cyber security Crossword Puzzles
Food Security 2024-11-28
Across
- A nutrient found in meat, beans and spinach, important for red blood cells
- A drink that keeps us hydrated and is essential for survival
- The study of how food affects health and the nutrients the body needs for growth and energy
- The body's most important mineral needed for hydration
- A healthy food group that includes carrots, broccoli, and spinach
- A vitamin found in dairy that helps us have strong bones
- The food we get from cows, commonly used in cereal or coffee
- A prolonged period of low rainfall that can lead to crop failure and food shortages
- A sweet food made from fruit, sugar often used with bread
Down
- __ is present in eggs, chicken or beans
- A citrus fruit that is an excellent source of vitamin c
- A green vegetable that is often used in salads and has lots of vitamins
- A food that gives energy and found in rice, bread and pasta
- A leafy green vegetable high in Vitamin K
- A sweet food made from cocoa beans and sugar enjoyed as a treat
15 Clues: __ is present in eggs, chicken or beans • A leafy green vegetable high in Vitamin K • The body's most important mineral needed for hydration • A citrus fruit that is an excellent source of vitamin c • A vitamin found in dairy that helps us have strong bones • A sweet food made from fruit, sugar often used with bread • ...
Food security 2024-11-28
Across
- the fruit great for athletes because they gives you energy
- the fruit Increases Bone Mass
- the fruit help fight off infections
- vegetable protects your heart
- juice reduce kidney stone formation
- the fruit provides support for immune system
- the fruit which reduce blood cholesterol levels
- the fruit contains 92% water helps to reduce weight
Down
- the fruit help calm your nervous system
- the fruit which may help lower risk of developing diabetes and asthma
- the fruit fight against arthritis
- the fruit prevent against diabetes
- the fruit can fight against cancer and aging
- the fruit reduce the risk of blindness
- the fruit Reduce blood pressure and lowers the risk of blood clots
15 Clues: the fruit Increases Bone Mass • vegetable protects your heart • the fruit fight against arthritis • the fruit prevent against diabetes • the fruit help fight off infections • juice reduce kidney stone formation • the fruit reduce the risk of blindness • the fruit help calm your nervous system • the fruit can fight against cancer and aging • ...
Food Security 2024-12-17
Across
- A place where food is grown.
- Food that is not old or spoiled.
- What farmers do to crops.
- Food like rice, wheat, or corn.
- A place to keep food safe.
- Food that grows on trees or plants.
- Plants grown for food.
Down
- Food that is good to eat.
- Not having enough food to eat.
- Helps plants and crops grow.
- Breakfast, lunch, or dinner.
- Needed to grow plants and crops.
- What we do with food.
- Something we eat to stay alive.
- To make food ready to eat.
15 Clues: What we do with food. • Plants grown for food. • Food that is good to eat. • What farmers do to crops. • A place to keep food safe. • To make food ready to eat. • A place where food is grown. • Helps plants and crops grow. • Breakfast, lunch, or dinner. • Not having enough food to eat. • Food like rice, wheat, or corn. • Something we eat to stay alive. • ...
Food security 2024-12-17
Across
- The opposite of full
- large animal that gives us milk
- The process of growing plants for food
- This is needed to cook food
- Food grown without chemicals
- The nutrient that helps build strong muscles
- The season when farmers plant seeds
- A person who grows crops
Down
- healthy drink made from fruits
- Green vegetable shaped like a tree
- A grain used to make bread
- Crops like wheat, rice,or corn
- The main source of water for plants
- fruit that is red and round
- The place where food is grown
15 Clues: The opposite of full • A person who grows crops • A grain used to make bread • This is needed to cook food • fruit that is red and round • Food grown without chemicals • The place where food is grown • healthy drink made from fruits • Crops like wheat, rice,or corn • large animal that gives us milk • Green vegetable shaped like a tree • The main source of water for plants • ...
Food security 2024-12-17
Across
- sweet and healthy food
- makes food sweet
- what we eat to live
- where plants grow
- a vegetable with layers
- improves health and prevents hunger
- comes from chicken
Down
- a food from water
- food for cows
- is the primary source of food production
- a living thing that grows in soil
- used for cooking food
- sweet food made by bees
- a drink from cows
- a big plant that gives fruits
15 Clues: food for cows • makes food sweet • a food from water • where plants grow • a drink from cows • comes from chicken • what we eat to live • used for cooking food • sweet and healthy food • sweet food made by bees • a vegetable with layers • a big plant that gives fruits • a living thing that grows in soil • improves health and prevents hunger • is the primary source of food production
Configuration Management -E-Mates 2024-01-29
Across
- submits the updated change plan to the change control board.
- A list of administrator-approved programs, IP and email addresses that can access the network.Blocks whatever is not on the list.
- The users profile
- The rules a company has for who can change the security systems.
- Settings that help you navigate the login
- Enable security configurations
- Enable security configurations
- Changes done to the security to improve the system
- Any unwanted changes get blocked and reported protecting the system
- Connections from far away
Down
- Multiple layers of security
- Restrictions on a area of importance
- The enviornment in which the secuirty will effect
- Enable security configurations
- Security plans to protect the system
15 Clues: The users profile • Connections from far away • Multiple layers of security • Enable security configurations • Enable security configurations • Enable security configurations • Restrictions on a area of importance • Security plans to protect the system • Settings that help you navigate the login • The enviornment in which the secuirty will effect • ...
Computer Crosword 2021-10-06
Across
- wide area network
- To get into a person's account without their permission.
- The right to make copies.
- Not CPU,but it is connected to CPU.
- Stealing another person's identity.
- Hard disk drive.
- connects a device to a computer
Down
- Security Security online.
- Drive A small portable Drive.
- local area network
- security measures.
- A piece or part of something.
- A list of rules that apply when you communicate across the internet.
- annoying repeated messages
- random-access memory
- a CPU is the central processing unit.
- use A limited use of copyright.
- solid-state drive
18 Clues: Hard disk drive. • wide area network • solid-state drive • local area network • security measures. • random-access memory • The right to make copies. • annoying repeated messages • Security Security online. • A piece or part of something. • connects a device to a computer • Drive A small portable Drive. • Not CPU,but it is connected to CPU. • use A limited use of copyright. • ...
The Internet 1 - 8.º ano - Finder 193 2024-07-09
Schoeman Wedding 2025-07-14
13 Clues: Bride's Name? • Groom's Name? • Garth's Vendor? • Kelly's Employer? • XON Head of Cyber? • Rynier's Employer? • Fran's wife's name? • Where is Aidan from? • Video game Arthur plays? • Palo Territory Director? • Oom Piet & Henri's Vendor? • What Rynier does all the time? • Gender for Ilze and Dillons' little one?
