cyber security Crossword Puzzles

NETWORK SECURITY 2024-01-30

NETWORK SECURITY crossword puzzle
Across
  1. ORDERED LIST
  2. ENSURES DATA IS ACCURATE. E.G. PRESENCE, FORMAT AND RANGE
  3. MADE SO THAT LOST DATA CAN BE RECOVERED EASILY
  4. ASSIGNED TO EACH USER TO ENSURE THEY ONLY ACCESS PARTICULAR FILES
  5. ATTACHED TO A DOCUMENT OR SPREADSHEET, COPYING ITSELF FROM ONE APPLICATION TO ANOTHER BY INFECTING START UP FILE
  6. WORLDWIDE COMMUNICATION SYSTEM LINKING COMPUTERS IN GEOGRAPHICALLY SEPERATE AREAS
  7. PROGRAM THAT IS SELF REPLICATING AND CAN INFECT A COMPUTER
  8. A USER INTERFACE OF THE APPLICATION WHERE APPS ARE DISPLAYED IN BROWSER
  9. THE START OF ANY WEB PAGE
Down
  1. LIES DORMANT UNTIL A SPECIFIC PIECE OF PROGRAM CODE IS ACTIVATED
  2. WHEN A WEBSITE CONTAINS ELEMENTS THAT ALLOW THE USER TO INTERACT
  3. MALICIOUS PROGRAMS THAT REPLICATE THEMSELVES FROM SYSTEM TO SYSTEM
  4. PROCESSED ON THE WEB SERVER WHEN THE USER REQUESTS INFORMATION
  5. A SECRET SERIES OF CHARACTERS USED TO GAIN ACCESS TO A COMPUTER SYSTEM
  6. WHEN A WEBSITE HAS NO FORM OF INTERACTIVITY
  7. PRIVATE COMMUNICATION SYSTEM WITHIN AN ORGANISATION

16 Clues: ORDERED LISTTHE START OF ANY WEB PAGEWHEN A WEBSITE HAS NO FORM OF INTERACTIVITYMADE SO THAT LOST DATA CAN BE RECOVERED EASILYPRIVATE COMMUNICATION SYSTEM WITHIN AN ORGANISATIONENSURES DATA IS ACCURATE. E.G. PRESENCE, FORMAT AND RANGEPROGRAM THAT IS SELF REPLICATING AND CAN INFECT A COMPUTER...

Security Crossword Puzzle 2025-06-26

Security Crossword Puzzle crossword puzzle
Across
  1. Only those with eligibility AND need-to-know can _______ classified information.
  2. The person in charge of a company's security program.
  3. Not a classification, but a designation.
  4. Something you should never share with others.
  5. The website used for all employee security training.
  6. Security risk that comes from within the organization.
  7. Three letter abbreviation for the request you must make before travelling to another secure site.
  8. Before you embark on any ________, you must complete a pre-briefing in Sign-In Compliance.
Down
  1. Everyone, cleared and uncleared, is responsible for ________ classified information.
  2. When classified information mistakenly ends up on an unsecured system.
  3. Sharing classified information with uncleared persons is called ________ disclosure.
  4. The document located on the FSO page where you can locate all security policies and procedures (Abbr.).
  5. To access classified information, you must first have a favorable _____________ determination at the appropriate level.
  6. Reporting _________ information to security is a requirement for all employees.
  7. How often every employee must complete their required security trainings.

15 Clues: Not a classification, but a designation.Something you should never share with others.The website used for all employee security training.The person in charge of a company's security program.Security risk that comes from within the organization.When classified information mistakenly ends up on an unsecured system....

PRIVATE SECURITY INDUSTRY 2022-06-25

PRIVATE SECURITY INDUSTRY crossword puzzle
Across
  1. short form for security agency grading assessment
  2. something that replaces intensive patrolling
  3. PMSCs are driven by ___ (money)
  4. new security career path in sg
  5. China’s capital
  6. Japanese warriors
  7. Employee theft costs businesses ___ billion a year
  8. Ford, __ pioneered the use of private security to guard his factories
  9. mogadishu syndrome is the ___ by governments to intervene with direct military intervention for humanitarian purposes
  10. Short form of China’s military
  11. DeWe’s profile rose dramatically last summer when Chinese Poly-GCL Petroleum Group Holdings hired it to manage security at a $4bn LNG project in ___
Down
  1. ___ and road initiative
  2. PMSCs are different from ___
  3. short form for standard operating procedure
  4. The rise of PMSCs is caused by the end of which war (combined the word and war)
  5. short form of city bombed in 9/11
  6. process of improving one’s skills
  7. PMSCs are considered ___ under humanitarian law
  8. China ___ Economic Corridor

19 Clues: China’s capitalJapanese warriors___ and road initiativeChina ___ Economic CorridorPMSCs are different from ___new security career path in sgShort form of China’s militaryPMSCs are driven by ___ (money)short form of city bombed in 9/11process of improving one’s skillsshort form for standard operating procedure...

bullying CAT 2015-06-14

bullying CAT crossword puzzle
Across
  1. to stand up for your self
  2. taking peoples stuff
  3. the targeted
  4. leaving people out
  5. doing nothing to help
  6. live your ...
  7. online
Down
  1. face to face
  2. word for bullying
  3. hurting people by punching them
  4. embarrassment photos of people
  5. spreads fast with ...
  6. bullying good or ...
  7. a form of bullying
  8. the bad guy

15 Clues: onlinethe bad guyface to facethe targetedlive your ...word for bullyingleaving people outa form of bullyingtaking peoples stuffbullying good or ...spreads fast with ...doing nothing to helpto stand up for your selfembarrassment photos of peoplehurting people by punching them

Mil 2025-11-19

Mil crossword puzzle
Across
  1. orientation or path
  2. related to digital tech
  3. difficulties to overcome
  4. ability to influence or control
  5. deceptive data-stealing tactic
  6. periodical publication
Down
  1. chance for advantage
  2. continuous mark or path
  3. online realm
  4. visual hue or tone
  5. illegal digital activities
  6. defined form or outline
  7. exact location or mark
  8. prohibited online material
  9. communication platforms

15 Clues: online realmvisual hue or toneorientation or pathchance for advantageexact location or markperiodical publicationcontinuous mark or pathrelated to digital techdefined form or outlinecommunication platformsdifficulties to overcomeillegal digital activitiesprohibited online materialdeceptive data-stealing tacticability to influence or control

Cyber Wellness 2013-06-28

Cyber Wellness crossword puzzle
Across
  1. Do not post b____things about people because it is bullying other people
  2. Be careful what l__________ you use on social networking websites because if you use the wrong words, other people might feel bad.
  3. Cyber b_________ is using a phone or a computer to say bad or hurtful things to others.
  4. Copyright i___________ is a crime that we must not commit because it means stealing other people’s work without permission.
  5. Be careful who you talk to on social n_________ sites because you do not know them.
Down
  1. Game a___________is losing control over the game and you can’t stop playing the game
  2. Do not use v_________ online because using it makes people hurtful
  3. Do not let other p______ cyber bully you and you suffer in silence, tell a teacher or an adult what is happening.
  4. Show your teachers e__________ of cyber bullying so that they can carry out further investigation
  5. You control the g_______, don’t let it control you. Control the amount of time you play it.

10 Clues: Do not use v_________ online because using it makes people hurtfulDo not post b____things about people because it is bullying other peopleBe careful who you talk to on social n_________ sites because you do not know them.Game a___________is losing control over the game and you can’t stop playing the game...

Castrofloresandtj 2024-10-24

Castrofloresandtj crossword puzzle
Across
  1. process- gain the information used to gain estimates of the situation
  2. marsupial
  3. weapons- traditional weapons such as rifles and explosives
  4. warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
Down
  1. operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
  2. warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
  3. lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
  4. control- measures taken to prevent a fire or collision.
  5. ceremony- when the vessel is formally named and launched is customarily
  6. a series of short cruises to check out the ship and its equipment.
  7. warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
  8. warfare- the use of military aircraft and other flying machines in warfare.
  9. launching- vessel is either completed on perpendicular building ways near the water.
  10. warfare of security experts will discuss the growing threats to corporations.
  11. warfare are self replicating programs that can hide in systems
  12. conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...

16 Clues: marsupialcontrol- measures taken to prevent a fire or collision.weapons- traditional weapons such as rifles and explosiveswarfare are self replicating programs that can hide in systemsa series of short cruises to check out the ship and its equipment.process- gain the information used to gain estimates of the situation...

Module 9 Participation | Cybersecurity Crossword Puzzle - Cian 2025-03-12

Module 9 Participation | Cybersecurity Crossword Puzzle - Cian crossword puzzle
Across
  1. – Remote storage accessed from internet
  2. - One billion bytes
  3. – Creates a private and secure connection
  4. – Protect from unauthorized access
  5. – Automated software performing tasks
  6. – Copies of data for recovery purposes
  7. – Entering credentials to access course
  8. – Individual who intrudes systems illegally
  9. - Faster storage uses flash memory
  10. - Two-Factor authentication app
  11. - short term memory for active tasks
Down
  1. – Little file that stores data on device
  2. – A bug that spreads between systems
  3. - Acesses code
  4. – Warning about potential security threats
  5. Authentication – Security method using two verification factors
  6. – Security update fixing vulnerabilities
  7. – A unit of digital information
  8. – Blocks unauthorized network access
  9. - Long term magnetic storage

20 Clues: - Acesses code- One billion bytes- Long term magnetic storage– A unit of digital information- Two-Factor authentication app– Protect from unauthorized access- Faster storage uses flash memory– A bug that spreads between systems– Blocks unauthorized network access- short term memory for active tasks– Automated software performing tasks...

CHAPTER 6: NATIONAL SECURITY CONCERNS AND PEACE EDUCATION 2019-09-23

CHAPTER 6: NATIONAL SECURITY CONCERNS AND PEACE EDUCATION crossword puzzle
Across
  1. __________ is a state without war.
  2. ___________, in 1943, defined it in terms of war saying that, "a nation has security when it does not have to sacrifice its legitimate interests to avoid war, and is able, if challenged, to maintain them by war,"
  3. It was Thomas Hobbes' 1651 work.
  4. U.S. Secretary of Defense from 1977 to 1981 in the Carter administration.
  5. A later definition by ____________ , a political scientist, in 1950, looks at national security from almost the same aspect, that of external coercion. "The distinctive meaning of national security means freedom from foreign dictation."
  6. A safe, orderly, and peaceful setting that contributes to positive thinking and learning.
  7. In Harvard, history professor _______________ definition of 1990 in national security as defined through the lens on national power: "National Security is best described as a capacity to control those domestic and foreign conditions that the public opinion of a given community believes necessary to enjoy its own self-determination of autonomy, prosperity and well-being.
  8. Serves the students' need to learn social responsibility and peacemaking skills.
  9. The origin of the modern concept of "national security" as a philosophy of maintaining a stable nation state can be traced to the ________________.
Down
  1. National Security Act of 1947 was signed by U.S. president ______________.
  2. Encouraged to support children's learning of pro-social activities at home.
  3. Networks implement programs to increase peace.
  4. Teaches students to consider the consequences of negative behavior and to solve conflicts peacefully.
  5. The 1996 definition propagated by the _________________________ accretes the elements of national power: "National security is an appropriate and aggressive blend of political resilience and maturity, human resources, economic structure and capacity, technological competence, industrial base and availability of natural resources and finally the military might."
  6. ________ to non-violence includes the infusion of peace throughout all aspects of teh educational process.
  7. Inclusive communication is the peaceful exchange of information and the sharing of feelings, decisions, and ideas.
  8. The requirement to maintain the survival of the state through the use of economic, power, projection, and political power, and the exercise of diplomacy.
  9. A german philosopher in his 1795 essay, "Perpetual Peace: A Philosophical Sketch."
  10. ____________, 1960, while recognizing the need to segragate the subjectivity of the conceptual idea from the objectivity, talks of threats to acquired values: " An ambiguous symbol means different things to different people. National Security objectively means that the absence of threats to acquired values and subjectively, the absence of fear that such values will be attacked."
  11. From latin word, diploma, meaning an official document.

20 Clues: It was Thomas Hobbes' 1651 work.__________ is a state without war.Networks implement programs to increase peace.From latin word, diploma, meaning an official document.U.S. Secretary of Defense from 1977 to 1981 in the Carter administration.National Security Act of 1947 was signed by U.S. president ______________....

Castrofloresandtj 2024-10-24

Castrofloresandtj crossword puzzle
Across
  1. process- gain the information used to gain estimates of the situation
  2. marsupial
  3. weapons- traditional weapons such as rifles and explosives
  4. warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
Down
  1. operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
  2. warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
  3. lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
  4. control- measures taken to prevent a fire or collision.
  5. ceremony- when the vessel is formally named and launched is customarily
  6. a series of short cruises to check out the ship and its equipment.
  7. warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
  8. warfare- the use of military aircraft and other flying machines in warfare.
  9. launching- vessel is either completed on perpendicular building ways near the water.
  10. warfare of security experts will discuss the growing threats to corporations.
  11. warfare are self replicating programs that can hide in systems
  12. conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...

16 Clues: marsupialcontrol- measures taken to prevent a fire or collision.weapons- traditional weapons such as rifles and explosiveswarfare are self replicating programs that can hide in systemsa series of short cruises to check out the ship and its equipment.process- gain the information used to gain estimates of the situation...

Monthly Information Security Crossword-3 2014-09-15

Monthly Information Security Crossword-3 crossword puzzle
Across
  1. _________ configures and manages a system as per the data owner’s requirements.
  2. Fulfilling contractual requirements for your client, including those for their information's security is also a ________ requirement.
  3. Maintaining the documents related to your work logically and accurately constitutes ________ of records.
  4. Personal computers requires ______ as much as office systems.
  5. Daily update for an antivirus which includes details of the latest viruses.
  6. Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
Down
  1. Digital _______ - Science of computer investigation.
  2. A statement or a set of statements adopted by management and binding on all the employees to follow.
  3. Documented information security policy ensure ______ in its implementation.
  4. _____, Security, Risk and Complaince are the 4 key deliverables of any information Security program.
  5. Data _______ defines the security requirements for data protection.
  6. Blocks unwanted network traffic to your computer.
  7. Weakest link in information security.

13 Clues: Weakest link in information security.Blocks unwanted network traffic to your computer.Digital _______ - Science of computer investigation.Personal computers requires ______ as much as office systems.Data _______ defines the security requirements for data protection.Documented information security policy ensure ______ in its implementation....

