”
- _______ is the way of sending messages over the Internet
- What technology was used in avengers end game
- Which technology is used in Brahmastra movie
- Protection of computer system and information from harm theft and unauthorised use
- what’s the name of Tony Stark’s computer that features advanced artificial intelligence
- Smallest unit of measurement in computing
Down
- RAM stands for _______ access memory
- The initial program that runs when a computer is powered up or rebooted
- Visual display unit is also called
- What is a document sent with with an email message ?
- This number system has a base 8
- What is the #1 social media app
- Is temporarily stored on your computer
- Terminates the loop statement and transfers execution to the statement immediately following the loop.
- _______is considered as one of the univerals gates.
- computing the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- _________________ protects your computer from viruses and hackers
- An incredibly powerful tool used to get meaning out of vast amounts of data
- A chatbot developed by openAI and launched in November 2022
- An interrupt triggered by a software
- Hyperlink is a saved link to a particular web page
27 Clues: This number system has a base 8 • What is the #1 social media app • Visual display unit is also called • RAM stands for _______ access memory • An interrupt triggered by a software • Is temporarily stored on your computer • What protects your computer from hackers • Smallest unit of measurement in computing • Which technology is used in Brahmastra movie • ...
Envision Crossword 2024-02-29
Across
- : Who famously exclaimed "Eureka!" when he discovered the principle of buoyancy while taking a bath?
- : What term describes a startup company valued at over $1 billion?
- : What mountain range serves as a natural barrier between Italy and Switzerland?
- : What geological feature erupts molten rock, ash, and gases from beneath the Earth's surface?
- : What branch of mathematics deals with symbols and the rules for manipulating those symbols?
- : Which prolific composer from the Classical era created over 600 works, including operas, symphonies, and concertos?
- : What field focuses on protecting computer systems, networks, and data from unauthorized access or attacks?
- : What is the planned sequence of learning experiences designed to achieve specific educational goals?
- : What city in Japan was devastated by the first wartime use of an atomic bomb?
- : Who proposed the concept of the "Neuralink," a brain–computer interface technology?
Down
- : What term refers to the process of designing, launching, and running a new business?
- : Who is the protagonist of a popular anime series about a young ninja striving for recognition and aiming to become the strongest ninja in his village?
- : What traditional teaching tool consists of a dark surface on which teachers can write with chalk?
- : What is a set of instructions designed to perform a specific task?
- : What sport is traditionally played with an oval-shaped ball?
- : What area of the school provides meals and a place for students to eat?
- : Who developed the theory of special relativity, which describes the relationship between space and time?
- : What is the first and most well-known cryptocurrency?
- : What term refers to ownership interest in a company, typically represented by shares of stock?
- : Which tennis tournament is played on grass courts?
20 Clues: : Which tennis tournament is played on grass courts? • : What is the first and most well-known cryptocurrency? • : What sport is traditionally played with an oval-shaped ball? • : What term describes a startup company valued at over $1 billion? • : What is a set of instructions designed to perform a specific task? • ...
technology and innovation vocabulary for IELTS bumper crossword (2) www.atomicielts.com 2024-09-01
Across
- to go -----; spreading quickly and widely on the internet (5)
- data-driven decisions are decisions or ------- based on data analysis (7)
- ----- computing; using the internet to store and access data and programs (5)
- e-learning is learning conducted via electronic media, typically on the --------(8)
- growing --------; when more and more people are becoming curious or involved in something (8)
- research methodology; the ------- or methods used in research (7)
- automation ------; the effect of using machines and technology to do jobs once done by people (6)
- digital --------; the ability to use technology and understand digital information (8)
- different forms of content like text, video, and audio together (10)
Down
- proving that something is true or meets a standard (10)
- ----- technology; technology that is environmentally friendly (5)
- a digital record of transactions that is secure and cannot be changed (10)
- user -------- designs; designing products with the needs of the user in mind (7)
- cybersecurity is protecting --------- and data from theft or damage (9)
- ------- transformation; the use of technology to change how a business or society operates (7)
- ----- cities; cities that use technology to improve services and quality of life (5)
- to change something in a big way (9)
- --------- biology is creating new biological parts or systems that do not exist in nature (9)
- pharmacogenomics is how a person’s ----- affect their response to drugs (5)
- ------- concerns are worries about how personal information is used or shared online (7)
- telecommuting is working from home using the internet to connect with the office (4)
- gene ------- is creating new biological parts or systems that do not exist in nature (7)
22 Clues: to change something in a big way (9) • proving that something is true or meets a standard (10) • to go -----; spreading quickly and widely on the internet (5) • ----- technology; technology that is environmentally friendly (5) • research methodology; the ------- or methods used in research (7) • different forms of content like text, video, and audio together (10) • ...
Technology crossword. 2023-06-07
Across
- standardized as ISO 32000, is a file format developed by Adobe in 1992 to present documents, including text formatting and images
- is a method of representing data in a visual, machine-readable form
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- are small blocks of data created by a web server while a user is browsing
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information,
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain (for example, a range of integers) to bits.
- is a bitmap image format that was developed by a team at the online services
- is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
- is a commonly used method of lossy compression for digital images
- Android is a mobile operating system
Down
- is an American multinational technology company
- is a hardware or software component that stores data so that future requests for that data can be served faster;
- also called a central processor or main processor
- is a collection of discrete values that convey information
- represents text, computer processor instructions, or any other data using a two-symbol system.
- is the protection of computer systems and networks
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
- is a method of transmitting and receiving messages using electronic devices.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device
20 Clues: Android is a mobile operating system • is an American multinational technology company • also called a central processor or main processor • is the protection of computer systems and networks • is a collection of discrete values that convey information • is a commonly used method of lossy compression for digital images • ...
Data Protection 2022-09-19
Across
- To gather compromised information and/or defense secrets
- Individuals who want to attack computers yet lack the knowledge
- Following a victim with authorized credentials through a door or other secure building access point
- Data at rest
- Visually capturing logins or passwords or other sensitive information over someone's ______ while using a computer.
- Designed to hold a computer system or the data it contains captive until a payment
- A security breach can have a negative long-term impact on an organization’s _________
- More targeted version of the phishing
- Employees, contract staff or trusted partners
- Telling a computer to perform some task using CLI
- Cyberwarfare can destabilize a nation
Down
- an attacker establishes trust with their victim by impersonating persons who have right-to-know authority
- Preventing unwanted changes or alteration
- Network, Devices, Power Grid, Roads
- Data traveling between information systems
- A broad range of malicious activities accomplished through psychological manipulation of people into performing actions or divulging confidential information.
- Core Principles of Cybersecurity
- Get victims to click on links to malicious websites, open attachments that contain malware or reveal sensitive information.
- Using technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services
- Amateurs or skilled attackers outside of the organization
- Data developed around the user without their express input, usually generated based on search histories, content consumption, purchases, and social media activity
- Breaks into networks or computer systems to identify and improve any weaknesses
- Technique used on unshredded documents
- Make political statements in order to raise awareness about issues
- Using a false promise to gain a victim’s interest to lure them into a trap that steals their personal information or infects their systems
25 Clues: Data at rest • Core Principles of Cybersecurity • Network, Devices, Power Grid, Roads • More targeted version of the phishing • Cyberwarfare can destabilize a nation • Technique used on unshredded documents • Preventing unwanted changes or alteration • Data traveling between information systems • Employees, contract staff or trusted partners • ...
BUAW Crossword 2024-11-12
Across
- The act of adhering to laws, regulations, and standards.
- An official examination and verification of financial accounts and records.
- A portion of a company's earnings distributed to shareholders.
- Any individual or group that has an interest in the operations of a business.
- The act of reporting illegal or unethical practices within an organization, often to an external body or regulatory agency.
- The process of distributing decision-making power away from a central authority to smaller, localized units.
- A digital or virtual currency that uses cryptography for security.
- A method for identifying and assessing risks through Threat, Assessment, Risk, and Action.
- A business structure where two or more individuals share ownership and responsibility.
- The process of creating a unique identity for a product or company in the marketplace.
- The practice of conducting business in an open and accountable manner.
- The ability to maintain or improve business operations without depleting natural resources.
- A market structure dominated by a small number of large firms, leading to limited competition.
Down
- A market state where supply and demand are balanced.
- A company’s financial obligations or debts.
- The combination of two or more companies into one entity.
- The availability of assets to meet short-term obligations
- The value of ownership interest in a business, after liabilities are subtracted.
- Financial assets used by a business to fund its operations and growth.
- A decentralized digital ledger technology used for secure, transparent transactions, often associated with cryptocurrency.
- The practice of contracting external parties to perform business functions or services.
- The practice of protecting computer systems and networks from digital threats such as hacking, malware, and data breaches.
- Rules or laws created to control or govern business practices.
23 Clues: A company’s financial obligations or debts. • A market state where supply and demand are balanced. • The act of adhering to laws, regulations, and standards. • The combination of two or more companies into one entity. • The availability of assets to meet short-term obligations • A portion of a company's earnings distributed to shareholders. • ...
The Internet Crossword 2024-01-23
Across
- wide web a system of interconnected public web pages accessible through the Internet
- abbreviation away from keyboard
- a set of computers sharing resources located on or provided by network codes
- facts provided or learned about something or someone
- The maximum amount of data transmitted over an internet connection in a given amount of time.
- Chip A set of microminiaturized electronic circuits fabricated on a thin slice of semiconductor material.
- electronic technology that generates, stores and processes data
- abbreviation for "for your information."
- the application of scientific knowledge for practical purposes, especially in industry
- conduct electricity and provide a low-resistance path for electricity to flow through
- information that is set up for easy access, management and updating.
- engine, coordinated set of programs that searches for and identifies items in a database that match
- facts and statistics collected together for reference or analysis
- search for information on the internet using the search engine Google
- an electronic device for storing and processing data
- an application, especially as downloaded by a user to a mobile device
- a computer program which manages access to a centralized resource or service in a network.
- the state of being protected against the criminal or unauthorized use of data
- text files with small pieces of data like a username and password
- abbreviation for non-player character
- abbreviation for frequently asked questions
- spot a physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network
- abbreviation for By The Way
- the default or front page of a site.
Down
- a device having or operating with the aid of many small components
- an individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- the process of scrambling or enciphering data so it can be read only by someone with the means to return it to its original state
- A newb or newbie; refers to the idea that someone is new to a game, concept, or idea; implying a lack of experience.
- a software application that runs automated tasks (scripts) on the Internet.
- A protected/private string of letters, numbers, and/or special characters used to authenticate an identity or to authorize access to data.
- relating to mobile phones, handheld computers, and similar technology
- an act of logging in to a computer, database, or system
- a type of communications technology that allows voice calls and other telephony
- something that can be done or seen using computers or the internet
- a set of related web pages located under a single domain name
- relating the culture of computers, information technology, and virtual reality
- a frequently updated web page used for personal commentary or business content
- an information system that enables content sharing over the Internet
- Room an online platform that enables users to communicate with each other in real time
- social media sites, applications, or accounts
- a computer program for displaying and navigating between web pages
- complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it
- an insulated wire or wires having a protective casing and used for transmitting electricity
- a worldwide system of computer networks
- a web services provider that offers both a search engine and a directory of World Wide Web pages organized in a hierarchy of topic categories
- computer network security system that restricts internet traffic in, out, or within a private network
- the largest vendor of computer software in the world
- abbreviation which means estimated time of arrival or the time you expect to arrive.
- the application of scientific knowledge for practical purposes, especially in industry
- The technology of transmitting audio and video files
- a unique address that identifies a device on the internet or a local network
51 Clues: abbreviation for By The Way • abbreviation away from keyboard • the default or front page of a site. • abbreviation for non-player character • a worldwide system of computer networks • abbreviation for "for your information." • abbreviation for frequently asked questions • social media sites, applications, or accounts • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-26
Across
- Something that secures or makes safe; protection; defense.
- The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
- Intending or intended to do harm.
- Exposure to the chance of injury or loss.
Down
- To try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one.
- The act or a result of breaking.
- Malware planted illegally in a computer or mobile device that disables its operation or access to its data until the owner or operator pays to regain control or access.
- A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.
8 Clues: The act or a result of breaking. • Intending or intended to do harm. • Exposure to the chance of injury or loss. • Something that secures or makes safe; protection; defense. • A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network. • ...
