cyber security Crossword Puzzles
Noodle Shop Mix Up 2018-12-27
Across
- One guest appearance with a ball or maybe it was Pogba
- Kid who supposedly knows hot to play footie but can't even score
- Chef with the ugly gf
- Salah special
- Buff security guard
- Guess(clue:mashupofallthenames)
- Rival kitchen (Clue/: The New Poohole)
- Main chef of the new Poohole
- God security guard(newly hired and not Zlatan)
- If he falls, gets ______ down
- Other kid sorry
- Yes you have to know the poohole managers name
- What the whole series is based on
Down
- Band by the two pipsqueaks
- The Real God
- MasterChef master faller, the only one who should dive
- Security
- Noodles in the box,he has chicken feet
- Chef who is friends with the GOAT
- The name of the delivery service
- Wrecking ball security guard
- Some ugly Englishman who dives
- Collective name of the pipsqueaks who hang around and help?
23 Clues: Security • The Real God • Salah special • Other kid sorry • Buff security guard • Chef with the ugly gf • Band by the two pipsqueaks • Wrecking ball security guard • Main chef of the new Poohole • If he falls, gets ______ down • Some ugly Englishman who dives • Guess(clue:mashupofallthenames) • The name of the delivery service • Chef who is friends with the GOAT • ...
FNAF 2025-12-07
Across
- Location of the scooper machine
- Molten version of Ennard
- Mysterious substance said to contain souls
- Pink-and-white fox animatronic from Sister Location
- The animatronics' internal metal framework
- Main antagonist known as the “Purple Guy”
- The security tool used to check hallways and rooms
- Freddy’s “glam” redesign in Security Breach
- Animatronic with a cupcake companion
Down
- Balloon-carrying childlike animatronic
- Company responsible for the animatronics
- Afton's digital counterpart
- The puppet-like guardian of the spirits
- The haunted bear who appears slumped in a chair
- Night guard’s limited resource in FNaF 1
- Name of the giant mall in Security Breach
- Term for the violent accident involving animatronic jaws
- Fox-themed animatronic who lives in Pirate Cove
- Nickname for the animatronic that mimics others in Security Breach
- Chica’s signature food item
- Afton’s daughter who becomes Circus Baby
- Version of Freddy seen in FNaF 2
22 Clues: Molten version of Ennard • Afton's digital counterpart • Chica’s signature food item • Location of the scooper machine • Version of Freddy seen in FNaF 2 • Animatronic with a cupcake companion • Balloon-carrying childlike animatronic • The puppet-like guardian of the spirits • Company responsible for the animatronics • Night guard’s limited resource in FNaF 1 • ...
DigiRallye 2016-07-22
Across
- Cyber...
- BEE...
- Firefox ist ein...
- Universal Serial Bus
- Intelligentes Telefon
- Abkürzung für World Wide Web
- Virtuelle Festplatte im Internet
- Schutzsystem auf PC
- Compact Disc
- digitale Unterhaltung
- Soziales Netzwerk
- lux. Bank
Down
- Dein persönlicher Nutzername zum Anmelden
- Werbung per E-Mail
- Eine drahtlose Verbindung
- Gründer von Apple
- Eine Person, die Programme erstellt.
- Betriebssystem
- Internetverbindung ohne Kabel
- Bill...
- Jemand, der deinen PC infiltriert
21 Clues: BEE... • Bill... • Cyber... • lux. Bank • Compact Disc • Betriebssystem • Gründer von Apple • Soziales Netzwerk • Werbung per E-Mail • Firefox ist ein... • Schutzsystem auf PC • Universal Serial Bus • Intelligentes Telefon • digitale Unterhaltung • Eine drahtlose Verbindung • Abkürzung für World Wide Web • Internetverbindung ohne Kabel • Virtuelle Festplatte im Internet • ...
cyber security 2021-11-05
Cyber security 2024-09-04
3 Clues: how to protect data at rest or in transit • when someone tries to compromise you via email • malicious type of software designed to compromise a system
Safety Online 2024-04-20
Across
- a self-replicating type of malware that spreads across computer networks by exploiting vulnerabilities in operating systems or network protocols
- unauthorized access to computer systems, typically with the intention of stealing or destroying data
- a type of software designed to detect and remove malicious software from computer systems
- a type of malicious software that replicates itself and spreads to other computer systems or files by attaching its code to host programs or documents
- unwanted electronic messages, typically sent in bulk
- malicious software
- malicious software designed to secretly monitor and collect information about a user's activities on an electronic device
Down
- a type of malware that masquerades as legitimate software to deceive users into installing it on their systems
- a software patch or release containing fixes, improvements, or new features designed to enhance the performance of a program
- a type of cyber attack in which attackers attempt to deceive individuals by posing as trustworthy entities in electronic communications
- a security system that monitors and controls incoming and outgoing network traffic
- a secret combination of characters, used to authenticate a user's identity and grant access to a computer system
12 Clues: malicious software • unwanted electronic messages, typically sent in bulk • a security system that monitors and controls incoming and outgoing network traffic • a type of software designed to detect and remove malicious software from computer systems • unauthorized access to computer systems, typically with the intention of stealing or destroying data • ...
FITDVocab.rs 2013-05-15
Across
- "heart of the computer"
- way you act and behave online.
- To control or operate the computer
- Picture owned by a company.
- legal right that a company owns a logo or product.
- Encoded program that makes a PC or MAC function differently.
- PDF is short for...
- Collection of papers that can be stored to your computer.
- hosting of an company online to provide details of their goods,services and facilities for online orders.
- Selection of a drawing and editing tools on a program.
- Xfinity.
- CD burner.
- dogpile
- device that stores information to send to other servers.
- Wireless fidelity.
- All files are stored from your computer here
- Online backup service.
- 8 bits make a ____
- a reference to an unpublished or published source.
Down
- type of peripheral
- Name on the bottom of your cable box
- "Finger lickin' good."
- Word document file format
- Short term memory on a computer.
- TVs have them in their screens.
- CPU
- visual display unit.
- .jpg,.png,.gif are ........
- Cell phone
- DSL or cable.
- system Windows 8 is a .....
- what? who? why?
- 3G or 4G.
- RTF is short for....
- National Cyber Security Alliance.
- plug in device for a computer
- form that tells what experience you've had and why you want the job
- file that can be read on any type of device.
- zebra tool
40 Clues: CPU • Google • dogpile • Xfinity. • 3G or 4G. • Cell phone • CD burner. • zebra tool • DSL or cable. • what? who? why? • type of peripheral • Wireless fidelity. • 8 bits make a ____ • PDF is short for... • visual display unit. • RTF is short for.... • "Finger lickin' good." • Online backup service. • "heart of the computer" • Word document file format • Picture owned by a company. • .jpg,.png,.gif are ........ • ...
Take a Break Terms - June 2024-06-07
Across
- Responsible for financial statement audits, tax returns, fiscal transparency through reporting and accountability, and negotiating and managing contracts and compliance and all financial processes and budgeting decisions for the entire organization.
- Handles all inbound donor calls, adjusts and updates donor records, adds to new donors to the donor database, records and reconciles pledges, records and reconciles pledge payments, and actively collects outstanding pledges
- Operates multiple food pantries throughout the Greater Philadelphia region with healthy and nutritious food in addition to providing case management to ensure clients have access to housing resources, job training, and applicable public benefits.
- manages the employee life cycle, fosters an inclusive workplace, strives to build an engaged team, administers employee compensation and benefit programs and ensures adherence to state, local and federal employment laws.
- Supports a vibrant alliance of synagogues, volunteers and representatives from Jewish community organizations all over Greater Philadelphia. This department encompasses the eight Kehillot – neighborhood groups.
- Provides strategic, operational, and institutional leadership for the organization.
- Identify, cultivate, solicit, engage and steward prospects and donors in the Greater Philadelphia Jewish community.
Down
- Operates, maintains and manages the headquarters office and all of the campuses, including the buildings as well as landlord - tenant relationships.
- Builds, maintains, and improves data integrity, database systems, manages key databases of record, streamlines reporting from these databases, and ensures that the organization utilizes databases in an efficient and effective manner.
- Responsible for negotiating business insurance coverage for the organization as well as thirty-two Jewish agencies in the community, handling all insurance claims, managing the pension plan, managing the investment of operating cash and coordinating the endowment investment portfolio results tracking and reporting.
- Ensure our mission continues for generations to come. An avenue for making vital and lasting philanthropic contributions, planned giving enables nonprofits to plan and provide for the long-term interests of the communities they serve.
- Raises state tax credits from businesses and individuals and directs them towards need-based scholarships for Jewish Day and Pre-school students, as well as supporting innovative curriculum programs, hosted by Jewish organizations, for public school students.
- Sets community priorities, vets potential grantee organizations, ensures grant funds are distributed appropriately, and evaluates efficacy and outcomes.
- Responsible for providing safety and security training, coordinating risk assessments, evaluating safety and security weaknesses and developing plans to bolster infrastructure and personal safety and security throughout the entire Jewish Community.
- Develops and implements information technology strategies and manages the organization's computer hardware, critical software systems,, communication systems and cyber security.
- Ccivic-minded individuals and local Jewish agencies involved in advocacy and public affairs, who engage in issues that are important to the Jewish community. JCRC leads Jewish Federation’s efforts to combat antisemitism and provide Israel advocacy.
- Storytellers, broadening the organization's awareness to the wider community through print, digital, social media and events.
17 Clues: Provides strategic, operational, and institutional leadership for the organization. • Identify, cultivate, solicit, engage and steward prospects and donors in the Greater Philadelphia Jewish community. • Storytellers, broadening the organization's awareness to the wider community through print, digital, social media and events. • ...
Is DIS Your Handle? 2024-02-06
Across
- Alongside our soldiers, sailors and airmen, are the _____ of the new frontier.
- Joint Intelligence Command provide ______, relevant, and timely intelligence for early warning and decision-making for the SAF’s operations.
- Is DIS Your Handle?
- Who are we? We are historians, electrical engineers, psychologists, computer _____, communicators, and leaders.
Down
- The symbols of DIS comprises of our crest, logo and _____.
- The DIS will defend and dominate in the digital domain. As part of an _____ SAF, the DIS will enhance Singapore’s security, from peace to war.
- WHAT WE DO. The DIS defends the SAF’s digital domain, from cyber incident response and threat hunting, to electronic protection of our networks and _____, to digital threats to our servicemen’s psychological defence.
7 Clues: Is DIS Your Handle? • The symbols of DIS comprises of our crest, logo and _____. • Alongside our soldiers, sailors and airmen, are the _____ of the new frontier. • Who are we? We are historians, electrical engineers, psychologists, computer _____, communicators, and leaders. • ...
Cybersecurity 2025-12-02
Across
- A security incident where sensitive, confidential, or personal information is accessed, stolen, or disclosed without authorization.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- The practice of protecting your digital world from cyber threats.
- Hackers send fake emails pretending to be a trusted source (like your bank), hoping you’ll click on a link or give them your personal info.
Down
- Stops unwanted traffic (like hackers) from getting into your system.
- A type of malicious software (malware) that encrypts a victim's files or locks their computer system, preventing them from accessing their data.
- Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it.
7 Clues: The practice of protecting your digital world from cyber threats. • Stops unwanted traffic (like hackers) from getting into your system. • Software designed to disrupt, damage, or gain unauthorized access to computer systems. • Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it. • ...
