cybersecurity Crossword Puzzles

Cybersecurity (year 09) 2022-12-12

Cybersecurity (year 09) crossword puzzle
Across
  1. an attack involving an email designed to look official
  2. people who are paid to legally hack into computer systems
  3. malware that collects info about the user and sends it back to criminals
  4. Manipulating people to get their personal information
  5. attacker watches their victim to get sensitive information
  6. malware that hides in legitimate software
Down
  1. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
  2. attack where the criminal tries to maintain a conversation with the victim
  3. kind of access Computer Misuse Act protects from
  4. Law that looks after your data
  5. type of malware that encrypts your data until you pay
  6. checks incoming and outgoing network traffic
  7. attack done by flooding a website with lots of requests

13 Clues: Law that looks after your datamalware that hides in legitimate softwarechecks incoming and outgoing network traffickind of access Computer Misuse Act protects fromtype of malware that encrypts your data until you payManipulating people to get their personal informationan attack involving an email designed to look official...

CyberSecurity Month Crossword 2024-10-10

CyberSecurity Month Crossword crossword puzzle
Across
  1. You should install this on your computer to detect and remove malicious software
  2. The process of proving your identity with a username and password
  3. Software that is designed to disrupt, damage, or gain unauthorized access to your computer
  4. ___________ backup - A way to protect important files by saving copies offsite or in the cloud
  5. A set of rules created to ensure security, such as not reusing passwords
Down
  1. Emails pretending to be from legitimate sources to steal personal info
  2. This type of "attack" involves tricking people into giving away personal information
  3. "Public ________ should not be used for sensitive tasks like banking."
  4. A software designed to protect against malicious software
  5. A security measure that sends a code to your phone to verify your login
  6. “_______ encryption” - Technology that scrambles data so it can only be read by authorized users
  7. What you should never share with others, even if they seem trustworthy
  8. A strong, unique _______ should be used for each account
  9. An attack where hackers encrypt your data and demand money to unlock it
  10. "_____ your devices regularly" - Important action to prevent unauthorized access

15 Clues: A strong, unique _______ should be used for each accountA software designed to protect against malicious softwareThe process of proving your identity with a username and passwordEmails pretending to be from legitimate sources to steal personal info"Public ________ should not be used for sensitive tasks like banking."...

Guess The Word 2022-06-27

Guess The Word crossword puzzle
Across
  1. blower Report certain types of wrongdoing
  2. Group of people for decision making
  3. of conduct A set of rules
  4. The act of obeying an order, rule, or request
  5. Possibility of loss or injury
Down
  1. A set of guidelines
  2. Protection of internet-connected system
  3. An official inspection
  4. An event that is either unpleasant or unusual
  5. of interest Clash between personal and professional duties

10 Clues: A set of guidelinesAn official inspectionof conduct A set of rulesPossibility of loss or injuryGroup of people for decision makingProtection of internet-connected systemblower Report certain types of wrongdoingAn event that is either unpleasant or unusualThe act of obeying an order, rule, or request...

Cybersecurity Crossword Puzzle 2024-02-01

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Passwords should not contain your
  2. Sikorsky Facility Security Officer (FSO)
  3. Strategy to protect sensitive information (operational security)
  4. Assured File Transfers (AFTs) should only be performed by a trained
  5. If you see something
  6. A company's most valuable asset
Down
  1. Report all security incidents to
  2. Sikorsky Classified Cybersecurity Manager
  3. Access is granted based on clearance level and

9 Clues: If you see somethingA company's most valuable assetReport all security incidents toPasswords should not contain yourSikorsky Facility Security Officer (FSO)Sikorsky Classified Cybersecurity ManagerAccess is granted based on clearance level andStrategy to protect sensitive information (operational security)...

Cybersecurity Awareness Month 2023 2023-09-21

Cybersecurity Awareness Month 2023 crossword puzzle
Across
  1. An email attack in which a cybercriminal attempts to disguise themselves as a trusted source..
  2. Cybersecurity Awareness Month
  3. A person who uses computers to gain unauthorized access to data.
  4. A form of phishing in which an attacker uses a compelling text message to trick targeted recipients into clicking a link and sending the attacker private information or downloading malicious software to a smartphone.
  5. This type of information includes your name, address, phone number, email address, bank account information, IP address, etc.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. A person who commits fraud or participates in a dishonest scheme.
  8. The practice of protecting critical systems and sensitive information from digital attacks.
  9. A manipulation technique that exploits human error to gain private information, access or valuables.(Two words)
Down
  1. This is the most common form of cybercrime. Roughly 90% of all data breaches start with one of these emails.
  2. The fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to trick individuals in to revealing personal information, such as bank details and card numbers.
  3. A sequence of words or text used to control access to a computer; similar to a password.
  4. Facebook, Instagram, TikTok, etc.(Two words)
  5. This type of information includes race or ethnicity, health and medical information, political or religious beliefs, etc.
  6. The address of a webpage. Check the validity of it before clicking on it.

15 Clues: Cybersecurity Awareness MonthFacebook, Instagram, TikTok, etc.(Two words)A person who uses computers to gain unauthorized access to data.A person who commits fraud or participates in a dishonest scheme.The address of a webpage. Check the validity of it before clicking on it....

Guess The word 2022-06-27

Guess The word crossword puzzle
Across
  1. The act of obeying an order, rule, or request
  2. Possibility of loss or injury
  3. Group of people for decision making
  4. An event that is either unpleasant or unusual
  5. An official inspection
  6. A set of guidelines
Down
  1. Report certain types of wrongdoing
  2. Protection of internet-connected system
  3. of conduct A set of rules
  4. of interest Clash between personal and professional duties

10 Clues: A set of guidelinesAn official inspectionof conduct A set of rulesPossibility of loss or injuryReport certain types of wrongdoingGroup of people for decision makingProtection of internet-connected systemThe act of obeying an order, rule, or requestAn event that is either unpleasant or unusual...

Information Technology 2023-05-10

Information Technology crossword puzzle
Across
  1. Desarrollo
  2. Comunicaciones
  3. Computación en la nube
  4. Apoyo técnico
  5. Innovar
  6. Programador
  7. Analista de malware
  8. Perspectiva
  9. Habilidades
  10. Fuerza laboral
  11. Ciencia de datos
  12. Compañías empresariales
  13. Operaciones comerciales
  14. Desarrollador web
  15. Ilimitado
  16. Implementación
  17. Productividad
  18. Ingeniero de software
  19. Recreación
  20. Microsoft
Down
  1. Soporte de escritorio
  2. Plataformas
  3. Software
  4. Sostenibilidad
  5. Habilidades
  6. Aplicaciones
  7. Hoja de cálculo
  8. Conocimientos técnicos
  9. Automatización
  10. Servicio de ayuda
  11. Programas
  12. Base de datos
  13. Gerencia
  14. Desarrollador de software
  15. Acceso a la información
  16. Inteligencia artificial
  17. Liderazgo
  18. Tecnología de la información (TI)
  19. Complejidad
  20. Ciberseguridad
  21. Educación
  22. soporte
  23. Mantenimiento
  24. Análisis
  25. Avance
  26. Hardware
  27. Gerente IT
  28. Conocimiento
  29. Robótica

49 Clues: AvanceInnovarsoporteSoftwareGerenciaAnálisisHardwareRobóticaProgramasLiderazgoEducaciónIlimitadoMicrosoftDesarrolloRecreaciónPlataformasHabilidadesProgramadorPerspectivaComplejidadHabilidadesGerente ITAplicacionesConocimientoApoyo técnicoBase de datosMantenimientoProductividadSostenibilidadComunicacionesAutomatizaciónFuerza laboralCiberseguridad...

Cybersecurity 2022-09-08

Cybersecurity crossword puzzle
Across
  1. airline
  2. Theft Using idenitty
  3. security
Down
  1. stalking
  2. IT

5 Clues: ITairlinestalkingsecurityTheft Using idenitty

KM Week 10 2021-10-11

KM Week 10 crossword puzzle
Across
  1. Smart Nation through Digital _________
  2. An intellectual property
  3. ________ citizen through e-participation
  4. Increase in digital usage has brought about the need to protect data, infrastructure and networks from growing cyber threats.
  5. in the eco-system of Digital Economy.
  6. A KMS
  7. A communication tool
Down
  1. The Government, _____ and Society are closely
  2. an advantage to move towards digital economy
  3. One of the KM processes
  4. structural resource
  5. An impact/ area of concern for digital society
  6. We need an update of this to move to a digital future
  7. Infrastructural resources
  8. He conceived the concept of KM

15 Clues: A KMSstructural resourceA communication toolOne of the KM processesAn intellectual propertyInfrastructural resourcesHe conceived the concept of KMin the eco-system of Digital Economy.Smart Nation through Digital _________________ citizen through e-participationan advantage to move towards digital economyThe Government, _____ and Society are closely...

Internet 2023-09-14

Internet crossword puzzle
Across
  1. - Electronic communication method.
  2. - Protecting against online threats.
  3. - A secret code to access accounts.
  4. - Real-time text-based conversation online.
  5. - Software used to access the internet.
  6. - Malicious software that can harm your computer.
  7. - Small digital images used to express emotions.
  8. - Prefix for media platforms like Facebook and Twitter.
  9. - Device that directs internet traffic.
Down
  1. - Wireless internet connection.
  2. - Online buying and selling of goods.
  3. - Watching videos or listening to music online.
  4. - A collection of web pages.
  5. - Getting files from the internet to your device.
  6. - What you do on Google to find information.

15 Clues: - A collection of web pages.- Wireless internet connection.- Electronic communication method.- A secret code to access accounts.- Protecting against online threats.- Online buying and selling of goods.- Software used to access the internet.- Device that directs internet traffic.- Real-time text-based conversation online....

NAVFAC Capabilities 2023-02-15

NAVFAC Capabilities crossword puzzle
Across
  1. ________Facilities and Equipment Engineering
  2. Definition: detailed coordination of a complex operation involving people, facilities, or supplies.
  3. Definition: a proposed or planned undertaking
  4. Definition: Relating to impact of human activity on the natural world
  5. Definition: Protection against criminal or unauthorized use of electronic data
  6. Definition: Basic physical and organizational structures and facilities
  7. ________ Handling Ashore Procurement
Down
  1. NAVFAC Capabilities: _________ & Facility Operations
  2. _______ and Facilities Operations
  3. _________ Vehicles provide transportation services
  4. Real Estate _________ and Management
  5. NAVFAC Capabilities: ______ & Construction
  6. NEPA regulations requirement

13 Clues: NEPA regulations requirement_______ and Facilities OperationsReal Estate _________ and Management________ Handling Ashore ProcurementNAVFAC Capabilities: ______ & Construction________Facilities and Equipment EngineeringDefinition: a proposed or planned undertaking_________ Vehicles provide transportation services...

