cybersecurity Crossword Puzzles
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Cybersecurity Last Test Vocab Review 2022-12-16
Across
- A cipher in which an encryption key, such as a word or phrase, is chosen and used to index to a row in the table. Each letter of the key indicates which row to use. To encrypt a message, you find the original letter in the appropriate row and use the letter at the top of the table as the encrypted character.
- ____ key encryption. A type of private key encryption is an encryption method where the sender and receiver share a single private key (such as a number, word, or phrase) to use in the encryption algorithm.
- The original message that needs to be encrypted
- The science and art of delivering a message securely and confidentially.
- ____ key encryption Also known as public key encryption; an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. The keys are combined mathematically to create one key used in the encryption/decryption algorithm
- this part of the CIA triad involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people.
- the practice of concealing messages within other data, such as text or images.
- The encrypted message generated by a cipher
- A file that contains other data and acts like a drive. It can be mounted (connected to) or unmounted (removed from) a drive letter, giving administrators greater control when making the data available to users.
Down
- ____ Watermarking. Authors or creators of works may embed some code or a signature to be used to verify where the work came from and who the owner is.
- ____ Steganography replaces redundant or insignificant data with covert data. LSB substitution is an example of this, where that last bit in a byte is used to encode information. An example of this would be reserving the last bit in each byte that represents a 24-bit pixel of an image to encode 3 bits worth of information.
- this part of the CIA triad is roughly equivalent to privacy. This measures are designed to prevent sensitive information from unauthorized access attempts. It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands. More or less stringent measures can then be implemented according to those categories.
- In hash functions, the same message always results in the same hash.
- this part of the CIA triad means information should be consistently and readily accessible for authorized parties.
- ____ function A computational process that converts data of varying size to a fixed-size. The data is converted using a one-way function so the process cannot be reversed.
- an algorithm used for encryption or decryption
16 Clues: The encrypted message generated by a cipher • an algorithm used for encryption or decryption • The original message that needs to be encrypted • In hash functions, the same message always results in the same hash. • The science and art of delivering a message securely and confidentially. • ...
TECHNOLOGY 2020-11-24
Across
- METHOD BY WHICH USERS ACCESS AND SAVE SOFTWARE OR OTHER FILES TO THEIR OWN COMPUTERS
- MEASURES DESIGNED TO PROTECT YOUR COMPUTER
- A CONVENTIONAL METHOD OF TRANSMITTING DATA
- A WIRELESS COMMUNICATION TECHNOLOGY INTENDED TO REPLACE CABLES
- A SOFTWARE PROGRAM THAT ALLOWS YOU TO SURF THE WEB
- A DOCUMENT SENT WITH AN EMAIL MESSAGE
- CARD A VIDEO ADAPTER
- ELECTRONIC MAIL IS A WAY OF SENDING MESSAGES OVER THE INTERNET
Down
- A SMALL PROGRAM THAT ALLOWS A PERIPHERAL DEVICE SUCH AS PRINTER OR SCANNER TO CONNECT TO YOUR PC
- TO LOAD AND INITIALISE THE OPERATING SYSTEM ON A COMPUTER
- A WEBSITE'S TEXT AND INFORMATION, AS OPPOSED TO ITS DESIGN AND STRUCTURE
- ACROBAT READER SOFTWARE THAT ALLOWS YOU TO VIEW A PDF DOCUMENT
- A SAVED LINK TO A PARTICULAR WEBPAGE
- TEMPORARILY STORED ON YOUR COMPUTER
- REALITY THE INTEGRATION OF DIGITAL INFORMATION WITH LIVE VIDEO
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS AND CALCULATIONS THAT MAKE YOUR COMPUTER RUN
- SMALLEST UNIT OF MEASUREMENT IN COMPUTING
17 Clues: CARD A VIDEO ADAPTER • TEMPORARILY STORED ON YOUR COMPUTER • A SAVED LINK TO A PARTICULAR WEBPAGE • A DOCUMENT SENT WITH AN EMAIL MESSAGE • SMALLEST UNIT OF MEASUREMENT IN COMPUTING • MEASURES DESIGNED TO PROTECT YOUR COMPUTER • A CONVENTIONAL METHOD OF TRANSMITTING DATA • A SOFTWARE PROGRAM THAT ALLOWS YOU TO SURF THE WEB • ...
Responds & Report Security Risks 2023-11-13
Across
- IT or tech professionals who can fix security issues.
- Action to take when you suspect a security problem – like turning off the water in a leaky house.
- Potential threats or vulnerabilities that could harm digital systems.
- Staying watchful and alert to potential security threats.
Down
- Unauthorized access
- One of the aspects compromised by security risks, involves protecting sensitive information.
- A collective effort to create a safer digital environment by addressing potential risks.
7 Clues: Unauthorized access • IT or tech professionals who can fix security issues. • Staying watchful and alert to potential security threats. • Potential threats or vulnerabilities that could harm digital systems. • A collective effort to create a safer digital environment by addressing potential risks. • ...
Crossword puzzle- Gaby Perez 2023-03-22
Across
- the second word in anglo pride.
- synonym of generous.
- an electronic device for storing and processing data.
- a global computer network providing a variety of information.
- Something you read.
- a person who takes care of things and is independent.
- the fifth word in anglo pride.
- a flat panel or area on an electronic device such as a television.
- movie about a boy whos a wizard.
- the machines, wiring, and other physical components of a computer or other electronic system.
- a person who sleeps a lot.
- the main means of mass communication.
Down
- the third word in anglo pride.
- the state of being protected against the criminal or unauthorized use of electronic data.
- a system for transmitting voices over a distance.
- the first word in anglo pride.
- the forth word in anglo pride.
- a small, movable device that lets you control a range of things on a computer.
- the programs and other operating information used by a computer.
- the transmission and reception of electromagnetic waves of radio frequency.
20 Clues: Something you read. • synonym of generous. • a person who sleeps a lot. • the third word in anglo pride. • the first word in anglo pride. • the forth word in anglo pride. • the fifth word in anglo pride. • the second word in anglo pride. • movie about a boy whos a wizard. • the main means of mass communication. • a system for transmitting voices over a distance. • ...
test 2022-07-15
Across
- City sammi did her internship in -
- Engagement ring shape -
- Sammi’s side hustle -
- How we are honoring sammis dad at the wedding -
- Where they ate on their first date -
- Sauce michael hates -
- Type of dance sammi did growing up -
- Industry sammi works in -
- Day of the week they attend life group -
- Sammis favorite flowers -
- Attends ___ ___ community church -
- Location of their first post together on IG -
- Year they met -
- Month they met -
- City they will live in after the wedding -
Down
- Amusement park they had annual passes to -
- City they took their engagement photos -
- Music festival they attended -
- Destination of first plane ride together -
- Color of michaels bathroom before they painted it -
- Basketball team michael supports -
- Brand of sammi’s car -
- State michael was raised in -
- European country michael lived in -
- Type of engineer Michael is -
- Sammis bridal shower was a ___ party -
- Michael proposed in ___ beach -
- On the way to Big Sur they stopped at an ___ farm -
- How they met
- City of the music festival they attended -
30 Clues: How they met • Year they met - • Month they met - • Sammi’s side hustle - • Sauce michael hates - • Brand of sammi’s car - • Engagement ring shape - • Industry sammi works in - • Sammis favorite flowers - • State michael was raised in - • Type of engineer Michael is - • Music festival they attended - • Michael proposed in ___ beach - • City sammi did her internship in - • ...
Cyber Security 2023-09-09
Across
- the protection of data and systems.
- insurance that provides liability.
- training to help educate about possible cyber threats.
- software designed with malicious intent to steal/destroy data.
- a type of malware used to encrypt files and obtain data.
- protecting connected devices and networks from unauthorized access.
- the conversion of readable data to encoded data.
- protects data from physical actions.
- insurance that covers losses money.
- a group of steps that show how to execute a test.
- an organization to help businesses manage cybersecurity risks.
- a set of requirements to help create strong passwords.
Down
- when someone pretends to be something to steal data.
- changes made to a software to improve it.
- helps cover a business's losses from a cyber attack.
- saving data in a different secure and safe place in case data is lost.
- encrypted security used to protect Wi-Fi networks.
- stealing information from an unaware person through the internet.
- a strategy made to protect businesses from threats.
- an attack used to obtain sensitive data by acting as a trusted source.
20 Clues: insurance that provides liability. • the protection of data and systems. • insurance that covers losses money. • protects data from physical actions. • changes made to a software to improve it. • the conversion of readable data to encoded data. • a group of steps that show how to execute a test. • encrypted security used to protect Wi-Fi networks. • ...
TTS Evolusi Teknologi 2024-08-30
Across
- Kendaraan udara tanpa awak yang dikendalikan secara remote atau otomatis
- Teknologi pencatatan informasi yang sulit untuk diubah atau dihack
- Algoritma yang memungkinkan mesin untuk belajar dari data
- Pengalaman yang mensimulasikan lingkungan melalui komputer
- Jaringan global yang menghubungkan komputer di seluruh dunia
- Mobil yang bisa beroperasi tanpa pengemudi manusia
- Mata uang digital yang menggunakan kriptografi untuk keamanan
- Penyimpanan dan pengolahan data yang dilakukan di server jarak jauh
- Komponen dasar dalam elektronik yang memungkinkan kontrol arus listrik
- Kumpulan data sangat besar yang tidak bisa diolah menggunakan metode tradisional
- Bahan dasar pembuatan transistor yang memiliki konduktivitas di antara konduktor dan isolator
- Perlindungan untuk sistem informasi dari serangan cyber
Down
- Sistem yang terinspirasi dari otak manusia untuk mengolah informasi
- Media transmisi cahaya yang digunakan untuk komunikasi data berkecepatan tinggi
- Teknologi nirkabel untuk mentransfer data antar perangkat dalam jarak dekat
- Program komputer yang dirancang untuk mensimulasikan percakapan dengan pengguna manusia
- Teknologi nirkabel yang memungkinkan koneksi internet tanpa kabel
- Kecil namun sangat penting, jantung dari semua perangkat modern
- Sistem yang memungkinkan penentuan posisi di permukaan bumi dengan presisi
- Perangkat yang menggabungkan telepon dengan komputer pribadi
20 Clues: Mobil yang bisa beroperasi tanpa pengemudi manusia • Perlindungan untuk sistem informasi dari serangan cyber • Algoritma yang memungkinkan mesin untuk belajar dari data • Pengalaman yang mensimulasikan lingkungan melalui komputer • Jaringan global yang menghubungkan komputer di seluruh dunia • Perangkat yang menggabungkan telepon dengan komputer pribadi • ...
Cyber Physical Systems 2025-03-20
Across
- The process of making systems operate without human intervention.
- Using models to replicate real-world behaviors.
- A decentralized and secure digital ledger technology.
- Internet-based computing providing storage and processing power.
- Related to manufacturing and production systems.
- A network of connected devices that communicate over the internet.
- Study of control and communication in machines and living beings.
- The ability of different systems to work together.
- A virtual replica of a physical system for monitoring and analysis.
- Devices that detect and respond to physical changes.
Down
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- The capability of a system to function independently.
- A computing system integrated into a larger system.
- Devices that convert electrical signals into mechanical motion.
- A highly automated, connected, and intelligent manufacturing system.
- Machine-based intelligence that enables decision-making.
- Combining different subsystems into a unified system.
- Large volumes of data used for analytics and decision-making.
- Processing data closer to the source rather than a central server.
20 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
Fisika: Teknologi Digital 2025-02-19
Across
- Teknologi yang menirukan pemikiran dan logika manusia.
- Teknologi untuk mencatat transaksi digital dengan cara terdesentralisasi dan aman.
- Komponen fisik dari sebuah sistem komputer.
- Generasi kelima dari jaringan seluler ya
- Mesin dimana rancangan algoritmik dapat berjalan.
- Jaringan perangkat fisik yang terhubung ke internet untuk pertukaran data.
- Sistem penyimpanan data terkumpul secara teratur.
- Perangkat lunak yang mengatur bejalannya program perangkat komputer.
- Teknologi yang menggabungkan dunia nyata dengan objek virtual.
- Pengalaman simulasi digital yang menggantikan dunia nyata.
- penyimpanan data secara daring melalui server yang dapat diakses dimanapun dengan koneksi internet.
Down
- Metode pembelajaran mesin yang memungkinkan algoritma untuk belajar dari data.
- Teknologi yang memungkinkan pembuatan versi virtual dari suatu hal di dunia nyata.
