cyber security Crossword Puzzles
Data Security 2024-01-23
Across
- software or hardware that sits between a computer and external network that monitors and filters all incoming and outgoing activities.
- a way of proving somebody or something is who or what they claim to be.
- (2words)the privacy of personal information, or other information stored on a computer, that should not be accessed by unauthorised parties.
- (2words)Identifying individuals through facial features.
- software that detects and removes spyware programs installed illegally on a user’s computer system.
- the use of encryption keys to make data meaningless without the correct decryption key.
- Comparison of unique patterns for access approval.
- Making data unreadable without proper decoding keys.
- malicious software that seeks to damage or gain unauthorised access to a computer system.
- Internet robots that can take control of computer systems.
- (2words)use of access levels to ensure only authorised users can gain access to certain data.
- (2words)Code activated under specific conditions to carry out harmful tasks.
- Infra-red scan capturing blood vessel patterns for identification.
- redirecting a user to a fake website in order to illegally obtain personal data about the user.
- (3words)altering IP addresses on a DNS server by a ‘pharmer’ or hacker with the intention of redirecting a user to their fake website.
Down
- Unauthorized access to computer systems.
- (3words)laws which govern how data should be kept private and secure.
- rely on the unique characteristics of human beings as part of the password system.
- illegal access to a computer system without the owner’s permission.
- legitimate-looking emails designed to trick a recipient into giving their personal data to the sender of the email.
- (2words)an agreement that allows an individual to use a computer or network server, often requiring a user name and password.
- (2words)methods taken to prevent unauthorised access to data and to recover data if lost or corrupted.
- (2words)hacking done with the sole intent of causing harm to a computer system or user (for example, deletion of files or use of private data to the hacker’s advantage).
- Stand-alone virus replicating and spreading to other computers.
- use of unique human characteristics to identify a user (such as fingerprints or face recognition).
- hacking (2words)hacking used to test the security and vulnerability of a computer system. The hacking is carried out with the permission of the computer system owner.
26 Clues: Unauthorized access to computer systems. • Comparison of unique patterns for access approval. • Making data unreadable without proper decoding keys. • (2words)Identifying individuals through facial features. • Internet robots that can take control of computer systems. • Stand-alone virus replicating and spreading to other computers. • ...
Security Review 2025-01-31
Across
- Person, A person has a favorable determination of eligibility for access to classified information, has signed an approved nondisclosure agreement, and has a need-to-know.
- An administrative determination that an individual is eligible, from a security point of view, for access to classified information.
- Activities designed to prevent or thwart spying, intelligence gathering, and sabotage by an enemy or other foreign entity.
- 5 step process to keep potential adversaries from accessing our critical information, to include information about planned, ongoing, or completed operations.
- Unauthorized disclosure of classified information.
- Concealing foreign travel, unexplained affluence, working abnormal work hours, or attempting to access sensitive information without authorization.
- Travel Report your _______ ______ to your security office at least 30 days in advance
- Threat, The likelihood, risk or potential for an insider to use their authorized access, wittingly or unwittingly, to harm the organization and / or national security.
- Oversees and implements security measures within a specific facility or organization.
Down
- The process of changing laws so that certain actions are no longer considered crimes or have reduced penalties.
- Clearance, Having a ________ _________ requires me to report changes in status, adverse information, foreign travel and submit an SF86 every 5 years.
- Unclassified Information, Information that requires safeguarding or dissemination controls as per laws, regulations, or government-wide policies.
- An administrative determination that, from a security viewpoint, an entity is eligible for access to classified information.
- Any form of subtle extraction of information during an apparently normal and innocent conversation.
- Unauthorized disclosure that can be expected to cause Serious Damage to National Security.
- The ability or opportunity to obtain knowledge of classified information.
- Spotting and assessing can be a phase of this insider threat technique.
- This is an example: Processing classified material on a non-approved computer.
- Information, Any information that adversely reflects on the integrity or character of a cleared employee, which suggests that his or her ability to safeguard classified information may be impaired, that his or her access to classified information clearly may not be in the interest of national security, or that the individual constitutes an insider threat.
- Evaluation, A personnel security investigative process to review the background of a covered individual who has been determined to be eligible for access to classified information or to hold a sensitive position at any time during the period of eligibility.
20 Clues: Unauthorized disclosure of classified information. • Spotting and assessing can be a phase of this insider threat technique. • The ability or opportunity to obtain knowledge of classified information. • This is an example: Processing classified material on a non-approved computer. • ...
Security Review 2025-01-31
Across
- Person, A person has a favorable determination of eligibility for access to classified information, has signed an approved nondisclosure agreement, and has a need-to-know.
- An administrative determination that an individual is eligible, from a security point of view, for access to classified information.
- Activities designed to prevent or thwart spying, intelligence gathering, and sabotage by an enemy or other foreign entity.
- 5 step process to keep potential adversaries from accessing our critical information, to include information about planned, ongoing, or completed operations.
- Unauthorized disclosure of classified information.
- Concealing foreign travel, unexplained affluence, working abnormal work hours, or attempting to access sensitive information without authorization.
- Travel, Report your _______ ______ to your security office at least 30 days in advance
- Threat, The likelihood, risk or potential for an insider to use their authorized access, wittingly or unwittingly, to harm the organization and / or national security.
- Oversees and implements security measures within a specific facility or organization.
Down
- The process of changing laws so that certain actions are no longer considered crimes or have reduced penalties.
- Clearance, Having a ________ _________ requires me to report changes in status, adverse information, foreign travel and submit an SF86 every 5 years.
- Unclassified Information, Information that requires safeguarding or dissemination controls as per laws, regulations, or government-wide policies.
- An administrative determination that, from a security viewpoint, an entity is eligible for access to classified information.
- Any form of subtle extraction of information during an apparently normal and innocent conversation.
- Unauthorized disclosure that can be expected to cause Serious Damage to National Security.
- The ability or opportunity to obtain knowledge of classified information.
- Spotting and assessing can be a phase of this insider threat technique.
- This is an example: Processing classified material on a non-approved computer.
- Information, Any information that adversely reflects on the integrity or character of a cleared employee, which suggests that his or her ability to safeguard classified information may be impaired, that his or her access to classified information clearly may not be in the interest of national security, or that the individual constitutes an insider threat.
- Evaluation, A personnel security investigative process to review the background of a covered individual who has been determined to be eligible for access to classified information or to hold a sensitive position at any time during the period of eligibility.
20 Clues: Unauthorized disclosure of classified information. • Spotting and assessing can be a phase of this insider threat technique. • The ability or opportunity to obtain knowledge of classified information. • This is an example: Processing classified material on a non-approved computer. • ...
network security 2024-07-24
Across
- provides multiple ports for connecting nodes
- can be used to share some of a company’s intranet resources with people outside the organization.
- is used to prevent attenuation when packets are traveling long distances
- are rules of communication that ensure packets are sent, received, and interpreted properly, and that data integrity, or accuracy, is guaranteed
- This contains the actual data being transmitted
- is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it
- consists of a single copper wire that is surrounded by insulation and a wire mesh shield, all inside a plastic sheath
- normally consists of four pairs of wires that are twisted around each other. All wires are collectively bound together in a layer of plastic that you would refer to as the network cable.
- most nodes connect directly to each other
Down
- is a node on a network that serves as an entrance to another network
- is a complex device that stores the routing information for networks. Determines the best route for packets
- a thin strand of glass that transmits pulsating beams of light rather than electric current.
- it is used to communicate and share information between computers and various devices.
- all nodes are connected to a hub or switch and communicate through it.
- The device at each node that performs translation and transmission
- is a data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media.
- the logical layout of the cables and devices that connect the nodes of the network
- is the connection of two or more central computers or LANs, generally across a wide geographical area.
- This contains information needed by the network, such as the address of the destination node
- Some organizations offer an internal version of the internet, which contains only the company’s private information.
20 Clues: most nodes connect directly to each other • provides multiple ports for connecting nodes • This contains the actual data being transmitted • The device at each node that performs translation and transmission • is a node on a network that serves as an entrance to another network • all nodes are connected to a hub or switch and communicate through it. • ...
Food security 2024-11-05
Across
- Environmental impact on food
- Animals raised for food
- Long-term environmental health
- Essential for irrigation
- Availability of resources
- Plants grown for food
- Lack of essential nutrients
- Crop production per area
- Amount of food produced
- Farming and crop production
Down
- Variety in ecosystems
- Foundation of agriculture
- Support for the food-insecure
- Extreme food shortage
- Shortage of resources
- Ability to withstand crises
- Government rules and regulations
- Diet quality focus
- Fair food distribution
- Food scarcity issue
20 Clues: Diet quality focus • Food scarcity issue • Variety in ecosystems • Extreme food shortage • Shortage of resources • Plants grown for food • Fair food distribution • Animals raised for food • Amount of food produced • Essential for irrigation • Crop production per area • Foundation of agriculture • Availability of resources • Ability to withstand crises • Lack of essential nutrients • ...
Food security 2024-11-05
Across
- A key component of food security involving ability to obtain food (6 letters).
- The process of transporting food from production to consumers (12 letters).
- Growth of cities, often affecting local food production (12 letters).
- Poor nutrition due to lack of a balanced diet (11 letters).
- ______: Process to maintain safe food from contamination (9 letters).
- Ability of systems to recover quickly, important for food security (10 letters).
- Financial aid provided to farmers to support food production (7 letters).
- Amount of crops produced per unit area (5 letters).
- Chemicals used to kill pests, sometimes impacting food safety (10 letters).
- Physical systems like roads and storage that support food supply (14 letters).
- Abbreviation for genetically modified organisms (4 letters).
Down
- A state caused by prolonged lack of food (6 letters).
- Means of securing the necessities of life, often through agriculture (10 letters).
- Economic condition that limits food access (7 letters).
- Practice of farming, crucial to food production (11 letters).
- ______: Significant changes in temperature and weather patterns impacting food production (6 letters).
- Meeting the needs of the present without compromising future generations (14 letters).
- Food produced without synthetic pesticides or fertilizers (7 letters).
- Artificial application of water to support crop growth (10 letters).
- Extreme scarcity of food (6 letters).
- ________: Ability of people to access sufficient, safe, and nutritious food (8 letters).
- Prolonged period with little or no rain (7 letters).
- Variety of life in ecosystems essential for resilient agriculture (12 letters).
- Individuals who cultivate land and raise crops (7 letters).
- The process of providing or obtaining the food necessary for health (9 letters).
25 Clues: Extreme scarcity of food (6 letters). • Amount of crops produced per unit area (5 letters). • Prolonged period with little or no rain (7 letters). • A state caused by prolonged lack of food (6 letters). • Economic condition that limits food access (7 letters). • Poor nutrition due to lack of a balanced diet (11 letters). • ...
Physical security 2025-03-06
Across
- – This happens when devices are not properly ventilated, leading to fire risks.
- – These can catch fire if overloaded.
- – A general term for any potential danger.
- – A danger caused by touching live cables.
- – A method to reduce the risk of electrical shock.
- – These can fall and cause injury if not placed securely.
- – Needed to prevent equipment from overheating.
- – A safety tool to put out electrical fires.
- – The general term for measures to prevent hazards.
- – A cause of fire when too many devices are plugged into a socket.
Down
- – The effect of an electric current passing through a person.
- – Spilling these near electrical equipment can lead to electrocution.
- – A strategy to prevent tripping hazards.
- – The act of stopping accidents before they happen.
- – Need to be properly managed to prevent tripping and electrocution.
- – Educating staff on safety practices.
- – The way out during fire hazards.
- – Cables forming these can lead to tripping hazards.
- – Covering wires properly to prevent electrocution.
- – A system that alerts people in case of fire.
20 Clues: – The way out during fire hazards. • – These can catch fire if overloaded. • – Educating staff on safety practices. • – A strategy to prevent tripping hazards. • – A general term for any potential danger. • – A danger caused by touching live cables. • – A safety tool to put out electrical fires. • – A system that alerts people in case of fire. • ...
Industrial Security 2025-09-23
Across
- -constructed in such a way that visual access through the fence is denied. Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the movements of the guards in the installation.
