cyber security Crossword Puzzles
lbock2@comcast.net 2023-04-23
Across
- Have no physical substance and include trade secrets, databases, and company records.
- A security flaw or weakness in a system that can be exploited by threats to gain unauthorized access to an asset.
- A comprehensive approach to managing risk and protecting information assets from a cyber threat
- When a person, place, or thing is open or exposed to harm and is a combination of threats and vulnerabilities.
- Keeping private information private by preventing unauthorized disclosure
- Evaluates a system to identify vulnerabilities that malicious actors could exploit.
- Ensures data has not been changed, destroyed or lost in an unauthorized or accidental manner
- Attack Sends multiple requests to a system to interrupt or suspend services to legitimate users.
Down
- Anything you can touch such as printers, servers, infrastructure devices, and end devices.
- The ability to recognize and understand the current environment along with the potential effects of that particular situation.
- Services are accessible and available to authorized users or processes in an information infrastructure.
- Assesses potential risks that can negatively affect an organization.
- Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.
13 Clues: Assesses potential risks that can negatively affect an organization. • Keeping private information private by preventing unauthorized disclosure • Evaluates a system to identify vulnerabilities that malicious actors could exploit. • Have no physical substance and include trade secrets, databases, and company records. • ...
Bullying 2022-10-24
Human Security Crosswords 2025-01-06
Across
- An institution responsible for determining emergencies in global health issues
- A strategy for reducing the population that displaces the existence of ethnic minorities
- A disease condition that has infected society widely and has occurred for a long time
- All ecosystems on this beloved earth
- A coalition of small countries fighting global warming and sinking of small island states
- Focus on resolving human security issues in an Asian perspective
- One of the industrial sectors that produces significant carbon emissions
- A form of conference held by state parties on environmental issues
- Problems that arise due to the issue of excess food
- Our Vice President
- One of the causes of food insecurity in several countries
- Orientation in resolving human security issues in the West
Down
- Large industrial countries that influence negotiations on environmental issues
- Food insecurity in extreme forms
- A concept criticized by the Human Security approach developed at UNDP
- One of the European regions affected by famine in the 19th century
- One of the crucial problems in health security
- Main subject in human security issues
- One of the cities where the carbon emission reduction agreement agreed
- Efforts to displace forest land for the sake of food and industrialization
- One of the ethnic minority communities threatened in terms of community security
21 Clues: Our Vice President • Food insecurity in extreme forms • All ecosystems on this beloved earth • Main subject in human security issues • One of the crucial problems in health security • Problems that arise due to the issue of excess food • One of the causes of food insecurity in several countries • Orientation in resolving human security issues in the West • ...
Cyber Security Revision - Cookie 2021-11-03
6 Clues: A type of ... • Used to protect account • What you use in this lesson • Surname of your computer science teacher • A type of Malware typically found on email attachments • An email scam to trick you into revealing personal information
Cyber Security word search 2024-10-16
6 Clues: Unauthorized access to data. • Software designed to harm a system. • Process of converting data into code. • Secret phrase for user authentication. • Fraudulent attempt to steal information. • Security system controlling network traffic.
Food Security 2020-10-08
Across
- security - the state of having reliable access to affordable, nutritious food.
- – full of nutrients
- – manufacture from raw materials
- – short supply of
- – shower from the clouds
- – person who manages a farm
- – relating to health and cleanliness
- – access to something
- insecurity – the state of not having reliable access to affordable, nutritious food.
Down
- – relating to the government
- – state of insufficient financial wealth
- – nutritious substance that animals and humans eat
- – inhabitants of a particular place
- change – a change in global or regional climate patterns
- - the management of financial matters for a community, business or family.
- – relating to a built-up area
- fuels – a natural fuel such as gas
- - a fuel derived immediately from living matter.
- – plants grown commercially
- – insufficient amount of something
20 Clues: – short supply of • – full of nutrients • – access to something • – shower from the clouds • – person who manages a farm • – plants grown commercially • – relating to the government • – relating to a built-up area • – manufacture from raw materials • fuels – a natural fuel such as gas • – insufficient amount of something • – inhabitants of a particular place • ...
computer security 2021-10-15
Across
- a study of design of computer equipment
- a person who has intention to destroy data
- a malicious code which sends out info to hacker
- a act of illegal listening to network channel
- a system of to protect safeguard network
- a secured layer of protocol to encrypt data
- a cause of system failure
- a computer health issue causing strain in hand
Down
- act of tricking user into revealing their info
- a person who access computer illegally
- a malicious act to slow down service of server
- act of making copy of files safely and secure
- act of stealing or faking information for hiding
- a malicious program which steals data from user
- a field of study on computer security
- a data protection act law in countries
- a program which copies itself repeateadly
- moral obligation to use computer with care
18 Clues: a cause of system failure • a field of study on computer security • a person who access computer illegally • a data protection act law in countries • a study of design of computer equipment • a system of to protect safeguard network • a program which copies itself repeateadly • moral obligation to use computer with care • a person who has intention to destroy data • ...
ASE Security 2012-03-29
Across
- Architecture based access control
- Malware that gives the attacker full control
- Result of a successful attack
- Network layer encryption technology
- Adaptable Cisco product that is both a firewall and IPS
- A blocking or filtering device based on ACLs
- The Ironport model for Email Security
- A set of rules defined by a business
- Malicious software that infects after a user clicks on the attachment
Down
- Malware installed on a computer that attacks on command
- Malware that the user thinks they want
- Application layer encryption technology
- A Cisco pioneered, standards based, VPN that ensures consistent application of policy
- Cisco product for web or email security
- Malicious software that is self propagating evilness
- Standard based link layer encryption
- The router that only offers an IOS Firewall
- The Ironport model for Web Security
18 Clues: Result of a successful attack • Architecture based access control • Network layer encryption technology • The Ironport model for Web Security • Standard based link layer encryption • A set of rules defined by a business • The Ironport model for Email Security • Malware that the user thinks they want • Application layer encryption technology • ...
Security Crossword 2022-12-02
Across
- used to track users
- protects against spyware
- a connected network of bots
- a patch to add new features to a product
- shows a user ads constantly
- tracks and blocks incoming requests
- secret entrance to a system
- logs keyboard inputs
- stops popups
Down
- sets access limits for users
- takes your data and demands ransom
- an encrypted file
- protects network
- copy of information
- a virus that replicates across computers
- used to protect computers from viruses
- a fix for software
- run code on a remote computer
18 Clues: stops popups • protects network • an encrypted file • a fix for software • used to track users • copy of information • logs keyboard inputs • protects against spyware • a connected network of bots • shows a user ads constantly • secret entrance to a system • sets access limits for users • run code on a remote computer • takes your data and demands ransom • ...
FOOD SECURITY 2024-11-28
Across
- – Essential for plant growth.
- – PROCESS OF CONSUMING AND USING FOOD
- – Growing crops and rearing animals together.
- – Food produced without chemicals.
- – A system of growing crops in water without soil.
- – The staple food in India.
- – SUPPLYING WATER TO CROPS
- – Protection against hunger.
- – An essential nutrient for energy.
Down
- – Process of improving seeds.
- – The practice of growing crops.
- – Another name for rice or wheat.
- – Organizations distributing food to the needy.
- – Overuse of this damages soil.
- – Lack of sufficient food.
- – A place where grains are stored.
- – A farming tool used to plow fields.
- – A farming method that saves water.
18 Clues: – Lack of sufficient food. • – SUPPLYING WATER TO CROPS • – The staple food in India. • – Protection against hunger. • – Process of improving seeds. • – Essential for plant growth. • – Overuse of this damages soil. • – The practice of growing crops. • – Another name for rice or wheat. • – Food produced without chemicals. • – A place where grains are stored. • ...
A CONNECTED SOCIETY 2020-12-16
Across
- fainéant
- fiable
- qui économise du temps
- des changements
- distrait
- en surpoids
- supprimer/effacer
- le clavier
- faciliter
- débrancher
- un écran
- un ordinateur portable
Down
- moteur de recherche
- se sentir seul
- précis
- un écran tactile
- des appareils électroniques
- harcèlement sur les réseaux sociaux
- télécharger
- un réseau
- pratique, facile à utiliser
- utile
22 Clues: utile • fiable • précis • fainéant • distrait • un écran • un réseau • faciliter • le clavier • débrancher • télécharger • en surpoids • se sentir seul • des changements • un écran tactile • supprimer/effacer • moteur de recherche • qui économise du temps • un ordinateur portable • des appareils électroniques • pratique, facile à utiliser • harcèlement sur les réseaux sociaux
Vocabulary 2021-03-17
30 Clues: CD • app • car • mouse • trunk • stereo • screen • police • browser • printer • to call • highway • to work • website • to save • to start • @ symbol • keyboard • computer • to erase • home page • tv channel • windsheild • voice mail • cyber cafe • to turn on • text message • television set • steering wheel • wireless connection
Security Crossword 2019-04-09
Across
- What do we measure by listening to calls?
- First security check after NINO/UTR
- No reference number? find them with _ _ _ _ _ & _ _ _ _ _
- Want their UTR we need to ask two of these
- who is responsible for security?
- Someone calling regarding another person's account is known as a _ _ _ _ _ / _ _ _ _ _
Down
- A little bit lost? Follow the _ _ _ _ _ _ _ _
- where we go to nest and third security check
- The system used to process security checks
- Happens once a year and our second security check
- The types of measure we take to ensure everyone's records are safe and protected
- If you don't know just _ _ _!
- Can be used to find MA relationships
- Book these sessions on Smiley Face
- Can't set up a PTA via government Gateway? Use Gov.uk _ _ _ _ _ _
15 Clues: If you don't know just _ _ _! • who is responsible for security? • Book these sessions on Smiley Face • First security check after NINO/UTR • Can be used to find MA relationships • What do we measure by listening to calls? • The system used to process security checks • Want their UTR we need to ask two of these • where we go to nest and third security check • ...
BC 2016-02-04
Across
- You should always be careful before opening any ___ that is unfamiliar to you.
- The program that is responsible for establishing the framework is called the ____.
- Take pictures of damage to your property for _____ purposes.
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
- _____ Response Team is a group of staff that assist in evacuation.
- The first thing to do when confronted with an active shooter if possible is _____.
- Throw away all food that has come in contact with the ____ water.
Down
- If escape is not possible, then _____.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- _____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- Only as a last resort, you must _____ the active shooter.
- Active shooter is defined as an individual _____ engaged in killing or attempting to kill people in a confined and other populated area.
- _____ virus can be transmitted from a pregnant mother to her baby
- The virus is transmitted through ______ bites.
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
15 Clues: If escape is not possible, then _____. • The virus is transmitted through ______ bites. • Only as a last resort, you must _____ the active shooter. • Take pictures of damage to your property for _____ purposes. • _____ virus can be transmitted from a pregnant mother to her baby • Throw away all food that has come in contact with the ____ water. • ...
BC 2016-02-04
Across
- The program that is responsible for establishing the framework is called the ____.
- Throw away all food that has come in contact with the ____ water.
- _____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- _____ virus can be transmitted from a pregnant mother to her baby
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- The first thing to do when confronted with an active shooter if possible is _____.
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
Down
- You should always be careful before opening any ___ that is unfamiliar to you.
- The virus is transmitted through ______ bites.
- Only as a last resort, you must _____ the active shooter.
- Take pictures of damage to your property for _____ purposes.
- If escape is not possible, then _____.
- Active shooter is defined as an individual _____ engaged in killing or attempting to kill people in a confined and other populated area.
- _____ Response Team is a group of staff that assist in evacuation.