Cybersecurity Awareness Puzzle 2 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cyber Security Awareness 2018-06-05
Across
- Be careful connecting to public _____.
- is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system
- unsolicited usually commercial messages (such as e-mails or text messages) sent to a large number of recipients
- shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network
- What month is National Cyber Security Awareness Month?
- True/False: Call I.T. Service desk right away when you suspect a phishing email
Down
- is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rule
- techniques of protecting computers, networks, programs and data from unauthorized access or attacks
- a secret word or expression used by authorized persons to prove their right to access, information, etc.
- when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information
- type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access
- is designed to spread from host to host and has the ability to replicate itself, through a file or document, without permission or knowledge of the user
12 Clues: Be careful connecting to public _____. • What month is National Cyber Security Awareness Month? • True/False: Call I.T. Service desk right away when you suspect a phishing email • techniques of protecting computers, networks, programs and data from unauthorized access or attacks • ...
hi 2022-09-28
Across
- A security strategy focused on detecting and preventing the loss, leakage or misuse of data through breaches, ex-filtration transmissions and unauthorized use
- A generic term encompassing decode and decipher
- Person or group of persons external to an organization who are not authorized to access its assets and pose a potential risk to the organization and its assets; "___ threat"
- Use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes; "___ engineering"
- The service provider for CrowdStrike's internal training courses
- The processes and specialized techniques for gathering, retaining, and analyzing system-related data for investigative purposes
- Technology that extends a private network and all its encryption, security, and functionality across a public network; abbr
- CrowdStrike's CEO and co-founder; abbr
- The property of being accessible and usable upon demand
- Computer compromised with malicious code; used by a threat actor to perform remote commands
- Hosting city of Fal.Con; abbr
- Someone who uses a social network to create an account with a fake identity to deceive an individual
- Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Ability for an authorized person to access a computer or network from a geographical distance through a network connection: "___ access"
- As part of CrowdStrike's core values, CrowdStrike employees are always "fanatical about the ___"
- System of prevention and recovery from potential threats to a business; abbr
- As part of CrowdStrike's core values, CrowdStrike employees always have a "relentless focus on ___"
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- String of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- An unauthorized user who attempts to or gains access to an information system
- Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information; abbr
- CrowdStrike's annual cybersecurity convention; "___.Con"
- Software that compromises the operation of a system by performing an unauthorized function or process
- An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device
- Certification for demonstrating sufficient knowledge to effectively respond to a detection within the Falcon interface; abbr
- A way to take advantage of a vulnerability in software
- A cybersecurity company
- The generic term encompassing encipher and encode
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- The process of verifying the identity or other attributes of an entity
Down
- Technology that utilizes remote servers in a data-center to store, manage, and process data instead of using local computer systems
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
- A denial of service technique that uses numerous systems to perform the attack simultaneously
- A recognizable, distinguishing pattern; typically used to sign documents
- Keeping careful watch for possible danger or difficulties; "CrowdStrike employees stay ___"
- Collection of hacking tools used to obtain administrator-level access to a computer; "___kit"
- Initiative at CrowdStrike related to cultivating a culture of security in three primary areas: people, facilities, and information; Referred to as, "Security ___"
- Software that is secretly installed into an information system in order to obtain covert information about the user's computer activities
- ___-Party Information
- Introductory course series to CrowdStrike's vision and mission, culture, products, and customers; abbr
- A capability to limit network traffic between networks and/or information systems
- Fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- General term for a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other; "___ in the middle"
- In the CrowdStrike Adversary Universe, adversaries from North Korea are commonly associated with this animal
- The process of transforming plaintext into ciphertext
- Type of analysis that determines what levels of impact to a system are tolerable; abbr
- Software that scans a device or a network to detect security threats, alert users, and neutralize malicious code
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- CrowdStrike threat hunting team
- Intranet webpage for all things CrowdStrike-related; abbr
- Circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact organizational operations, organizational assets, individuals, other organizations, or society
- Cryptographic network protocol for operating network services securely over an unsecured network; abbr
- A dishonest scheme; a fraud
- CrowdStrike feedback program designed to "easily allow for managers and employees to align on performance and developmental goals and how to achieve success in their role"; abbr
- Short form for "cryptography"
- When someone uses a social network to create an account with a fake identity to deceive a concrete person
- The process of transforming ciphertext into its original plaintext
- Acronym for Agent ID; this identifies the unique agent (sensor) once it registers to the cloud
- Certification for demonstrating sufficient knowledge to effectively manage the Falcon platform; abbr
- Term for communities at CrowdStrike with an intended focus on inclusivity; "Employee ___ Groups"
- Computer program that appears to have a useful function, but has a hidden and malicious function that evades security mechanisms
61 Clues: ___-Party Information • A cybersecurity company • A dishonest scheme; a fraud • Hosting city of Fal.Con; abbr • Short form for "cryptography" • CrowdStrike threat hunting team • CrowdStrike's CEO and co-founder; abbr • A generic term encompassing decode and decipher • The generic term encompassing encipher and encode • The process of transforming plaintext into ciphertext • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the prevention of damage to and the protection of computer and information systems and is everyone's responsibility.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the prevention of damage to or the protection of computer and information systems. It is everyone's responsibility!
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points. • ...
Cybersecurity Awareness Month 2023 #InformationSecurityInsights 2023-10-03
8 Clues: Secure data disposal. • Deceptive email attacks. • Adherence to regulations. • Examination for compliance. • Security approach to the left. • Trust model with no implicit trust. • Potential for harm, loss, or breach • Ability to withstand and recover from cyberattacks
Cybersecurity Awareness Puzzle 3 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 5 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 8 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 9 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- Contain tracking information for an individual email
- Fraud like Phishing, but it comes as a text message or SMS
- It is a deceptive scheme or trick used to cheat someone out of something
- It is merely an email trying to convince you to do something
- It is a phone scam designed to get your personal information by impersonating
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- Threat that involves sending email messages with a fake sender address
- It is just like Phishing but it only targets specific individuals within an organization
Down
- is news or knowledge received or given
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- It is a type of email attack where bad people are trying to steal your precious information
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- unsolicited bulk messages normally from people trying to sell something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • unsolicited bulk messages normally from people trying to sell something • ...
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- It is a phone scam designed to get your personal information by impersonating
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- It is a type of email attack where bad people are trying to steal your precious information
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- Fraud like Phishing, but it comes as a text message or SMS
- It is just like Phishing but it only targets specific individuals within an organization
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
Down
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- Threat that involves sending email messages with a fake sender address
- It is news or knowledge received or given
- Unsolicited bulk messages normally from people trying to sell something
- It is merely an email trying to convince you to do something
- Contain tracking information for an individual email
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- It is a deceptive scheme or trick used to cheat someone out of something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: It is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • ...
CSAM Crossword 1 2023-06-26
Across
- Acceptable Use policies often cover bring-your-own-device (or _____) rules as well.
- One way to avoid suspicious popups in your web browser is through the use of a popup _____.
- When it comes to communications made in your name, only _____ are accountable.
- any software designed by cybercriminals to harm or exploit a device or network is called:
- Organizations can monitor your email and _____ while at work.
- You should never leave fresh documents unattended at the _____.
- One of the most common ways to get users to click on bad links is through _____ windows.
- If you find documents at the printer containing sensitive information, you should shred the documents and _____ the incident.
Down
- When posting pictures to social media, make sure no sensitive information can be seen in the _____
- make sure to follow all organizational _____ when reporting suspicious behavior
- You should never _____ links that you don't recognize; this applies to personal and professional settings.
- The quickest way to verify if an email from a coworker is phishing, is to _____ the coworker on the phone and confirm the details of the email.
- When you give an app permission to access your social media profile, it can attain any of the _____ you share.
- Personal devices can be used for work only if it complies with the _____ use policy.
- Never share sensitive, personal, or organizational information over _____ wifi networks.
- One of the best cybersecurity practices for making a new password is to never _____ old passwords
- if you receive an email that you suspect to be fishing, you should notify your IT _____ department
17 Clues: Organizations can monitor your email and _____ while at work. • You should never leave fresh documents unattended at the _____. • When it comes to communications made in your name, only _____ are accountable. • make sure to follow all organizational _____ when reporting suspicious behavior • ...
Digital Transformation Crossword 2018-04-02
Across
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- Intelligence demonstrated by machines
- The protection of computer systems from the theft and damage
- A cross-channel business model and content strategy that companies use to improve their user experience
- The range of interactions that patients have with the health care system, including their care from health plans
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- The practice that aims at unifying software development and software operation
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- Computer oriented crime
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
Down
- Websites and applications that enable users to create and share content or to participate in social networking
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- Enhancing healthcare delivery and support using telecommunications technologies
- Creating relevant and consistent connections between offline and online media in real time
- The intersection of marketing and technology in today's highly digital business world
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
Champions Site Trivia 2023-03-15
Across
- How many “Infosec champion newsletter” entries were sent in 2022 (Write your answer in words with no space)
- What session was conducted by Kenneth Baron for Capability & Build Session for June’2022 (Write your answer with no space)
- At what level an Infosec champion will get an opportunity to have a tea/coffee with the Infosec leadership(Sriram Lakshmanan)
- How many influencers do we have in the Infosec Champions program (Write your answer in words with no space)
Down
- Who was invited in Cybersecurity podcast series to joined us to discuss on – “The effect of human behavior in cyber" (Write your answer in words with no space)
- Beware of any unsolicited caller who asks for sensitive information like _ . (Write your answer in words with no space)
6 Clues: How many “Infosec champion newsletter” entries were sent in 2022 (Write your answer in words with no space) • How many influencers do we have in the Infosec Champions program (Write your answer in words with no space) • Beware of any unsolicited caller who asks for sensitive information like _ . (Write your answer in words with no space) • ...
Cybersecurity Awareness month at Kent! 2024-10-14
Across
- Sense created by the attacker to make you react quickly without thinking.
- When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
- Software attack method to harm or exploit a device or network.
- Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
- Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
- An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
- Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
- The address of a webpage which you check the validity of before clicking it. (Acronym)
8 Clues: Software attack method to harm or exploit a device or network. • Sense created by the attacker to make you react quickly without thinking. • The address of a webpage which you check the validity of before clicking it. (Acronym) • Additional layer of security that verifies a user's access to an account more than once. (Acronym) • ...
SET 5 2023-01-22
Across
- Programming language whos design turned out to be general enough to address a wide variety of domains but slow in execution
- The practice of protecting computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction
Down
- A set of step-by-step instructions for solving a problem or completing a task, like a recipe for cooking a meal
- A component of a computer that controls its performance, like the foreman of a construction site, it supervises the work of all the other parts
- A network of remote servers that are used to store, manage, and process data
5 Clues: A network of remote servers that are used to store, manage, and process data • A set of step-by-step instructions for solving a problem or completing a task, like a recipe for cooking a meal • Programming language whos design turned out to be general enough to address a wide variety of domains but slow in execution • ...
Digital Transformation Crossword 2018-04-02
Across
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- The intersection of marketing and technology in today's highly digital business world
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- Intelligence demonstrated by machines
- The protection of computer systems from the theft and damage
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- The range of interactions that patients have with the health care system, including their care from health plans
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- Websites and applications that enable users to create and share content or to participate in social networking
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
Down
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Creating relevant and consistent connections between offline and online media in real time
- A cross-channel business model and content strategy that companies use to improve their user experience
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
- Enhancing healthcare delivery and support using telecommunications technologies
- Computer oriented crime
- The practice that aims at unifying software development and software operation
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
Securing your work, home and your digital footprint! 2020-10-06
Across
- someone pretending to be someone,such as your boss, friend etc.. sends a email intending to gain money or information from a fake email address.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- electronic device for storing an processing data
- Choose a password that is easy for you to _____but hard for someone to guess.
- Cybersecurity is a shared ________
- it IS VERY IMPORTANT to use strong privacy settings on ________.
- These devices are used to direct information between public and private networks
Down
- is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's identity
- ALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESK
- DO NOT LEAVE YOUR LAPTOP OR COMPUTER______.
- system of interrelated,internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
- Device that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
- _____is an attempt by an individual or group to trick you into giving personal information by employing social engineering techniques through email.
- An option you can use to protect your credit.
- networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet
- Technology used to connect to a public network through a secure tunnel.
