cybersecurity Crossword Puzzles
CyberSecurity Puzzle 2024-06-06
Across
- __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
- SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
- OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
- EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
- CYBER ATTACK CAN CAUSE HUGE ____________
- IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
- IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
- HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
- MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
- ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.
10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________ • SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION. • OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL. • IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION. • ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS. • ...
Cybersecurity Essentials 2024-11-06
Across
- monitors your online activity and can log every key you press
- a computer program that replicates and attaches to files
- holds data until it makes a payment
- a program that scans a computer for malicious software and deletes it
- replicates itself to spread from one computer to another
- a decoy to sneak malicious software past unsuspecting users
Down
- hackers who are self-employed or working for large crime organization
- hardware or software that prevents hackers from accessing your personal data
- converting information into a form where an unauthorized people cannot read it
- any code that can steal data or cause harm to a system
10 Clues: holds data until it makes a payment • any code that can steal data or cause harm to a system • a computer program that replicates and attaches to files • replicates itself to spread from one computer to another • a decoy to sneak malicious software past unsuspecting users • monitors your online activity and can log every key you press • ...
ACES 2022-12-19
Across
- ACES IS A MEMBER OF THE ______ COLLEGE
- ACES FOUNDING PARTNER
- WHAT ACES STUDENTS STUDY
- STUDENT UNION
- GROUP THAT PLANS SOCIAL EVENTS FOR ACES
- COMPUTER SCIENCE BUILDING
Down
- THE DAY THE WEEKLY EMAIL COMES OUT
- ACES IS MADE UP OF AN LLP AND A _____
- LAST NAME OF ACES DIRECTOR
- CODING USED IN ACES COURSES
- COURSE CODE FOR ACES COURSES REGISTRATION
- HOME TO ACES LLP
- TYPE OF PROJECT COMPLETED IN HACS200 or 202
- HOME TO ACES NORTH
- UNIVERSITY OF MARYLAND MASCOT
15 Clues: STUDENT UNION • HOME TO ACES LLP • HOME TO ACES NORTH • ACES FOUNDING PARTNER • WHAT ACES STUDENTS STUDY • COMPUTER SCIENCE BUILDING • LAST NAME OF ACES DIRECTOR • CODING USED IN ACES COURSES • UNIVERSITY OF MARYLAND MASCOT • THE DAY THE WEEKLY EMAIL COMES OUT • ACES IS MADE UP OF AN LLP AND A _____ • ACES IS A MEMBER OF THE ______ COLLEGE • GROUP THAT PLANS SOCIAL EVENTS FOR ACES • ...
Boredom buster 2023-06-28
Across
- Delicious Korean dish
- Creepy kids playground equipment at Minnippi parkland
- Dan's dream celebrity date
- Dan's alter ego
- 'Rejoice' in latin
- Place where the best conversations are had
- Dan's favourite mayonnaise
Down
- Hand-built spacecraft
- Name for a pressure cooker
- Bec's forbidden name
- I'm an ...
- 14th song on playlist
- Nerdy basketball team with cute point scorer
- Never would Dan ever ...
- I see you've played __ before
- Beloved kungfu fantasy series
- Term for a handsome cybersecurity person
- Powerful choral piece during epic space fight scene
- Best-looking hobbits in the Shire
- Name for a white Kona
- Brooklyn
- Dan's favourite book genre
22 Clues: Brooklyn • I'm an ... • Dan's alter ego • 'Rejoice' in latin • Bec's forbidden name • Hand-built spacecraft • Delicious Korean dish • 14th song on playlist • Name for a white Kona • Never would Dan ever ... • Name for a pressure cooker • Dan's dream celebrity date • Dan's favourite book genre • Dan's favourite mayonnaise • I see you've played __ before • Beloved kungfu fantasy series • ...
FIT_Vocab.JT 2013-05-15
Across
- picture for a business
- internet service provider
- headphone port
- TB
- online presentation maker
- Wireless Fidelity
- flash drive, disc
- who is asking, what they asking, why are they asking
- Google Bing Yahoo
- flash drive plug in
- online protection
- GB
- smallest storage amount
- 3g 4g
- MG
Down
- light emitting diode
- speakers, printer
- cd drive
- computer screen
- Safari, iTunes, iMovie, App Store
- central circuit board
- main engine of computer
- central processing unit
- National Cyber Security Alliance
- online manners
- Random Access Memory
- KB
- eight bits
- liquid crystal display
29 Clues: TB • KB • GB • MG • 3g 4g • cd drive • eight bits • headphone port • online manners • computer screen • speakers, printer • Wireless Fidelity • flash drive, disc • Google Bing Yahoo • online protection • flash drive plug in • light emitting diode • Random Access Memory • central circuit board • picture for a business • liquid crystal display • main engine of computer • central processing unit • ...
Technology 2023-06-11
Across
- (Step-by-step problem-solving procedure)
- (Global computer network)
- (Intelligence that mimics human behavior)
- (Securing data with codes)
- (Global Positioning System)
- (Pocket-sized mobile device)
- (Identification based on unique human characteristics)
- (Remote data storage and computing)
- (Wireless network connectivity)
- (Unmanned aerial vehicles)
- (Process of making systems operate automatically)
Down
- (Protection of computer systems)
- (Electronic data processing machine)
- (Distributed digital ledger)
- (Simulated or computer-generated)
- (Enhancement of real-world experiences with digital content)
- (Manipulation of matter at the atomic and molecular scale)
- (Field of building and programming robots)
- Printing (Additive manufacturing process)
- Data (Large sets of complex data)
20 Clues: (Global computer network) • (Securing data with codes) • (Unmanned aerial vehicles) • (Global Positioning System) • (Distributed digital ledger) • (Pocket-sized mobile device) • (Wireless network connectivity) • (Protection of computer systems) • (Simulated or computer-generated) • Data (Large sets of complex data) • (Remote data storage and computing) • ...
Cybersecurity Terms Crossword Puzzle 2024-02-28
Across
- Secure connection for private browsing
- Hostage-taking malware for files
- Vulnerability before the fix
- Identity verification for access
- Computer virus and harmful software
- Guard against harmful computer viruses
- Protecting digital systems and data
- Monitor for malicious activities
- Deceptive emails for sensitive data
Down
- Deliberate act to disrupt systems
- Malicious software's harmful action
- Secretly records keystrokes for theft
- System's exploitable weak point
- Network traffic gatekeeper and monitor
- Secret entry to bypass security
- Impersonation for unauthorized access
- Secure data with secret code
- Authorized entities' access list
- Flood of traffic to disrupt
- Software update to fix vulnerabilities
20 Clues: Flood of traffic to disrupt • Vulnerability before the fix • Secure data with secret code • System's exploitable weak point • Secret entry to bypass security • Hostage-taking malware for files • Identity verification for access • Authorized entities' access list • Monitor for malicious activities • Deliberate act to disrupt systems • Malicious software's harmful action • ...
Wedding Crossword 2024-11-18
Across
- Where Bride was working when the couple met
- Amanda's middle name
- Bride’s favorite cuisine
- Month of the proposal
- Amanda's birth month
- Bride’s profession
- Location of the wedding venue
- Couple's favorite fantasy series
- Bride's Eye Color
- Groom’s favorite holiday
- Groom’s favorite takeout
Down
- Where the couple get engaged
- Russ' middle name
- Bride's favorite outdoor activity
- Russ' birth month
- Bride’s favorite holiday
- What Russ is in school for
- Groom's Eye Color
- # of years couple has been together
- Where Groom was born
- Couple's favorite hobby
- Their cat's name
- Groom's favorite hobby
- Where Bride was born
- Honeymoon Destination
25 Clues: Their cat's name • Russ' middle name • Russ' birth month • Groom's Eye Color • Bride's Eye Color • Bride’s profession • Amanda's middle name • Where Groom was born • Amanda's birth month • Where Bride was born • Month of the proposal • Honeymoon Destination • Groom's favorite hobby • Couple's favorite hobby • Bride’s favorite holiday • Bride’s favorite cuisine • Groom’s favorite holiday • ...
Module 1 Introductory Course Telehealth 2017-03-01
8 Clues: Mobile health • Electronic health • Providing remote healthcare • Refers to teleconsultations • health Popular emerging term • Measures taken to protect a computer • Extended term for information technology • Ability of computers exchange information"
Cyber Security 2016-05-24
8 Clues: Has a trunk • Flying mammal • Large marsupial • What is my name? • Man's best friend • Likes to chase mice • What are we here for? • Steals data and holds it for ransom
CYBER SECURITY 2023-09-20
Across
- to steal sensitive information
- malware
- protection of computing systems and data that these systems store
- set of rules
Down
- the virtual and dynamic space created by the machine clones
- protecting info.from inauthorized parties
- attack data to web application
- malicious software
- attack uses trial & attack method
- automated process
10 Clues: malware • set of rules • automated process • malicious software • to steal sensitive information • attack data to web application • attack uses trial & attack method • protecting info.from inauthorized parties • the virtual and dynamic space created by the machine clones • protection of computing systems and data that these systems store
Cybersecurity Awareness 2021-09-28
Across
- An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
- A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
- The process of converting information or data into a code to further prevent unauthorized access.
- Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
- Unauthorized access to computer data, applications, networks, or devices.
- _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
- Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
- Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
- Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.
10 Clues: Unauthorized access to computer data, applications, networks, or devices. • A vulnerability, or a system flaw, that is taken advantage of for malicious goals. • Software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code to further prevent unauthorized access. • ...
Cybersecurity Crossword 2024-06-25
Across
- Faking an email, phone number or website.
- Attack that looks at/steals your data.
- Software used to protect your device.
- A string of random words used as a password.
Down
- We are not allowed to plug this into departmental devices.
- A program or programming code that self-replicates
- Attack that locks your data and demands money.
- Unsolicited emails that try to sell you products.
- Process used to help identify phishing.
- Malicious software.
10 Clues: Malicious software. • Software used to protect your device. • Attack that looks at/steals your data. • Process used to help identify phishing. • Faking an email, phone number or website. • A string of random words used as a password. • Attack that locks your data and demands money. • Unsolicited emails that try to sell you products. • ...
cybersecurity 2 2024-05-07
Across
- reacting to an incident
- assurance that information is not disclosed
- finding the problem
- the data or information is being maintained
- limiting access from everyone
Down
- making sure the information doesn't breach
- obtaining what was lost
- guarantees that systems are available
- information about something that one possess
- looking for the problem
10 Clues: finding the problem • obtaining what was lost • reacting to an incident • looking for the problem • limiting access from everyone • guarantees that systems are available • making sure the information doesn't breach • assurance that information is not disclosed • the data or information is being maintained • information about something that one possess
cybersecurity 4 2024-05-07
Across
- where all of the data is kept
- (1 trillion bytes)
- a passive way to direct someone to a malicious website
- (1000 bytes)
- (1 million bytes)
- threat actor that registers a domain name
Down
- a campaign desighned to steal account credentials.
- ( 1 billion bytes)
- remote access trojan
- an infected malware that's desighned to replicate and spread from device to device
10 Clues: (1000 bytes) • (1 million bytes) • (1 trillion bytes) • ( 1 billion bytes) • remote access trojan • where all of the data is kept • threat actor that registers a domain name • a campaign desighned to steal account credentials. • a passive way to direct someone to a malicious website • an infected malware that's desighned to replicate and spread from device to device
Cybersecurity Terms 2023-10-08
Across
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- Pertaining to the security challenges and measures for smartphones and tablets.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
Cybersecurity Class 2024-03-26
Across
- Used to keep intruders out
- Malware that spreads
- Malware used by hackers to spy
- Tricking users to reveal information
- Bad software that damages systems
- Two or more computers connected
Down
- Protect your information from hackers
- Identifying a user’s identity
- Malware that hijacks your system
- Shields users against viruses
10 Clues: Malware that spreads • Used to keep intruders out • Identifying a user’s identity • Shields users against viruses • Malware used by hackers to spy • Two or more computers connected • Malware that hijacks your system • Bad software that damages systems • Tricking users to reveal information • Protect your information from hackers
Cybersecurity M.A 2024-10-17
Across
- A method used for guessing password using a high volume of combinaisons
- A way for cybercriminals to trick someone for redirecting them in a not authorized jacket
- A system designed to prevent unauthorized access to or from a computer network
- A way for cybercriminals to hide stolen data or malicious code in images, audio files and others malicious code in images, audio files and other media
Down
- A weakness in a computer system or network that can possibly be exploited by attackers to compromise the security.
- A malfunction or weakness in the software
- Completly Automated Public Turing Test To Tell Computers and Humans Apart
- An exploitation system for computer
- A type of attack where the pirate takes the victim’s files has an hostages and ask for money to give them back
- A way to verify someone identity
10 Clues: A way to verify someone identity • An exploitation system for computer • A malfunction or weakness in the software • A method used for guessing password using a high volume of combinaisons • Completly Automated Public Turing Test To Tell Computers and Humans Apart • A system designed to prevent unauthorized access to or from a computer network • ...
Ylan cybersecurity 2024-11-21
Across
- Open-source operating system based on a kernel created by Linus Torvalds.
- A company that makes equipment and software to help connect and protect computer network
- A protocol that ensures reliable and ordered data transmission over a network.
- Raising awareness is the act of drawing attention to a previously overlooked topic
- A secret part of the internet, often used for anonymous activities.
Down
- A protocol for connecting to a remote computer without encryption
- A type of cyberattack where attackers impersonate legitimate organizations to steal sensitive information, like passwords or credit card details.
- A test used to verify if a user is human and not a robot.
- Identity theft to mask malicious communication.
- Software that secretly gathers information about a user without their consent.
10 Clues: Identity theft to mask malicious communication. • A test used to verify if a user is human and not a robot. • A protocol for connecting to a remote computer without encryption • A secret part of the internet, often used for anonymous activities. • Open-source operating system based on a kernel created by Linus Torvalds. • ...
Week 1 Puzzle 2020-08-25
Across
- This is an example of "something you know"--one of the key factors in MFA.
- Approximately $6 trillion is planned on being spent on this by 2021.
- General term for the type of device most often connecting to public WiFi.
- This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
- Globally, one of these attacks every 39 seconds.
- By 2025, there will be an estimated 75 billion of these devices connected to the internet.
- 95% of cybersecurity breaches involve this type of error.
Down
- Any incident that results in unauthorized access to computer data, applications, networks or devices.
- The most dangerous type of WiFi.
- This is an example of "something you are"--one of the key factors of MFA.
- This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
- To increase your personal internet security, consider turning off the "save password" feature in this.
- 93% of these organizations have experienced a data breach within the past 3 years.
- Software that is created specifically to help detect, prevent and remove malicious software.
14 Clues: The most dangerous type of WiFi. • Globally, one of these attacks every 39 seconds. • 95% of cybersecurity breaches involve this type of error. • Approximately $6 trillion is planned on being spent on this by 2021. • This is an example of "something you are"--one of the key factors of MFA. • ...
Week 6-7 spelling 2016-03-01
Across
- a decorative plate to finish motor vehicles
- to be someone's favorite
- a device to look at stars
- you usually hit BALLS with this
- to put up with something
- to think or believe that something is true
- to cancel something
Down
- to blend in
- to be safe online
- a device to look at very very small things
- to make a continuous low humming sound
- an area of land
- to make up your mind
- to secretly get married
- the past tense of strive
15 Clues: to blend in • an area of land • to be safe online • to cancel something • to make up your mind • to secretly get married • to be someone's favorite • to put up with something • the past tense of strive • a device to look at stars • you usually hit BALLS with this • to make a continuous low humming sound • a device to look at very very small things • ...
PeopleTec Engineering Week 2024-02-12
Across
- operations security
- exploratory programming marathon session
- use of scientific discoveries for practical purposes
- people first, technology always
- cyberattack prevention measures
- composing instructions for a computer to follow
- individual that provides products or services to the government
- Information technology role responsible for data security
Down
- representation of a real-world system
- training algorithms to create self-learning models
- designing and experimenting with a model
- connected computer systems
- professional problem solver
- next generation...
- document attesting to a level of achievement
15 Clues: next generation... • operations security • connected computer systems • professional problem solver • people first, technology always • cyberattack prevention measures • representation of a real-world system • exploratory programming marathon session • designing and experimenting with a model • document attesting to a level of achievement • ...
Cyberbullying 2024-05-02
Across
- Platforms where cyberbullying often occurs.
- Connected to the internet.
- Malicious digital intrusion.
- Online harassment targeting high school students.
- Person who intimidates or mistreats others.
- Persistent online abuse or intimidation.
- Measures taken to protect against online threats.
Down
- Individual singled out for cyberbullying.
- Moral principles governing online behavior.
- Person who posts provocative or offensive messages.
- Without a known identity.
- Someone subjected to cyberbullying.
- Illegal activities carried out online.
- Relating to electronic technology.
- Online space for real-time communication.
15 Clues: Without a known identity. • Connected to the internet. • Malicious digital intrusion. • Relating to electronic technology. • Someone subjected to cyberbullying. • Illegal activities carried out online. • Persistent online abuse or intimidation. • Individual singled out for cyberbullying. • Online space for real-time communication. • ...
Cybersecurity Crossword 2021-10-08
Across
- verifying the identity of a user, process, or device
- a flaw or weakness that may allow harm to occur to a system
- malicious code like virus, worm
- Blink's single sign-on(SSO) solution
- an unauthorized user who attempts to or gains access to an information system
Down
- ensuring that data has not been altered or destroyed in an unauthorized manner
- an undocumented way of gaining access to a computer system
- how we work since covid started
- incident that results in disclosure of sensitive data
- individually identifiable health information
10 Clues: how we work since covid started • malicious code like virus, worm • Blink's single sign-on(SSO) solution • individually identifiable health information • verifying the identity of a user, process, or device • incident that results in disclosure of sensitive data • an undocumented way of gaining access to a computer system • ...
Cybersecurity Risk 2021-09-07
Across
- Abbreviation of Internet of Things.
- Short for "malicious software."
