cyber security Crossword Puzzles
cyber 2023-10-19
Across
- A practice of securing your data by regularly copying it to a separate location.
- A technique for protecting your online accounts with a second layer of security.
- A type of malware that encrypts your files and demands a ransom for their release.
- A common social engineering technique where an attacker pretends to be someone they're not.
Down
- A combination of letters, numbers, and symbols that should be hard to guess.
- A program that appears legitimate but is harmful, often used to gain unauthorized access to a computer.
- An attempt to gain unauthorized access to a computer system or network.
- The process of keeping your software up-to-date to protect against vulnerabilities.
8 Clues: An attempt to gain unauthorized access to a computer system or network. • A combination of letters, numbers, and symbols that should be hard to guess. • A practice of securing your data by regularly copying it to a separate location. • A technique for protecting your online accounts with a second layer of security. • ...
cyber 2022-02-10
Across
- point to point tunneling protocl
- filter prevents a local computer from using a URL/IP to access the local server.
- stored data
Down
- allows a single transmission to reach multiple people
- the port that listens to queries/connections
- communicates to sites on your behalf
- protects data flow between peers
- protects local network from internet
8 Clues: stored data • point to point tunneling protocl • protects data flow between peers • communicates to sites on your behalf • protects local network from internet • the port that listens to queries/connections • allows a single transmission to reach multiple people • filter prevents a local computer from using a URL/IP to access the local server.
May-edition 2021-05-07
12 Clues: prey(6) • obey(5) • small(6) • amongst(4) • steward(9) • to rule(5) • cyber crime(8) • circle or hoop(4) • source of light(4) • make from scratch(6) • name of city/perfume(7) • mythological creature(6)
Múzeumpedagógia keresztrejtvény 2020-01-09
Across
- tér vitruális tér másként
- ICT jelentése
- learning by doing jelentése magyarul
- gyakorlatorientált
- kompetencia jelentése
- kreativitás másképp
Down
- edutainment jelentése
- non-formális oktatás helyszíne lehet
- interaktív, aktivitásra épülő angol kifejezéssel
- motiváció célja
- flow jelentése magyarul
- formális oktatás helyszíne lehet
12 Clues: ICT jelentése • motiváció célja • gyakorlatorientált • kreativitás másképp • edutainment jelentése • kompetencia jelentése • flow jelentése magyarul • tér vitruális tér másként • formális oktatás helyszíne lehet • non-formális oktatás helyszíne lehet • learning by doing jelentése magyarul • interaktív, aktivitásra épülő angol kifejezéssel
Environmental security 2021-06-06
Across
- the process by which something is made worse
- to stop something from happening or someone from doing something
- relating to the whole world
- useful or valuable possessions, such as oil or gas, that a country has and that can be sold
- existing as a natural and permanent quality of something or someone
- an amount of a substance that is produced and sent out into the air that is harmful to the environment
- relating to or used in farming
- a suggestion that something unpleasant or violent will happen, especially if a particular action or order is not followed
Down
- harm or injury
- a situation in which there is less of something than people want or need
- ability to continue to exist or develop as a living being
- the surroundings or conditions in which a person, animal, or plant lives or operates
- protection of a person, building, organization, or country against threats
- able to be maintained or continued
- an amount of something produced by a person, machine, factory, country, etc.
15 Clues: harm or injury • relating to the whole world • relating to or used in farming • able to be maintained or continued • the process by which something is made worse • ability to continue to exist or develop as a living being • to stop something from happening or someone from doing something • existing as a natural and permanent quality of something or someone • ...
FOOD SECURITY 2022-10-25
Across
- In which state more than 90% ration shops are run by cooperatives?
- The most devastating famine occurred in India in 1943 in _______.
- GOI of India introduced __________in 1940s against the backdrop of the Bengal Famine.
- Indian government distribute foodgrains in the deficit areas and among the poorer strata of the society at a price lower than the market price. This price is called _________.
- In which state of India, grain banks have been set up by NGOs?
- Yellow card is issued to __________ families.
- A __________ is characterised by wide spread deaths due to starvation and epidemics caused by forced use of contaminated water or decaying food and loss of body resistance due to weakening from starvation.
Down
- A special stamp entitled ‘Wheat Revolution’ was released by __________ in July 1968.
- ________ hunger is prevalent in both rural and urban areas.
- Buffer stock is the stock of foodgrains procured by the government through_________.
- Dairy This is a cooperative that provides milk and vegetables at controlled rates decided by the government of Delhi.
- ____ cards are given to the poorest of poor
- India is aiming at Self-sufficiency in Food grains since Independence. Which important measure helped India achieve self-sufficiency in food grains?
- The price that is announced before the sowing season is called __________.
- Under ______ scheme, 10 kgs of foodgrains are provided to Indigent Senior citizens free of cost.
15 Clues: ____ cards are given to the poorest of poor • Yellow card is issued to __________ families. • ________ hunger is prevalent in both rural and urban areas. • In which state of India, grain banks have been set up by NGOs? • The most devastating famine occurred in India in 1943 in _______. • In which state more than 90% ration shops are run by cooperatives? • ...
AIRPORT SECURITY 2023-02-01
Across
- to remove something or when a plane is leaving
- passing the hands over the body
- a carry-on luggage
- another word to say "forbidden"
- likely to cause danger or damage
- examine something in details
- the place where officials check incoming goods, travellers, or luggage.
Down
- any dangerous items such as knives or guns
- the way in which people can act
- an electronic device that gives a signal
- when something is kept out of sights, concealed
- an act of unlawfully seizing an aircraft
- to get into the plane
- a synonym of "dangerous"
- the security of passengers
15 Clues: a carry-on luggage • to get into the plane • a synonym of "dangerous" • the security of passengers • examine something in details • the way in which people can act • passing the hands over the body • another word to say "forbidden" • likely to cause danger or damage • an electronic device that gives a signal • an act of unlawfully seizing an aircraft • ...
Information Security 2023-08-28
Across
- making sure a person is who they say they are
- short for "malicious software" and covers threats such as viruses, worms, Trojan
- macros which have been programmed to carry out malicious intent
- requirement of being private or secret
- calculated assessment of potential threats to an organization’s security
- how information is protected
- ransomware and the numerous other programs used by hackers to gain
- information or data which can be accessed when needed
Down
- network of computers and devices managed as a unit with the same procedures and rules
- gap or weakness which undermines an organization’s security efforts
- rights an individual or organization has over information and how it is used
- to or damage sensitive information on a computer
- intent of doing harm
- state of being complete or uncorrupted
- procedure used to determine user privileges or access levels to the system
15 Clues: intent of doing harm • how information is protected • requirement of being private or secret • state of being complete or uncorrupted • making sure a person is who they say they are • to or damage sensitive information on a computer • information or data which can be accessed when needed • macros which have been programmed to carry out malicious intent • ...
IT-Security 2023-06-01
Across
- Was ist Social Engineering?
- Was ist eine Sicherheitslücke?
- Was ist Phishing?
- Was ist eine Sicherheitsbedrohung?
- Was ist eine Schwachstelle?
- Was ist ein Hacker?
Down
- Was ist eine Firewall?
- Was ist ein Passwort?
- Was ist ein Sicherheitsrisiko?
- Was ist ein Virus?
- Was bedeutet "Verschlüsselung"?
- Was bedeutet "Backup"?
- Was ist ein Angriffsvektor?
- Was ist eine Sicherheitsrichtlinie?
- Schwachstelle Was ist eine Zero-Day-Schwachstelle?
15 Clues: Was ist Phishing? • Was ist ein Virus? • Was ist ein Hacker? • Was ist ein Passwort? • Was ist eine Firewall? • Was bedeutet "Backup"? • Was ist Social Engineering? • Was ist ein Angriffsvektor? • Was ist eine Schwachstelle? • Was ist ein Sicherheitsrisiko? • Was ist eine Sicherheitslücke? • Was bedeutet "Verschlüsselung"? • Was ist eine Sicherheitsbedrohung? • ...
Food security 2024-09-24
Across
- A single person or distinct entity.
- Related to a specific geographic area.
- A group of people living together in a single residence.
- The maintenance of health and hygiene through clean conditions.
- Potential sources of danger or harm.
- Pertaining to a country as a whole.
- The possibility of loss, injury, or other adverse effects.
Down
- Pertaining to the natural world and the impact of human activity on it.
- status: A measure of the dietary intake and health of an individual.
- Distinguishing traits or qualities of an individual or group.
- Related to government, policies, or public affairs.
- Relating to the statistical characteristics of a population.
- The act of using up resources or goods.
- The state of being accessible or ready for use.
- Pertaining to society or its organization.
15 Clues: A single person or distinct entity. • Pertaining to a country as a whole. • Potential sources of danger or harm. • Related to a specific geographic area. • The act of using up resources or goods. • Pertaining to society or its organization. • The state of being accessible or ready for use. • Related to government, policies, or public affairs. • ...
Food Security 2024-11-28
Across
- Pearl millet
- India's biggest occupation
- Eat in night
- Orange
- Can be used in summer to make the items cool.
- Keeps the items well in summer
- Source of Protein
Down
- Vitamins and minerals
- Wash your hands before and after eating
- support a healthy heart and blood vessels
- Bone Health
- should be wear while cooking
- Digestion
- Heart health and digestion
- Energy & freshness
15 Clues: Orange • Digestion • Bone Health • Pearl millet • Eat in night • Source of Protein • Energy & freshness • Vitamins and minerals • India's biggest occupation • Heart health and digestion • should be wear while cooking • Keeps the items well in summer • Wash your hands before and after eating • support a healthy heart and blood vessels • Can be used in summer to make the items cool.
Food Security 2024-11-28
Across
- A program that distributes food to those in need
- The variety of life essential to sustaining food production.
- The practice of cultivating crops in urban environments
- The state of having reliable access to sufficient, nutritious food
- Growing crops and raising livestock for food and other products
- A severe lack of food affecting a large population over time
- A system that ensures food is grown, harvested, and distributed efficiently
Down
- A major global grain used as a staple food in many cultures
- The process of preserving food to ensure it lasts longer.
- A nutritious tuber that serves as a staple crop in many countries
- A strategy for growing crops without harming the environment
- The global challenge of inadequate food availability and access
- The spoilage or loss of food during production, storage, or distribution
- A global institution working to combat hunger.
- The environmental challenge of limited water availability for agriculture
15 Clues: A global institution working to combat hunger. • A program that distributes food to those in need • The practice of cultivating crops in urban environments • The process of preserving food to ensure it lasts longer. • A major global grain used as a staple food in many cultures • The variety of life essential to sustaining food production. • ...
Food Security 2024-11-28
Across
- What season do most farmers plant their crops?
- What do we call the process of drying food to preserve it?
- What do we call the place where we buy food?
- What do we call the tiny living things that can make food go bad?
- What do we need to make plants grow?
- What do we call the process of turning milk into cheese or yogurt?
- What do we call the nutrients in food that help us grow?
Down
- What do we call food that is grown without chemicals?
- What do we call food that comes from trees?
