cyber security Crossword Puzzles

Rabin Remembrance Day 2023-10-26

Rabin Remembrance Day crossword puzzle
Across
  1. army צבא חזקה
  2. להסיג
  3. country מדינה חזקה
  4. אותם
  5. יכולת
Down
  1. אזרח
  2. ביטחון
  3. להתבגר
  4. believe להאמין
  5. מטרה
  6. build לבנות

11 Clues: אזרחמטרהאותםלהסיגיכולתביטחוןלהתבגרarmy צבא חזקהbuild לבנותbelieve להאמיןcountry מדינה חזקה

tech thing 2015-09-15

tech thing crossword puzzle
Across
  1. object that changes screens and stuff
  2. an agreement to using the web responsibly
  3. community: its is a group of people that like something so they made it world wide for ppl to join
  4. something you are leader or supposed to talk care of
  5. : the way to act online
  6. Community : it like a group of ppl in a online game
  7. Environments a fake place that is fake or is real but not in person
Down
  1. when someone is bullying you
  2. when someone is breaking into your personal or work account
  3. a group of ppl
  4. someone that says/something over and over
  5. putting something public
  6. Theft :someone that steals your identity to do something bad
  7. Citizen following rules to web site agreements
  8. connect something to something
  9. Networking place where u can talk to other ppl
  10. use: you are allowed to use a piece of work as without paying if you use it for the news or something

17 Clues: a group of ppl: the way to act onlineputting something publicwhen someone is bullying youconnect something to somethingobject that changes screens and stuffsomeone that says/something over and overan agreement to using the web responsiblyCitizen following rules to web site agreementsNetworking place where u can talk to other ppl...

20 Definitions Technology Terms 2015-09-15

20 Definitions Technology Terms crossword puzzle
Across
  1. To put a document in a different place
  2. - A document that is released to the public/ other person(s)
  3. Citizen A responsible internet user that interacts with other people
  4. A rule that allows you to use someone’s idea if you give them credit for it
  5. Is meant to be used but not directly said
  6. Bullying a person online
  7. Media A place on the internet that allows a person to create and share their idea with other people
  8. Acceptable User Policy ….. An agreement that you sign that ensures you will take care of a computer
  9. - Being polite on the network
Down
  1. Being accountable for what you do
  2. Networking - A group of people that analyze info online
  3. To break into something that you aren’t suppose to
  4. Community A group of people that use the internet to interact
  5. Theft Someone who steals/ takes personal information from someone else
  6. An electronic tool with a screen
  7. A community around the world that communicates with each other
  8. A group of people who share some interests

17 Clues: Bullying a person online- Being polite on the networkAn electronic tool with a screenBeing accountable for what you doTo put a document in a different placeIs meant to be used but not directly saidA group of people who share some interestsTo break into something that you aren’t suppose toNetworking - A group of people that analyze info online...

Understand & Taking A Stand Against Bullying 2024-05-30

Understand & Taking A Stand Against Bullying crossword puzzle
Across
  1. Position or rank in relation to others.
  2. An act of physical harm or injury to another person.
  3. Behavior directed at another person that is unwanted and unwelcome.
  4. Belief in one's own abilities.
  5. To communicate through words or gestures the intent to harm another person.
  6. Set apart from others; alone.
  7. Having to do with or involving computers or other online technology.
  8. To refuse to admit; to force out.
  9. Using threats to frighten someone; often used to compel another person to do something, or to deter the person from doing something.
  10. People of the same age, or close in age, who are similar in many ways.
  11. To keep from happening or existing.
Down
  1. Boldly hostile; quarrelsome.
  2. Related to words and speech.
  3. The result or outcome of an action or event.
  4. Done on purpose; planned or deliberate.
  5. Confident and self-assured.

16 Clues: Confident and self-assured.Boldly hostile; quarrelsome.Related to words and speech.Set apart from others; alone.Belief in one's own abilities.To refuse to admit; to force out.To keep from happening or existing.Position or rank in relation to others.Done on purpose; planned or deliberate.The result or outcome of an action or event....

Disruptive technology 2025-07-24

Disruptive technology crossword puzzle
Across
  1. Using fast quantum bits rather then binary
  2. Multiple layers of authentication to prevent loss of personal data and information
  3. Technology that mixes with the virtual and real world
  4. Tech that automatically defends against other digital threats
  5. A model where tools and other forms of education is delivered online
  6. technology that convert data into decision making insights
  7. monitors and reacts to threats on user's device
  8. A flexible idea to secure digital assets
Down
  1. multi digital experiences that can be accessed across multiple platforms
  2. Machine learning and advanced automation
  3. A digital world where users interact with during real time
  4. A way to determine possible weaknesses
  5. Technology Innovations aimed to improve environmental sustainability
  6. A form of technology that is able to imitate human knowledge
  7. cloud services spread across multiple locations but centrally managed
  8. A form of insurance in case of cyber attacks

16 Clues: A way to determine possible weaknessesMachine learning and advanced automationA flexible idea to secure digital assetsUsing fast quantum bits rather then binaryA form of insurance in case of cyber attacksmonitors and reacts to threats on user's deviceTechnology that mixes with the virtual and real world...

Cyber ethics 10 2025-05-23

Cyber ethics 10 crossword puzzle
Across
  1. "do not harm" rule in cyber ethics.
  2. bullying is also called ____.
  3. others’ opinions in online discussions.
Down
  1. before sharing someone’s photo is showing ____.
  2. messages to trick people into giving info.

5 Clues: bullying is also called ____."do not harm" rule in cyber ethics.others’ opinions in online discussions.messages to trick people into giving info.before sharing someone’s photo is showing ____.

Cyber ethics 10 2025-05-23

Cyber ethics 10 crossword puzzle
Across
  1. "do not harm" rule in cyber ethics.
  2. bullying is also called ____.
  3. others’ opinions in online discussions.
Down
  1. before sharing someone’s photo is showing ____.
  2. messages to trick people into giving info.

5 Clues: bullying is also called ____."do not harm" rule in cyber ethics.others’ opinions in online discussions.messages to trick people into giving info.before sharing someone’s photo is showing ____.

Finacial Literacy Terms 1-34 2015-01-30

Finacial Literacy Terms 1-34 crossword puzzle
Across
  1. / Letters that identify a stock traded on a stock exchange.
  2. / A sum of money paid regularly (typically quarterly) by a company to its shareholders out of its profits (or reserves).
  3. / The nominal value of a bond, share of stock, or a coupon as indicated in writing on the document or specified by charter.
  4. / Reducing non-systematic risk by investing in a variety of assets.
  5. / A printed document that advertises or describes a school, commercial enterprise, forthcoming book, etc., in order to attract or inform clients, members, buyers, or investors.
  6. / A company stock that tends to increase in capital value rather than yield high income.
  7. / The monetary value of earnings per outstanding share of common stock for a company.
  8. / The current market price of a company share divided by the earnings per share of the company.
  9. / The amount for which something can be sold on a given market.
  10. / A place or system in which stocks, bonds, or other securities are bought and sold.
  11. / The rate of return earned in the course of one whole year, taking compounding into account, expressed as a percentage.
  12. / A stock that entitles the holder to a fixed dividend, whose payment takes priority over that of common-stock dividends.
  13. / A tradable financial asset of any kind.
  14. / a regulated professional individual, usually associated with a brokerage firm or broker-dealer, who buys and sells stocks and other securities for both retail and institutional clients, through a stock exchange or over the counter, in return for a fee or commission.
  15. / A type of security that signifies ownership in a corporation and represents a claim on part of the corporation's assets and earnings.
  16. / An order instructing a broker to buy or sell an asset immediately at the best prevailing price.
  17. / When stack prices are steadily decreasing over time.
  18. / A security traded in some context other than on a formal exchange.
Down
  1. / Income stock.
  2. / Shares entitling their holder to dividends that vary in amount and may even be missed, depending on the fortunes of the company.
  3. / A percentage which serves to measure the effectiveness of a synthetic procedure, is calculated by dividing the amount of the desired product obtained by the theoretical yield (the unit of measure for both must be the same).
  4. / An equity investment option offered directly from the underlying company.
  5. / A shareholder.
  6. / Is when a person buys outright a stock or a bond, primarily to obtain the dividend or interest paid on it, but also with the intention of selling should there be a material advance in the price of the security.
  7. / A comprehensive report on a company's activities throughout the preceding year.
  8. / Is the most common profitability ratio.
  9. / Income stocks.
  10. / The periodic and systematic purchase of a security regardless of the security price.
  11. / A measurement of the value of a section of the stock market.
  12. / When the stock prices are steadily increasing over time.
  13. / A corporate action in which a company divides its existing shares into multiple shares.
  14. / The value of a coin, stamp or paper money, as printed on the coin, stamp or bill itself by the minting authority.
  15. / The profit or loss you have on your investments
  16. / The chance of injury, damage, or economic loss.

34 Clues: / Income stock./ A shareholder./ Income stocks./ Is the most common profitability ratio./ A tradable financial asset of any kind./ The chance of injury, damage, or economic loss./ The profit or loss you have on your investments/ When stack prices are steadily decreasing over time./ When the stock prices are steadily increasing over time....

System software 2024-02-25

System software crossword puzzle
Across
  1. (2words)A feature that allows users to revert their computer's state to a previous point in time, restoring system settings and files to a known good state.
  2. (2words)Divides memory into non-contiguous segments, each representing a logical grouping of data.
  3. (2words)Involves allocating resources and facilitating the sharing and exchange of data among processes running on a computer.
  4. (2words)Tasks such as defining file naming conventions, performing file operations, maintaining directory structures, and managing access control.
  5. (2words)Manages a computer's main memory, including optimization, organization, and protection to ensure efficient and secure memory usage.
  6. Signals generated by hardware or software to request attention from the CPU, used for asynchronous events like hardware errors or user inputs.
  7. (2words)A memory management technique that extends a computer's physical memory by using disk space as an overflow area, improving system performance.
  8. (2words)Organization of files and folders on a storage device, maintained by file management systems.
  9. (2words)Determines allocation and deallocation of computer memory for running applications, including swapping data to and from the HDD or SSD.
  10. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, enhancing network security.
  11. (2words)Software that communicates with input and output devices, translating data and managing hardware resources.
  12. (2words)Process of restoring lost, deleted, corrupted, or inaccessible data from storage devices, ensuring data availability and integrity.
  13. (2words)Control and coordination of printing operations, including loading printer drivers, managing print queues, and handling error messages.
  14. (2words)Mechanisms implemented by the operating system to detect, report, and recover from errors or exceptional conditions, maintaining system stability.
  15. (2words)Splits memory into contiguous partitions and allocates partitions to applications, varying in size.
  16. Activity (2words)Simultaneous use of a computer system by multiple users, facilitated by user accounts, passwords, and access rights management.
  17. (2words)Ensures that competing applications cannot use the same memory locations simultaneously, preventing data loss, security issues, or system crashes.
  18. (2words)Allocates fixed-size partitions of memory, used by virtual memory systems.
  19. (2words)Allocates all memory to a single application, used by systems like MS-DOS and embedded systems.
Down
  1. The process of loading and initializing the operating system kernel when a computer is powered on or restarted.
  2. (2words)Involves managing physical and virtual devices connected to the computer system, including installation, configuration, and maintenance.
  3. Ensuring consistency and coordination among processes or threads accessing shared resources, preventing conflicts and data corruption.
  4. A temporary storage area used in hardware management to manage input/output operations.
  5. A program running on a computer, managed by process management to allocate resources and synchronize data exchange.
  6. (2words)Involves managing input and output peripheral devices, including communication, translation, and prioritization.
  7. Permissions granted to users or processes, controlling access to system resources and ensuring data privacy.
  8. (2words)Determines how memory is allocated to applications, including single allocation, partitioned allocation, paged memory, and segmented memory.
  9. Software designed to detect, prevent, and remove malicious software, ensuring the security of the operating system.
  10. (2words)Software that manages computer hardware and provides services for computer programs.
  11. (2words)Ensures the integrity, confidentiality, and availability of data through measures like updates, antivirus software, firewalls, user privileges, and data recovery.
  12. A data structure used in process management to schedule resources and resolve software conflicts.
  13. (2words)Verifying the identity of users accessing the system, typically through methods like passwords, biometrics, or cryptographic keys.

32 Clues: (2words)Allocates fixed-size partitions of memory, used by virtual memory systems.A temporary storage area used in hardware management to manage input/output operations.(2words)Software that manages computer hardware and provides services for computer programs....