- Praktik melindungi sistem komputer dan jaringan dari ancaman digital.
- Penghubungan berbagai perangkat digital untuk membagi informasi.
- Serangkaian langkah-langkah sistematis yang memiliki tujuan tertentu.
- Pengolahan dan analisis volume data yang sangat besar dan kompleks.
- Informasi yang diproses atau disimpan dalam sistem digital.
- Proses mengubah data menjadi format yang tidak dapat dibaca tanpa kunci tertentu.
- Program lunak yang menjalani fungsi tertentu pada perangkat digital.
20 Clues: Generasi kelima dari jaringan seluler ya • Komponen fisik dari sebuah sistem komputer. • Mesin dimana rancangan algoritmik dapat berjalan. • Sistem penyimpanan data terkumpul secara teratur. • Teknologi yang menirukan pemikiran dan logika manusia. • Pengalaman simulasi digital yang menggantikan dunia nyata. • ...
TTS INFORMATIKA 2025-04-10
Across
- salah satu bentuk konten digital berupa gambar
- profesi yang menganalisis data untuk pengambilan keputusan
- orang yang merancang tampilan dan interaksi pengguna
- simbol dalam pencarian untuk mengecualikan data
- domain khusus untuk organisasi
- platform media sosial sering menjadi tempat penyebaran konten
- tindakan menggunakan karya cipta tanpa izin
- orang yang membangun dan memelihara jaringan komputer
- tanda yang digunakan untuk mencari frasa
- profesi yang bertanggung jawab atas keamanan sistem komputer
- hak eksklusif pencipta atas karya intelektualnya
- perintah untuk mengakses data dalam database
- pengecekan fakta oleh pihak yang kompeten
Down
- salah satu tujuan HAKI adalah mendorong
- Hasil karya dalam bentuk digital
- proses memastikan kebenaran suatu informasi
- platform berbagi video populer
- salah satu cara memvalidasi konten adalah dengan memeriksa
- perlindungan hukum untuk invensi baru
- orang yang ahli dalam mengembangkan perangkat lunak
- elemen khas suatu kelompok masyarakat yang dimasukkan dalam konten
- mesin untuk mencari informasi di internet
- proses menyebarkan konten digital ke berbagai platform
- kegiatan membuat dan menyebarkan konten digital
- masa berlaku perlindungan hak cipta umumnya ... tahun setelah pencipta meninggal
- informasi palsu yang disebarkan untuk menipu
26 Clues: platform berbagi video populer • domain khusus untuk organisasi • Hasil karya dalam bentuk digital • perlindungan hukum untuk invensi baru • salah satu tujuan HAKI adalah mendorong • tanda yang digunakan untuk mencari frasa • mesin untuk mencari informasi di internet • pengecekan fakta oleh pihak yang kompeten • proses memastikan kebenaran suatu informasi • ...
tts informatika jasmine ivanov xg 19 2025-04-10
Across
- Orang yang mengedit konten
- Proses mencari informasi di internet
- Bentuk perlindungan HAKI untuk karya seni.
- Hak ekslusif atas suatu penemuan
- Mesin pencari bawaan Microsoft
- Mesin pencari populer di dunia
- Konten digital yang berupa tulisan
- Mesin pencari yang fokus pada privasi pengguna
- Hak ekslusif atas suatu merek dagang
- Platform medsos berbasis foto dan video
- Profesi yang mengelola jaringan komputer
- Konten yang berisi ujaran kebencian
- Alamat untuk mengakses situs web
- Proses pembuatan konten digital
- Proses penyebaran konten di internet
- Konten yang berisi informasi palsu
Down
- Bertugas menjaga keamanan sistem komputer
- Proses menilai kebenaran konten
- Hasil pencarian yang ditampilkan
- Profesi yang mendesain antarmuka pengguna
- Profesi yang merancang dan membangun situs web
- Profesi yang membuat perangkat lunak
- Platform untuk video berdurasi panjang
- Platform untuk menyebarkan tulisan dan artikel
- Profesi yang membuat konten digital
- Konten yang mengandung tindakan kekerasan
- Profesi yang bertugas untuk mengelola data
- Mesin pencari dari Tiongkok
- Organisasi yang bertugas memvalidasi konten negatif di Indonesia
- Lembaga yang mengurus HAKI di Indonesia
30 Clues: Orang yang mengedit konten • Mesin pencari dari Tiongkok • Mesin pencari bawaan Microsoft • Mesin pencari populer di dunia • Proses menilai kebenaran konten • Proses pembuatan konten digital • Hasil pencarian yang ditampilkan • Hak ekslusif atas suatu penemuan • Alamat untuk mengakses situs web • Konten digital yang berupa tulisan • Konten yang berisi informasi palsu • ...
Giulia 2025-05-13
Across
- A wearable device that tracks fitness and shows notifications
- Storage of data on remote servers accessed via the internet
- A handheld device that combines a phone with a computer
- Measures taken to protect digital systems from attacks
- A software program designed for mobile devices
- An unmanned flying device often controlled remotely
- Wireless technology used to connect devices to the internet
- A secret word or phrase used for authentication
- A display that responds to touch input
- The name used to identify a user in a system
- A program designed to simulate conversation with humans
- A global network that connects millions of computers
- A machine that creates three-dimensional objects from digital files
Down
- A digital ledger used to record transactions securely
- The simulation of human intelligence by machines
- Buying and selling goods or services online
- A system used to determine location via satellite signals
- Watching or listening to media in real time over the internet
- A machine capable of carrying out complex actions automatically
- A portable personal computer
20 Clues: A portable personal computer • A display that responds to touch input • Buying and selling goods or services online • The name used to identify a user in a system • A software program designed for mobile devices • A secret word or phrase used for authentication • The simulation of human intelligence by machines • An unmanned flying device often controlled remotely • ...
First Call Cybersecurity Challenge 2023-10-23
Across
- Deliberate actions taken by cybercriminals to compromise the integrity, confidentiality, or availability of data or systems.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems.
- Software: Programs designed to detect, block, and remove malicious software (viruses, worms, etc.) from a computer.
- A cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
- A documented set of rules and guidelines that govern an organization's cybersecurity practices and procedures.
Down
- Weaknesses or flaws in a computer system or network that can be exploited by attackers to compromise security.
- A software update that fixes security vulnerabilities and enhances the stability of an application or operating system.
- Malware that encrypts a victim's data and demands a ransom for the decryption key.
- Three letter acronym for a security mechanism that requires users to provide two or more forms of authentication before accessing a system, enhancing security beyond 2FA.
- The process of converting data into a code to prevent unauthorized access or data theft.
- A network security device or software that monitors and filters incoming and outgoing network traffic to prevent unauthorized access.
11 Clues: Malware that encrypts a victim's data and demands a ransom for the decryption key. • The process of converting data into a code to prevent unauthorized access or data theft. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems. • ...
Tech'22 2022-01-07
Across
- ______________ cloud: An architecture where multiple clouds are used to meet compliance needs, performance requirements.
- A unique and non-interchangeable unit of data stored on a blockchain.
- A network of 3D virtual worlds focused on social connection.
- Everything as a service
Down
- _______ automation: orchestrated use of multiple technologies, tools or platforms
- Refers to all the cryptocurrencies other than Bitcoin.
- __________ Computing: Machines performing calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s
- ____3: New age internet.
- The combination of video games and decentralized finance.
- Cybersecurity ______: A cyber defense strategy that independently secures each device with its own perimeter.
10 Clues: Everything as a service • ____3: New age internet. • Refers to all the cryptocurrencies other than Bitcoin. • The combination of video games and decentralized finance. • A network of 3D virtual worlds focused on social connection. • A unique and non-interchangeable unit of data stored on a blockchain. • ...
Crossword- Day 5 2023-07-20
Across
- A flexible approach to IT project management.
- The process of converting information into a code to prevent unauthorized access.
- The capacity to be maintained or continued without depleting resources.
- The capability of a system to handle an increasing amount of work or its potential to be enlarged.
Down
- The quality of being trustworthy and dependable.
- Protection of computer systems and data from digital threats and attacks.
- The ability to accomplish a task with the least amount of wasted time and effort.
- The potential for negative outcomes in IT operations.
- The degree of excellence of IT services.
- - An examination of IT processes for compliance and efficiency.
10 Clues: The degree of excellence of IT services. • A flexible approach to IT project management. • The quality of being trustworthy and dependable. • The potential for negative outcomes in IT operations. • - An examination of IT processes for compliance and efficiency. • The capacity to be maintained or continued without depleting resources. • ...
CyberCross 2023-09-10
Across
- is like a set of locks and guards that keep it safe from bad guys
- when someone pretends to be someone else
- viruses, worms, and trojan horses
- Names, Social Security numbers, birth dates, addresses, and other stuff that are targeted by hackers
Down
- A good one uses a mix of upper and lowercase letters, numbers, and symbols
- type of authentication that is like having 2 locks on your chest/safe (no space)
- locks your device or files until a ransom is paid
- something that puts your computer or information in danger
- breaking into computer systems or accounts that they're not supposed to
- don't ___ random links
10 Clues: don't ___ random links • viruses, worms, and trojan horses • when someone pretends to be someone else • locks your device or files until a ransom is paid • something that puts your computer or information in danger • is like a set of locks and guards that keep it safe from bad guys • breaking into computer systems or accounts that they're not supposed to • ...
Cybersecurity Awareness Month Crossword 2021-08-30
Across
- Converting plain data into a secret code, which later decoded by a user with a 'key'.
- VPN stands for _________ Private Network, Pulse Secure is an example of this.
- Dangerous code hidden in online ads to tricker users into visiting unsafe sites or downloading malware.
- Using text messages to attempt to gain access to sensitive information
- Something that occurs before any new program is used at NLH is a risk _______.
- Criminals pose as bank staff or other employees on the phone to try to trick you into sharing information.
Down
- The name of the email manager NLH uses to reduce the amount of Spam delivered to your inbox.
- Using the human tendency to trust to manipulate people to gain sensitive information.
- Another word for unsolicited emails, NLH has a dedicated email address for monitoring this.
- Using software to appear to be someone else, either by email address or caller ID.
- Harmful software meant to disable, infect, or allow hackers remote control of a device.
11 Clues: Using text messages to attempt to gain access to sensitive information • VPN stands for _________ Private Network, Pulse Secure is an example of this. • Something that occurs before any new program is used at NLH is a risk _______. • Using software to appear to be someone else, either by email address or caller ID. • ...
Cyber Society Final 2025-05-16
Across
- In short, Aristotle contends that the best friendship is one that we might call ______ friendship.
- The IT Team's critical tasks include keeping all software and systems ______.
- Assistive _______ products help maintain or improve an individual's functioning related to cognition, communication, hearing, mobility, self-care and visions, thus enabling their health, well being, inclusion, and participation.
- _____ is about protecting your digital information and systems.
- The CEO's Role in cybersecurity includes creating a _____ where everyone cares about digital safety.
- A networked society has major influence on the way we communicate. Instant messaging and video calls connect us _______.
- ____________ is a type of cyberattack where someone tries to trick you into giving away sensitive information like passwords, credit card numbers, or personal details—by pretending to be someone you trust.
- Smart and self-driving cars are a major advancement in transportation, but their reliance on complex technologies and connectivity also introduces several __________ risks.
- According to Aristotle there is only one type of friendship that is pure in its virtue and in its addition to/necessity for a good life. This is the purest form of friendship or "friendship of ______".
- Data integrity refers to the accuracy, completeness, _____, and trustworthiness of data.
- Cyber _____ aim to stop things like data breaches, identity theft, online harassment, and ransomware attacks—all of which cause real harm.
- Artificial __________: The ability for a computer or machine to complete tasks that are usually done by humans.
Down
- Technology can either _____ or undermine friendships.
- Cyberattacks are unique in their subtlety, scope, and psychological impact, often targeting the ______ of modern life rather than just its physical components.
- MFA stands for ______ Authentication: Your data shield
- AI Chatbots: a tool that can understand language and is constantly _____ from it's conversations.
- Citizen science involves public ____________ in scientific research. It connects people to science and nature. Examples include biodiversity monitoring and environmental data collection.
- Chat GPT: A tool that can understand language and is constantly learning from it's conversation. You can ask them a question, and they can provide a human-like response based on ________ data.
- Worm GPT: An AI chat bot that was created for ________ activities.
- Data transfer is ____ data from one computer to another.
- ‘Leaving no one behind’ means ensuring people with disabilities, the older population, those affected by chronic diseases and everyone who needs ____________ technology are included in society and able to live healthy and dignified lives.
