cybersecurity Crossword Puzzles
TSC 4.0 - What terms do you know? 2018-07-09
Across
- A supply chain for customers who are unpredictable and expect speed
- TSC 4.0, digitization powered by _______________ is driving end-to-end efficiency for industrial environment.
- We optimize end-to-end efficiency and asset reliability while providing visibility to customer.
- Flexible A supply chain that will be deployed in crises environments where speed and innovation are a premium
- A supply chain for customers who are price sensitive and who want efficiency and reliability
- Digital Procure to Pay. This digital accelerator accelerates procurement and suppliers efficiency.
- A supply chain for customers who value reliability and trustworthiness
Down
- End to end digital planning and control. With this digital accelerator, End-to-End Planning will expand to improve synchronization of Demand & Supply
- An enabler for TSC 4.0, empowered _____ drive the digital transformation with “competencies of the future”
- A supply chain for customers who typically have big projects with longer time horizons
- measures taken to protect against criminal or unauthorized access or use of electronic data and protect our EcoStruxure assets.
- We optimize resources, by developing a circular supply chain, in clean and safe facilities, powered by renewable energy.
- or Internet of Things - a network of physical devices embedded with computing devices connected to the internet, enabling them to send and receive data.
- Metrics The Golden_____ are Customer Satisfaction, Cost Efficiency and Cash Efficiency.
- Center of Digital Innovation. This digital accelerator will drive idea generation and experimentation
- Smart Distribution Center and Digital Delivery to Service. This digital accelerator focuses on Transportation and Customer Delivery Experience. Digitization here will improve customer experiences with more efficient and sustainable logistics.
- We provide our customers what they value while leveraging scale and efficiency.
- Smart Factory. This digital accelerator uses connected products, edge control, and apps, analytics and services to optimize end to end efficiency and asset reliability. We integrate innovative technologies, IT solutions and data analytics into our manufacturing operations.
- ___for customer and planet. This digital accelerator focuses on improving end to end quality while operating a sustainable supply chain.
19 Clues: A supply chain for customers who are unpredictable and expect speed • A supply chain for customers who value reliability and trustworthiness • We provide our customers what they value while leveraging scale and efficiency. • A supply chain for customers who typically have big projects with longer time horizons • ...
TSC 4.0 - What terms do you know? 2018-07-09
Across
- A supply chain for customers who are unpredictable and expect speed
- An enabler for TSC 4.0, empowered _____ drive the digital transformation with “competencies of the future”
- End to end digital planning and control. With this digital accelerator, End-to-End Planning will expand to improve synchronization of Demand & Supply
- A supply chain for customers who value reliability and trustworthiness
- Smart Factory. This digital accelerator uses connected products, edge control, and apps, analytics and services to optimize end to end efficiency and asset reliability. We integrate innovative technologies, IT solutions and data analytics into our manufacturing operations.
- Center of Digital Innovation. This digital accelerator will drive idea generation and experimentation
- Smart Distribution Center and Digital Delivery to Service. This digital accelerator focuses on Transportation and Customer Delivery Experience. Digitization here will improve customer experiences with more efficient and sustainable logistics.
- We optimize end-to-end efficiency and asset reliability while providing visibility to customer.
- TSC 4.0, digitization powered by _______________ is driving end-to-end efficiency for industrial environment.
- The Golden_____ are Customer Satisfaction, Cost Efficiency and Cash Efficiency.
Down
- A supply chain that will be deployed in crises environments where speed and innovation are a premium
- We provide our customers what they value while leveraging scale and efficiency.
- A supply chain for customers who are price sensitive and who want efficiency and reliability
- We optimize resources, by developing a circular supply chain, in clean and safe facilities, powered by renewable energy.
- measures taken to protect against criminal or unauthorized access or use of electronic data and protect our EcoStruxure assets.
- ___for customer and planet. This digital accelerator focuses on improving end to end quality while operating a sustainable supply chain.
- Digital Procure to Pay. This digital accelerator accelerates procurement and suppliers efficiency.
- A supply chain for customers who typically have big projects with longer time horizons
- or Internet of Things - a network of physical devices embedded with computing devices connected to the internet, enabling them to send and receive data.
19 Clues: A supply chain for customers who are unpredictable and expect speed • A supply chain for customers who value reliability and trustworthiness • We provide our customers what they value while leveraging scale and efficiency. • The Golden_____ are Customer Satisfaction, Cost Efficiency and Cash Efficiency. • ...
ACC03043 - Topic 9 2018-08-31
Across
- The practice of gaining unauthorised access to a computer system and carrying out various disruptive actions as a means of achieving political or social goals.
- The focus of one of the cyber resilience Board Principles of the World Economic Forum that is addressed by the board periodically reviewing its own performance in the implementation of these principles or seeking independent advice for continuous improvement.
- An __________ system of corporate governance is characterised by public companies with dispersed shareholder
- The focus of one of the cyber resilience Board Principles of the World Economic Forum that is addressed by the board encouraging management to collaborate with other stakeholders, as relevant and appropriate, to ensure systemic cyber resilience.
- An _________ system of corporate governance is one where ownership and control of public companies is exercised by a small number of majority shareholders, such as founding families or institutions.
Down
- Each country, in varying degrees, has its own ________ features that distinguish its system of corporate governance.
- To effectively deal with cyber challenges, organisational leaders need a mindset that goes beyond ____________ to build a more effective cyber strategy and incorporate it into overall strategic thinking.
- _________ has a vital role to play in securing cyber resilience.
- Corporations in Asia have now emerged as multinational entities with global investors, yet many remain highly __________ and do not exhibit the levels of transparency associated with companies operating in Europe or North America.
- One of the threats that corporations can face and which involves any underhand interference with production, work, etc.
10 Clues: _________ has a vital role to play in securing cyber resilience. • An __________ system of corporate governance is characterised by public companies with dispersed shareholder • Each country, in varying degrees, has its own ________ features that distinguish its system of corporate governance. • ...
Phishing for Madness 2022-02-25
Across
- This authentication method requires the user to provide two or more verification factors to access an account or platform. Note: fill in as one word.
- This is a type of scam in which a bad actor is disguised as a trusted source to gain access to important data or information.
- Name of the team that associates should notify if a mobile device containing Baird data is lost, stolen or compromised. Note: fill in as one word.
- A tactic bad actors use to manipulate people to give up confidential/personal information. Note: fill in as one word.
- This type of phishing targets a specific group or type of individual such as a company’s system administrator.
- Malicious software designed to block access to a computer system until a sum of money is paid.
Down
- This is a type of assessment the Information Security team conducts to educate associates on what to look for in malicious emails.
- _____ _____ is a trail of data you create while using the Internet which includes shopping, financial, health and fitness, and social data. Note: fill in as one word.
- The team at Baird that provides security and awareness training and content to our associates. Note: fill in as one word.
- The practice of protecting systems, networks, and programs from digital attacks.
- This type of phishing is an attack that uses text messaging or short message service (SMS) to execute the attack.
- This attack is accomplished through a voice call.
- Stop. Call. Verify. Are best practices to prevent _______. Note: fill in as one word.
- A ____________ is a sentence-like string of words used for authentication that is longer than a traditional password, easy to remember and difficult to crack.
- This phishing is an even more targeted type of phishing that goes after the whales – a marine animal even bigger than a fish. These attacks typically target a CEO, CFO, or any CXX within an industry or a specific business.
15 Clues: This attack is accomplished through a voice call. • The practice of protecting systems, networks, and programs from digital attacks. • Stop. Call. Verify. Are best practices to prevent _______. Note: fill in as one word. • Malicious software designed to block access to a computer system until a sum of money is paid. • ...
College Scavenger Hunt 2022-10-21
Across
- The community college located in Springfield, MA.
- Colleges are there own little community. You can live at college, eat there, and go to school there. What is a four letter word for residence hall?
- Colleges and universities are considered either public or private. Public colleges and universities in the state where you live are often less expensive than private colleges. How many public four year colleges are in Massachusetts?
- There are over 5,000 colleges and universities in the United States, with thousands more in other countries around the world. What is the name of the area of study you decide to pursue?
- The closest public state university is about 30 minutes from us. In which Massachusetts city is this located?
Down
- The term used to describe the discount you can get to help pay for college. These discounts are offered for good grades, playing a sport, or other achievements.
- In the list of programs/majors at the community college in Springfield, this program is the last one listed starting with the letter C.
- There are 107 HBCU's in the United States. HBCU stands for historically black college and university. Historically, many colleges were racially segregated only allow whites. One HBCU is Morgan State University. What state is this school in?
- Holyoke Community College is the closest community college located outside of Springfield. How many dinning locations do they have?
9 Clues: The community college located in Springfield, MA. • The closest public state university is about 30 minutes from us. In which Massachusetts city is this located? • Holyoke Community College is the closest community college located outside of Springfield. How many dinning locations do they have? • ...
Episode 7 Crossword 2020-08-11
Across
- What is a form of AI that allows machines to learn from data without being programmed specifically? (Two words, 7 and 8 letters)
- What is one of the 'happy hormones' called?
- What is it called when you learn to do something, or practice something to get better at it?
- What is another word for cerebral, or relating to one's mental functions or abilities?
- What is a type of music (and also a culture and art movement), which was born in the Bronx in the 1970s? (Two words, 3 and 3 letters)
- What is it called when you distribute something to different people, such as tasks or schedule a certain amount of time to something?
- What is another word for arrange, or sort?
- What is a type of dance that you see in certain kinds of Indian musicals? (Two words, 9 and 5 letters)
- What is it called when you look at the similarities and differences between two or more different things?
- What is a type of dance that originated in the US in the early 1970s, that includes toprock and downrock moves? (Two words, 5 and 5 letters)
Down
- What is another way of saying detecting light? (Two words 5 and 7 letters)
- What is another term for information technology security? (Two words, 5 and 8 letters)
- What is it called when you feel sure of yourself and your abilities?
- What is an organisation (normally private or not-for-profit) that has been set up to educate the media and public about a specific area or field called? (Two words, 11 and 10 letters)
- What does AI stand for? (Two words, 10 and 12 letters)
- What is another word for remember, or retain information?
- What is the name of a TV character who travels through time in a ship called the Tardis? (Two words, 6 and 3 letters)
- What is a type of dance where dancers typically have metal attached to the soles of their shoes which make sounds as they dance? (Two words, 3 and 5 letters)
18 Clues: What is another word for arrange, or sort? • What is one of the 'happy hormones' called? • What does AI stand for? (Two words, 10 and 12 letters) • What is another word for remember, or retain information? • What is it called when you feel sure of yourself and your abilities? • What is another way of saying detecting light? (Two words 5 and 7 letters) • ...
cyber 2021-09-30
Across
- Phreaking is a slang term for hacking into secure telecommunication networks.
- is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.
- Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control or for identifying individuals who are under surveillance.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user.
- A computer worm is a type of malware that spreads copies of itself from computer to computer.
- A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- A hacker is an individual who uses computer, networking or other skills to overcome a technical problem
- Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
- A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.
Down
- a method or pathway used by a hacker to access or penetrate the target system.
- Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason
- is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials.
- Hardening is the process by which something becomes harder or is made harder.
- The dark web refers to sites and services that aren't indexed by search engines
15 Clues: Phreaking is a slang term for hacking into secure telecommunication networks. • Hardening is the process by which something becomes harder or is made harder. • a method or pathway used by a hacker to access or penetrate the target system. • The dark web refers to sites and services that aren't indexed by search engines • ...
puzzle game 2021-08-22
Across
- Any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A term that refers to the grouping of every activity that makes a program available for use and moving that program to the target environment.
- Providing a common topic identifier in text and chat messages so they can be searched as a group.
- A software system that links topics on the screen to related information and graphics.
- Body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A local or restricted communications network, especially a private network created using World Wide Web software.
- A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- The duplication of an object under review in source control so that the same code can be modified by more than one developer in parallel
Down
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- The practice of developing software as an interconnected system of several independent, modular services that communicate with each other
- The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period
- A Standalone malware computer program that replicates itself in order to spread to other computers.
- A testing strategy in which the smallest unit of testable code is isolated from the rest of the software and tested to determine if it functions properly
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- A networking standard for very short-in the same place is called?
- A way to record the changes to a repository and add a log message to describe the changes that were made
- Any software program in which advertising banners are displayed while the program is running.
18 Clues: A networking standard for very short-in the same place is called? • A software system that links topics on the screen to related information and graphics. • Any software program in which advertising banners are displayed while the program is running. • Providing a common topic identifier in text and chat messages so they can be searched as a group. • ...
Cybersecurity Awareness Month - Crossword 2 - Moderate - Social Engineering 2025-08-25
Across
- Pretending to be someone else to gain access or information
- A phishing attack aimed at top-level executives
- Searching through trash to find confidential information
- A voice call scam pretending to be from a trusted source
- A scam email that targets a specific person using personal details
- Creating a believable story to get someone to reveal sensitive data
Down
- When private info is leaked or stolen from a company or website
- Following someone into a secure area without authorization
- Tricking people into giving up private info by pretending to be trustworthy
- A fake email that tricks you into giving away personal info
- Phishing that comes through text messages
11 Clues: Phishing that comes through text messages • A phishing attack aimed at top-level executives • Searching through trash to find confidential information • A voice call scam pretending to be from a trusted source • Following someone into a secure area without authorization • Pretending to be someone else to gain access or information • ...
Test 2024-07-19
Across
- Establishes early warning sensors and alert networks to warn others of potential attacks.
- Provides comprehensive databases of all known vulnerabilities, shared worldwide to help prepare for and fend off common attacks.
- Highly trained and well-funded hackers who steal secrets, gather intelligence, or commit sabotage for their government.
- Threats posed by increased use of mobile devices to access enterprise information and inability to centrally manage them.
- Businesses, government agencies, and countries sharing critical information about serious attacks to prevent similar attacks.
- Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- Information Security Management Standards providing a framework for implementing cybersecurity measures within an organization.
- Black hat hackers, self-employed or working for cybercrime organizations, who steal billions from consumers and businesses.
- Unethical hackers who exploit weaknesses in networks or computer systems, violating security for personal gain.
- Discourage cyberattacks and data breaches with severe penalties to punish cyber criminals caught carrying out illegal actions.
- Challenges posed by the huge amount, high speed, and wide range of data types and sources that need protection.
Down
- Internal users like employees or contract partners who can cause greater damage due to direct access and knowledge of systems.
- Gray hat hackers who protest against political and social ideas by posting articles, videos, and leaking sensitive information.
- Gray hat hackers who exploit vulnerabilities in software and systems and report them to vendors for rewards.
- Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun.
- Exploit weaknesses or vulnerabilities to gain access to internal resources.
- Technology enabling billions of devices to connect to the Internet, affecting the amount of data needing protection.
- Hackers between white and black hat, who may commit crimes not for personal gain or damage, and may report or publish vulnerabilities.
18 Clues: Exploit weaknesses or vulnerabilities to gain access to internal resources. • Establishes early warning sensors and alert networks to warn others of potential attacks. • Teenagers or hobbyists with little skill who could cause harm, not for profit but for fun. • ...
CyberFun 2022-09-01
Across
- An attack that prevents or impairs the authorized use of information system resources or services.
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
- The process of transforming plaintext into ciphertext.
- Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
- The property of being accessible and usable upon demand.
- A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.
- A collection of computers compromised by malicious code and controlled across a network.
- The process of verifying the identity or other attributes of an entity (user, process, or device).
Down
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group
- A technique to breach the security of a network or information system in violation of security policy.
- An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).
- A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
14 Clues: The process of transforming plaintext into ciphertext. • The property of being accessible and usable upon demand. • A collection of computers compromised by malicious code and controlled across a network. • An attack that prevents or impairs the authorized use of information system resources or services. • ...
Decode the Competencies Behind the Titles 2025-06-12
Across
- practice specialized in the design and development of features that Supports from L1 autonomous to L3 autonomous adhering to standard APSICE compliance.
- Designs and validates automotive-grade hardware like ECUs, sensor modules, and controller boards, supporting high-speed interfaces, thermal and EMI/EMC requirements, and production readiness.
- Supports OEMs in developing EV systems such as battery management systems (BMS), electric drivetrains, onboard chargers, and power electronics aligned with global electrification trends
- Delivers robust automotive cyber security solutions including secure boot, secure communication, ECU hardening, and compliance with standards like ISO/SAE 21434 to protect connected vehicle ecosystems
- involve developing standardized, scalable ECU software platforms and low-level firmware to power critical automotive functions
- Develops and integrates telematics control units (TCUs), cloud communication modules, and data analytics platforms enabling vehicle tracking, remote diagnostics, and V2X capabilities.
- Focuses on cloud-enabled connected car platforms, including over-the-air (OTA) updates, remote diagnostics, telematics backends, and fleet data analytics to enhance vehicle connectivity and user experience.
- Provides ISO 26262-compliant safety solutions including safety analysis, tool qualification, and software/hardware validation for safety-critical systems like ADAS, powertrain, and steering.
Down
- Encompasses end-to-end automotive engineering services at Tata Elxsi, including vehicle architecture, domain integration, and support across powertrain, ADAS, body, and infotainment systems
- Specializes in the design and development of advanced test automation solutions and test execution.
- Provides system-level engineering services including vehicle architecture definition, integration, and validation to ensure cross-domain functionality and performance in modern vehicle platforms.
- Utilizes tools like MATLAB/Simulink for algorithm development, rapid prototyping, and auto code generation to accelerate ECU development and validation for domains such as powertrain and chassis.
- practice specializes in the development virtual models of controller, system on chips, ECUs so that embedded software can be developed and validated much before the target hardware is available.
- Covers development of advanced digital cockpit solutions including infotainment, digital instrument clusters, voice assistants, and connected vehicle services using Android Automotive and embedded platforms.
14 Clues: Specializes in the design and development of advanced test automation solutions and test execution. • involve developing standardized, scalable ECU software platforms and low-level firmware to power critical automotive functions • ...
TTS Etika Propesi TI 2025-12-07
Across
- "Kategori kejahatan yang menggunakan sistem informasi atau jaringan sebagai sarana utama, sasaran, atau keduanya; sering memanfaatkan kerentanan teknis serta kelemahan perilaku pengguna.",
- "Bagian dari HKI yang melindungi ekspresi gagasan dalam bentuk karya orisinal, dan tidak sekadar melindungi ide abstrak tanpa perwujudan.",
- "Entitas atau perusahaan pemilik teknologi yang menerbitkan sertifikasi resmi atas penggunaan, pengelolaan, dan dukungan produk mereka (misalnya Cisco, Microsoft, Oracle).",
- "Sekumpulan prinsip moral yang mengatur bagaimana pengguna menjaga martabat, privasi, kejujuran, dan tanggung jawab dalam interaksi digital dan media sosial.",
- "Hak eksklusif yang lahir dari karya intelektual manusia dan memberikan kewenangan kepada pemiliknya untuk mengontrol pemanfaatan ekonomis maupun moral atas karya tersebut.",
- "Rangkaian prinsip normatif tertulis yang disusun dan disepakati oleh organisasi profesi TI untuk menjadi rujukan standar perilaku moral anggotanya dalam menjalankan tugas profesi.",
- "Regulasi nasional yang menjadi dasar penegakan hukum terhadap informasi dan transaksi elektronik, termasuk pengakuan alat bukti elektronik dan jenis perbuatan yang dilarang.",
- "Landasan teoritis terdalam yang mengkaji secara kritis asumsi-asumsi di balik teori etika (deontologi, teleologi, dan etika keutamaan), termasuk pertanyaan seperti: mengapa sesuatu wajib, baik, atau adil.",
Down
- "Orientasi sikap dan standar perilaku yang menuntut kompetensi tinggi, integritas, akuntabilitas, dan komitmen pada kualitas layanan, bukan sekadar status memiliki pekerjaan di bidang tertentu.",
- "Bidang hukum yang mengatur konsekuensi yuridis dari aktivitas berbasis teknologi informasi, mencakup kontrak elektronik, perlindungan data, tindak pidana siber, dan tanggung jawab platform.",
- "Kelompok profesi yang berfokus pada perancangan, pengelolaan, pengembangan, dan pengamanan sistem teknologi informasi, mencakup peran seperti analis sistem, network engineer, dan cybersecurity specialist.",
- "Bidang pekerjaan yang menuntut penguasaan pengetahuan khusus, standar kompetensi formal, tanggung jawab sosial, dan biasanya diawasi oleh organisasi profesi dengan kode etik yang mengikat.",
- "Sifat pembeda yang menjelaskan mengapa cybercrime sulit ditangani, misalnya lintas yurisdiksi, dapat dilakukan secara anonim, otomatis, dan berskala masif.",
- "Proses asesmen formal terhadap individu berdasarkan standar kompetensi tertentu, biasanya dikeluarkan oleh lembaga atau vendor resmi untuk menjamin kualitas keahlian di bidang TI.",
14 Clues: "Bagian dari HKI yang melindungi ekspresi gagasan dalam bentuk karya orisinal, dan tidak sekadar melindungi ide abstrak tanpa perwujudan.", • "Sifat pembeda yang menjelaskan mengapa cybercrime sulit ditangani, misalnya lintas yurisdiksi, dapat dilakukan secara anonim, otomatis, dan berskala masif.", • ...