Reasons why Singapore is Safe / Not Safe 2024-07-23

Reasons why Singapore is Safe / Not Safe crossword puzzle
Across
  1. emphasis on racial and religious [] reduces radicalisation
  2. [] to regional terrorist hotspots
  3. strong [] measures and proactive Internal [] Department
Down
  1. reduced vigilance over time
  2. public cooperation via programmes like []
  3. online platforms spreading [] ideologies
  4. advanced surveillance and cybersecurity[]

7 Clues: reduced vigilance over time[] to regional terrorist hotspotsonline platforms spreading [] ideologiespublic cooperation via programmes like []advanced surveillance and cybersecurity[]strong [] measures and proactive Internal [] Departmentemphasis on racial and religious [] reduces radicalisation

Harris 20th Anniversary 2022-10-14

Harris 20th Anniversary crossword puzzle
Across
  1. What sport/activity does Chris play
  2. Where did Melissa grow up?
  3. Where did they live when they got married?
  4. What is the Harris family dogs name?
  5. What volcano did the Harris family climb in Hawaii?
  6. Who is Melissa's favorite singer?
  7. Where did they Chris & Melissa get married?
Down
  1. What is Chris' profession?
  2. What are Chris & Melissa's kids middle
  3. Who is Chris' favorite rapper?
  4. What cruise line did they sail on when they
  5. married?

12 Clues: married?What is Chris' profession?Where did Melissa grow up?Who is Chris' favorite rapper?Who is Melissa's favorite singer?What sport/activity does Chris playWhat is the Harris family dogs name?What are Chris & Melissa's kids middleWhere did they live when they got married?What cruise line did they sail on when they...

Cybersecurity (year 09) 2022-12-12

Cybersecurity (year 09) crossword puzzle
Across
  1. people who are paid to legally hack into computer systems
  2. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
  3. Manipulating people to get their personal information
  4. malware that collects info about the user and sends it back to criminals
Down
  1. type of malware that encrypts your data until you pay
  2. attack done by flooding a website with lots of requests
  3. attack where the criminal tries to maintain a conversation with the victim
  4. Law that looks after your data
  5. kind of access Computer Misuse Act protects from
  6. attacker watches their victim to get sensitive information
  7. an attack involving an email designed to look official
  8. malware that hides in legitimate software
  9. checks incoming and outgoing network traffic

13 Clues: Law that looks after your datamalware that hides in legitimate softwarechecks incoming and outgoing network traffickind of access Computer Misuse Act protects fromtype of malware that encrypts your data until you payManipulating people to get their personal informationan attack involving an email designed to look official...

Module 1 Introductory Course Telehealth 2017-03-02

Module 1 Introductory Course Telehealth crossword puzzle
Across
  1. acronym for information and communication technology
  2. word used interchangeably with telecare
  3. used to monitor vital signs remotely
  4. nurses engaged in remote service delivery
  5. computer-based medical records
  6. the ability of computers to exchange information
  7. measures taken to protect computer/computer systems
  8. the use of smartphones to provide healthcare
Down
  1. virtual, medical, health, and educational services
  2. in real time
  3. emerging umbrella term; intersection of technology and healthcare
  4. live visual connection between two or more people
  5. the "e" in this term stands for many things
  6. term referring to teleconsultations
  7. electronic component used to provide input and detect changes

15 Clues: in real timecomputer-based medical recordsterm referring to teleconsultationsused to monitor vital signs remotelyword used interchangeably with telecarenurses engaged in remote service deliverythe "e" in this term stands for many thingsthe use of smartphones to provide healthcarethe ability of computers to exchange information...

Unit 1-3 vocab 2024-03-14

Unit 1-3 vocab crossword puzzle
Across
  1. Watering crops
  2. Farm animals like cows and chickens
  3. Picking crops when they're ready
  4. Person who plays sports
  5. security Making sure everyone has enough to eat
  6. rotation Changing what you plant to help the soil
  7. Computer steps to solve problems
  8. identity How you show yourself on the internet
  9. Keeping nature safe for the future
  10. Food for plants
  11. Underground water source
Down
  1. literacy Knowing how to use the internet well
  2. Trick emails trying to get private info
  3. Keeping computers safe
  4. Buying and selling online
  5. Watching videos on the internet without downloading
  6. detox Taking a break from screens and devices
  7. Long time with no rain
  8. gaming Playing games on the internet with others
  9. storage Keeping files on the internet, not your computer

20 Clues: Watering cropsFood for plantsKeeping computers safeLong time with no rainPerson who plays sportsUnderground water sourceBuying and selling onlinePicking crops when they're readyComputer steps to solve problemsKeeping nature safe for the futureFarm animals like cows and chickensTrick emails trying to get private info...

Module 1 Introductory Course Telehealth 2017-03-02

Module 1 Introductory Course Telehealth crossword puzzle
Across
  1. acronym for information and communication technology
  2. word used interchangeably with telecare
  3. used to monitor vital signs remotely
  4. nurses engaged in remote service delivery
  5. computer-based medical records
  6. the ability of computers to exchange information
  7. measures taken to protect computer/computer systems
  8. the use of smartphones to provide healthcare
Down
  1. virtual, medical, health, and educational services
  2. in real time
  3. emerging umbrella term; intersection of technology and healthcare
  4. live visual connection between two or more people
  5. the "e" in this term stands for many things
  6. term referring to teleconsultations
  7. electronic component used to provide input and detect changes

15 Clues: in real timecomputer-based medical recordsterm referring to teleconsultationsused to monitor vital signs remotelyword used interchangeably with telecarenurses engaged in remote service deliverythe "e" in this term stands for many thingsthe use of smartphones to provide healthcarethe ability of computers to exchange information...

Useful Vocab 2023-11-22

Useful Vocab crossword puzzle
Across
  1. Cooking style
  2. Newness
  3. The process of providing or obtaining the food necessary for health and growth
  4. Small electronic devices with a specific function
  5. The activity of visiting interesting places, especially as a tourist
  6. The ability to use, understand, and evaluate information across digital platforms
  7. Physical activity
  8. A place where people live or stay, such as a hotel or guesthouse
Down
  1. Conditions or practices conducive to maintaining health and preventing disease
  2. Techniques and therapies aimed at controlling stress levels for better mental health
  3. Place to stay
  4. Literacy Competence in using digital information
  5. Security
  6. Health
  7. The place to which someone or something is going or being sent
  8. Schedule
  9. A planned route or journey

17 Clues: HealthNewnessSecuritySchedulePlace to stayCooking stylePhysical activityA planned route or journeyLiteracy Competence in using digital informationSmall electronic devices with a specific functionThe place to which someone or something is going or being sentA place where people live or stay, such as a hotel or guesthouse...

11.2 Cabinet Departments and Independent Agencies 2021-04-22

11.2 Cabinet Departments and Independent Agencies crossword puzzle
Across
  1. counterterrorism, cybersecurity, aviation security, border security, port security, maritime security, administration and enforcement of our immigration laws, protection of our national leaders, protection of critical infrastructure, cybersecurity, detection of and protection against chemical, biological and nuclear threats to the homeland, and response to disasters.
  2. providing the military forces needed to deter war and protect the security of our country.
  3. the health of all Americans and providing essential human services.
  4. enforcing the laws of the United States federal government
  5. representing U.S. businesses within the President's Cabinet, interacting with communities, businesses, universities, and American workers, and promoting economic growth, job creation, and balanced economic development.
  6. manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans.
  7. national policy and programs that address America's housing needs, that improve and develop the Nation's communities, and enforce fair housing laws.
  8. manage the liquidity of a business.
Down
  1. planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation.
  2. integrating life-long healthcare services to eligible military veterans at the 1700 VA medical centers and outpatient clinics located throughout the country.
  3. oversees the American farming industry
  4. the management and distribution of the federal budget for education initiatives.
  5. what is the title of the head of the executive branch departments?
  6. laws affecting the workplace, unions, and issues pertaining to business-to-employee relationships.

14 Clues: manage the liquidity of a business.oversees the American farming industryenforcing the laws of the United States federal governmentwhat is the title of the head of the executive branch departments?the health of all Americans and providing essential human services.the management and distribution of the federal budget for education initiatives....

internet 2023-10-30

internet crossword puzzle
Across
  1. steal private information
  2. donot download attachments from untrusted sources from here
  3. protection of our devices
  4. infect smartphone and devices
Down
  1. protection against malware
  2. software responsible for undesirable tasks in device
  3. communication between two devices

7 Clues: steal private informationprotection of our devicesprotection against malwareinfect smartphone and devicescommunication between two devicessoftware responsible for undesirable tasks in devicedonot download attachments from untrusted sources from here

Information Technology Crossword Puzzle 1 2021-04-21

Information Technology Crossword Puzzle 1 crossword puzzle
Across
  1. Automated Rule Used in Excel
  2. Microsoft Meeting Tool
  3. VPN that allows users to work safely and effectively at locations outside of the traditional office
  4. Acronym for Virtual Machine
  5. Cybersecurity software used
Down
  1. Acronym for Customer Relationship Management
  2. Microsoft Email Used
  3. What is the first name of CommScope's new CIO?
  4. Replaced Software Center
  5. Planning methodology used to forecast, plan for and manage the demand for products and services
  6. Acronym for Virtual Private Network

11 Clues: Microsoft Email UsedMicrosoft Meeting ToolReplaced Software CenterAcronym for Virtual MachineCybersecurity software usedAutomated Rule Used in ExcelAcronym for Virtual Private NetworkAcronym for Customer Relationship ManagementWhat is the first name of CommScope's new CIO?...

Hast du den Durchblick in der Welt der IT und Innovation? 2023-11-15

Hast du den Durchblick in der Welt der IT und Innovation? crossword puzzle
Across
  1. Systeme, die Aufgaben ausführen, die normalerweise menschliche Intelligenz erfordern.
  2. Integration von digitalen Informationen in die reale Welt.
  3. Bereitstellung von Computing-Diensten über das Internet.
  4. Simulierte Umgebung durch Computer generiert.
  5. Dezentrales und sicheres Verzeichnis für Transaktionen.
  6. Verarbeitung und Analyse großer Datenmengen.
  7. Nächste Generation von Mobilfunknetzen.
Down
  1. Vernetzung von Geräten und Objekten im Internet.
  2. Schutz vor Cyberangriffen und Datenverlust.
  3. Verwendung von Quantenbits für leistungsstarke Berechnungen.

10 Clues: Nächste Generation von Mobilfunknetzen.Schutz vor Cyberangriffen und Datenverlust.Verarbeitung und Analyse großer Datenmengen.Simulierte Umgebung durch Computer generiert.Vernetzung von Geräten und Objekten im Internet.Dezentrales und sicheres Verzeichnis für Transaktionen.Bereitstellung von Computing-Diensten über das Internet....

DIGITAL CITIZENSHIP DAY 2024-10-14

DIGITAL CITIZENSHIP DAY crossword puzzle
Across
  1. anything shared online, like text or images
  2. someone who impacts others through social media
  3. controls for who sees your info
  4. tricking you to share personal info
  5. being real, even online!
  6. your computer's protective wall against threats
  7. someone who stirs up trouble online
  8. a virtual way to connect with someone new
  9. unauthorized access to someone else's computer or account
  10. hurtful words sent through screens
Down
  1. protection against online threats
  2. the trace you leave behind online
  3. a tool that keeps your online actions private
  4. legal protection for creative works and ideas
  5. tiny pictures that express feelings!
  6. your secret code for online access
  7. time spent gazing at your device
  8. unwanted emails that clutter your inbox
  9. your personal space on websites

19 Clues: being real, even online!controls for who sees your infoyour personal space on websitestime spent gazing at your deviceprotection against online threatsthe trace you leave behind onlineyour secret code for online accesshurtful words sent through screenstricking you to share personal infosomeone who stirs up trouble online...

