cyber security Crossword Puzzles
Creative Role Puzzle Maker The Eye of Minds 2019-04-24
Across
- Short for the VirtNet Security
- "To catch a hacker, you need a ______"
- Where Kaine's base is located
- The genre of the book "The Eye of Minds"
- Creatures programmed by Kaine to suck the life out of player's auras
- She gave Michael guidance to find Kaine but got attacked by KillSims
- A virtual reality system containing various games for players in their sleep
- A path that leads to Kaine
- A club that Michael and his friends hacks into in order to meet Ronika
- A program created by Kaine
Down
- A gamer who mysteriously disappeared from the VirtNet
- A victim of Kaine who commited suicide by ripping out her core and jumping off a bridge
- A barber in Lifeblood who helped Michael by giving him information
- A game in VirtNet where The Path could be found
- The main character/protagonist in the story
- The most popular game in VirtNet that features a recreation of real life
- A player's virtual body
- The girl who hacked into the Black and Blue club, one of Michael's friends
- A cyber-terrorist that the VNS wants to catch; the antagonist of the story
- This separates a player's virtual body from their real life body
20 Clues: A player's virtual body • A path that leads to Kaine • A program created by Kaine • Where Kaine's base is located • Short for the VirtNet Security • "To catch a hacker, you need a ______" • The genre of the book "The Eye of Minds" • The main character/protagonist in the story • A game in VirtNet where The Path could be found • ...
Terminologies Related to RA 10175 2023-10-26
Across
- instruction, communication with, storing data in, retrieving data from
- an electronic, magnetic, optical, electrochemical, or other data processing
- keeping of data that already exists in a stored form
- refers to any information contained in the form of computer data
- gathering and receiving information
- listening to, recording, monitoring or surveillance of the content of communications
- refers to the DOJ – Office of Cybercrime
- either the Cybercrime Investigation and Coordinating Center
- transmission of information through information and communication technology
- comprehensive plan of actions designed to improve the security and enhance cyber resilience
Down
- National Bureau of Investigation and the Philippine National Police
- collection of tools, policies, risk management approaches and actions
- representation of information, knowledge, facts, concepts or instructions which are being prepared
- refers to any computer data other than the content of the communication
- person who created or is the origin of the assailed electronic statement
- a person who hosts or who proposes to host internet content
- modification or change, in form or substance, of an existing computer data or program
- a set of instructions executed by the computer to achieve intended results
- any representation of facts, information, or concepts in a form suitable for processing in a computer system
- mathematical algorithm produced against digital information
20 Clues: gathering and receiving information • refers to the DOJ – Office of Cybercrime • keeping of data that already exists in a stored form • a person who hosts or who proposes to host internet content • either the Cybercrime Investigation and Coordinating Center • mathematical algorithm produced against digital information • ...
TTS Informatika_Nazala_XH_27 2025-04-15
Across
- diseminasi konten digital merupakan ... konten digital
- orang yang bekerja untuk menganalisis data disebut data..
- orang yang bertugas untuk memastikan keamanan website/aplikasi disebut ...security specialist
- fitur yang digunakan untuk menghindari konten negatif pada google adalah...
- software developer adalah seorang yang bertugas untuk .... sebuah aplikasi atau perangkat lunak
- Siapa yang bertanggung jawab untuk memvalidasi konten negatif di sebuah platform digital? penyelenggara...
- pelanggan haki dapat dikenakan hukuman penjara atau...
- platform diseminasi konten digital, dimana hanya berisi video
- Hak eksklusif bagi pencipta untuk mengumumkan atau memperbanyak ciptaannya disebut hak..
- Hak Kekayaan intelektual disingkat..
- cara melindungi haki yaitu dengan ... karya
- tombol lain yang juga berfungsi untuk memberi perintah menelusuri/mencari..
Down
- apa nama lain dari mesin pencari?
- pekerjaan untuk merancang suatu program disebut.
- apakah konten edukasi termasuk konten negatif?
- salah satu contoh mesin pencari yang paling banyak digunakan..
- konten digital merupakan kombinasi dari gambar,teks, video, dan ...
- tombol yang digunakan untuk memberi perintah menelusuri/mencari..
- Hak eksklusif atas penemuan disebut hak..
- salah satu tujuan diseminasi konten digital adalah ... informasi
- ui/ux designer merupakan pekerjaan untuk... web/program
- Microsoft Excel... merupakan platform diseminasi konten digital
- konten yang memuat unsur SARA, kekerasan,atau pornografi termasuk konten...
- Validasi konten negatif membantu menciptakan lingkungan digital yang... dan sehat
- mengandung ancaman Salah satu indikator .... negatif
25 Clues: apa nama lain dari mesin pencari? • Hak Kekayaan intelektual disingkat.. • Hak eksklusif atas penemuan disebut hak.. • cara melindungi haki yaitu dengan ... karya • apakah konten edukasi termasuk konten negatif? • pekerjaan untuk merancang suatu program disebut. • mengandung ancaman Salah satu indikator .... negatif • ...
Week Two News 2024-12-04
Across
- NFL teams stadium that people went two hours early to in order to dig out their seats
- the number of deaths in the past two years with Amazon vehicles involved
- An actor who opened up about his cancer
- the number of deaths caused by terrible road conditions across the United States
- what a traveler coming back to the United States was removed from and is now held in custody
- what police and first responders are looking in for a missing grandmother
- the Korea that the White House is concerned about
- number of millions of people who traveled during the holiday
- Movie that came out from Disney over the holidays
- the judge who granted 20 adaptations
- Country where hostages are from that are being help across seas
Down
- Trump's pick for his kids father in law
- the person killed while riding a golf cart with her husband
- the holiday on Monday after Thanksgiving
- this was the proof that some of the hostages are still alive
- Trumps pick for Defense Security
- Trump's pick for FBI Director
- the number of pounds of snow in a cubic foot
- number of million dollars expected to be spent during Cyber Monday
- the first name of Joe Biden's son who had gun convictions
- the age that Jonbenet was murdered the day after christmas
21 Clues: Trump's pick for FBI Director • Trumps pick for Defense Security • the judge who granted 20 adaptations • Trump's pick for his kids father in law • An actor who opened up about his cancer • the holiday on Monday after Thanksgiving • the number of pounds of snow in a cubic foot • the Korea that the White House is concerned about • ...
Cybersecurity Unit 10 Crossword 2025-03-20
Across
- also known as a "white list"
- any software that relies upon by other applications and software
- predefined responses for security incidents
- this type of restart is needed for applying updates
- when a system is unavailable
- involves assessing all existing security controls, policies and procedures
- step-by-step instructions for security measures
- ideal security position based on industry standards
- define requirements for security controls and configurations
Down
- prioritization of improving security and moving to the desired state
- also known as "block lists"
- limiting certain actions or behaviors
- comparing the current and desired states
- Comparing the current state of an organization's security position to a desired state
- never trust, always verify
- these types of apps are outdated and older
16 Clues: never trust, always verify • also known as "block lists" • also known as a "white list" • when a system is unavailable • limiting certain actions or behaviors • comparing the current and desired states • these types of apps are outdated and older • predefined responses for security incidents • step-by-step instructions for security measures • ...
Cyber Crime 2021-02-10
Across
- It is the part of the malware program that actually executes its designed task
- It is a form of social engineering carried out in electronic form, usually by email, with the purpose of gathering sensitive information.
- It is simply unsolicited email, also known as junk email
- It is a security barrier designed to keep unwanted intruders “outside” a computer system or network while allowing safe communication between systems and users
- A non-malicious surprise contained in a program or on a circuit board installed by the developer
- It is someone who breaks into a computer system or network without authorization and with the intention of doing damage
- It is a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there
- It is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network
- It is a non-destructive program that is designed to log every keystroke made on a computer
Down
- It is the art of misdirection
- The act of rummaging through the trash of an individual or business to gather information that could be useful for a cyber-criminal to gain access to a system or attain personal information to aid them in identity theft or system intrusion
- It includes viruses, Trojans, worms, time bombs, logic bombs, or anything else intended to cause damage upon the execution of the payload
- It is used to track a user’s Internet surfing habits for advertising purposes in an effort to match user's interests with relevant ads
- It is a malicious program or code that attaches itself to another program file and can replicate itself and thereby infect other systems
- It is a software designed to force pre-chosen ads to display on your system
- It is a small packet of information from a visited webserver stored on your system by your computer’s browser to store personalized information in order to customize your next visit
- It is a malicious program designed to execute when a certain criterion is met.
- It is a software “robot” that performs an extensive set of automated tasks on its own
18 Clues: It is the art of misdirection • It is simply unsolicited email, also known as junk email • It is a software designed to force pre-chosen ads to display on your system • It is the part of the malware program that actually executes its designed task • It is a malicious program designed to execute when a certain criterion is met. • ...
Cyber Ethics 2025-05-19
Across
- Action to prevent someone from contacting you online
- A dishonest scheme to trick someone online
- A secret word used for logging in
- Repeating someone's work without credit
- Threatening someone online
- An identity used to log into online accounts
- A system that blocks unauthorized access to a network
- Measures taken to protect devices and data
Down
- A file or program that can harm your computer
- Permission given to share personal data
- Illegal access to someone’s computer
- Browsing the internet casually
- Keeping your online identity safe
- Platforms like Facebook, Instagram, and Twitter
- Monitoring users’ activity on websites
- What you must do after using a public computer
- The process of converting data into a secure code
- What you should do if you see cyberbullying
18 Clues: Threatening someone online • Browsing the internet casually • Keeping your online identity safe • A secret word used for logging in • Illegal access to someone’s computer • Monitoring users’ activity on websites • Permission given to share personal data • Repeating someone's work without credit • A dishonest scheme to trick someone online • ...
Cyber Forensics 2024-11-26
Across
- Software that is used to allow a hacker to access all the activity on an individual’s personal/business computer
- Under this company's privacy policy, all video, photo, and message content is deleted from servers after it’s been viewed by all recipients or after 30 days.
- Intentionally entering an unauthorized network system
- These hackers fall somewhere in the middle. The short definition is that they violate computer laws, steal information, or shut down systems—but not for personal gain.
- The specialized practice of identifying, preserving, extracting, documenting, and interpreting electronic data that can be used as evidence
- Self-replicating malware program that spreads through a computer system by sending copies of itself to networked computers
- Software designed with the intention to harm a computer or the information therein
- Uses the same analysis techniques as computer forensics except the emphasis is placed on the Internet as a whole
Down
- These hackers attempt to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
- Illegally gathering personal information
- Hacking into a company’s internal networking system for the purpose of demonstrating or protesting a political agenda
- Software designed to provide unauthor-ized access to a computer system
- Ensuring that users always have accesses to their systems when required and expected, part of the CIA Triad.
- Part of the CIA Triad, means that systems and data are only being access to those who are authorized to do so.
- This company will always have your location data regardless of device settings
- These hackers are security experts that use their technical skills to to find vulnerabilities before malicious actors do.
- Security professionals ensure that data can always be trusted, part of the CIA Triad.
- A copy made in the same type of media
18 Clues: A copy made in the same type of media • Illegally gathering personal information • Intentionally entering an unauthorized network system • Software designed to provide unauthor-ized access to a computer system • This company will always have your location data regardless of device settings • ...
Neptunus Crossword Puzzle 2017-09-20
Across
- Which sport is practiced in the new sports hall at Papendal?
- What animals arrived – after a long flight – in our storage hall at Schiphol?
- Who said good-bye (retired) to Neptunus in 2016?
- What was the surname of Hans Eilers' father, the founder of Neptunus?
- What was the name of the Trophy skiers could win in Zagreb early January?
- What is the name of the new round Evolution?
- What is the campaign name of our security IT project?
- Which prestigious political event took place in Brussels in May?
- Our Neptunus team jumped in the canals for this charity event.
- What’s the name of our weekly Facebook post?
- In which place was the Salacia built for the first time? (Of Kessel )
- What is the nickname of Andy Coleman?
Down
- Where is our Belgian Office located?
- Which world famous violinist and conductor is among our clients?
- In which French City did the airshow take place? Le Bourget
- In which year was Neptunus founded?
- Where are we moving the sports hall of Lorentzweiler to?
- Where is our production facility based?
- Palace Since last year, we frequently supply structures for this royal location.
- What kind of 'attack' on online systems took place early/mid-May?
- We received three of these Neptunus vans.
21 Clues: In which year was Neptunus founded? • Where is our Belgian Office located? • What is the nickname of Andy Coleman? • Where is our production facility based? • We received three of these Neptunus vans. • What is the name of the new round Evolution? • What’s the name of our weekly Facebook post? • Who said good-bye (retired) to Neptunus in 2016? • ...
Pieces of Our Love Story 2025-07-14
Across
- Grooms degree (_____ Security)
- How many years the Bride & Groom have been married.
- Grooms favorite color.
- Brides degree (_____ Engineering)
- Brides zodiac sign.
- Bride & Grooms favorite board game.
- The name of the Bride & Grooms oldest dog.
- Year Bride & Groom started dating.
- Brides favorite season.
- Grooms rank in the Army.
- Name of Grooms childhood dog.
- Item Groom collects.
- Street name bride grew up on.
- Brides first car.
- Brides favorite TV show.
- Instrument Groom played in school.
- Bride & Grooms favorite artist.
- How many years the Bride & Groom have been together.
Down
- Sport Groom played in highschool.
- High school Bride & Groom attended.
- Street groom grew up on.
- Sport Bride played in college.
- Class Bride & Groom met in.
- Road that the Bride & Groom live on.
- Grooms first car.
- Grooms zodiac sign.
- Grooms college (____ University)
- Name of Grooms fraternity and Brides place of work.
- Brides go-to drink.
- The name of the Bride & Grooms youngest dog.
- Name of Brides childhood dog.
- Where Groom proposed (___ Park).
- Instrument Bride played in school.
- Grooms middle name.
- Grooms go-to drink.
- Brides middle name.
- Brides college (SUNY _____)
- The Bride & Grooms cats name.