TTS Etika Propesi TI 2025-12-07
Across
- "Kategori kejahatan yang menggunakan sistem informasi atau jaringan sebagai sarana utama, sasaran, atau keduanya; sering memanfaatkan kerentanan teknis serta kelemahan perilaku pengguna.",
- "Bagian dari HKI yang melindungi ekspresi gagasan dalam bentuk karya orisinal, dan tidak sekadar melindungi ide abstrak tanpa perwujudan.",
- "Entitas atau perusahaan pemilik teknologi yang menerbitkan sertifikasi resmi atas penggunaan, pengelolaan, dan dukungan produk mereka (misalnya Cisco, Microsoft, Oracle).",
- "Sekumpulan prinsip moral yang mengatur bagaimana pengguna menjaga martabat, privasi, kejujuran, dan tanggung jawab dalam interaksi digital dan media sosial.",
- "Hak eksklusif yang lahir dari karya intelektual manusia dan memberikan kewenangan kepada pemiliknya untuk mengontrol pemanfaatan ekonomis maupun moral atas karya tersebut.",
- "Rangkaian prinsip normatif tertulis yang disusun dan disepakati oleh organisasi profesi TI untuk menjadi rujukan standar perilaku moral anggotanya dalam menjalankan tugas profesi.",
- "Regulasi nasional yang menjadi dasar penegakan hukum terhadap informasi dan transaksi elektronik, termasuk pengakuan alat bukti elektronik dan jenis perbuatan yang dilarang.",
- "Landasan teoritis terdalam yang mengkaji secara kritis asumsi-asumsi di balik teori etika (deontologi, teleologi, dan etika keutamaan), termasuk pertanyaan seperti: mengapa sesuatu wajib, baik, atau adil.",
Down
- "Orientasi sikap dan standar perilaku yang menuntut kompetensi tinggi, integritas, akuntabilitas, dan komitmen pada kualitas layanan, bukan sekadar status memiliki pekerjaan di bidang tertentu.",
- "Bidang hukum yang mengatur konsekuensi yuridis dari aktivitas berbasis teknologi informasi, mencakup kontrak elektronik, perlindungan data, tindak pidana siber, dan tanggung jawab platform.",
- "Kelompok profesi yang berfokus pada perancangan, pengelolaan, pengembangan, dan pengamanan sistem teknologi informasi, mencakup peran seperti analis sistem, network engineer, dan cybersecurity specialist.",
- "Bidang pekerjaan yang menuntut penguasaan pengetahuan khusus, standar kompetensi formal, tanggung jawab sosial, dan biasanya diawasi oleh organisasi profesi dengan kode etik yang mengikat.",
- "Sifat pembeda yang menjelaskan mengapa cybercrime sulit ditangani, misalnya lintas yurisdiksi, dapat dilakukan secara anonim, otomatis, dan berskala masif.",
- "Proses asesmen formal terhadap individu berdasarkan standar kompetensi tertentu, biasanya dikeluarkan oleh lembaga atau vendor resmi untuk menjamin kualitas keahlian di bidang TI.",
14 Clues: "Bagian dari HKI yang melindungi ekspresi gagasan dalam bentuk karya orisinal, dan tidak sekadar melindungi ide abstrak tanpa perwujudan.", • "Sifat pembeda yang menjelaskan mengapa cybercrime sulit ditangani, misalnya lintas yurisdiksi, dapat dilakukan secara anonim, otomatis, dan berskala masif.", • ...
Hartford Funds Compliance Crossword 2019-05-06
Across
- Working for, or on the board of a start-up company is considered a(n) _____________ and must be reported via MCO prior to any engagement.
- FINRA Registered Broker-Dealer that is the official distributor for Hartford Fund’s ETFs.
- Mutual Funds/ETFs should never be described as providing this type of protection.
- Department hired by Hartford Funds to lifeguard the firm.
- (3 words) Something that interferes or competes with your job or your ability to decide and act in the best interest of Hartford Funds (personal activity, financial matter, obligation, etc.).
- Entity that engages in the underwriting and wholesale distribution and marketing of open end investment companies registered under the Investment Company Act of 1940 to third party firms on behalf of Hartford Funds.
- Investment adviser firm that serves as the adviser to the Hartford Mutual Funds.
- Unacceptable or improper behavior by an employee.
- Who is responsible for making sure all reportable accounts, trades, and holdings are appropriately and timely disclosed in MyComplianceOffice?
- An invisible barrier designed to prevent unauthorized access to Hartford Fund’s corporate network.
- Travel & Expense items are input into this system.
- Money laundering involves three steps – Placement, ____________ and Integration. Step two involves carrying out a series of complex financial transactions to camouflage the illegal source of the cash.
Down
- Procedures, laws and regulations designed to prevent individuals from disguising illegally obtained funds as legitimate income.
- Any technology application that allows users to create, share and exchange information in an online community or forum.
- Compliance is not an act, it’s a _______.
- Encouraging a Financial Advisor to invest his clients in Hartford Funds Core Equity Fund because the Fund will outperform its benchmark during the next 2 years is inappropriate. Use of such language is considered?
- All potential conflicts of interest need to be _________.
- Protection of internet-connected systems from cyber-attacks, protect against unauthorized access to data centers and other computerized systems.
- Investment adviser firm that serves as the adviser to the Hartford Funds multi-factor ETFs.
- Moral principles that govern a person’s behavior.
- Dedicated to investor protection and market integrity through effective and efficient regulation of broker-dealers.
- Hartford Funds Chief Compliance Officer.
- System employees use to attest/complete various Compliance related activities (reportable account disclosure, outside business requests, limited partnership requests, etc).
23 Clues: Hartford Funds Chief Compliance Officer. • Compliance is not an act, it’s a _______. • Moral principles that govern a person’s behavior. • Unacceptable or improper behavior by an employee. • Travel & Expense items are input into this system. • All potential conflicts of interest need to be _________. • Department hired by Hartford Funds to lifeguard the firm. • ...
Social Media 2023-09-01
Across
- - Your personal page on social media where you share information about yourself.
- - Eye-catching headlines or links designed to get you to click on them.
- - Using websites and apps to connect and communicate with others.
- - Sharing your location online, which can be risky, so it's best to be careful.
- - People who say mean things online to upset others, so it's best to ignore them.
- - Knowing how to find, evaluate, and use information on the internet.
- - Someone you know from the internet but may not have met in person.
- - A trick or fraud on the internet to steal money or personal information.
- - Keeping your personal information safe and not sharing it with people you don't know.
- - Protecting your devices and information from online threats.
- - A chosen name to represent yourself online.
- - Being careful about who you trust and what you share online to stay safe.
- - Someone you don't know in real life who tries to talk to you online.
- - Good manners and polite behavior when you're on the internet.
- - Rules that a website or app follows about how they use your information.
- - A website or app where you can connect with friends and share things.
Down
- - Repeated mean or threatening behavior toward someone online.
- - When someone tries to trick you into sharing your personal information, like your password.
- - Being responsible and safe when using the internet.
- - An extra layer of security for your online accounts.
- - Pictures, videos, or messages that aren't suitable for kids.
- - An online space where people can talk to each other in real-time.
- - Harmful software that can damage your computer or steal information.
- - To stop someone from contacting you or seeing your online posts.
- - The information about you online, like what you post and share.
- - When someone is mean or hurtful to others online, like teasing or spreading rumors.
- - To tell a trusted adult or website about something that makes you uncomfortable online.
- - A secret code that keeps your online accounts safe.
- - How others see you based on your online behavior.
- - Someone who tries to trick or harm kids online, so it's important not to share personal information.
30 Clues: - A chosen name to represent yourself online. • - How others see you based on your online behavior. • - Being responsible and safe when using the internet. • - A secret code that keeps your online accounts safe. • - An extra layer of security for your online accounts. • - Repeated mean or threatening behavior toward someone online. • ...
SN33003FP Chapter 6 2024-07-06
Across
- Reduces the severity of the loss or the likelihood of the loss from occurring
- Prevent a disaster from occurring
- The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
- Gets critical systems to another location while repair of the original facility is under way
- Avoiding complex solutions that users cannot understand or troubleshoot
- Ability to maintain availability during disruptive events
- Restricting access so that users only have the level of access required to do their job
- It is critical to keep an organization functioning when a disaster occurs
- Manages a complete inventory of hardware and software
- Discover the incident
- Plan for potential incidents
Down
- Creating a barrier of multiple defences to prevent attacks
- Identifies specific hardware and software products that the organization uses and supports
- Breaching one layer of security does not compromise the whole system
- Discover unwanted events
- Investigate the cause of the incident and ask questions to better understand the nature of the threat
- Analyzes the dangers posed by natural and human-caused events to the assets of an organization
- Enhances system reliability and availability by distributing them across multiple physical locations
- Manages a full inventory of hardware and software components that are vulnerable to security risks
- Network protocol that provides for redundancy
- Concealing certain types of information to make it more difficult for cyber criminals to attack a system
- The set of procedures that an organization follows after an event occurs outside the normal range
- Assigns all resources into a group based on common characteristics
- Restore the system after a disaster
- Minimizes risk by staying ahead of cybercriminals
- Ensures system availability in the event of a component failure
- Combines multiple physical hard drives into a single logical unit
- A group of servers that act like a single system
- Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
- Enables a system to continue operating if one or more components fail
- 99.999% uptime, less than 5.26 minutes downtime yearly
31 Clues: Discover the incident • Discover unwanted events • Plan for potential incidents • Prevent a disaster from occurring • Restore the system after a disaster • Network protocol that provides for redundancy • A group of servers that act like a single system • Minimizes risk by staying ahead of cybercriminals • Manages a complete inventory of hardware and software • ...
Techno2 2024-07-14
Across
- Computing - The use of quantum-mechanical phenomena such as superposition and entanglement to perform computation.
- - A software application that runs automated tasks.
- Reality - The use of computer technology to create a simulated environment.
- Language Processing - The ability of a computer program to understand human language as it is spoken.
- - The branch of technology that deals with the design, construction, operation, and application of robots.
- Intelligence - The simulation of human intelligence by machines.
- Vehicles - Vehicles that are capable of sensing their environment and moving safely with little or no human input.
- Mining - The practice of examining large databases to generate new information.
- Learning - A subset of AI that involves the development of algorithms that allow computers to learn from and make predictions based on data.
- - The fifth generation of mobile network technology.
- Network - A computer system modeled on the human brain and nervous system.
- Analytics - The use of statistics and modeling techniques to predict future outcomes based on historical data.
- Science - An interdisciplinary field that uses scientific methods, processes, and algorithms to extract knowledge from data.
- Vision - A field of AI that trains computers to interpret and understand the visual world.
- Reality - Technology that overlays digital information on the real world.
- Home - A home equipped with lighting, heating, and electronic devices that can be controlled remotely by smartphone or computer.
Down
- - A system of recording information in a way that makes it difficult to change or hack.
- Technology - Technology that uses AI and machine learning to provide advanced services.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - The use of technology to perform tasks without human intervention.
- - Measures taken to protect a computer or computer system against unauthorized access or attack.
- - The process of converting information or data into a code to prevent unauthorized access.
- Technology - Electronic devices that are worn on the body as accessories or implants.
- Computing - The delivery of computing services over the internet.
- Data - Extremely large data sets that may be analyzed computationally.
- Computing - A distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
- of Things (IoT) - A network of physical objects embedded with sensors and software.
- Address - A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- - A computer program designed to simulate conversation with human users.
- Learning - A subset of machine learning involving neural networks with many layers.
30 Clues: - A software application that runs automated tasks. • - The fifth generation of mobile network technology. • Intelligence - The simulation of human intelligence by machines. • Computing - The delivery of computing services over the internet. • - The use of technology to perform tasks without human intervention. • ...
ekonomi 2024-09-02
Across
- Kota di Belanda yang menjadi pusat untuk banyak perusahaan AS.
- Badan antar-pemerintah di bidang energi yang diikuti oleh Belanda dan Amerika Serikat.
- kerjasama militer yang terjalin antara Belanda dan Amerika Serikat sering melalui organisasi ini.
- Produk teknologi yang dikembangkan bersama oleh Belanda dan Amerika Serikat.
- kerjasama antara Belanda dan Amerika Serikat dalam bidang teknologi ini melibatkan startup dan inovasi.
- Organisasi internasional di bidang kesehatan di mana Belanda dan AS bekerja sama.
- badan riset yang sering menjadi topik dalam kerjasama antara universitas-universitas di Belanda dan Amerika Serikat.
- kegiatan penelitian bersama antara universitas Belanda dan Amerika Serikat.
- salah satu produk utama yang diekspor Belanda ke Amerika Serikat.
- Program pelatihan militer bersama antara Belanda dan Amerika Serikat.
- Bentuk bantuan ekonomi yang diberikan Amerika Serikat kepada Belanda setelah Perang Dunia II.
- Organisasi lingkungan yang diikuti oleh Belanda dan Amerika Serikat untuk melindungi spesies terancam punah.
- bidang di mana Belanda dan Amerika Serikat sering bekerjasama untuk mengatasi ancaman global.
- industri utama Belanda yang diekspor ke Amerika Serikat selain bunga.
- Kerjasama di bidang keamanan antara Belanda dan Amerika Serikat setelah 9/11.
- Kota di AS yang merupakan pusat dari banyak perusahaan Belanda.
- Perjanjian dagang penting antara Amerika Serikat dan negara-negara Eropa, termasuk Belanda.
Down
- Perjanjian militer antara Belanda dan Amerika Serikat di bawah naungan NATO.
- perjanjian antara negara-negara di Eropa yang diikuti oleh Belanda dan berimplikasi pada hubungan dagang dengan Amerika Serikat.
- Kota di Belanda tempat markas besar Eropa dari banyak perusahaan Amerika Serikat.
- Bentuk kerja sama di bidang kesehatan antara Belanda dan Amerika Serikat.
- Perusahaan transportasi asal Amerika yang memiliki hubungan dagang dengan Belanda.
- Organisasi internasional di bidang ekonomi di mana Belanda dan Amerika Serikat adalah anggotanya.
- Kerjasama di bidang keamanan siber antara Belanda dan Amerika Serikat.
- Organisasi internasional di mana Belanda dan Amerika Serikat bekerja sama dalam masalah lingkungan.
- program beasiswa terkenal yang merupakan hubungan pendidikan antara Belanda dan Amerika Serikat .
- Industri teknologi besar asal Amerika Serikat yang memiliki fasilitas di Belanda.
- Konvensi yang diikuti oleh Belanda dan Amerika Serikat untuk mengatur perdagangan internasional.
- Perusahaan teknologi asal Amerika yang bekerja sama dengan perusahaan Belanda di bidang chip.
- Konferensi internasional tentang hak asasi manusia yang dihadiri oleh Belanda dan Amerika Serikat.
30 Clues: Kota di Belanda yang menjadi pusat untuk banyak perusahaan AS. • Kota di AS yang merupakan pusat dari banyak perusahaan Belanda. • salah satu produk utama yang diekspor Belanda ke Amerika Serikat. • Program pelatihan militer bersama antara Belanda dan Amerika Serikat. • industri utama Belanda yang diekspor ke Amerika Serikat selain bunga. • ...
ACSO Privacy and Information Security Awareness Week May 2023 2023-05-03
Across
- The accidental or deliberate exposure of sensitive ACSO information into an uncontrolled or unauthorised environment or to persons without a need–to–know. Data ______
- refers to the potential for loss, damage, or harm resulting from threats exploiting vulnerabilities in information systems, networks, or data assets. Multi-step process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls
- Refers to obtaining permission before information is obtained, used or shared
- Stands for Multi-Factor Authentication.
- It's a fraudulent attempt, usually via email or social engineering, to deceive individuals into providing sensitive information, such as passwords or credit card details, by posing as a legitimate entity.
- the state of being unidentifiable or untraceable, ensuring that an individual's actions or information cannot be linked back to their real identity.
- Stands for Virtual Private Network. It's used to connect to ACSO network when working from home
- Section that explains how ACSO will manage the process of dealing with actual or suspected data _____ in accordance with the national Notifiable Data Breach Procedure
- I in the CIA triad. assurance that information and systems remain consistent and unaltered
- Role responsible for monitoring and reviewing privacy related processes in ACSO. Privacy _______
- C in the CIA triad. protection of sensitive information from unauthorized access
Down
- ACSO must ensure that the operation of information processing facilities, including operating systems, are secure and protected against malware and data loss. _______ security
- Either unclassified or classified ACSO information identified as requiring extra protection. _______ Information
- Section that explains how ACSO must take reasonable steps to destroy or permanently de-identify personal information if it is no longer needed for any purpose, unless an exception applies. Data _____
- An occurrence or activity that may threaten the confidentiality, integrity or availability of ACSO information. Cybersecurity _____
- The manager of the group that administers and operates that information asset or system
- A in the CIA triad. timely and reliable access to information and resources
- malicious software designed to infiltrate, damage, or disrupt computer systems, networks, or devices, often without the user's knowledge or consent.
- It's a fundamental human right
- refers to how all ACSO personnel are required to maintain their workspace, computer, mobile devices, printed materials and access cards to enhance privacy and information security. Clean _____ Policy
20 Clues: It's a fundamental human right • Stands for Multi-Factor Authentication. • A in the CIA triad. timely and reliable access to information and resources • Refers to obtaining permission before information is obtained, used or shared • C in the CIA triad. protection of sensitive information from unauthorized access • ...
Internet 2021-11-02
Across
- not controlled by or directly connected to a computer or external network.
- commonly known as the Web.
- a group or system of interconnected people or things.
- a post made on the social media application
- occurs when a computer program such as a software application or an operating system stops
- is a multiple of a byte
- contains data that is stored for a short amount of time.
- is a computer or system that provides resources
- is an organized collection of structured information.
- is the practice of defending computers, servers mobile devices, electronic systems, Networks, and data from malicious attacks.
- a thing made or adapted for a particular purpose
- utilizing devices constructed
- messages distributed by electronic means.
- takes signals from your ISP.
- the notional environment in which communication over computer networks occurs.
- designed to block unauthorized access while permitting outward communication.
- is a top-level domain, also known as a TLD.
- A symbol on a display screen indicating that the computer is waiting for input
- services that run on the Internet, instead of locally on your computer.
- to transfer from a computer or other digital device to the memory of another device
Down
- copy (data) from one computer system to another typically over the internet.
- controlled by or connected to another computer or to a network.
- the application of scientific knowledge for practical purposes
- to obtain, examine, or retrieve
- is a computer network that uses wireless data connections between network nodes
- a group of binary digits or bits operated on as a unit.
- is a collection of web pages and related content
- relating to the whole world
- relating to or characteristic of the culture of computers
- are used to connect two or more devices
- facts provided
- is a document, commonly written in HTML
- means of sending or receiving information
- not physically existing as such but made by software to appear to do so.
- a website or web page providing access or links to other sites.
- a global computer network providing a variety of information.
- information processed or stored by a computer
- is an online journal or informational website displaying information.
- authority or, control within the Internet
39 Clues: facts provided • is a multiple of a byte • commonly known as the Web. • relating to the whole world • takes signals from your ISP. • utilizing devices constructed • to obtain, examine, or retrieve • are used to connect two or more devices • is a document, commonly written in HTML • means of sending or receiving information • messages distributed by electronic means. • ...
Internet 2021-11-02
Across
- is a collection of web pages and related content
- not controlled by or directly connected to a computer or external network.
- controlled by or connected to another computer or to a network.
- is a top-level domain, also known as a TLD.
- information processed or stored by a computer
- a group or system of interconnected people or things.
- are used to connect two or more devices
- the application of scientific knowledge for practical purposes
- is the practice of defending computers
- a group of binary digits or bits operated on as a unit.
- is a computer or system that provides resources
- a thing made or adapted for a particular purpose
- services that run on the Internet, instead of locally on your computer.
- facts provided
- messages distributed by electronic means.
- a website or web page providing access or links to other sites.
- means of sending or receiving information
- takes signals from your ISP.
- is an online journal or informational website displaying information.
- the notional environment in which communication over computer networks occurs.
Down
- contains data that is stored for a short amount of time.
- not physically existing as such but made by software to appear to do so.
- a global computer network providing a variety of information.
- to obtain, examine, or retrieve
- designed to block unauthorized access while permitting outward communication.
- commonly known as the Web.
- is a computer network that uses wireless data connections between network nodes
- is a multiple of a byte
- is an organized collection of structured information.
- a post made on the social media application
- occurs when a computer program such as a software application or an operating system stops
- utilizing devices constructed
- relating to the whole world
- relating to or characteristic of the culture of computers
- authority or, control within the Internet
- is a document, commonly written in HTML
- to transfer from a computer or other digital device to the memory of another device
- A symbol on a display screen indicating that the computer is waiting for input
- copy (data) from one computer system to another typically over the internet.
39 Clues: facts provided • is a multiple of a byte • commonly known as the Web. • relating to the whole world • takes signals from your ISP. • utilizing devices constructed • to obtain, examine, or retrieve • is the practice of defending computers • are used to connect two or more devices • is a document, commonly written in HTML • authority or, control within the Internet • ...
new puzzle 2024-10-25
Across
- - A decentralized ledger that records all transactions.
- - A feature often missing in cryptocurrency transactions, where users can't easily reverse payments.
- - A benefit of using cryptocurrency, where users can make transactions without revealing personal information.
- - A digital asset used as a medium of exchange, secured by cryptography.
- - A secret code used to access and send cryptocurrency.
- - A self-executing contract with the terms directly written into code on the blockchain.
- - A cryptocurrency similar to Bitcoin but with faster transaction speeds.
- - A cryptographic process used to secure blockchain data.
- - A financial issue that some cryptocurrencies aim to protect against, similar to precious metals.
- - A cryptocurrency that started as a joke but gained popularity for its low cost.
- - The first and most popular cryptocurrency.
- - A type of network used in blockchain technology where participants interact directly with each other.
- - The feature of cryptocurrencies like Bitcoin, limiting their total supply.
Down
- - The method used in blockchain to track when a transaction occurred.
- - A small cost associated with processing cryptocurrency transactions.
- - Central Bank Digital Currency, a digital version of a country's fiat currency.
- - An institution that regulates traditional currency and may issue digital currencies in the future.
- - A property of blockchain transactions, meaning once added, they cannot be changed or altered.
- - A concern related to cryptocurrency transactions, where users must protect their digital wallets.
- - One of the advantages of blockchain, providing a clear and auditable transaction history.
- - The process of validating transactions and adding them to the blockchain.
- - A challenge in the cryptocurrency space, as governments attempt to control the technology.
- - A cryptographic code that allows users to receive cryptocurrency.
- - Traditional government-issued currency that cryptocurrencies can be exchanged for.
- - Distributed Ledger Technology, a type of digital system that allows decentralized data storage.
- - A blockchain platform that allows the creation of smart contracts.
- - A common characteristic of cryptocurrencies, where their prices fluctuate significantly.
- - A problem resolved by blockchain technology that prevents the same asset from being spent twice.
- - Independent users or computers that verify and record transactions in the blockchain.
- - A key feature of blockchain where no central authority controls the data.
30 Clues: - The first and most popular cryptocurrency. • - A decentralized ledger that records all transactions. • - A secret code used to access and send cryptocurrency. • - A cryptographic process used to secure blockchain data. • - A cryptographic code that allows users to receive cryptocurrency. • - A blockchain platform that allows the creation of smart contracts. • ...
Mrs Hesse's cybersecurity crossword 2021-02-12
CN-120 Linux Fundamentals Week 2 2023-05-17
Across
- Software or hardware device that protects a network segment or individual host by filtering packets to an access control list
- A discrete area of storage defined on a hard disk using either the master boot record (MBR) scheme or the GUID partition table (GPT) scheme. Each partition can be formatted with a different file system and a partition can be marked as active (made bootable).
