cyber security Crossword Puzzles
information security 2022-01-15
Across
- Seeming dishonest or false.
- To put furniture, a machine, or a piece of equipment into position and make it ready to use.
- If someone is agreed to do something, they are allowed to do it.
- To make something more modern or suitable for use now by adding new information or changing its design
- A particular form of something.
- To react to something with an opposing opinion or action.
- In a far place.
- Relating to a position of responsibility.
- A piece of work to be done with difficulty.
- Happening or existing before something or someone else.
Down
- To copy or move programs or information into a computer's memory.
- A typical quality or an important part of something.
- An illegal plan for making money, especially one that involves tricking people.
- A particular way of doing something.
- to slide something, especially cloth,in order to remove dirt, food, or liquid.
- Agreement that something is true or legal.
- The development or improvement of something.
- Physical or mental activity needed to achieve something.
- Pressing a button on the mouse or keyboard.
- Used or download data.
20 Clues: In a far place. • Used or download data. • Seeming dishonest or false. • A particular form of something. • A particular way of doing something. • Relating to a position of responsibility. • Agreement that something is true or legal. • Pressing a button on the mouse or keyboard. • A piece of work to be done with difficulty. • The development or improvement of something. • ...
Food Security 2017-04-29
Across
- Acquire from foods, used to nourish a person’s physical condition.
- Far from average.
- A humid and hot climate.
- No water, climate problem.
- Have nothing.
- What makes a something unique.
- Physical injured by bacteria.
- Not enough nutrition to supply a person’s body.
- Financially challenged.
- Accept, permit.
- Fairness, unbiased.
- Supply, grant.
- An epidemic of infectious disease.
Down
- Something that’s used to solve an issue.
- Enough to fill one’s desire.
- Demand, use.
- Farming, planting.
- Misuse, devastation.
- Fighting, suffering.
- Units of energy.
- Make, manufactured.
- Accessibility.
- Around the world.
- Respect and basic human rights.
- Too much body weight.
- Separate an item with someone.
- Accept, back off.
- A kind of natural effect with a short duration of time.
- Used to purchase goods.
- No foods, or anything to fill one’s stomach.
30 Clues: Demand, use. • Have nothing. • Accessibility. • Supply, grant. • Accept, permit. • Units of energy. • Far from average. • Around the world. • Accept, back off. • Farming, planting. • Make, manufactured. • Fairness, unbiased. • Misuse, devastation. • Fighting, suffering. • Too much body weight. • Used to purchase goods. • Financially challenged. • A humid and hot climate. • No water, climate problem. • ...
Security Awareness 2016-04-12
Across
- Cleartext data that is to be encrypted and decrypted by a cryptographic algorithm
- Spam that uses graphical images of text in order to circumvent text-based filters
- An email client feature that allows the user to read an email message without actually opening it
- A set of security standards that all U>S> companies processing, storing , or transmitting credit card information must follow
- Cryptographic algorithms that use a single key to encrypt and decrypt a message
- An earlier email protocol for handling incoming mail
- Cryptography that uses two mathematically related keys
- A publicly released software security update intended to repair a vulnerability
- A global network that allows devices connected to it to exchange information
- A more recent and advanced email protocol
- Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- The process of proving that a user performed an action
- The ability to remotely erase data stored on a mobile device
- A false warning intended to trick a user into performing an action that will compromise security
- An asymmetric encryption key that does not have to protected
- Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data
Down
- An asymmetric encryption key that does have to be protected
- Malware that prevents a user's device from properly operating until a fee is paid
- A web browser addition that adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser that normally it could not play or display
- One of several types of tools for securing passwords, including password generators, online vaults, and password management application
- A language that allows web authors to combine text, graphic images, audio, and video into a single document
- Malware that can trigger arbitrary code execution from one computer to a second computer over a network or the internet
- Stealing another person's personal information, such as a social security number, and then using the information to impersonate the victim, generally for financial gain
- A situation that involves exposure to danger
- Software that runs as a program on the local computer to block or filter traffic coming into and out of the computer
- A Microsoft Office function that automatically opens documents attached to emails in a read-only mode that disables editing functions
- The most recent version of html that standardizes sound and video formats
- A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows
- The tasks of protecting the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures
- A U.S. law designed to fight corporate corruption
- The most widely known and influential organization in the field of computer networking and wireless communications
- A set of software tools used by an attacker to hide the actions or presence of other types of malicious software
- Creating an invented scenario to persuade the victim to perform an action or provide confidential information
- Removing the built-in limitations and protections on Google Android devices
- Employees, contractors, and business partners who can be responsible for an attack
- The state or condition of being free from public attention to the degree that the user chooses
36 Clues: A more recent and advanced email protocol • A situation that involves exposure to danger • A U.S. law designed to fight corporate corruption • An earlier email protocol for handling incoming mail • Cryptography that uses two mathematically related keys • The process of proving that a user performed an action • ...
Operations Security 2019-10-08
Across
- should only be work onsite (seatbelt on _______ off)
- What is the abbreviation of the list that shows the commands critical information
- What you should do to your anti-virus software
- ___________ of scientific an tecnical information (RSTI) approval is needed to obtain a distribution statement
- Making changes to reduce your vulnerability to adversaries
- Profiles on social media used to get your attention
- "Computer1234" is a bad example of this
- _________ information is what OPSEC protects
- What potential harm from bad OPSEC practices is called
- OPSEC is a __________ effort
- __________ tweets sink fleets
- Emails that contain PII, FOUO or critical informaation senders must do this
Down
- posting pictures of this could put your family at risk
- The number of steps in the OPSEC process
- What a weakness in our practices or defense is called
- This marks your photos with longitude and latitude information
- What you should not take with your smartphone or camera anywhere onsite
- An adversary is considered a ________
- The kind of email account you can't use to conduct government business
- These settings should be used on social media
- A threat must have intent and ________ to do harm to the United States to be considered a threat
- An option to protect your credit
- the most commonly used social media platform by adversaries to target government employees and contractors
- What should you remove when you walk away from your NMCI computer
- The Freedom of Information Act is for what type of information
- How to destroy all FOUO documents
26 Clues: OPSEC is a __________ effort • __________ tweets sink fleets • An option to protect your credit • How to destroy all FOUO documents • An adversary is considered a ________ • "Computer1234" is a bad example of this • The number of steps in the OPSEC process • _________ information is what OPSEC protects • These settings should be used on social media • ...
Network Security 2015-04-03
Across
- Use of cryptographic systems to provide message-by-message authentication and integrity
- Cyber-attacks by national governments
- The attacks and attackers that companies face
- Layers of defense such that all must be breached for an attacker to succeed
- Method for malware to move to a victim computer
- Tricking the victim into doing something against his or her interests
- Attackers who use scripts or other applications developed by more experienced attackers
- Worm that will automatically infect other computers without any user interaction
- A vulnerability-specific attack that occurs before a patch is available
- Some form of proof of identity
- Attempting to guess a password by using every possible combination of characters
- Mandatory directives that must be followed during implementation
- Entity trying to prove their identity by supplying some form of credentials
- Attempting to guess a password based on dictionary patterns with basic modifications to dictionary words such as capitalization or digit replacement
- Scripts that travel with the downloaded webpage from the webserver to the browser where they are executed locally
- Method of authentication that uses of a private key, pubic key and a trusted verifier
- Broad statements of what should be accomplished, not how to accomplish it
- Attempting to guess a password by trying all the words in a standard or custom dictionary
- Long passwords that contain a mix of lowercase letters, uppercase letters, numeral characters, and symbols
- Lying to get victims to persuade them to do something against their financial self-interest
- Formalized plan to reestablish a firm’s ability to continue functioning after a devastating event
- Full stand-alone malware programs that operates and or replicates by itself
- A flaw in a program that permits a specific attack or set of attacks against a piece of software or hardware
- Instructions that are merely optional guidelines for implementation
- Process of balancing threats and protection costs for individual assets
- A name given to software that collects information about the user and the system without their knowledge and reports this info to another system for tracking
- Attacking your own systems to discover their weaknesses
- Collecting enough data about a victim to impersonate the victim and assume their identity for financial transactions
- Intentionally using a computer resource without authorization or in excess of authorization
Down
- The actions that a person given access to a resources is allowed to take
- A pair of algorithms used to encrypt and decrypt secure communications
- Methods and processes to ensure policies have been implemented properly
- deep inspection of application messages across multiple packets to identify malicious activity
- Procedures to capture and safeguard data as evidence for criminal court proceedings
- Formalized plan to reestablish IT operations within a firm
- Hardware or software that examines packets and determines if they are allowed to pass or not
- Use of authentic-looking e-mail or websites to entice the user to send his or her personal and/or confidential information
- Cyber attackers by terrorists
- Part of a piece of malware that performs malicious actions
- The practice and study of techniques for securing confidential communications
- Alternate way back into a system
- Process or program that takes advantage of a known vulnerability
- Successful attacks
- Filtering messages that are arriving at a company’s firewall from an outside source destined for hosts inside the trusted company network
- Pieces of executable code that attach themselves to other programs
- A malicious program that disguises itself as a legitimate system file
- Username and password combination that are relatively static in nature and are used each time authentication occurs; most common authentication method
- Use of two authentication methods such as something you know, something you have, or something you are
- Closing off all avenues of attack
- DoS attack committed by a distributed number or simultaneous attackers
- Filtering messages that arrive at a company’s firewall from inside the trusted network destined for hosts on the outside
- Limiting who may have access to each resource and limiting permissions to what they are able to do with the resource
- Use of measurements of a person’s attributes for authentication purposes
- General term for any evil software that does harm to your system
- Trusted system or entity that will verify a supplicant’s identity
- Making a computer or entire network unavailable to legitimate users by various means
- Sample actions taken for policy oversight
- General purpose exploitation programs that can be remotely controlled after installation
58 Clues: Successful attacks • Cyber attackers by terrorists • Some form of proof of identity • Alternate way back into a system • Closing off all avenues of attack • Cyber-attacks by national governments • Sample actions taken for policy oversight • The attacks and attackers that companies face • Method for malware to move to a victim computer • ...
IT Security 2014-04-07
Across
- providers: is another thraet for data
- engineering:A type of confidence trick for the purpose of information gathering, fraud, or system access
- raw facts
- Area Network : is a system whereby individual PCs are connected together within a company or organisation
- Identity theft and Fraud: is a way to protect personal data
- is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
- Private Network :is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
- that should stay secret stays secret and only those persons authorized to access it may receive access.
- hacking:___________ can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
- is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page
Down
- data prosed in some way
- is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
- is a software program designed to provide a user with administrator access to a computer without being detected.
- Area Network: as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
- backdoor: is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
- surfing: is using direct observation techniques, such as looking over someone's shoulder, to get information
- is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
- individuals: more threat of data
- is a threat for data
- is To move an infected file, such as a virus, into an area where it cannot cause more harm
- is a technique of fraudulently obtaining private information
- is when someone modifies computer hardware or software in a way that alters the creator's original intent.
- is a group of two or more computer systems linked together.
- theft: is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
24 Clues: raw facts • is a threat for data • data prosed in some way • individuals: more threat of data • providers: is another thraet for data • Identity theft and Fraud: is a way to protect personal data • is a group of two or more computer systems linked together. • is a technique of fraudulently obtaining private information • ...
Security Acronyms 2016-06-04
Across
- w
- 2nd largest trade show
- AKA IPS
- Curacao
- c
- simpky
- port 554
- may I exit please
- Patent
- DB, but not decibels
- I
- L
- worth a thousand words
Down
- Phonebook for computers
- 2.4 or 5.0
- Indirectly connected storage
- Leased IPs
- succeeded where PSIA failed
- simple
- Cameras POV
- time
- Duplicative set of cheap media
- Milestone, Exacq, Genetec
- tvi
- h
- their way or the highway
26 Clues: w • c • h • I • L • tvi • time • simple • simpky • Patent • AKA IPS • Curacao • port 554 • 2.4 or 5.0 • Leased IPs • Cameras POV • may I exit please • DB, but not decibels • 2nd largest trade show • worth a thousand words • Phonebook for computers • their way or the highway • Milestone, Exacq, Genetec • succeeded where PSIA failed • Indirectly connected storage • Duplicative set of cheap media
Security Crossword 2023-03-30
Across
- Type of patrol
- What the hall located on A1 where the game room is located
- The red button at the reception desk
- Integrity without (blank)
- If there is a building issue, you open a (blank)
- Security office room number
- The area in which the site is located
- Where you can search for and employees email or desk location
- GSOC phone number
- The emergency phones in the parking garage
- Where is Barry Pennett's Office Number?
- Supervisors phone number
- Conference room named after a flower on B2
- Tab in QuickBase where you log you D.A.R.
- When a door does not close, it is called a (blank)
- An outside contractor gets a badge labeled (black) at the bottom
- Tab in QuickBase where you log "lost and found" item
Down
- Room where air handlers are located
- Room were 3-6 employees can meet
- How many AEDs do we have onsite?
- Largest conference room in Building B
- Camera system we use
- Page 29 in the Post orders: Privacy and (blank)
- Reception desk phone number
- Monthly tasks/projects
- Largest conference room on A2
- Document that holds site specific policies and procedres
- Total number of patrols to be completed each shift
- Communication at the starts and end of each shift
- Page 37 in the Securitas Handbook
30 Clues: Type of patrol • GSOC phone number • Camera system we use • Monthly tasks/projects • Supervisors phone number • Integrity without (blank) • Reception desk phone number • Security office room number • Largest conference room on A2 • Room were 3-6 employees can meet • How many AEDs do we have onsite? • Page 37 in the Securitas Handbook • Room where air handlers are located • ...
Security 2 2024-02-28
Across
- - Used by all software applications on a network system to identify the software application or service; numbers range from Oto 65,535.
- - Written for the express purpose of modifying a computer's configuration or causing damage to a computer system.
- - False message spread about a real or unreal virus: not actually a virus.
- - Hardware device or software application that protects the computer from unauthorized access or malware delivered through a network or Internet connection.
- - Virus created using a macro programming language, and it is attached to documents that use the language.
- - Program that automatically disables a telephone modem that is dialing a number and automatically switches to another phone number.
- - Designed to track a user's habits such as their web browsing habits.
- - E-mail used to impersonate a legitimate company or institution, thus fooling the user into believing the e-mail is from a trusted source.
- - Refers to a collection of malware that is not regarded as very dangerous, but rather more of a nuisance.
- - Works with the Trusted Platform Module (TPM) to verify the successful launch of the operating system and store the information in the TPM.
- - Attacks the master boot record (MBR) of a hard drive and is considered extremely destructive.
- - Interception of a transmission over a network.
- - Collection of infected computers controlled by a source computer.
- - Small text file used to send information about a user to a server.
- - Consists of a collection of software programs that installs on a computer and allows an intruder to take administrative control.
- - Software application that performs specific network functions.
- - Destructive program that contaminates files on the infected computer and spreads to other computers without prompting from the user.
- - Combination of characteristics that include such things as its length, file name(s) used, mode of infection or replication, the areas of the system that are attacked, the type of software programs that are attacked, and the name or length of the file attachment.
- - Gathers information about a user's web-browsing habits.
Down
- - Program that changes the configuration of a browser.
- - Type of malware that seizes control of your computer and demands payment to unlock it.
- - Designed to support advertisements such as popups and may also gather information about the user.
- - Class of virus that appears as a desired download.
- - Occurs when a network server or web server is flooded with requests to the point that it cannot fulfill the request.
- - Hides from normal detection by incorporating itself into part of a known, and usually required, program for the computer.
- - Designed to breach security and steal passwords.
- - Destructive program that is slipped into an application and remains dormant until some event takes place.
- - Deceptive practice based on poisoning a Domain Name Service (DNS) server with an incorrect IP address for a website.
- - Software that is typically written to duplicate itself and, in the process. cause problems and possible permanent damage to a computer.
- - Virus that changes as it evolves to resist detection.
- - Designed to go undetected and leave a hole in the security system of a computer or network.
- - Unsolicited junk e-mail or junk electronic newsletters.