- Brides favorite color.
- Brides sport number.
40 Clues: Grooms first car. • Brides first car. • Brides zodiac sign. • Grooms zodiac sign. • Brides go-to drink. • Grooms middle name. • Grooms go-to drink. • Brides middle name. • Item Groom collects. • Brides sport number. • Grooms favorite color. • Brides favorite color. • Brides favorite season. • Street groom grew up on. • Grooms rank in the Army. • Brides favorite TV show. • ...
Horton Wedding 2025-09-26
Across
- Grooms rank in the Army.
- Road that the Bride & Groom live on.
- Where Groom proposed (___ Park).
- Instrument Bride played in school.
- Grooms first car.
- Grooms degree (_____ Security)
- Brides middle name.
- Class Bride & Groom met in.
- Grooms college (____ University)
- Instrument Groom played in school.
- The name of the Bride & Grooms youngest dog.
- Bride & Grooms favorite board game.
- Bride & Grooms favorite artist.
- Grooms favorite color.
- Brides sport number.
- Name of Grooms childhood dog.
- Item Groom collects.
Down
- High school Bride & Groom attended.
- The Bride & Grooms cats name.
- Street name bride grew up on.
- Grooms zodiac sign.
- Brides degree (_____ Engineering)
- Brides favorite color.
- Brides zodiac sign.
- Street groom grew up on.
- Sport Bride played in college.
- Brides college (SUNY _____)
- Brides first car.
- Sport Groom played in highschool.
- Grooms middle name.
- Name of Brides childhood dog.
- Brides go-to drink.
- Grooms go-to drink.
- Brides favorite season.
- The name of the Bride & Grooms oldest dog.
- Year Bride & Groom started dating.
- How many years the Bride & Groom have been married.
- How many years the Bride & Groom have been together.
- Name of Grooms fraternity and Brides place of work.
- Brides favorite TV show.
40 Clues: Grooms first car. • Brides first car. • Grooms zodiac sign. • Brides zodiac sign. • Brides middle name. • Grooms middle name. • Brides go-to drink. • Grooms go-to drink. • Brides sport number. • Item Groom collects. • Brides favorite color. • Grooms favorite color. • Brides favorite season. • Grooms rank in the Army. • Street groom grew up on. • Brides favorite TV show. • ...
Cyber Vocabulary 2022-08-17
Across
- Stealing another’s work
- The legal right to use a piece of media
- To use a piece of copyrighted material verbatim, without having to have permission from the copyright holder. Teaching and criticism both fall under fair use
- A piece of code that can copy itself to wreak havoc
- The sole right to an invention or piece of work
- Websites made to share or post in a social network
- A centralized program or area ran in a computer
- Software that continuously posts ads when a user is online
- Malware designed to replicate itself and spread elsewhere
- Predators that use the online to commit child abuse
- A collaboration of a single file
Down
- Belonging to the public, and therefore not copyrighted
- The act of sending emails, posing as a credible source or business, when it is in fact an attempt to access a user’s personal information
- A program hidden as a normal function attempting to breach the security
- A software that allows a user to essentially be a spy and access private info
- A word, symbol, or design representing a company or brand
- A set of rules stipulating what a user can and cannot do
17 Clues: Stealing another’s work • A collaboration of a single file • The legal right to use a piece of media • The sole right to an invention or piece of work • A centralized program or area ran in a computer • Websites made to share or post in a social network • A piece of code that can copy itself to wreak havoc • Predators that use the online to commit child abuse • ...
Spelling bee! 2022-06-25
Spelling bee! 2022-06-25
Cyber Risk 2018-02-25
18 Clues: Slow • Bate • Laws • Analog • History • Breaking • Sterness • Peaceful • To confirm • Data mining • To identify • Flexibility • Disturbance • Hiring staff • Internet of Things • Malicious software • Stores information • Artificial Intelligence
Cyber Safety 2025-01-26
Across
- Practices to ensure secure and responsible internet use
- A copy of important data stored separately for recovery
- Regular software improvements to fix security vulnerabilities
- Manipulating people to gain confidential information
- Software designed to detect and remove malicious programs
- The process of verifying a user's identity
- When data is accessed or exposed without permission
- A fraudulent attempt to obtain sensitive information
- A person who gains unauthorized access to systems
Down
- A type of malicious software that can infect a computer
- Malicious software designed to harm or exploit systems
- A program that secretly gathers information about a user
- A tool that stores and encrypts login credentials
- Protecting personal information from unauthorized access
- A wireless network that should be secured with a strong password
- When someone illegally uses your personal information
- The process of converting information into a secure code
- An extra layer of security requiring two forms of verification
18 Clues: The process of verifying a user's identity • A tool that stores and encrypts login credentials • A person who gains unauthorized access to systems • When data is accessed or exposed without permission • Manipulating people to gain confidential information • A fraudulent attempt to obtain sensitive information • When someone illegally uses your personal information • ...
Week 4 2024-02-28
Across
- The artist's painting depicted a ________________ figure, evoking a sense of discomfort in viewers.
- Seeking ________________ , the victim pressed charges against their assailant.
- He would often ________________ his way into conversations, subtly planting doubts in people's minds.
- There's a growing ________________ between the rich and the poor in many societies.
- The scent of fresh flowers ________________ the air in the springtime garden.
- The document appeared to be a ________________ of the original, complete with signatures and stamps.
- The ________________ waiter hovered attentively, eager to fulfill every diner's request.
- The professor's lectures on quantum mechanics were often ________________ , leaving many students bewildered.
- The detective began to ________________ the suspect about their whereabouts on the night of the crime.
Down
- The magician's performance was so captivating that it seemed to ________________ the entire audience.
- The company implemented new security measures to ________________ any potential cyber attacks
- The ________________ spread of misinformation can undermine trust in institution.
- It was an ________________ moment to pitch my idea to the investors while they were in a receptive mood.
- Some people believe in the existence of an ________________ being that controls the universe.
- The monk lived an ________________ life, devoid of material possessions.
15 Clues: The monk lived an ________________ life, devoid of material possessions. • The scent of fresh flowers ________________ the air in the springtime garden. • Seeking ________________ , the victim pressed charges against their assailant. • The ________________ spread of misinformation can undermine trust in institution. • ...
Digital Cititzenship crossword puzzle 2020-09-29
Across
- When someone tricks someone by taking there money or personal information
- information that you can't share online
- person who stands up to the cyberbully
- when someone steals your identity illegally
- someone who witness cyber-bulling but does nothing
- An online letter
Down
- your online history
- rude words that are usually CAPITALIZED
- a online program that guides you through he internet
- program that can mess up your device
- someone who can see your private info
- When you use facts to ask questions about a website
- someone who targets a person online
- victim of a cyberbully
14 Clues: An online letter • your online history • victim of a cyberbully • someone who targets a person online • program that can mess up your device • someone who can see your private info • person who stands up to the cyberbully • rude words that are usually CAPITALIZED • information that you can't share online • when someone steals your identity illegally • ...
Security 2023-03-27
Across
- Take no _____
- Try to remain _____
- Ensure a ___ index card is in place at each phone and teller station.
- Pay attention to the responses and any _________ sounds
- "This is ____, what time do I come to work today?"
- Do not touch or disturb __________ or abandoned packages, briefcases, or any other items.
Down
- Call your Regional _____ Officer at (801)-844-5000
- From a safe position, try to ____ the direction the robber(s)fled.
- Access all Robbery forms through the _____ icon and review them during required training sessions
- Keep excess cash out of _____ in a lower drawer, compartment, or vault and comply with allowable cash limits.
- remember that the lives and ________ of people are the critical factors.
- If a note is used, avoid unnecessary ____.
12 Clues: Take no _____ • Try to remain _____ • If a note is used, avoid unnecessary ____. • Call your Regional _____ Officer at (801)-844-5000 • "This is ____, what time do I come to work today?" • Pay attention to the responses and any _________ sounds • From a safe position, try to ____ the direction the robber(s)fled. • ...
Hierarchy of Needs 2024-02-05
Across
- satisfied that you have achieved what you wanted
- Protect oneself and one's property from threats such as theft, violence, or cyber-attacks. (ex, locking doors & windows to prevent break-ins)
- a relationship of mutual affection between people.
- A state of reduced mental and physical activity.
- is when two or more people interact, and each person feels valued, seen, and heard.
- An invisible mixture of gases that surrounds Earth.
- an occupation by which a person earns a living; work; business
- When someone acknowledges the value or skill of your work.
- the quality or state of being physically strong.
- A liquid that makes life on Earth possible.
Down
- The power or right to act, speak, or think as one wants without hindrance or restraint.
- the innate ability of every person to live and perform in alignment with their highest self
- the belief that some behavior is right and acceptable and that other behavior is wrong.
- the state of being free from illness or injury.
- a feeling of being close and emotionally connected and supported.
15 Clues: A liquid that makes life on Earth possible. • the state of being free from illness or injury. • satisfied that you have achieved what you wanted • A state of reduced mental and physical activity. • the quality or state of being physically strong. • a relationship of mutual affection between people. • An invisible mixture of gases that surrounds Earth. • ...
Impact of 9/11 on Commercial Aviation 2023-12-10
Across
- Passengers and crew who thwarted attacks.
- Increased awareness and watchfulness.
- List for individuals barred from flying.
- Advanced identification technology.
- Act addressing security post-9/11.
- The region controlled by a country's aviation authorities.
- Temporarily halted U.S. airspace operations.
Down
- Action taken to enhance security control.
- Security-focused federal department.
- Elevated levels of perceived danger.
- Strengthening security measure
- Area with enhanced security post-9/11.
- Airport security organization.
- North American defense organization.
- Coordinated reaction to a crisis.
15 Clues: Strengthening security measure • Airport security organization. • Coordinated reaction to a crisis. • Act addressing security post-9/11. • Advanced identification technology. • Security-focused federal department. • Elevated levels of perceived danger. • North American defense organization. • Increased awareness and watchfulness. • Area with enhanced security post-9/11. • ...
PSB ACADEMY CROSSWORDS 2020-06-24
Across
- Third part of SC’s mission - give (someone) the power or drive to do something.
- Keep it lit!
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
- First part of SC’s mission - provide (someone or something) the means to do something.
- IES, IET, IPRS.
- CSC, SAC, SC, Dance Club, Music Club, Photography Club.
- CSA, GSC, MAPIA, KSC, MSC, SASA.
Down
- SC initiated, 3 times per year event with the support of all PSB Student Clubs and Student Affairs & Industry Engagement.
- Second part of Student Affairs & Industry Engagement's tagline.
- A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres. Our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- First part of Student Affairs & Industry Engagement's tagline.
- Second part of SC’s mission - participate or become involved in.
- PSB Academy’s campus for training students in life sciences, sport science, engineering and cyber security.
13 Clues: Keep it lit! • IES, IET, IPRS. • CSA, GSC, MAPIA, KSC, MSC, SASA. • CSC, SAC, SC, Dance Club, Music Club, Photography Club. • First part of Student Affairs & Industry Engagement's tagline. • Second part of Student Affairs & Industry Engagement's tagline. • Second part of SC’s mission - participate or become involved in. • ...
CyberSecurity 2025-06-19
Across
- The use of physical characteristics, such as fingerprints, to verify identity.
- A copy of data stored separately to protect against data loss.
- Software that secretly monitors and collects information about users.
- A service that encrypts your internet connection and hides your IP address.
- A type of malware that threatens to publish or block access to data unless a ransom is paid.
- A type of cyber attack that attempts to trick individuals into providing sensitive information.
Down
- The process of verifying the identity of a user or device.
- The practice of protecting systems, networks, and programs from digital attacks.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- Software designed to detect and destroy computer viruses.
- A secret word or phrase used to gain access to a system.
- A network security device that monitors and filters incoming and outgoing network traffic.
- The process of converting information or data into a code to prevent unauthorized access.
- Unwanted or unsolicited email messages.
- An individual who uses technical skills to gain unauthorized access to systems.
15 Clues: Unwanted or unsolicited email messages. • A secret word or phrase used to gain access to a system. • Software designed to detect and destroy computer viruses. • The process of verifying the identity of a user or device. • A copy of data stored separately to protect against data loss. • Software that secretly monitors and collects information about users. • ...
Spelling bee! 2022-06-25
CRHNet Crossword Puzzle 2020-09-30
Across
- Advisory that hazard is approaching but is less imminent
- processes which increase the susceptibility of an individual
- assessing the effectiveness of an emergency management program
- is the deliberate release of viruses, bacteria, or other germs used to cause illness or death
- infrastructure to describe assets that are essential for the functioning of a society and economy
- action plan (IAP) It may include the identification of operational resources and assignments
- to take timely action to reduce their risks in advance of hazardous events
- of control usually expressed as the ratio of supervisors to individuals
- an assistance program designed to help municipalities, individuals
- transfer
- the financial consequences of particular risks from one party to another
- post-event activities and considerations
- may be natural, anthropogenic or socionatural in origin
- Process of restoring a stricken community to a pre-disaster level of function
- It may include the identification of operational resources and assignments
Down
- reducing vulnerability and exposure in such contexts where as a result the risk of disaster is removed
- human assets located in hazard-prone areas
- proactive activities or projects that eliminate or lessen the impact
- and Control exercise of authority and direction by a properly designated commander
- Continuity ensure that the necessary steps are taken to identify the impact of potential losses
- Standardized approach to the command, control, and coordination of emergency response
- capacity using available skills and resources, to manage adverse conditions
- Security Known as information technology security
- Emergency Response Team
- of organizations and systems to exchange information
- emergency control group
- assessment methodology to determine the nature and extent of risk by analyzing potential hazards
- has the potential to cause harm or damage
- They are smaller than the “mainshock” and can occur over a period of weeks
- area geographic area within which a disaster has occurred
- Community Based Disaster Risk Management
- a branch within the Ministry of Community Safety and Correctional Services
- recover from the effects of a hazard in a timely and efficient manner
33 Clues: transfer • Emergency Response Team • emergency control group • post-event activities and considerations • Community Based Disaster Risk Management • has the potential to cause harm or damage • human assets located in hazard-prone areas • Security Known as information technology security • of organizations and systems to exchange information • ...