- - safety from harms, a term that has different dimensions in psychology, public safety, defense and military matters, and information access. Is a state or quality, condition of being secured, freedom from fear, harm, danger, loss, destruction or damages, to secure is to make safe or be protected.
- is as old as civilization. Protective lighting is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.
- decreasing the risk by minimizing the probability of the potential loss.
- -red color code; is any information and material, the unauthorized disclosure of it would endanger national security, causes serious injury to the interest an prestige to the nation of any government activity, or of great advantage to a foreign country.
- -a metallic container used for the safekeeping of documents or small items in an office or installation. It can be classified as either robbery or burglary resistance depending upon the use and need.
- - refers to the act of changing the assigned classification from classified information or matter.
- - the analysis of risk includes examination of the vulnerability, probability and criticality of potential threats and includes natural and man-made risk.
- - moving the financial impact of the potential loss over to an insurance company.
- - white or no color, is any information and material which requires special protection other than those determines confidential, secret and top secret.
- - guard takes with him on his tour of duty a form which must have the time punched on it at each station.
- -the idea that lighting can provide improve protection for people and
- -the badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it in his possession until his authorization is terminates.
- or removing the risk totally from the business, government, or Industrial environment for which the risk manager has responsibility.
Down
- - the broad field of management related to asset management. physical security and human resource safety functions.
- -is the potential damage or loss of an asset.
- -planned assumption and acceptance of the potential risk by making a deliberate managerial decision of doing nothing about the threat or setting aside resources for use in case of a specific loss incident.
- - is a process of selecting and implementing security countermeasures to achieve an acceptable level of risk at an acceptable cost.
- - these are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.
- - is conducted to develop security awareness among employees of the company. It should cover all employees, regardless of rank or position.
- - spreading the risk through compartmentation or decentralization to limit the impact of the potential loss.
21 Clues: -is the potential damage or loss of an asset. • -the idea that lighting can provide improve protection for people and • decreasing the risk by minimizing the probability of the potential loss. • - moving the financial impact of the potential loss over to an insurance company. • ...
Information Security 2025-09-23
Across
- Digital proof of identity used in secure communications (9 letters)
- A program that pretends to be legitimate but is malicious (5 letters)
- An attack that overwhelms a system with traffic (3 letters)
- Opposite of encryption (11 letters)
- The process of converting data into unreadable form (10 letters)
- Software that spreads copies of itself across networks (5 letters)
- Ensuring data is not altered during storage or transfer (7 letters)
- Harmful software designed to damage systems (6 letters)
- Short form of "Personally Identifiable Information" (3 letters)
- Unauthorized access to a computer system (5 letters)
Down
- The process of verifying user identity (14 letters)
- Practice of disguising data to protect privacy (7 letters)
- Malicious software that locks files and demands payment (10 letters)
- Secret word or phrase used for authentication (8 letters)
- Unintended weakness in software that can be exploited (12 letters)
- A person who breaks into systems legally to find vulnerabilities (9 letters)
- Stronger form of DoS using multiple computers (4 letters)
- Attempt to trick users into revealing sensitive information via fake emails (7 letters)
- Security barrier between internal network and outside world (8 letters)
- Secret numeric code used in two-factor authentication (3 letters)
20 Clues: Opposite of encryption (11 letters) • The process of verifying user identity (14 letters) • Unauthorized access to a computer system (5 letters) • Harmful software designed to damage systems (6 letters) • Secret word or phrase used for authentication (8 letters) • Stronger form of DoS using multiple computers (4 letters) • ...
Security Terminology 2025-08-07
Across
- site or stage at which controls can be applied to prevent or reduce a threat or hazard
- device triggered by a person and designed to alert others (often authorities) in emergency situations
- test performed under conditions as close to as possible to real-world conditions
- equipped with a firearm (gun)
- valuable, private information created or collected for a considerable cost
- system of sensors, controls and annunciators arranged to detect and report an intrusion or other emergency
- direct and deliberate observation of people and/or property
- process of evaluating injuries and loss of life, damage to property and status of facilities resulting from an emergency or incident
- agency not under direct government control
Down
- designated location from which security programs are monitored and emergency plans can be implemented
- inquiry into the history, behaviors and character of an individual
- safeguarding of a boundary
- any property, tangible or intangible, which is owned by an individual or company and can be assigned a monetary value
- device which announces an alarm via sound, light or other means
- armor-plated truck with strong locks and doors which is operated by armed personnel and used to transport currency and other valuables
- list of contact information for team members and key players needed in an emergency
- program which detects and removes computer viruses
- risk remaining after measures are taken to reduce or eliminate risk
- device which, when triggered, alerts security personnel and/or police of a disturbance without the knowledge of the intruder or criminal
- planned, organized movement of people from a dangerous area
20 Clues: safeguarding of a boundary • equipped with a firearm (gun) • agency not under direct government control • program which detects and removes computer viruses • direct and deliberate observation of people and/or property • planned, organized movement of people from a dangerous area • device which announces an alarm via sound, light or other means • ...
Internet security 2025-07-15
Across
- trail data left behind when using the internet
- the right to control personal information
- into to investigate or spy without permission
- software or hardware that blocks unauthorized access
- people who gain unauthorized access to computer systems
- monitoring of activities or data, often by authorities
- gaining access secretly, often to steal or corrupt data
- software that secretly monitors user activity
- taken control of without authorization
- illegal activities carried out via the internet
- secret codes used to access systems or data
- the process of encoding data for security
- theft illegal use of someone’s personal information
- enforcement agencies government bodies that enforce laws and investigate crime
- software software designed to harm or exploit systems
- ensuring information is not disclosed to unauthorized parties
Down
- programs software designed to detect and remove viruses
- excessive data or traffic causing systems to slow or crash
- attempts to trick people into revealing personal data
- general term for harmful software like viruses or Trojans
- compromised or damaged by malware or viruses
- malicious programs that spread between computers
- details personal or confidential access credentials
- deceptive schemes to defraud or steal
- Brother symbol of invasive or authoritarian surveillance
- security measures to protect data and systems on the internet
- people who commit crimes using the internet
- converted into a secure code to prevent unauthorized access
- horses malicious programs disguised as legitimate software
- to set up software or systems for use
- of service attack an attack that floods a server to make it unavailable
- liberties rights and freedoms protecting individual privacy and freedom
- converted into a form that hides its true content
33 Clues: deceptive schemes to defraud or steal • to set up software or systems for use • taken control of without authorization • the right to control personal information • the process of encoding data for security • people who commit crimes using the internet • secret codes used to access systems or data • compromised or damaged by malware or viruses • ...
Security Crossword 2025-12-22
Across
- verbal communication at the start/end of every shift
- an audit where you ensure employees are badging into the site
- Conference room name on B2
- document with site and enterprise policies and procedures
- the emergency phones in the parking garage
- type of patrol
- Camera system we use
- website where you can search for employees
- a means of communication
- Largest conference room in A building
Down
- a room type where 3-6 employees can meet
- when a door does not close on its own
- Global (BLANK) and Security
- when items are turned into security that were left around the building
- (BLANK) Assembly Area
- "Integrity with out (BLANK)"
- Tab in QuickBase where D.A.R.s are completed
- monthly task
- an outside service provider
- device that is used in emergencies
- red button at the reception desk
21 Clues: monthly task • type of patrol • Camera system we use • (BLANK) Assembly Area • a means of communication • Conference room name on B2 • Global (BLANK) and Security • an outside service provider • "Integrity with out (BLANK)" • red button at the reception desk • device that is used in emergencies • when a door does not close on its own • Largest conference room in A building • ...
Law and 2024-10-23
Across
- scene rikospaikka
- punishment kuolemanrangaistus
- battery pahoinpitely
- bail takuu
- perpetrator rikoksentekijä, rikollinen
- service yhdyskuntapalvelu
- attorney puolustuksen asianajaja
- offence rikos
- record rikosrekisteri
Down
- haastehakemus, kanne
- rikostoveri
- of law tuomioistuin
- syytetty, vastaaja
- terrorist kyberterroristi
- syyllinen
15 Clues: syyllinen • bail takuu • rikostoveri • offence rikos • scene rikospaikka • syytetty, vastaaja • of law tuomioistuin • haastehakemus, kanne • battery pahoinpitely • record rikosrekisteri • service yhdyskuntapalvelu • terrorist kyberterroristi • punishment kuolemanrangaistus • attorney puolustuksen asianajaja • perpetrator rikoksentekijä, rikollinen
trivia 2025-03-11
Across
- The SEI has made significant contributions to this engineering discipline, focused on software systems and their architecture.
- The SEI is headquartered in this U.S. city.
- The SEI's _____ Lab advances the streamlined development of trustworthy and human-centered AI engineering practices.
- The SEI contributes to efforts that secure the software supply _____, preventing threats from entering through dependencies.
- The SEI is a federally funded research and development center affiliated with this university.
- The SEI developed a widely used maturity model for software development called the _____ Maturity Model.
- The SEI's research includes work in this area of artificial intelligence, where computers learn from data.
- The SEI developed a body of knowledge and practices to guide secure software development, known as _____ Secure Coding Standards.
- The SEI’s CERT Division was established in response to a major internet worm named after this person.
Down
- The pillars that guide the SEI’s approach to AI engineering are human-centered, scalable, and _____ and secure AI.
- The SEI is known for its work in software _____, ensuring reliability and performance.
- The SEI has expertise in this type of engineering, which deals with ensuring software performs reliably over time.
- The AJ Awards are named after Angel _____, founder of the SEI and co-founder of the CMU Robotics Institute.
- This methodology, developed at SEI, helps organizations improve their software processes.
- The SEI researches and develops cutting-edge technologies for the U.S. Department of _____.
- The SEI framework for evaluating software security is called the _____ Framework.
- The SEI has played a role in improving processes in this popular software development methodology, which emphasizes incremental progress.
- The SEI created an _____ to ensure that organizations develop, adopt, and use AI effectively and safely to safeguard the security of the nation.
- SEI researchers focus on software resilience, ensuring that systems can withstand and recover from this type of attack.
19 Clues: The SEI is headquartered in this U.S. city. • The SEI framework for evaluating software security is called the _____ Framework. • The SEI is known for its work in software _____, ensuring reliability and performance. • This methodology, developed at SEI, helps organizations improve their software processes. • ...
Cyber safety- Edwin Holm 2016-06-07
Across
- fun
- you tell the teacher what you saw and they will see to it
- tell your email
- a teacher or parent
- talk to people that you know
Down
- your passwords safe
- they will help you get out of the violent ad you got into be polite
- No cyber bullying
- tease people online
- games for your own age Never let your child give away personal information No Cyber bullying Respect others online
- download something that costs money without permission
11 Clues: fun • tell your email • No cyber bullying • your passwords safe • tease people online • a teacher or parent • talk to people that you know • download something that costs money without permission • you tell the teacher what you saw and they will see to it • they will help you get out of the violent ad you got into be polite • ...
Mortgage Terminology 2018-01-21
20 Clues: Note • FICO • Escrow • Assets • Default • Closing • Borrower • Security • Addendum • Refinance • Mortgagor • Mortgagee • Redlining • Liability • Collateral • Originator • Foreclosure • Hypothecate • Amortization • Acceleration
Mortgage Terminology 2018-01-21
20 Clues: Note • Escrow • Survey • Default • Borrower • Addendum • Security • Mortgagee • Principal • Mortgagor • Refinance • Liability • Redlining • Originator • Collateral • Hypothecate • Amortization • Acceleration • Improvements • Appreciation
12.13 2025-12-12
20 Clues: pile • bold • seldom • rescue • figure • devote • consume • version • arrange • predict • hesitate • complain • document • security • schedule • shortage • approach • persuade • colleague • accommodation
Cyber Awareness 2019-04-12
Across
- A program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- What is a network security system used to stop unauthorised access called?
- A program that can do things without the user of the computer having to give it instructions.
- A program that secretly monitors your actions.
- I am online and I meet someone my age in a chat room. Is it OK to give them my address or phone number?