- What do we call the process of watering crops?
- What do we call food that is given to people who need help?
- What do we call the place where food is grown?
- What do farmers grow in fields?
- What do we call the place where we store food at home?
- What do we call the part of a plant that we often eat?
15 Clues: What do farmers grow in fields? • What do we need to make plants grow? • What do we call food that comes from trees? • What do we call the place where we buy food? • What season do most farmers plant their crops? • What do we call the process of watering crops? • What do we call the place where food is grown? • What do we call food that is grown without chemicals? • ...
Food security 2024-11-28
Across
- known as the spice garden of india
- is national ice cream month
- D body produce when exposed to sunlight
- Foodgrains procured by food corporation
- high unsaturated fat
- B help with red blood cell production
- masala popular spices in India
- long lasting food
Down
- stock of stock grains
- fats fat which is liquid at room temperature
- fastest meat to spoil
- Revolution adopted in july 1968
- caused by malnutrition in infant
- helps with digestive health
- drink lot of water
15 Clues: long lasting food • drink lot of water • high unsaturated fat • stock of stock grains • fastest meat to spoil • is national ice cream month • helps with digestive health • masala popular spices in India • Revolution adopted in july 1968 • caused by malnutrition in infant • known as the spice garden of india • B help with red blood cell production • ...
Food Security 2024-11-28
Across
- A MINERAL THAT BODY NEEDS TO WORK PROPERLY
- GOOD SOURCE OF VITAMIN B
- THE FRUIT WITH SEEDS ON THE OUTSIDE
- WHERE WERE FRENCH FRIES FIRST INVENTED
- GOOD SOURCE OF VITAMIN D
- THE CHINESE GOOSEBERRY FRUIT
- SOURCE OF VITAMIN C
- SUGAR CANE, FRUIT, HONEY ARE EXAMPLE OF
Down
- MAIN SOURCE OF PROTEIN
- EXCESS CARBOHYDRATE ARE STORED IN THE BODY AS
- FAST FOOD RESTAURANT HAS THE LARGEST NUMBER OF RETAIL WORLDWIDE
- UNIT OF ENERGY THAT INDICATES THE AMOUNT OF ENERGY CONTAINED IN FOOD
- INDIA BIGGEST OCCUPATION
- GOOD SOURCE OF VITAMIN A
- SUBSTANCES IN THE FOOD THAT SUPPLY THE ENERGY TO BODY
15 Clues: SOURCE OF VITAMIN C • MAIN SOURCE OF PROTEIN • GOOD SOURCE OF VITAMIN B • INDIA BIGGEST OCCUPATION • GOOD SOURCE OF VITAMIN A • GOOD SOURCE OF VITAMIN D • THE CHINESE GOOSEBERRY FRUIT • THE FRUIT WITH SEEDS ON THE OUTSIDE • WHERE WERE FRENCH FRIES FIRST INVENTED • SUGAR CANE, FRUIT, HONEY ARE EXAMPLE OF • A MINERAL THAT BODY NEEDS TO WORK PROPERLY • ...
ECP, Crossword 2025-08-02
Across
- Facebooks virtual space
- insurance covering damage done by cyber breaches
- technology A type of tech that is healthier
- Reality VR, AR and MR
Down
- strategies, technologies, and processes used by organizations to analyze data
- Intelligence Replacing Humans
- Authentication A way to verify the idenity of someone
7 Clues: Reality VR, AR and MR • Facebooks virtual space • Intelligence Replacing Humans • technology A type of tech that is healthier • insurance covering damage done by cyber breaches • Authentication A way to verify the idenity of someone • strategies, technologies, and processes used by organizations to analyze data
Stop Cyberbullying 2024-04-22
10 Clues: Online • Grown up • Mean person • Online games • Out of danger • Kids Help Line • Mobile Computer • Hand held phone • Using the internet • Telling adults when unsure
Privacy, Security, and Common Security Problems 2025-08-06
Across
- a cyberattack that takes advantage of a previously unknown or unaddressed security flaw in computer software, hardware, or firmware.
- the fraudulent practice of sending emails or other messages pretending to be from a reputable company in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- the fraudulent acquisition and use of a person's private identifying information, usually for financial gain
- when a person posts information online that is untrue and damaging about another--generally done to shame, spread false rumors, and humiliate that person
- any incident that results in unauthorized access to computer data, applications, networks, or devices
- malicious marketing media that is used to interject malware into users' computers when they visit a website or click on an pop-up on the internet
- an interruption in an authorized user's access to a network typically caused with malicious intent
- gaining unauthorized access to data in a system or computer
- the public release of private identifying information as a form of harassment
- the part of the world wide web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable
- the action, of demanding payment or benefit from someone in return for not revealing compromising or damaging information about them
Down
- when a person uses extreme options, insults, and abusive language to get into online arguments on purpose
- a work is reproduced, distributed, performed, or made into a derivative without the creator/owner's permission
- the spread of behaviors, attitudes, and affect through crowds and other types of social aggregates from one member to another--peer influence
- when individuals determine their own social and personal worth based on how they stack up against others
- a use of the internet, especially a habitual or avid one
- the untended download of software, typically malicious software that is used to steal and collect personal information or inject banking Trojans.
- a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
- malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- when someone posts or comments online to deliberately upset others
- a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
- malware that attempts to scare users into thinking their device has been infected with a virus and then encourages them to quickly download a program (usually tainted) to fix it
- the use, copying, or distribution of copyrighted material
23 Clues: a use of the internet, especially a habitual or avid one • the use, copying, or distribution of copyrighted material • gaining unauthorized access to data in a system or computer • when someone posts or comments online to deliberately upset others • the public release of private identifying information as a form of harassment • ...
security week 2012-09-27
Across
- the _______ act is important when thinking about sharing customer information
- good security helps us protect the _________ of the tax system
- Security is Everyone's ______________
- DLP, Data Loss __________
- Information security is rewriting the use of email ______
- The longer this is the stronger this is.
Down
- The Information owner must _______ their Documents
- Section 6 of the TAA requires _______________ of tax payers affairs
- _____ Desk is good practice for protecting customer information
- With EDP we can now use bitlocker to _______ USB sticks
- ___________ Information Security Officer
- ____ your screen before you walk away
- Public, Controlled, _______, Highly Protected
- Scan sensitive documents to _____ not the M: Drive
- You can reset your own password so you don't need to call the _______ Desk
15 Clues: DLP, Data Loss __________ • Security is Everyone's ______________ • ____ your screen before you walk away • ___________ Information Security Officer • The longer this is the stronger this is. • Public, Controlled, _______, Highly Protected • The Information owner must _______ their Documents • Scan sensitive documents to _____ not the M: Drive • ...
Security Test 2013-01-09
Across
- Where is the alarm signal located?
- How long should you wait for the All Clear Signal to be set?
- What is one thing you never do during a robbery?
- What is the All Clear Signal?
- What is the first thing you do after a robbery?
- Who do you email if a robbery occurs?
- What is the predetermined amount to dispense if a robber asks you to dispense money?
Down
- Who do you email if there is a bomb threat?
- What is the most important thing to remember during a robbery?
- Incase of an emergency where is the safe place?
- Where do you find the branch robbery kit?
- What form is required for a member who does not qualify for an account?
- What do you do if all clear is not set?
- What do you put in the subject line when you are sending an email after a robbery?
- Whos card will you find in the branch robbery kit?
15 Clues: What is the All Clear Signal? • Where is the alarm signal located? • Who do you email if a robbery occurs? • What do you do if all clear is not set? • Where do you find the branch robbery kit? • Who do you email if there is a bomb threat? • Incase of an emergency where is the safe place? • What is the first thing you do after a robbery? • ...
Security systems 2018-08-24
15 Clues: sopiva • huolto • asennus • sireeni • langaton • ohjelmoida • opastevalo • käyttölaite • johtopidike • havainnointi • paloilmaisin • vakuutusyhtiö • rikosilmaisin • liiketunnistin • turvalaiteasentaja
Security Systems 2023-06-13
Food security 2024-12-17
Across
- Animal raised for wool
- This animal gives us milk for cheese, butter, and ice cream
- Small animal raised
- Likes to chase mice
- This animal helps people on farms and can be ridden
- Pollinator that plays a critical role in food production
- This animal helps carry things and gives wool
- Man's best friend
Down
- We eat this animal from the sea or rivers
- Has a trunk
- This animal gives milk and is important in the desert
- This bird is popular
- Large marsupial
- Flying mammal
- Poultry raised for eggs
15 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Small animal raised • Likes to chase mice • This bird is popular • Animal raised for wool • Poultry raised for eggs • We eat this animal from the sea or rivers • This animal helps carry things and gives wool • This animal helps people on farms and can be ridden • This animal gives milk and is important in the desert • ...
Food Security 2024-12-17
Across
- (7) – The seasonal rains in India crucial for agricultural activities.
- (10) – The process of gathering mature crops from the fields.
- (10) – Chemicals used in agriculture to protect crops from pests and diseases.
- (12) – A condition resulting from a lack of proper nutrition, often due to insufficient food or poor food quality.
- (11) – Chemical substances added to soil to improve its fertility and increase crop yields.
- (10) – The artificial application of water to soil, often used in farming to grow crops.
Down
- (5) – A staple crop widely grown in India and used to make flour for bread, roti, and other foods.
- (7) – A prolonged dry period affecting the water supply, which impacts food production.
- (7) – A group of food crops that are commonly used as staples, such as rice, wheat, and maize.
- (7) – The practice of cultivating crops and raising animals for food and raw materials.
- (12) – The ability to maintain food production without depleting natural resources.
- (11) – The practice of farming, including cultivation of the soil and livestock.
- (9) – The process of converting waste into reusable material, important for reducing food waste.
- (7) – A nutrient essential for body functions, found in foods like legumes, meat, and dairy.
- (9) – The process of providing or obtaining the food necessary for health and growth.
15 Clues: (10) – The process of gathering mature crops from the fields. • (7) – The seasonal rains in India crucial for agricultural activities. • (10) – Chemicals used in agriculture to protect crops from pests and diseases. • (11) – The practice of farming, including cultivation of the soil and livestock. • ...
Food Security 2024-12-17
Across
- What does preserving native fruit varieties protect?
- What trend threatens some fruit-growing lands?
- What farming method is gaining popularity for fruit production?
- What industry adds value to excess or damaged fruits?
- What infrastructure improvement could help fruit reach more people?
- What activity helps India's fruit economy grow internationally?
- What technique helps increase fruit production in dry areas?
Down
- What technology helps extend fruit shelf life?
- What natural event often reduces fruit yields?
- What aspect of health do fruits significantly contribute to?
- Which fruit is India the largest producer of?
- What factor most affects fruit production year to year?
- What is a major cause of fruit loss after harvesting?
- What limits year-round availability of some fruits?
- What chemicals are controversial in fruit farming?
15 Clues: Which fruit is India the largest producer of? • What technology helps extend fruit shelf life? • What natural event often reduces fruit yields? • What trend threatens some fruit-growing lands? • What chemicals are controversial in fruit farming? • What limits year-round availability of some fruits? • What does preserving native fruit varieties protect? • ...