Series 63 - Final Crossword 2024-05-06

Series 63 - Final Crossword crossword puzzle
Across
  1. the person who is going to pass tomorrow
  2. when a representative engages in private securities transactions without the knowledge or consent of his employer
  3. what you should remind yourself that you are tomorrow morning
  4. The official or agency in charge of following/enforcing the securities laws of a state
  5. must have: buy/sell, name of security, account number, order type, solicited or unsolicited
  6. refers to every contract to exchange securities, usually for cash
  7. must be filed when $10,000 or more is deposited
  8. transactions done solely to give the appearance of trading activity
  9. folks who are not dead, minors, or people who have been declared mentally incompetent.
  10. deposit of cash, securities or insurance to ensure protection of their consumers in the event of malpractice, theft or fraud
  11. legal document that must be given to every investor who purchases registered securities in a primary offering
  12. Although exempt securities and securities sold in exempt transactions are exempt from the registration and advertising filing requirements of the Uniform Securities Act, no security or person is exempt from the ________ rules.
  13. If an agent represents a broker/dealer, they must always ________, no matter what they sell.
  14. what you should feel about yourself for making it this far
  15. Any material designed for use by newspapers, magazines, radio, television, telephone recording or any other public medium to solicit business.
  16. act of reaching out to entice a client to buy or sell something
  17. placing an order for own account ahead of placing customers order
  18. any person who issues or proposes to issue any security
Down
  1. without intention to deceive, or "in good faith"
  2. the Series 63 test administrator, not FINRA
  3. laws passed by states to govern securities industry
  4. Includes every solicitation to sell a security for value
  5. deliberate concealment, misrepresentation or omission of material information or the truth to deceive or manipulate another party for unlawful or unfair gain
  6. person who, for compensation, engages in advising others to the value of securities and/or if they are to be invested in
  7. any person engaged in the business of effecting transactions in securities for the account of others or for his own account
  8. An individual who represents a broker/dealer or an issuer when selling or trying to sell securities to the investing public
  9. accepting customer funds or securities into a persons possession for safekeeping
  10. tomorrow you will be fully _________
  11. Any person who has non-public knowledge (material information) about a corporation
  12. when a brokerage firm combines its securities with customer's securities
  13. meaning not required to register
  14. submitted when there seems to be something wrong in the account, like theft, laundering or embezzlement
  15. exemption granted when the firm is not required to register in state when they do not have an office in the state and no more than. 5 clients in 12 months because they do not have a physical presence in the state and is only doing minimal business
  16. when you defeat NASAA you have become a ______
  17. buying a security in one market and simultaneously selling it on another market to profit from price difference between the two markets is not illegal

35 Clues: meaning not required to registertomorrow you will be fully _________the person who is going to pass tomorrowthe Series 63 test administrator, not FINRAwhen you defeat NASAA you have become a ______must be filed when $10,000 or more is depositedwithout intention to deceive, or "in good faith"laws passed by states to govern securities industry...

Cyber-Safety 2021-09-16

Cyber-Safety crossword puzzle
Across
  1. A Program used in malicious ways
  2. You don't receive what you were promised
  3. software that is designed to damage and destroy computers and computer systems
  4. when someone finds the pin for your credit card using automated programs
Down
  1. network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
  2. a title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code

6 Clues: A Program used in malicious waysYou don't receive what you were promisedwhen someone finds the pin for your credit card using automated programssoftware that is designed to damage and destroy computers and computer systemsa title used to describe people who change code in pre-existing software in order to exploit it or find weaknesses in the code...

cyber safety 2021-08-10

cyber safety crossword puzzle
Across
  1. a stranger asking too many personnel question
  2. i am careful with what i ____ because i know that it is on there forever
  3. making mean comments towards another person
Down
  1. search engine
  2. i have many different _____ just in case someone figures one out
  3. i have my _____ settings turned on so strangers cant talk to me

6 Clues: search enginemaking mean comments towards another persona stranger asking too many personnel questioni have my _____ settings turned on so strangers cant talk to mei have many different _____ just in case someone figures one outi am careful with what i ____ because i know that it is on there forever

Cyber Safety 2021-03-03

Cyber Safety crossword puzzle
Across
  1. Likes to chase mice
  2. Has a trunk
  3. Flying mammal
  4. Man's best friend
Down
  1. how to bulling the data
  2. Large marsupial

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase micehow to bulling the data

CYBER SAFETY 2021-10-20

CYBER SAFETY crossword puzzle
Across
  1. - Level of protection one has while being online/on the internet
  2. - harassments done online by the hackers of your account or by oneself
  3. - Something that keeps your accounts, files and posts safe
Down
  1. - Something that keeps your computer and files safe from viruses that destroy everything in your computer
  2. - practice of downloading and distributing copyrighted content digitally without permission of the creater
  3. - Mails that push you into trouble of being hacked once opened carelessly

6 Clues: - Something that keeps your accounts, files and posts safe- Level of protection one has while being online/on the internet- harassments done online by the hackers of your account or by oneself- Mails that push you into trouble of being hacked once opened carelessly...

Cyber Safety 2023-05-05

Cyber Safety crossword puzzle
Across
  1. the place where all your personal information is stored.
  2. ___________ technologies.
  3. how you should keep your personal information.
  4. pretending to be someone else.
Down
  1. an adult contacting a child with sexual intentions.
  2. to not be safe.

6 Clues: to not be safe.___________ technologies.pretending to be someone else.how you should keep your personal information.an adult contacting a child with sexual intentions.the place where all your personal information is stored.

Cyber safety 2023-05-22

Cyber safety crossword puzzle
Across
  1. When someone is being bullied online.
  2. Someone that takes your money
  3. Something you use to login to Apps
Down
  1. posting rumors online ruining someone's reputation
  2. When there is a bug in your computer.
  3. when your Safe online.

6 Clues: when your Safe online.Someone that takes your moneySomething you use to login to AppsWhen there is a bug in your computer.When someone is being bullied online.posting rumors online ruining someone's reputation

CYBER INTIMIDATION 2013-10-08

CYBER INTIMIDATION crossword puzzle
Across
  1. Ne fais pas tu _ _ _ _ _ _ _ _ _ à quelqu’un. Ne partagez pas votre mot de passe.
  2. Lorsque beaucoup de personnes _ _ _ _ _ _ _ Ils font de la peine aux personnes.
  3. Lorsque vous avez des gens qui vous menaces. _ _ _ _ _ _ leurs de votre page d’accueil Facebook.
Down
  1. Les gens maquent du _ _ _ _ _ _ _ lorsqu’ils vous appellent des noms.
  2. Lorsque _ _ _ _ _ _ _ _ _ _ tu as un problème de cyber intimidation, tu dois le dire à un professeur.
  3. Il est _ _ _ _ _ _ _ _ _ à soumettre votre information personnel sure l’internet.

6 Clues: Les gens maquent du _ _ _ _ _ _ _ lorsqu’ils vous appellent des noms.Lorsque beaucoup de personnes _ _ _ _ _ _ _ Ils font de la peine aux personnes.Il est _ _ _ _ _ _ _ _ _ à soumettre votre information personnel sure l’internet.Ne fais pas tu _ _ _ _ _ _ _ _ _ à quelqu’un. Ne partagez pas votre mot de passe....

Cyber attacks 2022-03-31

Cyber attacks crossword puzzle
Across
  1. an attempt by hackers to damage or destroy a computer network or system
  2. fraudulent message designed to trick a person
Down
  1. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  2. the state of being free from danger or threat
  3. An advanced persistent threat
  4. short for Internet Protocol.

6 Clues: short for Internet Protocol.An advanced persistent threatthe state of being free from danger or threatfraudulent message designed to trick a personan attempt by hackers to damage or destroy a computer network or systemsoftware that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system

Cyber Bullying 2023-10-19

Cyber Bullying crossword puzzle
Across
  1. What is a mean person’s name on social media?
  2. Where do you report cyber bullying?
  3. What should you be on social media, mean or kind?
  4. What to do before you post a comment?
Down
  1. Before posting a photo or video of someone else, what should you get?
  2. Is bullying online legal or illegal in Australia?

6 Clues: Where do you report cyber bullying?What to do before you post a comment?What is a mean person’s name on social media?What should you be on social media, mean or kind?Is bullying online legal or illegal in Australia?Before posting a photo or video of someone else, what should you get?

Cyber Ethics 2024-03-12

Cyber Ethics crossword puzzle
Across
  1. the right related to new inventions.
  2. An act of sending a fake mail to the user misleading him to share his personal details
  3. An illegal intrusion into a system or network
Down
  1. It protects your brand name, logos,etc.
  2. Unwanted bulk mails
  3. An act of harming, harassing a person using the Internet

6 Clues: Unwanted bulk mailsthe right related to new inventions.It protects your brand name, logos,etc.An illegal intrusion into a system or networkAn act of harming, harassing a person using the InternetAn act of sending a fake mail to the user misleading him to share his personal details

Cyber Criminals 2024-11-12

Cyber Criminals crossword puzzle
Across
  1. Hackers who find code online and tries it out
  2. Hackers who work for a Country
  3. Hackers who work internally looking for vulnerabilities
Down
  1. Hackers with political or ideological motivations
  2. Hackers already have privileged access
  3. Hackers who find a vulnerability and then sells it back to the owneer

6 Clues: Hackers who work for a CountryHackers already have privileged accessHackers who find code online and tries it outHackers with political or ideological motivationsHackers who work internally looking for vulnerabilitiesHackers who find a vulnerability and then sells it back to the owneer

Cyber Wellness 2025-01-28

Cyber Wellness crossword puzzle
Across
  1. The cause of the main lead's collapse in the video 'You saved the world' was _______.
  2. The main lead in the video 'Why' chose not to _______ about the strangers' comments online.
  3. In the video 'Bullied', one is advised to reach out to someone who has been _______.
Down
  1. Sara Lee in the video 'Bullied' commented on the main lead's account if she was trying to be a/an _______.
  2. The main lead in the video 'You saved the world' was _______ to gaming.
  3. The main lead in the video 'Why' should _______ the account

6 Clues: The main lead in the video 'Why' should _______ the accountThe main lead in the video 'You saved the world' was _______ to gaming.In the video 'Bullied', one is advised to reach out to someone who has been _______.The cause of the main lead's collapse in the video 'You saved the world' was _______....

cyber ethics 2025-06-07

cyber ethics crossword puzzle
Across
  1. which is a wireless technology used to interconnect of mobile.
  2. full form of lan
Down
  1. which topology is most common network setup that consists of star figured workstation
  2. it is a physically attach a computer so that it can participate in network communicatio
  3. what is device that connnects two different types of network with each other.
  4. in which topology all the network are connected in circular manner

6 Clues: full form of lanwhich is a wireless technology used to interconnect of mobile.in which topology all the network are connected in circular mannerwhat is device that connnects two different types of network with each other.which topology is most common network setup that consists of star figured workstation...

CYBER ETHICS 2025-06-02

CYBER ETHICS crossword puzzle
Across
  1. ufucucuvivigiv
  2. gxgxyxycufufjcucyuufufyff
  3. txycyfyfuguvigig
  4. yucucudtewRfivojovgx
Down
  1. itsyyd8gififuggig
  2. cucdts3adihohixh ohidtxjbifhvkvifycjc

6 Clues: ufucucuvivigivtxycyfyfuguvigigitsyyd8gififuggigyucucudtewRfivojovgxgxgxyxycufufjcucyuufufyffcucdts3adihohixh ohidtxjbifhvkvifycjc

Cyber Cleuths 2025-10-17

Cyber Cleuths crossword puzzle
Across
  1. – Code that makes computers sick.
  2. – Your digital bodyguard.
  3. – Turning messages into secret code.
Down
  1. – Online scam disguised as kindness.
  2. – The invisibility cloak of the internet.
  3. – Your weakest point, admit it.

6 Clues: – Your digital bodyguard.– Your weakest point, admit it.– Code that makes computers sick.– Online scam disguised as kindness.– Turning messages into secret code.– The invisibility cloak of the internet.

Bullying 2020-06-07

Bullying crossword puzzle
Across
  1. when someone is being mean when does it escalate to bullying
  2. when you make someone give you something threw violence
  3. what should you do when people are punching and hurting you
  4. what do you do after someone has bullied you
Down
  1. what is a type of bullying where someone insults you
  2. what is it called when someone hurts you with their body
  3. what is it called when nobody is your friend
  4. what is a type of bullying on the internet

8 Clues: what is a type of bullying on the internetwhat is it called when nobody is your friendwhat do you do after someone has bullied youwhat is a type of bullying where someone insults youwhen you make someone give you something threw violencewhat is it called when someone hurts you with their body...

SAW 2022 2022-01-14

SAW 2022 crossword puzzle
Across
  1. Applies to information or assets that, if compromised, could cause injury to an individual, organization or government.
  2. The unauthorized access to, disclosure, destruction, removal, modification, use or interruption of assets or information
  3. Any workplace violence toward an employee or any act, event or omission that could result in the compromise of information, assets or services.
  4. A present or imminent event, including IT incidents, that requires prompt coordination of actions to protect the health, safety or welfare of people, or to limit damage to assets or the environment.
  5. Applies to information or assets that, if compromised, could cause serious injury to an individual, organization or government.
  6. an attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive information.
  7. Converting information from one form to another to hide its content and prevent unauthorized access.
  8. Provides a forum to report (disclose) wrongdoing in the workplace, and ensure that public servants are treated fairly and are protected from reprisal when they report wrongdoing in good faith in accordance with the Public Servants Disclosure Protection Act.
  9. An inadequacy related to security that could increase susceptibility to compromise or injury.
Down
  1. This Directive applies to all employees and authorized personnel of AAFC under the direct authority of the Deputy Minister (DM).
  2. A type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric).
  3. indicates successful completion of a security assessment; with a need to know, allows access to classified information. There are three Security Clearance levels: Confidential, Secret and Top Secret.
  4. Professional activities performed outside the employer's offices by means of information and telecommunication technologies.
  5. Applies to information or assets that, if compromised, could cause serious injury to the national interest.
  6. Applies to information or assets that, if compromised, could cause exceptionally grave injury to the national interest.
  7. Training that provides an overview of the directives and best practices related to security. Contains 10 modules.
  8. Malicious software designed to infiltrate and damage computers without the user’s consent.