- When copying information or images off the internet you must check for what legal information?
- An email message sent to a large number of people without their consent, usually promoting a product or service
- What software can we use to protect out computer ---- virus?
Down
- what is it called if people are nasty to you online?
- What do you call a program that is sent to harm your computer
- a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites.
- In stead of using a photo of yourself, you should create an...?
- What should be strong and unpredictable to protect your data on-line?
- A term used to disallow someone to reach you digitally
- An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops.
- What is it called to break into another computer system
17 Clues: A program that secretly monitors your actions. • what is it called if people are nasty to you online? • A term used to disallow someone to reach you digitally • What is it called to break into another computer system • What software can we use to protect out computer ---- virus? • What do you call a program that is sent to harm your computer • ...
Cyber Vocab 2021-08-25
Across
- Fair use of a legal doctrine that promotes freedom of expression by permitting
- the code of responsible behavior on the Internet
- Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source
- Copyright is a form of protection grounded in the U.S. Constitution
- the right or acceptable way of communicating on the internet
- a vitriolic or abusive message posted on the internet or sent by email, typically in quick
- relating to moral principles or the branch of knowledge
- Use Policy, A important document which governs students use of the internet at
Down
- the exclusive legal right, given to an originator or an assignee to print, publish,
- intellectual property rights is any and all rights associated with
- criminal activities carried out by means of computers or the internet to another message
- Fraud and Abuse Act is an amendment to the first federal computer fraud law
- assets owned by a person or company and protected against use without consent
- Software piracy is the unauthorized use, copying or distribution of copyrighted software
- The use of electronic communication to bully someone
- film, or record literary, artistic, or musical material, and to authorize others to do the same
- unlicensed use of copyright protected that works in certain circumstances
17 Clues: the code of responsible behavior on the Internet • The use of electronic communication to bully someone • relating to moral principles or the branch of knowledge • the right or acceptable way of communicating on the internet • intellectual property rights is any and all rights associated with • Copyright is a form of protection grounded in the U.S. Constitution • ...
ABC NEWS JAN-5TH-2025 2025-01-09
Across
- What made people leave their house
- Who wants to change the name of New Mexico Golf Course
- What did the cops do with a clock during fire
- What flu took a life
- What state has a ft 1/2 deep of snow
- Where did they get the Bird flu from
- What type of truck did Matthew explode
- What does Indiana New Jersey don't have right now
Down
- What type of crabs disappeared
- Trump wants to change the name to what
- What happened after 4 years of riot for trump
- What ends Facebook checking
- What is Crashing
- What are people tracking now that there are a lot of them
- What killed the power in Indiana
- Who visits the family who lost family on new years
- What was the guys name that blew up a cyber truck
- Meta is also ending what app
- What did police save from fire
- What injured 144 Police officers
20 Clues: What is Crashing • What flu took a life • What ends Facebook checking • Meta is also ending what app • What type of crabs disappeared • What did police save from fire • What killed the power in Indiana • What injured 144 Police officers • What made people leave their house • What state has a ft 1/2 deep of snow • Where did they get the Bird flu from • ...
CTF-CW7 2025-11-14
Across
- Logbook tracking all the data-handling jobs run by a company
- Strangers checking under the rug
- Tekion’s online bouncer from Akamai—blocking cyber troublemakers at the front door!
- Sewing up another digital rip
- Hacking your way up the office ladder
- Hide-and-seek champ, cybersecurity edition
- Hiding credit card details with asterisks in statements
- Swaggers in so every Tekion API gets its time to shine!
- Give it a spin before you buy—or face the judge!
- Security’s version of duct-taping a leak
- The recipe card for fixing cyber messes
Down
- Data from your system’s fitbit
- Mixing up data to make it hard to interpret
- The “no free hugs” approach to access
- New European law aiming to make AI safe, fair, and compliant
- Company’s treasure map
- At Tekion, even buying office supplies is a breeze with this zippy tool!
- Class time for grownups
- Turning secret code into plain gossip
- Letting the bots handle the boring stuff
20 Clues: Company’s treasure map • Class time for grownups • Sewing up another digital rip • Data from your system’s fitbit • Strangers checking under the rug • The “no free hugs” approach to access • Hacking your way up the office ladder • Turning secret code into plain gossip • The recipe card for fixing cyber messes • Letting the bots handle the boring stuff • ...
CrossWord Puzzle Course Code & Title: 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY IV Year / VII Sem FT3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
"Cracking the Code: The Power of ICT in Daily Life" 2025-01-31
Across
- – Economic activities involving technology.
- – The use of AI and software to handle tasks automatically.
- – The exchange of information using technology.
- – Storing data and collaborating over the internet.
- – A process of acquiring knowledge, often enhanced by ICT.
Down
- – The use of ICT to entertain people, including streaming and gaming.
- – An online platform for networking and interaction.
- – Buying products or services through the internet.
- – Ensuring safety from cyber threats.
- – The ability to work efficiently using digital tools.
- – The ability to work together effectively using ICT.
11 Clues: – Ensuring safety from cyber threats. • – Economic activities involving technology. • – The exchange of information using technology. • – Buying products or services through the internet. • – Storing data and collaborating over the internet. • – An online platform for networking and interaction. • – The ability to work together effectively using ICT. • ...
CrossWord Puzzle FJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Malware analysis that involves running the program in a controlled environment.
- Attackers use username and password pairs from old breaches to access new accounts.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Free software framework for scanning and managing known security vulnerabilities.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Malicious digital communication causing emotional harm.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
- Security analysis technique that looks for statistical deviations from a security baseline
Down
- Machine learning model used in threat hunting to find correlations in data.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Formal and systematic security assessment and assurance process for a computer system.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Social engineering technique that offers something enticing like free software containing malware.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII SemFJ3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
IT Crossword 2019-01-09
Across
- An error in a program that prevents the program from running as expected.
- Software that encrypts programs and data until a ransom is paid to remove it.
Down
- Collection of captured bot computers.
- Malware that allows a cyber-security attacker to take control of an infected computer.
- Advertising supported software Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
5 Clues: Collection of captured bot computers. • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • Malware that allows a cyber-security attacker to take control of an infected computer. • ...
Der Verdacht 2025-11-06
Across
- ein Snack aus Maiskörnern
- eine gelbe, saure Frucht
- Die Klasse kocht ...
- Ayman soll ...öl holen.
- Der Security Officer denkt, Ayman ist ein ...
- ein Geldstück aus Metall
- Im Supermarkt legt man die Sachen in den ...
- In diesem Geschäft kann man Blumen kaufen.
- Aymans Vater sagt, er soll keinen ... machen.
- Der Security Officer will die ... von Ayman anrufen.
- ein Land, die Hauptstadt ist Paris
- Ayman mag ... lieber als Gemüse.
Down
- Ayman hat eine ... probiert.
- Hier kann man Filme schauen.
- Name des Security Officers
- ein rotes, rundes Gemüse
- ein grosses Geschäft wie Coop oder Migros
- Der Security Officer durchsucht Aymans ...
- eine kleine, rote, süsse Frucht
- Das macht ein Dieb.
- Bildschirm, Screen
- Früchte
- Name der Lehrerin
- ... ruft die Lehrerin an.
- Der Security Officer verschleppt Ayman in sein ...
- Meine ... ist "Furkastrasse 71, 3900 Brig"
26 Clues: Früchte • Name der Lehrerin • Bildschirm, Screen • Das macht ein Dieb. • Die Klasse kocht ... • Ayman soll ...öl holen. • ein rotes, rundes Gemüse • eine gelbe, saure Frucht • ein Geldstück aus Metall • ein Snack aus Maiskörnern • ... ruft die Lehrerin an. • Name des Security Officers • Ayman hat eine ... probiert. • Hier kann man Filme schauen. • eine kleine, rote, süsse Frucht • ...
Test your General Knowledge 2022-09-03
Across
- The Reserve Bank of India (RBI) withdrew the restrictions on which credit card service after compliance with data storage norms?
- Which city hosted the ‘UN session to save Biodiversity’?
- Mikhail Gorbachev, who passed away recently, was a former President of which country?
- What is ‘Garba’, which was nominated by India to be inscribed on UNESCO’s intangible cultural heritage list?
- India recently inaugurated the new Indian Embassy in which country (in August 2022)?
- Which major technology company has released the ‘Child safety toolkit’ and ‘Cyber-security up-skilling program’?
Down
- Which Indian state/UT launched the “country’s first virtual school”?
- Linthoi Chanambam, who was seen in the news, is associated with which sports?
- Which sportsperson has won the BWF World Championship title in 2022?
- What is the name of the new model of sustainable development of rivers proposed by Indian Government?
10 Clues: Which city hosted the ‘UN session to save Biodiversity’? • Which Indian state/UT launched the “country’s first virtual school”? • Which sportsperson has won the BWF World Championship title in 2022? • Linthoi Chanambam, who was seen in the news, is associated with which sports? • ...
Software Testing 2025-02-19
Across
- Testing that checks how different modules or components interact with each other.
- A preliminary set of tests to check whether the basic functionalities work before deeper testing.
- A testing technique that focuses on the edges of input ranges.
- A testing method that evaluates how a system performs under extreme conditions.
Down
- A flaw or error in software that causes incorrect results or unexpected behavior.
- A testing technique that modifies the source code slightly to check if tests detect the change.
- A type of testing that evaluates how well a system can withstand cyber threats.
- A type of performance testing that checks how the system behaves under expected user traffic.
- A testing phase conducted by real users in a production-like environment.
- A quick, focused set of tests to verify specific bug fixes or small changes.
10 Clues: A testing technique that focuses on the edges of input ranges. • A testing phase conducted by real users in a production-like environment. • A quick, focused set of tests to verify specific bug fixes or small changes. • A type of testing that evaluates how well a system can withstand cyber threats. • ...
Dangers of the internet 2021-03-22
iad 2023-09-28
National Science Fiction Day 2024-12-28
cyber 2022-06-01
Across
- xml stands for _______
- First page of Website is termed as _______
- To move a copy of file from one computer to another over a communication channel is called
- full form of LAN
- The scrambling of code is known as _______
Down
- translates and executes program at run time line by line
- father of computer science
- this button makes alphabets/letters in uppercase and lowercase and numbers to symbols
- type of virus uses computer hosts to reproduce itself
- The geometric arrangement of devices on the network is called _______
10 Clues: full form of LAN • xml stands for _______ • father of computer science • First page of Website is termed as _______ • The scrambling of code is known as _______ • type of virus uses computer hosts to reproduce itself • translates and executes program at run time line by line • The geometric arrangement of devices on the network is called _______ • ...
Cyber 2024-07-15
Across
- Engineering The psychological manipulation of individuals to gain access to confidential information.
- A software update designed to fix security vulnerabilities or improve functionality in a program or operating system.
- Authentication (2FA): A security process that requires two forms of identification before granting access, typically a password and a verification code sent to a device.
- (Virtual Private Network): A secure and encrypted connection between two points across a public network, often used to protect private web traffic from snooping.
- The process of converting information into a code to prevent unauthorized access.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.
- Incident An event that compromises the security, confidentiality, integrity, or availability of information assets.
- A device such as a computer, smartphone, or tablet that communicates with a network.
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
10 Clues: The process of converting information into a code to prevent unauthorized access. • A device such as a computer, smartphone, or tablet that communicates with a network. • Engineering The psychological manipulation of individuals to gain access to confidential information. • ...
CYBER 2022-11-16
Across
- malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything
- connects a series of computers and devices in a private encrypted network
- used to protect your information from hackers.
- A form of malware used by hackers to spy on you and your computer activities
- A scam where a hacker poses as a legitimate business
Down
- Ransomware, worms, viruses, and trojans are all considered this
- identifying a user’s identity
- software or hardware used to keep intruders out
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems
- a person who uses computers to gain unauthorized access to data.