- Data that in published and can be found by anyone
- The type of data that should not be known to everyone.
- Pretending to be a friend or a trusted source online.
Down
- software that encrypts data on someone's device until that person agrees to pay to regain access.
- measures taken to protect computer systems.
- Joined or linked together.
- is a password made up of a saying or memorable set of words.
- Legitimate or innocent emails trying to trick you in clicking a link or providing personal information.
10 Clues: Joined or linked together. • Short for "malicious software." • Abbreviation of Internet of Things. • measures taken to protect computer systems. • Data that in published and can be found by anyone • Pretending to be a friend or a trusted source online. • The type of data that should not be known to everyone. • ...
Cybersecurity Password 2020-01-10
Across
- You may not divulge this information while you are working for an employer or after you leave.
- Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
- E-mailing victims to trick them into voluntarily giving up their confidential information.
- Software aimed at protecting your computer from malware.
Down
- A flaw in a system that leaves it open to attack.
- A bunch of compromised computers running malicious programs and being remotely controlled by cybercriminals.
- It is the scrambling of data into a secret code that can be read only by software set to decode the information.
- A netork-based technology that allows user to store a large amount of data and have access to it with any Internet-connected device.
- Malware that secretly installs more malware on a computer.
- A remote infrastructure for developing and deploying new online software applications.
10 Clues: A flaw in a system that leaves it open to attack. • Software aimed at protecting your computer from malware. • Malware that secretly installs more malware on a computer. • A remote infrastructure for developing and deploying new online software applications. • E-mailing victims to trick them into voluntarily giving up their confidential information. • ...
cybersecurity story 2024-02-23
Across
- - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
- - The protection of the cyber realms
- - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
- - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
- - someone who tries to access data they aren't authorized to view
- - monitoring network security system
Down
- - What happens when the firewall is broken
- - A security incident where confidential information is stolen
- - the story this puzzle is about
- - a mechanism for creating a secure connection
10 Clues: - the story this puzzle is about • - The protection of the cyber realms • - monitoring network security system • - What happens when the firewall is broken • - a mechanism for creating a secure connection • - A security incident where confidential information is stolen • - someone who tries to access data they aren't authorized to view • ...
Cybersecurity Crossword 2024-04-13
Across
- What feature can you activate to secure your Habbo account from hacking attempts?
- What security measure adds an extra layer of protection to online accounts beyond just a username and password?
- What term refers to groups of individuals in Habbo who aim to maximize profit by any means necessary, including illegal activities?
- What should you do if you receive messages containing offers that seem too good to be true on Habbo DMs?
- What precautionary measure should you take to protect your personal information when using public networks?
- What is the first step you should take before giving personal information to a stranger online?
Down
- What symbol is often found on the badges and mottos of mafia members?
- What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?
- What action should you take if someone threatens you or attempts to scam you on Habbo?
- What type of software can protect your devices from malware, trojans, and ransomware?
10 Clues: What symbol is often found on the badges and mottos of mafia members? • What feature can you activate to secure your Habbo account from hacking attempts? • What is the type of app you can use to scan the QR code for setting up 2FA on Habbo? • What type of software can protect your devices from malware, trojans, and ransomware? • ...
cybersecurity 5 2024-05-07
Across
- turning a code into the information it was originally
- a program that threats to destroy data if they don't give money
- a program that decides whether to allow or block specific traffic
- to avoid
- a software that automates the process of scanning systems
- managing and protecting information assets
Down
- use of copying IT resources by employees
- type of substitution cipher in which each letter in plaintext is replaced
- practice of secure communication or information from the public
- converting information into a code
10 Clues: to avoid • converting information into a code • use of copying IT resources by employees • managing and protecting information assets • turning a code into the information it was originally • a software that automates the process of scanning systems • a program that threats to destroy data if they don't give money • ...
Cybersecurity Awareness 2024-10-17
Across
- A security system that monitors and controls incoming and outgoing network traffic
- A security model that requires strict identity verification for every person and device trying to access resources on a network
- Software that secretly gathers information about a user's activities
- The process of encoding information to protect it from unauthorized access
- Malicious software that misleads users of its true intent by disguising itself as legitimate software
Down
- Manipulating people into divulging confidential information
- Phishing attacks conducted via SMS messages
- A malware designed to deny a user or organization access to files on their computer
- A type of online scam that tricks people into sharing sensitive information, such as login credentials and credit card numbers
- Small files stored on a user’s system to recognize the user and track preferences
10 Clues: Phishing attacks conducted via SMS messages • Manipulating people into divulging confidential information • Software that secretly gathers information about a user's activities • The process of encoding information to protect it from unauthorized access • Small files stored on a user’s system to recognize the user and track preferences • ...
Cybersecurity Awareness - 2024-10-08
Across
- [?] is a situation where a victim is tempted into clicking a malicious link
- Virus, Trojans and Worms are forms of [?]
- [?] are attackers whose motivation are political or social causes
- [?] is the term we used to to state that a transaction performed cannot be denied
- The minimum length of password we aim for is [?} numeric representation
Down
- [?} is a common social engineering tactic involving fake emails
- Fingerprint and/or facial recognition are form of authentication known as [?] scans
- The term [?] is commonly used in cybersecurity as a representation of weakness
- Account [?} is when an employee's email is hacked and used to make payments to fraudster's accounts.
- The microsoft brand for mobile device management is known as [?]
10 Clues: Virus, Trojans and Worms are forms of [?] • [?} is a common social engineering tactic involving fake emails • The microsoft brand for mobile device management is known as [?] • [?] are attackers whose motivation are political or social causes • The minimum length of password we aim for is [?} numeric representation • ...
SULAM cybersecurity 2023-06-15
Across
- Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan.
- Upaya untuk menembusi sistem komputer dengan niat jahat.
- Ilmu dan teknik menyulitkan maklumat supaya hanya dapat dibaca oleh pihak yang dibenarkan.
- Proses memulihkan data atau sistem selepas berlaku kejadian yang tidak diingini.
Down
- Program jahat yang cuba merosakkan atau mengganggu komputer dan peranti elektronik.
- Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.
- Potensi bahaya atau kejadian yang boleh menjejaskan keselamatan sistem atau maklumat digital.
- Kemungkinan berlakunya ancaman atau kejadian yang boleh menyebabkan kerugian atau gangguan.
- Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.
- Program yang digunakan untuk mengesan, menghalang, dan membuang program jahat dari sistem komputer.
10 Clues: Upaya untuk menembusi sistem komputer dengan niat jahat. • Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran. • Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain. • Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan. • ...
Cybersecurity - General 2022-05-26
Across
- Large scale attacks using remotely controlled malware-infected devices
- Systems, functions & data being provided on-demand, based on levels of service and defined parameters
- Number of stages of Penetration Testing
- Flooding a network / computer by overloading the system with huge number of requests and making it incapable of responses
- Only authorized parties permitted to access sensitive information / functions
Down
- Process of psychologically manipulating people to divulge personal or critical information
- A method of interrupting data traffic between nodes and stealing the required information
- Hostile spyware, ransomware & viruses that breach through vulnerabilities like clicking on suspicious links / installing risky applications
- Ensuring only authorized users can enter, modify or delete information / functions
- An attack that takes advantage of opportunity between a vulnerability announcement and corresponding security patch solution
10 Clues: Number of stages of Penetration Testing • Large scale attacks using remotely controlled malware-infected devices • Only authorized parties permitted to access sensitive information / functions • Ensuring only authorized users can enter, modify or delete information / functions • ...
Cybersecurity Awareness 2021-09-29
Across
- An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
- A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
- The process of converting information or data into a code to further prevent unauthorized access.
- Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
- Unauthorized access to computer data, applications, networks, or devices.
- _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
- Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
- Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
- Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.
10 Clues: Unauthorized access to computer data, applications, networks, or devices. • A vulnerability, or a system flaw, that is taken advantage of for malicious goals. • Software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code to further prevent unauthorized access. • ...
Cybersecurity Crossword 2021-02-12
Across
- Something to protect your personal data.
- It locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- A malicious form of self-replicating software.
- It appears to be a useful or fun application but unbeknown to the user it also performs malicious actions.
Down
- It is any information relating to an identifiable person.
- a person who uses computers to gain unauthorized access to data.
- It is unwanted software that monitors and gathers information on a person and how they use their computer.
- It is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
- They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware.
- It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
10 Clues: Something to protect your personal data. • A malicious form of self-replicating software. • It is any information relating to an identifiable person. • a person who uses computers to gain unauthorized access to data. • They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware. • ...
Cybersecurity Introduction 2023-06-18
Across
- Protects your online accounts and prevents unauthorized access
- A program that self-replicates and spreads to other computers
- The practice of tricking individuals into revealing sensitive information
- A type of software designed to block or remove computer viruses
- A software vulnerability that allows unauthorized access to a system
- Malicious software that encrypts files and demands a ransom
Down
- The unauthorized copying or distribution of copyrighted material
- The act of intentionally damaging or disrupting computer systems
- A set of characters used to gain access to a computer system
- A method used to verify the identity of a user
10 Clues: A method used to verify the identity of a user • Malicious software that encrypts files and demands a ransom • A set of characters used to gain access to a computer system • A program that self-replicates and spreads to other computers • Protects your online accounts and prevents unauthorized access • ...
