cyber security Crossword Puzzles

Security Threats 2016-03-09

Security Threats crossword puzzle
Across
  1. hat look for holes in other systems and then contact the companies for payment in return for fixing the problem.
  2. Illegally hacking to steal data or with some other criminal intent.
  3. Irritating software that causes pop-up advertisiements to appear in a browser
  4. Computer is tricked and taken to a fake site it thought was genuine.
  5. Aimed at company or web servers to overload them or force them to crash.
  6. This should be updated consistently for antivirus software to be efficient.
  7. Unauthorised access to the network.
  8. Small file placed on hard-disk and stored by websites to store personal preferneces.
  9. self-replicating code that attaches itself to programs.
Down
  1. keylogging software that covertly gathers and reports your online activities.
  2. An email used a bait to trick users into sharing their personal details.
  3. Ethical hackers, employed by companies to deliberately find holes in their own security.
  4. Asked for a fee in order for the ‘lock’ to be removed and regain access to your files
  5. Non-self-replicating virus that masquerades as an innocent file.
  6. Illegally accessing program source code to change it.
  7. provides the creator with unauthorised remote access to an infected computer
  8. Will compromise a computer and use the host’s storage and processing power to perform jobs.

17 Clues: Unauthorised access to the network.Illegally accessing program source code to change it.self-replicating code that attaches itself to programs.Non-self-replicating virus that masquerades as an innocent file.Illegally hacking to steal data or with some other criminal intent.Computer is tricked and taken to a fake site it thought was genuine....

information security 2023-08-28

information security crossword puzzle
Across
  1. or data which can be accessed when needed
  2. sure a person is who they say they are
  3. used to determine user privileges or access levels to the system
  4. to or damage sensitive information on a computer
  5. ransomware and the numerous other programs used by hackers to gain
  6. information is protected
  7. or weakness which undermines an organization’s security efforts
  8. an individual or organization has over information and how it is used
  9. of being private or secret
Down
  1. of being complete or uncorrupted
  2. rules
  3. of doing harm
  4. which have been programmed to carry out malicious intent
  5. assessment of potential threats to an organization’s security
  6. for "malicious software" and covers threats such as viruses, worms, Trojan
  7. of computers and devices managed as a unit with the same procedures
  8. Virus

17 Clues: rulesVirusof doing harminformation is protectedof being private or secretof being complete or uncorruptedsure a person is who they say they areor data which can be accessed when neededto or damage sensitive information on a computerwhich have been programmed to carry out malicious intentassessment of potential threats to an organization’s security...

Security analysis 2025-03-10

Security analysis crossword puzzle
Across
  1. - very important for success or understanding.
  2. - an important part that supports a larger structure or idea.
  3. - changes that go back to an earlier state or direction.
  4. - to see or recognize something clearly.
  5. - to guess what will happen in the future based on information.
  6. - a return to a previous state, often less advanced.
  7. - the force that keeps something moving forward.
  8. - using something to gain an advantage or help achieve a goal.
Down
  1. - people or companies that try to do better than each other.
  2. - including all or nearly all parts of something.
  3. - belonging naturally; part of something's basic nature.
  4. - relating to the side rather than the front or back.
  5. - to look at something carefully to understand it better.
  6. - the way a person acts or behaves in different situations.
  7. - mixing two or more things together to make one.
  8. - the movement of money in and out of a business.
  9. - to place things in a straight line or correct position.

17 Clues: - to see or recognize something clearly.- very important for success or understanding.- the force that keeps something moving forward.- including all or nearly all parts of something.- mixing two or more things together to make one.- the movement of money in and out of a business.- a return to a previous state, often less advanced....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. term for lack of nutrients in the diet
  2. who grow crops for food.
  3. large storage building used to keep grains
  4. protection of crops from pests and diseases
  5. important practice to ensure food safety and avoid spoilage
  6. right of all people to have enough food
  7. condition caused by eating too little protein or calories
  8. United Nations agency working to end hunger
Down
  1. measure to protect farmers by setting a minimum price
  2. government program distributing food to the poor
  3. food to people during emergencies
  4. that provides energy to the body
  5. we call the act of wasting food.
  6. method where food is boiled in water.
  7. we call farming without harming the environment
  8. government program that provides food at low cost to the needy
  9. like rice, wheat, and maize are called

17 Clues: who grow crops for food.that provides energy to the bodywe call the act of wasting food.food to people during emergenciesmethod where food is boiled in water.term for lack of nutrients in the dietlike rice, wheat, and maize are calledright of all people to have enough foodlarge storage building used to keep grains...

FOOD SECURITY 2024-11-28

FOOD SECURITY crossword puzzle
Across
  1. - COOKING METHOD WHERE FOOD IS BOILED IN WATER.
  2. - FOOD THAT PROVIDES ENERGY TO THE BODY.
  3. - A GOVERNMENT PROGRAM THAT PROVIDES FOOD AT LOW COST TO THE NEEDY.
  4. - PEOPLE WHO GROW CROPS FOR FOOD.
  5. - A GOVERNMENT PROGRAM DISTRIBUTING FOOD TO THE POOR.
  6. - THE UNITED NATIONS AGENCY WORKING TO END HUNGER.
  7. - WHAT WE CALL FARMING WITHOUT HARMING THE ENVIRONMENT.
  8. - THE RIGHT OF ALL PEOPLE TO HAVE ENOUGH FOOD.
Down
  1. - THE PROTECTION OF CROPS FROM PESTS AND DISEASES.
  2. - A TERM FOR LACK OF NUTRIENTS IN THE DIET.
  3. - PROVIDING FOOD TO PEOPLE DURING EMERGENCIES.
  4. - WHAT WE CALL THE ACT OF WASTING FOOD.
  5. - A CONDITION CAUSED BY EATING TOO LITTLE PROTEIN OR CALORIES.
  6. - GRAINS LIKE RICE, WHEAT, AND MAIZE ARE CALLED.
  7. - AN IMPORTANT PRACTICE TO ENSURE FOOD SAFETY AND AVOID SPOILAGE.
  8. - THE LARGE STORAGE BUILDING USED TO KEEP GRAINS.
  9. - A MEASURE TO PROTECT FARMERS BY SETTING A MINIMUM PRICE.

17 Clues: - PEOPLE WHO GROW CROPS FOR FOOD.- WHAT WE CALL THE ACT OF WASTING FOOD.- FOOD THAT PROVIDES ENERGY TO THE BODY.- A TERM FOR LACK OF NUTRIENTS IN THE DIET.- PROVIDING FOOD TO PEOPLE DURING EMERGENCIES.- THE RIGHT OF ALL PEOPLE TO HAVE ENOUGH FOOD.- COOKING METHOD WHERE FOOD IS BOILED IN WATER.- GRAINS LIKE RICE, WHEAT, AND MAIZE ARE CALLED....

Food security 2025-04-21

Food security crossword puzzle
Across
  1. Poor health caused by not having enough of the right kinds of food.
  2. Limited or restricted in movement, choices, or freedom.
  3. crisis A serious situation where many people suffer due to war, disaster, or poverty, needing urgent help.
  4. To completely get rid of something, especially a problem or disease.
  5. The act of using something for a purpose.
  6. Being forced to leave your home, especially due to war, disaster, or conflict.
  7. Full of nutrients; healthy and good for your body.
  8. Very poor; lacking money, food, or basic resources.
Down
  1. Treated as unimportant or pushed to the edge of society with limited access to resources or power.
  2. Good enough or acceptable in quantity or quality.
  3. Hard to reach or get; not easily available.
  4. To increase or become more serious, especially quickly.
  5. Something that gets in the way or makes things harder to do.
  6. To a reasonable or average degree; not too much or too little.
  7. Something that happens or takes place.
  8. To reduce or limit something.
  9. In a very bad, serious, or extreme way.

17 Clues: To reduce or limit something.Something that happens or takes place.In a very bad, serious, or extreme way.The act of using something for a purpose.Hard to reach or get; not easily available.Good enough or acceptable in quantity or quality.Full of nutrients; healthy and good for your body.Very poor; lacking money, food, or basic resources....

SOP GEA - Penanganan Kehilangan/ Penemuan Anak (PM-ASRI/GEA-05) dan SOP Security – Penanganan Kejadian (PM-ASRI/SEC-01) 2019-07-19

SOP GEA - Penanganan Kehilangan/ Penemuan Anak (PM-ASRI/GEA-05) dan SOP Security – Penanganan Kejadian (PM-ASRI/SEC-01) crossword puzzle
Across
  1. Beberapa kasus anak hilang akan diantar jika diketahui …..
  2. Salah satu identitas pengendara yang harus diminta ketika terdapat kejadian insident.
  3. Pihak yang membuat surat pernyataan bahwa ia mengakui kehilangan barang.
  4. Laporan awal atas kejadian pencurian ditujukan kepada ….. Security.
  5. Jabatan dalam Security (Vendor) yang bertugas untuk mendokumentasikan barang bukti dalam kejadian operasional / insident.
  6. Kejadian/ tindakan / perbuatan yang mengakibatkan terganggunya kegiatan operasional mall dan mengakibatkan terjadinya kerusakan pada asset perusahaan/ management.
  7. Kejadian yang mengakibatkan kerugian dari pihak Mall, Pengunjung atau Tenant yang terjadi di area Mall dan Kawasan.
  8. Pihak yang bertugas membuat Berita Acara Kehilangan/ Penemuan Anak di dalam tim GEA.
  9. Korban pencurian akan meminta pelaku untuk melakukan ….. barang.
  10. Salah satu bentuk kejadian insident.
  11. Pihak yang membuat surat pernyataan mengakui atas perbuatan merugikan yang dilakukannya.
Down
  1. Pihak yang dihubungi oleh GEA Spv bersama Security bila hingga jam operasional mall berakhir orang tua dari laporan penemuan anak tidak datang.
  2. Tenant yang menjadi korban pencurian barang akan meminta pelaku untuk melakukan …..
  3. Pemeriksaan terhadap seseorang melalui pertanyaan lisan yang bersistem terhadap tersangka yang tertangkap oleh Spv Security.
  4. Pihak yang bertugas melakukan pengawasan secara intensif terhadap seluruh akses pintu masuk & memeriksa seluruh area dalam mall jika terdapat kasus anak hilang.
  5. Surat pernyataan pengakuan dan surat penyerahan tersangka harus dibuat diatas …..
  6. Dokumen yang harus dibuat jika terdapat kasus kehilangan/ penemuan anak.
  7. Pihak yang membuat surat pernyataan bahwa ia melihat kejadian operasional/ insident.
  8. Surat Pernyataan Perjanjian ….. akan dibuat oleh pelaku & korban dengan cara ganti rugi dan disaksikan oleh Security.
  9. Pengantaran anak hilang akan dilakukan oleh GEA berkoordinasi dengan Dept …..
  10. Pihak yang bertugas menerima dan melaporkan kerusakan aset ke Spv Security Outsourcing/ Vendor.

21 Clues: Salah satu bentuk kejadian insident.Beberapa kasus anak hilang akan diantar jika diketahui …..Korban pencurian akan meminta pelaku untuk melakukan ….. barang.Laporan awal atas kejadian pencurian ditujukan kepada ….. Security.Pihak yang membuat surat pernyataan bahwa ia mengakui kehilangan barang....

PUZZLE 2021-05-13

PUZZLE crossword puzzle
Across
  1. pink city
  2. in delhi
  3. city beautiful
  4. a thing to write or draw
  5. cyber city
  6. cleans teeth
  7. Likes to chase mice
Down
  1. our country
  2. Has a trunk
  3. Flying mammal
  4. known for Bollywood
  5. blue city
  6. treat people who are ill or hurt
  7. Man's best friend
  8. in Agra

15 Clues: in Agrain delhipink cityblue citycyber cityour countryHas a trunkcleans teethFlying mammalcity beautifulMan's best friendknown for BollywoodLikes to chase micea thing to write or drawtreat people who are ill or hurt

Chapter 11 Security Plus 2024-10-27

Chapter 11 Security Plus crossword puzzle
Across
  1. Virtualization vulnerability exposing data to another VM.
  2. integrated, cloud-centric, and user-centric approach to network security.
  3. Equipment and personnel spread across different locations.
  4. Unique challenges to securing cloud usage.
  5. Virtualizing parts of physical network for reconfiguration.
  6. located between the data source and the cloud
  7. Cloud security controls to mitigate vulnerabilities.
  8. On-demand infrastructure for configurable computing resources.
  9. Computing resources located on organization’s campus.
  10. VM breaking out to interact with host OS.
  11. use of technology without the knowledge of the official IT department
  12. expand and reduce resources according to the specific service requirements
Down
  1. IT services using resources that are traditionally bound to hardware
  2. Local equipment and personnel at organization’s campus computing.
  3. AWS Lambda, Microsoft Azure Functions, Google Cloud Functions
  4. provision computing infrastructure using code instead of manual processes.
  5. External providers offering cloud security controls.
  6. Special security challenges in spanning public/private spaces.
  7. computer that runs from resources stored on a central cloud
  8. Linux security architecture for access control.
  9. Table listing security duties of user and cloud provider.
  10. isolate the failure of a server and storage resources from cloud users
  11. Dividing application development into smaller, manageable entities.
  12. Method of packaging, distributing, and running applications .
  13. Virtualized service extending WAN networks.
  14. Simplifies the process of building, deploying, and managing containerized applications

26 Clues: VM breaking out to interact with host OS.Unique challenges to securing cloud usage.Virtualized service extending WAN networks.located between the data source and the cloudLinux security architecture for access control.External providers offering cloud security controls.Cloud security controls to mitigate vulnerabilities....

SECURITY 2024-11-27

SECURITY crossword puzzle
Across
  1. A fixed-size output derived from variable-sized input, used to verify data integrity.
  2. Property ensuring data is not altered or tampered with.
  3. Malware that encrypts data and demands payment for decryption.
  4. Process of converting plaintext into ciphertext.
  5. Device/software that filters data packets to secure a network.
  6. Cipher where letters are replaced by others.
Down
  1. Encryption method using two keys, public and private.
  2. Ensuring that information is accessible only to authorized individuals.
  3. Art of breaking encryption and analyzing vulnerabilities.
  4. Fraudulent attempt to obtain sensitive information via fake emails.

10 Clues: Cipher where letters are replaced by others.Process of converting plaintext into ciphertext.Encryption method using two keys, public and private.Property ensuring data is not altered or tampered with.Art of breaking encryption and analyzing vulnerabilities.Malware that encrypts data and demands payment for decryption....

Security 2025-03-17

Security crossword puzzle
Across
  1. A string of characters used to secure user accounts.
  2. A malicious program designed to damage or destroy data.
  3. A security barrier that filters and controls network traffic.
  4. A scam where attackers pretend to be a trusted entity to steal information.
  5. The process of converting data into an unreadable form for security.
Down
  1. A duplicate copy of important files for safeguarding against data loss.
  2. A program that appears harmless but allows hackers remote access.
  3. A systematic approach to solving computer problems.
  4. Malicious software designed to gather user information without consent.
  5. A secure connection that allows remote access to a private network.

10 Clues: A systematic approach to solving computer problems.A string of characters used to secure user accounts.A malicious program designed to damage or destroy data.A security barrier that filters and controls network traffic.A program that appears harmless but allows hackers remote access....