17 Clues: Malicious software designed to infiltrate and damage computers without the user’s consent.An inadequacy related to security that could increase susceptibility to compromise or injury.Converting information from one form to another to hide its content and prevent unauthorized access....

agruculture 2024-10-28

agruculture crossword puzzle
Across
  1. security
  2. National Product (GNP)
  3. Conditions
  4. larceny
  5. Liberalisation
  6. Exchange
Down
  1. drift
  2. land use
  3. tenure
  4. the following terms and use them in a sentence.
  5. equality

11 Clues: drifttenurelarcenysecurityland useequalityExchangeConditionsLiberalisationNational Product (GNP)the following terms and use them in a sentence.

Unit 1 Test Review 2026-02-12

Unit 1 Test Review crossword puzzle
Across
  1. Water, food, warmth
  2. Acceptable behaviour
  3. Movement
  4. Eye colour
  5. Security
Down
  1. Quick pick
  2. Rhymes and rhythms
  3. Patterns and sequencing
  4. Understanding others
  5. Same, but different
  6. Love and loyalty

11 Clues: MovementSecurityQuick pickEye colourLove and loyaltyRhymes and rhythmsWater, food, warmthSame, but differentAcceptable behaviourUnderstanding othersPatterns and sequencing

Jobs Are Here 2015-04-27

Jobs Are Here crossword puzzle
Across
  1. Game
  2. Security
  3. Fire
  4. School
  5. Good Sound
Down
  1. Find Precious Stones
  2. Engine
  3. Healty
  4. Justice

9 Clues: GameFireEngineHealtySchoolJusticeSecurityGood SoundFind Precious Stones

Westbury Library 2022-05-17

Westbury Library crossword puzzle
Across
  1. security
  2. westbury
  3. cottage
  4. donated money
Down
  1. copier
  2. return books
  3. street fair
  4. suffragettes
  5. zone

9 Clues: zonecopiercottagesecuritywestburystreet fairreturn bookssuffragettesdonated money

Glossary: Your biggest fan (4.2 ) 2023-03-16

Glossary: Your biggest fan (4.2 ) crossword puzzle
Across
  1. todennäköisyys
  2. häiritä
  3. raivoissaan
  4. täyttää odotukset (sanaväli=väliviiva
  5. huono
  6. keskittyä
  7. kuuluisuus
Down
  1. turvakoodi (sanaväli=väliviiva)
  2. kohtalo
  3. tulla väliin

10 Clues: huonohäiritäkohtalokeskittyäkuuluisuusraivoissaantulla väliintodennäköisyysturvakoodi (sanaväli=väliviiva)täyttää odotukset (sanaväli=väliviiva

Devolved and Reserved Powers 2021-11-01

Devolved and Reserved Powers crossword puzzle
Across
  1. Exams
  2. Scottish Parl
  3. country
  4. NHS
  5. Free in Scotland
  6. HGV drivers
Down
  1. £20
  2. one force
  3. UK Parliament
  4. Conflict

10 Clues: £20NHSExamscountryConflictone forceHGV driversScottish ParlUK ParliamentFree in Scotland

Vocab 2025-10-21

Vocab crossword puzzle
Across
  1. habitat
  2. voter turnout
  3. government crisis
  4. award
Down
  1. equal opportunity
  2. shooting conditions / terms of conditions
  3. species protection
  4. rehabilitation
  5. food security
  6. flooding

10 Clues: awardhabitatfloodingfood securityvoter turnoutrehabilitationequal opportunitygovernment crisisspecies protectionshooting conditions / terms of conditions

Cryptober Puzzle #2 2021-09-30

Cryptober Puzzle #2 crossword puzzle
Across
  1. The set of ways in which an adversary can enter a system and potentially cause damage
  2. The act of exploiting a security vulnerability on the same day it becomes publicly known
  3. The process of granting or denying specific requests for or attempts to obtain and use information and related information processing services
  4. A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents.
  5. a security control report developed by the American Institute of Certified Public Accountants
  6. The process of verifying the identity or other attributes of an entity (user, process, or device)
  7. An attack that prevents or impairs the authorized use of information system resources or services
Down
  1. allows access based on the job title
  2. Short for malicious software
  3. A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data
  4. An unauthorized act of bypassing the security mechanisms of a network or information system
  5. The unauthorized transfer of information from an information system
  6. a browser setting that lets you browse privately by deleting history, site data, cookies, and data.
  7. a service you can use to create and manage passwords. You only need a single master password to log in to the manager itself.

14 Clues: Short for malicious softwareallows access based on the job titleThe unauthorized transfer of information from an information systemThe set of ways in which an adversary can enter a system and potentially cause damageThe act of exploiting a security vulnerability on the same day it becomes publicly known...

156 2023-07-27

156 crossword puzzle
Across
  1. Measures taken to protect against unauthorized access, theft, or damage.
  2. Watching videos or listening to music online without downloading.
  3. Harmful software that can infect and damage computer files and programs.
  4. Storing data and files online to access them from any device with an internet connection.
  5. Software that securely stores and manages passwords for various accounts.
  6. Security system that controls and filters network traffic to protect against threats.
  7. Creating a copy of data to restore in case of loss or damage.
Down
  1. Biometric authentication using facial recognition.
  2. Unwanted and unsolicited emails, often sent in bulk.
  3. Biometric authentication using fingerprint recognition.
  4. Regular payment for access to a service or content.
  5. Installing the latest version of software to get new features and fixes.
  6. Software intended to harm or exploit devices, data, or networks.
  7. Improving a device or software to a better or newer version.
  8. Protection of personal information from being accessed or shared without consent.

15 Clues: Biometric authentication using facial recognition.Regular payment for access to a service or content.Unwanted and unsolicited emails, often sent in bulk.Biometric authentication using fingerprint recognition.Improving a device or software to a better or newer version.Creating a copy of data to restore in case of loss or damage....

PRINT 2025-01-23

PRINT crossword puzzle
Across
  1. – The physical components of a computer system.
  2. – Information processed or stored by a computer.
  3. – The maximum data transfer rate of a network or internet connection.
  4. – A wireless technology for connecting devices to the internet.
  5. – A type of malware that can replicate and spread to other computers.
  6. – The address of a web page on the World Wide Web.
  7. – A set of rules for transmitting data across a network.
  8. – Software designed to damage or disrupt a computer system.
Down
  1. – The process of converting data into a coded form for security.
  2. – A group of interconnected computers and devices sharing resources.
  3. – Programs and operating systems used by a computer.
  4. – A high-speed storage layer for frequently accessed data.
  5. – A security system that monitors and controls incoming and outgoing network traffic.
  6. – A set of instructions for solving a problem or performing a task.
  7. – The global network that connects millions of private, public, and academic systems.

15 Clues: – The physical components of a computer system.– Information processed or stored by a computer.– The address of a web page on the World Wide Web.– Programs and operating systems used by a computer.– A set of rules for transmitting data across a network.– A high-speed storage layer for frequently accessed data....

Cybersecurity & Web Exploitation Crossword 2022-11-16

Cybersecurity & Web Exploitation Crossword crossword puzzle
Across
  1. CSRF attacks use the ___ of other users without their knowledge.
  2. "Access control" is ensuring users cannot act outside of intended ___.
  3. You access web applications with this.
  4. As the ___ of web apps increase, the possibility of vulnerabilities also increase.
  5. When a malicious actor hijacks clicks meant for a visible top-level site.
  6. For security reasons, by default, web apps should not ___ data from the browser.
  7. The OSI model has ___ layers.
Down
  1. Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
  2. In cybersecurity, blue teams do this.
  3. Acronym for the organization set up to improve software security in 2001.
  4. SQL injection attacks can give ___ to data users typically can't retrieve.
  5. What does the "I" in OSI stand for?
  6. In cybersecurity, red teams do this.
  7. ___ hat hackers hack unethically, for personal gain.
  8. ___ sanitization is the modification of user data so that it can't run scripts.

15 Clues: The OSI model has ___ layers.What does the "I" in OSI stand for?In cybersecurity, red teams do this.In cybersecurity, blue teams do this.You access web applications with this.___ hat hackers hack unethically, for personal gain.CSRF attacks use the ___ of other users without their knowledge....

Online safty by Namo 2013-09-08

Online safty  by Namo crossword puzzle
Across
  1. is a website can chat with friend.
Down
  1. chat room you don’t known who really chatting with you.
  2. you can chat with you friend and call your friends.
  3. you can post your picture can chat with you friend and can play game
  4. _ bullying tessing somebody in internet
  5. you can see your friend face.

6 Clues: you can see your friend face.is a website can chat with friend._ bullying tessing somebody in internetyou can chat with you friend and call your friends.chat room you don’t known who really chatting with you.you can post your picture can chat with you friend and can play game

Via 2021-09-21

Via crossword puzzle
Across
  1. for via
  2. activity
  3. valuables left
  4. vigilant
  5. for help
Down
  1. lot
  2. steel security
  3. safe
  4. doors

9 Clues: lotsafedoorsfor viaactivityvigilantfor helpsteel securityvaluables left

The United States and the World Project 2024-06-14

The United States and the World Project crossword puzzle
Across
  1. Law
  2. review
  3. rights
  4. Social
  5. of Homeland Security
Down
  1. and Trade (GATT)
  2. media
  3. Nations
  4. Woods

9 Clues: LawmediaWoodsreviewrightsSocialNationsand Trade (GATT)of Homeland Security

COMMERCE INVESTMENT 2022-06-07

COMMERCE INVESTMENT crossword puzzle
Across
  1. The company that is providing the insurance
  2. items of value
  3. A loan from a financial institution where something is held as security in case the money is not repaid
  4. A list of income and likely expenditures (a step that can minimise impacts of events)
  5. setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
  6. A method of resolving disputes where parties discuss issues, and attempt to reach a compromise
  7. Part ownership of a company
  8. Where the exchange of goods and services between buyers and seller occur
  9. Someone who purchases goods and services to satisfy need and wants
  10. A practice of funding a project by raising money from a large number of people
  11. The price that must be paid to use someone else’s money
  12. Expand your portfolio with different types of shares
  13. money set aside during life for retirement (a step that can minimise the impact of events)
  14. A person who works for a wage or salary
  15. Money received on a regular basis from work, property, business, investment or welfare
  16. Any investment that grows or has potential to grow
  17. Investments that provide regulate profits
  18. to overcharge or swindle (a threat to financial security)
Down
  1. A promis to repair any defects that are in a product
  2. a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
  3. Regularly putting aside some money for future use
  4. electronic funds transfer point of sale
  5. The swapping or exchanging of one good or another
  6. Real estate that is bought with the aim of earning some kind of financial return
  7. A digital currency
  8. personal group with lots of money that are willing to lose it
  9. The buying and selling of goods and services via the internet
  10. Part of a firm’s profit that is divided amongst shareholders
  11. Buy goods in large quantities from the manufacturer
  12. items that can be used to reduce your accessible income
  13. Involves buying the rights of another business to distribute its products under its name
  14. A legally binding agreement
  15. What remains after all business expenses are deducted from sales revenue
  16. The amount of money a consumer is prepared to pay in exchange of a good or service
  17. Place where shares in public companies are bought and sold
  18. money owing to external sources (e.g a bank)
  19. the profit you receive on your investment as a percentage of your original investment
  20. Activities taken for the purpose of production and consumption of goods and services in a region
  21. when a person gives up control of their assets and finances, voluntary or by court order
  22. illegal business practice (a threat to financial security)
  23. A currency used to invest in stocks, shares as well as goods and services etc.
  24. spending more money than your disposable income allows (a threat to financial security)
  25. Buying something without giving much thought if you really need it
  26. Australian Stock exchange
  27. use of money to purchase equipment for a new business or an existing business
  28. a type of investment that is acceptable to society’s current standards
  29. a collection of financial investments like stocks and cash etc.

47 Clues: items of valueA digital currencyAustralian Stock exchangeA legally binding agreementPart ownership of a companyelectronic funds transfer point of saleA person who works for a wage or salaryInvestments that provide regulate profitsThe company that is providing the insurancemoney owing to external sources (e.g a bank)...