- - Windows feature that checks the integrity of the operating system during the boot process and only allows digitally signed software to boot and run on the computer.
33 Clues: - Interception of a transmission over a network. • - Designed to breach security and steal passwords. • - Class of virus that appears as a desired download. • - Program that changes the configuration of a browser. • - Virus that changes as it evolves to resist detection. • - Unsolicited junk e-mail or junk electronic newsletters. • ...
Security Squares 2022-07-14
Across
- A "tear" in the wall
- Hidden code that steals
- Alternative to the front
- Should be easy to remember
- Data inspection/what a blood hound is known for
- Pretending to be someone you're not
- A targeted attack
- "The Borg" under control
- A common cold
- Disguised as a legitimate program
Down
- Unauthorized domain registration
- Holding "Brent Spiner" hostage
- Need a key to open
- Unwanted online material
- Program that's intentionally harmful
- Hacker way to shutdown a network
- What you do with a hook, rod and reel
- Don't write this on a notepad
- Used by titans to catch fish
- A "secret" scrambled code
20 Clues: A common cold • A targeted attack • Need a key to open • A "tear" in the wall • Hidden code that steals • Unwanted online material • Alternative to the front • "The Borg" under control • A "secret" scrambled code • Should be easy to remember • Used by titans to catch fish • Don't write this on a notepad • Holding "Brent Spiner" hostage • Unauthorized domain registration • ...
Security Training 2023-05-05
Across
- the basics of reading, writing and verbalizing is called this
- they're like the ADT Service for Amazon - call them for all emergencies
- this program is used to look up badge tracing
- program used to monitor alarms
- this website houses all your security programs
- often hired to perform functions that others can't; often carries a 'yellow badge'
- primary internal messaging system
- the last name of the founder of Amazon
- this shouldn't be present at the desk
- area to report to when flagged for screening
Down
- there are a variety of these that should be completed by each shift
- these are the folks that work in the Yard
- used to support a decision, enforce something or help reflect upon when unsure
- this is the only TIER 1 alarm; it's the brain of IT/Amazon
- bathroom checks would reveal this type of 'artwork'
- we shouldn't be using this at the desk
- these are conducted when something is reported to you
- this acronym is what you are measured upon when reacting to something
- This program enters visitors
- this company was founded in a garage in 1994
- training tool that records your trainings and ensures you're up to date with training needs
- this is the name of the camera system we use
22 Clues: This program enters visitors • program used to monitor alarms • primary internal messaging system • this shouldn't be present at the desk • we shouldn't be using this at the desk • the last name of the founder of Amazon • these are the folks that work in the Yard • this company was founded in a garage in 1994 • this is the name of the camera system we use • ...
Security puzzle 2023-09-21
Across
- A security technique that adds an extra step and requires users to enter more information than just a password (abbreviation)
- A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
- The process of taking plain text and scrambling it into a code that is in an unreadable format
- Sending unwanted bulk messages to a large number of recipients, often commercial in nature without consent of the recipients
- A software designed to detect and destroy computer viruses
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- Email sent trying to get user to click on a malicious link
- Following someone through physical security without using your own badge
- Harmful computer programs such as viruses, worm, and trojans used by hackers to gain access to your computer and cause destructions
- Fraudulent text messages that try and get information (or youtube gift cards) from you
- Malicious software that intends to block access to a computer or server until an amount of money is paid
Down
- Copies of critical data should be maintained in the event of catastrophic system failure
- A flaw or weakness in a computer system that can be exploited
- Should be constructed of a long string of upper and lower case letters, numbers, and special characters, and not used more than one place
- Social ______ is the name of the cybersecurity threat where nefarious actors trick others into revealing sensitive information.
- Where to find our policies
- The address of a webpage. Check that it is valid before clicking on it (abbreviation)
- Information (typically electronic) that can identify a particularly individual, such as name, email, address (abbreviation)
- Security tool that creates a secure, encrypted connection between you and the internet (abbreviation)
- The process of verifying the identity of a user
- An individual who uses technology to try and gain unauthorized access to systems/networks to commit crimes
21 Clues: Where to find our policies • The process of verifying the identity of a user • A software designed to detect and destroy computer viruses • Email sent trying to get user to click on a malicious link • A flaw or weakness in a computer system that can be exploited • Following someone through physical security without using your own badge • ...
Food security 2024-11-05
Across
- Environmental impact on food
- Animals raised for food
- Long-term environmental health
- Essential for irrigation
- Availability of resources
- Plants grown for food
- Lack of essential nutrients
- Crop production per area
- Amount of food produced
- Farming and crop production
Down
- Variety in ecosystems
- Foundation of agriculture
- Support for the food-insecure
- Extreme food shortage
- Shortage of resources
- Ability to withstand crises
- Government rules and regulations
- Diet quality focus
- Fair food distribution
- Food scarcity issue
20 Clues: Diet quality focus • Food scarcity issue • Variety in ecosystems • Extreme food shortage • Shortage of resources • Plants grown for food • Fair food distribution • Animals raised for food • Amount of food produced • Essential for irrigation • Crop production per area • Foundation of agriculture • Availability of resources • Ability to withstand crises • Lack of essential nutrients • ...
Security Crossword 2025-01-23
Across
- The process of managing updates for software applications and technologies.
- Intermediary server for network requests.
- Unauthorized data access incident.
- A firewall that monitors and filters traffic between a web application and the internet.
- Attempt to obtain sensitive information.
- Testing a system for vulnerabilities by simulating attacks.
- Algorithm for performing encryption or decryption.
- A collection of tools used by an attacker to maintain access to a system while hiding their presence.
- Strategies to identify and prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.
Down
- Measures taken to protect the integrity and usability of networks.
- Running programs in a controlled environment to prevent them from affecting the host system.
- A formal document outlining how security measures are implemented within an organization.
- Protection measures applied to end-user devices like computers and mobile devices.
- A framework for managing digital certificates and public-key encryption.
- A systematic evaluation of the security of a company’s information system.
- An entity that issues digital certificates for secure communications.
- Protocol for establishing an encrypted link between a server and a client.
- Permissions granted to users regarding what they can do with resources on a system.
- A type of malware that replicates itself to spread to other computers without user intervention.
- Software that secretly collects user information.
20 Clues: Unauthorized data access incident. • Attempt to obtain sensitive information. • Intermediary server for network requests. • Software that secretly collects user information. • Algorithm for performing encryption or decryption. • Testing a system for vulnerabilities by simulating attacks. • Measures taken to protect the integrity and usability of networks. • ...
Industrial security 2025-10-23
Across
- – A weakness in security systems that can be exploited by threats or unauthorized individuals.
- – A signaling device used to alert personnel to security breaches or emergencies.
- – Continuous observation of activities to detect and prevent security breaches.
- – Training and education programs that inform personnel about proper security practices.
- – A defined step-by-step process for completing security-related tasks properly and safely.
- – Any indication or potential cause that can harm or disrupt security and safety.
- – The act of stealing small quantities of goods or materials over time, often by employees.
- – Unauthorized entry into a protected area or system.
- – Ensuring that sensitive information is only accessible to authorized individuals.
- – A formal statement of principles and rules to guide security practices within an organization.
Down
- – Protection of buildings, people, and assets.
- – A systematic process of identifying, evaluating, and prioritizing potential hazards or threats.
- – A designated safe route used during fire or other emergencies.
- – Safeguarding an organization’s physical and intangible resources against theft or loss.
- – A trained personnel responsible for protecting property, assets, and people from harm or theft.
- – Process of preparing personnel to handle threats and emergencies.
- – A detailed set of procedures to ensure safety and business continuity during emergencies.
- – A centralized area where monitoring, communication, and response systems are managed.
- – A system or method used to regulate who can enter or exit specific areas within a facility.
- – Closed-Circuit Television system used for surveillance and monitoring of premises.
20 Clues: – Protection of buildings, people, and assets. • – Unauthorized entry into a protected area or system. • – A designated safe route used during fire or other emergencies. • – Process of preparing personnel to handle threats and emergencies. • – Continuous observation of activities to detect and prevent security breaches. • ...
Network Security 2025-11-13
Across
- High level permissions that allow a user to install software or change system settings
- Malware that locks your files and demands money to unlock them like holding your data hostage
- A separate saved copy of important files so you can restore them if data is lost
- Rules that decide what different users can see or do on a computer system
- Software that scans for malicious files and removes them before they cause damage
- A login method that requires your password and a code sent to your phone making accounts harder to hack
- A password like 123456 or password that is very easy for attackers to guess
- A fake message pretending to be someone trustworthy asking for your password or personal data
- When a hacker keeps trying many passwords until one finally works
Down
- When a hacker tricks someone into giving away information instead of hacking the system
- A secret word or phrase used to prove who you are and log into your account
- A harmful program that spreads from file to file and computer to computer
- Software that secretly installs itself and causes damage like deleting files or slowing your computer
- The process of verifying your identity like entering a password or using fingerprint unlock
- A program that looks safe but secretly hides harmful code like a fake game that installs malware
- Turns information into unreadable code so intercepted messages cannot be understood
- Ethical hacking used to find weaknesses in a system before criminals do
- Software that secretly watches what you type or the websites you visit and sends it to someone else
- Someone who uses computer skills to access systems sometimes legally and sometimes illegally
- An attack that floods a server with too much traffic so real users cannot access it
- A security barrier that checks data coming in and out of a network like a bouncer letting only safe traffic through
21 Clues: When a hacker keeps trying many passwords until one finally works • Ethical hacking used to find weaknesses in a system before criminals do • A harmful program that spreads from file to file and computer to computer • Rules that decide what different users can see or do on a computer system • ...
IDK 2025-11-10
Across
- A potential for violation of security
- A collection of host computers together that can communicate with each other
- A term to describe connecting multiple separate networks together.
- identity usurpation to get access to some personal data
Down
- any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
- A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
- Advanced Research Projects Agency Network, a pioneer packet-switched network that was built in the early 1970s under contract to the US Government, led to the development of today's Internet, and was decommissioned in June 1990.
- A network point that acts as an entrance to another network.
- something that's protecting you frome virus
- a tool that monitors network traffic as it received in a network interface.
- a service who allow you to access to some foreign content
11 Clues: A potential for violation of security • something that's protecting you frome virus • identity usurpation to get access to some personal data • a service who allow you to access to some foreign content • A network point that acts as an entrance to another network. • A term to describe connecting multiple separate networks together. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the prevention of damage to and the protection of computer and information systems and is everyone's responsibility.
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • The process of encoding data, a message,or the securing of information in transit between authorized parties or end-points. • ...
Rush Health Cybersecurity Crossword Puzzle 2020-02-27
Across
- A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- The result of a compromise to the security or data of an information system or network.
- Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- Cyber_____ is the prevention of damage to or the protection of computer and information systems. It is everyone's responsibility!
- The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.
8 Clues: The result of a compromise to the security or data of an information system or network. • The probability of negative exposure or loss resulting from a cyber attack or data breach on your network. • The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points. • ...
Fundamental security 2013-02-06
Across
- data send between to hosts
- what is a common DoS attack
- what is another name code updates
- What wed security controls interactivity between a app and computer
- allows or Denys traffic on a computer
- A person that pretends to be a employee to get info on the company
- How often should you check your security
- a way to safely access resources
- file contents that hold known characteristics of someone
- permanently deleting something
Down
- What type of threat is stealing, damage, destroy equipment
- What is another name for unsolicited email
- What type of virus is the most damaging
- what is another name for an infected computer
- What reads info and operates without your computer knowing
- what do anti-virus look for in software
- who is responsible for security
- software that pretends to be a trusted computer
- what type of attack sniffs out user names and passwords in a network
- What is a Trojan
20 Clues: What is a Trojan • data send between to hosts • what is a common DoS attack • permanently deleting something • who is responsible for security • a way to safely access resources • what is another name code updates • allows or Denys traffic on a computer • What type of virus is the most damaging • what do anti-virus look for in software • How often should you check your security • ...
IT Security 2015-04-21
Across
- Programme, die Tastatureingaben mitprotokollieren
- Dateien, die am Computer abgespeichert werden /z.B. Anmeldeinformationen)
- "Hintertür" für Dritte über einen Computer Spams zu verteilen
- Diebstahl von Daten, die unachtsam einfach weggeworfen wurden
- chatten - Abkürzung
- Viren, die als Programm in ein Dokument eingebettet sind
- gezieltes Ansprechen von Minderjährigen im Internet mit dem Ziel der Anbahnung sexueller Kontakte
- Virus, der sich direkt über Netze (Internet) verbreitet
- Begriff setzt sich aus Advertisment und Software zusammen - forscht das Nutzerverhalten aus
- "Datendiebstahl" durch falsche E-Mails
Down
- Mobbing mit Hilfe von elektronischen Medien
- Programm, das Viren im Betriebssystem versteckt
- Beobachtung bei der Eingabe von Daten (Bankomat,...)
- "Datendiebstahl" durch zwischenmenschliche Beeinflussung
- unerwünschte Werbemails
- versteckt in einem scheinbar nützlichen Programm
- Daten eines Dritten (unter Vorgabe einer fremden Identität) besorgen
- Überbegriff für unerwünschte, schädliche Software
- Datensicherung
- Betrugsmethode, bei der der User auf gefälschte Webseiten umgeleitet wird
- forschen das Nutzerverhalten aus und senden die Daten an Hersteller
21 Clues: Datensicherung • chatten - Abkürzung • unerwünschte Werbemails • "Datendiebstahl" durch falsche E-Mails • Mobbing mit Hilfe von elektronischen Medien • Programm, das Viren im Betriebssystem versteckt • versteckt in einem scheinbar nützlichen Programm • Programme, die Tastatureingaben mitprotokollieren • Überbegriff für unerwünschte, schädliche Software • ...