Food security 2024-11-28
Across
- process of growing plants
- Chemical substances used to kill pests that harm crops
- insufficient food supply
- Practice of preserving food for future use
- name of country - highest food production in the world
- Nutritional deficiency caused by lack of Vitamin A
Down
- Vitamin found in eggs
- Vitamin found in leafy green vegetables, whole grains, nuts
- Natural disaster that leads to food shortage
- A nutrient found in wheat, rice, and bread that provides energy
- source of protein in vegetarian diets
- vitamin C
- Vitamin found in Oranage
- nutrient found in fruits and vegetables
- common grain consumed
15 Clues: vitamin C • Vitamin found in eggs • common grain consumed • insufficient food supply • Vitamin found in Oranage • process of growing plants • source of protein in vegetarian diets • nutrient found in fruits and vegetables • Practice of preserving food for future use • Natural disaster that leads to food shortage • Nutritional deficiency caused by lack of Vitamin A • ...
Food security 2024-11-28
Across
- What do we need to do to fruits and vegetables before eating them
- What do we call the place where food is grown
- What do we call food that is grown without chemicals
- What do we call the nutrients in food that help us grow
- What do we call the natural food for babies
- What do we call food that is thrown away
- What do we call the tiny living things that can make food go bad
- What do plants need to grow
Down
- What do we need to make plants grow
- What do we call food that comes from the sea
- What do we call the part of a plant that we often eat
- India's biggest occupation
- What do we call food that comes from animals
- What do we call the place where we buy food
- What do we call the practice of growing fruits and vegetables at home
15 Clues: India's biggest occupation • What do plants need to grow • What do we need to make plants grow • What do we call food that is thrown away • What do we call the natural food for babies • What do we call the place where we buy food • What do we call food that comes from the sea • What do we call food that comes from animals • What do we call the place where food is grown • ...
Network Security 2025-03-24
Across
- This prevention method protects accounts by asking for something only the user would know.
- This threat is when a server is overloaded with requests to disrupt services.
- This threat is when someone is manipulated into giving data
- This prevention method gets someone to break into the system to find flaws.
- This threat uses malicious software to disrupt computer systems.
Down
- This prevention method scans files and removes any malware from your computer.
- This threat happens when someone watches someone enter personal data.
- This prevention method scrambles data that is sent between devices.
- This prevention method monitors network traffic.
- This prevention method details which users have access to which files.
- This threat is when a password is repeatedly guessed.
- This threat is when code is entered into web forms to access data behind them.
- This prevention method checks if data entered is valid before accepting it.
- This prevention method protects the building where the data is stored.
- This threat is when someone intercepts data between two devices.
15 Clues: This prevention method monitors network traffic. • This threat is when a password is repeatedly guessed. • This threat is when someone is manipulated into giving data • This threat is when someone intercepts data between two devices. • This threat uses malicious software to disrupt computer systems. • ...
Food Security 2022-07-23
Across
- A reason why some may not have access to food
- A way to problem solve by creating something new
- A process that helps to preserve something for the future
- A place where things are processed/made
- Work with others effectively
- Another reason for food shortages
- A southern continent
Down
- People in charge of laws to do with climate change (like carbon emissions and land clearing)
- Feeling safe and protected
- Where you would find crops, sheep and cows
- A reason for food shortages (2 words)
- Something you need to survive
- A four letter continent
- A natural disaster involving water
- A way to use the internet and books to learn more
15 Clues: A southern continent • A four letter continent • Feeling safe and protected • Work with others effectively • Something you need to survive • Another reason for food shortages • A natural disaster involving water • A reason for food shortages (2 words) • A place where things are processed/made • Where you would find crops, sheep and cows • ...
JDCyber Security 2022-12-04
Across
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A person who uses computers to gain unauthorized access to data
- Sending of unsolicited and commercial bulk message over the internet is known as spamming
- A software or hardware that prevents unauthorized access to a network
- A program that attempts to damage a computer system and replicate itself
- A wireless technology for exchanging data over short distances.
- theft The crime of obtaining the personal or financial information of another person to use their identity to commit fraud
Down
- are weaknesses in software programs that can be exploited by hackers to compromise computers
- The space in which users share information, interact with each other; engage in discussions or social media platforms
- Software that automatically displays or downloads advertising material
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Part of the web that can’t be accessed by normal browsers
- practice of sending fraudulent communications that appear to come from a reputable source
- An automated process that interacts with other network services
- A smartphone application that allows users to transfer money between bank accounts.
15 Clues: Part of the web that can’t be accessed by normal browsers • A person who uses computers to gain unauthorized access to data • An automated process that interacts with other network services • A wireless technology for exchanging data over short distances. • A software or hardware that prevents unauthorized access to a network • ...
TSMC Article 2023-09-10
Vocab 6.2 - Column 1 2021-05-18
18 Clues: ID • To get • Customs • Airport • Airplane • To board • Travel bag • A passport • Male agent • To disembark • Plane ticket • To begin a trip • To change money • To meet up with • Birth certificate • A driver's license • Security checkpoint • Social security card
Mortgage Terminology 2018-01-21
Across
- Refinance
- Underwriting
- Note
- Term
- Acceleration
- Title
- Principal
- Closing
- Encroachment
- Collateral
- FICO
- Foreclosure
- Liability
- Rescission
- Escrow
- Interest
Down
- Amortization
- Security
- Mortgagor
- Appreciation
- Borrower
- Addendum
- Recording
- Depreciation
- Survey
- Default
- Appraisal
- Hypothecate
- Mortgage
- Originator
- Assets
- Origination
- Equity
- Mortgagee
- Redlining
35 Clues: Note • Term • FICO • Title • Survey • Assets • Equity • Escrow • Default • Closing • Security • Borrower • Addendum • Mortgage • Interest • Mortgagor • Recording • Refinance • Appraisal • Principal • Mortgagee • Redlining • Liability • Originator • Collateral • Rescission • Hypothecate • Origination • Foreclosure • Amortization • Appreciation • Depreciation • Underwriting • Acceleration • Encroachment
Cyber Terms 2013-10-29
Across
- is any event or action that could cause a loss or damage to computer hardware, software, data, or information
- politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare
- a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage
- Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet.
- is a classification of malware specifically designed to steal personal information (identity theft), commit a crime to or perform some other illegal activity on a hacked computer.
Down
- is often, but not always, a juvenile hacker; an attacker who uses scripts or programs developed by more sophisticated hackers or crackers
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- is an individual or group who uses email as an offensive force. The group or individual usually sends a company a threatening email stating that they have received confidential information about their company and will exploit a security leak or launch an attack that will harm
- is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks
- a set of software tools that enable an unauthorized user to gain control of a computer system without being detected
- is a standalone malware computer program that replicates itself in order to spread to other computers
- crime conducted via the Internet or some other computer network.
- software that is intended to damage or disable computers and compute
13 Clues: crime conducted via the Internet or some other computer network. • software that is intended to damage or disable computers and compute • is a standalone malware computer program that replicates itself in order to spread to other computers • is any event or action that could cause a loss or damage to computer hardware, software, data, or information • ...
cyber crimes 2023-11-09
Across
- a form of phishing that uses text messages to deceive people
- a form of phishing that uses phone calls to deceive people
- ... for scams;Autumn
- blocks unauthorized access to a computer or network
- identity theft or ...
- to deceive
- security ...
Down
- a gap, break, or whole
- a type of malicious software that can replicate itself
- a secret combination of letters,
- watchful
- not fake or artificial,real
- harmful software
13 Clues: watchful • to deceive • security ... • harmful software • ... for scams;Autumn • identity theft or ... • a gap, break, or whole • not fake or artificial,real • a secret combination of letters, • blocks unauthorized access to a computer or network • a type of malicious software that can replicate itself • a form of phishing that uses phone calls to deceive people • ...
Cyber Month 2024-09-24
Across
- Que tipo de software é projetado para detectar, prevenir e remover malware de um computador?
- Qual é o nome da autenticação que requer a verificação de pelo menos dois fatores diferentes
- Que tipo de malware criptografa os arquivos de um computador e exige um resgate em troca da chave de descriptografia?
- Que termo é usado para descrever a manipulação psicológica de pessoas para obter informações confidenciais ou acesso não autorizado a sistemas?
- Como são chamadas as pessoas que exploram vulnerabilidades em sistemas de computador para obter acesso não autorizado ou realizar atividades maliciosas?
- Qual é a tecnologia que permite criar uma conexão segura e criptografada entre um dispositivo e uma rede privada, mesmo estando em locais diferentes
Down
- Que técnica é usada para proteger informações confidenciais, convertendo-as em um formato ilegível usando algoritmos matemáticos?
- No mundo da tecnologia, Outubro é conhecido como o mês da:
- Qual é a técnica usada para enganar pessoas e obter informações confidenciais, por meio de mensagens falsas?
- Como é chamado o software malicioso projetado para danificar, controlar ou obter acesso não autorizado a um computador ou rede?
- Qual é a tecnologia usada para proteger uma rede, controlando o tráfego de entrada e saída com base em regras de segurança predefinidas?
- Que tipo de informação é usada para autenticar a identidade de um usuário e proteger o acesso a um sistema ou conta?
- Qual é o termo usado para se referir a mensagens indesejadas e não solicitadas enviadas em massa por e-mail?
13 Clues: No mundo da tecnologia, Outubro é conhecido como o mês da: • Que tipo de software é projetado para detectar, prevenir e remover malware de um computador? • Qual é o nome da autenticação que requer a verificação de pelo menos dois fatores diferentes • Qual é a técnica usada para enganar pessoas e obter informações confidenciais, por meio de mensagens falsas? • ...
Cyber 13.4 2025-03-17
Across
- A devices asking for permission to transmit
- Wireless network protocols based on the IEEE 802.11 family of standards
- The A in AP
- The R in RF
- Wifi operates on 2.4 to 5 of these.
- Devices transmitting over the same frequency can cause?
- When two ore more devices send data at the same time
Down
- All devices on the same WLAN must share this
- When the data transfer is complete the device sends this to the AP
- The method wireless networks use to prevent collisions
- The noise a cat eating makes
- Divides the available RF spectrum into smaller sections.
- AP's response to an RTS
13 Clues: The A in AP • The R in RF • AP's response to an RTS • The noise a cat eating makes • Wifi operates on 2.4 to 5 of these. • A devices asking for permission to transmit • All devices on the same WLAN must share this • When two ore more devices send data at the same time • The method wireless networks use to prevent collisions • ...
Cyber Safety 2025-04-30
Across
- Taking a break from the internet to avoid cyberbullying
- Settings on most online platforms that allow you to protect yourself
- Can easily be spread online
- safe usage of the internet, especially in order to protect against viruses, fraud, or other forms of attack.