INFORMATION SECURITY 2012-10-04
Across
- This happens when a document is no longer authorized to be classified
- When classified is compromised it is called a Security (Blank)
- Damage to National Security
- PII and FOUO must be sent this way via email
- It’s what AR 380-5 is
- Method of removal of exempted information from copies of document before releasing to public
Down
- Processes of going from higher classification to lower classification
- Act or Process by which information is determined to be classified
- The ability or opportunity to obtain knowledge of classified information
- Serious Damage to National Security
- Classification process of initial determination for classification information
- process which Information pulled from various sources, once together become classified
- If it’s not SCI it’s this type
- Classification process of paraphrasing, restating, or using of information in a new classified document
- Sequence of three letters used to represent a country
- This (blank) Inspection is conducted annually on by your security manager
16 Clues: It’s what AR 380-5 is • Damage to National Security • If it’s not SCI it’s this type • Serious Damage to National Security • PII and FOUO must be sent this way via email • Sequence of three letters used to represent a country • When classified is compromised it is called a Security (Blank) • Act or Process by which information is determined to be classified • ...
Online Security 2023-02-22
Across
- tricks the user into posing that is a security software
- unwanted email most from bots
- runs in the background and monitors what you are doing
- the information superhighway
- a provision that allows you to use copyrighted work without consent with certain limitations
- an option to hide a post so that search engines could not scan it
- a malicious software
- a browser feature that Is synonymous to “private” browsing
Down
- states that anyone who uses you work without your consent in punishable by law
- used to record the keystrokes done by the user
- sends on official-looking email and is designed to steal sensitive personal information
- designed to send you advertisement
- disguised as a useful program but is not
- It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups
- replicates and can transfer from one computer to another
- more complicated way of phishing where it exploits
16 Clues: a malicious software • the information superhighway • unwanted email most from bots • designed to send you advertisement • disguised as a useful program but is not • used to record the keystrokes done by the user • more complicated way of phishing where it exploits • runs in the background and monitors what you are doing • ...
Food Security 2024-11-28
Across
- This type of cloth is preferable to reusable cloths
- the uneasy or painful sensation caused by involuntary lack of food which may over time result in malnutrition
- a place where food is offered to non-profit agencies for distribution
- In the interests of food safety you should avoid touching this part of your body
- The principles on which SFBB is based
- To prevent contamination, food should be kept what?
- Common pests in food premises
- The food helps to improve Minds growth
- A food that could cause an allergic reaction in some people
Down
- By drinking 4-5 liter of water daily we can avoid...
- A possible symptom of food poisoning
- charitable program that provides free meals to hungry people
- The act of giving something to individuals or families in need
- Access to enough food to maintain a healthy lifestyle
- If found on food packaging, this could indicate pests
- Best Vegetable in winter which improve the blood
16 Clues: Common pests in food premises • A possible symptom of food poisoning • The principles on which SFBB is based • The food helps to improve Minds growth • Best Vegetable in winter which improve the blood • This type of cloth is preferable to reusable cloths • To prevent contamination, food should be kept what? • By drinking 4-5 liter of water daily we can avoid... • ...
Food Security 2024-11-28
Across
- KNOWS AS TOCOFEROL
- FISH MEAT
- DECREASING OXYGEN CARRYING CAPACITY
- RICE, GRAINS
- THYROIDE
- CURD IS SOURCE
- DEFICIENCY OF CALCIUM
- SPINACH
- UNHEALTHY FOOD
- SOURCE OF CALCIUM
Down
- NIGHT BLINDNESS DEFICIENCY
- DEFICIENCY IN RBC
- A DEFICIENCY OF THIAMINE, MORE COMMONLY KNOWN AS VITAMIN B1
- DEFICIENCY DUE TO MINERALS
- MADE OF AMINO ACIDS
- RICH SOURCE FROM SUN RAYS
16 Clues: SPINACH • THYROIDE • FISH MEAT • RICE, GRAINS • CURD IS SOURCE • UNHEALTHY FOOD • DEFICIENCY IN RBC • SOURCE OF CALCIUM • KNOWS AS TOCOFEROL • MADE OF AMINO ACIDS • DEFICIENCY OF CALCIUM • RICH SOURCE FROM SUN RAYS • NIGHT BLINDNESS DEFICIENCY • DEFICIENCY DUE TO MINERALS • DECREASING OXYGEN CARRYING CAPACITY • A DEFICIENCY OF THIAMINE, MORE COMMONLY KNOWN AS VITAMIN B1
CyberSec Crossword 2025-10-14
Across
- A security process requiring two forms of identification
- Malware that locks data and demands payment for release
- The process of converting data into a coded format
- Fraudulent attempt to obtain sensitive information via email
- A software update that fixes security vulnerabilities
- A security risk originating from within the organization
- A hidden method of bypassing normal authentication
- Software that secretly gathers user information
- A secret word or phrase used to gain access
- Faking the identity of a trusted source
Down
- Unauthorized release of sensitive information
- A malicious attempt to damage or disrupt systems
- Tricking users into clicking something different than they think
- Software designed to disrupt, damage, or gain unauthorized access
- Installing the latest version of software for security and performance
- A network of infected devices controlled remotely
- A secure connection over the internet, often used remotely
- A network security system that monitors and controls traffic
- A type of malware disguised as legitimate software
- Verifying the identity of a user or device
- A tool that records keystrokes to steal information
- Free from danger or threat
- A vulnerability that is exploited before it’s known to the vendor
23 Clues: Free from danger or threat • Faking the identity of a trusted source • Verifying the identity of a user or device • A secret word or phrase used to gain access • Unauthorized release of sensitive information • Software that secretly gathers user information • A malicious attempt to damage or disrupt systems • A network of infected devices controlled remotely • ...
Forensics 2 2023-02-23
Across
- Checks, certificates, wills, passports, etc.
- Portrait appears raised, security thread, etc.
- Handwriting is difficult to disguise or forge
- Any changes, erasures, or obliterations that may have occurred
- Computer system used to mimic likely targets of cyber attacks
- What are the height, width, and size of the letters?
- Year the Court of Appeals validated handwriting analysis as a form of expert testimony
- The specialty in forensics that analyzes accounting methods in disputes or litigation
Down
- Agency that investigates forgery cases
- Every person's handwriting is unique
- "Learns" to recognize how a person signs
- Any prewritten handwriting samples from a suspect
- What was the first known case in which handwriting analysis played a role?
- Stores handwriting samples in databases
- Checks, employment records, licenses, wills, etc.
- When false documents or other items are copied for the purpose of deception
- Directly altering a check, intercepting another person's check, etc.
- Amount that is written in illegitimate checks every day
- Writing over top to smear or make original writing unreadable
- Tool for including or excluding persons when determining a match
- Paper money, postage stamps, traveler's checks, etc.
- Chemically sensitive paper, multiple color patterns on paper, etc.
- Examination of questioned documents with known material
- Practice of finding vulnerabilities that hackers could exploit
- Making, altering, or falsifying any document or signature
- Forgery for material gain
- Maximum prison sentence for forgery
27 Clues: Forgery for material gain • Maximum prison sentence for forgery • Every person's handwriting is unique • Agency that investigates forgery cases • Stores handwriting samples in databases • "Learns" to recognize how a person signs • Checks, certificates, wills, passports, etc. • Handwriting is difficult to disguise or forge • Portrait appears raised, security thread, etc. • ...
RU ITEC411 Crime and Security 2025-10-08
Across
- Spreads by infected software files, but don't worry, humans can't get this sickness.
- The art of hiding information so that only those who know the key can read it.
- Face ID, fingerprints, and voice ID are all examples or this type of security.
- The name came from the plan of Greek hero Odysseus involved infiltrating Troy's strong walls by hiding soldiers inside a giant, hollow wooden horse.
- A network of compromised computers or devices, infected with malware and controlled remotely by a cybercriminal.
- Microsoft windows, Mac, and Linux are all examples of this.
- A portmanteau for hacking and activism.
- The abbreviated name for the law that allows law enforcement to intercept telephone calls.
- Recording devices attached to point of sales systems to steal credit card information.
- A term used to describe a benevolent hacker.
- WWW stands for:
Down
- Acting like a hacker to find vulnerabilities in a system or network
- the act of keeping sensitive information to yourself
- An incident involving a worm led to the creation of this organization (abbreviated).
- The Heartbleed bug targeted a vulnerability in this software.
- The act of tricking someone into revealing sensitive information.
- The field of computer science dedicated to securing computers and preventing cyber attacks.
- A type of computer attack that involves using email to trick the user into giving away private information.
- Proving someone is who they say they are.
- Original name for a sophisticated programmer.
- The I of the CIA triad
21 Clues: WWW stands for: • The I of the CIA triad • A portmanteau for hacking and activism. • Proving someone is who they say they are. • A term used to describe a benevolent hacker. • Original name for a sophisticated programmer. • the act of keeping sensitive information to yourself • Microsoft windows, Mac, and Linux are all examples of this. • ...
test 2021-03-29
15 Clues: Hope • Growth • Dreams • Belief • Success • Courage • Freedom • Security • Assurance • Stability • Resilience • Achievement • Opportunity • Empowerment • Possibilities
AVSEC 2025-10-23
Across
- – Core value that builds trust among colleagues
- – Machine that helps see what’s inside your bag
- – Key to effective teamwork in AVSEC
- – Process to detect prohibited items before boarding
- – Required when taking visitors into secure areas
- – Physical inspection when further screening is required
- – The person behind the X-ray monitor
- – Area that requires special authorization
- – What makes long shifts actually manageable
- – The secure zone beyond screening checkpoints
- – Short for Aviation Security
- – Not allowed past security — no exceptions!
- – Full-body scanner that detects concealed items (abbr.)
- – Open and honest communication within the team
- – Set of procedures that must be followed
- – The schedule everyone checks (and sometimes dreads)
- – An event that triggers a security response
- – What must always be verified before access is granted
- – Regular sessions to keep staff security-ready
- – Handheld metal detector screening method
- – Following the rules to keep the airport safe
- – What happens to prohibited items at screening
- – Secured part of the airport beyond screening
- – Quality and safety management system used for reporting and auditing
Down
- – Working together to keep the airport secure
- – Word no one wants to hear over the PA system
- – Person responsible for keeping AVSEC skills sharp
- – Description of a bag left behind too long
- – A serious security violation
- – Maintaining high standards and a positive image
- – The archway that’s beep-free for some and not for others
- – Tool for logging work hours and managing shifts
- – Scheduling software used for workforce planning in AVSEC and operations
- – What AVSEC professionals are trained to detect
- – The process of increasing response to a potential threat
- – When the boss’s boss checks how well you’re doing things
- – Continuous monitoring to ensure safety
- – Person who connects AVSEC with other departments
- – The reason we’re all here — and the focus of every security check
- – Doing the right thing, even when no one is watching
- – Required before entering a restricted zone
- – The public area before you go through screening
- – The “how-to” of security operations
- – Raised when something suspicious occurs
- – Where passengers board flights and security teams operate
45 Clues: – Short for Aviation Security • – A serious security violation • – Key to effective teamwork in AVSEC • – The person behind the X-ray monitor • – The “how-to” of security operations • – Continuous monitoring to ensure safety • – Set of procedures that must be followed • – Raised when something suspicious occurs • – Area that requires special authorization • ...