- ____Uses cellphone text messages to induce people to divulge their personal information
- ROVER12345 would be a bad example of a _____
- For a password to be secure, it should contain upper and lower case letters,numbers and ______.
19 Clues: Cybersecurity is a shared ________ • DO NOT LEAVE YOUR LAPTOP OR COMPUTER______. • ROVER12345 would be a bad example of a _____ • An option you can use to protect your credit. • electronic device for storing an processing data • ALWAYS _____YOUR COMPUTER WHEN YOU LEAVE YOUR DESK • it IS VERY IMPORTANT to use strong privacy settings on ________. • ...
Terminologies in RA 10175 2023-10-25
Across
- refers to the computer systems, and/or networks, whether physical or virtual
- refers to the mathematical algorithm produced against digital information
- refers to any representation of facts, information,
- refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- refers to any information contained in the form of computer data or any other form that is held by a service provider
- refers to the willful engagement, maintenance, control or operation, directly or indirectly,
- refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data
- refers to the application of investigative and analytical techniques that conform to evidentiary standards
Down
- refers to any computer data other than the content of the communication
- refers to a set of instructions executed by the computer to achieve intended results
- refers to any name or number that may be used alone or in conjunction with any other information to identify any specific individual,
- refers to the modification or change, in form or substance, of an existing computer data or program
- refers to the keeping of data that already exists in a stored form
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices
- refers to evidence, the use of which is sanctioned by existing rules of evidence
- refers to the person who created or is the origin of the assailed electronic statement or post using a computer system;
- refers to digital information that may be used as evidence in a case.
- also known as a forensic copy
- refers to gathering and receiving information
20 Clues: also known as a forensic copy • refers to gathering and receiving information • refers to any representation of facts, information, • refers to the keeping of data that already exists in a stored form • refers to digital information that may be used as evidence in a case. • refers to any computer data other than the content of the communication • ...
Digital Transformation Crossword 2018-04-02
Across
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- The intersection of marketing and technology in today's highly digital business world
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- Enhancing healthcare delivery and support using telecommunications technologies
- The myriad of IT resources provided over the internet; Digital data stored in logical pools
- Websites and applications that enable users to create and share content or to participate in social networking
- Creating relevant and consistent connections between offline and online media in real time
Down
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- The range of interactions that patients have with the health care system, including their care from health plans
- The protection of computer systems from the theft and damage
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
- A cross-channel business model and content strategy that companies use to improve their user experience
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- Computer oriented crime
- Intelligence demonstrated by machines
- The practice that aims at unifying software development and software operation
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
technology 2023-06-07
Across
- is a form of computer memory that can be read and changed in any order
- s a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device
- is a method of representing data in a visual, machine-readable form. Initially
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg
- s a collection of discrete values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network
- is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of,
- is a commonly used method of lossy compression for digital images
- is a digital multimedia container format most commonly used to store video and audio
- is a file format developed by Adobe in 1992 to present documents
Down
- is a mobile operating system
- is an American multinational technology company
- A binary code represents text, computer processor instructions
- is the most important processor in a given computer
- is a hardware or software component that stores data so that future requests for that data can be served faster
- is a type of computer program that, when executed
- is a mapping from some domain for example, a range of integers
- is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on June 15, 1987.
19 Clues: is a mobile operating system • is an American multinational technology company • is a type of computer program that, when executed • is the most important processor in a given computer • A binary code represents text, computer processor instructions • is a mapping from some domain for example, a range of integers • ...
MEDIA AND INFORMATION LITERACY 2024-09-01
Across
- The legal right granted to the creator of original work to control its use and distribution.
- False or misleading information spread without the intent to deceive.
- An inclination or preference that affects impartial judgment, leading to skewed or unfair perspectives.
- News False or misleading news stories created to gain attention or deceive readers.
- Privacy The protection of personal data from unauthorized access or use.
- A reference to the source of information or ideas used in research or writing.
- Media Platforms and websites that enable users to create, share, and interact with content.
- Measures taken to protect computers, networks, and data from attacks or damage.
- Footprint The trail of data that individuals leave behind when using digital devices or the internet.
- A visual representation of information or data designed to make complex information easier to understand.
- The openness of information sources and the clarity about how information is obtained and presented.
Down
- Information, often biased or misleading, used to promote a particular political cause or point of view.
- Literacy The ability to access, analyze, evaluate, and create media in various forms.
- The use of various forms of content, such as text, images, audio, and video, to convey information.
- Literacy The ability to recognize when information is needed and to locate, evaluate, and use it effectively.
- Literacy The skills required to effectively and critically navigate, evaluate, and create information using digital technologies.
- The quality of being trusted and believed in, often based on evidence or expertise.
- The process of verifying the accuracy of information before presenting or sharing it.
- Thinking The ability to analyze information objectively and make reasoned judgments.
- The practice of using someone else's work or ideas without proper acknowledgment.
20 Clues: False or misleading information spread without the intent to deceive. • Privacy The protection of personal data from unauthorized access or use. • A reference to the source of information or ideas used in research or writing. • Measures taken to protect computers, networks, and data from attacks or damage. • ...
Vallari FRM 2024-07-16
Across
- NTPC evaluates risks related to environmental regulations impacting thermal power generation and emissions control.
- Dabur India assesses risks of disruptions in sourcing herbal ingredients impacting production of Ayurvedic products.
- Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours.
- RBI monitors risks that could destabilize the entire banking sector, such as economic downturns or liquidity crises.
- Biocon reviews dependency on a few key drug patents affecting revenue stability in biopharmaceuticals.
- Insurance companies assess exposure to claims from natural disasters like cyclones or floods impacting claims processing.
- Adani Green Energy evaluates risks associated with government policies impacting renewable energy projects.
- Titan Company manages risks associated with fluctuating gold prices impacting jewelry manufacturing costs.
Down
- Kotak Mahindra Bank assesses the risk of default by retail borrowers in its personal loan portfolio.
- Mahindra & Mahindra evaluates exposure to fluctuations in commodity prices affecting profitability in agricultural machinery manufacturing.
- Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations.
- BigBasket navigates consumer trust issues during data privacy concerns impacting online grocery sales.
- Zee Entertainment faces litigation over copyright infringement affecting broadcasting rights and viewer engagement.
- Sun Pharma assesses geopolitical stability before expanding pharmaceutical manufacturing operations in new global markets.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues impacting passenger satisfaction and flight schedules.
- Wipro deals with currency fluctuations impacting revenue from global IT services contracts.
- JSW Steel manages liquidity to meet debt obligations amidst fluctuating cash flows from steel production.
- L&T Finance Holdings reviews the accuracy of financial models used for risk assessment and loan underwriting.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- HDFC Life Insurance manages exposure to changes in interest rates impacting investment returns on policyholder funds.
20 Clues: Wipro deals with currency fluctuations impacting revenue from global IT services contracts. • Axis Securities ensures compliance with new SEBI regulations affecting brokerage operations. • Ola faces disruptions in ride-hailing services due to app server crashes during peak travel hours. • ...
Ai Ethics 2022-02-15
3 Clues: Estimates that by 2030, 30% of all jobs will be automated. • This one of the major concerns of companies, especially in the governmental and financial services sector. • safety __________ and the reduction of crime rates are the greatest justifiers for the use of this technology.
Cybersecurity Awareness Puzzle 1 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 7 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
ADSI Cristian Niño 2022-06-01
Across
- Set of physical or material elements that constitute a computer or a computer system
- area of science that is responsible for studying the administration of methods, techniques and processes in order to store, process and transmit information and data in digital format
- Set of programs and routines that allow the computer to perform certain tasks
- relational database management system developed under dual license: General Public License/Commercial License by Oracle Corporation
- set of computers capable of handling requests from a client and returning a response accordingly
- is the use of a network of remote servers connected to the internet to store, manage and process data, servers, databases, networks and software
- arrangement and order of the parts within a whole
Down
- Program capable of storing large amounts of data, related and structured
- programming language and a computing platform that was first commercialized in 1995 by Sun Microsystems
- set of elements that are combined following certain rules and that are semantically interpretable, which allows information to be exchanged
- sum of techniques, skills, methods and processes used in the production of goods or services or in the achievement of objectives, such as scientific research
- a person who writes computer programs
- branch of applied physics that encompasses physics, engineering, technology, and applications dealing with the emission, flow, and control of electrons
- is the practice of protecting important systems and sensitive information from digital attacks
- worldwide interconnected computer network in the form of a spider web consisting of servers
15 Clues: a person who writes computer programs • arrangement and order of the parts within a whole • Program capable of storing large amounts of data, related and structured • Set of programs and routines that allow the computer to perform certain tasks • Set of physical or material elements that constitute a computer or a computer system • ...
Rush Health Cybersecurity Crossword Puzzle 2020-03-03
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive information, typically via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • ...
Standards Law & Ethics of Cybersecurity 2023-06-08
Across
- Link that is ______ often found on social media and SMS is one of the Phishing Scams.
- By sharing ______ date it potentially threatens personal safety.
- What should you do if you receive suspicious links on your mobile phone?
- Always update your ________ at least once in 6 months to make sure it is not easy to be hacked by irresponsible parties.
Down
- Resending fake emails to everyone who knows you can be identified as _______.
- Do not ______ your password.
- _____ crime is one of the crimes committed through computers on the internet. This action will cause the victim to suffer and exprience loss.
- Avoiding sharing ______ information on social media and the internet could protect yourself from becoming a cyber victim.
8 Clues: Do not ______ your password. • By sharing ______ date it potentially threatens personal safety. • What should you do if you receive suspicious links on your mobile phone? • Resending fake emails to everyone who knows you can be identified as _______. • Link that is ______ often found on social media and SMS is one of the Phishing Scams. • ...
Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11
Across
- A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
- A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
- The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
- _____-force attack is a technique used to guess a password by trying many possible combinations
- Gain access to someone else’s computer or device without permission
- The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
- Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
- An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
- Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
- A location on the internet where you can save your data (rather than on your computer or device)
Down
- A program or device used to detect and prevent unauthorized access to a network
- A sequence of characters (or words) used to stop criminals from accessing your accounts
- A method of protecting data by converting it into unreadable code that only authorized parties can read
- Malicious software that could harm your computer or gadget
- What is a form of malware that monitors and records a user's activities without their knowledge?
- A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
- A security incident where sensitive information is leaked to the public is a data ______
- ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor
18 Clues: Malicious software that could harm your computer or gadget • Gain access to someone else’s computer or device without permission • A program or device used to detect and prevent unauthorized access to a network • The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge) • ...
Cybersecurity Awareness Month - Acronym Edition 2022-10-07
Across
- An endpoint security solution that continuously monitors end-users’ devices to detect and respond to cyber threats
- A system turns domain names into IP addresses
- A part of Identity and Access Management that provides secure, privileged access to critical assets and meet compliance requirements
- Also called a "black cloud"
Down
- A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
- A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online
- A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorised users
- Provide outsourced monitoring and management of security devices and systems
8 Clues: Also called a "black cloud" • A system turns domain names into IP addresses • Provide outsourced monitoring and management of security devices and systems • A secure tunnel between your device and the internet, encrypting your connection and keeping you hidden online • ...
Ai Ethics 2022-02-15
3 Clues: Estimates that by 2030, 30% of all jobs will be automated. • This one of the major concerns of companies, especially in the governmental and financial services sector. • safety __________ and the reduction of crime rates are the greatest justifiers for the use of this technology.
Cybersecurity Awareness Puzzle 5 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 4 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Cybersecurity Awareness Puzzle 6 2024-08-09
6 Clues: __ alert button • __ reusing passwords • __ software regularly • __ factor authentication • __ a ticket if you're unsure • __ over links before clicking
Chapter 2- TYPES OF ATTACKS 2022-09-10
Across
- Contain tracking information for an individual email
- Fraud like Phishing, but it comes as a text message or SMS
- It is a deceptive scheme or trick used to cheat someone out of something
- It is merely an email trying to convince you to do something
- It is a phone scam designed to get your personal information by impersonating
- Targets popular websites such as Google.com and they create similar domain names, altering a letter of a popular domain hoping someone mistype the domain matching their new created fake domain
- Threat that involves sending email messages with a fake sender address
- It is just like Phishing but it only targets specific individuals within an organization
Down
- It is news or knowledge received or given
- Help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.