Technology 2021-12-20
Across
- A software that allows you to surf the web.
- A local computer network for communication between computers.
- Part of an application that performs an essential task not apparent to the user.
- Unsolicited email messages sent for marketing purposes.
- A barrier that acts as a security system.
Down
- A piece of programming code inserted into other programming to cause damage.
- Physical parts of a computer.
- A device that enables a computer to transfer data over telephone or cable lines.
- A problem that causes a program to crash or produce an invalid output.
- A cyber-attack where the perpetrator uses several, thousands of unique IP adressess.
- A number that is expressed by using only 1 and 0.
- A challenge-response test in the form of an image of distorted text the user must enter that to determine whether the user is human or a bot.
- String of characters you type into a browser to access a particular website.
13 Clues: Physical parts of a computer. • A barrier that acts as a security system. • A software that allows you to surf the web. • A number that is expressed by using only 1 and 0. • Unsolicited email messages sent for marketing purposes. • A local computer network for communication between computers. • A problem that causes a program to crash or produce an invalid output. • ...
cross word security 2025-10-27
Across
- -A systematic, close observation of people, objects, or premises, often done with cameras, to gather information and maintain security.
- A violation of a law, an agreement, or a security barrier, resulting in unauthorized entry or disclosure.
- process of verifying a job applicant's past history and credentials for security clearance.
- weakness in a system, procedure, or facility that could be exploited by a threat.
- A plan detailing how an organization will resume critical functions after a major security incident or disaster.
- potential for loss or damage to an asset, measured by the probability of a threat occurring and its impact.
- deliberate and malicious act of destruction or disruption of an industrial facility's operations.
- An electronic device that signals danger or unauthorized entry, often by a loud noise or flashing light.
- GUARD- A person employed to protect property, assets, or personnel from harm, theft, or criminal activity.
- complete set of rules and principles that guides an organization's long-term security decisions and actions.
Down
- first layer of security; the outer boundary of a secured area or facility.
- Petty theft of articles of small value, typically committed by employees within the workplace.
- A system or method designed to ensure that only authorized individuals can enter a specific area.
- (10 Clues)
- for Closed-Circuit Television; a private video system used for monitoring and security.
- valuable resource that requires protection, including physical property, information, and personnel.
- emergency procedure put in place to restrict movement and secure an area against an external threat.
- person, action, or event that has the potential to cause harm to an asset.
- A type of security barrier, often made of wire or metal, used to clearly define and protect the property line.
- physical or legal violation of a boundary, leading to unauthorized entry.
- formal inquiry or systematic examination to discover the facts and circumstances of a security incident.
- (10 Clues)
22 Clues: (10 Clues) • (10 Clues) • physical or legal violation of a boundary, leading to unauthorized entry. • first layer of security; the outer boundary of a secured area or facility. • person, action, or event that has the potential to cause harm to an asset. • weakness in a system, procedure, or facility that could be exploited by a threat. • ...
Cyber Bullying Cyber Grooming 2014-04-08
Across
- The person who is threatened, harassed, or harmed
- A website where a group can gather and communicate through chat or message posting
- Someone who has seen what the bully has done to a victim; If you hear someone talking about how they were bullied, encourage them to a have them report it or report what you have heard to an adult.
- A person who tries to get others to do things for them that are not normal, or of a sexual nature
- Lack of confidence
- To bother repeatedly
Down
- A bully who threatens, harms or harasses others through the internet or other electronic means
- The name that someone uses online
- Rude or hurtful
- Someone who does not reveal his or her name
- A person who is in charge of a website
- Messages people write on a website message board
- A person who harasses, threatens or causes harm to others
- When a predator or bully befriends or establishes an emotional connection to lower their natural guard so that the child is easier to exploit or take advantage of (to become friendly with someone so you can take advantage of them)
14 Clues: Rude or hurtful • Lack of confidence • To bother repeatedly • The name that someone uses online • A person who is in charge of a website • Someone who does not reveal his or her name • Messages people write on a website message board • The person who is threatened, harassed, or harmed • A person who harasses, threatens or causes harm to others • ...
PSB CCF CROSSWORD PUZZLE 2020-06-30
Across
- SC initiated, 3 times per year event with the support of all PSBA Student Clubs and Student Affairs & Industry Engagement.
- Keep it lit!
- CSA, GSC, MAPIA, KSC, MSC, SASA.
- Second part of Student Affairs & Industry Engagement's tagline.
- PSB Academy’s campus for training students in life sciences, sport science, engineering and cyber security.
- A place you go to for all student enquiries - career services, counselling support, student hostel enquiries or general enquiries.
- Second part of SC’s mission - participate or become involved in.
Down
- CSC, SAC, SC, Dance Club, Music Club, Photography Club.
- A campus of radio & TV studios, writable walls for breakout discussions, wireless display technology and acoustically balanced lecture theatres. Our learning spaces in the heart of the city connect students globally while preparing them for future careers.
- First part of Student Affairs & Industry Engagement's tagline.
- third part of SC’s mission - give (someone) the power or drive to do something.
- IES, IET, IPRS.
- First part of SC’s mission - provide (someone or something) the means to do something.
13 Clues: Keep it lit! • IES, IET, IPRS. • CSA, GSC, MAPIA, KSC, MSC, SASA. • CSC, SAC, SC, Dance Club, Music Club, Photography Club. • First part of Student Affairs & Industry Engagement's tagline. • Second part of Student Affairs & Industry Engagement's tagline. • Second part of SC’s mission - participate or become involved in. • ...
CyberFun 2022-09-01
Across
- An attack that prevents or impairs the authorized use of information system resources or services.
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
- The process of transforming plaintext into ciphertext.
- Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
- The property of being accessible and usable upon demand.
- A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function.
- A collection of computers compromised by malicious code and controlled across a network.
- The process of verifying the identity or other attributes of an entity (user, process, or device).
Down
- A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group
- A technique to breach the security of a network or information system in violation of security policy.
- An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).
- A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
14 Clues: The process of transforming plaintext into ciphertext. • The property of being accessible and usable upon demand. • A collection of computers compromised by malicious code and controlled across a network. • An attack that prevents or impairs the authorized use of information system resources or services. • ...
Cyber Bullying 2024-04-05
Across
- Someone who intervenes in a helpful way
- Unfair treatment based on prejudice
- Online harassment or intimidation
- Results or outcomes of actions
- False information spread for deceptive purposes
- Remain composed in difficult situations
- Relationship of mutual affection and trust
- Causing emotional or physical pain
- Limits that define acceptable behavior
- Ability to influence or control others
- Opposite of go also a call for cessation
Down
- Showing admiration and consideration for others
- Persistent annoyance or aggression towards someone
- Seek assistance or help from others
- Inform authorities or appropriate individuals about an issue
- Intimidating or aggressive behavior towards others
- Actions or conduct of individuals
- Showing compassion and empathy towards others
18 Clues: Results or outcomes of actions • Online harassment or intimidation • Actions or conduct of individuals • Causing emotional or physical pain • Unfair treatment based on prejudice • Seek assistance or help from others • Limits that define acceptable behavior • Ability to influence or control others • Someone who intervenes in a helpful way • ...
cyber ethics 2025-06-13
Across
- Online harassment or abuse using digital platforms
- Authentication method that adds a second layer of security
- The trail of data a person leaves online
- Fraudulent attempt to obtain sensitive information
- Software that secretly gathers user information
- Malicious software designed to harm systems or data
- Software or hardware that blocks unauthorized access
- Pretending to be someone else online
Down
- Unauthorized access to computer systems
- Method of converting data into unreadable code for security
- Criminal activities carried out using computers or internet
- A person who posts offensive or disruptive comments online
- Protecting personal information online
- A dishonest scheme meant to trick people online
- Principles that guide responsible online behavior
- A secret code used to access digital accounts
- Legal right that protects creative online content
- Software that protects against viruses and malware
18 Clues: Pretending to be someone else online • Protecting personal information online • Unauthorized access to computer systems • The trail of data a person leaves online • A secret code used to access digital accounts • Software that secretly gathers user information • A dishonest scheme meant to trick people online • Principles that guide responsible online behavior • ...
CYBER SOCIETY 2025-09-04
Across
- A PERSON WHO GAINS ATTENTION ONLINE, SHARES OPINION AND TRENDS VIA SOCIAL MEDIA
- a SHORT MESSAGE POSTED ON THE PLATFORM X (TWITTER)
- THE ACT OF SHARING SOMEONE ELSE POST
- GLOBAL NETWORK THAT CAN CONNECT COMPUTERS AND PHONES ETC TO EACH OTHER
- A SOCIAL MEDIA PLATFORM TO SHARE STATUSES,REELS, PHOTOS, LINKS; CAN HAVE A BUSINESS OR PROFESSIONAL PAGE
- A SYSTEM FOR CONNECTING COMPUTER OR PHONE TO THE INTERNET WIRELESSLY
- FOOTPRINT ALL OF YOUR ONLINE ACTIVITY LEAVES THIS BEHIND
- KEYWORD OR PHRASE USED TO GROUP POSTS ONLINE
Down
- CREATOR PERSON WHO MAKES OR SHARES VIDEOS AND OTHER CONTENT ONLINE
- YOUR PAGE ON SOCIAL MEDIA
- A PIECE OF MALICIOUS SOFTWARE DESIGNED TO DISRUPT OR DAMAGE THE COMPUTER OR PHONE
- USING THE INTERNET TO HARM OR HARASS OTHERS
- ILLEGAL DOWNLOAD OF MOVIES, BOOKS, MUSIC ETC
- A SMALL GRAPHIC IMAGE USED TO EXPRESS AN EMOTION OR IDEA
- A FAKE ONLINE IDENTITY CREATED TO DECEIVE OR MANIPULATE OTHERS
- SOCIAL MEDIA PLATFORM TO SHARE SHORT VIDEOS
- WEBSITE OR APP USED TO POST OR CREATE CONTENT
- A SOCIAL MEDIA PLATFORM TO SHARE PHOTOS, STORIES, NOTES; PEOPLE SOMETIMES BUY FOLLOWERS
18 Clues: YOUR PAGE ON SOCIAL MEDIA • THE ACT OF SHARING SOMEONE ELSE POST • USING THE INTERNET TO HARM OR HARASS OTHERS • SOCIAL MEDIA PLATFORM TO SHARE SHORT VIDEOS • ILLEGAL DOWNLOAD OF MOVIES, BOOKS, MUSIC ETC • KEYWORD OR PHRASE USED TO GROUP POSTS ONLINE • WEBSITE OR APP USED TO POST OR CREATE CONTENT • a SHORT MESSAGE POSTED ON THE PLATFORM X (TWITTER) • ...
Cyber Terms 2023-03-06
Across
- malware that encrypts your files until you pay a fee
- Sending fake emails to get you to click on a link
- Changing your IP or Mac address to appear from a different machine
- (2wds) A misleading computer program that allows a hacker into your system
- A means of attack on a computer system
- a wide variety of bad software used to infect and/or damage a system
- Coding used to protect your information from hackers
- a group of applications that instruct a computer to carry out a task
- Tricked into clicking on wrong object on a web page
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
Down
- Process of identifying a user's identity
- Software or Hardware used to keep intruders out
- computers and peripherals connected as on entity
- Malware that snoops on you
- Malware which changes, corrupts, or destroys information, and then spreads to other systems
- An audio or video that has been changed to make it seem authentic
- network of infected computers working together
- Multiple computers connected together to share resources
18 Clues: Malware that snoops on you • A means of attack on a computer system • Process of identifying a user's identity • network of infected computers working together • Software or Hardware used to keep intruders out • computers and peripherals connected as on entity • Sending fake emails to get you to click on a link • Tricked into clicking on wrong object on a web page • ...
i think theres someone hanging there 2025-07-23
13 Clues: (EDR) • Mesh, • cloud, • Detection • Computing, • Screening, • technology, • Reality (XR), • Intelligence (AI), • Intelligence (BI), • Immune System (DIS), • Liability Insurance, • Automation, Multi-Factor Authentication (MFA),
Safety Week Crossword Puzzle 2023-05-04
Across
- All Employees covered under the scope of the Hearing “______” Program are required to get an annual hearing test. The test determines whether you’ve had a shift/hearing loss of 10 decibels (dB) or more from your baseline or from your previous test.
- After a beltloader is positioned up to the aircraft and chocked, the handrail must be in the “______” position.
- This group regulates denied boarding compensation amounts. Failing to follow regulations may result in possible fines to Southwest.
- Slips and Trips can both cause this.
- Safety Objective #1: We will protect our People by reducing Employee “______”.
- This happens when you lose your balance because your foot, leg, or body hits a fixed object
- Once you’ve identified a Safety hazard, “______” what you’re doing to assess the situation.
- this is the only type of animals Southwest Airlines accepts for travel between the U.S. Mainland and Hawaii.
- The Mission Statement of the Safety and Security Department is to (3/4) …”and “______” deals with these issues before they become…”
- Safety “______” is the component of our SMS (Safety Management System) that evaluates the continued effectiveness of risk controls and supports the identification of new hazards.
- OSHA statistics indicate that “______” injuries account for one in every five injuries or illnesses in the workplace
- According to recent data, this type of attack occurs once every 39 seconds.
- Safety “______” is the component of our SMS (Safety Management System) that includes training, communication, and other actions that create a positive safety culture within all levels of the Company.
- Safety Assurance data shows the number of reported aircraft engine “______” fires has increased year-over-year since 2018.
- Safety “______” is the component of our SMS (Safety Management System) that establishes our commitment to continually improve safety and defines the methods, processes, and organizational structure needed to meet our Company’s safety goals.
- Safety Objective #2: We will reduce aircraft “______” in our operation.