- A package management system used by Linux distributions derived from Debian Linux
- A package management system used by Linux distributions derived from Red Hat Linux__
- Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
- The process of accepting input data from and sending output data to a component that is not a default I/O device
- One of the default file systems in modern Linux versions that supports journaling and efficiency in handling large files
Down
- An abstraction layer that translates file system information between a real file system and the Linux kernel
- Function that converts an arbitrary–length string input to a fixed length string output. A cryptographic has function does this in a way that reduces the chance of collisions, where two different inputs produce the same output. Also known as message digest and cryptographic hash
- A small, user–friendly text editor that evolved from the Pico text editor created for UNIX–like systems. Also known as nano
- Reducing the amount of space that a file takes up on disk using various algorithms to describe it more efficiently
- Using the output of one command as the input for a section command
- An openSUSE (RPM–based Linux distro) package manager that supports .rpm packages
- The default GUI text editor used in GNOME desktop environments
- Package manager for installing, maintaining, inventorying, and removing software from the Red Hat family of Linux distributions
- An improved version of the YUM package manager
- Application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22
17 Clues: An improved version of the YUM package manager • The default GUI text editor used in GNOME desktop environments • Using the output of one command as the input for a section command • An openSUSE (RPM–based Linux distro) package manager that supports .rpm packages • A package management system used by Linux distributions derived from Debian Linux • ...
Cybersecurity Awareness Month 2022 2022-03-30
Across
- an encrypted connection over the Internet from a device to a network.
- a string of characters that allows access to a computer system or service
Down
- type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware
- intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
4 Clues: an encrypted connection over the Internet from a device to a network. • a string of characters that allows access to a computer system or service • intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems • ...
Cyber Crosswords 2024-06-19
2 Clues: The practice of protecting systems, networks, and programs from digital attacks (10 letters) • A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
Internet 2021-11-02
Across
- not controlled by or directly connected to a computer or external network.
- commonly known as the Web.
- a group or system of interconnected people or things.
- a post made on the social media application
- occurs when a computer program such as a software application or an operating system stops
- is a multiple of a byte
- contains data that is stored for a short amount of time.
- is a computer or system that provides resources
- is an organized collection of structured information.
- is the practice of defending computers, servers mobile devices, electronic systems, Networks, and data from malicious attacks.
- a thing made or adapted for a particular purpose
- utilizing devices constructed
- messages distributed by electronic means.
- takes signals from your ISP.
- the notional environment in which communication over computer networks occurs.
- designed to block unauthorized access while permitting outward communication.
- is a top-level domain, also known as a TLD.
- A symbol on a display screen indicating that the computer is waiting for input
- services that run on the Internet, instead of locally on your computer.
- to transfer from a computer or other digital device to the memory of another device
Down
- copy (data) from one computer system to another typically over the internet.
- controlled by or connected to another computer or to a network.
- the application of scientific knowledge for practical purposes
- to obtain, examine, or retrieve
- is a computer network that uses wireless data connections between network nodes
- a group of binary digits or bits operated on as a unit.
- is a collection of web pages and related content
- relating to the whole world
- relating to or characteristic of the culture of computers
- are used to connect two or more devices
- facts provided
- is a document, commonly written in HTML
- means of sending or receiving information
- not physically existing as such but made by software to appear to do so.
- a website or web page providing access or links to other sites.
- a global computer network providing a variety of information.
- information processed or stored by a computer
- is an online journal or informational website displaying information.
- authority or, control within the Internet
39 Clues: facts provided • is a multiple of a byte • commonly known as the Web. • relating to the whole world • takes signals from your ISP. • utilizing devices constructed • to obtain, examine, or retrieve • are used to connect two or more devices • is a document, commonly written in HTML • means of sending or receiving information • messages distributed by electronic means. • ...
FITCVocab.rk 2013-05-15
Across
- a slot in your computer used for music
- something powered by a computer
- a peripheral were you provide information to your computer
- wireless internet (wireless fidelity)
- a search engine that finds better, more reliable information
- instructions and data readable by a machine
- something that is on or from the web
- a slot in your computer used for flash-drives and other things
- credit given to an author of a source
- a separate tool connected to your computer
- a picture or visual used to represent a product
- Who is contacting me, what are they asking, why are they asking it?
- programs know as "apps"
- a written file that is saved on your computer
- known as "NCSA"
- keeping your private information secure on the web
- a slot in your computer used for internet connection
- saved pieces of work or pictures saved and stored on a computer
- a pamphlet used to tell about a product or service
- a website that searches the web for you
- a mouse that is powered by a roller ball
- the type of internet you have (DSL/Cable)
- a written paper telling about you and good things you have done
- the screen for computer
Down
- a type of internet hosting service
- 3g or 4g
- a computer powered object that is portable
- known as ISP
- the machines and physical parts that make up your comupter
- a machine that isn't powered by a computer
- the internet area that is for saved data
- useful software loaded on to a computer
- an online presentation service
- the ceremony for an elected president
- making the right choices and being nice on the web
- a mouse that is powered by a laser
- a catchphrase used to represent a product
- a blank part of a document for you to work on
- mac/pc
- the circular discs inserted into a computer
- keeping safe on the web
- to put out or draw attention to a product
- the main "heart" of the computer
- this is the mouse on your laptop
- everything that you save is stored in this part of the computer
- a peripheral were a computer gives information to you
46 Clues: mac/pc • 3g or 4g • known as ISP • known as "NCSA" • programs know as "apps" • keeping safe on the web • the screen for computer • an online presentation service • something powered by a computer • the main "heart" of the computer • this is the mouse on your laptop • a type of internet hosting service • a mouse that is powered by a laser • something that is on or from the web • ...
IS1 NetSec Newsletter Crossword Challenge #4 - AWS Certificate Manager 2023-11-09
Across
- Automated process for certificate renewal for DNS Validated ACM Certificates. (7+7)
- Covers all the subdomains with a single certificate for a domain. (8+11)
- A security standard to detect and prevent fraudulent SSL/TLS certificates. (11+12)
- Repository of trusted certificates. (5+5)
- A certificate issued to a specific user, device, or server for authentication. (3+6+11)
- Certificate extension specifying if it's a CA or not. (5+11)
- Encoding format for X.509 certificates. (13+8+5)
- Certificate extension specifying the purposes for which the public key can be used. (8+3+5)
- Top-level Authority in a certificate hierarchy. (4+2)
- A protocol for checking the revocation status of certificates. (4)
- It's a DNS record for aliasing one domain to another, often used for verification of domain in ACM. (9+4)
Down
- Initial step in obtaining a digital certificate. (11+7+7)
- The middle-man of SSL Certificates. (12+2)
- An API in AWS to initiate the process of obtaining an ACM Certificate. (7+11)
- Locations where list of revoked certificates can be obtained. (3+12+6)
- Sequence of certificates forming a trust path. (11+5)
- A DNS record specifying which CAs are authorized to issue certificates for a domain. (13+9+13)
- A list of certificates that have been revoked before their expiration date. (11+10+4)
- An extension in a certificate allowing additional identities to be bound to the subject. (7+11+4)
- An entity that issues and manages digital certificates. (11+9)
- A cryptographic protocol for secure communication over a computer network, which falls under Layer-4 of the OSI Model. (9+5+8)
- Certificate with a signature of authenticity, but unlike most, this one vouches for itself. (4+6+11)
- Amazon's service for managing private certificates. (3+7+2)
- AWS-Recommended verification method of a new ACM Certificate. (3+10)
- A format for encoding SSL Certificates. (7+8+4)
- Security mechanism ensuring a specific cryptographic key is associated with a particular certificate; a protective measure against man-in-the-middle attacks in the cybersecurity realm. (3+7)
- A digital certificate that is no longer valid before its expiration date. (7+11)
- Open-source toolkit for SSL/TLS. (4+3)
- Trusted entity in certificate validation. (5+6)
29 Clues: Open-source toolkit for SSL/TLS. (4+3) • Repository of trusted certificates. (5+5) • The middle-man of SSL Certificates. (12+2) • A format for encoding SSL Certificates. (7+8+4) • Trusted entity in certificate validation. (5+6) • Encoding format for X.509 certificates. (13+8+5) • Sequence of certificates forming a trust path. (11+5) • ...
Cryptic Hunt Set - 1 2024-02-29
Across
- What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
- A class that allows multiple threads to read from or write to a shared resource without interference.
- A synchronization primitive used to synchronize threads by allowing them to take turns accessing a resource.
- In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
- A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
- Which technique aims to recover the original message from encrypted or encoded data without knowledge of the key?
- Which cipher involves using a series of rotating disks or cylinders to scramble the alphabet?
- A technique used in file systems to ensure data integrity by recording changes to disk structure before making them.
- What type of attack floods a network with excessive traffic to overwhelm its capacity?
- What is the name of the mathematical process used to reverse encryption?
- A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
Down
- What type of attack targets the domain name system to redirect users to malicious websites?
- A technique used in file systems to delay the actual writing of data to disk until it is necessary, often to optimize disk I/O performance.
- A tool used to automatically generate code from a given set of rules or templates.
- An interface in the java.util.function package that represents a function that acceptstwo arguments and produces a result.
- A type of reference in Java that prevents the referenced object from being garbagecollected until the reference itself is reachable.
- What security measure restricts access to a network based on the physical address of a
- In which cipher method does the key schedule determine the round keys used in the encryption algorithm?
- Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
- In which cipher does each letter in the plaintext get replaced by a corresponding letter some fixed number of positions down the alphabet?
20 Clues: What is the name of the mathematical process used to reverse encryption? • A tool used to automatically generate code from a given set of rules or templates. • What security measure restricts access to a network based on the physical address of a • What type of attack floods a network with excessive traffic to overwhelm its capacity? • ...
SN33003FP Chapter 6 2024-07-06
Across
- Reduces the severity of the loss or the likelihood of the loss from occurring
- Prevent a disaster from occurring
- The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
- Gets critical systems to another location while repair of the original facility is under way
- Avoiding complex solutions that users cannot understand or troubleshoot
- Ability to maintain availability during disruptive events
- Restricting access so that users only have the level of access required to do their job
- It is critical to keep an organization functioning when a disaster occurs
- Manages a complete inventory of hardware and software
- Discover the incident
- Plan for potential incidents
Down
- Creating a barrier of multiple defences to prevent attacks
- Identifies specific hardware and software products that the organization uses and supports
- Breaching one layer of security does not compromise the whole system
- Discover unwanted events
- Investigate the cause of the incident and ask questions to better understand the nature of the threat
- Analyzes the dangers posed by natural and human-caused events to the assets of an organization
- Enhances system reliability and availability by distributing them across multiple physical locations
- Manages a full inventory of hardware and software components that are vulnerable to security risks
- Network protocol that provides for redundancy
- Concealing certain types of information to make it more difficult for cyber criminals to attack a system
- The set of procedures that an organization follows after an event occurs outside the normal range
- Assigns all resources into a group based on common characteristics
- Restore the system after a disaster
- Minimizes risk by staying ahead of cybercriminals
- Ensures system availability in the event of a component failure
- Combines multiple physical hard drives into a single logical unit
- A group of servers that act like a single system
- Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
- Enables a system to continue operating if one or more components fail
- 99.999% uptime, less than 5.26 minutes downtime yearly
31 Clues: Discover the incident • Discover unwanted events • Plan for potential incidents • Prevent a disaster from occurring • Restore the system after a disaster • Network protocol that provides for redundancy • A group of servers that act like a single system • Minimizes risk by staying ahead of cybercriminals • Manages a complete inventory of hardware and software • ...
anthony nguyen 2024 2024-02-05
Across
- Club where i gave you your promposal where it coulda been much bigger and better but i chose not to make it a full blown thing
- I pranked you that i got a job in what field at ut
- goodnight ___
- You were really hesitant about going ___ but you still managed to make a vlog
- My biggest debt that i owe you is that you and armin tried to help me when i ____ at camp
- Alternative term of endearment i use after goodnight
- You said you would hypothetically vote for which valedictorian
- on some occasions i have also said that you are a better Nguyen to me than ___
- Taylor swift song I slayed and you danced to at camp
- Name i put down on your spooky gram paper
- My first impression when i first met you was that i thought you were way too ____ to the point i thought it was suspicious
- I would always refer to you as the ___ Nguyen twin
- Alternative to texting that you really love which we only did like 5 times in the last year ... Make that 6 haha
Down
- Selfie of us drinking booze at whose party
- Club in which we first met
- Name of the ut girl i was excited to tell you about
- Do you think Mr or Ms will be ___ if we don't win the competition
- cringe type of videos i send you from my dorm
- i was your ____ at prom
- First word of song lyrics i wrote on your love gram paper
- Something that was slightly damaged because of an accident you made in math olympiad state which we were luckily able to fix
- I was doing what when you startled me and sent me that three page long message during winter break
- We will stop being friends if you become an ____
- You would always try to come talk to me at the beginning of ____ class even when i would avoid eye contact
- You were wearing red _____ the day i was taking my anatomy test in Ritters desk when yall had an AP bio test even though i tried asking ritter if i could sit next to you but then i blamed you for getting an 85 on my anatomy test cuz i was distracted by staring at your face
25 Clues: goodnight ___ • i was your ____ at prom • Club in which we first met • Name i put down on your spooky gram paper • Selfie of us drinking booze at whose party • cringe type of videos i send you from my dorm • We will stop being friends if you become an ____ • I pranked you that i got a job in what field at ut • I would always refer to you as the ___ Nguyen twin • ...
Science and Technology 2024-10-18
Across
- An environment for experimenting with and refining military technologies.
- and Simulation, Technology used to test and evaluate military scenarios in a virtual environment.
- The practice of protecting defense networks and data from digital threats.
- Systems, Military technologies that operate independently, including drones and robotic vehicles.
- Manufacturing, Another term for 3D printing, used to create complex military parts and tools.
- Intelligence, Advanced technology that enhances military decision-making and automation.
- Manufacturing, Techniques like 3D printing used to produce next-generation military equipment.
- Vital component of modern defense systems, critical for communications and computing.
- Field of science focusing on biological systems, crucial for defense health and biosecurity.
- Chain, Critical to ensuring that defense technology can be built and deployed reliably.
- Biology, The engineering of biological systems for new defense capabilities, including bio-defense.
- Devices used to detect and respond to physical conditions like heat, light, or movement, essential in defense.
- The ability of defense systems to recover and adapt under stress or attack.
Down
- A form of nuclear energy research with potential military applications.
- Technology that enables systems to operate without human control, often applied in robotics and UAVs.
- Warfare, The use of digital attacks in military strategy, a key area of defense science.
- Computing, A revolutionary technology with implications for encryption, sensing, and defense communications.
- The development of early models of new military technologies for testing and refinement.
- Sensing, The use of quantum technology for ultra-precise military navigation and detection.
- Energy Weapons, Advanced systems such as lasers or microwave technologies for missile defense.
- Advanced computing capabilities used to simulate military scenarios or process large data sets.
- Research, Development, Test, and Evaluation—the budget category for defense science and technology.
- Tech, Devices such as body sensors that monitor soldier health and performance..
- Learning, A subset of AI used to enhance defense decision-making and system automation.
- Data, The analysis of large datasets to enhance military intelligence and operational efficiency.
- Weapons or vehicles that travel at speeds greater than Mach 5, a focus area in defense R&D.
- The driving goal for science and technology development within the DoD.
- Technologies, Cutting-edge innovations that have the potential to transform military capabilities.
- Science, Technology, Engineering, and Mathematics, the fields prioritized in defense talent development.
29 Clues: A form of nuclear energy research with potential military applications. • The driving goal for science and technology development within the DoD. • An environment for experimenting with and refining military technologies. • The practice of protecting defense networks and data from digital threats. • ...
Cyber Security Words and Terms 2022-09-15
Across
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- Text that can be read by the human eye, like this article!
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The deliberate use of someone else's identity, typically for financial gain.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Software that has their code listed as free to use, share, and modify.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- A simple form of code for software that can be written in word editors.
- Customizable additions to software for extra functionality.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
21 Clues: Text that can be read by the human eye, like this article! • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • ...
EXPERT U6 VOCABULARY 2025-03-26
Across
- – The company __________ assumed that their customer data was secure, only to find out later that they had suffered a massive data breach.
- – The new AI system can quickly __________ a detailed report based on the data it analyzes.
- – After realizing the app had a major security flaw, the developers worked tirelessly to __________ the issue before its official release.
- – The cybersecurity expert warned that strong passwords and two-factor authentication __________ account security and protect personal data.
- – The advertisement __________ customers into thinking the smartphone was waterproof, but after testing, many users discovered that even small splashes could damage it.
- – The project manager __________ that the development team would meet the deadline without considering potential technical difficulties.
- – She __________ clicked on a phishing link in her email, which resulted in her personal information being compromised.
- – Before the AI model can make predictions, it needs to __________ vast amounts of data to recognize patterns and trends.
Down
- – The machine learning algorithm is designed to __________ online reviews based on sentiment, labeling them as positive, neutral, or negative.
- – The financial analyst __________ the company’s quarterly earnings, which led to a major drop in stock prices after the report was corrected.
- – Technological advancements often __________ the direction of job markets, forcing workers to adapt to new digital skills.
- – In the crowded conference, I __________ the keynote speaker __________ a journalist and accidentally started asking unrelated questions.
- – The IT technician __________ that the server issue was caused by a minor bug, but it turned out to be a critical hardware failure.
- – I initially believed that the new operating system update would improve battery life, but I quickly realized I __________.
- – The performance test will __________ whether the new software is stable enough for a full-scale launch.
- – I must have __________ when entering the programming code, as the program keeps showing an unexpected error message.
- – My estimate for how long it would take to install the software update __________ by nearly three hours due to unexpected compatibility issues.
- – Modern AI tools can __________ realistic human voices, making it difficult to distinguish between real and synthetic speech.
- – Although meteorologists use advanced models to __________ weather conditions, sudden climate changes can still make predictions unreliable.
- – Before running the simulation, the scientist carefully __________ all the necessary variables into the program.
20 Clues: – The new AI system can quickly __________ a detailed report based on the data it analyzes. • – The performance test will __________ whether the new software is stable enough for a full-scale launch. • – Before running the simulation, the scientist carefully __________ all the necessary variables into the program. • ...
Factors Influencing Business Decisions 2024-11-12
Across
- Advanced computing using quantum-mechanical phenomena, such as superposition and entanglement.
- Large, complex data sets that require advanced tools for analysis, revealing patterns and trends.
- The manipulation of matter on an atomic or molecular scale to create materials with unique properties.
- The buying and selling of goods and services over the internet.
- The simulation of human intelligence in machines designed to think, learn, and make decisions.
- A simulated experience that can be similar to or completely different from the real world, created by computer technology.
- Software distribution model in which applications are hosted by a service provider and made available to customers over the internet.
- Writing instructions in a programming language to create software applications and systems.
- Technology used in mobile devices like smartphones and tablets, allowing for wireless communication and computing.
- The use of technology to perform tasks with minimal human intervention.
- The delivery of computing services over the internet, including storage, processing power, and applications.
- A set of rules or steps used to solve a problem or perform a computation.
- The field of study that combines domain expertise, programming skills, and knowledge of mathematics and statistics to extract meaningful insights from data.
Down
- The process of designing, coding, testing, and maintaining software applications and systems.
- Electronic devices worn on the body, often used to track health and fitness metrics or provide convenient access to information.
- User Experience (UX) and User Interface (UI) design focused on creating products that provide meaningful and relevant experiences to users.
- Practices and technologies designed to protect systems, networks, and data from digital attacks.
- Connecting computers and other devices to share resources and information.
- A decentralized digital ledger technology for securely recording transactions across multiple computers.
- The physical components of a computer or other electronic devices.
- Integrating digital technology into all areas of a business to improve operations and deliver value to customers.
- A subset of AI where systems automatically learn and improve from experience without explicit programming.
- The design, construction, and operation of robots capable of performing tasks autonomously or semi-autonomously.
- Financial technology innovations that improve and automate the delivery and use of financial services.
- A network of interconnected devices that can collect and exchange data.
25 Clues: The buying and selling of goods and services over the internet. • The physical components of a computer or other electronic devices. • A network of interconnected devices that can collect and exchange data. • The use of technology to perform tasks with minimal human intervention. • A set of rules or steps used to solve a problem or perform a computation. • ...
Community Safety Week Fall 2025 2025-11-18
Across
- Who would you contact for support responding to homelessness / mental health crises on campus?
- A helpline and online directory that connects people to community, social, health, and government services in the city of Toronto.
- Who would you contact for light outages?
- A confidential service where you can ask YorkU Public Health Nurses your health-related questions.
- Free, confidential, 24/7 service in Ontario that connects people to mental health, addiction, and problem gambling services through phone, text, and live chat.
- The YorkU department that offers support and resources if you or someone you know has experienced or been impacted by any form of sexual or gender-based violence – regardless of where or when it took place.
- A student club focused on sustainability and offers services like YUM market, free store, borrowing centre, seed library.
- A Black-led, Black-focused, and Black-serving organization providing culturally reflective programs and services to mitigate the opportunity gap for racialized and under-resourced communities.
- One way of directly connecting with Security or goSAFE.
- A virtual resource to help you discover a variety of Well-being content across six dimensions to help you enhance your daily life.
Down
- Life-saving medication and opioid antagonist that can temporarily reverse the effects of an opioid overdose.
- A service that offers trauma-informed and culturally affirming support to anyone who is thinking of suicide, or who is worried about someone they know.
- External resource for counselling and mental health support.
- A service that provides free, confidential, in-person mental health supports city-wide from mobile crisis worker teams.
- YorkU department that provides cybersecurity, technology services, and direction for the university community.
- A free service that helps community members get safely around campus in the evening.
- YorkU department that can provide counselling and mental health support.
- Who would you contact first in case of an accident, hazard, or suspicious person?
- A portable and easy-to-use device that analyzes a person's heart rhythm and delivers an electric shock if the heart has stopped beating properly due to sudden cardiac arrest.
- An emergency treatment that's done when someone's breathing or heartbeat has stopped.
- The safe area where individuals can stand and wait for emergency personnel to respond.
- The name of YorkU's safety app.
- A student-led alcohol awareness & education for safer consumption non-profit.
23 Clues: The name of YorkU's safety app. • Who would you contact for light outages? • One way of directly connecting with Security or goSAFE. • External resource for counselling and mental health support. • YorkU department that can provide counselling and mental health support. • A student-led alcohol awareness & education for safer consumption non-profit. • ...
AP CSP 2026-04-10
Across
- The practice of protecting systems, networks, and data from unauthorized access or attacks
- A variable used to pass information into a function, enabling flexible behavior
- A data type with only two possible values, often used for logical conditions
- The inclusion of extra components or pathways to increase reliability and fault tolerance
- The maximum amount of data that can be transmitted over a network connection in a given time
- Raw facts, measurements, or observations that can be processed to produce information
- The delay between sending a request and receiving a response in a network
- A computational model that imitates real‑world processes to study behavior or outcomes
- A structured interface that defines how software components communicate and request services from one another
- A reusable block of code that performs a specific task when called
- A technique that reduces the size of data to save storage space or speed up transmission
Down
- A problem‑solving strategy that uses practical shortcuts when an optimal solution is too costly or complex
- A method of transforming data so it cannot be understood without a secret key
- Divide The inequality in access to computing devices, high‑speed Internet, and digital literacy
- A small, structured unit of data sent across a network containing both payload and routing information
- A device that directs data packets between networks by selecting efficient transmission paths
- A named storage location in a program that holds data that can change during execution
- A standardized set of rules governing how data is transmitted and received across networks
- Data or signals provided to a computer system for processing
- An action or occurrence that triggers a specific response in a program
- The process of identifying and fixing errors or flaws in a program
- A base‑2 number system using only 0s and 1s, forming the foundation of all digital data
- A method of reducing complexity by hiding unnecessary details and focusing on essential features
- A precise, step‑by‑step procedure used to solve a problem or accomplish a computational task
- The smallest unit of digital information, representing a single binary value
- A programming construct that repeats a sequence of instructions based on a condition
- The repeated execution of a set of instructions until a condition is met
27 Clues: Data or signals provided to a computer system for processing • The process of identifying and fixing errors or flaws in a program • A reusable block of code that performs a specific task when called • An action or occurrence that triggers a specific response in a program • The repeated execution of a set of instructions until a condition is met • ...