- _____ networks amplify voices for social change; Online platforms mobilize support for causes.
- Aristotle's claim is that companion friendships are ______ to a good life.
- A networked society connects _____, organizations, and devices through digital networks.
24 Clues: Technology can either _____ or undermine friendships. • MFA stands for ______ Authentication: Your data shield • Data transfer is ____ data from one computer to another. • _____ is about protecting your digital information and systems. • Worm GPT: An AI chat bot that was created for ________ activities. • ...
IELTS WORKSHOP Technology 2024-05-06
Across
- digital currency
- (adj.) look like human
- When a person or a thing is on ______, they are or it is ready to be used if necessary
- made by people
- the use of machines without human control
- involving user in information exchange
- to move text or pictures up/down on a computer screen
- the ability to learn, understand, and make judgements based on reason
- very important change
Down
- (adj.) made in a complicated way
- a change to something, usually to improve it
- the scientific study of machines and electronic devices
- the protection of crimes on the internet
- a person who dislikes the use of technology
- use or study of computer systems that have some of the qualities that the human brain has
- a machine controlled by a computer that is used to perform jobs automatically
- large system of connected computers globally
- a material, such as silicon, that allows some electricity to move through it more easily when its temperature increases
- (v.) to notice something that is partly hidden/not clear
19 Clues: made by people • digital currency • very important change • (adj.) look like human • (adj.) made in a complicated way • involving user in information exchange • the protection of crimes on the internet • the use of machines without human control • a person who dislikes the use of technology • a change to something, usually to improve it • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- You can help fight cybercrime by becoming a
- This attack occurs when someone sneaks into a secured area behind someone else
- What should you do when a workstation or device is no longer in use
- Failure to run these equals failures to patch vulnerabilities
- These are designed to maintain the security of everyone associated with an organization
- The future of security is ___,not machines
- Stealing money is the main goal of this type of malware
Down
- This attack occurs when cybercriminals research and track which sites employees visit the most
- The security tool identifies and removes malicious programs
- The individuals who control access to people, data and systems
- Kwiktrip's password policy requires co workers change their passwords every__days
- ____are the last line of defense
12 Clues: ____are the last line of defense • The future of security is ___,not machines • You can help fight cybercrime by becoming a • Stealing money is the main goal of this type of malware • The security tool identifies and removes malicious programs • Failure to run these equals failures to patch vulnerabilities • ...
EQUATE Cybersecurity - Email edition 2023-05-18
Across
- Network security barrier against unauthorized access.
- Deceptive emails aiming to extract personal data.
- Identity verification for authorized access.
- Deceptive act of assuming someone's identity.
- Unwanted bulk emails.
- Data security through secret code conversion.
Down
- Malicious assault on computer systems or networks.
- Malicious software demanding payment for data release.
- Protective software against malware and viruses.
- Deceptive technique involving voice calls for extracting sensitive data.
- Website or email address identifier.
11 Clues: Unwanted bulk emails. • Website or email address identifier. • Identity verification for authorized access. • Deceptive act of assuming someone's identity. • Data security through secret code conversion. • Protective software against malware and viruses. • Deceptive emails aiming to extract personal data. • Malicious assault on computer systems or networks. • ...
CYBERSECURITY AWARENESS CROSSWORD PUZZLE 2025-11-06
Across
- hygiene The routine practices and steps taken to maintain good digital security.
- Software designed to detect and remove malicious programs from your computer.
- Malicious software designed to damage or gain unauthorized access to systems.
- breach An incident where sensitive information is accessed or disclosed without autorization.
- A private network that encrypts your internet connection to protect your data online.
- A fraudulent attempt to trick someone into revealing personal information via email or fake websites.
Down
- A type of malware that locks your data and demands payment to unlock it.
- Engineering Manipulating people into giving up confidential information.
- A security system that monitors and controls incoming and outgoing network traffic
- A method of converting data into a secret code to prevent unauthorized access.
- A software update that fixes security vulnerabilities or bugs.
11 Clues: A software update that fixes security vulnerabilities or bugs. • A type of malware that locks your data and demands payment to unlock it. • Engineering Manipulating people into giving up confidential information. • Software designed to detect and remove malicious programs from your computer. • ...
Cool Gadgets 2024-09-11
Across
- A mobile phone that combines features of a computer and a phone.
- Portable device for streaming music and podcasts
- The ability to learn, understand, and make judgments.
- Electronic devices that can be worn on the body.
- A group of interconnected computers or devices.
- A small mechanical or electronic device or tool.
- Existing or occurring on computers or on the internet.
- Introducing new ideas; creative in thinking.
Down
- The branch of technology dealing with the design, construction, and use of robots.
- A wearable device that often includes features like a phone, fitness tracker, and more.
- Measures taken to protect a computer or network against unauthorized access.
- Created by humans rather than occurring naturally.
- The state of things as they actually exist.
- Wearable tech that tracks fitness and health metrics
- Printing The process of creating a three-dimensional object from a digital model.
- The application of scientific knowledge for practical purposes.
- An unmanned aerial vehicle often used for photography or surveillance.
17 Clues: The state of things as they actually exist. • Introducing new ideas; creative in thinking. • A group of interconnected computers or devices. • Portable device for streaming music and podcasts • Electronic devices that can be worn on the body. • A small mechanical or electronic device or tool. • Created by humans rather than occurring naturally. • ...
Teka Teki Techco 2024-05-16
Across
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
5 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
FRM 2024-07-15
Across
- What measures should XYZ implement to enhance its liquidity risk management?
- How did the cyber-attack affect XYZ's working capital and liquidity?
- How can XYZ strengthen its regulatory compliance framework?
- What are the potential legal and financial consequences for the company?
- Were there any gaps in the company's credit risk assessment processes?
- What were the root causes of the cyber-attack on XYZ Corporation?
Down
- Were there any limitations in the company's liquidity contingency planning?
- What steps should XYZ take to strengthen its operational resilience?
- How well did the company's cybersecurity framework respond to the incident?
- Which data protection regulations did XYZ fail to comply with?
- How did the operational disruption impact XYZ's credit relationships?
- What actions should XYZ take to improve its credit risk management?
12 Clues: How can XYZ strengthen its regulatory compliance framework? • Which data protection regulations did XYZ fail to comply with? • What were the root causes of the cyber-attack on XYZ Corporation? • What actions should XYZ take to improve its credit risk management? • What steps should XYZ take to strengthen its operational resilience? • ...
Name: __________________Period:________ 2024-12-05
Across
- Codes of behavior that are sometimes, but not always, enforced by laws
- Ongoing effort to protect networks connected to the Internet
- A computer program that attaches itself to other executable files on the computer
- Any code that can steal data, bypass access, or cause harm to a system
- Design to automatically deliver advertisements to a user
- Replicates itself to spread from one computer to another
- A technique that allows suspicious files to be analyzed in a safe environment.
Down
- Any information about you, a company or organization
- An Internet-based conflict that involves the networks of other nations
- Hardware or software that prevents hackers from accessing your data
- A decoys to sneak malicious software past unsuspecting users
- A program that scans a computer for malicious software and deletes it
12 Clues: Any information about you, a company or organization • Design to automatically deliver advertisements to a user • Replicates itself to spread from one computer to another • Ongoing effort to protect networks connected to the Internet • A decoys to sneak malicious software past unsuspecting users • ...
Azure Core: Day of learning | October 2022-10-27
Across
- One way to donate during the Giving month in Microsoft
- Microsoft product with more than 90 million people using it to build software
- ----- partnered with Microsoft to add Teams to its meeting devices
- Microsoft product with more than 15 million monthly active users, up 50% year over year
- First British Asian Prime Minister of United Kingdom
- ICC Men's T20 World Cup is being played in
Down
- Microsoft's cybersecurity ecosystem, launched with Data Security Council of India
- Microsoft's program which connects employees with opportunities for impact in local communities
- Microsoft announced a metaverse partnership with --------
- The quadrennial international men's football championship to be held in Qatar this year
- Microsoft product with more than 20 million monthly active users
- An internal tool for Microsoft employees to share feedback
12 Clues: ICC Men's T20 World Cup is being played in • First British Asian Prime Minister of United Kingdom • One way to donate during the Giving month in Microsoft • Microsoft announced a metaverse partnership with -------- • An internal tool for Microsoft employees to share feedback • Microsoft product with more than 20 million monthly active users • ...
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Crossword 2023-02-27
Across
- Document that identifies the cost of a business's goods and/or services.
- Pricing and price book questions should be forwarded to this team.
- Generally a replacement of hardware, software or firmware with a newer or better version.
Down
- All Upgrade and Migration quotes need to be quoted by this team.
- Occurs when existing customer goes from an on prem product to cloud hosted.
- Orders can be placed into this for unresolved bookings.
- Value Added Reseller
- Customer wants to switch to one product for another.
- Is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management
9 Clues: Value Added Reseller • Customer wants to switch to one product for another. • Orders can be placed into this for unresolved bookings. • All Upgrade and Migration quotes need to be quoted by this team. • Pricing and price book questions should be forwarded to this team. • Document that identifies the cost of a business's goods and/or services. • ...
Axel's Puzzle 2024-03-13
Across
- Software designed to damage or disrupt a computer system.
- Process of converting information or data into a code to prevent unauthorized access.
- Trying to get sensitive information like usernames, passwords, and credit card details by pretending to be someone trustworthy.
- Secret word or phrase used for authentication and access control.
- Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
Down
- Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
- Software designed to detect and remove viruses and other malicious software.
- Network security system designed to prevent unauthorized access
- Update to fix vulnerabilities or improve functionality in software.
9 Clues: Software designed to damage or disrupt a computer system. • Network security system designed to prevent unauthorized access • Secret word or phrase used for authentication and access control. • Update to fix vulnerabilities or improve functionality in software. • Software designed to detect and remove viruses and other malicious software. • ...
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Cyber Security Month 2021 2021-09-15
Across
- Not disclosing information to unauthorized individuals
- An email or electronic communications scam targeted towards a specific individual, organization, or Business
- Assurance that information is accurate and Trustworthy
- Type of software that helps protect your computer against malware and cybercriminals
- The practice of being diligent about your online activities
- The process of converting information or data into a code, especially to prevent unauthorized access
Down
- Attacks that use email or malicious websites to infect your device
- Someone who takes information from many sources and uses them to piece together a bigger puzzle
- A secret word or phrase that be used to gain access
9 Clues: A secret word or phrase that be used to gain access • Not disclosing information to unauthorized individuals • Assurance that information is accurate and Trustworthy • The practice of being diligent about your online activities • Attacks that use email or malicious websites to infect your device • ...
Digital Citizenship Crossword Puzzle 2023-11-02
Across
- The practice of protecting computer systems and networks from digital attacks.
- Etiquette Appropriate behavior and manners when interacting with others online.
- Media Websites and apps that allow users to create and share content with others.
- Attempting to obtain sensitive information, like usernames and passwords, by pretending to be a trustworthy entity.
- A secret combination of characters used to access your accounts.
Down
- The legal protection of an original creative work (e.g., music, writing) from unauthorized use.
- Footprint The trail of data you create while using the internet.
- Harassment or threats that occur on the internet.
- Your right to keep personal information safe online.
9 Clues: Harassment or threats that occur on the internet. • Your right to keep personal information safe online. • Footprint The trail of data you create while using the internet. • A secret combination of characters used to access your accounts. • The practice of protecting computer systems and networks from digital attacks. • ...
Teka Teki Techco 2024-05-16
Across
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan. • ...
Teka Teki Techco 2024-05-16
Across
- Istilah untuk volume data besar yang diproses untuk informasi.
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan. • ...
Teka Teki Techco 2024-05-16
Across
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Program perangkat lunak yang dirancang untuk melakukan tugas tertentu pada perangkat elektronik, seperti ponsel cerdas atau komputer.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
6 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan. • ...
Smarthomes Exercise 1 2024-06-05
Across
- Practices and technologies designed to protect smart home systems from digital attacks.
- Device to store food
- Network of interconnected devices that communicate and exchange data.
Down
- attempts to obtain sensitive information by disguising as a trustworthy entity
- The process of converting information or data into a code to prevent unauthorized access.
- A home entertainment device with internet connectivity and streaming capabilities.
6 Clues: Device to store food • Network of interconnected devices that communicate and exchange data. • attempts to obtain sensitive information by disguising as a trustworthy entity • A home entertainment device with internet connectivity and streaming capabilities. • Practices and technologies designed to protect smart home systems from digital attacks. • ...