Final Review 2022-04-29

Final Review crossword puzzle
Across
  1. Encompasses the recovery, investigation, examination, and analysis of material found in digital devices during incidents.
  2. Security team that manages an organization's network defense.
  3. Type of RFID tag can send a signal over a long distance.
  4. Provides the network virtualization solution called XenServer.
  5. type of interference is caused by motors, heavy machinery, and fluorescent lights.
  6. The most volatile memory in the gathering of potential evidence.
  7. An security system that identifies any attacks. In addition, takes immediate action to stop or prevent the attack.
  8. Backup strategy backs up all files from a computer's file system.
  9. Cloud computing solutions delivers software applications to a client.
  10. Used as a secure tunnel to connect two networks.
  11. This layer of SDN communicates with the Control layer through what is called the northbound interface.
  12. Password attack employs a list of pre-defined passwords that it tries against a login prompt.
  13. Message authentication code that allows a user to verify that a file or message is legitimate.
  14. Type of wireless access point is generally used in a residential setting.
  15. sends unsolicited business cards and messages to a Bluetooth device.
  16. Process of adding random characters at the beginning or end of a password to generate a completely different hash.
  17. An exploit in which malware allows the virtual OS to interact directly with the hypervisor.
  18. Protocol for logging.
  19. An attack that injects malicious scripts into web pages to redirect users to fake websites to gather personal information.
  20. A PKI is an implementation for managing which type of encryption.
  21. Dumpster diving is this type of reconnaissance.
  22. One of the most popular packet capturing tools.
  23. Rights management category is applied to music, videos, and software that is sold to consumers.
Down
  1. Connects multiple servers together so that if one server fails, the others immediately take over its tasks.
  2. Entering random data to the inputs of an application.
  3. Violation of a security policy.
  4. SIEM component that is responsible for gathering all event logs from configured devices.
  5. A Cloud technology that allows cloud services to be shared by several.
  6. DLP method works by replacing sensitive data with realistic fictional data.
  7. A Cloud technology that provides cloud services to just about anyone.
  8. These types of logs are generated when a computer randomly restarts.
  9. (SOAR) system automation components that shows processes and procedures that are to be used by a human.
  10. Tool that can be used to view and modify DNS server information in Linux.
  11. A vulnerability scan method in which administrator logos into a system for scanning.
  12. Used to verify that a downloaded file has not been altered.
  13. Protocol used by IPsec to create a security association between communicating partners.
  14. Cryptography mechanism that hides secret communications within various forms of data.
  15. A Wireless device used to manage multiple access points in your organization.
  16. MOST secure EAP implementation.
  17. used on a wireless network to identify the network name.
  18. passive reconnaissance tool is used to gather information from a variety of public sources.
  19. Computer software, firmware, or hardware that creates and runs virtual machines.
  20. Acronym for a solution that pushes security policies directly to mobile devices over a network.
  21. An SDN layer also known as the Infrastructure layer.
  22. Password attack with a large table of hashes.
  23. Harddrive configuration used for data redundancy.

46 Clues: Protocol for logging.Violation of a security policy.MOST secure EAP implementation.Password attack with a large table of hashes.Dumpster diving is this type of reconnaissance.One of the most popular packet capturing tools.Used as a secure tunnel to connect two networks.Harddrive configuration used for data redundancy....

Week 8: Managing Conflict 2026-03-12

Week 8: Managing Conflict crossword puzzle
Across
  1. International body formed after WWII with six organs. One organ contains permanent members with veto powers over all UN decisions
  2. True or False, every state in the Nuclear Non-Proliferation Treaty are allowed to use nuclear energy for peaceful purposes
  3. Over time, UN peacekeeping has been sent to more _____ conflicts and wars
  4. International security organization of 32 countries that has existed since 1949. The organization has a defensive provision that has been invoked once in history (abbreviate it)
  5. Countries that ally and agree to aid each other when one of them is attacked are part of an alliance with ___ obligations
  6. Over time, UN peacekeeping has become more _____ as they incorporate military personnel and civilian personnel to not only reduce violence but help promote long-term peace
  7. State A threatens State B by saying it will invade B if B does not stop supporting rebels in A. State B increases military spending and military personnel as a result. This is a form of ___ deterrence
  8. Two countries form an alliance to agree to coordinate military operations and attacks if some previously agreed upon scenario happens
  9. Two countries form an alliance to agree not to fight each other. This alliance pact is ____
  10. True or False, NWS in the Nuclear Non-Proliferation Treaty are not allowed to share nuclear weapons or information about nuclear weapons to other countries
  11. A government confronting a strong rebel group centralizes its military and devotes more resources towards security and repression as a way to prevent rebels from attacking. This is a form of ____ deterrence
  12. Siding with other countries to counter a rising, ambitious state in order to prevent the rising state from becoming too strong is called ____
  13. Having a large military and spending a lot on defense is a form of ___ deterrence
  14. In the Dual Alliance, Germany and Austria-Hungary agree to not get involved if either state is attacked by any other state excluding Russia. This alliance obligation is _____
  15. The 2015 nuclear deal between the P5, the EU, and Iran (abbreviate name)
Down
  1. Formal, written agreements between states that contain some type of obligation
  2. State with the largest military expenditures
  3. Turkey and Pakistan’s alliance forces them to discuss international responses when there are international security concerns in the region. This alliance pact is _____
  4. A state increases its military presence in a client state due to increased security threats in the region that could hurt the client state. This is a form of ___ deterrence
  5. In the UN, there is a budget specifically for ____. In the current budget, UN _____ has $5.6 billion. P5 and wealthy states pay more, and the US currently pays more than any other UN state
  6. An attack against one is an attack against all is a core part of ____ _____
  7. International body formed after WWI but dead by the end of WWII. Tasked with preventing WWII and securing international security
  8. In the US, the 2025 budget for the Department of ___ is over $850 billion
  9. Siding with a rising, ambitious state in order to attain possible benefits of their rise is called _____
  10. Threatening explicitly or implicitly another actor to convince them to not take an undesired action
  11. True or False, the Nuclear Non-Proliferation Treaty does not require negotiations towards nuclear disarmament
  12. Treaty created in 1968 to establish rules for NWS and NNWS (abbreviate name)
  13. True or False, NNWS in the Nuclear Non-Proliferation Treaty are allowed to work towards nuclear weapons
  14. Regulating the amount, type, or use of weapons to manage conflict

29 Clues: State with the largest military expendituresRegulating the amount, type, or use of weapons to manage conflictThe 2015 nuclear deal between the P5, the EU, and Iran (abbreviate name)Over time, UN peacekeeping has been sent to more _____ conflicts and warsIn the US, the 2025 budget for the Department of ___ is over $850 billion...

Compiling Crosswords 2018-02-05

Compiling Crosswords crossword puzzle
Across
  1. In this department you have to manage customer relationships
  2. It offers financial security in case of damage
  3. One of the most important machine in the office
  4. The main task of this department is to produce goods
  5. A small container that you keep your documents in
  6. If you use a computer you need it as a display
Down
  1. This Departement ships the goods to the customer
  2. Systematic search for new insights
  3. One of the tasks of this Departement is to negotiate with suppliers
  4. The amount by which the value of a device is reduced over time
  5. Raising funds while offering your property as a security deposit
  6. This machine is used to communicate

12 Clues: Systematic search for new insightsThis machine is used to communicateIt offers financial security in case of damageIf you use a computer you need it as a displayOne of the most important machine in the officeThis Departement ships the goods to the customerA small container that you keep your documents in...

Puzzle title 2024-09-11

Puzzle title crossword puzzle
Across
  1. a popular digital payment tool on smartphones
  2. code a secret code used for digital transaction security
  3. secret code used for digital transaction security
  4. same do cash and digital money have the same function?
  5. whether cash and digital money have the same function
  6. if there is no signal whether the digital transaction process will run
  7. an institution that supervises and regulates non-cash transactions in a country.
  8. surveillance cameras inside and outside, how banks protect their branches from physical robbery according to this text
Down
  1. What is the negative impact of cash in the field of crime
  2. the transaction use a QR code?
  3. What are the advantages of digital money
  4. Benefits of digital money in making transactions

12 Clues: the transaction use a QR code?What are the advantages of digital moneya popular digital payment tool on smartphonesBenefits of digital money in making transactionssecret code used for digital transaction securitywhether cash and digital money have the same functionsame do cash and digital money have the same function?...

Computer Threats 2025-10-21

Computer Threats crossword puzzle
Across
  1. Core topic Weakness that threats can exploit
  2. Core topic Possible danger that may damage data
  3. Main focus of your lesson Protecting data and systems from harm
  4. From CIA Triad (Lesson 3 link) Ensuring information is kept private
Down
  1. From CIA Triad (Lesson 3 link) Keeping data accurate and unchanged
  2. Example of a computer threat Harmful software that damages systems
  3. Security defense Blocks unauthorized network access
  4. Example of user protection Secret code that secures access
  5. From CIA Triad (Lesson 3 link) Ensuring data is always accessible
  6. Example of an attack Fake message designed to steal data
  7. Common threat actor A person who breaks into systems
  8. Target of most threats Information stored or processed in computers

12 Clues: Core topic Weakness that threats can exploitCore topic Possible danger that may damage dataSecurity defense Blocks unauthorized network accessCommon threat actor A person who breaks into systemsExample of an attack Fake message designed to steal dataExample of user protection Secret code that secures access...

Review PDP SPIRIT: Respect 2021-07-12

Review PDP SPIRIT: Respect crossword puzzle
Across
  1. What is very difficult to receive without giving it first
Down
  1. Area that people know about us, but we don't.
  2. Antidote of bullying and social exclusion.
  3. ... Windows; a tool for self discovery
  4. ...bullying; happens online

5 Clues: ...bullying; happens online... Windows; a tool for self discoveryAntidote of bullying and social exclusion.Area that people know about us, but we don't.What is very difficult to receive without giving it first

HOLES 2025-02-21

HOLES crossword puzzle
Across
  1. felt better
  2. the sun burned the skin
  3. given to
  4. say who someone is
Down
  1. turned around
  2. security guard
  3. did nothing wrong
  4. stop
  5. scared
  6. very happy
  7. hair was taken off
  8. with no reason

12 Clues: stopscaredgiven tovery happyfelt betterturned aroundsecurity guardwith no reasondid nothing wronghair was taken offsay who someone isthe sun burned the skin

9th M3 L4 Crossword Puzzle 2024-01-28

9th M3 L4 Crossword Puzzle crossword puzzle
Across
  1. rare
  2. s.o. who breaks the law
  3. class of animals/plants
  4. Noun: stop existing
  5. security
Down
  1. Adjective "Environment"
  2. Adjective of "Globe"
  3. killing animals
  4. to impose
  5. valuable
  6. preserve
  7. the natural place where animals live

12 Clues: rarevaluablepreservesecurityto imposekilling animalsNoun: stop existingAdjective of "Globe"Adjective "Environment"s.o. who breaks the lawclass of animals/plantsthe natural place where animals live

RISKPUBLIKA #10 2023-09-04

RISKPUBLIKA #10 crossword puzzle
Across
  1. KRI adalah Key Risk ...
  2. Materi training Risk Mindset & Culture telah tersedia di ...
  3. (eng) ... Risk adalah potensi risiko utama yang menjadi perhatian perusahaan
  4. (eng) TAF Risk Mindset adalah .... Mind
Down
  1. (eng) Serangan cyber yang dilakukan melalui email dengan berpura-pura agar TAFriends melakukan sesuatu (open file) atau mengunjungi link yang mengandung konten berbahaya
  2. E-KYC adalah Electronic ... Your Customer
  3. (eng) Data yang berkualitas diawali dengan kebenaran saat melakukan ... entry
  4. (eng) Besar akibat yang mungkin timbul dari suatu risiko

8 Clues: KRI adalah Key Risk ...(eng) TAF Risk Mindset adalah .... MindE-KYC adalah Electronic ... Your Customer(eng) Besar akibat yang mungkin timbul dari suatu risikoMateri training Risk Mindset & Culture telah tersedia di ...(eng) ... Risk adalah potensi risiko utama yang menjadi perhatian perusahaan...

Cybersecurity 2025-01-21

Cybersecurity crossword puzzle
Across
  1. Software designed to protect systems from malware and cyber threats
  2. The act of stealing personal information for fraudulent use
  3. Unauthorized access to a computer system or network.
  4. A method hackers use to deceive users into sharing sensitive information
Down
  1. The process of converting data into a secure format
  2. A weakness in software that can be exploited by attackers.
  3. The process of identifying and fixing software bugs or vulnerabilities
  4. A type of malicious software that demands payment to restore access

8 Clues: The process of converting data into a secure formatUnauthorized access to a computer system or network.A weakness in software that can be exploited by attackers.The act of stealing personal information for fraudulent useSoftware designed to protect systems from malware and cyber threats...

Responsible Technology 2021-12-13

Responsible Technology crossword puzzle
Across
  1. The Tech We Want is this, ethical, and inclusive
  2. The difficult decision that The Tech Workers Handbook is designed to support
  3. The rails and roads of the digital economy
  4. A set of rules that are inadequate in the age of surveillance capitalism
  5. Data about data
  6. Not today’s data governance
  7. One community fighting back against disinformation
  8. Last Week Tonight Oct. 10
  9. The end-to-end world
Down
  1. A concept that balances data’s societal good, market innovation, and digital rights
  2. A key attribute of MOSIP that ensures it can adapt to future needs and risks
  3. Policies tried to undermine this fundamental right but advocates pushed back
  4. More than the new oil
  5. A new, digital form of colonization on the African continent
  6. The global tech movement that Harvard will lead into the future
  7. One of the most significant challenges in our connected world
  8. Five years of championing better digital identity
  9. The target of unsafe social media ads

18 Clues: Data about dataThe end-to-end worldMore than the new oilLast Week Tonight Oct. 10Not today’s data governanceThe target of unsafe social media adsThe rails and roads of the digital economyThe Tech We Want is this, ethical, and inclusiveFive years of championing better digital identityOne community fighting back against disinformation...