HIPAA Security 2016-04-06
Across
- After reading, the act of removing electronic information
- Keep safe
- To use to gain admission
- To inform of security incident
- HIPAA Security Officer
- Restricted information
- Punishment for breaking the law
- Example of PHI
- Reveal or share information with permission
- Who implements and maintains HIPAA laws
- Dispose of paper documents
Down
- Monetary penalty
- Protected *blank* information
- Part of trilogy
- Software designed to harm computer
- Act of stating presence before entering a room
- Educating others of HIPAA laws
- Organization responsible for HIPAA compliance (2 words)
- Rule establishes a level of protection for electronic PHI (2 words)
- Person receiving treatments
- Safety officer
- Compliance and privacy officer
- HIPAA, Omnibus, HITECH are part of a
- Cellphone, laptop, iPad are examples of
- To be on guard
25 Clues: Keep safe • Safety officer • Example of PHI • To be on guard • Part of trilogy • Monetary penalty • HIPAA Security Officer • Restricted information • To use to gain admission • Dispose of paper documents • Person receiving treatments • Protected *blank* information • Educating others of HIPAA laws • To inform of security incident • Compliance and privacy officer • ...
information security 2021-01-15
Across
- the right to enter a place, use something, see someone etc
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- someone who is in a position of authority in an organization
- a clever but dishonest way to get money
- to make a computer, machine, or piece of software better and able to do more things
- relating to computers, especially to messages and information on the Internet
- a machine or tool that does a special job
- to keep someone or something safe from harm, damage, or illness
- when something bad is stopped from happening
- the crime of stealing
- informal someone who secretly uses or changes the information in other people’s computer systems
- a written or spoken description that says what happens in an event or process
- to take something that belongs to someone else
Down
- relating to crime
- a group of related parts that work together as a whole for a particular purpose
- the sets of programs that tell a computer how to do a particular job
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the act of deliberately making someone believe something that is not true
- to make a short hard sound, or make something produce this sound
- to damage something so badly that it no longer exists or cannot be used or repaired
- the place where you pay or are served in a shop, bank, restaurant etc
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • someone who is in a position of authority in an organization • ...
information security 2020-12-18
Across
- to keep someone or something safe from harm, damage, or illness
- the state of being able to be alone, and not seen or heard by other people
- the sets of programs that tell a computer how to do a particular job
- to calculate a result, answer, sum etc
- what you earn by working and can use to buy things
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
- a small plastic card that you use to buy goods or services and pay for them later
- connect people
- someone who steals things from another person or place
- someone who secretly uses or changes the information in other people’s computer systems
Down
- someone who is in a position of authority in an organization
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- facts or details that tell you something about a situation, person
- the act of deliberately making someone believe something that is not true
- the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
- very convenience
- a group of related parts that work together as a whole for a particular purpose
- seeming bad or dishonest
- relating to crime
- to damage something so badly that it no longer exists or cannot be used or repaired
21 Clues: connect people • very convenience • relating to crime • seeming bad or dishonest • to calculate a result, answer, sum etc • what you earn by working and can use to buy things • someone who steals things from another person or place • someone who is in a position of authority in an organization • to keep someone or something safe from harm, damage, or illness • ...
information security 2020-12-18
Across
- the right to enter a place, use something, see someone etc
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- someone who is in a position of authority in an organization
- a clever but dishonest way to get money
- to make a computer, machine, or piece of
- relating to computers, especially to messages and information on the Internet
- a machine or tool that does a special job
- to keep someone or something safe from harm, damage, or illness
- when something bad is stopped from happening
- the crime of stealing
- informal someone who secretly uses or changes the information in other people’s computer systems
- a written or spoken description that says what happens in an event or process
- to take something that belongs to someone else
Down
- relating to crime
- a group of related parts that work together as a whole for a particular purpose
- the sets of programs that tell a computer how to do a particular job
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the act of deliberately making someone believe something that is not true
- to make a short hard sound, or make something produce this sound
- to damage something so badly that it no longer exists or cannot be used or repaired
- the place where you pay or are served in a shop, bank, restaurant etc
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • to make a computer, machine, or piece of • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • ...
information security 2020-12-18
Across
- the right to enter a place, use something, see someone etc
- to damage something so badly that it no longer exists or cannot be used or repaired
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- a machine or tool that does a special job
- to make a short hard sound, or make something produce this sound
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- the act of deliberately making someone believe something that is not true
- better and able to do more things upgrade
- informal someone who secretly uses or changes the information in other people’s computer systems
- to take something that belongs to someone else
Down
- relating to computers, especially to messages and information on the Internet
- the sets of programs that tell a computer how to do a particular job
- a group of related parts that work together as a whole for a particular purpose
- to keep someone or something safe from harm, damage, or illness
- someone who is in a position of authority in an organization
- when something bad is stopped from happening
- relating to crime
- the place where you pay or are served in a shop, bank, restaurant etc
- a clever but dishonest way to get money
- the crime of stealing
- a written or spoken description that says what happens in an event or process
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • a machine or tool that does a special job • better and able to do more things upgrade • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • ...
information security 2020-12-18
Across
- very convenience
- the state of being able to be alone, and not seen or heard by other people
- to keep someone or something safe from harm, damage, or illness
- a small plastic card that you use to buy goods or services and pay for them later
- someone who is in a position of authority in an organization
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- someone who secretly uses or changes the information in other people’s computer systems
- the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- relating to crime
- a group of related parts that work together as a whole for a particular purpose
- the act of deliberately making someone believe something that is not true
Down
- to damage something so badly that it no longer exists or cannot be used or repaired
- facts or details that tell you something about a situation, person
- to calculate a result, answer, sum etc
- seeming bad or dishonest
- the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
- the sets of programs that tell a computer how to do a particular job
- connect people
- someone who steals things from another person or place
- what you earn by working and can use to buy things
- a piece of computer software that does a particular job
22 Clues: connect people • very convenience • relating to crime • seeming bad or dishonest • to calculate a result, answer, sum etc • what you earn by working and can use to buy things • someone who steals things from another person or place • a piece of computer software that does a particular job • someone who is in a position of authority in an organization • ...
Food Security 2020-10-08
Across
- – inhabitants of a particular place
- – shower from the clouds
- – access to something
- - the management of financial matters for a community, business or family.
- – the state of not having reliable access to affordable, nutritious food.
- - the state of having reliable access to affordable, nutritious food.
Down
- – state of insufficient financial wealth
- – manufacture from raw materials
- – relating to the government
- – a change in global or regional climate patterns
- - a fuel derived immediately from living matter.
- – insufficient amount of something
- – relating to a built-up area
- – relating to health and cleanliness
- – short supply of
- – a natural fuel such as gas
- – person who manages a farm
- – full of nutrients
- – nutritious substance that animals and humans eat
- – plants grown commercially
20 Clues: – short supply of • – full of nutrients • – access to something • – shower from the clouds • – person who manages a farm • – plants grown commercially • – relating to the government • – a natural fuel such as gas • – relating to a built-up area • – manufacture from raw materials • – insufficient amount of something • – inhabitants of a particular place • ...
Information Security 2023-11-19
Across
- A TCS process for releasing application on Internet / Intranet.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
- Jenkins is the commonly used tool for performing this activity in the application development.
- A TCS portal with a framwork for Software security.
- A username, passowrd, and app-generated code on a phone.
- A protocol operate on UDP ports 67 and 68
- An application in TCS for Business Continuity Planning.
- Application security testing examines source code.
- It is Clould Service like TCS uses Google Workspaces
- Plan It is a plan devised for an outcome other than usual plan.
- It is achieved by using Hashing.
- Allows you to login once and access many services and systems.
Down
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information
- An application tool recommended to use in TCS for storing and manage multiple credentials.
- A TCS application used for managing physical access and logical resources access management.
- You should not just identity, you should also confirm ________________________
- An ability to shift workloads between cloud venders as needs change.
- A software development methodology is most closely linked to DevSecOps approach.
- DAY It is the day a new vulnerability is known and no patch is available yet.
20 Clues: It is achieved by using Hashing. • A protocol operate on UDP ports 67 and 68 • Application security testing examines source code. • A TCS portal with a framwork for Software security. • It is Clould Service like TCS uses Google Workspaces • An application in TCS for Business Continuity Planning. • A username, passowrd, and app-generated code on a phone. • ...
Security concepts 2024-07-24
Across
- personal code to log into your devices
- Secure network tunnel
- Verifying identity
- Dual-layer authentication
- Holds data hostage
- Fakes digital identity
- Engineering Manipulates human behavior
- Data scrambling for privacy
- Network security barrier
- Detects and removes malware
- Redirects to fake sites
Down
- Malicious digital intrusion
- Software with malicious intent
- Device in a network
- Weakness in security
- Software update for security
- Records keystrokes
- Authentication via body traits
- Malicious program's function
- Deceptive email tactic
- Unauthorized access point
21 Clues: Verifying identity • Records keystrokes • Holds data hostage • Device in a network • Weakness in security • Secure network tunnel • Fakes digital identity • Deceptive email tactic • Redirects to fake sites • Network security barrier • Dual-layer authentication • Unauthorized access point • Malicious digital intrusion • Data scrambling for privacy • Detects and removes malware • ...
Food Security 2024-12-17
Across
- Organization that works to end world hunger
- State of not having enough food to eat
- Nutrient essential for growth, found in pulses and meat
- When crops are harvested
- Fruit rich in potassium, often called "kela" in Hindi
- Common grain used in many Indian dishes, like biryani
- Kitchen garden grown at home or school for fresh produce
- The first 1000 ____ of a child's life are crucial for nutrition
- Measure of body fat based on height and weight
- Cereal grain that's a staple food in many parts of India
- Fortified salt that helps prevent iodine deficiency
- Nutrient found in milk and dairy products, important for strong bones
Down
- Nutrient-dense food often given to malnourished children
- Found in citrus fruits, helps boost immunity
- The right to adequate food is recognized as a human ____
- Ability to access enough safe and nutritious food
- Legume high in protein, often used in dal
- Green vegetable rich in iron and calcium, also known as drumstick
- Feeding only breast milk to infants for the first six months
- Government system providing subsidized food grains to the poor
- Colorful fruit rich in Vitamin A, often eaten as a dessert
- Government program providing midday meals to school children
- Type of malnutrition where a child is too short for their age
- Vegetable rich in iron, often called "palak" in Hindi
- Government program providing food grains to pregnant women and young children
25 Clues: When crops are harvested • State of not having enough food to eat • Legume high in protein, often used in dal • Organization that works to end world hunger • Found in citrus fruits, helps boost immunity • Measure of body fat based on height and weight • Ability to access enough safe and nutritious food • Fortified salt that helps prevent iodine deficiency • ...
Data security 2025-03-27
Across
- protection program Software that stops viruses
- A group of connected computers
- A saved copy of your data or files
- A bad program that can hurt your computer
- Software that is free to try before you buy
- container A box that protects things from fire
- A check to make sure everything is correct
- security Using your face, finger, or eye to enter a system
- backup A copy of only the new or changed files
- Happening from time to time (like every week or month)
- To change people or jobs regularly
- A program that blocks bad things from coming into a network
- Programs or apps that run on a computer
- lock and key Something stored in a locked place
Down
- Permission to use something or go into a system
- security system Equipment that protects a place (like cameras or locks)
- When a system is broken into or damaged
- A secret word you use to log in
- A company or person who sells something
- (a password) To break into a password or find it without permission
- To watch or check something regularly
- backup A copy of all your files
- The physical parts of a computer (like keyboard, screen)
- When you can go into a computer or a system
- To change data into a secret code
- system A system that calls you back to check who you are
26 Clues: A group of connected computers • A secret word you use to log in • backup A copy of all your files • To change data into a secret code • A saved copy of your data or files • To change people or jobs regularly • To watch or check something regularly • When a system is broken into or damaged • A company or person who sells something • Programs or apps that run on a computer • ...
Physical Security 2021-05-27
Across
- Digital Center location
- They monitor fire and alarm signals
- Designated "Captains"
- The top shortage department, as a Company
- Bart's Middle Name
- In 2021, Kohl's moved from Microsoft office programs entirely to this platform
- The building that screams innovation by name
- Newest Men's clothing brand launch
- Got a Human Resource question?
- Used to be granted access
- He is a Star Wars buff and was a drummer in a band
- The "S" in EAS
- Kohl's VMS CCTV Platform
- It is 1 of 2 buildings, service happens here
- We like to recognize people for this
- Milpitas is a Santa Clara County, located in this Valley
- We are a top 50 company for
- Not from the West or the Midwest, LP TLPM leader
- The program that "Pays" when you are honest
- This site is located on Broadway
- Where to go on MyKohls to achieve your ideal level of wellbeing
- Abbr for Closed Circuit Television
- To get paid, enter hours here
- 200 this year, 800 by the end of 2023
- hash (#) tag it!
Down
- In 2019, we partnered with this powerhouse to drive traffic in our stores through returns
- During these, the correct response is to run, hide or fight
- Hospitatlity isn't just a thought, it is a?
- The "Z" in PTZ
- Loss Preventions "eyes in the sky" to assist with the boots on the ground
- The site to be kept "in the know"
- Each June we celebrate this for the month
- As an associate you get 15% off, also known as this
- Check this to understand the "point" of the alarm
- He won't have the key, but he can pin you the core
- We provide, through volunteering
- Kohl's Corporate office is 16 miles from this Baseball teams stadium
- This Kohl's building is designated to "strike a pose"
- Abbr for the groups committed to driving business through our people
- Onguard, also known as
- Panic type alarm, also recently installed in exec offices
- Technology that prevents the same access badge from being used consecutively
- Played in a movie as a pitcher
- This caused store closures in 2020
- Service needs are entered in here
- Another name for Kohl's rewards, it's a program
- Automated external difibrillator, abbr
- The San Antonio Credit Center shares it's home with this famous battle
- This discontinued item caused the largest customer calls to the corporate office
- Loss Preventions purpose, to reduce
50 Clues: The "Z" in PTZ • The "S" in EAS • hash (#) tag it! • Bart's Middle Name • Designated "Captains" • Onguard, also known as • Digital Center location • Kohl's VMS CCTV Platform • Used to be granted access • We are a top 50 company for • To get paid, enter hours here • Got a Human Resource question? • Played in a movie as a pitcher • We provide, through volunteering • ...
information security 2022-01-15
Across
- Seeming dishonest or false.
- To put furniture, a machine, or a piece of equipment into position and make it ready to use.
- If someone is agreed to do something, they are allowed to do it.
- To make something more modern or suitable for use now by adding new information or changing its design
- A particular form of something.
- To react to something with an opposing opinion or action.
- In a far place.
- Relating to a position of responsibility.
- A piece of work to be done with difficulty.
- Happening or existing before something or someone else.
Down
- To copy or move programs or information into a computer's memory.
- A typical quality or an important part of something.
- An illegal plan for making money, especially one that involves tricking people.
- A particular way of doing something.
- to slide something, especially cloth,in order to remove dirt, food, or liquid.
- Agreement that something is true or legal.
- The development or improvement of something.
- Physical or mental activity needed to achieve something.
- Pressing a button on the mouse or keyboard.
- Used or download data.
20 Clues: In a far place. • Used or download data. • Seeming dishonest or false. • A particular form of something. • A particular way of doing something. • Relating to a position of responsibility. • Agreement that something is true or legal. • Pressing a button on the mouse or keyboard. • A piece of work to be done with difficulty. • The development or improvement of something. • ...
information security 2022-01-15
Across
- If someone is agreed to do something, they are allowed to do it.
- Seeming dishonest or false.
- To make something more modern or suitable for use now by adding new information or changing its design
- A typical quality or an important part of something.
- A particular form of something.
- Pressing a button on the mouse or keyboard.
- to slide something, especially cloth,in order to remove dirt, food, or liquid.
- Agreement that something is true or legal.
- Relating to a position of responsibility.
- To react to something with an opposing opinion or action.
- A particular way of doing something.
Down
- Used or download data.
- Happening or existing before something or someone else.
- To copy or move programs or information into a computer's memory.
- A piece of work to be done with difficulty.
- The development or improvement of something.
- An illegal plan for making money, especially one that involves tricking people.
- In a far place.
- Physical or mental activity needed to achieve something.
- To put furniture, a machine, or a piece of equipment into position and make it ready to use.
20 Clues: In a far place. • Used or download data. • Seeming dishonest or false. • A particular form of something. • A particular way of doing something. • Relating to a position of responsibility. • Agreement that something is true or legal. • A piece of work to be done with difficulty. • Pressing a button on the mouse or keyboard. • The development or improvement of something. • ...
information security 2022-01-15
Across
- Seeming dishonest or false.
- To put furniture, a machine, or a piece of equipment into position and make it ready to use.
- If someone is agreed to do something, they are allowed to do it.
- To make something more modern or suitable for use now by adding new information or changing its design
- A particular form of something.
- To react to something with an opposing opinion or action.
- In a far place.
- Relating to a position of responsibility.
- A piece of work to be done with difficulty.
- Happening or existing before something or someone else.
Down
- To copy or move programs or information into a computer's memory.
- A typical quality or an important part of something.
- An illegal plan for making money, especially one that involves tricking people.
- A particular way of doing something.
- to slide something, especially cloth,in order to remove dirt, food, or liquid.
- Agreement that something is true or legal.
- The development or improvement of something.
- Physical or mental activity needed to achieve something.
- Pressing a button on the mouse or keyboard.
- Used or download data.
20 Clues: In a far place. • Used or download data. • Seeming dishonest or false. • A particular form of something. • A particular way of doing something. • Relating to a position of responsibility. • Agreement that something is true or legal. • Pressing a button on the mouse or keyboard. • A piece of work to be done with difficulty. • The development or improvement of something. • ...
information security 2022-01-15
Across
- Seeming dishonest or false.
- To put furniture, a machine, or a piece of equipment into position and make it ready to use.
- If someone is agreed to do something, they are allowed to do it.
- To make something more modern or suitable for use now by adding new information or changing its design
- A particular form of something.
- To react to something with an opposing opinion or action.
- In a far place.
- Relating to a position of responsibility.
- A piece of work to be done with difficulty.
- Happening or existing before something or someone else.
Down
- To copy or move programs or information into a computer's memory.
- A typical quality or an important part of something.
- An illegal plan for making money, especially one that involves tricking people.