WeWork Noble House Community 2022-06-25

WeWork Noble House Community crossword puzzle
Across
  1. Consumer intelligence platform specializing in mobile advertising
  2. Consumer electronics company, well-known for its technologically advanced smartwatch
  3. Largest live training marketplace in Indonesia
  4. Solving the world's 1 gigaton refrigerant problem
  5. #DemiMasaDepan #MakingEducationAffordable
  6. Supporting diverse clean energy entrepreneurs to thrive
Down
  1. Language learning platform, mainly Chinese
  2. Pioneer of global content service and distribution
  3. Social justice philanthropy that supports initiatives to strengthen democracy
  4. SaaS platform that makes cybersecurity accessible to all
  5. Offering lead generation services from B2B telemarketing to inside sales
  6. Logistics service provider

12 Clues: Logistics service provider#DemiMasaDepan #MakingEducationAffordableLanguage learning platform, mainly ChineseLargest live training marketplace in IndonesiaSolving the world's 1 gigaton refrigerant problemPioneer of global content service and distributionSupporting diverse clean energy entrepreneurs to thrive...

 2016-06-23

 crossword puzzle
Across
  1. if someone gives you _______
  2. play tennis with it
  3. live next door to you
  4. step by step
  5. to measure heart rate
  6. another word for drunk
  7. there was a ______ of items on the shelf
Down
  1. put on the internet to stop viruses and bullies
  2. fellow members
  3. you are so _______ for not feeding the pet
  4. the ____ in the supermarket was packed full of people
  5. given to you after you buy an item
  6. not clear of plain
  7. an optical instrument
  8. a wedge like tool with a cutting edge at the end of the blade
  9. a French expression for accomplishment Or success

16 Clues: step by stepfellow membersnot clear of plainplay tennis with itlive next door to youan optical instrumentto measure heart rateanother word for drunkif someone gives you _______given to you after you buy an itemthere was a ______ of items on the shelfyou are so _______ for not feeding the petput on the internet to stop viruses and bullies...

Technology Vocabulary Words 2023-05-08

Technology Vocabulary Words crossword puzzle
Across
  1. a global computer network
  2. Central processing unit
  3. an electronic device for storing and processing data
  4. a series of coded software instructions
  5. stores data on a disk
  6. a programing language
  7. Artificial intelligence
  8. example- crome
  9. you send this on a computer
Down
  1. interconnected computing devices that can exchange data
  2. an organized collection of information on a computer system
  3. a device used for multiple purposes
  4. the state of being protected against the criminal or unauthorized use of electronic data
  5. physical components of a computer
  6. facts and statistics collected together for reference or analysis
  7. a set of instructions used to operate computer tasks

16 Clues: example- cromestores data on a diska programing languageCentral processing unitArtificial intelligencea global computer networkyou send this on a computerphysical components of a computera device used for multiple purposesa series of coded software instructionsan electronic device for storing and processing data...

DISA JFHQ-DODIN Holiday Gala 2022 2022-11-22

DISA JFHQ-DODIN Holiday Gala 2022 crossword puzzle
Across
  1. Social occasion with special entertainment performances
  2. Communications on the move
  3. Boots on the ground.
  4. Belief or confidence in a person or thing
  5. A duty assigned to an individual or unit; a task
Down
  1. Protection of IT systems and data
  2. Synchronizes C2 of the DODIN
  3. The IT Combat Support Agency
  4. One who gives someone else the power to behave in a certain way.
  5. Never trust; always verify

10 Clues: Boots on the ground.Never trust; always verifyCommunications on the moveSynchronizes C2 of the DODINThe IT Combat Support AgencyProtection of IT systems and dataBelief or confidence in a person or thingA duty assigned to an individual or unit; a taskSocial occasion with special entertainment performances...

globalisasi 3 2024-09-18

globalisasi 3 crossword puzzle
Across
  1. Mesin pencari terbesar di dunia
  2. Belanja online melalui situs web
  3. Aplikasi berbagi foto dan video
  4. Seseorang yang mengeksploitasi sistem komputer
Down
  1. Menonton konten video secara langsung tanpa diunduh
  2. Perlindungan terhadap sistem komputer dari ancaman
  3. Acara audio yang dapat diunduh dan didengarkan
  4. Model bisnis yang menawarkan layanan dasar gratis
  5. Aplikasi berbagi video pendek yang populer
  6. Platform untuk menulis dan berbagi konten secara online

10 Clues: Mesin pencari terbesar di duniaAplikasi berbagi foto dan videoBelanja online melalui situs webAplikasi berbagi video pendek yang populerAcara audio yang dapat diunduh dan didengarkanSeseorang yang mengeksploitasi sistem komputerModel bisnis yang menawarkan layanan dasar gratisPerlindungan terhadap sistem komputer dari ancaman...

CYBER CROSSSWORD 2022-10-29

CYBER CROSSSWORD crossword puzzle
Across
  1. stealing of information
  2. imitating others to gain some information
  3. using computer power to generate cryptocurrency
  4. one who illegally tries to breach others' system
  5. malware preventing users from accessing their system
Down
  1. information technology security
  2. gatekeeper of computer

7 Clues: gatekeeper of computerstealing of informationinformation technology securityimitating others to gain some informationusing computer power to generate cryptocurrencyone who illegally tries to breach others' systemmalware preventing users from accessing their system

Phishing Crossword 2023-10-14

Phishing Crossword crossword puzzle
Across
  1. an email that tricks people
  2. commonly hunted by fisherman
  3. a way scams try to reach you
  4. A scammer is trying to rush you
Down
  1. a fake email address
  2. an extra layer of security
  3. protects against online threats

7 Clues: a fake email addressan extra layer of securityan email that tricks peoplecommonly hunted by fishermana way scams try to reach youprotects against online threatsA scammer is trying to rush you

WeWork Noble House Community 2022-06-25

WeWork Noble House Community crossword puzzle
Across
  1. Logistics service provider
  2. SaaS platform that makes cybersecurity accessible to all
  3. Consumer intelligence platform specializing in mobile advertising
  4. Solving the world's 1 gigaton refrigerant problem
  5. Consumer electronics company, well-known for its technologically advanced smartwatch
  6. #DemiMasaDepan #MakingEducationAffordable
Down
  1. Language learning platform, mainly Chinese
  2. Social justice philanthropy that supports initiatives to strengthen democracy
  3. Largest live training marketplace in Indonesia
  4. Supporting diverse clean energy entrepreneurs to thrive
  5. Offering lead generation services from B2B telemarketing to inside sales
  6. Pioneer of global content service and distribution

12 Clues: Logistics service provider#DemiMasaDepan #MakingEducationAffordableLanguage learning platform, mainly ChineseLargest live training marketplace in IndonesiaSolving the world's 1 gigaton refrigerant problemPioneer of global content service and distributionSupporting diverse clean energy entrepreneurs to thrive...

Work from home 2023-07-30

Work from home crossword puzzle
Across
  1. Team Colleagues working from different locations.
  2. Designing a comfortable and efficient workspace.
  3. Training Professional development conducted via the internet.
  4. Essential tool for remote work
  5. Happy Hour Socializing with colleagues online after work.
  6. Meetings Replacing in-person gatherings.
  7. Protecting data and systems while working remotely.
Down
  1. Popular video conferencing platform.
  2. (Virtual Private Network)A secure network connection for remote access.
  3. Access The ability to connect to work resources from anywhere.
  4. Online seminar or presentation.
  5. One of the benefits of working from home.
  6. Balance Striving to maintain harmony between work and personal life.
  7. Office A dedicated workspace within one's home.

14 Clues: Essential tool for remote workOnline seminar or presentation.Popular video conferencing platform.Meetings Replacing in-person gatherings.One of the benefits of working from home.Office A dedicated workspace within one's home.Designing a comfortable and efficient workspace.Team Colleagues working from different locations....

Newsletter 2024-06-17

Newsletter crossword puzzle
Across
  1. What term describes an ethical hacker who uses their skills to improve cybersecurity
  2. what acts as a barrier between a trusted internal network and an untrusted external network.
  3. What small piece of data sent from a website and stored on the user's computer tracks information about their browsing activities?
  4. What term in cybersecurity is responsible for defending against simulated or real attacks.
  5. What type of cyber attack floods a network or system with a huge number of requests to disrupt normal traffic.
  6. What technology stores recently accessed data to speed up future acess
  7. What type of malware will self-replication and spread independently across networks.
  8. What term refers to a person who uses their programming skills to gain unauthorized access to computer systems?
  9. What term refers to the physical components of a computer system.
  10. What term refers to a group of interconnected computers or other devices that can communicate with each other.
  11. What term refers to testing a computer system, network, or web application to find security vulnerabilities?
  12. What term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge?
  13. what term refers to a collection of data or computer instructions that tell a computer how to work.
  14. What type of malicious software allows unauthorized access to a computer or network while concealing its presence?
  15. What group within an organization is responsible for simulating attacks against their own organization to test security measures.
  16. What term refers to a fixed-size output of a hash function that represents input data?
Down
  1. What term refers to a vulnerability in software that is unknown to a software vendor and has not yet been patched.
  2. What term refers to software which was designed to intentionally cause damage to the computer, server, client or computer network?
  3. What terms describes a hacker who exploits computer systems for personal gain or malicious purposes.
  4. What term refers to when someone is trying to disguise themselves as being a trusted known source.
  5. What term refers to the psychological manipulation of people into preforming actions or divulging confidential information.
  6. What type of software attaches itself to a legitimate program and spreads once the program is run.
  7. What term describes unauthorized use of someone else's computer to mine cryptocurrency?
  8. What term refers to a structured methodology or set of guidelines used to manage and improve an organization's cybersecurity posture.
  9. What type of malware encrypts a victim’s files and demands payment for the decryption key?
  10. What field of study involves techniques for secure communication in the presence of third parties?
  11. What protocol translates domain names into IP addresses?
  12. What term refers to a record of events that happen within an operating system, application or network device.
  13. What type of malicious software tricks the user by acting like a legitimate program to trick users into installing it.

29 Clues: What protocol translates domain names into IP addresses?What term refers to the physical components of a computer system.What technology stores recently accessed data to speed up future acessWhat term describes an ethical hacker who uses their skills to improve cybersecurity...

SBA Crossword 2022-06-24

SBA Crossword crossword puzzle
Across
  1. Ida, Harvey, Katrina
  2. Atmospheric/weather conditions
  3. System that provides loan information (4 letter abbrev)
  4. What you complete to be considered for a loan
  5. Presidential, SBA and Secretary of Agriculture (types of ________)
  6. Another word for crisis, SBA manages ____
  7. 2020 Pandemic (minus 19)
  8. Business assets used to secure a loan
  9. Businesses apply for EIDL loans and seek funds for normal operations known as
Down
  1. The ODA Mission is to be "in one word"
  2. Must meet minimum credit ____ to qualify for loan
  3. Death and ____ (IRS)
  4. Spreading payments over multiple periods
  5. A signed commitment
  6. SBA Employee recognition program (3 words)
  7. Economic ______ Disaster Loan
  8. Reconsideration/reacceptance
  9. Handles complaints or reports of fraud
  10. Never share this, cybersecurity, keep safe

19 Clues: A signed commitmentIda, Harvey, KatrinaDeath and ____ (IRS)2020 Pandemic (minus 19)Reconsideration/reacceptanceEconomic ______ Disaster LoanAtmospheric/weather conditionsBusiness assets used to secure a loanThe ODA Mission is to be "in one word"Handles complaints or reports of fraudSpreading payments over multiple periods...