- A link that direct you to a fake login page, in the hope that you might enter your credentials
- Exclusively targets high-ranking individuals such as your BOSS within an organization
- A link or an attachment which if you are unfortunate enough to click or download, you could possibly be downloading malware
- It is a type of email attack where bad people are trying to steal your precious information
- It is a type of DoS attack but in this case uses multiple computers normally infected to flood the target website
- Unsolicited bulk messages normally from people trying to sell something
- An act of pretending to be another person for the purpose of commiting fraud
17 Clues: It is news or knowledge received or given • Contain tracking information for an individual email • Fraud like Phishing, but it comes as a text message or SMS • It is merely an email trying to convince you to do something • Threat that involves sending email messages with a fake sender address • ...
Digital Transformation Crossword 2018-04-02
Across
- Originally devised for the digital currency Bitcoin, the tech community is now finding other potential uses for the technology
- Computer oriented crime
- The range of interactions that patients have with the health care system, including their care from health plans
- Enhancing healthcare delivery and support using telecommunications technologies
- Intelligence demonstrated by machines
- New York's leading technology, business, and educational advisory firm that brings out the best capabilities for all of our clients
- The myriad IT resources provided over the internet; Digital data stored in logical pools
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions
- A cross-channel business model and content strategy that companies use to improve their user experience
Down
- The practice that aims at unifying software development and software operation
- The change associated with the application of new digital technology in all aspects of business and organizational strategy
- The protection of computer systems from the theft and damage
- Creating relevant and consistent connections between offline and online media in real time
- Modern technology that enables a machine or computer program to receive and interpret dictation or to understand and carry out spoken commands
- The new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services
- Socio-technical model for healthcare management and delivery by using technology to provide healthcare services remotely
- Referring to billions of physical devices around the world that are now connected to the internet, collecting and sharing data
- The intersection of marketing and technology in today's highly digital business world
- Websites and applications that enable users to create and share content or to participate in social networking
19 Clues: Computer oriented crime • Intelligence demonstrated by machines • The protection of computer systems from the theft and damage • The practice that aims at unifying software development and software operation • Enhancing healthcare delivery and support using telecommunications technologies • ...
Nishant FRM 2024-07-15
Across
- Tata Power evaluates regulatory changes impacting renewable energy projects and carbon emissions.
- Maruti Suzuki assesses risks of disruptions in the supply of auto components impacting production schedules.
- Flipkart faces disruptions in e-commerce operations due to technical failures during peak shopping seasons.
- RBI monitors risks that could destabilize the entire banking sector, such as liquidity crises or economic recessions.
- Reliance Industries assesses overdependence on revenue from petrochemicals in its diversified business portfolio.
- Insurance companies assess exposure to claims from natural disasters like cyclones or floods.
- ONGC evaluates government policies impacting oil exploration projects in sensitive ecological zones.
- ITC manages risks associated with volatile prices of agricultural commodities used in its food and tobacco products.
Down
- State Bank of India assesses the creditworthiness of borrowers in its corporate lending portfolio.
- Infosys monitors exposure to fluctuations in global IT spending impacting service revenue.
- HDFC Bank ensures adherence to new banking regulations impacting loan approval processes.
- Amul manages public perception during food safety controversies affecting dairy product sales.
- Hindustan Unilever faces litigation over product safety regulations impacting consumer trust in its FMCG products.
- Mahindra & Mahindra assesses political stability and economic conditions before expanding manufacturing operations abroad.
- IndiGo Airlines deals with flight delays due to technical faults affecting passenger satisfaction.
- Tata Consultancy Services deals with currency fluctuations affecting revenue from international IT services contracts.
- Tata Motors evaluates the ability to raise short-term funds to meet operational expenses during economic downturns.
- Axis Bank reviews the accuracy of financial models used for risk assessment and capital allocation.
- Wipro strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- ICICI Prudential Life Insurance manages exposure to fluctuations in interest rates affecting investment returns.
20 Clues: HDFC Bank ensures adherence to new banking regulations impacting loan approval processes. • Infosys monitors exposure to fluctuations in global IT spending impacting service revenue. • Insurance companies assess exposure to claims from natural disasters like cyclones or floods. • ...
Puzzle No. 2 2022-09-08
Across
- A common type of memorized secret, characterized by a string of characters used to verify the identity of a user during the authentication process.
- Ensuring that authorized users have access to information and associated assets when required.
- These fix general software problems and provide new security patches where criminals might get in.
- A type of ATM scam wherein a thin device is inserted in ATM or POS terminal to capture and harvest data from EMV-chip enabled cards.
- Sentence-like format of password which is strong but easier to remember.
- A weakness in your security policy, implementation, design, and controls.
- Your password is considered ____ if it is a combination of upper and lowercase letters, numbers, punctuation, and special symbols.
- You should not write down your password in this type of physical medium.
Down
- A common social engineering attack which usually channeled via email message, whereby someone pretends to be from a legitimate entity to lure you to provide personal or financial data.
- Refers to the technologies, processes, and practices designed to protect information assets and consumers by preventing, detecting and responding to cyber-attacks.
- Ensuring that information is accessible only to those authorized to have access.
- An event that will cause harm to you or your asset.
- A possibility that a threat exploits vulnerability in an information asset, leading to an adverse impact on the organization.
- ”________ is everyone’s responsibility”.
- Safeguarding the accuracy and completeness of information.
15 Clues: ”________ is everyone’s responsibility”. • An event that will cause harm to you or your asset. • Safeguarding the accuracy and completeness of information. • Sentence-like format of password which is strong but easier to remember. • You should not write down your password in this type of physical medium. • ...
Virus Crossword 2 2017-11-28
Across
- Short for distributed denial of service.
- Messages distributed by electronic means from one computer user to one or more recipients via a network.
- Irrelevant/innapropriate messages sent to a large number of people through through the internet.
- A program designed to breach the security of a computer system while ostensibly performing some innocuous function.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
- A self-replicating program able to propagate itself across a network, typically having a detrimental effect.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Software that is intended to damage or disable computers and computer systems.
- The programs and other operating information used by a computer.
- To request confidential information over the internet or by telephone under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.
- Being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Someone who uses programs to gain unauthorized access to a computer and its data.
- A fast spreading virus that is distributed as an attachment on an email.
15 Clues: Short for distributed denial of service. • The programs and other operating information used by a computer. • A fast spreading virus that is distributed as an attachment on an email. • Software that is intended to damage or disable computers and computer systems. • Someone who uses programs to gain unauthorized access to a computer and its data. • ...
Cyber Society 2024-04-29
Across
- A set of instructions or rules followed by a computer to solve a problem or perform a task.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A software vulnerability that is exploited by attackers before the software developer becomes aware of it.
- Measures taken to protect computer systems and networks from unauthorized access or attacks.
- Footprint: The trail of data created by an individual's online activity.
- Software intended to damage or disable computers or computer systems.
Down
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, used for criminal activities.
- The study of communication and control processes in biological, mechanical, and electronic systems, especially the comparison of these processes in biological and artificial systems.
- A person who uses computers to gain unauthorized access to data.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
- Bullying that takes place over digital devices like cell phones, computers, and tablets.
- Web: Part of the internet that is not indexed by search engines and often associated with illegal activities.
- The process of converting data into a code to prevent unauthorized access.
- Reality: A computer-generated simulation of an environment that can be interacted with in a seemingly real or physical way.
- Theft: The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
15 Clues: A person who uses computers to gain unauthorized access to data. • Software intended to damage or disable computers or computer systems. • Footprint: The trail of data created by an individual's online activity. • The process of converting data into a code to prevent unauthorized access. • ...
Hoverstate - April Crossword 2022-04-18
Across
- Hoverstate’s Italy office location
- Oregon Train, This computer game developed in 1971 was designed to teach 8th grade school children about the realities of 19th-century pioneer life heading west
- mining, the process of examining and analyzing large amounts of data to find patterns and use these patterns to get a better insight in the collected data (2 words)
- programs that mimic human like interactions
- Recognition, the concept of translating human speech into text that can be understood by computers (2 words)
- Recognition, part of computer science where computers turn the spoken word of a human into text (2 words)
- Gates, visionary co-founder of Microsoft (2 words)
- Learning, a type of Artificial Intelligence which gives computer programs the ability to learn from new data without being explicitly programmed to do so (2 words)
- Interface, the parts of an application, website, computer etc. which the user can manipulate (2 words)
- 1983 movie where a high schooler accidentally hacks a military installation running a missile-command supercomputer called the WOPR
- assurance, this role ensures that the final product observes the company's quality standards (2 words)
- the replacement of technologically advanced people with people-literate platforms or technology
Down
- a software solution company founded in 2009
- system architect, this role is responsible for designing, implementing, and maintaining databases and critical computer systems (3 words)
- Matrix, this 1999 blockbuster depicts a dystopian future in which humanity is unknowingly trapped inside a simulated reality (2 words)
- Robot, this novel by Isaac Asimov weaves stories about robots, humanity, and the deep questions of existence (2 words)
- a new type of database which is distributed not just in one place and encrypted by default
- Jobs, visionary co-founder of Apple (2 words)
- this maze action video game was developed for arcades in 1980 and kept you busy avoiding Blinky, Pinky, Inky, and Clyde
- being protected against criminal or unauthorized use of electronic data, or the measures taken to achieve this
- a cloud computing–based data warehousing company
- Experience, how the user feels, emotions they get and the ease-of-use when interacting with a product or service (2 words)
22 Clues: Hoverstate’s Italy office location • a software solution company founded in 2009 • programs that mimic human like interactions • Jobs, visionary co-founder of Apple (2 words) • a cloud computing–based data warehousing company • Gates, visionary co-founder of Microsoft (2 words) • ...
Prince FRM 2024-07-15
Across
- Insurance companies assess exposure to claims from natural disasters like earthquakes or cyclones.
- Adani Enterprises evaluates risks related to government policies affecting infrastructure projects and investments.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues affecting customer satisfaction.
- RBI monitors risks that could destabilize the entire financial system, such as banking sector crises or economic recessions.
- Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio.
- Reliance Industries faces litigation over environmental compliance impacting public perception and regulatory approvals.
- Zomato manages public perception during controversies over food quality affecting user trust and market share.
- Mahindra & Mahindra evaluates its ability to secure short-term financing for working capital needs during economic slowdowns.
- Rate Tata Steel deals with currency fluctuations impacting revenue from international steel sales.
- Indian Oil Corporation assesses geopolitical stability before expanding refining operations in new global markets.
- Nestle India assesses risks of disruptions in the supply of dairy and agricultural products impacting production.
Down
- Paytm faces disruptions in payment processing due to technical glitches during high-volume transactions.
- Rate Bajaj Finance manages exposure to fluctuations in interest rates impacting loan profitability.
- NTPC evaluates risks related to environmental regulations impacting thermal power plant operations.
- HDFC Standard Life ensures adherence to new insurance regulations impacting policy sales and operations.
- TCS reviews the accuracy of financial models used for risk assessment and project estimation.
- Infosys assesses overdependence on revenue from a few large clients in its IT services business.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- Marico evaluates exposure to changes in raw material prices affecting profit margins in FMCG sector.
- Hindustan Unilever manages risks associated with fluctuating prices of palm oil affecting production costs.
20 Clues: Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio. • TCS reviews the accuracy of financial models used for risk assessment and project estimation. • Infosys assesses overdependence on revenue from a few large clients in its IT services business. • ...
cybersecurity 2023-10-24
INFORMATION TECHNOLOGY 2021-06-28
Across
- the study of computer algorithms that improve automatically through experience and by the use of data.
- the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
- a branch of computer science dealing with the simulation of intelligent behavior in computers.
- the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks
Down
- an artificial intelligence (AI) function that imitates the workings of the human brain in processing data and creating patterns for use in decision making. Subset of Machine learning
- field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from structured and unstructured data
- the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
- developing a Web site for the Internet or an intranet.
8 Clues: developing a Web site for the Internet or an intranet. • a branch of computer science dealing with the simulation of intelligent behavior in computers. • the study of computer algorithms that improve automatically through experience and by the use of data. • ...
Can You Guess the Fraud? 2022-09-16
Across
- __________ fraud is a type, rather than an act, where fraudsters use a highly targeted approach and impersonate corporate/trusted identities to solicit financial payments and/or sensitive information.
- Cybersecurity attack carried over mobile text messaging to obtain sensitive data
- ______________ is an act of fraudulently obtaining private and personal information by tricking recipient to open malicious links, attachments or sharing data with insecure websites.