Airport Terminology 2019-07-21

Airport Terminology crossword puzzle
Across
  1. Area of the airport after security and customs
  2. HLZ
  3. Where the aircraft can park
  4. Area of the airport before security and customs
  5. PAX
  6. WAG
  7. EK
  8. QF
  9. Vehicle used to carry the baggage to the aircraft
  10. Luggage brought into the hold by ground staff
Down
  1. Luggage brought into the cabin by passengers
  2. B in the ahonetic alphabet
  3. Area where passengers depart and board
  4. Another term for immigration officers
  5. Airline responsible for the flight
  6. Meaning worldwide
  7. Beginning and terminating in the same country
  8. Crew member responsible for flying the aircraft
  9. The security of the airport
  10. W in the phonetic alphabet

20 Clues: EKQFHLZPAXWAGMeaning worldwideB in the ahonetic alphabetW in the phonetic alphabetWhere the aircraft can parkThe security of the airportAirline responsible for the flightAnother term for immigration officersArea where passengers depart and boardLuggage brought into the cabin by passengersBeginning and terminating in the same country...

CSL Module 2 Puzzle 2020-09-10

CSL Module 2 Puzzle crossword puzzle
Across
  1. ___ Based Social Engineering refers to extraction of information using computer or any digital device
  2. _____ had made many significant changes in the prevailing laws of cyber space applicable in India, one of which is regarding Cyber Cafes
  3. pursue or approach stealthily
  4. Attacker targets high level employee to gain access to valuable data
  5. act of harming or harassing through information technology in a deliberate manner
Down
  1. Step 1 of planning an Attack
  2. Attempt made to physically access the device or server
  3. enable hackers to exploit system vulnerabilities
  4. Heroku, Force.com, Google App Engine are example of ___
  5. Second Step of Social Engineering Life-cycle
  6. Another name for Quid Pro Quo
  7. ___ cloud infrastructure is a composition of two or more distinct cloud infrastructures

12 Clues: Step 1 of planning an AttackAnother name for Quid Pro Quopursue or approach stealthilySecond Step of Social Engineering Life-cycleenable hackers to exploit system vulnerabilitiesAttempt made to physically access the device or serverHeroku, Force.com, Google App Engine are example of ___...

CHAPTER 6: NATIONAL SECURITY CONCERNS AND PEACE EDUCATION 2019-09-23

CHAPTER 6: NATIONAL SECURITY CONCERNS AND PEACE EDUCATION crossword puzzle
Across
  1. ___________, in 1943, defined it in terms of war saying that, "a nation has security when it does not have to sacrifice its legitimate interests to avoid war, and is able, if challenged, to maintain them by war,"
  2. WOLFERS ____________, 1960, while recognizing the need to segragate the subjectivity of the conceptual idea from the objectivity, talks of threats to acquired values: " An ambiguous symbol means different things to different people. National Security objectively means that the absence of threats to acquired values and subjectively, the absence of fear that such values will be attacked."
  3. U.S. Secretary of Defense from 1977 to 1981 in the Carter administration.
  4. Encouraged to support children's learning of pro-social activities at home.
  5. The origin of the modern concept of "national security" as a philosophy of maintaining a stable nation state can be traced to the ________________.
  6. Inclusive communication is the peaceful exchange of information and the sharing of feelings, decisions, and ideas.
  7. Networks implement programs to increase peace.
  8. A german philosopher in his 1795 essay, "Perpetual Peace: A Philosophical Sketch."
  9. National Security Act of 1947 was signed by U.S. president ______________.
  10. ________ to non-violence includes the infusion of peace throughout all aspects of teh educational process.
  11. Teaches students to consider the consequences of negative behavior and to solve conflicts peacefully.
Down
  1. Serves the students' need to learn social responsibility and peacemaking skills.
  2. A safe, orderly, and peaceful setting that contributes to positive thinking and learning.
  3. The 1996 definition propagated by the _________________________ accretes the elements of national power: "National security is an appropriate and aggressive blend of political resilience and maturity, human resources, economic structure and capacity, technological competence, industrial base and availability of natural resources and finally the military might."
  4. __________ is a state without war.
  5. The requirement to maintain the survival of the state through the use of economic, power, projection, and political power, and the exercise of diplomacy.
  6. It was Thomas Hobbes' 1651 work.
  7. In Harvard, history professor _______________ definition of 1990 in national security as defined through the lens on national power: "National Security is best described as a capacity to control those domestic and foreign conditions that the public opinion of a given community believes necessary to enjoy its own self-determination of autonomy, prosperity and well-being.
  8. A later definition by ____________ , a political scientist, in 1950, looks at national security from almost the same aspect, that of external coercion. "The distinctive meaning of national security means freedom from foreign dictation."
  9. From latin word, diploma, meaning an official document.

20 Clues: It was Thomas Hobbes' 1651 work.__________ is a state without war.Networks implement programs to increase peace.From latin word, diploma, meaning an official document.U.S. Secretary of Defense from 1977 to 1981 in the Carter administration.National Security Act of 1947 was signed by U.S. president ______________....

Cyber Security!! By: Juana Blanchet 2020-08-20

Cyber Security!! By: Juana Blanchet crossword puzzle
Across
  1. es un programa informático que tiene como propósito detectar y eliminar virus, y otros programas que pueden perjudicar.
  2. son correos que no son deseados recibir. Suelen ser publicidades de toda clase de productos y servicios.
  3. Evitan que los usuarios de internet que no están autorizados acceder a redes privadas conectadas con la red.
  4. son programas informáticos que quieren alterar el funcionamiento del computador, sin que el usuario se de cuenta. Pueden infectar archivos del sistema.
Down
  1. Pueden almacenar información sobre vos, como información de registros, o tu nombre de usuario, Pero no espían.
  2. es un software que recopila información de un ordenador. Después, esa información la transmite a una entidad externa sin el consentimiento del propietario del ordenador.
  3. es una estafa que quiere obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.

7 Clues: son correos que no son deseados recibir. Suelen ser publicidades de toda clase de productos y servicios.Evitan que los usuarios de internet que no están autorizados acceder a redes privadas conectadas con la red.Pueden almacenar información sobre vos, como información de registros, o tu nombre de usuario, Pero no espían....

ZAJEDNO ZA BOLJI INTERNET 2023-02-15

ZAJEDNO ZA BOLJI INTERNET crossword puzzle
Across
  1. BEZBROJNE,PORUKE
  2. OTISAK,NAŠ-TRAG
  3. ISMIJAVANJE,PONIŽAVANJE
  4. ELEKTRONSKA,POŠTA
  5. LIČNI,DNEVNIK,NA,INTERNETU
  6. EMOCIJA,ŽUTO,SMAJLIĆ,OKRUGLO
  7. MRŽNJA,LJUBOMORA,VRIJEĐANJE
  8. MRŽNJA,PRST,OZNAKA,NESVIĐANJE
  9. UZIMANJE,PROFILA
Down
  1. GOOGLE,STRANICA,DOKUMENT
  2. NASILJE,AGRESIJA,NA-INTERNETU
  3. OSOBE,MRŽNJA,HATE-KOMENTARIŽ
  4. APLIKACIJE,TIKTOK,SNAPCHAT,INSTAGRAM
  5. WIREWALL
  6. PORUKE,SEKSUALNISADRŽAJ
  7. PRIVATNOST,TAJNOVITO,
  8. BROJ,JAVNA,ADRESA
  9. NEWS,LAŽNO,TRAČANJE,ŠIRENJE
  10. MREŽA,PAUKOVA,RIBARSKA
  11. SVIĐANJE,OZNAKA,

20 Clues: WIREWALLOTISAK,NAŠ-TRAGBEZBROJNE,PORUKESVIĐANJE,OZNAKA,UZIMANJE,PROFILABROJ,JAVNA,ADRESAELEKTRONSKA,POŠTAPRIVATNOST,TAJNOVITO,MREŽA,PAUKOVA,RIBARSKAPORUKE,SEKSUALNISADRŽAJISMIJAVANJE,PONIŽAVANJEGOOGLE,STRANICA,DOKUMENTLIČNI,DNEVNIK,NA,INTERNETUNEWS,LAŽNO,TRAČANJE,ŠIRENJEMRŽNJA,LJUBOMORA,VRIJEĐANJEOSOBE,MRŽNJA,HATE-KOMENTARIŽ...

unit 4 2015-05-26

unit 4 crossword puzzle
Across
  1. (v) 결심하다
  2. (adj) 사적인, 개인적인
  3. (n) 회원
  4. (n) 잘못된 정보
  5. (n) 조직
  6. (adv) 대신
  7. (v) 이해하다, 깨닫다
  8. (adj) 진정한
  9. (adv) 갑자기
  10. (n) 인터넷 상의 친구
  11. (prep) ~을 통하여
  12. (v) 홍보하다, 증진하다
  13. (n) 항의
  14. (v) 받아들이다, 수용하다
Down
  1. (n) 외교관
  2. (adv) 나중에, 이후에
  3. (adj) 비정부의, 민간의
  4. (adj) 국제적인
  5. (adj) 전 세계적으로
  6. (adj) 온라인 상의
  7. (n) 정보
  8. (n) 교과서
  9. (v) 고치다, 정정하다

23 Clues: (n) 회원(n) 조직(n) 정보(n) 항의(n) 외교관(n) 교과서(v) 결심하다(adv) 대신(adj) 진정한(adv) 갑자기(n) 잘못된 정보(adj) 국제적인(adj) 온라인 상의(adj) 전 세계적으로(v) 이해하다, 깨닫다(n) 인터넷 상의 친구(v) 고치다, 정정하다(prep) ~을 통하여(adv) 나중에, 이후에(v) 홍보하다, 증진하다(adj) 사적인, 개인적인(adj) 비정부의, 민간의(v) 받아들이다, 수용하다

Black Friday 2025-11-28

Black Friday crossword puzzle
Across
  1. - Kitchen
  2. - Opening
  3. - Apparel
  4. - Gifts
  5. - Consoles
  6. - Bedding
  7. - Children
  8. - Clearance
  9. - Overnight
  10. - Deals
  11. - Fragrances
  12. - Homegoods
  13. - Crushing
  14. - Guarantee
  15. - Cyber-Monday
  16. - Special
  17. - Day-after
  18. - Rewards
  19. - Parking-lot
  20. - Touchscreen
Down
  1. - Returns
  2. - Grabbing
  3. - Computers
  4. - Steep
  5. - Rush
  6. - Shopping
  7. - Reserved
  8. - Exchange
  9. - Deep
  10. - Thermos
  11. - Sold-out
  12. - Friday
  13. - Waiting
  14. - Gadgets
  15. - Televisions
  16. - Lines
  17. - Hunting
  18. - Maxed
  19. - Therapy
  20. - Huge

40 Clues: - Rush- Deep- Huge- Gifts- Steep- Deals- Lines- Maxed- Friday- Returns- Kitchen- Opening- Apparel- Bedding- Thermos- Waiting- Gadgets- Hunting- Special- Therapy- Rewards- Grabbing- Shopping- Reserved- Exchange- Consoles- Sold-out- Children- Crushing- Computers- Clearance- Overnight- Homegoods- Guarantee- Day-after- Fragrances- Televisions...

Monthly Information Security Crossword-3 2014-09-15

Monthly Information Security Crossword-3 crossword puzzle
Across
  1. Data _______ defines the security requirements for data protection.
  2. Fulfilling contractual requirements for your client, including those for their information's security is also a ________ requirement.
  3. Weakest link in information security.
  4. Maintaining the documents related to your work logically and accurately constitutes ________ of records.
  5. A statement or a set of statements adopted by management and binding on all the employees to follow.
  6. Blocks unwanted network traffic to your computer.
  7. _____, Security, Risk and Complaince are the 4 key deliverables of any information Security program.
  8. _________ configures and manages a system as per the data owner’s requirements.
Down
  1. Personal computers requires ______ as much as office systems.
  2. Daily update for an antivirus which includes details of the latest viruses.
  3. Documented information security policy ensure ______ in its implementation.
  4. Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
  5. Digital _______ - Science of computer investigation.

13 Clues: Weakest link in information security.Blocks unwanted network traffic to your computer.Digital _______ - Science of computer investigation.Personal computers requires ______ as much as office systems.Data _______ defines the security requirements for data protection.Daily update for an antivirus which includes details of the latest viruses....

Impacts of Cyber Security Attacks 2022-01-17

Impacts of Cyber Security Attacks crossword puzzle
Across
  1. Stolen personal data is used.
  2. When data is edited without permission and it normally takes a long time to find the source.
Down
  1. Data is stolen with the intent to compromise privacy or confidential information.
  2. Data is destroyed
  3. - An attack the prevents users from accessing resources.
  4. Personal data is stolen
  5. Data is edited without permission but the source is found quite quickly.

7 Clues: Data is destroyedPersonal data is stolenStolen personal data is used.- An attack the prevents users from accessing resources.Data is edited without permission but the source is found quite quickly.Data is stolen with the intent to compromise privacy or confidential information....

Cyber Security Trivia 2018-09-25

Cyber Security Trivia crossword puzzle
Across
  1. 2014 catastrophic bug in OpenSSL
  2. 2010 cyber weapon that broke a country's nuclear enrichment centrifuges
Down
  1. local privilege escalation bug that exploits a race condition in Linux Kernel
  2. Exploit that targeted MS-Windows via SMB

4 Clues: 2014 catastrophic bug in OpenSSLExploit that targeted MS-Windows via SMB2010 cyber weapon that broke a country's nuclear enrichment centrifugeslocal privilege escalation bug that exploits a race condition in Linux Kernel

Cyber Monday 2014-12-01

Cyber Monday crossword puzzle
Across
  1. past tense of "hear"
  2. large shopping center
  3. how the worldwide web connects with us
  4. forecast or tell the future
  5. there's no place like this
  6. day after Thursday
  7. opposite of bigger
Down
  1. alike, not different
  2. 30 days equal one of these
  3. November holiday
  4. one thing substituted with another
  5. day before Tuesday
  6. before second
  7. opinion samples

14 Clues: before secondopinion samplesNovember holidayday before Tuesdayday after Thursdayopposite of biggeralike, not differentpast tense of "hear"large shopping center30 days equal one of thesethere's no place like thisforecast or tell the futureone thing substituted with anotherhow the worldwide web connects with us

Cyber Safety 2020-11-13

Cyber Safety crossword puzzle
Across
  1. Use privacy & __ settings on game/app/soc.media.
  2. Personal info is like __; value & protect it.
  3. __ make you feel worried/anxious/sad/uncomfy.
  4. Ask __ before you tag/share photos of others.
  5. Never __ friend requests from strangers online.
  6. Which platform is used by the most teens?
Down
  1. How long can a post last?
  2. Never share your __ online (apps/socmedia/etc.)
  3. Turn off Wifi/Bluetooth to avoid being __.
  4. Which platform do teens use most OFTEN?
  5. Internet best friends
  6. What % of teens use social media platforms?
  7. __ links if it looks weird or source is unknown.
  8. Do not post if you'd feel ashamed for a _ to see.