Christmas Crossword Competition 2023-10-25

Christmas Crossword Competition crossword puzzle
Across
  1. Around 25 million to be enjoyed in the UK
  2. In the UK, children have an average of 16
  3. Festive tune that was the first song played in space
  4. Artist who sang ‘Merry Xmas Everybody'
  5. A traditional name Father Christmas and, suspiciously, our compliance manager
  6. Steven Mint
  7. Finance present exchange
  8. In our last newsletter, Lauren Lee was named a ___
  9. British Christmas TV film released the same year Whitechurch Securities Ltd was established
Down
  1. 27% of families watch it
  2. 26.6 billion estimated to be lost
  3. 24 days in the calendar
  4. 6 million are sold in the UK to wrap those presents
  5. Why doesn’t santa have a retirement plan? Because he’s too focussed on the ___
  6. You can avoid it in ethical investments but santa still might fill your stocking with it if you’ve been naughty
  7. Monday that follows Black Friday
  8. Why do santa’s little helpers all have income protection insurance? Because they’re elf__
  9. Name of the Grinch’s dog

18 Clues: Steven Mint24 days in the calendar27% of families watch itFinance present exchangeName of the Grinch’s dogMonday that follows Black Friday26.6 billion estimated to be lostArtist who sang ‘Merry Xmas Everybody'Around 25 million to be enjoyed in the UKIn the UK, children have an average of 16In our last newsletter, Lauren Lee was named a ___...

Customer Service Week - Crossword 2025-10-04

Customer Service Week - Crossword crossword puzzle
Across
  1. Finish this CSC Guiding Principle: Very few things are actually ___________
  2. This CSC brand's main focus is home design
  3. The "S" in SLA
  4. Which CSC brand has a city in its name?
  5. Total number of brands in CSC's family of brandss
  6. Which CSC family brand has an animal in its logo?
  7. Which CSC Brand was featured in a South Park episode?
  8. who is the Vice President of CSC's Call Centers? (first & last name)
Down
  1. The "E" of EBITDA
  2. Which CSC value is this: "We're driven to support each other at all times. We act with empathy, honesty, and integrity."
  3. CSC Generation's CTO and AI Guru (last name)
  4. the "L" of BNPL
  5. The most recent brand to join CSC's family of brands
  6. time period of intense online shopping that begins Black Friday and ends Cyber Monday
  7. CSC brands are all part of which industry?
  8. CSC Generation's Founder & CEO (last name)
  9. The name of our LMS platform
  10. Measure of a customer's contentment (acronym)

18 Clues: The "S" in SLAthe "L" of BNPLThe "E" of EBITDAThe name of our LMS platformWhich CSC brand has a city in its name?This CSC brand's main focus is home designCSC brands are all part of which industry?CSC Generation's Founder & CEO (last name)CSC Generation's CTO and AI Guru (last name)Measure of a customer's contentment (acronym)...

Azure Data DoL, Feb 13, 2025 2025-02-13

Azure Data DoL, Feb 13, 2025 crossword puzzle
Across
  1. The management of data availability, usability, integrity, and security within an organization
  2. A security framework that assumes no user or device is trustworthy by default, regardless of its location inside or outside the network
  3. A network security system that monitors and controls incoming and outgoing network traffic
  4. Microsoft's single, unified, logical data lake for your whole organization
Down
  1. A Microsoft solution that can help an organization govern, protect, and manage data, wherever it lives
  2. A Microsoft tool used for business analytics, transforming data into interactive insights and visualization
  3. A framework that allows for the distributed processing of large datasets across clusters of computers
  4. A storage repository that holds a vast amount of raw data in its native format
  5. A standard programming language used for managing and manipulating relational databases

9 Clues: Microsoft's single, unified, logical data lake for your whole organizationA storage repository that holds a vast amount of raw data in its native formatA standard programming language used for managing and manipulating relational databasesA network security system that monitors and controls incoming and outgoing network traffic...

Five Nights at Freddy's Trivia 2023-12-14

Five Nights at Freddy's Trivia crossword puzzle
Across
  1. What name are you given in sister location?
  2. What animatronic was torn apart by kids?
  3. what color is the guy who un-alived kids?
  4. Animatronic Scott Cawthon is most afraid of?
  5. What animatronic is pirate themed?
Down
  1. what does chika eat in security breach?
  2. Who said "was that the bite of 87 ?!?!"
  3. Who do you play as in security breach?

8 Clues: What animatronic is pirate themed?Who do you play as in security breach?what does chika eat in security breach?Who said "was that the bite of 87 ?!?!"What animatronic was torn apart by kids?what color is the guy who un-alived kids?What name are you given in sister location?Animatronic Scott Cawthon is most afraid of?

internet safety crossword puzzle 2025-03-06

internet safety crossword puzzle crossword puzzle
Across
  1. a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses
  2. rules of conduct for respectful and appropriate communication on the internet
  3. distribution of copyrighted material,
Down
  1. image-editing software
  2. Any crime done online
  3. someone who frequently makes negative comments about you online
  4. a packet of data sent by a web server to a browser, which is returned by the browser each time it subsequently accesses the same server
  5. software designed to block access to a computer system until a sum of money is paid.
  6. texting someone online

9 Clues: Any crime done onlineimage-editing softwaretexting someone onlinedistribution of copyrighted material,someone who frequently makes negative comments about you onlinerules of conduct for respectful and appropriate communication on the internetsoftware designed to block access to a computer system until a sum of money is paid....

cyber intimidation 2013-09-30

cyber intimidation crossword puzzle
Across
  1. un _ _ _ _ _ _ _ _ _ _ si tu as problèmesde cyber intimidation
  2. beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonte mal tu
Down
  1. tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
  2. il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.
  3. peuple _ _ _ _ _ _ _ _ _tu qaund ils dire ton noms
  4. quand vous obtenez tu devrait _ _ _ _ _ _ leur

6 Clues: quand vous obtenez tu devrait _ _ _ _ _ _ leurpeuple _ _ _ _ _ _ _ _ _tu qaund ils dire ton nomstu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.un _ _ _ _ _ _ _ _ _ _ si tu as problèmesde cyber intimidationbeaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonte mal tu...

CYBER INTIMIDATION 2013-09-30

CYBER INTIMIDATION crossword puzzle
Across
  1. quand vous obtenez tu devrais _ _ _ _ _ _ leur
  2. peuple _ _ _ _ _ _ _ _ tu quand ils dire ton noms
  3. un _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidation
Down
  1. il est _ _ _ _ _ _ _ _ _ a parler avec a donner ton information personnel.
  2. -quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs.
  3. beaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu

6 Clues: quand vous obtenez tu devrais _ _ _ _ _ _ leurpeuple _ _ _ _ _ _ _ _ tu quand ils dire ton nomsun _ _ _ _ _ _ _ _ _ _ si tu as problèmes de cyber intimidationbeaucoup le personnes _ _ _ _ _ _ _ tu ils dit leur volonté mal tu-quand tu donner peuple to mots de passe tu _ _ _ _ _ _ _ _ _ leurs....

Bonus Game 2024-10-22

Bonus Game crossword puzzle
Across
  1. it is a consent or authorization to do something.
  2. serves as a pass when entering something.
  3. Acronym: One ____ Passwords.
  4. a state of being free from public attention.
Down
  1. it is a person's name and other facts about who they are.
  2. mfa serves as a ______ to decrease the possibility of a successful cyber attack.

6 Clues: Acronym: One ____ Passwords.serves as a pass when entering something.a state of being free from public attention.it is a consent or authorization to do something.it is a person's name and other facts about who they are.mfa serves as a ______ to decrease the possibility of a successful cyber attack.

Cyber Threat Intelligence Crossword Puzzle 2025-02-18

Cyber Threat Intelligence Crossword Puzzle crossword puzzle
Across
  1. The first phase of the cyber kill chain
  2. A cybercrime technique used to trick users into revealing sensitive data
  3. An online network that provides anonymity to cybercriminals
Down
  1. Gathering intelligence from freely available sources
  2. Cybercriminals who demand payment to restore encrypted files
  3. A threat intelligence framework that maps adversary behaviors

6 Clues: The first phase of the cyber kill chainGathering intelligence from freely available sourcesAn online network that provides anonymity to cybercriminalsCybercriminals who demand payment to restore encrypted filesA threat intelligence framework that maps adversary behaviorsA cybercrime technique used to trick users into revealing sensitive data

Complete the following crossword 2025-07-03

Complete the following crossword crossword puzzle
Across
  1. A method that cyber criminals use to trick you by sending fraudulent SMS or text messages
  2. Set up these to be notified of account activity
Down
  1. You can view these online
  2. Set it and forget it
  3. A transaction that can be completed online
  4. You can now assign these to your accounts

6 Clues: Set it and forget itYou can view these onlineYou can now assign these to your accountsA transaction that can be completed onlineSet up these to be notified of account activityA method that cyber criminals use to trick you by sending fraudulent SMS or text messages

Mod 5 1-b Application Security 2023-08-24

Mod 5 1-b Application Security crossword puzzle
Across
  1. Ensures that a user is who they say they are.
  2. Validates that a user has permission to access the application by comparing the user’s identity with a list of authorized users.
  3. Provides a time-stamped record of which aspects of the application were accessed and by whom.
Down
  1. Safeguarding sensitive data while in transit or at rest.
  2. Combines elements of both static and dynamic testing.
  3. Check their code as they are writing it
  4. Analyzes running code while simulating outside, or “black box” attacks.
  5. Designed specifically for the mobile environments and can examine how an attacker can leverage the mobile OS and the apps running on them in its entirety.
  6. Application ___________ the process of developing, testing, and adding security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.

9 Clues: Check their code as they are writing itEnsures that a user is who they say they are.Combines elements of both static and dynamic testing.Safeguarding sensitive data while in transit or at rest.Analyzes running code while simulating outside, or “black box” attacks....

crack it 2023-09-18

crack it crossword puzzle
Across
  1. A programming technique for finding solutions to complex problems.
  2. Digital or virtual currency that uses cryptography for security and operates independently of a central authority.
  3. computing paradigm involving probability and randomness.
  4. A method in cryptography to ensure data integrity.
  5. field of study involving massive datasets and patterns.
  6. A network security protocol to protect data in transit.
Down
  1. A decentralized digital ledger.
  2. A branch of AI simulating human-like conversation
  3. A network of interconnected smart devices.

9 Clues: A decentralized digital ledger.A network of interconnected smart devices.A branch of AI simulating human-like conversationA method in cryptography to ensure data integrity.field of study involving massive datasets and patterns.A network security protocol to protect data in transit.computing paradigm involving probability and randomness....

CHEMSTAR GROUP 2020-09-15

CHEMSTAR GROUP crossword puzzle
Across
  1. Behind the Security post
  2. product delivery
  3. Senior factory engineer
  4. Wider coverage
  5. HOD Finished goods store
  6. Paint samples in batches
  7. Fasanmi Ebenezer
  8. A Unit in Account
  9. oil based
  10. CPIN plastics
Down
  1. Best for outdoor painting
  2. Overall head of Admin
  3. Action
  4. Chemstar Group Subsidiary
  5. Acronym for raw materials
  6. Morning Devotion
  7. Strategy and Business Development
  8. Facility Unit Equipment

18 Clues: Actionoil basedCPIN plasticsWider coverageproduct deliveryMorning DevotionFasanmi EbenezerA Unit in AccountOverall head of AdminSenior factory engineerFacility Unit EquipmentBehind the Security postHOD Finished goods storePaint samples in batchesBest for outdoor paintingChemstar Group SubsidiaryAcronym for raw materials...