- At the top of our Operational Philosophy sits “______”, and rightly so, as it’s our top priority at Southwest Airlines.
- Safety Objective #3: We will reduce operational Safety “______”.
- Safety can never be sacrificed to achieve our other “______” pillars.
- The STORM Manual stands for Safe Transportation of “______” Materials.
Down
- When we leave behind cargo with available weight, we may violate our U.S. Mail contract that could result in fines and non-payment. More importantly, failing to load critical lifesaving shipments could cost someone their “______”.
- In 2022, Southwest invested 16,684 Hours of Training on this Safety and Security Topic (One Report: Page 30)
- The Mission Statement of the Safety and Security Department is to (4/4) “…injuries, accidents or “______”.”
- Once completed by Station Leadership, Ground Ops Irregularity Reports are forwarded to the Operational Reporting Team via the “______” reporting tool.
- We are safe by complying with our policies, procedures, and regulations in order to manage risk at an “______” level.
- Recently, Southwest Airlines has received a Safety Hazard Letter from the FAA stating Agents are failing to question Customers or make announcements prohibiting “______” batteries in checked baggage.
- This tool is a confidential, non-punitive reporting tool for all Employees and Contractors to submit non-emergency Safety or Security-related questions, concerns, or suggestions.
- The Mission Statement of the Safety and Security Department is to (2/4) “that “______” risks to the operation and workplace……”
- All Southwest Airlines Employees are responsible for complying with all Company policies and procedures, including all “______” regulations and guidelines.
- What position at Southwest Airlines is the Accountable Executive in all matters of Safety and Security?
- Federal regulations prohibit Southwest Airlines from allowing Customers who appear “______” to board the aircraft.
- Safety Objective #4: We will reduce Security “______” Violations.
- Personal protective equipment, commonly referred to as “______”, is equipment worn to minimize exposure to hazards that cause serious workplace injuries and illnesses.
- Take responsibility to say or do something to fix it. If it’s within your power, “______” the situation; and if you can’t, tell someone who can.
- All Southwest Employees are responsible for reading and being familiar with the Safety & Security Commitment and Safety “______”
- A condition that could cause or contribute to injury or death of persons and/or damage to or loss of equipment.
- For Ground Operations, the “______” Operational Reporting Team is responsible for processing and recording all Irregularity Reports and associated correspondences after they have been through the local Leadership level.
- Who does Southwest rely on to communicate Safety issues around the system?
- The Mission Statement of the Safety and Security Department (1/4) is to “_______”and support a Safety and Security Culture….”
- This policy is federally required to be announced at the Gate by both Customer Service and Operations Agents.
- Safety “______” Management is the component of our SMS (Safety Management System) that determines the need for and adequacy of new or revised risk controls based on the assessment of acceptable risk.
- This happens when you lose your footing and balance.
42 Clues: Slips and Trips can both cause this. • This happens when you lose your footing and balance. • Safety Objective #3: We will reduce operational Safety “______”. • Safety Objective #4: We will reduce Security “______” Violations. • Safety can never be sacrificed to achieve our other “______” pillars. • ...
DORA 2024-12-15
Across
- Financial entities shall identify, classify and adequately document all ICT supported business functions, roles and responsibilities, the information ****** and ICT ****** supporting those functions, and their roles and dependencies in relation to ICT risk.
- What must be promptly renewed to ensure ongoing security?
- Who is responsible for implementing the ICT risk management framework in financial entities?
- How frequently should vulnerability scanning be performed on critical ICT assets?
- What is the main subject matter of DORA?
- What must cryptographic keys be protected against throughout their lifecycle?
- The **** plan with a third party must be based on realistic scenarios and assumptions.
Down
- What technique can be used in network design to limit contagion during cyber attacks?
- What must financial entities use for advanced testing of ICT tools?
- What should financial entities have to ensure data restoration?
- What must financial entities report to relevant authorities?
- How often per year should a review of access rights for ICT systems that support critical or important functions be performed
- What percentage of affected clients using a service meets the materiality threshold for major incidents?
- What is the abbreviation of " a function, the disruption of which would materially impair the financial performance of a financial entity, or the soundness or continuity of its services and activities, or the discontinued, defective or failed performance of that function would materially impair the continuing compliance of a financial entity with the conditions and obligations of its authorisation, or with its other obligations under applicable financial services law;"
- What must ICT security policies ensure regarding data?
15 Clues: What is the main subject matter of DORA? • What must ICT security policies ensure regarding data? • What must be promptly renewed to ensure ongoing security? • What must financial entities report to relevant authorities? • What should financial entities have to ensure data restoration? • What must financial entities use for advanced testing of ICT tools? • ...
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- any software program in which advertising banners are displayed while the program is running.
- door a method, often secret, of bypassing normal authentication in a product.
- threat refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- someone who seeks and exploits weaknesses in a computer system or computer network.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- an attempt by hackers to damage or destroy a computer network or system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
Security Threats 2025-03-04
4 Clues: The unauthorized release of sensitive data • When a cloud misconfiguration leads to vulnerabilities • A security risk where an attacker gains control over someone’s account • A cyber threat where a system is overwhelmed with traffic to disrupt services
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales, nueral networks • automático, Machine learning
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales nueral networks • automático Machine learning
Lesson 5 French 2024-05-29
31 Clues: at • oil • car • fast • hood • road • tire • mouse • trunk • street • delete • screen • garage • charger • battery • printer • network • freeway • to load • channel • download • workshop • turn off • keyboard • password • suitcase • cyber cafe • windshield • application • music stereo • search engine
Lesson 5 BLOOM 2024-05-29
31 Clues: car • oil • seek • tire • grid • road • fast • chest • trunk • mouse • carry • street • screen • delete • stereo • garage • printer • charger • highway • channel • battery • at sign • workshop • keyboard • password • suitcase • Discharge • windshield • aplication • cyber cafe • to turn off
9 2024-08-18
Across
- Bright swirls
- Throwback fashion
- Flowing robes
- Powdered wigs
- Dark lace
- Bold graphics
- Pin-up glamour
- Unkempt style
- Oversized blazers
- Rationed fabrics
- Electric colors
- Jazz-inspired
Down
- Tailored cuts
- Platform shoes
- High collars
- Neon futurism
- Peasant blouses
- Flowing fabrics
- Beaded gowns
- Sequins
- Draped toga
- Tech-inspired
- Feather headbands
- Go-go boots
- Pastel florals
25 Clues: Sequins • Dark lace • Draped toga • Go-go boots • High collars • Beaded gowns • Tailored cuts • Bright swirls • Neon futurism • Flowing robes • Powdered wigs • Tech-inspired • Bold graphics • Unkempt style • Jazz-inspired • Platform shoes • Pin-up glamour • Pastel florals • Peasant blouses • Flowing fabrics • Electric colors • Rationed fabrics • Throwback fashion • Feather headbands • Oversized blazers
electronics information 2016-02-03
Across
- bullying using electronic to bully someone
- theft taking or stealing one's identity to make you look better often stolen for financial gain
- safe from any danger or threats
- A code or secret word created to protect something from others
- stealing someone's information due to not giving them credit through a citation
- tools or can be games but often are created to help do specific tasks
- a social media where you can post crafts and interest to others
- a website that you post interest and update things about the interest constantly
- is a social media where you can talk to your friends and send pictures
- identity An identity that is created by you online
- a social media where you can send photos to your friends
Down
- also considered a social media where you can watch and stream videos online
- quotes that are created from information to give credits to the author of the information researched
- a social media where you can post photos of you and your friends
- loading information from a software to another computer
- setting A setting on most social medias to keep your information private
- etiquette following the rules and having the respect while being online
17 Clues: safe from any danger or threats • bullying using electronic to bully someone • identity An identity that is created by you online • loading information from a software to another computer • a social media where you can send photos to your friends • A code or secret word created to protect something from others • ...
Who Am I? 2014-08-28
Across
- The Bishop's School's behavior policy
- Suicides that happen in one place
- More are developed to fight disease in joyous people
- Part of the Fundamental Standard
- A group that decides to commit suicide together
- Part of the Fundamental Standard
- A chemical _____ in the brain causes depression
- The Bishop's School's standard of conduct
- Responsible _____ is part of the Fundamental Standard
- Attempt suicide most often
- These males are more prone to suicide
- Disciplinary _____ prevents a visit to the DC
- A step to helping someone potentially suicidal
Down
- The fundamental ____ is a code of conduct
- Part of the Fundamental Standard
- The media's way of turning women into objects
- despair and hopelessness
- A serious type of depression
- Good stress
- Bullying online
- if you are being cyber bullied _____ someone
- If you have one you are more prone to suicide
- A step to helping someone potentially suicidal
- One of the causes of clinical depression
- Complete suicide most often
- our emotional response to too much pressure
- Can be the end result of severe depression
- Suicide is usually the result of _____ events
28 Clues: Good stress • Bullying online • despair and hopelessness • Attempt suicide most often • Complete suicide most often • A serious type of depression • Part of the Fundamental Standard • Part of the Fundamental Standard • Part of the Fundamental Standard • Suicides that happen in one place • The Bishop's School's behavior policy • These males are more prone to suicide • ...
Cybersecurity 2024-05-09
Across
- Malicious software designed to harm or exploit any programmable device, service, or network.
- A standalone malware computer program that replicates itself in order to spread to other computers.
- A security incident in which information is accessed without authorization.
- A weakness in a system or its design that can be exploited by a threat actor to perform unauthorized actions within a computer system.
- The exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.
- A cybersecurity strategy under which a user can only take actions on their computer or network that an administrator has explicitly allowed.
- A small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.
- A software update comprised code inserted (or patched) into the code of an existing software program to fix security vulnerabilities, improve functionality, or to update the software.
- The act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or classified), for personal, economic, political, or military advantage using illicit means.
- A mathematical technique used to validate the authenticity and integrity of a message, software, or digital document.
- A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools and techniques as an attacker might.
- Evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets.
- A control mechanism that allows through all elements (email, users, passwords, URLs, etc.), except for those explicitly mentioned.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- Engineering The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- Attack An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
- An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
- A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
- A systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.
- A device or software application that monitors a network or systems for malicious activity or policy violations.
Down
- A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- The application of scientific knowledge to investigate crimes on digital devices, such as computers, smartphones, or networks.
- The act of disguising a communication from an unknown source as being from a known, trusted source.
- A type of surveillance technology used to record keystrokes made by a user, often without their knowledge.
- Software that automatically displays or downloads advertising material when a user is online.
- Software designed to detect, prevent, and remove malicious software like viruses, worms, and trojans.
- The process of identifying, analyzing, and evaluating risk.
- A service that encrypts your internet traffic and protects your online identity by hiding your IP address.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- An organized approach to addressing and managing the aftermath of a security breach or cyberattack.
- Someone who uses computers to gain unauthorized access to data.
- Horse A type of malware that is often disguised as legitimate software.
- A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Attack An attack that exploits a previously unknown vulnerability in a computer application or operating system.
- The practice of protecting systems, networks, and programs from digital attacks.
- A cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need.
- Authentication A security process in which users provide two different authentication factors to verify themselves.
- A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software or hardware.
40 Clues: The process of identifying, analyzing, and evaluating risk. • Someone who uses computers to gain unauthorized access to data. • Horse A type of malware that is often disguised as legitimate software. • A security incident in which information is accessed without authorization. • The practice of protecting systems, networks, and programs from digital attacks. • ...
CROSS CODE PUZZLE 3 2017-12-24
Across
- Latest engine used by FIFA 17 this year
- American TV series aired on HBO that focuses on struggles of six programmers who are trying to make a mark in the big, bad world of programming
- He hosted the Grammys this year
Down
- Best animated feature film this year at Oscars
- He hosted The Oscars this year
- American TV series aired on USA network whose main protagonist works as a cyber security engineer by day, and hacks felons at night
6 Clues: He hosted The Oscars this year • He hosted the Grammys this year • Latest engine used by FIFA 17 this year • Best animated feature film this year at Oscars • American TV series aired on USA network whose main protagonist works as a cyber security engineer by day, and hacks felons at night • ...
when there's a space use underscore 2025-03-13
15 Clues: to tag • to add • log in • online • to chat • to text • to share • An update • followers • dashboard • to search • to download • to download • cyber bullying • Avatar: profile picture
Security, Risks and Safeguards 2022-04-16
Across
- Social engineering attacks fool users to give up usernames and __________
- A network ________ is a weakness or flaw in software, hardware, or organizational process, which when compromised by a threat can result in a security breach
- malware disguised as legitimate software
- assurance that someone cannot deny the validity of something
- Attempting to target high-profile business executive or manager with emails and web pages that appear to be official
- designed to lock users out of their system or deny access to data until ransom is paid
- Cyber-attack that uses SMS text messages
- CIA for maintaining consistency, accuracy and trustworthiness of data over its entire lifecycle
Down
- CIA for data readily accessible for authorized parties
- ______ network vulnerabilities involve protecting asset such as locking a server in a rack closet or securing an entry point with a turnstile
- short of roBOT NETwork
- monitors a user's keystrokes
- name for Trojan horses, viruses and worms
- CIA for safeguarding data
- Short for demilitarized zone it is firewalls that are often deployed as a buffer between the internet and your internal network
- email scam that appears to be from a legitimate user or business
- most common type of malware attack
17 Clues: short of roBOT NETwork • CIA for safeguarding data • monitors a user's keystrokes • most common type of malware attack • malware disguised as legitimate software • Cyber-attack that uses SMS text messages • name for Trojan horses, viruses and worms • CIA for data readily accessible for authorized parties • assurance that someone cannot deny the validity of something • ...
REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16
Across
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- an attempt by hackers to damage or destroy a computer network or system.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- designed to detect and destroy computer viruses.
- global system of interconnected computer networks that use the Internet protocol suite.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- any software program in which advertising banners are displayed while the program is running.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- door a method, often secret, of bypassing normal authentication in a product.