14 Clues: Internet best friendsHow long can a post last?Which platform do teens use most OFTEN?Which platform is used by the most teens?Turn off Wifi/Bluetooth to avoid being __.What % of teens use social media platforms?Personal info is like __; value & protect it.__ make you feel worried/anxious/sad/uncomfy.Ask __ before you tag/share photos of others....

Cyber Puzzle 2023-10-03

Cyber Puzzle crossword puzzle
Across
  1. An exact replica of a hard drive
  2. A tweak to the OS code that will fix an issue in how it runs or compatibility with devices and applications.
  3. Fixes a vulnerability in the OS code to stop exploits
  4. A Fix for a bug that is affecting OS functionality
  5. A security flaw, glitch, or weakness found in software code that could be exploited by an attacker.
  6. A specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access.
  7. A backup that includes the operating system and configuration settings
Down
  1. To minimize the risk or lessen the force or intensity of something unpleasant.
  2. Physical objects that are embedded with sensors, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or networks.
  3. Third-party programs installed by users to provide additional functions.
  4. Is a structured process through which we identify potential security threats and vulnerabilities
  5. A Patch for a very specific issue ‐not released through automatic updates.
  6. A database of known vulnerabilities in all types of digital products.
  7. Having several copies

14 Clues: Having several copiesAn exact replica of a hard driveA Fix for a bug that is affecting OS functionalityFixes a vulnerability in the OS code to stop exploitsA database of known vulnerabilities in all types of digital products.A backup that includes the operating system and configuration settings...

Cyber Crossword 2024-10-24

Cyber Crossword crossword puzzle
Across
  1. - Updates that fix vulnerabilities in software (5 letters)
  2. - Deliberate spread of false information to mislead (14 letters)
  3. - User's personal access information (11 letters)
  4. - Software that secretly monitors user activity (7 letters)
  5. - Unauthorized access to confidential data (6 letters)
  6. - Free from danger or threat; safe (6 letters)
Down
  1. - Information that must be kept secret (12 letters)
  2. - A security system that monitors network traffic (7 letters)
  3. - Method of encoding data to prevent unauthorized access (11 letters)
  4. - A type of malicious program that disguises itself (6 letters)
  5. - Attempt to deceive users into giving personal information (9 letters)
  6. - Malicious software designed to harm or exploit (7 letters)
  7. - Permission to enter a system or data (6 letters)
  8. - Process of verifying identity before granting access (14 letters)

14 Clues: - Free from danger or threat; safe (6 letters)- User's personal access information (11 letters)- Permission to enter a system or data (6 letters)- Information that must be kept secret (12 letters)- Unauthorized access to confidential data (6 letters)- Updates that fix vulnerabilities in software (5 letters)...

Cyber Test 2025-03-12

Cyber Test crossword puzzle
Across
  1. A Social Engineering technique that uses a fake promise to pique a victim's curiosity or greed.
  2. What is the name of the cybersecurity firm that has faulty software update on July 2024 and causes Global IT outage.
  3. Part of Social Engineering Life Cycle that identifies the victim & gathering their background information.
  4. It is the most targetted sector in the Philippines.
  5. A malicious software installed on a computing device without the end users knowledge.
  6. According to SimilarWeb Ranking, what is the top visited website as of February 2025.
Down
  1. A type of malware created to deny a user or organization access to files on their computer and will ask money for decryption.
  2. Occurs when a harmful code is injected into legitimate online advertising networks, and the code redirects users to malicious websites.
  3. Refers to a wide range of malicious activities carried out through human interactions.
  4. Refers to the unauthorized transfer or theft of sensitive, confidential, or private data from a computer system.
  5. Part of Social Engineering Life Cycle that occurs by forming a relationship and initiating communication to build trust.
  6. It is a type of malware that usually spreads in spam emails and malicious links.
  7. Is a type of malware designed to scare you into taking action.
  8. It is a advertisement-supported software helps generate revenue for its developers by automatically displaying adverts on your screen, typically within a web browser.

14 Clues: It is the most targetted sector in the Philippines.Is a type of malware designed to scare you into taking action.It is a type of malware that usually spreads in spam emails and malicious links.A malicious software installed on a computing device without the end users knowledge....

Cyber Ethics 2025-06-05

Cyber Ethics crossword puzzle
Across
  1. illegal intrusion into a computer system or network
  2. information about a person that exists on the internet
  3. criminal activities use of computer, network, internet
  4. unwanted bulk email that come from unknown source
  5. Communication Technology full form of ICT
  6. software copied and distributed illegally
  7. harming or harassing a person
Down
  1. meaning of malware
  2. use or imitating the language and thoughts of another person as one's original work
  3. fraud claiming to be an authorised financial institution
  4. theft stealing or misusing someone's personal information
  5. aware of the ethical practices, behaving responsible and appropriately
  6. misleading a person to believe that it come form a trusted person or organisation
  7. program or a set of program disrupts the normal functioning of a computer

14 Clues: meaning of malwareharming or harassing a personsoftware copied and distributed illegallyCommunication Technology full form of ICTunwanted bulk email that come from unknown sourceillegal intrusion into a computer system or networkinformation about a person that exists on the internetcriminal activities use of computer, network, internet...

Crosswords & memes 2018-09-17

Crosswords & memes crossword puzzle
Across
  1. problem
  2. advisor
  3. common
  4. to be bullying on the internet
  5. person who checks thoroughly
Down
  1. immediate (that's an adjective)
  2. animal yelp
  3. conclude
  4. someone or something sacrificed
  5. injure
  6. look at longingly (verbum)

11 Clues: injurecommonproblemadvisorconcludeanimal yelplook at longingly (verbum)person who checks thoroughlyto be bullying on the internetimmediate (that's an adjective)someone or something sacrificed

Chapter 8: Cybersecurity Vocab Crossword 2025-04-08

Chapter 8: Cybersecurity Vocab Crossword crossword puzzle
Across
  1. Update: phishing attack where the hacker sends a message regarding the restart or deactivation of your membership.
  2. a type of malware that gains access to your operating system, then locks you out of your own system, holding your own computer ransom until you pay for its release.
  3. Activity: phishing attack where the hacker sends a message regarding your account being locked out or unusual sign ins.
  4. Money Phish: phishing track where the hacker sends a message regarding some unearned money being given to you.
  5. Phish: phishing attack where the hacker sends a message for you to log back into your account.
  6. SMS phishing text messages asking you to click here.
  7. Before You Click’: Money Vehicle’s 5 Cyber security questions to ask yourself as you receive messages today, no matter if it looks like a known source or not.
  8. a system designed to block unauthorized access while still allowing outward communication.
  9. Funny Mirror: the lens people see the world of social media through, never a clear picture but always warped into how the content creator wants you to see the
Down
  1. a secret phrase used to gain admission into something.
  2. voicemail messages demanding you to take action.
  3. software that is designed to disrupt, damage, or gain unauthorized access to a computer.
  4. creating a story based on bits of information that the attacker has gathered to earn trust and manipulate an individual to share personal information.
  5. The Hackers: Money Vehicle’s approach to defending yourself in the online cyber war.
  6. Drive: a data storage device that can be used even when the device is turned off.
  7. Cloud: a data storage device that is stored on the internet
  8. Software: a program designed to detect and remove viruses and other malware from your computer.
  9. every aspect of your defense to fight the hackers.
  10. Password: an unpredictable password made up of eight (8) or more characters and using a combination of uppercase letters, lowercase letters, symbols, and numbers
  11. Engineering: the use of deception to manipulate an individual into giving personal information away.
  12. Phish: phishing attack where the hacker sends a message regarding a package being delivered.
  13. sending fraudulent messages that imitate a real company in hope of being given personal information.
  14. Horse: Leaving a piece of infected hardware, like a USB drive, some place public and waiting for someone to pick it up and try to use it, providing access to your system.

23 Clues: voicemail messages demanding you to take action.every aspect of your defense to fight the hackers.SMS phishing text messages asking you to click here.a secret phrase used to gain admission into something.Cloud: a data storage device that is stored on the internetDrive: a data storage device that can be used even when the device is turned off....

QBE 2020-04-01

QBE crossword puzzle
Across
  1. Annual Staff Survey
  2. Large broker for Minibus
  3. P&C Product
  4. Complaints are logged on
  5. Principle of Insurance
  6. QBE’s E-Trade Platform
  7. QBE CEO
  8. SME Team
  9. Partner Charity
  10. #together
  11. Data Protection
  12. Offshore Office
Down
  1. Large broker for Minibus
  2. Head of BA
  3. Minibus Product
  4. QBE Headquarters
  5. Diverse Hashtag
  6. E-Trade Platform
  7. Employee Assistance
  8. Fleet Product
  9. Newest SME Product
  10. Insured vehicles must be logged on
  11. QBE's platform to process payments

23 Clues: QBE CEOSME Team#togetherHead of BAP&C ProductFleet ProductMinibus ProductDiverse HashtagPartner CharityData ProtectionOffshore OfficeQBE HeadquartersE-Trade PlatformNewest SME ProductAnnual Staff SurveyEmployee AssistancePrinciple of InsuranceQBE’s E-Trade PlatformLarge broker for MinibusLarge broker for MinibusComplaints are logged on...

remake13 2024-06-13

remake13 crossword puzzle
Across
  1. Rebellious, edgy style.
  2. Ivy League inspired.
  3. Simple, clean lines.
  4. Bohemian, free-spirited style.
  5. Modern take on vintage.
  6. Everyday comfortable wear.
  7. Urban, casual fashion.
  8. Vintage inspired look.
Down
  1. Seattle music inspired look.
  2. Late 90s futuristic look.
  3. Urban music inspired fashion.
  4. Techinspired futuristic look.
  5. Boyish style for girls.
  6. Old-fashioned trends.
  7. Bright, eccentric outfits.
  8. Environmentally friendly clothing.
  9. Casual sportswear look.
  10. Business or dressy style.
  11. Dark, alternative style.
  12. Skateboard culture inspired.

20 Clues: Ivy League inspired.Simple, clean lines.Old-fashioned trends.Urban, casual fashion.Vintage inspired look.Rebellious, edgy style.Boyish style for girls.Casual sportswear look.Modern take on vintage.Dark, alternative style.Late 90s futuristic look.Business or dressy style.Bright, eccentric outfits.Everyday comfortable wear....

Ticket Terms A to Z 2024-10-16

Ticket Terms A to Z crossword puzzle
Across
  1. a person who receives Social Security Disability Insurance (SSDI) and/or Supplemental Security Income (SSI) benefits based on disability.
  2. the management information system administered by the Social Security Administration to facilitate and record all business functions of the Ticket to Work Program.
  3. Social Security's online secure system allowing Employment Networks (ENs) and State Vocational Rehabilitation (VR) agencies serving beneficiaries under the Ticket to Work (TTW) Program to perform transactions in real-time.
  4. a person who is in current-pay status (receiving a benefit check) for Supplemental Security Income (SSI) with at least one month in a year in current-pay status for Social Security Disability Insurance (SSDI).
  5. a plan often used for individuals receiving intensive services through a State's Federally-funded workforce system.
  6. It is one month in which the beneficiary earned the designated amount, Trial Work Level (TWL) or Substantial Gainful Activity (SGA), to qualify for payment under the Ticket Program.
Down
  1. Published annually by the Social Security Administration, this general reference book provides a brief summary of all of the employment supports available to recipients of Social Security disability benefits.
  2. the term Social Security uses to describe a level of work activity and earnings.
  3. a written and signed agreement between the beneficiary (or, as appropriate, an authorized representative of the beneficiary) and the Employment Network (EN).
  4. is any information that can be used to distinguish or trace a person's identity.
  5. special Social Security rules that make it easier for persons receiving Social Security Disability Insurance (SSDI) and Supplemental Security Income (SSI) to work and still receive health care
  6. Social Security's general benefit increases are based on increases in the cost of living (COL) as measured by the Consumer Price Index.
  7. a Work Incentive available to persons receiving Social Security Disability Insurance (SSDI) and/or Supplemental Security Income (SSI) benefits.

13 Clues: the term Social Security uses to describe a level of work activity and earnings.is any information that can be used to distinguish or trace a person's identity.a plan often used for individuals receiving intensive services through a State's Federally-funded workforce system....