10 Clues: identifying a user’s identity • used to protect your information from hackers. • software or hardware used to keep intruders out • A scam where a hacker poses as a legitimate business • Ransomware, worms, viruses, and trojans are all considered this • a person who uses computers to gain unauthorized access to data. • ...
cyber 2024-09-16
Across
- A text-based interface used to interact with the system through commands
- A collection of pre-compiled routines used in programming for code reuse
- A secret word or string of characters used for user authentication
- The system that translates human-readable domain names to IP addresses
Down
- To make an exact copy of a file, system, or repository
- Set of rules that define security measures and access control within a system or organization
- permission Settings that determine who can read, write, or execute a file on a system
- A simple, text-based text editor commonly used in UNIX/Linux systems
- A package management tool used in Debian-based systems for installing and managing software
- Command that allows a permitted user to execute a command as the superuser
10 Clues: To make an exact copy of a file, system, or repository • A secret word or string of characters used for user authentication • A simple, text-based text editor commonly used in UNIX/Linux systems • The system that translates human-readable domain names to IP addresses • A text-based interface used to interact with the system through commands • ...
cyber 2025-06-16
Across
- - Scrambling data to protect it
- - Moral rules that guide behavior
- - To inform someone about bad behavior online
- - Crime involving computers or networks
- - Acting wisely and safely online
Down
- - Extra step for account security
- - Asking before using others’ work or info
- - Good manners on the internet
- - False information shared online
- - To stop communication from a person or site
10 Clues: - Good manners on the internet • - Scrambling data to protect it • - Extra step for account security • - Moral rules that guide behavior • - False information shared online • - Acting wisely and safely online • - Crime involving computers or networks • - Asking before using others’ work or info • - To inform someone about bad behavior online • ...
CrossWord Puzzle 21CSE492T CYBER CRIMES AND CYBER SECURITY Year & Sem: IV Year / VII Sem FT3 -17.10.25 SET B Duration :15 mins Marks:20 2025-10-16
Across
- Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- Gateways that provide services to inside users while protecting hosts from outside users.
- Malware analysis that involves running the program in a controlled environment.
- Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- Formal and systematic security assessment and assurance process for a computer system.
- Attackers use username and password pairs from old breaches to access new accounts.
- Network security appliances that act as a barrier between trusted and untrusted networks.
- Security analysis technique that looks for statistical deviations from a security baseline
- Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
Down
- Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- Machine learning model used in threat hunting to find correlations in data.
- Tools that protect systems by detecting and eliminating a wide range of malicious software.
- The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- Extortion-based threat where malicious code denies access to data until a sum is paid.
- Social engineering technique that offers something enticing like free software containing malware.
- Malicious digital communication causing emotional harm.
- Forensic data layer containing file timestamps, size, author, and geolocation details.
- Formal process of technical evaluation for a system's or individual's security effectiveness.
- Free software framework for scanning and managing known security vulnerabilities.
20 Clues: Malicious digital communication causing emotional harm. • Machine learning model used in threat hunting to find correlations in data. • Malware analysis that involves running the program in a controlled environment. • Free software framework for scanning and managing known security vulnerabilities. • ...
Analisis Data dan Literasi Digital 2025-06-04
Across
- Versi horizontal dari volume chat adalah...
- Informasi palsu atau tidak benar yang disebarkan melalui media digital disebut...
- Representasi gratis dari informasi dan data disebut...
- Data yang diperoleh dari survei atau penelitian disebut...
- Pencemaran nama baik merupakan bentuk Cyber bullying yaitu...
- Nama, alamat rumah, no telp, email merupakan contoh informasi...
- Informasi yang salah atau tidak akurat yang disebarkan tanpa adanya niat untuk menipu atau merugikan disebut...
- Kondisi benar dalam fungsi logika adalah...
- Hasil dari proses yang telah dilakukan terhadap data input yaitu...
- Tahapan di mana data input diolah atau dimanipulasi sesuai dengan tujuan program merupakan pengertian dari...
- Informasi yang sebenarnya benar atau akurat, tetapi disebarkan dengan niat untuk merugikan atau merusak reputasi individu, kelompok, atau negara disebut...
- Menghargai perbedaan, pandangan, dan keyakinan baru, serta menghargai orang lain tanpa membedakan suku, gender, penampilan, budaya dan kepercayaan disebut...
- Microsoft Excel disebut juga dengan nama aplikasi...
- Menyebarkan rahasia orang lain atau foto-foto pribadi merupakan contoh dari bentuk Cyber bullying yaitu...
Down
- Dapat diakses oleh siapa saja merupakan ciri-ciri dari informasi...
- Hasil dari analisis data yang dapat digunakan untuk membuat keputusan disebut...
- Yang terdiri dari relevansi waktu yaitu pengertian dari...
- Untuk mengenali sebuah berita yang benar atau bohong mempunyai salah satu ciri ciri yaitu kalimat yang digunakan biasanya ditulis dengan banyak huruf...
- Pesan-pesan yang berisi gangguan pada email, SMS, maupun teks di jejaring sosial yang dilakukan secara terus menerus termasuk bentuk Cyber bullying bernama...
- Mengirimkan pesan teks yang isinya merupakan kata-kata yang penuh amarah dan frontal yaitu bentuk...
- Informasi yang salah atau tidak akurat yang sengaja dibuat dan disebarkan dengan tujuan untuk menipu atau merugikan orang lain disebut...
- Menampilkan kontribusi dari setiap nilai (slice) terhadap nilai keseluruhan (pie) adalah pengertian dari chart...
- Pernyataan yang mencerminkan pandangan, pendapat, interpretasi, atau keyakinan seseorang disebut...
- Data atau informasi yang diperlukan oleh program untuk diolah disebut...
- Objektif, dapat diverifikasi, univesal merupakan ciri ciri...
- Sumber yang memiliki reputasi baik, seperti institusi akademik, lembaga riset, atau media ternama merupakan pengertian dari...
- Berpura-pura menjadi orang lain dan mengirimkan pesan-pesan atau status yang tidak baik termasuk Cyber bullying bentuk...
- Memahami perasaan orang lain disebut...
- Sinbol atau nama yang digunakan untuk mempresentasikan nilai merupakan pengertian dari...
- Dengan area dibawah garis yang diisi dengan warna merupakan...
30 Clues: Memahami perasaan orang lain disebut... • Versi horizontal dari volume chat adalah... • Kondisi benar dalam fungsi logika adalah... • Microsoft Excel disebut juga dengan nama aplikasi... • Representasi gratis dari informasi dan data disebut... • Yang terdiri dari relevansi waktu yaitu pengertian dari... • Data yang diperoleh dari survei atau penelitian disebut... • ...
Cyber Security Incident Response and Recommendations 2025-11-21
Across
- (4,10) Ensure compliance with GDPR and secure storage of sensitive parent data. (Key Security Requirements)
- (12,8) Implement Multi-Factor Authentication (MFA) for all staff accounts to prevent unauthorized access. (Key Security Requirements)
- Financial loss, data breach, reputational damage, and regulatory risk. (Incident Overview)
- (4-4) MFA, Explore Zero Trust and AI-based threat detection for future resilience. Phase 3 (Recommended Approach)
- (6-4) Develop incident response plan and review data protection policies. Phase 2 (Recommended Approach)
- (5,8) Deploy advanced email filtering and sandboxing for attachments to block phishing attempts. (Key Security Requirements)
Down
- (4,5) Lack of multi-factor authentication (MFA), insufficient phishing awareness, and inadequate email security controls - sending CSV files unencrypted. (Incident Overview)
- (8,8) Establish a formal incident response plan with clear escalation procedures. (Key Security Requirements)
- Implement email filtering, and staff training. Phase 1 (Recommended Approach)
- (4,9) Conduct regular phishing simulations and cybersecurity training for staff. (Key Security Requirements)
- (4,2,6) Phishing leading to email compromise and financial fraud. (Incident Overview)
11 Clues: Implement email filtering, and staff training. Phase 1 (Recommended Approach) • (4,2,6) Phishing leading to email compromise and financial fraud. (Incident Overview) • Financial loss, data breach, reputational damage, and regulatory risk. (Incident Overview) • ...
Cyber Ethics 2025-05-20
Cyber Corner 2023-03-06
Across
- a signal that temporarily stops the execution of a program
- a number system with 16 digits, used in computing
- a device that connects two different networks
- a popular operating system
- a security system that prevents unauthorized access to a network
- the smallest unit of digital data
- a volatile memory used to store data that can be accessed quickly
- a program that translates code written in one language to another language
- a popular networking protocol
Down
- a set of rules governing the format and transmission of data
- a data structure that follows the first in first out (fifo) principle
- the process of finding and fixing errors in code
- a set of rules to solve a problem
- the process of adding information to a carrier signal
- a point of connection in a network
- the core of an operating system
- a small, fast memory used to store frequently accessed data
17 Clues: a popular operating system • a popular networking protocol • the core of an operating system • a set of rules to solve a problem • the smallest unit of digital data • a point of connection in a network • a device that connects two different networks • the process of finding and fixing errors in code • a number system with 16 digits, used in computing • ...
Cyber Ethics 2025-05-22
Across
- An act of sending an email to an user,misleading him to believe that it is from a trusted person or organisation.
- Accessing the internet in an illegal manner.
- Refers to criminal activities that involve the use of computers,networks, and the internet connections.
- An act of harming or harassing a person through information technology through a deliberate manner.
- Refers to an illegal intrusion into a computer system or network.
- Malicious Software.
- Refers to the act of using or imitating the language and thoughts of another person as one's original work.
- Hacking,which is done for a good cause,such as natural security.
- When software is copied and distributed illegally.
Down
- Combination of two words 'Net' and 'Etiquette'.
- The criminal practice of using social influence over the telephone system.
- A security system that prevents unauthorised people from accessing your system and network.
- A right related to the new inventions that grants the inventor the sole right to make,use,and sell that invention for a specific period time.
- A macious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- Another name of digital footprint.
- Unwanted bulk emails that come from unknown sources.
- The equivalent term to hacking.
17 Clues: Malicious Software. • The equivalent term to hacking. • Another name of digital footprint. • Accessing the internet in an illegal manner. • Combination of two words 'Net' and 'Etiquette'. • When software is copied and distributed illegally. • Unwanted bulk emails that come from unknown sources. • Hacking,which is done for a good cause,such as natural security. • ...
U03 - CSE-CH03 2024-02-15
Across
- A type of malware, similar to a virus, which self-replicates across networks without the need for a user to open an infected program.
- (8,8) Protecting the places where people work, and the locations of systems, services and networks.
- A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
- (5,9) Files containing data unique to particular pieces of malware, including viruses, that security software downloads in order to aid detection.
- A cyber attack where a user is misdirected to a fraudulent website, despite entering the correct address.
- (6,5) A type of malware, disguised as legitimate software, that is used to gain unauthorised access to a victim's computer.
Down
- (5,8) A form of phishing targeting particular individuals, where the email is designed to look like it's from a trusted or known person.
- is any kind of software that can damage computer systems, networks or devices. Includes viruses, ransomware and trojans.
- (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
- Deliberate or accidental threat to an organisation's security from someone who has authorised access (such as an employee).
- Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives.
- (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
- Unsolicited email sent in bulk, also referred to as junk email.
13 Clues: Unsolicited email sent in bulk, also referred to as junk email. • Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives. • (8,8) Protecting the places where people work, and the locations of systems, services and networks. • ...
Cyber Wellness Crossword Challenge 2013-06-24
Across
- Do not write in_____letters when texting to other because they may think that you are shouting.
- When you are being cyber bullied, ________ the incident.
- be _____for your words and actions online because you may hurt others.
Down
- _________ is online manners.
- Cyber bullying is using the ________________or phone to repeatedly say rude and hurtful things about a person.
- cyber bullying can ______ people’s feelings as they will feel sad
- Do not __________bad and hurtful things online.
- Do not scold others online, always be ________.
8 Clues: _________ is online manners. • Do not __________bad and hurtful things online. • Do not scold others online, always be ________. • When you are being cyber bullied, ________ the incident. • cyber bullying can ______ people’s feelings as they will feel sad • be _____for your words and actions online because you may hurt others. • ...