Technology 2019-08-25
Across
- set of things working together to make a meaningful result
- a message given to the web browser by the web server
- a network security system
- protects computer networks from unauthorized access
- a facility that allows electronics to be connected with internet
- the nature of electronic technology
- the situation when devices are ready to exchange data
- a robot with a human appearance
- a small device which sends wifi to other devices nearby
- means of communication between two devices
- stores and processes data
- a transmission of data for using the internet to electronic devices
- retrieving something from the internet
- facts or numbers collected for analysis
- a computer program which navigates through web pages
Down
- made or adapted for a particular purpose
- a program language used in smartphone industries earlier
- something that can be plugged into a multi-plug
- something that produces current
- a self-contained component
- a global computer network
- a private computer network for communication
- to move something from one device to another
- to assign something specific
- a short rang e wireless connection to any electronic device
- coded instructions to run something
- set of instructions use to operate a computer
- a file format developed by adobe including text formatting and image
- Some thing that connects electronic machines
- a small device by which data can be stored and plugged in with a computer
30 Clues: a network security system • a global computer network • stores and processes data • a self-contained component • to assign something specific • something that produces current • a robot with a human appearance • the nature of electronic technology • coded instructions to run something • retrieving something from the internet • facts or numbers collected for analysis • ...
Forensics 2 2023-02-23
Across
- Checks, certificates, wills, passports, etc.
- Portrait appears raised, security thread, etc.
- Handwriting is difficult to disguise or forge
- Any changes, erasures, or obliterations that may have occurred
- Computer system used to mimic likely targets of cyber attacks
- What are the height, width, and size of the letters?
- Year the Court of Appeals validated handwriting analysis as a form of expert testimony
- The specialty in forensics that analyzes accounting methods in disputes or litigation
Down
- Agency that investigates forgery cases
- Every person's handwriting is unique
- "Learns" to recognize how a person signs
- Any prewritten handwriting samples from a suspect
- What was the first known case in which handwriting analysis played a role?
- Stores handwriting samples in databases
- Checks, employment records, licenses, wills, etc.
- When false documents or other items are copied for the purpose of deception
- Directly altering a check, intercepting another person's check, etc.
- Amount that is written in illegitimate checks every day
- Writing over top to smear or make original writing unreadable
- Tool for including or excluding persons when determining a match
- Paper money, postage stamps, traveler's checks, etc.
- Chemically sensitive paper, multiple color patterns on paper, etc.
- Examination of questioned documents with known material
- Practice of finding vulnerabilities that hackers could exploit
- Making, altering, or falsifying any document or signature
- Forgery for material gain
- Maximum prison sentence for forgery
27 Clues: Forgery for material gain • Maximum prison sentence for forgery • Every person's handwriting is unique • Agency that investigates forgery cases • Stores handwriting samples in databases • "Learns" to recognize how a person signs • Checks, certificates, wills, passports, etc. • Handwriting is difficult to disguise or forge • Portrait appears raised, security thread, etc. • ...
CYBER FORENSICS 2016-08-24
Across
- Type of Military Computer Forensic Technology
- A group working on digital evidence
- A system startup task
- Disk Encryption Mechanism
- covertly capture sensitive information, passwords, and network logons
- Character code used by NTFS
- Customized setting for MS-DOS
- Stores time and date related information in a PC
Down
- section of a track , 512 bytes
- Theft Recovery Software for Laptops and PCs
- A Disk Editing Tool
- NTFS encrypted files
- SLACK random memory dumps in hidden storage areas
- Identify potential hazards in Location
14 Clues: A Disk Editing Tool • NTFS encrypted files • A system startup task • Disk Encryption Mechanism • Character code used by NTFS • Customized setting for MS-DOS • section of a track , 512 bytes • A group working on digital evidence • Identify potential hazards in Location • Theft Recovery Software for Laptops and PCs • Type of Military Computer Forensic Technology • ...
Cyber Crossword 2021-03-03
Across
- Software that is designed to disrupt, damage or gain unathorised access to a computer system
- A type of malware designed for spying on user activity without their knowledge
- A form of malware that holds data hostage, typically encrypting files and demanding that a ransom be paid so that the data can be recovered
- A group of computers, printers and other devices that are interconnected and governed as a whole
- An internet address for your computer, which is identified when communicating over a network
- A defensive technology designed to prevent unauthorised access to a network or system
- A tool that allows users to remain anonymous while using the internet by masking their location and encrypting traffic
Down
- An individual that uses computers to gain unathorised access to data
- A set of programs that tell a computer to perform a task
- The process of encoding data to prevent theft, making it only accessible with a key
- Technology that allows you to access files and services through the internet from anywhere in the world
- A technique used by hackers to try and obtain sensitive information, often through emails
- The moment a hacker successfully gains access to a computer or other device
- A type of malware that aims to corrupt a computer before spreading to others
14 Clues: A set of programs that tell a computer to perform a task • An individual that uses computers to gain unathorised access to data • The moment a hacker successfully gains access to a computer or other device • A type of malware that aims to corrupt a computer before spreading to others • ...
CYBER CROSSWORD 2020-10-13
Across
- / An unauthorized person seeking to maliciously disrupt or damage a system
- / A string of letters, characters and numbers that must be used to gain access to a device, system or service
- / Global system interconnected computer networks that uses standard communication protocol
- / A characteristics or specific weakness that renders an organization or asset open to exploitation
- / Never scribble private and confidential --------------- on desktop table or beneath the keyboard
- / Malicious software that is inserted in your system, usually covertly, with an intent on compromising victim’s data
Down
- / Unwanted and fraudulent e-mails, messages and advertisements that comes to your e-mail address
- / Hardware and/or Software mechanism to prevent unauthorized users from accessing a computer network
- / system invented by google that uses a test to establish if a user is human or robot
- / A type of malware designed to block access to a system or service data until a sum of money is paid
- / A tool that allows the user to remain anonymous while using internet by masking the location and encrypting traffic
- / Always ---------- your computer when you leave your desk
- / Cyber attack in which cyber criminals flood the network which make machine or network resource are unavailable to legitimate users
- / Encoding information into ciphertext to assure that the confidentiality of, and access to, certain information about an entity is protected
14 Clues: / Always ---------- your computer when you leave your desk • / An unauthorized person seeking to maliciously disrupt or damage a system • / system invented by google that uses a test to establish if a user is human or robot • / Global system interconnected computer networks that uses standard communication protocol • ...
cyber ethics 2025-06-08
Across
- thoughts of another person as one's original work.
- work.
- It refers to the act of using or imitating the language
- the internet in a deliberate manner.
- sources.
- BULLYING: It is an act of harming,harassing,or targetting an person
- It refers to unwanted bulk of email that comes from a
Down
- FOOTPRINT: It is an impression or information about a person that exists
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- It is a legal right granted by law to the creator for his
- It refers to being aware of the ethical practices.
- the internet because of his online activity.
- PIRACY: When a software is copied and distributed illegally, it is
14 Clues: work. • sources. • the internet in a deliberate manner. • the internet because of his online activity. • thoughts of another person as one's original work. • It refers to being aware of the ethical practices. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • ...
cyber ethics 2025-06-08
Across
- thoughts of another person as one's original work.
- work.
- It refers to the act of using or imitating the language
- the internet in a deliberate manner.
- sources.
- BULLYING: It is an act of harming,harassing,or targetting an person
- It refers to unwanted bulk of email that comes from a
Down
- FOOTPRINT: It is an impression or information about a person that exists
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- It is a legal right granted by law to the creator for his
- It refers to being aware of the ethical practices.
- the internet because of his online activity.
- PIRACY: When a software is copied and distributed illegally, it is
14 Clues: work. • sources. • the internet in a deliberate manner. • the internet because of his online activity. • thoughts of another person as one's original work. • It refers to being aware of the ethical practices. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • ...
Cyber Safety 2024-12-01
Across
- You need a strong one of these
- The ___commisioner can act on reports of inappropriate online posts
- You can use this of evidence if making a report about online activity
- The_Helpline
- Type of information you need to protect
- The age it will be legal to use Social Media from late 2025
- Instagram and TIC TOK are this type of media
Down
- Someone who is out to trick you online
- If you are worried about something online tell a _ adult
- Someone who repeatedly intimidates another person online
- When websites are designed poorly and have lots of mistakes they might be this
- Cyberbullying is
- A popular online game
- Never share your banking ____
14 Clues: The_Helpline • Cyberbullying is • A popular online game • Never share your banking ____ • You need a strong one of these • Someone who is out to trick you online • Type of information you need to protect • Instagram and TIC TOK are this type of media • If you are worried about something online tell a _ adult • Someone who repeatedly intimidates another person online • ...
Social Engineering 2022-05-12
Across
- A large scale social engineering and extortion attack that defeated the multifactor authentication of tech giants like Microsoft and Nvidia.
- Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- This attack targets individuals who can give the criminal physical access to a secure building or area.
- A documentary made about how scammers can mask their identities, charm their victims, and swindle them for billions of dollars.
- The first stage of social engineering, the perpetrator explores the victim's background to determine points of entry to conduct the attack.
- When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
- The third stage of social engineering, the perpetrator carries out the attack on the victim.
- Training done in an effort to learn about security before it is too late.
- Eliminates the chances of an uninvited user digging through your sensitive data.
Down
- A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
- An online manipulation technique that exploits human psychology in order to gain sensitive information, access or valuables from users.
- Software that scans your computer to make sure that there are no vulnerabilities that attackers can take advantage of.
- This attack centers around an exchange of information or service to convince the victim to act.
- An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- A type of monitoring software designed to record keystrokes made by a user.
- The second stage of social engineering, the perpetrator uses the information gathered to plan their mode of attack.
- Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
22 Clues: Training done in an effort to learn about security before it is too late. • A type of monitoring software designed to record keystrokes made by a user. • Eliminates the chances of an uninvited user digging through your sensitive data. • The third stage of social engineering, the perpetrator carries out the attack on the victim. • ...
Problemau Pobl Ifanc 2023-01-19
Forensic Science 2022-11-09
Financial Securities 2024-10-20
Across
- The highest price a buyer is willing to pay for a security.
- The initial sale of shares by a private company to the public.
- the return on an investment, expressed as a percentage.
- An agreement to buy or sell currency at a future date at a set price.
- A person who buys and sells securities on behalf of investors.
- The price at which a security is bought and sold.
- Shares that allow holders to participate in company profits but have voting rights.
- The difference between the bid and ask price.
Down
- Money paid to shareholders from a company’s profits.
- A security representing a loan made by an investor to a borrower, typically corporate or governmental.
- The amount an investor pays to acquire a security, usually quoted per share.
- A derivative contract to buy or sell an asset at a future date.
- A financial security backed by a pool of mortgages.
- A contract giving the right to buy or sell an asset at a specific price before a certain date.
- A place where stocks and other securities are traded.
- The amount paid periodically as interest on a bond.
- The lowest price a seller is willing to accept for a security.
17 Clues: The difference between the bid and ask price. • The price at which a security is bought and sold. • A financial security backed by a pool of mortgages. • The amount paid periodically as interest on a bond. • Money paid to shareholders from a company’s profits. • A place where stocks and other securities are traded. • ...
