cybersecurity Crossword Puzzles

cyber security 2024-10-25

cyber security crossword puzzle
Across
  1. Tries to steal information by impersonating a trusted entity.
  2. Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
  3. Specialist Protects a company from cyber threats.
  4. A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
  5. Creates harmful software to damage the network.
Down
  1. The process of converting information or data into a code to prevent unauthorized access.
  2. An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
  3. Software that secretly monitors user activity on a computer or device, often used to collect personal information.
  4. Acts as a security barrier, inspecting every request and filtering threats.
  5. Attempts to break into a system by manipulating data input.

10 Clues: Creates harmful software to damage the network.Specialist Protects a company from cyber threats.Attempts to break into a system by manipulating data input.Tries to steal information by impersonating a trusted entity.Acts as a security barrier, inspecting every request and filtering threats....

Navigating the Web of Cyber Law 2025-06-05

Navigating the Web of Cyber Law crossword puzzle
Across
  1. A violation of privacy where an individual's data is exposed or stolen.
  2. A type of digital attack where hackers encrypt a victim's data and demand payment for its release.
  3. A legal framework that governs the use of electronic signatures in contracts.
  4. The person responsible for overseeing and enforcing cyber laws in a jurisdiction.
  5. The unauthorized copying or distribution of software or digital content.
Down
  1. The process of obtaining a person's sensitive data through fraudulent means, typically via emails.
  2. The practice of protecting computers, networks, and data from unauthorized access or attacks.
  3. A method of writing in code so that only authorized parties can access it.
  4. A type of software designed to gain unauthorized access to systems, steal data, or cause damage.
  5. The unlawful act of accessing a computer system without authorization.

10 Clues: The unlawful act of accessing a computer system without authorization.A violation of privacy where an individual's data is exposed or stolen.The unauthorized copying or distribution of software or digital content.A method of writing in code so that only authorized parties can access it....

TECH_TUES 2024-11-26

TECH_TUES crossword puzzle
Across
  1. – The study of protecting systems and networks from digital attacks.
Down
  1. – A network device that connects multiple computers in a LAN.
  2. – The process of making predictions or decisions without human intervention.
  3. – An algorithm used to scramble data for secure communication.

4 Clues: – A network device that connects multiple computers in a LAN.– An algorithm used to scramble data for secure communication.– The study of protecting systems and networks from digital attacks.– The process of making predictions or decisions without human intervention.

Romance scam 2024-02-16

Romance scam crossword puzzle
Across
  1. The practice of protecting computer systems, networks, and programs from digital attacks, theft, or damage.
  2. A person engaged in fraudulent activities, such as scams or deceit.
  3. The action of threatening to reveal embarrassing or damaging information about someone unless they do something, usually pay money.
  4. To identify or discover something, often used in the context of finding fraudulent activities.
Down
  1. To stop something from happening, in this case, stopping romance scams before they occur.
  2. The act of intentionally misleading or tricking someone.
  3. Malicious software designed to harm or exploit computer systems.

7 Clues: The act of intentionally misleading or tricking someone.Malicious software designed to harm or exploit computer systems.A person engaged in fraudulent activities, such as scams or deceit.To stop something from happening, in this case, stopping romance scams before they occur....

Cyber Awareness 2023-05-05

Cyber Awareness crossword puzzle
Across
  1. Using technology to bully or harass someone online
  2. A secret code that you use to protect your online accounts
  3. A person who uses their computer skills to gain unauthorized access to systems or networks
  4. A type of malware that can harm your computer and steal your personal information
Down
  1. The practice of protecting computers, networks, and online systems from unauthorized access or attack
  2. Unsolicited emails or messages that are sent to a large number of people

6 Clues: Using technology to bully or harass someone onlineA secret code that you use to protect your online accountsUnsolicited emails or messages that are sent to a large number of peopleA type of malware that can harm your computer and steal your personal information...

School of Engineering History 2024-01-11

School of Engineering History crossword puzzle
Across
  1. The town on Long Island where the school once had a campus
  2. The artist who created the red sculpture in front of Starbucks in the MetroTech Commons
  3. The high-flying club that was established in 1929
  4. The "Father of Polymer Science"
  5. He developed our school's first courses in cybersecurity
  6. An alum who became the first African-American woman ever to head a Fortune 500 company
  7. Engineering honor society
  8. What the Bridge St. African Wesleyan Methodist Church became
Down
  1. Last name of the math professors who calculated pi to more than 8 billion digits
  2. An NSF Award that has been won by many young, tenure-track faculty
  3. The foamy formula alum Joseph L. Owades developed
  4. Last name of the professor who built what was then the world’s most advanced hypersonic wind tunnel
  5. Henry C. Goldmark was awarded a presidential medal for his work on this project
  6. The company that first mass-produced penicillin thank to a formula developed by an alum
  7. Microwave expert
  8. The group that designated the Polymer Research Institute as a National Historic Chemical Landmark
  9. In 2017 alum Paolo Nespoli spent more than four months here

17 Clues: Microwave expertEngineering honor societyThe "Father of Polymer Science"The foamy formula alum Joseph L. Owades developedThe high-flying club that was established in 1929He developed our school's first courses in cybersecurityThe town on Long Island where the school once had a campusIn 2017 alum Paolo Nespoli spent more than four months here...

FITDVocab.MY 2013-05-15

FITDVocab.MY crossword puzzle
Across
  1. the VDU
  2. the tower
  3. opposite of pause
  4. also known as KB
  5. it eats cheese
  6. apps
  7. wireless fidelity
  8. without wires it can be 3g or 4g
  9. national cyber security alliance
  10. what is google
  11. connect without wires
  12. in the sky
  13. to search for search engines
  14. also known as TB
  15. visual display unit
  16. it is what comes before byte
  17. a printer
  18. keep your password secret
  19. random access memory
  20. folder
  21. a blank sheet you can type on
  22. not by hand
  23. where you put your flash drive
  24. to restart your computer
  25. light admitting diode
  26. the internet world
Down
  1. a symbol to represent your company
  2. enter instructions into a computer
  3. a keyboard
  4. CD drive
  5. a virus on your computer
  6. also known as GB
  7. internet service provider
  8. liquid crystal display
  9. online police
  10. a phone
  11. a catchy phrase to go with a logo
  12. online bullying
  13. the brain of the computer
  14. where you stick your headphones into
  15. extension cord operating systems
  16. old school with WIFI
  17. bigger than a bit
  18. the creator
  19. a packet of paper to advertise your company
  20. also know as MB
  21. computer processing unit
  22. service set identifier

48 Clues: appsfolderthe VDUa phoneCD drivethe towera printera keyboardin the skythe creatornot by handonline policeit eats cheesewhat is googleonline bullyingalso know as MBalso known as KBalso known as GBalso known as TBopposite of pausewireless fidelitybigger than a bitthe internet worldvisual display unitold school with WIFIrandom access memory...

2021 TBI Holiday Crossword Puzzle 2021-12-17

2021 TBI Holiday Crossword Puzzle crossword puzzle
Across
  1. They work for Santa.
  2. A holiday drink that is traditionally made with milk, cream, sugar, and egg.
  3. TBI changed from a “master agent” to a______?(Two Words)
  4. A circular band of foliage, typically hung for decoration.
  5. The podcast hosted by the training team.(Three Words)
  6. A snowman with a name.
  7. October is ____________ awareness month.
  8. A holiday film about Buddy leaving the North Pole to find his dad in New York.
  9. TBI's team of solution architects and engineers.(Two Words)
  10. Reindeer name that is also a kitchen cleanser.
  11. What is the name of the TBI app?
Down
  1. A piece of clothing hung over the fireplace for Santa Claus.
  2. The destination of TBI’s 2021 Presidents Club Trip.
  3. A festive holiday treat that you assemble and decorate with frosting and candy.(Two Words)
  4. The town the Grinch stole Christmas from.
  5. The popular Christmas ballet.
  6. How many years is TBI celebrating in business?
  7. What is the name of TBI’s DEI employee resource group?
  8. They pull Santa’s sleigh.
  9. Lucy wanted this for Christmas in A Charlie Brown Christmas.(Two Words)
  10. What is the name of the dog that appears in TBI training videos teaching us about best practices with Dave Polakowski?
  11. First company to use Santa in advertising.(Three Words)

22 Clues: They work for Santa.A snowman with a name.They pull Santa’s sleigh.The popular Christmas ballet.What is the name of the TBI app?The town the Grinch stole Christmas from.October is ____________ awareness month.How many years is TBI celebrating in business?Reindeer name that is also a kitchen cleanser....

SUNY Canton Crossword 2020-04-01

SUNY Canton Crossword crossword puzzle
Across
  1. / Three _____ Design
  2. / Funeral services career opportunity
  3. / Dr. Szafran
  4. / SGA holds bi-weekly Budget and _____ meetings
  5. / Computer focused criminal justice
  6. / Roos House
  7. / Join the College _____ Board to bring your event ideas to life
  8. / Team based hero shooter
  9. / An older mascot
  10. / You can find SGA and CAB in this office
  11. / House of Engineering
  12. / Flame-cooked at the Corner
  13. / Renewable energy
  14. / SUNY Canton has _____ traditional athletic teams
  15. / One of the two newest additions to the Athletics Program
  16. / Headliner at Spring 2019 concert
  17. / No longer Underground Lounge
  18. / Early _____
  19. / Our favorite Macropod
  20. / David R. _____ Award
  21. / Where to find International Student Initiatives
Down
  1. / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
  2. / _____ Competency Badge
  3. / When you're looking for something to do
  4. / Criminal Justice _____ Photography
  5. / MATH 141
  6. / Sports Management
  7. / The Annual Steel _____ Competition
  8. / Catch a movie on campus
  9. / The Library
  10. / BIOL 209
  11. / Fifty Years on the _____
  12. / The _____ flag can be found hanging proudly in Roos House and the Campus Center
  13. / 90 hours of supervised clinical experiences
  14. / Physical _____
  15. / Relieve stress in the _____ Room
  16. / Dorm
  17. / First Year _____ Program
  18. / Campus _____ Garden
  19. / Student Service Center

40 Clues: / Dorm/ MATH 141/ BIOL 209/ Roos House/ Dr. Szafran/ The Library/ Early _____/ Physical _____/ An older mascot/ Renewable energy/ Sports Management/ Three _____ Design/ Campus _____ Garden/ House of Engineering/ David R. _____ Award/ Our favorite Macropod/ _____ Competency Badge/ Student Service Center/ Catch a movie on campus...

SUNY Canton Crossword 2020-04-01

SUNY Canton Crossword crossword puzzle
Across
  1. / BIOL 209
  2. / Headliner at Spring 2019 concert
  3. / When you're looking for something to do
  4. / The _____ flag can be found hanging proudly in Roos House and the Campus Center
  5. / Dr. Szafran
  6. / Funeral services career opportunity
  7. / Campus _____ Garden
  8. / 90 hours of supervised clinical experiences
  9. / Criminal Justice _____ Photography
  10. / House of Engineering
  11. / An older mascot
  12. / Join the College _____ Board to bring your event ideas to life
  13. / Computer focused criminal justice
  14. / Dorm
  15. / Roos House
  16. / SGA holds bi-weekly Budget and _____ meetings
  17. / Student Service Center
  18. / Renewable energy
  19. / Our favorite Macropod
  20. / Fifty Years on the _____
Down
  1. / Catch a movie on campus
  2. / No longer Underground Lounge
  3. / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
  4. / Physical _____
  5. / Three _____ Design
  6. / The Annual Steel _____ Competition
  7. / One of the two newest additions to the Athletics Program
  8. / David R. _____ Award
  9. / MATH 141
  10. / Relieve stress in the _____ Room
  11. / Where to find International Student Initiatives
  12. / The Library
  13. / First Year _____ Program
  14. / Early _____
  15. / SUNY Canton has _____ traditional athletic teams
  16. / _____ Competency Badge
  17. / Team based hero shooter
  18. / Sports Management
  19. / Flame-cooked at the Corner
  20. / You can find SGA and CAB in this office

40 Clues: / Dorm/ BIOL 209/ MATH 141/ Roos House/ Dr. Szafran/ The Library/ Early _____/ Physical _____/ An older mascot/ Renewable energy/ Sports Management/ Three _____ Design/ Campus _____ Garden/ David R. _____ Award/ House of Engineering/ Our favorite Macropod/ _____ Competency Badge/ Student Service Center/ Catch a movie on campus...

Loyola Trivia 2024-05-02

Loyola Trivia crossword puzzle
Across
  1. Nationally recognized club at Loyola that has travelled across the world for competitions
  2. Varsity sport with the most MIAA Championships
  3. Turf field for Football and Lacrosse games
  4. most popular lunch item off the menu
  5. name of our school mascot, which means a Spanish gentlemen
  6. name of the retreat that our Juniors and Seniors complete
  7. Number of hours of Christian Service students complete in order to graduate
  8. Non-athletic activity with the most trophies at Loyola
  9. word that our students use to describe their connection with each other
  10. Name of turf field that is used for our middle school games soccer and lacrosse games
  11. Where our most recent foreign exchange program was based
  12. Annual football game played against our rival school on Thanksgiving morning
Down
  1. Name of the saint for whom the school was founded
  2. the order of Catholic priests also known as the Society of Jesus
  3. our school colors
  4. Latin phrase and Jesuit philosophy which means “Care for the whole person”
  5. Four letters which stand for a Latin phrase meaning “For the Greater Glory of God”
  6. 5 minute guided meditation played over the speakers every day
  7. Motto at Loyola Blakefield
  8. Name of turf field with lights for Rugby, Lacrosse, Football, and Soccer games

20 Clues: our school colorsMotto at Loyola Blakefieldmost popular lunch item off the menuTurf field for Football and Lacrosse gamesVarsity sport with the most MIAA ChampionshipsName of the saint for whom the school was foundedNon-athletic activity with the most trophies at LoyolaWhere our most recent foreign exchange program was based...

WORDS RELATED TO TECHNOLOGY 2024-06-05

WORDS RELATED TO TECHNOLOGY crossword puzzle
Across
  1. - Materials used in electronic devices.
  2. - Electronic devices worn on the body.
  3. - Electronic device for processing data.
  4. - Internet-based storage and computing services.
  5. - Organized collection of data.
  6. -(Internet of Things Network of physical devices connected to the Internet.
  7. -(Artificial Intelligence)Simulation of human intelligence by machines.
  8. - Global network connecting millions of computers.
  9. - Buying and selling of goods online.
  10. - Large and complex data sets.
  11. - Digital or virtual currency using cryptography.
  12. - Manipulation of matter on an atomic scale.
  13. - Step-by-step procedure for calculations.
  14. - Process of converting information into code.
  15. - Group of interconnected computers.
Down
  1. - Computer that provides data to other computers.
  2. - Advanced computing using quantum-mechanical phenomena.
  3. - Unmanned aerial vehicles.
  4. - Mobile device with advanced features.
  5. - Protection of computer systems from theft or damage.
  6. - Programs and operating information used by a computer.
  7. - Overlaying digital information on the real world.
  8. - Physical components of a computer.
  9. - Technology enabling systems to operate without human intervention.
  10. - Technology dealing with the design and operation of robots.
  11. - Measuring and analyzing human body characteristics.
  12. - Distributed ledger technology.
  13. Printing - Creating a physical object from a digital model.
  14. - Type of AI that allows computers to learn from data.
  15. -(Virtual Reality)Computer-generated simulation of a 3D environment.

30 Clues: - Unmanned aerial vehicles.- Large and complex data sets.- Organized collection of data.- Distributed ledger technology.- Physical components of a computer.- Group of interconnected computers.- Buying and selling of goods online.- Electronic devices worn on the body.- Mobile device with advanced features.- Materials used in electronic devices....