Cyber Awareness Month 2023-10-31
Across
- A strong password should include a random string of numbers, letters, and _______
- Click the orange fish______ icon in Gmail to report suspicious email to the Kent Tech Team
- MFA requires _____ or more credentials to verify your identity
- MFA or multi-factor ____________ is a layered security approach to protect your accounts
- Text message scams that try to trick you into disclosing personal information
Down
- Verifying your identity through your fingerprint or facial recognition
- Update _______ to install bug fixes and security updates
- Cybersecurity Awareness Month
- Email that appear to be from a legitimate source to trick you into disclosing personal information such as passwords or bank account info
- Sequence of words used for authentication
- A password _______ helps keep your accounts secure by storing and generating strong passwords
11 Clues: Cybersecurity Awareness Month • Sequence of words used for authentication • Update _______ to install bug fixes and security updates • MFA requires _____ or more credentials to verify your identity • Verifying your identity through your fingerprint or facial recognition • Text message scams that try to trick you into disclosing personal information • ...
Teka Teki Techco 2024-05-16
Across
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
5 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
Teka Teki Techco 2024-05-16
Across
- Tempat di mana data disimpan secara online.
- Jaringan global yang menghubungkan jutaan perangkat.
Down
- Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
- Upaya melindungi sistem komputer dari ancaman di dunia maya.
- Data Istilah untuk volume data besar yang diproses untuk informasi.
5 Clues: Tempat di mana data disimpan secara online. • Jaringan global yang menghubungkan jutaan perangkat. • Upaya melindungi sistem komputer dari ancaman di dunia maya. • Data Istilah untuk volume data besar yang diproses untuk informasi. • Perangkat elektronik kecil yang sering digunakan untuk berkomunikasi atau hiburan.
DigitalTransformation 2024-10-09
Across
- A decentralized, digital ledger technology used for secure transactions.
- The process of changing or revolutionizing a business through digital means.
- A computer-generated simulation of a 3D environment (Abbreviation).
- The process of creating a physical object from a digital model by layering material
- The discovery and interpretation of meaningful data patterns.
- Large volumes of structured or unstructured data that can be analyzed for insights.
Down
- A subset of AI where computers learn from data.
- The practice of protecting systems, networks, and programs from digital attacks.
- A network of physical devices connected via the internet (Abbreviation).
- The simulation of human intelligence by machines (Abbreviation).
- The technology that designs, constructs, and operates robots.
- The fifth generation of mobile network technology.
- The use of software robots to automate repetitive tasks (Abbreviation).
- Raw information that can be processed to gain insights.
- Technology that overlays digital information onto the real world (Abbreviation).
- Technology that allows data to be stored and accessed over the internet.
16 Clues: A subset of AI where computers learn from data. • The fifth generation of mobile network technology. • Raw information that can be processed to gain insights. • The technology that designs, constructs, and operates robots. • The discovery and interpretation of meaningful data patterns. • The simulation of human intelligence by machines (Abbreviation). • ...
Cybersecurity Awareness Week - 9/24 2021-09-24
Across
- a standalone malware computer program that replicates itself in order to spread to other computers
- a network security system that controls incoming and outgoing network traffic based on a set of rules
- a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity
- usually consists of eight bits
- (abbreviation) a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period
- (abbreviation) a way of injecting malicious scripts into web pages
- type of software to detect unwanted programs on a computer
Down
- a secret word or phrase that must be used to gain admission to something, you should never share yours with anyone!
- generic name someone who seeks and exploits weaknesses in a computer system or computer network
- a type of ransomware that attacked running Microsoft Windows operating systems in May 2017
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed
- the process of converting information or data into a code, especially to prevent unauthorized access
- function of one way encryption that is normally used to check integrity of data
- a type of malicious software designed to block access to a computer system until a sum of money is paid
15 Clues: usually consists of eight bits • type of software to detect unwanted programs on a computer • (abbreviation) a way of injecting malicious scripts into web pages • function of one way encryption that is normally used to check integrity of data • a type of ransomware that attacked running Microsoft Windows operating systems in May 2017 • ...
computer apps review 2022-05-02
Across
- what do you need to know when using social media?
- what app do you use when you want to make a poster?
- letters on sheets
- how do you let other people collaborate with you?
- what was the first project we did in computer app?
- what color is the turn-in button in docs?
- how many wevideos did we make
- what's one thing you never do when writing an essay?
- our second unit?
- what do you need for your computer to work?
Down
- what were we taught to use when writing an email?
- what's the best app to make a presentation?
- what’s one thing you need to be careful of when being on social media?
- what were we given at the beginning of the year to complete schoolwork?
- what was our most recent project about?
- how do you make a quiz where anybody can answer and see their responses?
- what app is good for studying
- what is used between slides in videos and projects?
- what do you click on to add an image to docs?
19 Clues: our second unit? • letters on sheets • what app is good for studying • how many wevideos did we make • what was our most recent project about? • what color is the turn-in button in docs? • what's the best app to make a presentation? • what do you need for your computer to work? • what do you click on to add an image to docs? • ...
The Suffolk County September 2022 Hack 2022-10-31
Across
- __________is malware that locks access to devices & files
- __________ is better than a cure.
- Cybersecurity is a team _____
- Many tasks normally done online, became ________ tasks
- Those involved in ____ estate processing were crippled by the attack
- Data seized in a ransomware attack is held _____ unless payment is made
- The _______ of this attack is unprecedented
- The Suffolk County government experienced a_____ attack in early Sept. 2022
- $130 _______in unpaid receivables have accumulated since the hack was reported
- Citizens are in a ______ about their data & credit being accessed.
- Restoring data can be a costly & __________ task
Down
- Hackers posted confidential information on the _______
- If you see _________ say something.
- This ______ appears to be the most high-profile cyber attack against a government entity on LI
- It's important that we recognize the scope & ____ of this neighborhood cyberattack.
- As hackers become more sophisticated, it's important for our team to be _____
- ______ actors accessed or acquired personal information from County server.
- The County's 911 _________system was temporarily disabled
- ________ of dollars in Real Estate transactions are sitting on the sidelines
19 Clues: Cybersecurity is a team _____ • __________ is better than a cure. • If you see _________ say something. • The _______ of this attack is unprecedented • Restoring data can be a costly & __________ task • Hackers posted confidential information on the _______ • Many tasks normally done online, became ________ tasks • ...
9ABD 2025-05-12
Across
- - Number of wave cycles per second.
- - The basic unit of matter, central to quantum studies.
- - Field that may use quantum encryption to protect data.
- - Unique patterns of light produced by atoms when electrons drop energy levels.
- - When a quantum system exists in multiple states at once.
- - Branch of physics that explains the behavior of particles on a small scale.
- - Distance between two consecutive wave peaks.
- - Common display type that relies on polarized light.
- - Electromagnetic radiation that can behave like both a wave and a particle.
Down
- - Quantum link between particles no matter how far apart.
- - Required to excite electrons or eject them from metal surfaces.
- - Electrons are ejected when light hits a surface in this quantum phenomenon.
- - General term for strange behavior at the atomic and subatomic levels.
- - Heisenberg’s rule: you can’t know both position and momentum precisely.
- - Includes reflection, refraction, diffraction, and interference.
- - A particle of light with no mass, just energy.
- - What happens to electrons in the photoelectric effect.
- - Light can act as both a wave and a particle.
- - Describes the direction of oscillation in a transverse wave.
19 Clues: - Number of wave cycles per second. • - Light can act as both a wave and a particle. • - Distance between two consecutive wave peaks. • - A particle of light with no mass, just energy. • - Common display type that relies on polarized light. • - The basic unit of matter, central to quantum studies. • - Field that may use quantum encryption to protect data. • ...
Cybersecurity Awareness Week 4 2025 2025-10-28
Across
- When a device is not in the most current version, it means it is ______
- a device that is too many ______ behind will likely not receive current updates
- not all updates are required, some are labeled as ______.
- in ___ devices, you can go to the general settings section and perform a software update.
- you should only download updates from _______ sources
- You can also look for updates for a specific ________ in the app store or play store.
- make sure your device has enough ______ to perform the update
Down
- when a device has updates, you will likely be _____ a weakness
- keeping your devices up to date prevents hackers from exploiting a _____.
- a device can be _____ if weaknesses are left unchecked.
- A ____ update is mainly focused on fixing a flaw that can put your device at risk
- you should ______ updates whenever possible
- updates should be deemed important and done ______
- you should ____ all your devices whenever possible
- The lack of updates in an operating ______ can lead to an exposed device
15 Clues: you should ______ updates whenever possible • updates should be deemed important and done ______ • you should ____ all your devices whenever possible • you should only download updates from _______ sources • a device can be _____ if weaknesses are left unchecked. • not all updates are required, some are labeled as ______. • ...
Kreuzworträtsel für Krisenmanager 2025-03-26
Across
- Supercomputer der Zukunft, der herkömmliche Verschlüsselung in Sekunden knacken könnte (15 Buchstaben)
- Meist benutzter Laut bei BBUG
- Die wichtigste Eigenschaft für Unternehmen, um in unsicheren Zeiten erfolgreich zu bleiben (18 Buchstaben)
Down
- Wer Krisen überleben will, braucht ein starkes…? (9 Buchstaben)
- Wird durch Quantencomputer massiv bedroht – Unternehmen sollten hier dringend aufrüsten! (14 Buchstaben)
- Hier treffen sich kluge Köpfe, um über die Zukunft der Wirtschaft zu diskutieren (4 Buchstaben)
- Wirtschaftliche Auseinandersetzung zwischen Staaten durch Zölle, Sanktionen und Exportverbote (12 Buchstaben)
- Diese Technologie könnte bald Entscheidungen schneller und besser treffen als Menschen (2 Buchstaben)
8 Clues: Meist benutzter Laut bei BBUG • Wer Krisen überleben will, braucht ein starkes…? (9 Buchstaben) • Hier treffen sich kluge Köpfe, um über die Zukunft der Wirtschaft zu diskutieren (4 Buchstaben) • Diese Technologie könnte bald Entscheidungen schneller und besser treffen als Menschen (2 Buchstaben) • ...
Networking Fundamentals 2021-11-22
Across
- Unwanted emails sent repeatedly, often containing phishing links.
- Another name for the Internet.
- Stealing someone's data and pretending to be them.
- A collection computers and other devices connected together.
- A type of attack where multiple computers are used.
- Describes keeping data and users safe on a network.
- Type of software that is used encrypt data. Criminals then attempt to get the owner to pay up in return for access to the data.
Down
- Software designed to cause damage.
- Fooling someone into giving out personal data.
- Describes a situation where data has been accessed without permission.
- Part of the Internet that requires specialist software. Often contains illegal material.
- Part of the web that is not accessible to search engines, etc.
- a network of computers infected by malware that are under the control of a single attacking party
13 Clues: Another name for the Internet. • Software designed to cause damage. • Fooling someone into giving out personal data. • Stealing someone's data and pretending to be them. • A type of attack where multiple computers are used. • Describes keeping data and users safe on a network. • A collection computers and other devices connected together. • ...
Computer Science Crossword 2024-03-19
Across
- Protecting computers and networks from theft or damage.
- Wireless local area network that uses radio waves to connect devices to the internet.
- An icon or figure representing a person in video games, forums, etc.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- The ability to read and write.
- A secret word or phrase that must be used to gain admission to something.
- A computer program designed to simulate conversation with human users.
Down
- The programs and other operating information used by a computer.
- Facts and statistics collected for reference or analysis.
- A system of numerical notation that has 2 rather than 10 as a base.
- The action or practice of playing video games.
- A program or piece of software designed to fulfill a particular purpose.
- The physical parts of a computer system.
- A step-by-step procedure for calculations.
14 Clues: The ability to read and write. • The physical parts of a computer system. • A step-by-step procedure for calculations. • The action or practice of playing video games. • Protecting computers and networks from theft or damage. • Facts and statistics collected for reference or analysis. • The programs and other operating information used by a computer. • ...
Vocbulary - compound nouns in IT industry 2024-09-11
Across
- A copy of data stored separately to protect against loss.
- The process of transferring data from a remote system to a local one.
- A security system that controls incoming and outgoing network traffic
- A device used to input text and commands into a computer.
- A unique identifier used to log into a system or account.
- The protection of computer systems and networks from attacks.
- The physical components of a computer system, like the CPU, monitor, and keyboard.
- A group of connected computers and devices that share resources.
Down
- The process of transferring data from a local system to a remote one.
- A secret word or phrase used to access a system or account.