Lesson 3 2021-09-17

Lesson 3 crossword puzzle
Across
  1. far away
  2. eager or excited
  3. cannot travel across
  4. to get something
  5. very or intense
Down
  1. keep safe
  2. in cyber space
  3. separate
  4. to enjoy thoroughly
  5. to acquire

10 Clues: far awayseparatekeep safeto acquirein cyber spacevery or intenseeager or excitedto get somethingto enjoy thoroughlycannot travel across

DELTARUNE CHARACTER TRACKS 2025-11-21

DELTARUNE CHARACTER TRACKS crossword puzzle
Across
  1. Susie
  2. the world revolving
  3. BIG SHOT
  4. rude buster
  5. chaos king
Down
  1. lancer
  2. its pronounced “rules”
  3. cyber battle
  4. attack of the killer queen
  5. checker dance

10 Clues: SusielancerBIG SHOTchaos kingrude bustercyber battlechecker dancethe world revolvingits pronounced “rules”attack of the killer queen

3.5-3.6 Ap Gov Review 2023-05-22

3.5-3.6 Ap Gov Review crossword puzzle
Across
  1. John Locke natural rights: ____, liberty, and property
  2. Which amendment is usually associated with gun control?
  3. Amendment that protects citizens from unreasonable search and seizure.
  4. New York Times Co v United States was a court case that balanced civil liberty and security when it comes to freedom of ____.
  5. Second amendment guarantees the right to ____ ______
  6. Wisconsin v Yoder chose citizen’s civil liberties over security to protect the parent’s
  7. Supreme Court has ruled that the death penalty is _______
  8. Civil liberties have to be balanced with _____ of the government
  9. _______ Act changed surveillance laws after 9/11 to make it easier for the government to monitor the average citizen’s phone and email communications
  10. What event caused attendees at the 1787 Philadelphia Convention to want Congress to maintain a military?
  11. _______ allows states to choose whether to have the death penalty or not
  12. ______ rights are rights that citizens are born with and cannot be taken away.
  13. Court case related to second amendment that determined if individual states could take away a citizen’s right to own a gun.
Down
  1. Test used by the government to decide if they can regulate a citizen’s freedom of speech, as a result of Schenck v US.
  2. 9/11 caused security to be a higher or lower priority to the United States?
  3. Personal freedoms protected by the government.
  4. In the court case of Schenck versus US, was liberty or security chosen?
  5. Eighth amendment protects citizens from unreasonable fines, bails, and ___________ punishments
  6. Which amendment is the death penalty associated with?
  7. _______ v US was a court case that balanced civil liberty and security when it comes to freedom of speech.
  8. Legal protections listed in the bill of right
  9. Who wrote the second treatise of government?
  10. Was security or liberty chosen in New York Time Co v United States?
  11. Individual freedoms have to be balanced with public _____
  12. Second amendment would be considered a ____ ______

25 Clues: Who wrote the second treatise of government?Legal protections listed in the bill of rightPersonal freedoms protected by the government.Second amendment would be considered a ____ ______Second amendment guarantees the right to ____ ______Which amendment is the death penalty associated with?John Locke natural rights: ____, liberty, and property...

GE Network/Sentrol 2019-02-15

GE Network/Sentrol crossword puzzle
Across
  1. A _____ button is used to trigger an alarm condition
  2. A _____ contact is a type of switch used to monitor windows and doors
  3. _____ detection is used to protect the outer limits of a building
  4. A device used in a security system to make or break the current path
  5. a complete uninterrupted cable
  6. An _____ code is a silent summons for help
  7. A circuit with an end - of - the line resistor
  8. A device used to operate a security system
  9. Resets an alarm system to a normal condition
Down
  1. A _____ smoke detector can be used to cover an area such as an atrium
  2. The part of the security system that transmits the signals to a central station
  3. The angle at which the detector is most likely to detect an intruder
  4. _____ devices are card readers, door contacts and glass break detectors
  5. Acronym for passive infrared
  6. Floor _____ mat is used to detect a person trading on it
  7. Arm _____ turns the security system on with the entry delay turned off
  8. _____ zone is set up to signal an alarm if a violation occurs
  9. Turn the security system off

18 Clues: Acronym for passive infraredTurn the security system offa complete uninterrupted cableAn _____ code is a silent summons for helpA device used to operate a security systemResets an alarm system to a normal conditionA circuit with an end - of - the line resistorA _____ button is used to trigger an alarm condition...

2024 Arizona NFB 2024-08-12

2024 Arizona NFB crossword puzzle
Across
  1. Autonomy
  2. Delegate
  3. Belong
  4. Resilience
  5. Choice
  6. Status
  7. Collective
  8. Porterfield
  9. Partnership
  10. Opportunity
  11. Barricades
  12. Momentum
  13. Dignity
  14. Arizona
  15. Security
Down
  1. Innovation
  2. Value
  3. Identity
  4. Attitude
  5. Freewill
  6. Balance
  7. Ownership
  8. Dignitary
  9. Experience
  10. Legislation
  11. Respect
  12. Support
  13. Journey
  14. Equality
  15. Reinforce
  16. Networking
  17. Authentic

32 Clues: ValueBelongChoiceStatusBalanceRespectSupportJourneyDignityArizonaAutonomyIdentityAttitudeFreewillDelegateEqualityMomentumSecurityOwnershipDignitaryReinforceAuthenticInnovationExperienceResilienceCollectiveBarricadesNetworkingLegislationPorterfieldPartnershipOpportunity

Buffet de vocabulaire: Bon voyage 2025-10-22

Buffet de vocabulaire: Bon voyage crossword puzzle
Across
  1. to fasten
  2. something(as in to declare something)
  3. information
  4. counter/ticket counter
  5. to find
  6. security/security control
  7. to take off
  8. gate
  9. to thank
Down
  1. to leave on time
  2. passport control
  3. to declare
  4. to leave/get off
  5. seatbelt
  6. to land
  7. customs
  8. suitcase
  9. plane
  10. a flight
  11. boarding pass

20 Clues: gateplaneto landcustomsto findseatbeltsuitcasea flightto thankto fastento declareinformationto take offboarding passto leave on timepassport controlto leave/get offcounter/ticket countersecurity/security controlsomething(as in to declare something)

e-safety 2013-06-04

e-safety crossword puzzle
Across
  1. A name for unwanted emails
  2. bully This is someone who uses the internet to intimidate others
  3. Actions undertaken to befriend and establish an emotional connection to a child
  4. This is when you share too much personal information with someone you do not know very well
  5. networking Facebook is an example of one of these
  6. The term used when someone deliberately winds someone up on line
  7. Email attachments are one of the main reasons for these spreading
  8. You must do this if you suspect that one of your friends is a victim of cyber bullying
Down
  1. Protection Act What does DPA stand for?
  2. A password which would be hard to crack or guess
  3. Gaining unauthorised access to computer systems
  4. information you should not give these details out to people that you don't know
  5. You can do this to people you do not wish to chat to online
  6. Strain Injury What does RSI stand for?

14 Clues: A name for unwanted emailsStrain Injury What does RSI stand for?Protection Act What does DPA stand for?Gaining unauthorised access to computer systemsA password which would be hard to crack or guessnetworking Facebook is an example of one of theseYou can do this to people you do not wish to chat to online...

PRIVATE SECURITY INDUSTRY 2022-06-25

PRIVATE SECURITY INDUSTRY crossword puzzle
Across
  1. Ford __ pioneered the use of private security to guard his factories
  2. short form for standard operating procedure
  3. PMSCs are different from ___
  4. mogadishu syndrome is the ___ by governments to intervene with direct military intervention for humanitarian purposes
  5. ___ and road initiative
  6. something that replaces intensive patrolling
  7. new security career path in sg
  8. Japanese warriors
  9. Short form of China’s military
  10. The rise of PMSCs is caused by the end of which war (combined the word and war)
Down
  1. China’s capital
  2. China ___ Economic Corridor
  3. PMSCs are considered ___ under humanitarian law
  4. Employee theft costs businesses ___ billion a year
  5. short form of city bombed in 9/11
  6. DeWe’s profile rose dramatically last summer when Chinese Poly-GCL Petroleum Group Holdings hired it to manage security at a $4bn LNG project in ___
  7. short form for security agency grading assessment
  8. process of improving one’s skills
  9. PMSCs are driven by ___ (money)

19 Clues: China’s capitalJapanese warriors___ and road initiativeChina ___ Economic CorridorPMSCs are different from ___new security career path in sgShort form of China’s militaryPMSCs are driven by ___ (money)short form of city bombed in 9/11process of improving one’s skillsshort form for standard operating procedure...

WF 2021-08-08

WF crossword puzzle
Across
  1. the most interesting filed of work
  2. safest cyber company
  3. where we located
Down
  1. who we are looking for
  2. skill we mandatory ask for
  3. when should i apply

6 Clues: where we locatedwhen should i applysafest cyber companywho we are looking forskill we mandatory ask forthe most interesting filed of work

Wallets and Security 2023-06-12

Wallets and Security crossword puzzle
Across
  1. Malicious software
  2. Online wallet connected to the internet
  3. Additional security phrase
  4. Backup recovery words
  5. Printed wallet with key information
  6. Shared cryptographic code
  7. Copy of wallet data
  8. Additional security layer
  9. Offline wallet storage
Down
  1. Physical device for wallet security
  2. Multiple signature requirement
  3. Secret cryptographic code
  4. Data protection method
  5. Fingerprint or facial recognition
  6. Personal identification number

15 Clues: Malicious softwareCopy of wallet dataBackup recovery wordsData protection methodOffline wallet storageSecret cryptographic codeShared cryptographic codeAdditional security layerAdditional security phraseMultiple signature requirementPersonal identification numberFingerprint or facial recognitionPhysical device for wallet security...

GSO Puzzle 2025-06-21

GSO Puzzle crossword puzzle
Across
  1. The integration of security practices into the software development lifecycle, aiming for 'security by design'.
  2. The process of verifying the identity of a user, system, or application.
  3. A network security system that filters incoming and outgoing network traffic.
  4. The phase of incident response focused on analysis of the event and lessons learned for future improvement.
  5. Unsolicited commercial email, a common nuisance and potential vector for attacks.
  6. Adherence to established laws, regulations, and industry standards.
  7. A type of malware that encrypts data and demands payment for its release.
  8. The process of scrambling data to prevent unauthorized access.
  9. A weakness or flaw in a system that can be exploited by an attacker.
Down
  1. A type of malware that self-replicates and spreads to other computers by attaching to legitimate programs.
  2. Software Development Life Cycle, where security should be integrated at every stage.
  3. A security architecture where no user, device, or application is trusted by default.
  4. A simulated cyberattack against a computer system to identify vulnerabilities.
  5. The process of applying updates to software to fix bugs or security vulnerabilities.
  6. Malicious software designed to disrupt or damage computer systems.
  7. A type of social engineering attack often via email, aiming to trick users.
  8. Requiring more than one method of verification for user access.
  9. A sophisticated, prolonged cyberattack campaign often sponsored by nation-states.
  10. A type of malware that provides hidden access and privileges on a system, often at the kernel level.

19 Clues: The process of scrambling data to prevent unauthorized access.Requiring more than one method of verification for user access.Malicious software designed to disrupt or damage computer systems.Adherence to established laws, regulations, and industry standards.A weakness or flaw in a system that can be exploited by an attacker....

us military 2024-02-29

us military crossword puzzle
Across
  1. Aerial warfare branch
  2. Communication specialists
  3. Elite military units
  4. Foot soldiers
  5. Construction and demolition specialists
  6. Special operations force
  7. Maritime force
  8. Long-range weapons force
  9. Healthcare professionals in the military
  10. Maritime law enforcement)
  11. Unit specializing in cyber warfare
Down
  1. Amphibious assault force
  2. Mounted troops
  3. Naval construction force
  4. Part-time military personnel
  5. Supply chain management
  6. Information gathering and analysis
  7. State-level military reserve
  8. Newest branch established in 2019
  9. Land-based force

20 Clues: Foot soldiersMounted troopsMaritime forceLand-based forceElite military unitsAerial warfare branchSupply chain managementAmphibious assault forceNaval construction forceSpecial operations forceLong-range weapons forceCommunication specialistsMaritime law enforcement)Part-time military personnelState-level military reserve...

Cyber-Mobbing 2024-05-08

Cyber-Mobbing crossword puzzle
Across
  1. Ombudsmann Wer entfernt peinliche und unerwünschte Fotos von dir aus dem Internet?
  2. Was ist Mobbing auf keinen Fall nur?
  3. Was soll man machen, wenn man mitkriegt, dass jemand gemobbt wird?
  4. Welche Nummer rufst du an, wenn du Hilfe brauchst?
Down
  1. Ein anderer Begriff für Cyber-Mobbing?
  2. Welche Strafe droht Mobbern?
  3. Wohin kannst du gehen, wenn du in der Schule gemobbt wirst?
  4. Hauptdefinition von Mobbing?

8 Clues: Welche Strafe droht Mobbern?Hauptdefinition von Mobbing?Was ist Mobbing auf keinen Fall nur?Ein anderer Begriff für Cyber-Mobbing?Welche Nummer rufst du an, wenn du Hilfe brauchst?Wohin kannst du gehen, wenn du in der Schule gemobbt wirst?Was soll man machen, wenn man mitkriegt, dass jemand gemobbt wird?...

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. Belief that cyber-interests should be guided by state
  2. Process of registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  3. Group of computer systems linked together
  4. First type of media to be digitized
Down
  1. Conversion of analogue data into digital form
  2. The IT act is the regulatory body of ____ in India
  3. Author of ‘Code and Other Laws of CyberSpace’
  4. The convention of cyber crime was held in
  5. _____ runs specialized software and stores information

9 Clues: First type of media to be digitizedThe convention of cyber crime was held inGroup of computer systems linked togetherConversion of analogue data into digital formAuthor of ‘Code and Other Laws of CyberSpace’The IT act is the regulatory body of ____ in IndiaBelief that cyber-interests should be guided by state...

Cyber Law 2021-09-05

Cyber Law crossword puzzle
Across
  1. Belief that cyber-interests should be guided by state
  2. Process of registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  3. _____ runs specialized software and stores information
  4. The convention of cyber crime was held in
Down
  1. Conversion of analogue data into digital form
  2. Author of ‘Code and Other Laws of CyberSpace’
  3. The IT act is the regulatory body of ____ in India
  4. Group of computer systems linked together
  5. First type of media to be digitized

9 Clues: First type of media to be digitizedGroup of computer systems linked togetherThe convention of cyber crime was held inConversion of analogue data into digital formAuthor of ‘Code and Other Laws of CyberSpace’The IT act is the regulatory body of ____ in IndiaBelief that cyber-interests should be guided by state...

Cyber Bullying Crossword 2013-06-06

Cyber Bullying Crossword crossword puzzle
Across
  1. We should not ___ or reply to online strangers.
  2. ____ the incident to your parents or teachers.
  3. ______ can cause others to get angry and their computers will lag.
  4. Be ___for your words and actions online as it may hurt others.
  5. We should not be ___to gaming because it will cause us to be time stolen.
Down
  1. Bullying This means being bullied online.
  2. This means good online manners.
  3. Do not use _____ letters as people may think that you are shouting.
  4. Cyber ___ means using the computer or phone to say hurtful remarks to someone.
  5. Use ______ to show your feelings 

10 Clues: This means good online manners.Use ______ to show your feelings Bullying This means being bullied online.____ the incident to your parents or teachers.We should not ___ or reply to online strangers.Be ___for your words and actions online as it may hurt others.______ can cause others to get angry and their computers will lag....

