cyber security Crossword Puzzles
NETWORK SECURITY 2024-01-30
Across
- ORDERED LIST
- ENSURES DATA IS ACCURATE. E.G. PRESENCE, FORMAT AND RANGE
- MADE SO THAT LOST DATA CAN BE RECOVERED EASILY
- ASSIGNED TO EACH USER TO ENSURE THEY ONLY ACCESS PARTICULAR FILES
- ATTACHED TO A DOCUMENT OR SPREADSHEET, COPYING ITSELF FROM ONE APPLICATION TO ANOTHER BY INFECTING START UP FILE
- WORLDWIDE COMMUNICATION SYSTEM LINKING COMPUTERS IN GEOGRAPHICALLY SEPERATE AREAS
- PROGRAM THAT IS SELF REPLICATING AND CAN INFECT A COMPUTER
- A USER INTERFACE OF THE APPLICATION WHERE APPS ARE DISPLAYED IN BROWSER
- THE START OF ANY WEB PAGE
Down
- LIES DORMANT UNTIL A SPECIFIC PIECE OF PROGRAM CODE IS ACTIVATED
- WHEN A WEBSITE CONTAINS ELEMENTS THAT ALLOW THE USER TO INTERACT
- MALICIOUS PROGRAMS THAT REPLICATE THEMSELVES FROM SYSTEM TO SYSTEM
- PROCESSED ON THE WEB SERVER WHEN THE USER REQUESTS INFORMATION
- A SECRET SERIES OF CHARACTERS USED TO GAIN ACCESS TO A COMPUTER SYSTEM
- WHEN A WEBSITE HAS NO FORM OF INTERACTIVITY
- PRIVATE COMMUNICATION SYSTEM WITHIN AN ORGANISATION
16 Clues: ORDERED LIST • THE START OF ANY WEB PAGE • WHEN A WEBSITE HAS NO FORM OF INTERACTIVITY • MADE SO THAT LOST DATA CAN BE RECOVERED EASILY • PRIVATE COMMUNICATION SYSTEM WITHIN AN ORGANISATION • ENSURES DATA IS ACCURATE. E.G. PRESENCE, FORMAT AND RANGE • PROGRAM THAT IS SELF REPLICATING AND CAN INFECT A COMPUTER • ...
Security Crossword Puzzle 2025-06-26
Across
- Only those with eligibility AND need-to-know can _______ classified information.
- The person in charge of a company's security program.
- Not a classification, but a designation.
- Something you should never share with others.
- The website used for all employee security training.
- Security risk that comes from within the organization.
- Three letter abbreviation for the request you must make before travelling to another secure site.
- Before you embark on any ________, you must complete a pre-briefing in Sign-In Compliance.
Down
- Everyone, cleared and uncleared, is responsible for ________ classified information.
- When classified information mistakenly ends up on an unsecured system.
- Sharing classified information with uncleared persons is called ________ disclosure.
- The document located on the FSO page where you can locate all security policies and procedures (Abbr.).
- To access classified information, you must first have a favorable _____________ determination at the appropriate level.
- Reporting _________ information to security is a requirement for all employees.
- How often every employee must complete their required security trainings.
15 Clues: Not a classification, but a designation. • Something you should never share with others. • The website used for all employee security training. • The person in charge of a company's security program. • Security risk that comes from within the organization. • When classified information mistakenly ends up on an unsecured system. • ...
PRIVATE SECURITY INDUSTRY 2022-06-25
Across
- short form for security agency grading assessment
- something that replaces intensive patrolling
- PMSCs are driven by ___ (money)
- new security career path in sg
- China’s capital
- Japanese warriors
- Employee theft costs businesses ___ billion a year
- Ford, __ pioneered the use of private security to guard his factories
- mogadishu syndrome is the ___ by governments to intervene with direct military intervention for humanitarian purposes
- Short form of China’s military
- DeWe’s profile rose dramatically last summer when Chinese Poly-GCL Petroleum Group Holdings hired it to manage security at a $4bn LNG project in ___
Down
- ___ and road initiative
- PMSCs are different from ___
- short form for standard operating procedure
- The rise of PMSCs is caused by the end of which war (combined the word and war)
- short form of city bombed in 9/11
- process of improving one’s skills
- PMSCs are considered ___ under humanitarian law
- China ___ Economic Corridor
19 Clues: China’s capital • Japanese warriors • ___ and road initiative • China ___ Economic Corridor • PMSCs are different from ___ • new security career path in sg • Short form of China’s military • PMSCs are driven by ___ (money) • short form of city bombed in 9/11 • process of improving one’s skills • short form for standard operating procedure • ...
bullying CAT 2015-06-14
15 Clues: online • the bad guy • face to face • the targeted • live your ... • word for bullying • leaving people out • a form of bullying • taking peoples stuff • bullying good or ... • spreads fast with ... • doing nothing to help • to stand up for your self • embarrassment photos of people • hurting people by punching them
Mil 2025-11-19
Across
- orientation or path
- related to digital tech
- difficulties to overcome
- ability to influence or control
- deceptive data-stealing tactic
- periodical publication
Down
- chance for advantage
- continuous mark or path
- online realm
- visual hue or tone
- illegal digital activities
- defined form or outline
- exact location or mark
- prohibited online material
- communication platforms
15 Clues: online realm • visual hue or tone • orientation or path • chance for advantage • exact location or mark • periodical publication • continuous mark or path • related to digital tech • defined form or outline • communication platforms • difficulties to overcome • illegal digital activities • prohibited online material • deceptive data-stealing tactic • ability to influence or control
Cyber Wellness 2013-06-28
Across
- Do not post b____things about people because it is bullying other people
- Be careful what l__________ you use on social networking websites because if you use the wrong words, other people might feel bad.
- Cyber b_________ is using a phone or a computer to say bad or hurtful things to others.
- Copyright i___________ is a crime that we must not commit because it means stealing other people’s work without permission.
- Be careful who you talk to on social n_________ sites because you do not know them.
Down
- Game a___________is losing control over the game and you can’t stop playing the game
- Do not use v_________ online because using it makes people hurtful
- Do not let other p______ cyber bully you and you suffer in silence, tell a teacher or an adult what is happening.
- Show your teachers e__________ of cyber bullying so that they can carry out further investigation
- You control the g_______, don’t let it control you. Control the amount of time you play it.
10 Clues: Do not use v_________ online because using it makes people hurtful • Do not post b____things about people because it is bullying other people • Be careful who you talk to on social n_________ sites because you do not know them. • Game a___________is losing control over the game and you can’t stop playing the game • ...
Castrofloresandtj 2024-10-24
Across
- process- gain the information used to gain estimates of the situation
- marsupial
- weapons- traditional weapons such as rifles and explosives
- warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
Down
- operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
- warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
- lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
- control- measures taken to prevent a fire or collision.
- ceremony- when the vessel is formally named and launched is customarily
- a series of short cruises to check out the ship and its equipment.
- warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
- warfare- the use of military aircraft and other flying machines in warfare.
- launching- vessel is either completed on perpendicular building ways near the water.
- warfare of security experts will discuss the growing threats to corporations.
- warfare are self replicating programs that can hide in systems
- conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
16 Clues: marsupial • control- measures taken to prevent a fire or collision. • weapons- traditional weapons such as rifles and explosives • warfare are self replicating programs that can hide in systems • a series of short cruises to check out the ship and its equipment. • process- gain the information used to gain estimates of the situation • ...
Module 9 Participation | Cybersecurity Crossword Puzzle - Cian 2025-03-12
Across
- – Remote storage accessed from internet
- - One billion bytes
- – Creates a private and secure connection
- – Protect from unauthorized access
- – Automated software performing tasks
- – Copies of data for recovery purposes
- – Entering credentials to access course
- – Individual who intrudes systems illegally
- - Faster storage uses flash memory
- - Two-Factor authentication app
- - short term memory for active tasks
Down
- – Little file that stores data on device
- – A bug that spreads between systems
- - Acesses code
- – Warning about potential security threats
- Authentication – Security method using two verification factors
- – Security update fixing vulnerabilities
- – A unit of digital information
- – Blocks unauthorized network access
- - Long term magnetic storage
20 Clues: - Acesses code • - One billion bytes • - Long term magnetic storage • – A unit of digital information • - Two-Factor authentication app • – Protect from unauthorized access • - Faster storage uses flash memory • – A bug that spreads between systems • – Blocks unauthorized network access • - short term memory for active tasks • – Automated software performing tasks • ...
CHAPTER 6: NATIONAL SECURITY CONCERNS AND PEACE EDUCATION 2019-09-23
Across
- __________ is a state without war.
- ___________, in 1943, defined it in terms of war saying that, "a nation has security when it does not have to sacrifice its legitimate interests to avoid war, and is able, if challenged, to maintain them by war,"
- It was Thomas Hobbes' 1651 work.
- U.S. Secretary of Defense from 1977 to 1981 in the Carter administration.
- A later definition by ____________ , a political scientist, in 1950, looks at national security from almost the same aspect, that of external coercion. "The distinctive meaning of national security means freedom from foreign dictation."
- A safe, orderly, and peaceful setting that contributes to positive thinking and learning.
- In Harvard, history professor _______________ definition of 1990 in national security as defined through the lens on national power: "National Security is best described as a capacity to control those domestic and foreign conditions that the public opinion of a given community believes necessary to enjoy its own self-determination of autonomy, prosperity and well-being.
- Serves the students' need to learn social responsibility and peacemaking skills.
- The origin of the modern concept of "national security" as a philosophy of maintaining a stable nation state can be traced to the ________________.
Down
- National Security Act of 1947 was signed by U.S. president ______________.
- Encouraged to support children's learning of pro-social activities at home.
- Networks implement programs to increase peace.
- Teaches students to consider the consequences of negative behavior and to solve conflicts peacefully.
- The 1996 definition propagated by the _________________________ accretes the elements of national power: "National security is an appropriate and aggressive blend of political resilience and maturity, human resources, economic structure and capacity, technological competence, industrial base and availability of natural resources and finally the military might."
- ________ to non-violence includes the infusion of peace throughout all aspects of teh educational process.
- Inclusive communication is the peaceful exchange of information and the sharing of feelings, decisions, and ideas.
- The requirement to maintain the survival of the state through the use of economic, power, projection, and political power, and the exercise of diplomacy.
- A german philosopher in his 1795 essay, "Perpetual Peace: A Philosophical Sketch."
- ____________, 1960, while recognizing the need to segragate the subjectivity of the conceptual idea from the objectivity, talks of threats to acquired values: " An ambiguous symbol means different things to different people. National Security objectively means that the absence of threats to acquired values and subjectively, the absence of fear that such values will be attacked."
- From latin word, diploma, meaning an official document.
20 Clues: It was Thomas Hobbes' 1651 work. • __________ is a state without war. • Networks implement programs to increase peace. • From latin word, diploma, meaning an official document. • U.S. Secretary of Defense from 1977 to 1981 in the Carter administration. • National Security Act of 1947 was signed by U.S. president ______________. • ...
Castrofloresandtj 2024-10-24
Across
- process- gain the information used to gain estimates of the situation
- marsupial
- weapons- traditional weapons such as rifles and explosives
- warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
Down
- operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
- warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
- lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
- control- measures taken to prevent a fire or collision.
- ceremony- when the vessel is formally named and launched is customarily
- a series of short cruises to check out the ship and its equipment.
- warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
- warfare- the use of military aircraft and other flying machines in warfare.
- launching- vessel is either completed on perpendicular building ways near the water.
- warfare of security experts will discuss the growing threats to corporations.
- warfare are self replicating programs that can hide in systems
- conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
16 Clues: marsupial • control- measures taken to prevent a fire or collision. • weapons- traditional weapons such as rifles and explosives • warfare are self replicating programs that can hide in systems • a series of short cruises to check out the ship and its equipment. • process- gain the information used to gain estimates of the situation • ...
Monthly Information Security Crossword-3 2014-09-15
Across
- _________ configures and manages a system as per the data owner’s requirements.
- Fulfilling contractual requirements for your client, including those for their information's security is also a ________ requirement.
- Maintaining the documents related to your work logically and accurately constitutes ________ of records.
- Personal computers requires ______ as much as office systems.
- Daily update for an antivirus which includes details of the latest viruses.
- Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
Down
- Digital _______ - Science of computer investigation.
- A statement or a set of statements adopted by management and binding on all the employees to follow.
- Documented information security policy ensure ______ in its implementation.
- _____, Security, Risk and Complaince are the 4 key deliverables of any information Security program.
- Data _______ defines the security requirements for data protection.
- Blocks unwanted network traffic to your computer.