Middle School Computers 2023-08-23
Across
- The process of writing instructions (code) for a computer to perform specific tasks.
- Input device with keys used to input text and commands into the computer.
- Software that manages computer hardware and provides services for other software.
- A digital container used to organize and store files.
- The act of writing and creating computer programs using programming languages.
- A collection of web pages containing information, images, videos, and other resources.
- Driver: Software that enables communication between the operating system and hardware devices.
- The "brain" of the computer that carries out instructions of a computer program.
- Online platforms that enable users to connect, communicate, and share content with others.
- The point of interaction between a user and a computer system, often through graphical elements.
- Identifying and fixing errors or bugs in computer programs.
- A machine that can store, process, and retrieve information.
- Measures and practices taken to protect computer systems and data from unauthorized access and attacks.
- Programs and instructions that tell the computer what tasks to perform.
- A collection of data or information that is stored on a computer.
- Citizenship: The responsible and ethical use of technology and online resources.
- A global network of interconnected computers that allows communication and sharing of information.
Down
- The physical components of a computer, such as the monitor, keyboard, and motherboard.
- Output device that displays visual information from the computer.
- The trail of data left behind by a person's online activity.
- A step-by-step set of instructions for solving a problem or completing a task.
- Software used to access and view websites on the internet.
- Devices used to save and store data for future use, like hard drives and flash drives.
- Software used for organizing and analyzing data in rows and columns.
- Software: Applications used to create and deliver visual presentations, often including slides and multimedia.
- Pointing device that allows users to interact with the computer by moving a cursor on the screen.
- A tool that helps users find information on the internet by entering keywords.
- The temporary workspace where the computer stores data and programs that are currently in use.
- The address used to locate a webpage on the internet.
- Electronic mail sent and received over the internet.
30 Clues: Electronic mail sent and received over the internet. • A digital container used to organize and store files. • The address used to locate a webpage on the internet. • Software used to access and view websites on the internet. • Identifying and fixing errors or bugs in computer programs. • The trail of data left behind by a person's online activity. • ...
crypt hunt set - 1 2024-03-01
Across
- Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
- A scheduling algorithm that assigns priorities based on the ratio of CPU time to waiting time.
- Which technique aims to recover the original message from encrypted or encoded data without knowledge of the key?
- A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
- A type of reference in Java that prevents the referenced object from being garbagecollected until the reference itself is reachable.
- A synchronization primitive used to protect critical sections of code by allowing only one thread to enter at a time and blocking others.
- What type of attack floods a network with excessive traffic to overwhelm its capacity?
- What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
Down
- A technique used in file systems to ensure data integrity by recording changes to disk structure before making them.
- What security measure restricts access to a network based on the physical address of a
- What type of attack targets the domain name system to redirect users to malicious websites?
- Which cipher involves using a series of rotating disks or cylinders to scramble the
- In which cipher does each letter in the plaintext get replaced by a corresponding letter some fixed number of positions down the alphabet?
- An interface in the java.util.function package that represents a function that acceptstwo arguments and produces a result.
- A synchronization primitive used to synchronize threads by allowing them to take turns accessing a resource.
- A class that allows multiple threads to read from or write to a shared resource without interference
- In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
- In which cipher method does the key schedule determine the round keys used in the encryption algorithm?
- A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
- What is the name of the mathematical process used to reverse encryption?
20 Clues: What is the name of the mathematical process used to reverse encryption? • Which cipher involves using a series of rotating disks or cylinders to scramble the • What security measure restricts access to a network based on the physical address of a • What type of attack floods a network with excessive traffic to overwhelm its capacity? • ...
Chapter 20 2019-12-11
Across
- the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.
- Several factors that determine whether or not a country is developed
- Interconnected network
- a disease in which there is a severe loss of the body's cellular immunity, greatly lowering the resistance to infection and malignancy.
- The United States Department of Homeland Security (DHS) is a federal agency designed to protect the United States against threats. Its wide-ranging duties include aviation security, border control, emergency response and cybersecurity.
- a person who has been forced to leave their country in order to escape war, persecution, or natural disaster.
- Gender inequality acknowledges that men and women are not equal and that gender affects an individual's lived experience. These differences arise from distinctions in biology, psychology, and cultural norms.
- country that is on its way to becoming an industrialized nation.
- annual percentage of increase in sales that is consistent with a defined financial policy.
Down
- economy of all humans of the world.
- Space Station
- a form of philosophical monism that holds that matter is the fundamental substance in nature, and that all things, including mental states and consciousness, are results of material interactions.
- international trade left to its natural course without tariffs.
- Political dissent refers to any expression designed to convey dissatisfaction with or opposition to the policies of a governing body. Such expression may take forms from vocal disagreement to civil disobedience to the use of violence.
- international document that states basic rights and fundamental freedoms to which all human beings are entitled.
- Popular culture is generally recognized by members of a society as a set of the practices, beliefs and objects that are dominant or ubiquitous in a society at a given point in time. Popular culture also encompasses the activities and feelings produced as a result of interaction with these dominant objects.
- a region of Earth's stratosphere.
- an Act of the United States Congress that was signed into law by U.S. President George W. Bush on October 26, 2001.
- The deliberate modification of the characteristics of an organism by manipulating its genetic material.
- a large increase in crop production in developing countries
- the politically motivated use of computers and information
- rapid increase in numbers.
- A replicant
23 Clues: A replicant • Space Station • Interconnected network • rapid increase in numbers. • a region of Earth's stratosphere. • economy of all humans of the world. • the politically motivated use of computers and information • a large increase in crop production in developing countries • international trade left to its natural course without tariffs. • ...
ekonomi 2024-09-02
Across
- Organisasi internasional di bidang ekonomi di mana Belanda dan Amerika Serikat adalah anggotanya.
- Kota di AS yang merupakan pusat dari banyak perusahaan Belanda.
- badan riset yang sering menjadi topik dalam kerjasama antara universitas-universitas di Belanda dan Amerika Serikat.
- Perusahaan teknologi asal Amerika yang bekerja sama dengan perusahaan Belanda di bidang chip.
- Program pelatihan militer bersama antara Belanda dan Amerika Serikat.
- perjanjian antara negara-negara di Eropa yang diikuti oleh Belanda dan berimplikasi pada hubungan dagang dengan Amerika Serikat.
- Bentuk kerja sama di bidang kesehatan antara Belanda dan Amerika Serikat.
- Konvensi yang diikuti oleh Belanda dan Amerika Serikat untuk mengatur perdagangan internasional.
- program beasiswa terkenal yang merupakan hubungan pendidikan antara Belanda dan Amerika Serikat .
- industri utama Belanda yang diekspor ke Amerika Serikat selain bunga.
- Kota di Belanda yang menjadi pusat untuk banyak perusahaan AS.
- Perjanjian dagang penting antara Amerika Serikat dan negara-negara Eropa, termasuk Belanda.
- Perusahaan transportasi asal Amerika yang memiliki hubungan dagang dengan Belanda.
- Kerjasama di bidang keamanan siber antara Belanda dan Amerika Serikat.
- Kerjasama di bidang keamanan antara Belanda dan Amerika Serikat setelah 9/11.
- Bentuk bantuan ekonomi yang diberikan Amerika Serikat kepada Belanda setelah Perang Dunia II.
Down
- bidang di mana Belanda dan Amerika Serikat sering bekerjasama untuk mengatasi ancaman global.
- Organisasi internasional di mana Belanda dan Amerika Serikat bekerja sama dalam masalah lingkungan.
- Badan antar-pemerintah di bidang energi yang diikuti oleh Belanda dan Amerika Serikat.
- Organisasi lingkungan yang diikuti oleh Belanda dan Amerika Serikat untuk melindungi spesies terancam punah.
- Industri teknologi besar asal Amerika Serikat yang memiliki fasilitas di Belanda.
- Perjanjian militer antara Belanda dan Amerika Serikat di bawah naungan NATO.
- kerjasama militer yang terjalin antara Belanda dan Amerika Serikat sering melalui organisasi ini.
- kegiatan penelitian bersama antara universitas Belanda dan Amerika Serikat.
- Organisasi internasional di bidang kesehatan di mana Belanda dan AS bekerja sama.
- Produk teknologi yang dikembangkan bersama oleh Belanda dan Amerika Serikat.
- kerjasama antara Belanda dan Amerika Serikat dalam bidang teknologi ini melibatkan startup dan inovasi.
- Kota di Belanda tempat markas besar Eropa dari banyak perusahaan Amerika Serikat.
- salah satu produk utama yang diekspor Belanda ke Amerika Serikat.
- Konferensi internasional tentang hak asasi manusia yang dihadiri oleh Belanda dan Amerika Serikat.
30 Clues: Kota di Belanda yang menjadi pusat untuk banyak perusahaan AS. • Kota di AS yang merupakan pusat dari banyak perusahaan Belanda. • salah satu produk utama yang diekspor Belanda ke Amerika Serikat. • Program pelatihan militer bersama antara Belanda dan Amerika Serikat. • industri utama Belanda yang diekspor ke Amerika Serikat selain bunga. • ...
Zscaler Crossword puzzle 2023-07-17
Across
- (IDS): Monitors network traffic for suspicious activity or unauthorized access attempts.
- Software update that fixes security vulnerabilities or improves the functionality of a program.
- (2FA): Adds an extra layer of security by requiring users to provide two different forms of identification, typically a password and unique code.
- Weakness or flaw in a system that can be exploited by attackers.
- Involves managing and securing personal information on social media platforms to prevent unauthorized access or misuse.
- Secret combination of characters used to authenticate and gain access to a system or account.
- Security model that assumes no trust by default, requiring strict identity verification and continuous authentication for all users and devices, regardless of their location or network.
- Software designed to detect, prevent, and remove malicious software from a computer system.
- Type of malware that encrypts a victim's files and demands a ransom in exchange for their release.
- Type of social engineering attack that tricks users into revealing sensitive information through deceptive emails or websites.
- Manipulation of individuals to gain unauthorized access or sensitive information.
- Encompasses practices, technologies, and measures taken to protect computer systems, networks, and data from unauthorized access or attacks.
- Occurs when sensitive or confidential information is accessed, disclosed, or stolen by unauthorized individuals.
Down
- Creates a connection over a public network, allowing users to access private networks remotely.
- Information collected and analyzed to understand potential cyber threats and take proactive measures to mitigate risks.
- Protocol that encrypts data transmitted between a web server and a browser, ensuring secure communication.
- Simulated cyber attack conducted by professionals to identify vulnerabilities and assess the security of a system or network.
- Acts as a barrier between a trusted internal network and an untrusted external network.
- Converts data into a format that can only be read or accessed with the correct decryption key.
- Broad term for malicious software designed to harm or exploit computer systems.
- Technology that separates the network control plane from the physical infrastructure, allowing organizations to manage and optimize their wide area networks using software-based solutions.
- Software vulnerability that is unknown to the vendor or developers, leaving no time for a patch or fix before it's exploited.
- Cloud-based security approach that combines network security functions with wide-area networking (WAN) services to provide secure connectivity and protection at the network edge.
23 Clues: Weakness or flaw in a system that can be exploited by attackers. • Broad term for malicious software designed to harm or exploit computer systems. • Manipulation of individuals to gain unauthorized access or sensitive information. • Acts as a barrier between a trusted internal network and an untrusted external network. • ...
Factors Influencing Business Decisions 2024-11-12
Across
- The use of living organisms and biological systems to develop products and technologies for improving human life and the environment.
- Reality (VR): An immersive, computer-generated experience that simulates a real or imagined environment, allowing users to interact within that space.
- Transformation: The integration of digital technology into all areas of business, fundamentally changing how organizations operate and deliver value to customers.
- The buying and selling of goods and services over the internet, including online retail and electronic transactions.
- Technology: Portable, wireless technology devices such as smartphones and tablets, enabling communication and computing on the go.
- Analysis: The process of examining, cleaning, and modeling data to discover useful information, inform conclusions, and support decision-making.
- Financial technology that aims to compete with traditional financial methods, including mobile payments, cryptocurrency, and online banking.
- The manipulation and control of matter at the atomic and molecular scale, to create materials with novel properties and applications.
- Printing: The creation of three-dimensional objects from a digital file, by adding material layer by layer.
- Learning: A subset of AI that enables systems to automatically learn and improve from experience without being explicitly programmed.
- The practice of protecting systems, networks, and programs from digital attacks, ensuring data integrity, confidentiality, and availability.
Down
- Development: The process of designing, coding, testing, and maintaining software applications and systems.
- Data: Large, complex datasets that require advanced tools to analyze, revealing trends, patterns, and associations.
- Intelligence (AI): The simulation of human intelligence in machines that are programmed to think, learn, and make decisions like humans.
- of Things (IoT): A network of physical objects embedded with sensors, software, and other technologies to connect and exchange data with other devices over the internet.
- The use of technology to perform tasks with minimal human intervention, increasing efficiency and reducing errors.
- Reality (AR): An interactive experience where digital information is overlaid on the real world, enhancing the user's perception of reality.
- A decentralized digital ledger technology that records transactions across many computers securely and transparently.
- Computing: The delivery of computing services over the internet, including storage, processing power, and applications, on a pay-as-you-go basis.
- The design, construction, and operation of robots, machines capable of carrying out complex actions automatically.
20 Clues: Development: The process of designing, coding, testing, and maintaining software applications and systems. • Printing: The creation of three-dimensional objects from a digital file, by adding material layer by layer. • The use of technology to perform tasks with minimal human intervention, increasing efficiency and reducing errors. • ...
Hartford Funds Compliance Crossword 2019-05-03
Across
- FINRA Registered Broker-Dealer that is the official distributor for Hartford Fund’s ETFs.
- Engages in the underwriting and wholesale distribution and marketing of open end investment companies registered under the Investment Company Act of 1940 to third party firms.
- Unacceptable or improper behavior by an employee.
- Hartford Funds Chief Compliance Officer.
- Travel & Expense items are input into this system.
- Any technology application that allows users to create, share and exchange information in an online community or forum.
- Procedures, laws and regulations designed to stop the practice of generating income through illegal actions.
- Situation in which a person is in a position to derive personal benefit from decisions made in their official capacity (3 words). If needed, contact Compliance for an additional hint for this one.
- Mutual Funds/ETFs should never be described as providing this type of protection.
- Moral principles that govern a person’s behavior.
- Separation of illicit proceeds from their source by a variation of financial transactions intended to conceal the origin of the proceeds.
Down
- Working for, or on the board of a start-up company is considered a(n) _____________ and must be reported via MCO prior to any engagement.
- Investment adviser firm that serves as the adviser to separately managed accounts.
- Investment adviser firm that serves as the adviser to certain Hartford Funds.
- An invisible barrier designed to prevent unauthorized access to Hartford Fund’s corporate network.
- All potential conflicts of interest need to be _________.
- Protection of internet-connected systems from cyber-attacks, protect against unauthorized access to data centers and other computerized systems.
- Who is responsible for making sure all reportable accounts, trades, and holdings are appropriately and timely disclosed in MyComplianceOffice?
- Vendor employees use to attest/complete various Compliance related activities (reportable account disclosure, outside business requests, limited partnership requests, etc).
- Encouraging a Financial Advisor to invest his clients in Hartford Funds Core Equity Fund because the Fund will outperform its benchmark during the next 2 years is inappropriate. Use of such language is considered?
- Dedicated to investor protection and market integrity through effective and efficient regulation of broker-dealers.
- Department hired by Hartford Funds to lifeguard the firm.
- Compliance is not an act, it’s a _______.
23 Clues: Hartford Funds Chief Compliance Officer. • Compliance is not an act, it’s a _______. • Unacceptable or improper behavior by an employee. • Moral principles that govern a person’s behavior. • Travel & Expense items are input into this system. • All potential conflicts of interest need to be _________. • Department hired by Hartford Funds to lifeguard the firm. • ...
Making it hard for Taylor 2021-02-15
Across
- What you submit when you have technical issues
- Method protecting internet connected systems from hackers and other threats.
- The third component for bundling
- What a policy cannot be in the name of
- This policy type will bundle a monoline auto policy
- They are ineligible for new business (abbreviation)
- A way to move funds from your 401K into an IRA
- Type of coverage required as a pre-requisite to some policies.
- Complete or finalize a policy
- Homes that are in this state are ineligible risks for Allstate Homeowners policies.
- Adhering to the rules set forth for writing new policies
- Insures classic vehicles
- What a policy must be in the name of
- The first component for bundling
- What you need to sell insurance
- Method of obtaining personal information
- New auto product (not yet available in CO) that offers pay per mile.
- How sales people are often paid
- Vehicle that can go on a Specialty Auto policy
Down
- Allstate home page
- Can be listed as an additional insured on a policy
- on a Home policy there is a separate deductible for this
- A contract by which an individual receives reimbursement for a loss
- A form of financial product that Allstate sells
- A type of home that Allstate cannot write a landlord policy for
- A type of vehicle usage on an auto policy
- There are limitations on how many you can have on a homeowner policy
- A type of profession ineligible for Allstate PUP's
- American modern program to insure motorcycles, orv, scooters etc.
- Private or intended to keep secret
- Legally or officially acceptable
- Allows us to offer policies that Allstate can't write
- Type of peril that a homeowner policy never covers
- How we determine premium amounts
- Information that, when used alone or with other data, can identify an individual. (abbreviation)
- Allstate reporting system
- Way to communicate with Allstate support
- The second component for bundling
- Homes must be this to qualify for a Home Owner policy.
- Way to let Allstate know about compliance issues or unethical business practices.
- Tool to estimate reconstruction cost
41 Clues: Allstate home page • Insures classic vehicles • Allstate reporting system • Complete or finalize a policy • What you need to sell insurance • How sales people are often paid • The third component for bundling • Legally or officially acceptable • How we determine premium amounts • The first component for bundling • The second component for bundling • ...
Internet 2021-11-02
Across
- messages distributed by electronic means.
- is a computer or system that provides resources
- relating to the whole world
- facts provided
- not physically existing as such but made by software to appear to do so.
- is a document, commonly written in HTML
- relating to or characteristic of the culture of computers
- the notional environment in which communication over computer networks occurs.
- a website or web page providing access or links to other sites.
- is an online journal or informational website displaying information.
- designed to block unauthorized access while permitting outward communication.
- to obtain, examine, or retrieve
- is an organized collection of structured information.
- authority or, control within the Internet
- a group or system of interconnected people or things.
- services that run on the Internet, instead of locally on your computer.
- copy (data) from one computer system to another, typically over the internet.
- are used to connect two or more devices
Down
- is a collection of web pages and related content
- , is a computer network that uses wireless data connections between network nodes
- to transfer from a computer or other digital device to the memory of another device
- controlled by or connected to another computer or to a network.
- the application of scientific knowledge for practical purposes
- a global computer network providing a variety of information.
- means of sending or receiving information
- is a multiple of a byte
- a thing made or adapted for a particular purpose
- takes signals from your ISP.
- a group of binary digits or bits (usually eight) operated on as a unit.
- is a top-level domain, also known as a TLD.
- is the practice of defending computers, servers, mobile devices, electronic systems, Networks, and data from malicious attacks.
- utilizing devices constructed
- A symbol on a display screen indicating that the computer is waiting for input
- contains data that is stored for a short amount of time,
- information processed or stored by a computer
- a post made on the social media application
- commonly known as the Web.
- occurs when a computer program such as a software application or an operating system stops
- not controlled by or directly connected to a computer or external network.
39 Clues: facts provided • is a multiple of a byte • commonly known as the Web. • relating to the whole world • takes signals from your ISP. • utilizing devices constructed • to obtain, examine, or retrieve • is a document, commonly written in HTML • are used to connect two or more devices • messages distributed by electronic means. • means of sending or receiving information • ...
Internet 2021-11-02
Across
- to transfer from a computer or other digital device to the memory of another device
- is a top-level domain, also known as a TLD.
- is the practice of defending computers, servers mobile devices, electronic systems, Networks, and data from malicious attacks.
- is a computer network that uses wireless data connections between network nodes
- utilizing devices constructed
- a thing made or adapted for a particular purpose
- is a collection of web pages and related content
- a website or web page providing access or links to other sites.
- copy (data) from one computer system to another typically over the internet.
- is an online journal or informational website displaying information.
- not physically existing as such but made by software to appear to do so.
- the notional environment in which communication over computer networks occurs.
- the application of scientific knowledge for practical purposes
- are used to connect two or more devices
- messages distributed by electronic means.
- A symbol on a display screen indicating that the computer is waiting for input
- is a document, commonly written in HTML
- occurs when a computer program such as a software application or an operating system stops
Down
- is an organized collection of structured information.
- means of sending or receiving information
- not controlled by or directly connected to a computer or external network.
- contains data that is stored for a short amount of time,
- takes signals from your ISP.
- is a computer or system that provides resources
- facts provided
- to obtain, examine, or retrieve
- commonly known as the Web.
- is a multiple of a byte
- relating to the whole world
- controlled by or connected to another computer or to a network.
- information processed or stored by a computer
- a group of binary digits or bits operated on as a unit.
- designed to block unauthorized access while permitting outward communication.
- a global computer network providing a variety of information.
- relating to or characteristic of the culture of computers
- a group or system of interconnected people or things.
- services that run on the Internet, instead of locally on your computer.
- authority or, control within the Internet
- a post made on the social media application
39 Clues: facts provided • is a multiple of a byte • commonly known as the Web. • relating to the whole world • takes signals from your ISP. • utilizing devices constructed • to obtain, examine, or retrieve • are used to connect two or more devices • is a document, commonly written in HTML • means of sending or receiving information • authority or, control within the Internet • ...