IG crossword 2019-02-18
Across
- Our incident management system
- Permitted by law
- Exposure to danger
- Who or what a person is
- Meeting rules or standards
- A protection code
- Private information
- Relating to computers
- Document outlining a process
- Patient information
Down
- A valuable thing
- A portable computer
- Taking a course
- Protecting from harm
- Make private information known
- Collection of historical documents
- An adverse event
- A written or spoken agreement
- Oversees data processing
- Facts and statistics
20 Clues: Taking a course • A valuable thing • Permitted by law • An adverse event • A protection code • Exposure to danger • A portable computer • Private information • Patient information • Protecting from harm • Facts and statistics • Relating to computers • Who or what a person is • Oversees data processing • Meeting rules or standards • Document outlining a process • A written or spoken agreement • ...
HPE 2019-04-03
Across
- Serious disagreement
- wholesome
- Period of becoming sexually mature
- talk to others
- Pressure reason to become alcholic
- kind of a behaviour
- Bullying bullying through the internet
- beginning of human life
- Male hormone
- Forceful personality
- of a person
Down
- a person has
- Atomic
- come to a settlement
- what happens next
- ability to control others
- people make every day
- Human egg
- different people in society
- what you kick
- Confidence in one
- everyone belongs to
22 Clues: Atomic • wholesome • Human egg • of a person • a person has • Male hormone • what you kick • talk to others • what happens next • Confidence in one • kind of a behaviour • everyone belongs to • come to a settlement • Serious disagreement • Forceful personality • people make every day • beginning of human life • ability to control others • different people in society • Period of becoming sexually mature • ...
Simon's January News Crossword Puzzle 2014-01-22
Across
- The name of the person that his staffs are under scrutiny of closing bridges for political revenge.
- Colorado and Washington State legalize this "drug".
- What US government agency implanted radio frequency software in thousands of computers which can be wrongfully used for cyber attacks.
- Which company have to pay 32.5 million dollar to the US Federal Trade Commission for allowing children to purchase applications without their parents consent?
- What is the Ford's new F-150's body frame made out of?
- How many school shootings took place in United State in January?
Down
- What is the name of the guy who was allowed to take his pipe bomb even after Canadian Air Transport Security Authority in Edmonton noticed the explosive?
- What is the name of the 11th Prime Minister of Israel who died on January 11, 2014 (Israel Time)?
- Who won the Ballon d'Or?
- Which film won the best picture in drama for the 2014 Golden Globe Award?
- Who is the Famous MLB player suspended for a year for usage of performance enhancing drugs?
11 Clues: Who won the Ballon d'Or? • Colorado and Washington State legalize this "drug". • What is the Ford's new F-150's body frame made out of? • How many school shootings took place in United State in January? • Which film won the best picture in drama for the 2014 Golden Globe Award? • ...
ANALYTICS 2014-08-24
Across
- dynamic application Security testing (4)
- parses the code and identify constructs that seem to introduce threats.(4, 7)
- Flying mammal
- an action taken to harm an asset (6)
- Has a trunk
- a type of network security attack where the attacker takes control of a communication (9)
- used by attackers to gain unauthorized access to systems or data (6, 8)
- aprocess of converting data having many possible representations into a standard form (16)
- technique used to attack data driven applications through code injection (3, 9)
- cross-site Request Forgery (4)
- an attempt to acquire sensitive information by redirecting to a false site (8)
- Large marsupial
- a weakness that makes a threat possible (13)
- a character encoding standard (7)
- an operating system (4)
- provides remote access to a targeted computer system (6)
- an open-standard application protocol for directory access (4)
Down
- a method of bypassing normal authentication (8)
- an open-source web application security project (5)
- a possible danger that may act to breach security (6)
- the art of writing or solving secret codes (12)
- the act of confirming the truth of an attribute of an entity (14)
- a list of known good inputs (9)
- Likes to chase mice
- a list of software weaknesses (3)
- a safeguard that addresses a threat and mitigates risk (14)
- authentication, authorization and accounting (3)
- static application security testing (4)
- the degree of resistance to, or protection from, harm (8)
- provides pluggable dynamic authentication for applications and services (3)
- process of creating computer software (6)
- a software that controls the incoming and outgoing network traffic (8)
- a malware program (5)
- cross-site Scripting (3)
- Man's best friend
35 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • a malware program (5) • an operating system (4) • cross-site Scripting (3) • cross-site Request Forgery (4) • a list of known good inputs (9) • a list of software weaknesses (3) • a character encoding standard (7) • an action taken to harm an asset (6) • static application security testing (4) • ...
Security Manager Crossword 2021-12-01
Across
- A possessor of classified information determines a prospective recipients justification to access or have knowledge of classified data.
- A process of identifying critical information and subsequently analyzing friendly actions of military activities.
- Any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of national security information.
- An area under government jurisdiction in which special security measures are employed to prevent unauthorized entry.
- Individual overall responsible for an organization's Personnel Security Program.
- The ability and opportunity to obtain knowledge of classified information.
- An unauthorized disclosure of classified information.
Down
- The authorized change in status of information from classified to unclassified.
- Any knowing, willful, or negligent action that can reasonably be expected to not compromise national security.
- Measures taken by an organization to protect itself against all acts designed to impair its effectiveness.
- An individual who makes a classification determination and applied that to specific information or material.
- The determination that information classified at a specific level will be classified at a lower level.
- The process by which information is determined to be sensitive to national security.
- A calculated use of violence or threats to incite fear and promote change.
- The organization that conducts all background checks of military, federal, and contract personnel.
- Intergovernmental military alliance between foreign states in agreement of mutual defense.
- The time period covered between investigations.
17 Clues: The time period covered between investigations. • An unauthorized disclosure of classified information. • A calculated use of violence or threats to incite fear and promote change. • The ability and opportunity to obtain knowledge of classified information. • The authorized change in status of information from classified to unclassified. • ...
The Career Academy 2024-11-22
Across
- Pathway for those interested in learning about materials used in manufacturing, plant layout, materials handling, manufacturing processes, and the use of machines
- Pathway for those interested in learning how to install heating and air conditioning units
- Pathway for those interested in learning how to run electrical wire in a house
- Pathway for those interested in coding and web development
- Pathway for those interested in working in agriculture, medicine, environmental, or veterinary fields
- Pathway for those interested in becoming an educator or daycare provider
- Pathway for those interested in exploring the basics of business ownership, marketing, and management
Down
- Pathway for those interested in cyber security and troubleshooting hardware
- Pathway for those who want to get general education requirements done and transfer to a 2 or 4 year program
- Pathway for those interested in learning how to use tools and equipment for building structures or cabinets
- Pathway for those interested in law enforcement
- Pathway for those interested in design drafting and engineering processes
- Pathway for those who want to learn about being a nurse or health care provider
- Pathway for those interested in basic metal fabrication and building/repairing structures or products using OXY/FUEL and PLASMA cutting, ARC, MIG and TIG welding
- Pathway for those interested in social work, being a case manager, or counselor
- Pathway for those interested in learning food service and hospitality skills
16 Clues: Pathway for those interested in law enforcement • Pathway for those interested in coding and web development • Pathway for those interested in becoming an educator or daycare provider • Pathway for those interested in design drafting and engineering processes • Pathway for those interested in cyber security and troubleshooting hardware • ...