- Weakest link in information security.
13 Clues: Weakest link in information security. • Blocks unwanted network traffic to your computer. • Digital _______ - Science of computer investigation. • Personal computers requires ______ as much as office systems. • Data _______ defines the security requirements for data protection. • Documented information security policy ensure ______ in its implementation. • ...
Airport Terminology 2019-07-21
Across
- Area of the airport after security and customs
- HLZ
- Where the aircraft can park
- Area of the airport before security and customs
- PAX
- WAG
- EK
- QF
- Vehicle used to carry the baggage to the aircraft
- Luggage brought into the hold by ground staff
Down
- Luggage brought into the cabin by passengers
- B in the ahonetic alphabet
- Area where passengers depart and board
- Another term for immigration officers
- Airline responsible for the flight
- Meaning worldwide
- Beginning and terminating in the same country
- Crew member responsible for flying the aircraft
- The security of the airport
- W in the phonetic alphabet
20 Clues: EK • QF • HLZ • PAX • WAG • Meaning worldwide • B in the ahonetic alphabet • W in the phonetic alphabet • Where the aircraft can park • The security of the airport • Airline responsible for the flight • Another term for immigration officers • Area where passengers depart and board • Luggage brought into the cabin by passengers • Beginning and terminating in the same country • ...
CSL Module 2 Puzzle 2020-09-10
Across
- ___ Based Social Engineering refers to extraction of information using computer or any digital device
- _____ had made many significant changes in the prevailing laws of cyber space applicable in India, one of which is regarding Cyber Cafes
- pursue or approach stealthily
- Attacker targets high level employee to gain access to valuable data
- act of harming or harassing through information technology in a deliberate manner
Down
- Step 1 of planning an Attack
- Attempt made to physically access the device or server
- enable hackers to exploit system vulnerabilities
- Heroku, Force.com, Google App Engine are example of ___
- Second Step of Social Engineering Life-cycle
- Another name for Quid Pro Quo
- ___ cloud infrastructure is a composition of two or more distinct cloud infrastructures
12 Clues: Step 1 of planning an Attack • Another name for Quid Pro Quo • pursue or approach stealthily • Second Step of Social Engineering Life-cycle • enable hackers to exploit system vulnerabilities • Attempt made to physically access the device or server • Heroku, Force.com, Google App Engine are example of ___ • ...
CHAPTER 6: NATIONAL SECURITY CONCERNS AND PEACE EDUCATION 2019-09-23
Across
- ___________, in 1943, defined it in terms of war saying that, "a nation has security when it does not have to sacrifice its legitimate interests to avoid war, and is able, if challenged, to maintain them by war,"
- WOLFERS ____________, 1960, while recognizing the need to segragate the subjectivity of the conceptual idea from the objectivity, talks of threats to acquired values: " An ambiguous symbol means different things to different people. National Security objectively means that the absence of threats to acquired values and subjectively, the absence of fear that such values will be attacked."
- U.S. Secretary of Defense from 1977 to 1981 in the Carter administration.
- Encouraged to support children's learning of pro-social activities at home.
- The origin of the modern concept of "national security" as a philosophy of maintaining a stable nation state can be traced to the ________________.
- Inclusive communication is the peaceful exchange of information and the sharing of feelings, decisions, and ideas.
- Networks implement programs to increase peace.
- A german philosopher in his 1795 essay, "Perpetual Peace: A Philosophical Sketch."
- National Security Act of 1947 was signed by U.S. president ______________.
- ________ to non-violence includes the infusion of peace throughout all aspects of teh educational process.
- Teaches students to consider the consequences of negative behavior and to solve conflicts peacefully.
Down
- Serves the students' need to learn social responsibility and peacemaking skills.
- A safe, orderly, and peaceful setting that contributes to positive thinking and learning.
- The 1996 definition propagated by the _________________________ accretes the elements of national power: "National security is an appropriate and aggressive blend of political resilience and maturity, human resources, economic structure and capacity, technological competence, industrial base and availability of natural resources and finally the military might."
- __________ is a state without war.
- The requirement to maintain the survival of the state through the use of economic, power, projection, and political power, and the exercise of diplomacy.
- It was Thomas Hobbes' 1651 work.
- In Harvard, history professor _______________ definition of 1990 in national security as defined through the lens on national power: "National Security is best described as a capacity to control those domestic and foreign conditions that the public opinion of a given community believes necessary to enjoy its own self-determination of autonomy, prosperity and well-being.
- A later definition by ____________ , a political scientist, in 1950, looks at national security from almost the same aspect, that of external coercion. "The distinctive meaning of national security means freedom from foreign dictation."
- From latin word, diploma, meaning an official document.
20 Clues: It was Thomas Hobbes' 1651 work. • __________ is a state without war. • Networks implement programs to increase peace. • From latin word, diploma, meaning an official document. • U.S. Secretary of Defense from 1977 to 1981 in the Carter administration. • National Security Act of 1947 was signed by U.S. president ______________. • ...
Cyber Security!! By: Juana Blanchet 2020-08-20
Across
- es un programa informático que tiene como propósito detectar y eliminar virus, y otros programas que pueden perjudicar.
- son correos que no son deseados recibir. Suelen ser publicidades de toda clase de productos y servicios.
- Evitan que los usuarios de internet que no están autorizados acceder a redes privadas conectadas con la red.
- son programas informáticos que quieren alterar el funcionamiento del computador, sin que el usuario se de cuenta. Pueden infectar archivos del sistema.
Down
- Pueden almacenar información sobre vos, como información de registros, o tu nombre de usuario, Pero no espían.
- es un software que recopila información de un ordenador. Después, esa información la transmite a una entidad externa sin el consentimiento del propietario del ordenador.
- es una estafa que quiere obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
7 Clues: son correos que no son deseados recibir. Suelen ser publicidades de toda clase de productos y servicios. • Evitan que los usuarios de internet que no están autorizados acceder a redes privadas conectadas con la red. • Pueden almacenar información sobre vos, como información de registros, o tu nombre de usuario, Pero no espían. • ...
ZAJEDNO ZA BOLJI INTERNET 2023-02-15
Across
- BEZBROJNE,PORUKE
- OTISAK,NAŠ-TRAG
- ISMIJAVANJE,PONIŽAVANJE
- ELEKTRONSKA,POŠTA
- LIČNI,DNEVNIK,NA,INTERNETU
- EMOCIJA,ŽUTO,SMAJLIĆ,OKRUGLO
- MRŽNJA,LJUBOMORA,VRIJEĐANJE
- MRŽNJA,PRST,OZNAKA,NESVIĐANJE
- UZIMANJE,PROFILA
Down
- GOOGLE,STRANICA,DOKUMENT
- NASILJE,AGRESIJA,NA-INTERNETU
- OSOBE,MRŽNJA,HATE-KOMENTARIŽ
- APLIKACIJE,TIKTOK,SNAPCHAT,INSTAGRAM
- WIREWALL
- PORUKE,SEKSUALNISADRŽAJ
- PRIVATNOST,TAJNOVITO,
- BROJ,JAVNA,ADRESA
- NEWS,LAŽNO,TRAČANJE,ŠIRENJE
- MREŽA,PAUKOVA,RIBARSKA
- SVIĐANJE,OZNAKA,
20 Clues: WIREWALL • OTISAK,NAŠ-TRAG • BEZBROJNE,PORUKE • SVIĐANJE,OZNAKA, • UZIMANJE,PROFILA • BROJ,JAVNA,ADRESA • ELEKTRONSKA,POŠTA • PRIVATNOST,TAJNOVITO, • MREŽA,PAUKOVA,RIBARSKA • PORUKE,SEKSUALNISADRŽAJ • ISMIJAVANJE,PONIŽAVANJE • GOOGLE,STRANICA,DOKUMENT • LIČNI,DNEVNIK,NA,INTERNETU • NEWS,LAŽNO,TRAČANJE,ŠIRENJE • MRŽNJA,LJUBOMORA,VRIJEĐANJE • OSOBE,MRŽNJA,HATE-KOMENTARIŽ • ...
unit 4 2015-05-26
23 Clues: (n) 회원 • (n) 조직 • (n) 정보 • (n) 항의 • (n) 외교관 • (n) 교과서 • (v) 결심하다 • (adv) 대신 • (adj) 진정한 • (adv) 갑자기 • (n) 잘못된 정보 • (adj) 국제적인 • (adj) 온라인 상의 • (adj) 전 세계적으로 • (v) 이해하다, 깨닫다 • (n) 인터넷 상의 친구 • (v) 고치다, 정정하다 • (prep) ~을 통하여 • (adv) 나중에, 이후에 • (v) 홍보하다, 증진하다 • (adj) 사적인, 개인적인 • (adj) 비정부의, 민간의 • (v) 받아들이다, 수용하다
Black Friday 2025-11-28
Across
- - Kitchen
- - Opening
- - Apparel
- - Gifts
- - Consoles
- - Bedding
- - Children
- - Clearance
- - Overnight
- - Deals
- - Fragrances
- - Homegoods
- - Crushing
- - Guarantee
- - Cyber-Monday
- - Special
- - Day-after
- - Rewards
- - Parking-lot
- - Touchscreen
Down
- - Returns
- - Grabbing
- - Computers
- - Steep
- - Rush
- - Shopping
- - Reserved
- - Exchange
- - Deep
- - Thermos
- - Sold-out
- - Friday
- - Waiting
- - Gadgets
- - Televisions
- - Lines
- - Hunting
- - Maxed
- - Therapy
- - Huge
40 Clues: - Rush • - Deep • - Huge • - Gifts • - Steep • - Deals • - Lines • - Maxed • - Friday • - Returns • - Kitchen • - Opening • - Apparel • - Bedding • - Thermos • - Waiting • - Gadgets • - Hunting • - Special • - Therapy • - Rewards • - Grabbing • - Shopping • - Reserved • - Exchange • - Consoles • - Sold-out • - Children • - Crushing • - Computers • - Clearance • - Overnight • - Homegoods • - Guarantee • - Day-after • - Fragrances • - Televisions • ...
Monthly Information Security Crossword-3 2014-09-15
Across
- Data _______ defines the security requirements for data protection.
- Fulfilling contractual requirements for your client, including those for their information's security is also a ________ requirement.
- Weakest link in information security.
- Maintaining the documents related to your work logically and accurately constitutes ________ of records.
- A statement or a set of statements adopted by management and binding on all the employees to follow.
- Blocks unwanted network traffic to your computer.
- _____, Security, Risk and Complaince are the 4 key deliverables of any information Security program.
- _________ configures and manages a system as per the data owner’s requirements.
Down
- Personal computers requires ______ as much as office systems.
- Daily update for an antivirus which includes details of the latest viruses.
- Documented information security policy ensure ______ in its implementation.
- Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
- Digital _______ - Science of computer investigation.
13 Clues: Weakest link in information security. • Blocks unwanted network traffic to your computer. • Digital _______ - Science of computer investigation. • Personal computers requires ______ as much as office systems. • Data _______ defines the security requirements for data protection. • Daily update for an antivirus which includes details of the latest viruses. • ...
Impacts of Cyber Security Attacks 2022-01-17
Across
- Stolen personal data is used.
- When data is edited without permission and it normally takes a long time to find the source.
Down
- Data is stolen with the intent to compromise privacy or confidential information.
- Data is destroyed
- - An attack the prevents users from accessing resources.
- Personal data is stolen
- Data is edited without permission but the source is found quite quickly.
7 Clues: Data is destroyed • Personal data is stolen • Stolen personal data is used. • - An attack the prevents users from accessing resources. • Data is edited without permission but the source is found quite quickly. • Data is stolen with the intent to compromise privacy or confidential information. • ...
Cyber Security Trivia 2018-09-25
4 Clues: 2014 catastrophic bug in OpenSSL • Exploit that targeted MS-Windows via SMB • 2010 cyber weapon that broke a country's nuclear enrichment centrifuges • local privilege escalation bug that exploits a race condition in Linux Kernel
Cyber Monday 2014-12-01
Across
- past tense of "hear"
- large shopping center
- how the worldwide web connects with us
- forecast or tell the future
- there's no place like this
- day after Thursday
- opposite of bigger
Down
- alike, not different
- 30 days equal one of these
- November holiday
- one thing substituted with another
- day before Tuesday
- before second
- opinion samples
14 Clues: before second • opinion samples • November holiday • day before Tuesday • day after Thursday • opposite of bigger • alike, not different • past tense of "hear" • large shopping center • 30 days equal one of these • there's no place like this • forecast or tell the future • one thing substituted with another • how the worldwide web connects with us
Cyber Safety 2020-11-13
Across
- Use privacy & __ settings on game/app/soc.media.