Cyber 2024-08-08

Cyber crossword puzzle
Across
  1. The__________ Cube
  2. A type of hacker nicknamed pen tester
  3. The first letter of CIA
  4. The type of hacker that hacks for revenge
Down
  1. The main idea of Gen cyber
  2. The third letter of CIA
  3. Something that thinks like a human but isn't
  4. The second letter of CIA

8 Clues: The__________ CubeThe third letter of CIAThe first letter of CIAThe second letter of CIAThe main idea of Gen cyberA type of hacker nicknamed pen testerThe type of hacker that hacks for revengeSomething that thinks like a human but isn't

Thales prodcuts version 2 2024-05-30

Thales prodcuts version 2 crossword puzzle
Across
  1. Thales product for spaceborne observation
  2. Thales product for military الدفاع الجوي (difaa al-jawwi - air defense) systems
  3. Thales product for avionics
  4. Thales product for Airspace mobility solutions
Down
  1. Thales product for cybersecurity solutions
  2. Thales product for underwater defense solutions
  3. Thales product for civil aviation landing systems
  4. Thales product for digital identity and security
  5. Thales product for air traffic management

9 Clues: Thales product for avionicsThales product for spaceborne observationThales product for air traffic managementThales product for cybersecurity solutionsThales product for Airspace mobility solutionsThales product for underwater defense solutionsThales product for digital identity and securityThales product for civil aviation landing systems...

Vanessa & Jinsik <3 2024-10-24

Vanessa & Jinsik <3 crossword puzzle
Across
  1. Where do Vanessa and Jinsik live?
  2. What does Jinsik do for work?
  3. How old is Jinsik?
  4. What holiday were Vanessa and Jinsik celebrating when they met?
Down
  1. How did Vanessa and Jinsik meet?
  2. How many kids do Vanessa and Jinsik want?
  3. Where did Jinsik propose at?
  4. How many people are in the wedding party?
  5. Where are Vanessa and Jinsik going for their honeymoon?
  6. What does Vanessa do for work?
  7. How old is Vanessa?

11 Clues: How old is Jinsik?How old is Vanessa?Where did Jinsik propose at?What does Jinsik do for work?What does Vanessa do for work?How did Vanessa and Jinsik meet?Where do Vanessa and Jinsik live?How many kids do Vanessa and Jinsik want?How many people are in the wedding party?Where are Vanessa and Jinsik going for their honeymoon?...

Algorithms 2024-09-12

Algorithms crossword puzzle
Across
  1. a common port smaller than USB
  2. safety the practice of protecting yourself online
  3. the action you take with your mouse
  4. a programming concept that allows you to repeat a set of instructions
  5. the smallest unit of data a computer can process (1/0)
  6. another word for software
  7. a list of steps needed to complete a task
Down
  1. The most common type of port
  2. the practice of protecting computer systems
  3. The language that tells a computer what to do
  4. a single simple instruction
  5. a person who writes code
  6. A programming error

13 Clues: A programming errora person who writes codeanother word for softwarea single simple instructionThe most common type of porta common port smaller than USBthe action you take with your mousea list of steps needed to complete a taskthe practice of protecting computer systemsThe language that tells a computer what to do...

You can fight back against cyberattacks - Facetime 2022-03-07

You can fight back against cyberattacks - Facetime crossword puzzle
Across
  1. Short-lived fault in a system.
  2. Defect in a system's design
  3. A way to correct issues in devices.
  4. The service that was impacted by the issue
  5. The entity who makes something
Down
  1. A gap, break or a hole in something
  2. Be able to keep your personal info private
  3. Ways of protecting informatic systems
  4. To respond to a knock or ring
  5. Biggest tech company in the world

10 Clues: Defect in a system's designTo respond to a knock or ringShort-lived fault in a system.The entity who makes somethingBiggest tech company in the worldA gap, break or a hole in somethingA way to correct issues in devices.Ways of protecting informatic systemsBe able to keep your personal info privateThe service that was impacted by the issue

AI in business 2023-11-20

AI in business crossword puzzle
Across
  1. organizational entity or an individual engaged in commercial, industrial, or professional activities
  2. How many jobs will be created by AI
  3. biggest AI software
  4. simulation of human intelligence processes by computer inteligence
  5. Person that created ChatGpt
  6. AI-driven data insights for decision-making
Down
  1. AI technique predicting future outcomes
  2. AI application automating tasks
  3. refers to the application of scientific knowledge for practical purposes.
  4. AI application enhancing cybersecurity

10 Clues: biggest AI softwarePerson that created ChatGptAI application automating tasksHow many jobs will be created by AIAI application enhancing cybersecurityAI technique predicting future outcomesAI-driven data insights for decision-makingsimulation of human intelligence processes by computer inteligence...

sdaia crossword 2024-10-31

sdaia crossword crossword puzzle
Across
  1. Safeguarding personal information
  2. Collections of data
  3. Protecting digital information and systems
  4. An AI and art collaboration challenge
Down
  1. A city that uses technology to improve quality of life
  2. Competition encouraging open data innovation
  3. A special coworker we will miss!
  4. A strategic framework for Saudi Arabia's economic diversification
  5. First Saudi summit for global data and AI experts
  6. SDAIA's mission includes harnessing this technology to drive progress

10 Clues: Collections of dataA special coworker we will miss!Safeguarding personal informationAn AI and art collaboration challengeProtecting digital information and systemsCompetition encouraging open data innovationFirst Saudi summit for global data and AI expertsA city that uses technology to improve quality of life...

Cyber Security 2016-05-24

Cyber Security crossword puzzle
Across
  1. What are we here for?
  2. virtual private network
  3. email that has no meaning
  4. strong authenticater for access
Down
  1. Steals data and holds it for ransom
  2. pesky thing that goofs up my computer
  3. What is my name?

7 Clues: What is my name?What are we here for?virtual private networkemail that has no meaningstrong authenticater for accessSteals data and holds it for ransompesky thing that goofs up my computer

LifeHack 2022 Crossword 2022-07-09

LifeHack 2022 Crossword crossword puzzle
Across
  1. Actions that come from the heart
  2. Protecting personal stuff from hackers
  3. The surrounding place we live in
  4. One of the pillars
  5. Working for the good of others (for free!)
  6. (____ in wonderland)and (___ the builder)
Down
  1. Organizations that help groups of people
  2. How do we grow crops in winter?
  3. The Au of LifeHack
  4. OOO, It's good in the sky but not in our lungs

10 Clues: One of the pillarsThe Au of LifeHackHow do we grow crops in winter?Actions that come from the heartThe surrounding place we live inProtecting personal stuff from hackersOrganizations that help groups of people(____ in wonderland)and (___ the builder)Working for the good of others (for free!)OOO, It's good in the sky but not in our lungs

Risk Management Process, Common Approaches & Techniques 2023-08-09

Risk Management Process, Common Approaches & Techniques crossword puzzle
Across
  1. data driven risk technique
  2. common risk approach
  3. graphical representation of the 2nd step of the risk management process
  4. SGJ's risk response against disasters
  5. channel for communicating fraud internally
  6. effective risk management requires sound relationships with ________
Down
  1. a risk identified/assessed as "high" across the Group
  2. the last step in the risk management process
  3. risks with greater________ may be given greater priority
  4. category of risk response

10 Clues: common risk approachcategory of risk responsedata driven risk techniqueSGJ's risk response against disasterschannel for communicating fraud internallythe last step in the risk management processa risk identified/assessed as "high" across the Grouprisks with greater________ may be given greater priority...

Crossword 1 2023-11-24

Crossword 1 crossword puzzle
Across
  1. What does the middle 'w' stand for in www.?
  2. A record of your details
  3. A complex code used to gain access
  4. A computer for your lap
  5. A small book to record your thoughts and secrets
  6. Protecting your computer systems and information from harm
  7. What allows you to write digital letters?
Down
  1. Lightweight portable speakers for your head
  2. Small mammal often chased by cats
  3. A device used for observing, checking, or keeping a continuous record of something
  4. A string of metal
  5. A collection of information

12 Clues: A string of metalA computer for your lapA record of your detailsA collection of informationSmall mammal often chased by catsA complex code used to gain accessWhat allows you to write digital letters?Lightweight portable speakers for your headWhat does the middle 'w' stand for in www.?A small book to record your thoughts and secrets...

CHPW Cybersecurity 2019-10-28

CHPW Cybersecurity crossword puzzle
Across
  1. caused by programming weaknesses in software
  2. CHPW's secure email gateway
  3. software that redirects your browse, or monitor the websites you visit
Down
  1. software that captures your keystrokes
  2. people who seek to exploit weaknesses in software and computer systems
  3. when to report if your computer or mobile device becomes lost or stolen
  4. code that exploits programming weaknesses of software
  5. type of malicious code

8 Clues: type of malicious codeCHPW's secure email gatewaysoftware that captures your keystrokescaused by programming weaknesses in softwarecode that exploits programming weaknesses of softwarepeople who seek to exploit weaknesses in software and computer systemssoftware that redirects your browse, or monitor the websites you visit...

CyberSecurity 1 2024-08-15

CyberSecurity 1 crossword puzzle
Across
  1. online bullying
  2. a user that did not have permission
  3. intent to do something to be helpful
  4. someone who accesses things that are not theirs
  5. intent to do something for bad reasons
  6. a user who did have permission
Down
  1. Acronym for Personal Identifiable Information
  2. a user who did not have permission but did not cause harm

8 Clues: online bullyinga user who did have permissiona user that did not have permissionintent to do something to be helpfulintent to do something for bad reasonsAcronym for Personal Identifiable Informationsomeone who accesses things that are not theirsa user who did not have permission but did not cause harm

Cybersecurity 1 2024-05-07

Cybersecurity 1 crossword puzzle
Across
  1. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
  2. A weakness or flaw in a system that can be exploited by attackers.
  3. The process of converting data into a code to prevent unauthorized access.
Down
  1. The process of verifying the identity of a user or system.
  2. A barrier that monitors and controls incoming and outgoing network traffic.
  3. A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
  4. A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
  5. A secret combination of characters used to authenticate users and protect accounts.

8 Clues: The process of verifying the identity of a user or system.A weakness or flaw in a system that can be exploited by attackers.The process of converting data into a code to prevent unauthorized access.A barrier that monitors and controls incoming and outgoing network traffic....

Cybersecurity Crosswords 2024-10-17

Cybersecurity Crosswords crossword puzzle
Across
  1. Any incident that results in unauthorized access to computer data, applications, networks or devices. It results in information being accessed without authorization
  2. Program that maliciously takes advantage of vulnerabilities or security flaws in software
  3. The act of disguising a communication from an unknown source as being from a known, trusted source by impersonating a domain
  4. Two or more ways of authentication e.g. pincodes,OTPs
Down
  1. The process of protecting information or data by scrambling it in such a way that only the parties who have the key to unscramble it can access it
  2. Fraudulent Email sent to people to share their personal info by pretending to be legitimate business or person
  3. A type of malware or malicious software that can replicate rapidly and spread across devices within a network
  4. Any kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages

8 Clues: Two or more ways of authentication e.g. pincodes,OTPsProgram that maliciously takes advantage of vulnerabilities or security flaws in softwareAny kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages...