3 Work (1) 2016-02-20
16 Clues: aušra • patirtis • robotika • aparatūra • prižiūrėti • pagelbėti, padėti • pokalbis, apklausa • robotas-med.seselė • ligonis, pacientas • žmogus, mirtingasis • motyvacinis laiškas • internetinė tapatybė • surengti, suorganizuoti • pretendentas, kandidatas • gyvenimo aprašymas, autobiografija • dirbantis visą darbo dieną, visą etatą
internet dangers 2 2024-02-05
Across
- Scammers often can show up on
- When phishing is done with using messaging apps or text messages
- Internet does not have such a key
- One way that Cyber criminals use to trick people in order to downloading malware
- Causes the slowest performance to our computer
- One the most common medium where sexting can take place
Down
- Often young people had been the victims of
- Malware is installed without our .......
- Chidren can face severe ..........
- What children are towards Internet
- The most severe danger of gaming
- What cyber predators take advantage of
- Some of these may cause problems after a long time time
13 Clues: Scammers often can show up on • The most severe danger of gaming • Internet does not have such a key • Chidren can face severe .......... • What children are towards Internet • What cyber predators take advantage of • Malware is installed without our ....... • Often young people had been the victims of • Causes the slowest performance to our computer • ...
Mortgage Terminology 2018-01-21
20 Clues: Note • FICO • Assets • Escrow • Default • Closing • Security • Addendum • Borrower • Mortgagee • Refinance • Liability • Redlining • Mortgagor • Collateral • Originator • Foreclosure • Hypothecate • Amortization • Acceleration
N1 Word 2014-11-30
20 Clues: up • fit • keep • mark • case • cycle • front • virus • nuance • change • filter • system • comical • monitor • reality • popular • security • nonsense • inflation • deflation
Crimes O' Clock 2025-06-09
Internet dangers 2024-02-01
Across
- Scammers often can show up on
- When phishing is done with using messaging apps or text messages
- Internet does not have such a key
- One way that Cyber criminals use to trick people in order to downloading malware
- Causes the slowest performance to our computer
- One the most common medium where sexting can take place
Down
- Often young people had been the victims of
- Malware is installed without our .......
- Chidren can face severe ..........
- What children are towards Internet
- The most severe danger of gaming
- What cyber predators take advantage of
- Some of these may cause problems after a long time time
13 Clues: Scammers often can show up on • The most severe danger of gaming • Internet does not have such a key • Chidren can face severe .......... • What children are towards Internet • What cyber predators take advantage of • Malware is installed without our ....... • Often young people had been the victims of • Causes the slowest performance to our computer • ...
nostal30 2024-06-14
Across
- Early web portal
- Japanese phenomenon
- Cult classic film
- Digital music players
- Filesharing platform
- Music movement
- Popular shopping centers
- Internet connection device
- Iconic girl band
- Scifi blockbuster
- Electronic toy
Down
- 90s cyber crime
- Christmas comedy film
- Environmental concern
- Comedy TV show
- Collectible game
- Princess of Wales
- Film awards
- Scifi action movie
- Windows software
20 Clues: Film awards • Comedy TV show • Music movement • Electronic toy • 90s cyber crime • Early web portal • Collectible game • Iconic girl band • Windows software • Cult classic film • Princess of Wales • Scifi blockbuster • Scifi action movie • Japanese phenomenon • Filesharing platform • Christmas comedy film • Environmental concern • Digital music players • Popular shopping centers • ...
Analisis Data dan Literasi Digital 2025-06-04
Across
- Representasi gratis dari informasi dan data disebut...
- Kondisi benar dalam fungsi logika adalah...
- Berpura-pura menjadi orang lain dan mengirimkan pesan-pesan atau status yang tidak baik termasuk Cyber bullying bentuk...
- Menampilkan kontribusi dari setiap nilai (slice) terhadap nilai keseluruhan (pie) adalah pengertian dari chart...
- Microsoft Excel disebut juga dengan nama aplikasi...
- Dapat diakses oleh siapa saja merupakan ciri-ciri dari informasi...
- Memahami perasaan orang lain disebut...
- Sumber yang memiliki reputasi baik, seperti institusi akademik, lembaga riset, atau media ternama merupakan pengertian dari...
- Informasi yang salah atau tidak akurat yang disebarkan tanpa adanya niat untuk menipu atau merugikan disebut...
- Sinbol atau nama yang digunakan untuk mempresentasikan nilai merupakan pengertian dari...
- Objektif, dapat diverifikasi, univesal merupakan ciri ciri...
- Hasil dari proses yang telah dilakukan terhadap data input yaitu...
- Pencemaran nama baik merupakan bentuk Cyber bullying yaitu...
- Informasi palsu atau tidak benar yang disebarkan melalui media digital disebut...
- Pesan-pesan yang berisi gangguan pada email, SMS, maupun teks di jejaring sosial yang dilakukan secara terus menerus termasuk bentuk Cyber bullying bernama...
Down
- Nama, alamat rumah, no telp, email merupakan contoh informasi...
- Informasi yang salah atau tidak akurat yang sengaja dibuat dan disebarkan dengan tujuan untuk menipu atau merugikan orang lain disebut...
- Data yang diperoleh dari survei atau penelitian disebut...
- Menyebarkan rahasia orang lain atau foto-foto pribadi merupakan contoh dari bentuk Cyber bullying yaitu...
- Menghargai perbedaan, pandangan, dan keyakinan baru, serta menghargai orang lain tanpa membedakan suku, gender, penampilan, budaya dan kepercayaan disebut...
- Untuk mengenali sebuah berita yang benar atau bohong mempunyai salah satu ciri ciri yaitu kalimat yang digunakan biasanya ditulis dengan banyak huruf...
- Mengirimkan pesan teks yang isinya merupakan kata-kata yang penuh amarah dan frontal yaitu bentuk...
- Versi horizontal dari volume chat adalah...
- Hasil dari analisis data yang dapat digunakan untuk membuat keputusan disebut...
- Dengan area dibawah garis yang diisi dengan warna merupakan...
- Informasi yang sebenarnya benar atau akurat, tetapi disebarkan dengan niat untuk merugikan atau merusak reputasi individu, kelompok, atau negara disebut...
- Data atau informasi yang diperlukan oleh program untuk diolah disebut...
- Pernyataan yang mencerminkan pandangan, pendapat, interpretasi, atau keyakinan seseorang disebut...
- Yang terdiri dari relevansi waktu yaitu pengertian dari...
- Tahapan di mana data input diolah atau dimanipulasi sesuai dengan tujuan program merupakan pengertian dari...
30 Clues: Memahami perasaan orang lain disebut... • Kondisi benar dalam fungsi logika adalah... • Versi horizontal dari volume chat adalah... • Microsoft Excel disebut juga dengan nama aplikasi... • Representasi gratis dari informasi dan data disebut... • Data yang diperoleh dari survei atau penelitian disebut... • Yang terdiri dari relevansi waktu yaitu pengertian dari... • ...
Skyworks Cybersecurity Awareness Month 2024-04-26
Across
- Cyber attack that tricks people into revealing sensitive information through email, texts, or phone calls
- The practice of protecting systems, networks, and programs from digital attacks
- a person who uses computers to gain unauthorized access to data
Down
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- the process or action of verifying the identity of a user or process
- who is responsible for the security of an organization?
6 Clues: who is responsible for the security of an organization? • a person who uses computers to gain unauthorized access to data • the process or action of verifying the identity of a user or process • The practice of protecting systems, networks, and programs from digital attacks • ...
Disruptive Technology 2025-07-23
12 Clues: Mesh • cloud • Reality • Detection • Automation • technology • Intelligence • Intelligence • Immune System • Authentication • Liability Insurance • Screening, Quantum Computing
Safer Internet 2020-03-09
6 Clues: opfer von cyber-mobbing • wo passiert cyber-mobbing • Trick der Daten herausfinde kann • Beleidigungen über soziale Medien • massenhaft unerwünschte Nachrichten • jemand der sich in andere Profile hackt
Unlocking Privacy: Navigating the Maze of Data Protection 2025-01-28
Across
- Snippets of code used on web pages to gather information about website visitors and track their activity.
- Automated processing of personal data to analyze personal preferences, activity, and so on.
- The process of transforming readable data (clear text) into a form that is unreadable.
- Software that selectively blocks incoming or outgoing network communications based on security rules
- A process by which personal data is irreversibly altered in such a way that a person can no longer be identified.
Down
- Data such as fingerprint, DNA or handwriting.
- Consent that requires you to act.
- A small piece of data sent from a website and stored in your web browser as a record of browser activity.
- Cyber attackers use fraudulent messages or websites to get information from unsuspecting users.
- Any event that has resulted in (or could result in) unauthorized use, access, or disclosure of personal data.
- Locking your credit data until you give permission for it to be released.
- Malicious software, including but not limited to viruses, trojan horse applications, rootkits, and backdoors.
12 Clues: Consent that requires you to act. • Data such as fingerprint, DNA or handwriting. • Locking your credit data until you give permission for it to be released. • The process of transforming readable data (clear text) into a form that is unreadable. • Automated processing of personal data to analyze personal preferences, activity, and so on. • ...
Cyber ethics 2025-06-08
Across
- A program or asset of programs that disrupts the normal functioning of a computer.
- refers to the act of using or imitating the language and thoughts of another person as one original work.
- bombing refers spam attackers keep sending bulk mails server gets full.
- theft Refers to and act of stealing and misusing someone's personal information.
- jacking Refers to Malicious technique of tricking a web user into clicking on something different from what he user perceive he /she is clicking.
- fraud fraudulent obtaining money from depositors by clayming to be an authorised Bank of financial institution.
- Piracy When software is copied and distributed illegally.
- crime refers to criminal activities.
Down
- Refer criminal practice of using social influence over the telephone system.
- Refers to unwanted bulk email that come from unknown sources.
- Refers to an illegal illustration into a computer system or network.
- Refer security system that prevents on authorised people from accessing your system and network.
- ethics Moral rules which include honesty respecting the privacy of others and property rights.
- bullying An act of harming or harising a person through information technology in a deliberate manner.
14 Clues: crime refers to criminal activities. • Refers to unwanted bulk email that come from unknown sources. • Piracy When software is copied and distributed illegally. • Refers to an illegal illustration into a computer system or network. • bombing refers spam attackers keep sending bulk mails server gets full. • ...
ATL Crossword 2023-10-16
Across
- A term for a situation in which a system or network is completely isolated from other networks for security.
- A type of cybersecurity threat that mimics legitimate software but is malicious in nature.
- A group of computers controlled by an attacker to carry out tasks without the user's knowledge.
- A type of malware named after a deceptive ancient Greek tactic.
Down
- A form of authentication that relies on a physical attribute, like a fingerprint or iris scan.
- A set of rules or configurations that dictate which network traffic is allowed or blocked.
- A common form of cyber attack involving massive amounts of traffic to overwhelm a target system.
- A type of malware that can spread autonomously through networks.
8 Clues: A type of malware named after a deceptive ancient Greek tactic. • A type of malware that can spread autonomously through networks. • A set of rules or configurations that dictate which network traffic is allowed or blocked. • A type of cybersecurity threat that mimics legitimate software but is malicious in nature. • ...
Jonathan's Forty 2022-06-09
17 Clues: College • Landlord • Sumbergs • Best car • Best Grill • Best friend • Sweetest man • favorite team • It's a living • Favorite food • humbling sport • Enjoy this day! • Most loyal sister • Most favorite dog • Where he taught English • keeps his mind strategic • Where he taught journalism
Ethical Online teaching and Data management. 2025-07-24
Across
- more than one method to verify authenticity of an online identity.
- Permission needed before schools share student data under FERPA.
- Acronym for data like names, birthdates, or family info that can identify a student.
- ____ security: systems in place to protect from digital attacks/ unauthorized access.
- Two words:Opposite of ethical use of confidential/protected information in an online platform.
- Acronym: Legal agreements prior to use of the online educational services.
- Acronym for best practice to protect yourself when on public wifi.
- Acronym: Law that protects student education records and personally identifiable information.
- Two words:Teaching students to use technology responsibly and ethically.
- Parent/Student says no to third party educational service providers.