- Bullying,Harrasment,or threatening behavior targeting yourself online
- Hiding personal information
Down
- Something you should never connect your devices to
- Everyone on the internet
- Someone aiming to be mess with your time on the internet
- Being knowledgeable about the situation
- What you can do to protect yourself, or stop bullying
- How much your information is available on the Internet
- People who want to exploit you or your information
13 Clues: Everyone on the internet • Can easily be spread online • Hiding personal information • Being knowledgeable about the situation • Something you should never connect your devices to • People who want to exploit you or your information • What you can do to protect yourself, or stop bullying • How much your information is available on the Internet • ...
Security 2022-04-03
Across
- targeting high profile individuals using social engineering techniques
- a form of malware that demands money from the user in return for something
- a well-known group of red hat hackers
- the first D in DDoS
- following other people into secure areas
- a form of malware that is able to spread with no reliance on host files or human interaction
Down
- the process of converting plaintext to ciphertext so that it cannot be understood
- a social engineering technique that directs website's traffic elsewhere
- a piece of software that detects, prevents and removes malware from a system
9 Clues: the first D in DDoS • a well-known group of red hat hackers • following other people into secure areas • targeting high profile individuals using social engineering techniques • a social engineering technique that directs website's traffic elsewhere • a form of malware that demands money from the user in return for something • ...
SECURITY 2024-03-29
Across
- two people handling a task together to hold each other accountable.
- a visible signal to bank employees that shows it's safe to enter the branch.
- BONUS: James Estes extention.
- head of security.
- limits for the maximum amount of cash that may be held on the floor and at the teller stations.
Down
- what we grab after a robbery has taken place.
- currency that's been recorded by the bank and is given to a robber.
- our current all clear sign
- standards to guard against harm to employees in the event of a robbery or other criminal activity.
9 Clues: head of security. • our current all clear sign • BONUS: James Estes extention. • what we grab after a robbery has taken place. • two people handling a task together to hold each other accountable. • currency that's been recorded by the bank and is given to a robber. • a visible signal to bank employees that shows it's safe to enter the branch. • ...
Bonding with Government Securities: A Crossword Challenge 2024-03-17
Across
- Tradable government security
- Type of government bond issued by the Reserve Bank of India
- Regulatory body responsible for government debt management in India
- Federal Reserve's interest rate
- Tax-exempt securities issued by local governments
- A government security that pays interest at a rate linked to an external index
Down
- Period until maturity
- Type of debt security issued by a government
- Term for the process of selling government securities to the public
- Short-term government debt securities.
- government security that can be exchanged for shares of a specific company's stock
- Receiving fixed interest payments
- Government security with no fixed maturity date
13 Clues: Period until maturity • Tradable government security • Federal Reserve's interest rate • Receiving fixed interest payments • Short-term government debt securities. • Type of debt security issued by a government • Government security with no fixed maturity date • Tax-exempt securities issued by local governments • Type of government bond issued by the Reserve Bank of India • ...
Final Exam 2022-04-29
Across
- __ model describes when there is need for speed in response to prevent catastrophic results of loss
- A form of 2FA characteristic that describes biometrics "What you__"
- security tool that had usability testing in Why Johnny Still, Still Can't Encrypt
- ___ model is described when security can have financial outcome to presented risk
- __ model is when a mental model is based on provided stories
- security tool that had usability testing in Why Johnny Still Can't Encrypt
- single encryption key shared among people
- a type of posting regret when a user is frustrated or upset
Down
- posting too ___ is something that was described to avoid to do on your social media
- two pairs of keys (public and private)
- Removing a user from the decision making
- A known security encryption tool that advertise to be one of the most usable security tools for the general public
- ____ model is an explanation for someone's thoughts about how something works in the real world
- negative or offensive ___ is what a facebook user might post and later regret
- security tool that had usability testing in Why Johnny Can't Encrypt
15 Clues: two pairs of keys (public and private) • Removing a user from the decision making • single encryption key shared among people • a type of posting regret when a user is frustrated or upset • __ model is when a mental model is based on provided stories • A form of 2FA characteristic that describes biometrics "What you__" • ...
Types of Cybercrimes 2024-03-10
Across
- Gaining unauthorized access to a computer system or account, often to inflict further damage on the target¹.
- Sextortion The act of threatening to share intimate images of someone unless they meet certain demands².
- The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, credit card numbers, etc².
- Stalking The use of the Internet or other electronic means to stalk or harass an individual, group, or organization².
- Job Fraud The act of scamming individuals with fake job offers².
- Bullying A form of harassment or bullying inflicted through the use of electronic or communication devices².
Down
- Impersonating legitimate companies or individuals to trick users into revealing sensitive information¹.
- Theft Stealing personal data such as names, addresses, and social security numbers to fraudulently assume someone's identity¹.
- Grooming The act of establishing an emotional connection with a child to prepare the child for sexual abuse².
- Spreading malicious software such as viruses, worms, Trojans, and ransomware within a device or network¹.
10 Clues: Job Fraud The act of scamming individuals with fake job offers². • Impersonating legitimate companies or individuals to trick users into revealing sensitive information¹. • Spreading malicious software such as viruses, worms, Trojans, and ransomware within a device or network¹. • ...
HIT 410 Week 9 - Stand tall, Stand proud and be protected 2024-06-09
Across
- The function and data available to the user are based on the role of the user.
- Must include the policies required to prevent, identify, control, and resolve security incidents.
- The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from unauthorized alteration, destruction, or loss.
- An individual to be in charge of the security program for the CE.
- Educates CE employees about the CE's security policies and procedures.
Down
- The attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.
- Intentional destruction, mutilation, alteration, or concealment of evidence or alteration of evidence.
- The technology and the policy and procedure for its use that protect ePHI and controls assess to it.
- Poor security practices that have not led to harm, whereas security incidents have resulted in harm for a significant risk of harm.
- May be used to track keystrokes and passwords, monitor websites visited, or other actions and reports these actions to the designated person or organization.
- Defines the minimum that a CE must do to protect electronic ePHI, which is PHI that is "created, received, or transmitted" electronically by CEs.
11 Clues: An individual to be in charge of the security program for the CE. • Educates CE employees about the CE's security policies and procedures. • The function and data available to the user are based on the role of the user. • Must include the policies required to prevent, identify, control, and resolve security incidents. • ...
Analisis Data dan Literasi Digital 2025-06-03
Across
- Tahapan di mana data input diolah atau dimanipulasi sesuai dengan tujuan program merupakan pengertian dari...
- Dengan area dibawah garis yang diisi dengan warna merupakan...
- Sinbol atau nama yang digunakan untuk mempresentasikan nilai merupakan pengertian dari...
- Pencemaran nama baik merupakan bentuk Cyber bullying yaitu...
- Kabar bohong yang sengaja dibuat atau disamarkan seperti layaknya kebenaran merupakan pengertian dari...
- Objektif, dapat diverifikasi, univesal merupakan ciri ciri...
- Nama, alamat rumah, no telp, email merupakan contoh informasi...
Down
- Dapat diakses oleh siapa saja merupakan ciri-ciri dari informasi...
- Informasi yang salah atau tidak akurat yang disebarkan tanpa adanya niat untuk menipu atau merugikan disebut...
- Kondisi benar dalam fungsi logika adalah...
- Microsoft Excel disebut juga dengan nama aplikasi...
- Mengirimkan pesan teks yang isinya merupakan kata-kata yang penuh amarah dan frontal yaitu bentuk...
- Menyebarkan rahasia orang lain atau foto-foto pribadi merupakan contoh dari bentuk Cyber bullying yaitu...
- Pernyataan yang mencerminkan pandangan, pendapat, interpretasi, atau keyakinan seseorang disebut...
- Versi horizontal dari volume chat adalah...
15 Clues: Kondisi benar dalam fungsi logika adalah... • Versi horizontal dari volume chat adalah... • Microsoft Excel disebut juga dengan nama aplikasi... • Pencemaran nama baik merupakan bentuk Cyber bullying yaitu... • Objektif, dapat diverifikasi, univesal merupakan ciri ciri... • Dengan area dibawah garis yang diisi dengan warna merupakan... • ...
Cyber Ethics-Cyber Security Awareness 2 2025-06-19
Across
- A type of attack that tricks a user into revealing their personal information is called
- What is the term for a weakness in a system's security that could be exploited by a threat?
- Popular IDS used to check malicious activity in network company.
Down
- What is the term for the process of validating the identity of a user or system? INJECTION SQL is a type of attack that attempts to exploit a vulnerability in a web application.
- A L2 device that is used to connect multiple systems within a network.
5 Clues: Popular IDS used to check malicious activity in network company. • A L2 device that is used to connect multiple systems within a network. • A type of attack that tricks a user into revealing their personal information is called • What is the term for a weakness in a system's security that could be exploited by a threat? • ...
Cyber 2024-08-08
8 Clues: The__________ Cube • The third letter of CIA • The first letter of CIA • The second letter of CIA • The main idea of Gen cyber • A type of hacker nicknamed pen tester • The type of hacker that hacks for revenge • Something that thinks like a human but isn't
stego 2023-08-01
Across
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
Down
- uicydata; 104.18.12.126
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
9 Clues: Rhysider 44. • uicydata; 104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Camouflaged text 2023-08-01
Across
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
Down
- uicydata;104.18.12.126
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
9 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
cyber 2022-02-10
Across
- point to point tunneling protocl
- filter prevents a local computer from using a URL/IP to access the local server.
- stored data
Down
- allows a single transmission to reach multiple people
- the port that listens to queries/connections
- communicates to sites on your behalf
- protects data flow between peers
- protects local network from internet
8 Clues: stored data • point to point tunneling protocl • protects data flow between peers • communicates to sites on your behalf • protects local network from internet • the port that listens to queries/connections • allows a single transmission to reach multiple people • filter prevents a local computer from using a URL/IP to access the local server.
Stupid English task 2020-02-06
10 Clues: proof • sci-fi • lively • aligned • body part • existence • mechanical • not from earth • 100 years old people • animals that give birth to living creatures (no eggs)
D4 Jugendkultur 2021-09-03
Across
- means of communication
- internet
- to log in
- to text
- to discuss
- to communicate
- to publish/release
- to receive
- message
- to turn off
- to send
- check
- to talk
- remote control
Down
- to uptade
- to charge
- colloquial language
- Email email
- to call
- text message
- download
- to charge a battery
- connection
- battery
- to edit
- keyboard
- message, report
- battery
- to log out
- to turn on
- cyber bulling
- upload
- to tell
- headphones
34 Clues: check • upload • to call • to text • battery • to edit • battery • message • to send • to tell • to talk • download • internet • keyboard • to uptade • to charge • to log in • connection • to discuss • to receive • to log out • to turn on • headphones • Email email • to turn off • text message • cyber bulling • to communicate • remote control • message, report • to publish/release • colloquial language • to charge a battery • ...