Bullying crossword 2015-08-04
15 Clues: Sore • Ruining • Messaging • Technology • Red emotion • Name calling • Constant sadness • Synonym of scared • Hitting and kicking • Taking your own life • Opposite to happiness • media Facebook and Twitter • The worst word in the world • What you feel when you get hurst • Someone who is consistently mean
cyberbulling 2024-10-22
Across
- online bulling
- what is a way you can avoid cyber bullying
- revealing sensitive or personal information about somebody without their consent
- what is a way that can help avoid cyber bulling and is in every app or site you use
- when someone manages to break into your account
- what is a thing a lot of people being cyberbullied do that makes the situation worse
Down
- what is harassing someone by electronic means
- pretending to be someone else on the internet
- what is someone you can tell if you are being cyberbullied
- what is another feature that can help get rid of a cyberbully
- online fighting using electronic messages
- what is a feature that can help get rid of someone cyberbulling you
12 Clues: online bulling • online fighting using electronic messages • what is a way you can avoid cyber bullying • what is harassing someone by electronic means • pretending to be someone else on the internet • when someone manages to break into your account • what is someone you can tell if you are being cyberbullied • ...
Computer Science 06 2020-01-22
Across
- xxx bullying, The use of social media to intimidate, bully, humiliate, defame or insult another person.
- such as Windows uses windows icons menus and a pointer to interact with the user
- xxx issues, Are about how we impact on the natural world
- xxxx xxxxxxxx are used in an operating system to allow access to certain files and applications
- xxx issues, would be considered right and wrong by society
- xxx backup only files created and edited since the last backup are copied. Saves storage space and time
- xxx issues, ensuring all users abide by the legislation relating to computer and data use
- xxx backup a copy of every file is taken
- xxx storage size, what impact does file compression have on file size and reduced transmission time, compression reduces file size before sending over internet such as file uploads or web page content or email attachment
- xxx censorship, when an organisation or government controls what information you can see over the xxx.
Down
- files stored on a hard drive are stored in blocks, when these blocks are not stored next to each other this is known as fragmentation
- xxx Code of conduct or acceptable use policy contain a set of xxx that the employees of a company will follow
- xxx storage questions relating to who owns the data and its security
- xxxxx xxxxxxx allows the computer to run multiple applications at the same time
- is used to create folder, copy and paste files, move file and create folders in folders
- The monitoring of computer activity by employers or government agencies such as police or security agencies. This can be done by packet sniffing and looking for certain key words they may associate with the person of interest. Such as terror, bomb, threat or name of person of interest. ISP keep records of internet activity for all customers.
- xxx memory SSD solid state drives use this type of memory and has no moving parts and doesn’t need fragmenting
- allows the user to interact with the computer system
- XXX driver, specialist piece of software allows the operating system to communicate with hardware
19 Clues: xxx backup a copy of every file is taken • allows the user to interact with the computer system • xxx issues, Are about how we impact on the natural world • xxx issues, would be considered right and wrong by society • xxx storage questions relating to who owns the data and its security • ...
Cyber-Security 2023-01-16
Harcèlement 2024-06-24
Across
- : Le cyber-harcèlement est une forme de violence numérique caractérisée par un harcèlement, qui peut s'exercer à travers divers canaux numériques.
- : Suivre pour atteindre.
- : Personne qui subit les injustices de quelqu’un, ou qui souffre (d'un état de choses).
- : Acte ou parole qui vise à outrager ou constitue un outrage.
- : Affliger de souffrances physiques ou morales ; faire vivre dans l'angoisse.
- : Tourmenter avec insistance, physiquement ou moralement, de façon agaçante.
- : État, situation d'une personne isolée (solitude) ou qu'on isole.
- : C’est une maladie psychique fréquente qui par ses troubles de l'humeur, perturbe fortement la vie quotidienne.
- : Fait de souffrir.
- : Destiné à intimider, à en imposer.
- : Fait de recommencer (une action…).
Down
- : Idéologie postulant une hiérarchie des races.
- : Ennuyer en étant importun.
- : Tourmenter sans relâche par des traitements injustes et cruels.
- : Témoin d'un évènement ; personne qui regarde un spectacle.
- : Action, parole par laquelle on se moque.
- passif : Les témoins passifs ne participent pas directement aux actes et/ou propos négatifs mais ne s'y opposent pas non plus.
- actif : Un témoin actif est une personne qui observe un comportement inacceptable envers quelqu'un d'autre et qui intervient pour changer le cours des événements.
- : Faire quelque chose, avoir une activité qui transforme plus ou moins ce qui est.
- : Personne qui certifie ou peut certifier quelque chose, qui peut en témoigner.
20 Clues: : Fait de souffrir. • : Suivre pour atteindre. • : Ennuyer en étant importun. • : Destiné à intimider, à en imposer. • : Fait de recommencer (une action…). • : Action, parole par laquelle on se moque. • : Idéologie postulant une hiérarchie des races. • : Témoin d'un évènement ; personne qui regarde un spectacle. • ...
s 2023-09-28
security plan 2021-04-06
Across
- Events like safety have a high ___ when it comes to post-event repairs.
- This post-event housekeeping activity has ___ walk the seating bowl and pick up all debris left in the seating bowl and sort it into either trash or recycling.
- Putting off the post-event evaluation may be temping it there is not much time between events but putting it off can put the next event at ___.
- This post-event housekeeping activity has ___ wearing backpacks blow debris the pickers may have missed into piles.
- Post-season repairs that help the facility generate ___ are likely to have a high priority.
- Customer satisfaction ___ can provide lots of valuable post-event feedback.
- Post-event meetings should have a representative from each ___.
- The post-event management team meeting allows departments to discuss what went ___ and what went right.
Down
- A common post-event activity is ___ employee performance to check that they provided quality service.
- A(n) ___ nuisance is something that is potentially dangerous, but gets the attention of children who might want to play on it. One example is a trampoline.
- If a facility has a tight schedule, a precise, well-run ___-out is important so that the next event will not be delayed.
- If an unrepaired item might have a negative ___ on customer experience, it will probably have a high priority
- There are many reasons that post-event repairs may be___. One reason is that there isn’t enough manpower available in a short time-frame.
- There are many reasons that post-event repairs may be deferred. One reason is that ___ might not be available so that making the repair between events is impossible.
- This post-event housekeeping activity has ___ begin work an hour after the blowers, to sweep the debris, such as peanut shells, missed by the blowers and pickers.
- Post-season analysis generates lots of ___ that document things like ticket sales, concession sales and customer feedback.
16 Clues: Post-event meetings should have a representative from each ___. • Events like safety have a high ___ when it comes to post-event repairs. • Customer satisfaction ___ can provide lots of valuable post-event feedback. • Post-season repairs that help the facility generate ___ are likely to have a high priority. • ...
Security Vocabulary 2018-11-12
Across
- The malicious practice of manipulating a website user's activity by concealing hyperlinks beneath legitimate clickable content, thereby causing the user to perform actions of which they are unaware.
- Predator Adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes.
- Use a computer to gain unauthorized access to data in a system.
- Ware A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The loss of, unauthorized access to, or disclosure of, personal information.
- A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- The correct or acceptable way of communicating on the Internet.
- Imitate fraudulently.
Down
- privacy The ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.
- Creating Malware Computer programs designed to infiltrate and damage computers without the users consent.
- Online piracy and includes the unauthorized online distribution of electronic copies of copyrighted material such as software, etc.
- attacks The perpetrator seeks to make a machine or network resource unavailable.
- A situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
- The politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.
- The illegal copying, distribution, or use of software.
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
16 Clues: Imitate fraudulently. • The illegal copying, distribution, or use of software. • Use a computer to gain unauthorized access to data in a system. • The correct or acceptable way of communicating on the Internet. • The loss of, unauthorized access to, or disclosure of, personal information. • ...
Information security 2023-08-28
Across
- network of computers and devices managed as a unit with the same procedures
- requirement of being private or secret
- used to determine user privileges or access levels to the system
- how information is protected
- intent of doing harm
- information or data which can be accessed when needed
- ransomware and the numerous other programs used by hackers to gain
Down
- gap or weakness which undermines an organization’s security efforts
- short for "malicious software" and covers threats such as viruses, worms, Trojan
- making sure a person is who they say they are
- calculated assessment of potential threats to an organization’s security
- to or damage sensitive information on a computer
- state of being complete or uncorrupted
- rights an individual or organization has over information and how it is used
- macros which have been programmed to carry out malicious intent
- rules
16 Clues: rules • intent of doing harm • how information is protected • requirement of being private or secret • state of being complete or uncorrupted • making sure a person is who they say they are • to or damage sensitive information on a computer • information or data which can be accessed when needed • macros which have been programmed to carry out malicious intent • ...
Cyber Day 2018-01-17
Across
- Andy es muy _________. Nunca habla de exitos y no es orgulloso.
- Ashaya sabe reparar motores, puede trabajar como
- Itzel sabe mucho de computadoras, puede trabajar como
- La piloto debe ser
- Ashaya y Itzel saben de deportes y chicos, pueden trabajar como
- El detective debe ser
Down
- Un amigo es siempre comprensivo y _________.
- Shakira es muy
- La astronauta no debe ser
- Marisa es muy ________. Siempre entiende mis problemas.
- El cientifico no debe ser
- El electricista debe ser
- a veces el es muy _________ con sus companeros y los trata mal.
- La cientifico debe ser
14 Clues: Shakira es muy • La piloto debe ser • El detective debe ser • La cientifico debe ser • El electricista debe ser • La astronauta no debe ser • El cientifico no debe ser • Un amigo es siempre comprensivo y _________. • Ashaya sabe reparar motores, puede trabajar como • Itzel sabe mucho de computadoras, puede trabajar como • Marisa es muy ________. Siempre entiende mis problemas. • ...
cyber eating 2021-09-17
Across
- instagram is one of them and tiktok
- do not eat your mac
- do not eat your friends item
- beling mean online
- don't tell anyone exept your parent
- no watching video that is not a public
- no playing game that is not public
Down
- no telling anyone
- no posting privacy
- no going privite site
- no make people kill them self
- do not tell other people you r privite thing
- saying bad words to each others
- if something happen to you tell police
14 Clues: no telling anyone • no posting privacy • beling mean online • do not eat your mac • no going privite site • do not eat your friends item • no make people kill them self • saying bad words to each others • no playing game that is not public • instagram is one of them and tiktok • don't tell anyone exept your parent • if something happen to you tell police • ...
Cyber ethics 2025-06-13
Across
- malicious hackers break system
- defending network and data
- fake email and information
- internet manner and behaviour
- coping without giving credit
- right and wrong online
- illegal activities using computer
- legal right to creation
Down
- protection against digital threat
- online harassment or threats
- right and wrong online
- traces left online
- contorl over personal data
- unauthorized system access
- sending unwanted bulk messeages
15 Clues: traces left online • right and wrong online • right and wrong online • legal right to creation • defending network and data • contorl over personal data • fake email and information • unauthorized system access • online harassment or threats • coping without giving credit • internet manner and behaviour • malicious hackers break system • sending unwanted bulk messeages • ...