Technology CW 2023-06-07
Across
- is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems
- is a method of representing data in a visual, machine-readable form
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems
- is a digital multimedia container format most commonly used to store video and audio, but it can also be used to store other data such as subtitles and still images
- is a mapping from some domain
- is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on June 15, 1987
- is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code
- is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- is a mobile operating system
Down
- is an American multinational technology company
- is a hardware or software component that stores data so that future requests for that data can be served faster
- is the most important processor in a given computer. Its electronic circuitry executes instructions of a computer program
- is a collection of discrete values that convey information
- represents text, computer processor instructions, or any other data using a two-symbol system
- is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg
- is a method of transmitting and receiving messages using electronic devices
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device
20 Clues: is a mobile operating system • is a mapping from some domain • is an American multinational technology company • is a collection of discrete values that convey information • is a method of representing data in a visual, machine-readable form • is a method of transmitting and receiving messages using electronic devices • ...
FITDVocab.jf 2013-05-15
Across
- a picture or drawing that symbols your company
- is a hardware device that enables a computer to send and receive information over telephone lines
- refers to telecommunications that provide a variety of channels of data over a single
- wired internet
- wifi
- passcodes are an example of this
- SSID
- where you put a flash drive
- someone that has control over their internet or wifi
- where you get more plugins
- a phrase that you made up
- apps
- A quotation from or reference to a book, paper, or author, esp. in a scholarly work
- CPU
- how you act online
- the brain of the computer
- KB
- google is an example of this
- LED
- MB
- it is used to save and access from anywhere
- An oath of office is an oath or affirmation a person takes before undertaking the duties of an office
- is physically connected to your computer or something that can be physically touched
- internet world
- the object that you move the cursor with
- something that you made that tells someone about you
- main storage
Down
- is used to connect a computer mouse or keyboard to an IBM compatible computer
- GB
- searches the search engines
- taking someones work
- LCD
- 3g 4g
- is the most commonly found software on the computer
- A computer or computer program that manages access to a centralized resource or service in a network.
- is a hardware device that allows a computer to perform an additional function
- something that holds documents
- where you plug in to get music
- ISP
- RAM
- something the computer sends out
- being safe on internet
- is a software program that enables the computer hardware to communicate and operate with the computer software
- something you insert into the computer
- iphone is an example
- something you type on like word
- where you put a CD in
- is a collection of instructions that enables a user to interact with the computer or have the computer perform specific tasks for them
- information about something
- visual display screen
50 Clues: GB • KB • MB • LCD • ISP • RAM • CPU • LED • wifi • SSID • apps • 3g 4g • main storage • wired internet • internet world • how you act online • taking someones work • iphone is an example • where you put a CD in • visual display screen • being safe on internet • a phrase that you made up • the brain of the computer • where you get more plugins • searches the search engines • where you put a flash drive • ...
FITA Vocab. SLL 2013-05-16
Across
- a screen for displaying a picture
- a little magazine type thing that some businesses pass out
- a catchy phrase for a business
- allows you to use the internet
- liquid crystal display
- an input which you use to scroll around on the computer
- allows you to use the internet even if you don't have WIFI
- a device that operates separately from the computer but is connected to it
- a ceremonial induction into office
- ex:3G
- ex: you use a what to put your stuff on when you use prezi
- software program designed to preform a function to help a user
- random access memory
- ex: Microsoft Windows
- ex:Xfinity or Comcast
- a program on the web that saves all of your fill
- a thing you can do to make sure your work does not get taken
- allows you to play CDs
- an organization that tries to keep us safe online
- protecting your information online
- a prefix used to describe computers
- ex: a special type of light bulb
- ex: you can plug you headphones into this
- ex:printer
- a search engine that gives you results form more than one search engine
Down
- an image that you have for you company
- ex: IPHONE 5
- ex:mouse
- ex: pictures from your vacation
- an act of acknowledging that you used someones work
- sets of programs on computers
- heavy gamers may use these
- a program that allows you to search the web
- an oath you take before entering into an important job
- an online program that allows you to create a Presentation
- you can plug your flash drive into this
- who what why
- ex: you can create one on word
- promoting your business on things like billboards
- sequence of instructions written to be preformed by a computer
- rules and behaviors designed to keep us safe online
- long term storage
- ex:DSL
- you plug in game consuls to this port
- items of equipment
- to electronic device that allows it to be possible to send things in between computers
- how you act online
- the brain of the computer
48 Clues: ex:3G • ex:DSL • ex:mouse • ex:printer • ex: IPHONE 5 • who what why • long term storage • items of equipment • how you act online • random access memory • ex: Microsoft Windows • ex:Xfinity or Comcast • liquid crystal display • allows you to play CDs • the brain of the computer • heavy gamers may use these • sets of programs on computers • a catchy phrase for a business • ...
Science, Technology, and Society 2024-12-15
Across
- computing: Processing data near its source.
- New or improved ideas/products.
- Literacy: Understanding media messages.
- Highest biological group.
- Water vapor in the sky.
- Machine for processing information.
- Exists in a digital world.
- oxide: Laughing gas and pollutant.
- Holding radical views.
- Group of related organisms.
- Range of different things.
- Level under class.
- Basic unit of biological classification.
- Early device to play music.
- change: Global weather patterns shifting.
- Division: Separation within society.
- Games: Interactive digital entertainment.
- Level below phylum.
- Grouping above species.
- resources: Freshwater supply.
- Day-to-day atmospheric conditions.
- hacker: Legal cybersecurity tester.
- Prevents infectious diseases.
- World becoming interconnected.
- Unrest: Protests or disturbances in society.
- Global network of networks.
- Classification of living things.
- warming: Rising Earth's temperatures.
- Services for maintaining health.
- security: Reliable access to food.
- Key electronic component.
- Tools to make life easier.
- Long-term weather patterns.
- Organized in levels.
Down
- Related to DNA or heredity.
- Traffic or decision-making standstill.
- Using resources too much.
- media: Online platforms to connect people.
- A machine to write letters.
- Enhances reality with digital elements.
- security: Protecting digital information.
- migration: Large-scale movement of people.
- Mini computer in your pocket.
- Digital letter service.
- Keeping personal information safe.
- Early system to send messages.
- induced: Caused by nature.
- wide web: Connects websites globally.
- Potent greenhouse gas.
- Community of living and nonliving things.
- Second level in classification.
- gases: Trap heat in Earth's atmosphere.
- dioxide: A major greenhouse gas.
- Machines doing tasks automatically.
- areas: Lands near the sea.
- Variety of life on Earth.
- Uneven distribution of resources.
- Device to talk over distance.
- Tiny particles in the air.
- induced: Result of human activity.
60 Clues: Level under class. • Level below phylum. • Organized in levels. • Holding radical views. • Potent greenhouse gas. • Water vapor in the sky. • Digital letter service. • Grouping above species. • Using resources too much. • Highest biological group. • Variety of life on Earth. • Key electronic component. • Exists in a digital world. • induced: Caused by nature. • Range of different things. • ...
Thematic Puzzle 2024-12-24
Across
- – Permanent alteration in DNA.
- – Weakness in a system exploitable by threats.
- – Group of the same species in an area.
- – Step-by-step procedure for solving a problem.
- – Interpretation of data to uncover insights.
- – Protection of systems and data from threats.
- – Any living thing.
- – Malware disguised as legitimate software.
- – Program converting code into executable form.
- – Security system controlling network traffic.
- – Rate at which data is transmitted.
- – Remote storage and computing service.
- – Malicious code that replicates itself.
- – Malware spreading across networks independently.
- – Process by which plants convert sunlight into energy.
- – Process of converting data into a secure code.
- – Update to fix software vulnerabilities.
- – Structure carrying genetic material.
- – Interconnected system of organisms and their environment.
- – Natural home of an organism.
- – Imitation of a real-world process.
- – Trait improving survival in an environment.
- – Maximum data transfer rate of a network.
- – Pre-built code structure for development.
- – Identifying and removing errors in code.
- – Different forms of a gene.
- – Data structure with a "first-in, first-out" principle.
- – Temporary storage for faster data access.
- – Block of code performing a specific task.
Down
- – Use of technology to perform tasks without human intervention.
- – Ability of a system to handle growth.
- – Point of interaction between components.
- – Repeating a process to improve a result.
- – Study of heredity and variation.
- – Software recording keystrokes.
- – Software secretly monitoring user activity.
- – Unit of data sent over a network.
- – Security measure for controlling network traffic.
- – Individual gaining unauthorized access to systems.
- – Reasoning principles in problem-solving.
- – Symbol representing a value in programming.
- – Set of rules governing data exchange.
- – Unsolicited and often harmful messages.
- – Device directing data traffic on a network.
- – Process of verifying identity.
- – Variety of life in a particular habitat.
- – Process of change in species over time.
- – Process of energy production in cells.
- – Organized collection of data.
- – Computer providing data to other computers.
- – Data structure storing elements in indexed order.
- – Improving efficiency and performance.
- – Rules for writing code in a programming language.
- – Group of organisms capable of interbreeding.
- – Securing information through encoding.
- – Copy of data for recovery.
- – Fraudulent attempt to obtain sensitive information.
- – Characteristic determined by genetics.
- – Malicious software designed to harm systems.
- – Delay in data transmission.
60 Clues: – Any living thing. • – Copy of data for recovery. • – Different forms of a gene. • – Delay in data transmission. • – Permanent alteration in DNA. • – Natural home of an organism. • – Organized collection of data. • – Software recording keystrokes. • – Process of verifying identity. • – Study of heredity and variation. • – Unit of data sent over a network. • ...
Chapter 2 - Methods of Security Attacks 2025-08-11
Across
- The final stage of the Cyber Kill Chain where the attacker achieves their ultimate goal, such as stealing data or deploying ransomware.
- The act of listening in on a conversation or monitoring network traffic.
- A type of attack that involves inserting harmful software into a system to cause damage, steal data, or disrupt operations.
- The simple tactic of following closely behind a person who has just used their access card or PIN to gain physical access to a room or building.
- A type of attack where the attacker is physically close to the target system.
- A form of social engineering attack over Voice over IP (VoIP).
- Deliberate attempts by hackers to breach the security of computers, networks, or systems to steal, alter, or destroy sensitive data.
- A type of attack where the attacker does not make changes to the system but rather does such things as eavesdropping or monitoring data transmissions.
- A type of attack that relies on persuading a person to reveal information.
- Pretending to be a trusted person or entity to gain unauthorized access to information, systems, or resources.
- A method to make a service or network unavailable by overwhelming it with traffic or resource requests.
Down
- A method or technique that a hacker uses to gain access to a network in order to inject a "bad code".
- A type of social media phishing where attackers impersonate customer support accounts or organizations on platforms like Twitter, Facebook, or Instagram to trick people into revealing their personal information.
- A type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity.
- A physical intrusion that involves modifying the data stream or attempting to gain unauthorized access.
- Carried out through text messages (SMS), tricking victims into sharing personal information or clicking on harmful links.
- The process of an attacker gathering information about a network for a future attack.
- A specific type of spear phishing aimed at high-level executives or important individuals.
- Attacks using backdoors introduced to hardware or software systems at the time of manufacture.
- An attack from inside users, who use their access credentials and knowledge of the network to attack the target machines.
20 Clues: A form of social engineering attack over Voice over IP (VoIP). • The act of listening in on a conversation or monitoring network traffic. • A type of attack that relies on persuading a person to reveal information. • A type of attack where the attacker is physically close to the target system. • ...
7MT Digital Technology Vocabulary 2024-11-14
Across
- A physical point in a bitmap image or on a display device that corresponds to the smallest addressable element within the bitmap. On a computer screen, it represents a single dot or point.
- A result of something (physical or virtual), such as power, energy, action, material or information produced by a person, machine or a system.
- The usability, ease of use, and pleasure provided in the interaction between the customer and the product is known as User E...
- The protection provided to the creators of original works that offers a legal framework for the control and reproduction or transmission of their creations, it protects written works, computer programs and artistic works.
- A step-by-step procedure required to solve a problem.
- The protection of internet-connected systems, including hardware, software and data, from cyberattacks.
- An international encoding standard for use with different languages and scripts, by which each letter, digit or symbol is assigned a unique numeric value that applies across different platforms and programs.
- A security protocol designed to create secure wireless (wi-fi) networks.
Down
- The means by which users interact with computer hardware or software. In software, this usually comprises fields for text and number entry, mouse pointers, buttons and other graphical elements. In hardware, switches, dials and light-emitting diodes (LEDs) provide information about the interactions between a user and a machine is a User I...
- Traces of data left behind by a person using a digital system is a Digital F...
- The programs and other operating information used by a computer.
- The collection of physical components that constitute a computer system, all of which are tangible objects.
- Data or information put into a digital system to activate or modify a process.
- To break a complex problem or solution into parts that are easier to understand, design and implement.
- The method a digital system uses to store and manipulate data, it is a numeric system that uses only two digits, 0 and 1.
- Raw, unorganised facts and figures.
16 Clues: Raw, unorganised facts and figures. • A step-by-step procedure required to solve a problem. • The programs and other operating information used by a computer. • A security protocol designed to create secure wireless (wi-fi) networks. • Data or information put into a digital system to activate or modify a process. • ...
Technology 2025-01-29
Across
- It’s the technology that designs and builds machines or devices that can perform tasks automatically, often like humans do, without needing direct control.
- It’s a virtual world where people can interact with each other and digital environments in real time, often using avatars, just like in real life, but online.
- It’s the ability of computers or machines to think, learn, and solve problems on their own, similar to how humans use their brains to understand things and make decisions.
- It’s the science of creating and using extremely small materials and devices, often at the level of atoms and molecules, to solve problems or improve things like medicine, electronics, and energy.
- It’s the practice of protecting computers, networks, and data from being accessed or damaged by hackers or other online threats.
Down
- It’s a type of computing that uses tiny particles to process information in a way that’s much faster and more powerful than regular computers, allowing it to solve complex problems.
- It’s a way of storing and accessing data or programs over the internet instead of on your computer, so you can use them from anywhere with an internet connection.
- It’s the technology that blends real and virtual worlds, allowing people to experience things like 3D environments, simulations, or interactive spaces, using devices like headsets.
- It’s the use of data, patterns, and trends to make guesses about what might happen in the future, like predicting sales or how likely something is to occur.
- Hi, can you write like student a simple and short definition of Artificial intelligence without using this word
10 Clues: Hi, can you write like student a simple and short definition of Artificial intelligence without using this word • It’s the practice of protecting computers, networks, and data from being accessed or damaged by hackers or other online threats. • ...
PRBENLC 1 2024-04-29
Across
- possess critical thinking skills in understanding all societal issues
- refers to criminal activities that are conducted using computers, networks, or digital technologies as tools, targets, or mediums.
- means having a good understanding of cybersecurity practices, online etiquette, digital privacy, and the ability to use technology responsibly.
- refers to the status of a user being actively connected and available for interaction on a specific social media platform.
- entails taking responsibility for one's role in cyberspace
- develop an understanding of online security, identity and data management in our own literacy practices
- refers to the understanding, knowledge, and consciousness individuals have about the risks, challenges, and opportunities present in the digital environment
- a term that refers to a new form of literacy that goes beyond traditional literacy skills such as reading and writing
- refers to the digital persona or representation of an individual in the online world.
- global network of interconnected computer networks
- are used to track user activity, store preferences, remember login information, and personalize the browsing experience
- refers to the digital trail or record of one’s online activities, interactions, and presence across digital platforms and networks.
- refers to the practice of protecting computer systems, networks, devices, and data from cyber threats
- a Complex and multifaceted
- develop an understanding of the processes, procedures and systems that lie behind digital technologies rather than the specific elements of software/hardware involved.
- type of cyber attack in which cybercriminals use deceptive tactics to trick individuals into providing sensitive information, such as passwords, usernames, credit card details, or personal data
- is a software program designed to detect, prevent, and remove malicious software
- describe the ability to effectively manage and navigate the vast amount of information available in the digital age
- developing a cultural component of digital literacy
- also known as “Redditors,” can vote on submissions, comment on posts, and engage in discussions on a wide range of topics, interests, and communities.
- short for malicious software
- various forms of communication channels and platforms used to deliver information
Down
- develop the Constructive element It is the need to understand and demonstrate how to take existing resources and content to create something new that benefits our learning.
- refers to a fraudulent scheme or deceptive practice conducted online
- refers to the right of individuals to control their personal information and data in the digital realm.
- refers to a type of malicious software (malware) that is designed to replicate itself and infect computer systems, networks, and devices
- the need to assess and review on our own competence with digital technologies
- deliberate and malicious attempt to compromise, disrupt
- develop the cognitive element by engaging with a wide range of operating systems, platforms, devices and software and looking for developmental and training opportunities that expose to digital or cyber tools.
- Short for web browser
- a popular digital music streaming service that provides users with access to a vast library of music, podcasts, and other audio content.
- refers to any physical hardware component or electronic gadget that is used to perform specific functions, tasks, or operations.
- The one who identify the several of the digital tools that can be used for educational purpose
- pertains to the practices, measures, and awareness individuals need to ensure their security and well-being in the online environment.
- develop an awareness of how digital environment can help people self-organize and foster links with local, national and global organizations.
- individual who possess a range of digital skills
- process of encoding information in such a way that only authorized parties can access and read it
- refers to the virtual environment created by interconnected computer systems and digital networks
- refers to data that has been processed, organized, and presented in a meaningful context for a specific purpose.
- an individual with advanced technical skills and knowledge of computer systems, networks, and software who uses their expertise to gain unauthorized access to digital systems
- type of cybercrime in which an individual’s personal information is stolen and used by someone else without their permission
- collection of web pages that are typically related and interconnected by hyperlinks
- in the digital world is defined as the qualities that a person is expected to have
- cyber literacy also known as
- digital information that is generated, processed, stored, and transmitted within computer systems, networks, and digital platforms.
- this includes understanding the many different ways we can communicate with different devices, including mobile and other digital devices.
- serve as a form of security measure to protect sensitive information
- a popular online video-sharing platform that allows users to watch, upload, share, and comment on videos.
- is used to describe technologies, systems, and processes that operate using digital data and electronic signals
49 Clues: Short for web browser • a Complex and multifaceted • cyber literacy also known as • short for malicious software • individual who possess a range of digital skills • global network of interconnected computer networks • developing a cultural component of digital literacy • deliberate and malicious attempt to compromise, disrupt • ...
Computer Careers 2024-05-10
Across
- database administrators (DBAs) manage and maintain databases used by organizations to store and organize data. They ensure data security, optimize database performance, and troubleshoot issues as they arise.
- network administrators are responsible for the design, implementation, and maintenance of an organization's computer networks. They manage network hardware, troubleshoot connectivity issues, and ensure network security.
- systems analysts analyze an organization's computer systems and processes to identify areas for improvement. They work with stakeholders to gather requirements, design solutions, and oversee system implementation.
- computer hardware engineers design, develop, and test computer hardware components such as processors, memory devices, and circuit boards. They may also optimize existing hardware to improve performance and efficiency.
- IT support specialists provide technical assistance to users experiencing computer-related issues. They troubleshoot hardware and software problems, install and configure computer systems, and provide training to users.
- cybersecurity analysts protect computer systems and networks from cyber threats such as hacking, malware, and data breaches. They monitor for security incidents, implement security measures, and develop response plans.
Down
- web developers design and create websites. They are responsible for both the technical aspects of website construction, such as coding and scripting, as well as the visual design and user experience.
- data scientists analyze complex data sets to extract insights and inform business decisions. They use statistical analysis, machine learning algorithms, and programming skills to uncover patterns and trends in data.
- software developers design, develop, and maintain computer software and applications. They analyze user needs, create software solutions, and ensure that programs function correctly.
9 Clues: software developers design, develop, and maintain computer software and applications. They analyze user needs, create software solutions, and ensure that programs function correctly. • ...
Tech Puzzle 007 2022-08-30
Across
- refers to engaging audiences who have already interacted with your brand, to encourage them to take a desired action that may interest them, such as conversion.
- is a business-driven, disciplined approach that organizations use to rapidly identify, vet and automate as many business and IT processes as possible.
- a branch of advanced analytics that predicts about future outcomes using historical data combined with statistical modeling, data mining techniques and machine learning.
- a set of practices, tools, and a cultural philosophy that automate and integrate the processes between software development and IT teams.
- refers to off-the-shelf AI tools that enable companies to implement and scale AI techniques at a fraction of the cost of a full, in-house AI.
Down
- is the practice of deploying people, policies, processes and technologies to protect organizations, their critical systems and sensitive information from digital attacks.
- is a strategy in which retailers and brands engage customers through multiple, integrated digital and physical touchpoints, such as physical stores, websites, social media, and apps.
- a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that the record cannot be altered retroactively without the alteration of all subsequent blocks and the consensus of the network.
- a distributed computing paradigm that brings computation and data storage closer to the sources of data.
- a fully managed SaaS that provides a single platform for data warehousing, data lakes, data engineering, data science, data application development, and secure sharing and consumption of real-time / shared data.
- is a software application used to engage with customers alongside the classic customer service channels like phone, email, and social media.
11 Clues: a distributed computing paradigm that brings computation and data storage closer to the sources of data. • a set of practices, tools, and a cultural philosophy that automate and integrate the processes between software development and IT teams. • ...
Cyber Security Words and Terms 2022-09-15
Across
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- Text that can be read by the human eye, like this article!
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The deliberate use of someone else's identity, typically for financial gain.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Software that has their code listed as free to use, share, and modify.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- A simple form of code for software that can be written in word editors.
- Customizable additions to software for extra functionality.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
21 Clues: Text that can be read by the human eye, like this article! • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • ...
Malwarebytes 2022-09-19
Across
- malware attached to another program (such as a document) which can replicate and spread after an initial execution on a target system where human interaction is required.
- a network attack wherein threat actors force numerous systems (usually infected with malware) to send requests to a specific web server to crash, distract, or disrupt it enough that users are unable to connect to it.
- programs that may include advertising, toolbars, and pop-ups that are unrelated to the software you downloaded.
- What's the acronym for a program that creates a secure connection to the internet by encrypting all your online traffic and routing it through a point-to-point connection.
- A group of computers that are under the control of a common operator and administered as one unit.
- which company gives you cybersecurity for every one
- A form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.
- Firmware is software that is written to a hardware device's memory. It is used to run user programs on said devices.
- a private network with restricted access.
- a company that provides users with internet services.
Down
- A type of malware that gathers information on a device and sends it to a third-party actor or organization that wouldn't normally have access.
- the use of online advertising to distribute malware with little to no user interaction required.
- Undesired communication, often an email or call, that gets sent out in bulk.
- scams that attempt to obtain your information by presenting themselves as legitimate websites, then asking for your password, credit card details, or other sensitive information.
- malicious software
- A software program that allows users to control another system as if they have physical access to it.
- programs that claim to perform one function but actually do another, typically malicious.
- a term we use to generally describe a fake or false warning.
- A 2-dimensional barcode. They are squares filled with black and white blocks invented to keep track of cars during manufacturing.
- the process of changing data in a way that can not (easily) be undone (or decrypted) by parties that don't have a certain key.