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
15 Clues: If escape is not possible, then _____. • The virus is transmitted through ______ bites. • Only as a last resort, you must _____ the active shooter. • Take pictures of damage to your property for _____ purposes. • Throw away all food that has come in contact with the ____ water. • _____ virus can be transmitted from a pregnant mother to her baby • ...
Compliance week 2024-10-28
Across
- Abusive, Offensive or Discriminatory remarks are what type of abuse?
- PHW will strictly prohibit and will not tolerate any form of ____ or bullying.
- Compliance ______ is my favorite time of the year!
- The compliance program is supported by _____ and Procedures.
- The _______ Officer is responsible for implementing and supporting the effectiveness of the compliance program.
- Protecting systems and data from digital attacks
- Sending and email securely means it has been ______
- You should call the ____ to report a suspected or known violation.
Down
- Any Possible _____ event should be reported to the compliance team as soon as it is discovered
- All ______ are responsible for the information in the Code of Conduct and Compliance Program and will be responsible for failing to comply
- FWA stands for Fraud,_____ and Abuse.
- All employees are required to complete these in Centene University by the assigned due dates.
- An official inspection of an individual's or organization's accounts.
- You can obtain the FWA hotline and the Cyber Security hotline numbers, as well as other important phone numbers at the bottom of the _____ home page.
- Wrongful or criminal deception intended to result in financial or personal gain
15 Clues: FWA stands for Fraud,_____ and Abuse. • Protecting systems and data from digital attacks • Compliance ______ is my favorite time of the year! • Sending and email securely means it has been ______ • The compliance program is supported by _____ and Procedures. • You should call the ____ to report a suspected or known violation. • ...
Internet/Security 2011-12-08
Across
- A broad term that describes any pogram that is intended to cause harm or convey information to others without the owner's permission
- password A string of at least characters of upper and lower case letters and numbers.
- Hardware or software that prevents other computers on the Internet from accessing a computer .
- Steps a computer owner takes to prevent unauthorized use of or damage to a computer
- filter A feature in internet explorer 8 that helps detect phishing websites
- browsing Allows you to open more than one web page at a time.
- To break into a DNS server and redirect any attempts to access a particular Web siste to a spoofed site
- To create a Web site that looks exactly like another legitimate site on the Web but steals the information people enter
Down
- filtering Featured in internet explorer that helps you prevent website or third party developers from collecting information about the site you visit.
- A descriptive word or phrase you enter to obtain a list of results that include that word or phrase
- A software program that lets you open and display web pages.
- software Software that detecs and removes spyware
- An illicit activity used by hackers to trick computer users to reveal personal or financial information through an e-mail or website.
- rus software Software that searches excutable files for the sequences of commands
- Software that track a computer user's Internet usage and sends this data back to the company or person that created it
- harmful program that instructs a computer to perform destructive activities, such as erasing a disk drive.
- certificate Verifies the identity of a person or indicates the security of a website
- Window that opens on your screen as you visit websites, generally to advertise products you may or may not want
18 Clues: software Software that detecs and removes spyware • A software program that lets you open and display web pages. • browsing Allows you to open more than one web page at a time. • filter A feature in internet explorer 8 that helps detect phishing websites • Steps a computer owner takes to prevent unauthorized use of or damage to a computer • ...
Security Guard 2018-03-15
18 Clues: 911 • janitor • raining • be wise • sign in • computer • firealarms • looking for • contractors • security room • during patrol • Johnny Wilson • very important • facility issues • emails sent for? • make a habbit of • 4 steps to incidents • don't know what to do
Food Security 2024-12-17
Across
- A yellow fruit.
- people from Britain like to eat them with fish.
- A red vegetable.
- you have it with cornflakes.
- A brown and sweet Desert.
- People from Britain drink more of it than people from Germany.
- A burger with cheese.
- A drink it has lot of sugar in it.
- A kind of fruit.
- you can put it in your tea.
Down
- It is part of an English breakfast.
- Many people eat it in Italian Restaurants.
- A drink many adults like for breakfast.
- Usually we eat it with chips.
- you can put it on your sandwich.
- You need a recipe to make it.
- A drink made of fruits.
- you can eat it with tomato sauce.
- An apple or a banana for example.
19 Clues: A yellow fruit. • A red vegetable. • A kind of fruit. • A burger with cheese. • A drink made of fruits. • A brown and sweet Desert. • you can put it in your tea. • you have it with cornflakes. • Usually we eat it with chips. • You need a recipe to make it. • you can put it on your sandwich. • you can eat it with tomato sauce. • An apple or a banana for example. • ...
Energy Security 2025-02-26
Across
- A recyclable energy source
- The means to transport gas across continents
- The cleanest fossil fuel
- Black gold
- point A narrow route that maybe vulnerable
- A network for delivering electricity from producers to consumers
- An infinite energy source
- a fossil fuel used for making plastics
- Power derived from water
- The point where global production has reached its maximum
Down
- An unconventional fossil fuel
- The fuel used to produce nuclear energy
- Plant or animal matter used to produce energy
- The variety of energy sources a country has
- Having affordable, available and uninterrupted supply of energy
- An unconventional way to extract gas
- An offshore oil rig that had a blowout in the Gulf of Mexico
- A Russian energy TNC
- The means to transport oil by sea
19 Clues: Black gold • A Russian energy TNC • The cleanest fossil fuel • Power derived from water • An infinite energy source • A recyclable energy source • An unconventional fossil fuel • The means to transport oil by sea • An unconventional way to extract gas • a fossil fuel used for making plastics • The fuel used to produce nuclear energy • point A narrow route that maybe vulnerable • ...
Security Crossword 2025-12-17
Across
- instantly identifies hidden, deep insert and overlay, skimmers in Automated Teller Machines (ATMs) and Enhanced Teller Machines (ETMs)
- contact BSA Compliance when this report fails when doing member maintenance
- after an emergency once employees have evacuated they gather at their designated____
- after a robbery this persoon if a member refuses to stay inside the branch, will ask for their contact information (Name, phone, and account number)
- after a robbery will call 911-FROM AN RBFCU POLY HARD PHONE
- the RBG keystroke to dispense money during a robbery
- by all phones in case of emergency(ie extortion or bomb threat)
- another way in branch to verify a member besides their ID
- a technique for attempting to acquire sensitive data, such as bank account numbers, through fraudulent solicitation in an email or on a website, in which the perpetrator masquerades as a legitimate business or reputable person.
- our new phone system
Down
- to report a suspected phishing email to the Information Technology's (IT) Information Security (IS) department
- after a robbery will provide lead law enforcement official with downloaded video from DVR
- department to contact during lobby hours for an unscheduled vendor visit
- how often is all clear sign updated (days)
- lets other employees know that the branch is safe to enter
- Ensure one employee capturesthe most recentserial numbers dispensed from the RBG 100 that was used.
- pressing this alerts security and dispatches Security Forces
- who conducts a fire alarm inspection
18 Clues: our new phone system • who conducts a fire alarm inspection • how often is all clear sign updated (days) • the RBG keystroke to dispense money during a robbery • another way in branch to verify a member besides their ID • lets other employees know that the branch is safe to enter • after a robbery will call 911-FROM AN RBFCU POLY HARD PHONE • ...
CYBERLAW CROSSWORD 2021-09-05
Across
- Device that raise a number of security concerns because they create links between your computer and the outside world
- An economy that is based on digital computing technologies
- The code used in creating the environment that then forms Cyberspace.
- The use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- The ability to use computer technologies effectively and to understand the implications of your actions
Down
- The integration of two or more different technologies in a single device or system
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
- An independent U.S. government agency that oversees all interstate and international communications.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- A critical requirement for the sharing of digital text
10 Clues: A critical requirement for the sharing of digital text • An economy that is based on digital computing technologies • The code used in creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
security testing 2024-04-24
Across
- What is the highest level of policy in the security policy hierarchy?
- What executive role, abbreviated as CSO, is primarily concerned with ensuring the security of an organization's assets?
- Name a tool that helps in analyzing security event logs and data correlation.
- What are policies that relate to the operations and technical aspects of security?
- Type of network test that involves examining the network for vulnerabilities.
- Type of network test involving attempting to gain unauthorized access to a system or network.
- What tool is often used for network scanning and port mapping?
Down
- This network test involves examining the system's response to various attempts to breach its security.
- What type of documents outline, rules, and procedures related to security measures within an organization?
- What type of policies govern the actions and behaviors of end users?
- This network test involves analyzing the logs generated by various network devices for security-related events.
- Which tool is known for its vulnerability scanning capabilities?
- What is a popular open-source tool for network auditing?
- What is the title commonly abbreviated as CEO, responsible for the overall management of an organization?
- Network test that checks for the presence of malicious software on the network.
15 Clues: What is a popular open-source tool for network auditing? • What tool is often used for network scanning and port mapping? • Which tool is known for its vulnerability scanning capabilities? • What type of policies govern the actions and behaviors of end users? • What is the highest level of policy in the security policy hierarchy? • ...
technology 2021-07-20
Across
- to attempt to simplify or improve someone's life
- machinery and equipment developed from the application of scientific knowledge.
- the state of being free from danger or threat a statement of an intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something done or not done
- the effectiveness of productive effort, especially in industry, as measured in terms of the rate of output per unit of input
- providing knowledge
- expressing or implying affirmation, agreement, or permission.
Down
- happening or coming immediately
- protected from or not exposed to danger or risk; not likely to be harmed or lost
- a key which holds a variable value which can be applied to a string or a text block
- a report or description of an event or experience
- a new method, idea, product, etc
- the programs and other operating information used by a computer.
- a sudden, dramatic, and important discovery or development
- criminal activities carried out by means of computers or the internet
- a form of energy resulting from the existence of charged particles (such as electrons or protons), either statically as an accumulation of charge or dynamically as a current.
15 Clues: providing knowledge • happening or coming immediately • a new method, idea, product, etc • to attempt to simplify or improve someone's life • a report or description of an event or experience • a sudden, dramatic, and important discovery or development • expressing or implying affirmation, agreement, or permission. • ...
BC Newsletter 2016-02-10
Across
- Throw away all food that has come in contact with the ____ water.
- Only as a last resort, you must ____ the active shooter.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- The Zika virus is transmitted through ____ bites.
- Cyber ____ is now one of the number one threats against networks, computers, programs and data.
- The first thing to do when there is an active shooter in the building, if possible, is ____.
- The program that is responsible for establishing the Business Continuity framework is called the ____.
- You should always be careful before opening any ____ that is unfamiliar to you.
Down
- Each supervisor needs to have a Supervisor ____ form filled out in advance with their staffs’ names.
- Active shooter is defined as an individual ____ engaged in killing or attempting to kill people in a confined and other populated area.
- During an active shooter if escape is not possible, then ____.
- ____ Response Team is a group of staff that assists in evacuation.
- Take pictures of damage to your property for ____ purposes.
- ____ virus can be transmitted from pregnant mother to her baby.
- scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
15 Clues: The Zika virus is transmitted through ____ bites. • Only as a last resort, you must ____ the active shooter. • Take pictures of damage to your property for ____ purposes. • During an active shooter if escape is not possible, then ____. • ____ virus can be transmitted from pregnant mother to her baby. • ...