Missing Links 2021-01-26

Missing Links crossword puzzle
Across
  1. Action-Dispute-Revolution
  2. Again-At-Over
  3. Dawn-Girl-Greek
  4. Down-Arm-Par
  5. Holiday-Indian-Sun
  6. High-Pay-Sun
  7. Contact-Letter-Reaction
  8. Bank-Case-Compare
Down
  1. Wage-Room-Clean
  2. Hop-Egg-Whiskey
  3. Side-Stream-Up
  4. Blossom-Tomato-Picker
  5. Some-Day-Number
  6. Case-Hand-Lip
  7. High-Security-Factor
  8. Fire-Narrow-Route
  9. Eye-Intent-Lesser
  10. Student-Maid-Wet

18 Clues: Down-Arm-ParHigh-Pay-SunAgain-At-OverCase-Hand-LipSide-Stream-UpWage-Room-CleanHop-Egg-WhiskeyDawn-Girl-GreekSome-Day-NumberStudent-Maid-WetFire-Narrow-RouteEye-Intent-LesserBank-Case-CompareHoliday-Indian-SunHigh-Security-FactorBlossom-Tomato-PickerContact-Letter-ReactionAction-Dispute-Revolution

The Cyber Shield Crossword - Breach Guardians 2025-11-19

The Cyber Shield Crossword - Breach Guardians crossword puzzle
Across
  1. Secure connection tunnel
  2. Monitoring software
  3. Identity verification
  4. Multi-factor authentication
  5. Network of compromised devices
  6. Network traffic filter
  7. Unpatched vulnerability
Down
  1. Security testing method
  2. To encode data
  3. Hidden system modification tool
  4. Extortion malware
  5. Isolated test environment
  6. Science of encryption
  7. Keyboard activity recorder
  8. To trick someone into giving credentials
  9. Overload attack
  10. Hidden way into a system
  11. Malicious software

18 Clues: To encode dataOverload attackExtortion malwareMalicious softwareMonitoring softwareIdentity verificationScience of encryptionNetwork traffic filterSecurity testing methodUnpatched vulnerabilitySecure connection tunnelHidden way into a systemIsolated test environmentKeyboard activity recorderMulti-factor authenticationNetwork of compromised devices...

At a concert 2018-10-18

At a concert crossword puzzle
Across
  1. głośno
  2. ochroniarz
  3. scena
  4. zespół
  5. wejście
Down
  1. głośnik
  2. olbrzymi ekran
  3. ekscytujący
  4. miejsce siedzące

9 Clues: scenagłośnozespółgłośnikwejścieochroniarzekscytującyolbrzymi ekranmiejsce siedzące

ParaCommando Kruiswoordraadsel 2014-03-11

ParaCommando Kruiswoordraadsel crossword puzzle
Across
  1. meerdere compagnieën
  2. Thuishaven school voor onderofficieren
  3. Hoofddeksel van de chutist
  4. legervervoermiddel
  5. legeroefening
  6. Eskadron in het Belgisch Leger
  7. Vertrekplaats voor vliegtuigsprong
  8. De beste vriend van een para
  9. Militair voertuig
Down
  1. Auschwitz en Birkenau
  2. onbemande vliegtuig(afk)
  3. Opleidingskamp van de para-commando
  4. Belgium Luxemburg International Security Assistance Force
  5. M56
  6. Parachute
  7. voormalig Belgische Koning
  8. graad in het leger
  9. Militaire helikopter
  10. Operatie Kolwezi 78

19 Clues: M56ParachutelegeroefeningMilitair voertuiglegervervoermiddelgraad in het legerOperatie Kolwezi 78meerdere compagnieënMilitaire helikopterAuschwitz en Birkenauonbemande vliegtuig(afk)Hoofddeksel van de chutistvoormalig Belgische KoningDe beste vriend van een paraEskadron in het Belgisch LegerVertrekplaats voor vliegtuigsprong...

ParaCommando Kruiswoordraadsel 2014-03-11

ParaCommando Kruiswoordraadsel crossword puzzle
Across
  1. Hoofddeksel van de chutist
  2. Operatie Kolwezi 78
  3. Eskadron in het Belgisch Leger
  4. De beste vriend van een para
  5. Vertrekplaats voor vliegtuigsprong
  6. Militair voertuig
  7. Belgium Luxemburg International Security Assistance Force
  8. Opleidingskamp van de para-commando
  9. meerdere compagnieën
Down
  1. Auschwitz en Birkenau
  2. graad in het leger
  3. legeroefening
  4. legervervoermiddel
  5. Parachute
  6. onbemande vliegtuig(afk)
  7. Thuishaven school voor onderofficieren
  8. voormalig Belgische Koning
  9. M56
  10. Militaire helikopter

19 Clues: M56ParachutelegeroefeningMilitair voertuiggraad in het legerlegervervoermiddelOperatie Kolwezi 78Militaire helikoptermeerdere compagnieënAuschwitz en Birkenauonbemande vliegtuig(afk)Hoofddeksel van de chutistvoormalig Belgische KoningDe beste vriend van een paraEskadron in het Belgisch LegerVertrekplaats voor vliegtuigsprong...

ParaCommando Kruiswoordraadsel 2014-03-11

ParaCommando Kruiswoordraadsel crossword puzzle
Across
  1. Hoofddeksel van de chutist
  2. Operatie Kolwezi 78
  3. Eskadron in het Belgisch Leger
  4. De beste vriend van een para
  5. Vertrekplaats voor vliegtuigsprong
  6. Militair voertuig
  7. Belgium Luxemburg International Security Assistance Force
  8. Opleidingskamp van de para-commando
  9. meerdere compagnieën
Down
  1. Auschwitz en Birkenau
  2. graad in het leger
  3. legeroefening
  4. legervervoermiddel
  5. Parachute
  6. onbemande vliegtuig(afk)
  7. Thuishaven school voor onderofficieren
  8. voormalig Belgische Koning
  9. M56
  10. Militaire helikopter

19 Clues: M56ParachutelegeroefeningMilitair voertuiggraad in het legerlegervervoermiddelOperatie Kolwezi 78Militaire helikoptermeerdere compagnieënAuschwitz en Birkenauonbemande vliegtuig(afk)Hoofddeksel van de chutistvoormalig Belgische KoningDe beste vriend van een paraEskadron in het Belgisch LegerVertrekplaats voor vliegtuigsprong...

FDR's New Deal Programs 2023-04-14

FDR's New Deal Programs crossword puzzle
Across
  1. Rural Electrification
  2. Works Progress
  3. Federal Deposit Insurance
  4. National
Down
  1. Works Administration
  2. Federal Emergency
  3. Tennessee Valley
  4. Civilian Conservation
  5. Agricultural
  6. Social Security

10 Clues: NationalAgriculturalWorks ProgressSocial SecurityTennessee ValleyFederal EmergencyWorks AdministrationRural ElectrificationCivilian ConservationFederal Deposit Insurance

Identity Theft 2016-12-10

Identity Theft crossword puzzle
Across
  1. These should always be difficult so that identity thieves cannot guess them easily.
  2. a number in the format 000-00-0000, unique for each and every person, that is used to track Social Security benefits and for other identification purposes.
  3. the condition of being protected from identity thefts and other people who could cause you to lose financial security
  4. When someone steals this, they have the access to fraudently apply for credit, file taxes, or get medical services.
  5. the fraudulent acquisition and use of a person's private identifying information, usually for their own financial gain.
  6. Do this to your receipts and old credit cards.
  7. This occurs when someone steals your Social Security Number to obtain medical treatment or other medical services.
Down
  1. shielding your identity
  2. When criminals watch from a nearby location as you punch in your cell # to a hotel or rental car company.
  3. charges/bills that you may have noticed.. that you, yourself did NOT pay for.
  4. When you install this and virus-detection software on your home computer, you are protecting yourself from criminals who may be trying to access your private information via computer.
  5. If you suspect that your identity has been stolen, you should contact authorities immediately.

12 Clues: shielding your identityDo this to your receipts and old credit cards.charges/bills that you may have noticed.. that you, yourself did NOT pay for.These should always be difficult so that identity thieves cannot guess them easily.If you suspect that your identity has been stolen, you should contact authorities immediately....

Great Depression 2024-02-08

Great Depression crossword puzzle
Across
  1. FDR targeted these first, and shut down the unstable ones.
  2. What New Deal programs hired people to build public projects, murals and roads
  3. FDR used ____ to talk to people.
  4. How many programs were within the New Deal?
  5. Social Security provides what?
  6. The needy relied on the government and ___ for food.
Down
  1. Roosevelt addressed citizens by using this.
  2. A holdover from FDR, it was made to give relief to the elderly, it was called ______ Security.
  3. Bad farming practices contributed the ____ bowl.
  4. This program paid farmers to work/produce less.
  5. FDR believed that the workers employed by the New Deal should have jobs that gave them money and what?
  6. In his first days in ____ FDR pushed congress and they passed 15 bills (a record).
  7. Unlike most Americans FDR was _____.
  8. The R’s of the New Deal are to reform, recover and what?
  9. It was because of this that FDR was paralyzed
  10. FDR was the governor of this state.

16 Clues: Social Security provides what?FDR used ____ to talk to people.FDR was the governor of this state.Unlike most Americans FDR was _____.Roosevelt addressed citizens by using this.How many programs were within the New Deal?It was because of this that FDR was paralyzedThis program paid farmers to work/produce less....

Crossword 2024-10-09

Crossword crossword puzzle
Across
  1. A list of approved entities allowed access to a system.
  2. A vulnerability that is exploited before the vendor knows about it
  3. Processes for responding to and managing security incidents.
  4. Information used to verify a user’s identity, like a password.
  5. A network of compromised computers controlled by a hacker.
  6. Disguising communication from an unknown source as being from a known one.
  7. A code injection technique used to attack databases.
  8. Measures to protect physical assets and locations from unauthorized access.
  9. The state of being unidentifiable within a network or system.
  10. A symmetric-key algorithm for data encryption
Down
  1. A legal requirement to inform affected individuals after a data breach.
  2. A fixed-size string generated from data to ensure integrity.
  3. Dividing a computer network into smaller parts for security.
  4. An entity that issues digital certificates for secure communications.
  5. Software intended to harm or exploit any programmable device.

15 Clues: A symmetric-key algorithm for data encryptionA code injection technique used to attack databases.A list of approved entities allowed access to a system.A network of compromised computers controlled by a hacker.A fixed-size string generated from data to ensure integrity.Dividing a computer network into smaller parts for security....

FLW 2026 2026-02-10

FLW 2026 crossword puzzle
Across
  1. Security feature that replaces sensitive data with non-sensitive values (12)
  2. KYC method using biometric verification (6)
  3. Asset held in central bank reserves as a hedge against currency risk (4)
  4. Malicious software designed to capture keystrokes (8)
  5. Global standard governing payment card security (6)
  6. Tap-and-pay technology using short-range communication (3)
  7. Statutory mechanism for resolving complaints against banks and NBFCs (10)
  8. Capital buffer RBI maintains to absorb unexpected losses (7)
Down
  1. Difference between the face value of money and its cost of production (11)
  2. Authority responsible for maintaining CKYCR (6)
  3. Economic condition with neither excessive inflation nor weak growth (9)
  4. Restrictive legal or trade measure used to exert pressure on counterparties (9)
  5. Regulatory requirement to obtain clear customer permission (7)
  6. Centralised registry that stores KYC records in India (5)
  7. Smallest payable amount shown in a credit card statement (3)

15 Clues: KYC method using biometric verification (6)Authority responsible for maintaining CKYCR (6)Malicious software designed to capture keystrokes (8)Global standard governing payment card security (6)Centralised registry that stores KYC records in India (5)Tap-and-pay technology using short-range communication (3)...

account owners 2020-11-04

account owners crossword puzzle
Across
  1. a collection of items of the same type stored in a hidden or inaccessible place.
  2. the admin sets options that helps the accounts stay safe
  3. is when you are checking that it is that person
  4. accounts that people of the owner of the accounts have restricted
  5. a computer program with a graphical user interface for displaying and navigating between web pages.
  6. made by the admin of the accounts
Down
  1. you can protect your computer by downloading them
  2. has security in it
  3. are made by app developers
  4. you can do this so that you don't lose your stuff when you reset your computer
  5. the person who runs the accounts
  6. is places some one is allowed to go

12 Clues: has security in itare made by app developersthe person who runs the accountsmade by the admin of the accountsis places some one is allowed to gois when you are checking that it is that personyou can protect your computer by downloading themthe admin sets options that helps the accounts stay safe...

Summit 2013-04-16

Summit crossword puzzle
Across
  1. Summit provides (a)_____ for people with disabilities
  2. Summit's Youth Advocacy Club is also known as (y)___
  3. Someone shows (i)_____ if they make their own decisions
  4. Office of Public Assistance or (O)__
  5. Social Security Disability Insurance is also (S)___
  6. The Supreme Court decision in (o)____ v. United States determined that people have a right to live in the community
Down
  1. This civil rights law was passed in 1990 (a)__
  2. Instead of saying able-bodied, use the term (n)____
  3. MT Program: Medicaid for (W)_______ with Disabilities
  4. The advocacy group (p)______ at Summit is sponsored by the Kiwanis Club
  5. Supplemental Security Income is also (S)__
  6. The (A)__ Act would allow people to save money yet still receive Medicaid

12 Clues: Office of Public Assistance or (O)__Supplemental Security Income is also (S)__This civil rights law was passed in 1990 (a)__Instead of saying able-bodied, use the term (n)____Social Security Disability Insurance is also (S)___Summit's Youth Advocacy Club is also known as (y)___MT Program: Medicaid for (W)_______ with Disabilities...

Compiling Crosswords 2018-02-05

Compiling Crosswords crossword puzzle
Across
  1. If you use a computer you need it as a display
  2. Systematic search for new insights
  3. This Departement ships the goods to the customer
  4. The amount by which the value of a device is reduced over time
  5. It offers financial security in case of damage
  6. In this department you have to manage customer relationships
Down
  1. A small container that you keep your documents in
  2. One of the most important machine in the office
  3. The main task of this department is to produce goods
  4. Raising funds while offering your property as a security deposit
  5. This machine is used to communicate
  6. One of the tasks of this Departement is to negotiate with suppliers

12 Clues: Systematic search for new insightsThis machine is used to communicateIf you use a computer you need it as a displayIt offers financial security in case of damageOne of the most important machine in the officeThis Departement ships the goods to the customerA small container that you keep your documents in...