Cruciverba di diritto, inglese e informatica Flavio e Salvatore 2025-04-04

Cruciverba di diritto, inglese e informatica Flavio e Salvatore crossword puzzle
Across
  1. Parola che indica un'azione o uno stato.
  2. Parola che unisce frasi o parole.
  3. Parola che sostituisce un sostantivo.
  4. Parola che modifica un verbo, un aggettivo o un altro avverbio.
  5. News=Come si chiamano le notizie false
  6. Parte della frase che aggiunge informazioni al verbo o al nome.
  7. Parola che descrive un sostantivo.
  8. – Protezione di dati e sistemi informatici.
  9. – Sequenza di istruzioni per risolvere un problema.
  10. – Archivio strutturato di dati.
  11. player=Come si chiamano i giocatori di calcio in inglese
Down
  1. l'analisi economica del comportamento dei singoli operatori
  2. artificiale – Simulazione dell’intelligenza umana nei computer.
  3. Parola che collega un sostantivo ad altri elementi della frase.
  4. – Scrittura di codice per creare software.
  5. Chi compie l'azione o di cui si parla nella frase.
  6. si chiama il palazzo dove vive re Carlo 3
  7. Parola che precede il sostantivo, determinandone il genere e il numero.
  8. Vincolo di appartenenza a uno stato
  9. – Componenti fisici di un computer.
  10. Parola che indica una persona, un oggetto o un concetto.
  11. computing – Uso di server online per archiviare ed elaborare dati.
  12. informatica – Connessione tra computer per scambio di dati.
  13. operativo – Software che gestisce il computer (es. Windows, Linux).
  14. – Programmi che fanno funzionare un computer.

25 Clues: – Archivio strutturato di dati.Parola che unisce frasi o parole.Parola che descrive un sostantivo.Vincolo di appartenenza a uno stato– Componenti fisici di un computer.Parola che sostituisce un sostantivo.News=Come si chiamano le notizie falseParola che indica un'azione o uno stato.si chiama il palazzo dove vive re Carlo 3...

William Abdi Novanolo Zebua 2025-04-15

William Abdi Novanolo Zebua crossword puzzle
Across
  1. Hak atas penemuan baru di bidang teknologi disebut...
  2. Format gambar yang umum digunakan untuk konten web...
  3. Pelanggaran terhadap HAKI disebut juga dengan ... hak
  4. Kumpulan kata yang diletakkan untuk mencari informasi...
  5. Pekerjaan yang menjaga keamanan data digital...
  6. Tempat menyimpan konten digital secara daring...
  7. Salah satu bentuk HAKI yang melindungi ciptaan seni dan sastra...
  8. Profesi yang melakukan pengujian perangkat lunak...
  9. Profesi yang mengatur dan mengembangkan sistem basis data...
  10. Orang yang membuat desain antarmuka...
  11. Orang yang menulis code program computer...
  12. Suara atau musik yang ditambahkan dalam video...
  13. Search engine dari Microsoft
  14. Proses membuat atau menghasilkan konten digital...
Down
  1. Validasi untuk memastikan data berada dalam nilai minimum dan maksimum...
  2. Konten berbentuk tulisan panjang yang diunggah di situs...
  3. Mesin pencari paling populer di dunia
  4. Proses untuk memastikan daya yang dimasukkan sudah benar dan sesuai aturan...
  5. Validasi input berdasarkan jenis data, seperti teks atau angka...
  6. Jenis validasi yang memeriksa apakah data sudah ada di dalam daftar atau belum...
  7. Masa perlindungan hak cipta adalah seumur hidup ditambah 70 tahun setelah...
  8. Proses pencarian di internet dengan bantuan search engine disebut...
  9. Mesin pencari yang dikenal menjaga privasi penggunanya...
  10. Lembaga di Indonesia yang mengurus HAKI...
  11. Kesalahan umum ketika data tidak sesuai format...

25 Clues: Search engine dari MicrosoftMesin pencari paling populer di duniaOrang yang membuat desain antarmuka...Lembaga di Indonesia yang mengurus HAKI...Orang yang menulis code program computer...Pekerjaan yang menjaga keamanan data digital...Tempat menyimpan konten digital secara daring...Suara atau musik yang ditambahkan dalam video......

The Globalized world/ society 2025-05-14

The Globalized world/ society crossword puzzle
Across
  1. - Created Facebook, a major force in global communication.
  2. - 2008 agreement signed with global effects.
  3. - Pocket sized tech connecting the world.
  4. - Cheap, trendy, clothes produces rapidly.
  5. - Protection of digital systems and privacy.
  6. - Innovator behind tesla and space X ( First name)
  7. - Russian president with global influence in politics.
  8. - Platforms like Instagram and Twitter.
  9. - Pandemic that disrupted global systems.
  10. - Movement of people across borders.
  11. - Computers simulating human intelligence.
  12. - UK voted to leave the European Union.
  13. - Demonstrations for democracy in china.
  14. - Cofounder of Microsoft; Global tech leader.
  15. - Digital currency not tied to any country.
  16. - Pakistani activist for girls' education.
Down
  1. - Swedish climate activist who gained global fame.
  2. - Longtime German chancellor and EU leader.
  3. - 2022 conflict that tested global alliances.
  4. - Climate crisis caused by emissions.
  5. - New way people access music, TV, and film.
  6. - Terror attacks that reshaped globals security policy.
  7. - Global climate agreement signed in 2015.
  8. - Fought apartheid and became South Africa's first black president.
  9. - Current Chinese president and influential global figure (Last name)
  10. - Network that delivers goods world wide.
  11. - Environmental crisis affecting global climate.
  12. - 2011 protest across the Middle East.
  13. - First African- American U.S president; symbol of global change.
  14. - Rapid growth of the digital world in the 1990s-2000s

30 Clues: - Movement of people across borders.- Climate crisis caused by emissions.- 2011 protest across the Middle East.- Platforms like Instagram and Twitter.- UK voted to leave the European Union.- Demonstrations for democracy in china.- Pocket sized tech connecting the world.- Network that delivers goods world wide....

Technology Crossword 2025-06-23

Technology Crossword crossword puzzle
Across
  1. Which term refers to a disguised piece of malware that looks like a useful app?
  2. Which company created the Walkman?
  3. Who wrote the first-ever computer algorithm in the 1800s?
  4. Which operating system’s mascot is a penguin?
  5. Which app’s logo has a paper airplane?
  6. Which term describes a deceptive email meant to trick you into revealing personal info?
  7. Which company removed the headphone jack in its phones in 2016, sparking debate?
  8. Which social media platform was originally exclusive to Harvard students?
  9. Which term describes AI output that sounds right but is completely made up?
Down
  1. Which software methodology emphasizes fast, iterative releases?
  2. Which educational programming language is widely used to teach young girls to code?
  3. Which U.S. city was the birthplace of Microsoft?
  4. Which city hosted the first International Cybersecurity Challenge in 2022?
  5. Which chipmaker became central to AI development with its GPUs?
  6. What futuristic transport ideas use vacuum tubes for travel?
  7. What programming language is named after a British comedy group?
  8. Which tech company’s name was inspired by a mathematical term for “1 followed by 100 zeros”?
  9. What programming language shares its name with a type of coffee?
  10. Which blockchain platform introduced smart contracts?
  11. Which music device revolutionized listening with the slogan “1,000 songs in your pocket”?

20 Clues: Which company created the Walkman?Which app’s logo has a paper airplane?Which operating system’s mascot is a penguin?Which U.S. city was the birthplace of Microsoft?Which blockchain platform introduced smart contracts?Who wrote the first-ever computer algorithm in the 1800s?What futuristic transport ideas use vacuum tubes for travel?...

INTL mid-year meeting cross-word 2025-07-08

INTL mid-year meeting cross-word crossword puzzle
Across
  1. , Our CIO guest speaker’s cinematic spin on excellence
  2. A sparkle in the eye of our employee feedback tool
  3. , What’s fuelling Carl’s excitement for H2?
  4. , Analyst acronym behind our European Access Management report coming in H2
  5. , County home of our NHS customer
  6. It's this % we're aiming for in five years!
  7. , Name change for our Business Development department
  8. , Bounced around during the team game
  9. , A cultural mantra: Keep agile!
  10. , Shorter tune for the Access Management Alliance Partner Program
  11. , Carl's cultural pillar? Take full responsibility
  12. , Speed up the theme of the INTL Mid-Year Meeting?
Down
  1. , Smart card tech known for security and speed
  2. , Science that reshapes the land and this clue
  3. , Cultural pillar piece: international team’s 11% contribution
  4. , Product featured in our customer panel
  5. , Future integration target for Cybersecurity, MIOT, and connected applications
  6. , One key step to unlock high assurance
  7. , City home of our Irish customers
  8. , Why keep Clari current? For this sales virtue
  9. , World record youth? Just this many years old.
  10. , Our GTM compass points this way
  11. , Shrinking the phrase " Electronic Identification, Authentication and Trust Services " into five letters
  12. , Work together like one of Adam Bangle’s imperatives
  13. , Tie-in title for November’s new London customer event

25 Clues: , A cultural mantra: Keep agile!, Our GTM compass points this way, County home of our NHS customer, City home of our Irish customers, Bounced around during the team game, One key step to unlock high assurance, Product featured in our customer panel, What’s fuelling Carl’s excitement for H2?It's this % we're aiming for in five years!...

ICT Related Terms 2025-02-03

ICT Related Terms crossword puzzle
Across
  1. Processing data closer to the source, reducing latency and enhancing performance.
  2. Software that protects against malware and other threats.
  3. The ability to use and understand information technology effectively.
  4. Physical components of a computer system, like the monitor, keyboard, and CPU.
  5. Wireless technology for connecting to the internet.
  6. Extremely large datasets that require specialized tools for analysis and processing.
  7. Computer systems that mimic the structure and function of the human brain.
  8. Creating copies of data to protect against loss or corruption.
  9. A system of interconnected documents and resources accessible through the internet.
  10. Technology that creates immersive, interactive experiences
  11. A global network connecting computers and devices.
  12. A device that connects multiple devices to a network
Down
  1. Programs and instructions that tell hardware what to do.
  2. Protecting computer systems and networks from unauthorized access and threats.
  3. The process of examining raw data to extract meaningful insights and patterns.
  4. Storing and accessing data and applications over the internet.
  5. Presenting data in a visual format to make it easier to understand and interpret.
  6. Computer systems capable of performing tasks that typically require human intelligence.
  7. Online platforms for social interaction and content sharing.
  8. Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.

20 Clues: A global network connecting computers and devices.Wireless technology for connecting to the internet.A device that connects multiple devices to a networkPrograms and instructions that tell hardware what to do.Software that protects against malware and other threats.Technology that creates immersive, interactive experiences...

History, success and technology 2025-11-10

History, success and technology crossword puzzle
Across
  1. The widespread destruction and loss of life that happened during the Second World War.
  2. The state of being protected against the criminal use of electronic data.
  3. The process of judging the quality or value of something.
  4. A system of interconnected computers or devices.
  5. Being able to do something successfully or efficiently; skill.
  6. The belief or theory that things must happen the way they do; fate.
  7. Relating to a king, queen, or emperor
  8. The act of moving to live permanently in a foreign country.
  9. A sequence of steps or rules to be followed in calculations or problem-solving.
  10. The practice of using a mobile phone to send and receive text messages.
  11. The study of how Earth's features and human populations change over time.
Down
  1. A small piece of code stored on a user's computer by a website.
  2. A formal written agreement between countries.
  3. The belief or theory that things must happen the way they do; fate.
  4. An ambitious target or aim that is pursued with effort.
  5. The ability to keep doing something difficult despite setbacks or opposition.
  6. An original document, object, or account from a particular time period.
  7. The result of a process or project.
  8. The act of moving to live permanently in a foreign country.
  9. The process of inventing or introducing something new.
  10. The transmission of customs and beliefs from one generation to the next
  11. To make something happen, often through skill and effort.

22 Clues: The result of a process or project.Relating to a king, queen, or emperorA formal written agreement between countries.A system of interconnected computers or devices.The process of inventing or introducing something new.An ambitious target or aim that is pursued with effort.The process of judging the quality or value of something....

SUNY Canton Crossword 2020-04-01

SUNY Canton Crossword crossword puzzle
Across
  1. / Renewable energy
  2. / The Annual Steel _____ Competition
  3. / Criminal Justice _____ Photography
  4. / Dr. Szafran
  5. / Computer focused criminal justice
  6. / One of the two newest additions to the Athletics Program
  7. / Student Service Center
  8. / _____ Competency Badge
  9. / Our favorite Macropod
  10. / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
  11. / Three _____ Design
  12. / Dorm
  13. / David R. _____ Award
  14. / Physical _____
  15. / MATH 141
  16. / 90 hours of supervised clinical experiences
Down
  1. / Flame-cooked at the Corner
  2. / Team based hero shooter
  3. / The _____ flag can be found hanging proudly in Roos House and the Campus Center
  4. / Fifty Years on the _____
  5. / Where to find International Student Initiatives
  6. / SUNY Canton has _____ traditional athletic teams
  7. / Roos House
  8. / Relieve stress in the _____ Room
  9. / Sports Management
  10. / SGA holds bi-weekly Budget and _____ meetings
  11. / The Library
  12. / Early _____
  13. / An older mascot
  14. / First Year _____ Program
  15. / Headliner at Spring 2019 concert
  16. / House of Engineering
  17. / BIOL 209
  18. / When you're looking for something to do
  19. / Join the College _____ Board to bring your event ideas to life
  20. / No longer Underground Lounge
  21. / Funeral services career opportunity
  22. / Campus _____ Garden
  23. / You can find SGA and CAB in this office
  24. / Catch a movie on campus

40 Clues: / Dorm/ BIOL 209/ MATH 141/ Roos House/ The Library/ Dr. Szafran/ Early _____/ Physical _____/ An older mascot/ Renewable energy/ Sports Management/ Three _____ Design/ Campus _____ Garden/ House of Engineering/ David R. _____ Award/ Our favorite Macropod/ Student Service Center/ _____ Competency Badge/ Team based hero shooter...

SUNY Canton Crossword 2020-04-01

SUNY Canton Crossword crossword puzzle
Across
  1. / Three _____ Design
  2. / Funeral services career opportunity
  3. / Dr. Szafran
  4. / SGA holds bi-weekly Budget and _____ meetings
  5. / Computer focused criminal justice
  6. / Roos House
  7. / Join the College _____ Board to bring your event ideas to life
  8. / Team based hero shooter
  9. / An older mascot
  10. / You can find SGA and CAB in this office
  11. / House of Engineering
  12. / Flame-cooked at the Corner
  13. / Renewable energy
  14. / SUNY Canton has _____ traditional athletic teams
  15. / One of the two newest additions to the Athletics Program
  16. / Headliner at Spring 2019 concert
  17. / No longer Underground Lounge
  18. / Early _____
  19. / Our favorite Macropod
  20. / David R. _____ Award
  21. / Where to find International Student Initiatives
Down
  1. / SUNY Canton's future _____ Center will be located in the heart of downtown Canton
  2. / _____ Competency Badge
  3. / When you're looking for something to do
  4. / Criminal Justice _____ Photography
  5. / MATH 141
  6. / Sports Management
  7. / The Annual Steel _____ Competition
  8. / Catch a movie on campus
  9. / The Library
  10. / BIOL 209
  11. / Fifty Years on the _____
  12. / The _____ flag can be found hanging proudly in Roos House and the Campus Center
  13. / 90 hours of supervised clinical experiences
  14. / Physical _____
  15. / Relieve stress in the _____ Room
  16. / Dorm
  17. / First Year _____ Program
  18. / Campus _____ Garden
  19. / Student Service Center

40 Clues: / Dorm/ MATH 141/ BIOL 209/ Roos House/ Dr. Szafran/ The Library/ Early _____/ Physical _____/ An older mascot/ Renewable energy/ Sports Management/ Three _____ Design/ Campus _____ Garden/ House of Engineering/ David R. _____ Award/ Our favorite Macropod/ _____ Competency Badge/ Student Service Center/ Catch a movie on campus...