Manage basic security threats 2017-09-02

Manage basic security threats crossword puzzle
Across
  1. A video surveillance system used for legitimate safety and security purposes
  2. Two things security officers must protect: _______ and property.
  3. Who should you contact if you are unsure of your duty?
  4. IED is also known as Improvised _________ Device.
  5. Typically, there will be excessive _____________ on a suspicious parcel
  6. If you see a suspicious vehicle, you must write down its _________________ plate number
  7. Security _______ is a scrutiny of a site’s procedures and systems
Down
  1. A log/book for writing daily security activities
  2. Commonly used security communication equipment.
  3. Most prevalent security threats at the moment
  4. A report used for recording crimes / accident
  5. The practice of spying or of using spies
  6. One common characteristic of a suspicious person is that he/she constantly licks of his/her _____
  7. An item designed to explode on impact
  8. A type of tape used in securing incidences.

15 Clues: An item designed to explode on impactThe practice of spying or of using spiesA type of tape used in securing incidences.Most prevalent security threats at the momentA report used for recording crimes / accidentCommonly used security communication equipment.A log/book for writing daily security activities...

Cybersecurity Vocab 2024-04-08

Cybersecurity Vocab crossword puzzle
Across
  1. A self-replicating type of malware that spreads across networks without human intervention, often causing damage or disruption.
  2. the fraudulent practice of sending emails or text messages purpretending porting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  3. Good practices and habits for maintaining cybersecurity, such as keeping software up to date, using strong passwords, and being cautious of suspicious emails or links.
  4. A type of malware disguised as legitimate software, which appears harmless but actually performs malicious actions when executed.
  5. The process of converting encrypted data back into its original form using a decryption key or algorithm.
  6. A strong, complex password that is difficult for attackers to guess or crack, typically consisting of a combination of letters, numbers, and special characters.
  7. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  8. The ethical principles and guidelines governing acceptable behavior and conduct in cyberspace, including respect for privacy, intellectual property rights, and online safety.
  9. Short for malicious software, malware is any software intentionally designed to cause damage to computer systems, steal data, or disrupt operations.
  10. The practice of protecting computer systems, networks, and data from digital attacks, theft, and damage.
  11. The process of reacting to and managing cybersecurity incidents, such as data breaches or cyberattacks, to minimize damage and restore normal operations.
  12. A security process that requires users to provide two different forms of identification before accessing an account or system, typically a password and a unique code sent to a mobile device.
Down
  1. A type of malware that infects computer systems by attaching itself to files or programs and replicating when executed.
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  3. Measures and practices implemented to protect computer networks from unauthorized access, misuse, or disruption.
  4. The process of verifying the identity of users or devices attempting to access a system or network.
  5. the process of converting information or data into secret code, especially to prevent unauthorized access
  6. A person who uses technical skills to gain unauthorized access to computer systems or networks, often for malicious purposes.
  7. Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
  8. A weakness or flaw in computer systems, networks, or software that could be exploited by attackers to gain unauthorized access or cause harm.
  9. The trail of digital information or data left behind by an individual's online activities, including social media posts, website visits, and online purchases.
  10. The use of digital communication technologies to harass, intimidate, or bully individuals or groups, often through social media, messaging apps, or online forums.
  11. The process of granting or denying access to specific resources or services based on user credentials and permissions.
  12. attack an attempt by a hacker or hackers to infiltrate or damage a computer network or system
  13. Awareness Knowledge and understanding of cybersecurity risks, best practices, and strategies for protecting against digital threats.
  14. the gaining of unauthorized access to data in a system or computer
  15. A software update intended to fix vulnerabilities or bugs in computer programs, often issued by software vendors to improve security.

27 Clues: the gaining of unauthorized access to data in a system or computerattack an attempt by a hacker or hackers to infiltrate or damage a computer network or systemThe process of verifying the identity of users or devices attempting to access a system or network....

CYBERSECURITY DECEMBER 2, 2023 2023-12-03

CYBERSECURITY DECEMBER 2, 2023 crossword puzzle
Across
  1. A deceptive practice where a person or program successfully masquerades as another.
  2. A field within cybersecurity that uses investigative techniques to identify and store evidence from a computer device (2 words).
  3. Describes data that requires power to maintain its contents.
  4. a fundamental unit of data in computer networking and data communication.
  5. An authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA
  6. an advanced security technology that builds upon the functionality of an IDS. It not only detects suspicious or malicious activities but also takes proactive measures to block or mitigate them in real-time.
  7. A documented, structured approach for handling security breaches, and cyber threats. (3 words)
  8. A technology that allows you to create a secure connection over a less secure network, such as the internet. It can also mask your connection origin, making it appear that you are connecting via a different location than where you physically are located.
  9. _______ Modeling, Risk Modeling, or Risk Analysis is a systematic way of thinking where a system may be vulnerable in order to best defend against possible attacks.
  10. A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
  11. A phishing attack transmitted by SMS (text) message.
  12. The world's most famous hacker.
  13. From Day 1, cybersecurity is built upon a foundation of three principles – private data is kept private.
  14. Model that describes how data is transmitted through a network.
  15. a decoy system or resource set up to monitor and analyze the behavior of attackers.
  16. This cipher was the first documented form of encryption and involves shifting each letter of a message by 3.
  17. A public-key cryptography algorithm
Down
  1. Relies on human interaction and often involves tricking people into breaking normal security procedures.
  2. This color team is made up of offensive security experts who try to (ethically) attack an organization’s cybersecurity defenses.
  3. An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.
  4. In this kind of cipher, both the encryption and decryption process use the same key,
  5. From Day 1,cybersecurity is built upon a foundation of three principles. This is one of them which means that data can be used by any authorized parties.
  6. This term (2 words) refers to limiting who (subjects) can read or write which resources (objects: e.g. files)
  7. A SQL_______ vulnerability arises when the original SQL query can be altered to form an altogether different query.
  8. From Day 1, cybersecurity is built upon a foundation of three principles. This is one of them which means that data is modified only by authorized parties.
  9. Software tool that allows users to capture and inspect data packets on a computer network.
  10. This software examines requests to access the network and determines if it should pass through.
  11. A number used to identify specific services or processes running on a computer or network device.

28 Clues: The world's most famous hacker.A public-key cryptography algorithmA phishing attack transmitted by SMS (text) message.Describes data that requires power to maintain its contents.Model that describes how data is transmitted through a network.a fundamental unit of data in computer networking and data communication....

Data Security 2020-01-27

Data Security crossword puzzle
Across
  1. knowledge obtained from investigation, study, or instruction
  2. data that resides in a fixed field within a record
  3. timestamps, user browser and device type
  4. used to manage return data
  5. data during initial output modification computation or output
  6. facts and statistics collected for analysis
  7. data that cannot be classified into a category
  8. exponentially growing data from IOT and expanded storage capacities
  9. range of information or understanding
  10. a type of storage device that retains the data when no user or process is using it
  11. a unit of data that travels between an origin and a destination on the network
Down
  1. holds a computer system hostage until the target makes a payment
  2. examining large databases to generate useful information
  3. durable available and secure
  4. sending information from one device to another
  5. user name, user address
  6. database that stores data in plain text format

17 Clues: user name, user addressused to manage return datadurable available and securerange of information or understandingtimestamps, user browser and device typefacts and statistics collected for analysissending information from one device to anotherdata that cannot be classified into a categorydatabase that stores data in plain text format...

Information Security 2017-02-15

Information Security crossword puzzle
Across
  1. Personal journal published on the World Wide Web ________
  2. All colleagues must comply with these information security documents _______
  3. Personal information is protected by this act _______
  4. These should never be shared __________
  5. It should be changed immediately if suspected of being compromised
  6. Information Security policies are published on it ___________
  7. Always ensure your _________ is locked when you are away from your computer.
  8. A tidy desk is also known as a _________ desk
  9. When you received unsolicited email from unknown sources this is called ______
Down
  1. You should not allow others to do this when accessing Society premises ______
  2. Skipton may ______________ your internet usage
  3. Completion of Information Security and DPA annual training is ____________
  4. When you receive an email with a link to a bogus website it is called _________
  5. This should be worn at all times when on Society premises __________
  6. This should only be installed on Society systems by approved administrators ______
  7. A type of use that should be limited when using Society systems ________
  8. Something that can infect a PC/Laptop is known as a ________

17 Clues: These should never be shared __________A tidy desk is also known as a _________ deskSkipton may ______________ your internet usagePersonal information is protected by this act _______Personal journal published on the World Wide Web ________Something that can infect a PC/Laptop is known as a ________...

information security 2023-08-28

information security crossword puzzle
Across
  1. or data which can be accessed when needed
  2. sure a person is who they say they are
  3. used to determine user privileges or access levels to the system
  4. to or damage sensitive information on a computer
  5. ransomware and the numerous other programs used by hackers to gain
  6. information is protected
  7. or weakness which undermines an organization’s security efforts
  8. an individual or organization has over information and how it is used
  9. of being private or secret
Down
  1. of being complete or uncorrupted
  2. rules
  3. of doing harm
  4. which have been programmed to carry out malicious intent
  5. assessment of potential threats to an organization’s security
  6. for "malicious software" and covers threats such as viruses, worms, Trojan
  7. of computers and devices managed as a unit with the same procedures
  8. Virus

17 Clues: rulesVirusof doing harminformation is protectedof being private or secretof being complete or uncorruptedsure a person is who they say they areor data which can be accessed when neededto or damage sensitive information on a computerwhich have been programmed to carry out malicious intentassessment of potential threats to an organization’s security...

Information Security 2023-12-03

Information Security crossword puzzle
Across
  1. A private combination of characters associated with the user name that allows access to certain computer resources.
  2. A copy of a file, program, or media that can be used if the original is lost, damaged, or destroyed.
  3. The process of storing, analyzing, retrieving, and preserving electronic data that may be useful in an investigation.
  4. A security system, which can be either hardware or software-based. It monitors and controls incoming and outgoing network.
  5. A method used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.
  6. Ensures your internet privacy and anonymity while surfing, shopping, and banking online by hiding your location.
  7. An electronic, encrypted, stamp of authentication on digital information such as email messages or electronic documents.
  8. A person who breaks into a computer system to installing malware, stealing or destroying data.
Down
  1. A device that can identify a person using their unique facial characteristics, fingerprints, signatures, DNA.
  2. An online or Internet-based illegal acts.
  3. A malicious software that disrupt systems, cause major operational issues, and result in data loss and leakage.
  4. A monitoring system that detects suspicious activities and generates alerts when they are detected.
  5. A group of compromised computers or mobile devices connected to a network.
  6. A scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
  7. A program that protects website from botnet by telling human and computer apart automatically.
  8. When someone steals another person's information such as passport number, bank account with the intent to commit fraud.
  9. A malware that is capable of spreading by itself with no human interaction and infect other computers while remaining active on infected systems..

17 Clues: An online or Internet-based illegal acts.A group of compromised computers or mobile devices connected to a network.A program that protects website from botnet by telling human and computer apart automatically.A person who breaks into a computer system to installing malware, stealing or destroying data....

unit 5: electronics 2 2021-03-12

unit 5: electronics 2 crossword puzzle
Across
  1. account
  2. comment
  3. seguidores followers
  4. username
  5. password
Down
  1. cyber-bullying
  2. private
  3. public
  4. filter

9 Clues: publicfilterprivateaccountcommentusernamepasswordcyber-bullyingseguidores followers

Notable Criminal Techniques 2023-12-17

Notable Criminal Techniques crossword puzzle
Across
  1. (Online fraud)
  2. (Fake documents)
  3. (Fake currency)
  4. (Online illegal activity)
  5. (Coercion for money)
  6. Burglary (Stealthy theft)
  7. (Seizing control)
  8. Laundering (Illegal cash cleaning)
  9. Skimming (Credit card theft)
Down
  1. (Corrupt payments)
  2. Scheme (Financial scam)
  3. (Cyber extortion)
  4. Theft (Fraudulent use)
  5. Trading (Illegal stock trading)
  6. Engineering (Manipulative tactics)

15 Clues: (Online fraud)(Fake currency)(Fake documents)(Cyber extortion)(Seizing control)(Corrupt payments)(Coercion for money)Theft (Fraudulent use)Scheme (Financial scam)(Online illegal activity)Burglary (Stealthy theft)Skimming (Credit card theft)Trading (Illegal stock trading)Engineering (Manipulative tactics)Laundering (Illegal cash cleaning)

TTS 2 2024-08-27

TTS 2 crossword puzzle
Across
  1. salah satu bentuk penerapan AR yaitu dalam penasaran
  2. siklus hidup produk secara umum di bagi menjadi
  3. tahapan-tahapan yang di lalui oleh suatu produk mulai dari diluncurkan ke pasar sampai akhirnya hilang disebut
  4. aplikasi yang digunakan untuk mengobrol alat-alat industri bekerja di sebut aplikasi
  5. tahap mengenakan atau meluncurkan produk baru ke pasar
  6. istilah lain dalam proses perbaikan adalah
  7. Revolusi ...... industri yang dikenal dengan cyber physical
  8. tahap ketika produksi semakin besar
  9. penerapan teknologi Internet dalam proses industri kimia
  10. nama lain dari pesaing dalam bisnis produksi kimia adalah
  11. salah satu contoh barang yang mengalami siklus hidup di industri kimia
Down
  1. sebuah teknologi menggunakan Internet sebagai pusat pengelola data dan aplikasi disebut
  2. AI di aplikasi dalam bidang riset digunakan untuk proses produksi,......., dan distribusi
  3. fungsi dari sebuah cyber sekuriti adalah
  4. salah satu hal yang dapat memengaruhi siklus hidup produk adalah perkembangan
  5. tahap ketika produk mengalami penurunan eksistensi di pasar
  6. pergeseran industri kearah teknologi industri digital disebut
  7. tahap ketika pasar sudah mengenal produk, penjual meningkat, dan produsen memperoleh keuntungan
  8. singkatan dari Artificial intelligence

19 Clues: tahap ketika produksi semakin besarsingkatan dari Artificial intelligencefungsi dari sebuah cyber sekuriti adalahistilah lain dalam proses perbaikan adalahsiklus hidup produk secara umum di bagi menjadisalah satu bentuk penerapan AR yaitu dalam penasarantahap mengenakan atau meluncurkan produk baru ke pasar...