- A particular way of doing something.
- to slide something, especially cloth,in order to remove dirt, food, or liquid.
- Agreement that something is true or legal.
- The development or improvement of something.
- Physical or mental activity needed to achieve something.
- Pressing a button on the mouse or keyboard.
- Used or download data.
20 Clues: In a far place. • Used or download data. • Seeming dishonest or false. • A particular form of something. • A particular way of doing something. • Relating to a position of responsibility. • Agreement that something is true or legal. • Pressing a button on the mouse or keyboard. • A piece of work to be done with difficulty. • The development or improvement of something. • ...
Network Security 2022-04-27
Across
- any program or code designed to do something on a system or network that you don’t want to have happen.
- software tools and programs designed to identify and prevent malicious software, or malware, from infecting computer system or electric devices
- A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.
- Can sustain network operations for only a limited time in the event of an outage.
- Redundant ___ eliminates a single point of power failure.
- a program that has two jobs: to replicate and to activate.
- functions similar to a virus. It replicates exclusively through networks.
- Horse- is a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad.
- (IPS)- similar to IDS, but adds the capability to react to an attack (Active)
Down
- occurs when a user identifies himself to the system, and the identity is verified against an authentication database
- Engineering is the process of using or manipulating people inside the network environment to gain access to that network from the outside
- (AUP) states what users are allowed and not allowed to do on the company’s network
- protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
- Provides incremental trunk speeds by combining multiple Fast Ethernet links.
- uses duplication of critical components/devices, increasing the reliability of the system.
- software that detects, prevents, and removes viruses, worms, and other malware from a computer
- diving- when a person goes through the trash in order to find personal information
- - using another person's wireless network without permission.
- the 2nd most common firewall tool ensuring port security through port filtering
- a function of any program that sends information about your system or your actions over the Internet.
20 Clues: Redundant ___ eliminates a single point of power failure. • a program that has two jobs: to replicate and to activate. • - using another person's wireless network without permission. • functions similar to a virus. It replicates exclusively through networks. • Provides incremental trunk speeds by combining multiple Fast Ethernet links. • ...
Security crossword 2025-06-11
Across
- - Work laptops, iPads, phones, and documents being more susceptible to theft or loss when working ___
- Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
- Change of ___
- A marking used to show a document is originator controlled
- Must be strong and never shared
- What you should do when you step away from your laptop
- – Reporting these allow MFAT to identify and manage security risks
- – report all lost devices to the ___
- – access to official information is governed by your ___
- A secure way to connect remotely to our network
Down
- Encourages putting sensitive information away at the end of the day
- ___ your laptop securely when it is not under your direct control
- Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
- Do not disclose online that you hold a ___ ___ clearance
- Do not use ___ accessories such as headsets and keyboards
- Pre-travel notification is required when travelling through a ___ country
- Fake emails to get you to click
- – A way to categorise information to protect it
- – Online sites that can put your personal information at risk
- Suspicious, ongoing, unusual or ___
- Bag used to transport material RESTRICTED and above
- Key to entering secure areas
22 Clues: Change of ___ • Key to entering secure areas • Fake emails to get you to click • Must be strong and never shared • Suspicious, ongoing, unusual or ___ • – report all lost devices to the ___ • – A way to categorise information to protect it • A secure way to connect remotely to our network • Bag used to transport material RESTRICTED and above • ...
INDUSTRIAL SECURITY 2025-10-28
Across
- sound and good judgement to arrive at wise and timely desisions.
- a form of physical security that is concerned with the physical measures designed to safeguard personnel and prevent unauthorized access to equipment , facilities , materials and protect the from espionage
- is a freedom from accidents , hazards or harm.
- a chance of being injured or harmed.
- include mountains, rivers, seas, desserts to traverse.
- removing the risk totally from the business
- ability to deal with others successfully without offensing
- An indication of impending danger or harm.
- a system of barriers placed between the potential intruder and the objects / matter to be protected.
- is the potential that a chosen action or activity will lead to a loss probability of an event to happen .
Down
- minimizing the probability of the potential loss
- obtained through clearly unethical or illegal means.
- those that will deter man from committing such act of fea of being caught , charge in the court or get dismissed.
- being watchful in spotting violator , a person , a vehicle or an incident.
- inability to withstand the effects of a hostile environment - measure of how open an establishment to intrusion, attack or injury.
- involves the installation of physical barriers , security lighting , use of vaults , locks and others.
- the affect of impacting result in terms of life , existence finances security condition and other assets or on things intended by security measures to protect.
- is the protection resulting from the application of various measures which safeguards , cash and assets which are in storage , in transit and during transaction.
- a hollow device made of metal that makes a ringing sound.
- a kind of state where people , institution , authority or groups feel fully secured of feeling.
20 Clues: a chance of being injured or harmed. • An indication of impending danger or harm. • removing the risk totally from the business • is a freedom from accidents , hazards or harm. • minimizing the probability of the potential loss • obtained through clearly unethical or illegal means. • include mountains, rivers, seas, desserts to traverse. • ...
Law and order 2024-10-23
Across
- scene rikospaikka
- punishment kuolemanrangaistus
- battery pahoinpitely
- bail takuu
- perpetrator rikoksentekijä, rikollinen
- service yhdyskuntapalvelu
- attorney puolustuksen asianajaja
- offence rikos
- record rikosrekisteri
Down
- haastehakemus, kanne
- rikostoveri
- of law tuomioistuin
- syytetty, vastaaja
- terrorist kyberterroristi
- syyllinen
15 Clues: syyllinen • bail takuu • rikostoveri • offence rikos • scene rikospaikka • syytetty, vastaaja • of law tuomioistuin • haastehakemus, kanne • battery pahoinpitely • record rikosrekisteri • service yhdyskuntapalvelu • terrorist kyberterroristi • punishment kuolemanrangaistus • attorney puolustuksen asianajaja • perpetrator rikoksentekijä, rikollinen
Passwords To Power Chords 2025-05-07
Across
- - Rock band behind “Rock You Like a Hurricane.”
- - What every plant manager wants to avoid.
- - Digital defense against cyber threats.
- - Crucial step before a system update.
- - TV character who can fix anything with duct tape or his Swiss Army knife..
- - Elevator company often seen in manufacturing plants.
- - Greater metropolitan area including Chicago and suburbs.
- - Chicago baseball team hoping for a better season.
- - Feel-good soccer coach everyone loves.
Down
- - “The Boss” of classic rock anthems.
- - Tech buzzword that’s either a game-changer or a headache.
- - Classic rock band known for “Stairway to Heaven.”
- - Popular salad dressing and Midwestern staple.
- - Cyber scam pretending to be a trusted source.
- - Skilled worker who knows the ins and outs of a CNC machine.
15 Clues: - “The Boss” of classic rock anthems. • - Crucial step before a system update. • - Digital defense against cyber threats. • - Feel-good soccer coach everyone loves. • - What every plant manager wants to avoid. • - Rock band behind “Rock You Like a Hurricane.” • - Popular salad dressing and Midwestern staple. • - Cyber scam pretending to be a trusted source. • ...
AnaVation Security Crossword Puzzle 2022-06-28
Across
- An employee or consultant with access to classified or sensitive information who purposely or accidentally causes harm to national security.
- There are this many members on AnaVation's security team.
- AnaVation's Security Standard Practice Procedures (SPP) is located in here.
- This rule implements security policy, assigns responsibility, establishes requirements, and provides procedures consistent with the National Industrial Security Program.
- This program was created as part of the security clearance reform efforts to identify relevant security information from clearance holders between periodic reinvestigations.
- Failure to comply with national security policy and procedure, that could reasonably result in loss or compromise of classified information.
- The proper term for the "secure space" at AnaVation's facility.
- This is the federal security agency that is responsible for ensuring industry complies with national security policy.
- Before being granted a final clearance eligibility determination, you may be granted an _______ clearance.
- How many days in advance do you need to report foreign travel?
Down
- This kind of classification means incorporating paraphrased classified information onto newly developed material.
- All classified material at the Secret level or above that is mailed to another approved location must include this.
- An employee who on occasion will courier classified material to another approved location.
- Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers.
- The lowest level of classified information.
- The person in this role is authorized to determine if information is to be classified in the first instance.
- If you have a Top Secret clearance, you will need to go through reinvestigation every _____ years.
- The current system of record for personnel clearance information.
18 Clues: The lowest level of classified information. • There are this many members on AnaVation's security team. • How many days in advance do you need to report foreign travel? • The proper term for the "secure space" at AnaVation's facility. • The current system of record for personnel clearance information. • ...
cyberbully 2012-02-10
Across
- About 21% of kids have received ___ or threatening e-mails.
- About 75% have visited a Web site _____ another student.
- Four out of ten middle school students have had their password(s)_____ and changed by a bully who then locked them out of their own account or sent communications posing as them.
- Among this percentage, being ____and disrespected were the most common forms of cyber bullying.
- Nine out of ten ____ school students have had their feelings hurt online.
- bullying has increased in recent years. In a national survey of 10-17 year olds, twice as many children indicated they had been victims and perpetrators
Down
- About 58% of kids ___someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once.
- Nearly 42% of kids have been_____ online and almost one in four have had it happen more than once.
- cyber The _____ ___bullying location where victimizing occurs, at 56%, is in chat rooms.
- are about twice as likely as boys to be victims and perpetrators of cyber bullying.
10 Clues: About 75% have visited a Web site _____ another student. • About 21% of kids have received ___ or threatening e-mails. • Nine out of ten ____ school students have had their feelings hurt online. • are about twice as likely as boys to be victims and perpetrators of cyber bullying. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
Network Security 2018-08-24
Across
- puts up a barrier in between internal network and outside networks
- Determining the privileges to resources, objects, or data
- stop people from uploading or forwarding important information in an not safe way
- determining the privileges of a user
- cryptographic hash functions published by NIST
- Confidentiality, Integrity, Availability
- encrypts the connection from an endpoint to a network
- combines multiple layers of defenses at the edge and in the network
- blocks incoming attacks and controls outbound messages to prevent the loss of data
- countermeasures to avoid or fight against security risks
Down
- collections of equal and non-equal encryption algorithms
- determines physical location
- protects a wireless network
- hiding information in blocks or within images
- control web use, block threats, and deny access to malicious websites
- automatically sees activities that are not normal
- commonly used hash function that makes 128-bit hash value
- protection of information or information resources
- the only protection for the data when the defense fails
- Access, Authentication, Authorization
20 Clues: protects a wireless network • determines physical location • determining the privileges of a user • Access, Authentication, Authorization • Confidentiality, Integrity, Availability • hiding information in blocks or within images • cryptographic hash functions published by NIST • automatically sees activities that are not normal • ...
information security 2022-01-15
Across
- Seeming dishonest or false.
- To put furniture, a machine, or a piece of equipment into position and make it ready to use.
- If someone is agreed to do something, they are allowed to do it.
- To make something more modern or suitable for use now by adding new information or changing its design
- A particular form of something.
- To react to something with an opposing opinion or action.
- In a far place.
- Relating to a position of responsibility.
- A piece of work to be done with difficulty.
- Happening or existing before something or someone else.
Down
- To copy or move programs or information into a computer's memory.
- A typical quality or an important part of something.
- An illegal plan for making money, especially one that involves tricking people.
- A particular way of doing something.
- to slide something, especially cloth,in order to remove dirt, food, or liquid.
- Agreement that something is true or legal.
- The development or improvement of something.
- Physical or mental activity needed to achieve something.
- Pressing a button on the mouse or keyboard.
- Used or download data.
20 Clues: In a far place. • Used or download data. • Seeming dishonest or false. • A particular form of something. • A particular way of doing something. • Relating to a position of responsibility. • Agreement that something is true or legal. • Pressing a button on the mouse or keyboard. • A piece of work to be done with difficulty. • The development or improvement of something. • ...
IT Security 2014-04-07
Across
- Area Network : as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
- surfing : is using direct observation techniques, such as looking over someone's shoulder, to get information
- hacking :can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
- backdoor : is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
- engineering : A type of confidence trick for the purpose of information gathering, fraud, or system access
- individuals : more threat of data
- : is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
- : is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
- : is data prosed in some way
- : is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page
- providers : is another thraet for data
- : is To move an infected file, such as a virus, into an area where it cannot cause more harm
- theft : is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
Down
- : is a group of two or more computer systems linked together.
- Private Network : is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
- : is a software program designed to provide a user with administrator access to a computer without being detected.
- : is a technique of fraudulently obtaining private information
- :is raw facts
- : is a threat for data
- : is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
- : information that should stay secret stays secret and only those persons authorized to access it may receive access.
- : is when someone modifies computer hardware or software in a way that alters the creator's original intent.
- Area Network : is a system whereby individual PCs are connected together within a company or organisation
- Identity theft and Fraud : is a way to protect personal data
24 Clues: :is raw facts • : is a threat for data • : is data prosed in some way • individuals : more threat of data • providers : is another thraet for data • Identity theft and Fraud : is a way to protect personal data • : is a group of two or more computer systems linked together. • : is a technique of fraudulently obtaining private information • ...
IT Security 2014-04-07
Across
- : is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
- : is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
- : is another thraet for data
- : is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
- : is a group of two or more computer systems linked together.
- : is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
- : is a threat for data
- : is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
- : is using direct observation techniques, such as looking over someone's shoulder, to get information
- : is when someone modifies computer hardware or software in a way that alters the creator's original intent.
- : is a system whereby individual PCs are connected together within a company or organisation
- :can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
- : is To move an infected file, such as a virus, into an area where it cannot cause more harm
- :is raw facts
Down
- : is data prosed in some way
- : more threat of data
- : as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
- : A type of confidence trick for the purpose of information gathering, fraud, or system access
- : is a way to protect personal data
- : is a technique of fraudulently obtaining private information
- : is a software program designed to provide a user with administrator access to a computer without being detected.
- : information that should stay secret stays secret and only those persons authorized to access it may receive access.
- : is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
- : is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page
24 Clues: :is raw facts • : more threat of data • : is a threat for data • : is data prosed in some way • : is another thraet for data • : is a way to protect personal data • : is a group of two or more computer systems linked together. • : is a technique of fraudulently obtaining private information • ...
Fundamental Security 2013-02-06
Across
- What reads info and operates without your computer knowing
- what do anti-virus look for in software
- What wed security controls interactivity between a app and computer
- file contents that hold known characteristics of someone
- What is a Trojan
- What type of virus is the most damaging
- a way to safely access resources
- what is another name for an infected computer
- who is responsible for security
- What type of threat is stealing, damage, destroy equipment
- what type of attack sniffs out user names and passwords in a network
Down
- A person that pretends to be a employee to get info on the company
- How often should you check your security
- What is another name for unsolicited email
- permanently deleting something
- what is a common DoS attack
- allows or Denys traffic on a computer
- data send between to hosts
- what is another name code updates
- software that pretends to be a trusted computer
20 Clues: What is a Trojan • data send between to hosts • what is a common DoS attack • permanently deleting something • who is responsible for security • a way to safely access resources • what is another name code updates • allows or Denys traffic on a computer • what do anti-virus look for in software • What type of virus is the most damaging • How often should you check your security • ...
GENERAL SECURITY 2015-01-25
Across
- A minor criminal offence
- A Security guard can make an arrest when he finds someone committing a _______ offence
- Evidence of prior bad acts by the accused is called_______ evidence
- Police officers are __________ officers
- ____________can arrest on a " Found Committing " indictable offence
- Anything seized as a result of a Charter Violation is called _________ evidence
- A Fingerprint is ____________evidence
- __________________ Laws are also called By-laws
- When a person does not leave, after directed to do so, the person would considered to be __________
- Section 494 1 (a) says anyone can arrest if they ___________ an Indictable Offence (2 words)
- A gun is considered __________ evidence
- What does 10-4 mean?
- A trial within a trial
- Without colour of right if you convert something to your own use it is considered ______?
- The criminal code is a _____________ Act
- Security guards keep make entries during a shift in a
- A witness giving testimony is giving _________ evidence
Down
- Real evidence is_________ evidence.