Bullying 2021-08-26

Bullying crossword puzzle
Across
  1. Social media platform
  2. Exclusion
  3. Telling untrue stories about someone
  4. Type of psychological bullying
  5. Something you can do to stop cyberbullying
  6. Following someone
  7. Deliberate
  8. Occurs more than once
Down
  1. Not involving someone
  2. Intimidation
  3. Hitting, poking and pushing
  4. Social media
  5. Name calling
  6. Someone you can report bullying to
  7. Physical harm
  8. Someone you could report bullying to

16 Clues: ExclusionDeliberateIntimidationSocial mediaName callingPhysical harmFollowing someoneSocial media platformNot involving someoneOccurs more than onceHitting, poking and pushingType of psychological bullyingSomeone you can report bullying toTelling untrue stories about someoneSomeone you could report bullying to...

cyber security puzzle 2025-02-27

cyber security puzzle crossword puzzle
Across
  1. A scam where attackers create fake profiles on social media to trick people into believing they are real users.
  2. A program designed to simulate human conversation, often used in customer service or scams. (Chatbot) A scam where fake tech support calls are made, often impersonating well-known companies to steal money or access to computers. (Techsupport)
Down
  1. A deceptive attempt to get personal information or money by pretending to be a trusted entity. (Phishing)
  2. The practice of creating misleading digital content through the manipulation of photos, videos, or documents. (Forgery)

4 Clues: A deceptive attempt to get personal information or money by pretending to be a trusted entity. (Phishing)A scam where attackers create fake profiles on social media to trick people into believing they are real users.The practice of creating misleading digital content through the manipulation of photos, videos, or documents. (Forgery)...

National Cyber Security Awareness Month 2023 2023-08-25

National Cyber Security Awareness Month 2023 crossword puzzle
Across
  1. Bad guys will send these types of emails to try to get something out of your, or get you to do something
  2. (This is an abbreviation) A form of authenticating yourself in addition to your username and password. Examples of this include checking an authenticator app for a pin to enter in the resource you are logging into or tapping a banner notification.
  3. An attack involving bad guys texting you over the phone
  4. Software that(may or may not) lock down a computer system from use and demand payment to *fix* it
  5. Software bad guys will try to install to steal your information or do something nefarious (i.e., wire money from bank accounts you own)
  6. An attack involving bad guys calling you over the phone
  7. What you should do when you see a malicious or suspicious email
Down
  1. (Three words in total, no spaces) An excellent resource for resetting your own password or unlocking your account without having to make a phone call.
  2. A dishonest scheme with the intent of stealing something

9 Clues: An attack involving bad guys texting you over the phoneAn attack involving bad guys calling you over the phoneA dishonest scheme with the intent of stealing somethingWhat you should do when you see a malicious or suspicious emailSoftware that(may or may not) lock down a computer system from use and demand payment to *fix* it...

Newsletter 2023Q4 Crossword Puzzle 2023-11-06

Newsletter 2023Q4 Crossword Puzzle crossword puzzle
Across
  1. Concerning ransomware, a user or organization's critical data is made inaccessible
  2. Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
  3. Month of CAM
  4. Compromised digital devices, such as computers, smartphones, tablets, and even entire networks
  5. Process to restore data that has been lost, accidentally deleted, corrupted or made inaccessible.
  6. Any staff member who maintains security controls on behalf of an Owner
  7. Pertaining to a strong password, used to reduce vulnerability in the event of a hack
  8. TEAMS channel for up to date security notices
  9. Any person using Catalyst computing resource who are responsible for familiarizing themselves with and complying with Catalyst security policies and procedures
  10. Lead agency of IC3
  11. Number of years Catalyst has been a CAM Champ
Down
  1. One of two useful Security Awareness TEAMS channels
  2. Any staff member who oversees data recovery
  3. Leader of a business unit with responsibility for implementing department level operating procedures
  4. Person(s) responsible for ensuring that security policies are in place and for delegating security related responsibilities to ensure compliance
  5. Member of management or delegate who has primary responsibility for the business function supported by a system, application
  6. Minimizing the harm of a particular risk
  7. A kind of software used to prevent, scan, detect and delete viruses from a computer
  8. A malicious practice that aims to deceive and defraud people through texts

19 Clues: Month of CAMLead agency of IC3Minimizing the harm of a particular riskAny staff member who oversees data recoveryTEAMS channel for up to date security noticesNumber of years Catalyst has been a CAM ChampOne of two useful Security Awareness TEAMS channelsAny staff member who maintains security controls on behalf of an Owner...

Chapter 6 2019-09-27

Chapter 6 crossword puzzle
Across
  1. there is no single ________ accepted definition of national security
  2. this cannot prevent typhoon
  3. from Latin word diploma meaning an official document
  4. view of diplomacy and war, being the instruments of furthering national cause
  5. promoting the _____ of love for peace, as well as sentimental desire
  6. national security is an appropriate and ________ blend of political resilience and maturity
  7. it was Thomas Hobbes work in 1651
  8. a ________ to make school a place of peace is one of ultimate challenges in education.
  9. a state without war
Down
  1. complete the essay’s title of Immanuel kant “ perpetual peace: a _______ sketch
  2. nationality of Immanuel Kant
  3. the great effort of ______ to overcome various external and internal threats
  4. teaching how to develop a ______ that encourage harmony in the way people talk, listen, and interact with each other, and discourages action of hurt, harm, or destroy each other.
  5. the distinctive meaning of national security means freedom from _____ dictation
  6. teaching about ____ , about violence in all forms, about survival and our future
  7. surname of the U.S. secretary of defense from 1977 to 1981 in the carter administration
  8. meaning of “I” in CIA
  9. national ______ is the requirement to maintain the survival of the state
  10. an _______ symbol means different things to different people.
  11. surname of a history professor in Harvard who defines national security in 1990

20 Clues: a state without warmeaning of “I” in CIAthis cannot prevent typhoonnationality of Immanuel Kantit was Thomas Hobbes work in 1651from Latin word diploma meaning an official documentan _______ symbol means different things to different people.there is no single ________ accepted definition of national security...

Finance Crossword 2021-02-19

Finance Crossword crossword puzzle
Across
  1. Performance benchmark such as Nifty, S&P 500
  2. A contract whose value is based on the underlying asset
  3. A growing list of records or ‘blocks’ linked using cryptography
  4. Process of discovering patterns in large data and is used to ‘unearth’ cryptocurrencies
  5. A simulation of human intelligence in machines
  6. A privately held start-up company valued at over $1 billion
  7. Using APIs to enable regulated third party to access transactional data
Down
  1. Reduction in the value of a tangible asset due wear and tear
  2. A cryptocurrency featuring the face of the Shiba Inu dog from a popular meme
  3. A measure of systematic risk of a security or portfolio
  4. AI driven investment advisors that provide guidance based on algorithms
  5. A product that pays out fixed payments at regular intervals
  6. The price at which a potential buyer is willing to buy a security
  7. Transforming illiquid assets or debts into a security
  8. An increase in the prices of goods and services
  9. Profits earned from the simultaneous purchase and sale of a security to take advantage of the difference in prices
  10. Distribution of profits to the shareholders
  11. Asset that a lender accepts as security for a loan
  12. Indian consumer credit score
  13. Financing projects by raising money from a large number of people, example, Kickstarter

20 Clues: Indian consumer credit scoreDistribution of profits to the shareholdersPerformance benchmark such as Nifty, S&P 500A simulation of human intelligence in machinesAn increase in the prices of goods and servicesAsset that a lender accepts as security for a loanTransforming illiquid assets or debts into a security...

CTF-CW-1S 2025-11-17

CTF-CW-1S crossword puzzle
Across
  1. Dealing with crises as they happen
  2. Replacing sensitive data with non-sensitive equivalents
  3. Software designed to harm or exploit systems
  4. Computer Emergency Response Team acronym
  5. Applying updates to fix bugs or vulnerabilities
  6. Confidence in a system’s reliability and integrity
  7. Reading the fine print with a magnifying glass
  8. Monitoring and analytics solution adopted by Tekion SOC
  9. Identity and access management platform for login security at Tekion.
  10. How far the flashlight shines on your work
Down
  1. The fusion of security and IT operations for strong defense
  2. Encoding data so only authorized can read
  3. Verifying the claimed identity of a user, system, or device.
  4. Entity determining purposes and means of personal data processing
  5. California's comprehensive state law granting consumers rights over their personal information.
  6. Document explaining how organization collects and uses personal data
  7. Cloud-native tool at Tekion that safeguards running apps from attacks.
  8. Because numbers never fudge the truth
  9. The hole in your security bucket
  10. A security team's overall defensive stance

20 Clues: The hole in your security bucketDealing with crises as they happenBecause numbers never fudge the truthComputer Emergency Response Team acronymEncoding data so only authorized can readA security team's overall defensive stanceHow far the flashlight shines on your workSoftware designed to harm or exploit systems...

IR Terms 2024-03-16

IR Terms crossword puzzle
Across
  1. Where states pursue foreign policy objectives via a constructive engagement with other actors.
  2. The process of decision-making at the global level aimed at solving problems that affect more than one state (or region).
  3. Those states recognised as rising powers on the world stage (such as the BRICS).
  4. The ideological division within Europe between the American and Soviet spheres of influence. The term was used during the Cold War and coined by Winston Churchill.
Down
  1. An ideological doctrine which demands total obedience from its members.
  2. An environmental agreement adopted in 1997 that committed transitional economies to limit and reduce greenhouse gas emissions.
  3. The use (or threat) of cyber weapons against another with the intention of causing digital harm.
  4. Where a single state exercises structural dominance over the rules, norms, conventions and behaviour of a regional or international system.
  5. The strand of realist thought which claims the anarchic structure of global politics encourages states to prioritise their own national security.
  6. The right and acceptance of proper authority to rule.

10 Clues: The right and acceptance of proper authority to rule.An ideological doctrine which demands total obedience from its members.Those states recognised as rising powers on the world stage (such as the BRICS).Where states pursue foreign policy objectives via a constructive engagement with other actors....

CpE as a Discipline 2024-12-09

CpE as a Discipline crossword puzzle
Across
  1. Computer engineering professionals should take responsibility for any errors or mistakes and work to rectify them.
  2. Computer engineering professionals should respect and not use or distribute proprietary information without proper authorization. Use its acronym.
  3. It is the use of a computer as an instrument to commit illegal acts, such as fraud, stealing identities, or violating privacy.
  4. Computer engineering professionals should disclose any potential conflicts of interest or biases that may influence their work.
Down
  1. A set of values, behaviors, and wider responsibilities in how you apply your specialist knowledge and skills.
  2. Computer engineering professionals should be aware of the impact of their work on society and the environment.
  3. It is what keeps professional people true to their word.
  4. The abilities match the requirements of the role and often produce results that exceed expectations.
  5. The set of commonly agreed principles that govern the use of computers.
  6. Computer engineering professionals must ensure that the systems they design and implement protect the people from threats such as secretly tracking and selling online activity and cyber bullying.

10 Clues: It is what keeps professional people true to their word.The set of commonly agreed principles that govern the use of computers.The abilities match the requirements of the role and often produce results that exceed expectations.A set of values, behaviors, and wider responsibilities in how you apply your specialist knowledge and skills....

Crossword Puzzle - All about Security ONE 2020-10-08

Crossword Puzzle - All about Security ONE crossword puzzle
Across
  1. The dept that never sleeps
  2. Number of years have we been in this building
  3. Person with the most dogs
  4. Someone who has 3 boys
  5. Type of car Tyler drives
  6. the one who fixes everything
  7. The DJ
  8. Our first “technology”
  9. When Security One bought Alliance – what street was it on?
  10. Someone who has two girls
  11. The Nova Scotia retiree
  12. person who likes the “oldies”
  13. A former Marine
Down
  1. Latest in technology
  2. One of most common names at Security One
  3. The one that got away
  4. The Axe Man
  5. One of the ones who started it all
  6. The only girl in London
  7. Someone who loves boating
  8. Who has the most children?
  9. Our original street name
  10. Who has a hyphenated name?
  11. The crochet queen
  12. The newlywed
  13. Our building was formerly a part of ____
  14. Our team colors
  15. Street Dave lives on
  16. The best thing about Security ONE?
  17. Where is Security ONE located?
  18. Whose kids live the furthest away?

31 Clues: The DJThe Axe ManThe newlywedOur team colorsA former MarineThe crochet queenLatest in technologyStreet Dave lives onThe one that got awaySomeone who has 3 boysOur first “technology”The only girl in LondonThe Nova Scotia retireeType of car Tyler drivesOur original street nameSomeone who loves boatingPerson with the most dogsSomeone who has two girls...

Epic Crossword 2015-02-18

Epic Crossword crossword puzzle
Across
  1. device
  2. planet
  3. permission
  4. of mobile product
Down
  1. strangers
  2. url
  3. people
  4. safety

8 Clues: urldeviceplanetpeoplesafetystrangerspermissionof mobile product

Security 2022-04-03

Security crossword puzzle
Across
  1. targeting high profile individuals using social engineering techniques
  2. a form of malware that demands money from the user in return for something
  3. a well-known group of red hat hackers
  4. the first D in DDoS
  5. following other people into secure areas
  6. a form of malware that is able to spread with no reliance on host files or human interaction
Down
  1. the process of converting plaintext to ciphertext so that it cannot be understood
  2. a social engineering technique that directs website's traffic elsewhere
  3. a piece of software that detects, prevents and removes malware from a system

9 Clues: the first D in DDoSa well-known group of red hat hackersfollowing other people into secure areastargeting high profile individuals using social engineering techniquesa social engineering technique that directs website's traffic elsewherea form of malware that demands money from the user in return for something...

Security 2022-07-27

Security crossword puzzle
Across
  1. Alt+Shift+I keys
  2. this formal segregation of duties, teams of at least two employees will exercise under the following circumstances
  3. you find the Robbery Checklist, Robbery Response, and Roberry witness documents in here.
  4. while opening branch you carry this through the branch while doing the walkthrough
  5. When transaction(s) is done within the same day over 10k
Down
  1. These reports are filed in accordance with the NCUA regulation governing such reports
  2. should inspected the branch exterior for signs of forced entry, suspicious vehicles or persons.
  3. lock the branch entry/exit doors, relocking after each member leaves. Do not admit anyone into the branch after close
  4. you find the Bomb Threat Checklist, and Extortion Checklist documents in here

9 Clues: Alt+Shift+I keysWhen transaction(s) is done within the same day over 10kyou find the Bomb Threat Checklist, and Extortion Checklist documents in herewhile opening branch you carry this through the branch while doing the walkthroughThese reports are filed in accordance with the NCUA regulation governing such reports...