- ___________ fraud refers to instances where an individual who believes to be in a genuine relationship is defrauded by the offender for financial gains.
- The fraudulent practice of using someone’s personal information in order to gain money, goods or sensitive information is known as __________ Theft
Down
- Making an unauthorised purchase/transaction using someone’s credit/debit card details or banking account is an example of ________ fraud.
- Any type of fraudulent activity or scam executed through platforms such as Instagram, Facebook, Linkedin, Twitter, etc are classified as _____ _____ fraud
- _____ fraud occurs when bills are fabricated and disguised as legitimate to extract money.
8 Clues: Cybersecurity attack carried over mobile text messaging to obtain sensitive data • _____ fraud occurs when bills are fabricated and disguised as legitimate to extract money. • Making an unauthorised purchase/transaction using someone’s credit/debit card details or banking account is an example of ________ fraud. • ...
Security Crossword Puzzle 2020-02-08
Across
- Establishes the standard procedures and requirements for all government contractors, with regards to classified information.(Acronym)
- Giving a spoken or written account of something that one has observed, heard, done, or investigated.
- Any breach of security regulations, requirements, procedures or guidelines(2 Words)
- Denoting or relating to a principle or policy of telling people only what is deemed necessary for them to know in order to carry out a task effectively.(3 Words)
- Information which can be used to distinguish or trace the identity of an individual(Acronym)
Down
- Information or material whose unauthorized disclosure could be expected to cause exceptionally grave damage to national security.(2 Words)
- Refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- A current or former employee, who has or had authorized access to an organization's network, system, or data and intentionally misused that access to negatively affect the organization's information or information systems.(2 Words)
- Websites and applications that enable users to create and share content or to participate in social networking.(2 Words)
9 Clues: Any breach of security regulations, requirements, procedures or guidelines(2 Words) • Information which can be used to distinguish or trace the identity of an individual(Acronym) • Giving a spoken or written account of something that one has observed, heard, done, or investigated. • ...
ORG Game 2023-07-14
Across
- (General Data Protection Regulation): A comprehensive data protection regulation in the EU that sets out rules for the processing and handling of personal data.
- neutrality: The principle that all internet traffic should be treated equally by internet service providers, without discrimination or preference.
- Intelligence: The ability of machines or computer systems to mimic or simulate human intelligence, often used in various digital applications and services.
- Espionage Act: UK legislation that criminalizes unauthorized access to computer material with the intent to commit an offense. (3 letters)
- Access to Information Regulation: An EU regulation that aims to ensure the accessibility of public sector websites and mobile applications.
Down
- A term referring to measures or actions taken to monitor individuals without their consent.
- to be Forgotten: A ruling by the European Court of Justice that allows individuals to request the removal of personal information from search engine results under certain circumstances.
- Act 2000: UK legislation that regulates the interception of communications and the acquisition and disclosure of communications data.
- Sharing: The unauthorised distribution of copyrighted material over the internet, typically through peer-to-peer networks.
9 Clues: A term referring to measures or actions taken to monitor individuals without their consent. • Sharing: The unauthorised distribution of copyrighted material over the internet, typically through peer-to-peer networks. • Act 2000: UK legislation that regulates the interception of communications and the acquisition and disclosure of communications data. • ...
ARTIFUCIAL INTELLIGENCE 2024-04-22
Across
- VISION A field of AI that deals with the processing and analysis of visual information using computer algorithms.
- AI Through this technique AI models can learn the underlying patterns and create realistic and novel outputs.
- test is used to determine whether or not a computer(machine) can think intelligently like humans
- is the concept by which machines mimic or emulate the human mind’s intelligence or human behavior, with the ability to learn and apply this approach/intelligence to solve any kind of varied problems.
- AI is used for purposes, facial recognition, intrusion detection, and cybersecurity threat analysis.
Down
- Intelligence is the talk of a new changing and growing world that can be defined as a set of concepts and methodologies to improve decision-making in business through the use of facts and
- Systems is technology based on AI systems that mimic the decision-making ability of a human expert in a specific field.
- is the ability to learn and solve problems. This definition is taken from webster’s Dictionary
- Intelligence is a mental quality to learn from experiences, adapting to new situations and manipulating one’s environment by using knowledge.
9 Clues: is the ability to learn and solve problems. This definition is taken from webster’s Dictionary • test is used to determine whether or not a computer(machine) can think intelligently like humans • AI is used for purposes, facial recognition, intrusion detection, and cybersecurity threat analysis. • ...
Information Technology Crossword Puzzle 64 - Cybersecurity 2022-09-27
Across
- Is software that has been created to intentionally cause damage
- Involves malicious human interaction where people don’t tell the truth and they manipulate others to divulge personal information
- Pay attention to these that don’t have content or look like they are coming from a spoofed address
- Is an act of masquerading as a valid entity through falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain
- Is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
Down
- A type of malware that infects a network or steals confidential data and then demands something (typically currency of some sort) in exchange for access to systems
- Running these often will keep applications current and help protect your computer
- Is the act of surreptitiously listening to a private computer "conversation" (communication), typically between hosts on a network
- Hackers throw a line out there hoping that someone will bite, and when they do, the hacker steals sensitive information like passwords, credit card numbers and more
- Holding on to the same usage of this for ages isn’t a great idea
10 Clues: Is software that has been created to intentionally cause damage • Holding on to the same usage of this for ages isn’t a great idea • Running these often will keep applications current and help protect your computer • Pay attention to these that don’t have content or look like they are coming from a spoofed address • ...
Fintech 2024-03-05
Across
- refers to the use of innovative technologies such as artificial intelligence and Big Data to provide an alternative to traditional wealth management firms, with the aim of making wealth management and investment services more efficient and automated.
- the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- the intersection of payment and technology, a sub-industry within fintech that focuses solely on payments and transactions.
Down
- the use of technology and science to reduce human impacts on the natural environment.
- the innovative use of technology in insurance and is a subset of FinTech, or financial technology
- a system in which a record of transactions, especially those made in a cryptocurrency, is maintained across computers that are linked in a peer-to-peer network.
- the management of regulatory monitoring, reporting, and compliance within the financial industry through technology.
7 Clues: the use of technology and science to reduce human impacts on the natural environment. • the innovative use of technology in insurance and is a subset of FinTech, or financial technology • the management of regulatory monitoring, reporting, and compliance within the financial industry through technology. • ...
Computer Network Lingo 2024-10-15
Across
- A network that links computers/devices within a person's immediate vicinity.
- Network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
- Measures taken to protect a computer system against unauthorized access or attack.
- Connected to the Internet using signals transmitted by radio waves rather than over wires.
- Transmits data over a high-speed, high-bandwidth communication network.
- A measurement indicating the maximum capacity of the data transfer rate or capacity of a given network.
- Wireless Fidelity. A wireless networking technology that uses radio waves to provide wireless high-speed Internet.
- Basic unit of data that's grouped together and transferred over a computer network.
- A link between a plug or connector into a port or jack.
- Network that is wireless and spread over land areas called cells, each served by at least one tower.
Down
- A network that connects computer networks and computer facilities around the world.
- Connected to the Internet using a wire.
- Any data transmitted over a network that is for human interpretation.
- A way of scrambling data so that only authorized parties can understand the information.
- Open Systems Interconnection Model. A conceptual framework (7 layers) that describes how different computer systems communicate with each other inside a network.
- The act of identifying and then exploiting weaknesses in a network to gain unauthorized access to data.
- A computer network that extends over a large geographic area, usually connecting multiple local area networks (LANs).
- A collection of devices connected together in one physical location, such as a building, office, or home.
18 Clues: Connected to the Internet using a wire. • A link between a plug or connector into a port or jack. • Any data transmitted over a network that is for human interpretation. • Transmits data over a high-speed, high-bandwidth communication network. • A network that links computers/devices within a person's immediate vicinity. • ...
CLA Chapter 5 2024-05-01
Across
- A robot that performs behaviors or tasks with a high degree of autonomy.
- Human characteristics unique to an individual that identify that specific person.
- This utilizes interconnected sensors, instruments, and other devices networked together with computers' industrial applications within a central hub to faciliate more efficient management of warehouses and distribution centers.
- A broad spectrum of software applications and hardware devices that, when combined, provide users with digital information visually overlaid onto their immediate surroundings.
- The protection of computer systems, related networks and the information they manage from unauthorized access by people and systems.
Down
- Allows students of all ages in distanced locations to learn about an unlimited variety of subjects using electronic audio and video connections.
- The theory and development of computer systems able to perform tasks that normally require human intelligence.
- The latest generation wireless technology that is best known for cell phones and is expected to transmit data at least 20 times faster than its predecessor 4G.
- The process of inspecting, cleansing, transforming and modelling collected data to optimize warehouse and distribution center operations.
9 Clues: A robot that performs behaviors or tasks with a high degree of autonomy. • Human characteristics unique to an individual that identify that specific person. • The theory and development of computer systems able to perform tasks that normally require human intelligence. • ...
Crossword 2024-05-13
Across
- The field of knowledge and practices aimed at protecting computer systems, programs, and data from cyberattacks, theft, and unauthorized access.
- A set of rules and tools that allows programs to interact with each other.
- A model of cloud services that provides organizations with data and application recovery after emergencies.
- Action or interference taken to change or correct a process, situation, or behavior.
- The process of using up resources or goods, both in an economic and general sense.
- An individual or organization holding a current position or status in the market or society.
- Processes and technologies used to prevent the use of financial systems for the legalization of proceeds from criminal activities.
Down
- The combination of knowledge, skills, processes, and methods used to create products, services, and systems to meet human needs.
- A decentralized database used to store records of transactions, providing security, transparency, and immutability of data.
- The process of converting information using mathematical algorithms to make it unreadable to unauthorized users.
- A cryptocurrency based on blockchain technology, proposed in 2008 within a paper by Satoshi Nakamoto.
- A diversity or wide range of different elements, categories, or types.
- A procedure or set of instructions designed to solve a specific problem or perform a particular type of computation.
- At the beginning stage or at the moment of starting a specific process or event.
- To seize power, position, or right unlawfully, usually by force or deceit.
- A global standard for payment card security, based on the use of microchips to reduce fraud risks.
16 Clues: A diversity or wide range of different elements, categories, or types. • A set of rules and tools that allows programs to interact with each other. • To seize power, position, or right unlawfully, usually by force or deceit. • At the beginning stage or at the moment of starting a specific process or event. • ...
Week 3 Check In 2021-02-05
Across
- fried quickly in a little hot fat.
- A machine or device that performs processes, calculations, and operations based on instructions provided by a software or hardware program.
- The norms of appropriate, responsible behavior with regard to the use of technology.
- mixing pliable dough by stretching, folding and pushing in order to form gluten in the flour. The gluten is required for proper bread rising, as it forms elastic strands that keep the gases in the dough enabling the dough to rise.
Down
- The protection against access to, or alteration of, computing resources through the use of technology, processes, and training.
- A type of application software designed to run on a mobile device, such as a smartphone or tablet computer. Also known as a mobile application.
- Stow items/ingredients so that those with the nearest best before or use-by dates are used or sold first.
- to cook in liquid, bubbles forming and gently rising to the surface of the water, but the water is not yet at a full rolling boil.
- The global collection of computer networks and their connections, all using shared protocols to communicate.
9 Clues: fried quickly in a little hot fat. • The norms of appropriate, responsible behavior with regard to the use of technology. • Stow items/ingredients so that those with the nearest best before or use-by dates are used or sold first. • The global collection of computer networks and their connections, all using shared protocols to communicate. • ...
Puzzle - 10 2022-10-10
Across
- a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- a network security system that filters unsanctioned incoming and outgoing traffic.
- Refers to a program that is run entirely from the network, without requiring any installation of software on the endpoint device running the program
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
Down
- a term commonly used to describe a person who tries to gain unauthorized access into a network or computer system.
- involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
- Customizable additions to software for extra functionality
- Computing recourses that make it available to access your files and services through the internet from any point in the world.
- contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.
10 Clues: Customizable additions to software for extra functionality • a network security system that filters unsanctioned incoming and outgoing traffic. • contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed. • ...
Cybersecurity Fundamentals Chapter 2 Part 2 2022-11-24
Across
- requires a set of checks before allowing a device to connect to a network.