CyberSecurity Crossword 2023-09-02
Across
- Pengiriman pesan maupun objek secara masif dan berulang yang tidak dikehendaki penerimanya. (bahasa inggris)
- Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya
- Salah satu tipe malware yang menyandera data hingga suatu jumlah tebusan dibayarkan (bahasa inggris)
- Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.
Down
- Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)
- Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)
- Alat yang digunakan untuk mentransmisikan data secara aman terhadap jaringan publik sehingga lebih privat, dapat digunakan untuk bekerja remote (singkatan)
- Layanan komputasi termasuk penyimpanan data, perangkat lunak, perangkat keras dan lain-lain, melalui internet. Biasa disebut komputasi awan. (bahasa inggris)
- Istilah untuk jebolnya sistem keamanan data maupun informasi pada suatu entitas (bahasa inggris)
- Salah satu bentuk malware yang bersifat menyamar sebagai suatu program yang valid. Biasa diasosiasikan dengan jenis kuda. (bahasa inggris)
10 Clues: Facebook, X, Instagram, dll. (dua kata, bahasa indonesia) • Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya • Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web. • Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris) • ...
Cybersecurity Concepts 2024-03-31
Across
- a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
- the name commonly given to unwanted emails
- Made up of devices that are all connected to each other, like computers and
- a security system that forms a virtual perimeter around a network of workstations preventing an attack
- the process of verifying the identity of a user or piece of information
Down
- a process of maintaining data confidentiality by converting plain data into secret code
- makes sure that there are no unauthorized changes to information of systems
- A Virtual Private Network
- a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
- a program that gives a hacker remote access to, and control over, a computer or network
10 Clues: A Virtual Private Network • the name commonly given to unwanted emails • the process of verifying the identity of a user or piece of information • makes sure that there are no unauthorized changes to information of systems • Made up of devices that are all connected to each other, like computers and • ...
CyberSecurity 1 2024-07-23
Across
- Entitlement is very closely related to ... performed
- ... to standard is verified during audit
- IAM also differentiates 'authenticate' and ...
- We differentiate between User and ... in IAM
- ISO 27000 standards has 14 categories for ...
Down
- S in SOD
- Issue faced by user in IT
- A in CIA
- C in PDCA
- Example of non-human identity
10 Clues: S in SOD • A in CIA • C in PDCA • Issue faced by user in IT • Example of non-human identity • ... to standard is verified during audit • We differentiate between User and ... in IAM • ISO 27000 standards has 14 categories for ... • IAM also differentiates 'authenticate' and ... • Entitlement is very closely related to ... performed
Cybersecurity Basics 2024-07-25
Across
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
Down
- A security process that verifies the identity of a user or device attempting to access a system.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
10 Clues: A security process that verifies the identity of a user or device attempting to access a system. • Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity Puzzle 2024-07-19
Across
- Unauthorized access to or manipulation of a computer system or network
- A secret word or phrase used to gain access to a system.
- The practice of protecting systems, networks, and programs from digital attacks
- A digital certificate used to encrypt and authenticate a website
- A type of software designed to harm or exploit any programmable device.
Down
- The act of pretending to be someone else to gain sensitive information
- A type of malicious software that demands ransom
- An attack that floods a network with excessive traffic, disrupting service
- Unwanted email that often contains malware or phishing attempts
- Software designed to detect and remove malicious software
10 Clues: A type of malicious software that demands ransom • A secret word or phrase used to gain access to a system. • Software designed to detect and remove malicious software • Unwanted email that often contains malware or phishing attempts • A digital certificate used to encrypt and authenticate a website • ...
cybersecurity Y.V 2024-10-17
Across
- Way a programmer may bypass securityto access a computer through trapdoor programs
- Security system that forms a virtual perimeter around a network
- An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
- software that is secretly installed on a user's device to gather sensitive data
- Damage or destroy a computer network or system
- A malicious computer program
Down
- Block elements from sending you information
- Unwanted advertising, the email equivalant of physical junk
- person who use their skills and talents for good work and keep data safe from other (2_words)
- Person who try to gain unauthorized
10 Clues: A malicious computer program • Person who try to gain unauthorized • Block elements from sending you information • Damage or destroy a computer network or system • Unwanted advertising, the email equivalant of physical junk • Security system that forms a virtual perimeter around a network • ...
cybersecurity Y.V 2024-10-17
Across
- Damage or destroy a computer network or system
- A malicious computer program
- person who use their skills and talents for good work and keep data safe from other (2_words)
- Security system that forms a virtual perimeter around a network
Down
- Way a programmer may bypass securityto access a computer through trapdoor programs
- An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
- Block elements from sending you information
- Unwanted advertising, the email equivalant of physical junk
- Person who try to gain unauthorized
- software that is secretly installed on a user's device to gather sensitive data
10 Clues: A malicious computer program • Person who try to gain unauthorized • Block elements from sending you information • Damage or destroy a computer network or system • Unwanted advertising, the email equivalant of physical junk • Security system that forms a virtual perimeter around a network • ...
Crossword - Harold Benjamin 2023-09-08
Across
- Financial institution licensed
- Stationery company
- Fraudulent practice of acquiring sensitive data via emails
- Document sent via telecommunications
- Concealing management of illegally earnt money
- Protection of computer systems and networks
- Secured lending partner (last name)
- Goddess of health
- Client booking system at HH
- Transfer of property from one to another
- Private client partner (last name)
Down
- Equitable and fair treatment
- Operations director (last name)
- Dishonest persuasion with a gift or money
- Process of taking legal action
- Emailing system at HB
- Folder of court documents
- Offsite archiving company
- Case management system at HB
- Qualified legal professional
- Managing partner (last name)
21 Clues: Goddess of health • Stationery company • Emailing system at HB • Folder of court documents • Offsite archiving company • Client booking system at HH • Equitable and fair treatment • Case management system at HB • Qualified legal professional • Managing partner (last name) • Financial institution licensed • Process of taking legal action • Operations director (last name) • ...
Issue #1 2023-09-11
Across
- The Spooky Month Holiday
- Red ________ Week - Keeping kids drug-free
- Magnolia ________ Institute
- Racket sport this season
- Recent Hurricane in California
Down
- Seniors should be thinking about their college __________
- Homecoming King and ______
- Applying to a 4-year __________
- Future __________ Leaders of America Club
9 Clues: The Spooky Month Holiday • Racket sport this season • Homecoming King and ______ • Magnolia ________ Institute • Recent Hurricane in California • Applying to a 4-year __________ • Future __________ Leaders of America Club • Red ________ Week - Keeping kids drug-free • Seniors should be thinking about their college __________
Shayaans Life 2023-01-11
10 Clues: pc • what i do • what is aphone • My favorite game • where i used to live • what I have as a pet • what I have as another pet • something better than cookies • what is the base of a computer • what i think my future job is going to be
Cybersecurity : Keselamatan Sosial Media 2023-06-02
Across
- Fikir sebelum __
- Kebiasaan phishing dilakukan melalui __
- Sejenis malware yang menyerang komputer sehingga dituntut tebusan
- Set strict __ pada akaun media sosial
- Perbuatan mencuri maklumat peribadi seseorang
- Sejenis scam menggunakan e-mel atau mesej
- Sejenis bully yang berlaku dalam talian
Down
- Sosial media merupakan satu rangkaian __
- Cyberbully dilakukan melalui text, imej dan __
- Tutup __ lama
- Maklumat peribadi
- Amalan melindungi rangkaian daripada serangan digital
12 Clues: Tutup __ lama • Fikir sebelum __ • Maklumat peribadi • Set strict __ pada akaun media sosial • Kebiasaan phishing dilakukan melalui __ • Sejenis bully yang berlaku dalam talian • Sosial media merupakan satu rangkaian __ • Sejenis scam menggunakan e-mel atau mesej • Perbuatan mencuri maklumat peribadi seseorang • Cyberbully dilakukan melalui text, imej dan __ • ...
Lesson 1.3 2023-03-08
8 Clues: bugs and … • financial information • arise new security issues • they mitigate vulnerabilities • personal identity information • its top priority is make money • a weakness or a lack of countermeasures • it's a byproduct of technological change
Nicole & Sam 2023-04-26
Across
- What is Sam's favorite color?
- Nicole's major in college
- The couple's favorite football team
- Where they went the night they met
- Sam's major in college
- The bride's new last name
Down
- Groom's middle name
- Who is the couple's dog?
- Bride's first name
- Name of restaurant where the couple had their first date
- Where Sam went to college
- Where Nicole went to college
- Who made the first move?
- number of years together
14 Clues: Bride's first name • Groom's middle name • Sam's major in college • Who is the couple's dog? • Who made the first move? • number of years together • Where Sam went to college • Nicole's major in college • The bride's new last name • Where Nicole went to college • What is Sam's favorite color? • Where they went the night they met • The couple's favorite football team • ...
Cybersecurity and Cryptography 2024-10-17
Across
- What is a digital document that verifies the ownership of a public key?