Government Crisis 2025-01-21
20 Clues: Change • Crisis • Crisis • Threats • Security • Security • Scarcity • Disruption • Inequality • Populations • Polarization • Deficiencies • Health Crisis • Workforce Crisis • Justice Movements • Health Emergencies • Security Challenges • Economic Instability • Media and Misinformation • and Lack of Transparency
QBE 2020-04-01
Across
- Large broker for Minibus
- Large broker for P&C
- Data Protection
- Principle of Insurance
- Minibus Product
- Newest SME Product
- #together
- Insured vehicles must be logged on
- Complaints are logged on
- SME Team
- Partner Charity
Down
- Fleet Product
- P&C Product
- QBE Headquarters
- QBE's platform to process payments
- QBE CEO
- Employee Assistance
- E-Trade Platform
- Offshore Office
- Annual Staff Survey
- Diverse Hashtag
- Head of BA
22 Clues: QBE CEO • SME Team • #together • Head of BA • P&C Product • Fleet Product • Data Protection • Minibus Product • Offshore Office • Diverse Hashtag • Partner Charity • QBE Headquarters • E-Trade Platform • Newest SME Product • Employee Assistance • Annual Staff Survey • Large broker for P&C • Principle of Insurance • Large broker for Minibus • Complaints are logged on • QBE's platform to process payments • ...
TRADES AND PROFESSIONS TELESECUNDARIA 774 2024-12-09
Across
- VIDRIERO
- VENDEDORA POR CATALOGO
- SECRETARIA
- DUEÑO DE CYBER
- CONTADOR
- VENDEDOR DE DULCES
- MAESTRO
- DOCTOR
- TAXISTA
- ESTILISTA
- VETERINARIO
- INGENIERO
- DIRECTOR/DIRECTORA
- MUSICO
- POLICIA ESTATAL
Down
- EMPLEADO DE ALMACEN
- CONSERJE
- ALBAÑIL/TRABAJADOR DE CONSTUCCION
- GERENTE
- MONTACARGISTA
- TRACTORISTA
- SOLDADOR
- TRABAJADOR DE FABRICA
- TRAILERO/CAMIONERO
- EL TRABAJA EN LAS MILPAS
- ARQUITECTO
- PELUQUERO/BARBERO
- AMA DE CASA
- DESPACHO CONTABLE
- GRANJERO/AGRICULTOR
30 Clues: DOCTOR • MUSICO • GERENTE • MAESTRO • TAXISTA • VIDRIERO • CONSERJE • SOLDADOR • CONTADOR • ESTILISTA • INGENIERO • SECRETARIA • ARQUITECTO • TRACTORISTA • AMA DE CASA • VETERINARIO • MONTACARGISTA • DUEÑO DE CYBER • POLICIA ESTATAL • PELUQUERO/BARBERO • DESPACHO CONTABLE • TRAILERO/CAMIONERO • VENDEDOR DE DULCES • DIRECTOR/DIRECTORA • EMPLEADO DE ALMACEN • GRANJERO/AGRICULTOR • TRABAJADOR DE FABRICA • VENDEDORA POR CATALOGO • ...
Cybersecurity 2023-06-04
Across
- process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
- when a programmer gains access to a computer or network by bypassing security steps through a trapdoor programs
- a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device
- provides additional- revised or updated code for an operating system or application
- software that is secretly installed on a user’s device to gather sensitive data
- someone who intentionally challenges the security of a computer system- network- or web application to discover vulnerabilities that an attacker or hacker could exploit
- information should be consistently and readily accessible for authorized parties
- attack when one or more compromised systems launch a flooding attack on a remote target(s)- in an attempt to overload network resources and disrupt service.
- a type of internet fraud that seeks to acquire a user’s credentials by deception- usually taking the form of fake notifications from banks- providers- e-pay systems- and other organizations.
- taking advantage of a vulnerability or flaw in a network system to penetrate or attack it.
- the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience.
- the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data
- an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
- maintaining the consistency- accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit- and steps must be taken to ensure data cannot be altered by unauthorized people
Down
- assurance that information is not disclosed to unauthorized persons- processes- or devices.
- an attack method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
- criminals who break into computer networks with malicious intent.
- an increasingly popular method of gaining access to unauthorized resources by exploiting human psychology and manipulating users – rather than by breaking in or using technical hacking techniques
- a facility where enterprise information systems (websites- applications- databases- data centers and servers- networks- desktops- and other endpoints) are monitored- assessed- and defended by SOC analysts.
- look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found- they report them to the owner- sometimes requesting a small fee to fix the problem
- sometimes also called “ethical hackers” or “good hackers” – exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.
- the practice and study of techniques for secure communication in the presence of adversarial behavior.
- the process of verifying the identity of a user or piece of information and the veracity of the information provided. In computing- it is the process of identifying a person or system with a username- password- etc.
- encrypted parts of the internet that are not indexed by search engines- most notoriously used by all types of criminals including; pedophiles- illicit human and contraband traffickers- and cyber criminals- to communicate and share information without being detected or identified by law enforcement.
- a kind of spyware software that records every keystroke made on a computer’s keyboard
- when a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
- a security system that forms a virtual perimeter around a network of workstations preventing viruses- worms- and hackers from penetrating.
- a general term for any type of intrusive computer software with malicious intent against the user.
- a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
- a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
30 Clues: criminals who break into computer networks with malicious intent. • software that is secretly installed on a user’s device to gather sensitive data • information should be consistently and readily accessible for authorized parties • provides additional- revised or updated code for an operating system or application • ...
Per. 2 Cyber Security Words and Terms Puzzle Maker 2022-09-12
Across
- Text that can be read by the human eye, like google results for how to make eggs.
- A simple form of code for software that can be written in word editors.
- A form of malicious software that disguises itself as a harmless computer program.
- The programs and other operating systems used by a computer.
- A test that distinguishes between robots and humans using a website.
- A language used to create and control the content on a website.
- The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
- official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- An error, flaw, failure, or fault in a computer program or system.
Down
- A secret word or phrase that is used to access a computer system or service.
- Software that can only be run for a limited amount of time before it expires.
- seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- An alternative way to access software or hardware.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
- The method of obtaining user information through fraudulent communications targeted directly at people
- Program that automatically execute tasks as ordered by the creator of the program.
21 Clues: An alternative way to access software or hardware. • The programs and other operating systems used by a computer. • A language used to create and control the content on a website. • An error, flaw, failure, or fault in a computer program or system. • A test that distinguishes between robots and humans using a website. • ...
Per. 2 Cyber Security Words and Terms Puzzle Maker 2022-09-12
Across
- Software that can only be run for a limited amount of time before it expires.
- official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- A simple form of code for software that can be written in word editors.
- A language used to create and control the content on a website.
- Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- An alternative way to access software or hardware.
- A test that distinguishes between robots and humans using a website.
- An error, flaw, failure, or fault in a computer program or system.
- Text that can be read by the human eye, like google results for how to make eggs.
- A cyber attacker who uses software and social engineering methods to steal data and information.
Down
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
- Program that automatically execute tasks as ordered by the creator of the program.
- A secret word or phrase that is used to access a computer system or service.
- typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, can corrupt data or expand throughout a network and damage systems across a company.
- The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
- The programs and other operating systems used by a computer.
- The method of obtaining user information through fraudulent communications targeted directly at people
- A form of malicious software that disguises itself as a harmless computer program.
22 Clues: An alternative way to access software or hardware. • The programs and other operating systems used by a computer. • A language used to create and control the content on a website. • An error, flaw, failure, or fault in a computer program or system. • A test that distinguishes between robots and humans using a website. • ...
Say no to cyber bullying 2022-03-20
Public Safety: Agencies and Interactions 2024-10-21
Across
- area where an agency has an authority
- Premier agency known for handling major criminal cases, counterterrorism, and counterintelligence efforts.
- This federal agency, known by a three-letter acronym, oversees the enforcement of federal laws related to firearms, explosives, and arson investigations, as well as combating the illegal trafficking of alcohol and tobacco.
- Track public health impacts of drug abuse; develop health response plans.
- Federal agency that employs elite agents to provide protection to top government officials and also plays a crucial role in tracking and preventing counterfeit money production.
- responsible for enforcing drug-related federal laws, investigating drug trafficking, and regulating controlled substances.
- Coordinate state-level emergency resources; assist in crisis management.
- Track and apprehend fugitives related to drug trafficking; support law enforcement efforts.
Down
- Agency tasked with enforcing traffic laws on state highways and major roads, and often providing assistance in rural areas.
- Provide cyber intelligence on drug trafficking operations conducted online.
- the level of jurisdiction that is supreme
- This federal agency, represented by a three-letter acronym, enforces immigration laws, investigates customs violations, and often deals with deportations.
- Develop emergency response plans for public health crises related to drug overdoses.
- people in the employ of private business who do activities like asset protection.
- term for the collection of laws that define crimes in United States
15 Clues: area where an agency has an authority • the level of jurisdiction that is supreme • term for the collection of laws that define crimes in United States • Coordinate state-level emergency resources; assist in crisis management. • Track public health impacts of drug abuse; develop health response plans. • ...
information security 2020-12-12
Across
- get near to a place or person
- design for a particular purpose
- protect people
- into giving information over the internet
- relating to a position of responsible
- hacks into other people's computer systems
- an arrangement with a bank
Down
- someone who commits a crime
- carry out a computer operation
- the act of hiding the truth
- number use to call a particular phone
- an illegal plan for making money
- a secret word or combination of letters or numbers
- control what a computer does
- facts about a situation
- a set of connected things
16 Clues: protect people • facts about a situation • a set of connected things • an arrangement with a bank • someone who commits a crime • the act of hiding the truth • control what a computer does • get near to a place or person • carry out a computer operation • design for a particular purpose • an illegal plan for making money • number use to call a particular phone • ...
Informational Security 2020-12-11
Across
- information collected for use.
- computer programs.
- an occasion when an army or country uses force to enter and take control of another country.
- a set of connected things or devices that operate together.
- to keep someone or something safe from injury, damage, or loss.
- a person who is skilled in the use of computer systems.
- a secret word
- relating to a position of responsibility.
Down
- on your finger.
- allow you to take it out when you need to.
- a computer program or information that has been or can be copied into a computer's memory.
- someone's right to keep their personal matters and relationships secret.
- a machine, for example a phone or computer.
- the method or possibility of getting near to a place or person.
- an illegal plan for making money, especially one that involves tricking people.
- the system for using computers to send messages over the internet.
16 Clues: a secret word • on your finger. • computer programs. • information collected for use. • relating to a position of responsibility. • allow you to take it out when you need to. • a machine, for example a phone or computer. • a person who is skilled in the use of computer systems. • a set of connected things or devices that operate together. • ...
TRANSACTION SECURITY 2017-02-21
Across
- To take advantage of something.
- Not real.
- Connection to the Internet.
- To make something better, more modern, more useful.
- Verification of data.
- A virtual wall for protection.
- You can reach somebody.
- A box where you write in your username and password.
Down
- An offender who wants to do crime online.
- Not public.
- The type of crime through the net.
- Preventing any attack or crime.
- Doing business and sending over money.
- A person who wants to buy something.
- Local Area Network.
- Via the Internet
16 Clues: Not real. • Not public. • Via the Internet • Local Area Network. • Verification of data. • You can reach somebody. • Connection to the Internet. • A virtual wall for protection. • Preventing any attack or crime. • To take advantage of something. • The type of crime through the net. • A person who wants to buy something. • Doing business and sending over money. • ...