20 Clues: malicious software • a private network with restricted access. • which company gives you cybersecurity for every one • a company that provides users with internet services. • a term we use to generally describe a fake or false warning. • Undesired communication, often an email or call, that gets sent out in bulk. • ...
IS1 NetSec Newsletter Crossword Challenge #4 - AWS Certificate Manager 2023-11-09
Across
- A digital certificate that is no longer valid before its expiration date. (7+11)
- A DNS record specifying which CAs are authorized to issue certificates for a domain. (13+9+13)
- A list of certificates that have been revoked before their expiration date. (11+10+4)
- Encoding format for X.509 certificates. (13+8+5)
- AWS-Recommended verification method of a new ACM Certificate. (3+10)
- An extension in a certificate allowing additional identities to be bound to the subject. (7+11+4)
- Open-source toolkit for SSL/TLS. (4+3)
- An entity that issues and manages digital certificates. (11+9)
- A cryptographic protocol for secure communication over a computer network, which falls under Layer-4 of the OSI Model. (9+5+8)
- Initial step in obtaining a digital certificate. (11+7+7)
- It's a DNS record for aliasing one domain to another, often used for verification of domain in ACM. (9+4)
- Automated process for certificate renewal for DNS Validated ACM Certificates. (7+7)
- A format for encoding SSL Certificates. (7+8+4)
- Covers all the subdomains with a single certificate for a domain. (8+11)
- Locations where list of revoked certificates can be obtained. (3+12+6)
Down
- A security standard to detect and prevent fraudulent SSL/TLS certificates. (11+12)
- Certificate with a signature of authenticity, but unlike most, this one vouches for itself. (4+6+11)
- Security mechanism ensuring a specific cryptographic key is associated with a particular certificate; a protective measure against man-in-the-middle attacks in the cybersecurity realm. (3+7)
- Certificate extension specifying the purposes for which the public key can be used. (8+3+5)
- Top-level Authority in a certificate hierarchy. (4+2)
- Amazon's service for managing private certificates. (3+7+2)
- Certificate extension specifying if it's a CA or not. (5+11)
- A certificate issued to a specific user, device, or server for authentication. (3+6+11)
- An API in AWS to initiate the process of obtaining an ACM Certificate. (7+11)
- The middle-man of SSL Certificates. (12+2)
- Repository of trusted certificates. (5+5)
- A protocol for checking the revocation status of certificates. (4)
- Sequence of certificates forming a trust path. (11+5)
- Trusted entity in certificate validation. (5+6)
29 Clues: Open-source toolkit for SSL/TLS. (4+3) • Repository of trusted certificates. (5+5) • The middle-man of SSL Certificates. (12+2) • Trusted entity in certificate validation. (5+6) • A format for encoding SSL Certificates. (7+8+4) • Encoding format for X.509 certificates. (13+8+5) • Top-level Authority in a certificate hierarchy. (4+2) • ...
Core English Vocabulary Test 2023-09-03
Across
- converting information using digital technologies.
- to examine the news.
- when someone wants to be alone and doesn't want anyone to disturb.
- someone who is addicted to technology.
- to confidently state or declare a belief or opinion.
- a rapid increase in something.
- to put forward reasons or evidence in support of a particular point of view.
- showing good judgment
- easy to believe in something.
- to have the same opinion.
- to talk about the problems of someone or something.
- to recognize or admit the truth or existence of a particular fact or situation.
- protection from digital attacks.
- to refuse someone to do something.
- to give special importance or prominence to a particular point or aspect.
- the measurement and analysis of unique physical or behavioral characteristics.
- to present something in an exciting way.
- to state that something is true, typically without providing concrete evidence.
- beliefs of doing the right things or morals.
- being responsible.
- to express a fact or opinion clearly and authoritatively.
- to claim or argue a particular point of view, often in a debate or disagreement.
Down
- to emphasize or bring attention to a significant part of what was said.
- to repeat or emphasize a statement to underscore its importance or validity.
- to excess.
- a procedure used for solving problems.
- not supported or proven with evidence.
- to rely on something all the time.
- to give someone cautionary advice.
- a new idea or device.
- to blame someone.
- to disclose or make known previously unknown information.
- to confess that you have done something.
- to tell someone incorrect information to make him/her misunderstand.
- the quality of trust and belief in something.
- being honest to someone or something.
- to propose or indicate something without stating it directly.
- to say sorry.
- to continue to state or affirm a particular statement or position.
- the use of automatic equipment.
- to provide information or details to make something clear or understandable.
- to verify or acknowledge the accuracy of a statement made by someone.
- a deceive or trick.
- to feel sad about having done something.
44 Clues: to excess. • to say sorry. • to blame someone. • being responsible. • a deceive or trick. • to examine the news. • a new idea or device. • showing good judgment • to have the same opinion. • easy to believe in something. • a rapid increase in something. • the use of automatic equipment. • protection from digital attacks. • to rely on something all the time. • ...
Spring 2024 Firm Meeting 2024-03-12
Across
- something PWA advisors help client protect
- one approach our tax controversy team takes with the IRS
- with x, a tax credit for manufacturing or product improvement Development see x
- investigating, often in fraud or legal situations
- a service that several departments have in their names
- where most of the firm’s new business is originated
- Managed blank Technology
- something BayBridge Real Estate Capital helps clients manage, find or refinance
- clue
- a type of business that gives back to the community, we do their taxes and audits
- an area of tax that especially impacts clients with operations in multiple states
- planning how PWA creates a comprehensive approach
- part of the name of several affiliates
- what many of our MST services entail
- a charity event the firm teams have contributed $2 million to since it started 14 years ago
- an activity that often uses talents from a variety of departments
- clue
- present blank analysis
- an area that helps HNW people manage their financial lives
Down
- what every company and high net worth family needs
- a lifechanging client event we can help with from planning to tax preparation to estate planning
- a governmental agency that scares of our clients but not us
- a specialty area of PWA
- a software platform MST helps implement at companies
- a type of entity that provides tax benefits for manufacturers and distributors that expert products
- a special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
- an acronym for solving repetitive tasks with robotics
- tax one of the firm’s key service areas
- diversity, equity and blank
- firm members speak in practice in more than this many languages
- estate the area of tax services BPB is probably most famous for
- the largest group in the firm and a typical entry point for multiple services
- how our HR departments help clients
- clue
- a special type of audit for public companies
- what we all aspire to do
- a core value brought to life by our participation in the DCC and Bounce Back from Cancer
- an acronym for a special type of insurance that is tax mitigation tool
- clue
- assessment what assurance and cyber teams often do
40 Clues: clue • clue • clue • clue • present blank analysis • a specialty area of PWA • Managed blank Technology • what we all aspire to do • diversity, equity and blank • how our HR departments help clients • what many of our MST services entail • part of the name of several affiliates • tax one of the firm’s key service areas • something PWA advisors help client protect • ...
Technology Advance 2024-07-14
Across
- - A set of rules governing the exchange or transmission of data between devices.
- - A step-by-step procedure for solving a problem.
- - A hardware or software component that stores data so future requests for that data can be served faster.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - The process of converting information or data into a code to prevent unauthorized access.
- - The programs and other operating information used by a computer.
- - A small segment of data sent over a network.
- - Internet of Things, a network of physical objects embedded with sensors and software.
- System - Software that manages computer hardware and software resources.
- - The amount of data that can be transmitted over a network in a given amount of time.
- - Finding and fixing errors in software code.
- - Measures taken to protect a computer or computer system against unauthorized access or attack.
- - Uniform Resource Locator, the address of a web page.
- - A device that modulates and demodulates signals for data transmission.
Down
- - Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- - Unsolicited messages sent over the internet, typically to many users.
- - A group of binary digits or bits (usually eight) operated on as a unit.
- - Information processed or stored by a computer.
- - The delay before a transfer of data begins following an instruction for its transfer.
- - Hypertext Markup Language, the standard markup language for documents designed to be displayed in a web browser.
- - A programming language commonly used in web development.
- - A type of malicious software that, when executed, replicates itself by modifying other computer programs.
- - A method of trying to gather personal information using deceptive emails and websites.
- - The smallest unit of data in computing.
- - Approximately one billion bytes.
- Address - A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- - A software application used to access and view websites.
- - Permanent software programmed into a read-only memory.
- - A computer or computer program that manages access to a centralized resource or service in a network.
- - Random Access Memory, a type of computer memory that can be accessed randomly.
30 Clues: - Approximately one billion bytes. • - The smallest unit of data in computing. • - Finding and fixing errors in software code. • - A small segment of data sent over a network. • - Information processed or stored by a computer. • - A step-by-step procedure for solving a problem. • - Uniform Resource Locator, the address of a web page. • ...
Technology Advance 2024-07-14
Across
- - A set of rules governing the exchange or transmission of data between devices.
- - A step-by-step procedure for solving a problem.
- - A hardware or software component that stores data so future requests for that data can be served faster.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - The process of converting information or data into a code to prevent unauthorized access.
- - The programs and other operating information used by a computer.
- - A small segment of data sent over a network.
- - Internet of Things, a network of physical objects embedded with sensors and software.
- System - Software that manages computer hardware and software resources.
- - The amount of data that can be transmitted over a network in a given amount of time.
- - Finding and fixing errors in software code.
- - Measures taken to protect a computer or computer system against unauthorized access or attack.
- - Uniform Resource Locator, the address of a web page.
- - A device that modulates and demodulates signals for data transmission.
Down
- - Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- - Unsolicited messages sent over the internet, typically to many users.
- - A group of binary digits or bits (usually eight) operated on as a unit.
- - Information processed or stored by a computer.
- - The delay before a transfer of data begins following an instruction for its transfer.
- - Hypertext Markup Language, the standard markup language for documents designed to be displayed in a web browser.
- - A programming language commonly used in web development.
- - A type of malicious software that, when executed, replicates itself by modifying other computer programs.
- - A method of trying to gather personal information using deceptive emails and websites.
- - The smallest unit of data in computing.
- - Approximately one billion bytes.
- Address - A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- - A software application used to access and view websites.
- - Permanent software programmed into a read-only memory.
- - A computer or computer program that manages access to a centralized resource or service in a network.
- - Random Access Memory, a type of computer memory that can be accessed randomly.
30 Clues: - Approximately one billion bytes. • - The smallest unit of data in computing. • - Finding and fixing errors in software code. • - A small segment of data sent over a network. • - Information processed or stored by a computer. • - A step-by-step procedure for solving a problem. • - Uniform Resource Locator, the address of a web page. • ...
Lesson 17 2025-02-11
Across
- Software installed to a web browser to handle multimedia objects embedded in web pages. Use of most plug-in types is now deprecated.
- Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.
- Malware that hijacks computer resources to create cryptocurrency.
- Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
- Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).
- Software that records information about a PC and its users, often installed without the user's consent.
- Microsoft's file-level encryption feature available for use on NTFS.
- Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.
- Class of malware that modifies system files, often at the kernel level, to conceal its presence.
- Browser mode in which all session data and cache is discarded and tracking protection features are enabled by default.
- Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.
- Computing environment that is isolated from a host system to guarantee that the environment runs in a controlled, secure fashion. Communication links between the sandbox and the host are usually completely prohibited so that malware or faulty software can be analyzed in isolation and without risk to the host.
Down
- Malicious software or hardware that can record user keystrokes.
- Windows mechanisms for automatic actions to occur when a peripheral storage device is attached.
- Add-on that uses the browser API to implement new functionality.
- Security mechanism that locks the desktop after a period of inactivity and requires user to authenticate to resume.
- Consequence of malware infection where DNS and/or search results are corrupted to redirect requests from legitimate site hosts to spoofed sites or ads.
- Type of malware that replicates between processes in system memory and can spread over client/server network connections.
- The process of isolating a file, computer system, or computer network to prevent the spread of a virus or another cybersecurity incident.
- Mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.
20 Clues: Malicious software or hardware that can record user keystrokes. • Add-on that uses the browser API to implement new functionality. • Malware that hijacks computer resources to create cryptocurrency. • Microsoft's file-level encryption feature available for use on NTFS. • ...
The Internet and IOE 2024-09-20
Across
- the exchange of data between devices in IoT
- text-based name corresponding to an IP address
- storage storing data online rather than on local devices
- connected physical devices that interact
- buying and selling goods or services online
- improves daily activities by connecting devices
- devices used to monitor and collect data
- symbols used to create and format webpages
- malicious software designed to harm or exploit systems
- sensors gather information for processing
- the increasing number of physical objects linked to the Internet
- IoT devices often rely on this type of connection
- IoT depends on more objects being linked
- top-level domain, like .com or .org
- the first page of a website
- technology used to track objects in IoT systems
- use of machines or systems to perform tasks without human intervention
- the information collected by IoT devices
- the network of interconnected physical devices
- realtime online text communication
- concept of connecting everything digitally
- small files stored on a computer that track online activities
- refers to physical objects connected to the Internet
- protocol used for transferring files between computers
- converting data into a secure format
- communication between devices without human input
- controlling devices without human intervention
Down
- controlling multiple devices from a single location
- tool for finding information on the Internet
- protecting the information collected by IoT devices
- software or hardware that blocks unauthorized access to a network
- practices designed to protect networks and data from attacks
- issues arising from IoT-connected devices
- sending audio or video content over the Internet in real time
- amount of data transmitted in a given time period
- the issue of personal data being exposed in IoT
- improved by the information provided by IoT
- process of receiving data from the Internet
- observing and tracking systems in IoT
- an electronic document on the web
- ensuring different IoT devices work together
- system that translates domain names into IP addresses
- electronic mail sent over the Internet
- wireless technology for Internet connections
- protecting IoT systems from cyber attacks
- the challenge of integrating multiple IoT systems
- computer that stores and delivers web pages to users
47 Clues: the first page of a website • an electronic document on the web • realtime online text communication • top-level domain, like .com or .org • converting data into a secure format • observing and tracking systems in IoT • electronic mail sent over the Internet • connected physical devices that interact • devices used to monitor and collect data • ...
Factors Influencing Business Decisions 2024-11-12
Across
- A simulated experience that can be similar to or completely different from the real world, created by computer technology.
- Financial technology innovations that improve and automate the delivery and use of financial services.
- Connecting computers and other devices to share resources and information.
- Writing instructions in a programming language to create software applications and systems.
- A set of rules or steps used to solve a problem or perform a computation.
- The simulation of human intelligence in machines designed to think, learn, and make decisions.
- Practices and technologies designed to protect systems, networks, and data from digital attacks.
- The physical components of a computer or other electronic devices.
- The manipulation of matter on an atomic or molecular scale to create materials with unique properties.
- Integrating digital technology into all areas of a business to improve operations and deliver value to customers.
- The field of study that combines domain expertise, programming skills, and knowledge of mathematics and statistics to extract meaningful insights from data.
- The process of designing, coding, testing, and maintaining software applications and systems.
- Advanced computing using quantum-mechanical phenomena, such as superposition and entanglement.
Down
- The use of technology to perform tasks with minimal human intervention.
- User Experience (UX) and User Interface (UI) design focused on creating products that provide meaningful and relevant experiences to users.
- A network of interconnected devices that can collect and exchange data.
- A subset of AI where systems automatically learn and improve from experience without explicit programming.
- Technology used in mobile devices like smartphones and tablets, allowing for wireless communication and computing.
- Computing: The delivery of computing services over the internet, including storage, processing power, and applications.
- The design, construction, and operation of robots capable of performing tasks autonomously or semi-autonomously.
- Electronic devices worn on the body, often used to track health and fitness metrics or provide convenient access to information.
- A decentralized digital ledger technology for securely recording transactions across multiple computers.
- Data: Large, complex data sets that require advanced tools for analysis, revealing patterns and trends.
- Software distribution model in which applications are hosted by a service provider and made available to customers over the internet.
- The buying and selling of goods and services over the internet.
25 Clues: The buying and selling of goods and services over the internet. • The physical components of a computer or other electronic devices. • The use of technology to perform tasks with minimal human intervention. • A network of interconnected devices that can collect and exchange data. • A set of rules or steps used to solve a problem or perform a computation. • ...
paper 1 computer science ocr v2 2025-05-12
Across
- The process the CPU follows to retrieve, interpret, and carry out instructions from memory.
- A cyberattack that overwhelms a system or network with excessive traffic to make it unusable.
- Small fast memory close to the CPU that stores frequently accessed data, speeding up performance.
- Non-volatile memory that stores essential data like the boot process; it cannot be modified easily.
- Computer systems built into devices like washing machines and cars, performing dedicated functions.
- Online storage that allows users to save and access files over the internet, such as Google Drive and OneDrive.
- Security systems that monitor and control incoming and outgoing network traffic to prevent unauthorized access.
- (Central Processing Unit) – The brain of the computer, executing instructions and performing calculations.
- threat Risks to digital systems, including malware, phishing, hacking, and social engineering attacks.
- A number system that uses only 0s and 1s to represent data in computers. It is the foundation of all computing, where each binary digit (bit) represents a power of 2.
- The arrangement of computers and devices within a network, including star, mesh, and bus topologies.
- A number system that uses base 16, including digits 0-9 and letters A-F. It is often used in computing for memory addresses and color codes, as it is more compact than binary.
- Software that manages hardware and software resources, such as Windows, macOS, and Linux.
Down
- A type of storage device that has no moving parts, making it faster and more reliable than traditional hard drives.
- Storage technology used in hard drives, where data is stored on spinning magnetic disks.
- The rate at which a CPU processes instructions, measured in GHz (gigahertz); higher speeds mean faster processing.
- A CPU with multiple cores, allowing for better multitasking and improved performance.
- A computer design model where data and programs are stored in the same memory and processed sequentially.
- A security measure that converts data into unreadable code to protect it from unauthorized access.
- Programs that help maintain and optimize system performance, like antivirus software and disk cleanup tools.
- Long-term storage devices like hard drives, SSDs, and USB flash drives used to store data permanently.
- Temporary storage used for running programs; data is lost when power is turned off.
22 Clues: Temporary storage used for running programs; data is lost when power is turned off. • A CPU with multiple cores, allowing for better multitasking and improved performance. • Storage technology used in hard drives, where data is stored on spinning magnetic disks. • Software that manages hardware and software resources, such as Windows, macOS, and Linux. • ...
IST Topic 1: Introduction to Computers and Systems. 2026-02-11
Across
- Checking system behavior before deployment
- Chip combining processor, memory, and I/O for embedded use
- Ability to work consistently over time
- Testing using real hardware connected to simulations
- Instructions/programs that tell hardware what to do
- Ability of components to work together without conflict
- Scaling CPU speed to balance power and performance
- Ability to handle harsh conditions or unexpected issues
- Wireless technology for short-range connections
- Software that performs the main user or system functions
- Signal that requests immediate CPU attention
- Wireless network technology for internet and LAN access
- Operating system designed for time-sensitive tasks
- Devices that carry out actions from control signals
- Low-power wireless protocol used in IoT devices
- Ability to grow capacity without redesigning everything
- Physical components you can see and touch
- High-speed serial interface for short-distance device communication
- Low-power state to save energy when idle
- Hardware and software developed together for efficiency
- External devices connected to a computer system
Down
- Confirming the system meets requirements in real conditions
- Security feature ensuring trusted startup software
- Responding to inputs within strict time limits
- System built for specific dedicated tasks
- Non-volatile memory often used to store firmware
- Techniques to reduce power usage in battery systems
- Protecting data by converting it into unreadable form
- General-purpose computing brain like a PC CPU
- Deciding which task runs when in an RTOS
- Internet-connected devices for monitoring and control
- Two-wire serial bus for connecting chips and sensors
- Running AI/ML directly on devices instead of the cloud
- Standard rules for devices to communicate correctly
- Limited CPU, memory, or energy in many systems
- Combination of hardware, software, and peripherals working as one unit
- Temporary memory used while the system is running
- Being connected to other devices or networks
- Low-power processor architecture common in integrated devices
- Making devices smaller while improving capability
- Protection against attacks in connected systems
- Low-level embedded software stored in ROM or flash
- Serial communication interface often used in embedded systems
- Devices that convert real-world data into electrical signals
- Non-volatile memory storing permanent instructions
45 Clues: Ability to work consistently over time • Deciding which task runs when in an RTOS • Low-power state to save energy when idle • System built for specific dedicated tasks • Physical components you can see and touch • Checking system behavior before deployment • Being connected to other devices or networks • Signal that requests immediate CPU attention • ...
Technology 2025-01-29
Across
- It’s the technology that designs and builds machines or devices that can perform tasks automatically, often like humans do, without needing direct control.
- It’s a virtual world where people can interact with each other and digital environments in real time, often using avatars, just like in real life, but online.
- It’s the ability of computers or machines to think, learn, and solve problems on their own, similar to how humans use their brains to understand things and make decisions.
- It’s the science of creating and using extremely small materials and devices, often at the level of atoms and molecules, to solve problems or improve things like medicine, electronics, and energy.
- It’s the practice of protecting computers, networks, and data from being accessed or damaged by hackers or other online threats.
Down
- It’s a type of computing that uses tiny particles to process information in a way that’s much faster and more powerful than regular computers, allowing it to solve complex problems.
- It’s a way of storing and accessing data or programs over the internet instead of on your computer, so you can use them from anywhere with an internet connection.
- It’s the technology that blends real and virtual worlds, allowing people to experience things like 3D environments, simulations, or interactive spaces, using devices like headsets.
- It’s the use of data, patterns, and trends to make guesses about what might happen in the future, like predicting sales or how likely something is to occur.
- It’s using technology to perform tasks automatically, without needing people to do them by hand, making things faster and more efficient.
10 Clues: It’s the practice of protecting computers, networks, and data from being accessed or damaged by hackers or other online threats. • It’s using technology to perform tasks automatically, without needing people to do them by hand, making things faster and more efficient. • ...
GenCyber Cybersecurity Concepts 2022-05-27
Across
- The property that information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
- The property that information is not disclosed to individuals, devices, or processes unless they have been authorized to access the information.
Down
- The property that information or information systems are accessible and usable upon demand.
3 Clues: The property that information or information systems are accessible and usable upon demand. • The property that information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner. • ...
Policy on Service and Digital 2020-09-01
Across
- Section 4.5 of the PSD includes requirements for the CIO of Canada and Deputy Heads on supporting __________ __________ and capability.
- The management of the functions under the PSD is guided by principles and best practice of the Government of Canada ______________ _______________
- The CIO of Canada is responsible for prescribing enterprise-wide __________ and ____________ standards for quality, accessibility and data interoperability.
- In alignment with a 2016 Direction, the PSD includes requirements for the CIO of Canada and Deputy Heads to support innovation and _____________.
- The objective of the PSD is that ______ ______ ________ and government operations are improved through digital transformation approaches
- Deputy Heads are responsible for maximizing the release of departmental information and data as an open resource, discoverable through the Government of Canada _______ _________ _____.