The Voice: October 2nd, 2023 2023-10-02

The Voice: October 2nd, 2023 crossword puzzle
Across
  1. One of the new members highlighted!
  2. What curriculum is Alberta Education redrafting?
  3. DS Tax
  4. Someone who can help with templates and shortcuts!
Down
  1. Be a ________ of the 2026 Special Olympics Summer Games!
  2. What awareness month is October?
  3. 2023 ______ Breakfast coming up.
  4. Minister on Agriculture under Advocacy in Action.

8 Clues: DS TaxWhat awareness month is October?2023 ______ Breakfast coming up.One of the new members highlighted!What curriculum is Alberta Education redrafting?Minister on Agriculture under Advocacy in Action.Someone who can help with templates and shortcuts!Be a ________ of the 2026 Special Olympics Summer Games!

Air Force Career: Cyber Surety 2021-11-17

Air Force Career: Cyber Surety crossword puzzle
Across
  1. From programming to _____, these experts keep our systems and our information safe.
  2. Responsible for cybersecurity of national ____ systems.
  3. Minimum Education: High School ______
  4. ASVAB requirement
Down
  1. Completion of 8.5 weeks of Basic _____Training
  2. Enforce national, DoD, and Air Force security policies and _________
  3. Status: Enlisted Airmen with credits earned towards _______ Systems Technology
  4. Ensure all systems comply with ____ security standards.
  5. Training: 50 ____

9 Clues: Training: 50 ____ASVAB requirementMinimum Education: High School ______Completion of 8.5 weeks of Basic _____TrainingEnsure all systems comply with ____ security standards.Responsible for cybersecurity of national ____ systems.Enforce national, DoD, and Air Force security policies and _________...

SheTech x Entrata Crossword Puzzle 2024-03-12

SheTech x Entrata Crossword Puzzle crossword puzzle
Across
  1. Designer Makes apps pretty and user-friendly
  2. EngineerCrafts digital solutions from code
  3. Marketing Specialist Markets products in the digital realm
  4. Analyst Guardian against digital threats
Down
  1. Manager Directs tech projects to success
  2. Scientist Turns data into actionable insights
  3. Analyst Unlocks insights hidden in numbers
  4. Support Specialist Tech troubleshooter extraordinaire
  5. Engineer Connects the digital dots securely
  6. Assurance Engineer Detects bugs before users do

10 Clues: Manager Directs tech projects to successAnalyst Guardian against digital threatsEngineerCrafts digital solutions from codeAnalyst Unlocks insights hidden in numbersEngineer Connects the digital dots securelyDesigner Makes apps pretty and user-friendlyScientist Turns data into actionable insightsAssurance Engineer Detects bugs before users do...

Computer Article Crossword 2015-06-10

Computer Article Crossword crossword puzzle
Across
  1. Very important and possibly dangerous
  2. The month which the hack happened
  3. Far away from anything else
  4. The Chairman of the Senate Armed Services Committee
  5. Keeping people safe on the Internet
  6. Breaking into a secure area
  7. To put together information
  8. To break into a secure area on the internet
Down
  1. Stealing someone's personal details
  2. All over the world
  3. The abbreviation for The Office of Personnel Management
  4. One billion people have access to Facebook on.......
  5. The Name of Mark Zuckerberg's company
  6. The name of the new App Zuckerberg is releasing
  7. The ........ Intelligence Committee which released information about the cyber attack
  8. The Country blamed for the hacking of American databases
  9. The President of America

17 Clues: All over the worldThe President of AmericaFar away from anything elseBreaking into a secure areaTo put together informationThe month which the hack happenedStealing someone's personal detailsKeeping people safe on the InternetVery important and possibly dangerousThe Name of Mark Zuckerberg's companyTo break into a secure area on the internet...

Cybersecurity 2 2022-09-08

Cybersecurity 2 crossword puzzle
Across
  1. This is popular network protocol analyzer, or an application that captures packets from a network connection
  2. 95% of all firewalls fail due to this
  3. ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
  4. _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
Down
  1. This type of testing simulates an attack against an organization in which ethical hackers use many of the same tools, techniques, and procedures as a real attacker would use.
  2. ______ detection is the process of identifying cyberattacks trying to enter a machine or network
  3. The process of converting information or data into a code, especially to prevent unauthorized access
  4. A cybersecurity _____ is a set of rules and guidelines that direct everyday IT activity in your organization

8 Clues: 95% of all firewalls fail due to this______ detection is the process of identifying cyberattacks trying to enter a machine or networkThe process of converting information or data into a code, especially to prevent unauthorized access_____ scanning is a common technique hackers use to discover open doors or weak points in a network....

Cybersecurity Safegaurds 2023-01-18

Cybersecurity Safegaurds crossword puzzle
Across
  1. the use of the internet or other digital technology to stalk or harass an individual, group, or organization
  2. the information that exists about a person as a result of their online activity
  3. the regular habits that computer users can take to improve their cybersecurity
  4. a small data packet that websites can store on your device in order to collect information
Down
  1. a weakness that leaves one’s data open to a cyberattack
  2. influencing people to change their behaviors in order to benefit society
  3. a type of crime in which someone uses your personal information without your permission
  4. any information that can be used to identify, contact, or locate an individual, like your name, birthday, address, social security number, and email address or password. You should never share identifiable information with someone you don’t know online

8 Clues: a weakness that leaves one’s data open to a cyberattackinfluencing people to change their behaviors in order to benefit societythe regular habits that computer users can take to improve their cybersecuritythe information that exists about a person as a result of their online activity...

Cybersecurity Awareness 2024-09-22

Cybersecurity Awareness crossword puzzle
Across
  1. / Tool is often used to help create and store complex passwords.
  2. / Most commonly targeted entity of cyber attacks in an organization.
  3. / A type of cyber attack that tricks users into giving up personal information.
  4. / Who should you report a suspicious email to?
  5. / The person or department you should approach with documented security concerns.
Down
  1. / This attack is when an unauthorized individual follows through the doorway behind an authorized employee.
  2. / What should you use as a way to have multiple forms of authentication on your accounts?
  3. / Tactic where the attacker looks over your shoulder or from a distance while attempting to gather information.

8 Clues: / Who should you report a suspicious email to?/ Tool is often used to help create and store complex passwords./ Most commonly targeted entity of cyber attacks in an organization./ A type of cyber attack that tricks users into giving up personal information./ The person or department you should approach with documented security concerns....

FITCVocab.jd 2013-05-15

FITCVocab.jd crossword puzzle
Across
  1. internet service provided
  2. it delivers internet to computers
  3. no wires
  4. protects your computer
  5. you find engines
  6. like this that do are not part of the computer ex. printer,mouse
  7. a display for computer/screen
  8. using good behaviors on computer
  9. lets you have wirless
  10. a output device that is there to click things on computer
  11. being safe on the internet
Down
  1. designed to find info ex. google
  2. something that plugs into a computer ex. printer, mouse
  3. who is contacting
  4. a mini computer that ca you can play on and look things up
  5. controls computer main contol
  6. the lights that make up the screen
  7. ramdom access memory
  8. central processing unit
  9. download put in computer

20 Clues: no wiresyou find engineswho is contactingramdom access memorylets you have wirlessprotects your computercentral processing unitdownload put in computerinternet service providedbeing safe on the internetcontrols computer main contola display for computer/screendesigned to find info ex. googleusing good behaviors on computer...

Harryclyde 2023-01-02

Harryclyde crossword puzzle
Across
  1. How many true friends
  2. Second high school
  3. British part of my name
  4. first time I almost died
  5. Where was I born
  6. College major
  7. first city we moved to in the US
  8. sport I played in high school
  9. a place I really want to visit
  10. how old was I when I migrated to the US
  11. allergies
  12. love language
  13. 17% of Cameroon
  14. I love your
Down
  1. First high school
  2. another time I almost died (told you this)
  3. 83% of cameroon
  4. Catch me exploring in
  5. type of movies I like
  6. Personality type.
  7. nick name for for the baby
  8. French part of my name
  9. we both like this movie
  10. The baby’s name
  11. favorite animal
  12. Region what region I was raised

26 Clues: allergiesI love yourCollege majorlove language83% of cameroonThe baby’s namefavorite animal17% of CameroonWhere was I bornFirst high schoolPersonality type.Second high schoolCatch me exploring inHow many true friendstype of movies I likeFrench part of my namewe both like this movieBritish part of my namefirst time I almost died...

Eva and Clayton 2024-11-23

Eva and Clayton crossword puzzle
Across
  1. Subject Eva studies in graduate school
  2. Sport played by the couple
  3. Eva's musical hobby
  4. Clayton’s favorite food
  5. Clayton's least favorite food
  6. Clayton’s favorite movie genre
  7. Eva's first job
  8. Subject of Clayton’s bachelor’s degree
  9. Clayton’s favorite holiday
  10. Number of years the couple has been together
  11. Clayton's football team
  12. Shape of Eva’s birthmark
Down
  1. Eva’s middle name
  2. The older half of the couple (bride/groom)
  3. Clayton’s favorite childhood video game
  4. English town where Eva lived while studying abroad
  5. City where the couple currently lives (abbr)
  6. Couple’s go to breakfast food
  7. Eva’s favorite TV show
  8. Eva’s favorite season
  9. The couple's future furry friend
  10. Eva's hockey team
  11. Clayton’s eye color
  12. Couple’s favorite vacation spot
  13. Mascot of the couple's alma mater (abbr)

25 Clues: Eva's first jobEva's hockey teamEva's musical hobbyClayton’s eye colorEva’s middle nameEva’s favorite TV showClayton’s favorite foodClayton's football teamEva’s favorite seasonClayton’s favorite holidayShape of Eva’s birthmarkClayton's least favorite foodCouple’s go to breakfast foodSport played by the couple...

Intro Cybersecurity Puzzle 1 2021-09-08

Intro Cybersecurity Puzzle 1 crossword puzzle
Across
  1. Hacker with a political agenda
  2. The 'A' in the CIA Triade
  3. Psychological control discouraging an attack
  4. Acronym for information that is freely available
  5. Vulnerability + Threat
  6. A control such as a gateway or fence
Down
  1. Organization that publishes cybersecurity frameworks
  2. The 'C' in the CIA Triade
  3. Using a voice channel to conduct phishing
  4. The 'I' in the CIA Triade
  5. an attack type that can be polymorphic and is usually memory resident
  6. Acronym for a group with lot of resources to attack
  7. Alternative access to a system for malware
  8. A regulation only found in Canada

14 Clues: Vulnerability + ThreatThe 'C' in the CIA TriadeThe 'I' in the CIA TriadeThe 'A' in the CIA TriadeHacker with a political agendaA regulation only found in CanadaA control such as a gateway or fenceUsing a voice channel to conduct phishingAlternative access to a system for malwarePsychological control discouraging an attack...

Fundamentals of CYbersecurity 2023-01-22

Fundamentals of CYbersecurity crossword puzzle
Across
  1. secrecy of the information
  2. Involves a computer or computer network
  3. Warning for malicious activity
  4. control Role management and rule management
  5. Weakness in information system
Down
  1. assurance that the information received is exact and accurate
  2. enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
  3. Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
  4. Attempt to gain unauthorized access
  5. Virtual component world
  6. security triads
  7. identify the user or system or the entity

12 Clues: security triadsVirtual component worldsecrecy of the informationWarning for malicious activityWeakness in information systemAttempt to gain unauthorized accessInvolves a computer or computer networkidentify the user or system or the entitycontrol Role management and rule managementassurance that the information received is exact and accurate...