- What type of malware records keystrokes made by a user?
- What term refers to the permission to enter or use a system or network?
- What term refers to malicious software designed to harm or exploit devices?
- What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- term describes a weakness in a system that can be exploited by threats?
- What is the process of verifying the identity of a user or system?
- What is the process of converting data into a fixed-size string of characters for security?
Down
- What device monitors and controls incoming and outgoing network traffic?
- What is the process of converting ciphertext back into plaintext?
- What protocol secures data sent over the internet by encrypting it?
- What is the process of converting plaintext into ciphertext to protect information?
- What is the process of creating copies of data to restore in case of loss?
- What is a physical or digital object used to prove identity in security systems?
- What type of malware disguises itself as legitimate software?
15 Clues: What type of malware records keystrokes made by a user? • What type of malware disguises itself as legitimate software? • What is the process of converting ciphertext back into plaintext? • What is the process of verifying the identity of a user or system? • What protocol secures data sent over the internet by encrypting it? • ...
Technology in PMI 2024-04-19
8 Clues: online safety • detects changes • design trial phase • base or foundation • new creative ideas • problem solver, creator • a machine that compresses the leaves • a simplified model or imitation of an object or a process
Cybersecurity Careers Crossword 2022-09-26
Across
- the process of getting new software or hardware up and running
- small groups of similar careers within a career cluster
- the study of technologies to determine their usefulness
- a person who creates, manages, and maintains computer networks, software, and systems
- they ensure hardware, software, and other systems are working properly
- This person improves and maintains an information technology system
- creating or improving any part of technology
- the change in the number of people that are employed in a certain occupation in the future
- computer programs that run by giving instructions to the computer
Down
- a flaw or weakness that may allow harm to occur in an information technology system
- it is two or more computers or devices that exchange data
- all hardware, software, and other equipment operated by a group of users
- A type of software that can be installed and run on a computer, tablet, or other electronic device
- clusters a group of careers with similar features
- the physical parts that make up a computer or device
15 Clues: creating or improving any part of technology • clusters a group of careers with similar features • the physical parts that make up a computer or device • small groups of similar careers within a career cluster • the study of technologies to determine their usefulness • it is two or more computers or devices that exchange data • ...
Cybersecurity In December 2022-12-21
Across
- 2 or more computers/devices connected together to share resources
- The process of identifying a user's identity
- Coding used to protect your information from unauthorized access
- a form of malware that spies on you and your computer activities
- acronym for Virtual Private Network
- an update released to fix bugs and other vulnerabilities
- Used to keep intruders out
Down
- Software or device that has a flaw that can be exploited
- software or hardware used to combat viruses
- malware that looks legitimate, like the Greek horse
- MALicious softWARE
- a copy of data that is used in case of emergencies
- Software that is used to encrypt a user's files then demand ransom
- Trying to get sensitive information through social engineering
- the act of using a vulnerability
15 Clues: MALicious softWARE • Used to keep intruders out • the act of using a vulnerability • acronym for Virtual Private Network • software or hardware used to combat viruses • The process of identifying a user's identity • a copy of data that is used in case of emergencies • malware that looks legitimate, like the Greek horse • ...
Puzzle #4 2024-05-07
Across
- corrective action/suggestions for improvement
- proof
- process effected by management to provide reasonable assurance
- daily paid union
- an illegal act for financial or personal gain
- protecting sensitive information from unauthorised persons
Down
- monthly paid union
- formal statement of organisation's goal and objectives
- protecting systems, networks, and programs from digital attacks
- proper disclosure of financial information
- competing interest
- highest governing body
- event/action that negatively affects the achievement of objectives
13 Clues: proof • daily paid union • monthly paid union • competing interest • highest governing body • proper disclosure of financial information • corrective action/suggestions for improvement • an illegal act for financial or personal gain • formal statement of organisation's goal and objectives • protecting sensitive information from unauthorised persons • ...
Tech Talk 2024-03-23
Across
- Machine mimicking human intelligence
- Machines that work like humans
- Global network of computers
- A place you can visit without leaving your chair
- Math behind problem-solving
- Can be plug in many devices
- The brain of a computer
- Protects your computer from attacks
Down
- A field that protect computer systems,networks from digital attacks.
- Graphics processor unit
- Physical parts of a computer
- Getting a file from the internet
- A collection of data
- Malicious software
- The programs of computer
- Needs a mouse and keyboard
16 Clues: Malicious software • A collection of data • Graphics processor unit • The brain of a computer • The programs of computer • Needs a mouse and keyboard • Global network of computers • Math behind problem-solving • Can be plug in many devices • Physical parts of a computer • Machines that work like humans • Getting a file from the internet • Protects your computer from attacks • ...
#InfraNet Cyber Awareness 2022-10-13
Across
- Security or house
- Password attack method
- Doesn'trequire a host file to replicate itself
- This horse can stampede your security defenses
- Who is responsible for cybersecurity
- Verifying identity
- Unauthorized access to a network
- Scrambling text into an unreadable format
- Similar to a password
Down
- Any crime committed electronically
- Watches where you go on the internet
- Multi-factor authentication
- Cyber awareness month
- Wireless technology using short-wave UHF radio waves
- Attack attempt to acquire personal information
- Prevents unauthorized access to or from a private network
- The address of a webpage
- Program that is designed to automate tasks
- Chief information security officer
19 Clues: Security or house • Verifying identity • Cyber awareness month • Similar to a password • Password attack method • The address of a webpage • Multi-factor authentication • Unauthorized access to a network • Any crime committed electronically • Chief information security officer • Watches where you go on the internet • Who is responsible for cybersecurity • ...
4IR Technologies Pillars 2023-09-11
10 Clues: 4IR Act element (S) • 4IR Act element (3) • 4IR Act element (A) • 4IR Act element (A) • 4IR Sense element (C) • 4IR Sense element (C) • 4IR Sense element (I) • 4IR Analysis element (A) • 4IR Analysis element (C) • 4IR Analysis element (B)
NAVFAC's Ten Capabilities 2023-02-13
Across
- ________Facilities and Equipment Engineering
- detailed coordination of a complex operation involving people, facilities, or supplies.
- NAVFAC Capabilities: ______ & Construction
- NEPA requirement: Environmental __________
- a proposed or planned undertaking
- NAVFAC Capabilities: Environmental ___________
- Real Estate _________ and Management
- Basic physical and organizational structures and facilities
- ________ Handling Ashore Procurement
Down
- Protection against criminal or unauthorized use of electronic data
- Military Construction Acronym
- _______ and Facilities Operations
- ___________ Conservation: Health assessment of natural and cultural resources
- NAVFAC Capabilities: _________ & Facility Operations
- _________ Vehicles provide transportation services
15 Clues: Military Construction Acronym • _______ and Facilities Operations • a proposed or planned undertaking • Real Estate _________ and Management • ________ Handling Ashore Procurement • NAVFAC Capabilities: ______ & Construction • NEPA requirement: Environmental __________ • ________Facilities and Equipment Engineering • NAVFAC Capabilities: Environmental ___________ • ...
Issue 1 2023-04-14
Across
- Teacher in charge of MagTV
- Farm behind Magnolia
- Water sports (not necessarily just swimming)
- Vietnamese Dual Language Immersion Program
- Magnolia _______ Institute
- City we're located in
Down
- Girls' soccer and ________ made it to CIF
- The classic writing tool for students (that always seems to go missing when you need it)
- Book and _____ Club
- Associated Student Body
- Room 404 teacher
- Medical pathway, BITA, and JROTC are ___ programs
- Teacher in charge of Theater classes
13 Clues: Room 404 teacher • Book and _____ Club • Farm behind Magnolia • City we're located in • Associated Student Body • Teacher in charge of MagTV • Magnolia _______ Institute • Teacher in charge of Theater classes • Girls' soccer and ________ made it to CIF • Vietnamese Dual Language Immersion Program • Water sports (not necessarily just swimming) • ...
Cybersecurity Awareness 2023 2023-10-06
Across
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
- Digital ______ is the ability to use digital technology and media effectively
- Illegal _____ of copyrighted material is often referred to as piracy
- Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- Cybersecurity awareness month
- Online commenter whose intent is to attack views expressed online; these attacks are often personal
- Many features in online _____ can expose players to predators
- A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
- A person who attempts to gain unauthorized access to computer systems
- _____ settings help control things like your profile, contact, and other information relating to your account
- Online harrassment
- A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
- ______ theft is a type of crime in which your private information is stolen and used for criminal activity
- Designed to detect and destroy computer viruses
15 Clues: Online harrassment • Cybersecurity awareness month • Designed to detect and destroy computer viruses • Many features in online _____ can expose players to predators • Illegal _____ of copyrighted material is often referred to as piracy • A person who attempts to gain unauthorized access to computer systems • ...
Cybersecurity and Cryptography 2024-10-17
Across
- What device monitors and controls incoming and outgoing network traffic?
- What is a digital document that verifies the ownership of a public key?
- term describes a weakness in a system that can be exploited by threats?
- What is the process of converting data into a fixed-size string of characters for security?
- What is the process of converting plaintext into ciphertext to protect information?