Down
- Synonym for deidentification of student data and records.
- Two words: process that makes data unattainable without a key.
- Acronym: software used to manage and deliver online learning
- Acronym: Only pertaining to 13 and under, protection and online privacy from commercial and online services.
- “Agreement statement”: GDPR is law that regulates how personal data of citizens is handled both in and outside the EU
- other service providers of online services to schools.
- is a teacher/district's ethical and legal obligation to protect sensitive student information.
- Includes time spent on a task or number of clicks.
18 Clues: Includes time spent on a task or number of clicks. • other service providers of online services to schools. • Synonym for deidentification of student data and records. • Acronym: software used to manage and deliver online learning • Two words: process that makes data unattainable without a key. • Permission needed before schools share student data under FERPA. • ...
cyber security crossword (designed:the awesome Xiaoyu) 2015-12-31
Across
- an adjective to describe your professor Xiaoyu
- to choose options in order to create a custom system
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
- the process of attempting to acquire sensitive information used for identity theft
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- software installed on a network of computers without the owner’s knowledge
Down
- software that records everything you type, then sends it off to whomever installed the software.
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- The process of translating plaintext into ciphertext
- A capability to limit network traffic between networks and/or information systems
- a bridge between two computer networks
11 Clues: a bridge between two computer networks • an adjective to describe your professor Xiaoyu • The process of translating plaintext into ciphertext • to choose options in order to create a custom system • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
Cybersecurity Crossword Puzzle 2023-10-19
Across
- is a security technology that requires multiple methods of ___________ to verify a user’s identity before allowing login. Authentication
- can you turn your debit card off in digital banking? Manage cards
- may send unsolicited Emails, pretending to be a financial institution or a company, asking you to click a link to update or confirm your personal or login information. Phishing
Down
- companies or organizations will never ask you to divulge any _________ information over email. Personal
- is the name of our P2P product? SPIN
- can you view when your last login to digital banking was? Recent Logins
- can you change your Security Questions in digital banking? My Profile
- is our cyber insurance carrier? Beazley
8 Clues: is the name of our P2P product? SPIN • is our cyber insurance carrier? Beazley • can you turn your debit card off in digital banking? Manage cards • can you change your Security Questions in digital banking? My Profile • can you view when your last login to digital banking was? Recent Logins • ...
security plan 2021-03-29
Across
- ___ has been highlighted as the number one responsibility for facility managers
- To ensure safety at a facility, buildings must be up to ___.
- Having ___ security personnel is critical for solving disturbances in a large crowd.
- An alternative plan used in response to the facility closing or cancelling a show is a ___ plan.
- Crime prevention through ___ design (CPTED) provides extra protection from crime, using landscaping and architecture.
- ___ can be used to locate illegal and/or dangerous substances.
- Riding a ___ means that the police officer is positioned above the crowd, so it is easier to see.
- A ___ analysis identifies what events are most likely to happen. It starts by analyzing historical data.
- The key to security is ___.
- To ensure that employees can implement a security plan, they must be ___.
Down
- Sport events are unique to most events because fans are allowed to consume ___.
- The second “D” of physical security is ___.
- The fourth “D” of physical security is ___.
- ___ theory is used in a formula to determine how quickly fans can exit a facility. It’s elements are density, speed and flow.
- The first “D” of physical security is ___.
- A ___ is any event that threatens people, and/or tangible or intangible assets.
- An emergency ___ plan is a written and legal document.
- The third “D” of physical security is ___.
- Crowd ___ helps prevent the need for crown control.
19 Clues: The key to security is ___. • The first “D” of physical security is ___. • The third “D” of physical security is ___. • The second “D” of physical security is ___. • The fourth “D” of physical security is ___. • Crowd ___ helps prevent the need for crown control. • An emergency ___ plan is a written and legal document. • ...
Information Security 2024-04-19
Across
- The process of determining what rights and privileges a particular entity has.
- Occurs when the system is vulnerable to attacks
- Potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability
- Anything that can exploit a vulnerability, intentionally or accidentally and obtain, damage or destroy an asset
- A technique that is used to exploit a vulnerability.
- Encoded message
- The process of determining and assigning privileges to various resources, objects or data
- Authentication schemes based on the identification of individuals by their physical characteristics.
- The action of stopping any form of attack from happening
- Info used in cipher only to sender/receiver
Down
- Gaps in a security program that can be exploited by threats to gain unauthorized access to an asset
- The science of hiding information
- Unencrypted information
- Occurs when a user/machine is discovered trying to access unauthorized data
- A physical or virtual object such as a smart card, ID badge that store authentication information
- The part of accounting in which a security professional examines logs of what was recorded
- The process of retrieving vital data from a crashed system or data storage device
- The process of tracking recording system activities and resource access
- People, property, and information that needs to be protected
19 Clues: Encoded message • Unencrypted information • The science of hiding information • Info used in cipher only to sender/receiver • Occurs when the system is vulnerable to attacks • A technique that is used to exploit a vulnerability. • The action of stopping any form of attack from happening • People, property, and information that needs to be protected • ...
Government crossword puzzle 2024-10-24
Across
- health, education, welfare
- federal deposit insurance corporation
- department of agriculture
- department of energy
- National institute of health
- Freddie mac
- housing and development
- social security agency
- federal communication commission
- department of justice
- approves food and drugs
- department of transport
- national aeronautics and space admin
- buss rails, and mass transit
Down
- environmental protection agency
- federal emergency management agency
- department of interior
- national Institute of standard and technology
- department of health
- national oceanic and atmospheric administration
- department of homeland security
- security and exchange commission
- Fannie may
- central intelligence agency
- department of defense
- federal aviation administration
- department of veteran affairs
- transport security administration
- small business administration
29 Clues: Fannie may • Freddie mac • department of energy • department of health • department of justice • department of defense • department of interior • social security agency • housing and development • approves food and drugs • department of transport • department of agriculture • health, education, welfare • central intelligence agency • National institute of health • buss rails, and mass transit • ...
Chapter 11 2022-09-28
Across
- Be careful when choosing a college, because some on-line only programs are not ______________.
- There are over 72,000 students __________ at Ivy Tech.
- Some college ___________ require teacher recommendation letters, while others do not.
- In high school, one of the ________________ was wearing a uniform, but in college it is not mandatory.
- Some colleges mandate that all freshmen live on campus in ______________.
- Ivy Tech has 23 ____________ across Indiana.
Down
- Tamika earned her __________ degree before moving on and getting a master's degree in cyber security.
- When first applying for college, students need to submit an application and a high school ____________.
- An admissions ________________ assesses applications and transcripts for potential students.
- Lisa's husband did not get a college degree, but makes good money as a __________ carpenter.
- One of the goals of standardized testing is to judge the academic ________________ of students before they enter college.
- My history professor was very ________________ with grading and accepted late homework for full credit.
- For those who do not want to go to college or cannot afford tuition, joining the military is an ___________.
- Two of the most ________________ universities in the United States are Princeton and Harvard.
14 Clues: Ivy Tech has 23 ____________ across Indiana. • There are over 72,000 students __________ at Ivy Tech. • Some colleges mandate that all freshmen live on campus in ______________. • Some college ___________ require teacher recommendation letters, while others do not. • An admissions ________________ assesses applications and transcripts for potential students. • ...
How familiar are you with low level computer systems [university knowledge] 2024-02-28
Across
- What software structure represents network connections? (Hint: connect, accept, bind, listen, etc.)
- Smallest unit for measuring data that computers use
- Most common transport protocol
- A common locking mechanism used in programs that share memory
- What famous OpenSSL fork was started due to security concerns after the HeartBleed security incident?
- Most security vulnerabilities are related to..
- One of the most common number systems that the information technology industry uses
- A famous open-source kernel made by Linux Torvalds
- What famous BSD operating-system is known to be fixated with security?
Down
- One of the worst vulnerabilities to ever exist (OpenSSL)?
- What is the weakest link in the security chain?
- The most common data transfer interface in Unix systems
- Protocol whose purpose is to provide communications security over the Internet (green padlock in your browser)
- A famous distributed version control system made by Linus Torvalds
- Act of reversing a system and figuring out how it works
- Assembly is converted into computer instructions through an..
- In public-key cryptography, the most common ways to represent security keys are through prime numbers and...
- Systems storing user passwords are required to hash and..
- Worst programming language to ever exist (jokingly)
19 Clues: Most common transport protocol • Most security vulnerabilities are related to.. • What is the weakest link in the security chain? • A famous open-source kernel made by Linux Torvalds • Smallest unit for measuring data that computers use • Worst programming language to ever exist (jokingly) • The most common data transfer interface in Unix systems • ...
Lesson 5 Papp 2024-05-29
31 Clues: oil • car • hood • road • tire • bags • mouse • trunk • stereo • garage • street • screen • printer • battery • highway • charger • quickly • browser • network • password • @ symbol • keyboard • to carry • to erase • windshield • TV channel • cyber cafe • to turn off • to download • application • repair shop
Types of Threats 2019-01-09
Across
- an attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
- any software that shows adverts,such as popups
- criminals make a promise of goods in return for details,such as offering a free music download
Down
- an attack that sends an email or displays a web announcement that falsely claims to be from a legitimate enterprise
- a type of malware that locates and saves data from users without them knowing about it.
- unauthorized access to a computer system.
- a piece of code that is capable of copying itself and typically has a detrimental effect,destroying data
- malware that allows a cyber security attacker to control an infected computer
8 Clues: unauthorized access to a computer system. • any software that shows adverts,such as popups • malware that allows a cyber security attacker to control an infected computer • a type of malware that locates and saves data from users without them knowing about it. • criminals make a promise of goods in return for details,such as offering a free music download • ...
Networking Devices (Quiz 2) 2025-03-22
Across
- A system designed to both detect and prevent malicious network traffic
- A method of tricking individuals into revealing personal information by pretending to be a trusted entity
- A technique used to modify network addresses as packets pass through a router
- A server that acts as an intermediary between the user and the internet to enhance privacy
- A security system designed to block unauthorized access to a network or computer system
- Software designed to harm or exploit any device, service, or network
- The act of altering the appearance of a website, often as part of a cyber attack
- A type of attack where data exceeds a buffer’s limit, potentially allowing code execution (hyphenated two-piece word)
- A firewall configuration where only authorized services are exposed to the internet
- A system that monitors network traffic for suspicious activity and raises alerts
- A detection method that identifies behavior outside of predefined patterns (hyphenated two-piece word)
- A type of worm that specifically targeted Microsoft IIS web servers
- A buffer zone between a private network and the internet that hosts public-facing services
- A security measure that restricts users' access to certain network resources based on their identity (hyphenated two-piece word)
- The process of identifying unauthorized access to a network or system (hyphenated two-piece word)
- A manipulation technique where attackers exploit human psychology to gain unauthorized access (hyphenated two-piece word)
Down
- An IDS that monitors network traffic for unusual patterns
- Type of IDS that detects known threats based on predefined patterns (hyphenated two-piece word)
- A security architecture that uses two firewalls to protect the internal network (hyphenated two-piece word)
- A tool used to capture and analyze network traffic in real-time (hyphenated two-piece word)
- Technology that checks the state of active connections before deciding which packets to allow (hyphenated two-piece word)
- A firewall designed to protect web applications from security threats by filtering traffic
- A type of malicious software that locks a computer or data until a ransom is paid
- An attack method used to gain unauthorized access by guessing or cracking passwords (hyphenated two-piece word)
- An attack that disrupts the normal functioning of a server or network by overwhelming it with traffic (hyphenated two-piece word)
- A server that hosts websites and delivers web pages to users' browsers (hyphenated two-piece word)
- The process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized users can decipher it
- A secure method for connecting to a network from a remote location
- Malicious software that allows hackers to gain administrative access while hiding its presence
- A type of IDS that monitors activity on a single host or system
30 Clues: An IDS that monitors network traffic for unusual patterns • A type of IDS that monitors activity on a single host or system • A secure method for connecting to a network from a remote location • A type of worm that specifically targeted Microsoft IIS web servers • Software designed to harm or exploit any device, service, or network • ...