CSC 200 Cybersecurity 2018-01-31

CSC 200 Cybersecurity crossword puzzle
Across
  1. Deploying a security officer at the premises gate is an example of _____ control.
  2. _____ is a type of attacker who wants to make a statement and perform targeted cyber attacks
  3. Ensures transmission and storage of information in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the information.
  4. Prevents either sender or receiver from denying a transmitted message.
  5. Assures that the system works promptly and service is not denied to authorized users.
Down
  1. _______ is the act of accessing information during transmission.
  2. _________ unauthorized access and modification of an asset.
  3. _________ means an information becomes lost, unavailable, or unusable
  4. Preserving authorized restriction on information access and disclosure, including means for protection personal privacy and proprietary information
  5. A weakness which allows an attacker to reduce a system's information assurance.
  6. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
  7. Phishing and attachments target the _________ threat vector

12 Clues: _________ unauthorized access and modification of an asset.Phishing and attachments target the _________ threat vector_______ is the act of accessing information during transmission._________ means an information becomes lost, unavailable, or unusablePrevents either sender or receiver from denying a transmitted message....

Cybersecurity Awareness Month 2024-08-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments.
  2. Infectious software
  3. Type of attack that tricks users into revealing sensitive info
  4. Type of malware that allows an attacker to remotely control a system or network
  5. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  6. A type of software that is designed to damage or exploit a computer system
Down
  1. Attack where an attacker gains unauthorized access to a system or network
  2. Unwanted emails
  3. The process of verifying the identity of a user, device, or system
  4. A type of malware that demands payment in exchange for restoring access to data
  5. A network that encrypts internet connections and helps secure remote access to a network
  6. Creating a copy of data to prevent its loss in case of a disaster or data breach

12 Clues: Unwanted emailsInfectious softwareType of attack that tricks users into revealing sensitive infoThe process of verifying the identity of a user, device, or systemAttack where an attacker gains unauthorized access to a system or networkA type of software that is designed to damage or exploit a computer system...

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

CyberSecurity Awareness 2020-09-29

CyberSecurity Awareness crossword puzzle
Across
  1. a method used to get you to click on malware
  2. everyone must use their's when entering building
  3. information not meant for sharing
  4. often hidden in email attachments
Down
  1. take sensitive conversations somewhere _______
  2. meant for specific employees only
  3. unique way of authenticating yourself
  4. when our information is compromised

8 Clues: meant for specific employees onlyinformation not meant for sharingoften hidden in email attachmentswhen our information is compromisedunique way of authenticating yourselfa method used to get you to click on malwaretake sensitive conversations somewhere _______everyone must use their's when entering building

Cybersecurity Awareness 2021-09-24

Cybersecurity Awareness crossword puzzle
Across
  1. email
  2. complexity
  3. live
  4. virus
Down
  1. bub
  2. sms
  3. risk
  4. bot

8 Clues: bubsmsbotriskliveemailviruscomplexity

Cybersecurity Safeguards 2024-03-19

Cybersecurity Safeguards crossword puzzle
Across
  1. something you create so only you can access accounts
  2. believing someone will keep you safe
  3. ridges that help you grab onto objects
  4. all the information about you that makes you different from other people
Down
  1. another word for internet safety
  2. to keep safe from harm
  3. to be free from danger or harm
  4. information you don't want everyone to know

8 Clues: to keep safe from harmto be free from danger or harmanother word for internet safetybelieving someone will keep you saferidges that help you grab onto objectsinformation you don't want everyone to knowsomething you create so only you can access accountsall the information about you that makes you different from other people

Cybersecurity Crossword 2024-10-29

Cybersecurity Crossword crossword puzzle
Across
  1. Any software designed intentionally to cause damage to a computer, server, or network.
  2. A type of malware that encrypts your files and demands payment for their release.
  3. Rubber Ducky devices often perform a ______ injection attack in order to run unauthorized commands.
  4. An attacker sends a fake email pretending to be a trusted entity in a ______ attack.
Down
  1. A ______ records each key pressed on a keyboard, often to steal passwords.
  2. A process of converting information into ciphertext to prevent unauthorized access, usually applied in ransomware attacks.
  3. Short range wireless technology used in wireless earbuds and smartwatches but can be hacked by also used by devices like Flipper Zero.
  4. Artificial intelligence can create a ______, where someone’s face or voice is replaced or altered to appear realistic.

8 Clues: A ______ records each key pressed on a keyboard, often to steal passwords.A type of malware that encrypts your files and demands payment for their release.An attacker sends a fake email pretending to be a trusted entity in a ______ attack.Any software designed intentionally to cause damage to a computer, server, or network....

Cybersecurity Lesson 5 2022-08-28

Cybersecurity Lesson 5 crossword puzzle
Across
  1. gaining unauthorised access to or control of a computer system
  2. hackers who don’t hack with malicious intent but illegally hack for ethical purposes.
  3. locks up or encrypts your files so you can no longer access them without paying a ransom.
  4. hackers who attack others with malicious intent to cause damage and harm.
  5. involves the attacker watching the victim while they provide sensitive information.
  6. replicate themselves and spread through the network.
  7. An attack in which the victim receives an email or text message disguised to look as if it has come from a reputable source.
Down
  1. Raw facts and figures, with little to no meaning behind them.
  2. Created when that data has been processed and becomes meaningful.
  3. malicious form of self-replicating software that attach to software.
  4. Hackers who hack for the greater good.
  5. An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.

12 Clues: Hackers who hack for the greater good.replicate themselves and spread through the network.Raw facts and figures, with little to no meaning behind them.gaining unauthorised access to or control of a computer systemCreated when that data has been processed and becomes meaningful.malicious form of self-replicating software that attach to software....

Cybersecurity Crossword #1 2019-04-29

Cybersecurity Crossword #1 crossword puzzle
Across
  1. software designed to interfere with a computer's normal functioning
  2. computer software that is provided usually for free but contains advertisements
  3. a scam by which an email user is duped into revealing personal information
  4. a prescribed or proscribed course of action or behavior which is to be followed
  5. a program that is designed to harm a computer by deleting data
  6. of, relating to, or using data in the form of numerical digits
  7. a computer that is under the control of a malicious hacker without the knowledge of the computer owner
Down
  1. computer software that secretly records information about the way you use the computer
  2. measures taken to protect a computer or computer system against unauthorized access or attack
  3. email that is not wanted
  4. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer
  5. to change (something) by including the most recent information

12 Clues: email that is not wanteda program that is designed to harm a computer by deleting datato change (something) by including the most recent informationof, relating to, or using data in the form of numerical digitssoftware designed to interfere with a computer's normal functioning...

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Crossword Labs cybersecurity 2024-03-27

Crossword Labs cybersecurity crossword puzzle
Across
  1. the process or action of verifying the identity of a user or process.
  2. used to protect data from being stolen, changed, or compromised
  3. any security incident in which unauthorized parties gain access to sensitive or confidential information
  4. individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
  5. A thing to connect at an account
  6. software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
  1. type of malware that spreads between computers and damages data and software
  2. designed to detect and destroy computer viruses
  3. any program or file that is intentionally harmful to a computer, network or server
  4. network security device that monitors traffic to or from your network
  5. unwelcome attempts to steal, expose, alter, disable or destroy information through
  6. A technique for attempting to acquire sensitive data, with email

12 Clues: A thing to connect at an accountdesigned to detect and destroy computer virusesused to protect data from being stolen, changed, or compromisedA technique for attempting to acquire sensitive data, with emailnetwork security device that monitors traffic to or from your networkthe process or action of verifying the identity of a user or process....

Cybersecurity Awareness Month 2024-09-27

Cybersecurity Awareness Month crossword puzzle
Across
  1. Manages policies and practices aimed at preventing unauthorized access, data breaches, and misuse of personal data.
  2. A string of unique characters used to login to a computer.
  3. A sentence-like string of words used for authentication that is easy to remember but difficult to crack.
  4. The practice of protecting systems, networks, and programs from digital attacks.
  5. Attempting to acquire sensitive data, such as personal information or passwords, through a fraudulent solicitation in email.
  6. A method to verify identity and protect computers from unauthorized use.
Down
  1. Malware designed to deny a user or organization access to files on their computer.
  2. Phishing method using text messages
  3. A method used to defraud people over the phone.
  4. To keep safe from harm.
  5. A skilled programmer who secretly invades computers without authorization.
  6. A type of artificial intelligence used to create convincing fake images, videos and audio recordings.

12 Clues: To keep safe from harm.Phishing method using text messagesA method used to defraud people over the phone.A string of unique characters used to login to a computer.A method to verify identity and protect computers from unauthorized use.A skilled programmer who secretly invades computers without authorization....

Technology Terminology 2022-09-26

Technology Terminology crossword puzzle
Across
  1. Imaginary creatures that cause unexplained technology problems
  2. IT protection.
  3. Computer that manages access to centralized resource.
Down
  1. American multinational technology corporation based in Washington.
  2. Location of multiple centralized IT resources.
  3. Tool used to send and receive data across shared or public networks.
  4. Data "rains" from here.
  5. Interconnected people or technology.

8 Clues: IT protection.Data "rains" from here.Interconnected people or technology.Location of multiple centralized IT resources.Computer that manages access to centralized resource.Imaginary creatures that cause unexplained technology problemsAmerican multinational technology corporation based in Washington....

Information and Cyber Security 2021-03-29

Information and Cyber Security crossword puzzle
Across
  1. uses asymmetric key encryption
  2. person who performs a social engineering attack
  3. What will freezing your credit not affect?
  4. For online shopping it's best to use...?
Down
  1. most valuable to companies looking to sell you something
  2. Requires a carrier file to self-replicate
  3. What information do you need to set up a wireless access point?
  4. When is it ok to reuse a password?
  5. Cyber security month
  6. Weakest link in cybersecurity
  7. Continually bombarding a targeted network with fake requests

11 Clues: Cyber security monthWeakest link in cybersecurityuses asymmetric key encryptionWhen is it ok to reuse a password?For online shopping it's best to use...?Requires a carrier file to self-replicateWhat will freezing your credit not affect?person who performs a social engineering attackmost valuable to companies looking to sell you something...

crossword #1 2023-03-15

crossword #1 crossword puzzle
Across
  1. Change: Long-term change in global climate patterns.
  2. Practical application of scientific knowledge.
  3. Acquisition of knowledge and skills.
  4. Physical and mental wellbeing.
  5. Protection of computer systems and data.
  6. Meeting present needs without compromising future generations.
Down
  1. Integration and interaction among people, companies, and governments worldwide.
  2. Setting up a business and taking financial risks for profit.
  3. Media: Online platforms for creating and sharing content.
  4. Intelligence: Machines that think and learn like humans.
  5. Inclusion of people from different backgrounds.

11 Clues: Physical and mental wellbeing.Acquisition of knowledge and skills.Protection of computer systems and data.Practical application of scientific knowledge.Inclusion of people from different backgrounds.Change: Long-term change in global climate patterns.Intelligence: Machines that think and learn like humans....