Financial Market Risks 2024-07-15
Across
- Which risk arises from technological failures or cyber-attacks?
- What risk is associated with fraud or theft by employees?
- What is the risk associated with the volatility in market indices?
- Which risk involves deterioration in the credit spread of a counterparty?
- What risk is associated with potential legal penalties and fines?
- What risk involves potential losses due to legal interpretations?
- What risk involves difficulty in unwinding positions without significant cost?
Down
- What risk involves inadequate or failed internal controls?
- Which risk involves potential losses due to commodity price changes?
- What type of market risk arises from changes in stock prices?
- What term describes the risk that a debtor may restructure debt under bankruptcy?
- Which risk arises from changes in laws affecting business operations?
- Which risk arises when there are insufficient buyers or sellers in the market?
- What type of credit risk is related to sovereign debt?
- What is the risk of a bank facing sudden large withdrawals called?
15 Clues: What type of credit risk is related to sovereign debt? • What risk is associated with fraud or theft by employees? • What risk involves inadequate or failed internal controls? • What type of market risk arises from changes in stock prices? • Which risk arises from technological failures or cyber-attacks? • ...
Cyber World 2023-05-04
Across
- The smallest piece of computer information, either the number 0 or 1.
- changes the case of the letter when on
- Worldwide network of computers
- An input device
- The process of transferring information from a computer to a website
- An output device
Down
- Random Access Memory
- Video Display Unit
- To start up a computer
- These are the devices from which the sound comes out
- The brain of the computer
- Small, lightweight, portable battery-powered computers that can fit onto your lap
- Read-Only Memory
13 Clues: An input device • An output device • Read-Only Memory • Video Display Unit • Random Access Memory • To start up a computer • The brain of the computer • Worldwide network of computers • changes the case of the letter when on • These are the devices from which the sound comes out • The process of transferring information from a computer to a website • ...
cyber bullying 2022-11-11
Across
- if you made a video or a picture online
- if people said something that isn't true
- do's and dont's
- you bully someone online
- if you aren't kind to someone
- when you try to kill yourself
Down
- when people always know where you are
- if you write something on a post
- something you can send messages and call
- if you dont have any friends
- different websites
- if you tease someone every day
- if you are on a website
13 Clues: do's and dont's • different websites • if you are on a website • you bully someone online • if you dont have any friends • if you aren't kind to someone • when you try to kill yourself • if you tease someone every day • if you write something on a post • when people always know where you are • if you made a video or a picture online • something you can send messages and call • ...
Talage Crossword 2024-05-29
Across
- chat-gpt is an example
- leader in insurance technology
- click here to get started
- protect the company from workplace accidents
- legal doc protecting your interests
- stop the hackers
- connect
Down
- understand your data
- self-insurance
- you're responsible
- trusted advisor
- innovation in insurance
- saving time and money
- policy designed to simplify small business insurance
- cost of insurance
- join lots of workflows together
- paid out
17 Clues: connect • paid out • self-insurance • trusted advisor • stop the hackers • cost of insurance • you're responsible • understand your data • saving time and money • chat-gpt is an example • innovation in insurance • click here to get started • leader in insurance technology • join lots of workflows together • legal doc protecting your interests • protect the company from workplace accidents • ...
ANALYTICS 2014-08-24
Across
- a method of bypassing normal authentication (8)
- cross-site Scripting (3)
- a possible danger that may act to breach security (6)
- an operating system (4)
- a type of network security attack where the attacker takes control of a communication (9)
- a weakness that makes a threat possible (13)
- static application security testing (4)
- parses the code and identify constructs that seem to introduce threats.(4, 7)
- aprocess of converting data having many possible representations into a standard form (16)
- a character encoding standard (7)
- cross-site Request Forgery (4)
- an open-standard application protocol for directory access (4)
- provides pluggable dynamic authentication for applications and services (3)
- technique used to attack data driven applications through code injection (3, 9)
- an open-source web application security project (5)
Down
- the art of writing or solving secret codes (12)
- provides remote access to a targeted computer system (6)
- used by attackers to gain unauthorized access to systems or data (6, 8)
- a list of known good inputs (9)
- the degree of resistance to, or protection from, harm (8)
- the act of confirming the truth of an attribute of an entity (14)
- dynamic application Security testing (4)
- an attempt to acquire sensitive information by redirecting to a false site (8)
- authentication, authorization and accounting (3)
- a safeguard that addresses a threat and mitigates risk (14)
- an action taken to harm an asset (6)
- a list of software weaknesses (3)
- a software that controls the incoming and outgoing network traffic (8)
- process of creating computer software (6)
- a malware program (5)
30 Clues: a malware program (5) • an operating system (4) • cross-site Scripting (3) • cross-site Request Forgery (4) • a list of known good inputs (9) • a list of software weaknesses (3) • a character encoding standard (7) • an action taken to harm an asset (6) • static application security testing (4) • dynamic application Security testing (4) • ...
Jargon 2023-11-30
Across
- Account has shares of the underlying
- Acronym for Redemption charges on Mutual Funds
- Another term for a decimal point
- This is 4:30 PM Eastern time
- Balance owed
- number of shares available for trading
- mandates that if the order is not executed immediately, it is canceled.
- Another term for the execution of an order
- An Option contract’s unit of trade or underlying instrument
- Type 5 is
- Pattern day trader designation
- nine-character identifier used for a U.S. security
- Collateralized account
- price the seller gets
- Tax deferred
- The difference between the bid & ask price of a security
- 12-character code that identifies a security
- does not hold the underlying
Down
- Another Term for the Trading price of a Bond
- Type 1 is
- Reported trade price of a stock
- seven character code assigned to securities trading in the U.K.
- The Action of buying back a security that was sold short
- debt obligations of the U.S. government
- characteristic of a security which rises or falls sharply within a short time
- Term referring to the global trading of Currencies
- The ability to be converted to cash quickly
- The Date that an Option Contract will end
- Price the buyer pays
- vehicle that facilitates reporting of OTC transactions in fixed income securities.