- a standalone malware computer program that replicates itself in order to spread to other computers.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
2.02 Security Solutions 2025-03-17
Across
- Regulates transportation safety across air, land, and sea.
- Responds to and extinguishes fires.
- master key: key that provides access to all doors on one specific floor.
- a key used by guestroom attendants that is coded to open only a selection of rooms in a specific section.
- allows the door lock to be overridden to open electronically engaged deadbolt.
- document that details the emergency procedures designed to maintain safety of guests, employees, and the property.
- a key that allows access into all of the door locks of the hotel.
- Protects the nation from terrorism, cyber threats, and natural disasters.
- Oversees public health initiatives and disease control. Also Administers social services, including Medicaid, Medicare, and welfare programs.
Down
- the close observation of a situation to provide information for investigations regarding guests, employees, and asset protection.
- prevention: actions and procedures that ensure the safety and security of the property and its guests and preventing problems from occurring.
- a specifically encoded key, typically used by the bell attendant to handle a luggage pull; provides one-time entry into a selection of rooms.
- a legal term that means an operation has done everything (within reason) to ensure that a safe operation and product was delivered.
- a form of preventive maintenance that is done on a daily, weekly, monthly, quarterly, semi-annual, or annual basis to prevent breakdowns of equipment.
- maintenance: maintenance done under immediate circumstances.
- Enforces laws and maintains public order.
- control: procedures that control access to property keys to increase guest security and privacy and to reduce the possibility of theft.
- communication standard (HCS): requires that all employees notify employees about all chemical hazards present on the job and train them to use the materials safely.
- maintenance that is done to prevent future breakdowns of equipment and systems.
- the process of ensuring that managers and employees follow the laws, regulations, standards, and ethical practices that apply to a particular industry.
- Occupational Safety and Health Administration
21 Clues: Responds to and extinguishes fires. • Enforces laws and maintains public order. • Occupational Safety and Health Administration • Regulates transportation safety across air, land, and sea. • maintenance: maintenance done under immediate circumstances. • a key that allows access into all of the door locks of the hotel. • ...
Lesson 5 vocab 2024-05-29
30 Clues: At • Oil • Rojo • road • Cart • Tire • Trunk • Mouse • Chest • Screen • Street • Stereo • garage • battery • Channel • freeway • Printer • suitcase • workshop • Password • Keyboard • magazine • discharge • To delete • To charge • Windshield • Cyber Safe • Application • To turn off • search engin
RU ITEC411 Chapter 5 Crime and Security 2024-11-16
Across
- Early packet switching network, seen as the predecessor for modern internet.
- Software intentionally designed to cause disruption.
- Use of cyber-attacks against a state, causing comparable harm to warfare.
- A destructive computer worm that spread rapidly through email attachments.
- Cyberattack where malicious actors redirect internet users to a fake website, designed to mimic a legitimate one.
- Overwhelming targeted systems with a flood of traffic, rendering it inaccessible.
- Malware that disguises itself as legitimate software to gain unauthorized access to a computer system.
- A short-range wireless technology that allows electronic devices to communicate.
- Measurement and analysis of unique physical or behavioral characteristics of an individual, used for verification purposes.
Down
- Ethical hacking of a computer system to evaluate security weaknesses and address them.
- A mass-mailing macro virus released in 1999, that targeted Microsoft Word and Outlook-based systems, causing significant network traffic and disruption.
- Use of computer hacking to promote political agenda or social change.
- A self-replicating malware that spreads through networks, exploiting vulnerabilities to infect multiple devices without human interaction.
- An open-source library that provides secure communication between computer networks.
- A non-profit organization focused on improving cybersecurity, by conducting research on software bugs that impact internet security.
- A vulnerability found in OpenSSL allowing attackers to steal sensitive information.
- Created by Robert Tappan Morris, to spread across the internet by exploiting vulnerabilities in Unix systems.
- Cyberattack where attackers use deceptive tactics to trick individuals into revealing sensitive information.
- Malicious software that encrypts a victim's files, making them inaccessible, unless a fine is paid.
- Malware that replicates itself by attaching to other programs or files, requiring a host to run it.
- Network of computers or other internet-connected devices that have been infected with malware and are under the control of a single attacker.
21 Clues: Software intentionally designed to cause disruption. • Use of computer hacking to promote political agenda or social change. • Use of cyber-attacks against a state, causing comparable harm to warfare. • A destructive computer worm that spread rapidly through email attachments. • Early packet switching network, seen as the predecessor for modern internet. • ...
Cyber Arcade Game 2025-05-22
Across
- What is the team in PwC that looks after cyber security?
- What type of cyberattack where scammers trick individuals into scanning fake QR codes?
- What is the process of converting data into a code to protect it from unauthorized access?
- What is the name of the VPN PwC employees should use?
Down
- What is the attack type of scamming via text message called?
- What is the attack type directed at high-level executives where attackers pretend as legitimate, known and trusted entities, known as?
- What is the protective layer between a network and potential threats?
- What is the name of the review PwC employees should raise if they want to use a new tool or application?
- Which term describes software designed to damage or disrupt systems?
9 Clues: What is the name of the VPN PwC employees should use? • What is the team in PwC that looks after cyber security? • What is the attack type of scamming via text message called? • Which term describes software designed to damage or disrupt systems? • What is the protective layer between a network and potential threats? • ...
Week 2 Challenge - Cyber Security Awareness Month 2023-09-22
Across
- The acronym for a method of logon that requires you to present two or more pieces of evidence to prove your identity.
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source.
- A form of phishing that targets high profile individuals
- A type of software designed to protect against malware and other threats
- Malicious software that can cause damage to systems or data
- A passwordless option for logging into devices
- Malicious emails that request sensitive information or opening of attachments
- Always _ _ _ _ your computer when you leave your desk.
Down
- a string of random words that are a more secure version of passwords.
- A form of malware in which files are locked until a payment is made to the attacker
- _ _ _ _ breach. The unauthorized access, use, or disclosure of sensitive information.
- Method of converting plain text into a code that can only be read by authorised parties.
- Errors or vulnerabilities in software
- An update to software that fixes a vulnerability or bug.
- _ _ _ _ _ _ engineering. The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
15 Clues: Errors or vulnerabilities in software • A passwordless option for logging into devices • Always _ _ _ _ your computer when you leave your desk. • A form of phishing that targets high profile individuals • An update to software that fixes a vulnerability or bug. • Malicious software that can cause damage to systems or data • ...
MARVEL Cloud Computing and Cyber Security Domain 2022-02-24
Across
- Hash me D8578edf8458ce06fbc5bb76a58c5ca4
- a method, often secret, of bypassing normal authentication in a product
- I am a database design which enables the storage and querying of data outside the traditional structures found in relational databases.
- network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- The Cloud Platform that CNA Hardy have chosen
- a Deployment Model which is a combination of a Private and a Public Cloud
- unique name by performing a wide variety of automated tasks on behalf of their master
- is the computer's main circuit board.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- malicious computer program which is used to hack into a computer by misleading users of its true intent
- Encrypt the word alphabet using a Caesar cipher with a shift of 3
- what does the P stand for in PaaS
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
- A group of networked computers that share a common address (.edu, .com).
15 Clues: what does the P stand for in PaaS • is the computer's main circuit board. • Hash me D8578edf8458ce06fbc5bb76a58c5ca4 • The Cloud Platform that CNA Hardy have chosen • Encrypt the word alphabet using a Caesar cipher with a shift of 3 • a method, often secret, of bypassing normal authentication in a product • ...
The trends and buzzwords associated with disruptive technology 2025-08-07
14 Clues: Mesh • cloud • (XaaS) • Screening • Computing • Automation • technology • Reality (XR) • Intelligence (BI) • Intelligence (AI) • Liability Insurance • Immune System (DIS) • Authentication (MFA) • Detection and Response (EDR)
Internet & Security 2011-12-09
Across
- feature in internet explorer that lets you view websites without the browser storing data about your browsing session.
- to create a website that lloks exactly like another legitimate site on the web, but steals the information people enter.
- feature in the internet explorer that helps prevent websites or third-party developers from collecting information about the sites you visit.
- an illict activity used by hackers to trick computer users into revealing personal or financial through email massage or website.
- software that track a computer user's internet usage and sends this data back to the company or person that created it, usually without the computer user's permission or knowlegde.
- a feature in internet explorer 8 that hepls detect phishing websites.
- a descriptive word or phrase you enter to obtain a list of results that include that word or phrase.
- the steps a computer owner takes to prevent unauthorized use of or damage to the computer.
Down
- stores and organizes the link to the webpage that you want to revisit often.
- software that searches executable files for the sequences of characters that may cause harm and disinfects the files by erasing or disabling those commands.
- a software that lets you open and display website.
- window that opens on your screen as you visit websites, generally to advertise products you may or may not want.
- a string of at least eight characters of upper and lowercase letters and numbers.
- verifies the indentity of a person or indicates the security of a website.
- allows you to open more than one webpage at a time in a browser window.
- to break into a DNS server and redirect any attempts to access a particular website to a spoofed site.
- hardware or software that prevents other computers on the internet from accessing a computer or prevents a program on a computer from accessing the internet.
- a special website that searches the internet for websites based on words or phrases that you enter.
- a harmful program thyat intructs a computer to perform destructive activities, such as erasing a disk drive.
- a broad term that describes and program that is intended to cause harm or convey information to others withoutthe owner's permission.
20 Clues: a software that lets you open and display website. • a feature in internet explorer 8 that hepls detect phishing websites. • allows you to open more than one webpage at a time in a browser window. • verifies the indentity of a person or indicates the security of a website. • stores and organizes the link to the webpage that you want to revisit often. • ...
Fundamental Security 2013-02-06
Across
- What is a Trojan
- data send between to hosts
- What is another name for unsolicited email
- What type of threat is stealing, damage, destroy equipment
- allows or Denys traffic on a computer
- what do anti-virus look for in software
- permanently deleting something
- file contents that hold known characteristics of someone
- who is responsible for security
- What type of virus is the most damaging
Down
- what is another name for an infected computer
- what is another name code updates
- What reads info and operates without your computer knowing
- A person that pretends to be a employee to get info on the company
- What wed security controls interactivity between a app and computer
- what is a common DoS attack
- software that pretends to be a trusted computer
- a way to safely access resources
- what type of attack sniffs out user names and passwords in a network
- How often should you check your security
20 Clues: What is a Trojan • data send between to hosts • what is a common DoS attack • permanently deleting something • who is responsible for security • a way to safely access resources • what is another name code updates • allows or Denys traffic on a computer • what do anti-virus look for in software • What type of virus is the most damaging • How often should you check your security • ...
Fundamental security 2013-02-06
Across
- data send between to hosts
- what is a common DoS attack
- what is another name code updates
- What wed security controls interactivity between a app and computer
- allows or Denys traffic on a computer
- A person that pretends to be a employee to get info on the company
- How often should you check your security
- a way to safely access resources
- file contents that hold known characteristics of someone
- permanently deleting something
Down
- What type of threat is stealing, damage, destroy equipment
- What is another name for unsolicited email
- What type of virus is the most damaging
- what is another name for an infected computer
- What reads info and operates without your computer knowing
- what do anti-virus look for in software
- who is responsible for security
- software that pretends to be a trusted computer
- what type of attack sniffs out user names and passwords in a network
- What is a Trojan
20 Clues: What is a Trojan • data send between to hosts • what is a common DoS attack • permanently deleting something • who is responsible for security • a way to safely access resources • what is another name code updates • allows or Denys traffic on a computer • What type of virus is the most damaging • what do anti-virus look for in software • How often should you check your security • ...
IT-Security 2015-01-26
Across
- Datendiebstahl durch falsche Mails
- Beobachten bei der Eingabe von Daten
- Virus der sich direkt über Netze verbreitet
- Datendiebstahl durch zwischenmenschliche Beeinflussung
- Spionageprogramme, die Verhalten des Users ausspionieren
- maschinenlesbare Zeichen
- Daten können nicht missbräuchlich verändert werden
- protokolliert Tastatureingabe mit
- verschafft sich unerlaubt Zugang zu Netzwerken (nicht immer böse)
- Datensicherung
- Hintertür für Dritte ins Internet
- unerwünschte, schädliche Software
Down
- Datendiebstahl durch weggeworfene Daten
- verschafft sich in böser Absicht Zugang zu Netzwerken
- Viren, die als Programm in ein Dokument eingebettet sind
- Daten eines Dritten, unter Vorgabe einer fremden Identität besorgen
- Einwahl über teure Nummern ins Internet
- Schadsoftware die in einem scheinbar nützlichem Programm versteckt ist
- Abschöpfen von Daten durch Dritter bei Datenaustausch
- Programm, das Viren im Betriebssystem versteckt
- viele Rechner die ferngesteuert Angriffe über das Internet starten
- User wird auf gefälschte Webseiten umgeleitet
22 Clues: Datensicherung • maschinenlesbare Zeichen • protokolliert Tastatureingabe mit • Hintertür für Dritte ins Internet • unerwünschte, schädliche Software • Datendiebstahl durch falsche Mails • Beobachten bei der Eingabe von Daten • Datendiebstahl durch weggeworfene Daten • Einwahl über teure Nummern ins Internet • Virus der sich direkt über Netze verbreitet • ...
information security 2020-12-18
Across
- the right to enter a place, use something, see someone etc
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- someone who is in a position of authority in an organization
- a clever but dishonest way to get money
- to make a computer, machine, or piece of software better and able to do more things
- relating to computers, especially to messages and information on the Internet
- a machine or tool that does a special job
- to keep someone or something safe from harm, damage, or illness
- when something bad is stopped from happening
- the crime of stealing
- informal someone who secretly uses or changes the information in other people’s computer systems
- a written or spoken description that says what happens in an event or process
- to take something that belongs to someone else
Down
- relating to crime
- a group of related parts that work together as a whole for a particular purpose
- the sets of programs that tell a computer how to do a particular job
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the act of deliberately making someone believe something that is not true
- to make a short hard sound, or make something produce this sound
- to damage something so badly that it no longer exists or cannot be used or repaired
- the place where you pay or are served in a shop, bank, restaurant etc
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • someone who is in a position of authority in an organization • ...
information security 2020-12-18
Across
- the right to enter a place, use something, see someone etc
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- someone who is in a position of authority in an organization
- a clever but dishonest way to get money
- to make a computer, machine, or piece of
- relating to computers, especially to messages and information on the Internet
- a machine or tool that does a special job
- to keep someone or something safe from harm, damage, or illness
- when something bad is stopped from happening
- the crime of stealing
- informal someone who secretly uses or changes the information in other people’s computer systems
- a written or spoken description that says what happens in an event or process
- to take something that belongs to someone else
Down
- relating to crime
- a group of related parts that work together as a whole for a particular purpose
- the sets of programs that tell a computer how to do a particular job
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the act of deliberately making someone believe something that is not true
- to make a short hard sound, or make something produce this sound
- to damage something so badly that it no longer exists or cannot be used or repaired
- the place where you pay or are served in a shop, bank, restaurant etc
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • to make a computer, machine, or piece of • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • ...
information security 2020-12-18
Across
- the right to enter a place, use something, see someone etc
- the sets of programs that tell a computer how to do a particular job
- when something bad is stopped from happening
- relating to computers, especially to messages and information on the Internet
- a machine or tool that does a special job
- a clever but dishonest way to get money
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the crime of stealing
- to make a short hard sound, or make something produce this sound
- to keep someone or something safe from harm, damage, or illness
- the place where you pay or are served in a shop, bank, restaurant etc
- a group of related parts that work together as a whole for a particular purpose
Down
- someone who is in a position of authority in an organization
- relating to crime
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- to make a computer, machine, or piece of
- the act of deliberately making someone believe something that is not true
- a written or spoken description that says what happens in an event or process
- to damage something so badly that it no longer exists or cannot be used or repaired
- to take something that belongs to someone else
- informal someone who secretly uses or changes the information in other people’s computer systems
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • to make a computer, machine, or piece of • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • ...