Cybersecurity terms 2024-09-22
Across
- the process of converting plaintext data into a coded format to prevent unauthorized access
- a type of malicious software that automatically downloads advertisements on a device
- process of converting data into a fixed-size string of characters for unique identificaton
- a type of malicious software that disguises itself as legitimate or useful software
- the process of monitoring network or system activities for malicious activities
- technique that isolates applications or processes in a controlled environment
Down
- a type of malicious software or hardware that records keystrokes made by a user
- a security approach that allows only pre-approved users to access a network
- an incident of unauthorized access to sensitive, protected or confidential data
- the practice of securing information by transforming it into an unreadable format
- a network of compromised computers that are controlled remotely by a hacker to perform automated tasks
- a malicious software designed to gain unauthorized access to a network while hiding its presence
- a software update designed to fix vulnerabilities, bugs, or improve functionality
- any device that connects to a network and serves as a point of entry for data
- a simulated cyber attack on a system conducted to identify and vulnerabilities
15 Clues: a security approach that allows only pre-approved users to access a network • any device that connects to a network and serves as a point of entry for data • technique that isolates applications or processes in a controlled environment • a simulated cyber attack on a system conducted to identify and vulnerabilities • ...
CYBER CROSSWORD 2021-09-05
Across
- A critical requirement for the sharing of digital text
- An independent U.S. government agency that oversees all interstate and international communications.
- The integration of two or more different technologies in a single device or system
- an economy that is based on digital computing technologies
- literacy the ability to use computer technologies effectively and to understand the implications of your actions
Down
- The code is creating the environment that then forms Cyberspace.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- Device that raise a number of security concerns because they create links between your computer and the outside world
- the use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
10 Clues: A critical requirement for the sharing of digital text • an economy that is based on digital computing technologies • The code is creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
CYBERLAW CROSSWORD 2021-09-05
Across
- Device that raise a number of security concerns because they create links between your computer and the outside world
- an economy that is based on digital computing technologies
- The code used in creating the environment that then forms Cyberspace.
- the use of digital technologies to change a business model and provide new revenue and value-producing opportunities.
- the ability to use computer technologies effectively and to understand the implications of your actions
Down
- The integration of two or more different technologies in a single device or system
- An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce
- An independent U.S. government agency that oversees all interstate and international communications.
- Protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
- A critical requirement for the sharing of digital text
10 Clues: A critical requirement for the sharing of digital text • an economy that is based on digital computing technologies • The code used in creating the environment that then forms Cyberspace. • The integration of two or more different technologies in a single device or system • ...
Cybersecurity Awareness Puzzle 2023-09-20
Across
- ______ is a type of phishing that uses voice calls to manipulate a target.
- Type of malware that threatens to expose information unless a payment is made.
- Cyber defense agency that is hosting National Cybersecurity Awareness Month.
- Social engineering tactic that research is done on the victim to personalize the attack.
- Cybercrime tactic that disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
Down
- A new social engineering attack involves QR codes and is a form of a *ishing attacks.
- According to SANS 2023 Security Awareness Report: Managing Human Risk, social __________ related attacks are the number one top risk to an organization.
- Amazon devices, Ring doorbells, Fitbit watches, and smart tvs are ________ devices and require software updates to maintain safety.
- A ________ manager is best the way to create and maintain strong passwords.
- In 2023, this brand name was abused the most in phishing attacks.
10 Clues: In 2023, this brand name was abused the most in phishing attacks. • ______ is a type of phishing that uses voice calls to manipulate a target. • A ________ manager is best the way to create and maintain strong passwords. • Cyber defense agency that is hosting National Cybersecurity Awareness Month. • ...
Cyber Ethics 2025-06-10
Across
- – A fake message or email that tries to steal your personal info.
- – Legal right to own and protect your creative work.
- – Crimes done using computers or the internet.
- – A password that is hard to guess and keeps your account safe.
- – Thinking before posting or sharing anything online.
- – Breaking into someone’s computer or account without permission.
- – Staying safe while using the internet.
- – Good manners while using the internet.
Down
- – Hurting or teasing someone online.
- – The data you leave behind when using the internet.
- – Using apps like Instagram, WhatsApp, etc., carefully.
- – A program that protects your computer from viruses.
- – Rules for using computers and the internet in a good and fair way.
- – Harmful software that can damage your computer.
- – Being kind and polite on the internet.
- – Copying someone else’s work and saying it’s yours.
16 Clues: – Hurting or teasing someone online. • – Being kind and polite on the internet. • – Staying safe while using the internet. • – Good manners while using the internet. • – Crimes done using computers or the internet. • – Harmful software that can damage your computer. • – The data you leave behind when using the internet. • ...
BC Newsletter 2016-02-08
Across
- Throw away all food that has come in contact with the ____ water.
- The program that is responsible for establishing the framework is called the ____.
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- The first thing to do when there is an active shooter in the building if possible is ____.
- ____scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- You should always be careful before opening any ____ that is unfamiliar to you.
Down
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
- The Zika virus is transmitted through ____ bites.
- If escape is not possible, then ____.
- ____ Response Team is a group of staff that assist in evacuation.
- Take pictures of damage to your property for ____ purposes.
- Active shooter is defined as an individual ____ engaged in killing or attempting to kill people in a confined and other populated area.
- ____ virus can be transmitted from pregnant mother to her baby.
- Only as a last resort, you must ____ the active shooter.
15 Clues: If escape is not possible, then ____. • The Zika virus is transmitted through ____ bites. • Only as a last resort, you must ____ the active shooter. • Take pictures of damage to your property for ____ purposes. • ____ virus can be transmitted from pregnant mother to her baby. • Throw away all food that has come in contact with the ____ water. • ...
BC Newsletter 2016-02-10
Across
- ____ virus can be transmitted from pregnant mother to her baby.
- Active shooter is defined as an individual ____ engaged in killing or attempting to kill people in a confined and other populated area.
- Each supervisor needs to have a Supervisor ____ form filled out in advance with their staffs’ names.
- Throw away all food that has come in contact with the ____ water.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- Cyber ____ is now one of the number one threats against networks, computers, programs and data.
- Only as a last resort, you must ____ the active shooter.
Down
- During an active shooter if escape is not possible, then ____.
- The program that is responsible for establishing the Business Continuity framework is called the ____.
- Take pictures of damage to your property for ____ purposes.
- ____ Response Team is a group of staff that assists in evacuation.
- The Zika virus is transmitted through ____ bites.
- You should always be careful before opening any ____ that is unfamiliar to you.
- The first thing to do when there is an active shooter in the building, if possible, is ____.
- scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
15 Clues: The Zika virus is transmitted through ____ bites. • Only as a last resort, you must ____ the active shooter. • Take pictures of damage to your property for ____ purposes. • During an active shooter if escape is not possible, then ____. • ____ virus can be transmitted from pregnant mother to her baby. • ...
BC 2016-02-04
Across
- Throw away all food that has come in contact with the ____ water.
- _____ virus can be transmitted from a pregnant mother to her baby
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
- Active shooter is defined as an individual _____ engaged in killing or attempting to kill people in a confined and other populated area.
- The first thing to do when confronted with an active shooter if possible is _____.
- The program that is responsible for establishing the framework is called the ____.
- Only as a last resort, you must _____ the active shooter.
Down
- The virus is transmitted through ______ bites.
- You should always be careful before opening any ___ that is unfamiliar to you.
- If escape is not possible, then _____.
- _____ Response Team is a group of staff that assist in evacuation.
- Take pictures of damage to your property for _____ purposes.
- _____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
15 Clues: If escape is not possible, then _____. • The virus is transmitted through ______ bites. • Only as a last resort, you must _____ the active shooter. • Take pictures of damage to your property for _____ purposes. • Throw away all food that has come in contact with the ____ water. • _____ virus can be transmitted from a pregnant mother to her baby • ...
November Holidays 2023-11-20
Across
- In what city was the first Turkey Trot held?
- The holiday the day before Black Friday.
- Thanksgiving is always the 4th ____ of November.
- The decade that Black Friday became a national term.
- The marketing holiday following Black Friday is known as _____ Monday.
- Which Massachusetts city did the pilgrims first land when arriving to America?
- Historically, the most violent place to shop is where?
- Which state produces the most cranberries?
Down
- What sport is commonly watched on Thanksgiving Day?
- The company that sponsors the Thanksgiving Day Parade in NYC.
- The term Black Friday originated in which U.S. city?
- Which fruit is often associated with pie and fall, but is thought by many to be a vegetable?
- How many days was the first Thanksgiving celebration.
- A female turkey is called a ____?
- A price reduction to an item.
- Which president refused to celebrate Thanksgiving as a national holiday?
- Stores often offer great _____ on Black Friday.
- In addition to those 24-35, which generation does the most Cyber Monday shopping?
18 Clues: A price reduction to an item. • A female turkey is called a ____? • The holiday the day before Black Friday. • Which state produces the most cranberries? • In what city was the first Turkey Trot held? • Stores often offer great _____ on Black Friday. • Thanksgiving is always the 4th ____ of November. • What sport is commonly watched on Thanksgiving Day? • ...
Cybersecurity 2024-03-12
Across
- Network security barrier.
- Weakness in security.
- Data protection method.
- Malicious program disguised as useful.
- Faking identity or data.
- Secure website protocol.
- Self-replicating malware.
- Unauthorized access attempt.
- Software update for security.
- Harmful software.
Down
- Authentication method.
- Stealth force: Password cracking method.
- Secure network connection.
- Unique physical traits.
- Data encryption for ransom.
- Email scam tactic.
- Computer protection software.
- Denial-of-Service attack.
- engineering Manipulating people for data.
19 Clues: Harmful software. • Email scam tactic. • Weakness in security. • Authentication method. • Unique physical traits. • Data protection method. • Faking identity or data. • Secure website protocol. • Network security barrier. • Denial-of-Service attack. • Self-replicating malware. • Secure network connection. • Data encryption for ransom. • Unauthorized access attempt. • ...
BC 2016-02-04
Across
- The first thing to do when confronted with an active shooter if possible is _____.
- You should always be careful before opening any ___ that is unfamiliar to you.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- _____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
- _____ virus can be transmitted from a pregnant mother to her baby
- Throw away all food that has come in contact with the ____ water.
Down
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
- If escape is not possible, then _____.
- The program that is responsible for establishing the framework is called the ____.
- _____ Response Team is a group of staff that assist in evacuation.
- Take pictures of damage to your property for _____ purposes.
- Active shooter is defined as an individual _____ engaged in killing or attempting to kill people in a confined and other populated area.
- Only as a last resort, you must _____ the active shooter.
- The virus is transmitted through ______ bites.
15 Clues: If escape is not possible, then _____. • The virus is transmitted through ______ bites. • Only as a last resort, you must _____ the active shooter. • Take pictures of damage to your property for _____ purposes. • _____ virus can be transmitted from a pregnant mother to her baby • Throw away all food that has come in contact with the ____ water. • ...
Executive Departments Crossword 2020-03-05
Across
- Advances safety and well-being of Americans, through things like medical research funding
- Supervises banks and fiscal policy in the U.S., prints currency (paper money)
- Makes sure our war heroes are cared for, such as maintaining the VA hospitals
- Promotes economic and business growth in the U.S., administering the census for tax records
- Carries out foreign policy and diplomacy, such as striking trade agreements or targeting terrorists
- Ensures that our travel infrastructure is supported, such as building highways
- Originally designed to deal with nuclear programs, they manage natural resources as well like oil
Down
- Responsible for making sure american workers are protected, such as overseeing wages
- Manages the military branches of the U.S., such as the Navy and Army
- Deals with development of cities and rural spaces, managing mortgages and property grants
- Protects our laws as a nation, such as overseeing the FBI and DEA
- Facilitates all things related to schools, like school funding/grants and standardized testing
- Promotes farming and rural development, like managing food stamps and corn surpluses
- Ensures that our borders and interior are safe in various ways, such as cyber-security
- Management and conservation of federal lands, such as managing funding for national parks
15 Clues: Protects our laws as a nation, such as overseeing the FBI and DEA • Manages the military branches of the U.S., such as the Navy and Army • Supervises banks and fiscal policy in the U.S., prints currency (paper money) • Makes sure our war heroes are cared for, such as maintaining the VA hospitals • ...