- Between Funds of the same family & share class
- Type 2 is
32 Clues: Type 1 is • Type 5 is • Type 2 is • Balance owed • Tax deferred • Price the buyer pays • price the seller gets • Collateralized account • This is 4:30 PM Eastern time • does not hold the underlying • Pattern day trader designation • Reported trade price of a stock • Another term for a decimal point • Account has shares of the underlying • number of shares available for trading • ...
arti 2020-10-30
Across
- her sapling
- hes seen not heard
- a good mind
- the latest bundle
- her foray into cyber space
- the chris bundle
- the blue and pink flower in her life
- has her looks
- home in the lane
Down
- her art
- home on the road
- chota bhim
- he has been in confiment thrice
- co contortionist
- the flowers companion
- the naughty coalman
- he has a way to rile her
- another rajma chawal
- neice
- the first bundle
20 Clues: neice • her art • chota bhim • her sapling • a good mind • has her looks • home on the road • co contortionist • the chris bundle • the first bundle • home in the lane • the latest bundle • hes seen not heard • the naughty coalman • another rajma chawal • the flowers companion • he has a way to rile her • her foray into cyber space • he has been in confiment thrice • the blue and pink flower in her life
HPE 2019-04-03
Across
- wholesome
- Atomic
- Serious disagreement
- Male hormone
- Confidence in one
- kind of a behaviour
- talk to others
- beginning of human life
- different people in society
- Bullying bullying through the internet
- Period of becoming sexually mature
Down
- a person has
- Forceful personality
- what you kick
- come to a settlement
- people make every day
- what happens next
- everyone belongs to
- ability to control others
- Human egg
- of a person
- Pressure reason to become alcholic
22 Clues: Atomic • wholesome • Human egg • of a person • a person has • Male hormone • what you kick • talk to others • what happens next • Confidence in one • everyone belongs to • kind of a behaviour • Forceful personality • Serious disagreement • come to a settlement • people make every day • beginning of human life • ability to control others • different people in society • Period of becoming sexually mature • ...
mov29 2024-07-01
Across
- Stallone's night chase
- Martial arts showdown
- Military thriller
- Will Smith's cop duo
- Pirate adventure
- Rebel uprising
- Disaster thriller
- Mel Gibson's thriller
- Sci-Fi boat action
- Wild West action
- Police thriller
- Space cowboy
Down
- Futuristic combat
- Charles Bronson's return
- Schwarzenegger's sequel
- Urban crime action
- Submarine thriller
- Sci-Fi rebirth
- Dystopian future
- Digital age thriller
- Harrison Ford's CIA
- Sci-Fi escape
- Comedy superhero
- Space survival
- Superhero revenge
25 Clues: Space cowboy • Sci-Fi escape • Sci-Fi rebirth • Rebel uprising • Space survival • Police thriller • Dystopian future • Pirate adventure • Comedy superhero • Wild West action • Futuristic combat • Military thriller • Disaster thriller • Superhero revenge • Urban crime action • Submarine thriller • Sci-Fi boat action • Harrison Ford's CIA • Will Smith's cop duo • Digital age thriller • Martial arts showdown • ...
India by JSS 2022-10-18
13 Clues: Elephants • IT capital • Cyber City • Land of Faith • Land of Coconut • Financial Capital • Deccan Plateau located • Araku Valley is located • Lotus Temple is located • Largest Airport (Short Form) • Largest National Park is located • Largest Railway Station (Short Form) • Largest Metro organization (Short Form)
Homeland Security 2024-03-18
Across
- What department within Homeland Security deals with transportation security
- How many departments did the Homeland Security Act of 2002 combine
- What type of security does Homeland Security deal with when relating to the internet
- Acronym for department of homeland security
- What department within Homeland Security deals with emergency management
Down
- What is one Geographical Aspect Homeland Security Protects
- What kind of events does Homeland Security prepare for
- How would opposers of Homeland Security describe its strategy
- What Homeland Security was made to defend against
9 Clues: Acronym for department of homeland security • What Homeland Security was made to defend against • What kind of events does Homeland Security prepare for • What is one Geographical Aspect Homeland Security Protects • How would opposers of Homeland Security describe its strategy • How many departments did the Homeland Security Act of 2002 combine • ...
Hello, It`s me again :)) 2025-10-16
Across
- Birth city of the scholar (1946).
- Sector tied to resources, markets, and welfare.
- Global-scale version of that framing process.
- Epistemological lens shaping his approach.
- Counterpart whose security is intertwined with Israel’s.
- Copenhagen institute where he led projects (1988–2002).
- Role at the European Journal of International Relations (2004–2008).
- Defined as freedom from threat and preservation of identity.
- Case illustrating identity fractures in the societal sector.
- Sector centered on identity and cohesion.
- Security-studies school he is strongly linked with.
- British-Canadian scholar behind “People, States and Fear.”
- Internal weaknesses contrasted with external dangers.
- Field asking “how do we know?” in theory.
- Strategy of addressing both internal and external risks.
- Field asking “what exists?” in theory.
Down
- Cold War example of a macro-level threat narrative.
- Post-9/11 candidate for macro-securitization.
- Country his family later moved to.
- Sector dealing with armed threats and defense.
- Sector focused on climate, disasters, and nature.
- External dangers contrasted with internal weaknesses.
- System trait his ontology accepts in IR.
- Word completing “regional security ______.”
- State used in Middle East interdependence example.
- Essence of security in his definition.
- The “friendship” side shaping regional orders.
- The hostile counterpart in regional relations.
- Sector covering ideology and state institutions.
- Leader who announced a global “war on terror.”
- Framing an issue as an existential threat.
31 Clues: Birth city of the scholar (1946). • Country his family later moved to. • Essence of security in his definition. • Field asking “what exists?” in theory. • System trait his ontology accepts in IR. • Sector centered on identity and cohesion. • Field asking “how do we know?” in theory. • Epistemological lens shaping his approach. • Framing an issue as an existential threat. • ...
cyber security crossword (designed by:X, the Awesome!) 2015-12-31
Across
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- The process of translating plaintext into ciphertext
- the process of attempting to acquire sensitive information used for identity theft
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
- software that records everything you type, then sends it off to whomever installed the software.
- an adjective to describe your professor Xiaoyu
Down
- a bridge between two computer networks
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- to choose options in order to create a custom system
- software installed on a network of computers without the owner’s knowledge
- A capability to limit network traffic between networks and/or information systems
11 Clues: a bridge between two computer networks • an adjective to describe your professor Xiaoyu • to choose options in order to create a custom system • The process of translating plaintext into ciphertext • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
CISO Crossword Riddle - 2525 2025-11-12
Across
- I stand guard twice to verify who you are, Two layers strong — that’s security’s shining star
- I’m not an outsider, I already have the key, When I turn rogue, no firewall can stop me
- Infected machines obey a hacker’s command unseen, A silent cyber army waging war on the digital screen
- Every post and click leaves a mark in cyber space, Guard your trail — your data’s your trace
- Voices and faces I twist to deceive your sight, AI’s mask of lies — beware what feels too right
Down
- I look like your bank App but hide a cyber trap, Install me once — your data’s in my lap
- I’m the hacker’s grind, guessing passwords in a race, Weak logins fall when persistence finds its place
- I bait you with emails that seem so right, Click my link, and you’ll lose the fight
- They clone your number and steal your call, One fake SIM — and your bank account can fall
- I’m your one-time digital shield, protecting login doors, Use me once and never share — that’s how safety soars
10 Clues: I bait you with emails that seem so right, Click my link, and you’ll lose the fight • I’m not an outsider, I already have the key, When I turn rogue, no firewall can stop me • I look like your bank App but hide a cyber trap, Install me once — your data’s in my lap • They clone your number and steal your call, One fake SIM — and your bank account can fall • ...