33 2024-08-08
Across
- Tech break into
- Punk living
- Punk music culture
- Tech programming
- Punk group
- Tech signal check
- Tech data units
- Punk magazine
- Tech online world
- Punk dance
- Punk music venue
- Punk body art
- Punk attitude
Down
- Tech harmful software
- Tech data transfer
- Tech storage
- Punk record
- Punk icon
- Tech error
- Tech unwanted email
- Tech fix errors
- Tech code structure
- Tech program
- Tech slow response
- Tech network point
25 Clues: Punk icon • Punk group • Tech error • Punk dance • Punk living • Punk record • Tech storage • Tech program • Punk magazine • Punk body art • Punk attitude • Tech break into • Tech data units • Tech fix errors • Tech programming • Punk music venue • Tech signal check • Tech online world • Punk music culture • Tech data transfer • Tech slow response • Tech network point • Tech unwanted email • Tech code structure • ...
Clue Quest 2025-05-26
Across
- Rules of online behaviour
- fake email trick
- online harassment
- data left behind online
- safety measure
- unwanted bulk emails
- protecting data and resources
- passing of others' work
- Set-up cost is low
- Data transmission speed is very fast
Down
- criminal activities
- Another name of access point
- Illegal software copying
- Computer infection
- illegal intrusion
- net+etiquette
- Each computer in a network
- Cyber law
- Wide area network
- created for an individual person
20 Clues: Cyber law • net+etiquette • safety measure • fake email trick • illegal intrusion • online harassment • Wide area network • Computer infection • Set-up cost is low • criminal activities • unwanted bulk emails • data left behind online • passing of others' work • Illegal software copying • Rules of online behaviour • Each computer in a network • Another name of access point • ...
CIS 120 Rabago Module 9 2025-08-16
Across
- Encrypts data on internet
- Recording key strokes
- Software that hides itself
- Convert data into code
- Locked until paid
- Monitor and control traffic
- From inside the organization
- Investigating cyber crimes
- Trying everything
Down
- Secretly monitoring
- Limit who can access network
- Malicious software
- Understand and prevent threats
- remotely compromised computers
- Social engineering attack
- Manipulating people into giving info
- Overwhelming a system
- Ways to verify identity
- Unknown to vendor
- Updating Software
20 Clues: Locked until paid • Unknown to vendor • Updating Software • Trying everything • Malicious software • Secretly monitoring • Recording key strokes • Overwhelming a system • Convert data into code • Ways to verify identity • Encrypts data on internet • Social engineering attack • Software that hides itself • Investigating cyber crimes • Monitor and control traffic • Limit who can access network • ...
Bullying Facts 2016-02-24
Across
- how many kids are bullied each yeah
- how many kids have been cyber-bullied in 2015
- what is cyber bullying more common in
- occurs when someone is made to feel intimidated, insulted or humiliated
Down
- the amount of kids who skip school each year due to bullying
- where can bullying happen
- roughly how many people world wide that have been bullied
- how many common types of bullying are there
8 Clues: where can bullying happen • how many kids are bullied each yeah • what is cyber bullying more common in • how many common types of bullying are there • how many kids have been cyber-bullied in 2015 • roughly how many people world wide that have been bullied • the amount of kids who skip school each year due to bullying • ...
Bullying 2023-11-23
Across
- Pasal yang menghukum tindakan cyber bullying yaitu?
- Salah satu cara mengatasi tindakan bullying dari diri sendiri yaitu?
- Hal yang sering dilakukan secara anonim dan melibatkan penggunaan teknologi untuk menyebarkan konten yang merendahkan?
- Dampak tindakan bullying bagi korban bullying yaitu?
- Tindakan bullying yang dilakukan dengan kontak atau menyentuh langsung?
Down
- Tindakan bullying menggunakan kata kata yang tidak menyenangkan?
- Tindakan bullying yang di lakukan sekelompok yaitu?
- Media yang digunakan untuk cyber bullying
8 Clues: Media yang digunakan untuk cyber bullying • Pasal yang menghukum tindakan cyber bullying yaitu? • Tindakan bullying yang di lakukan sekelompok yaitu? • Dampak tindakan bullying bagi korban bullying yaitu? • Tindakan bullying menggunakan kata kata yang tidak menyenangkan? • Salah satu cara mengatasi tindakan bullying dari diri sendiri yaitu? • ...
Active Shooter Awareness 2025-09-11
Across
- - Measures taken to be safe.
- - A system of signals or symbols.
- - React quickly to a situation.
- - Take action to defend oneself.
- - A serious, unexpected situation
- - Knowledge of a situation.
- - Move quickly away from danger.
- - Conceal oneself from danger.
Down
- - Security measure to restrict movement.
- - Place giving protection from danger.
- - Keep safe from harm.
- - Protective barrier or defense.
- - Remove people from a place of danger.
- - Process of learning skills.
- - Be quick to notice and respond to danger.
- - U.S. Department responsible for public security.
- - Indication of possible danger.
- - Condition of being protected from harm.
18 Clues: - Keep safe from harm. • - Knowledge of a situation. • - Measures taken to be safe. • - Process of learning skills. • - Conceal oneself from danger. • - React quickly to a situation. • - Protective barrier or defense. • - Take action to defend oneself. • - Indication of possible danger. • - Move quickly away from danger. • - A system of signals or symbols. • ...
Hospital Codes 2025-08-13
Across
- severe weather
- hazardous materials release
- hostage situation
- fire
- trauma with surgeons
- stroke team alert
- security lockdown
- missing infant
- security needed
- team to prevent code blue
Down
- cardiac arrest
- trauma without surgeons
- disaster
- bomb threat
- patient has left their area
- activate radiation plan
- assist with patient
- active shooter
- missing child
19 Clues: fire • disaster • bomb threat • missing child • severe weather • cardiac arrest • missing infant • active shooter • security needed • hostage situation • stroke team alert • security lockdown • assist with patient • trauma with surgeons • trauma without surgeons • activate radiation plan • team to prevent code blue • hazardous materials release • patient has left their area
TSMC Article 2023-09-10
Security 2013-02-26
Across
- doorway to SAP system
- Cross System Responsibility can be defined by ____ role
- Authorization check can be traced
- a function call or a program call
- table which holds relationship between parent and child role
Down
- a template to derive roles with * for org elements
- permission to perform an action/give access to user
- transaction to compare two users/roles
- User type for communication within same system
9 Clues: doorway to SAP system • Authorization check can be traced • a function call or a program call • transaction to compare two users/roles • User type for communication within same system • a template to derive roles with * for org elements • permission to perform an action/give access to user • Cross System Responsibility can be defined by ____ role • ...
What is hacking? 2021-01-24
Across
- Hacking in the context of cyber security is gaining __________access to or control of a computer system
- A type of hacker who is not motivated by theft but instead creating disruption to cause public embarrassment or promote a political cause.
- Brute force attacks are an attack that makes multiple attempts to discover something, usually a _________.
Down
- The number of attacker(s) involved in a DDoS attack
- ______-kiddies are hackers (not necessarily kids) who use tools downloaded from the internet that allow them to hack with little technical knowledge.
- The number of attacker(s) involved in a DoS attack
- ________ testers are people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system.
7 Clues: The number of attacker(s) involved in a DoS attack • The number of attacker(s) involved in a DDoS attack • Hacking in the context of cyber security is gaining __________access to or control of a computer system • Brute force attacks are an attack that makes multiple attempts to discover something, usually a _________. • ...
Food security 2022-01-21
Across
- the rearing of aquatic animals or the cultivation of aquatic plants for food.
- products that are produced from chemical afteration.
- system that uses fertilizers of organic origin such as compast manure.
- manufactured artificially and contains minerals or synheic chemicals.
- the process of dealing with or controlling things or people.
- the cultivation of a single crop in a given area.
Down
- the results of the interaction between the environment.
- crops and animals products like eggs or milk.
- a form of malnutrition imbalanced nutrition rising from excessive intake of nutrients.
- a type of fish farming that uses the waste produced by fish to supply nutrients to hydroponic plant.
- a parliamentary grant to the sovereign for state needs.
- a destructive insect or other animal that attacts crops, food, livestock.
- are fertilizers that are naturally produced and contains carbon.
- the simultaneous cultivation or exploitation of saveral crops or kind of animals.
- top layer of soil.
15 Clues: top layer of soil. • crops and animals products like eggs or milk. • the cultivation of a single crop in a given area. • products that are produced from chemical afteration. • the results of the interaction between the environment. • a parliamentary grant to the sovereign for state needs. • the process of dealing with or controlling things or people. • ...
Food security 2022-01-21
Across
- a type of fish farming that uses the waste produced by fish to supply nutrients to hydroponic plant.
- the results of the interaction between the environment.
- crops and animals products like eggs or milk.
- products that are produced from chemical afteration.
- a destructive insect or other animal that attacts crops, food, livestock.
- a form of malnutrition imbalanced nutrition rising from excessive intake of nutrients.
- are fertilizers that are naturally produced and contains carbon.
Down
- the cultivation of a single crop in a given area.
- system that uses fertilizers of organic origin such as compast manure.
- manufactured artificially and contains minerals or synheic chemicals.
- a parliamentary grant to the sovereign for state needs.
- the rearing of aquatic animals or the cultivation of aquatic plants for food.
- the process of dealing with or controlling things or people.
- the simultaneous cultivation or exploitation of saveral crops or kind of animals.
- top layer of soil.
15 Clues: top layer of soil. • crops and animals products like eggs or milk. • the cultivation of a single crop in a given area. • products that are produced from chemical afteration. • a parliamentary grant to the sovereign for state needs. • the results of the interaction between the environment. • the process of dealing with or controlling things or people. • ...
IT Security 2014-12-21
Across
- Business_________ is one of the biggest IT threats
- This keyboard is not a physical peripheral
- peeping toms indulge in this sort of surfing
- This is always better than cure
- Establishes a barrier between trusted and untrusted networks
Down
- should be changed at periodical intervals
- lock before you walk!
- always update this piece of software
- Banks are heavily dependent on this for their day-to-day affairs
- these external drives are a big threat!
- stealing data online is this kind of threat!
- There is a limit to how much you can believe others
- is never enough and can always be breached
- There has to be control of the software as well
- this sign on the browser address bar indicates it is a secure site
15 Clues: lock before you walk! • This is always better than cure • always update this piece of software • these external drives are a big threat! • should be changed at periodical intervals • This keyboard is not a physical peripheral • is never enough and can always be breached • stealing data online is this kind of threat! • peeping toms indulge in this sort of surfing • ...
IT Security 2014-12-21
Across
- stealing data online is this kind of threat!
- peeping toms indulge in this sort of surfing
- lock before you walk!
- There has to be control of the software as well
- is never enough and can always be breached
Down
- Establishes a barrier between trusted and untrusted networks
- this sign on the browser address bar indicates it is a secure site
- Business_________ is one of the biggest IT threats
- should be changed at periodical intervals
- This is always better than cure
- always update this piece of software
- Banks are heavily dependent on this for their day-to-day affairs
- these external drives are a big threat!
- This keyboard is not a physical peripheral
- There is a limit to how much you can believe others
15 Clues: lock before you walk! • This is always better than cure • always update this piece of software • these external drives are a big threat! • should be changed at periodical intervals • This keyboard is not a physical peripheral • is never enough and can always be breached • stealing data online is this kind of threat! • peeping toms indulge in this sort of surfing • ...