- allows users to gain access to application software and databases. Cloud providers manage the infrastructure.
- programs and services that protect operating systems, databases, and other services operating on workstations, portable devices, and servers.
- shift the technology component from the organization to the cloud provider.
Down
- run inside a virtual environment with a pre-packaged
- includes the implementation of authentication and encryption.
- appliances that are installed within the network faculties.
- secure virtual network that uses the public network.
- provides virtualized computing resources over the Internet.
- developed a comprehensive framework to guide information security management.
10 Clues: run inside a virtual environment with a pre-packaged • secure virtual network that uses the public network. • appliances that are installed within the network faculties. • provides virtualized computing resources over the Internet. • includes the implementation of authentication and encryption. • ...
Challenge 2022-04-18
Across
- cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
- type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
- a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
- Malware that encrypts or locks a victim's computer files until the victim meets their demands
Down
- cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
- a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
- any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application
7 Clues: Malware that encrypts or locks a victim's computer files until the victim meets their demands • a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system • a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks • ...
Cybersecurity Fundamental Chapter 8 Part 1 2024-06-05
Across
- Security professionals who simulate cyberattacks on systems to identify vulnerabilities.
- Includes all hardware devices such as desktops, laptops, tablets, and smartphones connected to the network, which are vulnerable to various security threats.
- Experts who monitor and analyze security measures to protect an organization's information systems.
- Services hosted by cloud providers, including SaaS, PaaS, and IaaS, where organizations must protect their resources within the cloud environment.
- Programs aimed at educating users about security policies, risks, and best practices to mitigate threats.
- A network domain consisting of interconnected devices within a limited area, requiring strong security measures to protect against unauthorized access and data breaches.
Down
- The study of ethical issues and the impact of computer technology on individuals and society.
- The realm encompassing all users accessing an organization's information system, often considered the weakest link in security.
- Legislation and regulations that govern the behavior and measures required to protect information and information systems.
- Refers to private cloud services and infrastructure accessible to an organization via the internet, posing threats like unauthorized access and network probing.
10 Clues: Security professionals who simulate cyberattacks on systems to identify vulnerabilities. • The study of ethical issues and the impact of computer technology on individuals and society. • Experts who monitor and analyze security measures to protect an organization's information systems. • ...
Fintech 2024-03-05
Across
- the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.
- the intersection of payment and technology, a sub-industry within fintech that focuses solely on payments and transactions.
- the use of technology and science to reduce human impacts on the natural environment.
Down
- a system in which a record of transactions, especially those made in a cryptocurrency, is maintained across computers that are linked in a peer-to-peer network.
- the innovative use of technology in insurance and is a subset of FinTech, or financial technology
- refers to the use of innovative technologies such as artificial intelligence and Big Data to provide an alternative to traditional wealth management firms, with the aim of making wealth management and investment services more efficient and automated.
- the management of regulatory monitoring, reporting, and compliance within the financial industry through technology.
7 Clues: the use of technology and science to reduce human impacts on the natural environment. • the innovative use of technology in insurance and is a subset of FinTech, or financial technology • the management of regulatory monitoring, reporting, and compliance within the financial industry through technology. • ...
EHSPCM 2023-12-05
Across
- One of the many EHSPCM responsibilities that deals with vehicle emissions. (Acronym FEME)
- One of many Toyota initiatives Privacy provided consultation services. (Acronym NFL)
- Privacy review conducted to compare our Privacy program with Australia’s program.
- EHS, FEME, Sustainability, and chemical management scored over 65 risk statements in FY Q3.
- EHSPCM service is provided to our business units to detect issues in advance.
- One of the many EHSPCM responsibilities addressing TMNA’s electrification future.
- One of the many EHSPCM responsibilities that partners with stakeholders across the enterprise to provide guidance on personal identifiable information (PII).
- One of the many EHSPCM responsibilities looking at how we handle hazardous materials responsibly.
- One of the many EHSPCM responsibilities looking at innovating & continuously improving to minimize negative impacts and working toward making a net positive impact on the planet and society.
Down
- Compliance program element review led by the EHS DART team in conjunction with Deloitte.
- On-site facility visits conducted by EHS.
- One of the many EHSPCM responsibilities on how we can protect our people.
- EHS and FEME conducted tests of these types of processes in 2023. Also a term defined in the Compliance Program Standards.
- One of the many EHSPCM responsibilities on how we protect the environment in the communities we serve.
- Monitor existing programs and controls to confirm compliance preparedness for online threats.
- Empower team members to proactively mitigate EHS risks to prevent all injuries, generate a net positive impact on the environment, and enhance customer trust in the Toyota brand.
- To proactively identify risk through effective monitoring strategies and trend analysis to prioritize compliance preparedness for the organization and team members.
- One of the many EHSPCM responsibilities on how TMNA reviews and approves chemicals in our products and processes.
18 Clues: On-site facility visits conducted by EHS. • One of the many EHSPCM responsibilities on how we can protect our people. • EHSPCM service is provided to our business units to detect issues in advance. • Privacy review conducted to compare our Privacy program with Australia’s program. • ...
Infosec Exercise 1 2024-08-15
Across
- Restricting access to the subject based on sensitivity/ Need to know.
- Is the hacker/attacker's clever manipulation of the natural human tendency to trust to obtain information that will allow him to gain unauthorized access to a valued system
- Is a technique used to retrieve information that could be used to carry out an attack or gain access to a computer network from disposed items.
- An object should only have the rights and privileges necessary to perform its task with no additional permissions.
- Ensures that only valid users are admitted
- Is a way of storing the same data in different places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure
Down
- Protection from unauthorized disclosure.
- Is a set of techniques used to protect networks, programs and data from attack, damage, or unauthorized access.
- Is a cyberattack vector that takes advantage of an unknown or unaddressed security flaw in computer software, hardware or firmware. "Zero day" refers to the fact that the software or device vendor has zero days to fix the flaw because malicious actors can already use it to access vulnerable systems.
- Solutions we can implement in the enterprise.
- Full identity theft packages to commit financial fraud.
- For a given task, more than 1 person should be involved.
- Do not rely on a single brand of security device.
- The cost of safeguard or protection should not be greater than the value of the asset.
14 Clues: Protection from unauthorized disclosure. • Ensures that only valid users are admitted • Solutions we can implement in the enterprise. • Do not rely on a single brand of security device. • Full identity theft packages to commit financial fraud. • For a given task, more than 1 person should be involved. • ...
Cybersecurity Awareness Crossword Game 2024-09-10
Across
- It is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
- It is the term used for various pop-up advertisements that show up on your computer or mobile device.
Down
- It is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- It is a type of malware that holds a victim's sensitive data or device hostage, threatening to keep it locked—or worse—unless the victim pays a ransom to the attacker.
- It is cybersecurity software that detects and removes malicious software (malware) from a computer, device, or network.
5 Clues: It is the term used for various pop-up advertisements that show up on your computer or mobile device. • It is cybersecurity software that detects and removes malicious software (malware) from a computer, device, or network. • It is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. • ...
Day 10 Crossword Puzzle 2022-11-09
Across
- (first word out of 2) systems or machines that perform tasks and can iteratively improve themselves based on the information they collect (10 letters)
- a tool or service that maintains an inventory of data assets through the discovery, description, and organization of datasets (two words 4 and 7 letters)
- a virtual representation that serves as a real time counterpart in the production process ___ , ___ (two words 7 and 4 letters) hint: this meet the expert article might help…
- holistic approach to the security of our products, solutions, information security, and much more ____ , _____ (two words 5 and 8 letters)
Down
- (second word out of 2)systems or machines that perform tasks and can iteratively improve themselves based on the information they collect (12 letters)
- complete or partial replacement of human work with machine work (10 letters)
6 Clues: complete or partial replacement of human work with machine work (10 letters) • holistic approach to the security of our products, solutions, information security, and much more ____ , _____ (two words 5 and 8 letters) • ...
CSD Unit 3 Lessons 1 - 4 2024-01-21
Across
- in this step of the problem solving process, you research and consider possible solutions
- in this step of the problem solving process, you may follow thru with your best solution idea and see what happens
- one of the parameters of a shape, the size from left to right on the screen
- a normal part of coding, this is identifying and fixing problems that you find in your code or the code of others
- a field of study related to the principles and uses of computing, including coding and cybersecurity (two words)
- one of the parameters of a shape, the size from top to bottom on the screen
- a process used to help people systematically slow down and think about how to best solve a problem (three words)
- this shortened form of the word rectangle is used when drawing shapes in javaScript or GameLab
Down
- additional information provided as input to a block to customize its functionality
- another word for an oval or circle used on javaScript or GameLab
- in this step of the problem solving process, you look back to see if the solution that you tried worked and what can be improved upon
- this command can be used to make the screen a different solid color that will be behind the shapes you place on the screen.
- in this step of the problem solving process, you make sure you understand the problem.
- background (_______) This is the piece of information that you put between the parenthesis in the background command
14 Clues: another word for an oval or circle used on javaScript or GameLab • one of the parameters of a shape, the size from left to right on the screen • one of the parameters of a shape, the size from top to bottom on the screen • additional information provided as input to a block to customize its functionality • ...
CSAM 2024-09-22
Insider Risk Awareness 2022-08-17
Across
- Deliberate disclosures of classified or unclassified information to the media.
- An act or acts with intent to injure, interfere with, or obstruct the national defense of a country by willfully injuring or destroying, or attempting to injure or destroy, any national defense or war materiel, premises, or utilities
- ability to obtain knowledge of classified info
- prevention from action by fear of the consequences
- Security classification that shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or
- Unauthorized user who attempts to or gains access to an information system
Down
- Anything that effectively negates or mitigates an adversary’s ability to exploit vulnerabilities
- Formal security determination by an authorized adjudicative office that an individual is authorized access, on a need-to-know basis, to a specific level of collateral classified information
- Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks, and systems.
- Repeated incidents that may be similar in nature or dissimilar events that occur in a specific location or time span that may indicate a potential insider threat
- Prevention of damage to, protection of, and restoration of computers, electronic communications systems...etc.
11 Clues: ability to obtain knowledge of classified info • prevention from action by fear of the consequences • Unauthorized user who attempts to or gains access to an information system • Deliberate disclosures of classified or unclassified information to the media. • Anything that effectively negates or mitigates an adversary’s ability to exploit vulnerabilities • ...
Cyber security 2022-12-11
Across
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
- The ACSC's cyber security principles are grouped into four key activities:XXXX,protect,detect and respond.
- An annoying malware that spams you with ads.
- Settings on folders or files that control who is allowed to access them.
- A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
- What does the C stand for in the abbreviation AACA, as used in the Information Security Manual?
- A malicious code typically disguised as a legitimate program.
- Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
- An important process that verifies a user is really who they are; many different ways this can be done.
Down
- Full name of a DoS attack (three words).
- The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
- A collection of malware infested computers that form a network to attack.
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
- In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
- Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- An email that contains a message with a suspicious link designed to steal personal information.
17 Clues: Full name of a DoS attack (three words). • An annoying malware that spams you with ads. • A malicious code typically disguised as a legitimate program. • Settings on folders or files that control who is allowed to access them. • A collection of malware infested computers that form a network to attack. • ...
random 2023-11-29
Across
- monarchy - A form of government in which a monarch serves as the head of state within the parameters of a written or unwritten constitution.
- - A period of cultural and intellectual rebirth that took place in Europe between the 14th and 17th centuries. Photosphere - The visible surface of the Sun, where energy is emitted as light and heat.
- - The philosophical belief that knowledge is primarily derived from sensory experience and observation.
- - The study of heredity and the variation of inherited characteristics.
- - A political system where power is held by the people themselves. Photosynthesis - The process in which plants convert sunlight, water, and carbon dioxide into energy.
Down
- - The process of increasing interconnectedness and integration among countries in terms of economics, culture, and politics.
- tectonics - The theory that explains the movement of Earth's lithosphere and the formation of landf dissonance - The psychological discomfort experienced when holding two contradictory beliefs or values.
- e development - Development that meets the needs of the present generation without compromising the ability of future generations to meet their own needs.
- - takeskenes taken to protect computer systems and data from unauthorized access or attacks.
- - A situation where a single company or entity dominates a particular market or industry.
- - The use of living organisms or their products to develop or improve processes, products, or services.
- - A community of living organisms and their interactions with the environment.