- Under the trespass to property act a security can only
- Evidence that relates to a series of facts other than the particular fact sought to be proved is called ______ evidence
- An NSF cheque is ________ evidence
- Is a Security guard a peace officer?
- Class C fires involve _______________ equipment
- The lowest criminal court is called ________ court
- A serious criminal offence
- only the police can _______________
- A Security guard who uses excessive force is committing
- A person who lies on the stand is committing
- Surveillance from a place hidden from view is what type of Surveillance?
- An offence which has the option of being summary or indictable
- An expert witness can give ________ evidence
31 Clues: What does 10-4 mean? • A trial within a trial • A minor criminal offence • A serious criminal offence • An NSF cheque is ________ evidence • Real evidence is_________ evidence. • only the police can _______________ • Is a Security guard a peace officer? • A Fingerprint is ____________evidence • Police officers are __________ officers • A gun is considered __________ evidence • ...
Information Security 2023-03-16
Across
- Сombining several means of presenting information in one system.
- Preventing unauthorized access; safety.
- List of objects that are under suspicion regarding security.
- Bait net; trap network.
- Technical devices.
- Data interception.
- Unauthorized entry into the system bypassing its protection.
- Security of information.
- Computer program.
- The user's secret password to unlock the phone/smartphone.
- The process of rewriting or deletion information.
- Identification of intruders or threats.
- Type of malware.
- Avoiding bad events.
- Disclosure of information.
Down
- Proof.
- Encoding of information.
- A set of tools that allows the user to interact with the program.
- Computer attacker.
- Security of information.
- The weakest link in computer security.
- A crime involving a computer or computer network.
- The amount of potential damage.
- Bad event.
- Masking an intruder or malware.
- Secret character set.
- System user.
- User, trying to gain unauthorized access to a computer system.
- Effort to penetration into the system.
- Organized collection of structured information.
30 Clues: Proof. • Bad event. • System user. • Type of malware. • Computer program. • Technical devices. • Computer attacker. • Data interception. • Avoiding bad events. • Secret character set. • Bait net; trap network. • Encoding of information. • Security of information. • Security of information. • Disclosure of information. • The amount of potential damage. • Masking an intruder or malware. • ...
Network Security 2023-02-09
Across
- a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad
- Monitors the type of websites visited to generate targeted advertisements
- Occurs when a user identifies himself to the system, and the identity is verified against an authentication database.
- The process of using or manipulating people inside the network environment to gain access to that network from the outside
- Low-level operating trojan horse
- A person goes through garbage to find personal information
- A virus is a program that has two jobs: to replicate and to activate
- Software utility that detects, prevents, and removes viruses, worms, and other malware from a computer
Down
- A rogue access point is an unauthorized Wireless Access Point (WAP) installed on the network
- after the user is authenticated, he is then granted access to resources or services on the network.
- A rogue access point that looks like a legitimate access point
- Program or code that does something on a system or network you don’t want happening
- Sends information about your system or your actions over the internet
- Protects networks from potential attacks from outside your network by filtering packets using a number of methods
- An attacker poses as some sort of trusted site
- It is a firewall tool that prevents the passage of any TCP or UDP segments or datagrams through any port other than the ones prescribed by the system administrator.
- Using another person’s wireless network without permission
- When a person inserts themselves into a conversation between two others, covertly intercepting traffic thought to be only between those other people.
- Embedded on a program file. Once opened, the virus runs automatically wreaking havoc
- Similar to a virus, but doesn’t need activation to replicate
20 Clues: Low-level operating trojan horse • An attacker poses as some sort of trusted site • Using another person’s wireless network without permission • A person goes through garbage to find personal information • Similar to a virus, but doesn’t need activation to replicate • A rogue access point that looks like a legitimate access point • ...
Network Security 2020-04-16
Across
- permits or denies based on physical burnt in address
- logical seperation of your network
- access _________ list, allow or deny traffic on routers interfaces
- protocol used for reading and writing directories over network
- code runs, destroys database server after employee fired
- group of computers luring bad guys
- process where data formatted in a way that only the receiver can "break" the code
- attack restricts your data until you pay
- terminal access remote, not secure
- okay, you signed in? what access do you have
- inside, outside, _______ zone
- fingerprint, iris, voice authentication
- pretend to be someone that you are not
Down
- traffic redirected to unintentional intermediary
- signin once, authenticated anywhere
- who are you?
- social ____ , phishing is an example
- AAA protocol, needs server
- something you are, and something you know
- WPA uses it to check key integrity
- traffic redirected to intentional intermediary
- restricts or allows features in a particular area
- using common words as passwords to force your way in
- force a service to fail, distributed
24 Clues: who are you? • AAA protocol, needs server • inside, outside, _______ zone • logical seperation of your network • group of computers luring bad guys • WPA uses it to check key integrity • terminal access remote, not secure • signin once, authenticated anywhere • social ____ , phishing is an example • force a service to fail, distributed • pretend to be someone that you are not • ...
information security 2020-12-18
Across
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the act of deliberately making someone believe something that is not true
- when something bad is stopped from happening
- the sets of programs that tell a computer how to do a particular job
- the place where you pay or are served in a shop, bank, restaurant etc
- informal someone who secretly uses or changes the information in other people’s computer systems
- to take something that belongs to someone else
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- to make a short hard sound, or make something produce this sound
- a clever but dishonest way to get money
- a group of related parts that work together as a whole for a particular purpose
Down
- to keep someone or something safe from harm, damage, or illness
- relating to computers, especially to messages and information on the Internet
- the crime of stealing
- a machine or tool that does a special job
- someone who is in a position of authority in an organization
- the right to enter a place, use something, see someone etc
- to damage something so badly that it no longer exists or cannot be used or repaired
- relating to crime
- a written or spoken description that says what happens in an event or process
20 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • someone who is in a position of authority in an organization • ...
Security Terms 2022-11-17
Across
- Copy of files from computer hard drive saved on other digital media that is stored in a secure location
- Set of software tools used by attackers to hide the presence of other malicious softwares
- Logical computer network of zombies under control of an attacker
- Attacker who controls a botnet
- Database of viruses used to identify infected files
- Computer code that is dormant until it is triggered by a specific logical event
- General term used to describe software that spies on users by gathering information without consent
Down
- Program or feature incorporated in a browser that stops popup advertisements from appearing
- Enhancements to software to provide expanded functionality, but do not address vulnerabilities
- Software that is a cumulative package of all patches and feature updates
- Malware preventing devices from properly operating until a fee is paid
- Software that helps prevent computers from becoming infected by spyware
- Infected computer under remote control of an attacker
- Malicious computer code that reproduces itself on a computer
- Software of hardware device that captures each keystroke that is typed on the computer's keyboard
- Hardware or software designed to limit spread of malware
- Software code that gives access to a program that circumvents normal security protections
- Publicly released software security update to repair a vulnerability
- Malicious program designed to enter a computer via a network to take advantage of vulnerabilities
- Security program that delivers advertising content in a way that is unexpected and unwanted
20 Clues: Attacker who controls a botnet • Database of viruses used to identify infected files • Infected computer under remote control of an attacker • Hardware or software designed to limit spread of malware • Malicious computer code that reproduces itself on a computer • Logical computer network of zombies under control of an attacker • ...
Public Security 2016-10-01
Across
- Detective
- Delincuente
- Forense
- Motín
- Seguridad
- Robo
- Culpable
- Secuestro
- Orden
- Lealtad
- Prueba
- Delito
- Asalto
- Ley
- Inocente
- Pistola
- Cárcel
- Corporación
- Esposas
- Investigación
- Chaleco antibalas
- Cadáver
- Fiscal
- Juez
- Ciencia
Down
- Abogado
- Marina
- Disciplina
- Código
- Uniforme
- Ejercito
- Patrulla
- Ladrón
- Protección
- Recompensa
- Violencia
- Tecnología
- University
- Ministerio público
- Huella digital
- Educación
- Inteligencia
- Rango
- Gas lacrimógeno
- Cuchillo
- Autopsia
- Sospechoso
- Entrenamiento
- Evidencia
- Policía
- Victima
- Arma
52 Clues: Ley • Robo • Arma • Juez • Motín • Orden • Rango • Marina • Código • Ladrón • Prueba • Delito • Asalto • Cárcel • Fiscal • Abogado • Forense • Lealtad • Pistola • Esposas • Policía • Cadáver • Victima • Ciencia • Uniforme • Ejercito • Patrulla • Culpable • Inocente • Cuchillo • Autopsia • Detective • Seguridad • Secuestro • Violencia • Educación • Evidencia • Disciplina • Protección • Recompensa • Tecnología • University • Sospechoso • Delincuente • Corporación • Inteligencia • ...
Security Markets 2018-01-22
Across
- trading: computer triggers are established in which large-volume trades can be initiated by institutional investors
- sheets: electronic quotation service that gathers and publishes bid and ask quotation prices
- market: occurs when prices respond to new information, when each successive trade is made at a price close to the preceding price
- dot: allows NYSE member firms to electronically transmit all market and limit orders directly to the specialist at the trading post or the member trading booth
- banker: serves as the middleman in the process of raising funds
- guarantee the investment banking firm gives the selling firm to purchase its securities at a fixed price
- stock market: first electronic stock market listing over 5000 companies
- option: gives the owner the right to buy 100 shares of the underlying common stock at a set price for a certain period
- brokers and independent brokers: two types of floor brokers
- trading: rely on mathematical algorithms to trigger the trades without any human interaction
- markets: markets for existing assets that can be traded between investors i.e. NYSE
- public offering: bring private companies public for the first time
- brokers and specialists: the two types of members at the NYSE
- efforts: basis where the issuing firm assumes the risk and simply takes back an securities not sold after a fixed period
Down
- a way of exchanging assets
- markets: distinguished by the flow of funds between the market participants
- Advisor Act of 1940: set up to protect the public from unethical investment advisors
- exchange: formed in 2005 as an ECN and was granted exchange status by the SEC
- book: a database that keeps track of limit orders and market orders for the specialist
- Investor Protection Corporation: established to oversee liquidation of brokerage firms and to insure investors accounts to a maximum value of $500,000
- Exchange: founded to create a 24 hour electronic market for energy contracts
- directly: where the company sells its stock to the public without the help of an investment bank
- the counter bulletin board: electronic trading service provided by the NASD that offers traders and investors up-to-the-minute quotes, last-price sales, and volume information for equity securities traded over the counter
- traded funds: closed-end funds and structured products i.e. Standard and Poors 500 index and the DJIA
- York Stock Exchange: a stock exchange in New York that began as a physical location
- breakers: will shut down the markets or a stock in the event that it takes a pre-defined drop
- crash: rapid, deep, and volatile fall in security prices occurring within an extremely short time period
27 Clues: a way of exchanging assets • brokers and independent brokers: two types of floor brokers • brokers and specialists: the two types of members at the NYSE • banker: serves as the middleman in the process of raising funds • public offering: bring private companies public for the first time • stock market: first electronic stock market listing over 5000 companies • ...
Network Security 2018-03-03
Across
- stacked one on top of the other
- has permission to proceed
- belong to an entity only
- able to reach a destination
- able to enter into
- action taken to destroy or manipulate
- perception of a person or company
- act of using 1 and 0 to communicate
- maintaining the accuracy and consistency
- outer area
Down
- bad intention is not good
- interconnected system
- policies and procedures established to protect the network from harm or misuse
- can not enter
- prevent damage or harm
- stored and transmitted by electrical signals
- ability to use a system with ease
- take advantage of a weakness
- anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset
- protect against
20 Clues: can not enter • interconnected system • protect against • outer area • belong to an entity only • able to enter into • prevent damage or harm • has permission to proceed • bad intention is not good • perception of a person or company • able to reach a destination • take advantage of a weakness • ...
Security Crossword 2023-05-26
Across
- these are generally audible in nature
- this side of the building or TEAM is known for receiving product
- this acronym identifies merchandise that is highly sought or expensive
- this program is used to clear alarms as well as monitor alarms
- this part of the building houses hazardous labeled products...some you would use in your HAIR!
- written, typed or vocalized are forms of this
- this website should be used to track weather conditions
- this side of the building is responsible for removal/shipping out product from the FC
- full height access controlled device
- these aisles are known as this because they are extremely close together
- only done in emergency situations deemed appropriate by the Safety, GM or LP advisement
Down
- this number is specific to amazon product/items and is used to identify product
- this program is used to provide access to visitors and keep track of them as well
- office used to treat the sick and injured
- this program helps us account for everyone during an emergency situation
- this should be collected from witnesses or victims
- this should not be present at the Security Desk
- should be detailed and descriptive
- validating a persons badge and their access levels; can do badge trace as well
- this is the new CMS method you should be using
20 Clues: should be detailed and descriptive • full height access controlled device • these are generally audible in nature • office used to treat the sick and injured • written, typed or vocalized are forms of this • this is the new CMS method you should be using • this should not be present at the Security Desk • this should be collected from witnesses or victims • ...
Security Safety 2023-07-19
Across
- Biological user authentication methods
- Software used to prevent cyberattacks
- Malicious web browser advertisements
- Publishing private user information
- Blocks fraudulent network traffic
- Maliciously placed computer system infection
- Attacker changes DNS server information
- Intimidating and threatening electronic communication
- Words used for account access
Down
- Tracks user's keystrokes
- Practice of protecting computer systems
- Computer networks used for cyberattacks
- Forceful hacker password guessing technique
- Fraudulent solicitation through an email
- More than two authentication techniques
- Requires users to confirm identity
- Tracks user's online behavior
- Plans and implements security measures
- Malicious click tricks
- Use of fake website addresses
20 Clues: Malicious click tricks • Tracks user's keystrokes • Tracks user's online behavior • Use of fake website addresses • Words used for account access • Blocks fraudulent network traffic • Requires users to confirm identity • Publishing private user information • Malicious web browser advertisements • Software used to prevent cyberattacks • Biological user authentication methods • ...
Security - Training 2023-12-25
22 Clues: H7. • SS. • PPE. • C227 • keys. • ABBAS. • reset. • 1800hrs. • I'm red. • weekends. • evacuate. • CALL SIGN. • disinfect. • woof woof. • what are we. • WORK INJURY. • coordinator. • we write in. • paper print. • building related. • in coming chat request. • you can find me in any floors.
Security Crossword 2024-04-09
Across
- a physical device assigned to a user that can generate a unique code
- security principle that ensures information is only modified in an authorized manner
- security principle that ensures information is accessible by authorized users whenever required
- the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
- security principle that ensures information is only disclosed or made available to authorized users
- notification sent by an authentication server to a mobile device associated with a user
- a case of unauthorized computer access
- extra information that describes data, like location information or author information
- the act of verifying or proving a user's claim to an identity
- aspect of a computer that can be used to breach security
- special codes used to decode data
- the act of granting a user access to a system resource
- emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
- achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
- a type of malware disguised as legitimate software such as a game or a utility application
- measurements of the unique characteristics of an individual
Down
- control which users, groups, or services can perform an action on a file
- A standardized set of rules for formatting and processing data
- is the act of a user claiming an identity
- software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
- any software developed to compromise the confidentiality, integrity, or availability of data
- a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
- a phishing attack aimed at a high-value individual like a CEO
- a threat actor who gains unauthorized access to a high-value target for an extended period of time
- intelligence derived from publicly available information on an individual or organization
- the process of adding geographical identification to a device
- the most common form of a breach
- an authentication method that uses only one authentication factor to verify a claimed identity
- a protected environment where suspicious files can be run
- software that provides protection against computer viruses and many other forms of malware
30 Clues: the most common form of a breach • special codes used to decode data • a case of unauthorized computer access • is the act of a user claiming an identity • the act of granting a user access to a system resource • aspect of a computer that can be used to breach security • a protected environment where suspicious files can be run • ...
Household Security 2024-09-19
Across
- What do you open to enter a fenced area?
- What turns on automatically when someone approaches the house?
- Wakes you up or alerts you to danger.
- Makes a sound when someone is at the door.
- Detects motion or changes in the environment.
- Watches over an area with cameras.