FITCvocab.GJK 2013-05-15

FITCvocab.GJK crossword puzzle
Across
  1. Flat disc used to store data
  2. one page document about your life
  3. protection of info. on the Internet
  4. Serves information to other computers
  5. 1000 bytes
  6. a slot where you can put head phones
  7. Internet/Online
  8. internet rules to keep you safe
  9. An official catch phrase of a company or brand
  10. Stands for ISP
  11. who is asking? what are they asking? Why do they want it?
  12. 1000 kilobytes
  13. Slots for hardware
  14. for connecting keyboards and mouses
  15. don't plagiarize
  16. Service set identification name signed to wifi networks
Down
  1. Data stored in a computers memory
  2. EX.headphones
  3. 1000 Gigabytes
  4. Stands for CPU
  5. Official picture of a company
  6. Piece of written matter
  7. Long term memory
  8. Search engine that take you to other search engines
  9. Selection of editing tools
  10. Stands for RAM
  11. front of the program
  12. rich text format
  13. Smallest piece of information
  14. Visual display used in devices
  15. DSL,Cable
  16. protect users form people phising
  17. program stored on internet servers
  18. No wire
  19. EX.mouse
  20. how you act online
  21. The second smallest device that stores information(8 Bits)
  22. 1000 megabytes
  23. Wireless Fidelity
  24. one canvas you can put anything on
  25. Document

41 Clues: No wireEX.mouseDocumentDSL,Cable1000 bytesEX.headphones1000 GigabytesStands for CPUStands for RAMStands for ISP1000 kilobytes1000 megabytesInternet/OnlineLong term memoryrich text formatdon't plagiarizeWireless Fidelityhow you act onlineSlots for hardwarefront of the programPiece of written matterSelection of editing tools...

Terminologies Related to RA 10175 2023-10-26

Terminologies Related to RA 10175 crossword puzzle
Across
  1. instruction, communication with, storing data in, retrieving data from
  2. an electronic, magnetic, optical, electrochemical, or other data processing
  3. keeping of data that already exists in a stored form
  4. refers to any information contained in the form of computer data
  5. gathering and receiving information
  6. listening to, recording, monitoring or surveillance of the content of communications
  7. refers to the DOJ – Office of Cybercrime
  8. either the Cybercrime Investigation and Coordinating Center
  9. transmission of information through information and communication technology
  10. comprehensive plan of actions designed to improve the security and enhance cyber resilience
Down
  1. National Bureau of Investigation and the Philippine National Police
  2. collection of tools, policies, risk management approaches and actions
  3. representation of information, knowledge, facts, concepts or instructions which are being prepared
  4. refers to any computer data other than the content of the communication
  5. person who created or is the origin of the assailed electronic statement
  6. a person who hosts or who proposes to host internet content
  7. modification or change, in form or substance, of an existing computer data or program
  8. a set of instructions executed by the computer to achieve intended results
  9. any representation of facts, information, or concepts in a form suitable for processing in a computer system
  10. mathematical algorithm produced against digital information

20 Clues: gathering and receiving informationrefers to the DOJ – Office of Cybercrimekeeping of data that already exists in a stored forma person who hosts or who proposes to host internet contenteither the Cybercrime Investigation and Coordinating Centermathematical algorithm produced against digital information...

Loyola Crossword 2024-07-02

Loyola Crossword crossword puzzle
Across
  1. Annual football game played against our rival school on Thanksgiving morning
  2. Varsity sport with the most MIAA Championships
  3. Name of turf field with lights for Rugby, Lacrosse, Football, and Soccer games
  4. 5 minute guided meditation played over the speakers every day
  5. Non-athletic activity with the most trophies at Loyola
  6. name of our school mascot, which means a Spanish gentlemen
  7. Nationally recognized club at Loyola that has travelled across the world for competitions
  8. Where our most recent foreign exchange program was based
  9. Name of landmark front field which hosts football and lacrosse games
  10. Name of the saint for whom the school was founded
  11. our school colors
Down
  1. name of popular retreat that our Juniors and Seniors complete
  2. the order of Catholic priests also known as the Society of Jesus
  3. Four letters which stand for a Latin phrase meaning “For the Greater Glory of God”
  4. Motto at Loyola Blakefield
  5. Name of turf field that is used for our middle school games soccer and lacrosse games
  6. Latin phrase and Jesuit philosophy which means “Care for the whole person”
  7. Number of hours of Christian Service students complete in order to graduate
  8. most popular lunch item off the menu
  9. word that our students use to describe their connection with each other

20 Clues: our school colorsMotto at Loyola Blakefieldmost popular lunch item off the menuVarsity sport with the most MIAA ChampionshipsName of the saint for whom the school was foundedNon-athletic activity with the most trophies at LoyolaWhere our most recent foreign exchange program was basedname of our school mascot, which means a Spanish gentlemen...

cyber crime 2024-11-07

cyber crime crossword puzzle
Across
  1. - Engineering technique used to manipulate people into revealing confidential information.
  2. - Software designed to detect and prevent computer viruses and other malware.
  3. - Type of cyberattack that overwhelms a network with traffic, causing denial of service.
  4. - Device or software that filters network traffic to block unauthorized access.
  5. - Encoding information so only authorized parties can access it.
  6. - Individual or group that hacks for political or social causes.
  7. - Concealing messages or information within other non-suspicious files.
  8. - Automated program that performs tasks; can be used in botnets for malicious purposes.
  9. - Software that allows unauthorized access to a computer while hiding its presence.
  10. - Software that gathers user information without their knowledge.
Down
  1. - Hacker who sometimes violates laws or ethical standards without malicious intent.
  2. - Malicious code that attaches itself to legitimate files and spreads.
  3. - Malicious software disguised as a legitimate program.
  4. - Breach exposing sensitive information to unauthorized parties.
  5. - A software vulnerability that is unknown to the vendor, often exploited by hackers.
  6. - Measures taken to protect a computer or network from unauthorized access or attack.
  7. - A hacker who breaks into computer systems with malicious intent.
  8. - Malware that locks or encrypts files until a ransom is paid.
  9. - Unwanted and unsolicited messages, usually sent in bulk by email.
  10. - Software that records keystrokes to capture sensitive information like passwords.

20 Clues: - Malicious software disguised as a legitimate program.- Malware that locks or encrypts files until a ransom is paid.- Breach exposing sensitive information to unauthorized parties.- Encoding information so only authorized parties can access it.- Individual or group that hacks for political or social causes....

Ethical Online Teaching and Data Management 2025-07-17

Ethical Online Teaching and Data Management crossword puzzle
Across
  1. The rules you agree to when you use a website or app.
  2. Protecting computers and data from bad guys online.
  3. Fake emails or messages trying to steal your info.
  4. Watching or tracking people online or with cameras.
  5. Choosing who can see or use certain info.
  6. breach When private info is stolen, leaked, or hacked.
  7. Extra info about data, like when a file was made or who made it.
  8. A written notice that tells how your data is collected and used.
  9. Turning data into a code so only certain people can read it.
  10. A way to log in using two steps, like a password and a code.
Down
  1. Saving files on the internet instead of your computer.
  2. Hiding names and details so data can't be linked to a person.
  3. Protecting student info so it stays safe and private.
  4. Keeping shared info secret or private.
  5. A U.S. law that helps keep student school records private.
  6. Small files websites use to remember what you do online.
  7. The trail of stuff you leave behind when you go online.
  8. A law that protects kids under 13 when they're online.
  9. A rule in Europe that says how companies must protect people's personal info.
  10. Saying “yes” before your personal info is used or shared.

20 Clues: Keeping shared info secret or private.Choosing who can see or use certain info.Fake emails or messages trying to steal your info.Protecting computers and data from bad guys online.Watching or tracking people online or with cameras.Protecting student info so it stays safe and private.The rules you agree to when you use a website or app....

FITAVocab.HBM 2013-05-15

FITAVocab.HBM crossword puzzle
Across
  1. presentation software program similar to Keynote and Powerpoint, but more abstract
  2. a file created by a software application
  3. Example: Windows
  4. rules and behaviors made to keep individuals safe when online
  5. an opening in a computer that allows to have more plug-ins
  6. part of the computer that processes everything
  7. main circuit board of a computer
  8. protecting information on computer systems/networks
  9. Example: printer
  10. legal means of protecting an author's work
  11. file format made by WORD that has a smaller chance of getting a virus
  12. digital, online, accesible on the digital world
  13. selection of editing and drawing/art tools on your computer
  14. file format made by Microsoft that can't be viewed by all programs
Down
  1. a file that serves as a starting place for a new document
  2. a software that runs on your computer
  3. the short term memory of a computer
  4. to start up a computer
  5. collection of data stored in one unit
  6. code of positive conduct online
  7. a piece of equipment that provides input and output for the computer
  8. a web-based program that saves your photos, docs, and music
  9. data transmission
  10. Example: keyboard
  11. file format made by ADOBE that is viewable by all programs

25 Clues: Example: WindowsExample: printerdata transmissionExample: keyboardto start up a computercode of positive conduct onlinemain circuit board of a computerthe short term memory of a computera software that runs on your computercollection of data stored in one unita file created by a software applicationlegal means of protecting an author's work...

The Internet 2025-02-07

The Internet crossword puzzle
Across
  1. The amount of data that can be sent over an internet connection in a given time.
  2. A high-speed internet connection that is always on.
  3. A device that connects multiple devices to the internet.
  4. The process of converting data into a secret code to protect it.
  5. A company that provides internet access.
  6. Software that secretly collects information from a device.
  7. A security system that blocks unauthorized access to a network.
  8. A system that translates website names into IP addresses.
Down
  1. Protection of internet-connected systems from attacks.
  2. Breach When private data is accessed without permission.
  3. Backbone The high-speed global infrastructure that connects networks and data centers.
  4. Authentication A security process requiring two steps to log in.
  5. Small files stored on a device to track user activity online.
  6. A service that encrypts internet connections for privacy.
  7. Malicious software designed to harm or steal information.
  8. A device that connects to the internet through a service provider.
  9. Address A unique number assigned to each device on the internet.
  10. A scam where attackers trick users into revealing personal information.
  11. A wireless network that allows devices to connect to the internet.
  12. Computing Storing and accessing data over the internet instead of a local device.

20 Clues: A company that provides internet access.A high-speed internet connection that is always on.Protection of internet-connected systems from attacks.Breach When private data is accessed without permission.A device that connects multiple devices to the internet.A service that encrypts internet connections for privacy....

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  2. dipublikasikan Kapan validasi konten sebaiknya dilakukan?
  3. Sebutkan satu jenis konten negatif selain hoaks!
  4. Surat menyurat dengan media elektronik
  5. Istilah pencipta dalam hak paten disebut dengan
  6. Penghargaan yang diberikan kepada inventor atas hasil ciptaannya disebut
  7. Platform besar untuk berbagi video (dimiliki Google).
  8. Mesin pencari informasi di Internet
  9. Alat apa yang bisa digunakan untuk validasi otomatis?
  10. Proses menciptakan ide, menulis naskah, dan produksi konten.
  11. Salah satu hak cipta yang dilindungi seumur hidup
  12. Visual yang dihasilkan dari kamera atau ponsel.
Down
  1. Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. Hak yang hanya diberikan kepada pencipta dan orang lain tidak dapat menggunakannya disebut
  3. alat digital untuk mengedit foto dan video.
  4. Siapa yang bertanggung jawab dalam validasi konten?
  5. Nama lain hak cipta adalah
  6. Profesi yang bertugas menjaga keamanan jaringan dan data.
  7. Menu yang digunakan untuk mengulangi proses loading
  8. Seni pertunjukan khas dari Yogyakarta dan Jawa Tengah.
  9. Mengunduh file dari Internet ke komputer
  10. Menu yang digunakan untuk menutup atau mengakhiri penggunaan email
  11. Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  12. Sebutkan satu contoh konten negatif!
  13. Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web

25 Clues: Nama lain hak cipta adalahMesin pencari informasi di InternetSebutkan satu contoh konten negatif!Surat menyurat dengan media elektronikMengunduh file dari Internet ke komputeralat digital untuk mengedit foto dan video.Istilah pencipta dalam hak paten disebut denganVisual yang dihasilkan dari kamera atau ponsel....

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  2. Mesin pencari informasi di Internet
  3. Istilah pencipta dalam hak paten disebut dengan
  4. Platform besar untuk berbagi video (dimiliki Google).
  5. Surat menyurat dengan media elektronik
  6. Visual yang dihasilkan dari kamera atau ponsel.
  7. Menu yang digunakan untuk mengulangi proses loading
  8. Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  9. alat digital untuk mengedit foto dan video.
  10. Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  11. Salah satu hak cipta yang dilindungi seumur hidup
  12. Hak yang hanya diberikan kepada pencipta dan orang lain tidak dapat menggunakannya disebut
  13. Penghargaan yang diberikan kepada inventor atas hasil ciptaannya disebut
Down
  1. validasi konten sebaiknya dilakukan?
  2. Mengunduh file dari Internet ke komputer
  3. Siapa yang bertanggung jawab dalam validasi konten?
  4. Menu yang digunakan untuk menutup atau mengakhiri penggunaan email
  5. learning Alat apa yang bisa digunakan untuk validasi otomatis?
  6. Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  7. Seni pertunjukan khas dari Yogyakarta dan Jawa Tengah.
  8. Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. Nama lain hak cipta adalah
  10. Sebutkan satu jenis konten negatif selain hoaks!
  11. Proses menciptakan ide, menulis naskah, dan produksi konten.
  12. Sebutkan satu contoh konten negatif!

25 Clues: Nama lain hak cipta adalahMesin pencari informasi di Internetvalidasi konten sebaiknya dilakukan?Sebutkan satu contoh konten negatif!Surat menyurat dengan media elektronikMengunduh file dari Internet ke komputeralat digital untuk mengedit foto dan video.Istilah pencipta dalam hak paten disebut denganVisual yang dihasilkan dari kamera atau ponsel....

XE_Florentcia Nielce E 2025-04-15

XE_Florentcia Nielce E crossword puzzle
Across
  1. Logo dan nama perusahaan termasuk hak
  2. proses pencarian dan pengumpulan data
  3. Mengembangkan dan mengelola perangkat lunak
  4. sumber perlindungan hak cipta perangkat lunak mencakup perlindungan terhadap
  5. Sebelum mempercayai berita yang ada, kita harus
  6. Apabila bertemu dengan konten negatif, harus
  7. materi yang memiliki dampak buruk pada kesehatan mental, emosional, atau psikologis seseorang.
  8. Dalam memilih konten adalah upaya untuk meminimalisir paparan konten negatif Konten digital Penyebaran budaya secara global bisa melalui
  9. Salah satu contoh konten negatif yang tersebar di media sosial dan membuat orang mudah tertipu adalah berita
  10. hak melindungi karya intelektual berupa program, algoritma, dan inovasi
Down
  1. Merancang tampilan dan pengalaman pengguna dalam aplikasi atau website
  2. program berbasis web yang diperuntukkan untuk mencari informasi
  3. Proses menciptakan dan mengedit konten
  4. melindungi perangkat, jaringan, dan data dari ancaman digital
  5. Diseminasi konten digital berupa video
  6. Mengelola dan merancang basis data agar dapat diakses efisien
  7. Apabila melanggar hak cipta suatu karya maka akan mendapatkan
  8. mengurutkan hasil pencarian berdasarkan relevansi dengan kata kunci yang dimasukkan pengguna.
  9. profesi yang berpaku pada analisis, pengolahan, dan interpretasi data untuk mendapat wawasan bisnis
  10. 20 tahun merupakan perlindungan hak.... Di Indonesia
  11. Salah satu video musik buatan anak bangsa yang berisi budaya nusantara
  12. salah satu contoh mesin pencari
  13. proses penyusunan dan penyimpanan data
  14. Proses penyebaran konten digital dengan berbagai platform

24 Clues: salah satu contoh mesin pencariLogo dan nama perusahaan termasuk hakproses pencarian dan pengumpulan dataDiseminasi konten digital berupa videoproses penyusunan dan penyimpanan dataProses menciptakan dan mengedit kontenMengembangkan dan mengelola perangkat lunakApabila bertemu dengan konten negatif, harus...

cyber crime 2024-11-07

cyber crime crossword puzzle
Across
  1. - Engineering technique used to manipulate people into revealing confidential information.
  2. - Software designed to detect and prevent computer viruses and other malware.
  3. - Type of cyberattack that overwhelms a network with traffic, causing denial of service.
  4. - Device or software that filters network traffic to block unauthorized access.
  5. - Encoding information so only authorized parties can access it.
  6. - Individual or group that hacks for political or social causes.
  7. - Concealing messages or information within other non-suspicious files.
  8. - Automated program that performs tasks; can be used in botnets for malicious purposes.
  9. - Software that allows unauthorized access to a computer while hiding its presence.
  10. - Software that gathers user information without their knowledge.
Down
  1. - Hacker who sometimes violates laws or ethical standards without malicious intent.
  2. - Malicious code that attaches itself to legitimate files and spreads.
  3. - Malicious software disguised as a legitimate program.
  4. - Breach exposing sensitive information to unauthorized parties.
  5. - A software vulnerability that is unknown to the vendor, often exploited by hackers.
  6. - Measures taken to protect a computer or network from unauthorized access or attack.
  7. - A hacker who breaks into computer systems with malicious intent.
  8. - Malware that locks or encrypts files until a ransom is paid.
  9. - Unwanted and unsolicited messages, usually sent in bulk by email.
  10. - Software that records keystrokes to capture sensitive information like passwords.