Cybersecurity Notables 2021-01-17
Across
- She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon”
- This astronomer caught the first advanced persistent threat and wrote about it in the 1989 book “The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage”
- He gained unauthorized access to dozens of computer networks. Arrested by the FBI in 1995, he pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, resulting in five years in prison. Now he runs a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing.
- He exposed some of the biggest data breaches ever, including the ones at Target and Home Depot. He has also written several books chronicling his extensive work investigating cyber-criminal gangs in Russia and elsewhere. But he is not related to the recently fired CISA director.
- Best known for his work involving DNS cache poisoning, he is one of just seven people with the authority to restore the DNS root keys on the Internet in the event of an emergency.
- He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo.
- This Cornell University graduate student created in 1988 the very first internet worm and denial-of-service (DoS) attack.
Down
- She invented the Spanning Tree Protocol (STP) that builds a loop-free logical topology for Ethernet networks.
- She created Microsoft’s Bug Bounty Program and the Hacker One Bug Bounty Program, where she helped create the Department of Defense's "Hack the Pentagon" pilot program.
- As a researcher at BBN technologies, he realized in 1970 the possibilities of creating a program capable of moving in a network and leaving behind a trail.
- Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period.
- Created the haveibeenpwned.com website that allows anyone to check to see if their email or username has been compromised in major breaches.
12 Clues: She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” • He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo. • Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period. • ...
evidence 2015-01-11
Across
- ____________can arrest on a " Found Committing " indictable offence
- Under the trespass to property act a security can only
- Anything seized as a result of a Charter Violation is called _________ evidence
- A Security guard can make an arrest when he finds someone committing a _______ offence
- Evidence that relates to a series of facts other than the particular fact sought to be proved is called ______ evidence
- A person who lies on the stand is committing
- A witness giving testimony is giving _________ evidence
- An expert witness can give ________ evidence
- Real evidence is_________ evidence.
Down
- Is a Security guard a peace officer?
- A Security guard who uses excessive force is committing
- The criminal code is a _____________ Act
- A Fingerprint is ____________evidence
- A serious criminal offence
- The lowest criminal court is called ________ court
- Evidence of prior bad acts by the accused is called_______ evidence
- Every person who is acting as a security guard shall carry his/her___________
- A minor criminal offence
- An NSF cheque is ________ evidence
- Security guards keep make entries during a shift in a
- A gun is considered __________ evidence
- An offence which has the option of being summary or indictable
22 Clues: A minor criminal offence • A serious criminal offence • An NSF cheque is ________ evidence • Real evidence is_________ evidence. • Is a Security guard a peace officer? • A Fingerprint is ____________evidence • A gun is considered __________ evidence • The criminal code is a _____________ Act • A person who lies on the stand is committing • ...
Security 2018-06-13
Across
- Supervisor inspects the branch to make sure no one is still in the branch
- Who you should call if anything looks out of the ordinary during morning procedure
- Tested monthly to ensure proper function
- The answer you should expect when asking "Is everything okay?"
Down
- When two employees arrive at the branch and inspect the building
- Set when the branch is safe to enter
- On all day long, recording what goes on inside the branch
- Station Limit
- When a supervisor comes in before the scheduled time
- Floor Limit
- When two employees access a perform a function together
11 Clues: Floor Limit • Station Limit • Set when the branch is safe to enter • Tested monthly to ensure proper function • When a supervisor comes in before the scheduled time • When two employees access a perform a function together • On all day long, recording what goes on inside the branch • The answer you should expect when asking "Is everything okay?" • ...
Security 2024-06-19
Across
- Something that strong people have
- Strong men who are trained to fight
- The nation guarding the tomb
- What the tomb was
Down
- Something you keep valuable items in
- Hard to open
- People who protect something important
- Something soldiers use to protect themselves
- Something soldiers use to fight
- Something that soldiers never feel
- Something you use to open things
11 Clues: Hard to open • What the tomb was • The nation guarding the tomb • Something soldiers use to fight • Something you use to open things • Something that strong people have • Something that soldiers never feel • Strong men who are trained to fight • Something you keep valuable items in • People who protect something important • Something soldiers use to protect themselves
cyber safety 2016-05-25
Across
- makes computer sick
- when someone gets into a game is called
- something you download stuff into
- up something keeps on coming back
- message something that you send something that is not nice and it's on your phone
- login to something that Facebook will stuff
- something you can do work or games on
- something you sent to another person
- something you get information from
- something something you do while you're on a computer or iPad
Down
- something that your friend send you from the iPad
- bullying you should know this love your new computer or the Internet
- someone you don't know that might be having into you
- I think you keep to your computer
- safety can you keep safe on the Internet or games
- someone who helps you when you're stuck with a virus
- something you play on your iPad
17 Clues: makes computer sick • something you play on your iPad • something you download stuff into • I think you keep to your computer • up something keeps on coming back • something you get information from • something you sent to another person • something you can do work or games on • when someone gets into a game is called • login to something that Facebook will stuff • ...
cyber safety 2016-05-25
Across
- makes computer sick
- when someone gets into a game is called
- something you download stuff into
- up something keeps on coming back
- message something that you send something that is not nice and it's on your phone
- login to something that Facebook will stuff
- something you can do work or games on
- something you sent to another person
- something you get information from
- something something you do while you're on a computer or iPad
Down
- something that your friend send you from the iPad
- bullying you should know this love your new computer or the Internet
- someone you don't know that might be having into you
- I think you keep to your computer
- safety can you keep safe on the Internet or games
- someone who helps you when you're stuck with a virus
- something you play on your iPad
17 Clues: makes computer sick • something you play on your iPad • something you download stuff into • I think you keep to your computer • up something keeps on coming back • something you get information from • something you sent to another person • something you can do work or games on • when someone gets into a game is called • login to something that Facebook will stuff • ...
cyber safety 2021-09-17
Across
- a game with games in it
- don't go on this
- the biggest company in the world
- you text on this
- don't text people...
- you buy stuff on this
- is an online game
- think before you...
Down
- a thing you use every day
- you watch stuff on this
- the second-best phone compney
- you need to look out for this
- you need this to use your phone
- you play...
- don't hate people
- do this to people you don't know
- be your self
17 Clues: you play... • be your self • don't go on this • you text on this • don't hate people • is an online game • think before you... • don't text people... • you buy stuff on this • you watch stuff on this • a game with games in it • a thing you use every day • the second-best phone compney • you need to look out for this • you need this to use your phone • the biggest company in the world • ...
Cyber Safety 2024-01-25
Across
- make a fake profile to pretend to be someone else
- texts that go back and forth between people that are angry, insulting, or hurtful
- where I ___ is personal information that I should NOT share
- for your use and no one else's
- a person or people that are looking for someone to hurt or use
- an example of personal information that I should NOT share is __
- you know that person will be honest
Down
- information that describes you
- being protected from danger
- one way for me to access the internet is my ___ system
- a plan to trick people so they can steal from or hurt others
- an example of personal information that I can share is my favorite ___
- a feeling that someone is being dishonest or doing something wrong
- sharing private information is not ___
- bothering or pressuring a person over and over
- relating to computers or computer networks; internet
- using the phone to send sexual pictures or messages
17 Clues: being protected from danger • information that describes you • for your use and no one else's • you know that person will be honest • sharing private information is not ___ • bothering or pressuring a person over and over • make a fake profile to pretend to be someone else • using the phone to send sexual pictures or messages • ...
Cyber Ethics 2025-05-21
Across
- Converts the encrypted information into a readable form.
- The process of transforming data into unreadable code.
- Protects your brand name's logo, packaging, and other distinctive designs that identify and distinguish the products of one manufacturer.
- The act of using or imitating the language and thoughts of another person as one's original work.
- Criminal activities that involve the use of computers, network, and the internet connections with the intentions to cause harm to individuals.
- Unwanted bulk emails coming from unknown sources.
- An illegal intrusion into a computer system or network.
- An act of harming or harassing a person through information technology
Down
- A legal right granted by law to the creator for his original work.
- A single licenced copy of a software is loaded into many computers contrary to the licence's terms.
- A security system that prevents unauthorised people from accessing your system and network.
- A right related to the new intentions that grants the inventor the sole right to make, use, and sell that intention for a specific period of time.
- A term which is a combination of two terms,'net' and 'etiquette'.
- A program or a set of programs that disrupts the normal functioning of a computer.
- An act of sending an email to a user to mislead him.
- A safety measure to minimise the chances of being hacked which is a combination of letters, numbers, and symbols.
- The simplest way to prevent plagiarism.
17 Clues: The simplest way to prevent plagiarism. • Unwanted bulk emails coming from unknown sources. • An act of sending an email to a user to mislead him. • The process of transforming data into unreadable code. • An illegal intrusion into a computer system or network. • Converts the encrypted information into a readable form. • ...
Unit 1 What is cybersecurity? 2021-09-27
Across
- protocols for encrypting or decrypting information in order to protect computer systems, networks and data from cyber attacks
- assurance that systems and data are accessible by authorized users when and where needed
- the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data
- the protection of information from people who are not authorized to view it
Down
- the study of computational thinking which describes a step by step process
- a widely accepted security measure that should be guaranteed in every secure system
- the usage of deceptive emails and websites to maliciously gather personal information
- identify theft, stealing money, stealing private information controlling private computers
- ensures that information is protected from unauthorized or unintentional alteration
9 Clues: the study of computational thinking which describes a step by step process • the protection of information from people who are not authorized to view it • a widely accepted security measure that should be guaranteed in every secure system • ensures that information is protected from unauthorized or unintentional alteration • ...
security threats 2020-01-29
Aviation security 2023-11-15
Across
- Something that even if said as a joke will be taken seriously
- open to the public
- hold your items
- nz main flying company
- its the 22 word in the phonetic alphabet
- a type of id to go over seas
- you do this if your travelling with foods
- animal in security
- evacuate passengers quick and safe
- menzies who found menzies
Down
- IATA code is wag
- expensive seating on plane
- you need this to work overseas
- the 2 letter code is ek
- only passengers can access
- go here to catch flights
- tenth word in the phonetic alphabet
- a covered walkway
- where aircraft park
19 Clues: hold your items • IATA code is wag • a covered walkway • open to the public • animal in security • where aircraft park • nz main flying company • the 2 letter code is ek • go here to catch flights • expensive seating on plane • only passengers can access • menzies who found menzies • a type of id to go over seas • you need this to work overseas • evacuate passengers quick and safe • ...
Food security 2024-11-28
Across
- Insecurity The condition in which people lack stable access to sufficient food
- Market An economic system where food is grown locally and directly sold to consumers
- A practice of growing food without soil, often using water and nutrients
- A type of agriculture that focuses on using minimal resources while maintaining productivity
- A resource essential for growing food, often limited in drought-prone areas
- The variety of crops or animals that are used to reduce risk in food systems
- Rotation The practice of rotating different crops to maintain soil fertility
- An essential crop used to make oil, often grown for its seeds
- A condition where people do not have enough food for a healthy life
- A major food that provides protein, especially important in developing countries
Down
- Security The ability to consistently access enough nutritious food
- An essential nutrient found in fruits and vegetables that helps build immune strength
- The process of protecting food from spoilage and contamination
- A system of farming that integrates different types of crops and livestock for sustainability
- A nutrient-rich crop often used to feed both humans and livestock, especially in Africa
- (Food and Agriculture Organization) A large-scale international organization working to end hunger and promote food security
- A staple grain used to make bread and pasta
- (Sustainable Development Goal) A global goal aimed at eliminating hunger and poverty by 2030
- The process of distributing food to areas that need it most, especially in emergencies
- A type of farming that avoids chemical fertilizers and pesticides, focusing on sustainability
20 Clues: A staple grain used to make bread and pasta • An essential crop used to make oil, often grown for its seeds • The process of protecting food from spoilage and contamination • Security The ability to consistently access enough nutritious food • A condition where people do not have enough food for a healthy life • ...
security 2014-03-05
Across
- a way of prooving your identity
- place hand on scanner
- to manage power or authority over something
- look into the camera
- needed for speaker recognition
- characteristics examples: palm print recognition, fingerprint recognition, iris scanning, DNA
Down
- A way of reading something that is put onto the scanner
- no identity number needed
- not the same as voice recognition software
- one of a kind, specific to you only.