- Personal info is like __; value & protect it.
- __ make you feel worried/anxious/sad/uncomfy.
- Ask __ before you tag/share photos of others.
- Never __ friend requests from strangers online.
- Which platform is used by the most teens?
Down
- How long can a post last?
- Never share your __ online (apps/socmedia/etc.)
- Turn off Wifi/Bluetooth to avoid being __.
- Which platform do teens use most OFTEN?
- Internet best friends
- What % of teens use social media platforms?
- __ links if it looks weird or source is unknown.
- Do not post if you'd feel ashamed for a _ to see.
14 Clues: Internet best friends • How long can a post last? • Which platform do teens use most OFTEN? • Which platform is used by the most teens? • Turn off Wifi/Bluetooth to avoid being __. • What % of teens use social media platforms? • Personal info is like __; value & protect it. • __ make you feel worried/anxious/sad/uncomfy. • Ask __ before you tag/share photos of others. • ...
Cyber Puzzle 2023-10-03
Across
- An exact replica of a hard drive
- A tweak to the OS code that will fix an issue in how it runs or compatibility with devices and applications.
- Fixes a vulnerability in the OS code to stop exploits
- A Fix for a bug that is affecting OS functionality
- A security flaw, glitch, or weakness found in software code that could be exploited by an attacker.
- A specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access.
- A backup that includes the operating system and configuration settings
Down
- To minimize the risk or lessen the force or intensity of something unpleasant.
- Physical objects that are embedded with sensors, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or networks.
- Third-party programs installed by users to provide additional functions.
- Is a structured process through which we identify potential security threats and vulnerabilities
- A Patch for a very specific issue ‐not released through automatic updates.
- A database of known vulnerabilities in all types of digital products.
- Having several copies
14 Clues: Having several copies • An exact replica of a hard drive • A Fix for a bug that is affecting OS functionality • Fixes a vulnerability in the OS code to stop exploits • A database of known vulnerabilities in all types of digital products. • A backup that includes the operating system and configuration settings • ...
Cyber Crossword 2024-10-24
Across
- - Updates that fix vulnerabilities in software (5 letters)
- - Deliberate spread of false information to mislead (14 letters)
- - User's personal access information (11 letters)
- - Software that secretly monitors user activity (7 letters)
- - Unauthorized access to confidential data (6 letters)
- - Free from danger or threat; safe (6 letters)
Down
- - Information that must be kept secret (12 letters)
- - A security system that monitors network traffic (7 letters)
- - Method of encoding data to prevent unauthorized access (11 letters)
- - A type of malicious program that disguises itself (6 letters)
- - Attempt to deceive users into giving personal information (9 letters)
- - Malicious software designed to harm or exploit (7 letters)
- - Permission to enter a system or data (6 letters)
- - Process of verifying identity before granting access (14 letters)
14 Clues: - Free from danger or threat; safe (6 letters) • - User's personal access information (11 letters) • - Permission to enter a system or data (6 letters) • - Information that must be kept secret (12 letters) • - Unauthorized access to confidential data (6 letters) • - Updates that fix vulnerabilities in software (5 letters) • ...
Cyber Test 2025-03-12
Across
- A Social Engineering technique that uses a fake promise to pique a victim's curiosity or greed.
- What is the name of the cybersecurity firm that has faulty software update on July 2024 and causes Global IT outage.
- Part of Social Engineering Life Cycle that identifies the victim & gathering their background information.
- It is the most targetted sector in the Philippines.
- A malicious software installed on a computing device without the end users knowledge.
- According to SimilarWeb Ranking, what is the top visited website as of February 2025.
Down
- A type of malware created to deny a user or organization access to files on their computer and will ask money for decryption.
- Occurs when a harmful code is injected into legitimate online advertising networks, and the code redirects users to malicious websites.
- Refers to a wide range of malicious activities carried out through human interactions.
- Refers to the unauthorized transfer or theft of sensitive, confidential, or private data from a computer system.
- Part of Social Engineering Life Cycle that occurs by forming a relationship and initiating communication to build trust.
- It is a type of malware that usually spreads in spam emails and malicious links.
- Is a type of malware designed to scare you into taking action.
- It is a advertisement-supported software helps generate revenue for its developers by automatically displaying adverts on your screen, typically within a web browser.
14 Clues: It is the most targetted sector in the Philippines. • Is a type of malware designed to scare you into taking action. • It is a type of malware that usually spreads in spam emails and malicious links. • A malicious software installed on a computing device without the end users knowledge. • ...
Cyber Ethics 2025-06-05
Across
- illegal intrusion into a computer system or network
- information about a person that exists on the internet
- criminal activities use of computer, network, internet
- unwanted bulk email that come from unknown source
- Communication Technology full form of ICT
- software copied and distributed illegally
- harming or harassing a person
Down
- meaning of malware
- use or imitating the language and thoughts of another person as one's original work
- fraud claiming to be an authorised financial institution
- theft stealing or misusing someone's personal information
- aware of the ethical practices, behaving responsible and appropriately
- misleading a person to believe that it come form a trusted person or organisation
- program or a set of program disrupts the normal functioning of a computer
14 Clues: meaning of malware • harming or harassing a person • software copied and distributed illegally • Communication Technology full form of ICT • unwanted bulk email that come from unknown source • illegal intrusion into a computer system or network • information about a person that exists on the internet • criminal activities use of computer, network, internet • ...
Crosswords & memes 2018-09-17
11 Clues: injure • common • problem • advisor • conclude • animal yelp • look at longingly (verbum) • person who checks thoroughly • to be bullying on the internet • immediate (that's an adjective) • someone or something sacrificed
Chapter 8: Cybersecurity Vocab Crossword 2025-04-08
Across
- Update: phishing attack where the hacker sends a message regarding the restart or deactivation of your membership.
- a type of malware that gains access to your operating system, then locks you out of your own system, holding your own computer ransom until you pay for its release.
- Activity: phishing attack where the hacker sends a message regarding your account being locked out or unusual sign ins.
- Money Phish: phishing track where the hacker sends a message regarding some unearned money being given to you.
- Phish: phishing attack where the hacker sends a message for you to log back into your account.
- SMS phishing text messages asking you to click here.
- Before You Click’: Money Vehicle’s 5 Cyber security questions to ask yourself as you receive messages today, no matter if it looks like a known source or not.
- a system designed to block unauthorized access while still allowing outward communication.
- Funny Mirror: the lens people see the world of social media through, never a clear picture but always warped into how the content creator wants you to see the
Down
- a secret phrase used to gain admission into something.
- voicemail messages demanding you to take action.
- software that is designed to disrupt, damage, or gain unauthorized access to a computer.
- creating a story based on bits of information that the attacker has gathered to earn trust and manipulate an individual to share personal information.
- The Hackers: Money Vehicle’s approach to defending yourself in the online cyber war.
- Drive: a data storage device that can be used even when the device is turned off.
- Cloud: a data storage device that is stored on the internet
- Software: a program designed to detect and remove viruses and other malware from your computer.
- every aspect of your defense to fight the hackers.
- Password: an unpredictable password made up of eight (8) or more characters and using a combination of uppercase letters, lowercase letters, symbols, and numbers
- Engineering: the use of deception to manipulate an individual into giving personal information away.
- Phish: phishing attack where the hacker sends a message regarding a package being delivered.
- sending fraudulent messages that imitate a real company in hope of being given personal information.
- Horse: Leaving a piece of infected hardware, like a USB drive, some place public and waiting for someone to pick it up and try to use it, providing access to your system.
23 Clues: voicemail messages demanding you to take action. • every aspect of your defense to fight the hackers. • SMS phishing text messages asking you to click here. • a secret phrase used to gain admission into something. • Cloud: a data storage device that is stored on the internet • Drive: a data storage device that can be used even when the device is turned off. • ...
QBE 2020-04-01
Across
- Annual Staff Survey
- Large broker for Minibus
- P&C Product
- Complaints are logged on
- Principle of Insurance
- QBE’s E-Trade Platform
- QBE CEO
- SME Team
- Partner Charity
- #together
- Data Protection
- Offshore Office
Down
- Large broker for Minibus
- Head of BA
- Minibus Product
- QBE Headquarters
- Diverse Hashtag
- E-Trade Platform
- Employee Assistance
- Fleet Product
- Newest SME Product
- Insured vehicles must be logged on
- QBE's platform to process payments
23 Clues: QBE CEO • SME Team • #together • Head of BA • P&C Product • Fleet Product • Minibus Product • Diverse Hashtag • Partner Charity • Data Protection • Offshore Office • QBE Headquarters • E-Trade Platform • Newest SME Product • Annual Staff Survey • Employee Assistance • Principle of Insurance • QBE’s E-Trade Platform • Large broker for Minibus • Large broker for Minibus • Complaints are logged on • ...
remake13 2024-06-13
Across
- Rebellious, edgy style.
- Ivy League inspired.
- Simple, clean lines.
- Bohemian, free-spirited style.
- Modern take on vintage.
- Everyday comfortable wear.
- Urban, casual fashion.
- Vintage inspired look.
Down
- Seattle music inspired look.
- Late 90s futuristic look.
- Urban music inspired fashion.
- Techinspired futuristic look.
- Boyish style for girls.
- Old-fashioned trends.
- Bright, eccentric outfits.
- Environmentally friendly clothing.
- Casual sportswear look.
- Business or dressy style.
- Dark, alternative style.
- Skateboard culture inspired.
20 Clues: Ivy League inspired. • Simple, clean lines. • Old-fashioned trends. • Urban, casual fashion. • Vintage inspired look. • Rebellious, edgy style. • Boyish style for girls. • Casual sportswear look. • Modern take on vintage. • Dark, alternative style. • Late 90s futuristic look. • Business or dressy style. • Bright, eccentric outfits. • Everyday comfortable wear. • ...
Ticket Terms A to Z 2024-10-16
Across
- a person who receives Social Security Disability Insurance (SSDI) and/or Supplemental Security Income (SSI) benefits based on disability.
- the management information system administered by the Social Security Administration to facilitate and record all business functions of the Ticket to Work Program.
- Social Security's online secure system allowing Employment Networks (ENs) and State Vocational Rehabilitation (VR) agencies serving beneficiaries under the Ticket to Work (TTW) Program to perform transactions in real-time.
- a person who is in current-pay status (receiving a benefit check) for Supplemental Security Income (SSI) with at least one month in a year in current-pay status for Social Security Disability Insurance (SSDI).
- a plan often used for individuals receiving intensive services through a State's Federally-funded workforce system.
- It is one month in which the beneficiary earned the designated amount, Trial Work Level (TWL) or Substantial Gainful Activity (SGA), to qualify for payment under the Ticket Program.
Down
- Published annually by the Social Security Administration, this general reference book provides a brief summary of all of the employment supports available to recipients of Social Security disability benefits.
- the term Social Security uses to describe a level of work activity and earnings.
- a written and signed agreement between the beneficiary (or, as appropriate, an authorized representative of the beneficiary) and the Employment Network (EN).
- is any information that can be used to distinguish or trace a person's identity.
- special Social Security rules that make it easier for persons receiving Social Security Disability Insurance (SSDI) and Supplemental Security Income (SSI) to work and still receive health care
- Social Security's general benefit increases are based on increases in the cost of living (COL) as measured by the Consumer Price Index.
- a Work Incentive available to persons receiving Social Security Disability Insurance (SSDI) and/or Supplemental Security Income (SSI) benefits.
13 Clues: the term Social Security uses to describe a level of work activity and earnings. • is any information that can be used to distinguish or trace a person's identity. • a plan often used for individuals receiving intensive services through a State's Federally-funded workforce system. • ...
Lesson 3 2021-09-17
10 Clues: far away • separate • keep safe • to acquire • in cyber space • very or intense • eager or excited • to get something • to enjoy thoroughly • cannot travel across
DELTARUNE CHARACTER TRACKS 2025-11-21
10 Clues: Susie • lancer • BIG SHOT • chaos king • rude buster • cyber battle • checker dance • the world revolving • its pronounced “rules” • attack of the killer queen
3.5-3.6 Ap Gov Review 2023-05-22
Across
- John Locke natural rights: ____, liberty, and property
- Which amendment is usually associated with gun control?
- Amendment that protects citizens from unreasonable search and seizure.
- New York Times Co v United States was a court case that balanced civil liberty and security when it comes to freedom of ____.