20 Clues: - Malicious software disguised as a legitimate program.- Malware that locks or encrypts files until a ransom is paid.- Breach exposing sensitive information to unauthorized parties.- Encoding information so only authorized parties can access it.- Individual or group that hacks for political or social causes....

ICT Related Terms 2025-02-03

ICT Related Terms crossword puzzle
Across
  1. Processing data closer to the source, reducing latency and enhancing performance.
  2. Software that protects against malware and other threats.
  3. The ability to use and understand information technology effectively.
  4. Physical components of a computer system, like the monitor, keyboard, and CPU.
  5. Wireless technology for connecting to the internet.
  6. Extremely large datasets that require specialized tools for analysis and processing.
  7. Computer systems that mimic the structure and function of the human brain.
  8. Creating copies of data to protect against loss or corruption.
  9. A system of interconnected documents and resources accessible through the internet.
  10. Technology that creates immersive, interactive experiences
  11. A global network connecting computers and devices.
  12. A device that connects multiple devices to a network
Down
  1. Programs and instructions that tell hardware what to do.
  2. Protecting computer systems and networks from unauthorized access and threats.
  3. The process of examining raw data to extract meaningful insights and patterns.
  4. Storing and accessing data and applications over the internet.
  5. Presenting data in a visual format to make it easier to understand and interpret.
  6. Computer systems capable of performing tasks that typically require human intelligence.
  7. Online platforms for social interaction and content sharing.
  8. Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.

20 Clues: A global network connecting computers and devices.Wireless technology for connecting to the internet.A device that connects multiple devices to a networkPrograms and instructions that tell hardware what to do.Software that protects against malware and other threats.Technology that creates immersive, interactive experiences...

Cyber Crossword 2025-10-30

Cyber Crossword crossword puzzle
Across
  1. crime investigation; comes after “digital”
  2. attack stage involving traversal between systems
  3. slang term for “hacked”
  4. attack component that performs the target malicious action
  5. to gain attacker presence on a system
  6. field focusing on protecting computers
  7. attack stage where NMAP may be used
  8. facility whose analysts may use a SIEM
  9. investigation of system and network records
  10. principle of least ___
  11. phrase an attacker says after gaining access
  12. network layer protocol with pings
  13. THE defensive cyber club
  14. fancy term for Google-fu
  15. smartcards using close-proximity communication
  16. fun term for a CDRU member
  17. evidence of malicious activity
  18. evil computer program
Down
  1. short form of “covered writing”
  2. comes before “base” or “science”
  3. a tantalizing trap for attackers
  4. engineering type that works on people
  5. act of sending a malicious email
  6. the shield to red’s sword
  7. authorized cyberattack to identify vulnerabilities
  8. proactive defense, or our theme this semester
  9. bypassing physical security devices without a key
  10. IT person in charge of organization computers
  11. act of smuggling data from a system
  12. common term for offensive security person
  13. short form of “secret writing”
  14. often a network packet filter
  15. collections of connected computers
  16. either 0 or 1

34 Clues: either 0 or 1evil computer programprinciple of least ___slang term for “hacked”THE defensive cyber clubfancy term for Google-futhe shield to red’s swordfun term for a CDRU memberoften a network packet filtershort form of “secret writing”evidence of malicious activityshort form of “covered writing”comes before “base” or “science”...

Cybersecurity Fundamentals Chapter 3 2024-06-03

Cybersecurity Fundamentals Chapter 3 crossword puzzle
Across
  1. A type of malware that attaches itself to a legitimate executable files and requires user initiation to spread and activate.
  2. A program that remains dormant until triggered by a specific event to execute its harmful actions.
  3. Software design to disrupt, damage, or gain unauthorized access to computer systems.
  4. Malware that encrypts a victim's data and demands payment to restore access.
  5. Disguise itself as a legitimate or desired operation, requiring user interaction to execute its malicious payload.
Down
  1. Techniques used by cybercriminals to manipulate individuals into divulging confidential information or performing actions that compromise security.
  2. A weakness in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause damage.
  3. An offensive action targeting computer systems, networks, or devices with the intent to disrupt, damage, or gain unauthorized access.
  4. Malicious software that replicates itself and spreads independently in networks, without needing a host program.

9 Clues: Malware that encrypts a victim's data and demands payment to restore access.Software design to disrupt, damage, or gain unauthorized access to computer systems.A program that remains dormant until triggered by a specific event to execute its harmful actions....

GenAI and Cybersecurity Puzzle 2025-09-16

GenAI and Cybersecurity Puzzle crossword puzzle
Across
  1. - The process of encoding information in such a way that only authorized parties can access it.
  2. - Malicious software designed to block access to a computer system until a sum of money is paid.
  3. AI - A branch of artificial intelligence that focuses on creating new content, such as text, images, or music, by learning from existing data.
  4. - A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. - A private Generative AI tool similar exclusively available for use by NNL personnel
  2. Trust - A security model that assumes that threats could be internal or external and verifies each request as though it originates from an open network.
  3. (Machine Learning) - A subset of Generative AI that focuses on building systems that learn from data to improve their performance over time without being explicitly programmed.
  4. - A number of Internet-connected devices, each of which is running one or more bots, typically used to perform distributed denial-of-service (DDoS) attacks.
  5. Phishing - A targeted attempt to steal sensitive information such as account credentials or financial information from a specific individual, often for malicious reasons, by masquerading as a trustworthy entity.

9 Clues: - A private Generative AI tool similar exclusively available for use by NNL personnel- The process of encoding information in such a way that only authorized parties can access it.- Malicious software designed to block access to a computer system until a sum of money is paid....

GZ MAG 6 2020-11-06

GZ MAG 6 crossword puzzle
Across
  1. softens the dirt within the pores.
  2. prejudice directed against a person or people groups on the basis of their membership in a particular racial or ethnic group.
  3. a chemical that improves a person's mood.
  4. one of the worst things you could apply to your face.
  5. showing the hole essence of what you are trying to show to the audience.
  6. putting yourself in a place where people can see how you work.
Down
  1. practice of defending computers, mobile devices, electronic systems, networks, and data from malicious or cyber-attacks.
  2. a store with style that inspires young people to feel confident about themselves when dressing up.
  3. refers to a change or shift along with a curve on a graph of price versus quantity.
  4. artistry a way to express yourself, boost your confidence, and show it off.

10 Clues: softens the dirt within the pores.a chemical that improves a person's mood.one of the worst things you could apply to your face.putting yourself in a place where people can see how you work.showing the hole essence of what you are trying to show to the audience.artistry a way to express yourself, boost your confidence, and show it off....

Jaringan Komputer Cindy 2024-01-15

Jaringan Komputer Cindy crossword puzzle
Across
  1. faktor yang memastikan setiap sistem komputer atau jaringan harus memastikan bahwa pihak, objek, dan informasi yang berkomunikasi di dalamnya adalah benar adalah..
  2. topologi dengan seluruh komputer yang berada dalam jaringan dihubungan satu sama lainnya secara langsung (point to point) disebut topologi..
  3. perangkat komputer atau perangkat TIK lainnya yang terkoneksi satu sama lain disebut..
  4. alat yang menghubungkan workstation, server, atau perangkat lainnya menggunakan kabel jaringan adalah..
  5. mode komunikasi antara pengirim dan penerima yang bersifat satu arah disebut mode..
Down
  1. aspek teknis yang mengatur biaya merupakan aspek teknis..
  2. jaringan yang menghubungkan dua perangkat komputer persib akan atau lebih pada cakupan yang relatif dekat adalah..
  3. singkatan dari model open system inter connection adalah..
  4. upaya perlindungan terhadap keamanan data dan informasi dari berbagai serangan siber adalah..
  5. garis pertahanan pertama dalam keamanan sistem komputer dan database merupakan fungsi dari..

10 Clues: aspek teknis yang mengatur biaya merupakan aspek teknis..singkatan dari model open system inter connection adalah..mode komunikasi antara pengirim dan penerima yang bersifat satu arah disebut mode..perangkat komputer atau perangkat TIK lainnya yang terkoneksi satu sama lain disebut.....

Non-GT Cyber Security Fun Quiz 2025-09-23

Non-GT Cyber Security Fun Quiz crossword puzzle
Across
  1. A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet.
  2. _ _ _ _ _ _ _ _ _ is the process of converting information or data into a code to prevent unauthorized access.
  3. The term for guessing a person’s password to gain unauthorized access is _ _ _ _ _ _ _ _ _ _ _ _.
  4. A program designed to spread from one computer to another is called a _ _ _ _ _.
  5. The act of stealing someone’s personal information and pretending to be them is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Down
  1. The practice of protecting systems, networks, and programs from digital attacks is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
  2. _ _ _ _ _ _ _ _ _ _ _ is a fake website set up to look like a real one to steal your information.
  3. The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _.
  4. A _ _ _ _ _ _ _ _ _ is a software application used to protect a computer from unauthorized access.
  5. A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information.

10 Clues: The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _.A program designed to spread from one computer to another is called a _ _ _ _ _.A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet.A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information....

Tech Week Test 2024-04-29

Tech Week Test crossword puzzle
Across
  1. A program that enables a computer to perform specific tasks.
  2. Step-by-step procedure for solving a problem.
  3. Manipulation of matter on an atomic, molecular, and supramolecular scale.
  4. Authentication techniques based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
  5. Collection of structured information stored in a computer system.
  6. Process of converting information into a code to prevent unauthorized access.
  7. Creation of a virtual version of something, such as an operating system or server.
Down
  1. Wireless networking technology that allows devices to connect to the internet without using cables.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. Mobile phone with advanced features, such as internet connectivity and app support.
  4. Internet-based computing that provides shared resources and data storage on demand.
  5. Software application used to access and view websites on the internet.
  6. Measures taken to protect computer systems and data from unauthorized access or attacks.
  7. Simulation of human intelligence processes by machines, especially computer systems.
  8. A security system that monitors and controls incoming and outgoing network traffic.

15 Clues: Step-by-step procedure for solving a problem.A program that enables a computer to perform specific tasks.Collection of structured information stored in a computer system.Software application used to access and view websites on the internet.Manipulation of matter on an atomic, molecular, and supramolecular scale....

VPNs 2025-03-21

VPNs crossword puzzle
Across
  1. Type of VPN that uses a protocol suite to create a secure, encrypted connection.
  2. Type of VPN that can be used to provide a secure connection between an employee's device working from home and the company's HQ
  3. Type of VPN that can be used to create a secure connection between two different locations of the same organization
  4. Providing a secure communication channel by encapsulating one protocol inside of another
  5. Mode used to provide secure communication between two hosts.
  6. What VPN stands for.
  7. Mode used to provide secure communication between networks
  8. Suite of protocols that provide security for VPNs called.
Down
  1. Protocol that provides authentication and integrity, but NOT confidentiality
  2. In cybersecurity, this tool is used to provided confidentiality
  3. Protocol used to negotiate connections and manage security associations through the use of cryptographic keys
  4. Type of VPN that uses TLS or its predecessor to provide an secure connection
  5. Tunneling protocol that references the Data Link layer of the OSI model
  6. a Tool that can be used for authentication of remote users, and also provide accounting and authorization.
  7. Protocol that provides authentication, encryption, and integrity?

15 Clues: What VPN stands for.Suite of protocols that provide security for VPNs called.Mode used to provide secure communication between networksMode used to provide secure communication between two hosts.In cybersecurity, this tool is used to provided confidentialityProtocol that provides authentication, encryption, and integrity?...

ICT Crossword - Social Media and Digital Ethics 2021-05-19

ICT Crossword - Social Media and Digital Ethics crossword puzzle
Across
  1. an attacker uses a number of computers to target a server
  2. starting arguments online and losing control is known as
  3. harass, threaten, and embarrass others using the internet
  4. once a new technology is planned out, experts in that field are brought it to point out any vulnerabilities that they can see.
  5. devices that give us the ability to change ourselves genetically
  6. is a system of connected devices that transfer data over a network
  7. using another person’s sexually explicit images to blackmail them
  8. a set of rules of how to behave online
  9. software used to protect against system intrusion
  10. the term used to describe that what is posted on the internet stays on there forever
Down
  1. accessing a system through its weaknesses and without permission
  2. online websites or applications to share content
  3. a field in technology that people are exploring in order to make sense of the world and thus make better choices.
  4. attempts by spammers to trick you into giving out personal information
  5. the general term used to describe online security measures

15 Clues: a set of rules of how to behave onlineonline websites or applications to share contentsoftware used to protect against system intrusionstarting arguments online and losing control is known asan attacker uses a number of computers to target a serverharass, threaten, and embarrass others using the internet...

MIL SET B 2023-10-22

MIL SET B crossword puzzle
Across
  1. The access to the whole or any part of a computer system without right.
  2. bullying that takes place online
  3. The acquisition of a domain name over the internet
  4. The willful engagement of any lascivious exhibition of sexual organs or sexual activity
  5. Refers to a set of instructions executed by the computer to achieve intended results.
Down
  1. Refers to a representation of information, knowledge, facts, concepts
  2. Refers to listening to, recording, monitoring or surveillance of the content of communications
  3. the common outlet of self-expression and creativityThe access to the whole or any part of a computer system without right.
  4. the excessive use of computers to the extent that it interferes with daily life.
  5. Refers to the collection of tools, policies, risk management approaches, actions, training, best practices
  6. refers to the process of harvesting bank details
  7. The input, alteration, or deletion of any computer data
  8. Refers to a computer or computer network
  9. The unauthorized input, alteration, or deletion of computer data
  10. refers to pedophiles using the Internet as a means to contact children

15 Clues: bullying that takes place onlineRefers to a computer or computer networkrefers to the process of harvesting bank detailsThe acquisition of a domain name over the internetThe input, alteration, or deletion of any computer dataThe unauthorized input, alteration, or deletion of computer data...

Digital Citizenship Puzzle 2024-01-29

Digital Citizenship Puzzle crossword puzzle
Across
  1. Tricks some people use to get your private info. Be careful.
  2. Being polite and nice when talking to others or playing games online.
  3. People you know and talk to on the computer. Add only friends you know in real life.
  4. Getting things from the internet onto your computer or tablet.
  5. Special controls that help you choose who can see your information online.
  6. Being mean to others on the internet. Always be kind and friendly.
  7. A place on the computer where you can find info or play games.
  8. Asking and getting approval before doing something online.
  9. Your special name when you play games or talk online.
Down
  1. The trail of things you do online. Be careful what you share.
  2. Protecting your computer and personal info from online bad stuff.
  3. Being careful and making good choices when using the internet.
  4. A secret code to keep your online stuff safe, like a hidden key.
  5. The time you spend looking at screens, like computers or tablets.
  6. Putting things from your computer or tablet onto the internet.

15 Clues: Your special name when you play games or talk online.Asking and getting approval before doing something online.Tricks some people use to get your private info. Be careful.The trail of things you do online. Be careful what you share.Getting things from the internet onto your computer or tablet....