- The main page of a website that users first see.
- Programs and applications that run on computers and devices.
- A collection of related web pages accessed via the internet.
- A structured collection of data stored electronically
14 Clues: The main page of a website that users first see. • A structured collection of data stored electronically • A copy of data stored separately to protect against loss. • A device used to input text and commands into a computer. • A unique identifier used to log into a system or account. • A secret word or phrase used to access a system or account. • ...
The Iowa Banker Crossword 2025-02-18
Across
- The IBA’s “Money Cents” campaign was launched to help prevent this.
- A major driver of change in banking operations and customer service.
- A word used to describe the wave of regulations impacting banks.
- Many Iowa banks prioritize supporting this through local efforts.
- The Iowa Bankers Benefit Plan helps banks provide this for bank employees.
- A key benefit of attending IBA events.
Down
- IBA’s efforts to champion and represent the interests of Iowa’s community banks.
- A bank’s ability to meet cash needs.
- A challenge community banks continue to face.
- Technology-driven solutions transforming the banking industry.
- Essential for protecting customer data in an increasingly digital world.
- A critical aspect of banking operations to meet legal standards.
- Shaped by those who guide and influence the future of Iowa banking.
- The previous name of IBA’s quarterly magazine before it became The Iowa Banker.
14 Clues: A bank’s ability to meet cash needs. • A key benefit of attending IBA events. • A challenge community banks continue to face. • Technology-driven solutions transforming the banking industry. • A critical aspect of banking operations to meet legal standards. • A word used to describe the wave of regulations impacting banks. • ...
SuperPower Resources 2025-05-29
Across
- Raw facts and numbers collected and used to make decisions.
- Secret information or spying, used to know what rivals are doing.
- Legal ownership of things, including ideas or inventions (like patents).
- Tools and systems made using science, like computers or advanced robots.
- A country's army, navy, and air force, used for protection.
- Energy that comes from sources that won't run out, like sun or wind.
Down
- The smarts, skills, and hard work that a country's people provide.
- Workers with special training for specific jobs, like engineers or doctors.
- Agreements between countries to work together and support each other.
- The power that makes things work, move, or light up.
- Special metals used in phones, computers, and electric cars.
- A dark, thick liquid dug from the ground, used for fuel and making plastics.
- Protecting computer systems and information from online attacks.
- The power to change how others think or act without force.
14 Clues: The power that makes things work, move, or light up. • The power to change how others think or act without force. • Raw facts and numbers collected and used to make decisions. • A country's army, navy, and air force, used for protection. • Special metals used in phones, computers, and electric cars. • ...
Cybersecurity Awareness Month Week 3 2025-10-20
Across
- MFA can be used in many forms, one of them is a _____
- apart from your ______, you should also turn on MFA to better protect yourself
- MFA is a way to confirm your ______ to the site and apps
- most companies and organizations ________ their employees to have MFA enabled in order to better protect sensitive information
- you have information _______ in mind if you enable MFA on your accounts
- you are the ______ of an attack when you receive a phishing email
- if you dont turn on MFA, you may run the risk of bad actors gaining ______ access to your accounts
- you should _____ clicking on links that look weird and are coming from an unknown source
- if you don't use MFA your account can be _____
Down
- MFA adds an extra layer of _______ to your logins
- it should be your personal _____ to use MFA whenever possible
- MFA can be used to log in to a ______
- if you are in a public wifi, your internet traffic can be _______
- you should take ______ when receiving emails from unknown senders
- another method of MFA has to do with "something you are," a ______ scan
15 Clues: MFA can be used to log in to a ______ • if you don't use MFA your account can be _____ • MFA adds an extra layer of _______ to your logins • MFA can be used in many forms, one of them is a _____ • MFA is a way to confirm your ______ to the site and apps • it should be your personal _____ to use MFA whenever possible • ...
English for Computer Engineering Management 2018-06-30
Across
- the unit used to measure the speed of a computer's processor
- set of rules that computers and other devices use when communicating with one another.
- designed to protect your computer
- a software program developed to do harm to other computers
- a type of email fraud in which the perpetrator sends out emails
- the brains of your computer
- the number of distinct pixels of the display for computer
Down
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections
- the maximum amount of data that can travel a communications path in a given time
- it experiences a sudden spike in popularity in a short period of time
- any type of illegal activity on your computer
- the process of converting electronic data to an unrecognizable
- unsolicited email messages sent for marketing purposes
- the reduction of the size of a file
14 Clues: the brains of your computer • designed to protect your computer • the reduction of the size of a file • any type of illegal activity on your computer • unsolicited email messages sent for marketing purposes • the number of distinct pixels of the display for computer • a software program developed to do harm to other computers • ...
The Iowa Banker Crossword 2025-02-14
Across
- The previous name of IBA’s quarterly magazine before it became The Iowa Banker.
- A major driver of change in banking operations and customer service.
- IBA’s efforts to champion and represent the interests of Iowa’s community banks.
- Shaped by those who guide and influence the future of Iowa banking.
- A key benefit of attending IBA events.
- A bank’s ability to meet cash needs.
Down
- A challenge community banks continue to face.
- Essential for protecting customer data in an increasingly digital world.
- The IBA offers schools and training to support bankers' growth.
- Technology-driven solutions transforming the banking industry.
- A critical aspect of banking operations to meet legal standards.
- Many Iowa banks prioritize supporting this through local efforts.
- The IBA’s “Money Cents” campaign was launched to help prevent this.
- The Iowa Bankers Benefit Plan helps banks provide this for bank employees.
14 Clues: A bank’s ability to meet cash needs. • A key benefit of attending IBA events. • A challenge community banks continue to face. • Technology-driven solutions transforming the banking industry. • The IBA offers schools and training to support bankers' growth. • A critical aspect of banking operations to meet legal standards. • ...
History, success and technology 2025-11-10
Across
- To make something happen, often through skill and effort.
- Relating to a king, queen, or emperor
- The ability to keep doing something difficult despite setbacks or opposition.
- The act of moving to live permanently in a foreign country.
- The belief or theory that things must happen the way they do; fate.
- A formal written agreement between countries.
- A system of interconnected computers or devices.
- An original document, object, or account from a particular time period.
- The widespread destruction and loss of life that happened during the Second World War.
Down
- A small piece of code stored on a user's computer by a website.
- The state of being protected against the criminal use of electronic data.
- An ambitious target or aim that is pursued with effort.
- Being able to do something successfully or efficiently; skill.
- The belief or theory that things must happen the way they do; fate.
- A sequence of steps or rules to be followed in calculations or problem-solving.
15 Clues: Relating to a king, queen, or emperor • A formal written agreement between countries. • A system of interconnected computers or devices. • An ambitious target or aim that is pursued with effort. • To make something happen, often through skill and effort. • The act of moving to live permanently in a foreign country. • ...
crossword puzzle 2023-01-25
Across
- an attackin whickan attacker injects malicious executable scripts into the code of a trusted application or website
- an attack that forces an end user to execute unwanted actions on a web application
- A person who hacks for political gain
- uses computer hacking to spread fear
- a cyber attack that involves executing arbitrary commands on a host operating system(OS)
- one where the number generated is extremely hard for any third party to predict what it might be
Down
- meeting customers' cybersecurity ecpectations
- using libraries, frameworks, and other software modules that run the same privilages as the application
- bug found in a web application that attackers use to manipulate the URL
- the response and recovery procedures from error conditions present in a software application
- When the volume of data exceeds the storage capacity
- attacking information for millitary purposes
- uses the social media to campaign
- deliberate destution of an item or systeam
14 Clues: uses the social media to campaign • uses computer hacking to spread fear • A person who hacks for political gain • deliberate destution of an item or systeam • attacking information for millitary purposes • meeting customers' cybersecurity ecpectations • When the volume of data exceeds the storage capacity • ...
Technology Crossword 2023-05-10
Across
- Measures designed to protect your computer.
- The number of distinct pixels that make up the display on a computer monitor.
- A wireless communications technology intended to replace cables.
- Resources and services available on the Internet
- Malicious software.
- The process of making something digital.
Down
- A point within a network that interconnects with other networks.
- A piece of programming code inserted into other programming to cause damage.
- A computer that handles requests for data, email, file transfers, and other network services from other computers.
- The most common way of connecting computers on a network with a wired connection.
- A barrier that acts as a security system to protect trusted computer systems.
- A unique resource locator.
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company.
- Technology that allows computers and other devices to communicate via a wireless signal.
14 Clues: Malicious software. • A unique resource locator. • The process of making something digital. • Measures designed to protect your computer. • Resources and services available on the Internet • A point within a network that interconnects with other networks. • A wireless communications technology intended to replace cables. • ...
Set B 2023-01-29
Across
- We must be _____ when helping new citizens integrate into our society.
- I show my support to family members who are in the military by _____ them.
- Be a _____ Singaporean.
- Learning life-saving skills such as CPR prepares you to help others in an _____.
- Regardless of age, we must continue to love _____ and acquire new skills for adaptability.
- It is important to practice good _____ habits such as ignoring emails and attachements from unknown sources.
Down
- Regardless of race, language or religion, we can have fun together as one _____.
- Stay vigilant against public threats and report _____ people and activities to the authorities.
- We thank and show our _____ to soldiers who defend Singapore.
- Following water and electricity saving tips to _____ resources.
- The Singapore Armed Forces is a strong and well-respected _____ force.
- _____ saves lives.
12 Clues: _____ saves lives. • Be a _____ Singaporean. • We thank and show our _____ to soldiers who defend Singapore. • Following water and electricity saving tips to _____ resources. • We must be _____ when helping new citizens integrate into our society. • The Singapore Armed Forces is a strong and well-respected _____ force. • ...
Technologia 2025-09-08
Across
- A set of rules or steps for solving a problem or performing a task.
- An organized collection of information stored electronically.
- The way a user communicates with a computer, device, or program.
- The programs and operating information used by a computer.
- Measures taken to protect computers and networks from attacks.
- The science of building and using extremely small devices or materials.
- The process of creating new ideas, methods, or devices.
Down
- The physical parts of a computer or electronic device.
- Something created by humans, not occurring naturally (often used with "intelligence").
- The act of converting information into a secret code to protect it.
- The use of machines or technology to perform tasks with little human input.
- The amount of data that can be transmitted over an internet connection.
12 Clues: The physical parts of a computer or electronic device. • The process of creating new ideas, methods, or devices. • The programs and operating information used by a computer. • An organized collection of information stored electronically. • Measures taken to protect computers and networks from attacks. • ...
Trick or threat : The Cybersecurity Crossword 2025-10-19
Across
- _____________ is a secret combination of numbers, letters and symbols
- _________ is the protocol for Internet safety
Down
- ___________ is the king-ware of harmful viruses
- ___________ refers to illegally downloading legal things such as movies, music, videos etc.
- __________ is an attempt to access someone's data via email
5 Clues: _________ is the protocol for Internet safety • ___________ is the king-ware of harmful viruses • __________ is an attempt to access someone's data via email • _____________ is a secret combination of numbers, letters and symbols • ___________ refers to illegally downloading legal things such as movies, music, videos etc.
ENA Crossword: Part 2 2024-01-25
Across
- The person who had his gift repeatedly stolen at the Christmas party (5)
- A metric of energy; also a meeting room (5)
- Device that interrupts the flow of electricity when a fault is detected (7,7)
- Protection against unauthorised access to the digital infrastructure of the power grid (13)
- Essential gear for workers, including helmets, gloves, and safety glasses (3)
- First person to host the Elec/SHE thursday meeting after the reformat (5)
Down
- Number of years ENA has existed (6-3)
- One of the main component in a heat pump (10)
- Forum hosted in the office on Tuesday (5)
- The UK regulator responsible for overseeing electricity markets (5)
- Third named storm to hit the UK this year (7)
- CEO of Northern Power Grid, first name (6)
12 Clues: Number of years ENA has existed (6-3) • Forum hosted in the office on Tuesday (5) • CEO of Northern Power Grid, first name (6) • A metric of energy; also a meeting room (5) • One of the main component in a heat pump (10) • Third named storm to hit the UK this year (7) • The UK regulator responsible for overseeing electricity markets (5) • ...
tech 2023-10-04
Across
- The evaluation or appraisal of someone or something.
- The practice of analyzing and interpreting complex data sets to inform decision-making.
- Services or strategies for finding and hiring suitable employees.
Down
- Measures taken to protect computer systems, networks, and data from cyber threats.
- The practice of recruiting highly skilled individuals for specialized positions.