Security Operations 2020-10-21
Across
- Referral submitted when reversal fails for master card
- occurs when a new, renewal, or reissued card is mailed but never received and used without customers permission (Refer to PRO1002443)
- your hold time is equal to or greater than 4 minutes, an extended hold time will be scored as a __ (REF1001046)
- Pend case for _ business day(s) to ensure that the loss type is complete. (PRO1002443)
- Do not rebill if cm never disputed charge and receives this letter. Submit a RR to recoveries for rebill.
- Must be completed before disclosing any account information.
- Credit Card that has been printed, altered, embossed, and/or encoded so it appears to be a valid card. Account closure type should be updated to ___ (Refer to PRO1002443)
- if during call there is less than 10 seconds of dead their will be ___ on score (PRO1055360 )
Down
- DOB, Last 4 ssn, Security password
- Screen in Rumba that allows you to update closure type of security cancelled card
- Complaint capture rate should be at least __%
- expressions of dissatisfaction will not be considered a Complaint Ex)"I'm upset that you cannot tell me how my card was compromised!" (COP1013206)
- Once in chargeback, you can only process a __ if the cm accepts charge as valid OR a merchant return is present
- __ seconds or longer both process and FCIM cards will be scored as a 0.
- Failing to answer call within 10 seconds will result in a ___ quality (REF1001046)
- ___ will be scored as an incomplete if hold time is greater than 3 minutes but less than 4 minutes 1 instance on call.(REF1001046)
16 Clues: DOB, Last 4 ssn, Security password • Complaint capture rate should be at least __% • Referral submitted when reversal fails for master card • Must be completed before disclosing any account information. • __ seconds or longer both process and FCIM cards will be scored as a 0. • Screen in Rumba that allows you to update closure type of security cancelled card • ...
Security Systems 2023-06-13
information security 2023-08-28
Across
- network of computers and devices managed as a unit with the same procedures
- Virus macros which have been programmed to carry out malicious intent
- to or damage sensitive information on a computer
- information or data which can be accessed when needed
- procedure used to determine user privileges or access levels to the system
- how information is protected
- state of being complete or uncorrupted
- rights an individual or organization has over information and how it is used
- calculated assessment of potential threats to an organization’s security
Down
- making sure a person is who they say they are
- ransomware and the numerous other programs used by hackers to gain
- gap or weakness which undermines an organization’s security efforts
- short for "malicious software" and covers threats such as viruses, worms, Trojan
- requirement of being private or secret
- rules
- intent of doing harm
16 Clues: rules • intent of doing harm • how information is protected • requirement of being private or secret • state of being complete or uncorrupted • making sure a person is who they say they are • to or damage sensitive information on a computer • information or data which can be accessed when needed • ransomware and the numerous other programs used by hackers to gain • ...
Food Security 2024-11-28
Across
- Natural toxin in some seafood.
- Deficiency caused by lack of iron.
- Environmentally friendly farming.
- Heating process to kill pathogens
- Packaging to extend food shelf life.
- Food grown without synthetic chemicals.
- Presence of harmful microorganisms in food
- Global lack of food access
Down
- Substances enhancing flavor or preservation.
- A measure of energy in food
- Protecting food from contamination.
- Harmful chemical in improperly stored food.
- Temperature range where bacteria grow rapidly
- The condition of having access to enough nutritious food.
- Food safety regulatory body
- Practice of rotating crops.
16 Clues: Global lack of food access • A measure of energy in food • Food safety regulatory body • Practice of rotating crops. • Natural toxin in some seafood. • Environmentally friendly farming. • Heating process to kill pathogens • Deficiency caused by lack of iron. • Protecting food from contamination. • Packaging to extend food shelf life. • Food grown without synthetic chemicals. • ...
CODEBREAKERS CROSSWORD 2024-12-07
14 Clues: Eight bits • Code infiltrator • Fix coding errors • Cyber scam tactic • Digital image unit • Unlocks encryption • Dots and dashes code • Programming iteration • Base-2 numeric system • Temporary storage space • Prefix for hidden messages • WWII code-breaking machine • Step-by-step problem solver • Cryptographic function output
test 2021-03-29
15 Clues: Hope • Growth • Belief • Dreams • Success • Courage • Freedom • Security • Assurance • Stability • Resilience • Opportunity • Empowerment • Achievement • Possibilities
help 2022-12-19
15 Clues: service • savings • mobility • security • workflows • reporting • visibility • compliance • efficiency • scalability • forecasting • flexibility • productivity • collaboration • centralization
Harcélement 2024-06-24
Across
- : Idéologie postulant une hiérarchie des races.
- : Fait de recommencer (une action…).
- passif : Les témoins passifs ne participent pas directement aux actes et/ou propos négatifs mais ne s'y opposent pas non plus.
- : Le cyber-harcèlement est une forme de violence numérique caractérisée par un harcèlement, qui peut s'exercer à travers divers canaux numériques.
- : Fait de souffrir.
- : Acte ou parole qui vise à outrager ou constitue un outrage.
- : Témoin d'un évènement ; personne qui regarde un spectacle.
- : Ennuyer en étant importun.
- : Personne qui certifie ou peut certifier quelque chose, qui peut en témoigner.
- :Suivre pour atteindre.
- : Affliger de souffrances physiques ou morales ; faire vivre dans l'angoisse.
Down
- : Destiné à intimider, à en imposer.
- : Faire quelque chose, avoir une activité qui transforme plus ou moins ce qui est.
- : Tourmenter avec insistance, physiquement ou moralement, de façon agaçante.
- : Action, parole par laquelle on se moque.
- : Personne qui subit les injustices de quelqu’un, ou qui souffre (d'un état de choses).
- : Tourmenter sans relâche par des traitements injustes et cruels.
- de dépression : C’est une maladie psychique fréquente qui par ses troubles de l'humeur, perturbe fortement la vie quotidienne.
- actif : Un témoin actif est une personne qui observe un comportement inacceptable envers quelqu'un d'autre et qui intervient pour changer le cours des événements.
- : État, situation d'une personne isolée (solitude) ou qu'on isole.
20 Clues: : Fait de souffrir. • :Suivre pour atteindre. • : Ennuyer en étant importun. • : Destiné à intimider, à en imposer. • : Fait de recommencer (une action…). • : Action, parole par laquelle on se moque. • : Idéologie postulant une hiérarchie des races. • : Témoin d'un évènement ; personne qui regarde un spectacle. • ...
Cyber Mobbing - Doris, Lena, Elias und Marietta 2015-03-05
7 Clues: Fachwort für Selbstmord • Medizin gegen Traurigkeit • Welcher Zwang führt zu Cyber Mobbing? • Folge von Mobbing - sehr traurig sein • Nachname eines bekannten Mobbingopfers • Welche Art von Mobber ist man wenn man aus Spaß mobbt? • Ein soziales Netzwerk wo besonders oft Cyber Mobbing praktiziert wird.
Week 2 Crossword Puzzle 2024-05-15
Across
- ,The Application/Tool do we use to reach out to Internal Departments?
- ,If a customer contacts on live chat and is not logged in asking about a bet being settled incorrectly what besides Standard Security can be asked?
- ,The Application/Tool do we use to bring up customers accounts to review.
- ,The Technique that is used to handle all customers.
- ,What is it called when you ask for Full name date of birth and email address or telephone number?
- ,What communication method would you see a majority of Enhanced Security to resolve an customers issue?
Down
- ,For what category would you ALWAYS ask for Enhanced Security?
- ,What communication method would you first ask for the username to bring up account?
- ,What communication method would you see a majority of no security needed?
- ,The relevant tool that we use to review all policies and procedures?
- ,Supplying the customer with accurate and up-to-date information regarding aspects of their account that are relevant to the query or issue.
- ,What is it called when you ask for Full name date of birth email or telephone number address and username?
- ,The Application/Tool do we use to check what documents customer send in to complete Verification.
- ,Means answering the customers questions or bringing their issues to a satisfactory conclusion to the best of your ability by using the resources available?
- ,Ensuring that each and every contact is delivered in a way which demonstrates a real commitment to the customer and bet365.
- ,What is it called where you can find what security is needed for each communication method?
- ,What communication method can you only send if you are logged into your account?
- ,The Application/Tool do we use to send emails throughout bet365.
18 Clues: ,The Technique that is used to handle all customers. • ,For what category would you ALWAYS ask for Enhanced Security? • ,The Application/Tool do we use to send emails throughout bet365. • ,The relevant tool that we use to review all policies and procedures? • ,The Application/Tool do we use to reach out to Internal Departments? • ...
Lesson 18 2024-04-16
Across
- Personal device integration
- Essential mobile device maintenance task
- Spontaneous restart
- Remote device reset
- Unofficial app installation
- Advanced mobile protection feature
- Mobile security barrier
- Motion-sensitive feature failure
- Security measure after errors
Down
- Organizational mobile strategy
- _____ is designed to protect mobile devices such as smartphones and tablets from various security threats and vulnerabilities
- Personal data exposure
- Unofficial software markets
- Mimicking app attack
- Data safeguarding method
- Device superpower
- Simple device fix
17 Clues: Device superpower • Simple device fix • Spontaneous restart • Remote device reset • Mimicking app attack • Personal data exposure • Mobile security barrier • Data safeguarding method • Personal device integration • Unofficial software markets • Unofficial app installation • Security measure after errors • Organizational mobile strategy • Motion-sensitive feature failure • ...
Cyber Awareness 2019-04-12
Across
- a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites.
- An email message sent to a large number of people without their consent, usually promoting a product or service
- What is it called to break into another computer system
- A program that secretly monitors your actions.
- What should be strong and unpredictable to protect your data on-line?
- what is it called if people are nasty to you online?
- An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops.
Down
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- What do you call a program that is sent to harm your computer
- A term used to disallow someone to reach you digitally
- What is a network security system used to stop unauthorised access called?
- What software can we use to protect out computer?
- When copying information or images off the internet you must check for what legal information?
- I am online and I meet someone my age in a chat room. Is it OK to give them my address or phone number?
14 Clues: A program that secretly monitors your actions. • What software can we use to protect out computer? • what is it called if people are nasty to you online? • A term used to disallow someone to reach you digitally • What is it called to break into another computer system • What do you call a program that is sent to harm your computer • ...
Cyber Ethics 2025-05-29
Cyber security 2023-09-09
Cyber Crossword 2021-03-03
Across
- Software that is designed to disrupt, damage or gain unathorised access to a computer system
- A type of malware designed for spying on user activity without their knowledge
- A form of malware that holds data hostage, typically encrypting files and demanding that a ransom be paid so that the data can be recovered
- A group of computers, printers and other devices that are interconnected and governed as a whole
- An internet address for your computer, which is identified when communicating over a network
- A defensive technology designed to prevent unauthorised access to a network or system
- A tool that allows users to remain anonymous while using the internet by masking their location and encrypting traffic
Down
- An individual that uses computers to gain unathorised access to data
- A set of programs that tell a computer to perform a task
- The process of encoding data to prevent theft, making it only accessible with a key
- Technology that allows you to access files and services through the internet from anywhere in the world
- A technique used by hackers to try and obtain sensitive information, often through emails
- The moment a hacker successfully gains access to a computer or other device
- A type of malware that aims to corrupt a computer before spreading to others
14 Clues: A set of programs that tell a computer to perform a task • An individual that uses computers to gain unathorised access to data • The moment a hacker successfully gains access to a computer or other device • A type of malware that aims to corrupt a computer before spreading to others • ...