Programming 1 Vocab Review (Modules 16 -17) 2023-04-27

Programming 1 Vocab Review (Modules 16 -17) crossword puzzle
Across
  1. a standard, perspective, or set of ideas
  2. is the numeric representation of a character
  3. to make (a coded or unclear message) intelligible
  4. a shift cipher, one of the easiest and most well known encryption systems
  5. the practice of protecting critical systems and sensitive information from digital attacks
  6. a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication
  7. the practice of hiding a secret message in something that is not secret
Down
  1. numeric representation using only the digits 1 and 0
  2. a software program that lets you do things
  3. a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
  4. a program that manages the hardware and software on the computer
  5. a random string of bits created explicitly for scrambling and unscrambling data
  6. software that allows a computer to communicate with external devices
  7. computer programming language written in either binary (2) or hexadecimal (16)
  8. to convert (information or data) into a cipher or code, especially to prevent unauthorized access

15 Clues: a standard, perspective, or set of ideasa software program that lets you do thingsis the numeric representation of a characterto make (a coded or unclear message) intelligiblenumeric representation using only the digits 1 and 0a program that manages the hardware and software on the computer...

Robots and Technology 2023-09-18

Robots and Technology crossword puzzle
Across
  1. Writing instructions in a programming language to create software and apps.
  2. Printing A technology that creates three-dimensional objects from digital models.
  3. An electronic device that processes data and performs tasks using programs.
  4. A set of steps or rules that computers follow to solve problems or make decisions.
  5. A mobile phone with advanced features like internet access and apps.
  6. A global network that connects computers and allows information sharing.
  7. The physical components of computers and electronic devices.
  8. Measures and practices to protect computer systems and data from threats.
  9. The use of technology and machines to perform tasks without human intervention.
Down
  1. Reality (VR) Technology that creates a computer-generated environment for users to interact with.
  2. An unmanned aircraft that can be controlled remotely or autonomously.
  3. Programs and instructions that run on computers and other devices.
  4. Intelligence (AI) Technology that enables machines to think, learn, and make decisions like humans.
  5. A machine designed to carry out tasks autonomously or under remote control.
  6. The application of scientific knowledge to create tools, devices, and systems.

15 Clues: The physical components of computers and electronic devices.Programs and instructions that run on computers and other devices.A mobile phone with advanced features like internet access and apps.An unmanned aircraft that can be controlled remotely or autonomously.A global network that connects computers and allows information sharing....

puzzle corner 8 2024-09-23

puzzle corner 8 crossword puzzle
Across
  1. High-speed storage located close to the CPU to improve processing speed.
  2. Malicious software that disguises itself as legitimate to trick users.
  3. A device that forwards data packets between computer networks
  4. A security system that monitors and controls incoming and outgoing network traffic
  5. The process of analyzing large sets of data to discover patterns and trends.
  6. The maximum amount of data that can be transmitted over a network in a given amount of time
  7. The standard markup language used to create web pages
Down
  1. A data type with only two possible values: true or false.
  2. The practice of protecting systems, networks, and programs from digital attacks
  3. The delay between a user's action and a system's response in a network.
  4. Supply A component that provides electrical power to a computer
  5. The practice of using remote servers hosted on the internet to store, manage, and process data
  6. A common method for connecting devices in a wired local area network (LAN).
  7. A large, powerful computer used for bulk data processing in organizations.
  8. A physical location where people can access the internet using Wi-Fi.

15 Clues: The standard markup language used to create web pagesA data type with only two possible values: true or false.A device that forwards data packets between computer networksSupply A component that provides electrical power to a computerA physical location where people can access the internet using Wi-Fi....

Science and Technology in the 2000s 2023-03-24

Science and Technology in the 2000s crossword puzzle
Across
  1. Mobile devices used for communication and accessing the Internet
  2. Electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  3. Websites and applications that enable users to create and share content or to participate in social networking.
  4. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks
Down
  1. The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. Tech company best known for its extensive search engine and other products
  3. Among the most popular mobile phone distributor
  4. Largest online shopping/delivery company

8 Clues: Largest online shopping/delivery companyAmong the most popular mobile phone distributorMobile devices used for communication and accessing the InternetTech company best known for its extensive search engine and other productsWebsites and applications that enable users to create and share content or to participate in social networking....

Crossword Puzzle of Computer-Topic: Browsing Safely 2025-05-16

Crossword Puzzle of Computer-Topic: Browsing Safely crossword puzzle
Across
  1. It is a collection of technologies, processes and practices designed to protect network.
  2. It refers to the act of stealing and misusing someone's personal information.
  3. It is a process of befriending children on social media.
  4. It is the act of sending an email to a user; misleading him to believe that it is from a trusted person.
Down
  1. It harm anyone using a computer and an internet connection.
  2. It refers to an illegal entry into a computer system or network.
  3. It is a program that disrupts the normal functioning of a computer.
  4. It is a computer program that is designed to identity, prevent, and remove viruses from a computer.

8 Clues: It is a process of befriending children on social media.It harm anyone using a computer and an internet connection.It refers to an illegal entry into a computer system or network.It is a program that disrupts the normal functioning of a computer.It refers to the act of stealing and misusing someone's personal information....

Trade school vs 4 year College 2024-02-26

Trade school vs 4 year College crossword puzzle
Across
  1. what is one of the hardest trade school
  2. he structure of laws, rules and agencies designed to hold criminals
  3. you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. what trade jobs pat the most

5 Clues: what trade jobs pat the mostwhat is one of the hardest trade schoolhe structure of laws, rules and agencies designed to hold criminalsyou to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .....

Trade school vs 4 year College 2024-02-26

Trade school vs 4 year College crossword puzzle
Across
  1. what is one of the hardest trade school
  2. he structure of laws, rules and agencies designed to hold criminals
  3. you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. what trade jobs pat the most

5 Clues: what trade jobs pat the mostwhat is one of the hardest trade schoolhe structure of laws, rules and agencies designed to hold criminalsyou to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .....

Browsing Safely 2025-05-26

Browsing Safely crossword puzzle
Across
  1. the process of befriend children on social media to facilitate online or physical sexual abuse
  2. full form is vital information resource under seize.
  3. any criminal activity intended to harm anyone using computer or internet connection
Down
  1. a collection of technologies, processes design to protect network or computer and data from attack or unauthorized access
  2. an illegal entry into a computer system or network

5 Clues: an illegal entry into a computer system or networkfull form is vital information resource under seize.any criminal activity intended to harm anyone using computer or internet connectionthe process of befriend children on social media to facilitate online or physical sexual abuse...

Trade school vs 4 year College 2024-02-26

Trade school vs 4 year College crossword puzzle
Across
  1. what is one of the hardest trade school
  2. he structure of laws, rules and agencies designed to hold criminals
  3. you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. what trade jobs pat the most

5 Clues: what trade jobs pat the mostwhat is one of the hardest trade schoolhe structure of laws, rules and agencies designed to hold criminalsyou to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .....

Beware, Become Cyber Aware! 2025-05-23

Beware, Become Cyber Aware! crossword puzzle
Across
  1. To imitate a legitimate sender’s address in order to trick you.
  2. The practice of protecting systems, networks, and data from digital threats.
Down
  1. To imitate a legitimate sender's email address in order to trick the recipient
  2. What you should do via a different communication channel when in doubt about a suspicious email
  3. ___________, Don't Delete: Best option for handling suspicious emails

5 Clues: To imitate a legitimate sender’s address in order to trick you.___________, Don't Delete: Best option for handling suspicious emailsThe practice of protecting systems, networks, and data from digital threats.To imitate a legitimate sender's email address in order to trick the recipient...

IT Roles & Responsibilities 2023-02-16

IT Roles & Responsibilities crossword puzzle
Across
  1. This group keeps company and user data secure and takes preventative measures to reduce harm in the event of a breach
  2. This person builds databases that logically store information and are also responsible for data recovery efforts and back ups
  3. This group troubleshoots and resolves technical issues
  4. This person manages and prioritizes the product backlog, translates product managers' strategies to development tasks, and learning the customers' requirements
  5. This person collects and interprets data sets in order to solve a problem
  6. This person develops, codes and maintains software systems
  7. This person conducts daily calls and helps the team by removing obstacles
Down
  1. This person is the liaison between business and IT
  2. This person tests new and existing programs to identify and help remove bugs, glitches, and other issues
  3. This person creates the overall technical vision for a specific solution to a business problem
  4. This person plays the lead role in planning, executing, monitoring, and closing projects

11 Clues: This person is the liaison between business and ITThis group troubleshoots and resolves technical issuesThis person develops, codes and maintains software systemsThis person collects and interprets data sets in order to solve a problemThis person conducts daily calls and helps the team by removing obstacles...

AV Lesson 5 2024-03-10

AV Lesson 5 crossword puzzle
Across
  1. The act of compelling observance of or compliance with a law or rule.
  2. Existing or occurring in a digital environment, often simulated or computer-generated.
  3. Designed to be easily understood and operated by ordinary people.
  4. A penalty or coercive measure imposed to ensure compliance with a law or rule.
  5. To bring legal action against someone, typically in a court of law.
Down
  1. To introduce new methods or ideas, especially to promote change or improvement.
  2. To make a process or system operate automatically, reducing the need for human intervention.
  3. The practice of protecting computer systems, networks, and programs from digital attacks.
  4. The status of being a member of a particular country and having the rights and duties associated with it.
  5. Transmitting signals without the need for physical connection, typically using radio waves.
  6. To officially require or authorize something, often by law or command.

11 Clues: Designed to be easily understood and operated by ordinary people.To bring legal action against someone, typically in a court of law.The act of compelling observance of or compliance with a law or rule.To officially require or authorize something, often by law or command.A penalty or coercive measure imposed to ensure compliance with a law or rule....

Networking and the Internet 2022-06-27

Networking and the Internet crossword puzzle
Across
  1. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  2. The process of transferring data between two or more digital devices
  3. Facts and statistics collected together for reference or analysis.
  4. A global computer network consisting of multiple interconnected networks.
  5. The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
  1. The ability of computers and the Internet to consistently perform to the expectations of their designed function.
  2. The speed and resource usage involved in collecting, manipulating, and analyzing data.
  3. The preservation of accuracy and consistency of a data set over the course of its analysis.
  4. A numerical label assigned to each computing device on a network.
  5. A series of interconnected computers and devices that share resources and exchange data with each other.
  6. The rate at which data is communicated from the Internet to a computer and vice versa.

11 Clues: A numerical label assigned to each computing device on a network.Facts and statistics collected together for reference or analysis.The process of transferring data between two or more digital devicesA global computer network consisting of multiple interconnected networks....

2022 Stay Aware Event 2022-03-02

2022 Stay Aware Event crossword puzzle
Across
  1. This practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  2. __________ and access management is a framework of policies and technologies used to ensure that the right users have the appropriate access to technology resources.
  3. Memorized secret consisting of a sequence of words or other text that a person uses to authenticate their identity and would be difficult for someone else to guess.
  4. Type of social engineering where scammers send text messages pretending to be from reputable companies to entice individuals to reveal personal information, such as passwords or credit card numbers.
  5. A virtual _______ _______ is an encrypted connection over the Internet from a device to a network.
  6. A term for additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.
  7. A term for hackers that break into the network to steal information that would be used to harm the owner or the users without their consent and is completely illegal.
  8. An acronym for a centralized function/team at Lowe’s allowing people, processes, and technology to continuously monitor and improve the security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents.
  9. Shoulder ________ is a criminal practice using direct observation techniques, such as looking over someone's shoulder, to try to steal someone’s personal information.
  10. The ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption.
Down
  1. ____ ______ authentication is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are such as something they have (e.g., bank card), something they know (e.g., PIN number) and/or something they are (e.g., biometrics).
  2. A security violation where sensitive, protected, or confidential data is copied, viewed, stolen, or used by an unauthorized individual, and can cause great financial loss and other repercussions.
  3. Software that is secretly installed into an information system without the knowledge of the system user or owner.
  4. This aims to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
  5. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  6. A type of malicious code or software that looks legitimate but can take control of your computer and is designed to damage, disrupt, steal, or (in general) inflict some other harmful action on your data or network.
  7. __________ __________ baselines are standards for all systems in the network and enable Lowe’s to implement systems in an efficient and standardized manner.
  8. An unauthorized user who attempts to or gains access to an information system.
  9. Highly targeted phishing attack aimed at senior executives masquerading as a legitimate email.
  10. Refrain from inserting unknown or unidentifiable ___________ ______ into your Lowe’s devices unless you are an approved user.

20 Clues: An unauthorized user who attempts to or gains access to an information system.Highly targeted phishing attack aimed at senior executives masquerading as a legitimate email.A malicious application or script that can be used to take advantage of a computer’s vulnerability....

OT InfoSec 2024 2024-09-30

OT InfoSec 2024 crossword puzzle
Across
  1. MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE.
  2. A TYPE OF MALWARE THAT DENIES A USER'S ACCESS TO A SYSTEM OR DATA UNTIL A SUM OF MONEY IS PAID.
  3. A ROUTINE FIX FOR A COMPUTER PROGRAM.
  4. THIS ACRONYM IS A DEVICE THAT EXAMINES WEB TRAFFIC AND CAN PREVENT ATTACKS EXPLOITING WEB APPLICATION VULNERABILITIES.
  5. FLOW OR WEAKNESS IN AN INFORMATION SYSTEM THAT COULD BE EXPLOITED.
  6. A CLASS OF MALICIOUS SOFTWARE, OR MALWARE, THAT CIRCULATES BETWEEN COMPUTERS AND CAUSES DAMAGE TO DATA AND SOFTWARE.
  7. YUBIKEY IS AN EXAMPLE OF A HARDWARE _______
  8. THIS COLORFUL ACROMYN MEANS TROUBLE ON A WINDOWS SYSTEM.
  9. A STRING OF CHARACTERS USED TO AUTHENTICATE AN IDENTITY.
  10. THE POTENTIAL FOR LOSING VALUABLE INFORMATION.
  11. THE INTENTIONAL OR UNINTENTIONAL RELEASE OF SECURE OR PRIVATE/CONFIDENTIAL INFORMATION TO AN UNTRUSTED ENVIRONMENT (2 WORDS).
  12. I LOVE ROCK MUSIC AND SPENDING TIME WITH FRIENDS. (WHICH SECURITY TEAM MEMBER AM I?).
  13. A SELF-REPLICATING MALICIOUS PROGRAM.
  14. AN ETHICAL SECURITY HACKER THAT USES THEIR SKILLS FOR GOOD.
  15. A CONTROLLED PRIVATE NETWORK THAT ALLOWS ACCESS TO PARTNERS, VENDORS AND SUPPLIERS, OR AN AUTHORIZED SET OF CUSTOMERS.
  16. ACCOUNT LOGIN PROCESS THAT REQUIRES USERS TO ENTER MORE INFORMATION THAN JUST A PASSWORD.
  17. I HAVE A FAMILY OF SIX AND I'M A GRANDPA (WHICH SECURITY TEAM MEMBER AM I?).
Down
  1. THE ACT OF PUBLISHING SOMEONE’S PERSONAL, CONFIDENTIAL INFORMATION ON THE INTERNET, OFTEN WITH MALICIOUS INTENT.
  2. UNAUTHORIZED USER WITH MALICIOUS INTENT.
  3. WORLD FAMOUS HACKER WHO CLAIMED TO BE ABLE TO ISSUE NUCLEAR LAUNCH CODES VIA WHISTLING.
  4. THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).
  5. A LIST OF PEOPLE, ORGANIZATIONS, IP ADDRESSES, OR COUNTRIES THAT ARE BLOCKED OR EXCLUDED BY OTHERS BECAUSE THEY ARE ALLEGED TO HAVE ENGAGED IN UNACCEPTABLE, OR UNETHICAL BEHAVIOR/ACTIVITIES.
  6. CYBER ATTACK IN WHICH THE ATTACKER FLOODS A SERVER WITH INTERNET TRAFFIC TO PREVENT USERS FROM ACCESSING CONNECTED ONLINE SERVICES AND SITES.
  7. MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
  8. WHEN I'M NOT WORKING OR WRITING CODE, I LOVE TO PLAY MUSICAL INSTRUMENTS. (WHICH SECURITY TEAM MEMBER AM I?)
  9. THE PROTECTION OF DIGITAL INFORMATION, AS WELL AS THE INTEGRITY OF THE INFRASTRUCTURE HOUSING AND TRANSMITTING DIGITAL INFORMATION.
  10. A MECHANISM FOR CREATING A SECURE CONNECTION BETWEEN A COMPUTING DEVICE AND A COMPUTER NETWORK.
  11. I AM A FOODIE, AND MY FAVORITE FOOTBALL TEAM IS HOCKEY! (WHICH SECURITY TEAM MEMBER AM I?).
  12. CURRENT HEAD OF THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA).
  13. ANY SOFTWARE OR APPLICATION THAT DISPLAYS UNSOLICITED ADVERTISEMENTS ON YOUR COMPUTER/BROWSER.
  14. MALWARE THAT MISLEADS USERS OF ITS TRUE INTENT BY DISGUISING ITSELF AS A STANDARD PROGRAM.
  15. ATTEMPTING TO TRICK PEOPLE INTO REVEALING SENSITIVE INFORMATION, OFTEN BY USING EMAILS OR FAKE WEBSITES THAT LOOK LIKE THEY ARE FROM TRUSTED SOURCES.
  16. A PROCESS USED TO IDENTIFY A HUMAN PERSON ENTERING DATA (I AM NOT A ROBOT).

