Cybersecurity Awareness Month 2024 Crossword Puzzle
Across
- 2. Although the keyboard shortcut for copying information is Ctrl + C, the shortcut for pasting information is not Ctrl + P (that's a shortcut for printing). Instead, the shortcut letter for pasting is closer to the shortcuts for copying and cutting. What letter is used to to paste information when clicked synchronously with Ctrl
- 3. technology that enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy (acronym).
- 5. Seven-letter branded software standard created by Apple that enables a car radio or touchscreen to be a display and a controller for an iOS device
- 6. The name of the security company founded in 2006 by two Harvard Business School students who couldn't find a security company designed to help renters? The couple was interested in the field after multiple friends in Cambridge had experienced break-ins. By 2014, the company has raised more than $50 million in venture capital.
- 7. 6-letter term for a group of computers that is networked together and used by hackers to steal information
- 8. Contract Management process used to review and sign all Start Early
- 9. A user identity and access management solution piloted in Start Early that allows users to seamlessly do Single Sign-On (SSO)
- 10. Users are responsible for creating and maintaining the confidentiality of the password associated with their unique user ID
- 13. A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common cyberattack on the internet
Down
- 1. Most common delivery method for viruses
- 2. In 1988, the Morris Worm was created (and released) just to see whether it could be pulled off. As it spread via the Internet, mayhem (and a criminal conviction) followed. It was the first major example of which “highly infectious” computer security threat
- 4. What colorful apparel is also a two-word term for a computer security expert who engages in “ethical hacking” to help expose and fix security flaws within a company’s information system
- 7. On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers
- 8. Delicious computer term did web browser programmer Lou Montulli coin to refer to information that is sent from the browser to the web server
- 11. If you have an iPhone and send a text to another iPhone user via iMessage, the bubbles look blue. If you send a text to an Android user, the bubble is green because it’s being sent as which kind of message?
- 12. According to Michael Scott, there have been eight "IT guys," including Lozenge, Shorts, and Nick, at what fictional company on "The Office?"