VisioNize 2022-03-18

VisioNize crossword puzzle
Across
  1. VisioNize _____ enabled devices require a hardware hub to connect to VisioNize
  2. This module is important for GxP lab for documentation purposes
  3. the pillars of VisioNize subscriptions are Essential and sample ___________
  4. The _________ module allows for you to check all device parameter and monitor them
  5. Lab suite Essential allows for ________ notifications ONLY
Down
  1. VisioNize is a ________ based platform
  2. Device data ________ function is available for both Essential and Sample Security plans
  3. This module allows you to plan maintenance for your devices
  4. VisioNize ___ enabled devices are equipped with the VisioNize touch interface
  5. One VisioNize Box can connect up to _________ devices
  6. Any device __________ updates can be done remotely for connected Eppendorf devices
  7. VisioNize ______ connect 3rd party devices to VisioNize

12 Clues: VisioNize is a ________ based platformOne VisioNize Box can connect up to _________ devicesVisioNize ______ connect 3rd party devices to VisioNizeLab suite Essential allows for ________ notifications ONLYThis module allows you to plan maintenance for your devicesThis module is important for GxP lab for documentation purposes...

Travel terms 2024-10-04

Travel terms crossword puzzle
Across
  1. "The act of leaving for a journey, or the start of a flight."
  2. "Area where passengers collect their luggage after a flight."
  3. "Screening of passengers and their belongings before boarding."
  4. "The act of reaching a destination."
  5. "Elevator, especially at airports, to move between floors."
Down
  1. "The area where passengers board or leave an aircraft."
  2. "Main building at an airport where passengers arrive and depart."
  3. "Official document required for international travel."
  4. "Security checkpoint for passengers entering a country, ensuring compliance with national laws."
  5. "The process of registering for a flight before departure."
  6. "Place at the airport where you leave your checked luggage."
  7. "Wheeled cart used to carry luggage in airports."

12 Clues: "The act of reaching a destination.""Wheeled cart used to carry luggage in airports.""Official document required for international travel.""The area where passengers board or leave an aircraft.""The process of registering for a flight before departure.""Elevator, especially at airports, to move between floors."...

Digital media literacy 2023-09-06

Digital media literacy crossword puzzle
Across
  1. password
  2. using online
  3. technical process
  4. needed for woodwork practical
  5. used in practical choices
  6. how to use devices
Down
  1. online being mean
  2. collect information
  3. playing games
  4. Leonardo da Vinci
  5. Mechanism
  6. online platform

12 Clues: passwordMechanismusing onlineplaying gamesonline platformonline being meanLeonardo da Vincitechnical processhow to use devicescollect informationused in practical choicesneeded for woodwork practical

Vocab Unit 11 2024-02-12

Vocab Unit 11 crossword puzzle
Across
  1. organize
  2. picky
  3. nuts
  4. sour
  5. rules
Down
  1. guide
  2. away from danger
  3. looking life-like
  4. downfall of snow or rocks on a mountain
  5. to make sure you're safe
  6. snuggle; get comfy
  7. cry out

12 Clues: nutssourguidepickyrulescry outorganizeaway from dangerlooking life-likesnuggle; get comfyto make sure you're safedownfall of snow or rocks on a mountain

CLUB DE SOLEIL 2025-08-24

CLUB DE SOLEIL crossword puzzle
Across
  1. MAKE A SPLASH
  2. VIP GUEST
  3. PATROLS PROPERTY
  4. WHO CLEANS
  5. OUTSIDE COOKER
  6. CHECK IN
Down
  1. WHERE DO YOU TAKE YOUR LUNCH
  2. BOOKS TOURS
  3. WHO REPAIRS
  4. WHAT DO YOU SLEEP ON
  5. TRANSPORT
  6. REFLECTION

12 Clues: CHECK INVIP GUESTTRANSPORTWHO CLEANSREFLECTIONBOOKS TOURSWHO REPAIRSMAKE A SPLASHOUTSIDE COOKERPATROLS PROPERTYWHAT DO YOU SLEEP ONWHERE DO YOU TAKE YOUR LUNCH

Devo Delight 2021-04-12

Devo Delight crossword puzzle
Across
  1. Day after Cyber Monday (Two words)
  2. Center's planned gifts program (2 words)
  3. name of our printed member newsletter (2 words)
Down
  1. Quarterly webinar for Leadership Circle and Owls Club members (2 words)
  2. Center's automatic recurring donations program (2 words)
  3. What can you do with a match (3 words)
  4. Someone who has signed up to receive our emails but hasn't made a donation to the Center
  5. Someone who has made a donation to the Center
  6. The graphic sometimes on the Center's homepage that links to a donation form or petition

9 Clues: Day after Cyber Monday (Two words)What can you do with a match (3 words)Center's planned gifts program (2 words)Someone who has made a donation to the Centername of our printed member newsletter (2 words)Center's automatic recurring donations program (2 words)Quarterly webinar for Leadership Circle and Owls Club members (2 words)...

Caleigh- bullying crossword 2022-05-17

Caleigh- bullying crossword crossword puzzle
Across
  1. Mckenna was teasing Caleigh because of her purple hair
  2. Pam would get bullied by Tyson everyday because of her height
  3. Kalia was making fun of her brother because he didn't know the answer to a homework question
  4. Kate invites everyone except Paige to her birthday party and makes sure Paige knows about it
  5. front of the whole class
  6. JD was getting bullied because of his character on the online game
Down
  1. Kaylynn was making fun of DeeDee´s outfit on Friday
  2. What is the B of the 4 b´s of bullying
  3. John would constantly trip Morgan everyday
  4. what is the A in the 4 b´s of bullying?
  5. Abbie was spreading rumors around the school about lily because their friendship ended

11 Clues: front of the whole classWhat is the B of the 4 b´s of bullyingwhat is the A in the 4 b´s of bullying?John would constantly trip Morgan everydayKaylynn was making fun of DeeDee´s outfit on FridayMckenna was teasing Caleigh because of her purple hairPam would get bullied by Tyson everyday because of her height...

Caleigh- bullying crossword 2022-05-17

Caleigh- bullying crossword crossword puzzle
Across
  1. Mckenna was teasing Caleigh because of her purple hair
  2. Pam would get bullied by Tyson everyday because of her height
  3. Kalia was making fun of her brother because he didn't know the answer to a homework question
  4. Kate invites everyone except Paige to her birthday party and makes sure Paige knows about it
  5. front of the whole class
  6. JD was getting bullied because of his character on the online game
Down
  1. Kaylynn was making fun of DeeDee´s outfit on Friday
  2. What is the B of the 4 b´s of bullying
  3. John would constantly trip Morgan everyday
  4. what is the A in the 4 b´s of bullying?
  5. Abbie was spreading rumors around the school about lily because their friendship ended

11 Clues: front of the whole classWhat is the B of the 4 b´s of bullyingwhat is the A in the 4 b´s of bullying?John would constantly trip Morgan everydayKaylynn was making fun of DeeDee´s outfit on FridayMckenna was teasing Caleigh because of her purple hairPam would get bullied by Tyson everyday because of her height...

EAS Crossword 2020-11-08

EAS Crossword crossword puzzle
Across
  1. SOF Cashiers and TMs must ensure they _____ active security tags when customers purchase security tagged items.
  2. A type of EAS stop where a PSG conducts an EAS stop and finds that store product has NOT been paid for.
Down
  1. Theft deterrence system where the security gate is triggered by an active security tag.
  2. App that is used to view EAS alarm triggers on EAS iPods.
  3. A performance measure used to evaluate the efficiency of an investment (i.e., our EAS system).
  4. VENDOR

6 Clues: VENDORApp that is used to view EAS alarm triggers on EAS iPods.Theft deterrence system where the security gate is triggered by an active security tag.A performance measure used to evaluate the efficiency of an investment (i.e., our EAS system).A type of EAS stop where a PSG conducts an EAS stop and finds that store product has NOT been paid for....

HUMAN RIGHTS 2020-11-12

HUMAN RIGHTS crossword puzzle
Across
  1. the right to be employed
  2. tranquillity/non war
  3. the right to state your opinion
  4. same rights/fairness
  5. existence
  6. protection/assurance
  7. social equality
Down
  1. to own
  2. liberty
  3. the right to relaxation
  4. freedom from intrusion
  5. variety of behaviour/opinion
  6. freedom to have your own ideas
  7. non-discrimination
  8. philosophy based on faith
  9. formal learning
  10. soundness of body/mind

17 Clues: to ownlibertyexistenceformal learningsocial equalitynon-discriminationtranquillity/non warsame rights/fairnessprotection/assurancefreedom from intrusionsoundness of body/mindthe right to relaxationthe right to be employedphilosophy based on faithvariety of behaviour/opinionfreedom to have your own ideasthe right to state your opinion

Chiara Silvestre crossword puzzle 2021-05-23

Chiara Silvestre crossword puzzle crossword puzzle
Across
  1. one of organization objectives
  2. month of the conference in San Francisco
  3. number of the first states that joined the UN
Down
  1. UN was established after
  2. one of main office closest to Italy
  3. one of the aims that maintains intergovernmental organization that start with S
  4. headquartered on international territory
  5. intergovernmental organization that aims to maintain international peace and security

8 Clues: UN was established afterone of organization objectivesone of main office closest to Italyheadquartered on international territorymonth of the conference in San Francisconumber of the first states that joined the UNone of the aims that maintains intergovernmental organization that start with S...

Society & Aging 2015-11-14

Society & Aging crossword puzzle
Across
  1. a maximum number of cell divisions that normal cells undergo as typically measured in a laboratory dish
  2. prejudice or negative stereotypes about people based on chronological age
  3. the excess of social security payroll taxes collected over the amount paid out, including excess funds accumulated from prior years
  4. the federal government program that pays for acute health care for older people
  5. the predicted length of life usually from some specific point in time such as birth
  6. those people, usually women, who have obligations to care for children as well as older parents or in-laws
  7. a pension system, public or private, in which future retirement benefits owed are paid out of money saved up in advance
  8. a view holding that the more active people are, the more likely they are to be satisfied with life
  9. a rise in the average age of the population; alternatively, an increase in the proportion of the population made up of people over age 65
Down
  1. as applied to Social Security, a fair return to beneficiaries depending on how much they contribute to the system
  2. the intellectual ability to solve novel tasks or problems
  3. the medical specialty treating the diseases of old age
  4. rituals that mark major life events, thereby reinforcing shared norms about age grading
  5. people aged 65 to 74
  6. residential facilities for older adults that provide limited supportive care and permit a high degree of independence
  7. a group of people born within a bounded period of years, such as the baby boom generation
  8. legal responsibility for another person's welfare
  9. an individual's written statement specifying or limiting his or her medical treatment in a situation without hope of recovery
  10. temporary care for dependent older people to allow the caregiver some time off
  11. people aged 85 and older

20 Clues: people aged 65 to 74people aged 85 and olderlegal responsibility for another person's welfarethe medical specialty treating the diseases of old agethe intellectual ability to solve novel tasks or problemsprejudice or negative stereotypes about people based on chronological age...

Betelihem Abeje 12/05/2024 2024-12-06

Betelihem Abeje                                               12/05/2024 crossword puzzle
Across
  1. is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  2. security features that enable administrators to control who has access to the network
  3. testers who are paid to probe networks and report vulnerabilities
  4. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
  5. a document that describes the rules governing access to an organization’s information resources
  6. a series of letters, numbers, and special characters that two devices use to authenticate each other’s identity
  7. attackers who do not report problems, but instead disseminate the information to other black hat attackers
  8. creates a barrier between a computer OS and the network so potentially harmful packets can’t enter or leave the OS
  9. WSUS is a server role that makes it possible for administrators to take control of Microsoft product updates a process called
  10. only backs up files that have changed since the last full backup
Down
  1. a Windows domain environment and provides mutual authentication
  2. to supply two or more types of authentication drawn from Knowledge, Possession, Inherence
  3. security features that enable what users can do after they are logged on to the network
  4. backs up the disk sector by sector to create an exact image of the disk’s contents
  5. is specially allocated disk area that holds information that is swapped back and forth from RAM to disk
  6. good security enhancement for servers that aren’t physically secure and for mobile devices at risk of being lost or stolen
  7. The most widely used method for encrypting data
  8. creates a barrier between networks so that potentially harmful packets can’t enter or leave the protected networks
  9. common tool used by many Linux administrators
  10. Most Linux distributions have a built-in firewall called

20 Clues: common tool used by many Linux administratorsThe most widely used method for encrypting dataMost Linux distributions have a built-in firewall calleda Windows domain environment and provides mutual authenticationonly backs up files that have changed since the last full backuptesters who are paid to probe networks and report vulnerabilities...