- Second amendment guarantees the right to ____ ______
- Wisconsin v Yoder chose citizen’s civil liberties over security to protect the parent’s
- Supreme Court has ruled that the death penalty is _______
- Civil liberties have to be balanced with _____ of the government
- _______ Act changed surveillance laws after 9/11 to make it easier for the government to monitor the average citizen’s phone and email communications
- What event caused attendees at the 1787 Philadelphia Convention to want Congress to maintain a military?
- _______ allows states to choose whether to have the death penalty or not
- ______ rights are rights that citizens are born with and cannot be taken away.
- Court case related to second amendment that determined if individual states could take away a citizen’s right to own a gun.
Down
- Test used by the government to decide if they can regulate a citizen’s freedom of speech, as a result of Schenck v US.
- 9/11 caused security to be a higher or lower priority to the United States?
- Personal freedoms protected by the government.
- In the court case of Schenck versus US, was liberty or security chosen?
- Eighth amendment protects citizens from unreasonable fines, bails, and ___________ punishments
- Which amendment is the death penalty associated with?
- _______ v US was a court case that balanced civil liberty and security when it comes to freedom of speech.
- Legal protections listed in the bill of right
- Who wrote the second treatise of government?
- Was security or liberty chosen in New York Time Co v United States?
- Individual freedoms have to be balanced with public _____
- Second amendment would be considered a ____ ______
25 Clues: Who wrote the second treatise of government? • Legal protections listed in the bill of right • Personal freedoms protected by the government. • Second amendment would be considered a ____ ______ • Second amendment guarantees the right to ____ ______ • Which amendment is the death penalty associated with? • John Locke natural rights: ____, liberty, and property • ...
GE Network/Sentrol 2019-02-15
Across
- A _____ button is used to trigger an alarm condition
- A _____ contact is a type of switch used to monitor windows and doors
- _____ detection is used to protect the outer limits of a building
- A device used in a security system to make or break the current path
- a complete uninterrupted cable
- An _____ code is a silent summons for help
- A circuit with an end - of - the line resistor
- A device used to operate a security system
- Resets an alarm system to a normal condition
Down
- A _____ smoke detector can be used to cover an area such as an atrium
- The part of the security system that transmits the signals to a central station
- The angle at which the detector is most likely to detect an intruder
- _____ devices are card readers, door contacts and glass break detectors
- Acronym for passive infrared
- Floor _____ mat is used to detect a person trading on it
- Arm _____ turns the security system on with the entry delay turned off
- _____ zone is set up to signal an alarm if a violation occurs
- Turn the security system off
18 Clues: Acronym for passive infrared • Turn the security system off • a complete uninterrupted cable • An _____ code is a silent summons for help • A device used to operate a security system • Resets an alarm system to a normal condition • A circuit with an end - of - the line resistor • A _____ button is used to trigger an alarm condition • ...
2024 Arizona NFB 2024-08-12
32 Clues: Value • Belong • Choice • Status • Balance • Respect • Support • Journey • Dignity • Arizona • Autonomy • Identity • Attitude • Freewill • Delegate • Equality • Momentum • Security • Ownership • Dignitary • Reinforce • Authentic • Innovation • Experience • Resilience • Collective • Barricades • Networking • Legislation • Porterfield • Partnership • Opportunity
Buffet de vocabulaire: Bon voyage 2025-10-22
20 Clues: gate • plane • to land • customs • to find • seatbelt • suitcase • a flight • to thank • to fasten • to declare • information • to take off • boarding pass • to leave on time • passport control • to leave/get off • counter/ticket counter • security/security control • something(as in to declare something)
e-safety 2013-06-04
Across
- A name for unwanted emails
- bully This is someone who uses the internet to intimidate others
- Actions undertaken to befriend and establish an emotional connection to a child
- This is when you share too much personal information with someone you do not know very well
- networking Facebook is an example of one of these
- The term used when someone deliberately winds someone up on line
- Email attachments are one of the main reasons for these spreading
- You must do this if you suspect that one of your friends is a victim of cyber bullying
Down
- Protection Act What does DPA stand for?
- A password which would be hard to crack or guess
- Gaining unauthorised access to computer systems
- information you should not give these details out to people that you don't know
- You can do this to people you do not wish to chat to online
- Strain Injury What does RSI stand for?
14 Clues: A name for unwanted emails • Strain Injury What does RSI stand for? • Protection Act What does DPA stand for? • Gaining unauthorised access to computer systems • A password which would be hard to crack or guess • networking Facebook is an example of one of these • You can do this to people you do not wish to chat to online • ...
PRIVATE SECURITY INDUSTRY 2022-06-25
Across
- Ford __ pioneered the use of private security to guard his factories
- short form for standard operating procedure
- PMSCs are different from ___
- mogadishu syndrome is the ___ by governments to intervene with direct military intervention for humanitarian purposes
- ___ and road initiative
- something that replaces intensive patrolling
- new security career path in sg
- Japanese warriors
- Short form of China’s military
- The rise of PMSCs is caused by the end of which war (combined the word and war)
Down
- China’s capital
- China ___ Economic Corridor
- PMSCs are considered ___ under humanitarian law
- Employee theft costs businesses ___ billion a year
- short form of city bombed in 9/11
- DeWe’s profile rose dramatically last summer when Chinese Poly-GCL Petroleum Group Holdings hired it to manage security at a $4bn LNG project in ___
- short form for security agency grading assessment
- process of improving one’s skills
- PMSCs are driven by ___ (money)
19 Clues: China’s capital • Japanese warriors • ___ and road initiative • China ___ Economic Corridor • PMSCs are different from ___ • new security career path in sg • Short form of China’s military • PMSCs are driven by ___ (money) • short form of city bombed in 9/11 • process of improving one’s skills • short form for standard operating procedure • ...
WF 2021-08-08
6 Clues: where we located • when should i apply • safest cyber company • who we are looking for • skill we mandatory ask for • the most interesting filed of work
Wallets and Security 2023-06-12
Across
- Malicious software
- Online wallet connected to the internet
- Additional security phrase
- Backup recovery words
- Printed wallet with key information
- Shared cryptographic code
- Copy of wallet data
- Additional security layer
- Offline wallet storage
Down
- Physical device for wallet security
- Multiple signature requirement
- Secret cryptographic code
- Data protection method
- Fingerprint or facial recognition
- Personal identification number
15 Clues: Malicious software • Copy of wallet data • Backup recovery words • Data protection method • Offline wallet storage • Secret cryptographic code • Shared cryptographic code • Additional security layer • Additional security phrase • Multiple signature requirement • Personal identification number • Fingerprint or facial recognition • Physical device for wallet security • ...
GSO Puzzle 2025-06-21
Across
- The integration of security practices into the software development lifecycle, aiming for 'security by design'.
- The process of verifying the identity of a user, system, or application.
- A network security system that filters incoming and outgoing network traffic.
- The phase of incident response focused on analysis of the event and lessons learned for future improvement.
- Unsolicited commercial email, a common nuisance and potential vector for attacks.
- Adherence to established laws, regulations, and industry standards.
- A type of malware that encrypts data and demands payment for its release.
- The process of scrambling data to prevent unauthorized access.
- A weakness or flaw in a system that can be exploited by an attacker.
Down
- A type of malware that self-replicates and spreads to other computers by attaching to legitimate programs.
- Software Development Life Cycle, where security should be integrated at every stage.
- A security architecture where no user, device, or application is trusted by default.
- A simulated cyberattack against a computer system to identify vulnerabilities.
- The process of applying updates to software to fix bugs or security vulnerabilities.
- Malicious software designed to disrupt or damage computer systems.
- A type of social engineering attack often via email, aiming to trick users.
- Requiring more than one method of verification for user access.
- A sophisticated, prolonged cyberattack campaign often sponsored by nation-states.
- A type of malware that provides hidden access and privileges on a system, often at the kernel level.
19 Clues: The process of scrambling data to prevent unauthorized access. • Requiring more than one method of verification for user access. • Malicious software designed to disrupt or damage computer systems. • Adherence to established laws, regulations, and industry standards. • A weakness or flaw in a system that can be exploited by an attacker. • ...
us military 2024-02-29
Across
- Aerial warfare branch
- Communication specialists
- Elite military units
- Foot soldiers
- Construction and demolition specialists
- Special operations force
- Maritime force
- Long-range weapons force
- Healthcare professionals in the military
- Maritime law enforcement)
- Unit specializing in cyber warfare
Down
- Amphibious assault force
- Mounted troops
- Naval construction force
- Part-time military personnel
- Supply chain management
- Information gathering and analysis
- State-level military reserve
- Newest branch established in 2019
- Land-based force
20 Clues: Foot soldiers • Mounted troops • Maritime force • Land-based force • Elite military units • Aerial warfare branch • Supply chain management • Amphibious assault force • Naval construction force • Special operations force • Long-range weapons force • Communication specialists • Maritime law enforcement) • Part-time military personnel • State-level military reserve • ...
Cyber-Mobbing 2024-05-08
Across
- Ombudsmann Wer entfernt peinliche und unerwünschte Fotos von dir aus dem Internet?
- Was ist Mobbing auf keinen Fall nur?
- Was soll man machen, wenn man mitkriegt, dass jemand gemobbt wird?
- Welche Nummer rufst du an, wenn du Hilfe brauchst?
Down
- Ein anderer Begriff für Cyber-Mobbing?
- Welche Strafe droht Mobbern?
- Wohin kannst du gehen, wenn du in der Schule gemobbt wirst?
- Hauptdefinition von Mobbing?
8 Clues: Welche Strafe droht Mobbern? • Hauptdefinition von Mobbing? • Was ist Mobbing auf keinen Fall nur? • Ein anderer Begriff für Cyber-Mobbing? • Welche Nummer rufst du an, wenn du Hilfe brauchst? • Wohin kannst du gehen, wenn du in der Schule gemobbt wirst? • Was soll man machen, wenn man mitkriegt, dass jemand gemobbt wird? • ...
Cyber Law 2021-09-05
Across
- Belief that cyber-interests should be guided by state
- Process of registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- Group of computer systems linked together
- First type of media to be digitized
Down
- Conversion of analogue data into digital form
- The IT act is the regulatory body of ____ in India
- Author of ‘Code and Other Laws of CyberSpace’
- The convention of cyber crime was held in
- _____ runs specialized software and stores information
9 Clues: First type of media to be digitized • The convention of cyber crime was held in • Group of computer systems linked together • Conversion of analogue data into digital form • Author of ‘Code and Other Laws of CyberSpace’ • The IT act is the regulatory body of ____ in India • Belief that cyber-interests should be guided by state • ...
Cyber Law 2021-09-05
Across
- Belief that cyber-interests should be guided by state
- Process of registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- _____ runs specialized software and stores information
- The convention of cyber crime was held in
Down
- Conversion of analogue data into digital form
- Author of ‘Code and Other Laws of CyberSpace’
- The IT act is the regulatory body of ____ in India
- Group of computer systems linked together
- First type of media to be digitized
9 Clues: First type of media to be digitized • Group of computer systems linked together • The convention of cyber crime was held in • Conversion of analogue data into digital form • Author of ‘Code and Other Laws of CyberSpace’ • The IT act is the regulatory body of ____ in India • Belief that cyber-interests should be guided by state • ...
Cyber Bullying Crossword 2013-06-06
Across
- We should not ___ or reply to online strangers.
- ____ the incident to your parents or teachers.
- ______ can cause others to get angry and their computers will lag.
- Be ___for your words and actions online as it may hurt others.
- We should not be ___to gaming because it will cause us to be time stolen.
Down
- Bullying This means being bullied online.
- This means good online manners.
- Do not use _____ letters as people may think that you are shouting.
- Cyber ___ means using the computer or phone to say hurtful remarks to someone.
- Use ______ to show your feelings
10 Clues: This means good online manners. • Use ______ to show your feelings • Bullying This means being bullied online. • ____ the incident to your parents or teachers. • We should not ___ or reply to online strangers. • Be ___for your words and actions online as it may hurt others. • ______ can cause others to get angry and their computers will lag. • ...
Bullying 2021-08-26
Across
- Social media platform
- Exclusion
- Telling untrue stories about someone
- Type of psychological bullying
- Something you can do to stop cyberbullying
- Following someone
- Deliberate
- Occurs more than once
Down
- Not involving someone
- Intimidation
- Hitting, poking and pushing
- Social media
- Name calling
- Someone you can report bullying to
- Physical harm
- Someone you could report bullying to
16 Clues: Exclusion • Deliberate • Intimidation • Social media • Name calling • Physical harm • Following someone • Social media platform • Not involving someone • Occurs more than once • Hitting, poking and pushing • Type of psychological bullying • Someone you can report bullying to • Telling untrue stories about someone • Someone you could report bullying to • ...
cyber security puzzle 2025-02-27
Across
- A scam where attackers create fake profiles on social media to trick people into believing they are real users.