- Where do you enter numbers to unlock a door?
- A secret number you enter to unlock something.
- What keeps the door securely closed?
Down
- A simple way to keep a door or window closed without a key.
- What takes pictures or records videos for security?
- A person who protects a place.
- What stores valuable items securely?
- Metal rods that protect windows or doors.
- A metal bar that locks a door from the inside.
- Makes a loud noise to alert people to danger.
- A barrier that surrounds your yard.
- What you wear on your wrist to check the time?
- Protects you from harm.
- What do you need to unlock a door?
20 Clues: Protects you from harm. • A person who protects a place. • Watches over an area with cameras. • What do you need to unlock a door? • A barrier that surrounds your yard. • What stores valuable items securely? • What keeps the door securely closed? • Wakes you up or alerts you to danger. • What do you open to enter a fenced area? • Metal rods that protect windows or doors. • ...
Security Crossword 2025-01-20
Across
- - Software that is specifically designed to disrupt, damage, or gain unauthorized access to computer systems.
- - A vulnerability in software that is unknown to the vendor and can be exploited by hackers.
- - A type of malicious software designed to block access to a computer system until a sum of money is paid.
- - The process of converting an input (or 'message') into a fixed-length string of characters, which is typically a hash code.
- - The process of verifying the identity of a user or process.
- - A network of private computers infected with malicious software and controlled as a group.
- - A method of trying to gather personal information using deceptive e-mails and websites.
- - A type of malware that is often disguised as legitimate software.
Down
- - A method of bypassing normal authentication to secure unauthorized remote access to a computer.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - A type of surveillance software that has the capability to record every keystroke you make.
- - The process of converting information or data into a code to prevent unauthorized access.
- - A collection of software tools that enable unauthorized access to a computer or network.
- - Software that enables a user to obtain covert information about another's computer activities.
- - Virtual Private Network, a service that encrypts your internet traffic and protects your online identity.
- - A security mechanism for separating running programs to reduce system failures or software vulnerabilities.
- - Distributed Denial of Service, an attack meant to shut down a machine or network, making it inaccessible.
- - A piece of software designed to update or fix problems with a computer program or its supporting data.
- - Software designed to detect and destroy computer viruses.
- - Unauthorized access to a computer system or network.
20 Clues: - Unauthorized access to a computer system or network. • - Software designed to detect and destroy computer viruses. • - The process of verifying the identity of a user or process. • - A type of malware that is often disguised as legitimate software. • - A method of trying to gather personal information using deceptive e-mails and websites. • ...
Security & Cybercrimes 2024-11-20
Across
- an action that violates the security of the system
- a malware that demands payment to gain access to your computer or files again
- a weakness that can compromise the security of the system
- any sexual activity done with the aid of computer systems
- allows the user to use an application or perform an operation
- a state of well-being of information and infrastructures
- using or copying ideas of others without their consent
- it has to be protected and secured
- work on its own without attaching itself to files or programs
Down
- used by third parties to infiltrate your computer
- a crime involving computers
- an attempt to obtain sensitive information
- taken in advance to protect the system against potential threats
- degrades system performance and poses a security threat
- malicious software
- must be strong to protect accounts
- ensuring that the information is accurate, complete, reliable, and is in its original form
- another term for phishing
- exclusive legal right
- an individual who breaks into computer systems to steal, change, or destroy information
20 Clues: malicious software • exclusive legal right • another term for phishing • a crime involving computers • must be strong to protect accounts • it has to be protected and secured • an attempt to obtain sensitive information • used by third parties to infiltrate your computer • an action that violates the security of the system • ...
Physical security 2025-03-06
Across
- – This happens when devices are not properly ventilated, leading to fire risks.
- – These can catch fire if overloaded.
- – A general term for any potential danger.
- – A danger caused by touching live cables.
- – A method to reduce the risk of electrical shock.
- – These can fall and cause injury if not placed securely.
- – Needed to prevent equipment from overheating.
- – A safety tool to put out electrical fires.
- – The general term for measures to prevent hazards.
- – A cause of fire when too many devices are plugged into a socket.
Down
- – The effect of an electric current passing through a person.
- – Spilling these near electrical equipment can lead to electrocution.
- – A strategy to prevent tripping hazards.
- – The act of stopping accidents before they happen.
- – Need to be properly managed to prevent tripping and electrocution.
- – Educating staff on safety practices.
- – The way out during fire hazards.
- – Cables forming these can lead to tripping hazards.
- – Covering wires properly to prevent electrocution.
- – A system that alerts people in case of fire.
20 Clues: – The way out during fire hazards. • – These can catch fire if overloaded. • – Educating staff on safety practices. • – A strategy to prevent tripping hazards. • – A general term for any potential danger. • – A danger caused by touching live cables. • – A safety tool to put out electrical fires. • – A system that alerts people in case of fire. • ...
Physical security 2025-03-06
Across
- – A secret code to protect computers.
- – Used to keep computer rooms safe.
- – Can be caused by overheating computers.
- – Should be locked when not in use.
- – A label to identify important ICT items.
- – These must be handled safely to avoid damage.
- – A camera system used for security monitoring.
- – Guidelines that help keep ICT equipment safe.
- – A loud sound that warns of danger.
- – What we should do to computers when not in use.
- – The way to leave safely in an emergency.
Down
- – These must be managed properly to prevent tripping.
- – Should be locked to keep computers safe.
- – Used to watch and record security footage.
- – Used to unlock doors and cabinets.
- – A card used to enter secure places.
- – A motion used to unlock some security doors.
- – A person who protects a place.
- – The protection of computers and information.
- – What we should always be when using ICT equipment.
20 Clues: – A person who protects a place. • – Used to keep computer rooms safe. • – Should be locked when not in use. • – Used to unlock doors and cabinets. • – A loud sound that warns of danger. • – A secret code to protect computers. • – A card used to enter secure places. • – Can be caused by overheating computers. • – Should be locked to keep computers safe. • ...
Computer Security 2025-03-14
Across
- Anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen but has the potential to cause serious damage.
- Use of modern electronic means to manipulate an event or influence public perception toward a certain point of view.
- Misuse This refers to entering a computer system without permission (hacking).
- An attempt to make a machine or network resource unavailable to its intended users, such as temporarily or indefinitely interrupting or suspending services of a host connected to the internet.
- Software that installs itself onto devices and then steals personal information about the user, like passwords, email addresses and other important information.
- An action or method that is applied to prevent, avert or reduce potential threats to computers, servers, networks, operating systems (OS) or information systems (IS).
- Is the use of technology to harass, threaten, embarrass, or target another person.
- Pretends it will be a useful and safe program.
- When someone accesses information without permission.
- Theft Is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.
- A security barrier designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside.
- Copying and distributing of recordings of a piece of music for which the rights owners (composer, recording artist, or copyright-holding record company) did not give consent.
- Sending the same message indiscriminately to a large number of internet users.
Down
- The act of intercepting communications between two points.
- A flaw or weakness in a system or network that could leave it open to attacks or allow an attacker to manipulate the system in some way.
- The protection of computing systems and the data that they store or access.
- An information security threat that involves an attempt to obtain, alter, destroy, remove, implant or reveal information without authorized access or permission.
- The practice of sending emails that appear to be from reputable companies in order to induce individuals to reveal personal information online.
- A malicious program or code that attaches itself to another program or file and can replicate itself, thereby infecting other systems.
- Can spread from device to device, but unlike a virus they don’t need to attach themselves to other programs.
- Gaining unauthorized access to data in a system or computer.
- A network of private computers infected with malicious software and controlled as a group without the owner's knowledge, often used to send spam.
- The act of illegally using, copying or distributing software without ownership or legal rights.
- Any illegal activity that uses a computer as its primary means of commission.
- Covert activities, such as the theft of trade secrets by the removal, copying or recording of confidential or valuable information in a company for use by a competitor.
- The practice of using another person's name and personal information to obtain credit, loans, etc.
26 Clues: Pretends it will be a useful and safe program. • When someone accesses information without permission. • The act of intercepting communications between two points. • Gaining unauthorized access to data in a system or computer. • The protection of computing systems and the data that they store or access. • ...
Information Security 2025-09-23
Across
- Digital proof of identity used in secure communications (9 letters)
- A program that pretends to be legitimate but is malicious (5 letters)
- An attack that overwhelms a system with traffic (3 letters)
- Opposite of encryption (11 letters)
- The process of converting data into unreadable form (10 letters)
- Software that spreads copies of itself across networks (5 letters)
- Ensuring data is not altered during storage or transfer (7 letters)
- Harmful software designed to damage systems (6 letters)
- Short form of "Personally Identifiable Information" (3 letters)
- Unauthorized access to a computer system (5 letters)
Down
- The process of verifying user identity (14 letters)
- Practice of disguising data to protect privacy (7 letters)
- Malicious software that locks files and demands payment (10 letters)
- Secret word or phrase used for authentication (8 letters)
- Unintended weakness in software that can be exploited (12 letters)
- A person who breaks into systems legally to find vulnerabilities (9 letters)
- Stronger form of DoS using multiple computers (4 letters)
- Attempt to trick users into revealing sensitive information via fake emails (7 letters)
- Security barrier between internal network and outside world (8 letters)
- Secret numeric code used in two-factor authentication (3 letters)
20 Clues: Opposite of encryption (11 letters) • The process of verifying user identity (14 letters) • Unauthorized access to a computer system (5 letters) • Harmful software designed to damage systems (6 letters) • Secret word or phrase used for authentication (8 letters) • Stronger form of DoS using multiple computers (4 letters) • ...
Industrial security 2025-10-15
Across
- – A prepared procedure to handle emergencies or disasters.
- – Security measure restricting movement due to threats.
- – A potential cause of unwanted incident or harm.
- – A person employed to protect property and personnel.
- – A badge used for identification and access within a facility.
- – A designated safe route used during an evacuation.
- – A set of rules and guidelines for security operations.
- – Continuous observation of people or areas for security purposes.
- – The routine inspection of areas to ensure safety and security.
- – The act of keeping people and assets safe from harm.
- – Unauthorized entry into a restricted area.
- – A system that uses video cameras to monitor and record activities.
- – A system that restricts entry to authorized personnel only.
Down
- – Written documentation of a security event or breach.
- – The process of identifying and evaluating potential hazards.
- – The deliberate destruction or disruption of industrial operations.
- – The act of stealing small quantities or low-value items from the workplace.
- – Protection of computer systems from digital attacks.
- – A weakness that can be exploited by threats.
- – Device that signals when unauthorized access occurs.
20 Clues: – Unauthorized entry into a restricted area. • – A weakness that can be exploited by threats. • – A potential cause of unwanted incident or harm. • – A designated safe route used during an evacuation. • – Written documentation of a security event or breach. • – A person employed to protect property and personnel. • ...
Cyber Corner 2023-03-27
Across
- Technique used to impersonate another user or system in order to gain access or hide identity
- attack that floods a target with traffic to make it unavailable to users
- Type of social engineering attack that uses emails or fake websites to steal personal information
- Software designed to harm a computer system or network
- Ethical hacker who uses their skills to help identify and fix security vulnerabilities
- a method for breaking into a system by trying every possible password combination.
- Type of malware designed to hide its presence and maintain privileged access to a computer system
- Hidden method of accessing a computer system that bypasses normal authentication procedures
- Malware disguised as legitimate software that can give an attacker access to a computer system
Down
- a type of malicious software that can encrypt files and demand payment for that release.
- a technique used to exploit vulnerabilities in a web application’s database.
- Malicious hacker who uses their skills to exploit security vulnerabilities for personal gain or harm
- Abbrev. of the attack in which an attacker intercepts communication between two parties and can eavesdrop, modify or inject malicious code into the communication.
- Software or device used to intercept and read network traffic
- Network of infected computers that are controlled remotely by an attacker
- Vulnerability in a computer system or software that is not yet known to the vendor or public
- Software or technique that takes advantage of a vulnerability in a computer system or application
17 Clues: Software designed to harm a computer system or network • Software or device used to intercept and read network traffic • attack that floods a target with traffic to make it unavailable to users • Network of infected computers that are controlled remotely by an attacker • a technique used to exploit vulnerabilities in a web application’s database. • ...
Cyber Literacy 2025-08-22
Across
- Emails that “fish” for users’ private information
- Malicious software used by hackers or cybercriminals
- and E-Commerce To convince people to buy something
- Words most relevant to our topic
- repeatedly sending mean messages
- revealing someone’s private thoughts
- Re-direct users to a phony website
Down
- Hackers that commit financial crimes
- insulting someone in an online discussion
- Questions Questions about a subject and what you want to learn
- People who “hack” or break into computer systems
- To learn about something
- threats Breaches of security causing harm to a computer
- stealing someone’s passwords and using for fraud
- Engines A tool to wade through the billions of websites
- Search Logical operators such as and, or, and not
- spreading lies and rumors
17 Clues: To learn about something • spreading lies and rumors • Words most relevant to our topic • repeatedly sending mean messages • Re-direct users to a phony website • Hackers that commit financial crimes • revealing someone’s private thoughts • insulting someone in an online discussion • People who “hack” or break into computer systems • ...
test2 2023-07-11
Across
- One-stop shop where you can quickly find the Cyber Security and Data Privacy/ Data Compliance requirements at Daimler Truck
- One of the the Purpose (SMART)
- An initiative powered by Women in Tech; a platform for everyone to connect with prominent leaders on different topics from innovations to work-life balance
Down
- People System that reflects the whole spectrum of our HR development environment
- One of the Values
- Campaign which stands for a prevention strategy that focuses on three dimensions: safety, health and wellbeing
6 Clues: One of the Values • One of the the Purpose (SMART) • People System that reflects the whole spectrum of our HR development environment • Campaign which stands for a prevention strategy that focuses on three dimensions: safety, health and wellbeing • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
Win an iPad mini from SIX Financial Information! 2013-04-01
Across
- How many global security ID schemes cross-referenced by SIX
- When the sum of 1 plus 1 might equal 3?
- International security ID number
- Managing Director of SIX Financial Information USA
- Brand of bourbon or one of the AL state birds
- How many millions of securities in SIX Financial’s DB?
- Creator of 15022 and 20022 message standards
- Capital of Alabama
- How many decades SIX has been in business?
Down
- When an issuer buys back securities?
- Company recently acquired by SunGard
- Provider of corp. actions & cross reference data
- One type of distribution
- Provider of secure financial messaging services
- What some debtors declare?
- UK security identification scheme
- Largest city in Alabama
- No. times SIX named "Best Corp. Actions Data Provider"
- Type of data that describes a security or issuer
- Swiss national security ID number
- Brendan’s last name
21 Clues: Capital of Alabama • Brendan’s last name • Largest city in Alabama • One type of distribution • What some debtors declare? • International security ID number • UK security identification scheme • Swiss national security ID number • When an issuer buys back securities? • Company recently acquired by SunGard • When the sum of 1 plus 1 might equal 3? • ...
web safety 2023-08-22
Across
- Monitoring web activity for ads.
- Dual-step login for added security.
- Unauthorized release of private info.
- Redirecting traffic to malicious sites.
- Stealing info for fraudulent purposes.
- Virtual private network for secure browsing.
- Harassment/intimidation behavior online.
- coding for utmost security.
- Cautious online behavior to avoid risks.
- Programs combating malware infections.
- Complex code to protect accounts.
- Manipulating to access sensitive data.
Down
- Restricting location data sharing.
- Regular maintenance of online security.
- Regularly saving data to prevent loss.
- Security barrier blocking unauthorized access.
- Deceptive emails/websites aiming to steal info.
- Protecting identifiable personal info.
- Harmful software harming devices/data.
- Fixes for software security vulnerabilities.
- Fraudulent schemes for financial gain.
- Controls limiting shared personal info.
- Coding data to prevent unauthorized reading.
- Securely locking devices to deter access.
- Online traces revealing user activities.
25 Clues: coding for utmost security. • Monitoring web activity for ads. • Complex code to protect accounts. • Restricting location data sharing. • Dual-step login for added security. • Unauthorized release of private info. • Regularly saving data to prevent loss. • Stealing info for fraudulent purposes. • Protecting identifiable personal info. • Harmful software harming devices/data. • ...