November Crossword 2017-10-13
Across
- Veterans Day
- black Friday
- St. Andrew Day
- giving Tuesday
- National pizza day
- Great american smokeout
- All saints day
- world television day
- Day lights savings
Down
- Thanks giving day
- Science day for peace and environment
- World philosophy day
- national children's university day
- world diabetes day
- cyber Monday
- National unfriend day
- election day
- small business day
18 Clues: Veterans Day • black Friday • cyber Monday • election day • St. Andrew Day • giving Tuesday • All saints day • Thanks giving day • world diabetes day • National pizza day • small business day • Day lights savings • World philosophy day • world television day • National unfriend day • Great american smokeout • national children's university day • Science day for peace and environment
spanish 2024-04-23
Cybersecurity 2024-02-18
Across
- Code red is a type of computer _______.
- Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
- In ethical hacking and cyber security, there are ______types of scanning.
- what is transformed with the help of a cipher algorithm.
- The technique used to hide information inside a picture.
Down
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
- Oldest phone hacking technique used by hackers to make free calls.
- The malware which does not replicate or clone through an infection.
- The debian based OS which has 2 virtual machines and focuses on preserving user's data.
- A type of attack which uses a fraudulent server with a relay address.
10 Clues: Code red is a type of computer _______. • what is transformed with the help of a cipher algorithm. • The technique used to hide information inside a picture. • Oldest phone hacking technique used by hackers to make free calls. • The malware which does not replicate or clone through an infection. • ...
IT ristsõna 2022-01-27
Across
- need, kes vastavalt olukorrast võivad teha nii head või võivad tegutseda ka oma kasu eesmärgil ehk kui näiteks turvavea avastamisel on võimalik selle eest saada ka kasu, siis kindlasti nad selle ka välja võtavad.
- kaitse kübervahendeid mõjutavate ja kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes.
- arvutispetsialist või huviline, kes tegeleb arvutisüsteemide uurimise, arendamise ja parendamisega.
- informatsiooni muutmine loetamatuks ilma eriteadmiste ja -vahenditeta.
- programmikood, mis paljundab end massiliselt
- tegelased, kellel on pigem kurjad motiivid ja neid kardetakse, sest nende eesmärgiks on ainult omakasu ja pahanduste tegemine teistele.
- erinevad programmid, äpid, millega kasutaja otseselt kokku puutub.
- tarkvara, mis kogub arvuti kasutaja kohta isiklikku infot ilma sellest kasutajat selgesõnaliselt teavitamata.
Down
- Nende eesmärgiks on leida süsteemist turvavigu ja nendest teada anda või neid parandada. Neid kutsutakse ka eetilisteks häkkeriteks.
- alussüsteem, mis aitab erinevaid rakendusi käivitada.
- arvutite omavahel võrgustikuks (nt Internet) ühendamine peab olema võimalik ka erinevaid operatsioonisüsteeme kasutavaid seadmeid kasutades.
- Cyber Security Network (CyberSN) asjutaja.
- võrgu dünaamilise käitumise jälgimine ja hindamine, see võib uurida liikluse olemasolu, puudumist, mahtu, suunda, ja/ või sagedust.
- Tegeleb koodianalüüsi ja skriptide automatiseerimisega. Oskab turvaliselt programmeerida.
- anonüümsete aktivistide ja häktivistide rahvusvaheline, ilma keskse ülesehituseta ühendus (võrgustik).
- Tegeleb nõrkuste leidmise ja ründamisega
- programm, mis on võimeline end iseseisvalt kopeerima ja arvutit nakatama.
17 Clues: Tegeleb nõrkuste leidmise ja ründamisega • Cyber Security Network (CyberSN) asjutaja. • programmikood, mis paljundab end massiliselt • alussüsteem, mis aitab erinevaid rakendusi käivitada. • erinevad programmid, äpid, millega kasutaja otseselt kokku puutub. • informatsiooni muutmine loetamatuks ilma eriteadmiste ja -vahenditeta. • ...
Protect for Points: Hybrid Work Crossword 2023-04-26
Across
- A security incident in which sensitive information is exposed or stolen (10 letters).
- An attempt to gain unauthorized access for malicious purposes (11 letters).
- A set of guidelines for information security (20 letters).
- A security measure requiring two forms of identification (21 letters).
- A secure connection to a remote network (3 letters).
- Sending fraudulent emails or messages to trick people (8 letters).
Down
- A security measure requiring multiple forms of identification (23 letters).
- The practice of maintaining good online habits (11 letters).
- A security vulnerability unknown to the software vendor (15 letters).
- Any software that harms or exploits a computer system (7 letters).
- The process of converting data into a coded language (10 letters).
- A device connected to a network (8 letters).
- A security system that monitors and controls incoming and outgoing network traffic (8 letters).
- A software update that fixes security vulnerabilities (5 letters).
- A targeted form of phishing that is personalized (13 letters).
- The type of engineering used for psychological manipulation to trick people into divulging confidential information (5 letters).
16 Clues: A device connected to a network (8 letters). • A secure connection to a remote network (3 letters). • A set of guidelines for information security (20 letters). • The practice of maintaining good online habits (11 letters). • A targeted form of phishing that is personalized (13 letters). • Any software that harms or exploits a computer system (7 letters). • ...
Online Safety 2025-03-13
Across
- The trail of data left by people using the internet.
- A crime where someone wrongfully obtains and uses another person's personal data.
- Cyberbullying in Australia can be considered a criminal offence under which legislation?
- Harassment, bullying, or abuse that takes place over digital platforms.
- The office responsible for addressing online safety issues in Australia.
- When an adult builds a relationship with a child to exploit or abuse them online.
- The purpose of the Online Safety Act 2021 in Australia.
- A cyber attack where fraudsters trick individuals into revealing sensitive information.
- An extra layer of security used to protect online accounts beyond just a password.
Down
- Platforms such as Facebook, Twitter, and Instagram are part of what online category?
- What legal duty do schools have towards their students in Australia?
- The primary aim of the eSafety Commissioner's Office in Australia.
- What should you do if you encounter online harassment or harmful content?
- Criminal activities carried out using computers and the internet.
- Legislation aimed at protecting individuals, particularly children, from harmful online experiences in Australia.
- Schools and organizations handling student data in Australia must comply with which laws?
- Which organization provides educational resources, support, and complaint mechanisms for addressing online safety issues in Australia?
- Intentionally posting inflammatory or offensive content online to provoke reactions.
- The practice of protecting internet users, especially children, from online harm.
- An incident where personal information is accessed without authorization.
20 Clues: The trail of data left by people using the internet. • The purpose of the Online Safety Act 2021 in Australia. • Criminal activities carried out using computers and the internet. • The primary aim of the eSafety Commissioner's Office in Australia. • What legal duty do schools have towards their students in Australia? • ...
Security Room 2023-04-24
Across
- Best selling
- Hardly any
- Building block of molecules
- Follower of tic tac
- Spider's trap
- The head of a city government
- To feed data into a computer
- Power tool used for making narrow holes
- Romantic appointment
Down
- Article of clothing on the head
- Lie on surface of water
- The path of an electron around the nucleus of an atom
- Hearing organ
- Enclose in paper or soft material
- Cushion
- To attempt again
- Top of a container
- Insurance policy specification
18 Clues: Cushion • Hardly any • Best selling • Hearing organ • Spider's trap • To attempt again • Top of a container • Follower of tic tac • Romantic appointment • Lie on surface of water • Building block of molecules • To feed data into a computer • The head of a city government • Insurance policy specification • Article of clothing on the head • Enclose in paper or soft material • ...
IT Security 2017-03-28
Across
- Person who gains unauthorised access to a computer (6)
- Malicious software (7)
- Hardware device attached to a computer system (10)
- Preventing sensitive information reaching wrong hands (15)
- Crime involving a computer and a network (10)
- Group of computers involved in malicious activity (6)
- Form of identity theft (8)
- Area where infected files cannot cause harm (10)
- Occurs when someone gains access to resources or benefits in another persons name (8,5)
- Person responsible for a network's maintenance (7, 13)
Down
- Hardware or software that filters network traffic (8)
- Law that protects an individuals privacy (4,10,3)
- Manipulating people to act in a certain manner (6,11)
- Conversion of data to code to make it safe (10)
- Processed data (11)
- Wireless technology (9)
- Raw unorganised facts (4)
- Virus that exists in bootup instructions of a computer (7)
18 Clues: Processed data (11) • Malicious software (7) • Wireless technology (9) • Raw unorganised facts (4) • Form of identity theft (8) • Crime involving a computer and a network (10) • Conversion of data to code to make it safe (10) • Area where infected files cannot cause harm (10) • Law that protects an individuals privacy (4,10,3) • ...
security glossary 2021-06-02
Across
- Cognizant Security Agency
- categorized by people, information, equipment, facilities, activities and operations- PIEFAO
- protection resulting from all measures designed to deny unauthorized persons valuable information, which experts in electronics or telecommunications might be able to find.
- a partnership between the U.S. Government and industry to protect classified information.
- Creating areas of higher security within a larger area of lower or more general security.
- Classification by incorporating, paraphrasing, restating, or generating classified information in a new form or document
- Evaluated Products Listing
- The process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost.
- The integration of active and passive complementary physical security measures to insure the protection of DoD assets
Down
- Unauthorized disclosure of classified information.
- Analytic process used to deny adversary information concerning intentions and capabilities by identifying, planning processes, or operations
- Classification decision that an item of information could reasonably be expected to cause damage to national security if subjected to unauthorized disclosure.
- Unclassified information that requires safeguarding or dissemination controls.
- oversees specific contracts ensuring the successful completion of all necessary contract requirements.
- Any individual, group, organization, or government that conducts activities, or has the intention or capability to conduct activities, detrimental to assets.
- A situation or circumstance, which, if left unchanged, may result in the degradation, loss of life, or damage to mission-essential resources.
- Any action, circumstance, or event with the potential to cause loss of, or damage to an asset, which impedes the effectiveness or survival of your mission and operations.
- An information protection program to preclude inadvertent disclosure of national security information through electronic emanations, due to bad design or installation practices.
18 Clues: Cognizant Security Agency • Evaluated Products Listing • Unauthorized disclosure of classified information. • Unclassified information that requires safeguarding or dissemination controls. • a partnership between the U.S. Government and industry to protect classified information. • ...
Security Terms 2022-11-17
Across
- Software that is a cumulative package of all patches and feature updates
- Software that helps prevent computers from becoming infected by spyware
- Malware preventing devices from properly operating until a fee is paid
- Publicly released software security update to repair a vulnerability
- Database of viruses used to identify infected files
- Software code that gives access to a program that circumvents normal security protections
- Attacker who controls a botnet
Down
- Program or feature incorporated in a browser that stops popup advertisements from appearing
- General term used to describe software that spies on users by gathering information without consent
- Copy of files from computer hard drive saved on other digital media that is stored in a secure location
- Hardware or software designed to limit spread of malware
- Security program that delivers advertising content in a way that is unexpected and unwanted
- Malicious computer code that reproduces itself on a computer
- Software of hardware device that captures each keystroke that is typed on the computer's keyboard
- Logical computer network of zombies under control of an attacker
- Infected computer under remote control of an attacker
- Computer code that is dormant until it is triggered by a specific logical event
- Set of software tools used by attackers to hide the presence of other malicious softwares
18 Clues: Attacker who controls a botnet • Database of viruses used to identify infected files • Infected computer under remote control of an attacker • Hardware or software designed to limit spread of malware • Malicious computer code that reproduces itself on a computer • Logical computer network of zombies under control of an attacker • ...