- The process of integrating a new employee into a company.
6 Clues: The evaluation or appraisal of someone or something. • The process of integrating a new employee into a company. • Services or strategies for finding and hiring suitable employees. • The practice of recruiting highly skilled individuals for specialized positions. • Measures taken to protect computer systems, networks, and data from cyber threats. • ...
Crossword 4 2023-09-04
Across
- An action taken to withdraw/remove a product or system from distribution
- A fraudulent imitation of something.
- A process of increasing the knowledge and skills of an employee for doing a particular job.
Down
- the practice of protecting systems, networks, and programs from digital attacks.
- Anything that permitted by law.
- A practice to ensure that products are stored and handled under sanitary conditions.
6 Clues: Anything that permitted by law. • A fraudulent imitation of something. • An action taken to withdraw/remove a product or system from distribution • the practice of protecting systems, networks, and programs from digital attacks. • A practice to ensure that products are stored and handled under sanitary conditions. • ...
Risk Awareness! 2024-08-21
Across
- Type of risk related to cybersecurity attacks like clicking on malicious links
- Responsible for owning and managing risks
- One of the functions of the second line, starts with "o"
- The act of trying to get you to click on a malicious link
Down
- Type of risk that remains even after risk management
- Last step of the risk management process
- This obligation of the PDPA states that personal data we collect should be accurate and complete
- Provides independent assurance and advisory services on risk controls
- What happens if you do click on a malicious link and a hacker gets access to stored personal data
- Type of risk control that monitors for risks
10 Clues: Last step of the risk management process • Responsible for owning and managing risks • Type of risk control that monitors for risks • Type of risk that remains even after risk management • One of the functions of the second line, starts with "o" • The act of trying to get you to click on a malicious link • ...
TECH ADVANCEMENT - PART 2 - ARTICLE 1A - L1 2023-02-16
Across
- To criticize or belittle someone or something.
- The origin or mode of formation of something.
- The final resolution of a complex plot in a story, often involving the unraveling of secrets and the tying up of loose ends.
- Changes or variations in a quantity or value over time.
- Digital or virtual tokens that use cryptography to secure and verify transactions and to control the creation of new units.
Down
- The process of creating a systematic and organized approach to a particular task or field.
- The practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- To provoke or oppose someone or something.
- Lacking in seriousness or importance.
- Present, appearing, or found everywhere.
10 Clues: Lacking in seriousness or importance. • Present, appearing, or found everywhere. • To provoke or oppose someone or something. • The origin or mode of formation of something. • To criticize or belittle someone or something. • Changes or variations in a quantity or value over time. • ...
Technology Laws 2025-02-21
Across
- The right to keep personal information confidential.
- Protecting computers and data from attacks.
- Breach An event where unauthorized access to confidential data happens, often exposing personal information.
- A legal document that outlines the terms for using a service, requiring users to agree before accessing it.
- The data trail left while using the internet, including websites visited and information shared.
Down
- Following rules or meeting established guidelines.
- Creations of the mind, like inventions and artistic works.
- Permission for something to happen, especially regarding personal data collection.
- A rule made by an authority to control behavior.
- A set of rules or instructions for a computer to perform tasks, often used to decide what content users see online.
10 Clues: Protecting computers and data from attacks. • A rule made by an authority to control behavior. • Following rules or meeting established guidelines. • The right to keep personal information confidential. • Creations of the mind, like inventions and artistic works. • Permission for something to happen, especially regarding personal data collection. • ...
QuizSurp2 2025-01-04
Across
- BlackBerry's reliance on its legacy products reflected a lack of strategic _______
- The failure to adapt to touchscreens showed BlackBerry's weak alignment with _______ market trends
- The shift from smartphones to software was part of BlackBerry's strategy to _______ its focus
- Secure messaging and privacy were part of BlackBerry's _______ proposition
Down
- BlackBerry's initial _______ was to create innovative devices for secure communication
- BlackBerry’s transition to software emphasized the need for strategic _______ in resource allocation
- The rise of iPhone demonstrated the dynamic nature of _______ competition
- External analysis involves frameworks like PESTEL, which examines _______ factors impacting businesses
- BlackBerry initially gained a competitive _______ by offering advanced cybersecurity and secure messaging
- BlackBerry's inability to compete with Apple and Android highlighted the importance of _______ in industry analysis
10 Clues: The rise of iPhone demonstrated the dynamic nature of _______ competition • Secure messaging and privacy were part of BlackBerry's _______ proposition • BlackBerry's reliance on its legacy products reflected a lack of strategic _______ • BlackBerry's initial _______ was to create innovative devices for secure communication • ...
May 2025 2025-04-27
Across
- A teen show that exaggerates teen life and revolves around the death of a classmate in a small town.
- amount of students attending speech and debate nationals.
- petting a dog releases this type of hormone.
Down
- The TPS cybersecurity team won this competition in their first year competing.
- Chess player who inspired "The Queens Gambit"
- type of bat that has become very controversial in the world of baseball.
- America has too many gosh darn ______
7 Clues: America has too many gosh darn ______ • petting a dog releases this type of hormone. • Chess player who inspired "The Queens Gambit" • amount of students attending speech and debate nationals. • type of bat that has become very controversial in the world of baseball. • The TPS cybersecurity team won this competition in their first year competing. • ...
Computer fundamentals 2025-05-23
Across
- Machines that mimic human intelligence to perform tasks.
- This company is known for electric cars and autonomous driving innovations.
- Virtual space where people interact using digital avatars.
- Security field that protects networks from hackers.
- A search engine developed by Microsoft.
- A cloud storage service provided by Google.
- Type of file format commonly used for storing high-quality images.
- Wearable device used for fitness tracking and health monitoring.
- This programming language is widely used for AI development and is known for its simplicity.
- A virtual assistant developed by Apple.
- Fifth-generation mobile network technology faster than 4G.
Down
- This type of digital currency operates on blockchain technology.
- A software application designed to mimic human conversation and assist users online.
- The process of transmitting data wirelessly over a network.
- A social media platform known for short 280-character posts.
- Short videos popular on Instagram and YouTube.
- A mobile operating system widely used in smartphones, developed by Google.
- Technology that immerses users in simulated environments through headsets.
- The study of designing systems that allow computers to learn without being explicitly programmed.
19 Clues: A search engine developed by Microsoft. • A virtual assistant developed by Apple. • A cloud storage service provided by Google. • Short videos popular on Instagram and YouTube. • Security field that protects networks from hackers. • Machines that mimic human intelligence to perform tasks. • Virtual space where people interact using digital avatars. • ...
TIK 2025-11-05
Across
- kejahatan siber yang mengarahkan pengguna ke situs web palsu untuk mencuri informasi pribadi
- Teknik penipuan lewat email, telpon atau pesan teks menyamar dari lembaga sah untuk mencuri informasi pribadi.
- Perangkat lunak yang memata-matai aktivitas pengguna dan mengumpulkan data tanpa izin.
- banyaknya usaha untuk meretas, muncul otentikasi dengan metode lain yaitu otentikasi ...
- mengenkripsi file korban dan meminta tebusan untuk mengembalikannya
- catatan harian berupa video
- Jenis aplikasi pengolah berupa poin utama dokumen
- Contoh aplikasi membuat laporan perhitungan keuangan
- Jenis aplikasi membuat laporan yang banyak mengandung Teks
Down
- Catatan harian di internet
- mengubah data asli menjadi bentuk kode agar tidak dapat dibaca oleh pihak yang tidak berwenang.
- Verifikasi identitas berdasarkan ciri fisik atau perilaku seseorang
- keamanan informasi di internet
- Perangkat lunak yang membantu membantu pengguna melindungi peranti dan file dari gangguan virus
- Aktivitas membobol sistem komputer, menyebar virus komputer untuk mencuri data pribadi
- Contoh aplikasi membuat blog yang kalian gunakan saat praktik di labor
- Program jahat menempel pada perangkat lain, menghapus dan menyembuyikan file
- Layanan yang dapat digunakan untuk mempublikasi vlog
- Setelah melakukan perekaman video, hal selanjutnya dilakukan
19 Clues: Catatan harian di internet • catatan harian berupa video • keamanan informasi di internet • Jenis aplikasi pengolah berupa poin utama dokumen • Layanan yang dapat digunakan untuk mempublikasi vlog • Contoh aplikasi membuat laporan perhitungan keuangan • Jenis aplikasi membuat laporan yang banyak mengandung Teks • ...
ISSO June 2021 2021-06-07
Across
- IRM’s _ _ _ was established by the CIO as IRM’s operationally focused cybersecurity organization responsible for cybersecurity compliance, threat analysis, preventative control monitoring, and incident response across all IRM-managed networks.
- The physical separation or isolation of a system from other systems or networks is known as an __ __.
- A ___ is a remote network of zombie drones under the control of a black hat. Attackers use various malware and viruses to take control of computers to form a robotic network, which will send further attacks such as spam and viruses to target computers or networks.
- A ____ is a Layer 2 technique that allows for the coexistence of multiple local area network (LAN) broadcast domains interconnected via trunks using the IEEE 802.1Q trunking protocol.
- IRM office responsable for Cyber Operations oversight.
- ____ is the only thumb drive authorized on Department of State Automated Information Systems.
- vulnerabilities must be remediated within ___calendar days of initial detection.
- The ___ and ___ Division is responsible for directing the coordination of ISSO activities through the DOS enterprise that includes its domestic facilities and overseas missions.
- this type of cyber attack locks out the rightful user of a computer or computer network and holds it hostage until the victim pays a fee.
- The ___ ___ group is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations to manage vulnerabilities to the Department’s information technology networks and enterprise mobile infrastructure.
Down
- is a United States federal law passed in 2002 that made it a requirement for federal agencies to develop, document, and implement an information security and protection program.
- The _ _ _ _ is a management and oversight body of the Deputy Chief Information Officer (DCIO) for Cyber Operations (CO) to meet responsibilities documented in 5 FAM 1063.
- A ___ ___ attack is a cyberattack in which a custom USB device emulates a USB keyboard to attack a workstation.
- Criminal organization responsable for the cyber attack against the Colonial Pipeline.
- A ____ is equal to 1,2 8,925,819,614,629,174,7 6,176 (28 ) bits, or 1, , , , , , , , (1 24) bytes and is the largest recognized value used with storage.
- computer accounts are accounts for computers that are stored within Active Directory where the computer hasn't actually connected to Active Directory for a lengthy amount of time.
- ISSO duties must be performed using an ISSO ___ account.
- The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality is know as ___ assurance.
- of ___ is an attack that prevents or impairs the authorized use of information system resources or services.
19 Clues: IRM office responsable for Cyber Operations oversight. • ISSO duties must be performed using an ISSO ___ account. • vulnerabilities must be remediated within ___calendar days of initial detection. • Criminal organization responsable for the cyber attack against the Colonial Pipeline. • ...
Unit 5 Crossword 2025-04-28
Across
- Running AI models locally on devices like smartphones without needing cloud access.
- AI that can create new content like images, music, or text.
- Python’s basic plotting library used for creating static, animated, and interactive visualizations.
- Google's AI framework known for deep learning and end-to-end machine learning workflows.
- Technology that converts spoken language into text.
- Open-source library used for computer vision tasks like face detection and image processing.
- Identifying human faces in digital images or video streams.
- Meta’s (Facebook's) flexible and dynamic deep learning library.
- Using a pre-trained AI model for a new but similar task.
Down
- Protection of systems and networks from digital attacks.
- Machine learning type where an agent learns by reward and punishment.
- Python library for making attractive and informative statistical graphics.
- Subfield of machine learning involving neural networks with many layers.
13 Clues: Technology that converts spoken language into text. • Protection of systems and networks from digital attacks. • Using a pre-trained AI model for a new but similar task. • AI that can create new content like images, music, or text. • Identifying human faces in digital images or video streams. • Meta’s (Facebook's) flexible and dynamic deep learning library. • ...
ITA EXAMPLE WORDSEARCH 2025-05-21
Across
- a popular ai chatbot that can answer questions
- any confirmed event that compromises the integrity, confidentiality, or availability of information
- flood-type attack that knocks a site offline by overwhelming it
- malware that encrypts files and demands payment for the key
- fake emails that lure you into clicking malicious links or downloading malicious files
- a secret string of characters that proves your identity when logging in
Down
- replacing a person's face or voice in a video with synthetic version or manipulation their expressions
- the practice of defending computer, network, and data from unauthorized access
- a person who breaks into system, usually maliciously
- a scam delivered via SMS text message
- QR code based phishing
- a network barrier that blocks out unwanted traffic
- two or more step login method used with a password to better secure an account
13 Clues: QR code based phishing • a scam delivered via SMS text message • a popular ai chatbot that can answer questions • a network barrier that blocks out unwanted traffic • a person who breaks into system, usually maliciously • malware that encrypts files and demands payment for the key • flood-type attack that knocks a site offline by overwhelming it • ...