- A program designed to simulate human conversation, often used in customer service or scams. (Chatbot) A scam where fake tech support calls are made, often impersonating well-known companies to steal money or access to computers. (Techsupport)
Down
- A deceptive attempt to get personal information or money by pretending to be a trusted entity. (Phishing)
- The practice of creating misleading digital content through the manipulation of photos, videos, or documents. (Forgery)
4 Clues: A deceptive attempt to get personal information or money by pretending to be a trusted entity. (Phishing) • A scam where attackers create fake profiles on social media to trick people into believing they are real users. • The practice of creating misleading digital content through the manipulation of photos, videos, or documents. (Forgery) • ...
National Cyber Security Awareness Month 2023 2023-08-25
Across
- Bad guys will send these types of emails to try to get something out of your, or get you to do something
- (This is an abbreviation) A form of authenticating yourself in addition to your username and password. Examples of this include checking an authenticator app for a pin to enter in the resource you are logging into or tapping a banner notification.
- An attack involving bad guys texting you over the phone
- Software that(may or may not) lock down a computer system from use and demand payment to *fix* it
- Software bad guys will try to install to steal your information or do something nefarious (i.e., wire money from bank accounts you own)
- An attack involving bad guys calling you over the phone
- What you should do when you see a malicious or suspicious email
Down
- (Three words in total, no spaces) An excellent resource for resetting your own password or unlocking your account without having to make a phone call.
- A dishonest scheme with the intent of stealing something
9 Clues: An attack involving bad guys texting you over the phone • An attack involving bad guys calling you over the phone • A dishonest scheme with the intent of stealing something • What you should do when you see a malicious or suspicious email • Software that(may or may not) lock down a computer system from use and demand payment to *fix* it • ...
Newsletter 2023Q4 Crossword Puzzle 2023-11-06
Across
- Concerning ransomware, a user or organization's critical data is made inaccessible
- Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
- Month of CAM
- Compromised digital devices, such as computers, smartphones, tablets, and even entire networks
- Process to restore data that has been lost, accidentally deleted, corrupted or made inaccessible.
- Any staff member who maintains security controls on behalf of an Owner
- Pertaining to a strong password, used to reduce vulnerability in the event of a hack
- TEAMS channel for up to date security notices
- Any person using Catalyst computing resource who are responsible for familiarizing themselves with and complying with Catalyst security policies and procedures
- Lead agency of IC3
- Number of years Catalyst has been a CAM Champ
Down
- One of two useful Security Awareness TEAMS channels
- Any staff member who oversees data recovery
- Leader of a business unit with responsibility for implementing department level operating procedures
- Person(s) responsible for ensuring that security policies are in place and for delegating security related responsibilities to ensure compliance
- Member of management or delegate who has primary responsibility for the business function supported by a system, application
- Minimizing the harm of a particular risk
- A kind of software used to prevent, scan, detect and delete viruses from a computer
- A malicious practice that aims to deceive and defraud people through texts
19 Clues: Month of CAM • Lead agency of IC3 • Minimizing the harm of a particular risk • Any staff member who oversees data recovery • TEAMS channel for up to date security notices • Number of years Catalyst has been a CAM Champ • One of two useful Security Awareness TEAMS channels • Any staff member who maintains security controls on behalf of an Owner • ...
Chapter 6 2019-09-27
Across
- there is no single ________ accepted definition of national security
- this cannot prevent typhoon
- from Latin word diploma meaning an official document
- view of diplomacy and war, being the instruments of furthering national cause
- promoting the _____ of love for peace, as well as sentimental desire
- national security is an appropriate and ________ blend of political resilience and maturity
- it was Thomas Hobbes work in 1651
- a ________ to make school a place of peace is one of ultimate challenges in education.
- a state without war
Down
- complete the essay’s title of Immanuel kant “ perpetual peace: a _______ sketch
- nationality of Immanuel Kant
- the great effort of ______ to overcome various external and internal threats
- teaching how to develop a ______ that encourage harmony in the way people talk, listen, and interact with each other, and discourages action of hurt, harm, or destroy each other.
- the distinctive meaning of national security means freedom from _____ dictation
- teaching about ____ , about violence in all forms, about survival and our future
- surname of the U.S. secretary of defense from 1977 to 1981 in the carter administration
- meaning of “I” in CIA
- national ______ is the requirement to maintain the survival of the state
- an _______ symbol means different things to different people.
- surname of a history professor in Harvard who defines national security in 1990
20 Clues: a state without war • meaning of “I” in CIA • this cannot prevent typhoon • nationality of Immanuel Kant • it was Thomas Hobbes work in 1651 • from Latin word diploma meaning an official document • an _______ symbol means different things to different people. • there is no single ________ accepted definition of national security • ...
Finance Crossword 2021-02-19
Across
- Performance benchmark such as Nifty, S&P 500
- A contract whose value is based on the underlying asset
- A growing list of records or ‘blocks’ linked using cryptography
- Process of discovering patterns in large data and is used to ‘unearth’ cryptocurrencies
- A simulation of human intelligence in machines
- A privately held start-up company valued at over $1 billion
- Using APIs to enable regulated third party to access transactional data
Down
- Reduction in the value of a tangible asset due wear and tear
- A cryptocurrency featuring the face of the Shiba Inu dog from a popular meme
- A measure of systematic risk of a security or portfolio
- AI driven investment advisors that provide guidance based on algorithms
- A product that pays out fixed payments at regular intervals
- The price at which a potential buyer is willing to buy a security
- Transforming illiquid assets or debts into a security
- An increase in the prices of goods and services
- Profits earned from the simultaneous purchase and sale of a security to take advantage of the difference in prices
- Distribution of profits to the shareholders
- Asset that a lender accepts as security for a loan
- Indian consumer credit score
- Financing projects by raising money from a large number of people, example, Kickstarter
20 Clues: Indian consumer credit score • Distribution of profits to the shareholders • Performance benchmark such as Nifty, S&P 500 • A simulation of human intelligence in machines • An increase in the prices of goods and services • Asset that a lender accepts as security for a loan • Transforming illiquid assets or debts into a security • ...
CTF-CW-1S 2025-11-17
Across
- Dealing with crises as they happen
- Replacing sensitive data with non-sensitive equivalents
- Software designed to harm or exploit systems
- Computer Emergency Response Team acronym
- Applying updates to fix bugs or vulnerabilities
- Confidence in a system’s reliability and integrity
- Reading the fine print with a magnifying glass
- Monitoring and analytics solution adopted by Tekion SOC
- Identity and access management platform for login security at Tekion.
- How far the flashlight shines on your work
Down
- The fusion of security and IT operations for strong defense
- Encoding data so only authorized can read
- Verifying the claimed identity of a user, system, or device.
- Entity determining purposes and means of personal data processing
- California's comprehensive state law granting consumers rights over their personal information.
- Document explaining how organization collects and uses personal data
- Cloud-native tool at Tekion that safeguards running apps from attacks.
- Because numbers never fudge the truth
- The hole in your security bucket
- A security team's overall defensive stance
20 Clues: The hole in your security bucket • Dealing with crises as they happen • Because numbers never fudge the truth • Computer Emergency Response Team acronym • Encoding data so only authorized can read • A security team's overall defensive stance • How far the flashlight shines on your work • Software designed to harm or exploit systems • ...
IR Terms 2024-03-16
Across
- Where states pursue foreign policy objectives via a constructive engagement with other actors.
- The process of decision-making at the global level aimed at solving problems that affect more than one state (or region).
- Those states recognised as rising powers on the world stage (such as the BRICS).
- The ideological division within Europe between the American and Soviet spheres of influence. The term was used during the Cold War and coined by Winston Churchill.
Down
- An ideological doctrine which demands total obedience from its members.
- An environmental agreement adopted in 1997 that committed transitional economies to limit and reduce greenhouse gas emissions.
- The use (or threat) of cyber weapons against another with the intention of causing digital harm.
- Where a single state exercises structural dominance over the rules, norms, conventions and behaviour of a regional or international system.
- The strand of realist thought which claims the anarchic structure of global politics encourages states to prioritise their own national security.
- The right and acceptance of proper authority to rule.
10 Clues: The right and acceptance of proper authority to rule. • An ideological doctrine which demands total obedience from its members. • Those states recognised as rising powers on the world stage (such as the BRICS). • Where states pursue foreign policy objectives via a constructive engagement with other actors. • ...
CpE as a Discipline 2024-12-09
Across
- Computer engineering professionals should take responsibility for any errors or mistakes and work to rectify them.
- Computer engineering professionals should respect and not use or distribute proprietary information without proper authorization. Use its acronym.
- It is the use of a computer as an instrument to commit illegal acts, such as fraud, stealing identities, or violating privacy.
- Computer engineering professionals should disclose any potential conflicts of interest or biases that may influence their work.
Down
- A set of values, behaviors, and wider responsibilities in how you apply your specialist knowledge and skills.
- Computer engineering professionals should be aware of the impact of their work on society and the environment.
- It is what keeps professional people true to their word.
- The abilities match the requirements of the role and often produce results that exceed expectations.
- The set of commonly agreed principles that govern the use of computers.
- Computer engineering professionals must ensure that the systems they design and implement protect the people from threats such as secretly tracking and selling online activity and cyber bullying.
10 Clues: It is what keeps professional people true to their word. • The set of commonly agreed principles that govern the use of computers. • The abilities match the requirements of the role and often produce results that exceed expectations. • A set of values, behaviors, and wider responsibilities in how you apply your specialist knowledge and skills. • ...
Crossword Puzzle - All about Security ONE 2020-10-08
Across
- The dept that never sleeps
- Number of years have we been in this building
- Person with the most dogs
- Someone who has 3 boys
- Type of car Tyler drives
- the one who fixes everything
- The DJ
- Our first “technology”
- When Security One bought Alliance – what street was it on?
- Someone who has two girls
- The Nova Scotia retiree
- person who likes the “oldies”
- A former Marine
Down
- Latest in technology
- One of most common names at Security One
- The one that got away
- The Axe Man
- One of the ones who started it all
- The only girl in London
- Someone who loves boating
- Who has the most children?
- Our original street name
- Who has a hyphenated name?
- The crochet queen
- The newlywed
- Our building was formerly a part of ____
- Our team colors
- Street Dave lives on
- The best thing about Security ONE?
- Where is Security ONE located?
- Whose kids live the furthest away?
31 Clues: The DJ • The Axe Man • The newlywed • Our team colors • A former Marine • The crochet queen • Latest in technology • Street Dave lives on • The one that got away • Someone who has 3 boys • Our first “technology” • The only girl in London • The Nova Scotia retiree • Type of car Tyler drives • Our original street name • Someone who loves boating • Person with the most dogs • Someone who has two girls • ...
Epic Crossword 2015-02-18
Security 2022-04-03
Across
- targeting high profile individuals using social engineering techniques
- a form of malware that demands money from the user in return for something
- a well-known group of red hat hackers
- the first D in DDoS
- following other people into secure areas
- a form of malware that is able to spread with no reliance on host files or human interaction
Down
- the process of converting plaintext to ciphertext so that it cannot be understood
- a social engineering technique that directs website's traffic elsewhere
- a piece of software that detects, prevents and removes malware from a system
9 Clues: the first D in DDoS • a well-known group of red hat hackers • following other people into secure areas • targeting high profile individuals using social engineering techniques • a social engineering technique that directs website's traffic elsewhere • a form of malware that demands money from the user in return for something • ...
Security 2022-07-27
Across
- Alt+Shift+I keys
- this formal segregation of duties, teams of at least two employees will exercise under the following circumstances
- you find the Robbery Checklist, Robbery Response, and Roberry witness documents in here.
- while opening branch you carry this through the branch while doing the walkthrough
- When transaction(s) is done within the same day over 10k
Down
- These reports are filed in accordance with the NCUA regulation governing such reports
- should inspected the branch exterior for signs of forced entry, suspicious vehicles or persons.
- lock the branch entry/exit doors, relocking after each member leaves. Do not admit anyone into the branch after close
- you find the Bomb Threat Checklist, and Extortion Checklist documents in here
9 Clues: Alt+Shift+I keys • When transaction(s) is done within the same day over 10k • you find the Bomb Threat Checklist, and Extortion Checklist documents in here • while opening branch you carry this through the branch while doing the walkthrough • These reports are filed in accordance with the NCUA regulation governing such reports • ...
Cyber Security - Safety on the Road. 2023-08-28
Across
- Another word for concealed.
- Use this drive for department files.