Cisco Security 2016-03-15
Across
- Cisco team who manages receipt, investigation and reporting of security vulnerabilities
- Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL ______
- Monitored isolated data designed to study attack methods
- Psychological manipulation of people to perform actions or divulge security info (2 words)
- "Security has to happen at the _________" - John Chambers
- Malicious intent hacker
- First half of a login
Down
- Attack which overwrites buffers boundary and adjacent memory
- First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- Known for fuzzing tools for software crash testing
- Type of security including locked doors, badge readers and surveillance cams
- Hacker with protective intent
- Development process Cisco uses to increase resiliency and trustworthiness.
- _____-_____ Cracking method trying every possible combination
- Attack which denys a machine or resource to intended users. (ABBR)
15 Clues: First half of a login • Malicious intent hacker • Hacker with protective intent • Known for fuzzing tools for software crash testing • Monitored isolated data designed to study attack methods • "Security has to happen at the _________" - John Chambers • Attack which overwrites buffers boundary and adjacent memory • ...
Cisco Security 2016-03-15
Across
- First half of a login
- Malicious intent hacker (2 words)
- Cisco team who manages receipt, investigation and reporting of security vulnerabilities
- First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- Attack which denys a machine or resource to intended users. (ABBR)
- Monitored isolated data designed to study attack methods
- "Security has to happen at the _________" - John Chambers
- Known for fuzzing tools for software crash testing
Down
- Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
- Development process Cisco uses to increase resiliency and trustworthiness.
- Psychological manipulation of people to perform actions or divulge security info (2 words)
- Hacker with protective intent (2 words)
- Type of security including locked doors, badge readers and surveillance cams
- _____-_____ Cracking method trying every possible combination
- Attack which overwrites buffers boundary and adjacent memory
15 Clues: First half of a login • Malicious intent hacker (2 words) • Hacker with protective intent (2 words) • Known for fuzzing tools for software crash testing • Monitored isolated data designed to study attack methods • "Security has to happen at the _________" - John Chambers • Attack which overwrites buffers boundary and adjacent memory • ...
Computer Security 2016-01-05
Across
- E-mail sent by online criminals to trick you into giving them money
- setting these for Internet use can help protect your privacy and security
- E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information
- type of theft where con artists get your personal information and access your cash and/or credit
- Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information
- Both children and adults may use the Internet to harass or intimidate other people
- helps create a protective barrier between your computer and the Internet
- Software that tracks your online activities or displays endless ads
Down
- act in ways that help protect us against the risks that come with Internet use
- These people use the Internet to trick children into meeting with them in person
- type of software that helps detect and remove computer viruses before they can cause damage
- type of software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.
- credit bureau where one can specify notation on credit account as added security from fraud
- Unwanted e-mail, instant messages, and other online communication
- Software programs designed to invade your computer, and copy, damage, or delete your data
15 Clues: Unwanted e-mail, instant messages, and other online communication • E-mail sent by online criminals to trick you into giving them money • Software that tracks your online activities or displays endless ads • helps create a protective barrier between your computer and the Internet • setting these for Internet use can help protect your privacy and security • ...
Internet Security 2023-01-09
Across
- protection of actual equipment
- people accessing the information is who they say they are
- data has not been altered in an unauthorized manner
- only provide access to information necessary to perform the job at hand
- Access Control List
- starting point in developing an overall security plan
- message gets encrypted regardless, only authorized users can decrypt it
Down
- information can be accessed and modified by authorized individuals in an appropriate timeframe
- sender and receiver have keys, very risky
- restrict access to authorized individuals
- Inspects and stops packets of information that don’t apply to a strict set of rules
- easiest to break in regards to security
- important information should be stored in seperate location
- scrambles information during transmission or storage
- A good way to remember role-based access control
15 Clues: Access Control List • protection of actual equipment • easiest to break in regards to security • sender and receiver have keys, very risky • restrict access to authorized individuals • A good way to remember role-based access control • data has not been altered in an unauthorized manner • scrambles information during transmission or storage • ...
Food security 2024-11-28
Across
- What do we call a lack of food due to natural causes, like drought or floods?
- What is it called when a community works together to grow food?
- What types of food are healthy and grows naturally?
- What is needed for farmers to grow food in healthy soil?
- What do we call a shortage of food in a country or region?
- What do we call the nutrients that make our bodies strong?
- What is the term for the area where food is grown or raised?
Down
- What do we call the system of growing crops without harming the environment?
- what keeps things cold to keep food and drinks fresh and safe?
- What do we call food that is kept for a long time?
- What do we call the act of planting and taking care of crops?
- food grown without using chemicals are called as?
- What can help reduce food waste at home or at school?
- What is it called when we use food more efficiently to avoid waste?
- What is the process of growing food called?
15 Clues: What is the process of growing food called? • food grown without using chemicals are called as? • What do we call food that is kept for a long time? • What types of food are healthy and grows naturally? • What can help reduce food waste at home or at school? • What is needed for farmers to grow food in healthy soil? • ...
Food security 2024-11-28
Across
- The type of agriculture that supports the local community and minimizes environmental impact
- An essential nutrient found in vegetables and fruits, important for immune health
- A crop that is commonly used to make oils and is important for food security in many countries
- A system of farming that uses fewer chemicals and focuses on sustainability
- The type of agriculture that supports the local community and minimizes environmental impact
- India's biggest occupation
- Food insecurity consequence
Down
- Food preservation method
- Food price volatility cause
- The process of protecting food from contamination or spoilage
- The nutrient-rich, green leafy vegetable, often a staple in food security programs
- Food waste reduction strategy
- The process of preserving food by canning, freezing, or drying
- The condition in which people do not have enough food to live a healthy life
- A staple food, rich in carbohydrates, often used in bread and pasta
- small scale farming system
16 Clues: Food preservation method • small scale farming system • India's biggest occupation • Food price volatility cause • Food insecurity consequence • Food waste reduction strategy • The process of protecting food from contamination or spoilage • The process of preserving food by canning, freezing, or drying • A staple food, rich in carbohydrates, often used in bread and pasta • ...
Food Security 2024-11-28
Across
- process of obtaining nutrients from food.
- Organization storing food for distribution to those in need.
- Ability to obtain food, physically and economically.
- Amount of crop produced per unit area.
- A major factor contributing to food insecurity.
- Genetically modified organism, a type of engineered crop.
- Land suitable for farming.
- Found in vegetable oils, leafy green vegetables, whole grains, and nuts
- Prolonged period of dry weather affecting crop yields.
Down
- Poor nutrition due to inadequate food intake.
- organic substances produced by plants or animals
- Ability to recover from food security disruptions.
- Vitamin C
- farming: Growing crops primarily for personal consumption.
- Extreme scarcity of food leading to widespread hunger.
15 Clues: Vitamin C • Land suitable for farming. • Amount of crop produced per unit area. • process of obtaining nutrients from food. • Poor nutrition due to inadequate food intake. • A major factor contributing to food insecurity. • organic substances produced by plants or animals • Ability to recover from food security disruptions. • ...
Food Security 2024-11-05
Across
- a lack of proper nutrition
- Growing one type of crop in a field
- The provision of the various food substances required to maintain life
- growing multiple types of crops in a field
- Accumulation of water in body tissues
- crop production per area
- a shortage of food
- the ability to get sufficient, safe and nutritious food
- availability of resources
Down
- being too short
- long-term environmental health
- essential for irrigation
- weight divided by height squared
- Variety in ecosystems
- plants grown for food
15 Clues: being too short • a shortage of food • Variety in ecosystems • plants grown for food • essential for irrigation • crop production per area • availability of resources • a lack of proper nutrition • long-term environmental health • weight divided by height squared • Growing one type of crop in a field • Accumulation of water in body tissues • growing multiple types of crops in a field • ...
Security Quiz 2025-09-18
Across
- Personnel Security Acronym
- OPSEC cycle consists of how many steps?
- 757-396-3333
- Be aware of your _________
- Last name of the SY OPSEC Program Manager.
- Most common phishing attack.
- Loose Lips ______ Ships
Down
- Who is responsible for OPSEC?
- _________ Information is an adversary’s target of choice.
- C1122 _______ Security
- See Something ___ ______
- OPSEC mascot
- Controlled _________ Information (CUI)
- Report _____ Packages
- Active Threat action.
15 Clues: OPSEC mascot • 757-396-3333 • Report _____ Packages • Active Threat action. • C1122 _______ Security • Loose Lips ______ Ships • See Something ___ ______ • Personnel Security Acronym • Be aware of your _________ • Most common phishing attack. • Who is responsible for OPSEC? • Controlled _________ Information (CUI) • OPSEC cycle consists of how many steps? • ...
Crossword 2018-09-13
Across
- SIA stands for?
- Lindsay Batoryk is the new?
- Moses Owour gave chase to a?
- The trip to Winner's Circle is organised by the?
Down
- Which systems are very different in the US and in the UK according to Phillip Thomas?
- Security training commences from good?
- The online courses (from the US) for security officers are called?
- Which security officer saved a life?
- What model was developed in the UK in 1994?
- Troy Hewitt's first security job was?
- Outside of which store was the unattended vehicle parked?
- A new contract?
- What is the US threat response called?
- A hobby of Stephen Douglas?
- An officer who helped the Jehova's witness?
- Which award provides credibility through transparent evaluation?
16 Clues: A new contract? • SIA stands for? • A hobby of Stephen Douglas? • Lindsay Batoryk is the new? • Moses Owour gave chase to a? • Which security officer saved a life? • Troy Hewitt's first security job was? • Security training commences from good? • What is the US threat response called? • What model was developed in the UK in 1994? • An officer who helped the Jehova's witness? • ...
Cyber Crime 2017-04-25
Across
- He cracked the Enigma code and much more...
- (5,9,5) appears to be sent from a friend
- crime created using a computer or a network
- (5,4) tells the computer to execute a set of instructions at a certain date and time
- (5,5)embedded in the template files of Excel or Word
Down
- (6,5)it's all Greek to me
- (8,6,3) law that hackers are prosecuted under
- (8,3,5) usually a long and desperate please for help ...
- (3,6) maximum sentence for looking at someone's files without permission
- hijacks some browser functions
- (4,6)prevents common scams reaching your inbox
- not carp but you might get hooked
- contraction of the words malicious and software
13 Clues: (6,5)it's all Greek to me • hijacks some browser functions • not carp but you might get hooked • (5,9,5) appears to be sent from a friend • He cracked the Enigma code and much more... • crime created using a computer or a network • (8,6,3) law that hackers are prosecuted under • (4,6)prevents common scams reaching your inbox • ...
cyber securty 2017-06-30
Across
- when some one gets in to a company or someone's computer legally or illegally if they do it legally they get paid a lot
- a thing that was made to damager a computer system.
- a place that people go on that they can talk to over people
- when company's send you adverts that you don't want
- when someone finds out your credit card number and pretends to be you
- something that you have on your computer that stops over people from getting in
- faking to be big company's like banks to get information like credit card numbers
- to get past a computers security.