IOT competetion 2024-03-19
Across
- cybersecurity strategy that approves a list of email address ip address on domain names
- the technology which is used to identify the object by scanning
- country which has more electronis and aslo gained title of world's factory.
- local area computer network.
Down
- any devices use directly by an end user to communicate.
- an american multinational digital communication technology that develops networking hardware and software
- it is used to mobile control internet of things that covers 3GGP standardised low power wide area
7 Clues: local area computer network. • any devices use directly by an end user to communicate. • the technology which is used to identify the object by scanning • country which has more electronis and aslo gained title of world's factory. • cybersecurity strategy that approves a list of email address ip address on domain names • ...
Week 1 Cybersecurity Know-How Challenge 2023-09-26
4 Clues: What does HIPPA protect? • National Cybersecurity Awareness Month • Health Insurance Portability and Accountability Act • Web Browsing Safety Tip 1: _ _ with the websites you visit..
HD January Crossword Puzzle 2025-12-02
Across
- Adhering to laws, regulations, and standards in IT practices.
- A software update that fixes vulnerabilities or bugs.
- Updating systems and processes to keep pace with technology.
- The time a system is operational and available.
- Software designed to disrupt or damage computer systems.
- The foundation of a strong relationship between businesses and their IT provider. Part of the "_____ Yet Verify" methodology.
- An unauthorized intrusion into a computer system.
- The day HD Tech releases their patches.
- The period when systems are unavailable or not functioning.
Down
- The ability of a system to handle growth without performance issues.
- A technology that delivers computing services over the internet.
- The practice of protecting systems and data from digital threats.
- A network security system that monitors and controls incoming and outgoing traffic.
- A copy of data stored separately to prevent loss.
- A method of converting data into a secure code to prevent unauthorized access.
- A cyberattack that tricks users into revealing sensitive information.
16 Clues: The day HD Tech releases their patches. • The time a system is operational and available. • A copy of data stored separately to prevent loss. • An unauthorized intrusion into a computer system. • A software update that fixes vulnerabilities or bugs. • Software designed to disrupt or damage computer systems. • ...
IT-OT Gap 2022-11-16
Across
- Susceptible to physical or cyber attacks or harm
- When a system has been compromised over the web or network
- This controls the logic of a process and runs the program
- The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss
- Two or more individuals or groups working together to accomplish a goal
- This is how Technicians interact with a process
Down
- Another term for outdated, like processes equipment in many industrial plants
- Person tasked to handle implementing, maintaining, and repairing computer networks.
- Unwilling or hesitant. Like OT is to accept change
- The act of being ready
- Unique number used to identify a computer or component on a network
- Should be unique and hard to guess
- Person in charge of others at a plant or facility
- The practice of employing people, policies, processes and technology to protect organizations
14 Clues: The act of being ready • Should be unique and hard to guess • This is how Technicians interact with a process • Susceptible to physical or cyber attacks or harm • Person in charge of others at a plant or facility • Unwilling or hesitant. Like OT is to accept change • This controls the logic of a process and runs the program • ...
Kejahatan di Dunia Digital 2025-11-05
Across
- keamanan informasi di internet
- karakteristik biologis yang unik bagi seorang individu
- software yang mampu mendapatkan akses ke sistem komputer melewati security normal
- kegiatan yang dilakukan untuk memastikan dan mengonfirmasibahwa suatu objek itu asli
- kejahatan di dunia maya yang biasanya targetbdihubungi melalui surel,telepon atau pesan teksoleh seseorangbyangbmenyamar dari lembaga yang sah
- malware yang dapat memantau dan merekam aktivitas pengguna di komputer atau perangkat seluler
- perangkat lunak yang menempel pada perangkat lunak lain
Down
- sekelompok komputer yang memiliki virus atau malware yang dikendalikan oleh peretas melalui server pusat
- malware yang tampak seperti perangkat lunak jinak tetapi membawa komponen yang jahatbdi dalamnya
- malware yang mengeksploitasi kelemahan sistem tertentu
- suatu metode yang mengkodekan data sebelum dikirim melalui jaringan komputer
- malware yang mampu mengenkripsi file di komputer atau perangkat seluler dan menuntut pembayaran untuk mendekripsi file
- anti-malware
- usaha untuk memikat pengguna internet untuk masuk ke situs web palsu
14 Clues: anti-malware • keamanan informasi di internet • malware yang mengeksploitasi kelemahan sistem tertentu • karakteristik biologis yang unik bagi seorang individu • perangkat lunak yang menempel pada perangkat lunak lain • usaha untuk memikat pengguna internet untuk masuk ke situs web palsu • suatu metode yang mengkodekan data sebelum dikirim melalui jaringan komputer • ...
Task 7 2025-08-07
Across
- A digital delivery service for software.
- A system which is used to detect threats from specific endpoints.
- Tool used for identifying and addressing vulnerabilities.
- Cloud computing that spreads data across multiple locations.
- Concept that everything can be automated.
- Technology that is made to not affect the environment.
- A system of several tools to enhance cyber security.
- Strategies, methods and technologies used to analyse business information.
- Insurance which is designed to cover legal costs and expenses from cyber attacks.
Down
- Computer program that learns and produces outputs.
- Multi step login process that uses something other than a login.
- A term refering to VR, AR
- Practice and technology to ensure security.
- A digital vr world made by Meta.
- An experience with one app from different points.
- A computer that uses quantum mechanics to work.
16 Clues: A term refering to VR, AR • A digital vr world made by Meta. • A digital delivery service for software. • Concept that everything can be automated. • Practice and technology to ensure security. • A computer that uses quantum mechanics to work. • An experience with one app from different points. • Computer program that learns and produces outputs. • ...
Military Careers 2025-12-05
Across
- The organized movement of troops and resources to a mission location.
- Designing, building, and repairing structures or systems (e.g., runways, bridges).
- The planning and movement of supplies, equipment, and personnel.
- A technician who repairs and maintains vehicles and equipment.
- Instruction and exercises that develop skills, certifications, and readiness.
- Leadership structure responsible for decision-making and orders.
- Hub A central location where supplies and equipment are stored and distributed.
- Military roles related to aircraft operations, maintenance, and support.
- Pertaining to military operations at sea and related career roles.
- Support Roles that provide essential services enabling combat operations (e.g., engineering, medical, logistics).
- Protecting computer systems and networks from attacks.
- The process of returning troops and equipment home after a mission.
Down
- Systems and personnel who transmit information and coordinate operations.
- Collecting and analyzing information to support missions and decisions.
- Specialist A role focused on supply chain, transportation, and inventory management.
- — Medical personnel who treat injured service members.
- The act of gathering information about enemy positions or terrain.
- People who have served in the military.
- Soldiers trained to fight on foot.
- Operations On-site activities and tasks carried out during missions or training.
20 Clues: Soldiers trained to fight on foot. • People who have served in the military. • — Medical personnel who treat injured service members. • Protecting computer systems and networks from attacks. • A technician who repairs and maintains vehicles and equipment. • The planning and movement of supplies, equipment, and personnel. • ...
Defend the Money: Cybersecurity in Finance 2025-09-24
Across
- ______ attack: flooding financial systems to halt services (3)
- International body combatting money laundering — abbr. (4)
- Finance staff are vulnerable due to high ______ to process payments quickly(6)
- Compliance requirement: "Know Your Customer" (3)
- Fraudulent CEO email scam to trick finance into urgent transfers (2 words) (8)
- Criminals hide illicit funds via digital or shell accounts (12)
- Fraud involving stolen credit card data (7)
- Fake websites that mimic bank login portals (8)
- Attack technique: secretly changing account details on vendor invoices (3 words)(23)
Down
- Fraudulent billing scheme tricking Accounts Payable(2 words) (12)
- Banking network messaging system — attackers have hacked it before (9)
- Cybercriminals often attempt to divert these electronic payments (11)
- Federal regulator often mentioned in financial cybersecurity compliance (abbr., 3)
- Targeted spear-phishing at executives, often CFOs (7)
- Malware disguised as something harmless, used to steal banking credentials(2 words) (11)
- Attack where hackers encrypt financial records and demand crypto payment (10)
16 Clues: Fraud involving stolen credit card data (7) • Fake websites that mimic bank login portals (8) • Compliance requirement: "Know Your Customer" (3) • Targeted spear-phishing at executives, often CFOs (7) • International body combatting money laundering — abbr. (4) • ______ attack: flooding financial systems to halt services (3) • ...
DELOITTE MASTERCLASS ON CYBERSECURITY & BCMS 2025-04-05
Across
- Is a security practice that involves several steps, all of which are meant to proactively prevent bad actors from taking advantage of IT vulnerabilities
- A software that hackers use to gain access to your system and capture sensitive information.
- A type of testing which a discussion-based exercise where participants respond to a hypothetical situation
- The B in BETH3 concept means
- A holistic management process that identifies disruptive threats and their impact on the organization's operations.
- A type of testing which a discussion-based exercise where the participants review the BCP and verify it for correctness and practicality
- The E in BETH3 concept means
Down
- A two-page document containing the organization's objectives for establishing a BCMS and the signatures of the key leaders supporting the initiative
- A type of testing which a simulation exercise usually involving multiple departments (rehearsals)
- A critical component of a BCMS because it helps an organization figure out how effective its BCMS is
- The T in BETH3 concept means
- A type of testing which an exercise where participants actually implement recovery action (e.g., move to alternate site, use backup systems, etc.)
- A type of phishing attacks ehich uses SMS messages or notifications to target people
- Is a cybercrime in which a target or targets are contacted by e-mail, telephone, or text message by someone posing as a legitimate institution to lure them into providing sensitive data
- A type of phishing attacks which a mash-up of 'Voice' and 'Phishing', refers to phishing done over phone calls
15 Clues: The T in BETH3 concept means • The B in BETH3 concept means • The E in BETH3 concept means • A type of phishing attacks ehich uses SMS messages or notifications to target people • A software that hackers use to gain access to your system and capture sensitive information. • ...
Recruitment Trends in 2023 2022-12-22
Across
- Working together with one or more people to complete a project or task or develop ideas or processes
- The range of similarities and differences each individual brings to the workplace
- Doing your job from any location
- Pay that is comparable or better than the market value of a position
- A focus on employee well-being
Down
- Protecting businesses' sensitive employee and personal data
- The organizational goal of keeping productive and talented workers and reducing turnover by developing a positive work environment
- Hiring temporary staff to work for a specific project or for a specified length of time
- A workplace model that mixes in-office and remote work
- A pool of candidates ready to fill a position
- A workplace where everyone feels equally involved and supported
- Shared values and goals of an organization
12 Clues: A focus on employee well-being • Doing your job from any location • Shared values and goals of an organization • A pool of candidates ready to fill a position • A workplace model that mixes in-office and remote work • Protecting businesses' sensitive employee and personal data • A workplace where everyone feels equally involved and supported • ...
Chapter 2 - Cybersecurity Threat Landscape 2025-09-03
Across
- ethical hacker motivated by desire to expose vulnerabilities and improve security
- the means that threat actors use to obtain access
- often the perpetrators of advanced persistent threats (APTs)
- unskilled attacker who uses hacking techniques but has limited skills
- threat intelligence gathered from publicly available sources
Down
- occurs when an employee, contractor, vendor, or other individuals with authorized access to information and systems
- attacks that exploit a previously unknown vulnerability
- seek to extort money or other concessions from victims by threatening to release sensitive information or launch further attacks
- motivated by the desire to obtain sensitive or proprietary information
- the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
- motive is simply illegal financial gain
- uses hacking techniques to accomplish some activist goal
12 Clues: motive is simply illegal financial gain • the means that threat actors use to obtain access • attacks that exploit a previously unknown vulnerability • uses hacking techniques to accomplish some activist goal • often the perpetrators of advanced persistent threats (APTs) • threat intelligence gathered from publicly available sources • ...
Software 2025-10-30
Across
- Algorithm that rearranges a collection of elements in an ascending or descending order.
- To divide and manage hardware resources.
- Allows one physical machine to run multiple OS at once.
- The practice of protecting systems, networks, and programs from digital attacks.
- Focuses on how a product looks and how users experience it.