Huntsville Government Security Crossword 2023-06-02
Across
- The first step you should take when unsecured classified information is found unattended is to ___________ it
- To gain access to a closed space you must have a signed SF 312, Need to know and a _____
- Refer to ____ to determine if something is classified
- When securing a GSA safe or combination lock you must not forget to ____ the dial
- As a cleared employee it is your ______ to safeguard classified material
- Leanne _______ is the Huntsville site FSO
- Loss of aggregated CUI is the one of the most significant risks to national security, directly affecting lethality of our ___________
- if you discover a security incident, infration or violation you would contact your ______ POC for the area
Down
- Report any suspicious ______ that approach you about classified information
- you must _______ any security violation or adverse information
- Certain information requiring protection against unauthorized disclosure in the interests of national defense and security or foreign relations of the United States pursuant to Federal statute or Executive order
- government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies
- Richard _________ is the Huntsville site Industrial Security Manager
- All Visitors must sign a ____
- Unclear visitors must be __________ at all times
- Classified information is ___ to be discussed in open areas
- an ________ threat is someone with access who will use that access for illegal means
- ______ information needs to be self reported such as having a bill go to collections
18 Clues: All Visitors must sign a ____ • Leanne _______ is the Huntsville site FSO • Unclear visitors must be __________ at all times • Refer to ____ to determine if something is classified • Classified information is ___ to be discussed in open areas • you must _______ any security violation or adverse information • ...
PUMPKINS FLY 2013-01-13
Across
- / Conflict region in Sudan where the killings of thousands of civilians by the Janjaweed militias took place in 2003. Action taken by the UN Security Council was weak and ineffective, leading to at least half a million civilian deaths in Sudan.
- / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / Location in Britain where the first Security Council session took place on 17 January 1946.
- / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
- / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
- / Granted permanent membership into the Security Council in 1971.
- / Country that has made the strongest requests for a permanent seat in the UN Security Council other than Brazil, India and Japan.
- / The deliberate and organised massacre of a large group of people, especially those of a particular ethnicity, race or religion. Occurred in Cambodia (1975 - 1978), Rwanda (1994 - 1996) and Germany (1933 - 1945).
- / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
- / Permanent member of the UN Security Council that has used its veto power the greatest number of times.
- / Russian inaction that allowed the UN Security Council to pass the resolution in 1950 that condemned North Korea and called for the deployment of armed forces by member states to aid South Korea.
- / Number of members in the Security Council.
- / UN peacekeeping force sent to Rwanda in 1993 to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out as the conflict between the Rwandese Patriotic Front (RPF) and the official Rwandan Army escalated.
- / Arguably the only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
17 Clues: / Number of members in the Security Council. • / Granted permanent membership into the Security Council in 1971. • / Location in Britain where the first Security Council session took place on 17 January 1946. • / Permanent member of the UN Security Council that has used its veto power the greatest number of times. • ...
Matt's Birthday Crossword 2024-04-05
Across
- not a real meal
- necrophiliac
- fingerling potatoes fan
- your cyber friend
- thank you, in the language of your people
- "matthew"
- adjective describing you
- going to the motherland this summer
Down
- hometown icon
- you and arun found here
- future plateau man
- canadian weeb
- would make a great man
- charlie would not attend ____'s concert
- running pal
- your rival
16 Clues: "matthew" • your rival • running pal • necrophiliac • hometown icon • canadian weeb • not a real meal • your cyber friend • future plateau man • would make a great man • you and arun found here • fingerling potatoes fan • adjective describing you • going to the motherland this summer • charlie would not attend ____'s concert • thank you, in the language of your people
Goodbye Emma 2024-08-13
Across
- emma's position in the 20km
- emma's favorite EFRAG TEG person
- emma's favorite kitchen object
- emma's baby
- emma's achilles heel
Down
- emma's beverage
- emma's favorite task in EFRAG
- emma's spot
- emma's first day axiety
- emma's biggest distraction
- emma's next destination
- emma's lunch break escape
- emma's main research project
13 Clues: emma's spot • emma's baby • emma's beverage • emma's achilles heel • emma's first day axiety • emma's next destination • emma's lunch break escape • emma's biggest distraction • emma's position in the 20km • emma's main research project • emma's favorite task in EFRAG • emma's favorite kitchen object • emma's favorite EFRAG TEG person
:-) 2019-09-20
Across
- Flaw that occurs when untrusted data is sent to an interpreter as part of a command or query and the attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
- Attack using poorly configured XML processors evaluate external entity references within XML documents, which can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.
- Ericssons model to incorporate security and privacy considerations into all phases of product development.
- Flaw that occurs when application functions related to authentication and session management are implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.
- Set of technologies designed to detect conditions indicative of a security vulnerability in an application in its running state.
- Responsible for Ericsson product vulnerability management process, coordination of customer product security incidents and reported security issues affecting Ericsson products, solutions, and services.
- Practice of increasing product security by reducing its attack surface.
Down
- Cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities.
- Recognized as a fundamental human right by the United Nations (UN) in Article 12 of the Universal Declaration of Human Rights
- This Kubernetes Benchmark is a reference document that can be used by system administrators, security and audit professionals and other IT roles to establish a secure configuration baseline for Kubernetes.
- Comprehensive, versatile, automated black box fuzzer that enables organizations to efficiently and effectively discover and remediate security weaknesses in software.
- One of the world’s most popular free security tools for finding security vulnerabilities in web applications.
- Flaw exploited to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files, modify other users' data, change access rights, etc.
- Software testing technique consisting of finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.
- Set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities.
15 Clues: Practice of increasing product security by reducing its attack surface. • Ericssons model to incorporate security and privacy considerations into all phases of product development. • One of the world’s most popular free security tools for finding security vulnerabilities in web applications. • ...
ANALYTICS 2014-08-24
Across
- parses the code and identify constructs that seem to introduce threats.(4, 7)
- technique used to attack data driven applications through code injection (3, 9)
- a weakness that makes a threat possible (13)
- a software that controls the incoming and outgoing network traffic (8)
- the degree of resistance to, or protection from, harm (8)
- an open-source web application security project (5)
- the act of confirming the truth of an attribute of an entity (14)
- process of creating computer software (6)
- an operating system (4)
- provides remote access to a targeted computer system (6)
- a type of network security attack where the attacker takes control of a communication (9)
Down
- a method of bypassing normal authentication (8)
- an attempt to acquire sensitive information by redirecting to a false site (8)
- a safeguard that addresses a threat and mitigates risk (14)
- a list of known good inputs (9)
- an action taken to harm an asset (6)
- dynamic application Security testing (4)
- a list of software weaknesses (3)
- used by attackers to gain unauthorized access to systems or data (6, 8)
- authentication, authorization and accounting (3)
- cross-site Request Forgery (4)
- a character encoding standard (7)
- a malware program (5)
- a possible danger that may act to breach security (6)
- the art of writing or solving secret codes (12)
- cross-site Scripting (3)
26 Clues: a malware program (5) • an operating system (4) • cross-site Scripting (3) • cross-site Request Forgery (4) • a list of known good inputs (9) • a list of software weaknesses (3) • a character encoding standard (7) • an action taken to harm an asset (6) • dynamic application Security testing (4) • process of creating computer software (6) • ...