Security Crossword 2022-03-14
Across
- A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
- A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.
- A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- Refers to a company security policy that allows for employees’ personal devices to be used in business. A BYOD policy sets limitations and restrictions on whether or not a personal phone or laptop can be connected over the corporate network.
- An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
- A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.
- An internet version of a home address for your computer, which is identified when it communicates over a network; For example, connecting to the internet (a network of networks).
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
Down
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- Another kind of malware that allows cybercriminals to remotely control your computer. Rootkits are especially damaging because they are hard to detect, making it likely that this type of malware could live on your computer for a long time.
- A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
20 Clues: The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. • A malicious application or script that can be used to take advantage of a computer’s vulnerability. • A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based. • ...
Information Security 2022-09-29
Across
- A type of malware that records every single press of the keyboard that you make
- A key only used by one individual to decrypt
- A key that can be used by anyone to encrypt messages
- Gaining unauthorised access to or control of a computer system
- A trap for cybersecurity criminals
- Bullying that takes place online
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
- Special viruses that move from computer to computer without human action
- Impersonation of email address or device to gain unauthorized access to information or systems
- Copy of data
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information
- A weaknesses in computers
- scrambled data
- Ethical hacking in order to find any cybersecurity weaknesses
- Raw data that is put into context and has meaning
Down
- core of an operating system
- General term for programs that gains access to your system for unethical reasons
- Email that contains a message with a suspicious link designed to steal personal information
- annoying malware that spams you with ads
- Software that protects computers from virus related harm
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
- Malicious code typically disguised as a legitimate program
- To take advantage of a system's weakness
- I am not a robot
- Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
- Secretly watches computer activity
- Collection of malware infested computers that form a network to attack
- Electronic messages sent through the internet
- Readable data
- Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- An internal security team that defends against both real attackers and Red Teams
32 Clues: Copy of data • Readable data • scrambled data • I am not a robot • A weaknesses in computers • core of an operating system • Bullying that takes place online • A trap for cybersecurity criminals • Secretly watches computer activity • annoying malware that spams you with ads • To take advantage of a system's weakness • A key only used by one individual to decrypt • ...
Security puzzle 2022-10-26
Across
- The government is watching our certification through compliance
- Mcdonald's _____ browns or the secure format to store passwords in a database
- Not the loch ness monster but a dynamic scanning tool
- Process for scanning federal VPCs before releases because the government says so
- Following someone through physical security without using your own badge
- Acronym for the three pillars of security, or an unrelated government agency
- Example: 12 characters, 1 uppercase, 1 lowercase, 1 symbol, 1 blood of unicorn, 1 rabbit foot
- Conference affectionately known as "hacker summer camp" held in Las Vegas every year
- Tool used for vendor reviews
- Representation of a system used to assess risk boundaries
- Using (vulnerability #) to conduct an attack
Down
- Something you have, something you know, something you are.. just a password is not enough
- Public or private? Symmetric or asymmetric? Also unlocks doors
- Use 1.2 or higher, formerly called SSL
- Example: Entering in name as "1=1; drop table USER;"
- Example: AJ sends you an urgent text message requesting youtube gift cards
- A weakness in our code or configuration (example: log4j)
- Process for evaluating security and privacy of medium/high risk features
- Secure physical space to store user data
- Example: <script>alert(1);</script>
- Our endpoint protection product
- How you sign in to get access to company resources
- Internal password management tool
- This organization publishes top ten vulnerabilities
24 Clues: Tool used for vendor reviews • Our endpoint protection product • Internal password management tool • Example: <script>alert(1);</script> • Use 1.2 or higher, formerly called SSL • Secure physical space to store user data • Using (vulnerability #) to conduct an attack • How you sign in to get access to company resources • This organization publishes top ten vulnerabilities • ...
Industrial security 2023-11-29
Across
- Measures to manage and regulate security
- Authorization for accessing classified information
- Security measures implemented within a facility
- Evaluation of security measures and vulnerabilities
- Adherence to laws, regulations, and standards
- Designated location for entering or exiting a secure area
- Regulation and management of systems or processes
- Practices to prevent and manage fires in industrial settings
- Coordinated actions in reaction to an emergency situation
- Education to enhance knowledge and skills related to safety or security
- Practice session simulating response to an emergency
- Examination to ensure equipment or processes meet standards
- Plan and actions taken after a security or safety incident
- Protected exchange of information between parties
- Hazardous Materials, substances harmful to health or the environment
- Physical obstacle preventing access or providing protection
- Measures to safeguard physical assets and spaces
- Isolated storage or processing system within an organization
- Set of rules and guidelines for ensuring security
- Regular upkeep of equipment and systems
- Supervisory Control and Data Acquisition, industrial control system
- Restriction and monitoring of user access to resources
- Practices to ensure safe handling of chemicals
- Devices used to secure doors, gates, or containers
- Integration of cybersecurity with physical security
- Measures to prevent accidents or harm to individuals
- Personnel responsible for monitoring and ensuring security
- Audible or visual signals indicating an emergency or problem
- Group responsible for managing and responding to incidents
- Evaluation of potential risks to determine their impact
- Unauthorized entry or interference with a system
- Established procedures to ensure safety in specific situations
- Established guidelines for ensuring safety in various contexts
- Unique physical or behavioral attributes for identification
- Accidental release of hazardous chemicals
- Tools or gear used to enhance safety in the workplace
- Examination for detecting prohibited items or threats
- Monitoring and regulation of industrial processes
- Controlled entry or exit point in a facility
Down
- Established steps to ensure safety in specific situations
- Preparation for potential emergency scenarios
- Programmable Logic Controller, used in industrial automation
- Evaluation of weaknesses in security defenses
- Essential systems and assets for societal functioning
- Designated exit for evacuating a facility in an emergency
- Surveillance devices capturing visual information
- Shared values and beliefs promoting safety within an organization
- Notification or warning of a potential threat or danger
- Personal Protective Equipment worn to minimize exposure to hazards
- Perimeter barrier for security or safety purposes
- Strategies to handle and overcome a crisis situation
- Swift departure from a facility in response to a threat
- Potential source of danger or harm in an industrial setting
- Prepared strategy for responding to emergencies
- Safeguarding valuable assets from loss or damage
- Measures to secure the outer boundaries of a facility
- Immediate cessation of operations in an emergency
- Use of control systems for operating industrial equipment
- Monitoring and observation of activities for security purposes
- Systematic examination of safety measures within an organization
- Recognition and assessment of potential hazards
- Implementation of security measures and regulation
- Protection against unauthorized access or harm
- Examination of potential risks or dangers to security
- Capacity to recover quickly from difficulties or disruptions
- Systematic examination of safety or security measures
- Measures to protect a network from unauthorized access
- Safety procedure to control hazardous energy during maintenance
- Individual responsible for evaluating safety practices
- Instruction to enhance knowledge and skills related to safety
- Use of technology to perform tasks without human intervention
- Devices detecting physical changes or conditions
72 Clues: Regular upkeep of equipment and systems • Measures to manage and regulate security • Accidental release of hazardous chemicals • Controlled entry or exit point in a facility • Preparation for potential emergency scenarios • Evaluation of weaknesses in security defenses • Adherence to laws, regulations, and standards • Practices to ensure safe handling of chemicals • ...
Mobile Security 2023-09-27
Across
- escalating privileges on a device, Bypasses operating system-imposed restrictions, Allows full control of the system
- the use of GPS to track a device
- Two devices linked together, A sender and a receiver, Unicast connection
- (USB) Physical connectivity to your mobile device,
- the ability to use device with another mobile carrier
- More than two devices linked together, Multiple receivers, Single link shared with multiple devices
- Radio Frequency Identifier; Examples: Hospital inventory tracking, Some passports, Building access cards, Hotel Keycards
- (NFC) two-way wireless communication, payment systems, short range with encryption support
- Mobile devices, “cellular” phones, Service area divided into “cells” Towers cover each cell, 3 towers serve each call, can triangulate phone’s location
- Ability to remotely remove data from mobile device
- remote capture, jam known frequencies, replay/replay attack, loss of device control
- Device can capture network data, Lost phone can carry sensitive data, Encrypt your data!, Man-in-the-middle, Mobile device could sniff network traffic, Denial of Service, Frequency interference with company wifi, “Hotspot” could be Rouge Access Point, Exfiltrate internal data via cellular,
- separating device functions, One container holds all the work-related data, One container holds all the personal data, Can have other containers
Down
- (GPS) sattelibe-based radio navigation, geolocation
- Controlling content, What content is available to applications
- Updating the firmware to stay up to date, Secures device, Fixing problems as reported or discovered
- (MDM)Policy can include: Encrypt data on each device, Auto-lock a device after certain amount of inactivity, Force use of strong passwords, Wipe device automatically if too many fail log-in attempts, Remotely lock device if lost/stolen, Remotely wipe device if lost/stolen
- Management Controlling apps hard because always being added and changing,company can whitelist certain apps
- ability to determine device’s location, Can only use a device inside (or outside) boundary, Can only allow certain actions inside (or outside) boundary
- installing apps not authorized by official app store
- Short-wave UHF radio waves, 2.402 GHz to 2.48GHz, Range is very limited, One to one connection
21 Clues: the use of GPS to track a device • (USB) Physical connectivity to your mobile device, • Ability to remotely remove data from mobile device • (GPS) sattelibe-based radio navigation, geolocation • installing apps not authorized by official app store • the ability to use device with another mobile carrier • Controlling content, What content is available to applications • ...
computer security 2020-03-10
20 Clues: код • защита • хранить • ноутбук • взломщик • улучшение • применение • полезность • информация • надежность • доступность • обрабатывать • безопасность • многогранный • достоверность • предотвращать • телекоммуникации • идентифицируемость • аппаратное обеспечение • программное обеспечение
Food Security 2020-09-07
Across
- house and occupants; referred to as unit
- state of being firmly established
- means or opportunity to use something
- (nation) socially and economically advanced
- inhabitants of particular place
- able to be used or obtained
- relating to nation as a whole
- nutritious substance consumed to maintain life
- undergo natural development
- state of freedom from illness or injury
Down
- suffering from lacking proper nutrition
- human beings
- to expend carelessly with no purpose
- action of making effective use of something
- (nation) seeking social and economic advances
- efficient food for health
- justified in terms of profitability
- adequate amount; enough
- state of being free from danger or threat
- kinds of food habitually consumed
20 Clues: human beings • adequate amount; enough • efficient food for health • able to be used or obtained • undergo natural development • relating to nation as a whole • inhabitants of particular place • state of being firmly established • kinds of food habitually consumed • justified in terms of profitability • to expend carelessly with no purpose • means or opportunity to use something • ...
DTIN : Security 2024-05-21
Across
- - A computer controlled by someone else without the owner's knowledge
- - Software designed to detect and destroy computer viruses
- - Malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
- - Uninterruptible Power Supply, a device that provides emergency power
- - Hidden access to a computer system that bypasses security mechanisms
- - Measures taken to guard against espionage or sabotage, crime, attack, or escape
- - Distributed Denial of Service attack
- - Process of encoding messages or information
- - Security system that controls the incoming and outgoing network traffic
- - Action of regaining possession or control of something stolen or lost
- - Malicious software that includes viruses and worms
- - A copy of a file or other item of data made in case the original is lost or damaged
Down
- - Pertaining to or using digits, particularly binary
- - Software that records the keys struck on a keyboard
- - Unwanted electrical signal causing disturbances in communication systems
- - Network of compromised computers controlled by malicious actors
- - Software that appears legitimate but can take control of your computer
- - Sudden powerful forward or upward movement, especially by a crowd or by a natural force such as the waves or tide
- - Moral principles that govern a person's behavior or conducting of an activity
- - Software that automatically displays or downloads advertising material
- - Software that enables a user to obtain covert information about another's computer activities
- - Online or Internet-based illegal act
- - Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
- - Malicious software that copies itself and consumes system resources
- - A potentially damaging computer program that replicates itself
25 Clues: - Distributed Denial of Service attack • - Online or Internet-based illegal act • - Process of encoding messages or information • - Pertaining to or using digits, particularly binary • - Malicious software that includes viruses and worms • - Software that records the keys struck on a keyboard • - Software designed to detect and destroy computer viruses • ...