Cyber Crossword 2021-10-27
Across
- To copy someone’s behavior and appearance,
- A preposition indicating toward the inside of
- The cubes freezes in the refrigerator
- Born young child
- Freedom from outsider control
- Money that is earned from work
- A picture by camera or mirror is called
Down
- Synonym of start
- Exactly the same
- Some thing that is not real in your mind
- Antonym of formal
- An ordered list in the front or end of the book
- To refuse to hear or see someone’s action
- A unit of measurement
14 Clues: Synonym of start • Exactly the same • Born young child • Antonym of formal • A unit of measurement • Freedom from outsider control • Money that is earned from work • The cubes freezes in the refrigerator • A picture by camera or mirror is called • Some thing that is not real in your mind • To refuse to hear or see someone’s action • To copy someone’s behavior and appearance, • ...
Cyber ethics 2025-06-13
Across
- malicious hackers break system
- defending network and data
- fake email and information
- internet manner and behaviour
- coping without giving credit
- right and wrong online
- illegal activities using computer
- legal right to creation
Down
- protection against digital threat
- online harassment or threats
- right and wrong online
- traces left online
- contorl over personal data
- unauthorized system access
- sending unwanted bulk messeages
15 Clues: traces left online • right and wrong online • right and wrong online • legal right to creation • defending network and data • contorl over personal data • fake email and information • unauthorized system access • online harassment or threats • coping without giving credit • internet manner and behaviour • malicious hackers break system • sending unwanted bulk messeages • ...
Cyber hygiene 2025-05-20
Across
- Mowa nienawiści w internecie
- Zapora sieciowa chroniąca przed nieautoryzowanym dostępem
- Nękanie, zastraszanie lub ośmieszanie kogoś za pomocą technologii cyfrowych
- Nadmierne dzielenie się informacjami i zdjęciami dzieci w internecie przez rodziców
- Rodzaj złośliwego oprogramowania, które replikuje się, infekując inne programy
- Zautomatyzowany program wykonujący określone zadania
- Oprogramowanie wyświetlające niechciane reklamy
- Osoba włamująca się do systemów komputerowych
Down
- Manipulacja obrazem lub dźwiękiem tworząca fałszywe, ale realistyczne materiały
- Chwytliwy, często mylący tytuł mający na celu skłonienie do kliknięcia
- Celowe wprowadzanie w błąd poprzez fałszywe informacje
- Złośliwe oprogramowanie
- Osoba prowokująca i zakłócająca dyskusje online
- Uwodzenie nieletnich w sieci
14 Clues: Złośliwe oprogramowanie • Mowa nienawiści w internecie • Uwodzenie nieletnich w sieci • Osoba włamująca się do systemów komputerowych • Osoba prowokująca i zakłócająca dyskusje online • Oprogramowanie wyświetlające niechciane reklamy • Zautomatyzowany program wykonujący określone zadania • Celowe wprowadzanie w błąd poprzez fałszywe informacje • ...
digital footprint 2017-09-08
Across
- passwords should contain what in addition to upper and lowercase letters
- things such as google and bing can be used to do this
- communication done through any digital device
- use of someone else's work passed as your own
- the thing that allows us all to be connected and all social media platforms are based on
- passwords should never be one of these
- who can access your information that is online
- never post personal information to the internet
Down
- hostile behavior done over the internet is call cyber...
- should be something only you know consisting of numbers and letters
- snap chat, Instagram, facebook are all forms of cyber bullying
- the information you leave behind every time you post
- once you delete something it is gone forever and no one can see it true/false
- these places often check your social media accounts before accepting you
- all social media accounts should be made what
- should be your number one priority on the internet
16 Clues: passwords should never be one of these • communication done through any digital device • all social media accounts should be made what • use of someone else's work passed as your own • who can access your information that is online • never post personal information to the internet • should be your number one priority on the internet • ...
PRIVACY ESCAPE ROOM 2025-06-10
Across
- Upholding privacy principles requires ongoing _
- A client may make one of these following a breach if they think their personal information has been mishandled
- Making parts of a document hidden to protect privacy
- Sharing information
- It's important to send sensitive and personal client information via _ attach
- A type of AI that client information should never be entered into (or any for that matter!)
- Unique data set used to represent a person's identity
Down
- PAW occurs every year to increase _ of privacy issues and and the importance of protecting personal information
- Scheme under which risk related information can be shared
- Privacy is __'s business
- Information provided to the wrong person would be considered a _
- 1988 is the year the Australian Parliament passed the Privacy _
- Relating to, or involving computers or computer networks
- The way cyber criminals trick you into giving them personal information
- Client information provided to the courts is requested under a _
- Sensitive information is personal information that includes information or an opinion about an individual
16 Clues: Sharing information • Privacy is __'s business • Upholding privacy principles requires ongoing _ • Making parts of a document hidden to protect privacy • Unique data set used to represent a person's identity • Relating to, or involving computers or computer networks • Scheme under which risk related information can be shared • ...
Per. 2 Cyber Security Words and Terms Puzzle Maker 2022-09-12
Across
- A cyber attacker who uses software and social engineering methods to steal data and information.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- The method of obtaining user information through fraudulent communications targeted directly at people
- A test that distinguishes between robots and humans using a website.
- typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, can corrupt data or expand throughout a network and damage systems across a company.
- Program that automatically execute tasks as ordered by the creator of the program.
- A language used to create and control the content on a website.
- official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
- The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- A simple form of code for software that can be written in word editors.
- An error, flaw, failure, or fault in a computer program or system.
Down
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- Software that can only be run for a limited amount of time before it expires.
- A secret word or phrase that is used to access a computer system or service.
- Text that can be read by the human eye, like google results for how to make eggs.
- The programs and other operating systems used by a computer.
- An alternative way to access software or hardware.
- A form of malicious software that disguises itself as a harmless computer program.
- An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
- Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
22 Clues: An alternative way to access software or hardware. • The programs and other operating systems used by a computer. • A language used to create and control the content on a website. • An error, flaw, failure, or fault in a computer program or system. • A test that distinguishes between robots and humans using a website. • ...
Say no to cyber bullying 2022-03-20
information security 2020-03-10
Across
- безопасность
- способ средство
- защищенность, уверенность
- быстрый
- надежность
- применение использование, употребление
- средства, имущество
- опора,фундамент, прочное устойчивое положение
Down
- нарушитель защиты,взломщик
- неправильное применение, злоупотребление
- доступность
- шифр, код
- финансовые средства
- защита
- масса, куча
- небольшой портативный компьютер
16 Clues: защита • быстрый • шифр, код • надежность • доступность • масса, куча • безопасность • способ средство • финансовые средства • средства, имущество • защищенность, уверенность • нарушитель защиты,взломщик • небольшой портативный компьютер • применение использование, употребление • неправильное применение, злоупотребление • опора,фундамент, прочное устойчивое положение
global security 2021-09-19
Across
- the activity of preventing war and violence, especially using armed forces not involved in a disagreement to prevent fighting
- a formal, legally binding written agreement between actors in international law
- meeting of a (usually large) group of individuals and/or companies in a certain field who share a common interest
- violence or other harmful acts committed (or threatened) against civilians by groups or persons for political or other ideological goals
- the act of reducing, limiting, or abolishing weapons
- freedom from potential harm caused by others
- practice of influencing the decisions and conduct of foreign governments or organizations through dialogue, negotiation, and other nonviolent means
- the action of setting a limit on the number of weapons a country is allowed to own, usually in agreement with another country
Down
- the situation in which two or more countries try to have more and stronger weapons than each other
- a communication of intent to inflict harm or loss on another person
- relating to politics
- а policy of reducing Cold War tensions through verbal communication that was adopted by the United States during the presidency of Richard Nixon
- involving more than one country
- involving diplomats or the management of the relationships between countries
- ability to control people and events
- the act of surviving, is the propensity of something to continue existing, particularly when this is done despite conditions that might kill or destroy it
16 Clues: relating to politics • involving more than one country • ability to control people and events • freedom from potential harm caused by others • the act of reducing, limiting, or abolishing weapons • a communication of intent to inflict harm or loss on another person • involving diplomats or the management of the relationships between countries • ...
Food Security 2021-09-05
Across
- something that is becoming scarce because of over population
- (two words)lack of an adequate food supply
- conflict
- the name for growing food
- (2 words)long term changes in weather events and patterns world wide
- introduced insects and plant species
- when the crops get covered in water
Down
- (2 words)the lack of access to clean water
- the process of taking salt out of water
- a solution to over using the land
- a country that grows sugarcane to produce biofuels
- a movement where the buyer goes directly to the producer
- when crops can not get enough water
- scarcity of this resource is number one concern
- crops are grown to produce this instead of food
- a crop that is effected by introduced pests
16 Clues: conflict • the name for growing food • a solution to over using the land • when crops can not get enough water • when the crops get covered in water • introduced insects and plant species • the process of taking salt out of water • (2 words)the lack of access to clean water • (two words)lack of an adequate food supply • a crop that is effected by introduced pests • ...
Security Guard 2022-11-08
Across
- to look at carefully
- self-control, self-discipline
- how you stand and hold your body
- things in the way
- person who's entered an area they shouldn't have
- to turn off
- proof of who a person is
- informal language that not all undrestand
Down
- to evaluate, to judge
- people inside a car, building, etc.
- outer edge of an area
- the place where you're guarding
- acting within the law
- to physically control of confine
- a formal statement about a problem
- against the law
16 Clues: to turn off • against the law • things in the way • to look at carefully • to evaluate, to judge • outer edge of an area • acting within the law • proof of who a person is • self-control, self-discipline • the place where you're guarding • to physically control of confine • how you stand and hold your body • a formal statement about a problem • people inside a car, building, etc. • ...
Information security 2023-08-28
Across
- short for "malicious software" and covers threats such as viruses, worms, Trojan
- intent of doing harm
- how information is protected
- state of being complete or uncorrupted
- gap or weakness which undermines an organization’s security efforts
- rules
- macros which have been programmed to carry out malicious intent
- information or data which can be accessed when needed
- requirement of being private or secret
- ransomware and the numerous other programs used by hackers to gain
Down
- making sure a person is who they say they are
- calculated assessment of potential threats to an organization’s security
- procedure used to determine user privileges or access levels to the system
- network of computers and devices managed as a unit with the same procedures
- rights an individual or organization has over information and how it is used
- to or damage sensitive information on a computer
16 Clues: rules • intent of doing harm • how information is protected • state of being complete or uncorrupted • requirement of being private or secret • making sure a person is who they say they are • to or damage sensitive information on a computer • information or data which can be accessed when needed • macros which have been programmed to carry out malicious intent • ...