- The CIO of Canada will approve an annual, forward-looking three-year __________-wide plan that establishes strategic direction for the integrated management of service, information, data, IT, and cyber security.
- The Policy on _____ __ _____ articulates how Government of Canada organizations manage service delivery, information and data, information technology, and cyber security in the digital era
- Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________
Down
- Deputy Heads are responsible for ensuring that, when managing personal information or data, including in the context of data interoperability, the privacy of individuals is protected according to the _________ _____ and any other relevant legislation, policy or agreement.
- Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems.
- Deputy Heads are responsible for establishing __________ governance to ensure the integrated management of service, information, data, IT, and cyber security within their department.
- Deputy Heads must __________ the online end-to-end availability of services and their ease of use to complement all service delivery channels.
- The _____________ ___________________ Officer of Canada provides advice to the President and the Secretary of the Treasury Board of Canada about governing and managing enterprise-wide information, data, IT, cyber security, and service design and delivery.
- The PSD supports the mandate of the Minster for _______ _____________
- The CIO of Canada is responsible for defining ______ ________ requirements to ensure that Government of Canada and departmental information and data, applications, systems and networks are secure, reliable and trusted.
16 Clues: The PSD supports the mandate of the Minster for _______ _____________ • Deputy Heads are responsible for ensuring the responsible and ethical use of __________ ___________ systems. • Deputy Heads are responsible for ensuring that the development and delivery of services is ______-_____ ____ ________ • ...
Phishing for Madness 2022-02-25
Across
- Malicious software designed to block access to a computer system until a sum of money is paid.
- A phishing email that is from a trusted sender/business
- A tactic bad actors use to manipulate people to give up confidential/personal information. Note: fill in as one word.
- This is a type of scam in which a bad actor is disguised as a trusted source to gain access to important data or information.
- Stop. Call. Verify. Are best practices to prevent _______. Note: fill in as one word.
- This is a type of assessment the Information Security team conducts to educate associates on what to look for in malicious emails.
- This attack is accomplished through a voice call.
- The practice of protecting systems, networks, and programs from digital attacks.
Down
- This authentication method requires the user to provide two or more verification factors to access an account or platform. Note: fill in as one word.
- This type of phishing targets a specific group or type of individual such as a company’s system administrator.
- A ____________ is a sentence-like string of words used for authentication that is longer than a traditional password, easy to remember and difficult to crack.
- This type of phishing is an attack that uses text messaging or short message service (SMS) to execute the attack.
- This phishing is an even more targeted type of phishing that goes after the whales – a marine animal even bigger than a fish. These attacks typically target a CEO, CFO, or any CXX within an industry or a specific business.
- The team at Baird that provides security and awareness training and content to our associates. Note: fill in as one word.
- Name of the team that associates should notify if a mobile device containing Baird data is lost, stolen or compromised. Note: fill in as one word.
- _____ _____ is a trail of data you create while using the Internet which includes shopping, financial, health and fitness, and social data. Note: fill in as one word.
16 Clues: This attack is accomplished through a voice call. • A phishing email that is from a trusted sender/business • The practice of protecting systems, networks, and programs from digital attacks. • Stop. Call. Verify. Are best practices to prevent _______. Note: fill in as one word. • ...
Internet saftey 2025-02-26
Across
- the information about a particular person that exists on the internet as a result of their online activity.
- to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
- Flaming is distinct from trolling, which is the act of someone causing discord online or in person.
- the correct or acceptable way of communicating on the internet.
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- controls available on many websites and apps to limit who can access your profile and what information visitors can see.
- talk in a friendly and informal way.
- the practice of protecting systems, networks, and programs from digital attacks.
- the practice of preparing or training someone for a particular purpose or activity.
Down
- shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
- the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
- using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- A blog is a space where an individual, group, or organization can publish articles (also known as posts) on a regular basis. Blogs tend to include timely, relevant and updated content.
- attention-seeking behavior
- remembering your preferences, recording what you have put in your shopping basket, and counting the number of people looking at a website.
- unauthorized reproduction or distribution of someone's intellectual property without their consent.
- Ransomware is a type of malware (malicious software) designed to deny access to a user's data, usually by encrypting the data with a key known only to the hacker who deployed the malware, until a ransom is paid. Since 2018, there has been a 264% increase in large breaches reported to OCR involving ransomware attack
- a person who ruthlessly exploits others.
- someone who uses the internet, email, or other electronic communications devices to repeatedly threaten and harass another person.
19 Clues: attention-seeking behavior • talk in a friendly and informal way. • a person who ruthlessly exploits others. • the correct or acceptable way of communicating on the internet. • the practice of protecting systems, networks, and programs from digital attacks. • the practice of preparing or training someone for a particular purpose or activity. • ...
technology 2024-07-18
Across
- - Biological measurements or physical characteristics that can be used to identify individuals, such as fingerprints, iris patterns, or facial recognition.
- - A decentralized and distributed digital ledger used to record transactions across many computers in a secure way.
- Intelligence (AI) - The simulation of human intelligence in machines that are programmed to think and learn like humans.
- Security - Measures to protect the integrity and usability of a network and data within the network.
- - Measures taken to protect computer systems and networks from unauthorized access or attacks.
- Computing - The delivery of computing services (like servers, storage, databases) over the internet ("the cloud") to offer faster innovation, flexible resources, and economies of scale.
- - The interdisciplinary field of engineering and science that involves the design, construction, operation, and use of robots.
- - Unmanned aerial vehicles (UAVs) that can be remotely controlled or fly autonomously using software-controlled flight plans.
- Learning - A subset of AI that allows systems to learn and improve from experience without being explicitly programmed.
- Vision - Technology that enables machines to visually perceive the world, interpret images, and make decisions based on visual data.
- - Technology and science that deals with the manipulation of matter on an atomic, molecular, and supramolecular scale.
Down
- of Things (IoT) - The network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity that enables them to connect and exchange data.
- Reality (AR) - An enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with computer-generated sensory input such as sound, video, graphics, or GPS data.
- Mining - The process of analyzing large datasets to discover patterns, trends, and relationships.
- - The process of converting data into a code to prevent unauthorized access.
- Communication - Transfer of information between two or more points without using an electrical conductor as a medium.
- - A set of rules or instructions designed to solve a problem or perform a task.
- Reality (VR) - A computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way.
- Computing - A type of computing that uses quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.
- Data - Extremely large datasets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
20 Clues: - The process of converting data into a code to prevent unauthorized access. • - A set of rules or instructions designed to solve a problem or perform a task. • - Measures taken to protect computer systems and networks from unauthorized access or attacks. • Mining - The process of analyzing large datasets to discover patterns, trends, and relationships. • ...
Unit 1: Safety and Orientation 2016-05-25
Across
- is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.
- Any internet-related illegal activity.
- Refers to virtual sexual encounters between two or more persons.
- as adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes.
- intentionally harmful; spiteful
- Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
- is federal legislation in the United States that protects the privacy of students' personally identifiable information (PII). The act applies to all educational institutions that receive federal funds.
- the fact or condition of being affected by something or experiencing something
- A scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
Down
- requires public schools and libraries receiving federal e-rate funds to use a portion of those funds to filter their internet access.
- a machine that uses heated rollers to melt plastic onto paper for durability
- Methods individuals use to track, lure, or harass another person online.
- information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
- Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites)
- computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
- Any technique, software, etc., used to protect computers and prevent online crime.
- A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer.
- a machine that consist of a lever and a plate that uses a metal die with sharp edges to press into paper therefore cutting the paper into the shape of the die
18 Clues: intentionally harmful; spiteful • Any internet-related illegal activity. • Refers to virtual sexual encounters between two or more persons. • Methods individuals use to track, lure, or harass another person online. • a machine that uses heated rollers to melt plastic onto paper for durability • ...
Cabinet Departments 2025-12-09
Across
- manages the United States' nuclear infrastructure and administers the country's energy policy.
- works to improve the security of the United States. The Department's work includes customs, border, and immigration enforcement, emergency response to natural and manmade disasters, antiterrorism work, and cybersecurity.
- provides leadership on food, agriculture, natural resources, and related issues.
- advises the President and leads the nation in foreign policy issues. It also negotiates treaties and agreements with foreign entities and represents the United States at the United Nations.
- is responsible for planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation.
- provides the military forces needed to deter war, and to protect the security of the United States.
- enforces federal laws, seeks just punishment for the guilty, and ensures the fair and impartial administration of fair consequences
Down
- administers programs that provide housing and community development assistance. The Department also works to ensure fair and equal housing opportunities for all.
- is to promote student achievement and preparation for global competitiveness by fostering educational excellence and ensuring equal access for students of all ages.
- works with businesses, universities, communities, and the Nation’s workers to promote job creation, economic growth, sustainable development, and improved standards of living for Americans.
- administers federal work laws to guarantee workers' rights to fair, safe, and healthy working conditions, including minimum hourly wage and overtime pay, protection against employment discrimination, and unemployment insurance.
- presides over the U.S. Senate and takes over the role of president of the United States if the president is unable to perform their duties.
- runs programs benefiting veterans and members of their families. It offers education opportunities and rehabilitation services and provides compensation payments for disabilities or death related to military service, home loan guaranties, pensions, burials, and health care that includes the services of nursing homes, clinics, and medical centers.
- manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans. Additionally, they are responsible for endangered species conservation and other environmental conservation efforts.
- manages federal finances by collecting taxes and paying bills and by managing currency, government accounts and public debt.
15 Clues: provides leadership on food, agriculture, natural resources, and related issues. • manages the United States' nuclear infrastructure and administers the country's energy policy. • provides the military forces needed to deter war, and to protect the security of the United States. • ...
Unit Vocab 2021-09-28
Across
- a relatively unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites, according to the programming and hacking cultures.
- any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices
- A hacker that violates computer security for their own profit or gain
- the process of recognizing a user's identity'
- a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
- an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected"
Down
- parts of the Internet not fully accessible through standard search engines
- measurement and statistical analysis of people's unique physical and behavioral characteristics
- a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities
- people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.
- a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means
- the gaining of unauthorized access to data in a system or computer.
- the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- a social or political activist act that is carried out by breaking into and wreaking havoc on a secure computer system
15 Clues: the process of recognizing a user's identity' • the gaining of unauthorized access to data in a system or computer. • A hacker that violates computer security for their own profit or gain • parts of the Internet not fully accessible through standard search engines • measurement and statistical analysis of people's unique physical and behavioral characteristics • ...
Compliance Training 2022-10-10 2022-10-04
Across
- The signed contract that ICW has with our Clients; outlines our services, responsibility, liabilities and limitations
- A type of incident that may require Incident Response Team activation; can include cybersecurity and physical access
- The processing of fees paid by Clients; done monthly in advance based on prior month-end values
- A word or passphrase that is used to secure logins; must be a minimum of 16 digits containing uppercase, lowercase alpha, numerical and special characters
- A Client’s written dissatisfaction with the acts of a Supervised Person that demands rectification
- A __________ Client has been defined by the SEC ad being older than 62; is subject to additional monitoring to detect exploitation and abuse
- The set of documents consisting of the Form CRS, ADV Part 2A and 2B; provides information about the Firm's advisory services, business practices, professionals, policies and any actual and potential conflicts of interest, among other things
- The only Firm-approved social media platform
- Asset Disposal and ___________________; the proper process of removing Firm Information, physical assets, mobile devices and business equipment; must be logged
- A Federal Rule that governs the physical or electronic access and/or control of Client assets; includes the acceptance of cash or cash equivalents, and access to Client’s username and password
Down
- ___________ Theft; a growing issue aimed at mimicking Clients in order to obtain financial control
- Actual or hypothetical results presented to Clients; is under new scrutiny via the Marketing Rule
- Data __________________; organized into tiers based on data sensitivity; includes Firm Information, NPI, and Public Information
- The acronym of a Federal regulatory law that requires the reporting of cash deposits over $10,000 and OFAC screening; this is one reason why ICW does not accept cash
- The act of governing such Persons in a way that reasonably prevents violations of policies and procedures; an over-watch of conduct and adhesion to duties
- The absence of a hard-wired connection to the Firm’s network; using such access must be done via the Firm’s VPN and use of public connection is prohibited
- Penetration and _________________ testing; used to test the effectiveness of the Firm’s network and data security
- Supervised Person trading meets this when personal trading is completed in the last hour of the day, is less than 4% of the account’s value, or consists of shares that were held longer than 90 days
18 Clues: The only Firm-approved social media platform • The processing of fees paid by Clients; done monthly in advance based on prior month-end values • Actual or hypothetical results presented to Clients; is under new scrutiny via the Marketing Rule • ___________ Theft; a growing issue aimed at mimicking Clients in order to obtain financial control • ...
Tinkerers Lab + Kludge 2023-03-27
Across
- What interplanetary institution was once hacked by 15 year Olds leading to a 21 day shutdown
- Doug Engelbart was the inventor of what computer accessory? The first one was made from wood. You might find it either in the corner of a room or attached to your computer through a long cable, both in different senses.
- What animal could a firefox be called
- What was the spooky name of the first computer worm, created in 1971, that could be defeated by the first antivirus software (aptly named Reaper), a character of this namesake is also found in a famous Swedish Game that puts the player in a blank chunked world.
- What does the T in reCAPTCHA stand for
- A virus which attacks on other viruses. Also biological word for a virus that grows and divides inside a bacterium, destroying it
- WinVru was the virus first made for which OS
- According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation?
- The protection of computer systems and networks from attack by malicious actors that may result in unauthorized information getting leaker
Down
- What does the first "D" stand for in the common cybercrime known as a DDoS attack?
- A makeshift solution to a problem, especially a computer or programming problem.
- A computer connected to a network that a hacker has compromised
- The "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020, The name fits for a group of people not known because of their name.
- What is the process of analyzing the passage of data packets through a network called (A hound would do this action to a packet of drugs in an airport as well)
- A malicious software designed to give you unwanted ads without your consent, mostly in web browsers
- Hacking for a cause
- A person who enjoys fixing and experimenting with machines and their parts.
- What is a virtual environment which people use to open risky files inorder to protect their system from getting hurt
18 Clues: Hacking for a cause • What animal could a firefox be called • What does the T in reCAPTCHA stand for • WinVru was the virus first made for which OS • A computer connected to a network that a hacker has compromised • A person who enjoys fixing and experimenting with machines and their parts. • ...
The Role of Elections in Democratic Societies 2023-12-15
Across
- Political systems that are ostensibly democratic but where political power is not exercised by the people or their elected representatives in practice.
- A course or principle of action adopted or proposed by a government, party, business, or individual.
- Not subject to being taken away or given up; often used in reference to rights that cannot be relinquished or transferred from one person to another.
- A view or attitude toward a situation or event; an opinion.
- More than half of a total number; in the context of elections, it refers to receiving over 50% of the votes.
- The action or manner of governing a state, organization, etc.; the way that a city, company, etc., is controlled by the people who run it.
- The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- The quality of being trusted and believed in; the capacity to inspire belief or trust.
Down
- The act of preventing something from being expressed or known; in the context of voting, it refers to various strategies used to influence the outcome of an election by discouraging or preventing specific groups of people from voting.
- Pertaining to a system of government in which the executive branch derives its democratic legitimacy from, and is accountable to, the legislature (parliament); the executive and legislative branches are thus interconnected.
- The number of votes cast for a candidate who receives more than any other but does not receive an absolute majority.
- Supreme power or authority; in the context of a nation, the full right and power of a governing body over itself, without any interference from outside sources or bodies.
- The quality of being easy to see through or detect; in a political context, it refers to openness, communication, and accountability in government and other public sector activities.
- An instrument measuring atmospheric pressure, used especially in forecasting the weather and determining altitude; metaphorically, it refers to something that reflects changes in circumstances or opinions.
- The quality of being honest and having strong moral principles; moral uprightness.
15 Clues: A view or attitude toward a situation or event; an opinion. • The quality of being honest and having strong moral principles; moral uprightness. • The quality of being trusted and believed in; the capacity to inspire belief or trust. • A course or principle of action adopted or proposed by a government, party, business, or individual. • ...
Unit 1: Safety and Orientation 2016-05-25
Across
- Any internet-related illegal activity.
- as adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes.
- intentionally harmful; spiteful
- A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer.
- Any technique, software, etc., used to protect computers and prevent online crime.
- a machine that consist of a lever and a plate that uses a metal die with sharp edges to press into paper therefore cutting the paper into the shape of the die
- requires public schools and libraries receiving federal e-rate funds to use a portion of those funds to filter their internet access.
- Methods individuals use to track, lure, or harass another person online.
- information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
Down
- is federal legislation in the United States that protects the privacy of students' personally identifiable information (PII). The act applies to all educational institutions that receive federal funds.
- a machine that uses heated rollers to melt plastic onto paper for durability
- computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
- Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites)
- is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.
- Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
- A scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
- Refers to virtual sexual encounters between two or more persons.
- the fact or condition of being affected by something or experiencing something
18 Clues: intentionally harmful; spiteful • Any internet-related illegal activity. • Refers to virtual sexual encounters between two or more persons. • Methods individuals use to track, lure, or harass another person online. • a machine that uses heated rollers to melt plastic onto paper for durability • ...
Crack the Code 2.0 2024-01-18
Across
- Technology that peruses upon the make-up of genes, DNAs, their mapping, structure, etc.
- This clandestine online realm is often accessed through specialized browsers, with content hidden from traditional search engines.
- Cylindrical shaped items must be kept upright and any single item should touch exactly 3 items. Get the minimum number of items required for this configuration.
- Alon has got 5 new rocket boosters (all have been used at least once), 2 of which have been used same number of times and are of the same company and the other 3 have been used different number of times and they are of another company. The total number of times the boosters have been used is same for each company; so is the sum of the squares of the no. of times they individually have been used. Alon will reject the set of rocket boosters if any one of the 5 boosters have been used more than 9 times. Find the solution set showing the maximum number of times each booster has been used and get the sum of all the 5 numbers.
- Decoding a hidden message requires embracing the strategy of an ancient Roman's linguistic escapade.
Down
- Where data dances in digital mist, servers perform a hidden ballet, and connectivity rains down like a silent storm in the vast expanse of the technological sky.
- An architectural style that structures an application as a collection of small, independently deployable services.
- A deliberate act of making a defensive cloak for software secrets.
- A neurotechnology company that focuses on developing brain–machine interface (BMI) technologies.
- Despite the buzzing name, this enigmatic group declares, "I am not an insect." Instead, it's a clandestine collective leaving cybersecurity experts scratching their heads.
10 Clues: A deliberate act of making a defensive cloak for software secrets. • Technology that peruses upon the make-up of genes, DNAs, their mapping, structure, etc. • A neurotechnology company that focuses on developing brain–machine interface (BMI) technologies. • Decoding a hidden message requires embracing the strategy of an ancient Roman's linguistic escapade. • ...
malware program 2022-11-17
Across
- is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
- is a computer software package that performs a specific function directly for an end user or, in some cases
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
- also known as advertisement-supported software, generates revenue for its developers by automatically generating adverts on your screen
- data can be a number, symbol, character, word, codes, graphs, etc.
Down
- is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
- the state of being free from public attention.
- is a program designed to detect and remove viruses and other kinds of malicious software from your computer or laptop. Malicious software - known as malware - is code that can harm your computers and laptops, and the data on them.
- Ransomware is malware that employs encryption to hold a victim’s information at ransom.
- defines any legitimate programs that pose potential risks due to security vulnerability, software incompatibility, or legal violations.
- is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.
- Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
12 Clues: the state of being free from public attention. • data can be a number, symbol, character, word, codes, graphs, etc. • Ransomware is malware that employs encryption to hold a victim’s information at ransom. • is a computer software package that performs a specific function directly for an end user or, in some cases • ...
Decode the Future of Digital Banking 2023-06-15
Across
- - Revolutionary technology built on a decentralized, shared, immutable ledger that records transactions & tracks assets across a network where up-to-date information is available to all participants at the same time
- - Technologies that guard the bank against attacks, malware, viruses, hacking, data theft, and unauthorized access to banking platforms and data, helping protect the end customer
- - A tech-implementation paradigm that allows continuous delivery of banking applications across test and production environments, allowing significant reduction in the time taken from development to production, enabling banks to better serve their customers faster
- - Technologies that mimic human intelligence and decision-making to enable banks to customize financial advice, offer targeted product recommendations, proactively detect fraud and more
- - A leader in next-generation digital banking solutions powering leading US banks with a cloud-native solution suite across their core banking, lending, digital engagement, payments, analytics, AI and blockchain needs
Down
- - Digital banking Core used by Discover Financial Services, one of the largest direct banks in the US to power their innovation strategy
- - Orchestrating and workflow technologies enabling banks to connect systems and reduce manual tasks; reducing employee workloads, helping them feel productive and freeing up their time to deliver greater value to customers
- - An on-demand computing paradigm that offers access to pooled resources, programs, or storage allowing banks to handle sudden seasonal spikes with ease, while building resilience with minimal downtime, maximum security and strong compliance
- - Acronym for a type of short-term financing that allows consumers to buy now and pay for them over time, usually with no interest
- - Acronym for a model in which banks integrate their digital banking products and services directly into the products of other non-bank businesses, via APIs, enabling specialized propositions for customers. Rhymes with SaaS
10 Clues: - Acronym for a type of short-term financing that allows consumers to buy now and pay for them over time, usually with no interest • - Digital banking Core used by Discover Financial Services, one of the largest direct banks in the US to power their innovation strategy • ...
Cyber Security 2020-09-09
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- Chief Information Security Officer
- Avoid sending personal information via
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- A malicious program designed to record which keys are pressed on a computer keyboard
- _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- Unwanted advertising that comes to your email address
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- An unauthorized person seeking to maliciously disrupt or damage a computer
- A string of words that must be used to gain access to a computer system or service
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- An Internet scam that targets unsuspecting users through email
Down
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- Always _ _ _ _ your computer when you leave your desk
- Small files that Web sites put on your computer hard disk drive when you first visit
- Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- Domino's is known for selling
- Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- Global system of interconnected computer networks that use the Internet protocol suite
- media Websites and applications that enable users to create and share content or to participate in social networking
- An acronym that stands for distributed denial of service – a form of cyber attack
- A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A characteristic or specific weakness that renders an organization or asset open to exploitation.
- Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- An attempt by hackers to damage or destroy a computer network or system
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- A system invented by Google that uses a test to establish if a user is a human or a robot
- A regular system update that is designed to cover security blunders that have been discovered
31 Clues: Domino's is known for selling • Chief Information Security Officer • Avoid sending personal information via • Always _ _ _ _ your computer when you leave your desk • Unwanted advertising that comes to your email address • Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use • Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • ...
Aviation 2023-06-28
Across
- The four forces acting on an aircraft in flight are lift, weight, thrust, and...