Down
- enables a user to find out information about the person who uses the computer they can also find out what they do on the computer
- when hackers try to damage a computer system.
- something that always replicates its self and can some times carry a virus
- showing people fake websites that look like really company's to get money out of them
- is a really bad virus because it is really hard to get rid of that can sometimes be hacked on to peoples computer
13 Clues: to get past a computers security. • when hackers try to damage a computer system. • a thing that was made to damager a computer system. • when company's send you adverts that you don't want • a place that people go on that they can talk to over people • when someone finds out your credit card number and pretends to be you • ...
cyber safety 2021-09-16
Across
- an audio or video that isn't you or someone
- your private information
- your name that people can call you
- A defensive technology designed to keep the bad guys out
- A technology that allows us to access our files
- address An internet version of a home address for your computer
- a digital platform which is mostly used by teenagers
Down
- A type of malware that functions by spying on user activity without their knowledge.
- someone who has your private information
- A type of malware aimed too corrupt, erase or modify information on a computer before spreading to others
- what you leave on the internet
- your information
- constant messages over and over again
13 Clues: your information • your private information • what you leave on the internet • your name that people can call you • constant messages over and over again • someone who has your private information • an audio or video that isn't you or someone • A technology that allows us to access our files • a digital platform which is mostly used by teenagers • ...
Cyber Safety 2024-03-28
Across
- Clue: A word or phrase preceded by the pound sign (#) used to categorize content on social media.
- Clue:Information that identifies an individual, such as their name, address, phone number, or email, often collected by companies for various purposes
- Clue: A type of malicious software that can replicate itself and spread to other computers.
- Clue: A company pays for their product or service to be the first result you see.
- Clue: A set of rules or processes followed by computer programs, especially search engines or social media platforms, to determine the order and presentation of content to users.
- Clue: Harassing or intimidating someone online is known as this.
- Clue: Digitally manipulated videos or images that convincingly depict someone saying or doing something they never did.
- Clue: The process of selecting specific criteria, such as demographics or interests, to display ads to a particular audience.
Down
- Clue: A digital effect you can put over a video or photo to change your real appearance.
- Clue: Associating a person or page with a post or photo on social media.
- Clue: A secret combination of characters used to access a user's account.
- Clue: Someone who has the power to affect the purchasing decisions or opinions of others because of their authority, knowledge, position, or relationship with their audience on social media.
- Clue: This is your personal page on a social networking site where you share information about yourself.
13 Clues: Clue: Harassing or intimidating someone online is known as this. • Clue: Associating a person or page with a post or photo on social media. • Clue: A secret combination of characters used to access a user's account. • Clue: A company pays for their product or service to be the first result you see. • ...
Cyber Ethics 2025-06-17
Across
- Encrypted data undergoes a process at receiver end.
- A security system that prevents unauthorised people to access network.
- A law prohibit others from creating a copy of work.
- Criminal activities involve to use computer, network and internet..
- How many characters are required to make a strong password?
- Unwanted bulk e-mails come from unknown source.
Down
- Most reliable method of data protection.
- To protect the brand name's, logo, packaging etc.
- In which process of transforming data into unreadable code ?
- Keep secret and change periodically.
- A digital footprint is also known as .....
- Hacking done for good purpose, such as national security.
- An illegal intrusion into a computer system or network.
13 Clues: Keep secret and change periodically. • Most reliable method of data protection. • A digital footprint is also known as ..... • Unwanted bulk e-mails come from unknown source. • To protect the brand name's, logo, packaging etc. • Encrypted data undergoes a process at receiver end. • A law prohibit others from creating a copy of work. • ...
Cyber Ethics 2025-06-10
Across
- Simplest way to prevent plagiarism
- Software is copied and distributed illegally
- Process of transforming data into unreadable code
- Spamming untill mail server gets full
- Illegal intrusion into computer
Down
- Being aware of ethical practices and behaving appropriately in internet
- Act of imitating another person's original work
- Another name for digital footprints
- Equivalent term to hacking
- Hacking done for good purposes
- Unwanted bulk resources from unknown sources
- Act of stealing and misusing someone's personal information
- Security system that prevents unauthorised people from accessing your account
13 Clues: Equivalent term to hacking • Hacking done for good purposes • Illegal intrusion into computer • Simplest way to prevent plagiarism • Another name for digital footprints • Spamming untill mail server gets full • Software is copied and distributed illegally • Unwanted bulk resources from unknown sources • Act of imitating another person's original work • ...
HPE 2019-04-03
Across
- Confidence in one
- kind of a behaviour
- everyone belongs to
- a person has
- ability to control others
- Male hormone
- talk to others
- come to a settlement
- beginning of human life
Down
- Serious disagreement
- Period of becoming sexually mature
- Forceful personality
- different people in society
- people make every day
- what you kick
- of a person
- wholesome
- what happens next
- Human egg
- Atomic
- Bullying bullying through the internet
- Pressure reason to become alcholic
22 Clues: Atomic • wholesome • Human egg • of a person • a person has • Male hormone • what you kick • talk to others • Confidence in one • what happens next • kind of a behaviour • everyone belongs to • Serious disagreement • Forceful personality • come to a settlement • people make every day • beginning of human life • ability to control others • different people in society • Period of becoming sexually mature • ...
Dutch vocabulary 2023-03-21
34 Clues: File • Phone • Email • Laptop • Filter • Tablet • Online • Screen • account • Website • To send • Comment • To save • To text • To post • To share • Computer • Password • To click • Keyboard • The mouse • To upload • To stream • To record • Followers • To search • The filter • To download • Application • Flash drive • social media • Text message • Cyber bullying • To take a photo
impact on society (Name........................... 2016-09-07
Across
- unnecessary emails
- something to do with google
- cell phone
- the keypad
- stuff you need to search
- phone communicate
- speaking to someone
- bully people bullying you online
Down
- when you want to be alone
- needs to be updated
- when you want to search
- always a way to communicate
- bullying/ stalking
- companies online
- sim card in your phone
- the www
- mail emails you don't need
18 Clues: the www • whatsapp • cell phone • the keypad • companies online • unnecessary emails • bullying/ stalking • needs to be updated • phone communicate • speaking to someone • sim card in your phone • when you want to search • stuff you need to search • when you want to be alone • mail emails you don't need • something to do with google • always a way to communicate • ...
SECURITY CROSSWORD CHALLENGE 2024-08-19
Across
- How many business days do you have upon return from Foreign Travel to conduct a Foreign Travel Debrief?
- It is your responsibility to _______ all SAP Fraud, Waste and Abuse.
- Last Name of your Program Security Officer.
- A Template-2/Foreign ____________ is completed if you, your spouse or cohabitant have any continued contact with citizens of another country or dual citizens.
- There is _____ a need to discuss or talk around classified information outside of a SAPF.
- Program material can only be reproduced on equipment approved by the _____.
- When couriering SAP information you must make ________ contact with your destination prior to departure.
- All SAP material must be classified IAW the program ___.
- Report all foreign ________ at least 30 Days in advance.
Down
- Security __________ Are any incident that is not in the best interest of security that does not involve the loss, compromise, or suspected compromise of classified information.
- Security ________ Involves loss, compromise, or suspected compromise of classified information.
- Unauthorized ___________ is communication or physical transfer of classified information to an unauthorized recipient.
- Sharing of accounts and _________ is Strictly Prohibited.
- An exemption to the security requirements.
- Author of the Monthly SETA Newsletter Last name?
- Program discussions can only be conducted in an approved ____.
- Enables an individual to retain SAP accesses when the individual is transferred from one location to another for continued SAP access.
- ____________ Security Specialists provide oversight for SAPF functions to include Facility Operating Procedure (FOP) training for personnel granted unescorted access.
18 Clues: An exemption to the security requirements. • Last Name of your Program Security Officer. • Author of the Monthly SETA Newsletter Last name? • All SAP material must be classified IAW the program ___. • Report all foreign ________ at least 30 Days in advance. • Sharing of accounts and _________ is Strictly Prohibited. • ...
Privacy & Security day 2023-05-10
Across
- A designated person within an organization responsible for overseeing data protection and GDPR compliance
- The application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks
- It is a fraudulent or deceptive act or operation
- The controller is responsible for and needs to demonstrate compliance with the Data Protection Principles and regulations
- It refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons
- It is a formal, documented, comprehensive and accurate registry compiling every processing activity that is done at Riot games
- The process of analyzing and combining personal data to make predictions, assessments, or decisions about individuals
Down
- A Regulation in EU law on data protection and privacy
- It means any information relating to an identified or identifiable, directly or indirectly, natural person (‘data subject’)
- A security measure that requires multiple forms of verification, such as passwords and one-time codes, to access an account
- It is the legal justification for the processing of personal data, It can be :consent; contract; legal obligation; vital interests; public task; or legitimate interests
11 Clues: It is a fraudulent or deceptive act or operation • A Regulation in EU law on data protection and privacy • A designated person within an organization responsible for overseeing data protection and GDPR compliance • The process of analyzing and combining personal data to make predictions, assessments, or decisions about individuals • ...
Simon's January News Crossword Puzzle 2014-01-22
Across
- What is the name of the 11th Prime Minister of Israel who died on January 11, 2014 (Israel Time)?
- Who is the Famous MLB player suspended for a year for usage of performance enhancing drugs?
- What is the Ford's new F-150's body frame made out of?
- The name of the person that his staffs are under scrutiny of closing bridges for political revenge.
- What is the name of the a guy that was allowed to take his pipe bomb even after Canadian Air Transport Security Authority in Edmonton noticed the explosive?
- Who won the Ballon d'Or?
- Colorado and Washington State legalize this "drug".
Down
- Which film won the best picture in drama for the 2014 Golden Globe Award?
- What US government agency implanted radio frequency software in thousands of computers which can be wrongfully used for cyber attacks.
- Which company have to pay 32.5 million dollar to the US Federal Trade Commission for allowing children to purchase applications without their parents consent?
- How many school shootings took place in United State in January?
11 Clues: Who won the Ballon d'Or? • Colorado and Washington State legalize this "drug". • What is the Ford's new F-150's body frame made out of? • How many school shootings took place in United State in January? • Which film won the best picture in drama for the 2014 Golden Globe Award? • ...
Industry 4.0 Crossword Challenge 2024-02-22
Across
- Virtual and Augmented Reality (VR/AR) are used in Industry 4.0 primarily for enhancing __________ and simulation.
- A term used to describe the collection, processing, and analysis of large volumes of data to uncover patterns and insights.
- The pillar of Industry 4.0 that involves the use of sensors and connectivity to enable objects to send and receive data.
- A technology crucial for ensuring the security of data and systems in Industry 4.0.
Down
- The integration of cyber-physical systems is the core idea behind __________ 4.0.
- Also known as 3D printing, this technology involves the layer-by-layer addition of material to create objects.
- A computing paradigm that involves delivering computing services over the internet on a pay-per-use basis.