33 Clues: A ROUTINE FIX FOR A COMPUTER PROGRAM.A SELF-REPLICATING MALICIOUS PROGRAM.UNAUTHORIZED USER WITH MALICIOUS INTENT.YUBIKEY IS AN EXAMPLE OF A HARDWARE _______THE VAST UNDERBELLY OF THE INTERNET (2 WORDS).THE POTENTIAL FOR LOSING VALUABLE INFORMATION.MALWARE DESIGNED TO HIDE ITS PRESENCE ON YOUR DEVICE....

Chapter 3 2024-09-11

Chapter 3 crossword puzzle
Across
  1. What type of attack floods a target with data requests to make a site unavailable?
Down
  1. What does BYOD stand for?
  2. What should organizations implement to secure themselves from attacks?
  3. What organization is mentioned as a resource for cybersecurity guidance?

4 Clues: What does BYOD stand for?What should organizations implement to secure themselves from attacks?What organization is mentioned as a resource for cybersecurity guidance?What type of attack floods a target with data requests to make a site unavailable?

technology 2016-05-17

technology crossword puzzle
Across
  1. company of the type of touch screen phone most of the world uses today
  2. card, a video adapter
  3. a conventional method of transmitting data
  4. computing, does not eliminate servers
  5. is a document sent with an email message
  6. a wireless communications technology intended to replace cables.
  7. A software program that allows you to surf the web
  8. a saved link to a particular Web page
  9. driver, a small program that allows a peripheral device such as a printer or scanner to connect to your PC
  10. refers to a website's text and information, as opposed to its design and structure
Down
  1. reality, is the integration of digital information with live video
  2. microprocessor that performs many functions and calculations that make your computer run
  3. Acrobat Reader, is software that allows you to view a PDF document
  4. refers to measures designed to protect your computer
  5. to load and initialise the operating system on a computer.
  6. refers to the part of an application that performs an essential task not apparent to the user.
  7. electronic mail is a way of sending messages over the internet
  8. method by which users access and save or "pull down" software or other files to their own computers
  9. is temporarily stored on your computer.
  10. smallest unit of measurement in computing.

20 Clues: card, a video adaptercomputing, does not eliminate serversa saved link to a particular Web pageis temporarily stored on your computer.is a document sent with an email messagea conventional method of transmitting datasmallest unit of measurement in computing.A software program that allows you to surf the web...

Digital Tech 2021-08-23

Digital Tech crossword puzzle
Across
  1. It is the data that is stored inside the computer.
  2. Allows other devices to connect to the computer and vice versa.
  3. Stores all the digital content. Can be internal and external.
  4. A form of coding using dots and dashes.
  5. Settings that allow your personal data and social media accounts to be private.
  6. A trace you leave behind after posting something on social media.
  7. Computer language. This language helps programmers develop algorithms.
  8. Cooling process unit
  9. Source of charge and power for the device.
  10. Random access memory
  11. Units of information, most often numeric, which are collected through surveys.
Down
  1. An address that identifies your device on a local network.
  2. It is the physical part of a computer, the machinery or equipment.
  3. Video graphics card
  4. Connects the computer from one spot. Without the motherboard, the computer won’t be able to communicate or work with each other.
  5. A form of communication, used to send signals, instructions, and messages through encrypted language.
  6. Online security used to protect your data.
  7. A worldwide infrastructure.
  8. Used to transmit power and data.
  9. A set of instructions that computers follow. A good analogy of it would be a recipe it says what needs to be done, step by step.

20 Clues: Video graphics cardCooling process unitRandom access memoryA worldwide infrastructure.Used to transmit power and data.A form of coding using dots and dashes.Online security used to protect your data.Source of charge and power for the device.It is the data that is stored inside the computer.An address that identifies your device on a local network....

Loyola Blakefield Crossword Puzzle 2024-08-13

Loyola Blakefield Crossword Puzzle crossword puzzle
Across
  1. Number of hours of Christian service students must complete to graduate
  2. Name of the landmark front field that hosts football and lacrosse games
  3. Name of the turf field with lights for rugby, lacrosse, football, and soccer games
  4. Nationally recognized club at Loyola that has traveled across the world for competitions
  5. Location of our most recent foreign exchange program
  6. Motto at Loyola Blakefield
  7. Our school colors
  8. Annual football game played against our rival school on Thanksgiving morning
  9. Name of the saint for whom the school was founded
  10. Non-athletic activity with the most trophies at LoyolaNon-athletic activity with the most trophies at Loyola
Down
  1. Latin phrase and Jesuit philosophy meaning "Care for the whole person"
  2. 5-minute guided meditation played over the speakers every day
  3. Name of the popular retreat that our juniors and seniors complete
  4. Word that our students use to describe their connection with each other
  5. Name of the turf field used for our middle school soccer and lacrosse games
  6. Name of our school mascot, which means "Spanish gentleman"
  7. The order of Catholic priests also known as the Society of Jesus
  8. Most popular lunch item on the menu
  9. Four letters that stand for a Latin phrase meaning "For the Greater Glory of God"
  10. Varsity sport with the most MIAA championships

20 Clues: Our school colorsMotto at Loyola BlakefieldMost popular lunch item on the menuVarsity sport with the most MIAA championshipsName of the saint for whom the school was foundedLocation of our most recent foreign exchange programName of our school mascot, which means "Spanish gentleman"5-minute guided meditation played over the speakers every day...

Vocab Words in Computer Science 2023-10-24

Vocab Words in Computer Science crossword puzzle
Across
  1. a step-by-step procedure or set of rules for solving a problem or performing a computation
  2. a text or arithmetic expression with true or false value.
  3. opposite of cloud storage
  4. an abbreviation for common gateway interface.
  5. the process of protecting data from unauthorized users or hackers.
  6. stands for the Central Processing Unit
  7. allows for the changing of the settings, appearance and behavior of a program
  8. refers to the rules that dictate the structure of a language
  9. a set of similar data that saves in a sequential form
  10. Short for file allocation table
Down
  1. a programming language used primarily for web development
  2. a physical component that allows two devices to share data over a wired connection
  3. an error in the programming of software or an application.
  4. a computer program that supports the main system on a computer when it starts up
  5. commonly abbreviated as I/O
  6. the hardware component used to store data that is actively being used by a processor
  7. stands for transmission control protocol/internet protocol.
  8. a collection of interconnected devices or systems that can communicate and share resources
  9. a single point within a digital image.
  10. a number system that uses only two symbols

20 Clues: opposite of cloud storagecommonly abbreviated as I/OShort for file allocation tablestands for the Central Processing Unita single point within a digital image.a number system that uses only two symbolsan abbreviation for common gateway interface.a set of similar data that saves in a sequential form...

ICT Related Terms 2025-02-03

ICT Related Terms crossword puzzle
Across
  1. Processing data closer to the source, reducing latency and enhancing performance.
  2. Software that protects against malware and other threats.
  3. The ability to use and understand information technology effectively.
  4. Physical components of a computer system, like the monitor, keyboard, and CPU.
  5. Wireless technology for connecting to the internet.
  6. Extremely large datasets that require specialized tools for analysis and processing.
  7. Computer systems that mimic the structure and function of the human brain.
  8. Creating copies of data to protect against loss or corruption.
  9. A system of interconnected documents and resources accessible through the internet.
  10. Technology that creates immersive, interactive experiences
  11. A global network connecting computers and devices.
  12. A device that connects multiple devices to a network
Down
  1. Programs and instructions that tell hardware what to do.
  2. Protecting computer systems and networks from unauthorized access and threats.
  3. The process of examining raw data to extract meaningful insights and patterns.
  4. Storing and accessing data and applications over the internet.
  5. Presenting data in a visual format to make it easier to understand and interpret.
  6. Computer systems capable of performing tasks that typically require human intelligence.
  7. Online platforms for social interaction and content sharing.
  8. Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.

20 Clues: A global network connecting computers and devices.Wireless technology for connecting to the internet.A device that connects multiple devices to a networkPrograms and instructions that tell hardware what to do.Software that protects against malware and other threats.Technology that creates immersive, interactive experiences...

technology 2016-05-17

technology crossword puzzle
Across
  1. reality, is the integration of digital information with live video
  2. card, a video adapter
  3. refers to measures designed to protect your computer
  4. electronic mail is a way of sending messages over the internet
  5. method by which users access and save or "pull down" software or other files to their own computers
  6. refers to the part of an application that performs an essential task not apparent to the user.
  7. is a document sent with an email message
  8. refers to a website's text and information, as opposed to its design and structure
Down
  1. company of the type of touch screen phone most of the world uses today
  2. computing, does not eliminate servers
  3. microprocessor that performs many functions and calculations that make your computer run
  4. a saved link to a particular Web page
  5. A software program that allows you to surf the web
  6. smallest unit of measurement in computing.
  7. Acrobat Reader, is software that allows you to view a PDF document
  8. is temporarily stored on your computer.
  9. a wireless communications technology intended to replace cables.
  10. a conventional method of transmitting data
  11. to load and initialise the operating system on a computer.
  12. driver, a small program that allows a peripheral device such as a printer or scanner to connect to your PC

20 Clues: card, a video adaptercomputing, does not eliminate serversa saved link to a particular Web pageis temporarily stored on your computer.is a document sent with an email messagesmallest unit of measurement in computing.a conventional method of transmitting dataA software program that allows you to surf the web...

History, success and technology 2025-11-10

History, success and technology crossword puzzle
Across
  1. The widespread destruction and loss of life that happened during the Second World War.
  2. The state of being protected against the criminal use of electronic data.
  3. The process of judging the quality or value of something.
  4. A system of interconnected computers or devices.
  5. Being able to do something successfully or efficiently; skill.
  6. The belief or theory that things must happen the way they do; fate.
  7. Relating to a king, queen, or emperor
  8. The act of moving to live permanently in a foreign country.
  9. A sequence of steps or rules to be followed in calculations or problem-solving.
  10. The practice of using a mobile phone to send and receive text messages.
  11. The study of how Earth's features and human populations change over time.
Down
  1. A small piece of code stored on a user's computer by a website.
  2. A formal written agreement between countries.
  3. The belief or theory that things must happen the way they do; fate.
  4. An ambitious target or aim that is pursued with effort.
  5. The ability to keep doing something difficult despite setbacks or opposition.
  6. An original document, object, or account from a particular time period.
  7. The result of a process or project.
  8. The act of moving to live permanently in a foreign country.
  9. The process of inventing or introducing something new.
  10. The transmission of customs and beliefs from one generation to the next
  11. To make something happen, often through skill and effort.

22 Clues: The result of a process or project.Relating to a king, queen, or emperorA formal written agreement between countries.A system of interconnected computers or devices.The process of inventing or introducing something new.An ambitious target or aim that is pursued with effort.The process of judging the quality or value of something....

Imp. of Misuse and Cybersecurity 2020-12-03

Imp. of Misuse and Cybersecurity crossword puzzle
Across
  1. involve the use of websites and email messages that try to trick you into entering your personal information
  2. battery which supplies equipment with electricity during power outage
  3. monitors incoming and outgoing network traffic based on a set of security rules
  4. internally produced software
Down
  1. involves trying to electronically break into a system without authorization
  2. hardware device keystroke loggers implanted in the keyboard
  3. spreading both beneficial and harmful material using computer systems
  4. preserves file that you no longer need
  5. damage can occur when there is a planned attempt to bypass all legitimate access restrictions
  6. making copies of files
  7. an electronic threat that does not require a host program
  8. receiving lots of junk email

12 Clues: making copies of filesreceiving lots of junk emailinternally produced softwarepreserves file that you no longer needan electronic threat that does not require a host programhardware device keystroke loggers implanted in the keyboardspreading both beneficial and harmful material using computer systems...

Technology Vocabulary 2023-09-08

Technology Vocabulary crossword puzzle
Across
  1. The physical components of a computer system.
  2. Programs that run on computers and devices.
  3. (Hypertext Markup Language) The standard language for creating web pages.
  4. (Basic Input/Output System) Software that initializes and controls hardware during computer startup.
  5. A global network that connects computers and information.
  6. A security system that protects a network from unauthorized access.
  7. A mobile device with advanced computing capabilities.
  8. Software used to access and view websites on the internet.
  9. A structured collection of data organized for easy retrieval.
  10. Computing Storing and accessing data and programs over the internet.
  11. Measures taken to protect computer systems and data from theft or damage.
Down
  1. Code (Quick Response Code) A two-dimensional barcode used to store information for quick access.
  2. The process of converting data into a coded form to secure it.
  3. Software designed to harm, disrupt, or gain unauthorized access to computers.
  4. Positioning System) A satellite-based navigation system for determining location.
  5. Cache Temporary storage of web pages to speed up loading times.
  6. A wired network technology commonly used for internet connections.
  7. A step-by-step procedure for solving a problem or task.
  8. System Software that manages computer hardware and provides services.
  9. Resource Locator) The web address used to locate a specific resource on the internet.

20 Clues: Programs that run on computers and devices.The physical components of a computer system.A mobile device with advanced computing capabilities.A step-by-step procedure for solving a problem or task.A global network that connects computers and information.Software used to access and view websites on the internet....

Cyber Security CrossWord Puzzel 2021-03-02

Cyber Security CrossWord Puzzel crossword puzzle
Across
  1. Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
  2. _______________ is any crime perpetrated using computers and networks.
  3. A__________ monitored a network, blocking dangerous content such as viruses.
  4. _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
  5. Viruses, trojans and worms are examples of __________________________.
  6. An ethical hacker.
  7. Your favorite teacher.
  8. A statement of an intention to inflict harm or damage .
Down
  1. Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
  2. Your favorite class.
  3. __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
  4. The exposure to the possibility of the attacked or harmed.
  5. Actual action that causes harm or damage.
  6. A blend between an ethical hacker and a cracker.
  7. __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
  8. An action taken to counteract the threat.
  9. ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.

17 Clues: An ethical hacker.Your favorite class.Your favorite teacher.Actual action that causes harm or damage.An action taken to counteract the threat.A blend between an ethical hacker and a cracker.A statement of an intention to inflict harm or damage .The exposure to the possibility of the attacked or harmed....

Road Security Crosswords 2023-05-09

Road Security Crosswords crossword puzzle
Across
  1. Technique or code that takes advantage of a vulnerability.
  2. Who uses skills to exploit systems or networks.
  3. Is a technique used to assess the security of web applications by simulating attacks in real-time.
  4. A potential harm or negative consequences that arise from vulnerabilities and threats.
  5. Weakness or flaw that can be exploited.
  6. The practice of protecting computer systems, networks, and data from digital threats or unauthorized access.
  7. Malicious software that aims to damage or compromise systems.
  8. A disruptive event that compromises the security or integrity.
  9. A structured approach to developing software with a focus on security.
  10. A type of security testing that analyzes application source code for vulnerabilities.
Down
  1. A non-profit organization dedicated to improving software security through open resources and information.
  2. The process of evaluating and analyzing potential risks and vulnerabilities.
  3. Condition or circumstance that can cause harm or damage.
  4. Individuals within an organization who promote and advocate for security practices and help drive a culture of security awareness.
  5. Confidential or hidden information that is not widely known or shared
  6. A security assessment that identifies vulnerabilities in computer systems and networks.
  7. The process of reducing or minimizing the impact or severity.

17 Clues: Weakness or flaw that can be exploited.Who uses skills to exploit systems or networks.Condition or circumstance that can cause harm or damage.Technique or code that takes advantage of a vulnerability.Malicious software that aims to damage or compromise systems.The process of reducing or minimizing the impact or severity....