12 Clues: - The study of heredity and the variation of inherited characteristics. • - A community of living organisms and their interactions with the environment. • - A situation where a single company or entity dominates a particular market or industry. • - takeskenes taken to protect computer systems and data from unauthorized access or attacks. • ...
test 2024-01-23
Across
- ___________ is a cybersecurity attack that can be mistaken for a hobby.
- ___________ is any automated Processing of Personal Data to evaluate, analyse or predict a Data Subject’s performance at work, economic situation, location, health, personal preferences, interests, reliability, behaviour, driving, location, or movements.
- Privacy By ____________ is a concept intended to anticipate, build, and manage privacy during the entire life cycle of a process/system/project/product/software, right from its concept to execution to retirement. Hint
- VFS privacy ______ provides individuals a clear explanation of our personal data handling practices at the time of collection.
- Within the Volvo Group, we collect 3 categories of personal data, HR data, Business Partner data & ____________ data.
- Racial or ethnic origin, Political opinions, Genetic data are examples of ____________ personal data
- _________ is the Volvo Group Appointed cloud-based SaaS Solution for managing Privacy Compliance. hint
Down
- A personal data _________ considered to be a security incident and can be either accidental or intentional/unlawful. You should immediately alert the IT service desk and VFS privacy office.
- _________ must be freely given and easy to withdraw.
- Information classified as _______ may cause significant damage (medium to high impact) to the Volvo Group, our business partners or an individual’s right to privacy if leaked.
- What does AI stand for?(2 words)
- Privacy __________ Screening questionnaire (PISQ) is a document to identify and minimize data protection risks within a process/system/project/software. Hint
12 Clues: What does AI stand for?(2 words) • _________ must be freely given and easy to withdraw. • ___________ is a cybersecurity attack that can be mistaken for a hobby. • Racial or ethnic origin, Political opinions, Genetic data are examples of ____________ personal data • ...
SECURITY DOMAIN 2023-11-03
Across
- / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access.
- / Means the program to increase the knowledge and improve the attitude that members of an organization possess regarding the protection of the physical, and especially informational, assets of an organization.
- / Responsible for managing and maintaining the security of computer systems, including user accounts, access controls, and system configurations.
- Issues / Refers to the ethical, legal, and social considerations related to technology and cybersecurity, including privacy and compliance issues.
- / Refer to the underlying software and hardware technologies that provide a foundation for building applications or services, like operating systems or cloud platforms.
Down
- / The study, planning and design of how people and computers work together so that a person’s need are satisfied in the most effective way.
- and Architecture / Addresses the security aspects of integrating different systems and designing secure system architectures.
- / Refers to physical security measures, such as securing data centers, facilities, and infrastructure from physical threats.
- / Centered on securing web applications, servers, and the communication between users and web services.
- / Refers to the practice of integrating different software components or systems to work together cohesively and efficiently.
- / Deals with the secure handling, storage, retrieval, and sharing of sensitive information and data within an organization.
- / Refers to the foundational principles and concepts in computer programming, such as data structures, algorithms, and coding basics.
12 Clues: / Centered on securing web applications, servers, and the communication between users and web services. • / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access. • ...
Cyber Security 1 2023-04-23
Across
- Manipulative tactics used by cybercriminals to trick people into divulging sensitive information or performing actions that compromise security.
- The part of the internet not indexed by search engines and accessible only through special software, often associated with illegal activities.
- An incident in which unauthorized individuals gain access to sensitive, protected, or confidential data.
- An additional layer of security that requires a user to provide two separate pieces of evidence for authentication.
- The process of converting data into a code to prevent unauthorized access.
- A trial-and-error method used by attackers to gain access to an account or system by systematically guessing passwords or encryption keys.
- A string of characters used to authenticate a user's identity and grant access to a computer system or account.
Down
- Malicious software designed to infiltrate or damage computer systems, networks, or devices.
- A virtual private network that extends a private network across a public network, allowing users to send and receive data securely and anonymously.
- A type of malicious software that encrypts a victim's files and demands payment for their release.
- The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
- A piece of information used to decrypt or encrypt data, ensuring its confidentiality and integrity.
- A network of compromised computers remotely controlled by a cybercriminal to perform tasks such as launching attacks or sending spam emails.
- A security system that controls incoming and outgoing network traffic based on predetermined rules.
- A cyber attack that attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.
15 Clues: The process of converting data into a code to prevent unauthorized access. • Malicious software designed to infiltrate or damage computer systems, networks, or devices. • A type of malicious software that encrypts a victim's files and demands payment for their release. • ...
GROUP 2 2024-02-13
Across
- It stresses technical knowledge and proficiency.
- It is mental dispositions people have towards others and the current circumstances before making decisions that result in behaviour.
- It is the ability of an individual or a group of people to influence and guide followers or members of an organization, society or team.
- It is the process of defining the architecture, interfaces, and data for a system that satisfies specific requirements.
- It refers to where the software or products have been made live for use of the intended users.
- It is the process of finding and eliminating the cause of a problem.
- It is the practice of protecting systems, networks, and programs from digital attacks.
- It means you can respond quickly to changing ideas, responsibilities, expectations, trends, strategies and other processes.
Down
- It uses and examines pre-release software to identify errors, missteps, or bugs that may hinder end-user, or customer experience.
- They design, program, build, deploy and maintain software using many different skills and tools.
- It refers to all the public websites or pages that users can access on their local computers and other devices through the internet.
- It is a person who uses analysis and design techniques to solve business problems using information technology.
- It is the process of acquiring new understanding, knowledge, behaviors, skills, values, attitudes, and preferences.
- It is the process of gradually improving or getting nearer to achieving or completing something.
- It is about having strong principles and values, which you demonstrate through your conduct in the work environment
15 Clues: It stresses technical knowledge and proficiency. • It is the process of finding and eliminating the cause of a problem. • It is the practice of protecting systems, networks, and programs from digital attacks. • It refers to where the software or products have been made live for use of the intended users. • ...
Cybersecurity Revision 2022-10-19
Facebook Ethics 2023-09-22
Across
- - Facts and statistics collected together for reference or analysis
- - To control or play upon by artful, unfair, or insidious means especially to one's own advantage
- - An international, malicious attack on an organisation or an individual by targeting their computer systems and accessing their data, including confidential data such as banking data
- - A stated outcome that a business aims to achieve; can be broadly stated in vision and mission statements, or more narrowly stated with measurable outcomes.
- - A situation involving exposure to danger
- - Detailed examination of the elements or structure of something
Down
- Analytics - Two words. The process of inspecting and modelling data in order to discover useful information
- - A set of instructions to solve a problem or to complete a task or computation.
- - A collection of data that is organised to be easily accessed, managed, explored and updated
- - The practice of defending computers and IT systems against malicious attacks
- - Company that owns and operates Facebook, Instagram, Threads, and Whatsapp and also has an alternative name
- - is the overall long-term target or goal of the business, whereas business objectives are the short-term steps a business needs to take to meet its overall aims.
- - The state or condition of being free from being observed or disturbed by other people.
- - View that businesses, rather than focusing solely on increasing shareholder value, should contribute to the economic, social and environmental well-being of society
- - Refers to the moral principles and values that form the basis of how a person or organisation conducts their activities
- - Taking something in someone's property without permission or legal right and without intending to return it.
16 Clues: - A situation involving exposure to danger • - Detailed examination of the elements or structure of something • - Facts and statistics collected together for reference or analysis • - The practice of defending computers and IT systems against malicious attacks • - A set of instructions to solve a problem or to complete a task or computation. • ...
EMPTECH QUIZ 2024-09-18
Across
- primary characteristic of Web 1.0
- The ability of a person to determine for themselves when, how, and to what extent personal information about them is shared with or communicated to others
- This web is also known as WEB 2.0.
- A type of social engineering attack often used to steal user data, including login credentials and credit card numbers by “reeling in” victims through several and often unsophisticated ways
- Service that is offered on-demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file size-based pricing or vice versa.
- Occurs when a criminal obtains or uses the personal information of someone else to assume their identity or access their accounts to commit fraud, receive benefits, or gaining financially in some way
- any criminal activity that involves the use of a computer, networked device, or a network as an instrument to further illegal ends
- the use of scientific knowledge, experience and resources to create processes and products that fulfill human needs.
Down
- Refers to the online security or safety of people and their information when using the internet
- Involves activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks through unauthorized access
- It was invented by Tim Berners-Lee in 1989.
- proper manner of communication in the online environment
- refers to the knowledge obtained from reading, investigation, study or research. The tools to transmit information are the telephone, television and radio.
- type of false information that is used for political agenda
- is an act of transmitting messages.
15 Clues: primary characteristic of Web 1.0 • This web is also known as WEB 2.0. • is an act of transmitting messages. • It was invented by Tim Berners-Lee in 1989. • proper manner of communication in the online environment • type of false information that is used for political agenda • ...
Cyber security 2022-10-19
Across
- In order to ensure the security of the data/information, we need to ____________ the data:
- _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- ________is actually considered the first computer virus?
- ________ is when attackers send malicious emails designed to trick people into falling for a scam.
- ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
- __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Advertising software can be used to spread malware.
- _______ is a program that secretly records what a user does so that cybercriminals can make use of this information.
- Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
- _______ is a type of software designed to help the user's computer detect viruses and avoid them.
- _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
- _______ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
- Which wifi cummunication protocol is more Secure?
15 Clues: Which wifi cummunication protocol is more Secure? • Advertising software can be used to spread malware. • ________is actually considered the first computer virus? • In order to ensure the security of the data/information, we need to ____________ the data: • _______ is a type of software designed to help the user's computer detect viruses and avoid them. • ...
AI Meetup Crosswords 2023-11-28
Across
- It is a cybersecurity company that utilizes artificial intelligence and machine learning to provide solutions for threat detection and response in real-time.
- refers to raw facts, figures, or information that can be processed and analyzed to extract meaningful insights
- In the context of machine learning, they are individual measurable properties or characteristics of the data used to make predictions or decisions
- In machine learning,it is the variable you are trying to predict or the outcome you are trying to achieve
- A social humanoid robot developed by Hong Kong-based company Hanson Robotics
- a type of machine learning where the model is given unlabeled data and must find patterns or relationships within the data on its own.
- a software agent that can perform tasks or services for an individual. Examples include voice-activated assistants like Siri, Google Assistant, and Alexa.
- Subset of ML in which multilayered Neural Networks learn from vast amount of data
Down
- A type of data that Can be displayed in rows , spreadsheet , Relational Database.
- Algorithmes whose performance improve as they are exposed to more data over time
- A type of data that Cannot be displayed in rows,Relational Database.
- The process to extract value from data and use it to make decisions
- A program that can sense,reason,act and adapt
- it a computational model inspired by the structure and function of the human brain ,Normally used in deep learning.
- Research laboratory that created and developed ChatGPT
- is a type of machine learning where the model is trained on a labeled dataset(That has a target)
- An electric vehicle and clean energy company known for its electric cars, energy storage solutions, and solar products. It was founded by Elon Musk and others.
17 Clues: A program that can sense,reason,act and adapt • Research laboratory that created and developed ChatGPT • A type of data that Cannot be displayed in rows,Relational Database. • The process to extract value from data and use it to make decisions • A social humanoid robot developed by Hong Kong-based company Hanson Robotics • ...
Technology 2023-05-09
Across
- The process of creating a physical object from a digital design by adding successive layers of material.
- the ability of machines to perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making
- the practice of protecting computer systems and networks from digital attacks, theft, and damage
- A device that detects or measures physical stimuli such as light, sound, or motion.
- a technology that overlays digital information onto the real world, usually viewed through a device like a smartphone or headset
- A set of instructions or rules that a computer program follows to perform a task or solve a problem.
- Energy that is generated from renewable sources such as wind, solar, or hydro power.
Down
- a computer-generated simulation of a three-dimensional environment that can be interacted with using special equipment
- a mobile device that can make calls, send text messages, and access the internet
- the study and application of extremely small things, such as molecules and atoms, for use in fields like medicine and electronics.
- the delivery of computing services, including servers, storage, databases, and software, over the internet
- a type of AI that uses algorithms to enable machines to learn from and make decisions based on data, without being explicitly programmed
- A portable computer that can be easily carried and used in various locations.
- an electronic device that can store, retrieve, and process data
- the use of living organisms, cells, or biological processes to develop new products or solve problems.