Crossword Puzzle 2023-11-14

Crossword Puzzle crossword puzzle
Across
  1. Malicious software designed to gain access to your devices
  2. The process of verifying the identity of a user or device before granting access to systems and data
  3. A crucial cybersecurity practice involving making copies of data to prevent loss in case of a ransomware attack
  4. In the context of supply chain attacks, this is a critical factor between partners that can be exploited by cybercriminals to infiltrate networks
  5. A tactic used in AI-assisted attacks where attackers mimic a trusted entity to deceive victims, often through sophisticated methods
  6. A cybersecurity threat that could be exploited to gain unauthorized access or cause harm by targeting less-secure elements in the supply network
Down
  1. A type of security measure that uses unique physical characteristics for user identification
  2. A fundamental principle in data privacy, requiring explicit permission before collecting, using, or sharing personal information
  3. A common tactic used in social engineering where the attacker creates a sense of immediate action to bypass rational decision-making
  4. A type of AI technology used in sophisticated cyberattacks, involving learning from data to improve over time
  5. An incident where personal or confidential information is accessed or disclosed without authorization, requiring immediate response and remediation
  6. A deceptive attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication

12 Clues: Malicious software designed to gain access to your devicesA type of security measure that uses unique physical characteristics for user identificationThe process of verifying the identity of a user or device before granting access to systems and data...

LCA ACTIVITY 2 2024-07-18

LCA ACTIVITY 2 crossword puzzle
Across
  1. Metric improved by good BI practices
  2. Type of organization that benefits from BI
  3. The primary focus of intelligence efforts
  4. Creating summaries of analyzed data
  5. Valuable understanding gained from data analysis
  6. Process of turning data into insights
  7. Type of analytics answering "What happened?"
  8. Applications used in business intelligence
  9. Repositories for storing unstructured data
  10. Software and hardware supporting BI efforts
  11. Metaphor for complex business structures
Down
  1. Pattern identified through data analysis
  2. Essential plan before construction begins
  3. Visual tool for displaying business data
  4. The blueprint for an organization's BI efforts
  5. Important feature of data management systems
  6. How data is collected, stored, and accessed
  7. Databases designed for storing and analyzing data
  8. Devices used to collect data in manufacturing
  9. Critical aspect of protecting data

20 Clues: Critical aspect of protecting dataCreating summaries of analyzed dataMetric improved by good BI practicesProcess of turning data into insightsPattern identified through data analysisVisual tool for displaying business dataMetaphor for complex business structuresEssential plan before construction beginsThe primary focus of intelligence efforts...

Web Wonders Crossword Challenge 2023-10-09

Web Wonders Crossword Challenge crossword puzzle
Across
  1. - Data protection through coding
  2. - Wireless internet connection
  3. - Online buying and selling
  4. - Tool for finding information on the internet
  5. - Measures to protect online data and privacy
  6. - Electronic mail for online communication
  7. - Content that spreads rapidly online
  8. - Storage and computing services on the internet
  9. - Web address identifying a website
  10. - Symbol used to categorize and search for topics
Down
  1. - Platforms for sharing content and connecting
  2. - Software for accessing the web
  3. - Audio or video series available for streaming
  4. - Online location with webpages
  5. - Security system to block unauthorized access
  6. - Saving files from the internet to a device
  7. - Real-time media content delivery
  8. - Clickable link that directs to another webpage
  9. - Sending files from a device to the internet
  10. - Online journal or diary

20 Clues: - Online journal or diary- Online buying and selling- Wireless internet connection- Online location with webpages- Data protection through coding- Software for accessing the web- Real-time media content delivery- Web address identifying a website- Content that spreads rapidly online- Electronic mail for online communication...

ICS and Hydropower 2024-04-02

ICS and Hydropower crossword puzzle
Across
  1. Turbine type operating from fluid pressure.
  2. System distributing control for efficiency.
  3. Height of water used to generate pressure.
  4. Mechanism for moving or controlling a system.
  5. Protection against digital attacks.
  6. Interface for human interaction with machines.
  7. Device detecting changes in environment.
  8. Device for converting fluid flow into energy.
  9. A type of turbine used in low-head applications.
Down
  1. Movement of water through a system.
  2. Pipe channeling water to turbines.
  3. Converts mechanical energy to electrical.
  4. System for remote monitoring and control.
  5. A communication protocol for devices.
  6. Type of turbine driven by water jet.
  7. Programmable controller critical in automation.
  8. Storage space for water.
  9. A type of turbine used in medium to high-head applications.
  10. Security system for network defense.
  11. Device for remote utility control.

20 Clues: Storage space for water.Pipe channeling water to turbines.Device for remote utility control.Movement of water through a system.Protection against digital attacks.Type of turbine driven by water jet.Security system for network defense.A communication protocol for devices.Device detecting changes in environment....

Intricacy 2022-11-22

Intricacy crossword puzzle
Across
  1. Mark
  2. Course which CMR NPS doesn't provide but CMR PU does
  3. Without this no computer would exist
  4. Nanobots assemble
  5. You do not fart in apple store because there are no _______
  6. Method of communication
  7. Present continuous tense of a device
  8. _______ explorer
  9. Of no use without a physical interface
  10. _______ assistant or Facebook Meta
Down
  1. Nanobots are from which category
  2. Reduces manforce
  3. Norbert Wiener: "the study of control and communication in the animal and the machine"
  4. Base of every project
  5. The computer isn't working, it's likely a system _______
  6. You do not want this on your device
  7. e-storage
  8. Firewall is a type of _______
  9. The creation of the Mars Rover falls mainly under which field?
  10. The bane of every iOS user

20 Clues: Marke-storageReduces manforce_______ explorerNanobots assembleBase of every projectMethod of communicationThe bane of every iOS userFirewall is a type of _______Nanobots are from which category_______ assistant or Facebook MetaYou do not want this on your deviceWithout this no computer would existPresent continuous tense of a device...

Cybersecurity 2021 2021-10-18

Cybersecurity 2021 crossword puzzle
Across
  1. use this where possible to protect valuable data and content
  2. phishing via SMS
  3. don't allow your devices to do this with unfamiliar networks
Down
  1. hover over all of these before clicking on them to make sure they are legitimate
  2. keep these updated to ensure they have the latest security
  3. Spotting these URLs is a bit of an art
  4. before you share
  5. do this over a link to ensure it is taking you to the site the email content says it will

8 Clues: phishing via SMSbefore you shareSpotting these URLs is a bit of an artkeep these updated to ensure they have the latest securityuse this where possible to protect valuable data and contentdon't allow your devices to do this with unfamiliar networkshover over all of these before clicking on them to make sure they are legitimate...

Cybersecurity 2021 2021-10-18

Cybersecurity 2021 crossword puzzle
Across
  1. use this where possible to protect valuable data and content
  2. don't allow your devices to do this with unfamiliar networks
  3. do this over a link to ensure it is taking you to the site the email content says it will
  4. Spotting these URLs is a bit of an art
  5. before you share
Down
  1. phishing via SMS
  2. hover over all of these before clicking on them to make sure they are legitimate
  3. keep these updated to ensure they have the latest security

8 Clues: phishing via SMSbefore you shareSpotting these URLs is a bit of an artkeep these updated to ensure they have the latest securityuse this where possible to protect valuable data and contentdon't allow your devices to do this with unfamiliar networkshover over all of these before clicking on them to make sure they are legitimate...

Cybersecurity Vocabulary 2023-02-27

Cybersecurity Vocabulary crossword puzzle
Across
  1. verifiying that the user is who they say they are
  2. spying on a user to get their login information
  3. sending targeted emails pretending to be a known person to gain information or give malware
Down
  1. Protection of computer systems and networks from attack
  2. requires the user to provide two or more verification factors to gain access
  3. a hacking method that uses trial and error to crack passwords
  4. sending emails that pretend to be real in order to gain information or give malware
  5. helps you identify vulnerabilities and create countermeasures against attacks

8 Clues: spying on a user to get their login informationverifiying that the user is who they say they areProtection of computer systems and networks from attacka hacking method that uses trial and error to crack passwordsrequires the user to provide two or more verification factors to gain access...

Cybersecurity puzzle 2023-10-04

Cybersecurity puzzle crossword puzzle
Across
  1. Cybersecurity month
  2. resist immediate action when receiving an email or text
  3. ready to gobble up all your important files
  4. refers to best practices for maintaining online security
Down
  1. dangerous pieces of phishing email; compromised links, malicious attachments
  2. well-honed social engineering-spotting skills to avoid his tricks
  3. charm of social engineering
  4. malware that replicated itself to infect more devices

8 Clues: Cybersecurity monthcharm of social engineeringready to gobble up all your important filesmalware that replicated itself to infect more devicesresist immediate action when receiving an email or textrefers to best practices for maintaining online securitywell-honed social engineering-spotting skills to avoid his tricks...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Information security is not just a___issue.
  2. Use hard-to-guess ______ and keep them secret–even from your friends.
  3. You should not just check, you should also confirm.
  4. If you open a suspicious email by ______, don't click on the links or download the files that came with it.
Down
  1. Delete spam email. Don't ______ it.
  2. The strongest password's is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca!,
  3. Be careful when ______ files or shopping online. Use trusted sites only.
  4. Don't open an ______ from someone you don't know. It may contain a virus.

8 Clues: Delete spam email. Don't ______ it.Information security is not just a___issue.You should not just check, you should also confirm.Use hard-to-guess ______ and keep them secret–even from your friends.Be careful when ______ files or shopping online. Use trusted sites only.The strongest password's is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca!,...

M-cybersecurity 2024-03-27

M-cybersecurity crossword puzzle
Across
  1. attack which consists of testing all the words in a list as a keyword
  2. word used to gain access to certain information
  3. a public-key cryptosystem, one of the oldest widely used for secure data transmission
  4. attack which consists of testing all possible password or key solutuions
Down
  1. a feature or defect of a computer system that allows surreptitious unauthorized access to data.
  2. type of computer attack that blocks access to a victim's device or files and demands payment of a ransom in exchange for restoring access
  3. uses encryption to protect your Internet connection from unauthorized access
  4. a symmetric encryption algorithm using 56-bit keys

8 Clues: word used to gain access to certain informationa symmetric encryption algorithm using 56-bit keysattack which consists of testing all the words in a list as a keywordattack which consists of testing all possible password or key solutuionsuses encryption to protect your Internet connection from unauthorized access...

Cybersecurity Crossword 2024-03-20

Cybersecurity Crossword crossword puzzle
Across
  1. Measures adopted to protect systems and data from cyber threats.
  2. A network-connected computer or device.
  3. A deceptive technique used to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
  4. The process of converting information or data into a code, especially to prevent unauthorized access.
Down
  1. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. A powerful tool used for penetration testing, security research, and IDS signature development.
  3. The process or action of verifying the identity of a user or process.
  4. A country in Europe known for its precision engineering and historical contributions to science and technology.

8 Clues: A network-connected computer or device.Measures adopted to protect systems and data from cyber threats.The process or action of verifying the identity of a user or process.A powerful tool used for penetration testing, security research, and IDS signature development....

PROFESI DAN PELUANG USAHA 2023-11-17

PROFESI DAN PELUANG USAHA crossword puzzle
Across
  1. Orang yang spesialis dalam keamanan informasi.
  2. Orang yang merancang dan mengembangkan perangkat lunak.
  3. Bisnis yang menyediakan layanan cloud computing.
  4. Orang yang ahli dalam analisis data besar.
  5. Orang yang bekerja dengan perangkat keras komputer.
  6. Bisnis yang menyediakan solusi penyimpanan data.
  7. Bisnis yang fokus pada pengembangan aplikasi mobile.
Down
  1. Bisnis yang menyediakan solusi perangkat lunak ERP.
  2. Bisnis yang menyediakan layanan keamanan jaringan.
  3. Orang yang ahli dalam merancang rangkaian listrik.