3rd Qtr Newsletter 2022 2022-09-14

3rd Qtr Newsletter 2022 crossword puzzle
Across
  1. In Apr 2019, Julian Assange had his asylum with this country was revoked.
  2. The name for the Russian retreat in Ney York state.
  3. how many years can the NCIS agent receive for her actions?
  4. This former FBI agent turned spy had two Rolex watches.
  5. Two men, formally of Dept of Homeland Security were spying for this country.
  6. Type of sandwich used to hide a SD card holding national secrets by this a Maryland couple.
  7. In 1946 who purchase Killenworth?
  8. For her efforts Belle Boyd was awarded this medal.
  9. Where can you find the Emergency Action Plan EAP?
  10. Convicted spy Walt Liew was 56 at what time?
  11. A watch is used by case officers to remind their target of this.
  12. Russian cyber spies number one targets are the United States and _______.
  13. What organization did Meyya Meyyappan work for?
  14. A NCIS agent was involved with a citizen of this country when she was arrested.
  15. The most famous spy from the US Civil War.
Down
  1. Walter Liew spied for this country.
  2. Who is the primary Security Manger for the 24 IS?
  3. Watch worn by James Bond (007).
  4. In 1943 the Office of Strategic Services (OSS) presented a Patek Phippe watch to?
  5. The U-2 pilot shot down over USSR.
  6. What is the reason that insider threats have used through the centuries for spying?
  7. A retired Army officer was hoping to meet his Russia Contact here, before the FBI arrested him.
  8. This country offered Julian Assange asylum.
  9. these are used by young case officers to stike up conversations.
  10. Spy Meyya Meyyappan had 27 of these.
  11. Where is the proper area to validate the identity of a visitor to any of the facilities?
  12. Besides be TSG compliant what is the other feature all NIPR/SIPR telephone must have?
  13. what type of voice do you announce uncleared visitors?
  14. Microblogging company employee spied for this country and is facing 20 years imprisonment.
  15. A German officer faces how many years for providing information to Russia?
  16. Who is the primary Security Manager for the 450 IS?
  17. This map is located on each emergency exit.

32 Clues: Watch worn by James Bond (007).In 1946 who purchase Killenworth?The U-2 pilot shot down over USSR.Walter Liew spied for this country.Spy Meyya Meyyappan had 27 of these.The most famous spy from the US Civil War.This country offered Julian Assange asylum.This map is located on each emergency exit.Convicted spy Walt Liew was 56 at what time?...

Cybersecurity Words 2020-11-18

Cybersecurity Words crossword puzzle
Across
  1. a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
  2. An observable occurrence or sign that an attacker may be preparing to cause an incident.
  3. uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
  4. set of instructions to help IT staff detect, respond to, and recover from network security incidents.
  5. a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
  6. a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
  7. ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
  8. strategy used to make sure users do not send critical information outside of a corporate network.
  9. an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
  10. integrated collection of security measures to prevent unauthorized access to a networked computer system
  11. a cyberattack on a server, service, website, or network floods it with Internet traffic.
  12. identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
  13. the unauthorized movement of information being spread throughout the internet.
  14. Authentication via group
  15. a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
  16. used to detect malware.
  17. a system that allows web hosts to distinguish between human and automated access to websites.
  18. Someone or Something that authenticates
  19. a standalone malware computer program that replicates itself in order to spread to other computers.
  20. science concerned with data communication and storage in secure and usually secret form.
  21. related to cloud computing, in which it can hold information and photos.
  22. to successfully escape from an area under enemy control.
  23. Source code that is free to copy and modify.
  24. an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
  25. Hacker who violates computer security for personal gain or malice.
  26. is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
  27. The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
  28. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
  1. an evaluation of events that can adversely affect operations and/or specific assets
  2. a type of monitoring software designed to record keystrokes made by a user.
  3. Source code that is not available
  4. the psychological manipulation of people into performing actions or divulging confidential information.
  5. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  6. software that displays unwanted advertisements on your computer.
  7. the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. code that takes advantage of a vulnerability of flaw.
  9. a set of changes to a computer program or its supporting data designed to update, fix, or improve it
  10. an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
  11. List of people under suspicion, disfavor, etc.
  12. internet protocol address, which identifies the number associated with a specific computer or network.
  13. an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
  14. are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
  15. any malware which misleads users of its true intent.
  16. A thing that supports another thing
  17. Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
  18. an attack on the internet that is used to steal usernames and passwords from the network.
  19. a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
  20. a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
  21. keeping data safe
  22. process of collecting and searching through a database to discover information.
  23. a computer network that provides online privacy by creating an encrypted connection on the Internet.
  24. it ensures a person’s identity matches with who they are.
  25. a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
  26. a person who operates the command and control of botnets for remote process execution.
  27. when data is coded a certain way to disallow others from seeing that information.
  28. a collection of internet-connected devices infected by malware that allow hackers to control them.
  29. offensive security professionals who are experts in attacking systems and breaking into defenses.
  30. a type of malware that is often disguised as legitimate software.
  31. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
  32. identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
  33. the methods that adversaries use to breach or infiltrate your network.
  34. Number generated from a string of text
  35. malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  36. to convert information into cipher
  37. short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.

65 Clues: keeping data safeused to detect malware.Authentication via groupSource code that is not availableto convert information into cipherA thing that supports another thingNumber generated from a string of textSomeone or Something that authenticatesSource code that is free to copy and modify.List of people under suspicion, disfavor, etc....

Artificial Intelligence 2024-12-08

Artificial Intelligence crossword puzzle
Across
  1. The idea of the technological singularity
  2. Artificial Intelligence is utilized in the film business toenhance digital effects, save costs, and expedite production.
  3. Quality Precise, timely, and consistent data is the cornerstone of artificial intelligence systems.
  4. Context provided by AI technologies, but using AI also brings up moral dilemmas as, for better or worse,
  5. It is advised to conduct further research on the effectsof AI on adaptive tests, individualized learning, and creative teaching environments.
  6. AI-powered personalization allows marketing campaigns and product suggestions to be customized to each person's taste.
  7. AI is also capable of automating room administration, ensuring security, and detecting fraudulent activity.
  8. selecting the appropriate ai model for a project is essential
  9. AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz
  10. Robotics integration into the workflow has been pioneered by the manufacturing sector.
Down
  1. Artificial Intelligence is utilized in product design, labor planning, and equipment predictive maintenance.
  2. (AI) technologies are employed in transportation to forecast aircraft delays, regulate traffic, and enhance the safetyand efficiency of maritime transportation.
  3. AI is used by banking institutions to enhance loan decision-making, establish credit limits, and find investment possibilities.
  4. capable of anticipating maintenance requirements and arranging them in advance of issues, which lowersexpenses and downtime.
  5. Terms AI is being used to assist automate labor intensive tasks in the legal sector, which saves time and enhances customerservice.
  6. This sector has been profoundly influenced by AI-powered technologies, which have revolutionized supply chain management, sorting and packing, and determining the most efficient shipping routes.
  7. AI may also be used to identify fraudulent activity and support strategic decision-making, which improves user engagement and experience
  8. By analyzing data from blogs, social media, and online platforms to detect trends and influencers, artificial intelligence (AI) has completely transformed the fashion business.
  9. AI tools such as IBM Watson mimic human medical tasks, while NuMedii's AI-driven AIDD platform looks for medication interactions across diseases.
  10. Artificial intelligence (AI) is a useful tool in cyber security for anomaly identification, behavioral threat analytics, and false positive resolution.

20 Clues: The idea of the technological singularityselecting the appropriate ai model for a project is essentialRobotics integration into the workflow has been pioneered by the manufacturing sector.Quality Precise, timely, and consistent data is the cornerstone of artificial intelligence systems....

Security 2022-01-27

Security crossword puzzle
Across
  1. Encrypts a device or network in order to extort
  2. Software intended to infiltrate and damage or disable devices
  3. Prevents unauthorised access to a device or network
  4. The transformation of data to hide its information content
  5. Detects and removes malicious software
  6. Using body measurements to authenticate
Down
  1. All the data marks you leave behind when you are online
  2. Making a copy of data
  3. A secret series of characters used to authenticate a person’s identity
  4. A person who performs a cyber attack or causes an accident

10 Clues: Making a copy of dataDetects and removes malicious softwareUsing body measurements to authenticateEncrypts a device or network in order to extortPrevents unauthorised access to a device or networkAll the data marks you leave behind when you are onlineThe transformation of data to hide its information content...

Security 2022-05-12

Security crossword puzzle
Across
  1. When an employee an employee receive a bomb threat on the phone, they should continue the conversation and get as much ___ as possible.
  2. After a robbery all doors of the bank should be what?
  3. After notifying 911 who do you call 2nd after any emergency?
  4. When a tornado is near, where do you go?
  5. How often do we change the all clear signal?
Down
  1. When getting the money for a robber be sure and include what money?
  2. When an active shooter is at the branch you should 1.run, 2.___, 3.Fight, 4.Call 911 when safe
  3. Items to be secured in case of fire is vault, basket, cash drawers, and ____ checks.
  4. Where to go if an emergency is at the bank?
  5. During a robbery the teller is suppose to remain what?

10 Clues: When a tornado is near, where do you go?Where to go if an emergency is at the bank?How often do we change the all clear signal?After a robbery all doors of the bank should be what?During a robbery the teller is suppose to remain what?After notifying 911 who do you call 2nd after any emergency?...

Security 2024-10-17

Security crossword puzzle
Across
  1. in bulk.
  2. meals weekly.
  3. your diet.
  4. new recipes.
  5. seasonal produce.
Down
  1. a food budget.
  2. excess food.
  3. surplus food.
  4. food properly.
  5. your own vegetables.

10 Clues: in bulk.your diet.excess food.new recipes.meals weekly.surplus food.a food budget.food properly.seasonal produce.your own vegetables.

social media and data protection act 1998. 2023-05-05

social media and data protection act 1998. crossword puzzle
Across
  1. ______ data is the data company's have about you.
  2. personal data can not be _______.
  3. cyber ______ is when you bully someone online.
  4. _____ footprint is the footprint you leave online, it stays there for years.
Down
  1. all data should be kept _____ by businesses.
  2. you can report bullying to any ______ adult.
  3. you have to keep you data up to ____.
  4. Lots of times people will say they’re not bullying, they’re ‘just ____ ’ – in fact, it’s the number one reason for being mean online.
  5. you should always _____ any cyber bullying.
  6. you can _______ your data.

10 Clues: you can _______ your data.personal data can not be _______.you have to keep you data up to ____.you should always _____ any cyber bullying.all data should be kept _____ by businesses.you can report bullying to any ______ adult.cyber ______ is when you bully someone online.______ data is the data company's have about you....

Security Fest 2021-11-19

Security Fest crossword puzzle
Across
  1. Facility not ready for immediate switch over
  2. Command-line interface client program to transfer files
  3. This has Security Clauses identified from the Contract and relevant controls
  4. Data Encryption Standard is a ____ key algorithm
  5. Gives its owner the legal right to exclude others from selling an invention for a limited period
  6. Performs Traffic directing functions on the Internet
  7. Hierarchical, Decentralized naming system for various resources connected to Internet
Down
  1. Program offering on Cloud
  2. Automatically generates online advertisements
  3. Biometric access
  4. A Tool to prevent Security Incidents
  5. A potential threat or damage if not handled proactively may result in huge impact
  6. Physical/Logical Subnetwork that exposes an organization's external-facing services to untrusted network
  7. Duration of time and a service level within which a business process must be restored after a disaster
  8. FIX released every month for all software
  9. This technology provides Confidentiality, Authentication and Integrity
  10. Electrical Apparatus that provides emergency power to a Load

17 Clues: Biometric accessProgram offering on CloudA Tool to prevent Security IncidentsFIX released every month for all softwareFacility not ready for immediate switch overAutomatically generates online advertisementsData Encryption Standard is a ____ key algorithmPerforms Traffic directing functions on the Internet...

International security 2020-12-11

International security crossword puzzle
Across
  1. Application
  2. number if you call someone you need it
  3. you do some bad things
  4. you need to buy something
  5. card If you use it you will get the bill
  6. electronic Product
  7. White-collar criminal of sorts
  8. if you search is you will get it
  9. use If you use it you will become crime
Down
  1. data You should protect yourself
  2. Like google
  3. you don’t want everyone to know
  4. someone stolen money
  5. people’s sitter
  6. like windows 10
  7. forced entry
  8. You need it to log in your account

17 Clues: ApplicationLike googleforced entrypeople’s sitterlike windows 10electronic Productsomeone stolen moneyyou do some bad thingsyou need to buy somethingWhite-collar criminal of sortsyou don’t want everyone to knowif you search is you will get itdata You should protect yourselfYou need it to log in your account...

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. The process of cutting and gathering crops
  2. Act of preserving nature and resources
  3. A lack of food or resources
  4. Harmful substances that spoil air,water, or soil
  5. System for watering crops artificially
  6. The science of growing crops and raising animals
  7. When added to soil,helps the plants grow better
Down
  1. A community of plants, animals, and their environment
  2. Farming without harming the environment
  3. The order in which living things depend on each other for food
  4. Food grown without harmful chemicals
  5. The health benefits we get from food
  6. Practice of cultivating the land for food production
  7. Weather patterns that affect farming
  8. Growing fish and other water animals for food
  9. A large area used for farming a specific crop
  10. Plants like rice or wheat grown for food

17 Clues: A lack of food or resourcesFood grown without harmful chemicalsThe health benefits we get from foodWeather patterns that affect farmingAct of preserving nature and resourcesSystem for watering crops artificiallyFarming without harming the environmentPlants like rice or wheat grown for foodThe process of cutting and gathering crops...

The Suffolk County September 2022 Hack 2022-10-31

The Suffolk County September 2022 Hack crossword puzzle
Across
  1. __________is malware that locks access to devices & files
  2. __________ is better than a cure.
  3. Cybersecurity is a team _____
  4. Many tasks normally done online, became ________ tasks
  5. Those involved in ____ estate processing were crippled by the attack
  6. Data seized in a ransomware attack is held _____ unless payment is made
  7. The _______ of this attack is unprecedented
  8. The Suffolk County government experienced a_____ attack in early Sept. 2022
  9. $130 _______in unpaid receivables have accumulated since the hack was reported
  10. Citizens are in a ______ about their data & credit being accessed.
  11. Restoring data can be a costly & __________ task
Down
  1. Hackers posted confidential information on the _______
  2. If you see _________ say something.
  3. This ______ appears to be the most high-profile cyber attack against a government entity on LI
  4. It's important that we recognize the scope & ____ of this neighborhood cyberattack.
  5. As hackers become more sophisticated, it's important for our team to be _____
  6. ______ actors accessed or acquired personal information from County server.
  7. The County's 911 _________system was temporarily disabled
  8. ________ of dollars in Real Estate transactions are sitting on the sidelines

19 Clues: Cybersecurity is a team _______________ is better than a cure.If you see _________ say something.The _______ of this attack is unprecedentedRestoring data can be a costly & __________ taskHackers posted confidential information on the _______Many tasks normally done online, became ________ tasks...

Lukla - Ryan van Duzer 2023-01-26

Lukla - Ryan van Duzer crossword puzzle
Across
  1. airport
  2. people
  3. porters
  4. outside
  5. world
  6. anyway
  7. spacious
  8. freezing
Down
  1. awesome
  2. pilot
  3. seventh
  4. unload
  5. security
  6. fingers
  7. chilly
  8. yourself

16 Clues: pilotworldpeopleunloadchillyanywayairportawesomeseventhportersfingersoutsidesecurityyourselfspaciousfreezing

Information Security 2024-10-11

Information Security crossword puzzle
Across
  1. Policy ensuring access is based on least privilege
  2. Sensitive data classification requiring protection
  3. Oversight structure of an information security program
  4. Person responsible for overall security in an organization
  5. Type of authentication requiring multiple credentials
  6. A framework for reacting to security breaches
  7. Data protection by converting it to unreadable format
  8. Software to detect and remove malicious software
Down
  1. Person ensuring security policies are integrated with employee lifecycle
  2. Process of identifying and evaluating potential threats
  3. Malicious software that demands payment
  4. Subject Matter Expert, responsible for expertise in specific areas
  5. Ensuring that information is accurate and unaltered
  6. A method to store data to protect against loss
  7. Network security system that monitors and controls traffic

15 Clues: Malicious software that demands paymentA framework for reacting to security breachesA method to store data to protect against lossSoftware to detect and remove malicious softwarePolicy ensuring access is based on least privilegeSensitive data classification requiring protectionEnsuring that information is accurate and unaltered...