Information Security 2023-08-28
Across
- to or damage sensitive information on a computer
- of computers and devices managed as a unit with the same procedures
- ransomware and the numerous other programs used by hackers to gain
- sure a person is who they say they are
- an individual or organization has over information and how it is used
- assessment of potential threats to an organization’s security
- Virus-macros which have been programmed to carry out malicious intent
- rules
Down
- of being private or secret
- of being complete or uncorrupted
- or weakness which undermines an organization’s security efforts
- or data which can be accessed when needed
- used to determine user privileges or access levels to the system
- information is protected
- of doing harm
- short for "malicious software" and covers threats such as viruses, worms, Trojan
16 Clues: rules • of doing harm • information is protected • of being private or secret • of being complete or uncorrupted • sure a person is who they say they are • or data which can be accessed when needed • to or damage sensitive information on a computer • assessment of potential threats to an organization’s security • ...
medicaid abbreviations 2023-12-04
Across
- Children, Youth and Families Department
- Modified Adjusted Growth Income
- Your Eligibility System NM (on-line benefit application system)TANF Temporary Assistance for Needy Families
- Help Us Make a Decision form
- NM Human Services Department
- NM Department of Health
- Social Security Disability Insurance (Federal)
- supplemental nutrition assistance program
- Notice of Case Action
- category of eligibility
- Third Party Liability
Down
- department of workforce solutions
- income support division
- Electronic Health Record
- TaNF
- NM Human Services Department’s Medical Assistance Division
- Supplemental Security Income
- United States Social Security Administration
- New Mexico Administrative Code
- Explanation of Benefits
- Electronic Fund Transfers
21 Clues: TaNF • Notice of Case Action • Third Party Liability • income support division • NM Department of Health • Explanation of Benefits • category of eligibility • Electronic Health Record • Electronic Fund Transfers • Help Us Make a Decision form • NM Human Services Department • Supplemental Security Income • New Mexico Administrative Code • Modified Adjusted Growth Income • ...
I am not here 2023-07-22
20 Clues: VP • VP • Peso? • Justin • BOOMBA! • Wakanda! • librarian • counselor • principal • zia mascot • room number • nmsu mascot • 2nd security • security guard • I have a dream • batman sidekick • wing room is in • second counselor • nmsu rival north of us • nmsu rival south of us
Extreme Sports 2021-09-23
Across
- Use this element when you're in a dark cave
- It's a risk factor when you practice extreme sports and it's in kilos
- Activity in which a person is propelled by the wind-down a ravine and uses a parachute
- Extreme sport where you jump out of a plane with a parachute
- A security element to protect your eyes
- A security element to protect your hand from hurting you
- Use this security element to protect the head
Down
- When you broke a bone anywhere in your body
- Extreme sport that is done in the rapids of a river
- A security element that does not allow you to drown
- A security element to do bungee jumping
- Use this element when you do Paragliding
- Is a risk of practicing any extreme sport
- A natural underground chamber
- Extreme sport in which a person throws himself from a high height,
- A situation similar to dizziness
16 Clues: A natural underground chamber • A situation similar to dizziness • A security element to do bungee jumping • A security element to protect your eyes • Use this element when you do Paragliding • Is a risk of practicing any extreme sport • When you broke a bone anywhere in your body • Use this element when you're in a dark cave • ...
Epic Crossword 2015-02-18
Cyber crime 2024-01-16
Cryptober Crossword Puzzle #1 2020-09-30
Across
- The means of proving identity using two authentication factors
- Any weakness in an asset or security protection which would allow for a threat to cause harm
- The act of falsifying the identity of the source of a communication or interaction
- A means of security evaluation where automated tools and manual exploitations are performed by security and attack experts
- Program designed to detect and remove computer viruses
- A social engineering attack that attempts to collect information from victims
Down
- In computing, the process or action of verifying the identity of a user or process
- A means of isolating applications from critical system resources and other programs. It provides an extra layer of security that prevents malware or harmful applications from negatively affecting your system.
- The number one spot in the OWASP 10
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system
- A security tool that attempts to detect the presence of intruders or the occurrence of security violations
- Small amounts of data generated by websites that are saved by a browser
- The act of collecting frames or packets off of a data network communication
- A set of changes to a computer program or its supporting data designed to update, fix, or improve it. ... This includes fixing security vulnerabilities and other bugs.
- An error or mistake in software coding or hardware design or construction
- A type of surveillance software used to record the keystrokes made on a device
16 Clues: The number one spot in the OWASP 10 • Program designed to detect and remove computer viruses • The means of proving identity using two authentication factors • Small amounts of data generated by websites that are saved by a browser • An error or mistake in software coding or hardware design or construction • ...
Cyber mobbing 2022-05-03
Across
- was ist Cyber Mobbing?
- Cyber Mobbing ist ...
- Wenn dich jemand im Internet mobbt kannst du einen ... machen
- Was lernst du in dieser Brochüre?
- Einen erwachsenen in dieses Thema miteinzubeziehen ist meistens eine ...
Down
- Mache immer einen Screenshot von dem Chat denn somit hast du ...
- was kann man für die Person machen als außenstehender
- Falls du jemals in so eine Situation gerätst, kannst du im schlimmsten fall jemanden ...
8 Clues: Cyber Mobbing ist ... • was ist Cyber Mobbing? • Was lernst du in dieser Brochüre? • was kann man für die Person machen als außenstehender • Wenn dich jemand im Internet mobbt kannst du einen ... machen • Mache immer einen Screenshot von dem Chat denn somit hast du ... • Einen erwachsenen in dieses Thema miteinzubeziehen ist meistens eine ... • ...
Netweorks 2019-05-16
Across
- an impression or mark made on a surface by a person's fingertip, able to be used for identifying individuals from the unique pattern of whorls and lines on the fingertips.
- each unique piece of hardware on a network has a MAC address
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- a secret word or phrase that must be used to gain admission to a place.
Down
- the process or action of proving or showing something to be true, genuine, or valid.
- the process of converting information or data into a code
- A piece of data sent over a network. Messages have to be broken down into binary data packets before they are transferred.
- A device or system used to protect a network from unauthorized access.
- A unique identifier issued to each device connected to a network
9 Clues: the process of converting information or data into a code • each unique piece of hardware on a network has a MAC address • A unique identifier issued to each device connected to a network • A device or system used to protect a network from unauthorized access. • a secret word or phrase that must be used to gain admission to a place. • ...
ITA Times - Client/Supplier Crossword Puzzle - July 2025 2025-07-22
Across
- This client had three big Event Gifting programs this year that operated in Spain, Mexico, and soon in Indonesia.
- This is Event Gifting's #1 financial client.
- This is a prepaid only client whose name doubles as a mode of transportation on railroad tracks - but with different spelling.
- This client won team of the year last fiscal year.
Down
- This client is very well known by anyone who worked in the call center at some point in time for the high number of calls and memorable participants. Note: their name has changed in recent years.
- The buyers are working hard to move all suppliers to this new system that is replacing DSCO.
- This is a newer client that has heightened our awareness for fraud and cyber security.
- This is the top supplier that our buyers work with.
- A local grocery store that we handle Anniversary Awards for with custom PAGs.
9 Clues: This is Event Gifting's #1 financial client. • This client won team of the year last fiscal year. • This is the top supplier that our buyers work with. • A local grocery store that we handle Anniversary Awards for with custom PAGs. • This is a newer client that has heightened our awareness for fraud and cyber security. • ...
Solutions 2024-05-12
Across
- This service line is notable for its solutions including ISTRA (Information Security Tech Risk Assessment) among others, and also has UIDAI (Unique Identification Authority of India) among its list of clients. ID the intials of this service line
- This solution within TRA implements GRC solutions like ServiceNow, Archer, OneTrust etc., factoring in technology risk, inherent risk, program governance, audit considerations, regulatory considerations and industry best practices. What is it called?
- The four core capabilities of this serviceline include Data Strategy and Governance, Advanced Data management, Data Insight and Visualization and Intelligent Automation. ID this serviceline
Down
- This service line provides its clients with services such as Business continuity Planning, ISO22301 implementation, Cyber Maturity assessments and Data Privacy assessments for compliance with industry/regulatory standards. ID the initials of this service line
- The key solutions offered within this service line include OT security, Incident response, red teaming, vulnerability management & remediation, and app security. Name the initials of this service line.
5 Clues: The four core capabilities of this serviceline include Data Strategy and Governance, Advanced Data management, Data Insight and Visualization and Intelligent Automation. ID this serviceline • ...
IOT PROTOCOLS 2024-02-13
Across
- - Measures to protect data and devices.
- - Ability to expand system capacity.
- - Delay in data transmission.
- - Device detecting and transmitting data.
- - Combining systems to work together.
- - Network security barrier.
- - Rules for communication between devices.
- - Process automation using technology.
- - Communication without physical connections.
- - Connects different networks.
- - Data transfer capacity.
- - Signal disruption.
- - Software embedded in devices.
- - Short-range wireless technology.
- - Changing signal characteristics.
Down
- - Weakness in security.
- - Verifying identity.
- - Range of frequencies.
- - Improving efficiency and performance.
- - Embedded software in devices.
- - Wired networking standard.
- - Securing data with codes.
- - Framework supporting systems.
- - Interconnected devices or systems.
- - Integrated into larger systems.
25 Clues: - Signal disruption. • - Verifying identity. • - Weakness in security. • - Range of frequencies. • - Data transfer capacity. • - Network security barrier. • - Securing data with codes. • - Wired networking standard. • - Delay in data transmission. • - Connects different networks. • - Embedded software in devices. • - Framework supporting systems. • - Software embedded in devices. • ...
cyber security 2017-06-30
3 Clues: malicious code • spreads through the inbox and makes a copy of itself • practical networks to send copies of the original code to other computers
Cyber security 2021-03-20
Cyber Security 2022-11-28
cyber security 2024-11-11
3 Clues: A string of characters that allows access to a computer system or service. • Network security device that controls incoming and outgoing network traffic. • A program that monitors a device and remove suspicious or malicious software.
bullying 2023-09-21
CP Security 2014-11-19
Across
- Out sick during an emergency
- Staying ______ will keep you safe.
- Could be an identity or just a book of checks
- Holds after-robbery info
- Purchase requiring signature
- Debit/Visa dispute form number FSP
- ACH dispute form number in FSP
- Red flag situation
Down
- To enter or not to enter
- Systems in place for your safety
- Superman
- Fake checks and cash
- Describing suspicious person
- Your go-to for all things security
- Unauthorized transaction
- Member claims fraudulent transaction
16 Clues: Superman • Red flag situation • Fake checks and cash • To enter or not to enter • Holds after-robbery info • Unauthorized transaction • Out sick during an emergency • Describing suspicious person • Purchase requiring signature • ACH dispute form number in FSP • Systems in place for your safety • Staying ______ will keep you safe. • Your go-to for all things security • ...
information security 2023-08-28
Across
- making sure a person is who they say they are
- intent of doing harm
- Virus- macros which have been programmed to carry out malicious intent
- network of computers and devices managed as a unit with the same procedures
- requirement of being private or secret
- short for "malicious software" and covers threats such as viruses, worms, Trojan
- how information is protected
- information or data which can be accessed when needed
Down
- gap or weakness which undermines an organization’s security efforts
- state of being complete or uncorrupted
- procedure used to determine user privileges or access levels to the system
- rights an individual or organization has over information and how it is used
- ransomware and the numerous other programs used by hackers to gain
- calculated assessment of potential threats to an organization’s security
- to or damage sensitive information on a computer
- rules
16 Clues: rules • intent of doing harm • how information is protected • state of being complete or uncorrupted • requirement of being private or secret • making sure a person is who they say they are • to or damage sensitive information on a computer • information or data which can be accessed when needed • ransomware and the numerous other programs used by hackers to gain • ...