- What is the process of converting ciphertext back into plaintext?
- What type of malware disguises itself as legitimate software?
- What type of malware records keystrokes made by a user?
Down
- What is a physical or digital object used to prove identity in security systems?
- What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- What term refers to malicious software designed to harm or exploit devices?
- What term refers to the permission to enter or use a system or network?
- What protocol secures data sent over the internet by encrypting it?
- What is the process of verifying the identity of a user or system?
- What is the process of creating copies of data to restore in case of loss?
15 Clues: What type of malware records keystrokes made by a user? • What type of malware disguises itself as legitimate software? • What is the process of converting ciphertext back into plaintext? • What is the process of verifying the identity of a user or system? • What protocol secures data sent over the internet by encrypting it? • ...
Cybersecurity Vocab 2 2021-09-28
Across
- biometrics considered invalid
- Resources such as computers and accounts
- cycle or new roles
- Validating a user
- authorizing access to user using biological feature
- token into USB port
- permission giver from other things
- denying authorized biometircs credential
- permission recieved from higher level
Down
- Everyplace the hacker can get into
- standard authentication protocol
- permission given at certain lications
- reducing vulnerability
- Identity Managementsemi-independent systems
- FAR and FRR are equal
15 Clues: Validating a user • cycle or new roles • token into USB port • FAR and FRR are equal • reducing vulnerability • biometrics considered invalid • standard authentication protocol • Everyplace the hacker can get into • permission giver from other things • permission given at certain lications • permission recieved from higher level • Resources such as computers and accounts • ...
October Cybersecurity Month 2019-09-19
Across
- Department to call for computer problem
- A device you should not plug in
- Think before you -- ?
- A type of malware that encrypts your file
- Something you should never share
- Programs installed on your phone are called?
Down
- Location of the Bank's Disaster Recovery Site
- A type of an email scam
- key word used to send secure email
- Password should always be?
- Northern Bank's Mission Statement
- Location of the Bank's head quarter
- A way to access the bank resources remotely
- Last name of the head of IT
- Type of an Operating system
15 Clues: Think before you -- ? • A type of an email scam • Password should always be? • Last name of the head of IT • Type of an Operating system • A device you should not plug in • Something you should never share • Northern Bank's Mission Statement • key word used to send secure email • Location of the Bank's head quarter • Department to call for computer problem • ...
cybersecurity Puzzle-Enrique 2023-08-22
Across
- prevents unauthorized changes
- scrambling data
- UI redress attack
- false perception of reality
- disguised attacks
- fools users into providing sensitive information
- personal laptop, smart phones, ect
Down
- online harassment
- virtual private network
- locks users out until they pay
- short for malicious software
- prevents unauthorized access
- transmits information without user knowing
- codes that protect data
- carry out cyber attacks on other systems
15 Clues: scrambling data • online harassment • UI redress attack • disguised attacks • virtual private network • codes that protect data • false perception of reality • short for malicious software • prevents unauthorized access • prevents unauthorized changes • locks users out until they pay • personal laptop, smart phones, ect • carry out cyber attacks on other systems • ...
October Cybersecurity Month 2019-09-19
Across
- A device you should not plug in
- Last name of the head of IT
- Location of the Bank's Disaster Recovery Site
- Type of an Operating system
- key word used to send secure email
- Programs installed on your phone are called?
- Think before you -- ?
Down
- A type of malware that encrypts your file
- Something you should never share
- A type of an email scam
- Department to call for computer problem
- Location of the Bank's head quarter
- Northern Bank's Mission Statement
- Password should always be?
- A way to access the bank resources remotely
15 Clues: Think before you -- ? • A type of an email scam • Password should always be? • Last name of the head of IT • Type of an Operating system • A device you should not plug in • Something you should never share • Northern Bank's Mission Statement • key word used to send secure email • Location of the Bank's head quarter • Department to call for computer problem • ...
October Cybersecurity Month 2019-09-19
Across
- Something you should never share
- A type of an email scam
- Location of the Bank's Disaster Recovery Site
- Northern Bank's Mission Statement
- Last name of the head of IT
- Department to call for computer problem
- Location of the Bank's head quarter
- Password should always be?
Down
- A type of malware that encrypts your file
- Type of an Operating system
- Think before you -- ?
- A way to access the bank resources remotely
- Programs installed on your phone are called?
- key word used to send secure email
- A device you should not plug in
15 Clues: Think before you -- ? • A type of an email scam • Password should always be? • Type of an Operating system • Last name of the head of IT • A device you should not plug in • Something you should never share • Northern Bank's Mission Statement • key word used to send secure email • Location of the Bank's head quarter • Department to call for computer problem • ...
Cybersecurity and Cryptography 2024-10-17
Across
- What device monitors and controls incoming and outgoing network traffic?
- What is a digital document that verifies the ownership of a public key?
- term describes a weakness in a system that can be exploited by threats?
- What is the process of converting data into a fixed-size string of characters for security?
- What is the process of converting plaintext into ciphertext to protect information?
- What is the process of converting ciphertext back into plaintext?
- What type of malware disguises itself as legitimate software?
- What type of malware records keystrokes made by a user?
Down
- What is a physical or digital object used to prove identity in security systems?
- What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- What term refers to malicious software designed to harm or exploit devices?
- What term refers to the permission to enter or use a system or network?
- What protocol secures data sent over the internet by encrypting it?
- What is the process of verifying the identity of a user or system?
- What is the process of creating copies of data to restore in case of loss?
15 Clues: What type of malware records keystrokes made by a user? • What type of malware disguises itself as legitimate software? • What is the process of converting ciphertext back into plaintext? • What is the process of verifying the identity of a user or system? • What protocol secures data sent over the internet by encrypting it? • ...
Cybersecurity 2022-11-01
6 Clues: ___ should use a unsecure password • The best passwords are easy to ____ • Is this a strong password: Muff1n M@n!! • Should you make your password 5 characters? • A strong password has at least __ characters • The best passwords have lowercase and __ letters
Cybersecurity 2023-08-14
Across
- Designed to deny a user or organisation access to files on their computer.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- An attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
Down
- Intrusive software developed to steal data and damage or destroy computers and computer systems.
- When attackers attempt to trick users into doing 'the wrong thing.
- Process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
6 Clues: When attackers attempt to trick users into doing 'the wrong thing. • Designed to deny a user or organisation access to files on their computer. • Intrusive software developed to steal data and damage or destroy computers and computer systems. • The act of compromising digital devices and networks through unauthorized access to an account or computer system. • ...
Cybersecurity 2024-02-29
Across
- is a cyber attack intended to redirect a website's traffic to another, fake site
- PIN numbers.
- is the act of creating a scenario where the victim gives out personal information
Down
- is observing a person's private information over their shoulder e.g. cashpoint
- is a technique of fraudulently obtaining private information, often using email or SMS.
- Malicious software is called?
6 Clues: PIN numbers. • Malicious software is called? • is observing a person's private information over their shoulder e.g. cashpoint • is a cyber attack intended to redirect a website's traffic to another, fake site • is the act of creating a scenario where the victim gives out personal information • ...
Information Security Terms 2024-01-31
Across
- Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- A software vulnerability that is exploited by attackers before the vendor releases a fix.
- of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- The process of converting data into a code to prevent unauthorized access.
- Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- Software designed to detect and remove malicious software from a computer.
- The process of verifying the identity of a user, system, or device.
- Security: Security measures to protect network endpoints, such as computers and mobile devices.
- Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- A network security device that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A software update designed to fix vulnerabilities or improve security.
16 Clues: The process of verifying the identity of a user, system, or device. • A software update designed to fix vulnerabilities or improve security. • Software designed to detect and remove malicious software from a computer. • The process of converting data into a code to prevent unauthorized access. • ...
Information Security Terms 2024-01-31
Across
- Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- A software vulnerability that is exploited by attackers before the vendor releases a fix.
- of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- The process of converting data into a code to prevent unauthorized access.
- Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- Software designed to detect and remove malicious software from a computer.
- The process of verifying the identity of a user, system, or device.
- Security: Security measures to protect network endpoints, such as computers and mobile devices.
- Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- A network security device that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A software update designed to fix vulnerabilities or improve security.
16 Clues: The process of verifying the identity of a user, system, or device. • A software update designed to fix vulnerabilities or improve security. • Software designed to detect and remove malicious software from a computer. • The process of converting data into a code to prevent unauthorized access. • ...
Shayaans Life 2023-01-11
10 Clues: what is aphone • My favorite game • an animal I hate • my favorite food • what I have as a pet • where i used to live • what I have as another pet • are something better than cookies • what is the base code of a computer • what i think my future job is going to be
M3 test crossword 2023-06-14
Across
- Stops electricity from flowing, rubber.
- Power from water.
- Happens again and again.
- Power from Earth's heat.
- Online protection.
Down
- Power lines connecting power supplies to homes in a large area.
- Measures the voltage in the circuit.
- Makes power and electricity.
- If it's high, power is low.
- Allows electricity to flow, metal.