- The revolution marked by the convergence of digital, physical, and biological spheres, often referred to as the Fourth __________.
- The __________ Revolution is associated with the emergence of Industry 4.0.
- A perspective emphasizing integration of data and processes across the organization is termed as __________ and Connected Business Perspective.
- A key component of the technology roadmap for Industry 4.0, often referred to as the backbone of Industry 4.0.
- __________ Factories are characterized by high levels of automation and connectivity.
12 Clues: The __________ Revolution is associated with the emergence of Industry 4.0. • The integration of cyber-physical systems is the core idea behind __________ 4.0. • A technology crucial for ensuring the security of data and systems in Industry 4.0. • __________ Factories are characterized by high levels of automation and connectivity. • ...
U11 M01 Part 2 2025-09-15
Across
- (5,7) refers to amateur or inexperienced hackers who uses existing tools or instructions found on the Internet to launch attacks.
- (5,9) attackers gather intelligence or commit sabotage on behalf of their government.
- a type of data breach where the goal is to take sensitive personal data.
- This can includes employees, contract staff, or trusted partners that can accidentally or intentionally cause a threat.
- a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
- (4,2,7) the financial impact of a security breach can
Down
- make political statements to create awareness about issues that are important to them.
- (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
- (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
- a criminal tactic using scam emails, texts, or calls to trick people into clicking malicious links, downloading malware, revealing sensitive information like passwords or financial details, or transferring money
- This can include amateurs or skilled attackers outside of the organization can cause a threat.
11 Clues: (4,2,7) the financial impact of a security breach can • a type of data breach where the goal is to take sensitive personal data. • (5,9) attackers gather intelligence or commit sabotage on behalf of their government. • make political statements to create awareness about issues that are important to them. • ...
Resume Vocab 2022-12-12
Across
- ___________ services include occupations related to helping disabled, elderly, impoverished or other underrepresented populations to secure housing, employment, financial assistance or other social services.
- ___________ security includes occupations focused on keeping the country's people, institutions, systems, technology and economy safe from physical or cyber attack.
- ___________ systems include occupations that design and operate public transportation systems — road, air, sea and rail.
Down
- ___________ services include occupations focused on financial planning, asset and hedge fund management.
- ___________ services include workers who assist people with personal, family, educational, mental health, and career decisions and problems.
- ___________ services include occupations focused primarily on changing the health status of patients over time through direct care, treatment, counseling, or health education information.
6 Clues: ___________ services include occupations focused on financial planning, asset and hedge fund management. • ___________ systems include occupations that design and operate public transportation systems — road, air, sea and rail. • ...
Crossword Puzzle 2017-09-05
Across
- An item designed to explode on impact
- A report used for writing incidences / crimes.
- When managing threats, avoid taking any personnel _________. (Plural)
- A type of tape used for securing incidences and crime scene.
- If you see a suspicious vehicle, you must write down its _________ plate number
- A commonly used security communication equipment is a two-way _________.
- Most prevalent security threats at the moment
- If a bomb threat is received by phone, fill out all information on Bomb Threat Call _________.
Down
- whom you should immediately alert when reporting threats.
- IED is also known as Improvised _________ Device.
- A video surveillance system used for safety and security purposes
- Two things security officers must protect: lives and _________.
- You should always stay _________ during security threat/crisis.
- Typically, there will be a lot of _________ on a suspicious parcel. (Plural)
- A common characteristic of a suspicious person is that he/she constantly licks of his/her _________. (Plural)
15 Clues: An item designed to explode on impact • Most prevalent security threats at the moment • A report used for writing incidences / crimes. • IED is also known as Improvised _________ Device. • whom you should immediately alert when reporting threats. • A type of tape used for securing incidences and crime scene. • ...
risk assessment 2017-11-17
Across
- Outage, Communications.
- Workplace Accidents Entrapment.
- Acts, bomb treats
- Materials,Nuclear Power Plant
- Dam, Levee
- Strike,demonstrations
- FEMA
- Explosion
Down
- Control System, Utility Outage
- insurance, part of financial risk mitigation
- Accident,Hazardous Materials
- Hazards Program, USGS
- of risk assessment, potential loss
- Workers from Heat Illness - OSHA
- Technology, Loss of Connectivity
- Pandemic Disease
- Information Technology,Malware Attack Hacking Fraud.
- impact analysis, consequence when business is disrupted
- zone, national flood insurance
19 Clues: FEMA • Explosion • Dam, Levee • Pandemic Disease • Acts, bomb treats • Hazards Program, USGS • Strike,demonstrations • Outage, Communications. • Accident,Hazardous Materials • Materials,Nuclear Power Plant • Control System, Utility Outage • zone, national flood insurance • Workplace Accidents Entrapment. • Workers from Heat Illness - OSHA • Technology, Loss of Connectivity • ...
GK by JSS 2022-10-18
12 Clues: Cyber City • Lotus Temple • Lanf of faith • Land of Coconut • Nadu Elephants • Financial Capital • IT capital of India • Largest National Park • largest metro in India • Largest International Airport • largest railway station(short form) • Substancial portion of Deccan Plateau
SECURITY TERMINOLOGY 2020-05-24
Across
- The unauthorized disclosure of which, could be expected to cause Serious Damage to National Security
- _______________ Assistance Program
- Used on official government information that should be withheld from the public
- The ability and opportunity to obtain knowledge of classified sensitive information
- Given the name “Purple Dragon”
- Reportable action (two words)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)
- Any person with authorized access to any U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems
- You are required to ____________ suspicious behavior
Down
- Not authorized special accesses such as COMSEC
- The unauthorized disclosure of which, could be expected to cause Exceptionally Grave Damage to National Security
- Devotion or loyalty to a person, group, cause, or country
- Goal of an Insider Threat Program
- Data derived from friendly detectable actions and open-source information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities, or activities
- An adversary having the intent, capability, and opportunity to cause loss or damage
15 Clues: Reportable action (two words) • Given the name “Purple Dragon” • Goal of an Insider Threat Program • _______________ Assistance Program • Not authorized special accesses such as COMSEC • You are required to ____________ suspicious behavior • Devotion or loyalty to a person, group, cause, or country • ...
Computer Security 2016-01-05
Across
- type of theft where con artists get your personal information and access your cash and/or credit
- setting these for Internet use can help protect your privacy and security
- Unwanted e-mail, instant messages, and other online communication
- type of software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.
- These people use the Internet to trick children into meeting with them in person
- act in ways that help protect us against the risks that come with Internet use
Down
- credit bureau where one can specify notation on credit account as added security from fraud
- helps create a protective barrier between your computer and the Internet
- Both children and adults may use the Internet to harass or intimidate other people
- Software that tracks your online activities or displays endless ads
- E-mail sent by online criminals to trick you into giving them money
- Software programs designed to invade your computer, and copy, damage, or delete your data
- E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information
- type of software that helps detect and remove computer viruses before they can cause damage
- Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information
15 Clues: Unwanted e-mail, instant messages, and other online communication • Software that tracks your online activities or displays endless ads • E-mail sent by online criminals to trick you into giving them money • helps create a protective barrier between your computer and the Internet • setting these for Internet use can help protect your privacy and security • ...
Cisco Security 2016-03-15
Across
- Known for fuzzing tools for software crash testing
- _____-_____ Cracking method trying every possible combination
- Attack which denys a machine or resource to intended users. (ABBR)
- First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- Type of security including locked doors, badge readers and surveillance cams
- Monitored isolated data designed to study attack methods
- Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
- Cisco team who manages receipt, investigation and reporting of security vulnerabilities
Down
- Attack which overwrites buffers boundary and adjacent memory
- "Security has to happen at the _________" - John Chambers
- Malicious intent hacker (2 words)
- Psychological manipulation of people to perform actions or divulge security info (2 words)
- Development process Cisco uses to increase resiliency and trustworthiness.
- First half of a login
- Hacker with protective intent (2 words)
15 Clues: First half of a login • Malicious intent hacker (2 words) • Hacker with protective intent (2 words) • Known for fuzzing tools for software crash testing • Monitored isolated data designed to study attack methods • "Security has to happen at the _________" - John Chambers • Attack which overwrites buffers boundary and adjacent memory • ...
Security Threats 2018-05-08
Across
- using common or well known words until the right password is discovered
- using every possible password combination until the right one is discovered
- broad category of malicious software
- standing over someone's shoulder to view what's on their screen
- able to replicate itself from system to system with NO user interaction
- type of attack that seeks to overwhelm system resources
- when hackers target a specific group of people or organization
- sits quietly watching everything you do
Down
- hides itself from the operating system and is invisible to anti-virus and anti-malware solutions
- using people to get around security controls
- someone who is not authorized to enter a particular area does so by following behind someone who is authorized
- tricks users into running an application because they think it will do one thing but actually performs some other malicious function
- able to replicate itself from system to system when a user runs an application
- pretending to be someone you are not to gain network or system access
- holds your system hostage until you pay money
15 Clues: broad category of malicious software • sits quietly watching everything you do • using people to get around security controls • holds your system hostage until you pay money • type of attack that seeks to overwhelm system resources • when hackers target a specific group of people or organization • standing over someone's shoulder to view what's on their screen • ...
Food Security 2024-11-28
Across
- Food grown under the ground, like potatoes and carrots.
- A liquid food made from blending fruits or vegetables.
- Food that grows on trees, like apples and oranges.
- This happens when there isn’t enough food for people to eat.
- People who grow crops and raise animals.
- The most important meal of the day.
- A food that comes from cows and helps build strong bones.
- This animal gives us eggs.
Down
- This sweet treat is made by bees.
- A store where we buy food.
- A red fruit often used in salads or ketchup.
- Farmers grow this sweet yellow fruit with a peel.
- Something farmers use to water their crops.
- Something green that grows in leaves, like spinach.
- This food is white, grows in water, and is eaten in many countries.
15 Clues: A store where we buy food. • This animal gives us eggs. • This sweet treat is made by bees. • The most important meal of the day. • People who grow crops and raise animals. • Something farmers use to water their crops. • A red fruit often used in salads or ketchup. • Farmers grow this sweet yellow fruit with a peel. • Food that grows on trees, like apples and oranges. • ...
Food Security 2024-11-28
Across
- Places where we go to buy stuff
- Money we get after working for specific duration in firm
- Basic rules to live as provided by constitution
- one who provides work opportunities
- Can you get and afford it?
- Manufacturing and production area in bulk
Down
- Balance diet of all the food intakes provides us?
- Government make these to provide and check facilities
- sensation of discomfort physically because of lack of food
- Is there enough?
- People who work on scientific knowledge to deduce facts
- Steps you take to fulfill the requirement
- Farming of crops and other resources
- Status of our physical body in medical terms
- Opposite of harming
15 Clues: Is there enough? • Opposite of harming • Can you get and afford it? • Places where we go to buy stuff • one who provides work opportunities • Farming of crops and other resources • Steps you take to fulfill the requirement • Manufacturing and production area in bulk • Status of our physical body in medical terms • Basic rules to live as provided by constitution • ...