Security Threats 2023-04-28
Across
- means you can connect to the computer system
- means the data is protected from unauthorised changes
- you can look at the data on the system but you cannot make changes
- gaining unauthorised access to ICT systems
- means data is only seen or copied by people who have permission
- you can make changes to the data. You can also make changes to the system itself
- can cause a lot of damage and problems
- access do not have permission to see or alter a data
- you can look at the data and you can also make changes to the data
- patch an update that fixes a security problem
- an example of removable hard disk
Down
- computer viruses and other harmful software
- a password that is hard to guess
- stealing someone else's personal details, and pretending to be that person
- taking copy of music, games, movies, etc.
- means the data has been damaged or changed
- means the state of the system if you don't make any changes
- you cannot connect to the system at all
- means the data no longer exist in storage
- a password that are easier to guess
20 Clues: a password that is hard to guess • an example of removable hard disk • a password that are easier to guess • can cause a lot of damage and problems • you cannot connect to the system at all • taking copy of music, games, movies, etc. • means the data no longer exist in storage • gaining unauthorised access to ICT systems • means the data has been damaged or changed • ...
Security+Chap2 2023-01-22
Across
- attacks against cryptographic implementations or crypto algorithms
- group of compromised computers known as robots
- code that can run on a computer without any action from the user, self-replicating
- master computer that controls the botnet
- malware that occurs in memory of computer
- in the clear
- malware that restricts access to a system or encrypts files and demands payment
- malicious software downloaded unwittingly from a website or installed with some third-party software
- an attack on a hashing system that attempts to send two different messages for the same hash
- list of encrypted passwords located in a lookup table
- attacker captures credit card information from a cardholder
- attacker uses this to bypass normal authorization
- advanced form of ransomware that leverages advanced encryption techniques
- spyware that records your keystrokes
- software designed to gain administrator-level control over a computer system without being detected
- code added to software that will initiate when something specific happens
Down
- password attack where every possible password is attempted
- form of spyware that includes grayware, adware or jokes
- attack when a protocol is downgraded from the current version to a previous version, exploiting backward compatibility
- password attack uses a prearranged list of ordinary words
- malicious software
- software appears to perform a desired function but actually is performing malicious functions behind the scenes
- password attack where attacker uses simple passwords against targeted user accounts and moves on to other accounts before being detected
- type of attack where attackers target security weaknesses in the supply network
- attacker clones a credit card or SIM card
- computer used to distribute malware across the internet, also a zombie
- two different files end up using the same hash, MD5
- a trojan used to gain back-end access to a server
28 Clues: in the clear • malicious software • spyware that records your keystrokes • master computer that controls the botnet • malware that occurs in memory of computer • attacker clones a credit card or SIM card • group of compromised computers known as robots • attacker uses this to bypass normal authorization • a trojan used to gain back-end access to a server • ...
Database security 2024-10-16
Across
- The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
- What are the 3 Principles of Information Security? (third one)
- A data type that is simply a sequence of characters hash character for comments
- An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
- Malicious software that can corrupt or steal data stored in a database.
- Software used to protect against malicious software
- Logical Operator that evaluates to false If condition evaluates to true.
- The process of controlling who has access to specific data in a database.
- What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
- if its boolean expression is true, then executes a block of code
- The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
- A _______ statement allows us to execute a statement or group of statements multiple times
Down
- The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
- Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python
- Merges the string representations of elements in sequence seq into a string, with separator string
- This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
- A type of cyberattack where malicious code is inserted into SQL queries to access data.
- A function that returns the smallest item in an iterable
- A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
- keeps executing as long as True
- What are the 3 Principles of Information Security? (second one)
- The primary language used to create web pages
- Malicious software designed to harm or exploit any programmable device
- Logical Operator that evaluates to true If both the operands are true then condition becomes true. Modulus Divides left hand operand by right hand operand and returns remainder
- How many times will the following while loop run? x = 5 while x > 0: x -= 1
25 Clues: keeps executing as long as True • The primary language used to create web pages • Software used to protect against malicious software • A function that returns the smallest item in an iterable • What are the 3 Principles of Information Security? (third one) • What are the 3 Principles of Information Security? (second one) • ...
Security Policy 2024-12-08
Across
- creates a barrier between networks so that potentially harmful packets can't enter or leave protected networks.
- used to encrypt files and folders in windows OSs.
- requires a user to supply two or more types of authentication.
- a document that describes the rules governing access to an organization's information resources, enforcement of these rules, and steps taken if rules are breached.
- a framework for other protocols that provide encryption and authentication.
- is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
- is a common tool used by many Linux administrators.
- prevents people from using eavesdropping technology, such as protocol analyzer, to capture packets.
- is a good secrity enhancement for servers that aren't physically secure and for mobile devices at risk of being lost or stolen.
- An important part for maintaining a system.
- backs up the disk sector by sector to create an exact image of the disk's contents.
- used in a windows domain environment and provides mutual authentication.
Down
- is disk storage used when there is not enough RAM for a particular operation or for all processes currently in use.
- a server role that makes it possible for administrators to take control of Microsoft product updates.
- the built-in firewall in most linux distributions.
- a Linux files tool that offers a trash can for deleting files permanently.
- backs up any files that changed since the last full or incremental backup.
- creates a barrier between two entities.
- only backs up files that have changed since the last full backup.
- the most widely method for encrypting data.
20 Clues: creates a barrier between two entities. • the most widely method for encrypting data. • An important part for maintaining a system. • used to encrypt files and folders in windows OSs. • the built-in firewall in most linux distributions. • is a common tool used by many Linux administrators. • requires a user to supply two or more types of authentication. • ...
Industrial Security 2025-09-23
Across
- bell-a hollow device made of metal that makes a ringing sound
- being watchful in spotting violator , a person a vehicle or an incident
- security- a system of barriers placed between the potential intruder and the objects/matter to be protected.
- reduction- minimizing the probability of the potential loss
- a portable and detachable lock having a pivoted or sliding hasp
- avoidance-removing the risk totally from the business.
- to deal with others succesfully without offending
- Fence- Constructed in suvh away that visual access through the fence is denied.
- low- aim the nozzle or hose of extinguisher at the base of the fire.
Down
- to withstand the effects of a hostile environment -measure of how open an establishment to intrusion , attack or injury.
- a chance of being injured or harmed.
- the potential that a chosen action or activity will lead to a loss probability of an event to happen that will lead to losd.
- a kind of state or quality of being secured , freedom from fear or danger , assurance , certainty.
- sound and good judgement to arrive at wise and timely decisions
- Measures- these involve installation of physical barriers , security lighting , use of vaults, locks and others.
- - faith in oneself and his abilities
- zone-is an unobstructed area maintain on both sides ofbthe perimeter barrier
- System-an installation owned system which is direct extension of the local enforcement agency and /or fire department by special arrangement.
- a metallic container used for the safekeeping of document or small items in an office or installation.
- - an indication of impending danger or harm.
20 Clues: a chance of being injured or harmed. • - faith in oneself and his abilities • - an indication of impending danger or harm. • to deal with others succesfully without offending • avoidance-removing the risk totally from the business. • reduction- minimizing the probability of the potential loss • bell-a hollow device made of metal that makes a ringing sound • ...
Industrial security 2025-10-15
Across
- – A weakness that can be exploited by threats.
- – A prepared procedure to handle emergencies or disasters.
- – Device that signals when unauthorized access occurs.
- – Continuous observation of people or areas for security purposes.
- – Protection of computer systems from digital attacks.
- – The process of identifying and evaluating potential hazards.
- – A set of rules and guidelines for security operations.
- – The act of stealing small quantities or low-value items from the workplace.
- – A person employed to protect property and personnel.
- – The routine inspection of areas to ensure safety and security.
Down
- – Unauthorized entry into a restricted area.
- – A designated safe route used during an evacuation.
- – A badge used for identification and access within a facility.
- – A potential cause of unwanted incident or harm.
- – The act of keeping people and assets safe from harm.
- – Written documentation of a security event or breach.
- – Security measure restricting movement due to threats.
- – A system that uses video cameras to monitor and record activities.
- – A system that restricts entry to authorized personnel only.
- – The deliberate destruction or disruption of industrial operations.
20 Clues: – Unauthorized entry into a restricted area. • – A weakness that can be exploited by threats. • – A potential cause of unwanted incident or harm. • – A designated safe route used during an evacuation. • – The act of keeping people and assets safe from harm. • – Written documentation of a security event or breach. • ...
Cyber Ready 2022-09-15
Across
- A person who uses technical skills and technology to gain unauthorized access to systems, networks, or data to commit crimes.
- A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones
- The act of applying effective technical and practical security measures to meet the regulatory or contractual requirements of a third party.
- URLS that lead the user to download a virus or visit a harmful website
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
- The probability of exposure or loss that can result from a cyberattack or data breach
- A self-replicating program that spreads across a network
- Malicious code that spreads through devices to damage them or steal the data within them.
Down
- A type of phishing based on previously gathered information about a target that's publicly available or gained from a data breach.
- . A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
- The possibility of an attack to gain unauthorized access to, damage, or steal information, intellectual property, or data.
- A type of phishing attack that tricks C-suite employees into falling for some sort of emergency where they click a link or attachment that installs malware or steals sensitive information
- Malicious code intended to monitor your activity without your permission.
- preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.
- Settings on folders or files that control who is allowed to access them.
- Unauthorized entry to gain access to computer data, applications, networks, or devices.
- A security approach based on the concept that all users both inside and outside an organization's network must have security authentication, authorization, and validation before gaining access to applications or data
- An attack intended to make a machine or network inaccessible to its authorized users
18 Clues: A self-replicating program that spreads across a network • URLS that lead the user to download a virus or visit a harmful website • Settings on folders or files that control who is allowed to access them. • Malicious code intended to monitor your activity without your permission. • ...
CyberSecurity Trivia 2024-07-09
Across
- Unsolicited emails
- Protection of physical assets
- Authentication method using two steps
- Copy of data for recovery
- Protection of personal information
- Harmful software
- Monitoring for unauthorized access
- Potential danger
- Software to detect and remove viruses
- Epiq's CISO
- Network security barrier
- Ethical hacking to find vulnerabilities
- Evaluation of potential threats
Down
- Data protection through coding
- Encrypted communication protocol
- Adherence to regulations
- Examination of security measures
- Network security barrier (again)
- Offensive action against computer systems
- Process of updating software vulnerabilities
- Permission to access resources
- Weakness in a system's security
- Software update to fix vulnerabilities
- Psychological manipulation for information
- Verification of who someone is
- Science of secure communication
- Protection against threats
- Breach of security
- Overwhelming a system to deny access
- Deceptive email or website to steal information
30 Clues: Epiq's CISO • Harmful software • Potential danger • Unsolicited emails • Breach of security • Adherence to regulations • Network security barrier • Copy of data for recovery • Protection against threats • Protection of physical assets • Data protection through coding • Permission to access resources • Verification of who someone is • Weakness in a system's security • ...
SPANISH I- UNIT 4 VOCABULARY 2022-02-06
28 Clues: link • send • virus • memes • reply • smile • games • survey • photos • e-mail • videos • emojis • victims • unknown • privacy • get mad • receive • selfies • bullying • to extort • antivirus • get happy • cell phone • accessories • social media • text message • abbreviations • cyber criminals
SPANISH I- UNIT 4 VOCABULARY 2022-02-06
28 Clues: send • link • games • memes • smile • virus • reply • e-mail • videos • survey • photos • emojis • unknown • receive • privacy • victims • get mad • selfies • bullying • get happy • to extort • antivirus • cell phone • accessories • text message • social media • abbreviations • cyber criminals
Fall 2024 2024-09-23
20 Clues: Ten • New VP • Governor • New Office • Six Million • GM for NETM • Cyber Attack • Mulch Colors • Tool Cabinet • GNEMA Honoree • Railway Flood • Red Sox's Home • Intern Project • Kyle's New Role • Picnic Location • Payroll Manager • 1st Place Winner • Blumenthal Presented • Best Portrait Winner • North Branford SB Driver
UNSC: Fun Facts! 2021-09-25
Across
- The sole country aside from the five permanent members to be included in the working process of the Iran Nuclear Deal.
- The member state which currently holds the presidency of the Security Council.
- The presidency of the Security Council is rotated every month among its member states based on _____ order.
- An operation that is established through the adoption of a Security Council resolution.
- The Security Council is empowered to impose _____ obligations on the 193 UN member states to maintain peace through its resolutions.
- The location of the UN Security Council’s headquarters.
Down
- The smallest country to secure a seat in the Security Council.
- The most frequent user of the veto, blocking more than one hundred resolutions since the founding of the Security Council.
- A procedure to determine the rest 10 non-permanent members to have a seat in the Security Council in two-year terms.
- One of the first two peacekeeping operations deployed by the UN.
- Regulated in Chapter VI of the UN Charter, the Security Council suggests member states to choose a ______ settlement of dispute method as the first action possible.
- The measure of punishing a certain regime to maintain or restore international peace and security that can be taken by the Security Council.
- The name of the city where the first meeting of the Security Council took place back in January 17, 1946.
- The power of the five permanent members to block a resolution in the Security Council from being passed.
- To be adopted, a Security Council resolution must have the affirmative vote of ____ members of the Council, including the concurring votes of the five permanent members.
15 Clues: The location of the UN Security Council’s headquarters. • The smallest country to secure a seat in the Security Council. • One of the first two peacekeeping operations deployed by the UN. • The member state which currently holds the presidency of the Security Council. • An operation that is established through the adoption of a Security Council resolution. • ...