- statistical study of biological data
11 Clues: look into the camera • place hand on scanner • no identity number needed • needed for speaker recognition • a way of prooving your identity • one of a kind, specific to you only. • statistical study of biological data • not the same as voice recognition software • to manage power or authority over something • A way of reading something that is put onto the scanner • ...
Security 2022-02-11
Across
- This filter blocks cookies, which are data stored on your computer and used by websites when
- This filter blocks the use of Internet proxy servers.
- port 113 is a filter that keeps port 113 from being able to scan on the internet
- This filter prevents a local computer from using a URL or Internet IP address to access the local
- This filter blocks Java, so you may not be able to access Java content on websites.
Down
- filter blocks Internet requests from unknown sources such as ping requests.
- Filter helps protect your local network from the Internet.
- recipients within your local network.
- multicast This filter blocks multicasting, which allows a single transmission to simultaneously reach
- This filter blocks ActiveX, so you may not be able to access ActiveX content on websites.
- interact with them.
11 Clues: interact with them. • recipients within your local network. • This filter blocks the use of Internet proxy servers. • Filter helps protect your local network from the Internet. • filter blocks Internet requests from unknown sources such as ping requests. • port 113 is a filter that keeps port 113 from being able to scan on the internet • ...
TD40 2024-02-14
International Relations - Constructivism & Realism 2017-05-06
20 Clues: Waltz • means • Wendt • realism • harmony • anarchy • survival • hegemony • security • identity • interests • diplomacy • legitimacy • liberalism • sovereignty • institutions • collaboration • constructivism • balance_of_power • self-determination
Industrial Security 2025-09-23
Across
- to withstand the effects of a hostile environment -measure of how open an establishment to intrusion , attack or injury.
- being watchful in spotting violator , a person a vehicle or an incident
- a kind of state or quality of being secured , freedom from fear or danger , assurance , certainty.
- a chance of being injured or harmed.
- a metallic container used for the safekeeping of document or small items in an office or installation.
- - faith in oneself and his abilities
- reduction- minimizing the probability of the potential loss
- System-an installation owned system which is direct extension of the local enforcement agency and /or fire department by special arrangement.
- zone-is an unobstructed area maintain on both sides ofbthe perimeter barrier
Down
- sound and good judgement to arrive at wise and timely decisions
- to deal with others succesfully without offending
- avoidance-removing the risk totally from the business.
- security- a system of barriers placed between the potential intruder and the objects/matter to be protected.
- the potential that a chosen action or activity will lead to a loss probability of an event to happen that will lead to losd.
- Fence- Constructed in suvh away that visual access through the fence is denied.
- a portable and detachable lock having a pivoted or sliding hasp
- low- aim the nozzle or hose of extinguisher at the base of the fire.
- - an indication of impending danger or harm.
- Measures- these involve installation of physical barriers , security lighting , use of vaults, locks and others.
- bell-a hollow device made of metal that makes a ringing sound
20 Clues: a chance of being injured or harmed. • - faith in oneself and his abilities • - an indication of impending danger or harm. • to deal with others succesfully without offending • avoidance-removing the risk totally from the business. • reduction- minimizing the probability of the potential loss • bell-a hollow device made of metal that makes a ringing sound • ...
ARREST & USE OF FORCE 2015-01-25
Across
- ____________can arrest on a " Found Committing " indictable offence
- A serious criminal offence
- An offence which has the option of being summary or indictable
- A security guard does not have the same power as the __________
- A Security guard who uses excessive force is committing
- Security guards have to follow a "code of _____________"
- A person who lies on the stand is committing
Down
- A minor criminal offence
- Is a Security guard a peace officer?
- Security guards keep make entries during a shift in a
- A Security guard can make an arrest when he finds someone committing a _______ offence
- The criminal code is a _____________ Act
- Under the trespass to property act a security can only
- Every person who is acting as a security guard shall carry his/her___________
14 Clues: A minor criminal offence • A serious criminal offence • Is a Security guard a peace officer? • The criminal code is a _____________ Act • A person who lies on the stand is committing • Security guards keep make entries during a shift in a • Under the trespass to property act a security can only • A Security guard who uses excessive force is committing • ...
Security Fair 2018 2018-05-16
Across
- Restricted access
- Violation of Security policy/procedure
- New visitor system
- Not-quite-final clearance
- Foreign visitor badge color
- Person inside the company with malicious intent
- Ken Morgan
- Defense ____ Service
Down
- Facility Security Officer
- Documents with 180 day retention requirement
- Information with need-to-know
- Allied ____ Security- Our guard service
- Form to apply for security clearance
- Protection for classified media
14 Clues: Ken Morgan • Restricted access • New visitor system • Defense ____ Service • Facility Security Officer • Not-quite-final clearance • Foreign visitor badge color • Information with need-to-know • Protection for classified media • Form to apply for security clearance • Violation of Security policy/procedure • Allied ____ Security- Our guard service • ...
Newspaper's Crossword February 18th, 2015 2015-02-18
Across
- Craig Hicks was indicted for killing 3 Muslims in a dispute over _________ spaces. RJT
- In most states there is no law dictating which _______ teachers must get. RJT
- 16 people were killed in Haiti when a Carnival float hit a _______ above the street. MJS
- A Federal judge halted Barack Obama’s plan to protect immigrants from _______________. MJS
- The top two vote getters in Tuesday’s election will be on the April 7th ballot for __________. RJT
- The National Bakery in Milwaukee alone sold 36,000 __________ yesterday. MJS
- Miss P is the second ever _______ to win at Westminster. MJS
Down
- In West Virginia and in eastern Canada there were fuel car train ___________________. MJS
- Morgan Geyser had _______________ Barbie dolls in her room. MJS
- __________ Lab is a Russian cyber security firm that released a report of a $1 billion hacker attack. RJT
- A person was killed at a Copenhagen Jewish __________. RJT
- _________ is where the Islamic extremist group has a strong presence outside of Syria and Iraq. RJT
12 Clues: A person was killed at a Copenhagen Jewish __________. RJT • Miss P is the second ever _______ to win at Westminster. MJS • Morgan Geyser had _______________ Barbie dolls in her room. MJS • The National Bakery in Milwaukee alone sold 36,000 __________ yesterday. MJS • In most states there is no law dictating which _______ teachers must get. RJT • ...
Unlocking Privacy: Navigating the Maze of Data Protection 2025-01-07
Across
- Malicious software, including but not limited to viruses, trojan horse applications, rootkits, and backdoors.
- A small piece of data sent from a website and stored in your web browser as a record of browser activity.
- Cyber attackers use fraudulent messages or websites to get information from unsuspecting users.
- Consent that requires you to act.
- Snippets of code used on web pages to gather information about website visitors and track their activity.
- Locking your credit data until you give permission for it to be released.
- Data such as fingerprint, DNA or handwriting.
Down
- Automated processing of personal data to analyze personal preferences, activity, and so on.
- A process by which personal data is irreversibly altered in such a way that a person can no longer be identified.
- Software that selectively blocks incoming or outgoing network communications based on security rules
- Any event that has resulted in (or could result in) unauthorized use, access, or disclosure of personal data.
- The process of transforming readable data (clear text) into a form that is unreadable.
12 Clues: Consent that requires you to act. • Data such as fingerprint, DNA or handwriting. • Locking your credit data until you give permission for it to be released. • The process of transforming readable data (clear text) into a form that is unreadable. • Automated processing of personal data to analyze personal preferences, activity, and so on. • ...
Safety and Security 2025-06-26
Across
- someone who monitors security cameras
- airport area before passport control
- machine that scans your luggage
- item required to enter the secure zone
- security step to inspect shoes or belt
- agency responsible for screening
- carry-on item
- no-entry sone on the tarmac
- prohibited liquids over 100ml
- forbidden object to take
Down
- airline staff that check cabin for safety
- type of explosive detection check
- where security occur
- must be shown to board a plane
- restricted item often found in aerosols
- keep this on when the sign is on
- detector detects metal objects
- physical search by hand
- safety procedure before takeoff
- the process of identifying passengers
20 Clues: carry-on item • where security occur • physical search by hand • forbidden object to take • no-entry sone on the tarmac • prohibited liquids over 100ml • must be shown to board a plane • detector detects metal objects • machine that scans your luggage • safety procedure before takeoff • keep this on when the sign is on • agency responsible for screening • ...
Government crossword puzzle 2024-10-24
Across
- department of defense
- federal deposit insurance corporation
- department of transport
- security and exchange commission
- National institute of health
- Freddie mac
- department of health
- department of energy
- social security agency
- federal aviation administration
- national oceanic and atmospheric administration
- transport security administration
- approves food and drugs
- department of agriculture
Down
- central intelligence agency
- department of homeland security
- federal communication commission
- department of interior
- environmental protection agency
- national Institute of standard and technology
- housing and development
- federal emergency management agency
- health, education, welfare
- department of veteran affairs
- small business administration
- buss rails, and mass transit
- national aeronautics and space admin
- Fannie may
- department of justice
29 Clues: Fannie may • Freddie mac • department of health • department of energy • department of defense • department of justice • department of interior • social security agency • department of transport • housing and development • approves food and drugs • department of agriculture • health, education, welfare • central intelligence agency • National institute of health • buss rails, and mass transit • ...
Government crossword puzzle 2024-10-24
Across
- health, education, welfare
- federal deposit insurance corporation
- department of agriculture
- department of energy
- National institute of health
- Freddie mac
- housing and development
- social security agency
- federal communication commission
- department of justice
- approves food and drugs
- department of transport
- national aeronautics and space admin
- buss rails, and mass transit
Down
- environmental protection agency
- federal emergency management agency
- department of interior
- national Institute of standard and technology
- department of health
- national oceanic and atmospheric administration
- department of homeland security
- security and exchange commission
- Fannie may
- central intelligence agency
- department of defense
- federal aviation administration
- department of veteran affairs
- transport security administration
- small business administration
29 Clues: Fannie may • Freddie mac • department of energy • department of health • department of justice • department of defense • department of interior • social security agency • housing and development • approves food and drugs • department of transport • department of agriculture • health, education, welfare • central intelligence agency • National institute of health • buss rails, and mass transit • ...
NEWSPAPERS CROSSWORD February 18th, 2015 2015-02-18
Across
- In most states there is no law dictating which _______ teachers must get. RJT
- The National Bakery in Milwaukee alone sold 36,000 __________ yesterday. MJS
- Miss P is the second ever _______ to win at Westminster. MJS
- A Federal judge halted Barack Obama’s plan to protect immigrants from _______________. MJS
- __________ Lab is a Russian cyber security firm that released a report of a $1 billion hacker attack. RJT
- Morgan Geyser had _______________ Barbie dolls in her room. MJS
Down
- _________ is where the Islamic extremist group has a strong presence outside of Syria and Iraq. RJT
- A person was killed at a Copenhagen Jewish __________. RJT
- Craig Hicks was indicted for killing 3 Muslims in a dispute over _________ spaces. RJT
- 16 people were killed in Haiti when a Carnival float hit a _______ above the street. MJS
- In West Virginia and in eastern Canada there were fuel car train ___________________. MJS
- The top two vote getters in Tuesday’s election will be on the April 7th ballot for __________. RJT
12 Clues: A person was killed at a Copenhagen Jewish __________. RJT • Miss P is the second ever _______ to win at Westminster. MJS • Morgan Geyser had _______________ Barbie dolls in her room. MJS • The National Bakery in Milwaukee alone sold 36,000 __________ yesterday. MJS • In most states there is no law dictating which _______ teachers must get. RJT • ...
Summer of '16 2016-07-20
7 Clues: Gamechanger? • Latest Malware Victim • June Healthcare Hacker • Zika vs. Unrestricted WiFi? • Come on and Meet the Neighbors! • Still Beholden to EU Cyber Laws? • Growing Demand in Cyber Healthcare