10 Clues: Power from water. • Online protection. • Happens again and again. • Power from Earth's heat. • If it's high, power is low. • Makes power and electricity. • Allows electricity to flow, metal. • Measures the voltage in the circuit. • Stops electricity from flowing, rubber. • Power lines connecting power supplies to homes in a large area.
CROSSWORD 2023-01-12
Across
- The art of cooking.
- Learns to handle and drive large machines.
- Focuses on fighting fires.
- Information Technology.
- Learns to teach young children.
- Deals with teeth.
- The art of mending metals.
- Dog, cat, and pet care.
- Digital photography, planning, and recording.
- Heating, ventilation, and air Conditioning.
Down
- Builds and constructs things.
- Learns how to do procedures on people in need.
- Hair, makeup, and nails.
- Learns to keep devices safe and secure.
- Laws, justice, and how to enforce them.
- Learns to design and print.
- Nursing and saving lives.
- Learns to do auto care and maintenance.
- Installs, removes, and repairs electric.
19 Clues: Deals with teeth. • The art of cooking. • Information Technology. • Dog, cat, and pet care. • Hair, makeup, and nails. • Nursing and saving lives. • Focuses on fighting fires. • The art of mending metals. • Learns to design and print. • Builds and constructs things. • Learns to teach young children. • Learns to keep devices safe and secure. • Laws, justice, and how to enforce them. • ...
Telecom Olympics 2020 2020-04-10
Across
- Making copies of data
- Tech Support Company
- Don't open ___ from people you don't know
- WCTA is ____ years old
- Use ____ passwords
- The capacity of a telecom line to carry signals
- Network security system used to stop unauthorized access
- Communication over a distance
- A piece of code that is capable of destroying data
Down
- Board President
- NIST involves strategies for ____
- The activity of defrauding by posing as a legit business
- Someone who seeks to exploit weaknesses in a network
- What is a CDR?
14 Clues: What is a CDR? • Board President • Use ____ passwords • Tech Support Company • Making copies of data • WCTA is ____ years old • Communication over a distance • NIST involves strategies for ____ • Don't open ___ from people you don't know • The capacity of a telecom line to carry signals • A piece of code that is capable of destroying data • ...
Garrett & Angie 2024-04-23
Across
- The city where Garrett proposed
- Angie's favorite type of wine
- Garrett's college degree
- Their favorite sport to watch together
- Couples' favorite sport to play together
- The current city the couple lives in
- The # of years the couple has been together
Down
- Couples' favorite TV show to watch together
- The sport Garrett played in college
- Garrett's middle name
- Angie's middle name
- City where Angie was born
- The state where the couple went to college
- Angie's college degree
14 Clues: Angie's middle name • Garrett's middle name • Angie's college degree • Garrett's college degree • City where Angie was born • Angie's favorite type of wine • The city where Garrett proposed • The sport Garrett played in college • The current city the couple lives in • Their favorite sport to watch together • Couples' favorite sport to play together • ...
Profesi dan peluang usaha dibildang tkjt 2023-11-17
Across
- memastikan perusahaan mematuhi peraturan dan standar keamanan TI
- pembuat konten
- mengelola dan memelihara jaringan komputer perusahaan
- bertanggung jawab memelihara jaringan komputer
- mengkroordinasikan proyek proyek TI
Down
- yang mengelola jaringan komputer
- membangun dan mengembangkan situs web
- memberikan pelatihan tentang penggunaan teknologi
- yang mengembangkan kecerdasan buatan
- yang menjaga keamanan terhadap sistem insfastrukur TI
10 Clues: pembuat konten • yang mengelola jaringan komputer • mengkroordinasikan proyek proyek TI • yang mengembangkan kecerdasan buatan • membangun dan mengembangkan situs web • bertanggung jawab memelihara jaringan komputer • memberikan pelatihan tentang penggunaan teknologi • yang menjaga keamanan terhadap sistem insfastrukur TI • ...
Cybersecurity 2022-09-29
Across
- An attack that attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.
- Attacker invents a scenario in order to convince the victim to give them data or money.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- Sending an email designed to trick the recipient into giving away personal information
- Any malware that misleads users of its true intent.
- Someone that gains unauthorised access to a device or sever.
6 Clues: Any malware that misleads users of its true intent. • Someone that gains unauthorised access to a device or sever. • Sending an email designed to trick the recipient into giving away personal information • Attacker invents a scenario in order to convince the victim to give them data or money. • ...
Cybersecurity 2024-01-09
6 Clues: Type of social engineering attack • A secret code to access your account • Software update to fix vulnerabilities • Malicious code that can harm your computer • Protective barrier against unauthorized access • Process of converting data to prevent unauthorized access
Cybersecurity 2020-08-24
Across
- Proposito informatico de detectar virus
- Estafa que busca sacrte datos bancarios, o tarjetas
- Se quedan con tu informacion como la de ingreso, nombre de usuario no espian
Down
- Sofwtare malo que esta hecho para meterse infiltradamente a una computadora
- Programas que no son originales y que te cambian y inhabilitan el acceso a tu computadora
- Hace que no pueda entrar nadie infiltrado a tu computadora
6 Clues: Proposito informatico de detectar virus • Estafa que busca sacrte datos bancarios, o tarjetas • Hace que no pueda entrar nadie infiltrado a tu computadora • Sofwtare malo que esta hecho para meterse infiltradamente a una computadora • Se quedan con tu informacion como la de ingreso, nombre de usuario no espian • ...
Cybersecurity 2022-08-15
6 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • The United States' first state-specific consumer privacy law
Cybersecurity 2022-11-01
6 Clues: ___ should use a unsecure password • The best passwords are easy to ____ • Is this a strong password: Muff1n M@n!! • Should you make your password 5 characters? • A strong password has at least __ characters • The best passwords have lowercase and __ letters
NCSAM 2021 Crossword 2021-08-05
Across
- TIAA’s associates are our company’s first and best line of _______ against cyber criminals.
- Smart devices such as Amazon Alexa, Google Speakers, and Smart Appliances are examples of what?
- What malware propagates without a host program?
- Tips to keep your home office secure: _____ your computer when you step away, and shut it down at the end of the day.
- A _____ is email monitoring designed to prevent unwanted email and deliver good email. Messages that this will block include spam, phishing attacks, malware or fraudulent content.
- What does the A in CAP stand for?
- What TIAA Cybersecurity team manages the full lifecycle of user access to applications and systems. Hint: _______ and Access Management
- What malware encrypts files and demands money for the decryption key?
- This year Cyber has rebranded as TIAA _____ Cybersecurity
Down
- What is the last name of the TIAA Bank CISO?
- A good way to secure your devices at home is by regularly _______
- What type of attack do patches not prevent against?
- The probability of exposure or loss of assets is considered what?
- What type of information is private and identifies people?
- What technology allows information sent over the internet to remain private or confidential?
- What do most modern websites use to provide encryption?
- Which industry is most targeted by social engineers?
- Multifactor _____ adds extra layers of security when logging in.
- A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
19 Clues: What does the A in CAP stand for? • What is the last name of the TIAA Bank CISO? • What malware propagates without a host program? • What type of attack do patches not prevent against? • Which industry is most targeted by social engineers? • What do most modern websites use to provide encryption? • This year Cyber has rebranded as TIAA _____ Cybersecurity • ...
Guess me If you Can 2022-06-29
Across
- Moral philosophy
- of conduct A set of rules
- An event that is either unpleasant or unusual
- The act of obeying an order, rule, or request
- Possibility of loss or injury
- A set of guidelines
Down
- An official inspection
- One who reports suspected wrongdoing
- Verification of the identity
- Protection of internet-connected system
10 Clues: Moral philosophy • A set of guidelines • An official inspection • of conduct A set of rules • Verification of the identity • Possibility of loss or injury • One who reports suspected wrongdoing • Protection of internet-connected system • An event that is either unpleasant or unusual • The act of obeying an order, rule, or request
Guess Me If You Can 2022-06-29
Across
- Moral philosophy
- of conduct A set of rules
- An event that is either unpleasant or unusual
- The act of obeying an order, rule, or request
- Possibility of loss or injury
- A set of guidelines
Down
- An official inspection
- One who reports suspected wrongdoing
- Verification of the identity
- Protection of internet-connected system
10 Clues: Moral philosophy • A set of guidelines • An official inspection • of conduct A set of rules • Verification of the identity • Possibility of loss or injury • One who reports suspected wrongdoing • Protection of internet-connected system • An event that is either unpleasant or unusual • The act of obeying an order, rule, or request
Majors and Concentrations 2022-01-26
Across
- learns to protect on a digital platform
- the scientific study of mind and behavior
- works with chemicals and beakers
- spends a lot of time with a calculator
- studies the ocean
- synthesizes math science and creativity to build things
Down
- studies how to effectively target consumers
- synthesizes biology and chemistry
- clinicals are part of the program
- studies the past
- lights...camera...action!
- the study of living organisms
12 Clues: studies the past • studies the ocean • lights...camera...action! • the study of living organisms • works with chemicals and beakers • synthesizes biology and chemistry • clinicals are part of the program • spends a lot of time with a calculator • learns to protect on a digital platform • the scientific study of mind and behavior • studies how to effectively target consumers • ...