Extreme Sports 2021-09-23
Across
- Use this element when you do Paragliding
- A security element to do bungee jumping
- Extreme sport in which a person throws himself from a high height,
- A situation similar to dizziness
- A security element that does not allow you to drown
- Extreme sport where you jump out of a plane with a parachute
- Use this security element to protect the head
Down
- Use this element when you're in a dark cave
- Extreme sport that is done in the rapids of a river
- A security element to protect your eyes
- When you broke a bone anywhere in your body
- Activity in which a person is propelled by the wind-down a ravine and uses a parachute
- A natural underground chamber
- A security element to protect your hand from hurting you
14 Clues: A natural underground chamber • A situation similar to dizziness • A security element to protect your eyes • A security element to do bungee jumping • Use this element when you do Paragliding • Use this element when you're in a dark cave • When you broke a bone anywhere in your body • Use this security element to protect the head • ...
Crossword Period 1 2024-06-04
Across
- For insiders only
- Not quite
- Class of conspicuous consumption
- Like teacher's answers, sometimes
- Something precious and portable
- All puffed up
- Like a speech or sermon
- Last ___ of...
- Like the prices on Black Friday or Cyber Monday
Down
- Linked
- Like a famous fictional knight
- Relative of "shy" and "shoo"
- Clownish
- You might have this before a big decision
- Salty or spicy, in speech
- Link
- Something worse than a lecture
- Find intolerable
- Opposite of indifference
19 Clues: Link • Linked • Clownish • Not quite • All puffed up • Last ___ of... • Find intolerable • For insiders only • Like a speech or sermon • Opposite of indifference • Salty or spicy, in speech • Relative of "shy" and "shoo" • Like a famous fictional knight • Something worse than a lecture • Something precious and portable • Class of conspicuous consumption • Like teacher's answers, sometimes • ...
Crossword Period 1 2024-06-04
Across
- For insiders only
- Not quite
- Class of conspicuous consumption
- Like teacher's answers, sometimes
- Something precious and portable
- All puffed up
- Like a speech or sermon
- Last ___ of...
- Like the prices on Black Friday or Cyber Monday
Down
- Linked
- Like a famous fictional knight
- Relative of "shy" and "shoo"
- Clownish
- You might have this before a big decision
- Salty or spicy, in speech
- Link
- Something worse than a lecture
- Find intolerable
- Opposite of indifference
19 Clues: Link • Linked • Clownish • Not quite • All puffed up • Last ___ of... • Find intolerable • For insiders only • Like a speech or sermon • Opposite of indifference • Salty or spicy, in speech • Relative of "shy" and "shoo" • Like a famous fictional knight • Something worse than a lecture • Something precious and portable • Class of conspicuous consumption • Like teacher's answers, sometimes • ...
safe computing assignment 2025-08-06
Across
- Attack traffic to take servers down
- scrambles data for protection
- network of infected computers
- manipulating into confidential info
- hides malware
- records keynotes
- hides IP
- identity check
- stealing data from emails
Down
- watches and sends information to others
- malware disguised as program
- fix for volnurability
- attack targeting vulnerabilities of software
- blocks unauthorized access
- knowledge about cyber threats
- hacking to find flaws
- providing identity
- tries everything to gain access
- locks data until paid for
19 Clues: hides IP • hides malware • identity check • records keynotes • providing identity • fix for volnurability • hacking to find flaws • locks data until paid for • stealing data from emails • blocks unauthorized access • malware disguised as program • scrambles data for protection • network of infected computers • knowledge about cyber threats • tries everything to gain access • ...
Henlo 2023-09-26
10 Clues: uniform • dream job • Best pizza • favorite car • best gf ever • Favorite game • favorite food • Big Stinky Place • Animal with supersonic screeching • Big White Animal (Threat to Society)
Cyber Law (CIA Component 1) 2021-09-04
Across
- ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
- ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
- Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
- This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
- The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
- ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc. (Shortform)
- ___________ was the most prominent cyber paternalistic scholar.
Down
- Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
- The adoption or increase in use of digital or computer technology by an organization, industry, country, etc.
- It is often viewed as the act of sending unsolicited email usually commercial messages.
10 Clues: ___________ was the most prominent cyber paternalistic scholar. • It is often viewed as the act of sending unsolicited email usually commercial messages. • ______is one such constraint in cyber space which allows us to regulate the principle of anonymity. • ...
Cyber Law (CIA Component 1) 2021-09-04
Across
- ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
- ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
- Regulatory __________, seen as a problem for authorities who attempt to capture activities within the web, however it is also seen as a solution to the problems of excessive or inappropriate regulation as it aims in limiting the capacities and boundaries of authorities.
- This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
- The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
- ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc.
- ___________ was the most prominent cyber paternalistic scholar
Down
- Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
- The process where companies, indutries, countries, etc increase the use of digital or computer technology.
- The act of sending unsolicited emails which are usually commercial messages.
10 Clues: ___________ was the most prominent cyber paternalistic scholar • The act of sending unsolicited emails which are usually commercial messages. • ______is one such constraint in cyber space which allows us to regulate the principle of anonymity. • The process where companies, indutries, countries, etc increase the use of digital or computer technology. • ...
SN33003FP Chapter 6 2024-07-06
Across
- Reduces the severity of the loss or the likelihood of the loss from occurring
- Prevent a disaster from occurring
- The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
- Gets critical systems to another location while repair of the original facility is under way
- Avoiding complex solutions that users cannot understand or troubleshoot
- Ability to maintain availability during disruptive events
- Restricting access so that users only have the level of access required to do their job
- It is critical to keep an organization functioning when a disaster occurs
- Manages a complete inventory of hardware and software
- Discover the incident
- Plan for potential incidents
Down
- Creating a barrier of multiple defences to prevent attacks
- Identifies specific hardware and software products that the organization uses and supports
- Breaching one layer of security does not compromise the whole system
- Discover unwanted events
- Investigate the cause of the incident and ask questions to better understand the nature of the threat
- Analyzes the dangers posed by natural and human-caused events to the assets of an organization
- Enhances system reliability and availability by distributing them across multiple physical locations
- Manages a full inventory of hardware and software components that are vulnerable to security risks
- Network protocol that provides for redundancy
- Concealing certain types of information to make it more difficult for cyber criminals to attack a system
- The set of procedures that an organization follows after an event occurs outside the normal range
- Assigns all resources into a group based on common characteristics
- Restore the system after a disaster
- Minimizes risk by staying ahead of cybercriminals
- Ensures system availability in the event of a component failure
- Combines multiple physical hard drives into a single logical unit
- A group of servers that act like a single system
- Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
- Enables a system to continue operating if one or more components fail
- 99.999% uptime, less than 5.26 minutes downtime yearly
31 Clues: Discover the incident • Discover unwanted events • Plan for potential incidents • Prevent a disaster from occurring • Restore the system after a disaster • Network protocol that provides for redundancy • A group of servers that act like a single system • Minimizes risk by staying ahead of cybercriminals • Manages a complete inventory of hardware and software • ...
crossword 2024-12-04
Across
- How old was the granddaughter that was found in a car when her grandmother went missing?