- The angle between an aircraft's wing chord line and the direction of the oncoming airflow.
- Wing section for small aircraft.
- What is the name of the area where an aircraft is parked and serviced?
- The study of aircraft design and engineering is known as...
- Control tower's guidance.
- The term used to describe the sudden loss of control of an aircraft due to turbulence or extreme weather conditions is...
- Nap has been my GP for the last 15 years and I do not take movig GP practices lightly. I have built a relationship with Dr Knowlden over these years, so much so that even though
- Weakness exploited by cyber attackers.
- The control surface that allows an aircraft to roll.
- Detach ailerons initially for maintenance.
- New fighter jet initially identified over Pacific.
- Rotorcraft with uneven number of blades.
- The protective clothing worn by pilots to provide oxygen at high altitudes.
- Digital currency embraced by blockchain technology.
- A device used to control the speed of an aircraft.
- Noisy supporter of soaring flight.
- Deceptive online tactic to trick individuals into revealing sensitive information.
- The minimum speed required for an aircraft to maintain level flight is known as ...
Down
- Activist employing cyber attacks for political or social causes.
- Plane's ability to bank sharply.
- Airport employee's announcement.
- The area where an aircraft is parked and serviced.
- Formation of jets in flight.
- The imaginary line that connects an aircraft's nose to its tail.
- The system that measures and displays an aircraft's altitude.
- The process of reducing an aircraft's speed before landing.
- The rotating blades of an aircraft's engine responsible for producing thrust.
- The central structure of an aircraft that houses the crew, passengers, and cargo.
- Device used to steer an aircraft. on the ground.
- Government-backed hackers posing a significant cybersecurity risk.
- The unit of measurement for airspeed equal to one nautical mile per hour is called a...
- Manipulative method of obtaining personal information through phone calls.
- What is the name of the system that controls the direction of an aircraft's flight
- Airborne machines with bird-like features.
- Aircraft's celestial guide.
- Test an aircraft's limits.
- Illegitimate hacker hiding behind computer networks.
- Navigator heads northwest in fast aircraft.
- What is the name of the instrument that indicates the aircraft's heading relative to magnetic north?
- Pilot's power source.
41 Clues: Pilot's power source. • Control tower's guidance. • Test an aircraft's limits. • Aircraft's celestial guide. • Formation of jets in flight. • Plane's ability to bank sharply. • Airport employee's announcement. • Wing section for small aircraft. • Noisy supporter of soaring flight. • Weakness exploited by cyber attackers. • Rotorcraft with uneven number of blades. • ...
crossword 2025-02-16
Across
- - A unit of digital storage equal to 1,024 gigabytes.
- - A reference in a document that connects to another location or file.
- - Increasing a computer component’s speed beyond its specifications.
- - A cryptographic technique that uses quantum mechanics.
- - An organized collection of structured information or data.
- - A global network connecting millions of devices.
- - A cyber attack that tricks users into revealing personal information.
- - The maximum rate of data transfer across a network.
- - A security system that monitors and controls network traffic.
- - A temporary storage area for frequently accessed data.
- - Software with publicly available source code.
- - A type of AI that mimics human intelligence.
- - Temporary memory used for quick access.
- - The process of replacing sensitive data with unique identifiers.
- - A digital storage space in the cloud.
- - Data that describes other data.
- - A device that connects networks.
- - A wireless networking technology.
- - A step-by-step procedure for solving a problem.
- - The delivery of computing services over the internet.
- - Unwanted or unsolicited messages, typically emails.
- - A self-replicating computer program.
- - The smallest unit of data in computing.
- - A secret code used for security.
- - The smallest unit of a digital image.
Down
- - A decentralized ledger technology used in cryptocurrencies.
- - A program that translates source code into machine code.
- - Permanent software programmed into a hardware device.
- - An error in programming.
- - The manipulation of matter on an atomic scale.
- - A software testing method to verify previous functionality.
- - A set of rules for data transmission.
- - Software that harms a system.
- - The simulation of human intelligence in machines.
- - The delay before data is transferred over a network.
- - A technology that overlays digital content on the real world.
- - A subset of machine learning using neural networks.
- - The process of creating a virtual version of computing resources, such as servers or storage.
- - The practice of protecting systems and networks from digital attacks.
- - The part of a system that users interact with.
- - The process of converting information into a secure format.
- - A type of malware that spreads across networks automatically.
- - A program that performs a specific task.
- - A memory management technique using disk storage.
- - The process of converting analog data to digital.
- - A common wired networking technology.
- - A tool used to test and fix errors in software.
- - The physical parts of a computer.
- - A collection of tools for software development.
- - The brain of a computer.
50 Clues: - An error in programming. • - The brain of a computer. • - Software that harms a system. • - Data that describes other data. • - A device that connects networks. • - A secret code used for security. • - A wireless networking technology. • - The physical parts of a computer. • - A self-replicating computer program. • - A set of rules for data transmission. • ...
Thematic Puzzle 2024-12-16
Across
- A glass house or gases keeping heat in
- Level The line where water meets land, now rising
- Flying robots used for delivering or spying
- Bees' secret job to keep flowers blooming
- An uninvited guest in a fragile system
- Machines that can move and mimic humans
- The gas that makes cows and swamps notorious
- A frozen river that moves slowly but powerfully
- Saving something precious for the future
- Progress without harming the future
- Forests disappearing, leaving empty land
- The blueprint of all living things
- Living in balance without running out
- Teetering on the edge of survival
- The recipe for solving tech problems
- What escapes into the air after burning
- The spice of life in nature
- A pocket-sized supercomputer
- Intelligence Machines learning to think like humans
- Locking data so only the key can open it
- Invisible tools that make hardware useful
- A world where borders blur
- Energy sources that won’t run dry
- The language of numbers powering technology
- The digital highway’s traffic capacity
- Digital money without a physical form
- The invisible web connecting the world
- Nature’s soggy sponge full of life
- Tiny tools working at an atomic level
- When trees say goodbye to the forest
Down
- Moving across lands for a better life
- A cozy home for wild creatures
- The physical body of a computer system
- Energy sources that never run out
- A unique kind of animal or plant
- A new idea that changes everything
- Land losing its lushness, turning barren
- Reality Adding digital layers to the real world
- A digital window to the World Wide Web
- Reality A computer-made world you can step into
- Protecting data from invisible threats
- Earth's life-supporting bubble
- Processes that work on their own
- Vehicles Cars powered by clean energy
- Gadgets you can wear like fashion
- Storage floating above, yet invisible
- When rains forget to visit
- Fuels Ancient energy buried underground
- The fastest connection for a digital age
- Buying and selling at the speed of a click
- Exploration Discovering the universe beyond Earth
- A web of connections for communication
- Energy straight from the sun
- A community where nature works together
- A clever change to fit the environment
- The mood of the weather over time
- Gone forever, like the dinosaurs
- A virtual library of organized information
- The element behind life's sparkle and pollution's trouble
- A traveler with no choice but to leave
60 Clues: When rains forget to visit • A world where borders blur • The spice of life in nature • A pocket-sized supercomputer • Energy straight from the sun • A cozy home for wild creatures • Earth's life-supporting bubble • A unique kind of animal or plant • Processes that work on their own • Gone forever, like the dinosaurs • Energy sources that never run out • ...
IT 2024-12-05
Across
- What allows communication between different software components?
- What encapsulates applications and dependencies into isolated units?
- What device connects multiple devices in a network and forwards data?
- What process verifies the identity of a user or device?
- What process involves creating copies of data to prevent loss?
- What software allows multiple virtual machines on a single physical machine?
- What technology allows multiple virtual environments on one system?
- What is a popular tool for building, running, and managing containers?
- What protocol automatically assigns IP addresses to devices?
- What protocol provides secure remote access to devices?
- What was the predecessor to TLS for securing communications?
- What cryptographic protocol secures network communications, succeeding SSL?
- What protocol manages packet routing across the internet?
- What segments a network into logical groups, regardless of location?
- What smaller network is defined by a subnet mask?
- What architectural style organizes applications into loosely coupled services?
- What measures the amount of data processed by a system in a given time?
- What open-source operating system is widely used for servers?
- What operating system is developed by Microsoft?
- What process converts data into a fixed-size string for verification?
- What term describes the delay in network communication?
Down
- What measures the maximum data transfer rate of a network?
- What optimizes data retrieval by creating quick access paths?
- What process secures data by converting it into a protected format?
- What platform automates the deployment and scaling of containers?
- What data structure pairs keys with values for fast retrieval?
- What involves tracking and analyzing system performance?
- What provides on-demand access to computing resources over the internet?
- What is an organized collection of data for easy access and management?
- What is a network security device that monitors and filters traffic?
- What device connects multiple networks and directs data packets?
- What distributes network or application traffic across multiple servers?
- What field focuses on protecting systems and data from attacks?
- What is a formatted unit of data transmitted over a network?
- What is the process of identifying and fixing code errors?
- What is a set of rules for communication between devices?
- What internet protocol version expands the address space to 128 bits?
- What is the process of saving data for future use?
- What system translates domain names into IP addresses?
- What routing protocol operates within an autonomous system?
40 Clues: What operating system is developed by Microsoft? • What smaller network is defined by a subnet mask? • What is the process of saving data for future use? • What system translates domain names into IP addresses? • What process verifies the identity of a user or device? • What protocol provides secure remote access to devices? • ...
Law Office Technology Vocabulary.1 2025-04-08
Across
- - Two-Factor Authentication requiring two verification methods
- - Process of moving data from one system to another
- - Process of identifying and collecting electronic data for legal proceedings
- - Use of technology to perform tasks with minimal human intervention
- - Practices protecting computers and data from attacks
- - Legal case or transaction in practice management software
- - Software as a Service model of accessing programs via internet subscription
- - Internet-based computing providing shared processing resources
- - Technology that converts text in images into machine-readable data
- - Hidden information about a document, like author and creation date
- - Virtual Private Network providing secure remote access
- - Official record of proceedings in a court case
- - Secure, decentralized digital ledger technology
- - Healthcare privacy regulation affecting legal handling of medical information
- - Standard document format that preserves formatting across devices
- - Process of verifying a user's identity
- - System where data is stored in one primary location
- - Document Management System for storing and tracking documents
- - Reusable document pattern with placeholders for information
- - Process of collecting initial client and case information
- - System where data is distributed across multiple locations
- - Modern version of the federal court's electronic filing system
- - Fraudulent attempt to obtain sensitive information
- - Security system preventing unauthorized access to networks
- - Process of encoding information to prevent unauthorized access
- - Access rights granted to different users of a system
- - Visual display of key information in software
Down
- - Arranging document appearance to meet requirements
- - Automated system for reminding of upcoming deadlines
- - Enterprise Legal Management for large firms/departments
- - Connection between different software systems to share information
- - Adapting software to specific firm requirements
- - Removing confidential information from documents before sharing
- - Process of recording time and expenses for client invoicing
- - Process of scrambling data to protect it from unauthorized access
- - Sequence of processes through which work passes from initiation to completion
- - Organized collection of structured information
- - Case Management/Electronic Case Files system used for federal court filing
- - Interface allowing different software applications to communicate
- - Public system for accessing federal court records electronically
- - Process of organizing information for easy retrieval
- - Adherence to legal and regulatory requirements
- - Secure website for client access to case information
- - Transport Layer Security protocol securing data transmission
- - Advanced Encryption Standard used to secure digital information
- - Submitting court documents electronically instead of on paper
- - System that calculates deadlines based on court rules
- - European data protection regulation with global implications
- - Structured Query Language used to manage database information
- - Central location where documents are stored and managed
50 Clues: - Process of verifying a user's identity • - Visual display of key information in software • - Official record of proceedings in a court case • - Organized collection of structured information • - Adherence to legal and regulatory requirements • - Adapting software to specific firm requirements • - Secure, decentralized digital ledger technology • ...
Ehi, happy birthday! Per te un bel cruciverba personalizzato. 2025-08-14
Across
- …ora caro mio, ne fai parte, non puoi più scappare! (Per fortuna direi)
- Una tua fissa
- Un personaggio non molto compreso e che merita
- (Mi dissocio) Drop the…
- tua dualità, prima la odiavi, ora ti sta facendo crescere
- La cosa che ti piace di più farmi
- Dove ci sentiamo a casa, il nostro posto preferito
- Il tuo opposto in una serie di cui siamo stra fan
- Era un fenomeno
- Una cosa che hai in comune con il tuo corso di laurea magistrale
- Quello di cui avresti bisogno capdecaz
- Cosa sei tu per me
- Hai presente quel gruppo di persone che idolatri? Ecco loro non la fanno proprio mai eh, e pensare che la studi pure
- è un rischio… direi calcolato!
- Sembra un suono…ma non lo è!
- Una cosa che tu hai, ma io proprio no…
- Era la tua spiaggia preferita in Grecia
- Ti stanno molto simpatici
- Lo abbiamo trovato anche a Praga…ma la prima volta non ci era piaciuto molto
- Il posto più economico in cui siamo stati proprio
- Lo sei diventato quando stavamo insieme <3
- Brrr che freddo!
- c’era in Kenya ed anche questo mese
Down
- Il primo regalo che ti ho fatto
- Il posto più bello del mondo
- Ti ruberò la sua carta
- Qualcosa che accomuna me e Daenerys
- è la prima cosa che ci diamo quando ci vediamo, specialmente a Vienna <3
- Casa d’aria con vita cuore
- E’ la versione premium in cui ti piacerebbe vivere…nel caso in cui rimanessimo disoccupati
- Un mezzo romantico che abbiamo preso insieme
- Era la mia preferita a Cefalonia, è tra un peto e un ano!
- L’attività che facciamo più spesso, anche insieme
- Unica…dolce…giocherellona
- La versione nerd del sistema immunitario
- Una cosa che raggiungeremo
- Il tuo cibo preferito
- E’ quello che facevi più spesso in Kenya
- Dovrebbero pagarti!
- È la mia cosa preferita dopo il mare, spesso la guardiamo insieme
- Devi indovinare il nome…ma non ha ancora il cognome!
- Chi non c’è oggi?
- Due parole, 5 lettere <3
- Il nome di un anime/manga
- Se io per te sono Marge, tu per me sei…
- Devi stare attento a farle quando sei con me
- praticamente è un manuale di sopravvivenza ultraterrena, il primo travel blogger dell’aldilà
- Un gruppo di persone che idolatri
48 Clues: Una tua fissa • Era un fenomeno • Brrr che freddo! • Chi non c’è oggi? • Cosa sei tu per me • Dovrebbero pagarti! • Il tuo cibo preferito • Ti ruberò la sua carta • (Mi dissocio) Drop the… • Due parole, 5 lettere <3 • Unica…dolce…giocherellona • Il nome di un anime/manga • Ti stanno molto simpatici • Casa d’aria con vita cuore • Una cosa che raggiungeremo • Il posto più bello del mondo • ...
Example Cyber Crossword 2023-07-13
Across
- Measures used to protect the confidentiality, integrity and availability of systems, devices and the information residing on them.
Down
- the application of scientific knowledge to the practical aims of human life or, as it is sometimes phrased, to the change and manipulation of the human environment.
2 Clues: Measures used to protect the confidentiality, integrity and availability of systems, devices and the information residing on them. • the application of scientific knowledge to the practical aims of human life or, as it is sometimes phrased, to the change and manipulation of the human environment.
CYBERCRIME 2021-07-10
Across
- measures promoting the safe usage of the internet, especially in order to protect against viruses, fraud, or other forms of attack.
- is a form of bullying or harassment using electronic means
- Interception made by technical means without right
- It is when an individual or entity with malice or in bad faith
- is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access
- is data that describes other data.
- Intentional or reckless alteration, damaging, deletion of computer data
- protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- is a hacker who violates computer security for their own personal profit or out of malice.
- is a type of social engineering where an attacker sends a fraudulent ("spoofed") message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
- is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
- a string of characters that allows access to a computer system or service.
- a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations
- sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- of 2012 therefore and for other purposes
- act protecting individual personal information in information and communication systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes.
- It is offense against the confidentiality, integrity and availability of computer data and systems.
- is pornography that exploits children for sexual stimulation.
- information of an individual in any container for trash collection.
- is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- what comes after terabyte
- It is when personal
- is a form of phishing that uses mobile phones as the attack platform to gather personal details, like SSN or credit card number.
- is a suspected, attempted, successful, or imminent threat of unauthorized access, use, disclosure, breach, modification, or destruction of information; interference with information technology operations; or significant violation of responsible use policy
- is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Down
- is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- is any crime or illegal online activity committed on the Internet, through the Internet or using the Internet.
- Intentional alteration or reckless interference with the functioning of a computer or computer network
- when individual handling personal information knowingly or negligently disposed, discard, or abandon in an area accessible to the public or has otherwise placed the
- includes the vast network of highways, connecting bridges and tunnels, railways, utilities and buildings necessary to maintain normalcy in daily life.
- It is when an individual handling personal information or intentional knowingly and unlawfully, or violating data confidentiality breach and security
- breach It is when an individual or entity who has knowledge of a security breach and of the obligation
- It is when an individual or entity discloses to third party personal information.
- is a concept describing a widespread interconnected digital technology.
- is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
- Prevention investigation, suppression and the imposition of penalties
- is a data storage device that includes flash memory with an integrated USB interface.
- refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
- refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
- Act of 2012
- is a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and vulnerabilities of online access and use of the internet.
- Use, production, sale, procurement, importation, distribution, or otherwise making available, without right
- Acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering.
- global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- what comes after zettabyte.
- Access Access to the whole or any part of a computer system without right
- is a shortfall that comes from fragmented thinking, reactive acquisition, and unmanaged vulnerability against the known threats that violate confidentiality, integrity, availability, and privacy of information in the infrastructure, process, data, application, and agreements of service delivery.
- An act defining cybercrime, providing for the prevention,
- is an electronic data storage device used for storing digital information, typically using flash memory.
51 Clues: Act of 2012 • It is when personal • what comes after terabyte • what comes after zettabyte. • is data that describes other data. • of 2012 therefore and for other purposes • Interception made by technical means without right • An act defining cybercrime, providing for the prevention, • is a form of bullying or harassment using electronic means • ...
Crossword Challenge — Decode the Tech Behind the Titles 2025-05-28
Across
- Specializes in the development virtual models of controller, system on chips, ECUs so that embedded software can be developed and validated much before the target hardware is available. This helps in left shifting the automotive software development lifecycle.
- Designs and validates automotive grades like ECUs, sensor modules, and controller boards, supporting high-speed interfaces, thermal and EMI/EMC requirements, and production readiness
- Developing standardized, scalable ECU software platforms and low-level firmware to power critical automotive functions.
- Specializes in the design and development of advanced test automation solutions and test execution. The team primarily focuses on Hardware-in-the-Loop (HIL) testing and covers component, subsystem, system, and vehicle-level testing.
- Provides system-level engineering services including vehicle architecture definition, integration, and validation to ensure cross-domain functionality and performance in modern vehicle platforms.
- Automotive engineering services, including vehicle architecture, domain integration, and support across powertrain, ADAS, body, and infotainment systems.
Down
- Delivers robust solutions including secure boot, secure communication, ECU hardening, and compliance with standards like ISO/SAE 21434 to protect connected vehicle ecosystems.
- Covers development of advanced solutions including infotainment, digital instrument clusters, voice assistants, and connected vehicle services using Android Automotive and embedded platforms.
- Supports OEMs in developing EV systems such as battery management systems (BMS), electric drivetrains, onboard chargers, and power electronics
- Provides ISO 26262-compliant safety solutions including safety analysis, tool qualification, and software/hardware validation for safety-critical systems like ADAS, powertrain, and steering.
- Utilizes tools like MATLAB/Simulink for algorithm development, rapid prototyping, and auto code generation to accelerate ECU development and validation for domains such as powertrain and chassis.
- Focuses on cloud-enabled connected car platforms, including over-the-air (OTA) updates, remote diagnostics, telematics backends, and fleet data analytics to enhance vehicle connectivity and user experience.
- Specialized in the design and development of ADAS features that Supports from L1 autonomous to L3 autonomous adhering to standard APSICE compliance.
- Develops and integrates telematics control units (TCUs), cloud communication modules, and data analytics platforms enabling vehicle tracking, remote diagnostics, and V2X capabilities.
14 Clues: Developing standardized, scalable ECU software platforms and low-level firmware to power critical automotive functions. • Supports OEMs in developing EV systems such as battery management systems (BMS), electric drivetrains, onboard chargers, and power electronics • ...
Mod 2 Keywords 2024-11-20
Across
- A method of gaining unauthorised access to a computer system/network.
- (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- (6,6) An individual who uses existing computer scripts or codes to hack into computer systems. They do not have the expertise to write their own code.
- (5,8) Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.
- (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- (6,11) Hackers use this non-technical method to access computer systems/networks without authorisation. It involves fooling people into breaking normal security procedures, such as guarding their passwords and relies on manipulating the good nature of individuals.
- (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Down
- (5,4,3,6) the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.
- (6,6) a path by which a threat actor can access a server, host, or network.
- (5,8) An individual who commits illegal activities using computers and the Internet.
- (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
- Is a weakness in a computer system/network that can be exploited by a threat, for example, out of date anti-malware software can result in the threat of a malware attack. If a computer system/network’s vulnerabilities can be found and dealt with, this will help to minimize threats and risks.
- (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- An individual who gains unauthorised access to computer system/network for social or political purposes.
14 Clues: A method of gaining unauthorised access to a computer system/network. • (6,6) a path by which a threat actor can access a server, host, or network. • (5,8) An individual who commits illegal activities using computers and the Internet. • An individual who gains unauthorised access to computer system/network for social or political purposes. • ...
Cyber Security 2020-09-09
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- Chief Information Security Officer
- To protect personal information, avoid sending it via
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- A malicious program designed to record which keys are pressed on a computer keyboard
- _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- Unwanted advertising that comes to your email address
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- An unauthorized person seeking to maliciously disrupt or damage a computer
- a string of words that must be used to gain access to a computer system or service
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- An Internet scam that targets unsuspecting users through email
Down
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- Always _______your computer when you leave your desk
- Small files that Web sites put on your computer hard disk drive when you first visit
- Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- Domino's is known for selling
- Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- Global system of interconnected computer networks that use the Internet protocol suite
- media websites and applications that enable users to create and share content or to participate in social networking
- An acronym that stands for distributed denial of service – a form of cyber attack
- A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A characteristic or specific weakness that renders an organization or asset open to exploitation.
- Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- An attempt by hackers to damage or destroy a computer network or system
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- A system invented by Google that uses a test to establish if a user is a human or a robot
- A regular system update that is designed to cover security blunders that have been discovered
31 Clues: Domino's is known for selling • Chief Information Security Officer • Always _______your computer when you leave your desk • To protect personal information, avoid sending it via • Unwanted advertising that comes to your email address • Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use • Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • ...