LTC IS IT FOR ME 2025-09-12

LTC IS IT FOR ME crossword puzzle
Across
  1. Safeguarding client information.
  2. The rate charged by a facility for a patient who is paying his own cost of care.
  3. When imposition of a penalty due to the asset transfer would deprive the client of Medical care such that the a/r’s health or life would be endangered,
  4. A managed care service delivery for the frail community-dwelling elderly,
  5. A person appointed by a court to be legally in charge of another affairs.
  6. Assets
  7. Health insurance for aged and disabled under Title XVIII of the Social Security Act.
  8. An individual who is blind or permanently and totally disabled who is unable to become self-supporting after age 18.
  9. An advocacy program mandated by the Older Americans Act and North Carolina General Statutes.
  10. A long-term care facility which provides 24 hour nursing care with a RN or LPN on duty at all times.
Down
  1. The owner of the property creates a life estate for themself, retaining the power to sell the property, with a remainder interest to someone else
  2. IMC must complete and mail informing the a/r of changes or adverse actions.
  3. To change ownership or title from one person(s) to another
  4. Principal place of residence owned by an a/r or a budget unit member
  5. The portion that a patient in long-term care is expected to pay.
  6. Irrevocable ______ A contract in which the terms cannot be altered.
  7. The period of ineligibility when client gives away or sells an asset
  8. Katie Beckett is referred to as ____ in North Carolina.
  9. current market value less any encumbrances
  10. A review of all factors of eligibility
  11. A computer printout listing the amount of an individual's Social Security benefits.
  12. The disregard of Social Security benefits when determining eligibility
  13. 5 years (60 months) from the starting point

23 Clues: AssetsSafeguarding client information.A review of all factors of eligibilitycurrent market value less any encumbrances5 years (60 months) from the starting pointKatie Beckett is referred to as ____ in North Carolina.To change ownership or title from one person(s) to anotherThe portion that a patient in long-term care is expected to pay....

Crossword Puzzle For CS 2025-03-30

Crossword Puzzle For CS crossword puzzle
Across
  1. – A copy of data stored in case the original is lost or damaged.
  2. – A list of trusted websites or emails that are safe to use.
  3. – Malware that locks files and demands payment to unlock them.
  4. – Installing the latest version of software to fix security issues.
  5. – Unauthorized access to sensitive information.
  6. – Unsolicited, often irrelevant emails or messages.
  7. – Malicious software that attaches to programs to spread and damage files.
  8. – A scam that tricks users into giving personal information.
  9. – A hidden way for hackers to access a computer system.
  10. – A network of infected computers controlled remotely by hackers.
  11. – A type of malware that replicates itself to spread to other computers.
  12. – A list of websites or emails that are considered unsafe or malicious.
  13. – A system that protects your computer from unauthorized access.
  14. – The process of encoding data to keep it safe from unauthorized access.
  15. – Fake software that scares users into downloading it.
  16. – Software that secretly records keystrokes to steal information.
  17. – Another name for Trojan Horse; malicious software pretending to be useful.
  18. – A software update that fixes bugs or security vulnerabilities.
Down
  1. – Verifying the identity of a user or system before granting access.
  2. – Software that secretly monitors and collects information from users.
  3. – Software that scans and removes viruses from your computer.
  4. – Malware disguised as legitimate software to trick users.
  5. – Software that displays unwanted advertisements on your computer.
  6. – A type of malware that hides the presence of other malicious software.
  7. – Redirecting users to fake websites to steal information.
  8. – A software used to detect and remove spyware.
  9. – Trickery used to manipulate people into giving out confidential information.
  10. – A security flaw that is exploited before the software is updated.
  11. – Gaining unauthorized control of a computer or account.
  12. – Software designed to harm your computer or steal data.

30 Clues: – Unauthorized access to sensitive information.– A software used to detect and remove spyware.– Unsolicited, often irrelevant emails or messages.– Fake software that scares users into downloading it.– A hidden way for hackers to access a computer system.– Gaining unauthorized control of a computer or account....

Unit 3 Network Threats and Vulnerabilities 2025-07-17

Unit 3 Network Threats and Vulnerabilities crossword puzzle
Across
  1. Software which records and transmits key strokes
  2. The use of fake websites to collect credentials from unsuspecting users.
  3. Directive access control that sets out the expectations and responsibilities for employees.
  4. Should be carried out yearly to ensure security systems are suitable and uptodate.
  5. A range of methods that prey upon human mistakes rather than digital systems.
  6. Types of attacks that change, damage or delete data and systems.
  7. Applied to systems to fix known problems.
  8. Uses a key to convert data into an unintelligible form.
  9. Appears as or is part of a legitimate file but is actually malicious code.
  10. determins which parts of an IP address should match or not for authorisation.
  11. A _ would allow unauthorised users access to something.
  12. The E in WEP (Something which should not be used anymore)
  13. Leaving discarded, infected, portable media in the open hoping someone will run it on a device.
  14. Following people closely through secured doors.
  15. Once in a system will spread automatically depending on its programming.
  16. The U in UAC
  17. Hackers can make use of these to gain access to systems and bypass security.
Down
  1. Checks incoming and outgoing traffic to ensure it is authorised based on credentials such as IP Addresses.
  2. Where an identity is disguised to appear as a trusted source.
  3. A type of attack when data is monitored and not changed.
  4. Using an authorised users credentials when they are already logged in.
  5. Anti Virus software keeps a record of known malicious code within this.
  6. Fake emails used to gain information and credentials from targets.
  7. This is what malware is short for.
  8. After we _ users, they are given authorised access.
  9. Requires human interaction to run.
  10. An attack that encrypts data until a payment is made.
  11. A type of attack that makes use of an exploit to bypass security measures.
  12. A denial of service attack that makes use of multiple devices.

29 Clues: The U in UACThis is what malware is short for.Requires human interaction to run.Applied to systems to fix known problems.Following people closely through secured doors.Software which records and transmits key strokesAfter we _ users, they are given authorised access.An attack that encrypts data until a payment is made....

Regulatory Agencies 2026-03-18

Regulatory Agencies crossword puzzle
Across
  1. Sector regulated to protect worker rights
  2. Administers health and human services programs
  3. Agency action to ensure laws are followed
  4. Responsible for national security and border protection
  5. A market structure dominated by one seller
  6. Systems for moving people and goods
  7. Protects consumers and prevents unfair business practices
  8. Ensures workplace safety standards
  9. Requirement to reveal important financial information
  10. RESERVE The central banking system of the United States
  11. Laws designed to prevent unfair competition
  12. Oversees housing and urban development programs
  13. Ensures food and drug safety
  14. Natural world protected by agencies like EPA
  15. Regulates interstate transmission of electricity and gas
  16. Regulates firearms, alcohol, and explosives
  17. Enforces immigration laws within the U.S.
  18. Industry regulated to ensure financial stability
  19. Manages Social Security benefits
  20. Regulates the stock market and securities industry
  21. Protects works' rights to organize unions
  22. Financial instruments such as stocks and bonds
  23. Official permission to operate in an industry
  24. Person who reports illegal or unethical activity
Down
  1. Following rules set by regulatory agencies
  2. AIR ACT Environmental law regulating air pollution
  3. Supervision of industries or government activity
  4. Regulates radio, television, and internet communications
  5. Responds to natural disasters and emergencies
  6. PROTECTION Government protection of buyers from unfair practices
  7. Self-regulatory organization overseeing brokage firms
  8. Manages federal finances and revenue
  9. Protects consumers in the financial sector
  10. Regulates national banks
  11. Industry regulated by FCC
  12. Oversees national transportation systems
  13. Enforces federal laws and administers justice
  14. ACT Law regulating the sale of securities
  15. Oversees agriculture and food policy
  16. Protects the environment and enforces environmental laws
  17. Regulates commodity futures and options markets
  18. Insures bank deposits
  19. Audits and evaluates federal government spending
  20. Management of money and investments
  21. Provides airport security screening
  22. Helps prepare and oversee the federal budget
  23. Enforces laws against workplace discrimination
  24. Government rule to control business activity
  25. ACT Law establishing consumer protection authority of the FTC
  26. Exchange of goods and services regulated by government

50 Clues: Insures bank depositsRegulates national banksIndustry regulated by FCCEnsures food and drug safetyManages Social Security benefitsEnsures workplace safety standardsSystems for moving people and goodsManagement of money and investmentsProvides airport security screeningManages federal finances and revenueOversees agriculture and food policy...

CPSC 4240 Crossword 2026-03-31

CPSC 4240 Crossword crossword puzzle
Across
  1. a hardware device that provides emergency power and allows systems to shut down gracefully during failures
  2. an authentication system developed a MIT that uses "tickets" to guarantee identities
  3. the method of hiding data within another medium, like an image or audio file, to conceal its existence
  4. a cryptographic failure where two different inputs generate the same hash output
  5. a security system that requires multiple forms of identification factors to gain access to an account
  6. a network of compromised computers, often including IoT devices, infected with malware
  7. the systematic process of securing a Linux system by reducing its attack surface by disabling unnecessary services
  8. a process that generates a fixed-length string of characters from a variable-length input
  9. malicious software that provides unauthorized administrative-level access to a computer while remaining undetected.
  10. public-key cryptography that utilizes a shared public key and a secret private key to guarantee the identities of users and services
Down
  1. a command-line firewall utility that acts as a packet filtering system.
  2. the file or medium used in steganography to hold a hidden payload
  3. a cyberattack where scammers impersonate organization or individuals to steal sensitive information
  4. a malicious computer worm that targeted Iran's nuclear program in 2010
  5. a public turing test used to verify that a web user is a human rather than a spambot
  6. a type of encryption that utilizes a singular shared key for both encryption and decryption
  7. in steganography, this refers to information that has to be concealed and transmitted
  8. the Linux command used to manage password expiration and aging
  9. a cryptographic network protocol used for secure remote login and command execution
  10. a network-level security system that prevents unwanted packets from accessing network and systems
  11. a security measure that uses unique physical traits, such as fingerprints or retinas, for authentication
  12. a cryptographic method used for securing email through encryption and digital signatures

22 Clues: the Linux command used to manage password expiration and agingthe file or medium used in steganography to hold a hidden payloada malicious computer worm that targeted Iran's nuclear program in 2010a command-line firewall utility that acts as a packet filtering system.a cryptographic failure where two different inputs generate the same hash output...

Chapter 5 3KB 2022-03-08

Chapter 5 3KB crossword puzzle
Across
  1. bouwen
  2. flexibel
  3. samen
  4. verdienen
  5. stipt
  6. beveiliging
  7. verwarrend
  8. kapper
  9. tevreden
  10. veiligheid
  11. sociaal
  12. omringen
  13. timmerman
  14. beweging
  15. kok
  16. dienst
  17. kwetsbaar
  18. evenement
  19. gezondheidszorg
Down
  1. vol
  2. balanceren
  3. bezorgen
  4. bord
  5. vooruitgang
  6. protest
  7. vervuiling
  8. georganiseerd
  9. aanmoedigen
  10. productie
  11. zelfstandig
  12. oprichter
  13. duidelijk
  14. verkoper
  15. hoeveelheid
  16. gewoonte
  17. kantoor
  18. secretaresse
  19. fooi
  20. salaris
  21. ervaren

40 Clues: volkokbordfooisamenstiptbouwenkapperdienstprotestsociaalkantoorsalariservarenbezorgenflexibeltevredenverkopergewoonteomringenbewegingverdienenproductieoprichterduidelijktimmermankwetsbaarevenementbalancerenvervuilingverwarrendveiligheidvooruitgangaanmoedigenbeveiligingzelfstandighoeveelheidsecretaressegeorganiseerdgezondheidszorg

Scene 3: Set 2 Society 2021-10-25

Scene 3: Set 2 Society crossword puzzle
Across
  1. vammainen
  2. demokratia
  3. mielipide
  4. eläkeläinen (AmE)
  5. köyhyys
  6. vapaus
  7. uskonto
  8. arvo, arvostaa
  9. yhteisö
  10. eläkeläinen (BrE)
  11. kulttuuri
  12. nuoriso
  13. epätasa-arvo
  14. terveydenhoito
  15. vapaaehtoistyö
  16. sosiaaliturva
Down
  1. koulutus
  2. ympäristö
  3. enemmistö
  4. sukupuoli
  5. vähemmistö
  6. etninen tausta
  7. tasa-arvo
  8. yhteiskunta
  9. oikeus
  10. tasavalta
  11. sukupuoli
  12. talous
  13. hyvinvointi
  14. vero
  15. kansalainen
  16. velvollisuus
  17. hyväntekeväisyys
  18. asia, kysymys
  19. rasismi

35 Clues: verovapausoikeustalousköyhyysuskontoyhteisönuorisorasismikoulutusvammainenympäristöenemmistösukupuolimielipidetasa-arvotasavaltasukupuolikulttuuridemokratiavähemmistöyhteiskuntahyvinvointikansalainenepätasa-arvovelvollisuusasia, kysymyssosiaaliturvaetninen taustaarvo, arvostaaterveydenhoitovapaaehtoistyöhyväntekeväisyyseläkeläinen (AmE)...