NAVFAC Capabilities 2023-02-16
Across
- NEPA regulations requirement
- ________ Handling Ashore Procurement
- ________Facilities and Equipment Engineering
- Protection against criminal or unauthorized use of electronic data
- Basic physical and organizational structures and facilities
- Real Estate _________ and Management
Down
- _______ and Facilities Operations
- _________ Vehicles provide transportation services
- Relating to impact of human activity on the natural world
- Proposed or planned undertaking
- NAVFAC Capabilities: ______ & Construction
- Detailed coordination of a complex operation involving people, facilities, or supplies.
12 Clues: NEPA regulations requirement • Proposed or planned undertaking • _______ and Facilities Operations • ________ Handling Ashore Procurement • Real Estate _________ and Management • NAVFAC Capabilities: ______ & Construction • ________Facilities and Equipment Engineering • _________ Vehicles provide transportation services • ...
Family Puzzle Time! 2022-01-11
Across
- A game completed by all three (human) family members
- Messengers for Demon Slayers
- The most dignified gentleman in the house
- The go-to nightly unwind YouTube videos
- Katie's favorite novel!
- Both our favorite burger AND a character on Venture Brothers
Down
- Taylor's favorite dinner food
- Beckett's college major!
- Toss a coin to this guy
- He loves nighttime belly pets!
- Please don't tell people how he lives
- He loves to play on the bachelor pad
- Our favorite doggo!
- This guy loves to grind...
14 Clues: Our favorite doggo! • Toss a coin to this guy • Katie's favorite novel! • Beckett's college major! • This guy loves to grind... • Messengers for Demon Slayers • Taylor's favorite dinner food • He loves nighttime belly pets! • He loves to play on the bachelor pad • Please don't tell people how he lives • The go-to nightly unwind YouTube videos • ...
Jenny and Nate 2023-01-19
Across
- Jenny is the _________ of her siblings
- What God has _______, let not man separate
- State where honeymoon will be
- Relationship of flower girl (Esther) to Jenny
- Name of wedding venue
- ”Mawiage, mawiage, is what ______ us together today”
- Nate’s birthday month
- Jenny's major
- The couple's favorite author, hint: Narnia
Down
- _____ is patient and kind
- Nate’s hometown, hint: rhymes with “mutton”
- Jenny played this sport in high school
- Nate plays this instrument
- Nate's major
- The formal event to declare a marriage
- Jenny’s birthday month
- First date, hint: Omaha Art Museum
- You may now _____ the bride
- Who drinks coffee black? Him or her
- Class Nate and Jenny met in
20 Clues: Nate's major • Jenny's major • Name of wedding venue • Nate’s birthday month • Jenny’s birthday month • _____ is patient and kind • Nate plays this instrument • You may now _____ the bride • Class Nate and Jenny met in • State where honeymoon will be • First date, hint: Omaha Art Museum • Who drinks coffee black? Him or her • Jenny is the _________ of her siblings • ...
Puzzle 2023-01-13
9 Clues: Our own ERP • Password Manager • we comply this compliance • I help you plan and visualise • As a manufacturer we ship this • I am Zoho’s new bee for calibri • Financial platform for business • we protect from malicious attacks • Zoho’s attempt on server less journey
ict 2023-09-16
Across
- unwanted and unsolicited email.
- machine that processes data.
- a structured collection of data.
- prevents data loss.
- writing code to instruct a computer.
- helps data find its way
- return to an initial state.
- Usually in one location.
- online storage and computing resources.
- blocks unwanted traffic
Down
- connects devices in a network.
- step-by-step procedure for solving a problem.
- wireless data transfer technology.
- programs that run on a computer.
- protecting computer systems from threats.
- a global network of connected computers.
- technology that allows data transmission without physical connections.
- keeps data secure.
- electroniconic communication method for sending and receiving messages.
- the global system of interconnected computer networks.
20 Clues: keeps data secure. • prevents data loss. • helps data find its way • blocks unwanted traffic • Usually in one location. • return to an initial state. • machine that processes data. • connects devices in a network. • unwanted and unsolicited email. • a structured collection of data. • programs that run on a computer. • wireless data transfer technology. • ...
Production & Process 2024-07-11
Across
- a series of actions or steps taken in order to achieve a particular end result
- Teddy Swims loses this
- American painter Norman _______
- abbreviation for digital transformation
- continually rhymes with domination
- large scale industrial production
Down
- protection from digital attacks
- "baby you can _____ my car"
- for indicating, measuring, and recording physical quantities
- Cirrus, Stratus, Cumulus to name a few
- setting standards for controls and automation
- should always be first
12 Clues: Teddy Swims loses this • should always be first • "baby you can _____ my car" • protection from digital attacks • American painter Norman _______ • large scale industrial production • continually rhymes with domination • Cirrus, Stratus, Cumulus to name a few • abbreviation for digital transformation • setting standards for controls and automation • ...
Majors and Concentrations 2022-01-26
Across
- studies the past
- studies the ocean
- lights...camera...action!
- spends a lot of time with a calculator
- the study of living organisms
Down
- studies how to effectively target consumers
- the scientific study of mind and behavior
- clinicals are part of the program
- synthesizes biology and chemistry
- learns to protect on a digital platform
- works with chemicals and beakers
- synthesizes math science and creativity to build things
12 Clues: studies the past • studies the ocean • lights...camera...action! • the study of living organisms • works with chemicals and beakers • clinicals are part of the program • synthesizes biology and chemistry • spends a lot of time with a calculator • learns to protect on a digital platform • the scientific study of mind and behavior • studies how to effectively target consumers • ...
Cyberpatriot 2023-02-08
Across
- gives instructions on what to do
- protection of digital assets
- where users are sorted and adjusted
- protects against incoming cyberattacks
Down
- the scrambling of data to protect it
- gives points for answering questions
- where the competition takes place
- file disguised as something else
- software with ill intents
9 Clues: software with ill intents • protection of digital assets • file disguised as something else • gives instructions on what to do • where the competition takes place • where users are sorted and adjusted • the scrambling of data to protect it • gives points for answering questions • protects against incoming cyberattacks
Computer Basics 2023-04-06
Across
- email scam
- computers talking to computers
- a computer used for math
- instructions for a computer online
- online protection from hackers
- shortcut for linking in a document
Down
- a common output from typing or drawing
- a set of step-by-step instructions
- an input device with letters and numbers
- people that try to take your online inforamtion
- a websites name
- most used search engine
- device that takes an input and gives an output
13 Clues: email scam • a websites name • most used search engine • a computer used for math • computers talking to computers • online protection from hackers • a set of step-by-step instructions • instructions for a computer online • shortcut for linking in a document • a common output from typing or drawing • an input device with letters and numbers • ...
klausimai 2023-05-17
Across
- Kas yra „object-oriented programming“?
- Kas yra žurnalavimas?
- Kas yra „data cente?
- Kas yra „software development life cycle“?
- Kas yra „operating system“?
- Kas yra „network protocol“?
- Kas yra „serveris“?
- Kas yra „cloud computing“?
- Kas yra „version control“?
- Kas yra „URL“?
- Kas yra „cybersecurity“?
- Kas yra „cache“?
- Kas yra „cyber attack“?
- Kas yra „bug“
- Kas yra „router“?
- Kas yra „firewall“?
Down
- Kas yra „artificial intelligence“?
- Kas yra „RAM“?
- Kas yra „encryption“?
- Kas yra „HTML“?
- Kas yra „API“?
- Kas yra „data backup“?
- Kas yra „malware“?
- Kas yra „database management system“?
- Kas yra algoritmas
- Kas yra duomenų bazė?
- Kas yra „programming language“?
- Kas yra „data mining“?
- Kas yra „open source“?
- Kas yra „user interface“?
30 Clues: Kas yra „bug“ • Kas yra „RAM“? • Kas yra „API“? • Kas yra „URL“? • Kas yra „HTML“? • Kas yra „cache“? • Kas yra „router“? • Kas yra „malware“? • Kas yra algoritmas • Kas yra „serveris“? • Kas yra „firewall“? • Kas yra „data cente? • Kas yra „encryption“? • Kas yra žurnalavimas? • Kas yra duomenų bazė? • Kas yra „data backup“? • Kas yra „data mining“? • Kas yra „open source“? • Kas yra „cyber attack“? • ...
Cybersecurity Awareness Month 2024-10-16
Across
- A type of malware that demands payment in exchange for restoring access to data
- A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
- Creating a copy of data to prevent its loss in case of a disaster or data breach
- A type of software that is designed to damage or exploit a computer system
- The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
- The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
- The process of verifying the identity of a user, device, or system
Down
- A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
- Type of malware that allows an attacker to remotely control a system or network
- A network that encrypts internet connections and helps secure remote access to a network
- Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
- Unsolicited, unwanted, and often malicious messages sent in bulk.
- Attack where an attacker gains unauthorized access to a system or network
- The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.
14 Clues: Unsolicited, unwanted, and often malicious messages sent in bulk. • The process of verifying the identity of a user, device, or system • Attack where an attacker gains unauthorized access to a system or network • A type of software that is designed to damage or exploit a computer system • ...