- Block unauthorized access while permitting outward communication.
- Before you leave, _____ your data.
- Use " " to access the Boise Cascade network.
Down
- Many phones can be turned into a ___________.
- Use this drive for business or project files.
- Term for when hackers can load malware onto public usb charging stations.
- Avoid public ______.
9 Clues: Avoid public ______. • Another word for concealed. • Before you leave, _____ your data. • Use this drive for department files. • Use " " to access the Boise Cascade network. • Many phones can be turned into a ___________. • Use this drive for business or project files. • Block unauthorized access while permitting outward communication. • ...
social networking 2013-03-06
Across
- that can be seen
- a blogging site
- sharing your oppinion
- sharing with people on the internet
- social networking site
- spreading computers
- a shortened form of word
- publish a messeging online
- photo blog
Down
- to regard with displeasure
- you can do this to someone you dont like
- agreeing with someone
- a dangerous person
- where people can share things to you
- keywords
- online harrassment
- attached by feelings
- private stored messeges
- social network rapid chatter
- instant messeging service
20 Clues: keywords • photo blog • a blogging site • that can be seen • a dangerous person • online harrassment • spreading computers • attached by feelings • agreeing with someone • sharing your oppinion • social networking site • private stored messeges • a shortened form of word • instant messeging service • to regard with displeasure • publish a messeging online • social network rapid chatter • ...
Powerpuff Thief Puzzle (Slowpoke Squad has new recruits!) 2023-09-15
Across
- shifty drug
- clutch aid
- tach o mint
- rev n go
- easy idle
- n2o cola
- gask its
- faux wheel drive
- revolting
- synerg
- fiber fuel
- carbon cyber
- tank coat
- no stall
- lil torquey pistons
- vinyl toupee
Down
- sidewall shine
- combustr
- viewzeen
- mood springs
- tow cap
- rpm
- bumper save
- trunk fresh
- triple dent
- retread
- shiny wax
- intersection
- spare mint
- leak less
- nitroade
- gasprin
- sputter stop
33 Clues: rpm • synerg • tow cap • retread • gasprin • combustr • viewzeen • rev n go • n2o cola • gask its • nitroade • no stall • easy idle • shiny wax • revolting • leak less • tank coat • clutch aid • spare mint • fiber fuel • shifty drug • tach o mint • bumper save • trunk fresh • triple dent • mood springs • intersection • carbon cyber • sputter stop • vinyl toupee • sidewall shine • faux wheel drive • lil torquey pistons
Technologie 2023-03-21
Across
- Profile
- Filter
- Account
- To Search
- Computer
- Social Media
- File
- Website
- Application
- To Post
- To Share
- To Stream
- To Save
- Online
- Text Message
- Keyboard
- To Download
- To Take A Photo
Down
- Public
- Password
- To Click
- Technology
- Mouse
- Laptop
- Username
- To Upload
- Cell Phone
- Follower
- Cyber Bullying
- Screen
- To Record
- To Text
- Flash Drive
- Tablet
- Comment
- Private
37 Clues: File • Mouse • Email • Public • Filter • Laptop • Screen • Tablet • Online • Profile • Account • Website • To Post • To Text • To Save • Comment • Private • Password • To Click • Computer • Username • Follower • To Share • Keyboard • To Search • To Upload • To Record • To Stream • Technology • Cell Phone • Application • Flash Drive • To Download • Social Media • Text Message • Cyber Bullying • To Take A Photo
Cyberland Magazine 2021-03-29
Across
- being literate in virtual world
- virtual
- virtual culture
- acts of virtual world
- virtual assault
- science fiction stories in virtual world
- virtual offense
Down
- misguide in virtual world
- virtual vacancy
- pirate of virtual world
- voyager in virtual world
- virtual tyranny
- science of virtual fields
- half human half robot
- safeness of virtual world
15 Clues: virtual • virtual vacancy • virtual tyranny • virtual culture • virtual assault • virtual offense • acts of virtual world • half human half robot • pirate of virtual world • voyager in virtual world • misguide in virtual world • science of virtual fields • safeness of virtual world • being literate in virtual world • science fiction stories in virtual world
IMR533-Chapter 5.1-Computer Crimes 2025-05-28
Across
- The spread of _____can interfere with computers and change or erase data, which affects how data is stored.
- Many parties, including authorities, make significant investments, such as sophisticated threat detection systems, encryption tools, and staff training in order to improve it.
- Viruses, worms, ransomware, trojans and spyware are the examples.
- Typically intended to advertise goods and services, but it can also be used to spread malware or launch phishing scams.
- Any criminal activity that involves a computer or network as the primary tool or target of the offense.
- An assault on a networking system that stops a server from servicing customers.
- Cyber _____ occurs when someone creates or joins online groups or communities that harass, mock, or bully their target.
- _____theft occurs when an attacker deceives a victim into giving up personal information and then utilises it to commit a crime.
- Cyber _____is defined as the use of the internet to create, display, import, distribute, or publish pornographic or obscene content.
Down
- Finding and taking advantage of flaws in computer networks or systems in order to obtain data without authorisation, or accomplish other nefarious goals.
- Cyberbullying can cause self-doubt and _____ thoughts.
- Computer _____ is a subset of computer crime.
- Extreme types of pornography, violent movies, graphic novels, and other media that show violent or sexual behaviours in a way that is meant to shock or arouse are examples of _____ publications.
- Hacking, malware distribution, denial-of-service attacks, and cyber _____ are examples of illegal activities on the Net.
- Deception using emails, messages, or websites to collect personal data for malevolent reasons.
- _____ is morally acceptable when it is done to strengthen security, find security flaws, and address them.
16 Clues: Computer _____ is a subset of computer crime. • Cyberbullying can cause self-doubt and _____ thoughts. • Viruses, worms, ransomware, trojans and spyware are the examples. • An assault on a networking system that stops a server from servicing customers. • Deception using emails, messages, or websites to collect personal data for malevolent reasons. • ...
NERD Packet Puzzler! 2023-06-01
Across
- The latest version of the internet protocol that provides a larger address space and improved security compared to its predecessor.
- A security protocol that provides data confidentiality and integrity for wired and wireless networks.
- The process of establishing and maintaining the security parameters necessary for MACsec communication
- A distributed database that maps domain names to their respective IP addresses
- A protocol used for remote authentication and authorization of network access.
- A technology that enables the creation of virtual local area networks for improved network management and security.
- A set of techniques used to manage network traffic and prioritize certain types of traffic over others.
- Network configuration that allows multiple servers to share the load for a single application or service
Down
- A technology used to provide redundancy in network connections, which combines multiple physical links into a single logical one
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security policies.
- A unit of data transmitted over a network.
- A networking equipment manufacturer that provides high-performance routing and switching solutions.
- Creating an outbound and inbound channel, this fundamental component of MACsec enables secure communication between two devices.
- A portion of a network that is segregated based on a common IP address prefix, improving security and network management.
- A technique that enables multiple hosts to share the same IP address, improving availability and fault tolerance.
- The process of directing network traffic from one device to another device.
- A routing protocol used to exchange routing information between different autonomous systems on the internet.
17 Clues: A unit of data transmitted over a network. • The process of directing network traffic from one device to another device. • A distributed database that maps domain names to their respective IP addresses • A protocol used for remote authentication and authorization of network access. • ...
Elastic Security #1 2023-04-24
Across
- Process of continuously checking for threats
- Exploring data at a more granular level
- Measure of potential impact of a threat
- Observable behavior in data
- Visual representation of events over time
- Prioritizing incidents based on severity
- Security event that may have negative consequences
- Actions taken to mitigate a security incident
- List of trusted entities
- Label assigned to data for easier organization
- Notification of a potential security threat
- Finding relationships between events
- Identifiable characteristic of a threat
- List of untrusted entities
Down
- Observable related to malicious activity
- Act of searching for threats
- Changing focus in data analysis
- Criteria used to detect suspicious activity
- Additional information about an event
- Identifying malicious or suspicious activity
- Adversary behaviors in the MITRE ATT&CK framework
- Grouping and summarizing data
- Framework for categorizing attack techniques
- Likelihood and impact of a security event
- Elasticsearch feature for alerting and monitoring
- Deviation from normal behavior
- Visual interface for data analysis
27 Clues: List of trusted entities • List of untrusted entities • Observable behavior in data • Act of searching for threats • Grouping and summarizing data • Deviation from normal behavior • Changing focus in data analysis • Visual interface for data analysis • Finding relationships between events • Additional information about an event • Exploring data at a more granular level • ...
Crossword 3 2024-07-25
Across
- A type of cybersecurity analysis that focuses on the likelihood and potential impact of risks.
- A type of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
- A security concept that ensures that data is only accessible to those with authorized access.
- A type of software that is specifically designed to detect, stop, and remove viruses and other kinds of malicious software.
- A security protocol that ensures privacy between communicating applications and their users on the internet.
- A type of firewall that filters traffic between a trusted and an untrusted network.
- A type of security audit that evaluates the security of a system or network by simulating an attack from a malicious source.
Down
- A security measure that involves hiding internal IP addresses.
- A method used to verify the integrity and authenticity of a message, software, or digital document.
- A security model that enforces strict access controls and compartmentalization.
- A set of rules that govern the actions computers take to secure data and is often used in conjunction with firewalls.
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- A type of security threat that is disguised as legitimate software.
13 Clues: A security measure that involves hiding internal IP addresses. • A type of security threat that is disguised as legitimate software. • A security model that enforces strict access controls and compartmentalization. • A type of firewall that filters traffic between a trusted and an untrusted network. • ...
2ND QTR NEWSLETTER 2022-05-16
Across
- Who is the security representative for the 450 IS?
- Convicted spy Klaus Fuchs was charged with stealing what research secrets?
- Taha Thompson spied for who?
- The Israeli Defense Minister had a spy posing as this?
- U.S. has won the extradition lawsuit of Julia Assange who is a citizen of what country?
- An Inquiry Official receives an appointment letter signed by the Group _______
- On systems below JWICS what is required on any headset with a microphone?
- Who was the guard that compromised 20 MI6 operatives?
- A man from Chicago that aided Iran and plead guilty to spying faces how many years in jail?
- Air Force update their PED policy to ban all __________ devises in secure areas.
- Because of the actions of David Smith, only _________ guards will be used on British embassies.
- Where was the malware called “HermeticWipe” discovered?
- During the opening process of a facility how many forms are you to complete?
- The convicted spy Haitao Xiang lived in the town.
- When scientists commit espionage, one expert believes they do it because they believe ________ should benefit from the research.
Down
- Photographs taken within a facility will not contain any ______ material.
- Who was the former linguist turned spy for the Lebanese?
- Who is the security representative for the 402 IS?
- The Chinese company that makes cell phones and has been linked to secretly recording phone conversations is?
- Where do spy’s often meet and use as cover for exchanging information?
- How many forms are completed while going through the close procedure of a facility?
- What organization tricked some scientists to destroy the power supply to the centrifuge they worked on in Iran?
- What is the name of the Chinese agency that claims to promote China’s language and culture to American students?
- The most common security violation in the 693 ISRG is ________ disclosure over IT.
- Who is the security representative for the 485 IS?
- Who is the security representative for the 24 IS?
- Who is the security representative for the 693 ISS?
- A robust Security, Education, Training, and Awareness (SETA) is built on the foundation of the _______ orientation.
- How many years was Klaus Fuchs sentence to in prison?
29 Clues: Taha Thompson spied for who? • Who is the security representative for the 24 IS? • The convicted spy Haitao Xiang lived in the town. • Who is the security representative for the 450 IS? • Who is the security representative for the 402 IS? • Who is the security representative for the 485 IS? • Who is the security representative for the 693 ISS? • ...
Cybersecurity Awareness month at Kent! 2024-10-14
Across
- Sense created by the attacker to make you react quickly without thinking.
- When a person slips in the door behind you without your knowledge or consent and without using the proper access cards.
- Software attack method to harm or exploit a device or network.
- Additional layer of security that verifies a user's access to an account more than once. (Acronym)
Down
- Impersonate certain people or job roles like Tech Support or Human Resources to persuade you to release information or perform a dangerous action.
- An individual who represents the last line of defense in a world where the threat landscape is constantly changing.
- Online platforms that cyber criminals can use to gather information to better target you or your organisation. (Two words)
- The address of a webpage which you check the validity of before clicking it. (Acronym)
8 Clues: Software attack method to harm or exploit a device or network. • Sense created by the attacker to make you react quickly without thinking. • The address of a webpage which you check the validity of before clicking it. (Acronym) • Additional layer of security that verifies a user's access to an account more than once. (Acronym) • ...