TEST 2016-08-26

TEST crossword puzzle
Across
  1. You should never use your ____'s name as a password
  2. You should have a unique password for every single online ________
  3. Identity theft, financial fraud, stalking, bullying, criminal hacking, email spoofing and piracy are all types of this.
  4. Viruses, Trojans and key loggers are all types of this.
  5. Information security isn’t just cyber! It also includes people and ________
  6. Mobile apps ask for these when you install them
  7. 99% of these people are not criminals, but the 1% that are have made a bad name for them
  8. You should always use a VPN when using public _____
  9. A type of malware that has the ability to record every keystroke
  10. Treat your passwords like this household item; never share them, use a good one, and change them regularly.
  11. Someone else’s computer.
  12. Make sure you have this in case of disaster.
  13. Information security is _____ responsibility!
  14. What happens online stays online because the internet is _______
  15. This included pieces of identifiable information such as your full name, home address, phone number, drivers license number, etc.
  16. Think before you ______
  17. Illegally downloading software, music and movies.
  18. Don't connect with _______ or people you don’t know in real life
Down
  1. This contains the exact location of where a photo was taken.
  2. These should be strong, long and complex.
  3. It's exciting to turn 16 and get this, but NEVER post photos of this piece of plastic online (2 words).
  4. Passwords are private, so never do this with them.
  5. These types of emails often have bad spelling and grammar, and convey a false sense of urgency.
  6. Strong passwords include letters, numbers and ______.
  7. Bad guys can use this to find you in real life, so never give out ________ information online.
  8. See______? Say ________!
  9. Every ____ seconds someone's identity is stolen!
  10. You should only download official versions of these and only with your parents' permission.
  11. Never be afraid to ask your _______ for help. Also tell them if you’re being cyberbullied or know someone who is.
  12. Use two-_______ authentication whenever it's offered.
  13. When in doubt, ___!

31 Clues: When in doubt, ___!Think before you ______See______? Say ________!Someone else’s computer.These should be strong, long and complex.Make sure you have this in case of disaster.Information security is _____ responsibility!Mobile apps ask for these when you install themEvery ____ seconds someone's identity is stolen!...

CWO Crossword 2024-09-28

CWO Crossword crossword puzzle
Across
  1. Management The process of identifying, assessing, and prioritizing security risks
  2. A self-replicating malware that spreads through a network
  3. Malware that locks a user’s data until a ransom is paid
  4. Detection A system that monitors network traffic for suspicious activity
  5. A type of malware disguised as legitimate software
  6. A network of infected computers controlled remotely by an attacker
  7. Team The group responsible for defending an organization against attacks
  8. A hidden method of bypassing security to gain access to a system
  9. Software designed to damage or disrupt a computer system
  10. of Service An attack that makes a service unavailable by overwhelming it with traffic
  11. Threat A security risk that comes from within the organization
  12. The process of verifying the identity of a user or system
Down
  1. Software that secretly monitors user activity and collects information
  2. A type of attack where fraudulent emails are sent to steal personal information
  3. Software designed to detect and remove malicious software
  4. Authentication A security system requiring more than one method of authentication
  5. A network security system that monitors and controls incoming and outgoing traffic
  6. Engineering Manipulating individuals into divulging confidential information
  7. An isolated testing environment used to run and analyze untrusted programs
  8. A software update that fixes security vulnerabilities
  9. Malware that records keystrokes to steal information
  10. The process of converting data into a secure code to prevent unauthorized access
  11. Control A method of ensuring that only authorized users can access resources
  12. Team A group that simulates attacks to test the security of systems
  13. Software or hardware designed to block unauthorized access to a network
  14. An attack where multiple systems flood the bandwidth of a targeted system

26 Clues: A type of malware disguised as legitimate softwareMalware that records keystrokes to steal informationA software update that fixes security vulnerabilitiesMalware that locks a user’s data until a ransom is paidSoftware designed to damage or disrupt a computer systemA self-replicating malware that spreads through a network...

Mod 11: 1b Cryptography 2025-06-10

Mod 11: 1b Cryptography crossword puzzle
Across
  1. Piece of crypto equipment was for IPv4 & IPv6 networks.KG-175D.
  2. The U.S. Government adopted this standard in 2001,providing encryption using 128, 192, and 256 bits key lengths.
  3. Number of codes the KY-99 can hold.
  4. This fill device is used for proprietary data protocol
  5. A key used to encrypt messages.
  6. Applying these includes Cryptographic solutions, transmission security, emission security & physical security.
  7. This type of key is used for classified and sensitive national security information.
  8. The process of converting information to a disguised form in order to send it across the process of converting information to a disguised form in order to send it across potentially unsafe channel.
  9. The Modern encryption schemes that encryption and decryption keys are the same.
  10. Those who try to "break" a cryptosystem are practicing this.
  11. How NSA ranks cryptographic products or algorithms with a certification.
Down
  1. An a electronic device used primarily by the military for the distribution of cryptographic variables such as Transmission Encryption and Security Keys.
  2. Formed in 1952, This agency took over responsibility for all U.S. Government encryption systems.
  3. Used to secure the link by which the message will travel.
  4. Key type used for unclassified government information and proprietary information.
  5. Purpose is to ensure information pertaining to national security stays out of the wrong hands.
  6. The art & science of making & breaking codes & ciphers.
  7. It Requires a minimum bandwidth of 2400 Hz.
  8. Along with NSA, they prevent foreign adversaries from gaining access to classified national security information.
  9. This Classification of encryption-device category provides Confidential through Top Secret.
  10. The KIV–7 provides traditional bulk encryption for this type of system.
  11. This fill device is forward and backward compatible with equipment and systems.

22 Clues: A key used to encrypt messages.Number of codes the KY-99 can hold.It Requires a minimum bandwidth of 2400 Hz.This fill device is used for proprietary data protocolThe art & science of making & breaking codes & ciphers.Used to secure the link by which the message will travel.Those who try to "break" a cryptosystem are practicing this....

Security 2022-08-16

Security crossword puzzle
Across
  1. A potential for violation of security which exists when there is a circumstance capability action or event that could breach security and cause harm
  2. A computer's inter-network address that is assigned for use by the Internet Protocol and other protocols,
  3. A system entity that provides a service in response to requests from other system entities called clients.
  4. A type of malware that is a form of extortion. It works by encrypting a victim's hard drive denying them access to key files. The victim must then pay a ransom to decrypt the files and gain access to them again
  5. A hidden self-replicating section of computer software usually malicious logic that propagates by infecting
Down
  1. a special high-speed storage mechanism. It can be either a reserved section of main memory or an independent high-speed storage device.
  2. A generic term for a number of different types of malicious code,
  3. A client computer program that can retrieve and display information from servers on the World Wide Web
  4. A logical or physical discontinuity in a network to prevent unauthorized access to data or resources
  5. is whom someone or what something is for example the name by which something is known,

10 Clues: A generic term for a number of different types of malicious code,is whom someone or what something is for example the name by which something is known,A logical or physical discontinuity in a network to prevent unauthorized access to data or resources...

Security 2022-11-23

Security crossword puzzle
Across
  1. floods the end users computer with unwanted advertising
  2. the act of gaining unauthorised illegal access to a computer system
  3. legitimate looking emails sent to fool target users into giving their personal data
Down
  1. malicious programs disguised as some legitimate useful software
  2. viruses that spread to other computers and corrupt the whole network without need for an active host program.
  3. a program that encrypts users data and holds the data hostage until ransom money is paid
  4. a Voicemail message sent to trick users into giving away sensitive data
  5. a malicious program that can monitor users keyboard activity and gain sensitive data
  6. malicious programs that enter users computer without their knowledge and get installed ,
  7. program code that replicates with the intention of deleting or corrupting files aur causing computer malfunction

10 Clues: floods the end users computer with unwanted advertisingmalicious programs disguised as some legitimate useful softwarethe act of gaining unauthorised illegal access to a computer systema Voicemail message sent to trick users into giving away sensitive datalegitimate looking emails sent to fool target users into giving their personal data...

Security 2021-10-20

Security crossword puzzle
Across
  1. personal data to purify the access
  2. collection data
  3. record of events
  4. the procedure to get the access
  5. the process of validating user identity
  6. some you use to enter the resource
Down
  1. to prove that data is correct
  2. provides user identity to the security system
  3. the one who seeks the access
  4. the function of specifying access rights to resources

10 Clues: collection datarecord of eventsthe one who seeks the accessto prove that data is correctthe procedure to get the accesspersonal data to purify the accesssome you use to enter the resourcethe process of validating user identityprovides user identity to the security systemthe function of specifying access rights to resources

Security 2018-03-08

Security crossword puzzle
Across
  1. Who is the 1st security officer
  2. 1st contact for media
  3. Last resort during an active shooter
  4. If you suspect a check is fraudulent where do you send it
  5. First thing you do after a robbery
Down
  1. Where should you store your passwords for security
  2. what form do we hand out to customer who witnessed the robbery
  3. First name of the 2nd security officer
  4. What word do you put in the subject line when sending confidential information for a customer
  5. Keep customers ______ after a robbery

10 Clues: 1st contact for mediaWho is the 1st security officerFirst thing you do after a robberyLast resort during an active shooterKeep customers ______ after a robberyFirst name of the 2nd security officerWhere should you store your passwords for securityIf you suspect a check is fraudulent where do you send it...

Security 2025-05-03

Security crossword puzzle
Across
  1. The color of the bomb threat folder
  2. This person drives a sweet Hummer
  3. What is done to the doors once robber leaves
  4. When we call 911 from a branch phone, this department will call to check in on us
  5. What is the last nose type option on the Robbery Witness Form M054C
  6. Hot chicken joint opening where Carl's Jr used to be
Down
  1. Don't eat these in the fridge unless Russ says its okay
  2. What is the first hair color option on the Robbery Witness Form (M054C)
  3. What the incident teller does with the alarm (according to the Robbery Checklist M423)
  4. The color of the robbery folder

10 Clues: The color of the robbery folderThis person drives a sweet HummerThe color of the bomb threat folderWhat is done to the doors once robber leavesHot chicken joint opening where Carl's Jr used to beDon't eat these in the fridge unless Russ says its okayWhat is the last nose type option on the Robbery Witness Form M054C...

security 2025-01-17

security crossword puzzle
Across
  1. DO NOT let _________ individuals into the banl. ( Public/media)
  2. __________ off area surrounding victim(s) teller window with chairs or trash cans.
  3. Ensure that all tellers ___________ are locked.
  4. distribute ________ sheets to all staff.
  5. Provide support to the affected teller, offer _____ or some other non caffeinated drink.
Down
  1. Wait for the police by the _________.
  2. If anyone is hurt--immediately call 911 to request an _______.
  3. Make sure __________ has been triggered by pulling a second bill trap.
  4. Place "closed due _______" sign on the door.
  5. Call retail operations manager or _______ manager.

10 Clues: Wait for the police by the _________.distribute ________ sheets to all staff.Place "closed due _______" sign on the door.Ensure that all tellers ___________ are locked.Call retail operations manager or _______ manager.If anyone is hurt--immediately call 911 to request an _______.DO NOT let _________ individuals into the banl. ( Public/media)...

Security 2025-09-21

Security crossword puzzle
Across
  1. Control mechanism preventing unauthorized use.
  2. Infrastructure binding public keys to identities.
  3. Process of converting plaintext into ciphertext.
  4. C in the CIA triad; keeping information secret
  5. One-way function producing a fixed-size output.
  6. A in the CIA triad; keeping resources accessible.
Down
  1. Verifying the claimed identity of a user or system.
  2. Digital proof of authenticity and integrity.
  3. Secret input required for encryption or decryption.
  4. I in the CIA triad; keeping information unaltered.

10 Clues: Digital proof of authenticity and integrity.Control mechanism preventing unauthorized use.C in the CIA triad; keeping information secretOne-way function producing a fixed-size output.Process of converting plaintext into ciphertext.Infrastructure binding public keys to identities.A in the CIA triad; keeping resources accessible....

Operation DigiVyuh 2025-01-27

Operation DigiVyuh crossword puzzle
Across
  1. - Scrambling data to keep it safe
  2. - Breaking into computer systems illegally
  3. - Unwanted emails or messages
Down
  1. - Police unit for cyber crime investigations
  2. - Indian law for cyber crimes (abbreviation)
  3. - Tricking people to steal their passwords
  4. - Malicious software that harms computers

7 Clues: - Unwanted emails or messages- Scrambling data to keep it safe- Malicious software that harms computers- Tricking people to steal their passwords- Breaking into computer systems illegally- Police unit for cyber crime investigations- Indian law for cyber crimes (abbreviation)

Cyber Crossword 2022-09-15

Cyber Crossword crossword puzzle
Across
  1. a collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.
  2. A simple form of code for software that can be written in word editors.
  3. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
  4. Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
  5. A computer program that records keystrokes made by a user. This user is typically unaware that their actions are being monitored and that a hacker now has access to passwords and other confidential data.
  6. A secret word or phrase that is used to access a computer system or service.
  7. Software that is in a constant state of updating.
Down
  1. The way in which the identity of a user is confirmed.
  2. Customizable additions to software for extra functionality.
  3. The programs and other operating systems used by a computer.
  4. Worms predate viruses and have infected systems since mainframes were the only computers in existence. Worms are also capable of self-replication and may spread by exploiting flaws in applications or through social engineering.
  5. Software that can only be run for a limited amount of time before it expires.
  6. Code that is embedded into the hardware of a computer.
  7. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
  8. The core of a computer’s operating system that houses the most essential functions of the computer.

15 Clues: Software that is in a constant state of updating.The way in which the identity of a user is confirmed.Code that is embedded into the hardware of a computer.Customizable additions to software for extra functionality.The programs and other operating systems used by a computer.Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto....

Cyber Threats 2021-06-07

Cyber Threats crossword puzzle
Across
  1. intended to cause damage to a computer system, or to steal private information from a computer system
  2. a person, object, or place selected as the aim of an attack
  3. to prevent something, esp. a system, process, from continuing as usual or as expected
  4. a person who secretly collects and reports information about the activities of another country or organization
  5. a period of time when electric power has failed, causing a loss of lights
  6. an act of breaking a rule, law, custom, or practice
  7. the programs that you put into a computer to make it do particular jobs
  8. very powerful, forceful, or effective
Down
  1. the activity of secretly collecting and reporting information, especially secret political, military, business, or industrial information
  2. using or relating to computers and the internet
  3. someone who uses violent action, or threats of violent action, for political purposes
  4. something having value, such as a possession or property, that is owned by a person, business, or organization
  5. information collected for use
  6. an electronic system that allows computer users around the world to communicate with each other or to access information for any purpose
  7. a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems

15 Clues: information collected for usevery powerful, forceful, or effectiveusing or relating to computers and the internetan act of breaking a rule, law, custom, or practicea person, object, or place selected as the aim of an attackthe programs that you put into a computer to make it do particular jobs...