- how many U.S troops are in South Korea?
- How much money is expected to be spent for Cyber Monday?
- What was stuck on train tracks and got hit by a train?
- how many Americans are traveling after the holidays?
- how big is the biggest asteroid that is coming towards Earth?
- What two places have a new ceasefire?
- What did the sinkhole start as the size of?
- What does Hegseth think about women in the military?
Down
- What miles an hour are winds expected to be due to the bad winter storms?
- How many football fields big is the new facility for Cyber Monday?
- Who had U.S hostages?
- Who denies all accusations about sexual misconduct and alcohol abuse?
- What was the name of the bride that was killed in a car crash on her wedding day?
- Next to Wicked, what movie broke box office records?
- How deep is the sinkhole that a grandmother fell in?
- what judge granted many kids adoptions?
- What does James Van Der Beek suffer from?
- Yoon What is the name of the south korea president?
- Where has the bad weather now stretched to in the U.S?
20 Clues: Who had U.S hostages? • What two places have a new ceasefire? • how many U.S troops are in South Korea? • what judge granted many kids adoptions? • What does James Van Der Beek suffer from? • What did the sinkhole start as the size of? • Next to Wicked, what movie broke box office records? • How deep is the sinkhole that a grandmother fell in? • ...
L'aéroport 2021-09-26
14 Clues: flight • customs • airport • luggage • check-in • airplane • suitcase • passenger • passeport • waiting room • security guard • airline ticket • luggage carousel • security checkpoint
UN Structure 2025-03-12
Across
- Settles disputes between UN member states
- Supervised 11 territories until 1994
- Main decision-making body of the UN
- Military forces authorized by the Security Council
- Carries out UN resolutions
- ECOSOC builds partnerships with businesses and these organizations
- Ensures peace and has binding resolutions
Down
- General Assembly must approve this financial plan
- number of Security Council members
- Type of Security Council members elected for two-year terms
- Current UN Secretary-General
- Each UN member state has this amount of votes in the General Assembly
- Penalties imposed by the Security Council
- number of main General Assembly committees
14 Clues: Carries out UN resolutions • Current UN Secretary-General • number of Security Council members • Main decision-making body of the UN • Supervised 11 territories until 1994 • Settles disputes between UN member states • Penalties imposed by the Security Council • Ensures peace and has binding resolutions • number of main General Assembly committees • ...
L'Aeroport 2025-02-25
15 Clues: gate • plane • board • early • customs • bag tag • transfer • pass through • boarding room • boarding pass • baggage claim • direct flight • security/seat belt • passport checkpoint • security checkpoint
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
Risk, cyber security concern 2023-06-13
1.The first thing that your reader to see Answer:HOMEPAGE 2.Construction of pages should start at the start of class Answer:PAGE 3.This is the way for your student to try to capture your personal journey of of learning Answer:REFLECTION 4.This is the b 2025-03-19
Across
- is the basic understanding of HTML,CSS and like creat a shard understanding of what can be done with webpages.
- is teaching students about
- how to select and use digital
- LITERACY
- is the way for your student to try to capture your personal journey of of learning
- and general safety
- and evaluating its validity in order
- around photo posting
- essential part of document management
- is a students should be taught the concepts
- understand copyright laws and property rights for online assets.
- facial recognition
- SOFTWARE
- data,tagging,keywords and catergories to make them aware.
- information from the web and
- applications or services to
Down
- in a globally
- students how to
- arena
- students to be aware and
- viruses, cyber threats,
- cyber bullying etc.
- of pages should start at the start of class
- is use to a video recording using the computer and usually includes an audio
- ARCHIVING
- LETIRACY
- it can be shared
- first thing that your reader to see
- phone numbers etc.
- students how to protect
- ways of knowing how to study and learn in a technology enriched environment.
- information such as
- tasks.
- SKILLS
34 Clues: arena • tasks. • SKILLS • LETIRACY • LITERACY • SOFTWARE • ARCHIVING • in a globally • students how to • it can be shared • and general safety • phone numbers etc. • facial recognition • cyber bullying etc. • information such as • around photo posting • viruses, cyber threats, • students how to protect • students to be aware and • is teaching students about • applications or services to • ...
Security Awareness Puzzle 2019-08-27
Across
- The individual who is charged with overall formulation and management of Security Procedures within LIAT
- An area which makes up the Critical Part of an airport
- An item which may pose a threat to persons or property
- A means of receiving bomb threats
- A Means of controlling access in restricted areas
- Probability of an attack within a specified time frame
- LIATs regulatory authority with aviation
Down
- A major threat to aviation
- an individual responsible for Security at Stations
- a group of personnel who are responsible for access control
- Sensitive or confidential information
- An international organization responsible for Security Matters within aviation worldwide
- The individual who is at the helm of the Security Org Chart
- Part The part of an airport which one must go through security control to have access
14 Clues: A major threat to aviation • A means of receiving bomb threats • Sensitive or confidential information • LIATs regulatory authority with aviation • A Means of controlling access in restricted areas • an individual responsible for Security at Stations • An area which makes up the Critical Part of an airport • An item which may pose a threat to persons or property • ...
The Spill 06/07/21 2021-06-08
Across
- BPS USA belongs to the world's _____________ meat producer.
- What kind of whale has been seen near New York recently?
- In a ____________ attack, hackers target a company's computer system.
Down
- People in Hong Kong wanted to hold a candlelight __________.
- Grand Island is a city in which state?
- "Oceanographic" is a _______________ about ocean studies.
- The Tiananmen ____________ protests were student-led rallies calling for democracy in China.
- A _________ of whales is a group that travels together, hunts together, protects one another, and shares in the care of young.
- A ________ company was targeted by a cyber attack.
- Marine biologists have spotted whales in New York Harbor and the Hudson __________.
10 Clues: Grand Island is a city in which state? • A ________ company was targeted by a cyber attack. • What kind of whale has been seen near New York recently? • "Oceanographic" is a _______________ about ocean studies. • BPS USA belongs to the world's _____________ meat producer. • People in Hong Kong wanted to hold a candlelight __________. • ...