Security Verification 2019-11-05
Across
- This position in a religious organization has no restrictions.
- Progressive ________ can be verified by giving their 10 digit phone number and first and last name.
- How many security verification requirements are needed to verify a policy.
- Can only verify policy information required to complete the sale or lease of vehicle.
- One of two non-primary requestors that can update their own information.
- If the caller asks for _______ information unrelated to the policy, we do not need to verify.
- What is your _______ in the company?
- Can make any request except to reinstate the policy.
Down
- Who provides roadside assistance?
- The top dog in a company (also has no restrictions)
- Left on policy so a normally unauthorized person can make changes
- After verifying an insured, we should check what?
- If VIN is acceptable as verification, how many last digits must be verified?
- The Text "Caller has been _____" will appear if automated authentication is completed.
- Can only update their MVR or DLN.
- What kind of permission is needed for a religious organization representative to reinstate a policy?
- One of two non-primary requestors that can update their own information.
- If you receive a call from this agent account, you must transfer.
- Can access any information from direct policy, but only limited information from agency policy
19 Clues: Who provides roadside assistance? • Can only update their MVR or DLN. • What is your _______ in the company? • After verifying an insured, we should check what? • The top dog in a company (also has no restrictions) • Can make any request except to reinstate the policy. • This position in a religious organization has no restrictions. • ...
Food Security 2024-12-17
Across
- A drink it has lot of sugar in it.
- People from Britain drink more of it than people from Germany.
- A drink made of fruits.
- Usually we eat it with chips.
- A kind of fruit.
- It is part of an English breakfast.
- A drink many adults like for breakfast.
- you can eat it with tomato sauce.
- you can put it on your sandwich.
- Many people eat it in Italian Restaurants.
Down
- you have it with cornflakes.
- A burger with cheese.
- An apple or a banana for example.
- people from Britain like to eat them with fish.
- A brown and sweet Desert.
- you can put it in your tea.
- A yellow fruit.
- You need a recipe to make it.
- A red vegetable.
19 Clues: A yellow fruit. • A kind of fruit. • A red vegetable. • A burger with cheese. • A drink made of fruits. • A brown and sweet Desert. • you can put it in your tea. • you have it with cornflakes. • Usually we eat it with chips. • You need a recipe to make it. • you can put it on your sandwich. • An apple or a banana for example. • you can eat it with tomato sauce. • ...
Food security 2024-12-17
Across
- A drink it has lot of sugar in it.
- People from Britain drink more of it than people from Germany.
- A drink made of fruits.
- Usually we eat it with chips.
- A kind of fruit.
- It is part of an English breakfast.
- A drink many adults like for breakfast.
- you can eat it with tomato sauce.
- you can put it on your sandwich.
- Many people eat it in Italian Restaurants.
Down
- you have it with cornflakes.
- A burger with cheese.
- An apple or a banana for example.
- people from Britain like to eat them with fish.
- A brown and sweet Desert.
- you can put it in your tea.
- A yellow fruit.
- You need a recipe to make it.
- A red vegetable.
19 Clues: A yellow fruit. • A kind of fruit. • A red vegetable. • A burger with cheese. • A drink made of fruits. • A brown and sweet Desert. • you can put it in your tea. • you have it with cornflakes. • Usually we eat it with chips. • You need a recipe to make it. • you can put it on your sandwich. • An apple or a banana for example. • you can eat it with tomato sauce. • ...
Security Services 2025-03-18
Across
- An authentication protocol that encrypts only passwords but has extensive logging.
- An SNMP function that allows network administrators to modify device settings.
- A network administrator’s tool for overseeing device performance remotely.
- The command center in SNMP that controls network elements.
- A security model ensuring access control, user permissions, and activity logging.
- A traffic analysis technology used to monitor network performance and security.
- A structured storage of SNMP device statistics and performance metrics.
- The SNMP command used when retrieving information from a monitored device.
- A security mechanism that ensures encrypted, authenticated communication over IP networks.
Down
- A Cisco-specific protocol that encrypts entire authentication packets.
- A hierarchical level in a system that dictates time synchronization accuracy.
- A secure method for connecting to a network over an untrusted environment.
- The central repository where devices send messages for analysis and troubleshooting.
- An alert sent to an SNMP manager to signal critical events proactively.
- The alternative name for a technique used to duplicate and inspect network traffic.
- The software counterpart that collects and reports operational network data.
- A protocol ensuring that all network devices remain time-synchronized.
- A tunneling protocol enabling encapsulation of multiple network protocols.
18 Clues: The command center in SNMP that controls network elements. • A Cisco-specific protocol that encrypts entire authentication packets. • A protocol ensuring that all network devices remain time-synchronized. • An alert sent to an SNMP manager to signal critical events proactively. • A structured storage of SNMP device statistics and performance metrics. • ...
Deakin Crossword 2025-10-05
Across
- Which city is home to Deakin’s largest campus?
- True or False: Deakin is the first university in the world to offer a Bachelor of Robotics and Mechatronics Engineering online.
- Which Deakin research centre focuses on nanotechnology and advanced materials?
- What is the name of Deakin University’s student association?
- Deakin is known for its strong programs in which field of sport-related studies?
- What is the mascot of the Deakin University Student Association?
- Which Deakin campus was the original and first to open?
- Which Deakin program helps students gain real-world experience by working with industry partners while studying?
- What is the name of Deakin University’s online learning platform?
- True or False: Deakin was the first Australian university to offer degrees entirely through distance education.
Down
- Which Deakin campus houses the Deakin Medical School?
- Which Deakin faculty houses the Centre for Cyber Security Research and Innovation (CSRI)?
- Deakin University is named after which prominent Australian political figure?
- Geelong Waterfront Campus was once used for what purpose before becoming part of Deakin?
- Deakin University was the first Australian university to establish a campus in which country?
- What is the name of Deakin's career and employability platform for students?
- True or False: Deakin has on-campus student accommodation at all four campuses.
- How many local campuses does Deakin University have?
- What was the first course offered by Deakin University when it opened?
- Which Deakin campus is located near the Great Ocean Road?
20 Clues: Which city is home to Deakin’s largest campus? • How many local campuses does Deakin University have? • Which Deakin campus houses the Deakin Medical School? • Which Deakin campus was the original and first to open? • Which Deakin campus is located near the Great Ocean Road? • What is the name of Deakin University’s student association? • ...
Anti Bullying :) 2021-11-25
Across
- When someone spreads rumors or posts embarrassing photos of you without permission it is called ____.-bullying.
- When someone verbally,socially,physically or cyber bullies you it is called ________.
- When someone pushes,kicks,slaps ect daily it is called _______-bullying.
- Someone who watches someone get bullied and doesn't do anything is called a _________.
- Bullying usually occurs at _______.
Down
- A bully usually targets some one especially if someone has no _______ or is all alone because it is easy to gang up on them
- A bully can be very ___ of what someone has that they do not and that's what causes them to bully them.
- When someone says mean things or calls you mean names daily it is called _______-bullying.
- Someone who verbally,physically,socially or cyber bullies someone is called a _______.
- When someone bullies you online it is called ___-bullying.
- Someone being bullied is called a _____.
- A bully tends to think that they are _____ for bullying and thinks it makes them better than them they might also think that because their friends or people around them do it
12 Clues: Bullying usually occurs at _______. • Someone being bullied is called a _____. • When someone bullies you online it is called ___-bullying. • When someone pushes,kicks,slaps ect daily it is called _______-bullying. • Someone who verbally,physically,socially or cyber bullies someone is called a _______. • ...
Anti Bullying :) 2021-11-25
Across
- When someone spreads rumors or posts embarrassing photos of you without permission it is called ____.-bullying.
- When someone verbally,socially,physically or cyber bullies you it is called ________.
- When someone pushes,kicks,slaps ect daily it is called _______-bullying.
- Someone who watches someone get bullied and doesn't do anything is called a _________.
- Bullying usually occurs at _______.
Down
- A bully usually targets some one especially if someone has no _______ or is all alone because it is easy to gang up on them
- A bully can be very ___ of what someone has that they do not and that's what causes them to bully them.
- When someone says mean things or calls you mean names daily it is called _______-bullying.
- Someone who verbally,physically,socially or cyber bullies someone is called a _______.
- When someone bullies you online it is called ___-bullying.
- Someone being bullied is called a _____.
- A bully tends to think that they are _____ for bullying and thinks it makes them better than them they might also think that because their friends or people around them do it
12 Clues: Bullying usually occurs at _______. • Someone being bullied is called a _____. • When someone bullies you online it is called ___-bullying. • When someone pushes,kicks,slaps ect daily it is called _______-bullying. • Someone who verbally,physically,socially or cyber bullies someone is called a _______. • ...
CISO Crossword Puzzle 0623 2023-10-17
Across
- Criminal activities carried out by means of computers or the internet.
- The use of cyber-attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems.
- Process of Maintaining regular surveillance over system & network logs.
- A Ransomware attack in which the ransom asked to be paid in crypto currency to in exchange of data.
- It is a form of social engineering where attackers focus on creating a fabricated scenario to steal victims’ personal information.
Down
- A software designed to detect and destroy computer viruses.
- The action or process of spoiling the appearance of a website in a cyber attack.
- A hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
- The action of keeping the cyber-attack outfalls under control or within acceptable limits.
- A software program designed to take advantage of a flaw in a computer system, typically for malicious purposes.
10 Clues: A software designed to detect and destroy computer viruses. • Criminal activities carried out by means of computers or the internet. • Process of Maintaining regular surveillance over system & network logs. • The action or process of spoiling the appearance of a website in a cyber attack. • ...
Types of Threats 2019-01-09
Across
- malware that allows a cyber security attacker to control an infected computer
- a piece of code that is capable of copying itself and typically has a detrimental effect,destroying data
- an attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
- any software that shows adverts,such as popups
Down
- criminals make a promise of goods in return for details,such as offering a free music download
- a type of malware that locates and saves data from users without them knowing about it.
- an attack that sends an email or displays a web announcement that falsely claims to be from a legitimate enterprise
7 Clues: any software that shows adverts,such as popups • malware that allows a cyber security attacker to control an infected computer • a type of malware that locates and saves data from users without them knowing about it. • criminals make a promise of goods in return for details,such as offering a free music download • ...
Amanda Todd Cyber-Bullying Crossword 2014-11-22
Across
- People were physically forceful to her.
- People were not willing to excuse her faults or wrongdoings.
- Amanda's peers dismissed her.
- Her peers made a accusation of her by hearing what has happened to her.
- Amanda was not knowledgeable of her surroundings and the situation she was putting herself in.
- Amanda flashed a predator online showing her bareness.
- Amanda Todd died at a very young age.
- A person or group that ruthlessly exploits on others.
- Cyber-bullying is a form of _______.
- The predator used the _____ against her.
- Where was Amanda threatened?
- Amanda gave away information in which was dangerous and risky.
- The images of Amanda attracted the attention of her _____.
Down
- Cyber-bullying usually happens over _____.
- Amanda came in contact online with a person she did not know.
- What Amanda did online had a __________ in person.
- Amanda gave away valuable statistics of her online.
- Her Youtube video consisted of ______ minutes.
- Amanda was persistent with ______, cutting and drugs.
- What Amanda did was a ________.
- What did the predator ask Amanda to do online?