- A language for accessing and managing database data.
Down
- A collection of code and instructions that direct computer operations.
- A global communication system that links together thousands of individual networks.
- Software that runs on a device to carry out user-defined functions.
- Central software that manages both a computer’s hardware and software.
- A theory on how much resource an algorithm takes as the input size grows larger.
- An attack where hackers run harmful scripts in a trusted website’s pages.
12 Clues: To divide and manage hardware resources. • A language for accessing and managing database data. • Allows one physical machine to run multiple OS at once. • Focuses on how a product looks and how users experience it. • Software that runs on a device to carry out user-defined functions. • A collection of code and instructions that direct computer operations. • ...
STRENGTHENING MEDIA LITERACY CROSSPUZZLE 2021-05-03
Across
- short text type used to communicate
- an electronic communication network that allows computer networks to connect to each other
- video and voice speech application
- Information technology security or electronic information security
Down
- it is the common name given to traditional and next-generation communication tools that provide one-way or interactive communication.
- A form of promotion and sharing shaped by graphic design and software languages hosted on the Internet network
- voice communication tool
- a person who provides access to systems that exploit vulnerabilities of electronic-based systems or accounts on the Internet
8 Clues: voice communication tool • video and voice speech application • short text type used to communicate • Information technology security or electronic information security • an electronic communication network that allows computer networks to connect to each other • ...
Test 2025-01-27
Across
- What type of algorithm does my blockchain project use?
- What Python framework did I use to write my web financial planner app?
- Outside of coding I enjoy playing __________ and video game with friends.
- What is my github username?
Down
- What is the name of the top down shooter game that I made in C# and Unity?
- What website am I using to learn cybersecurity and do ctf's right now?
- In the future I want to learn more about ethical hacking and _______ computing.
- What company did I do my high school co-op with?
8 Clues: What is my github username? • What company did I do my high school co-op with? • What type of algorithm does my blockchain project use? • What website am I using to learn cybersecurity and do ctf's right now? • What Python framework did I use to write my web financial planner app? • Outside of coding I enjoy playing __________ and video game with friends. • ...
C.A.G.E. File 1 2020-05-07
Across
- In order to stay safe ________, be sure to only go to websites you trust.
- ________security has to do with online safety.
- To be a C.A.G.E. secret ____________ you must work hard and fight for good!
Down
- A _____ tester is an important cybersecurity job. It is also called a penetration tester.
- Someone who finds security problems in a system and then helps to fix them is called an Ethical ___________.
- Microchip is the C.A.G.E. helper ___________.
- Agent X also goes by the name __________.
- A hacker might try to gain access to your computer by sending a bad link in an __________.
8 Clues: Agent X also goes by the name __________. • Microchip is the C.A.G.E. helper ___________. • ________security has to do with online safety. • In order to stay safe ________, be sure to only go to websites you trust. • To be a C.A.G.E. secret ____________ you must work hard and fight for good! • ...
find your career? 2023-10-16
Across
- AI jobs chatgpt,8. Genetic engineering study,9. Data broker money
- Programmer comp,5. Cybersecurity sec,6. Content creator insta
- Healthcare health,2. Networking work,3. Geneticist doc
Down
- Big data engineer data sceince,14. Web developer develop
- Psychology mind,11. Entrepreneur business,12. Digital marketer markeiing
5 Clues: Big data engineer data sceince,14. Web developer develop • Healthcare health,2. Networking work,3. Geneticist doc • Programmer comp,5. Cybersecurity sec,6. Content creator insta • AI jobs chatgpt,8. Genetic engineering study,9. Data broker money • Psychology mind,11. Entrepreneur business,12. Digital marketer markeiing
QUIZ 2024-12-10
Across
- Protects systems,networks,and data from unauthorized access and attacks
- Represents information stored digitally and needs protection from breaches
Down
- A person who gains unauthorized access to systems or data
- A secret mix of letters, numbers, and symbols used to secure accounts
- A potential danger to systems
5 Clues: A potential danger to systems • A person who gains unauthorized access to systems or data • A secret mix of letters, numbers, and symbols used to secure accounts • Protects systems,networks,and data from unauthorized access and attacks • Represents information stored digitally and needs protection from breaches
Technology 2025-03-27
Across
- The machines and programs we use to make our lives easier (5 letters)
- The positive change technology brings to how we live (10 letters)
- A system that allows data to be stored and accessed online (5 letters)
- The harm caused by too much e-waste and pollution (10 letters)
- This connects people through the internet (10 letters)
- The feeling of being attached to your devices and not wanting to disconnect (8 letters)
Down
- Technology used for entertainment, like games and movies (7 letters)
- Technology that helps protect people's personal information (12 letters)
- Technology used to make tasks faster and more efficient (7 letters)
- The feeling of being alone due to too much screen time (9 letters)
- The use of robots to do jobs (9 letters)
11 Clues: The use of robots to do jobs (9 letters) • This connects people through the internet (10 letters) • The harm caused by too much e-waste and pollution (10 letters) • The positive change technology brings to how we live (10 letters) • The feeling of being alone due to too much screen time (9 letters) • ...
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
CIS 178 Participation Cybersecurity Joseph Certuche 2023-07-13
Across
- short for malicious
- act of listening in
- duplicate copy of data
- to describe any fraudulent business
- screen out hackers, viruses, and worms
- humans can get it too.
- monitors a victim's online activity
- to ensure and confirm identity
- decoy system to attract attackers
- overlay on a legitimate page
- software program that montitors computer
- capture keystrokes
Down
- high-profile business attack
- Generates revenue for its developer
- face swapped or digitally altered
- online advertising to deliver malware
- technique for acquiring sensitive data
- error, fault or flaw
- type of malicious software
- flaw in the system
- encyption technology
21 Clues: flaw in the system • capture keystrokes • short for malicious • act of listening in • error, fault or flaw • encyption technology • duplicate copy of data • humans can get it too. • type of malicious software • high-profile business attack • overlay on a legitimate page • to ensure and confirm identity • face swapped or digitally altered • decoy system to attract attackers • ...
Jo-Jo's Cybersecurity Term Crossword Puzzle 2025-03-14
Across
- Everyone can use to encrypt
- Authentication with physical traits
- Accesses systems with technical skills
- Counting system with two digits
- Key aspect in scam tactics
- Malicious computer code/software
- Input, process, output, storage device
- Malware disguised as benign program
- Filters data for network security
Down
- System of infected computers
- Remote systems over the internet
- Phishing using text messages
- Secret code to decrypt data
- Network not accessible by public
- Network accessible by anyone, anywhere
- Malware that demands payment
- Connects home network to internet
- A way to secure data
- Authentication using multiple types
- Converts digital data into analog
- Simulate human intelligence
21 Clues: A way to secure data • Key aspect in scam tactics • Everyone can use to encrypt • Secret code to decrypt data • Simulate human intelligence • System of infected computers • Phishing using text messages • Malware that demands payment • Counting system with two digits • Remote systems over the internet • Network not accessible by public • Malicious computer code/software • ...
Data, Algorithms, Cybersecurity, and Global Impacts 2025-04-25
Across
- An asymmetric encryption system where a different key is used for encryption and decryption.
- Information about an individual that identifies, links, relates, or describes them.
- Decision problem for which an algorithm can be written to produce a correct output for all inputs.
- An algorithm that searches a sorted list for a value by repeatedly splitting the list in half until the value is found or all elements have been eliminated.
- A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer.
- Finite set of instructions that accomplish a specific task.
- Data about data.
- Problem with the goal of finding the "best" solution among many.
- Computer programs that can block, detect, and remove virus and other malware.
- A broad term for datasets so large or complex that traditional data processing applications are inadequate.
- A scheme in which the key to encrypt data is different from the key to decrypt.
- A technique for encrypting data where the same key is used to both encrypt and decrypt data.
- A method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
- The time used to complete a task sequentially divided by the time to complete a task in parallel.
- Copyrighted software that is given for free by the author or copyright owner.
- An algorithm that iterates through each item in a list until it finds the target value or all elements have been checked.
- A model in which programs are run by multiple devices.
- A process that reverses encryption, taking a secret message and reproducing the original plain text.
- A model in which programs run in order, one command at a time.
- The act of attempting to decode a secret message without knowing all the specifics of the cipher.
- A technique that attempts to trick a user into providing personal information.
- An application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
- In a worst case scenario, the number of steps of an algorithm has a exponential or factorial efficiency.
- A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
Down
- General description of a task that can (or cannot) be solved with an algorithm.
- Data that does not accurately reflect the full population or phenomenon being studied.
- A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
- Application of each step of an algorithm in the order in which the code statements are given.
- A measure of how many steps are needed to complete an algorithm.
- Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
- Software intended to damage a computing system or to take partial control over its operation.
- In a worst case scenario, the number of steps of an algorithm has a polynomial efficiency or lower (constant, linear, square, cube, etc.)
- An innovation that includes a computer or program code as an integral part of its functionality. Examples: self-driving car, picture editing software, e-commerce
- Problem with a yes/no answer.
- A process of encoding messages to keep them secret, so only "authorized" parties can read it.
- Data that can be freely used, re-used and redistributed by anyone.
- A model in which programs are broken into small pieces, some of which are run simultaneously.
- Choosing a smaller subset of a data set to use for analysis, for example by eliminating/keeping only certain rows in a table.
- Scientific research conducted in whole or part by distributed individuals (not always scientists) who contribute relevant data to research using their own computing devices.
- A relationship between two pieces of data.
- The practice of obtaining input or information from a large number of people via the Internet.
- Occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions due to its design or use.
- Process that makes the data uniform without changing its meaning.
- A malicious program that can copy itself and gain access to a computer in an unauthorized way.
44 Clues: Data about data. • Problem with a yes/no answer. • A relationship between two pieces of data. • A model in which programs are run by multiple devices. • Finite set of instructions that accomplish a specific task. • A model in which programs run in order, one command at a time. • A measure of how many steps are needed to complete an algorithm. • ...
cybersecurity by richard f 2dt1-1 2025-12-04
Across
- Cilvēks, kas sargā ēku
- Aizsardzība internetā
- numurs, kas identificē ierīci tīklā
- Metāla aizsargs logiem vai durvīm
- Datu glabāšanas vieta internetā
- Ierīce brīdināšanai par apdraudējumu
- Kustības detektors
- Pārbaude ar pirkstu/seju
- Process, as nosaka, kam ļauts un kam ne
- Skaitļu kombinācija
- Datu aizsardzība
- Lai pieteiktos savā kontā, jums vajag ievadīt login un...
- Sistēma ieejas kontrolei
- Informācija elektroniskā formā
Down
- Ierīce, kas pārbauda, vai tu drīksti tur atrasties
- Vieta, kur tiek pierakstīts, kas ir ienācis un izgājis
- Durvju mehānisms
- Dokuments ar drošības noteikumiem un soļiem
- Kameru novērošana
- Drošības noteikumi
- Persona, kas ielaužas sistēmās
- Stingri aizsargāts glabāšanas objekts
- Telpa, kur glabājas uzņēmuma "sirds"
- Datu kopija
- Programma, kas kaitē datoram
25 Clues: Datu kopija • Durvju mehānisms • Datu aizsardzība • Kameru novērošana • Drošības noteikumi • Kustības detektors • Skaitļu kombinācija • Aizsardzība internetā • Cilvēks, kas sargā ēku • Pārbaude ar pirkstu/seju • Sistēma ieejas kontrolei • Programma, kas kaitē datoram • Persona, kas ielaužas sistēmās • Informācija elektroniskā formā • Datu glabāšanas vieta internetā • ...
FC Times Crossword 2019-01-30
Across
- The street name of FC's new office
- What FC company raised $155 million in 2018 and expanded into Europe?
- This NYC-based insurance startup was named a CNBC Upstart 100 company in 2018
- The conference Joanne and Steve spoke at in 2018
- In a WSJ article about the top tech companies to watch in 2018, Charles said the firm is most focused on Artificial intelligence, cybersecurity and what other industry?
- The New York Times said this company will emerge as the leading residential solar installer in the US
Down
- Foundation led this meditation company's series A
- On-demand vet service in the FC portfolio
- Foundation's newest unicorn
- Bolt Thread's first fabric is made by
10 Clues: Foundation's newest unicorn • The street name of FC's new office • Bolt Thread's first fabric is made by • On-demand vet service in the FC portfolio • The conference Joanne and Steve spoke at in 2018 • Foundation led this meditation company's series A • What FC company raised $155 million in 2018 and expanded into Europe? • ...