- websites and applications that allow users to create and share content, and connect with other users
- a way to send and receive messages over the internet
17 Clues: a way to send and receive messages over the internet • an electronic device that can store, retrieve, and process data • A portable computer that can be easily carried and used in various locations. • a mobile device that can make calls, send text messages, and access the internet • ...
Know your QMS! 2020-07-23
Across
- A Bug state where all work activities except test is done and includes investigation, design, code, documentation etc (6)
- Process of protecting information by preventing, detecting and responding to attacks (13)
- A term used for testing an application with the primary goal of getting the application to fail. It is synonymous with "negative" testing or "exceptions" testing. (11,8)
- The manufacturer’s objective intent for the device and its usage – Intended use (8,3)
- Folder in DHF structure where documentation such as drawings, product documentation, labeling, device specifications, sw documentation etc…..(6,6)
- Any change to product is controlled by a 7 step process (11,6,5)
- Name one of the project outcomes of tollgate meetings where the project is being terminated and the result is documented (4)
- Instruction that outlines how to assign a software safety class based on the risk of harm, defined in the product risk management plan (8,6,14)
Down
- The group that decides to approve or postpone or reject proposed changes for a specific project (6,7,5)
- The Software Hotfix Release process cannot be used for _______________ modifications(10)
- Examination of your task/activities performed at every milestone of your project(6,6)
- One of the activities performed periodically to check if the __________________ is carried out as described in the PMS Plan (4,6,12)
- Name of the procedure in RMED QMS where the ‘Retention Period’ for all the created documents are specified (7,6)
- Defined as any identifiable part of a computer program, i.e., source code, object code, control code, control data, or a collection of these (8, 4)
- QSR Section number related to Design Verification (3,2,1)
15 Clues: QSR Section number related to Design Verification (3,2,1) • Any change to product is controlled by a 7 step process (11,6,5) • Examination of your task/activities performed at every milestone of your project(6,6) • The manufacturer’s objective intent for the device and its usage – Intended use (8,3) • ...
Know your QMS! 2020-07-23
Across
- A Bug state where all work activities except test is done and includes investigation, design, code, documentation etc (6)
- Process of protecting information by preventing, detecting and responding to attacks (13)
- A term used for testing an application with the primary goal of getting the application to fail. It is synonymous with "negative" testing or "exceptions" testing. (11,8)
- The manufacturer’s objective intent for the device and its usage(8,3)
- Folder in DHF structure where documentation such as drawings, product documentation, labeling, device specifications, sw documentation etc…..(6,6)
- Any change to product is controlled by a 7 step process (11,6,5)
- Name one of the project outcomes of tollgate meetings where the project is being terminated and the result is documented (4)
- Instruction that outlines how to assign a software safety class based on the risk of harm, defined in the product risk management plan (8,6,14)
Down
- The group that decides to approve or postpone or reject proposed changes for a specific project (6,7,5)
- The Software Hotfix Release process cannot be used for _______________ modifications(10)
- Examination of your task/activities performed at every milestone of your project(6,6)
- One of the activities performed periodically to check if the __________________ is carried out as described in the PMS Plan (4,6,12)
- Name of the procedure in RMED QMS where the ‘Retention Period’ for all the created documents are specified (7,6)
- Defined as any identifiable part of a computer program, i.e., source code, object code, control code, control data, or a collection of these (8, 4)
- QSR Section number related to Design Verification (3,2,1)
15 Clues: QSR Section number related to Design Verification (3,2,1) • Any change to product is controlled by a 7 step process (11,6,5) • The manufacturer’s objective intent for the device and its usage(8,3) • Examination of your task/activities performed at every milestone of your project(6,6) • ...
Executive Departments Crossword Puzzle 2022-02-10
Across
- Responsible for fostering, promoting, and developing the welfare of the wage earners, such as federal minimum wage and overtime pay.
- Responsible for providing benefits, health care and cemetery services, such as the National Cemetery Administration.
- Responsible for providing leadership on food, agriculture, natural resources, and related issues, such as managing the American farming industry
- Responsible for managing public lands and minerals, such as the National Park Service.
- Responsible for leading and facilitating the development and implementation of a quality public education system, such as collecting data on trends.
- Responsible for promoting job creation and economic growth by ensuring fair trade, such as measuring the health and vitality of the economy
- Responsible for providing the military forces needed to deter war, such as the Army or Navy.
Down
- Responsible for administering programs that provide community developing assistance, such as revitalizing neighborhoods
- Responsible for advising the President and leads the nation in foreign policy issues, such as the CIA and the US Agency
- Responsible for advancing the environmental and nuclear security of the US, such as managing the US nuclear infrastructure.
- Responsible for enforcing the law and defending the interests of the US, such as the FBI.
- Responsible for counterterrorism, cybersecurity, aviation security, such as the US Customs and Border Patrol.
- Responsible for planning and coordinating federal transportation projects, such as the Federal Highway Administration.
- Responsible for managing Federal finances by collecting taxes and paying bills, such as enforcing finance and tax laws
- Responsible for enhancing the health and well-being of all Americans, such as providing essential human services.
15 Clues: Responsible for managing public lands and minerals, such as the National Park Service. • Responsible for enforcing the law and defending the interests of the US, such as the FBI. • Responsible for providing the military forces needed to deter war, such as the Army or Navy. • ...
Defense Departments 2024-05-14
Across
- Experts who protect computers and the internet from bad guys who try to do harm.
- Brave people who wear uniforms and work together to keep our country safe. They have different groups like the Army, Navy, Air Force, and Marines.
- A big, five-sided building where important decisions about keeping our country safe are made.
- Pilots who fly planes way up in the sky to protect us.
- Brave sailors who protect our seas and oceans. They travel on big ships.
- Part-time soldiers who help out in emergencies like floods or fires. They also protect our country when needed.
- Tools and machines that soldiers use to defend our country, like guns, tanks, and planes.
Down
- People who make sure our country is safe from bad things like terrorists or big disasters.
- Soldiers who work on the ground, marching and using tanks and big guns.
- Heroes who keep our coasts safe. They rescue people in trouble and stop bad guys on the water.
- Smart people who find out important information to keep us safe. They solve puzzles to know what’s going on in the world.
- Making sure all the right things are in the right place at the right time for our soldiers to do their job well.
- Protecting our country and people from bad things happening.
- Planning Figuring out the best ways to keep our country safe and making plans to do it.
- Tough soldiers who can fight on land or at sea. They’re like a mix of the Army and Navy.
15 Clues: Pilots who fly planes way up in the sky to protect us. • Protecting our country and people from bad things happening. • Soldiers who work on the ground, marching and using tanks and big guns. • Brave sailors who protect our seas and oceans. They travel on big ships. • Experts who protect computers and the internet from bad guys who try to do harm. • ...
Trends 2021 2021-01-11
Across
- Intelligence Two common words for new age term for machine learning often shortened to two letters
- AWS, Google, Microsoft all offer this – ensuring access to information stored in the ____
- AI -A term referring to the governance of robotics and machine learning. risk, trust, transparency, ethics, fairness, interpretability, accountability, safety and compliance
- Acronym for the current industry revolution.
- Something most people make up in the beginning of January, but most broken later in the year
- the technology that is the next generation and rolled out in SA in 2020 by Vodacom and MTN. Some conspiracy theorists also think its linked to the coronavirus
Down
- experience Customers continue to expect the brands they do business with to deliver on their higher expectations. Customers have become smarter and more impatient, companies must deliver on this (hint Cx)
- – South Africa will receive 1 million doses of this from India at the end of January
- Umbrella tech term top of the IT agenda to ensure integrity and safety of network
- One of the larger international streaming partners available in South Africa
- a freemium video and conferencing based tool which exploded in growth and subscriptions in 2020
- privacy Increasing cry amongst internet and social media users, customers and employees where information is shared online. References some parts of the POPI act
- from Home –Term used regarding new way for employees, starting with the acronym WFH
- Edge New technology trend which is “more clever” and happening closer to the source or locality
- RAN A new standard currently being deployed in Radio Access Networks to reduce vendor lock in.
15 Clues: Acronym for the current industry revolution. • One of the larger international streaming partners available in South Africa • Umbrella tech term top of the IT agenda to ensure integrity and safety of network • from Home –Term used regarding new way for employees, starting with the acronym WFH • ...
DIGITAL TECHNOLOGY AND YOU 2024-09-02
Across
- Responsible and respectful behavior when using the internet and digital tools.
- How you present yourself online, including your profiles, activities, and personal information.
- An online space where teachers and students interact, similar to a traditional classroom but conducted over the internet.
- of Things A network of connected devices, such as appliances and wearables, that communicate and exchange data over the internet.
- Well-Being Maintaining a healthy balance of technology use that supports mental and physical health.
- The use of digital communication to provide healthcare remotely, such as video consultations with doctors.
- Storage A service that allows you to save data online instead of on a local computer or device, making it accessible from anywhere.
Down
- A mobile device that combines a phone with a variety of functions such as internet access, apps, and a camera.
- Measures and practices to protect devices, networks, and data from digital attacks and unauthorized access.
- A wearable device that tracks fitness, shows notifications, and often includes apps, similar to a small smartphone on your wrist.
- The process of sending and receiving messages or information using digital devices like phones or computers.
- The ability to use digital tools and platforms to find, evaluate, create, and communicate information responsibly.
- The study of designing equipment and workspaces to fit the user's needs, reducing strain and improving comfort.
- Education that takes place over the internet, using digital tools like virtual classrooms and educational platforms.
- Devices Gadgets that connect to the internet and can be controlled remotely, like smart lights or thermostats.
15 Clues: Responsible and respectful behavior when using the internet and digital tools. • How you present yourself online, including your profiles, activities, and personal information. • Well-Being Maintaining a healthy balance of technology use that supports mental and physical health. • ...
ADSI Oscar Gómez 2022-06-01
Across
- a set of lines of text with the steps that the computer must follow
- Set of information found at a given internet address.
- is the name by which an organized set of processed data is known
- creation, modification, use and knowledge of tools, machines, techniques, systems and methods of organization
- Set of physical or material elements that constitute a computer or a computer system.
- It is the process of creating a set of data that tells a computer how to perform some type of task.
- Figure,letter or word that is processed and becomes information
- gives a person, in this case the programmer, the ability to write a series of instructions
- are the instructions to communicate with the computer and that make it possible to use it
Down
- is the area related to computing and telematics that focuses on the protection of computing infrastructure
- is an electronic document or information capable of containing text, sound, video, programs, links, images, hyperlinks and many other things
- to those tools that users can use by accessing a web server through the internet
- is the use of a network of remote servers connected to the internet to store, manage and process data, servers, databases, networks and software
- It is a programmable digital electronic machine that executes a series of commands to process the input data, conveniently obtaining information that is later sent to the output units.
- It is an organized collection of information or structured data, which is usually stored electronically in a computer system.
15 Clues: Set of information found at a given internet address. • Figure,letter or word that is processed and becomes information • is the name by which an organized set of processed data is known • a set of lines of text with the steps that the computer must follow • to those tools that users can use by accessing a web server through the internet • ...
"Cybersecurity Glossary". 2024-02-04
Fintech 2022-09-23
Cybersecurity Awareness Crossword 2022-09-10
Across
- _______security provides the first line of defence against unauthorized access to your computer and personal information
- is an attack that attempts to steal your money or your identity via email
Down
- is an attack that attempts to steal your money or your identity via voice call
- malware designed to deny a user or organization access to files on their computer
4 Clues: is an attack that attempts to steal your money or your identity via email • is an attack that attempts to steal your money or your identity via voice call • malware designed to deny a user or organization access to files on their computer • ...
Cybersecurity Units 1 & 2 Vocab 2024-10-03
Across
- A type of cyberattack disguised as a legitimate communication.
- A cipher that shifts letters by a fixed amount.
- The process of encoding data to protect it from unauthorized access.
Down
- A one-way function that transforms data into a fixed-length string.
- Data that provides information about other data, often hidden.
- What attackers try to guess or crack to access accounts.
- A language only computers speak.
7 Clues: A language only computers speak. • A cipher that shifts letters by a fixed amount. • What attackers try to guess or crack to access accounts. • Data that provides information about other data, often hidden. • A type of cyberattack disguised as a legitimate communication. • A one-way function that transforms data into a fixed-length string. • ...