12 Days of Christmas ITHD, Part II 2024-12-11

12 Days of Christmas ITHD, Part II crossword puzzle
Across
  1. Chaotic changes in air pressure and flow velocity.
  2. Any substance or material capable of posing an unreasonable risk to health, safety and property when transported.
  3. Cybersecurity strategy essential for safeguarding an org's IT environment.
  4. Helps system admin's to rapidly automate task that manage operating systems.
  5. Usually is used to refer to extraordinary situations in which a flight does not operate as scheduled.
  6. Tools and concepts that technology developers use as points of interaction.
  7. Regional partner Headquartered in St. George Utah.
  8. Used to force a set apply group policy.
Down
  1. A session and user authentication service that permits a user to use one set of login credentials.
  2. Platform that automates time and attendance management.
  3. Toolset for reporting, analytics, scorecarding, and monitoring of events and metrics.
  4. Small segment of a larger message that is broken down for efficient transmission over a network
  5. The complete line address of the communication line between the gateway and the host or GDS.
  6. The heart of a computer.
  7. Largest Global Distribution System (GDS) provider for Air Bookings.
  8. Maximum possible data transfer rate of a network.
  9. Systems, Applications and Products in Data Processing.

17 Clues: The heart of a computer.Used to force a set apply group policy.Maximum possible data transfer rate of a network.Chaotic changes in air pressure and flow velocity.Regional partner Headquartered in St. George Utah.Systems, Applications and Products in Data Processing.Platform that automates time and attendance management....

FSA 1 2021-02-03

FSA 1 crossword puzzle
Across
  1. THE AMOUNT THAT A BORROWER CAN BORROW FOR A SECURED LOAN IS USUALLY ____ THAN AN UNSECURED LOAN
  2. INTEREST RATES USED BY BANKS WHEN LENDING UNSECURED FUNDS TO EACH OTHER
  3. A PLATFORM THAT CAN ALLOW BUSINESSES TO POOL MONEY FROM A VARIETY OF SOURCES
  4. THE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGIN
  5. THIS FORM OF LOGOUT CLOSES A USER’S ACCESS AFTER A FEW MINUTES OF INACTIVITY
  6. THE TYPE OF LOAN THAT THE BORROWER DOES NOT NEED TO PLEDGE AN ASSET AS COLLATERAL
  7. A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWN
  8. AN EXAMPLE OF WHICH IS A SIX-DIGIT CODE SENT TO A CUSTOMER’S CELL PHONE FOR ADDITIONAL SECURITY
  9. DURING A SLUMP, THE GOVERNMENT CAN ____ THE INTEREST RATE TO ENCOURAGE SPENDING
Down
  1. FOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION
  2. A FORM OF AUTHENTICATION THAT RELIES ON RETINA SCANS, THUMBPRINTS OR FACIAL RECOGNITION
  3. THE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITY
  4. HAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOME
  5. THE MARKET VALUE OF AL GOODS AND SERVICES PRODUCED WITHIN THE COUNTRY
  6. MAS IS SINGAPORE’S _____ BANK.
  7. THE ORGANIZATION TO REGISTER YOUR BUSINESS WITH
  8. A CYBER-SECURITY DEVICE AND CONFIGURATION TO BLOCK ATTACKS

17 Clues: MAS IS SINGAPORE’S _____ BANK.A TERM TO DESCRIBE THE ECONOMY WHEN IT IS DOWNTHE ORGANIZATION TO REGISTER YOUR BUSINESS WITHTHE ACCOUNT NEEDED BEFORE TRADING ON SGX CAN BEGINHAVING MORE MONEY TO SPEND IS TO HAVE HIGH ____ INCOMETHE FUNDAMENTAL AND MOST IMPORTANT FORM OF CYBERSECURITYFOR FINANCIAL DISPUTES THROUGH MEDIATION AND ADJUDICATION...

lets go 2022-05-11

lets go crossword puzzle
Across
  1. scam
  2. online safety
Down
  1. a tatic of hacking used by interacting with people

3 Clues: scamonline safetya tatic of hacking used by interacting with people

Mixed 2021-11-06

Mixed crossword puzzle
Across
  1. created by computer technology and appearing to exist but not existing in the physical world
  2. a situation in which different elements are equal or in the correct proportions
  3. Used to describe something very unique
  4. barrier that acts as a security system to protect computer systems and networks from outside connections and untrusted networks
Down
  1. An expression to show surprise, disgust, anger
  2. the central principle or part of a policy, system,etc, which other things depend on
  3. to add to something in a way that improves it or makes it more attractive
  4. to make a record of the address of a web page on your computer so that you can find it again easily
  5. unable to think about or pay attention to something;unable to concentrate

9 Clues: Used to describe something very uniqueAn expression to show surprise, disgust, angerto add to something in a way that improves it or makes it more attractiveunable to think about or pay attention to something;unable to concentratea situation in which different elements are equal or in the correct proportions...

National Cyber Security Awareness Month 2017-08-09

National Cyber Security Awareness Month crossword puzzle
Across
  1. A cryptographic algorithm for encryption and decryption.
  2. Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack?
  3. What is the term for electronic mail?
  4. Abbreviation for a physical address; a numeric value that uniquely identifies that network device from every other device on the planet.
Down
  1. What is the term to describe connecting multiple separate networks together?
  2. The term used for attacks that try to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer?
  3. What is the abbreviation for the University's Technology group on-campus?
  4. What is it called when someone encrypts your files and asks for money to decrypt them?
  5. What is the basic communication language or protocol of the Internet?

9 Clues: What is the term for electronic mail?A cryptographic algorithm for encryption and decryption.What is the basic communication language or protocol of the Internet?What is the abbreviation for the University's Technology group on-campus?What is the term to describe connecting multiple separate networks together?...

CROSSWORD PUZZLE!! 2024-05-16

CROSSWORD PUZZLE!! crossword puzzle
Across
  1. This is platform, object-oriented programming language.
  2. This covers all technical means used to handle information and aid communication.
  3. It specifies accessibility to changing variables, methods, and classes.
  4. A style or method of cooking, especially as characteristics of a particular country, region, or establishment.
  5. This is an issue that can have significant impact on the individual's mental and emotional well being.
  6. This can be frustrating to people.
Down
  1. A compulsive need to spend a lot of time in the internet.
  2. The various of methods used to prepare food.
  3. A variable that has been allocated "Statically"; This only declares with a "static" keyword.
  4. An illness caused by bacteria or other toxins in food.
  5. A list of dishes available in a restaurant.
  6. This is a type of access modifier that allows access inside the class, subclass, or other classes of the same package as the modifier.
  7. It is a global computer network.
  8. Having to do cooking in the kitchen.
  9. This is the practice of protecting systems, networks, and programs from digital attacks.

15 Clues: It is a global computer network.This can be frustrating to people.Having to do cooking in the kitchen.A list of dishes available in a restaurant.The various of methods used to prepare food.An illness caused by bacteria or other toxins in food.This is platform, object-oriented programming language....

MIL SET B 2023-10-22

MIL SET B crossword puzzle
Across
  1. that takes place online
  2. Refers to listening to, recording, monitoring or surveillance of the content of communications
  3. Refers to the collection of tools, policies, risk management approaches, actions, training, best practices
  4. The access to the whole or any part of a computer system without right.
  5. Refers to a set of instructions executed by the computer to achieve intended results.
Down
  1. refers to the process of harvesting bank details
  2. The input, alteration, or deletion of any computer data
  3. the common outlet of self-expression and creativityThe access to the whole or any part of a computer system without right.
  4. the excessive use of computers to the extent that it interferes with daily life.
  5. Refers to a representation of information, knowledge, facts, concepts
  6. refers to pedophiles using the Internet as a means to contact children
  7. The acquisition of a domain name over the internet
  8. Refers to a computer or computer network
  9. The willful engagement of any lascivious exhibition of sexual organs or sexual activity
  10. The unauthorized input, alteration, or deletion of computer data

15 Clues: that takes place onlineRefers to a computer or computer networkrefers to the process of harvesting bank detailsThe acquisition of a domain name over the internetThe input, alteration, or deletion of any computer dataThe unauthorized input, alteration, or deletion of computer dataRefers to a representation of information, knowledge, facts, concepts...

CROSSWORD 2024-10-09

CROSSWORD crossword puzzle
Across
  1. A service that creates a secure connection over the internet.
  2. The process of addressing and managing the aftermath of a security breach or cyberattack.
  3. A cryptographic key that can be shared openly and is used for encryption.
  4. The process of replacing sensitive data with unique identification symbols.
  5. An incident where unauthorized access to data occurs.
  6. A network security device that monitors and filters incoming and outgoing traffic.
  7. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
  1. Best practices and steps to maintain cybersecurity and protect personal information.
  2. The process of converting encrypted data back into its original form.
  3. A targeted attempt to steal sensitive information by masquerading as a trusted entity.
  4. The study of methods to break encryption or analyze cryptographic systems.
  5. A weakness in a system that can be exploited by attackers.
  6. Software designed to detect and remove malware from computers.
  7. A method for restricting access to resources to authorized users only.
  8. The practice of hiding information within another medium, such as images or text.

15 Clues: An incident where unauthorized access to data occurs.A weakness in a system that can be exploited by attackers.A service that creates a secure connection over the internet.Software designed to detect and remove malware from computers.The process of converting encrypted data back into its original form....

Privacy 2025-11-05

Privacy crossword puzzle
Across
  1. This stands for _____ Health Information
  2. The electronic measures taken to protect patient information
  3. Proper privacy practices require you not to share this with anyone
  4. The acronym for Ontario's health privacy law
  5. All users must read and sign one of these ________agreements prior to getting access to the chart
  6. This restricts access to a patients health information so it cannot be viewed by anyone
Down
  1. Patient ______ is required in order to share records with a third party
  2. WH has a Privacy ______ who is responsible for privacy training and auditing
  3. The locked bins are located throughout the hospital and are for discarding paper that contains patient information
  4. A privacy _____ occurs when patient information is lost, stolen or viewed without authority
  5. The person who is responsible for making health care decisions when a patient is not capable
  6. A patient can request to be this if they don't want anyone to know they are currently in the hospital
  7. This is everyone's responsibility to protect
  8. This task is done regularly to ensure access to Powerchart is authorized
  9. Patients ______ that we will keep their information secure and privacy

15 Clues: This stands for _____ Health InformationThis is everyone's responsibility to protectThe acronym for Ontario's health privacy lawThe electronic measures taken to protect patient informationProper privacy practices require you not to share this with anyonePatients ______ that we will keep their information secure and privacy...

Trade school vs 4 year College 2024-02-26

Trade school vs 4 year College crossword puzzle
Across
  1. what is one of the hardest trade school
  2. he structure of laws, rules and agencies designed to hold criminals
  3. you to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided ..
Down
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. what trade jobs pat the most

5 Clues: what trade jobs pat the mostwhat is one of the hardest trade schoolhe structure of laws, rules and agencies designed to hold criminalsyou to drive vehicles with a gross combination weight rating (GVWR) of 26,001 or more, provided .....

Cyber Security 2021-10-07

Cyber Security crossword puzzle
Across
  1. ethics being authorized to attempt to gain unauthorized access to a computer,
  2. scramble,
  3. the practice of encoding information so only authorized people can read it,
  4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit care numbers,
  5. the practice of protecting systems networks, and programs from digital attacks,
  6. footprint a data trail you unintentionally leave online,
  7. hat hackers have permission to hack a system to discover the systems vulnerabilities,
Down
  1. the practice of solving and writing encryptions,
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid,
  3. hacking to promote a political agenda or social change,
  4. a form of protection for intellectual property usually applying to artistic works,
  5. the use of electronic communication to bully a person,
  6. literacy having the ability to find information evaluate information credibility and use information effectively,

13 Clues: scramble,the practice of solving and writing encryptions,the use of electronic communication to bully a person,hacking to promote a political agenda or social change,footprint a data trail you unintentionally leave online,the practice of encoding information so only authorized people can read it,...

Cybersecurity Fundamental Chapter 3 Part 2 2022-10-18

Cybersecurity Fundamental Chapter 3 Part 2 crossword puzzle
Across
  1. looking over one's shoulder to get their pin or access code.
  2. records or logs the keystrokes of the user of the system.
  3. action of pretending to be someone else
  4. intercepting communication between computers to steal information crossing the network.
  5. examines all network traffic as it passes through their Network Interface Card (NIC).
  6. criminal tags along with an authorized person to gain entry into a secured location.
  7. use short message service (sms) to send fake text messages
  8. impersonation attack, and it takes advantage of a trusted relationship between two systems.
  9. involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
Down
  1. one man's trash is another man's treasure
  2. non-technical means for a criminal to gather information on a target.
  3. an attacker requests personal information from a party in exchange for something like a gift.
  4. a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
  5. posing as a IRAS employee, told the victim that they own money to IRAS.
  6. attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
  7. application that behave in an annoying or undesirable manner.

16 Clues: action of pretending to be someone elseone man's trash is another man's treasurerecords or logs the keystrokes of the user of the system.use short message service (sms) to send fake text messageslooking over one's shoulder to get their pin or access code.application that behave in an annoying or undesirable manner....

Internet Safety 2025-03-04

Internet Safety crossword puzzle
Across
  1. Testing Security For Images To Prevent Theft And Fakes secure from hackers, crooks, and internet thieves
  2. Make your posts 'friends only' so that only people you know get to see them. If you need to share your phone number or other private information with a friend, do so in a private message - not in a public post.
  3. Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet.
  4. Adults seeking to abuse children will go where kids are. As a result, grooming can theoretically happen just about anywhere online
  5. Never get into 'flaming' someone else on an online forum (ie. insulting them or getting into heated arguments)
  6. Privacy settings are configurations on digital platforms that allow users to control their personal information and how it is shared with others.
  7. After all, capital letters on the internet mean shouting and are generally considered impolite.
  8. While cybersecurity protects devices and networks from harm by third parties, Online Safety protects the people using them from harm by the devices and networks (and therefore third parties) through awareness, education, information and technology.
  9. Respect the privacy of others. This rule should be followed not only in everyday use of online
  10. A cookie is a piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
Down
  1. November 2021) Flaming, also known as roasting, is the act of posting insults, often including profanity or other offensive language, on the internet.
  2. Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or the Internet if you did not initiate the contact.
  3. Tell your children they do not have to accept any online activity meant to intimidate, threaten, tease, or harm them or anyone else
  4. recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing.
  5. Identity theft is the act of stealing a specific person's identifying information and then using it to pretend to be that particular individual. So identity theft can sometimes
  6. You can help limit the potentially damaging impact of your online presence by searching for yourself, setting alerts and tightening your privacy settings.
  7. A website that lets users keep a journal or diary on any subject they like and leave comments on other users' posts.
  8. An online predator is an individual who uses the Internet as a means to commit sexual abuse or harassment, specifically of children
  9. The use of hacking, malware attacks, or other cyber activity in which an unauthorized user attempts to access sensitive data or intellectual property
  10. a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.

20 Clues: Respect the privacy of others. This rule should be followed not only in everyday use of onlineAfter all, capital letters on the internet mean shouting and are generally considered impolite.Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet....

TECH_TUES 2024-11-26

TECH_TUES crossword puzzle
Across
  1. – The study of protecting systems and networks from digital attacks.
Down
  1. – A network device that connects multiple computers in a LAN.
  2. – The process of making predictions or decisions without human intervention.
  3. – An algorithm used to scramble data for secure communication.

4 Clues: – A network device that connects multiple computers in a LAN.– An algorithm used to scramble data for secure communication.– The study of protecting systems and networks from digital attacks.– The process of making predictions or decisions without human intervention.