Aviation/Landside & Airside terms crossword 2025-07-12
Across
- Area where passengers board the aircraft
- Area where aircraft are parked, loaded or refueled
- Area where passengers drop bags and get boarding passes
- Secure part of airport – past security checks
- Where international passengers get passports checked
- A place where aircraft take off, land, and passengers travel
- Tax-free shopping in international terminals
- Screening area to check passengers and baggage
- NZ aviation security service checking passengers and bags
Down
- Suitcases or personal items travellers take with them
- Checks passengers for restricted goods at international airports
- Bridge connecting terminal gate to aircraft door
- A large building for storing and maintaining aircraft
- Where aircraft take off and land
- Special waiting area for eligible passengers
- Path aircraft use to move between runway and terminal
- Air traffic __________ guides aircraft in the air
- When a passenger stops at an airport but doesn’t enter the country
- Public part of airport – before security
- Controls aircraft movements from the ground and air
20 Clues: Where aircraft take off and land • Area where passengers board the aircraft • Public part of airport – before security • Special waiting area for eligible passengers • Tax-free shopping in international terminals • Secure part of airport – past security checks • Screening area to check passengers and baggage • Bridge connecting terminal gate to aircraft door • ...
Industrial Security Concepts Crossword Puzzle. 2025-10-28
Across
- – Warning device that signals intrusion or danger.
- – Careful checking to ensure compliance with standards.
- – Regular inspection done by guards to ensure safety.
- – Mechanical or electronic device used to secure entry points.
- – Weakness that can be exploited by threats.
- – Event causing severe disruption and damage.
- – Any potential cause of harm to people or property.
- – Process of gathering facts after a security incident.
- – Electronic system used for video monitoring in secured areas.
- – Intentional destruction or disruption of operations.
- – The right or ability to enter a restricted area.
Down
- – Exchange of information vital in security operations.
- – Verification of a person’s credentials or legitimacy.
- – Person responsible for enforcing security measures.
- – Formal written account of an incident or observation.
- – Act of keeping people and property safe.
- – Continuous observation of people or premises for safety.
- – The act of stealing small quantities from the workplace.
- – Valuable property or resources needing protection.
- – A written guideline that governs security procedures.
20 Clues: – Act of keeping people and property safe. • – Weakness that can be exploited by threats. • – Event causing severe disruption and damage. • – Warning device that signals intrusion or danger. • – The right or ability to enter a restricted area. • – Valuable property or resources needing protection. • – Any potential cause of harm to people or property. • ...
Security Threats 2016-06-13
Across
- able to replicate itself from system to system with NO user interaction
- type of attack that seeks to overwhelm system resources
- often sits quietly watching everything you do
- pretending to be someone you are not to gain network or system access
- tricks user into running an application because they think it will do one thing but actually performs some other malicious function
- bad guys may go after a specific organization or individual
- using people to get around security techniques
- able to replicate itself from system to system by a user running an application
Down
- someone who is not authorized to enter a particular area does so by following closely behind someone who is authorized
- holds your system hostage until you pay money
- broad category of malicious software
- standing over someone's shoulder to view what's on their computer
- using every possible password combination until the right one is found
- attack using common or well known words until the right password is found
- hides itself from the operating system and is invisible to anti-virus and anti-malware applications too
15 Clues: broad category of malicious software • holds your system hostage until you pay money • often sits quietly watching everything you do • using people to get around security techniques • type of attack that seeks to overwhelm system resources • bad guys may go after a specific organization or individual • ...
Computer Security 2016-01-05
Across
- type of software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.
- credit bureau where one can specify notation on credit account as added security from fraud
- Software programs designed to invade your computer, and copy, damage, or delete your data
- helps create a protective barrier between your computer and the Internet
- type of software that helps detect and remove computer viruses before they can cause damage
- E-mail sent by online criminals to trick you into giving them money
- Unwanted e-mail, instant messages, and other online communication
- setting these for Internet use can help protect your privacy and security
Down
- E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information
- These people use the Internet to trick children into meeting with them in person
- Both children and adults may use the Internet to harass or intimidate other people
- act in ways that help protect us against the risks that come with Internet use
- Software that tracks your online activities or displays endless ads
- Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information
- type of theft where con artists get your personal information and access your cash and/or credit
15 Clues: Unwanted e-mail, instant messages, and other online communication • Software that tracks your online activities or displays endless ads • E-mail sent by online criminals to trick you into giving them money • helps create a protective barrier between your computer and the Internet • setting these for Internet use can help protect your privacy and security • ...
Security Training 2021-02-23
Across
- Always ____ each member when they walk in
- If being robbed, remember to stay ________
- Minimum number of tellers on the line
- Always ______ emails, if sending to a member with personal information
- True or false, we can discuss a robbery with the media
- First step in keeping yourself safe during an active shooter situation
- Our alarm company
- When opening the branch you may receive a call asking if we have a HAPO in which state
Down
- _____ plan is a proactive plan on how to maintain services during an emergency
- Activate the silent alarm when it's _____ to do so
- Primary meeting point
- WP fire extinguishers are located next to the electrical room and ____ room
- How often our alarms are tested
- Color of paper used to signal to police that branch is safe
- Secondary meeting point
15 Clues: Our alarm company • Primary meeting point • Secondary meeting point • How often our alarms are tested • Minimum number of tellers on the line • Always ____ each member when they walk in • If being robbed, remember to stay ________ • Activate the silent alarm when it's _____ to do so • True or false, we can discuss a robbery with the media • ...
food security 2022-01-21
Across
- manufactured artificially and contains minerals or synthetic chemicals
- pesticide toxic chemicals that are made to repel,prevent and kill pests
- fertilizers derived from animal or vegetable matter
- pest multifaceted approach to pest control
- the top 5-10 inches of soil
- is a sub-set of general biodiversity
- the simultaneous cultivation of several crops or kinds of animals
- the rearing of aquatic animals or the cultivation of aquatic plants for food
- a destructive insect or animal the attacks crops,food,or livestock
Down
- industrialized production of livestock,poultry,fish,and crops
- the condition of not having access to sufficient food
- the salt content in the soil
- excessive food intake
- the cultivation of a single crop in a given area
- a parliament grant to the sovereign for state needs
15 Clues: excessive food intake • the top 5-10 inches of soil • the salt content in the soil • is a sub-set of general biodiversity • pest multifaceted approach to pest control • the cultivation of a single crop in a given area • fertilizers derived from animal or vegetable matter • a parliament grant to the sovereign for state needs • ...
Information Security 2023-12-18
Across
- A secret word or phrase that must be used to gain access to a system or service.
- A technique that falsifies the identity or location of a sender or receiver.
- A deliberate attempt to compromise or damage a system, network, or program.
- The process of protecting data by secret code.
- A cybercriminal who breaks into systems
- A part of the internet that is hidden from regular search engines and requires special software to access.
- A software program that enters a computer system without the owner’s knowledge or consent.
Down
- The practice of protecting systems, networks, and programs from digital attacks.
- A type of malware that infects and replicates itself on other files or programs
- A small computer defect that causes errors or failures.
- A small piece of data stored on a user’s browser that tracks their preferences or activities.
- A fraudulent attempt to obtain sensitive information by impersonating a legitimate entity.
- A type of malware that encrypts the victim’s data and demands payment for its decryption.
- Unsolicited or unwanted messages sent over the internet, usually for advertising purposes.
- A system that prevents unauthorized access to a network or device.
15 Clues: A cybercriminal who breaks into systems • The process of protecting data by secret code. • A small computer defect that causes errors or failures. • A system that prevents unauthorized access to a network or device. • A deliberate attempt to compromise or damage a system, network, or program. • ...
Imformation Security 2020-12-11
Across
- being bad
- to copy or move programs or information into a computer's memory, especially from the internet or a larger computer
- protection of a person, building, organization, or country against threats such as crime or attacks by foreign countries
- an arrangement with a bank to keep your money there and to allow you to take it out when you need to
- open the phone
- theft
- the right to enter
- can play game or internet
- open your phone and more safer than password
Down
- to improve the quality or usefulness of something
- to keep someone or something safe from injury, damage, or loss
- information, especially facts or numbers
- someone who hacks
- to take something without the permission or knowledge of the owner and keep it
- an illegal plan for making money, especially one that involves tricking people
- cheating
16 Clues: theft • cheating • being bad • open the phone • someone who hacks • the right to enter • can play game or internet • information, especially facts or numbers • open your phone and more safer than password • to improve the quality or usefulness of something • to keep someone or something safe from injury, damage, or loss • ...
Food Security 2024-12-17
Across
- Process of providing food or nutrients
- A measure of food availability and quality
- A type of agriculture that minimizes environmental impact
- A sudden, severe shortage of food
- Animal product that is a major source of protein
- Type of food that is essential for growth and repair
- Staple crop, often used in breadmaking
Down
- Condition where people do not have enough access to nutritious food
- The practice of making food more nutritious by adding vitamins and minerals
- Another word for famine, especially in Africa
- Practice of growing diverse crops to ensure food availability
- Part of a diet that includes fruits, vegetables, and whole grains
- This nutrient is crucial for healthy brain function
- A crop that is drought-resistant and widely grown in Africa
- To produce food or goods through farming
15 Clues: A sudden, severe shortage of food • Process of providing food or nutrients • Staple crop, often used in breadmaking • To produce food or goods through farming • A measure of food availability and quality • Another word for famine, especially in Africa • Animal product that is a major source of protein • This nutrient is crucial for healthy brain function • ...
Food security 2024-12-17
Across
- which improves blood flow and energy
- Immediate enery
- rich in protein,fats
- contain nutrients like A,C and K
- rich in carbohydrates
- powerhouse of boosting energy
- contains fiber and nutrients
- king of the fruit
Down
- contains natural sugar that your body can quickly turn into energy
- rich in healthy fats
- for body Hydration
- blend of protein,fats and carbohydrates
- primary ingredient on Hummus
- source of protein
- vitamin C
15 Clues: vitamin C • Immediate enery • source of protein • king of the fruit • for body Hydration • rich in healthy fats • rich in protein,fats • rich in carbohydrates • primary ingredient on Hummus • contains fiber and nutrients • powerhouse of boosting energy • contain nutrients like A,C and K • which improves blood flow and energy • blend of protein,fats and carbohydrates • ...
Food Security 2024-12-18
Across
- - What food gives to keep us strong
- - Place where people donate food to help others
- - Plant food like carrots or broccoli
- - Gathering crops from the field
- - Large animals raised for meat and milk
- - A group of people living together and helping each other
Down
- - Cereal crop like wheat or rice
- - Keeping things going for a long time
- - Where plants grow
- - Essential for life and growing food
- - Good for your body
- - Amount of food available
- - Place where crops are grown and animals are raised
- - A plant grown for food
- - Place where food is sold
15 Clues: - Where plants grow • - Good for your body • - A plant grown for food • - Amount of food available • - Place where food is sold • - Cereal crop like wheat or rice • - Gathering crops from the field • - What food gives to keep us strong • - Essential for life and growing food • - Plant food like carrots or broccoli • - Keeping things going for a long time • ...
Security Test 2025-06-08
Across
- Extra verification step beyond just a password
- Program designed to detect and remove digital threats
- Copy of data stored elsewhere for safety
- Used to prove your identity; includes things like usernames and passwords
- General name for harmful software
- Used to restrict access; must be strong and secret
- Tiny digital threat that can spread and destroy files
Down
- Term for systems that are easy to attack
- Tool that hides your internet activity and location
- Security system that controls incoming and outgoing traffic
- Person who breaks into systems without permission
- Watches your online activity without permission
- Has the highest access in a system
- Tricks users into giving personal information by pretending to be trustworthy
- Unwanted messages often sent in bulk
15 Clues: General name for harmful software • Has the highest access in a system • Unwanted messages often sent in bulk • Term for systems that are easy to attack • Copy of data stored elsewhere for safety • Extra verification step beyond just a password • Watches your online activity without permission • Person who breaks into systems without permission • ...
NETWORK SECURITY 2025-02-25
Across
- a secure and unchangeable digital record of tranction
- A network security system that uses tickets for authentication.
- A security system that blocks or allows network traffic.
- The process of converting data into a secret code to keep it safe
- Keeping information private and protected from unauthorized access
- A secure way to prove a message or document is real
Down
- A tool used to monitor and analyze network traffic
- A one-way process that converts data into a fixed-length code.
- A type of encryption that uses matrix math to code message
- A key that is shared openly to help encrypt messages.
- The ability to enter or use a system or network.