Cyber Threats 2021-06-07

Cyber Threats crossword puzzle
Across
  1. using or relating to computers and the internet
  2. an electronic system that allows computer users around the world to communicate with each other or to access information for any purpose
  3. a person who secretly collects and reports information about the activities of another country or organization
  4. a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems
  5. to prevent something, esp. a system, process, from continuing as usual or as expected
  6. information collected for use
  7. very powerful, forceful, or effective
  8. a person, object, or place selected as the aim of an attack
  9. an act of breaking a rule, law, custom, or practice
Down
  1. intended to cause damage to a computer system, or to steal private information from a computer system
  2. a period of time when electric power has failed, causing a loss of lights
  3. someone who uses violent action, or threats of violent action, for political purposes
  4. the programs that you put into a computer to make it do particular jobs
  5. the activity of secretly collecting and reporting information, especially secret political, military, business, or industrial information
  6. something having value, such as a possession or property, that is owned by a person, business, or organization

15 Clues: information collected for usevery powerful, forceful, or effectiveusing or relating to computers and the internetan act of breaking a rule, law, custom, or practicea person, object, or place selected as the aim of an attackthe programs that you put into a computer to make it do particular jobs...

Cyber bullying 2022-11-11

Cyber bullying crossword puzzle
Across
  1. its them there get bullied.
  2. if many people's like you are...
  3. if you love the photo .... it
  4. if i write something with my friends so i make a ....
  5. its then it not true or unreal.
  6. its the same as account
  7. it opposite of happy.
  8. media many get bullied on it.
Down
  1. a account there only choose people can see your post and videos, so you have a ..... account
  2. if someone keep looking and search for you.
  3. a group there you can chat in.
  4. when your talk and is together much you are....
  5. when you are on the internet
  6. what do you call someone there commented bad things on your post
  7. its a picture you can post.

15 Clues: it opposite of happy.its the same as accountits them there get bullied.its a picture you can post.when you are on the internetif you love the photo .... itmedia many get bullied on it.a group there you can chat in.its then it not true or unreal.if many people's like you are...if someone keep looking and search for you....

Cyber Crime 2023-12-26

Cyber Crime crossword puzzle
Across
  1. บิตคอยน์
  2. ไวรัสทำลายข้อมูล
  3. โปรแกรมอันตราย
  4. การล่อหลอก
  5. การระรานทางไซเบอร์
  6. ข้อมูลขนาดใหญ่
  7. ไวรัสเรียกค่าไถ่
Down
  1. ความมั่นคงปลอดภัยไซเบอร์
  2. เมล์ขยะ
  3. ดักจับข้อมูลการพิมพ์
  4. บล๊อกเชน
  5. ปัญญาประดิษฐ์
  6. ม้าโทรจัน
  7. สปายแวร์
  8. หนอนอินเทอร์เน็ต

15 Clues: เมล์ขยะบิตคอยน์บล๊อกเชนสปายแวร์ม้าโทรจันการล่อหลอกปัญญาประดิษฐ์โปรแกรมอันตรายข้อมูลขนาดใหญ่ไวรัสทำลายข้อมูลหนอนอินเทอร์เน็ตไวรัสเรียกค่าไถ่การระรานทางไซเบอร์ดักจับข้อมูลการพิมพ์ความมั่นคงปลอดภัยไซเบอร์

Cyber Society 2024-04-29

Cyber Society crossword puzzle
Across
  1. A set of instructions or rules followed by a computer to solve a problem or perform a task.
  2. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. A software vulnerability that is exploited by attackers before the software developer becomes aware of it.
  4. Measures taken to protect computer systems and networks from unauthorized access or attacks.
  5. Footprint: The trail of data created by an individual's online activity.
  6. Software intended to damage or disable computers or computer systems.
Down
  1. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, used for criminal activities.
  2. The study of communication and control processes in biological, mechanical, and electronic systems, especially the comparison of these processes in biological and artificial systems.
  3. A person who uses computers to gain unauthorized access to data.
  4. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
  5. Bullying that takes place over digital devices like cell phones, computers, and tablets.
  6. Web: Part of the internet that is not indexed by search engines and often associated with illegal activities.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Reality: A computer-generated simulation of an environment that can be interacted with in a seemingly real or physical way.
  9. Theft: The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.

15 Clues: A person who uses computers to gain unauthorized access to data.Software intended to damage or disable computers or computer systems.Footprint: The trail of data created by an individual's online activity.The process of converting data into a code to prevent unauthorized access....

Cyber Ethics 2025-06-08

Cyber Ethics crossword puzzle
Across
  1. illegal activity carried out using computers orthe internet.
  2. fraudulent messages that trick uses into revealing personal info.
  3. converting data into a secret code to protect it from an authorised access.
  4. installing software on more devices then the licence allows.
  5. rules are principles that help people distinguish right from wrong online.
  6. gaining unauthorised access to someone's computer or data.
  7. a secret string or characters used to access accounts.
  8. security system that blocks on authorised access to or from network.
  9. full program that is spreads and damages computers.
Down
  1. someone who uses technology to harass intimate others.
  2. sending a massive number of email to crash someone's inbox.
  3. anything related to computers, data, or the internet.
  4. a trick or fraud done online to steal money or data.
  5. available network that connects millions of computers.
  6. unique identify used to login to digital platforms.

15 Clues: unique identify used to login to digital platforms.full program that is spreads and damages computers.a trick or fraud done online to steal money or data.anything related to computers, data, or the internet.someone who uses technology to harass intimate others.available network that connects millions of computers....

Cyber Ethics 2025-06-14

Cyber Ethics crossword puzzle
Across
  1. It refers to an illegal intrusion into a computer system or network
  2. Similar to rules
  3. It is a security system that prevents unauthorised people from accessing your system and network
  4. When software is copied and distributed illegally
  5. The simplest way to prevent Plagiarism
  6. It is a malicious software to extract secret information from the target computer
  7. It is an act of sending an email to a user misleading him to believe that it is from a trusted person or organisation
  8. Refers to unwanted bulk emails coming from unknown sources
Down
  1. It refers to being aware of the ethical practices and behaving responsibly and appropriately while using the internet
  2. Criminal activities that is done by internet, computers,etc
  3. Refers to the act of using or imitating the language and thoughts of another person as one's original work.
  4. An act of harming or harrassing a person through information technology in a deliberate manner
  5. Fraudulently obtaining money from depositors by claiming to be an authorised bank or a financial institution
  6. It is the process of transforming data into unreadable code
  7. A set of programs that disrupts the normal functioning of a computer

15 Clues: Similar to rulesThe simplest way to prevent PlagiarismWhen software is copied and distributed illegallyRefers to unwanted bulk emails coming from unknown sourcesCriminal activities that is done by internet, computers,etcIt is the process of transforming data into unreadable codeIt refers to an illegal intrusion into a computer system or network...

Cyber Ethics 2025-06-02

Cyber Ethics crossword puzzle
Across
  1. Unauthorized access to a computer system
  2. Connects your computer to a available network
  3. Harassment or intimidation using online communication
  4. A security system that moniters and controls incoming and outgoing network traffic
  5. The process of verifying the identity of a user or a device
Down
  1. Criminal activity carried out using computers and networks
  2. Softwares that protect against viruses and malware
  3. A message designed to trick you into revealing information
  4. The set of rules for appropriate online communication and behavior
  5. An unauthorized access and/or use of sensitive or confidential data
  6. The process of converting information into a code to protect it from unauthorized access
  7. A strong password should be this
  8. Software designed to cause harm
  9. The right of an individual to control access to their personal information
  10. A malicious software program designed to damage or disrupt a computer system

15 Clues: Software designed to cause harmA strong password should be thisUnauthorized access to a computer systemConnects your computer to a available networkSoftwares that protect against viruses and malwareHarassment or intimidation using online communicationCriminal activity carried out using computers and networks...

Crossword 2017-09-04

Crossword crossword puzzle
Across
  1. An item designed to explode on impact
  2. Two things security officers must protect: _______ and property.
  3. A video surveillance system used for legitimate safety and security purposes
  4. A type of tape used in securing incidences.
  5. Who should you contact if you are unsure of your duty?
  6. Security _______ is a scrutiny of a site’s procedures and systems
  7. A report used for recording crimes / accident
  8. Espionage is the practice of using __________
Down
  1. If you see a suspicious vehicle, you must write down its _________________ plate number
  2. A log/book for writing daily security activities
  3. Most prevalent security threats at the moment
  4. IED is also known as Improvised _________ Device.
  5. A commonly used security communication equipment is a two-way ___________.
  6. One common characteristic of a suspicious person is that he/she constantly licks of his/her _____.
  7. Typically, there will be excessive _____________ on a suspicious parcel.

15 Clues: An item designed to explode on impactA type of tape used in securing incidences.Most prevalent security threats at the momentA report used for recording crimes / accidentEspionage is the practice of using __________A log/book for writing daily security activitiesIED is also known as Improvised _________ Device....

food security 2020-10-08

food security crossword puzzle
Across
  1. a state closely linked with food security
  2. to long-term changes in weather events and patterns worldwide.
  3. the lack of access to enough safe water
  4. the production of food in an urban or highly populated area.
  5. an issue related to the amount of food that is expected to be needed by the year 2050
  6. opposite of security
Down
  1. issue relating to where houses are built and food is grown.
  2. meaning that money that previously could have been used to purchase food no longer holds enough value to do so, thus leaving people in a state of food insecurity due to an inability to access food.
  3. means physical and economic access to food
  4. when people are forced to leave their homes
  5. is food that is produced for human consumption but does not reach the retail stage
  6. involves individuals going through a retailer’s dumpsters/garbage bins/trash cans and retrieving this food for consumption.
  7. means people have enough food of appropriate quality available on a consistent basis.
  8. using food safely and applying knowledge about nutrition, clean water and sanitation when preparing food.
  9. is a state where all people at all times have access to enough safe, nutritious food to sustain a healthy life.
  10. the thing that results in food chains being cut.
  11. is food that is made available in a retail setting and is fit for consumption but is never consumed

17 Clues: opposite of securitythe lack of access to enough safe watera state closely linked with food securitymeans physical and economic access to foodwhen people are forced to leave their homesthe thing that results in food chains being cut.issue relating to where houses are built and food is grown....

Information Security 2020-12-18

Information Security crossword puzzle
Across
  1. positions of authority
  2. keep something safe
  3. someone's right to keep their personal matters secret
  4. computer program
  5. someone allow you to do something
  6. information
  7. connected computers around the world
  8. a set of computer equipment and programs
  9. an arrangement with a bank
Down
  1. you buy something need this
  2. an action that affects someone in an unwanted way
  3. the act of stopping something from happening
  4. a machine
  5. illegal activities
  6. to take something without the permission
  7. a secret word
  8. an illegal plan for tricking people

17 Clues: a machineinformationa secret wordcomputer programillegal activitieskeep something safepositions of authorityan arrangement with a bankyou buy something need thissomeone allow you to do somethingan illegal plan for tricking peopleconnected computers around the worldto take something without the permissiona set of computer equipment and programs...

Security Concept and Threats 2017-09-04

Security Concept and Threats crossword puzzle
Across
  1. One common characteristic of a suspicious person is that he/she constantly licks of his/her _____.
  2. If you see a suspicious vehicle, you must write down its _________________ plate number
  3. Two things security officers must protect: _______ and property.
  4. Who should you contact if you are unsure of your duty?
  5. A report used for recording crimes / accident
  6. Security _______ is a scrutiny of a site’s procedures and systems
  7. Most prevalent security threats at the moment
  8. An item designed to explode on impact (bomb)
Down
  1. A log/book for writing daily security activities
  2. Espionage is the practice of __________
  3. IED is also known as Improvised _________ Device.
  4. Typically, there will be excessive _____________ on a suspicious parcel.
  5. A video surveillance system used for legitimate safety and security purposes
  6. A type of tape used in securing incidences.
  7. A commonly used security communication equipment is a two-way ___________.

15 Clues: Espionage is the practice of __________A type of tape used in securing incidences.An item designed to explode on impact (bomb)A report used for recording crimes / accidentMost prevalent security threats at the momentA log/book for writing daily security activitiesIED is also known as Improvised _________ Device....

Complete the Puzzle & Win an iPad mini from SIX Financial Information! 2013-04-01

Complete the Puzzle & Win an iPad mini from SIX Financial Information! crossword puzzle
Across
  1. Provider of corp. actions & cross reference data
  2. How many decades SIX has been in business?
  3. When the sum of 1 plus 1 might equal three?
  4. What some debtors declare?
  5. Brand of bourbon or one of the AL state birds
  6. Provider of secure financial messaging services
  7. Type of data that describes a security or issuer
  8. Swiss national security ID number
  9. No. times SIX named "Best Corp. Actions Data Provider"
Down
  1. Creator of 15022 and 20022 message standards
  2. Company recently acquired by SunGard
  3. One type of distribution
  4. How many millions of securities in SIX Financial’s DB?
  5. Managing Director of SIX Financial Information USA
  6. Largest city in Alabama
  7. How many global ID schemes cross referenced by SIX
  8. UK security identification scheme
  9. International security ID number
  10. Brendan’s last name

19 Clues: Brendan’s last nameLargest city in AlabamaOne type of distributionWhat some debtors declare?International security ID numberUK security identification schemeSwiss national security ID numberCompany recently acquired by SunGardHow many decades SIX has been in business?When the sum of 1 plus 1 might equal three?...

Travel 2023-04-03

Travel crossword puzzle
Across
  1. waiting
  2. culture
  3. language
  4. lost
  5. train
  6. suitcase
  7. security
  8. beach
Down
  1. ticket
  2. reception
  3. plane
  4. hotel
  5. tourist
  6. checkin
  7. restaurant
  8. friends

16 Clues: lostplanehoteltrainbeachticketwaitingtouristculturecheckinfriendslanguagesuitcasesecurityreceptionrestaurant

title 2025-08-05

title crossword puzzle
Across
  1. Foreign
  2. Finances
  3. Month
  4. Arrested
  5. Crime
  6. Travel
  7. Abuse
  8. Security
Down
  1. Lien
  2. Influence
  3. Contact
  4. Awareness
  5. Cohabitant
  6. Garnish
  7. Debt
  8. Drug

16 Clues: LienDebtDrugMonthCrimeAbuseTravelForeignContactGarnishFinancesArrestedSecurityInfluenceAwarenessCohabitant

:-) 2019-09-20

:-) crossword puzzle
Across
  1. Flaw that occurs when untrusted data is sent to an interpreter as part of a command or query and the attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
  2. Company behind Burp and the Web Security Academy which contains high-quality learning materials, interactive vulnerability labs, and video tutorials.
  3. Flaw that occurs when application functions related to authentication and session management are implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.
  4. Attack using poorly configured XML processors evaluate external entity references within XML documents, which can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.
  5. Set of technologies designed to detect conditions indicative of a security vulnerability in an application in its running state.
  6. This Kubernetes Benchmark is a reference document that can be used by system administrators, security and audit professionals and other IT roles to establish a secure configuration baseline for Kubernetes.
  7. Ericssons model to incorporate security and privacy considerations into all phases of product development.
  8. One of the world’s most popular free security tools for finding security vulnerabilities in web applications.
Down
  1. Flaw exploited to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files, modify other users' data, change access rights, etc.
  2. Cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities.
  3. Set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities.
  4. Recognized as a fundamental human right by the United Nations (UN) in Article 12 of the Universal Declaration of Human Rights
  5. Responsible for Ericsson product vulnerability management process, coordination of customer product security incidents and reported security issues affecting Ericsson products, solutions, and services.
  6. Practice of increasing product security by reducing its attack surface.
  7. Comprehensive, versatile, automated black box fuzzer that enables organizations to efficiently and effectively discover and remediate security weaknesses in software.
  8. A massive playground for you to learn and improve your pen-testing skills.
  9. Software testing technique consisting of finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.