Cyber Security - Safety on the Road. 2023-08-28

Cyber Security - Safety on the Road. crossword puzzle
Across
  1. Another word for concealed.
  2. Use this drive for department files.
  3. Block unauthorized access while permitting outward communication.
  4. Before you leave, _____ your data.
  5. Use " " to access the Boise Cascade network.
Down
  1. Many phones can be turned into a ___________.
  2. Use this drive for business or project files.
  3. Term for when hackers can load malware onto public usb charging stations.
  4. Avoid public ______.

9 Clues: Avoid public ______.Another word for concealed.Before you leave, _____ your data.Use this drive for department files.Use " " to access the Boise Cascade network.Many phones can be turned into a ___________.Use this drive for business or project files.Block unauthorized access while permitting outward communication....

social networking 2013-03-06

social networking crossword puzzle
Across
  1. that can be seen
  2. a blogging site
  3. sharing your oppinion
  4. sharing with people on the internet
  5. social networking site
  6. spreading computers
  7. a shortened form of word
  8. publish a messeging online
  9. photo blog
Down
  1. to regard with displeasure
  2. you can do this to someone you dont like
  3. agreeing with someone
  4. a dangerous person
  5. where people can share things to you
  6. keywords
  7. online harrassment
  8. attached by feelings
  9. private stored messeges
  10. social network rapid chatter
  11. instant messeging service

20 Clues: keywordsphoto bloga blogging sitethat can be seena dangerous persononline harrassmentspreading computersattached by feelingsagreeing with someonesharing your oppinionsocial networking siteprivate stored messegesa shortened form of wordinstant messeging serviceto regard with displeasurepublish a messeging onlinesocial network rapid chatter...

Powerpuff Thief Puzzle (Slowpoke Squad has new recruits!) 2023-09-15

Powerpuff Thief Puzzle (Slowpoke Squad has new recruits!) crossword puzzle
Across
  1. shifty drug
  2. clutch aid
  3. tach o mint
  4. rev n go
  5. easy idle
  6. n2o cola
  7. gask its
  8. faux wheel drive
  9. revolting
  10. synerg
  11. fiber fuel
  12. carbon cyber
  13. tank coat
  14. no stall
  15. lil torquey pistons
  16. vinyl toupee
Down
  1. sidewall shine
  2. combustr
  3. viewzeen
  4. mood springs
  5. tow cap
  6. rpm
  7. bumper save
  8. trunk fresh
  9. triple dent
  10. retread
  11. shiny wax
  12. intersection
  13. spare mint
  14. leak less
  15. nitroade
  16. gasprin
  17. sputter stop

33 Clues: rpmsynergtow capretreadgasprincombustrviewzeenrev n gon2o colagask itsnitroadeno stalleasy idleshiny waxrevoltingleak lesstank coatclutch aidspare mintfiber fuelshifty drugtach o mintbumper savetrunk freshtriple dentmood springsintersectioncarbon cybersputter stopvinyl toupeesidewall shinefaux wheel drivelil torquey pistons

Technologie 2023-03-21

Technologie crossword puzzle
Across
  1. Profile
  2. Filter
  3. Account
  4. To Search
  5. Computer
  6. Social Media
  7. File
  8. Website
  9. Application
  10. To Post
  11. To Share
  12. Email
  13. To Stream
  14. To Save
  15. Online
  16. Text Message
  17. Keyboard
  18. To Download
  19. To Take A Photo
Down
  1. Public
  2. Password
  3. To Click
  4. Technology
  5. Mouse
  6. Laptop
  7. Username
  8. To Upload
  9. Cell Phone
  10. Follower
  11. Cyber Bullying
  12. Screen
  13. To Record
  14. To Text
  15. Flash Drive
  16. Tablet
  17. Comment
  18. Private

37 Clues: FileMouseEmailPublicFilterLaptopScreenTabletOnlineProfileAccountWebsiteTo PostTo TextTo SaveCommentPrivatePasswordTo ClickComputerUsernameFollowerTo ShareKeyboardTo SearchTo UploadTo RecordTo StreamTechnologyCell PhoneApplicationFlash DriveTo DownloadSocial MediaText MessageCyber BullyingTo Take A Photo

Cyberland Magazine 2021-03-29

Cyberland Magazine crossword puzzle
Across
  1. being literate in virtual world
  2. virtual
  3. virtual culture
  4. acts of virtual world
  5. virtual assault
  6. science fiction stories in virtual world
  7. virtual offense
Down
  1. misguide in virtual world
  2. virtual vacancy
  3. pirate of virtual world
  4. voyager in virtual world
  5. virtual tyranny
  6. science of virtual fields
  7. half human half robot
  8. safeness of virtual world

15 Clues: virtualvirtual vacancyvirtual tyrannyvirtual culturevirtual assaultvirtual offenseacts of virtual worldhalf human half robotpirate of virtual worldvoyager in virtual worldmisguide in virtual worldscience of virtual fieldssafeness of virtual worldbeing literate in virtual worldscience fiction stories in virtual world

IMR533-Chapter 5.1-Computer Crimes 2025-05-28

IMR533-Chapter 5.1-Computer Crimes crossword puzzle
Across
  1. The spread of _____can interfere with computers and change or erase data, which affects how data is stored.
  2. Many parties, including authorities, make significant investments, such as sophisticated threat detection systems, encryption tools, and staff training in order to improve it.
  3. Viruses, worms, ransomware, trojans and spyware are the examples.
  4. Typically intended to advertise goods and services, but it can also be used to spread malware or launch phishing scams.
  5. Any criminal activity that involves a computer or network as the primary tool or target of the offense.
  6. An assault on a networking system that stops a server from servicing customers.
  7. Cyber _____ occurs when someone creates or joins online groups or communities that harass, mock, or bully their target.
  8. _____theft occurs when an attacker deceives a victim into giving up personal information and then utilises it to commit a crime.
  9. Cyber _____is defined as the use of the internet to create, display, import, distribute, or publish pornographic or obscene content.
Down
  1. Finding and taking advantage of flaws in computer networks or systems in order to obtain data without authorisation, or accomplish other nefarious goals.
  2. Cyberbullying can cause self-doubt and _____ thoughts.
  3. Computer _____ is a subset of computer crime.
  4. Extreme types of pornography, violent movies, graphic novels, and other media that show violent or sexual behaviours in a way that is meant to shock or arouse are examples of _____ publications.
  5. Hacking, malware distribution, denial-of-service attacks, and cyber _____ are examples of illegal activities on the Net.
  6. Deception using emails, messages, or websites to collect personal data for malevolent reasons.
  7. _____ is morally acceptable when it is done to strengthen security, find security flaws, and address them.

16 Clues: Computer _____ is a subset of computer crime.Cyberbullying can cause self-doubt and _____ thoughts.Viruses, worms, ransomware, trojans and spyware are the examples.An assault on a networking system that stops a server from servicing customers.Deception using emails, messages, or websites to collect personal data for malevolent reasons....

NERD Packet Puzzler! 2023-06-01

NERD Packet Puzzler! crossword puzzle
Across
  1. The latest version of the internet protocol that provides a larger address space and improved security compared to its predecessor.
  2. A security protocol that provides data confidentiality and integrity for wired and wireless networks.
  3. The process of establishing and maintaining the security parameters necessary for MACsec communication
  4. A distributed database that maps domain names to their respective IP addresses
  5. A protocol used for remote authentication and authorization of network access.
  6. A technology that enables the creation of virtual local area networks for improved network management and security.
  7. A set of techniques used to manage network traffic and prioritize certain types of traffic over others.
  8. Network configuration that allows multiple servers to share the load for a single application or service
Down
  1. A technology used to provide redundancy in network connections, which combines multiple physical links into a single logical one
  2. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security policies.
  3. A unit of data transmitted over a network.
  4. A networking equipment manufacturer that provides high-performance routing and switching solutions.
  5. Creating an outbound and inbound channel, this fundamental component of MACsec enables secure communication between two devices.
  6. A portion of a network that is segregated based on a common IP address prefix, improving security and network management.
  7. A technique that enables multiple hosts to share the same IP address, improving availability and fault tolerance.
  8. The process of directing network traffic from one device to another device.
  9. A routing protocol used to exchange routing information between different autonomous systems on the internet.

17 Clues: A unit of data transmitted over a network.The process of directing network traffic from one device to another device.A distributed database that maps domain names to their respective IP addressesA protocol used for remote authentication and authorization of network access....

Elastic Security #1 2023-04-24

Elastic Security #1 crossword puzzle
Across
  1. Process of continuously checking for threats
  2. Exploring data at a more granular level
  3. Measure of potential impact of a threat
  4. Observable behavior in data
  5. Visual representation of events over time
  6. Prioritizing incidents based on severity
  7. Security event that may have negative consequences
  8. Actions taken to mitigate a security incident
  9. List of trusted entities
  10. Label assigned to data for easier organization
  11. Notification of a potential security threat
  12. Finding relationships between events
  13. Identifiable characteristic of a threat
  14. List of untrusted entities
Down
  1. Observable related to malicious activity
  2. Act of searching for threats
  3. Changing focus in data analysis
  4. Criteria used to detect suspicious activity
  5. Additional information about an event
  6. Identifying malicious or suspicious activity
  7. Adversary behaviors in the MITRE ATT&CK framework
  8. Grouping and summarizing data
  9. Framework for categorizing attack techniques
  10. Likelihood and impact of a security event
  11. Elasticsearch feature for alerting and monitoring
  12. Deviation from normal behavior
  13. Visual interface for data analysis

27 Clues: List of trusted entitiesList of untrusted entitiesObservable behavior in dataAct of searching for threatsGrouping and summarizing dataDeviation from normal behaviorChanging focus in data analysisVisual interface for data analysisFinding relationships between eventsAdditional information about an eventExploring data at a more granular level...

Crossword 3 2024-07-25

Crossword 3 crossword puzzle
Across
  1. A type of cybersecurity analysis that focuses on the likelihood and potential impact of risks.
  2. A type of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
  3. A security concept that ensures that data is only accessible to those with authorized access.
  4. A type of software that is specifically designed to detect, stop, and remove viruses and other kinds of malicious software.
  5. A security protocol that ensures privacy between communicating applications and their users on the internet.
  6. A type of firewall that filters traffic between a trusted and an untrusted network.
  7. A type of security audit that evaluates the security of a system or network by simulating an attack from a malicious source.
Down
  1. A security measure that involves hiding internal IP addresses.
  2. A method used to verify the integrity and authenticity of a message, software, or digital document.
  3. A security model that enforces strict access controls and compartmentalization.
  4. A set of rules that govern the actions computers take to secure data and is often used in conjunction with firewalls.
  5. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  6. A type of security threat that is disguised as legitimate software.

13 Clues: A security measure that involves hiding internal IP addresses.A type of security threat that is disguised as legitimate software.A security model that enforces strict access controls and compartmentalization.A type of firewall that filters traffic between a trusted and an untrusted network....

2ND QTR NEWSLETTER 2022-05-16

2ND QTR NEWSLETTER crossword puzzle
Across
  1. Who is the security representative for the 450 IS?
  2. Convicted spy Klaus Fuchs was charged with stealing what research secrets?
  3. Taha Thompson spied for who?
  4. The Israeli Defense Minister had a spy posing as this?
  5. U.S. has won the extradition lawsuit of Julia Assange who is a citizen of what country?
  6. An Inquiry Official receives an appointment letter signed by the Group _______
  7. On systems below JWICS what is required on any headset with a microphone?
  8. Who was the guard that compromised 20 MI6 operatives?
  9. A man from Chicago that aided Iran and plead guilty to spying faces how many years in jail?
  10. Air Force update their PED policy to ban all __________ devises in secure areas.
  11. Because of the actions of David Smith, only _________ guards will be used on British embassies.
  12. Where was the malware called “HermeticWipe” discovered?
  13. During the opening process of a facility how many forms are you to complete?
  14. The convicted spy Haitao Xiang lived in the town.
  15. When scientists commit espionage, one expert believes they do it because they believe ________ should benefit from the research.
Down
  1. Photographs taken within a facility will not contain any ______ material.
  2. Who was the former linguist turned spy for the Lebanese?
  3. Who is the security representative for the 402 IS?
  4. The Chinese company that makes cell phones and has been linked to secretly recording phone conversations is?
  5. Where do spy’s often meet and use as cover for exchanging information?
  6. How many forms are completed while going through the close procedure of a facility?
  7. What organization tricked some scientists to destroy the power supply to the centrifuge they worked on in Iran?
  8. What is the name of the Chinese agency that claims to promote China’s language and culture to American students?
  9. The most common security violation in the 693 ISRG is ________ disclosure over IT.
  10. Who is the security representative for the 485 IS?
  11. Who is the security representative for the 24 IS?
  12. Who is the security representative for the 693 ISS?
  13. A robust Security, Education, Training, and Awareness (SETA) is built on the foundation of the _______ orientation.
  14. How many years was Klaus Fuchs sentence to in prison?

29 Clues: Taha Thompson spied for who?Who is the security representative for the 24 IS?The convicted spy Haitao Xiang lived in the town.Who is the security representative for the 450 IS?Who is the security representative for the 402 IS?Who is the security representative for the 485 IS?Who is the security representative for the 693 ISS?...

Cybersecurity Awareness month at Kent! 2024-10-14

Cybersecurity Awareness month at Kent! crossword puzzle
Across
  1. Sense created by the attacker to make you react quickly without thinking.
  2. When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
  3. Software attack method to harm or exploit a device or network.
  4. Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
  1. Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
  2. An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
  3. Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
  4. The address of a webpage which you check the validity of before clicking it. (Acronym)

8 Clues: Software attack method to harm or exploit a device or network.Sense created by the attacker to make you react quickly without thinking.The address of a webpage which you check the validity of before clicking it. (Acronym)Additional layer of security that verifies a user's access to an account more than once. (Acronym)...