21 Clues: Where was Amanda threatened? • Amanda's peers dismissed her. • What Amanda did was a ________. • Cyber-bullying is a form of _______. • Amanda Todd died at a very young age. • People were physically forceful to her. • The predator used the _____ against her. • Cyber-bullying usually happens over _____. • Her Youtube video consisted of ______ minutes. • ...
Fraud Awareness and Prevention Week 2017 2017-10-25
Across
- ____employee morale is an example of a non-financial consequence of fraud.
- One of the three sides of the Fraud Triangle.
- Be __________.
- Once you know the costs, take ____ today to fight fraud.
- Fraud against government entities can result in _______ of public funds and resources.
- Type of fraud committed by employees.
- One of the three sides of the Fraud Triangle.
- Fraud type that includes hacking and and cyber attacks.
- An example of an effective fraud prevention control is segregation of _______.
- A non-financial consequence example is decreased _________in public officials.
- The most effective way to fight fraud
Down
- Where fraud can happen.
- Implement a fraud _____ mechanism.
- Fraud awareness and prevention is the _______ of every state employee.
- One of the three sides of the Fraud Triangle.
- A type of fraud.
- Employees are expected to adhere to policies and the Code of ________.
- Controls that are implemented by management to reduce the opportunities for someone to commit fraud without being detected.
- How approx. 40% of all frauds are uncovered.
- Knowingly misrepresenting the truth or concealing important facts to harm another or benefit oneself.
- Fraud against government entities can result in increased cost in government _______.
- The second most targeted industry of fraud.
22 Clues: Be __________. • A type of fraud. • Where fraud can happen. • Implement a fraud _____ mechanism. • Type of fraud committed by employees. • The most effective way to fight fraud • The second most targeted industry of fraud. • How approx. 40% of all frauds are uncovered. • One of the three sides of the Fraud Triangle. • One of the three sides of the Fraud Triangle. • ...
Fraud Awareness and Prevention 2025-03-03
Across
- One of the three sides of the Fraud Triangle.
- A non-financial consequence example is decreased _________in public officials.
- The second most targeted industry of fraud.
- Be __________.
- Fraud against government entities can result in increased cost in government _______.
- Implement a fraud _____ mechanism.
- ____employee morale is an example of a non-financial consequence of fraud.
- Fraud against government entities can result in _______ of public funds and resources.
- Fraud type that includes hacking and and cyber attacks.
- An example of an effective fraud prevention control is segregation of _______.
Down
- Knowingly misrepresenting the truth or concealing important facts to harm another or benefit oneself.
- A type of fraud.
- The most effective way to fight fraud
- One of the three sides of the Fraud Triangle.
- Employees are expected to adhere to policies and the Code of ________.
- How approx. 40% of all frauds are uncovered.
- Fraud awareness and prevention is the _______ of every state employee.
- Type of fraud committed by employees.
- One of the three sides of the Fraud Triangle.
- Controls that are implemented by management to reduce the opportunities for someone to commit fraud without being detected.
20 Clues: Be __________. • A type of fraud. • Implement a fraud _____ mechanism. • The most effective way to fight fraud • Type of fraud committed by employees. • The second most targeted industry of fraud. • How approx. 40% of all frauds are uncovered. • One of the three sides of the Fraud Triangle. • One of the three sides of the Fraud Triangle. • ...
Cashless Society 2024-09-03
Across
- Concealing illegal funds
- Practical
- Transaction of money
- Goods for sale
- System of money
- Earnings on deposit
- Financial records
- People who buy
- Total to paid
- Medium of exchange
Down
- Betting activity
- Institution for money
- Sellers of goods
- Physical money
- Cyber criminals
- Exchange of goods or money
- People who purchase
- Remove funds from account
- Reduced amount
- Small metal currency
20 Clues: Practical • Total to paid • Physical money • Goods for sale • Reduced amount • People who buy • Cyber criminals • System of money • Betting activity • Sellers of goods • Financial records • Medium of exchange • People who purchase • Earnings on deposit • Transaction of money • Small metal currency • Institution for money • Concealing illegal funds • Remove funds from account • Exchange of goods or money
computer security 2021-10-15
Across
- a study of design of computer equipment
- a person who has intention to destroy data
- a malicious code which sends out info to hacker
- a act of illegal listening to network channel
- a system of to protect safeguard network
- a secured layer of protocol to encrypt data
- a cause of system failure
- a computer health issue causing strain in hand
Down
- act of tricking user into revealing their info
- a person who access computer illegally
- a malicious act to slow down service of server
- act of making copy of files safely and secure
- act of stealing or faking information for hiding
- a malicious program which steals data from user
- a field of study on computer security
- a data protection act law in countries
- a program which copies itself repeateadly
- moral obligation to use computer with care
18 Clues: a cause of system failure • a field of study on computer security • a person who access computer illegally • a data protection act law in countries • a study of design of computer equipment • a system of to protect safeguard network • a program which copies itself repeateadly • moral obligation to use computer with care • a person who has intention to destroy data • ...
Food Security 2024-12-17
Across
- A drink it has lot of sugar in it.
- People from Britain drink more of it than people from Germany.
- A drink made of fruits.
- Usually we eat it with chips.
- A kind of fruit.
- It is part of an English breakfast.
- A drink many adults like for breakfast.
- you can eat it with tomato sauce.
- you can put it on your sandwich.
- Many people eat it in Italian Restaurants.
Down
- you have it with cornflakes.
- A burger with cheese.
- An apple or a banana for example.
- people from Britain like to eat them with fish.
- A brown and sweet Desert.
- you can put it in your tea.
- A yellow fruit.
- You need a recipe to make it.
- A red vegetable.
19 Clues: A yellow fruit. • A kind of fruit. • A red vegetable. • A burger with cheese. • A drink made of fruits. • A brown and sweet Desert. • you can put it in your tea. • you have it with cornflakes. • Usually we eat it with chips. • You need a recipe to make it. • you can put it on your sandwich. • An apple or a banana for example. • you can eat it with tomato sauce. • ...
FOOD SECURITY 2024-12-17
Across
- A drink it has lot of sugar in it.
- People from Britain drink more of it than people from Germany.
- A drink made of fruits.
- Usually we eat it with chips.
- A kind of fruit.
- It is part of an English breakfast.
- A drink many adults like for breakfast.
- you can eat it with tomato sauce.
- you can put it on your sandwich.
- Many people eat it in Italian Restaurants.
Down
- you have it with cornflakes.
- A burger with cheese.
- An apple or a banana for example.
- people from Britain like to eat them with fish.
- A brown and sweet Desert.
- you can put it in your tea.
- A yellow fruit.
- You need a recipe to make it.
- A red vegetable.
19 Clues: A yellow fruit. • A kind of fruit. • A red vegetable. • A burger with cheese. • A drink made of fruits. • A brown and sweet Desert. • you can put it in your tea. • you have it with cornflakes. • Usually we eat it with chips. • You need a recipe to make it. • you can put it on your sandwich. • An apple or a banana for example. • you can eat it with tomato sauce. • ...
Sophie Jeffrey cyber safety 2016-05-26
Across
- Holds infomaition that travels through the worlds computer system
- is like an antivirus
- is the opiset to virus
- it is like you are harassed by a message or picture this is called
- when someone steals someone else's identity
- you have to ask your family or guardians for it
- is sent to millions of users a year
- most spams go here
- some ***** can have spams and spams involved
Down
- when online you have to be ***********
- only you should have ******* to your private infomaition
- passwords , lock and pins are a type of this
- most scams and spams need to what ?
- is to harass or scare for example by sending a threatening email
- some people can hack and enter your *****
- you have to ****** scams , spams and cyber bulling to a adult you trust
- is like your device has a cold
- the family name of these objects iPad , iPod ,iPhone ,Apple computer or any other devises
- software that enables A to untainted Covent infomaition
- cyber bulling can be delived through *****
- is a disonhest scheme
21 Clues: most spams go here • is like an antivirus • is a disonhest scheme • is the opiset to virus • is like your device has a cold • most scams and spams need to what ? • is sent to millions of users a year • when online you have to be *********** • some people can hack and enter your ***** • when someone steals someone else's identity • cyber bulling can be delived through ***** • ...
IT Puzzle 2014-01-09
17 Clues: IT • Bits • Scams • Exact • Cable • Bytes • Network • Synergy • Sending • Password • Computer • Security • Harddisk • Phishing • Programs • Receiving • Administrator
PUZZLE 4 2025-08-17
Sophie Jeffrey cyber safety 2016-05-26
Across
- the family name of these objects iPad , iPod ,iPhone ,Apple computer or any other devises
- most spams go here
- is like an antivirus
- is to harass or scare for example by sending a threatening email
- Holds infomaition that travels through the worlds computer system
- only you should have ******* to your private infomaition
- is like your device has a cold
- you have to ****** scams , spams and cyber bulling to a adult you trust
- you have to ask your family or guardians for it
- some ***** can have spams and spams involved
Down
- most scams and spams need to what ?
- passwords , lock and pins are a type of this
- it is like you are harassed by a message or picture this is called
- is a disonhest scheme
- some people can hack and enter your *****
- when online you have to be ***********
- when someone steals someone else's identity
- is sent to millions of users a year
- is the opiset to virus
- cyber bulling can be delived through *****
- software that enables A to untainted Covent infomaition
21 Clues: most spams go here • is like an antivirus • is a disonhest scheme • is the opiset to virus • is like your device has a cold • most scams and spams need to what ? • is sent to millions of users a year • when online you have to be *********** • some people can hack and enter your ***** • when someone steals someone else's identity • cyber bulling can be delived through ***** • ...
Fraud Awareness and Prevention Week 2017 2024-03-14
Across
- ____employee morale is an example of a non-financial consequence of fraud.
- One of the three sides of the Fraud Triangle.
- Be __________.
- Once you know the costs, take ____ today to fight fraud.
- Fraud against government entities can result in _______ of public funds and resources.
- Type of fraud committed by employees.
- One of the three sides of the Fraud Triangle.
- Fraud type that includes hacking and and cyber attacks.
- An example of an effective fraud prevention control is segregation of _______.
- A non-financial consequence example is decreased _________in public officials.
- The most effective way to fight fraud
Down
- Where fraud can happen.
- Implement a fraud _____ mechanism.
- Fraud awareness and prevention is the _______ of every state employee.
- One of the three sides of the Fraud Triangle.
- A type of fraud.
- Employees are expected to adhere to policies and the Code of ________.
- Controls that are implemented by management to reduce the opportunities for someone to commit fraud without being detected.
- How approx. 40% of all frauds are uncovered.
- Knowingly misrepresenting the truth or concealing important facts to harm another or benefit oneself.
- Fraud against government entities can result in increased cost in government _______.
- The second most targeted industry of fraud.
22 Clues: Be __________. • A type of fraud. • Where fraud can happen. • Implement a fraud _____ mechanism. • Type of fraud committed by employees. • The most effective way to fight fraud • The second most targeted industry of fraud. • How approx. 40% of all frauds are uncovered. • One of the three sides of the Fraud Triangle. • One of the three sides of the Fraud Triangle. • ...
CTF-CW4 2025-11-14
Across
- The before-pic of your cybersecurity fitness journey
- The grown-ups table for company decisions
- The “ctrl+z” for disasters
- The set of powers (like access, erase) given to a person under privacy laws
- “Don’t do this” in formal writing
- The cyber-beehive buzzing with clues
- Fortune-teller’s favorite word
- The “red flags” in the cyber crime scene
- AI method: models train locally so raw data stays put
- At Tekion, say “LUMOS!” to light up your software requests.
- The fire drill script for hackers
- Every Tekion deploy “leaps” through this pond!