17 Clues: Practice of increasing product security by reducing its attack surface.A massive playground for you to learn and improve your pen-testing skills.Ericssons model to incorporate security and privacy considerations into all phases of product development....

Computing Careers Group Members Name: 2022-05-06

Computing Careers     Group Members Name: crossword puzzle
Across
  1. __________________ create systems to protect information networks and websites from cyber attacks and other security breaches.
  2. __________________ is considered to be one of the most widely recognized forces affecting work and how it is changing.
  3. As a ____________________ you are responsible for creating new programs for an organization.
  4. _________________ are responsible for designing, developing, and testing computer components, such as circuit boards, routers, and memory devices.
  5. They develop and improve the data resources used to store and retrieve critical information.
  6. Individuals who watch over a team of programmers and analysts to complete projects.
Down
  1. ______________ analyze a company's technology needs and oversee the implementation of appropriate data systems.
  2. _________________assess an organization's computer systems and recommend changes to hardware and software to improve the company.
  3. which team installs new software, troubleshoots, and repairs software problems
  4. Which department in an organisation is responsible for the hardware software and network of computers in a company
  5. __________________design, implement, and maintain networking and data communication systems.
  6. ____________________ invent technology that solves complex problems in fields like science, medicine, and business.
  7. They need to be fluent in the computer languages that are used to write the code for programs.
  8. Communication Skills and broad knowledge of technology and computer systems help computer science individuals excel in this role.
  9. Who creates Websites

15 Clues: Who creates Websiteswhich team installs new software, troubleshoots, and repairs software problemsIndividuals who watch over a team of programmers and analysts to complete projects.__________________design, implement, and maintain networking and data communication systems....

Browsing safely 2025-06-01

Browsing safely crossword puzzle
Across
  1. Flying mammal
  2. Has a trunk
  3. Man's best friend
Down
  1. Large marsupial
  2. Likes to chase mice
  3. Hacking, Banking Frauds, Cyber Grooming, Cyber Bullying

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceHacking, Banking Frauds, Cyber Grooming, Cyber Bullying

IT 2030 Puzzle 2025-07-21

IT 2030 Puzzle crossword puzzle
Across
  1. For unleashing the value of data "______ process automation" is a key focus
  2. Per IT2030 strategy, cost savings are reinvested for ___________
  3. "Perform as OneIT" from previous years has now evolved into "Perform as ___"
  4. ______ AI is an important component of Trust by design priority
  5. One of the leads for the priority "create seamless experience" is
  6. 0 business disruption due to cyber incidents is a _____ of trust by design
  7. "Every ______ matters"
  8. ______ five percent of population adopting approved new technology is a measure of pioneering new technologies
Down
  1. Accelerated _______ should be aligned to business value
  2. Create seamless experience involves the following: Positive physical, technology and __________ experience creation
  3. repeatable service should be _______________
  4. Organizational ___-first culture is important for achieving trust by design
  5. "________ new technologies" is a priority under the pillar innovate with purpose
  6. Providing tech thought leadership involves equipping employees for __________
  7. 3% improvement as measured in _________ is the metric for creating seamless experience

15 Clues: "Every ______ matters"repeatable service should be _______________Accelerated _______ should be aligned to business value______ AI is an important component of Trust by design priorityPer IT2030 strategy, cost savings are reinvested for ___________One of the leads for the priority "create seamless experience" is...

Ethical and Social Issues in ICT 2024-06-16

Ethical and Social Issues in ICT crossword puzzle
Across
  1. A form of bullying that occurs through digital devices
  2. An illegal and criminal activity done by using computer and internet technology
  3. The set of technologies that facilitate the sharing of ideas, thoughts, and information through virtual networks and communities
  4. Refers to the responsible use of technology by anyone who uses digital tools
  5. The social issue referring to the differing amount of information between those who have access to the Internet and those who do not
  6. The set of moral principles for using the computer and internet
Down
  1. A type of intellectual property law that grants creators of original works exclusive rights
  2. The laws that prevent cybercrime, legalize electronic transactions, and punish cyber criminals
  3. Challenges of ICT that include virtual identity, security, privacy issues, copyright, social behavior, and digital divide
  4. A type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work
  5. Unauthorized access to computer systems or networks to manipulate or exploit them
  6. A trial of data you create while using the Internet
  7. Technologies that provide access to information through telecommunications
  8. The responsible use of technology by anyone who uses computers, the internet, and digital devices

14 Clues: A trial of data you create while using the InternetA form of bullying that occurs through digital devicesThe set of moral principles for using the computer and internetTechnologies that provide access to information through telecommunicationsRefers to the responsible use of technology by anyone who uses digital tools...

Lá Fhéile Vailintín Faoi Mhaise Duit! 2025-02-15

Lá Fhéile Vailintín Faoi Mhaise Duit! crossword puzzle
Across
  1. Top cyber-security consultant is surrounded by accountant wearing garment used for bath, reflecting drink he brings Úna in the morning (7)
  2. Verbally order sleep as Gaeilge, bringing you this embrace (6)
  3. Announced sudden sharp expulsions of air from the lungs, not typically put in shopping trolleys (6)
  4. Confused IT nerd, and harpist, owe a lot to this app (6)
  5. Mentions eye prior to sin returning, before the average surrounds one, in this place (4, 5)
  6. This flattery rocks (7)
  7. You can't get this on Amazon, hun ... lite is not the word to describe the cocoa in this amazing gift (12)
  8. May be taken out to have a drink somewhere in Ireland (4)
Down
  1. Aah, catch null except for a cailín deas at this society (9)
  2. In the dew, zen Alan is of an Antipodean nation (10)
  3. I have a hunch there's a cur and a dino in this 4,000-year-old fort (12)
  4. Sport played at Wimbledon, topless, in Co. Clare (5)
  5. The third note, and the cable that connects devices, is a great place to eat pizza (5)
  6. YouTuber, linked to podcast addict, visited this hipster capital (6)

14 Clues: This flattery rocks (7)In the dew, zen Alan is of an Antipodean nation (10)Sport played at Wimbledon, topless, in Co. Clare (5)Confused IT nerd, and harpist, owe a lot to this app (6)May be taken out to have a drink somewhere in Ireland (4)Aah, catch null except for a cailín deas at this society (9)...

AI's New Playground: The Good, the Bad, and the Chatbots 2023-10-16

AI's New Playground: The Good, the Bad, and the Chatbots crossword puzzle
Across
  1. Before it was like ChatGPT, it answered "What is...?" on a quiz show. (6)
  2. A nudge for the AI to start talking. (6)
  3. The game where Watson first showed off. (8)
  4. Meta's own chatbot, not an animal. (6) <abbr.>
  5. Not just looking around, but a bureau in North Korea. (13)
  6. Revealing breaches, now with a ticking clock. (9)
  7. Digital gold mined without a pickaxe. (13)
  8. Not fishing, but equally deceptive on voice calls. (7)
  9. A common bait in phishing, but ChatGPT will draft an email with one. (10)
Down
  1. The AI chatbot that started a trend, but doesn't know wrestling. (7)
  2. The future of logging in, sans secret phrase. (11)
  3. Target of a recent cyber heist. (9)
  4. Llama 2 reminds you of this when you cross the line. (5, 2, 7)
  5. Not Hollywood's worst, but cyber culprits causing digital chaos. (9)
  6. Social media giant turned AI racer. (4)

15 Clues: Target of a recent cyber heist. (9)Social media giant turned AI racer. (4)A nudge for the AI to start talking. (6)Digital gold mined without a pickaxe. (13)The game where Watson first showed off. (8)Meta's own chatbot, not an animal. (6) <abbr.>Revealing breaches, now with a ticking clock. (9)The future of logging in, sans secret phrase. (11)...

Chapter 12 - Non-State Actors - Study Crossword 2023-11-09

Chapter 12 - Non-State Actors - Study Crossword crossword puzzle
Across
  1. Author synonymous with a criminal coder.
  2. Cyber terrorist are likely to choose targets that are publicly _____.
  3. 2008-09 Worm that recruited devices into a botnet without the control of an operator to guide it.
  4. Hackers generally tied to national conflicts.
  5. A "kiddie" that is the most common of non-state attackers.
Down
  1. In the technical industry they are often well-organized and have highly trained employees.
  2. Motivation is entirely political or religious in nature.
  3. Cyber terrorist are likely to choose targets that are highly _____.
  4. IDS, Intrusion _____System
  5. Motivations of organized crime are _____ and power.
  6. Attackers with no regard for the rule of law or disruption caused.
  7. Considered the lowest of the low attacker. Seeks PII

12 Clues: IDS, Intrusion _____SystemAuthor synonymous with a criminal coder.Hackers generally tied to national conflicts.Motivations of organized crime are _____ and power.Considered the lowest of the low attacker. Seeks PIIMotivation is entirely political or religious in nature.A "kiddie" that is the most common of non-state attackers....

Simon's January News Crossword Puzzle 2014-01-15

Simon's January News Crossword Puzzle crossword puzzle
Across
  1. MLB player suspended for a year for usage of performance enhancing drugs. Alex Rodriguez
  2. What is the Ford's new F-150's body frame made out of?
  3. How many school shootings took place in United State in January?
  4. What US government agency implanted radio frequency software in thousands of computers which can be wrongfully used for cyber attacks.
  5. 11th Prime Minister of Israel who died on January 11, 2014 (Israel Time).
  6. Which company have to pay 32.5 million dollar to the US Federal Trade Commission for allowing children to purchase applications without their parents consent.
Down
  1. Whose staffs are under scrutiny of closing bridges for political revenge.
  2. What is the name of the a guy that was allowed to take his pipe bomb even after Canadian Air Transport Security Authority in Edmonton noticed the explosive.
  3. Who won the Ballon d'Or.
  4. What does the US Senate says about the attack on Benghazi American diplomatic Mission that took place in September 11~12, 2012.
  5. Who won the best picture in drama for the 2014 Golden Globe Award
  6. Colorado and Washington State legalize this "drug" for recreational use.

12 Clues: Who won the Ballon d'Or.What is the Ford's new F-150's body frame made out of?How many school shootings took place in United State in January?Who won the best picture in drama for the 2014 Golden Globe AwardColorado and Washington State legalize this "drug" for recreational use....

Safe Online 2017-10-04

Safe Online crossword puzzle
Across
  1. the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc
  2. a humorous or malicious trick
  3. someone who seeks to breach defenses and exploit weaknesses in a computer system or network
  4. a string of characters that allows access to a computer, interface, or system
  5. a copy of a file or other item of data made in case the original is lost or damaged.
  6. a type of Internet-based computing," where different services — such as servers, storage and applications — are delivered to an organization's computers and devices through the Internet.
  7. a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
Down
  1. (of software) designed to detect and destroy computer viruses.
  2. a software function that completes words or strings without the user needing to type them in full.
  3. a form of criminal activity using social engineering techniques.
  4. a program designed to attack the security of a computer system while ostensibly performing some innocuous function.
  5. a cyber attack intended to redirect a website's traffic to another, fake site

12 Clues: a humorous or malicious trick(of software) designed to detect and destroy computer viruses.a form of criminal activity using social engineering techniques.a cyber attack intended to redirect a website's traffic to another, fake sitea string of characters that allows access to a computer, interface, or system...

Security Concept and Threats 2017-09-04

Security Concept and Threats crossword puzzle
Across
  1. A commonly used security communication equipment is a two-way ___________.
  2. Who should you contact if you are unsure of your duty?
  3. An item designed to explode on impact (bomb)
  4. A report used for recording crimes / accident
  5. If you see a suspicious vehicle, you must write down its _________________ plate number
  6. One common characteristic of a suspicious person is that he/she constantly licks of his/her _____.
Down
  1. Most prevalent security threats at the moment
  2. A log/book for writing daily security activities
  3. Typically, there will be excessive _____________ on a suspicious parcel.
  4. IED is also known as Improvised _________ Device.
  5. A type of tape used in securing incidences.
  6. A video surveillance system used for legitimate safety and security purposes
  7. Security _______ is a scrutiny of a site’s procedures and systems
  8. Two things security officers must protect: _______ and property.
  9. Espionage is the practice of __________

15 Clues: Espionage is the practice of __________A type of tape used in securing incidences.An item designed to explode on impact (bomb)Most prevalent security threats at the momentA report used for recording crimes / accidentA log/book for writing daily security activitiesIED is also known as Improvised _________ Device....

ICUK Final 2024-10-15

ICUK Final crossword puzzle
Across
  1. Prefix for attack or security(5)
  2. Magic words for entry(8)
  3. Turn off and on again(6)
  4. A defence mechanism against enthusiastic bonfires(8)
  5. A diet-friendly eye exam(5,5)
  6. Popular website builder(9)
  7. A generic name for digital lines(3)
  8. Best wholesale ISP(4)
  9. Core links in a network(8)
  10. When your morning alarm goes off(6)
  11. The sound a microwave makes(4)
  12. Protocol for authenticating users accessing a network(6)
  13. Throwing a party for spiders(3,7)
  14. One touch is all it takes(6)
  15. A hairnet for ghosts(8)
  16. Love them or loathe them, we need to work with them(9)
  17. Father of computing(4,6)
  18. Technology that increases the capacity of optical fibre(4)
Down
  1. 3 golf courses and 2 Michelin stars(10)
  2. walking while on the phone and trip over(4,8)
  3. A discreet way to drink tea from a tree(3,5)
  4. Starting with the ball(6)
  5. An eclectic musical ensemble(9)
  6. Go for this if you are in a challenging area(8)
  7. The result of drinking too much coffee before a phone call(6)
  8. Angling is a version of this activity(8)
  9. Say goodbye in 2027(4)
  10. A mobile device made of marshmallow(9)
  11. Maximum rate of data transfer(9)
  12. A gateway between networks(6)
  13. Not FTTC(5)
  14. A weightlifting session for people with low energy(8)

32 Clues: Not FTTC(5)Best wholesale ISP(4)Say goodbye in 2027(4)A hairnet for ghosts(8)Magic words for entry(8)Turn off and on again(6)Father of computing(4,6)Starting with the ball(6)Popular website builder(9)Core links in a network(8)One touch is all it takes(6)A diet-friendly eye exam(5,5)A gateway between networks(6)The sound a microwave makes(4)...