Security 101 2022-09-22
Across
- You are required to ____ any suspicious behavior to Jovian Security.
- One of the penalties for failure to comply with export guidelines is ____ years in prison.
- The last name of your Security Manager/FSO/CSSO.
- When someone sends an email with a link to a bogus website that tricks you into giving up your password, it is called ____.
- Your ____ is your underwear; don't share it with your friends and change it often.
- This information is deemed sensitive by the USG and requires protection of confidentiality.
- If you ____ something, say something.
- Two types of terrorism are International and ____.
- Owning a security clearance does not mean you have the right to access all classified information; you must also have ____.
- ____ is a US regulatory regime to restrict and control the export of defense and military related technologies to safeguard the US national security and further US foreign policy objectives.
- An unsolicited request for detailed information about your job, security clearance, contract activities, etc. would be considered a ____ contact.
Down
- Your Top Secret clearance is referred to as your ____ clearance.
- This information, if disclosed, could reasonably be expected to cause exceptionally grave damage to National Security.
- Never click on these in an email that has been sent by an unknown or untrusted source.
- ____ information is any information about you or another cleared employee that suggests the ability to safeguard classified information may be impaired.
- An ____ is an employee with legitimate access who is hardest to detect and who can cause the most damage to a company.
- As a cleared employee of the federal government, you should neither confirm nor deny the validity of any classified information that appears in open-source publications, on television, or in movies. This is covered under Public ____.
- Safeguard protected information, report unauthorized disclosure, and prepublication are your three ____ obligations.
- A malicious code that can infect your system.
- Any data that could be used to potentially identify a person.
20 Clues: If you ____ something, say something. • A malicious code that can infect your system. • The last name of your Security Manager/FSO/CSSO. • Two types of terrorism are International and ____. • Any data that could be used to potentially identify a person. • Your Top Secret clearance is referred to as your ____ clearance. • ...
Food Security 2020-10-08
Across
- When the supply on household level remains constant during the year and in the long-term
- Unfortunately these disputes contribute drastically to food security
- One risk factor or reason for malnutrition
- When all people have access to sufficient food that meets the needs of an active life
- Distance food travels from production to consumption
- Where the government regulates the food industry so food is safe to eat and consumers can make informed choices about food.
- Not enough food to eat
- Children who do not get enough food are shorter, weigh less and be less able physically and _______________________.
- Something to do with the weather which affects food availability
- Where most of the world's undernourished people live
- Unable to access enough food to sustain health and well being
- A threat to food security, lack of access to enough safe water.
Down
- process in which a general population is supplied with food
- At home, food needs to be prepared in this way
- When there is a shortage of food, prices ………….
- When people don’t have access to sustainable and nutritious food
- Nutrients missing from diet.
- Ability to meet the needs of the current population whilst not compromising future generations
- When people have enough food of appropriate quality available on a consistent basis.
- Another crucial factor to help remove food insecurity
20 Clues: Not enough food to eat • Nutrients missing from diet. • One risk factor or reason for malnutrition • At home, food needs to be prepared in this way • When there is a shortage of food, prices …………. • Distance food travels from production to consumption • Where most of the world's undernourished people live • Another crucial factor to help remove food insecurity • ...
Security Crossword 2020-02-21
Across
- act or process of growth; to bring out the capabilities or possibilities of;
- on the integrity, strength, ability, surety, etc.
- to bear or hold up; serve as a foundation for
- a person or thing that leads
- act or process of acquiring knowledge or skill.
- careful watch for possible danger
- or coordinated effort on the part of a group of people
- relative worth, merit, or importance
- condition of being protected from injury or danger
- competence or skill expected of a professional
- written or clerical records or reports, forming a necessary but often a routine
- a person’s manner, disposition, feeling, position, etc.,
Down
- requirement or obligatory for getting, having to holding a post
- matter that engages a person's attention, interest, or care, or that affects a person's welfare or happiness
- inquiry or interrogation.
- inspire with courage, spirit, or confidence
- systematic series of actions directed to some end
- act or instance of leading; guidance; direction
- derived from one's own achievements
- a person, vehicle or group
- things, conditions, or influences; surroundings
- right of possession; proprietorship.
- account or statement describing in detail an event, situation
- inquiry for ascertaining facts; detailed or careful examination
- sound; signal for attention
- fact or condition of being responsible
- hold in esteem or honor
- person’s manner of behaving or acting
- set of concise instructions or a summary of events
29 Clues: hold in esteem or honor • inquiry or interrogation. • a person, vehicle or group • sound; signal for attention • a person or thing that leads • careful watch for possible danger • derived from one's own achievements • right of possession; proprietorship. • relative worth, merit, or importance • person’s manner of behaving or acting • fact or condition of being responsible • ...
Security Crossword 2020-05-11
Across
- A system that binds public keys with identities
- CVP of ID PM at MS
- An avid skateboarder started this widely admired security company
- The TF in 17 Across was the architect for this technology
- Where you might specify a number used once
- First name, middle name, and surname, but for computers
- Sneaky character commonly found in discussions about Alice and Bob
- Used in silver ticket attacks: T??
- A security MVP with a popular AAD blog whom the author introduced to 17 across
- AAD researcher you might meet in Finland
- CVP of ID was once a Director of Development for this remote access protocol
- Controversial variable name discovered in Windows in 1999
- Mallory specializes in this kind of attack
- Before you login into Office365, you first interact with this popular service
- You might pass the hash to attack this
- XML oriented standard full of assertions
- I?? Acronym for IT dept most likely to manage AD
Down
- Preauthentication process involving X.509
- Your UPN could be considered to be a form of this
- Known for its utility with SSO
- A container of sorts in AD parlance
- Dir. PM of ID Sec. at MS
- Alan Turing built a bombe to crack this
- To issue X.509 certificates, you'd stand up one of these
- To understand the internals of an unknown protocol, one might do this to it
- The prefix in the flags ??_KEYEXCHANGE and ??_SIGNATURE used in MS CryptoAPI
- Architect behind Microsoft's two most widely used identity systems
- Keeper of secrets in Windows
- SYSKEY was introduced to help encrypt this
- The NTLM hash is sometimes referred to as this
- Container of claims in SAML
- Fill in the missing letters of this cipher known in the 90s for augmented security: 3??S
- One way or Two way
- Alliance determined to replace passwords with stronger alternatives
- One might use this to mitigate a rainbow table attack
- Tina Turner ex-husband that shares a name with IPSEC protocol
- Popular utility for 'handling' Windows credentials
- A salve for password fatigue
38 Clues: CVP of ID PM at MS • One way or Two way • Dir. PM of ID Sec. at MS • Container of claims in SAML • Keeper of secrets in Windows • A salve for password fatigue • Known for its utility with SSO • Used in silver ticket attacks: T?? • A container of sorts in AD parlance • You might pass the hash to attack this • Alan Turing built a bombe to crack this • ...
information security 2020-12-18
Across
- someone who is in a position of authority in an organization
- to keep someone or something safe from harm, damage, or illness
- what you earn by working and can use to buy things
- the criminal activity of sending emails or having a website that is intended to trick someone into giving away information such as their bank account number or their computer password. This information is then used to get money or goods
- the sets of programs that tell a computer how to do a particular job
- the act of deliberately making someone believe something that is not true
- the people who work for an official organization whose job is to catch criminals and make sure that people obey the law
- to damage something so badly that it no longer exists or cannot be used or repaired
- someone who steals things from another person or place
- facts or details that tell you something about a situation, person
Down
- very convenience
- someone who secretly uses or changes the information in other people’s computer systems
- relating to crime
- a small plastic card that you use to buy goods or services and pay for them later
- connect people
- a group of related parts that work together as a whole for a particular purpose
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- seeming bad or dishonest
- to calculate a result, answer, sum etc
- message
- the state of being able to be alone, and not seen or heard by other people
22 Clues: message • connect people • very convenience • relating to crime • seeming bad or dishonest • to calculate a result, answer, sum etc • what you earn by working and can use to buy things • someone who steals things from another person or place • someone who is in a position of authority in an organization • to keep someone or something safe from harm, damage, or illness • ...
information security 2020-12-18
Across
- the right to enter a place, use something, see someone etc
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- someone who is in a position of authority in an organization
- a clever but dishonest way to get money
- to make a computer, machine, or piece of
- relating to computers, especially to messages and information on the Internet
- a machine or tool that does a special job
- to keep someone or something safe from harm, damage, or illness
- when something bad is stopped from happening
- the crime of stealing
- informal someone who secretly uses or changes the information in other people’s computer systems
- a written or spoken description that says what happens in an event or process
- to take something that belongs to someone else
Down
- relating to crime
- a group of related parts that work together as a whole for a particular purpose
- the sets of programs that tell a computer how to do a particular job
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the act of deliberately making someone believe something that is not true
- to make a short hard sound, or make something produce this sound
- to damage something so badly that it no longer exists or cannot be used or repaired
- the place where you pay or are served in a shop, bank, restaurant etc
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • to make a computer, machine, or piece of • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • ...
information security 2020-12-18
Across
- the right to enter a place, use something, see someone etc
- a mark made by the pattern of lines at the end of a person’s finger, which is used by the police to find out who has committed a crime
- someone who is in a position of authority in an organization
- a clever but dishonest way to get money
- to make a computer, machine, or piece of
- relating to computers, especially to messages and information on the Internet
- a machine or tool that does a special job
- to keep someone or something safe from harm, damage, or illness
- when something bad is stopped from happening
- the crime of stealing
- informal someone who secretly uses or changes the information in other people’s computer systems
- a written or spoken description that says what happens in an event or process
- to take something that belongs to someone else
Down
- relating to crime
- a group of related parts that work together as a whole for a particular purpose
- the sets of programs that tell a computer how to do a particular job
- a secret group of letters or numbers that you must type into a computer before you can use a system or program
- the act of deliberately making someone believe something that is not true
- to make a short hard sound, or make something produce this sound
- to damage something so badly that it no longer exists or cannot be used or repaired
- the place where you pay or are served in a shop, bank, restaurant etc
21 Clues: relating to crime • the crime of stealing • a clever but dishonest way to get money • to make a computer, machine, or piece of • a machine or tool that does a special job • when something bad is stopped from happening • to take something that belongs to someone else • the right to enter a place, use something, see someone etc • ...
Security 101 2021-09-16
Across
- distributed type of denial
- Public Key Infrastructure
- robot and network
- Invented WWW
- stuxnet virus type
- legitimate and bypasses security
- A meaning in CIA
- first commercially successful video game
- replacement for telnet
- injected or persistent script
- security flaw or weakness
- same key for encryption/decryption
Down
- popular hacking tool
- TOR dark web
- famous hacking convention in Las Vegas
- best password has
- Invented Email
- person who finds and exploits vulnerabilities
- first self-replicating virus
- First computer bug
- virtual information resource under siege
- Firstname Linux Creator
- process to extend length of password
- different keys for encryption/decryption
- tool to scan TCP ports
25 Clues: TOR dark web • Invented WWW • Invented Email • A meaning in CIA • robot and network • best password has • stuxnet virus type • First computer bug • popular hacking tool • replacement for telnet • tool to scan TCP ports • Firstname Linux Creator • Public Key Infrastructure • security flaw or weakness • distributed type of denial • first self-replicating virus • injected or persistent script • ...
IT Security 2021-03-01
Across
- An Internet _____ is a number designating a specific protocol or command
- _____ code execution provides for a hacker to make changes to a device wherever they are
- IP Address is a _______ label assigned to each device on a network
- Service _____ identifier
- _____ code, the exploitation of a computer bug by processing invalid data
- A _____ of concept allows for experimenting
- Common vulnerability _____ system
- Identifies, monitors, and analyzes security events.
- Encryption is converting _____ to an unrecognizable form
- A _____ authority digital certificates
- Network: A group of ____ or more computers or devices which are linked together
- An _____ attack is immediately recognizable
- Pre-booting is the time between turning on a computer and _____ the operating system
- A port _____ is an application designed to probe a server or host for open ports
Down
- _____ escalation is to gain unauthorized elevated access to information technology
- Acts as a filter between a trusted system and an outside connection
- A technology or network weakness
- To take advantage of an IT weakness
- A standard set of rules that allow electronic devices to communicate with each other
- A _____ audit is a review of an organization's adherence to regulatory guidelines
- Health information privacy (US)
- A _____ healing device can recover on its own
- European data privacy act
- Defense in _____, multiple layers to security
- Moving _____ is to exploit from a vulnerable device to other areas of a network
25 Clues: Service _____ identifier • European data privacy act • Health information privacy (US) • A technology or network weakness • Common vulnerability _____ system • To take advantage of an IT weakness • A _____ authority digital certificates • A _____ of concept allows for experimenting • An _____ attack is immediately recognizable • A _____ healing device can recover on its own • ...
Network Security 2023-03-28
Across
- varies in size and can sustain network operations for only a limited time in the event of an outage
- attacker poses as a trusted site
- analyzes data, identifies attacks, responds to intrusions
- after user is authenticated, he is granted access to resources or services n the network
- pretends to do one thing while doing something malicious
- a form of network equipment redundancy
- a rogue access point that looks like a legit access point
- manipulating people inside the network environment to gain access to the network from the outside
- uses your info to generate targeted ads
- used to check for weakness in a network
- consists of software safeguards
- programming a list of mac addresses that you accept and block all others
Down
- a program that has two jobs: to replicate and activate
- when a person goes through trash to find personal info
- a user identifies himself to the system and the identity is verified against authentication database
- duplication of digital components/devices
- hides itself from all but the most aggressive antimalware tools
- replicates exclusively through networks
- something on a system or network that you don't want to have to happen
- method used to prevent passage of any TCP or UDP segments or datagrams through any port other than ones assigned by system admin
- consists of hardware safeguards
- flooding the network w/so many requests that it stops functioning
- using another person's wireless network w/o permission
- software that helps prevent intrusions
- the tracking of a network and resource usage on the network
25 Clues: consists of hardware safeguards • consists of software safeguards • attacker poses as a trusted site • a form of network equipment redundancy • software that helps prevent intrusions • replicates exclusively through networks • uses your info to generate targeted ads • used to check for weakness in a network • duplication of digital components/devices • ...
Internet Security 2013-10-03
Across
- Software that sends information from your computer to a third party without your consent
- Programs that are designed to harm your computer
- A group of computers within a small area, such as a house, office or school, that are connected to each other
- Stealing information from mobile devices using a wireless connection Cookie – Information, usually in a file, about someone’s Internet activities, such as the date of the last visit to a Web site, preferences, etc.
- Driving around with a computer to find and access wireless networks
- A number used to identify a computer or other device on the Internet
- Trying to get into computer systems in order to steal, corrupt, or illegitimately view data
- Buying items online and conducting business over the Internet
- Phony email warning about a computer virus or other threat
- A device that monitors and controls the traffic coming into and out of your computer
- A self-replicating, self-spreading malicious program
Down
- Software that displays advertising banners or pop-up windows Bandwidth – How fast information can be moved from one computer to another
- Redirecting users from legitimate Web sites they are trying to visit to fraudulent Web sites
- A computer language that is used for creating World Wide Web pages
- A code of conduct followed on the Internet in order to be respectful and clearly understood (Internet + etiquette)
- A malicious program disguised as legitimate software
- A way of communicating online in code by changing the spellings of words
- Unwanted email used mainly for advertising
- When someone uses your personal information to commit fraud and the nation’s first research and education center devoted to information networking
- Using fake Web sites to trick you into giving away personal information
- Hanging out on Internet bulletin boards or chat rooms without posting
- Computer system that provides shared resources over a network
- In gaming, targeting players below your skill level; Also, a type of Denial of Service attack
- Posting messages that are deliberately hostile and insulting
24 Clues: Unwanted email used mainly for advertising • Programs that are designed to harm your computer • A malicious program disguised as legitimate software • A self-replicating, self-spreading malicious program • Phony email warning about a computer virus or other threat • Posting messages that are deliberately hostile and insulting • ...