10 Clues: Orang yang ahli dalam analisis data besar.Orang yang spesialis dalam keamanan informasi.Bisnis yang menyediakan layanan cloud computing.Bisnis yang menyediakan solusi penyimpanan data.Bisnis yang menyediakan layanan keamanan jaringan.Orang yang ahli dalam merancang rangkaian listrik.Bisnis yang menyediakan solusi perangkat lunak ERP....

FOP Crossword Puzzle 2023-03-28

FOP Crossword Puzzle crossword puzzle
Across
  1. SOCC is in charge of maintaining and building ________ relations.
  2. SPAI created its own Project _____.
  3. Gryphons plan & organize ______-___-___ competitions.
  4. SOCC organized Freshman Orientation ______.
  5. ______ organized the SOC Open House.
  6. Gryphons aims to promote ________ to students that are passionate about IT.
Down
  1. Programming competition only for freshmen.
  2. SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events
  3. SOCA is In charge of ________ relations.
  4. SEED hosts the ___-___-Series.
  5. SEED stands for Sharing, _______, Enriching, Development.
  6. DISM’s SIG.
  7. SPAI attended and presented at the ____ Conference.
  8. SPAI is part of the AI Singapore Student ________.
  9. SOCA’s ________ department is the first point of contact with outside organizations.

15 Clues: DISM’s SIG.SEED hosts the ___-___-Series.SPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relations.Programming competition only for freshmen.SOCC organized Freshman Orientation ______.SPAI is part of the AI Singapore Student ________.SPAI attended and presented at the ____ Conference....

Viruses 2018-04-10

Viruses crossword puzzle
Across
  1. to preserve or keep safe from harm
  2. protection from hackers and viruses
  3. identify the presence of something concealed
  4. a malware that replicates itself in order to spread
  5. "in the ____" meaning it is still a threat to your computer
  6. software that is intended to damage or disable computers
  7. distributed denial of service
Down
  1. set of instructions for a computer
  2. tools, machinery, and other durable equipment
  3. electronic device for storing and processing data
  4. someone who uses computers to gain unauthorized access to data
  5. fake emails
  6. messages delivered by electronics
  7. a type of virus that disguises itself as something else
  8. corrupts your system and can be easily spread

15 Clues: fake emailsdistributed denial of servicemessages delivered by electronicsset of instructions for a computerto preserve or keep safe from harmprotection from hackers and virusesidentify the presence of something concealedtools, machinery, and other durable equipmentcorrupts your system and can be easily spread...

XoXo Your BIg 2024-10-12

XoXo Your BIg crossword puzzle
Across
  1. What do you call a fake noodle?
  2. Home to summer fun and seaside charm
  3. I named my car this
  4. My fav littles major
  5. America favorite fighting frenchman
  6. My favorite subject in school
Down
  1. What do you call a dinosaur with a extensive vocab
  2. My favorite little name
  3. My favorite day of the week
  4. What do you call a bear with no teeth?
  5. My favorite animal
  6. I call this salty place home
  7. My favorite color is
  8. I’m a dark elixir that many drink to kickstart their day
  9. I’m a sturdy substance often found underfoot, shaping landscapes and used for building

15 Clues: My favorite animalI named my car thisMy favorite color isMy fav littles majorMy favorite little nameMy favorite day of the weekI call this salty place homeMy favorite subject in schoolWhat do you call a fake noodle?America favorite fighting frenchmanHome to summer fun and seaside charmWhat do you call a bear with no teeth?...

Vanessa & Jinsik <3 2024-10-24

Vanessa & Jinsik <3 crossword puzzle
Across
  1. What does Jinsik do for work?
  2. Where did Jinsik propose at?
  3. Where do Vanessa and Jinsik live?
  4. four How old is Vanessa?
  5. How many kids do Vanessa and Jinsik want?
Down
  1. How did Vanessa and Jinsik meet?
  2. What does Vanessa do for work?
  3. How old is Jinsik?
  4. How many people are in the wedding party?
  5. Where are Vanessa and Jinsik going for their honeymoon?
  6. What holiday were Vanessa and Jinsik celebrating when they met?

11 Clues: How old is Jinsik?four How old is Vanessa?Where did Jinsik propose at?What does Jinsik do for work?What does Vanessa do for work?How did Vanessa and Jinsik meet?Where do Vanessa and Jinsik live?How many people are in the wedding party?How many kids do Vanessa and Jinsik want?Where are Vanessa and Jinsik going for their honeymoon?...

PAW 2024 Crossword Puzzle 2024-05-16

PAW 2024 Crossword Puzzle crossword puzzle
Across
  1. Always access and transmit patient data ________.
  2. When faxing, ensure that the fax _____-sheet is free of any PHI.
  3. If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
  4. Snooping may be motivated by _________, concern about the health and well-being of others, interpersonal conflicts, or personal gain.
  5. Always verify the source of emails and links ______ clicking.
  6. All access to personal health information must be limited to what is _________ to perform your job duties.
  7. Loss of _____ by patients and families may be one of the consequences of a privacy breach.
  8. When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
  9. The patient must be informed of the purpose of the _________, use, or disclosure of their PHI.
Down
  1. If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
  2. When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
  3. A patient may be confidential not only for privacy reasons but also potentially for ______ reasons.
  4. Check twice that all information is the correct information for the correct person _____ to releasing it.
  5. If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
  6. All access to personal health information must be for a ____ -related need-to-know.
  7. Consent must be _________, whether it is written or verbal.
  8. ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
  9. Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
  10. Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors.
  11. If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.

20 Clues: Always access and transmit patient data ________.Consent must be _________, whether it is written or verbal.Always verify the source of emails and links ______ clicking.When faxing, ensure that the fax _____-sheet is free of any PHI.All access to personal health information must be for a ____ -related need-to-know....

crossword #1 2023-03-15

crossword #1 crossword puzzle
Across
  1. Change: Long-term change in global climate patterns.
  2. Practical application of scientific knowledge.
  3. Acquisition of knowledge and skills.
  4. Physical and mental wellbeing.
  5. Protection of computer systems and data.
  6. Meeting present needs without compromising future generations.
Down
  1. Integration and interaction among people, companies, and governments worldwide.
  2. Setting up a business and taking financial risks for profit.
  3. Media: Online platforms for creating and sharing content.
  4. Intelligence: Machines that think and learn like humans.
  5. Inclusion of people from different backgrounds.

11 Clues: Physical and mental wellbeing.Acquisition of knowledge and skills.Protection of computer systems and data.Practical application of scientific knowledge.Inclusion of people from different backgrounds.Change: Long-term change in global climate patterns.Intelligence: Machines that think and learn like humans....

Introduction to Cybersecurity 2024-09-18

Introduction to Cybersecurity crossword puzzle
Across
  1. Protection of computer systems, networks, and data from digital attacks
  2. IoT devices increase our ____ to cyber attacks
  3. Assurance that systems and data are accessible by authorized users
  4. Ensuring information is protected from unauthorized or unintentional alterations
  5. Secure Systems with ____ and other security measures
  6. _______ contain a combination of numbers, letters, and symbols
  7. ______ store and send personal information
Down
  1. Protection of information from people who are not authorized to view it
  2. Security measure that should be guaranteed in every secured system
  3. ________ workers are needed to build more secure systems and respond to threats
  4. Cyber attacks threaten security,_______, and economic growth
  5. Another name for Internet of things

12 Clues: Another name for Internet of things______ store and send personal informationIoT devices increase our ____ to cyber attacksSecure Systems with ____ and other security measuresCyber attacks threaten security,_______, and economic growth_______ contain a combination of numbers, letters, and symbols...

Cybersecurity Crossword Puzzle 2024-10-30

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Malicious software designed to harm or exploit devices
  2. A method of disguising data to protect it
  3. A program that scans for vulnerabilities in systems
  4. A type of attack where multiple systems are used to overwhelm a target
  5. The act of illegally accessing a computer system
  6. A device that helps protect networks by filtering traffic
  7. A common form of malware that locks files
Down
  1. A more secure method to login to an account using various factors such as something you know and something you have
  2. The process of verifying the identity of a user
  3. A malicious email designed to trick recipients
  4. A legal framework for data protection in the EU
  5. Software that detects and removes malware

12 Clues: A method of disguising data to protect itSoftware that detects and removes malwareA common form of malware that locks filesA malicious email designed to trick recipientsThe process of verifying the identity of a userA legal framework for data protection in the EUThe act of illegally accessing a computer system...

Enterprise manual 2022-06-21

Enterprise manual crossword puzzle
Across
  1. CATERPILLAR CONFIDENTIAL INFORMATION
  2. CYBERSECURITY
Down
  1. HIGH VALUE TECHNICAL INFORMATON
  2. DATA PRIVACY
  3. COMPANY LEGAL MATTERS

5 Clues: DATA PRIVACYCYBERSECURITYCOMPANY LEGAL MATTERSHIGH VALUE TECHNICAL INFORMATONCATERPILLAR CONFIDENTIAL INFORMATION

Protexxa's Cybersecurity Awareness Month 2024-09-19

Protexxa's Cybersecurity Awareness Month crossword puzzle
Across
  1. A type of threat from within a company
  2. Cybersecurity Awareness Month
  3. The process of verifying identity
  4. Ceo Of our Company
  5. Our Internal Site
  6. Ensuring data has not been altered
  7. A security system that monitors network traffic
Down
  1. Covertly observing someone's screen to steal information
  2. The act of searching through trash for discarded personal information
  3. Refers to a vulnerability that is exploited on the same day it becomes known
  4. The middle child of Cloud Models
  5. The "G" in GRC
  6. A cloud computing platform from Microsoft
  7. Gaining unauthorized access to a secure area by closely following someone
  8. An amateur hacker
  9. The process of converting data into a secure format
  10. Icon for reporter button
  11. A type of malware that pretends to be legitimate

18 Clues: The "G" in GRCAn amateur hackerOur Internal SiteCeo Of our CompanyIcon for reporter buttonCybersecurity Awareness MonthThe middle child of Cloud ModelsThe process of verifying identityEnsuring data has not been alteredA type of threat from within a companyA cloud computing platform from MicrosoftA security system that monitors network traffic...

mari 2024-05-20

mari crossword puzzle
Across
  1. a decentralized digital currency
  2. the application of conceptual knowledge for
  3. a wide range of criminal activity that are
  4. providing the appearance of smth without reality
  5. practice and study of techniques for secure
  6. the process of writing computer software code
Down
  1. study and experimentation of algorithmic process
  2. a public distributed ledger of lists of records
  3. protection of computer systems and networks
  4. collection of accounts in which accounting
  5. a potential for vulnerabilities to turn into
  6. a digital currency designated to work as
  7. a device that can make and receive calls over
  8. the minimum amount of any physical entity involved
  9. the opposite of natural

15 Clues: the opposite of naturala decentralized digital currencya digital currency designated to work ascollection of accounts in which accountinga wide range of criminal activity that areprotection of computer systems and networksthe application of conceptual knowledge forpractice and study of techniques for secure...