6E On the plane 2023-01-12

6E On the plane crossword puzzle
Across
  1. luggage
  2. X-ray
  3. abroad
  4. helpful
  5. various
  6. reach
  7. tour
  8. fare
  9. previous
  10. security
  11. negotiate
  12. certain
Down
  1. crew
  2. duty-free
  3. manage
  4. passport
  5. announce
  6. flight
  7. clerk
  8. hitch-hike
  9. van
  10. following
  11. path
  12. excursion
  13. useful
  14. coastal

26 Clues: vancrewtourfarepathX-rayclerkreachmanageabroadflightusefulluggagehelpfulvariouscertaincoastalpassportannounceprevioussecurityduty-freefollowingexcursionnegotiatehitch-hike

Noodle Shop Mix Up 2018-12-27

Noodle Shop Mix Up crossword puzzle
Across
  1. One guest appearance with a ball or maybe it was Pogba
  2. Kid who supposedly knows hot to play footie but can't even score
  3. Chef with the ugly gf
  4. Salah special
  5. Buff security guard
  6. Guess(clue:mashupofallthenames)
  7. Rival kitchen (Clue/: The New Poohole)
  8. Main chef of the new Poohole
  9. God security guard(newly hired and not Zlatan)
  10. If he falls, gets ______ down
  11. Other kid sorry
  12. Yes you have to know the poohole managers name
  13. What the whole series is based on
Down
  1. Band by the two pipsqueaks
  2. The Real God
  3. MasterChef master faller, the only one who should dive
  4. Security
  5. Noodles in the box,he has chicken feet
  6. Chef who is friends with the GOAT
  7. The name of the delivery service
  8. Wrecking ball security guard
  9. Some ugly Englishman who dives
  10. Collective name of the pipsqueaks who hang around and help?

23 Clues: SecurityThe Real GodSalah specialOther kid sorryBuff security guardChef with the ugly gfBand by the two pipsqueaksWrecking ball security guardMain chef of the new PooholeIf he falls, gets ______ downSome ugly Englishman who divesGuess(clue:mashupofallthenames)The name of the delivery serviceChef who is friends with the GOAT...

Security Wise 2022-07-07

Security Wise crossword puzzle
Across
  1. Get rid of a security threat
  2. Joining hands
  3. Keeping you safe and free from injury, damage, or loss when appropriate security actions are taken
  4. Our Corporation
  5. Your security partner
Down
  1. Watch carefully
  2. Look for anomaly
  3. Say it
  4. Unlawful acts causing enormous damages & casualties
  5. Your mindset when handling a security situation
  6. Respond calmly
  7. Have a security sense in mind

12 Clues: Say itJoining handsRespond calmlyWatch carefullyOur CorporationLook for anomalyYour security partnerGet rid of a security threatHave a security sense in mindYour mindset when handling a security situationUnlawful acts causing enormous damages & casualties...

Win an iPad mini from SIX Financial Information! 2013-03-21

Win an iPad mini from SIX Financial Information! crossword puzzle
Across
  1. When the sum of two might equal three?
  2. Largest city in Alabama
  3. Managing Director of SIX Financial Information USA
  4. Type of data that describes a security or an issuer
  5. International security ID number
  6. What some debtors declare?
  7. how many times SIX won award for "best corporate actions data provider"
  8. Creator of 15022 and 20022 message standards
  9. One type of distribution
Down
  1. Company recently acquired by SunGard
  2. How many millions of securities in SIX Financial’s DB?
  3. how many national and international ID schemes cross referenced by SIX
  4. Brand of bourbon or one of the AL state birds
  5. Brendan’s last name
  6. When an issuer buys back securities?
  7. How many decades SIX has been in business?
  8. Swiss national security ID number
  9. Provider of secure financial messaging services
  10. UK security identification scheme
  11. Company that provides corp. actions and cross reference data

20 Clues: Brendan’s last nameLargest city in AlabamaOne type of distributionWhat some debtors declare?International security ID numberSwiss national security ID numberUK security identification schemeCompany recently acquired by SunGardWhen an issuer buys back securities?When the sum of two might equal three?How many decades SIX has been in business?...

How much do you know? 2015-04-22

How much do you know? crossword puzzle
Across
  1. The practice of setting up a fictitious online profile, most often for the purpose of luring another into a fraudulent romantic relationship
  2. A verbal attack targeting someone because of their race, gender, religion and/or sexual orientation
  3. Suicide resulting directly or indirectly from cyberbullying victimization
  4. Repeated harassment using electronic devices and networked technology that includes threats of harm, or that is highly intimidating
  5. Is using images/material of another without their approval and/or permission
  6. Electronic material that specifically raises concerns that may intent to inflict harm or violence to others or to himself
Down
  1. The sending or receiving of sexually/explicit or sexually-suggestive images or videos via phone or the internet
  2. sending or posting hostile messages intended to "inflame the emotions of others”
  3. The unofficial rules of accepted proper online social conduct
  4. rituals involving harassment, abuse or humiliation used as a way of initiating a person into a group
  5. Hiding behind social media to fight against or to retaliate negative comments. Could also be used to provoke others into a virtual fight.
  6. Stealing someone's password and/or hijacking their online accounts to post incriminating or humiliating information
  7. A cyber predator who uses the Internet to hunt for victims to take advantage of ANY way
  8. Deliberately posting information to entice genuinely helpful people to respond (often emotionally)
  9. recording someone being harassed or bullied then posting the video online for public viewing

15 Clues: The unofficial rules of accepted proper online social conductSuicide resulting directly or indirectly from cyberbullying victimizationIs using images/material of another without their approval and/or permissionsending or posting hostile messages intended to "inflame the emotions of others”...

IR Theory Realism 2021-05-27

IR Theory Realism crossword puzzle
Across
  1. the means by which a state tries to
  2. discipline since the end of
  3. he wrote Twenty Years' Crisis.
  4. the central and most important actors of
  5. he wrote the book: Politics among
  6. of organizing the relations
  7. Man's best friend
  8. Large marsupial
  9. Second World War.
Down
  1. scholars.
  2. its security decrease the
  3. Has a trunk
  4. Flying mammal
  5. politics according the the
  6. Likes to chase mice
  7. of others
  8. the dominant theory of International
  9. the absence of a superior authority
  10. sovereign units.

19 Clues: scholars.of othersHas a trunkFlying mammalLarge marsupialsovereign units.Man's best friendSecond World War.Likes to chase miceits security decrease thediscipline since the end ofof organizing the relationspolitics according the thehe wrote Twenty Years' Crisis.he wrote the book: Politics amongthe means by which a state tries to...

IT 2030 Puzzle 2025-07-21

IT 2030 Puzzle crossword puzzle
Across
  1. For unleashing the value of data "______ process automation" is a key focus
  2. Per IT2030 strategy, cost savings are reinvested for ___________
  3. "Perform as OneIT" from previous years has now evolved into "Perform as ___"
  4. ______ AI is an important component of Trust by design priority
  5. One of the leads for the priority "create seamless experience" is
  6. 0 business disruption due to cyber incidents is a _____ of trust by design
  7. "Every ______ matters"
  8. ______ five percent of population adopting approved new technology is a measure of pioneering new technologies
Down
  1. Accelerated _______ should be aligned to business value
  2. Create seamless experience involves the following: Positive physical, technology and __________ experience creation
  3. repeatable service should be _______________
  4. Organizational ___-first culture is important for achieving trust by design
  5. "________ new technologies" is a priority under the pillar innovate with purpose
  6. Providing tech thought leadership involves equipping employees for __________
  7. 3% improvement as measured in _________ is the metric for creating seamless experience

15 Clues: "Every ______ matters"repeatable service should be _______________Accelerated _______ should be aligned to business value______ AI is an important component of Trust by design priorityPer IT2030 strategy, cost savings are reinvested for ___________One of the leads for the priority "create seamless experience" is...

TTS REVOLUSI INDUSTRI 2025-09-22

TTS REVOLUSI INDUSTRI crossword puzzle
Across
  1. Era marketing yang menekankan komunitas, keberlanjutan, dan tanggung jawab sosial
  2. Era marketing yang berorientasi pada produk
  3. Revolusi Industri ketiga ditandai dengan hadirnya komputer dan otomatisasi
  4. Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan
Down
  1. Revolusi Industri kedua ditandai dengan penggunaan listrik secara luas
  2. Era marketing yang memakai teknologi canggih untuk meningkatkan pengalaman manusia
  3. Era marketing yang menggabungkan pemasaran tradisional dengan dunia digital
  4. Revolusi Industri keempat dikenal dengan istilah cyber physical system
  5. Revolusi Industri pertama ditandai dengan penemuan mesin uap
  6. Era marketing yang berfokus pada kebutuhan dan keinginan konsumen

10 Clues: Era marketing yang berorientasi pada produkRevolusi Industri pertama ditandai dengan penemuan mesin uapEra marketing yang berfokus pada kebutuhan dan keinginan konsumenEra marketing yang menekankan aspek nilai, emosi, dan kemanusiaanRevolusi Industri kedua ditandai dengan penggunaan listrik secara luas...

stock market 2020-10-31

stock market crossword puzzle
Across
  1. actively traded stocks
  2. intraday orders
  3. buy or sell a security immediately
  4. object of attention
  5. prize movement
  6. decline of 10% in the price of a security
  7. where investors make regular payment
  8. trading strategy
  9. shares a company has issued to the public
  10. trading style
Down
  1. a high volume of activity in a market
  2. buy or sell a stock
  3. fearless brown animal
  4. highly-priced stocks
  5. non-intraday product
  6. dispersion of returns for a given security
  7. ideal option for investors
  8. benchmark index of india
  9. male obvine animal
  10. unanticipated drop in stock prices

20 Clues: trading styleprize movementintraday orderstrading strategymale obvine animalbuy or sell a stockobject of attentionhighly-priced stocksnon-intraday productfearless brown animalactively traded stocksbenchmark index of indiaideal option for investorsbuy or sell a security immediatelyunanticipated drop in stock prices...

Jream H. 2021-03-17

Jream H. crossword puzzle
Across
  1. - to surf the internet
  2. - Tv channel
  3. - to chat
  4. - to download
  5. - App
  6. - Radio set
  7. - Wireless connection
  8. - text message
  9. - Television set
  10. - cd
  11. - Network
  12. - Cyber cafe
  13. - Browser
  14. - Website
  15. - to ring
  16. - to call
  17. - Computer monitor
Down
  1. - remote control
  2. - Screen
  3. - to print
  4. - File
  5. - Cell phone
  6. - email address
  7. - Laptop
  8. - Mouse
  9. - to scan
  10. - printer
  11. - Voicemail
  12. - Keyboard
  13. - Blog
  14. - Charger

31 Clues: - cd- App- File- Blog- Mouse- Screen- Laptop- to chat- to scan- printer- Network- Browser- Charger- Website- to ring- to call- to print- Keyboard- Voicemail- Radio set- Tv channel- Cell phone- Cyber cafe- to download- text message- email address- remote control- Television set- Computer monitor- Wireless connection- to surf the internet

Cashless Society 2024-09-03

Cashless Society crossword puzzle
Across
  1. medium of exchange
  2. seller of goods
  3. a statement of charges
  4. small metal currency
  5. financial records
  6. system of money
  7. reduced amount
  8. no physical money involved
  9. exchange of goods or money
  10. transaction of money
Down
  1. goods for sale
  2. concealing illegal funds
  3. betting activity
  4. cyber criminals
  5. remove funds from account
  6. earning on deposit
  7. institution for money
  8. people who purchase
  9. people who buy
  10. physical money

20 Clues: goods for salepeople who buyreduced amountphysical moneycyber criminalsseller of goodssystem of moneybetting activityfinancial recordsmedium of exchangeearning on depositpeople who purchasesmall metal currencytransaction of moneyinstitution for moneya statement of chargesconcealing illegal fundsremove funds from accountno physical money involved...

Technology 2022-11-26

Technology crossword puzzle
Across
  1. hiện thực
  2. sự phát triển
  3. nghiện
  4. xa lánh
  5. thiết bị cầm tay
  6. giao thiệp
  7. hiện đại
  8. phát minh
  9. sự ảnh hưởng
Down
  1. kĩ thuật số
  2. rành công nghệ
  3. thụ động
  4. hiện tượng nghiện mạng
  5. quá phụ thuộc vào
  6. công nghệ
  7. tương tác
  8. ảo, không thực
  9. đắm chìm vào

18 Clues: nghiệnxa lánhthụ độnghiện đạihiện thựccông nghệtương tácphát minhgiao thiệpkĩ thuật sốđắm chìm vàosự ảnh hưởngsự phát triểnrành công nghệảo, không thựcthiết bị cầm tayquá phụ thuộc vàohiện tượng nghiện mạng

cycber bullying 2024-11-08

cycber bullying crossword puzzle
Across
  1. retrieves information from other parts of the web and displays it on your desktop or mobile device.
  2. to act as a detective
  3. the act of posting insults, often including profanity or other offensive language, on the internet.
  4. Treating someone unfairly
  5. web connected the world in a way that made it much easier for people to get information, share, and communicate
Down
  1. to make sur that one can get in
  2. a way cyber criminals trick you into giving them personal information.
  3. teasing someone
  4. change the internet password for cyber safety
  5. Uniform Resource Locator

10 Clues: teasing someoneto act as a detectiveUniform Resource LocatorTreating someone unfairlyto make sur that one can get inchange the internet password for cyber safetya way cyber criminals trick you into giving them personal information.retrieves information from other parts of the web and displays it on your desktop or mobile device....

TTS REVOLUSI INDUSTRI 2025-09-22

TTS REVOLUSI INDUSTRI crossword puzzle
Across
  1. Revolusi Industri kedua ditandai dengan penggunaan listrik secara luas
  2. Era marketing yang memakai teknologi canggih untuk meningkatkan pengalaman manusia
  3. Revolusi Industri ketiga ditandai dengan hadirnya komputer dan otomatisasi
  4. Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan
Down
  1. Era marketing yang menekankan komunitas, keberlanjutan, dan tanggung jawab sosial
  2. Revolusi Industri keempat dikenal dengan istilah cyber physical system
  3. Era marketing yang berfokus pada kebutuhan dan keinginan konsumen
  4. Era marketing yang menggabungkan pemasaran tradisional dengan dunia digital
  5. Era marketing yang berorientasi pada produk
  6. Revolusi Industri pertama ditandai dengan penemuan mesin uap

10 Clues: Era marketing yang berorientasi pada produkRevolusi Industri pertama ditandai dengan penemuan mesin uapEra marketing yang berfokus pada kebutuhan dan keinginan konsumenEra marketing yang menekankan aspek nilai, emosi, dan kemanusiaanRevolusi Industri keempat dikenal dengan istilah cyber physical system...

Globalisasi 2023-09-07

Globalisasi crossword puzzle
Across
  1. gejala sosial ketdksesuaian unsur berbeda
  2. KEJAHATAN DUNIA MAYA
  3. ISTRI BERSUAMI BANYAK
  4. DAMPAK PEMBANGUNAN
  5. PEMISAHAN DUNIA DGN AGAMA
  6. PAHAM KENIKMATAN
Down
  1. TINDAKAN MELAWAN HUKUM
  2. PENEMUAN HASIL KEBUDAYAAN BARU
  3. PENEMUAN BARU DIAKUI
  4. tanpa norma
  5. MENIRU GAYA HIDUP BARAT
  6. dunia tanpa batas
  7. keadaan kacau
  8. ORGANISASI DAGANG DUNIA

14 Clues: tanpa normakeadaan kacauPAHAM KENIKMATANdunia tanpa batasDAMPAK PEMBANGUNANPENEMUAN BARU DIAKUIKEJAHATAN DUNIA MAYAISTRI BERSUAMI BANYAKTINDAKAN MELAWAN HUKUMMENIRU GAYA HIDUP BARATORGANISASI DAGANG DUNIAPEMISAHAN DUNIA DGN AGAMAPENEMUAN HASIL KEBUDAYAAN BARUgejala sosial ketdksesuaian unsur berbeda

CyberMe 2023 2023-06-22

CyberMe 2023 crossword puzzle
Across
  1. Type of data classification used in this business
  2. tool used to check cyber score monthly
  3. Cyber Policy - ***** our information
Down
  1. Approved tool for sharing information
  2. Type of stick we should not use, especially free or promotional
  3. Document type that has the most valuable information
  4. Type of passwords that should be used for every account
  5. Scam email asking for personal information

8 Clues: Cyber Policy - ***** our informationApproved tool for sharing informationtool used to check cyber score monthlyScam email asking for personal informationType of data classification used in this businessDocument type that has the most valuable informationType of passwords that should be used for every account...