Information Security 2014-06-27
Across
- ___ [abbreviation] refers to information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.
- ______ is software that displays ads on your computer while you are using it, often in the form of popups. It is almost always installed without your authorization or hidden with another program you installed.
- ________ information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account number, credit card number, etc.
- Information Security Officer
- _________ is the commonly used term to mean the capacity of a communication channel to pass data through the channel in a given amount of time.
- The strongest password is: grrrrrrr8!, Go^sa!, John012109, Am3rica, This_P^zz1e!
- ______ engineering is an approach to gain access to information primarily through misrepresentation, relying on the trusting nature of individuals.
- Information Security is not just a _________ issue.
- Protect your laptop, cell phone or Blackberry, etc. by treating it like ____.
Down
- A ________ is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and blocks communications to and from sources you don’t permit.
- Never share your ________ with another person.
- A ____ Assessment is the process by which risks are identified and the impact of those risks determined.
- ____ is a term for spam messages sent to instant message addresses.
- Your password is like a _________; use it regularly, change it often, and do not share it with anyone else.
- ___ [abbreviation] is the place in the computer where the application programs and data in current use are kept so they can be quickly reached by the computer’s processor.
- An __________ use policy is a set of rules and guidelines that specify appropriate use of computer systems or networks.
- When somebody sends an e-mail with a link to a bogus website it is called _________.
- A ________ download is a program that is involuntarily downloaded to your computer, without your permission or even your awareness. It can be downloaded by simply visiting a web site or viewing an HTML email message.
- Criminals sometimes use _______ - programs like viruses and spyware – to get into your computer. Once there, they can steal information, send spam, and commit fraud.
- The _______ Privacy Rule focuses upon the protection of the privacy of people who seek care. (abbr.)
20 Clues: Information Security Officer • Never share your ________ with another person. • Information Security is not just a _________ issue. • ____ is a term for spam messages sent to instant message addresses. • Protect your laptop, cell phone or Blackberry, etc. by treating it like ____. • The strongest password is: grrrrrrr8!, Go^sa!, John012109, Am3rica, This_P^zz1e! • ...
Public Security 2016-10-01
Across
- Prueba
- Cárcel
- Fiscal
- Arma
- Sospechoso
- Cadáver
- Seguridad
- Delito
- Tecnología
- Robo
- Disciplina
- Secuestro
- Ejercito
- vest: Chaleco antibalas
- Educación
- Inocente
- Inteligencia
- Evidencia
- Autopsia
- Abogado
- Ciencia
- Entrenamiento
- Juez
- Patrulla
- Cuchillo
Down
- Forense
- Lealtad
- Pistola
- Violencia
- Detective
- Recompensa
- Asalto
- Marina
- Código
- Corporación
- Protección
- Motín
- Delincuente
- University
- Rango
- Investigación
- Huella digital
- Esposas
- gas: Gas lacrimógeno
- Orden
- Ley
- Victima
- Ladrón
- Uniforme
- Policía
- Culpable
- ministry: Ministerio público
52 Clues: Ley • Arma • Robo • Juez • Motín • Rango • Orden • Prueba • Cárcel • Fiscal • Asalto • Delito • Marina • Código • Ladrón • Forense • Lealtad • Pistola • Cadáver • Esposas • Victima • Abogado • Ciencia • Policía • Ejercito • Inocente • Autopsia • Uniforme • Culpable • Patrulla • Cuchillo • Violencia • Detective • Seguridad • Secuestro • Educación • Evidencia • Recompensa • Sospechoso • Tecnología • Disciplina • Protección • University • Corporación • Delincuente • Inteligencia • ...
Food Security 2016-04-28
Across
- Being inferior in quality, or insufficient in amount
- Access to safe and nutritious food and is produced in a way that is environmentally sustainable
- Lack of fairness/justice
- The degree of overall satisfaction one gets from life
- Discomfort, weakness, illness or pain from lack of food
- Sufficient food for all people at any given time
- Any nutritious substance that people/animals eat/drink to maintain life and growth
- Physical and economic access to food for everyone at all times
- Having insufficient food that does not provide the correct health benefits
- Foods containing large amounts of dietary nutrients
- Often a nation/country that is still developing
Down
- Efforts to address and end hunger
- President of South Africa from 1994-1999
- The lack of balance/similarity in status
- People having physical social and economic access to sufficient safe and nutritious food(s)
- Often more developed, capitalist, industrial nations/countries
- Providing food for the present without compromising future generation's supply
- Access to culturally acceptable food which is produced and obtained in ways that do not compromise one's dignity, human rights or self-respect
- *BONUS* Who has the most points (all-time) in the NHL
- The process of providing/obtaining the food necessary for growth and good health
- Justice, fairness and freedom to all; everyone is equal
- A campaign to collect food for a charitable organization
22 Clues: Lack of fairness/justice • Efforts to address and end hunger • President of South Africa from 1994-1999 • The lack of balance/similarity in status • Often a nation/country that is still developing • Sufficient food for all people at any given time • Foods containing large amounts of dietary nutrients • Being inferior in quality, or insufficient in amount • ...
Security Challenge 2016-01-30
Across
- Pelconian Parent
- Big Gamble / Big Booth
- Low light foe
- Ivy League Blogger
- Japanese company / Chinese walls
- First P of PPF
- S,G,Q for video
- Palindromic access control mfr
Down
- Metal oxide, complimentary
- Runner-up in race-to-bottom
- SOE
- Just over of the rainbow from UV
- Actually just 3840
- Milestone Partner of the Year
- Invented 4K CCTV camcorder
- Makes loonies
- Should rhyme with hoax but doesn't
- H264 done one better
- Hanwha DBA
- 802.3.af
- Digimergerer
- Illuminance
22 Clues: SOE • 802.3.af • Hanwha DBA • Illuminance • Digimergerer • Low light foe • Makes loonies • First P of PPF • S,G,Q for video • Pelconian Parent • Actually just 3840 • Ivy League Blogger • H264 done one better • Big Gamble / Big Booth • Metal oxide, complimentary • Invented 4K CCTV camcorder • Runner-up in race-to-bottom • Milestone Partner of the Year • Palindromic access control mfr • ...
Food Security 2017-04-29
Across
- Physical injured by bacteria.
- Around the world.
- Misuse, devastation.
- Enough to fill one’s desire.
- Financially challenged.
- Acquire from foods, used to nourish a person’s physical condition.
- Farming, planting.
- A humid and hot climate.
- No water, climate problem.
- An epidemic of infectious disease.
- Far from average.
- Not enough nutrition to supply a person’s body.
- No foods, or anything to fill one’s stomach.
- Fairness, unbiased.
- Separate an item with someone.
Down
- Demand, use.
- Units of energy.
- Too much body weight.
- Accept, back off.
- What makes a something unique.
- Something that’s used to solve an issue.
- Make, manufactured.
- Accept, permit.
- Fighting, suffering.
- Accessibility.
- Supply, grant.
- Have nothing.
- Used to purchase goods.
- Respect and basic human rights.
- A kind of natural effect with a short duration of time.
30 Clues: Demand, use. • Have nothing. • Accessibility. • Supply, grant. • Accept, permit. • Units of energy. • Around the world. • Accept, back off. • Far from average. • Farming, planting. • Make, manufactured. • Fairness, unbiased. • Misuse, devastation. • Fighting, suffering. • Too much body weight. • Financially challenged. • Used to purchase goods. • A humid and hot climate. • No water, climate problem. • ...
Food Security 2017-04-29
Across
- A kind of natural effect with a short duration of time.
- Enough to fill one’s desire.
- A humid and hot climate.
- Fairness, unbiased.
- Supply, grant.
- Not enough nutrition to supply a person’s body.
- Units of energy.
- Accept, permit.
- Accept, back off.
- Around the world.
- Physical injured by bacteria.
- Too much body weight.
- Have nothing.
- Separate an item with someone.
Down
- Misuse, devastation.
- An epidemic of infectious disease.
- No water, climate problem.
- Farming, planting.
- Respect and basic human rights.
- Accessibility.
- What makes a something unique.
- Demand, use.
- Something that’s used to solve an issue.
- Fighting, suffering.
- Acquire from foods, used to nourish a person’s physical condition.
- Far from average.
- No foods, or anything to fill one’s stomach.
- Make, manufactured.
- Used to purchase goods.
- Financially challenged.
30 Clues: Demand, use. • Have nothing. • Accessibility. • Supply, grant. • Accept, permit. • Units of energy. • Far from average. • Accept, back off. • Around the world. • Farming, planting. • Fairness, unbiased. • Make, manufactured. • Misuse, devastation. • Fighting, suffering. • Too much body weight. • Used to purchase goods. • Financially challenged. • A humid and hot climate. • No water, climate problem. • ...
Facebook Security 2017-09-19
Across
- Whose Diner Is It?
- Sans Logistics
- Inventor From Menlo Park
- No Touchy
- Paystub access
- Sierra
- Rays used to filter data center water.
- We all badge in to keep the uninvited out.
- Quebec
- Burtdawg
- 24DAV
- FC Mobile
- 3 minus 2 Chief Engineer
- We're building the future
- Online Courses
Down
- Internal Facebook employee application
- Meditate here.
- Lowest Mohs
- American Health and Safety Institute
- Mikitarians ATN Subordinate
- Contract worker
- ATN1.1F.08
- Prairie Meadows, Exile,...?
- He's got IT
- Baby Zuck
- FTE badge color
- Keep It To Yourself
- Found on every continent except Antarctica.
- PPE Noggin Aegis
- All employee and employee conversations will be...
- First aid suppliers
- George and Margaret's Daughter
- G4S General Manager who helped The Beach Boys?
- Elsa's creation
- Number of Others Like Ours
35 Clues: 24DAV • Sierra • Quebec • Burtdawg • No Touchy • Baby Zuck • FC Mobile • ATN1.1F.08 • Lowest Mohs • He's got IT • Meditate here. • Sans Logistics • Paystub access • Online Courses • Contract worker • FTE badge color • Elsa's creation • PPE Noggin Aegis • Whose Diner Is It? • Keep It To Yourself • First aid suppliers • Inventor From Menlo Park • 3 minus 2 Chief Engineer • We're building the future • ...
information security 2018-05-17
Across
- An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
- A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
- An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
- A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
- All malicious software, including viruses, Trojan horses, and worms
- Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
- A weakness in some aspect of a computer system that can be used to compromise a system during an attack
- Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
- Property of being accessible and usable on demand by an authorized entity
- Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
- Property of accuracy and completeness
- The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
- A string of characters that allows access to a computer, interface, or system.
Down
- The fear of being without a mobile device, or beyond mobile phone contact
- A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
- A software that detects and cleans comp
- Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
- Potential cause of an unwanted incident, which can result in harm to a system or organization
- The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
- A humorous or malicious deception
- the ability to control information about oneself
- Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
- Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
- An autonomous and malicious software program propagating among computer networks
- The person that a software program or hardware device is designed for.
- Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
- Measure of the criticality of a situation--the likelihood of something being attacked
28 Clues: A humorous or malicious deception • Property of accuracy and completeness • A software that detects and cleans comp • the ability to control information about oneself • All malicious software, including viruses, Trojan horses, and worms • The person that a software program or hardware device is designed for. • ...
information security 2018-05-17
Across
- A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
- An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
- A humorous or malicious deception
- Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
- Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
- Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
- An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
- The person that a software program or hardware device is designed for.
- Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
- Property of being accessible and usable on demand by an authorized entity
- Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- Potential cause of an unwanted incident, which can result in harm to a system or organization
- The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
- An autonomous and malicious software program propagating among computer networks
Down
- Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
- Property of accuracy and completeness
- the ability to control information about oneself
- The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
- A weakness in some aspect of a computer system that can be used to compromise a system during an attack
- All malicious software, including viruses, Trojan horses, and worms
- A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
- The fear of being without a mobile device, or beyond mobile phone contact
- Measure of the criticality of a situation--the likelihood of something being attacked
- A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
- A software that detects and cleans comp
- A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
- Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
- A string of characters that allows access to a computer, interface, or system.
28 Clues: A humorous or malicious deception • Property of accuracy and completeness • A software that detects and cleans comp • the ability to control information about oneself • All malicious software, including viruses, Trojan horses, and worms • The person that a software program or hardware device is designed for. • ...
Network Security 2018-08-24
Across
- determining the privileges of a user
- protection of information or information resources
- commonly used hash function that makes 128-bit hash value
- Access, Authentication, Authorization
- puts up a barrier in between internal network and outside networks
- collections of equal and non-equal encryption algorithms
- combines multiple layers of defenses at the edge and in the network
- determines physical location
Down
- stop people from uploading or forwarding important information in an not safe way
- automatically sees activities that are not normal
- cryptographic hash functions published by NIST
- control web use, block threats, and deny access to malicious websites
- the only protection for the data when the defense fails
- Confidentiality, Integrity, Availability
- protects a wireless network
- blocks incoming attacks and controls outbound messages to prevent the loss of data
- hiding information in blocks or within images
- Determining the privileges to resources, objects, or data
- countermeasures to avoid or fight against security risks
- encrypts the connection from an endpoint to a network
20 Clues: protects a wireless network • determines physical location • determining the privileges of a user • Access, Authentication, Authorization • Confidentiality, Integrity, Availability • hiding information in blocks or within images • cryptographic hash functions published by NIST • automatically sees activities that are not normal • ...
Network Security 2022-04-27
Across
- any program or code designed to do something on a system or network that you don’t want to have happen.
- software tools and programs designed to identify and prevent malicious software, or malware, from infecting computer system or electric devices
- A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.
- Can sustain network operations for only a limited time in the event of an outage.
- Redundant ___ eliminates a single point of power failure.
- a program that has two jobs: to replicate and to activate.
- functions similar to a virus. It replicates exclusively through networks.
- Horse- is a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad.
- (IPS)- similar to IDS, but adds the capability to react to an attack (Active)
Down
- occurs when a user identifies himself to the system, and the identity is verified against an authentication database
- Engineering is the process of using or manipulating people inside the network environment to gain access to that network from the outside
- (AUP) states what users are allowed and not allowed to do on the company’s network
- protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
- Provides incremental trunk speeds by combining multiple Fast Ethernet links.
- uses duplication of critical components/devices, increasing the reliability of the system.
- software that detects, prevents, and removes viruses, worms, and other malware from a computer
- diving- when a person goes through the trash in order to find personal information
- - using another person's wireless network without permission.
- the 2nd most common firewall tool ensuring port security through port filtering
- a function of any program that sends information about your system or your actions over the Internet.
20 Clues: Redundant ___ eliminates a single point of power failure. • a program that has two jobs: to replicate and to activate. • - using another person's wireless network without permission. • functions similar to a virus. It replicates exclusively through networks. • Provides incremental trunk speeds by combining multiple Fast Ethernet links. • ...
Information Security 2023-11-19
Across
- It is Clould Service like TCS uses Google Workspaces
- An ability to shift workloads between cloud venders as needs change.
- Application security testing examines source code.
- An application in TCS for Business Continuity Planning.
- A protocol operate on UDP ports 67 and 68
- DAY It is the day a new vulnerability is known and no patch is available yet.
- A TCS process for releasing application on Internet / Intranet.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
- A TCS portal with a framwork for Software security.
- Plan It is a plan devised for an outcome other than usual plan.
- It is achieved by using Hashing.
Down
- A username, passowrd, and app-generated code on a phone.
- You should not just identity, you should also confirm ________________________
- Allows you to login once and access many services and systems.
- A software development methodology is most closely linked to DevSecOps approach.
- An application tool recommended to use in TCS for storing and manage multiple credentials.
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information
- A TCS application used for managing physical access and logical resources access management.
- Jenkins is the commonly used tool for performing this activity in the application development.
20 Clues: It is achieved by using Hashing. • A protocol operate on UDP ports 67 and 68 • Application security testing examines source code. • A TCS portal with a framwork for Software security. • It is Clould Service like TCS uses Google Workspaces • An application in TCS for Business Continuity Planning. • A username, passowrd, and app-generated code on a phone. • ...