Down
- To strip removed details linking data back to real people
- Digital “pinkie promise” you can’t break
- Making secrets so secret even you forget them
- When your diary writes in code
- Keeping receipts for your servers
- The goal algorithms treat people equally, not favoring some over others
- At Tekion, if you need software access, this smart gatekeeper lights the way—no magic wand required!
- Ethical hackers playing hide-and-seek in your network
20 Clues: The “ctrl+z” for disasters • When your diary writes in code • Fortune-teller’s favorite word • Keeping receipts for your servers • “Don’t do this” in formal writing • The fire drill script for hackers • The cyber-beehive buzzing with clues • Digital “pinkie promise” you can’t break • The “red flags” in the cyber crime scene • The grown-ups table for company decisions • ...
Homeland Security & Trade 2022-03-23
Across
- The abbreviation for the government department in charge of stopping domestic threats and terrorism, cyber security, and securing the nation's border.
- The act of restricting imports from a country with tariffs and quotas. This can create tension between countries and can cause harm in the long run for those who need foreign goods. (Hint: --ism)
- Abbreviation for the trade agreement between the U.S., Mexico, and Canada in order to eliminate barriers and break away from tariffs.
- A term that describes an open international market.
Down
- The date in 2001 that instigated the creation of the Department of Homeland Security (month day, ex: March Ninth)
- An act that was passed in order to “deter and punish terrorist acts in the United States and around the world.”
- The abbreviation for the new trade agreement created in 2020 by Donald after he revised the old agreement between the U.S., Canada, and Mexico to create more benefits for the U.S.
- The abbreviation for the administration that is made in order to protect the transportation of people within, in, and out of the country.
8 Clues: A term that describes an open international market. • An act that was passed in order to “deter and punish terrorist acts in the United States and around the world.” • The date in 2001 that instigated the creation of the Department of Homeland Security (month day, ex: March Ninth) • ...
DAY 1 2014-04-15
Across
- A Security guard who uses excessive force is committing
- A Security guard can make an arrest when he finds someone committing a _______ offence
- ____________can arrest on a " Found Committing " indictable offence
- Security guards keep make entries during a shift in a
- A person who lies on the stand is committing
Down
- The Criminal Code is _________ law
- A minor criminal offence
- Under the trespass to property act a security can only
- A serious criminal offence
- A security guard does not have the same power as the __________
- Every person who is acting as a security guard shall carry his/her___________
- Security guards have to follow a "code of _____________"
- An offence which has the option of being summary or indictable
- Who determines what evidence will be allowed in court?
14 Clues: A minor criminal offence • A serious criminal offence • The Criminal Code is _________ law • A person who lies on the stand is committing • Security guards keep make entries during a shift in a • Under the trespass to property act a security can only • Who determines what evidence will be allowed in court? • A Security guard who uses excessive force is committing • ...
Cybersecurity 2024-03-12
Across
- Secure network connection.
- Email scam tactic.
- Self-replicating malware.
- engineering Manipulating people for data.
- Unauthorized access attempt.
- Stealth force: Password cracking method.
- Data encryption for ransom.
- Network security barrier.
- Faking identity or data.
- Malicious program disguised as useful.
Down
- Weakness in security.
- Data protection method.
- Harmful software.
- Denial-of-Service attack.
- Unique physical traits.
- Authentication method.
- Secure website protocol.
- Computer protection software.
- Software update for security.
19 Clues: Harmful software. • Email scam tactic. • Weakness in security. • Authentication method. • Data protection method. • Unique physical traits. • Secure website protocol. • Faking identity or data. • Self-replicating malware. • Denial-of-Service attack. • Network security barrier. • Secure network connection. • Data encryption for ransom. • Unauthorized access attempt. • ...
te 2015-10-03
25 Clues: Web • Risk • Link • Hoax • User • Hack • Virus • Google • Tablet • Mobile • Safety • Search • Hazard • Network • Privacy • Profile • Facebook • Security • Reliable • Password • Snapchat • Identity • Computer • Internet • Messaging
managment styles 2024-02-26
25 Clues: Salary • Hygiene • Security • Herzberg • planning • technical • conceptual • democratic • Motivation • management • delegation • Supervision • Advancement • Recognition • Achievement • TeamDynamics • laissezfaire • communication • authoritarian • interpersonal • problemsolving • Responsibility • decisionmaking • Companypolicies • jobdissatisfaction
puzzle 12 2024-02-13
Across
- Cyber rebellion
- Animal metropolis mystery
- Doomed ocean liner
- Hitchcock's dizzying thriller
- Parisian whimsy
- Dreams within dreams
- Bond's loyalty tested
- Alien world adventure
- Bates Motel mystery
Down
- Coming-of-age journey
- Outer space terror
- Teenage predicament
- War's evacuation epic
- Astronaut's ordeal
- Snowy crime caper
15 Clues: Cyber rebellion • Parisian whimsy • Snowy crime caper • Doomed ocean liner • Outer space terror • Astronaut's ordeal • Teenage predicament • Bates Motel mystery • Dreams within dreams • Coming-of-age journey • War's evacuation epic • Bond's loyalty tested • Alien world adventure • Animal metropolis mystery • Hitchcock's dizzying thriller
Review 2017-11-14
22 Clues: VOTE • GATE • LAND • TINY • RETIRE • WALLET • PARENT • ANTIQUE • SHAMPOO • ENORMOUS • SECURITY • VALUABLE • ARRIVALS • TAKE OFF • SUITCASE • PENSIONER • HAIRBRUSH • COLOURFUL • DEPARTURES • OLD-FASHIONED • GO TO UNIVERSITY • GET A DRIVING LICENCE
Fnaf: The Silver Eyes 2024-02-23
Across
- Who is Jessica?
- What genre is this book?
- How old is charlie?
- Who is John?
- How old is John?
- Who is the antagonist?
Down
- how did the security guard "die"?
- is Charlie's father dead?
- How many main characters are there?
- Did the security guard die?
- Who does charlie have a crush on?
- Who is the main character?
- How old is the security guard?
- What is the security guards name?
- Who is Charlie's father?
- What is the name of the human-like robot in charlies closet
- how many books are in the series?
- What is the first location the main character visits?
- What is on the cover of the book?
- How many antagonists are there?
20 Clues: Who is John? • Who is Jessica? • How old is John? • How old is charlie? • Who is the antagonist? • What genre is this book? • Who is Charlie's father? • is Charlie's father dead? • Who is the main character? • Did the security guard die? • How old is the security guard? • How many antagonists are there? • how did the security guard "die"? • Who does charlie have a crush on? • ...
LARAS CROSSWORD 2024-06-10
Amanda Todd Cyber-Bullying Crossword 2014-11-22
Across
- Amanda gave away information in which was dangerous and risky.
- Amanda Todd died at a very young age.
- The images of Amanda attracted the attention of her _____.
- Amanda was persistent with ______, cutting and drugs.
- Amanda gave away valuable statistics of her online.
- A person or group that ruthlessly exploits on others.
- Cyber-bullying usually happens over _____.
- Amanda came in contact online with a person she did not know.
- What Amanda did was a ________.
- The predator used the _____ against her.
- People were physically forceful to her.
Down
- What did the predator ask Amanda to do online?
- Amanda flashed a predator online showing her bareness.
- Her peers made a accusation of her by hearing what has happened to her.
- Amanda's peers dismissed her.
- People were not willing to excuse her faults or wrongdoings.
- Her Youtube video consisted of ______ minutes.
- What Amanda did online had a __________ in person.
- Amanda was not knowledgeable of her surroundings and the situation she was putting herself in.
- Cyber-bullying is a form of _______.
- Where was Amanda threatened?
21 Clues: Where was Amanda threatened? • Amanda's peers dismissed her. • What Amanda did was a ________. • Cyber-bullying is a form of _______. • Amanda Todd died at a very young age. • People were physically forceful to her. • The predator used the _____ against her. • Cyber-bullying usually happens over _____. • What did the predator ask Amanda to do online? • ...
Mortal Kombat Kharacters 2023-12-06
Across
- Kronika's minion
- Big guy, small girl (MKX)
- water ninja
- everyone's favorite tarkatan
- Known to stomp
- funny hat man
- kitana's sister
- Fat man that drinks, a lot (mkx DLC)
- Man with robotic arms
- she fights with hand fans
- multiple spirits in one body
- Johnny's daughter
- red cyber lin quei
- Johnny's wife
- Hollywood superstar
- "chosen one"
- Blood god, Aztec emperer
- "your soul is mine"
- screaming lady
Down
- smoke, sektor, and smoke in one character
- "Vengeance will be mine" (mortal kombat 9)
- timekeeper before liu kang
- This man's special move is to ball up and hit the opponent
- thunder god
- "you suck"
- He can regenerate super duper fast
- Jax's daughter
- bug lady
- sonic, as a human
- Sounds like taquito
- He shoots green bubbles that bounce you in the air
- Marksman of outworld
- rock ninja
- "grandmaster blueberry ice"(johnny cage, mk11)
- yellow cyber lin quei
- sorcerer that brought scorpion back to life
- "he's there with fire"
37 Clues: bug lady • "you suck" • rock ninja • water ninja • thunder god • "chosen one" • funny hat man • Johnny's wife • Known to stomp • Jax's daughter • screaming lady • kitana's sister • Kronika's minion • sonic, as a human • Johnny's daughter • red cyber lin quei • Sounds like taquito • Hollywood superstar • "your soul is mine" • Marksman of outworld • Man with robotic arms • yellow cyber lin quei • ...
search with us 2017-08-29
test2 2023-07-11
Across
- One-stop shop where you can quickly find the Cyber Security and Data Privacy/ Data Compliance requirements at Daimler Truck
- One of the Values
Down
- One of the the Purpose (SMART)
- An initiative powered by Women in Tech; a platform for everyone to connect with prominent leaders on different topics from innovations to work-life balance
- Campaign which stands for a prevention strategy that focuses on three dimensions: safety, health and wellbeing
5 Clues: One of the Values • One of the the Purpose (SMART) • Campaign which stands for a prevention strategy that focuses on three dimensions: safety, health and wellbeing • One-stop shop where you can quickly find the Cyber Security and Data Privacy/ Data Compliance requirements at Daimler Truck • ...
Testing cross words 2023-12-21
17 Clues: API • Unit • Load • Alpha • Agile • Smoke • Active • System • BlackBox • Software • Security • Endurance • Usability • Functional • Regression • Performance • Compatibility
Combat Support 2024-10-16
Across
- Supports commanders and staff in gaining situational understanding of threats, terrain, weather, and civil considerations
- Protects the force/nation from MWD and CBHN threats and hazards
Down
- Supports unified land operations from stable peace to major decisive action consisting of lethal or nonlethal engagement against the wide range of threats
- Installs, operates, maintains, secures, and defends the Army's portion of the Department of Defense information networks and communication security
- Plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations
- Responsible for detecting, identifying, evaluating, rendering safe, exploiting, and disposing of explosive ordnance
6 Clues: Protects the force/nation from MWD and CBHN threats and hazards • Plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations • Responsible for detecting, identifying, evaluating, rendering safe, exploiting, and disposing of explosive ordnance • ...
Cybersecurity Fundamentals Chapter 1 2024-06-02
Across
- Identifies and explains various cybersecurity threats that affect individuals, businesses, and organizations. It covers the nature of these threats and their potential impact .
- Involves the collaboration between businesses, government agencies, and countries to share information about serious cyberattacks.
- Professionals dedicated to protecting information systems and networks from cyber threats.
- refers to the broad scope of cybersecurity, which includes understanding the history and evolution of hacking, the role of cyber criminals, and the ongoing need for cybersecurity professionals to protect data and systems .