- An attempt to harm or gain unauthorized access to a system
- The method of protecting information by converting it into a secret code
- Encrypted version of the message
- A key exchange method for securely sharing encryption keys over network
15 Clues: Encrypted version of the message • The ability to enter or use a system or network. • A tool used to monitor and analyze network traffic • A secure way to prove a message or document is real • a secure and unchangeable digital record of tranction • A key that is shared openly to help encrypt messages. • A security system that blocks or allows network traffic. • ...
Bullying 2013-07-27
Across
- when bullying goes too far the victim resorts to this
- the type of bullying which involves the spreading of rumors
- the person who is bullied feels this
- this is often used in physical bullying
- the type of bullying which involves the use of the internet
- the words that are normally used in verbal bullying are called:
- the type of bullying were the victim is socially left out
Down
- the victim of bullying can get this so that it does not go too far
- the type of bullying which involves the use of words which offend a person
- the type of bullying were the victim is intimidated
- the type of bullying which involves contact with the victim
- the person who picks on a weaker and smaller person than they are
- this is often the birth place of cyber bullying
13 Clues: the person who is bullied feels this • this is often used in physical bullying • this is often the birth place of cyber bullying • the type of bullying were the victim is intimidated • when bullying goes too far the victim resorts to this • the type of bullying were the victim is socially left out • the type of bullying which involves the spreading of rumors • ...
Gen AI for Observability 2024-03-01
Across
- How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution)
- This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)
Down
- Elastic has a platform, what is it called?
- What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
4 Clues: Elastic has a platform, what is it called? • This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution) • What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution) • ...
FRM 2024-07-15
Across
- What measures should XYZ implement to enhance its liquidity risk management?
- How did the cyber-attack affect XYZ's working capital and liquidity?
- How can XYZ strengthen its regulatory compliance framework?
- What are the potential legal and financial consequences for the company?
- Were there any gaps in the company's credit risk assessment processes?
- What were the root causes of the cyber-attack on XYZ Corporation?
Down
- Were there any limitations in the company's liquidity contingency planning?
- What steps should XYZ take to strengthen its operational resilience?
- How well did the company's cybersecurity framework respond to the incident?
- Which data protection regulations did XYZ fail to comply with?
- How did the operational disruption impact XYZ's credit relationships?
- What actions should XYZ take to improve its credit risk management?
12 Clues: How can XYZ strengthen its regulatory compliance framework? • Which data protection regulations did XYZ fail to comply with? • What were the root causes of the cyber-attack on XYZ Corporation? • What actions should XYZ take to improve its credit risk management? • What steps should XYZ take to strengthen its operational resilience? • ...
Technology & Digital Culture 2025-04-01
9 Clues: Online image • Online realm • Internet humor • Audio broadcast • Social media tag • Computer process • Electronic format • Online personality • Online video viewing
AmTrust 2023-12-12
bullying CAT 2015-06-14
15 Clues: online • the bad guy • face to face • the targeted • live your ... • word for bullying • leaving people out • a form of bullying • taking peoples stuff • bullying good or ... • spreads fast with ... • doing nothing to help • to stand up for your self • embarrassment photos of people • hurting people by punching them
LEASEM9 Crossword Puzzle 2025-09-23
Across
- RECOVERY – Plan to restore business operations after a disaster.
- SECURITY – Security measures established around the outer boundaries of a site.
- – Taking another’s property without permission.
- – Intentional destruction to hinder operations.
- PLAN – Backup plan for unexpected disruptions.
- – Process of gathering facts to solve an incident.
- – Rounds conducted by guards to ensure safety.
Down
- – Continuous monitoring of people, objects, or areas.
- – Illegal entry into restricted premises.
- – Small-scale theft usually committed by employees.
- PREVENTION – Measures to stop the outbreak and spread of fire.
- SYSTEM – Device that alerts authorities of unauthorized activities.
- ASSESSMENT – Evaluation of possible threats to an organization.
- GUARD – Person hired to protect people and property.
- CONTROL – Mechanism that regulates entry and exit in a facility.
- – Unauthorized entry attempt into a protected area.
- SECURITY – Protection of buildings, assets, and personnel.
- – Video monitoring system used to deter and detect crime.
- ASSESSMENT – Process of evaluating potential dangers and vulnerabilities.
- PLAN – Documented procedures for responding to crises.
20 Clues: – Illegal entry into restricted premises. • PLAN – Backup plan for unexpected disruptions. • – Rounds conducted by guards to ensure safety. • – Taking another’s property without permission. • – Intentional destruction to hinder operations. • – Process of gathering facts to solve an incident. • – Small-scale theft usually committed by employees. • ...
FOOD SECURITY 2024-12-17
Across
- the food security is deepens on
- The major feature of food security
- FOOD COOPERATION OF INDIA
- price food grains depends on
- making main object of food security
Down
- payment depends on food security
- dimensions of food security
- revolution agricultural production
- stock The food security depends on
- main food insecurity
10 Clues: main food insecurity • FOOD COOPERATION OF INDIA • dimensions of food security • price food grains depends on • the food security is deepens on • payment depends on food security • revolution agricultural production • stock The food security depends on • The major feature of food security • making main object of food security
IT Jobs & Computer Ethics 2024-08-20
12 Clues: Builds websites. • Online harassment. • Fake online identity. • Designs cloud systems. • Tests software quality. • Designs user interfaces. • Publishing private info. • Domain name exploitation. • Malware demanding payment. • Fake emails to steal info. • Secret cryptocurrency mining. • Protects against cyber threats.
Technology Vocab 2025-02-07
34 Clues: vlog • edit • post • safe • clear • block • login • blurry • delete • google • record • change • modern • invent • charge • tablet • selfie • upload • privacy • problem • connect • comment • download • security • username • addicted • captions • solution • internet • dangerous • streaming • smartphone • information • communication
Allie's Cybersecurity Crossword 2025-03-15
Across
- Longer, complicated phrase to enter accounts
- Converting data into unreadable code
- Malware disguised as legitimate software
- Duplicate copy preventing data loss
- Webpages not indexed by search engines
- Small file tracking website activity
- Unauthorized individual with skill to gain access to
- Verifying a user's claimed identity
- Malware attached to files stealing/damaging data
- Monitors/controls incoming and outgoing traffic
- Ending access to secure system
- Self-replicating malware
Down
- Fraudulent attempt to steal sensitive information
- Malware demanding payment for access
- Malicious software that harms systems
- Weakness exploitable by security threats
- Security method using physical traits
- Installing newest software security versions
- Private browsing hiding local history
- Encrypted connection masking user location
20 Clues: Self-replicating malware • Ending access to secure system • Duplicate copy preventing data loss • Verifying a user's claimed identity • Malware demanding payment for access • Converting data into unreadable code • Small file tracking website activity • Malicious software that harms systems • Security method using physical traits • Private browsing hiding local history • ...
safety and security 2022-12-12
Across
- / allows the door lock to be overridden to open the electronically engaged deadbolt.pg192
- / the guestroom key opens the door of the room that has been assigned to the guest.pg192
- / is the close observation of a situation to provide information for investigations regrading guests, employees, and asset protection.pg193
- / are laws that protect both the innkeeper and guest.pg187
- / The director of security maintains relationships with law enforcement(police)...etc.pg190
- / based on the emergency response plan, determine what needs to be purchased and acquired, and then store these items.pg196
- / human trafficking is a form of modern-day slavery. It includes the force, fraud, or coercion to labor or commercial s*x.pg189
- / the security officer(loss prevention officer) has multiple responsible and is the "boots on the ground".pg188
- / create an emergency response plan.pg196
- / is responsible for handling daily operations in the hotel as well as any emergency situations that arise.pg195
- / as the department head, the security manager(director of security) over...pg188
- / can be defined as having an understanding of what is going on around you.pg188
- / conduct a practice run of the emergency response plan to make employees comfortable.pg197
- / a comprehensive report that addresses.pg188
- / one reason lodging properties are allowed to refuse service to guest is if guests are intoxicated.pg186
Down
- / is typically used by guestroom attendants.pg192
- / details the emergency procedures designed to maintain safety of guest, employees ad the property.pg191
- / means that you have a legal duty to act in the way that an ordinary, prudent, reasonable person would.pg186
- / come from outside such as weather, active assailants, and bomb threats.pg198
- / an innkeekper is an individual or business owner who provides overnight accommodations for guest in exchange for reasonable compensation.pg187
- / is the secure and logical control of all keys in the hotel.pg191
- / if a hotel dose not have a security department.pg187
- floors, stairwells / key access also used for...pg194
- / The security department is responsible for traininng emplayees to be prepared to hanble emergency situations.pg191
- / is any observed behavior that could indicate crime or terrorism.pg189
- / The security supervisor supports the security manager and the management function.pg188
- / are something that happen in the hotel like a gas leak or water damage.pg198
- / review the response, identify any gaps, and make improvements to respond more efficiantly in future emergency situations.pg197
- / allows access into all of the door locks of the hotel.pg192
- / include monitoring keys, surveillance, and awareness of pretinent technological advance.pg191
- / Usually, keys given to employees are metal keys. these should be audited on a regular basis.pg193
- / is failure to act in a safe manner.pg186
- / is typically used by inspector.pg192
- / addresses ensuring the safety and security of the hotel and its guest preventing problem from occurring.pg190
- / is a specifically encoded key, typically used by the bell attendant to handle a luggage pull.pg192
- / may be carried by housekeeping, maintenance, and security personnel.pg194
- / refers to being responsible for the actions or the condition of an establishment.pg186
- / are well known for having highly sophisticated security technology.pg194
- / alert guests to potential hazards, such as wet floors.pg187
- / Ensure every employee knows how to follow the emergency response plan during an emergercy.pg197
40 Clues: / is typically used by inspector.pg192 • / create an emergency response plan.pg196 • / is failure to act in a safe manner.pg186 • / a comprehensive report that addresses.pg188 • / is typically used by guestroom attendants.pg192 • floors, stairwells / key access also used for...pg194 • / if a hotel dose not have a security department.pg187 • ...
Domestic & International Airports 2019-07-21
Across
- rotoruas airport code
- christchurchs airport code
- walks around with an animal in customs
- before security
- new zealands biggest airline
- the person that works in security
- the people that keep in touch with the pilots
- something the airport provides for passengers
Down
- shows identity
- where you get off and on the aircraft
- new zealnads biggest airport
- gets you between domestic and international airports
- queenstowns airport code
- where you wait before you get on the aircraft
- hamiltons airport code
- what you check in to go on the plane
- after you go through security
- something a plane lands on
- taupos airport code
- invercargills airport code
20 Clues: shows identity • before security • taupos airport code • rotoruas airport code • hamiltons airport code • queenstowns airport code • christchurchs airport code • something a plane lands on • invercargills airport code • new zealnads biggest airport • new zealands biggest airline • after you go through security • the person that works in security • what you check in to go on the plane • ...
Final Exam 2022-04-29
Across
- __ model describes when there is need for speed in response to prevent catastrophic results of loss
- A form of 2FA characteristic that describes biometrics "What you__"
- security tool that had usability testing in Why Johnny Still, Still Can't Encrypt
- ___ model is described when security can have financial outcome to presented risk
- __ model is when a mental model is based on provided stories
- security tool that had usability testing in Why Johnny Still Can't Encrypt
- single encryption key shared among people
- a type of posting regret when a user is frustrated or upset
Down
- posting too ___ is something that was described to avoid to do on your social media
- two pairs of keys (public and private)
- Removing a user from the decision making
- A known security encryption tool that advertise to be one of the most usable security tools for the general public
- ____ model is an explanation for someone's thoughts about how something works in the real world
- negative or offensive ___ is what a facebook user might post and later regret
- security tool that had usability testing in Why Johnny Can't Encrypt
15 Clues: two pairs of keys (public and private) • Removing a user from the decision making • single encryption key shared among people • a type of posting regret when a user is frustrated or upset • __ model is when a mental model is based on provided stories • A form of 2FA characteristic that describes biometrics "What you__" • ...
Security 2022-04-03
Across
- a well-known group of red hat hackers
- the first D in DDoS
- targeting high profile individuals using social engineering techniques
- a form of malware that is able to spread with no reliance on host files or human interaction
- a piece of software that detects, prevents and removes malware from a system
Down
- the process of converting plaintext to ciphertext so that it cannot be understood
- a form of malware that demands money from the user in return for something
- following other people into secure areas
- a social engineering technique that directs website's traffic elsewhere
9 Clues: the first D in DDoS • a well-known group of red hat hackers • following other people into secure areas • targeting high profile individuals using social engineering techniques • a social engineering technique that directs website's traffic elsewhere • a form of malware that demands money from the user in return for something • ...