Aviation/Landside & Airside terms crossword 2025-07-12

Aviation/Landside & Airside terms crossword crossword puzzle
Across
  1. Area where passengers board the aircraft
  2. Area where aircraft are parked, loaded or refueled
  3. Area where passengers drop bags and get boarding passes
  4. Secure part of airport – past security checks
  5. Where international passengers get passports checked
  6. A place where aircraft take off, land, and passengers travel
  7. Tax-free shopping in international terminals
  8. Screening area to check passengers and baggage
  9. NZ aviation security service checking passengers and bags
Down
  1. Suitcases or personal items travellers take with them
  2. Checks passengers for restricted goods at international airports
  3. Bridge connecting terminal gate to aircraft door
  4. A large building for storing and maintaining aircraft
  5. Where aircraft take off and land
  6. Special waiting area for eligible passengers
  7. Path aircraft use to move between runway and terminal
  8. Air traffic __________ guides aircraft in the air
  9. When a passenger stops at an airport but doesn’t enter the country
  10. Public part of airport – before security
  11. Controls aircraft movements from the ground and air

20 Clues: Where aircraft take off and landArea where passengers board the aircraftPublic part of airport – before securitySpecial waiting area for eligible passengersTax-free shopping in international terminalsSecure part of airport – past security checksScreening area to check passengers and baggageBridge connecting terminal gate to aircraft door...

Industrial Security Concepts Crossword Puzzle. 2025-10-28

Industrial Security Concepts Crossword Puzzle. crossword puzzle
Across
  1. – Warning device that signals intrusion or danger.
  2. – Careful checking to ensure compliance with standards.
  3. – Regular inspection done by guards to ensure safety.
  4. – Mechanical or electronic device used to secure entry points.
  5. – Weakness that can be exploited by threats.
  6. – Event causing severe disruption and damage.
  7. – Any potential cause of harm to people or property.
  8. – Process of gathering facts after a security incident.
  9. – Electronic system used for video monitoring in secured areas.
  10. – Intentional destruction or disruption of operations.
  11. – The right or ability to enter a restricted area.
Down
  1. – Exchange of information vital in security operations.
  2. – Verification of a person’s credentials or legitimacy.
  3. – Person responsible for enforcing security measures.
  4. – Formal written account of an incident or observation.
  5. – Act of keeping people and property safe.
  6. – Continuous observation of people or premises for safety.
  7. – The act of stealing small quantities from the workplace.
  8. – Valuable property or resources needing protection.
  9. – A written guideline that governs security procedures.

20 Clues: – Act of keeping people and property safe.– Weakness that can be exploited by threats.– Event causing severe disruption and damage.– Warning device that signals intrusion or danger.– The right or ability to enter a restricted area.– Valuable property or resources needing protection.– Any potential cause of harm to people or property....

Security Threats 2016-06-13

Security Threats crossword puzzle
Across
  1. able to replicate itself from system to system with NO user interaction
  2. type of attack that seeks to overwhelm system resources
  3. often sits quietly watching everything you do
  4. pretending to be someone you are not to gain network or system access
  5. tricks user into running an application because they think it will do one thing but actually performs some other malicious function
  6. bad guys may go after a specific organization or individual
  7. using people to get around security techniques
  8. able to replicate itself from system to system by a user running an application
Down
  1. someone who is not authorized to enter a particular area does so by following closely behind someone who is authorized
  2. holds your system hostage until you pay money
  3. broad category of malicious software
  4. standing over someone's shoulder to view what's on their computer
  5. using every possible password combination until the right one is found
  6. attack using common or well known words until the right password is found
  7. hides itself from the operating system and is invisible to anti-virus and anti-malware applications too

15 Clues: broad category of malicious softwareholds your system hostage until you pay moneyoften sits quietly watching everything you dousing people to get around security techniquestype of attack that seeks to overwhelm system resourcesbad guys may go after a specific organization or individual...

Computer Security 2016-01-05

Computer Security crossword puzzle
Across
  1. type of software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.
  2. credit bureau where one can specify notation on credit account as added security from fraud
  3. Software programs designed to invade your computer, and copy, damage, or delete your data
  4. helps create a protective barrier between your computer and the Internet
  5. type of software that helps detect and remove computer viruses before they can cause damage
  6. E-mail sent by online criminals to trick you into giving them money
  7. Unwanted e-mail, instant messages, and other online communication
  8. setting these for Internet use can help protect your privacy and security
Down
  1. E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information
  2. These people use the Internet to trick children into meeting with them in person
  3. Both children and adults may use the Internet to harass or intimidate other people
  4. act in ways that help protect us against the risks that come with Internet use
  5. Software that tracks your online activities or displays endless ads
  6. Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information
  7. type of theft where con artists get your personal information and access your cash and/or credit

15 Clues: Unwanted e-mail, instant messages, and other online communicationSoftware that tracks your online activities or displays endless adsE-mail sent by online criminals to trick you into giving them moneyhelps create a protective barrier between your computer and the Internetsetting these for Internet use can help protect your privacy and security...

Security Training 2021-02-23

Security Training crossword puzzle
Across
  1. Always ____ each member when they walk in
  2. If being robbed, remember to stay ________
  3. Minimum number of tellers on the line
  4. Always ______ emails, if sending to a member with personal information
  5. True or false, we can discuss a robbery with the media
  6. First step in keeping yourself safe during an active shooter situation
  7. Our alarm company
  8. When opening the branch you may receive a call asking if we have a HAPO in which state
Down
  1. _____ plan is a proactive plan on how to maintain services during an emergency
  2. Activate the silent alarm when it's _____ to do so
  3. Primary meeting point
  4. WP fire extinguishers are located next to the electrical room and ____ room
  5. How often our alarms are tested
  6. Color of paper used to signal to police that branch is safe
  7. Secondary meeting point

15 Clues: Our alarm companyPrimary meeting pointSecondary meeting pointHow often our alarms are testedMinimum number of tellers on the lineAlways ____ each member when they walk inIf being robbed, remember to stay ________Activate the silent alarm when it's _____ to do soTrue or false, we can discuss a robbery with the media...

food security 2022-01-21

food security crossword puzzle
Across
  1. manufactured artificially and contains minerals or synthetic chemicals
  2. pesticide toxic chemicals that are made to repel,prevent and kill pests
  3. fertilizers derived from animal or vegetable matter
  4. pest multifaceted approach to pest control
  5. the top 5-10 inches of soil
  6. is a sub-set of general biodiversity
  7. the simultaneous cultivation of several crops or kinds of animals
  8. the rearing of aquatic animals or the cultivation of aquatic plants for food
  9. a destructive insect or animal the attacks crops,food,or livestock
Down
  1. industrialized production of livestock,poultry,fish,and crops
  2. the condition of not having access to sufficient food
  3. the salt content in the soil
  4. excessive food intake
  5. the cultivation of a single crop in a given area
  6. a parliament grant to the sovereign for state needs

15 Clues: excessive food intakethe top 5-10 inches of soilthe salt content in the soilis a sub-set of general biodiversitypest multifaceted approach to pest controlthe cultivation of a single crop in a given areafertilizers derived from animal or vegetable mattera parliament grant to the sovereign for state needs...

Information Security 2023-12-18

Information Security crossword puzzle
Across
  1. A secret word or phrase that must be used to gain access to a system or service.
  2. A technique that falsifies the identity or location of a sender or receiver.
  3. A deliberate attempt to compromise or damage a system, network, or program.
  4. The process of protecting data by secret code.
  5. A cybercriminal who breaks into systems
  6. A part of the internet that is hidden from regular search engines and requires special software to access.
  7. A software program that enters a computer system without the owner’s knowledge or consent.
Down
  1. The practice of protecting systems, networks, and programs from digital attacks.
  2. A type of malware that infects and replicates itself on other files or programs
  3. A small computer defect that causes errors or failures.
  4. A small piece of data stored on a user’s browser that tracks their preferences or activities.
  5. A fraudulent attempt to obtain sensitive information by impersonating a legitimate entity.
  6. A type of malware that encrypts the victim’s data and demands payment for its decryption.
  7. Unsolicited or unwanted messages sent over the internet, usually for advertising purposes.
  8. A system that prevents unauthorized access to a network or device.

15 Clues: A cybercriminal who breaks into systemsThe process of protecting data by secret code.A small computer defect that causes errors or failures.A system that prevents unauthorized access to a network or device.A deliberate attempt to compromise or damage a system, network, or program....

Imformation Security 2020-12-11

Imformation Security crossword puzzle
Across
  1. being bad
  2. to copy or move programs or information into a computer's memory, especially from the internet or a larger computer
  3. protection of a person, building, organization, or country against threats such as crime or attacks by foreign countries
  4. an arrangement with a bank to keep your money there and to allow you to take it out when you need to
  5. open the phone
  6. theft
  7. the right to enter
  8. can play game or internet
  9. open your phone and more safer than password
Down
  1. to improve the quality or usefulness of something
  2. to keep someone or something safe from injury, damage, or loss
  3. information, especially facts or numbers
  4. someone who hacks
  5. to take something without the permission or knowledge of the owner and keep it
  6. an illegal plan for making money, especially one that involves tricking people
  7. cheating

16 Clues: theftcheatingbeing badopen the phonesomeone who hacksthe right to entercan play game or internetinformation, especially facts or numbersopen your phone and more safer than passwordto improve the quality or usefulness of somethingto keep someone or something safe from injury, damage, or loss...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. Process of providing food or nutrients
  2. A measure of food availability and quality
  3. A type of agriculture that minimizes environmental impact
  4. A sudden, severe shortage of food
  5. Animal product that is a major source of protein
  6. Type of food that is essential for growth and repair
  7. Staple crop, often used in breadmaking
Down
  1. Condition where people do not have enough access to nutritious food
  2. The practice of making food more nutritious by adding vitamins and minerals
  3. Another word for famine, especially in Africa
  4. Practice of growing diverse crops to ensure food availability
  5. Part of a diet that includes fruits, vegetables, and whole grains
  6. This nutrient is crucial for healthy brain function
  7. A crop that is drought-resistant and widely grown in Africa
  8. To produce food or goods through farming

15 Clues: A sudden, severe shortage of foodProcess of providing food or nutrientsStaple crop, often used in breadmakingTo produce food or goods through farmingA measure of food availability and qualityAnother word for famine, especially in AfricaAnimal product that is a major source of proteinThis nutrient is crucial for healthy brain function...

Food security 2024-12-17

Food security crossword puzzle
Across
  1. which improves blood flow and energy
  2. Immediate enery
  3. rich in protein,fats
  4. contain nutrients like A,C and K
  5. rich in carbohydrates
  6. powerhouse of boosting energy
  7. contains fiber and nutrients
  8. king of the fruit
Down
  1. contains natural sugar that your body can quickly turn into energy
  2. rich in healthy fats
  3. for body Hydration
  4. blend of protein,fats and carbohydrates
  5. primary ingredient on Hummus
  6. source of protein
  7. vitamin C

15 Clues: vitamin CImmediate enerysource of proteinking of the fruitfor body Hydrationrich in healthy fatsrich in protein,fatsrich in carbohydratesprimary ingredient on Hummuscontains fiber and nutrientspowerhouse of boosting energycontain nutrients like A,C and Kwhich improves blood flow and energyblend of protein,fats and carbohydrates...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. - What food gives to keep us strong
  2. - Place where people donate food to help others
  3. - Plant food like carrots or broccoli
  4. - Gathering crops from the field
  5. - Large animals raised for meat and milk
  6. - A group of people living together and helping each other
Down
  1. - Cereal crop like wheat or rice
  2. - Keeping things going for a long time
  3. - Where plants grow
  4. - Essential for life and growing food
  5. - Good for your body
  6. - Amount of food available
  7. - Place where crops are grown and animals are raised
  8. - A plant grown for food
  9. - Place where food is sold

15 Clues: - Where plants grow- Good for your body- A plant grown for food- Amount of food available- Place where food is sold- Cereal crop like wheat or rice- Gathering crops from the field- What food gives to keep us strong- Essential for life and growing food- Plant food like carrots or broccoli- Keeping things going for a long time...

Security Test 2025-06-08

Security Test crossword puzzle
Across
  1. Extra verification step beyond just a password
  2. Program designed to detect and remove digital threats
  3. Copy of data stored elsewhere for safety
  4. Used to prove your identity; includes things like usernames and passwords
  5. General name for harmful software
  6. Used to restrict access; must be strong and secret
  7. Tiny digital threat that can spread and destroy files
Down
  1. Term for systems that are easy to attack
  2. Tool that hides your internet activity and location
  3. Security system that controls incoming and outgoing traffic
  4. Person who breaks into systems without permission
  5. Watches your online activity without permission
  6. Has the highest access in a system
  7. Tricks users into giving personal information by pretending to be trustworthy
  8. Unwanted messages often sent in bulk

15 Clues: General name for harmful softwareHas the highest access in a systemUnwanted messages often sent in bulkTerm for systems that are easy to attackCopy of data stored elsewhere for safetyExtra verification step beyond just a passwordWatches your online activity without permissionPerson who breaks into systems without permission...

NETWORK SECURITY 2025-02-25

NETWORK SECURITY crossword puzzle
Across
  1. a secure and unchangeable digital record of tranction
  2. A network security system that uses tickets for authentication.
  3. A security system that blocks or allows network traffic.
  4. The process of converting data into a secret code to keep it safe
  5. Keeping information private and protected from unauthorized access
  6. A secure way to prove a message or document is real
Down
  1. A tool used to monitor and analyze network traffic
  2. A one-way process that converts data into a fixed-length code.
  3. A type of encryption that uses matrix math to code message
  4. A key that is shared openly to help encrypt messages.
  5. The ability to enter or use a system or network.
  6. An attempt to harm or gain unauthorized access to a system
  7. The method of protecting information by converting it into a secret code
  8. Encrypted version of the message
  9. A key exchange method for securely sharing encryption keys over network

15 Clues: Encrypted version of the messageThe ability to enter or use a system or network.A tool used to monitor and analyze network trafficA secure way to prove a message or document is reala secure and unchangeable digital record of tranctionA key that is shared openly to help encrypt messages.A security system that blocks or allows network traffic....

Bullying 2013-07-27

Bullying crossword puzzle
Across
  1. when bullying goes too far the victim resorts to this
  2. the type of bullying which involves the spreading of rumors
  3. the person who is bullied feels this
  4. this is often used in physical bullying
  5. the type of bullying which involves the use of the internet
  6. the words that are normally used in verbal bullying are called:
  7. the type of bullying were the victim is socially left out
Down
  1. the victim of bullying can get this so that it does not go too far
  2. the type of bullying which involves the use of words which offend a person
  3. the type of bullying were the victim is intimidated
  4. the type of bullying which involves contact with the victim
  5. the person who picks on a weaker and smaller person than they are
  6. this is often the birth place of cyber bullying

13 Clues: the person who is bullied feels thisthis is often used in physical bullyingthis is often the birth place of cyber bullyingthe type of bullying were the victim is intimidatedwhen bullying goes too far the victim resorts to thisthe type of bullying were the victim is socially left outthe type of bullying which involves the spreading of rumors...