- The various areas within cybersecurity, such as big data, data analytics, and the responsibilities of businesses to protect data.
Down
- Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals.
- Individuals or groups who use computers, networks, and the internet to commit illegal activities.
- The frameworks and guidelines, such as the ISO 27000 series, that help organizations implement effective cybersecurity measures.
8 Clues: Professionals dedicated to protecting information systems and networks from cyber threats. • Individuals or groups who use computers, networks, and the internet to commit illegal activities. • Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals. • ...
Simon's January News Crossword Puzzle 2014-01-15
Across
- Colorado and Washington State legalized this "drug" for recreational use.
- What is the name of the a guy that was allowed to take his pipe bomb even after Canadian Air Transport Security Authority in Edmonton noticed the explosive.
- Which company have to pay 32.5 million dollar to the US Federal Trade Commission for allowing children to purchase applications without their parents' consent.
- Who won the Ballon d'Or.
Down
- What US government agency implanted radio frequency software in thousands of computers which can be wrongfully used for cyber attacks.
- Whose staffs are under scrutiny of closing bridges for political revenge.
- Who won the best picture in drama for the 2014 Golden Globe Award
- 11th Prime Minister of Israel who died on January 11, 2014 (Israel Time).
- How many school shootings took place in the United State in January?
- What is the Ford's new F-150's body frame made out of?
- Famous MLB player suspended for a year for usage of performance enhancing drugs.
11 Clues: Who won the Ballon d'Or. • What is the Ford's new F-150's body frame made out of? • Who won the best picture in drama for the 2014 Golden Globe Award • How many school shootings took place in the United State in January? • Colorado and Washington State legalized this "drug" for recreational use. • ...
overvaagning 2014-04-01
20 Clues: CCT • trace • public • rights • to spy • to trace • security • recordings • preventive • confidence • fingerprint • authorities • registration • private life • data security • residence areas • feeling of safety • telephone tapping • intelligence agency • terror legislation/act
Profession 2021-04-30
Across
- at the forefont of medicine
- as Security and public Order
- co -pilot
- draw a building
- collect and manage data
- carrier car
- as a teacher
- as fish finders
- as store of payment results
- defends the nation and contry
Down
- Shell their
- as repairing damaged vehiclese
- the man who carries the plane
- produces cool photos
- administer drugs to patients
- as breeding livestock
- takes care of the patient
- people who work on famland
- carrying captain
- guard as security in his work Environment
20 Clues: co -pilot • Shell their • carrier car • as a teacher • draw a building • as fish finders • carrying captain • produces cool photos • as breeding livestock • collect and manage data • takes care of the patient • people who work on famland • at the forefont of medicine • as store of payment results • administer drugs to patients • the man who carries the plane • as Security and public Order • ...
Profession 2021-04-30
Across
- at the forefont of medicine
- as Security and public Order
- co -pilot
- draw a building
- collect and manage data
- carrier car
- as a teacher
- as fish finders
- as store of payment results
- defends the nation and contry
Down
- Shell their
- as repairing damaged vehiclese
- the man who carries the plane
- produces cool photos
- administer drugs to patients
- as breeding livestock
- takes care of the patient
- people who work on famland
- carrying captain
- guard as security in his work Environment
20 Clues: co -pilot • Shell their • carrier car • as a teacher • draw a building • as fish finders • carrying captain • produces cool photos • as breeding livestock • collect and manage data • takes care of the patient • people who work on famland • at the forefont of medicine • as store of payment results • administer drugs to patients • the man who carries the plane • as Security and public Order • ...
FITAVocab.lo 2013-05-15
Across
- code of positive conduct one uses such as plagiarism, copyright, etc.
- rules and behaviors designed to keep individuals safe online
- a search engine that goes through all the search engines.
- speed of machine
- short term memory for your computer
- a
Down
- a website that protects young people from cyber bullies
- protecting information on computer systems/networks
- a program that allows you to search information on the internet.
- a combining form meaning "computer," "computer network," or "virtual reality," used in the formation of compound words.
10 Clues: a • speed of machine • short term memory for your computer • protecting information on computer systems/networks • a website that protects young people from cyber bullies • a search engine that goes through all the search engines. • rules and behaviors designed to keep individuals safe online • a program that allows you to search information on the internet. • ...
CYBER CRIME 2019-11-25
Across
- false Debit and Credit cards used by criminals for their monetary benefits
- changing data prior or during input into a computer
- breaking into your computer systems without your knowledge and consent
- deceive large number of persons by sending threatening mails
- software that takes control of any individual’s computer to spread a bug to other people’s devices
- act of imputing any person with intent to lower down the dignity
- taking control of computers without the users realizing it
Down
- unauthorized control/access over computer system
- cyber attack through voice calls
- cyber attack through emails
- Vital Information Resources Under Seize
- computer program that replicates itself in order to spread to other computers.
- politically motivated hacking to conduct sabotage and espionage
- substitution of the original home page of a website with another page
- selling the pirated software in physical media
15 Clues: cyber attack through emails • cyber attack through voice calls • Vital Information Resources Under Seize • selling the pirated software in physical media • unauthorized control/access over computer system • changing data prior or during input into a computer • taking control of computers without the users realizing it • ...
Digital Competencies for All Public Servants 2025-03-16
Across
- Use and understand the power of modern tools, technologies and approaches to improve productivity, collaboration and creativity.
- Improve work with ongoing collaboration and feedback and learn to solve problems and deliver value efficiently.
- Manage, organize and use information and data to inform decisions, and achieve and measure outcomes.
- Ensure that documents, communications and interactions are accessible, inclusive, equitable and usable by all in any setting.
Down
- Use digital tools safely and ethically.
- Take personal responsibility for safeguarding data, information and systems in your work environment by consistently using cyber security best practices and departmental standards.
6 Clues: Use digital tools safely and ethically. • Manage, organize and use information and data to inform decisions, and achieve and measure outcomes. • Improve work with ongoing collaboration and feedback and learn to solve problems and deliver value efficiently. • ...
overvaagning 2014-04-01
20 Clues: CCT • trace • to spy • public • rights • security • to trace • recordings • confidence • authorities • fingerprint • private life • registration • data security • investigation • residence areas • telephone tapping • feeling of safety • intelligence agency • terror legislation/act
Marie Van Brittan Brown Dennise 2022-03-17
cyber security crossword (designed:the awesome Xiaoyu) 2015-12-31
Across
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- to choose options in order to create a custom system
- a bridge between two computer networks
- A capability to limit network traffic between networks and/or information systems
Down
- the process of attempting to acquire sensitive information used for identity theft
- software installed on a network of computers without the owner’s knowledge
- The process of translating plaintext into ciphertext
- software that records everything you type, then sends it off to whomever installed the software.
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
10 Clues: a bridge between two computer networks • The process of translating plaintext into ciphertext • to choose options in order to create a custom system • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
BallyCara Cyber Security Feb 23 Crossword 2023-02-24
Across
- Software that is designed to disrupt, damage, or gain unauthorised access to a computer system
- The opposite of offline
- Name given to the people trying to get your information
- The name given to online illegal activities
Down
- A unique mixture of characters and numbers
- A big wooden horse with a sneaky surprise
- The act of sending emails to gain unauthorised information.
- What is your info called online?
- Electronic form of posting letters
- When your Computer is infected with this it is bad news
10 Clues: The opposite of offline • What is your info called online? • Electronic form of posting letters • A big wooden horse with a sneaky surprise • A unique mixture of characters and numbers • The name given to online illegal activities • When your Computer is infected with this it is bad news • Name given to the people trying to get your information • ...
CS CrsWrd Pzl 2024-03-14
Across
- faking identity or data
- duel layered access verification
- updating software for security
- detect and prevent intrusions
- protecting individual devices
- exploits before patches released
- secure data transmission protocols
- data scrambling for privacy
- weakness prone to exploitation
- malicious software harming systems
Down
- ethical hacking for assesssment
- unique physical trait authentication
- encrypts data for extortion
- overwhelming traffic to disrupt
- engineering manipulating people for access
- unathorized accesss point
- deceptive emails for stealing data
- secure network connection tunnel
- network security barrier
- security information event management
20 Clues: faking identity or data • network security barrier • unathorized accesss point • encrypts data for extortion • data scrambling for privacy • detect and prevent intrusions • protecting individual devices • updating software for security • weakness prone to exploitation • ethical hacking for assesssment • overwhelming traffic to disrupt • duel layered access verification • ...
IT Cyber Security Harrison's Epic Crossword!!!!! 2023-04-21
Across
- Facts and statistics collected together for reference or analysis without context.
- The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder
- when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website
- the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
- an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
Down
- Facts provided or learned about someone/ something
- the act of inventing a specific scenario to try and engage with the victim. The scenario will be set up so that it increases the chance that the victim will share their sensitive information or data.
- information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc.
- An action or decision which was not intended by a human.
10 Clues: Facts provided or learned about someone/ something • An action or decision which was not intended by a human. • Facts and statistics collected together for reference or analysis without context. • The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. • ...
Services 2022-05-08
Across
- The fastest travelling service
- Fixes your tap
- Safes the land
- Makes your party memorable
- Guarantees social security
- Guarantees iformation technologies security
- Bulids homes
- Makes your back yard beautiful
Down
- Headcooker
- Fixes your vehicle
- Fixes your mental status
- Makes your hairy places good looking
- Makes you beautiful
- Coffe artist
- Heals you
- Relaxes your body
- Mops up a place
- Serves the meal
18 Clues: Heals you • Headcooker • Coffe artist • Bulids homes • Fixes your tap • Safes the land • Mops up a place • Serves the meal • Relaxes your body • Fixes your vehicle • Makes you beautiful • Fixes your mental status • Makes your party memorable • Guarantees social security • The fastest travelling service • Makes your back yard beautiful • Makes your hairy places good looking • ...
BOMB THREATS SECURITY PROCEDURES 2022-03-08
Across
- ARE PROPERLY STORED AND SECURED OVERNIGHT IN A LOCKED LOCATION
- RELAY THE INFO TO THE BRANCH SECURITY OFFICER
- SIGNAL TO LET STAFF KNOW WHEN ENTERING THE BIULDING
- FROM DISCUSSING THE DETAILS OF THE THREAT BEFORE RECORDING EVERYTHING
- ARE TO BE ALERT TO UNUSUAL PACKAGES LEFT NEAR THE BULIDING
- 1ST QUARTER SECURITY
Down
- FOR EMERGENCY ESSENTIALS LOCATED AT ALL STATIONS WITH A CALLING TREE
- IS THE EVACUATION POINT
- PLAN IS LOCATED IN THE SECURITY BINDER
- SIGNAL INDICATING THAT EVERYTHING IS SAFE
- THE BRANCH SECURITY MANAGER
- OF A PACKAGE CALL THE POLICE AND DIVISION SECURITY OFFICER
- WHERE THE SECURITY BINDER IS LOCATED
- RECIEVING THREAT SHOULD TAKE OUT THE THREATENING CALL CHECK LIST FROM RED FOLDER
14 Clues: 1ST QUARTER SECURITY • IS THE EVACUATION POINT • THE BRANCH SECURITY MANAGER • WHERE THE SECURITY BINDER IS LOCATED • PLAN IS LOCATED IN THE SECURITY BINDER • SIGNAL INDICATING THAT EVERYTHING IS SAFE • RELAY THE INFO TO THE BRANCH SECURITY OFFICER • SIGNAL TO LET STAFF KNOW WHEN ENTERING THE BIULDING • OF A PACKAGE CALL THE POLICE AND DIVISION SECURITY OFFICER • ...