Crossword Puzzle - All about Security ONE 2020-10-07

Crossword Puzzle - All about Security ONE crossword puzzle
Across
  1. The best thing about Security ONE?
  2. the only person with a 3 letter name
  3. When Security One bought Alliance – what street was it on?
  4. The newlywed
  5. A retiree
  6. Who has a hyphenated name?
  7. Person with the most dogs
  8. Someone who has 3 boys
  9. The dept that never sleeps
  10. One of the ones who started it all
  11. Type of car Tyler drives
  12. Our building was formerly owned by
  13. One of most common names at Security One
  14. Who has the most children?
Down
  1. Number of years have we been in this building
  2. Someone who loves boating
  3. Whose kids live the furthest away?
  4. Latest in technology
  5. Someone who has two girls
  6. The only girl in London
  7. Street Dave lives on
  8. The crochet queen
  9. One of our owners who left
  10. Where is the current Security ONE located?

24 Clues: A retireeThe newlywedThe crochet queenLatest in technologyStreet Dave lives onSomeone who has 3 boysThe only girl in LondonType of car Tyler drivesSomeone who loves boatingSomeone who has two girlsPerson with the most dogsWho has a hyphenated name?The dept that never sleepsOne of our owners who leftWho has the most children?...

Secured Connections 2025-07-03

Secured Connections crossword puzzle
Across
  1. Provides a safe environment to analyze suspicious files
  2. Are key to redundant and primary links to branch offices and campuses alike. Housing these devices under the same security umbrella as the rest of the network ensures common configuration, thereby reducing the attack surface
  3. Security solutions that continuously monitor all user and endpoint activities to protect them from threats and detect suspicious behavior. They also offer investigation and incident response capabilities, which eradicate the threat and isolate the affected system from impacting the rest of the network
  4. Allows organizations to stop domain-based attacks
  5. Help organizations protect sensitive information by preventing employees from sharing, uploading, or printing it unsafely
  6. These solutions typically include authentication mechanisms, such as usernames and passwords, as well as measures to verify the security posture of devices before granting access
  7. A kind of network security protocol that is mainly used to ensure the security of internet connections and sensitive data. This protocol supports both server/client and server/server communication
  8. Defends against attacks which aim to overwhelm the corporate network and disrupt operations
  9. Blocks known malware threats
  10. Implement encryption protocols and authentication mechanisms, protecting data in transit. They also support access control lists (ACLs), restricting unauthorized devices from connecting to the network
Down
  1. Unlike traditional security like VPNs that give full network access, they only offer users the specific permissions they need for their roles
  2. Allow users to securely access the corporate network from outside their organization’s office
  3. Network security technology that allows users to establish a secure and encrypted connection over a public network, such as the Internet
  4. Provides secure, reliable connectivity between branch and remote locations
  5. Divides network traffic into categories and simplifies enforcing security policies. It focuses on endpoint identity rather than just IP addresses
  6. Helps you manage and protect your entire setup, whether your data and apps are on-premises or not. This includes your data center's servers and storage, IoT devices in your warehouse, remote laptops, phones, and even employees at branch locations
  7. A network security system that monitors and controls incoming and outgoing network traffic based on configurable security rules
  8. Proactively identify and prevent potential threats from infliltrating a network. They can detect and block suspicious or malicious activities by montoring network traffic and anaylyzing patterns in real-time

18 Clues: Blocks known malware threatsAllows organizations to stop domain-based attacksProvides a safe environment to analyze suspicious filesProvides secure, reliable connectivity between branch and remote locationsDefends against attacks which aim to overwhelm the corporate network and disrupt operations...

E-money 2021-02-19

E-money crossword puzzle
Across
  1. funding
  2. by cheque or credit card
  3. Mania
  4. one thousand billion
  5. virtual
  6. failure of a company
  7. reach
  8. Cryptocurrency
  9. opposed to sell
  10. money devoted to something
  11. well off
Down
  1. likely to explode
  2. restrict by law
  3. support
  4. go up rapidly
  5. perspectives
  6. strong belief
  7. cost to purchase something
  8. decline
  9. it doesn't bring happiness
  10. cautious
  11. possibility
  12. don't break into it !
  13. possessions
  14. financial value

25 Clues: Maniareachsupportfundingdeclinevirtualcautiouswell offpossibilitypossessionsperspectivesgo up rapidlystrong beliefCryptocurrencyrestrict by lawopposed to sellfinancial valuelikely to explodeone thousand billionfailure of a companydon't break into it !by cheque or credit cardcost to purchase somethingit doesn't bring happiness...

Noodle Shop Mix Up 2018-12-27

Noodle Shop Mix Up crossword puzzle
Across
  1. One guest appearance with a ball or maybe it was Pogba
  2. Kid who supposedly knows hot to play footie but can't even score
  3. Chef with the ugly gf
  4. Salah special
  5. Buff security guard
  6. Guess(clue:mashupofallthenames)
  7. Rival kitchen (Clue/: The New Poohole)
  8. Main chef of the new Poohole
  9. God security guard(newly hired and not Zlatan)
  10. If he falls, gets ______ down
  11. Other kid sorry
  12. Yes you have to know the poohole managers name
  13. What the whole series is based on
Down
  1. Band by the two pipsqueaks
  2. The Real God
  3. MasterChef master faller, the only one who should dive
  4. Security
  5. Noodles in the box,he has chicken feet
  6. Chef who is friends with the GOAT
  7. The name of the delivery service
  8. Wrecking ball security guard
  9. Some ugly Englishman who dives
  10. Collective name of the pipsqueaks who hang around and help?

23 Clues: SecurityThe Real GodSalah specialOther kid sorryBuff security guardChef with the ugly gfBand by the two pipsqueaksWrecking ball security guardMain chef of the new PooholeIf he falls, gets ______ downSome ugly Englishman who divesGuess(clue:mashupofallthenames)The name of the delivery serviceChef who is friends with the GOAT...

Cryptology 2024-11-14

Cryptology crossword puzzle
Across
  1. Converting encrypted data back into readable text
  2. Translating a secret message into regular text
  3. a way to disguise texts
  4. Protection against threats or harm
  5. Converting information into a secure code
  6. The study of braking codes and ciphers
  7. A German cipher device used in WW2
  8. Rules made to keep a system safe
  9. Gathering information secretively
  10. exchange of information between people or things
Down
  1. confirming identity
  2. A secret code used for security
  3. When it isn’t really random but looks like it is
  4. A blockchain-based platform specializing in the creation, issuance, and management of security tokens.
  5. process of writing software instructions
  6. An encryption technique using multiple alphabet shifts
  7. How often something occurs or repeats
  8. The theory that the security of a system should depend on the key, not the algorithm
  9. a branch of math dealing with counting and arrangements
  10. the steps you use to complete a task

20 Clues: confirming identitya way to disguise textsA secret code used for securityRules made to keep a system safeGathering information secretivelyProtection against threats or harmA German cipher device used in WW2the steps you use to complete a taskHow often something occurs or repeatsThe study of braking codes and ciphers...

FNAF 2025-12-07

FNAF crossword puzzle
Across
  1. Night guard’s limited resource in FNaF 1
  2. Afton's digital counterpart
  3. Molten version of Ennard
  4. The security tool used to check hallways and rooms
  5. Company responsible for the animatronics
  6. The puppet-like guardian of the spirits
  7. Location of the scooper machine
  8. Pink-and-white fox animatronic from Sister Location
  9. Version of Freddy seen in FNaF 2
  10. Main antagonist known as the “Purple Guy”
  11. The haunted bear who appears slumped in a chair
Down
  1. Name of the giant mall in Security Breach
  2. Term for the violent accident involving animatronic jaws
  3. Chica’s signature food item
  4. The animatronics' internal metal framework
  5. Nickname for the animatronic that mimics others in Security Breach
  6. Balloon-carrying childlike animatronic
  7. Freddy’s “glam” redesign in Security Breach
  8. Animatronic with a cupcake companion
  9. Mysterious substance said to contain souls
  10. Fox-themed animatronic who lives in Pirate Cove
  11. Afton’s daughter who becomes Circus Baby

22 Clues: Molten version of EnnardChica’s signature food itemAfton's digital counterpartLocation of the scooper machineVersion of Freddy seen in FNaF 2Animatronic with a cupcake companionBalloon-carrying childlike animatronicThe puppet-like guardian of the spiritsNight guard’s limited resource in FNaF 1Company responsible for the animatronics...

TTS REVOLUSI INDUSTRI 2025-09-22

TTS REVOLUSI INDUSTRI crossword puzzle
Across
  1. Revolusi Industri kedua ditandai dengan penggunaan listrik secara luas
  2. Era marketing yang memakai teknologi canggih untuk meningkatkan pengalaman manusia
  3. Revolusi Industri ketiga ditandai dengan hadirnya komputer dan otomatisasi
  4. Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan
Down
  1. Era marketing yang menekankan komunitas, keberlanjutan, dan tanggung jawab sosial
  2. Revolusi Industri keempat dikenal dengan istilah cyber physical system
  3. Era marketing yang berfokus pada kebutuhan dan keinginan konsumen
  4. Era marketing yang menggabungkan pemasaran tradisional dengan dunia digital
  5. Era marketing yang berorientasi pada produk
  6. Revolusi Industri pertama ditandai dengan penemuan mesin uap

10 Clues: Era marketing yang berorientasi pada produkRevolusi Industri pertama ditandai dengan penemuan mesin uapEra marketing yang berfokus pada kebutuhan dan keinginan konsumenEra marketing yang menekankan aspek nilai, emosi, dan kemanusiaanRevolusi Industri keempat dikenal dengan istilah cyber physical system...

37 2024-06-21

37 crossword puzzle
Across
  1. Clear malt beverage
  2. Loosefitting pants trend
  3. Body modification trend
  4. Citrusflavored soda
  5. Soda with floating beads
  6. Candy on a stick
  7. Popular headwear
  8. Highcaffeine cola
  9. Rollup fruit snack
  10. Bracelet that snaps around wrist
Down
  1. Plaid shirts trend
  2. Pop music groups
  3. Seattlebased music style
  4. Online discussion forums
  5. Hair accessory
  6. Permanent body art
  7. Online relationship or date
  8. Trend of body adornment
  9. Precellphone communication device
  10. Allnight dance parties

20 Clues: Hair accessoryPop music groupsCandy on a stickPopular headwearHighcaffeine colaPlaid shirts trendPermanent body artRollup fruit snackClear malt beverageCitrusflavored sodaAllnight dance partiesBody modification trendTrend of body adornmentLoosefitting pants trendSeattlebased music styleOnline discussion forumsSoda with floating beads...

Is DIS Your Handle? 2024-01-18

Is DIS Your Handle? crossword puzzle
Across
  1. Joint Intelligence Command provide ______, relevant, and timely intelligence for early warning and decision-making for the SAF’s operations.
  2. Who are we? We are historians, electrical engineers, psychologists, computer _____, communicators, and leaders.
  3. Alongside our soldiers, sailors and airmen, are the _____ of the new frontier.
Down
  1. The DIS will defend and dominate in the digital domain. As part of an _____ SAF, the DIS will enhance Singapore’s security, from peace to war.
  2. The symbols of DIS comprises of our crest, logo and _____.
  3. Is DIS Your Handle?
  4. WHAT WE DO. The DIS defends the SAF’s digital domain, from cyber incident response and threat hunting, to electronic protection of our networks and _____, to digital threats to our servicemen’s psychological defence.

7 Clues: Is DIS Your Handle?The symbols of DIS comprises of our crest, logo and _____.Alongside our soldiers, sailors and airmen, are the _____ of the new frontier.Who are we? We are historians, electrical engineers, psychologists, computer _____, communicators, and leaders....

extra task 2024-11-07

extra task crossword puzzle
Across
  1. An incident where sensitive information is accessed without authorization.
  2. A cyber attack used to trick people into revealing personal information.
  3. Software designed to disrupt, damage, or gain unauthorized access to a system.
  4. A decrease in the general price level of goods and services, often during a recession.
  5. A significant decline in economic activity across the economy, lasting more than a few months.
  6. Software that gathers information about a person or organization without their knowledge.
  7. Government measures to reduce spending, often during times of financial difficulty.
  8. A legal process involving a person or business unable to repay outstanding debts.
  9. A period when a system is unavailable or non-functional.
  10. A period of slow economic growth and high unemployment accompanied by inflation.
  11. A type of malware disguised as legitimate software.
Down
  1. Criminal activities carried out by means of computers or the internet.
  2. The state of being jobless, often rising during economic downturns.
  3. A network security system that monitors and controls incoming and outgoing traffic.
  4. A type of malware that locks users out of their data until a ransom is paid.
  5. A prolonged period of severe economic downturn.
  6. Failure to fulfill a financial obligation, especially a loan repayment.
  7. A general increase in prices and fall in the purchasing value of money.
  8. The process of converting information into a code to prevent unauthorized access.
  9. The process of a lender taking possession of a property when the borrower fails to make payments.

20 Clues: A prolonged period of severe economic downturn.A type of malware disguised as legitimate software.A period when a system is unavailable or non-functional.The state of being jobless, often rising during economic downturns.Criminal activities carried out by means of computers or the internet....

Domestic & international Airports 2019-02-14

Domestic & international Airports crossword puzzle
Across
  1. somewhere where you would go to pray
  2. what airport code is WLG
  3. a location with a runway,a helipad for takes offs and landings
  4. passenger will get it when checking in
  5. Checking cargo, mail, travellers and their ——————-
  6. the cargo and laggage compartment of the plane
  7. check that the _____ is valid
  8. a area before departing passengers pass through security
  9. you will need this as a form of ID
Down
  1. a area where you go through security & hand over your passport and departure card
  2. a place,amenities or equipment provided in a big area
  3. ask the passengers which ______they are travelling to
  4. who is the worlds top 10 busiest airports
  5. who has the longest runway in the world
  6. Inverviewing and questioning —————-
  7. ask the _____ ,dangerous goods a
  8. passengers for prohibited and restricted _____
  9. Release the bags down the —————
  10. airport security for dangerous goods
  11. An area usually adjacent to a terminal

20 Clues: what airport code is WLGcheck that the _____ is validRelease the bags down the —————ask the _____ ,dangerous goods ayou will need this as a form of IDInverviewing and questioning —————-somewhere where you would go to prayairport security for dangerous goodspassenger will get it when checking inAn area usually adjacent to a terminal...