Gen AI for Observability 2024-03-01

Gen AI for Observability crossword puzzle
Across
  1. How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution)
  2. This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)
Down
  1. Elastic has a platform, what is it called?
  2. What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)

4 Clues: Elastic has a platform, what is it called?This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)...

FRM 2024-07-15

FRM crossword puzzle
Across
  1. What measures should XYZ implement to enhance its liquidity risk management?
  2. How did the cyber-attack affect XYZ's working capital and liquidity?
  3. How can XYZ strengthen its regulatory compliance framework?
  4. What are the potential legal and financial consequences for the company?
  5. Were there any gaps in the company's credit risk assessment processes?
  6. What were the root causes of the cyber-attack on XYZ Corporation?
Down
  1. Were there any limitations in the company's liquidity contingency planning?
  2. What steps should XYZ take to strengthen its operational resilience?
  3. How well did the company's cybersecurity framework respond to the incident?
  4. Which data protection regulations did XYZ fail to comply with?
  5. How did the operational disruption impact XYZ's credit relationships?
  6. What actions should XYZ take to improve its credit risk management?

12 Clues: How can XYZ strengthen its regulatory compliance framework?Which data protection regulations did XYZ fail to comply with?What were the root causes of the cyber-attack on XYZ Corporation?What actions should XYZ take to improve its credit risk management?What steps should XYZ take to strengthen its operational resilience?...

Technology & Digital Culture 2025-04-01

Technology & Digital Culture crossword puzzle
Across
  1. Electronic format
  2. Social media tag
  3. Online video viewing
  4. Computer process
  5. Online realm
Down
  1. Audio broadcast
  2. Online image
  3. Internet humor
  4. Online personality

9 Clues: Online imageOnline realmInternet humorAudio broadcastSocial media tagComputer processElectronic formatOnline personalityOnline video viewing

AmTrust 2023-12-12

AmTrust crossword puzzle
Across
  1. dfdf
  2. dfdf
  3. dfdfd
  4. DFHD
  5. the third largest in
Down
  1. dfd
  2. fdfd
  3. dfdf
  4. fdf
  5. kdkd

10 Clues: dfdfdfdfdffdfddfdfdfdfDFHDkdkddfdfdthe third largest in

bullying CAT 2015-06-14

bullying CAT crossword puzzle
Across
  1. to stand up for your self
  2. taking peoples stuff
  3. the targeted
  4. leaving people out
  5. doing nothing to help
  6. live your ...
  7. online
Down
  1. face to face
  2. word for bullying
  3. hurting people by punching them
  4. embarrassment photos of people
  5. spreads fast with ...
  6. bullying good or ...
  7. a form of bullying
  8. the bad guy

15 Clues: onlinethe bad guyface to facethe targetedlive your ...word for bullyingleaving people outa form of bullyingtaking peoples stuffbullying good or ...spreads fast with ...doing nothing to helpto stand up for your selfembarrassment photos of peoplehurting people by punching them

LEASEM9 Crossword Puzzle 2025-09-23

LEASEM9 Crossword Puzzle crossword puzzle
Across
  1. RECOVERY – Plan to restore business operations after a disaster.
  2. SECURITY – Security measures established around the outer boundaries of a site.
  3. – Taking another’s property without permission.
  4. – Intentional destruction to hinder operations.
  5. PLAN – Backup plan for unexpected disruptions.
  6. – Process of gathering facts to solve an incident.
  7. – Rounds conducted by guards to ensure safety.
Down
  1. – Continuous monitoring of people, objects, or areas.
  2. – Illegal entry into restricted premises.
  3. – Small-scale theft usually committed by employees.
  4. PREVENTION – Measures to stop the outbreak and spread of fire.
  5. SYSTEM – Device that alerts authorities of unauthorized activities.
  6. ASSESSMENT – Evaluation of possible threats to an organization.
  7. GUARD – Person hired to protect people and property.
  8. CONTROL – Mechanism that regulates entry and exit in a facility.
  9. – Unauthorized entry attempt into a protected area.
  10. SECURITY – Protection of buildings, assets, and personnel.
  11. – Video monitoring system used to deter and detect crime.
  12. ASSESSMENT – Process of evaluating potential dangers and vulnerabilities.
  13. PLAN – Documented procedures for responding to crises.

20 Clues: – Illegal entry into restricted premises.PLAN – Backup plan for unexpected disruptions.– Rounds conducted by guards to ensure safety.– Taking another’s property without permission.– Intentional destruction to hinder operations.– Process of gathering facts to solve an incident.– Small-scale theft usually committed by employees....

FOOD SECURITY 2024-12-17

FOOD SECURITY crossword puzzle
Across
  1. the food security is deepens on
  2. The major feature of food security
  3. FOOD COOPERATION OF INDIA
  4. price food grains depends on
  5. making main object of food security
Down
  1. payment depends on food security
  2. dimensions of food security
  3. revolution agricultural production
  4. stock The food security depends on
  5. main food insecurity

10 Clues: main food insecurityFOOD COOPERATION OF INDIAdimensions of food securityprice food grains depends onthe food security is deepens onpayment depends on food securityrevolution agricultural productionstock The food security depends onThe major feature of food securitymaking main object of food security

IT Jobs & Computer Ethics 2024-08-20

IT Jobs & Computer Ethics crossword puzzle
Across
  1. Builds websites.
  2. Tests software quality.
  3. Designs cloud systems.
  4. Fake online identity.
  5. Domain name exploitation.
Down
  1. Malware demanding payment.
  2. Protects against cyber threats.
  3. Secret cryptocurrency mining.
  4. Online harassment.
  5. Designs user interfaces.
  6. Publishing private info.
  7. Fake emails to steal info.

12 Clues: Builds websites.Online harassment.Fake online identity.Designs cloud systems.Tests software quality.Designs user interfaces.Publishing private info.Domain name exploitation.Malware demanding payment.Fake emails to steal info.Secret cryptocurrency mining.Protects against cyber threats.

Technology Vocab 2025-02-07

Technology Vocab crossword puzzle
Across
  1. blurry
  2. record
  3. download
  4. vlog
  5. change
  6. modern
  7. invent
  8. problem
  9. security
  10. connect
  11. addicted
  12. post
  13. charge
  14. safe
  15. internet
  16. block
  17. login
  18. upload
  19. streaming
Down
  1. smartphone
  2. delete
  3. privacy
  4. google
  5. dangerous
  6. information
  7. communication
  8. edit
  9. username
  10. clear
  11. captions
  12. solution
  13. tablet
  14. comment
  15. selfie

34 Clues: vlogeditpostsafeclearblockloginblurrydeletegooglerecordchangemoderninventchargetabletselfieuploadprivacyproblemconnectcommentdownloadsecurityusernameaddictedcaptionssolutioninternetdangerousstreamingsmartphoneinformationcommunication

Allie's Cybersecurity Crossword 2025-03-15

Allie's Cybersecurity Crossword crossword puzzle
Across
  1. Longer, complicated phrase to enter accounts
  2. Converting data into unreadable code
  3. Malware disguised as legitimate software
  4. Duplicate copy preventing data loss
  5. Webpages not indexed by search engines
  6. Small file tracking website activity
  7. Unauthorized individual with skill to gain access to
  8. Verifying a user's claimed identity
  9. Malware attached to files stealing/damaging data
  10. Monitors/controls incoming and outgoing traffic
  11. Ending access to secure system
  12. Self-replicating malware
Down
  1. Fraudulent attempt to steal sensitive information
  2. Malware demanding payment for access
  3. Malicious software that harms systems
  4. Weakness exploitable by security threats
  5. Security method using physical traits
  6. Installing newest software security versions
  7. Private browsing hiding local history
  8. Encrypted connection masking user location

20 Clues: Self-replicating malwareEnding access to secure systemDuplicate copy preventing data lossVerifying a user's claimed identityMalware demanding payment for accessConverting data into unreadable codeSmall file tracking website activityMalicious software that harms systemsSecurity method using physical traitsPrivate browsing hiding local history...

safety and security 2022-12-12

safety and security crossword puzzle
Across
  1. / allows the door lock to be overridden to open the electronically engaged deadbolt.pg192
  2. / the guestroom key opens the door of the room that has been assigned to the guest.pg192
  3. / is the close observation of a situation to provide information for investigations regrading guests, employees, and asset protection.pg193
  4. / are laws that protect both the innkeeper and guest.pg187
  5. / The director of security maintains relationships with law enforcement(police)...etc.pg190
  6. / based on the emergency response plan, determine what needs to be purchased and acquired, and then store these items.pg196
  7. / human trafficking is a form of modern-day slavery. It includes the force, fraud, or coercion to labor or commercial s*x.pg189
  8. / the security officer(loss prevention officer) has multiple responsible and is the "boots on the ground".pg188
  9. / create an emergency response plan.pg196
  10. / is responsible for handling daily operations in the hotel as well as any emergency situations that arise.pg195
  11. / as the department head, the security manager(director of security) over...pg188
  12. / can be defined as having an understanding of what is going on around you.pg188
  13. / conduct a practice run of the emergency response plan to make employees comfortable.pg197
  14. / a comprehensive report that addresses.pg188
  15. / one reason lodging properties are allowed to refuse service to guest is if guests are intoxicated.pg186
Down
  1. / is typically used by guestroom attendants.pg192
  2. / details the emergency procedures designed to maintain safety of guest, employees ad the property.pg191
  3. / means that you have a legal duty to act in the way that an ordinary, prudent, reasonable person would.pg186
  4. / come from outside such as weather, active assailants, and bomb threats.pg198
  5. / an innkeekper is an individual or business owner who provides overnight accommodations for guest in exchange for reasonable compensation.pg187
  6. / is the secure and logical control of all keys in the hotel.pg191
  7. / if a hotel dose not have a security department.pg187
  8. floors, stairwells / key access also used for...pg194
  9. / The security department is responsible for traininng emplayees to be prepared to hanble emergency situations.pg191
  10. / is any observed behavior that could indicate crime or terrorism.pg189
  11. / The security supervisor supports the security manager and the management function.pg188
  12. / are something that happen in the hotel like a gas leak or water damage.pg198
  13. / review the response, identify any gaps, and make improvements to respond more efficiantly in future emergency situations.pg197
  14. / allows access into all of the door locks of the hotel.pg192
  15. / include monitoring keys, surveillance, and awareness of pretinent technological advance.pg191
  16. / Usually, keys given to employees are metal keys. these should be audited on a regular basis.pg193
  17. / is failure to act in a safe manner.pg186
  18. / is typically used by inspector.pg192
  19. / addresses ensuring the safety and security of the hotel and its guest preventing problem from occurring.pg190
  20. / is a specifically encoded key, typically used by the bell attendant to handle a luggage pull.pg192
  21. / may be carried by housekeeping, maintenance, and security personnel.pg194
  22. / refers to being responsible for the actions or the condition of an establishment.pg186
  23. / are well known for having highly sophisticated security technology.pg194
  24. / alert guests to potential hazards, such as wet floors.pg187
  25. / Ensure every employee knows how to follow the emergency response plan during an emergercy.pg197

40 Clues: / is typically used by inspector.pg192/ create an emergency response plan.pg196/ is failure to act in a safe manner.pg186/ a comprehensive report that addresses.pg188/ is typically used by guestroom attendants.pg192floors, stairwells / key access also used for...pg194/ if a hotel dose not have a security department.pg187...

Domestic & International Airports 2019-07-21

Domestic & International Airports crossword puzzle
Across
  1. rotoruas airport code
  2. christchurchs airport code
  3. walks around with an animal in customs
  4. before security
  5. new zealands biggest airline
  6. the person that works in security
  7. the people that keep in touch with the pilots
  8. something the airport provides for passengers
Down
  1. shows identity
  2. where you get off and on the aircraft
  3. new zealnads biggest airport
  4. gets you between domestic and international airports
  5. queenstowns airport code
  6. where you wait before you get on the aircraft
  7. hamiltons airport code
  8. what you check in to go on the plane
  9. after you go through security
  10. something a plane lands on
  11. taupos airport code
  12. invercargills airport code

20 Clues: shows identitybefore securitytaupos airport coderotoruas airport codehamiltons airport codequeenstowns airport codechristchurchs airport codesomething a plane lands oninvercargills airport codenew zealnads biggest airportnew zealands biggest airlineafter you go through securitythe person that works in securitywhat you check in to go on the plane...

Final Exam 2022-04-29

Final Exam crossword puzzle
Across
  1. __ model describes when there is need for speed in response to prevent catastrophic results of loss
  2. A form of 2FA characteristic that describes biometrics "What you__"
  3. security tool that had usability testing in Why Johnny Still, Still Can't Encrypt
  4. ___ model is described when security can have financial outcome to presented risk
  5. __ model is when a mental model is based on provided stories
  6. security tool that had usability testing in Why Johnny Still Can't Encrypt
  7. single encryption key shared among people
  8. a type of posting regret when a user is frustrated or upset
Down
  1. posting too ___ is something that was described to avoid to do on your social media
  2. two pairs of keys (public and private)
  3. Removing a user from the decision making
  4. A known security encryption tool that advertise to be one of the most usable security tools for the general public
  5. ____ model is an explanation for someone's thoughts about how something works in the real world
  6. negative or offensive ___ is what a facebook user might post and later regret
  7. security tool that had usability testing in Why Johnny Can't Encrypt

15 Clues: two pairs of keys (public and private)Removing a user from the decision makingsingle encryption key shared among peoplea type of posting regret when a user is frustrated or upset__ model is when a mental model is based on provided storiesA form of 2FA characteristic that describes biometrics "What you__"...

Security 2022-04-03

Security crossword puzzle
Across
  1. a well-known group of red hat hackers
  2. the first D in DDoS
  3. targeting high profile individuals using social engineering techniques
  4. a form of malware that is able to spread with no reliance on host files or human interaction
  5. a piece of software that detects, prevents and removes malware from a system
Down
  1. the process of converting plaintext to ciphertext so that it cannot be understood
  2. a form of malware that demands money from the user in return for something
  3. following other people into secure areas
  4. a social engineering technique that directs website's traffic elsewhere

9 Clues: the first D in DDoSa well-known group of red hat hackersfollowing other people into secure areastargeting high profile individuals using social engineering techniquesa social engineering technique that directs website's traffic elsewherea form of malware that demands money from the user in return for something...