Cybersecurity Fundamentals Chapter 4 Part 2 2022-10-25

Cybersecurity Fundamentals Chapter 4 Part 2 crossword puzzle
Across
  1. uses at least two methods of verification.
  2. restricts the actions that a subject can perform on an object.
  3. keeps something from happening.
  4. conceals data in another file such as a graphic, audio, or other text file.
  5. return to restore back to a state of Confidentially, integrity and availability.
  6. passwords, passphases, or pins are examples of something that the user knows.
  7. opposite of a reward.
Down
  1. use and practice of data masking and steganography techniques.
  2. counteracts something that is undesirable.
  3. smart cards and security key fobs are examples of something that users have in their possession.
  4. replaces data with authentic looking values to apply anonymity to the data records.
  5. to make up for something.
  6. unique physical characteristics, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
  7. uses access control lists (ACLs) to help determine whether to grant access.
  8. derives from substitution set from the same column of data that a user wants to mask.
  9. is the act or process of noticing or discovering something.

16 Clues: opposite of a reward.to make up for something.keeps something from happening.counteracts something that is undesirable.uses at least two methods of verification.is the act or process of noticing or discovering something.use and practice of data masking and steganography techniques.restricts the actions that a subject can perform on an object....

Do you know these automation terms? 2021-10-12

Do you know these automation terms? crossword puzzle
Across
  1. Precautions to guard against crime on the internet
  2. The ability of the automation software to communicate and work with other programs and technology
Down
  1. the precise instructions telling the computer how to do a task or manipulate data.
  2. A series of tasks or processes that take a given job from start to completion.
  3. Initials for combination of hardware and software used for industrial automation.

5 Clues: Precautions to guard against crime on the internetA series of tasks or processes that take a given job from start to completion.Initials for combination of hardware and software used for industrial automation.the precise instructions telling the computer how to do a task or manipulate data....

Cybersecurity Fundamentals Chapter 4 Part 2 2022-10-25

Cybersecurity Fundamentals Chapter 4 Part 2 crossword puzzle
Across
  1. uses at least two methods of verification.
  2. restricts the actions that a subject can perform on an object.
  3. keeps something from happening.
  4. conceals data in another file such as a graphic, audio, or other text file.
  5. return to restore back to a state of Confidentially, integrity and availability.
  6. passwords, passphases, or pins are examples of something that the user knows.
  7. opposite of a reward.
Down
  1. use and practice of data masking and steganography techniques.
  2. counteracts something that is undesirable.
  3. smart cards and security key fobs are examples of something that users have in their possession.
  4. replaces data with authentic looking values to apply anonymity to the data records.
  5. to make up for something.
  6. unique physical characteristics, such as a fingerprint, retina, or voice, that identifies a specific user is called biometrics.
  7. uses access control lists (ACLs) to help determine whether to grant access.
  8. derives from substitution set from the same column of data that a user wants to mask.
  9. is the act or process of noticing or discovering something.

16 Clues: opposite of a reward.to make up for something.keeps something from happening.counteracts something that is undesirable.uses at least two methods of verification.is the act or process of noticing or discovering something.use and practice of data masking and steganography techniques.restricts the actions that a subject can perform on an object....

Cybersecurity Fundamental Chapter 3 Part 2 2022-10-18

Cybersecurity Fundamental Chapter 3 Part 2 crossword puzzle
Across
  1. looking over one's shoulder to get their pin or access code.
  2. records or logs the keystrokes of the user of the system.
  3. action of pretending to be someone else
  4. intercepting communication between computers to steal information crossing the network.
  5. examines all network traffic as it passes through their Network Interface Card (NIC).
  6. criminal tags along with an authorized person to gain entry into a secured location.
  7. use short message service (sms) to send fake text messages
  8. impersonation attack, and it takes advantage of a trusted relationship between two systems.
  9. involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
Down
  1. one man's trash is another man's treasure
  2. non-technical means for a criminal to gather information on a target.
  3. an attacker requests personal information from a party in exchange for something like a gift.
  4. a type of network attack that results in some sort of interruptions of network services to users, devices or applications.
  5. posing as a IRAS employee, told the victim that they own money to IRAS.
  6. attacks that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor.
  7. application that behave in an annoying or undesirable manner.

16 Clues: action of pretending to be someone elseone man's trash is another man's treasurerecords or logs the keystrokes of the user of the system.use short message service (sms) to send fake text messageslooking over one's shoulder to get their pin or access code.application that behave in an annoying or undesirable manner....

Cybersecurity Awareness Month 2024 Crossword Puzzle 2024-08-26

Cybersecurity Awareness Month 2024 Crossword Puzzle crossword puzzle
Across
  1. Although the keyboard shortcut for copying information is Ctrl + C, the shortcut for pasting information is not Ctrl + P (that's a shortcut for printing). Instead, the shortcut letter for pasting is closer to the shortcuts for copying and cutting. What letter is used to to paste information when clicked synchronously with Ctrl
  2. technology that enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy (acronym).
  3. Seven-letter branded software standard created by Apple that enables a car radio or touchscreen to be a display and a controller for an iOS device
  4. The name of the security company founded in 2006 by two Harvard Business School students who couldn't find a security company designed to help renters? The couple was interested in the field after multiple friends in Cambridge had experienced break-ins. By 2014, the company has raised more than $50 million in venture capital.
  5. 6-letter term for a group of computers that is networked together and used by hackers to steal information
  6. Contract Management process used to review and sign all Start Early
  7. A user identity and access management solution piloted in Start Early that allows users to seamlessly do Single Sign-On (SSO)
  8. Users are responsible for creating and maintaining the confidentiality of the password associated with their unique user ID
  9. A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common cyberattack on the internet
Down
  1. Most common delivery method for viruses
  2. In 1988, the Morris Worm was created (and released) just to see whether it could be pulled off. As it spread via the Internet, mayhem (and a criminal conviction) followed. It was the first major example of which “highly infectious” computer security threat
  3. What colorful apparel is also a two-word term for a computer security expert who engages in “ethical hacking” to help expose and fix security flaws within a company’s information system
  4. On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers
  5. Delicious computer term did web browser programmer Lou Montulli coin to refer to information that is sent from the browser to the web server
  6. If you have an iPhone and send a text to another iPhone user via iMessage, the bubbles look blue. If you send a text to an Android user, the bubble is green because it’s being sent as which kind of message?
  7. According to Michael Scott, there have been eight "IT guys," including Lozenge, Shorts, and Nick, at what fictional company on "The Office?"

16 Clues: Most common delivery method for virusesContract Management process used to review and sign all Start Early6-letter term for a group of computers that is networked together and used by hackers to steal informationUsers are responsible for creating and maintaining the confidentiality of the password associated with their unique user ID...

URS Security Crossword 2014-02-18

URS Security Crossword crossword puzzle
Across
  1. Your Assistant FSO is E._______.
  2. The ____________ (DSS) supports national security and the warfighter through security oversight and education missions.
  3. Initial and _________ security briefings must be completed by all URS personnel.
  4. Your FSO is M. _____.
  5. All visitors must check in through reception and receive a ______.
  6. ________is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in electronic communication.
  7. Report all suspicious activity to your ______.
Down
  1. ________ is the act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation.
  2. OPSEC stands for __________.
  3. You should always make your passwords complex. Use a combination of numbers, symbols & _________.
  4. __________ describes the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.

11 Clues: Your FSO is M. _____.OPSEC stands for __________.Your Assistant FSO is E._______.Report all suspicious activity to your ______.All visitors must check in through reception and receive a ______.Initial and _________ security briefings must be completed by all URS personnel....

Chapter 2 Vocabulary 2023-09-06

Chapter 2 Vocabulary crossword puzzle
Across
  1. I want to start a cybersecurity company, this would mean that I want to become an ______
  2. Resources Everything from farmers to buildings are considered _______
  3. Customers of Apple are insisting they make more units for sale, this is called _____
  4. China sells the US the most electronic exports in the world. Electronic exports are considered ____
  5. I use the school bus every morning to get to school. The School bus is a _____
  6. I am going to spend money on gas instead of food, this is called a _____
Down
  1. Instead of buying expensive clothes, you would use that money to buy groceries, which is a ____
  2. China produces the most goods in the world. This means that they have a very strong ______
  3. Instead of buying food, you would use that money to buy expensive clothes, which is a _____
  4. Apple has only made 5,000 units of a product, this is called _____
  5. The people who buy products are called ____

11 Clues: The people who buy products are called ____Apple has only made 5,000 units of a product, this is called _____Resources Everything from farmers to buildings are considered _______I am going to spend money on gas instead of food, this is called a _____I use the school bus every morning to get to school. The School bus is a _____...

Information Technology enabled services 2024-06-09

Information Technology enabled services crossword puzzle
Across
  1. Temporary storage for frequently used data (like a computer's short-term memory).
  2. A network of interconnected virtual worlds (like a universe built on computers).
  3. Rules that govern communication between devices (like a language for computers to talk).
  4. The trail of data you leave behind online (like your footsteps on the digital world).
  5. An automated program that performs tasks online (like a tireless digital assistant).
Down
  1. Protecting information systems from cyberattacks (like building a fort for your data).
  2. Software program that understands voice commands and helps you with tasks (like a digital genie).
  3. Software with freely available code that anyone can modify (like a recipe everyone can share and improve).
  4. The secret code that unlocks encrypted data (like the key to a treasure chest).
  5. Software that sorts unwanted emails from important ones (like a digital trash can).

10 Clues: The secret code that unlocks encrypted data (like the key to a treasure chest).A network of interconnected virtual worlds (like a universe built on computers).Temporary storage for frequently used data (like a computer's short-term memory).Software that sorts unwanted emails from important ones (like a digital trash can)....

types of hazards 2024-01-11

types of hazards crossword puzzle
Across
  1. A sudden and unexpected event that can cause harm or damage in the office environment.
  2. Hazardous situations that may result from poor ergonomic design of office furniture or equipment.
  3. The risk of data breaches, unauthorized access, or loss of sensitive information in the office.
  4. The threat of violence or harm in the workplace, including bullying and harassment.
Down
  1. The risk of fire, whether from faulty wiring, electronic devices, or other sources in the office.
  2. Issues related to inadequate lighting, ventilation, or air quality in the office.
  3. Potential dangers related to the use of electrical equipment or wiring in the office.
  4. Risks associated with slips, trips, and falls in the office space.
  5. Exposure to harmful substances, such as chemicals or allergens, present in the office environment.
  6. The risk of exposure to harmful microorganisms or infectious diseases within the office.

10 Clues: Risks associated with slips, trips, and falls in the office space.Issues related to inadequate lighting, ventilation, or air quality in the office.The threat of violence or harm in the workplace, including bullying and harassment.Potential dangers related to the use of electrical equipment or wiring in the office....

Digital Citizenship and Cyber Hygiene Vocabulary 2022-09-20

Digital Citizenship and Cyber Hygiene Vocabulary crossword puzzle
Across
  1. How companies use your data
  2. Identity theft, stealing money, stealing private information, controlling private computers.
  3. A type of cyber-attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
  4. Attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
  5. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.
Down
  1. Protection of computer systems, networks, and data from digital attacks.
  2. The information about a particular person that exists on the Internet as a result of their online activity.
  3. A computer security specialist who breaks into protected systems and networks to test and assess their security
  4. The use of electronic communication to bully a person
  5. Legal document outlining how a company can collect and use your data

10 Clues: How companies use your dataThe use of electronic communication to bully a personLegal document outlining how a company can collect and use your dataProtection of computer systems, networks, and data from digital attacks.Identity theft, stealing money, stealing private information, controlling private computers....

Networking and the Internet 2022-06-27

Networking and the Internet crossword puzzle
Across
  1. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  2. The process of transferring data between two or more digital devices
  3. Facts and statistics collected together for refences or analysis.
  4. A global computer network consisting of multiple interconnected networks.
  5. The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
  1. The ability of computers and the Internet to consistently perform to the expectations of their designed function.
  2. The speed and resource usage involved in collecting, manipulating, and analyzing data.
  3. The preservation of accuracy and consistency of a data set over the course of its analysis.
  4. A numerical label assigned to each computing device on a network.
  5. A series of interconnected computers and devices that share resources and exchange data with each other.
  6. The rate at which data is communicated from the Internet to a computer and vice versa.

11 Clues: A numerical label assigned to each computing device on a network.Facts and statistics collected together for refences or analysis.The process of transferring data between two or more digital devicesA global computer network consisting of multiple interconnected networks....

Women in Forensics 2021-01-17

Women in Forensics crossword puzzle
Across
  1. US Navy’s chief cryptanalyst who served during World War I and World War II.
  2. a women led startup providing security solutions for strong 2FA using U2F, OTP, PIV,etc.
  3. largest initiative to increase women’s participation in the cyber field in Europe.
  4. the first woman to speak at DEFCON, the world’s greatest hacker conference.
  5. India’s first woman cybercrime investigator
  6. a DSCI led initiative to enhance cyber security education for girls in India
Down
  1. a spread spectrum modulation technique derived from chirp spread spectrum (CSS) technology
  2. a security Camp supported by the NSA being largest girls-only residential camp in the country.
  3. a non profit organization which launched a program "100 Women in 100 Days" to uplift girls in cyber security
  4. a process in data cloning that spreads the data across the available drives in chunks.
  5. percentage of women in cybersecurity according to report by Frost and Sullivan in 2013.

11 Clues: India’s first woman cybercrime investigatorthe first woman to speak at DEFCON, the world’s greatest hacker conference.US Navy’s chief cryptanalyst who served during World War I and World War II.a DSCI led initiative to enhance cyber security education for girls in India...

Myles Osborne AI Cybersecurity Word Search 2025-03-08

Myles Osborne AI Cybersecurity Word Search crossword puzzle
Across
  1. The use of largely automatic equipment in a system of operation or production.​
  2. in Science
  3. Society: A concept that refers to a society increasingly preoccupied with the future and safety, generating the notion of risk.​
  4. The practice of protecting systems, networks, and programs from digital attacks.​
  5. Intelligence: The simulation of human intelligence processes by machines, especially computer systems.​
  6. Inclination or prejudice for or against one person or group, especially in a way considered to be unfair.​
  7. The state of not being equal, especially in status, rights, and opportunities.​
  8. The belief that every problem has a solution, especially technological solutions to societal issues.​
  9. The process by which individuals become more concerned with their own lives and identities rather than traditional societal roles.​
Down
  1. The fact or condition of being accountable; responsibility.​
  2. The quality of being done in an open way without secrets.​
  3. Reliance on the integrity, strength, ability, or surety of a person or thing; confidence.​
  4. The ability to recognize forces of socialization and alter one's place in the social structure.​
  5. in Science
  6. A rule or directive made and maintained by an authority.​
  7. The process by which businesses or other organizations develop international influence or start operating on an international scale.​
  8. Moral principles that govern a person's behavior or the conducting of an activity.

17 Clues: in Sciencein ScienceA rule or directive made and maintained by an authority.​The quality of being done in an open way without secrets.​The fact or condition of being accountable; responsibility.​The use of largely automatic equipment in a system of operation or production.​...

FLIPPED CLASSROOM 2025-11-05

FLIPPED CLASSROOM crossword puzzle
Across
  1. A secret combination of characters used to access a system or account.
  2. A program that detects, prevents, and removes malicious software from a computer.
  3. The practice of protecting computers, networks, and data from unauthorized access, attacks, or damage.
Down
  1. A cyberattack that tricks people into revealing personal or financial information through fake messages or websites.
  2. Malicious software designed to damage, disrupt, or steal information from computers or networks.
  3. Security systems that monitor and control network traffic to block unauthorized access.

6 Clues: A secret combination of characters used to access a system or account.A program that detects, prevents, and removes malicious software from a computer.Security systems that monitor and control network traffic to block unauthorized access.Malicious software designed to damage, disrupt, or steal information from computers or networks....

Cyber Security 2024-11-13

Cyber Security crossword puzzle
Across
  1. An unauthorised user who attempts to or gain access to a network
  2. A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
  3. Securing your online accounts with an extra layer of protection is called ____________________ authentication
  4. Computer programs that can block, detect, and remove viruses and other malware
Down
  1. A mechanism to create a secure connection between a computer and the network
  2. The unauthorised disclosure or unwanted exposure of confidential information
  3. The protection of digital information, as well as the integrity of the infrastructure
  4. Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
  5. Faking the sender’s email address to gain access to a secure network

9 Clues: An unauthorised user who attempts to or gain access to a networkFaking the sender’s email address to gain access to a secure networkA mechanism to create a secure connection between a computer and the networkThe unauthorised disclosure or unwanted exposure of confidential information...