CISO Crossword Quiz - 1825 2025-03-29
Across
- All the data about a person generated while interacting with the internet, from browsing history and social media posts to online purchases and app usage called _______
- The process of sending indiscriminately unsolicited bulk messages/emails to a large number of internet users with the intention of scamming is called ______
- Cybercriminals creating sophisticated scams like advanced phishing, deepfakes etc. by using a technology that enable computers to simulate human-like intelligence is called ______
- ______ often called the weakest link in the cyber security chain because of fear, greed and lack of awareness
- ______ is a cyber scam in which fraudsters convince the victim to merge the WhatsApp registration OTP call to access the OTP & to take over the WhatsApp account of victim
Down
- The “C” in the C-I-A Triad stands for ______
- ______ is a type of malware that downloads onto a computer disguised as a legitimate program/software
- ______ is a technique where the first eight digits of your Aadhaar number are hidden and only the last four digits are displayed, enhancing privacy and reducing the risk of misuse of your Aadhaar data
- To pose or pretend to be another person in email by forging the sender address of an email to make it appear legitimate is called Email ______
- Passwords that contain easy-to-guess information like common words, personal information like names or dates, simple sequences, or easily guessed keyboard patterns called ______ password
10 Clues: The “C” in the C-I-A Triad stands for ______ • ______ is a type of malware that downloads onto a computer disguised as a legitimate program/software • ______ often called the weakest link in the cyber security chain because of fear, greed and lack of awareness • ...
The Zero-Trust Puzzle 2025-10-29
Across
- Managed DDoS protection service safeguarding applications on AWS
- Core service managing fine-grained access control to AWS resources
- Service enabling private connectivity between VPCs and services without internet exposure
- Automated security assessment service identifying vulnerabilities and deviations
- Service for provisioning, managing, and deploying SSL/TLS certificates
- Advanced web application firewall service providing customizable rules for threat mitigation
- Security service that automatically analyzes CloudTrail events for potential security incidents
- Continuous security monitoring service providing intelligent threat detection
Down
- Network security service providing stateful inspection of traffic at multiple layers
- Centralized service for managing, rotating, and accessing encryption keys and credentials
- Managed service handling user authentication and authorization with enhanced security features
- Data security service that discovers and protects sensitive data using machine learning
- Service providing detailed history of API calls for security analysis and compliance
- Managed service for creation and control of encryption keys across AWS services
- Central hub aggregating security alerts and compliance status across AWS accounts
15 Clues: Managed DDoS protection service safeguarding applications on AWS • Core service managing fine-grained access control to AWS resources • Service for provisioning, managing, and deploying SSL/TLS certificates • Continuous security monitoring service providing intelligent threat detection • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-03-03
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive information, typically via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • Cyber_____ is the process of protecting information by preventing, detecting, and responding to attacks. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • ...
Cyber Safety 2021-08-25
Seminar 4 Crossword 2013-07-10
Across
- With any computer, you should shut down any _______ you do not need
- Also called a DMZ
- The third phase of assessing a system's security using the Six P's
- The minimum frequency for system probing and auditing is once per _____
- The most important factor when looking for a security professional
- You should block all ______ ports
- Room where servers are kept. It should have a strong door with a strong luck, such as a deadbolt
- Command typed at the command line to edit your registry
- The most respected security certification
- The preferred method for storing backups
Down
- It is absolutely essential that any organization have clearly written _______ on computer security
- The process of securing a computer system against hackers, malware, and other intruders
- Old media should be thoroughly ________ when no longer needed
- Any legitimate security professional will not mind giving you ______
- All communication takes place via some ______
- ________ access to routers, hubs, and switches should be tightly controlled (Last of the Six P's)
- The first rule of computer security is to check for ______
- It is key to periodically ______ your network for security flaws (One of the Six P's)
- Only download from well-known, ______ sites
- The most widely used vulnerability scanner available today
20 Clues: Also called a DMZ • You should block all ______ ports • The preferred method for storing backups • The most respected security certification • Only download from well-known, ______ sites • All communication takes place via some ______ • Command typed at the command line to edit your registry • The first rule of computer security is to check for ______ • ...
Miljoonaristikko 2024-08-01
17 Clues: Jackman • Bobin uhri • cyber-Keanu • Jackdaw'n kapu • heränneen vaimo • roihuava summon • CTU:n jääkiekkoa • tomaatti paukkuu • Barbien kumppani • fantastinen herra • Hugon sugar mamma • arpipojan vankila • kuvitti gallialaiset • Tekkenin vanha körmy • talven tuulten tuoja • jalkoja & väkivaltaa • "... you're small-time."
training 2024-10-28
Across
- A set of data that describes and provides information about other data.
- Person or unit responsible for managing a particular document.
- Required only for a limited time to ensure the completion of a routine action or the preparation of a subsequent record.
- A controlled environment for the management of information.
- The seven stages of properly managing information.
Down
- The final stage in the life of a record.
- Information that could reasonably be expected to cause injury to an individual, organization or government that lies outside of the national interest.
- Provides a right of access to information in records under the control of a government
- A TBS instrument that supports the management of service delivery, information and data, information technology, and cyber security in the digital era.
- The official way for organizing HC/PHAC information.
- The official electronic document management system for the Government of Canada.
11 Clues: The final stage in the life of a record. • The seven stages of properly managing information. • The official way for organizing HC/PHAC information. • A controlled environment for the management of information. • Person or unit responsible for managing a particular document. • A set of data that describes and provides information about other data. • ...
comment les communautées virtuelles fragilisent-elles les liens sociaux? 2022-02-14
Across
- transposition virtuells d'un comportement humain mauvais
- peut raisoudre une situation de cyber-harcèlement
- de quoi line souffre-t-elle?
- nom de votre école
- ensemble de personnes liées par l'intermédiaires d'internet
- soeur d'adèle et de tom
Down
- où se trouvent les communautées virtuelles
- effet de l'abscence de limites espace/temps sur l'impact des communautées virtuelles
- lien fragilisé par les communautées virtuelles
- exemple de communautée virtuelle
- fragilise les liens sociaux
11 Clues: nom de votre école • soeur d'adèle et de tom • fragilise les liens sociaux • de quoi line souffre-t-elle? • exemple de communautée virtuelle • où se trouvent les communautées virtuelles • lien fragilisé par les communautées virtuelles • peut raisoudre une situation de cyber-harcèlement • transposition virtuells d'un comportement humain mauvais • ...
information security 2020-12-18
Across
- a written or spoken description that says what happens in an event or process
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the right to enter a place, use something, see someone etc
- to make a short hard sound, or make something produce this sound
- to take something that belongs to someone else
- when something bad is stopped from happening
- the crime of stealing
- relating to crime
- relating to computers, especially to messages and information on the Internet
- the act of deliberately making someone believe something that is not true
Down
- someone who is in a position of authority in an organization
- to make a computer, machine, or piece of software better and able to do more things
- informal someone who secretly uses or changes the information in other people’s computer systems
- a clever but dishonest way to get money
- a group of related parts that work together as a whole for a particular purpose
- the place where you pay or are served in a shop, bank, restaurant etc
- the sets of programs that tell a computer how to do a particular job
- a machine or tool that does a special job
- to keep someone or something safe from harm, damage, or illness
- to damage something so badly that it no longer exists or cannot be used or repaired
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • someone who is in a position of authority in an organization • ...
information security 2020-12-18
Across
- to keep someone or something safe from harm, damage, or illness
- the state of being able to be alone, and not seen or heard by other people
- the sets of programs that tell a computer how to do a particular job
- to calculate a result, answer, sum etc
- what you earn by working and can use to buy things
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
- a small plastic card that you use to buy goods or services and pay for them later
- connect people
- someone who steals things from another person or place
- someone who secretly uses or changes the information in other people’s computer systems
Down
- someone who is in a position of authority in an organization
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- facts or details that tell you something about a situation, person
- the act of deliberately making someone believe something that is not true
- the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
- very convenience
- a group of related parts that work together as a whole for a particular purpose
- seeming bad or dishonest
- relating to crime
- to damage something so badly that it no longer exists or cannot be used or repaired
21 Clues: connect people • very convenience • relating to crime • seeming bad or dishonest • to calculate a result, answer, sum etc • what you earn by working and can use to buy things • someone who steals things from another person or place • someone who is in a position of authority in an organization • to keep someone or something safe from harm, damage, or illness • ...
information security 2020-12-18
Across
- to keep someone or something safe from harm, damage, or illness
- the state of being able to be alone, and not seen or heard by other people
- the sets of programs that tell a computer how to do a particular job
- to calculate a result, answer, sum etc
- what you earn by working and can use to buy things
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
- a small plastic card that you use to buy goods or services and pay for them later
- connect people
- someone who steals things from another person or place
- someone who secretly uses or changes the information in other people’s computer systems
Down
- someone who is in a position of authority in an organization
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- facts or details that tell you something about a situation, person
- the act of deliberately making someone believe something that is not true
- the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
- very convenience
- a group of related parts that work together as a whole for a particular purpose
- seeming bad or dishonest
- relating to crime
- to damage something so badly that it no longer exists or cannot be used or repaired
21 Clues: connect people • very convenience • relating to crime • seeming bad or dishonest • to calculate a result, answer, sum etc • what you earn by working and can use to buy things • someone who steals things from another person or place • someone who is in a position of authority in an organization • to keep someone or something safe from harm, damage, or illness • ...
Physical Security 2021-05-27
Across
- Digital Center location
- They monitor fire and alarm signals
- Designated "Captains"
- The top shortage department, as a Company
- Bart's Middle Name
- In 2021, Kohl's moved from Microsoft office programs entirely to this platform
- The building that screams innovation by name
- Newest Men's clothing brand launch
- Got a Human Resource question?
- Used to be granted access
- He is a Star Wars buff and was a drummer in a band
- The "S" in EAS
- Kohl's VMS CCTV Platform
- It is 1 of 2 buildings, service happens here
- We like to recognize people for this
- Milpitas is a Santa Clara County, located in this Valley
- We are a top 50 company for
- Not from the West or the Midwest, LP TLPM leader
- The program that "Pays" when you are honest
- This site is located on Broadway
- Where to go on MyKohls to achieve your ideal level of wellbeing
- Abbr for Closed Circuit Television
- To get paid, enter hours here
- 200 this year, 800 by the end of 2023
- hash (#) tag it!
Down
- In 2019, we partnered with this powerhouse to drive traffic in our stores through returns
- During these, the correct response is to run, hide or fight
- Hospitatlity isn't just a thought, it is a?
- The "Z" in PTZ
- Loss Preventions "eyes in the sky" to assist with the boots on the ground
- The site to be kept "in the know"
- Each June we celebrate this for the month
- As an associate you get 15% off, also known as this
- Check this to understand the "point" of the alarm
- He won't have the key, but he can pin you the core
- We provide, through volunteering
- Kohl's Corporate office is 16 miles from this Baseball teams stadium
- This Kohl's building is designated to "strike a pose"
- Abbr for the groups committed to driving business through our people
- Onguard, also known as
- Panic type alarm, also recently installed in exec offices
- Technology that prevents the same access badge from being used consecutively
- Played in a movie as a pitcher
- This caused store closures in 2020
- Service needs are entered in here
- Another name for Kohl's rewards, it's a program
- Automated external difibrillator, abbr
- The San Antonio Credit Center shares it's home with this famous battle
- This discontinued item caused the largest customer calls to the corporate office
- Loss Preventions purpose, to reduce
50 Clues: The "Z" in PTZ • The "S" in EAS • hash (#) tag it! • Bart's Middle Name • Designated "Captains" • Onguard, also known as • Digital Center location • Kohl's VMS CCTV Platform • Used to be granted access • We are a top 50 company for • To get paid, enter hours here • Got a Human Resource question? • Played in a movie as a pitcher • We provide, through volunteering • ...
information security 2022-01-15
Across
- Seeming dishonest or false.
- To put furniture, a machine, or a piece of equipment into position and make it ready to use.
- If someone is agreed to do something, they are allowed to do it.
- To make something more modern or suitable for use now by adding new information or changing its design
- A particular form of something.
- To react to something with an opposing opinion or action.
- In a far place.
- Relating to a position of responsibility.
- A piece of work to be done with difficulty.
- Happening or existing before something or someone else.
Down
- To copy or move programs or information into a computer's memory.
- A typical quality or an important part of something.
- An illegal plan for making money, especially one that involves tricking people.
- A particular way of doing something.
- to slide something, especially cloth,in order to remove dirt, food, or liquid.
- Agreement that something is true or legal.
- The development or improvement of something.
- Physical or mental activity needed to achieve something.
- Pressing a button on the mouse or keyboard.
- Used or download data.
20 Clues: In a far place. • Used or download data. • Seeming dishonest or false. • A particular form of something. • A particular way of doing something. • Relating to a position of responsibility. • Agreement that something is true or legal. • Pressing a button on the mouse or keyboard. • A piece of work to be done with difficulty. • The development or improvement of something. • ...
information security 2022-01-15
Across
- Seeming dishonest or false.
- To put furniture, a machine, or a piece of equipment into position and make it ready to use.
- If someone is agreed to do something, they are allowed to do it.
- To make something more modern or suitable for use now by adding new information or changing its design
- A particular form of something.
- To react to something with an opposing opinion or action.
- In a far place.
- Relating to a position of responsibility.
- A piece of work to be done with difficulty.
- Happening or existing before something or someone else.
Down
- To copy or move programs or information into a computer's memory.
- A typical quality or an important part of something.
- An illegal plan for making money, especially one that involves tricking people.
- A particular way of doing something.
- to slide something, especially cloth,in order to remove dirt, food, or liquid.
- Agreement that something is true or legal.
- The development or improvement of something.
- Physical or mental activity needed to achieve something.
- Pressing a button on the mouse or keyboard.
- Used or download data.
20 Clues: In a far place. • Used or download data. • Seeming dishonest or false. • A particular form of something. • A particular way of doing something. • Relating to a position of responsibility. • Agreement that something is true or legal. • Pressing a button on the mouse or keyboard. • A piece of work to be done with difficulty. • The development or improvement of something. • ...