Cybersecurity Month 2023-05-19
Across
- creating a fake identity on a social network account or dating website
- an error, flaw, failure, or fault in a computer or system
- programs that automatically execute tasks as ordered by the creator of the program that has infected them
- after these are downloaded, opened, or executed, your data becomes corrupt
- programs and other operating systems used by a computer
- a type of malicious software that disguises itself as a harmless program
- a cyber attacker
- private network VPN
- an attack when a person or program disguises themselves as another
- malware used to gain access to a user's system or data
- authentication attaching a phone number or email to an account for extra security
- short for malicious software
- breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
- engineering taking advantage of human trust to gain access to private information
Down
- customizable additions to software for extra functionality
- secret word or phrase used to gain access
- method of obtaining user info through fraudulent communications targeted directly at people
- a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
- the way in which the identity of a user is confirmed
- cryptocurrency
- software that automatically displays or downloads material when a user if offline
- a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
- technology IT
- an internet traffic filter meant to stop unauthorized traffic
- the physical and tangible parts of a computer
25 Clues: technology IT • cryptocurrency • a cyber attacker • private network VPN • short for malicious software • secret word or phrase used to gain access • the physical and tangible parts of a computer • the way in which the identity of a user is confirmed • malware used to gain access to a user's system or data • programs and other operating systems used by a computer • ...
Website 2024-07-29
Across
- situs company profile memang untuk menyampaikan informasi penting terkait perusahaan jasa.
- Singkatan dari Content Managemen Sistem
- Cyber security yang bagus
- halaman
- Desain yang unik
- Kumpulan halaman yang digunakan untuk menampilkan informasi teks, gambar, animasi suara atau gabungan dari semuanya baik yang bersifat statis dan dinamis yang membentuk satu rangakain saling terkait, yang masing-masing dihubungkan dengan jaringan terkait
- Menambah gambar, teks, building block
- Skala kecil hingga menengah
- CNN merupakan sebuah website
- Sebuah website yang dibuat untuk menampilkan karya dan prestasi seseorang atau sebuah perusahaan
- Halaman khusus yang dirancang untuk kebutuhan pemasaran digital dan merupakan bagian dari website
- Bentuk aplikasi web yang berbentuk tulisan-tulisan pada sebuah halaman web. Tulisan-tulisan ini sering kali dimuat dalam urutan isi terbaru dahulu sebelum diikuti isi yang lebih lama, meskipun tidak selamanya demikian.
- Website ecommerce
Down
- Situs jual beli
- Terpajang di Website
- tata letak
- akses
- Dukungan multi bahasa, untuk bisnis Internasional
- CMS yang tidak di Install
- Mencari
- Web memberi situs web atau aplikasi web Anda sebuah server atau mesin di internet
- Nama yang mudah diingat yang terkait dengan alamat IP fisik di internet
- Jenis web yang dimiliki oleh seorang individu
- Standar komunikasi data yang digunakan oleh komunitas internet dalam proses tukar-menukar data
- Domain komersial
- organisasi
- Berita
- Penyedia layanan informasi khusus untuk menarik perhatian pembaca supaya masuk pada laman web yang dicari, dan bisa diakses lewat bermacam fitur semacam desktop, mobile, dan tablet.
- Software yang menambahkan fitur tertentu pada suatu program tanpa mengharuskan Anda mengubah program itu sendiri.
- Uniform Resource Locator
30 Clues: akses • Berita • halaman • Mencari • tata letak • organisasi • Situs jual beli • Desain yang unik • Domain komersial • Website ecommerce • Terpajang di Website • Uniform Resource Locator • Cyber security yang bagus • CMS yang tidak di Install • Skala kecil hingga menengah • CNN merupakan sebuah website • Menambah gambar, teks, building block • Singkatan dari Content Managemen Sistem • ...
Commerce Cybersecurity 2025-03-02
Across
- Wrongful or criminal deception intended to result in financial or personal gain.
- Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data.
- A method to hide the actual web address (URL) of a webpage and replace it with another,
- the action or activity of buying goods from shops.
- Importance requiring swift action.
- Relating to or characteristic of the culture of computers, information technology, and virtual reality.
- Getting your money back after a purchase.
- A voluntary promise offered by the person or business who sold the product or service to you.
Down
- Made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- Acronym for Two factor Authentication
- An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
- Make an online service unavailable by overwhelming it with excessive traffic from many locations and sources.
- A legally binding agreement between two or more people
- Commonly known as the Scamming Captial of the world.
- The power or right to give orders, make decisions, and enforce obedience.
- The state of being free from danger or threat.
- When cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information.
- A program inserted into a system to compromise the confidentiality, integrity, or availability of data.
- pay someone for the use of (something, typically property, land, or a car).
- designed to trick you into giving away your money or your personal details.
20 Clues: Importance requiring swift action. • Acronym for Two factor Authentication • Getting your money back after a purchase. • The state of being free from danger or threat. • the action or activity of buying goods from shops. • Commonly known as the Scamming Captial of the world. • A legally binding agreement between two or more people • ...
Cyber bullying 2013-10-30
Across
- rules that people have agreed to follow
- if a website can be _______ its not a hack
- a right that people have
- to be apart of a civilisation
- on a screen
- when two people agree
- talking
- being mean
Down
- a source of multimedia
- talking by typing sentences to each other via phone or mobile
- bullying some one in the virtual world
- a situation
- a cable has a _________ between the computers
13 Clues: talking • being mean • a situation • on a screen • when two people agree • a source of multimedia • a right that people have • to be apart of a civilisation • bullying some one in the virtual world • rules that people have agreed to follow • if a website can be _______ its not a hack • a cable has a _________ between the computers • ...
Cyber safety 2013-11-03
Across
- up advertisements that pop up on your screen
- a person who breaks into someones personal online information
- a personal web page where you can put anything you want up there
- this is a program taht allows you to access a bunch of information
- the arrow
- where you can share websites with your friends
- its when your computer gets sick because of a terrible problem
Down
- a search engine
- a series of letters and numbers to protect your account
- when you transfer interent information to your computer
- room a online entertainment thing that allows you to chat to other people
- mail sent electronically anywhere
- bulling using the internet to bully people
13 Clues: the arrow • a search engine • mail sent electronically anywhere • bulling using the internet to bully people • up advertisements that pop up on your screen • where you can share websites with your friends • a series of letters and numbers to protect your account • when you transfer interent information to your computer • ...
Cyber safety 2013-11-03
Across
- up advertisements that pop up on your screen
- a person who breaks into someones personal online information
- a personal web page where you can put anything you want up there
- this is a program taht allows you to access a bunch of information
- the arrow
- where you can share websites with your friends
- its when your computer gets sick because of a terrible problem
Down
- a search engine
- a series of letters and numbers to protect your account
- when you transfer interent information to your computer
- room a online entertainment thing that allows you to chat to other people
- mail sent electronically anywhere
- bulling using the internet to bully people
13 Clues: the arrow • a search engine • mail sent electronically anywhere • bulling using the internet to bully people • up advertisements that pop up on your screen • where you can share websites with your friends • a series of letters and numbers to protect your account • when you transfer interent information to your computer • ...
Cyber Puzzle 2023-03-30
Across
- fraudulent practice of sending emails or other messages in order to induce individuals to reveal personal or sensitive information
- authentication method which requires two or more verification factors
- accuracy, completeness and consistency of data
- a person or thing likely to cause damage or danger
- making sure that no sensitive information on a monitor when left unattended
Down
- a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it
- attempt to exploit a computer system or a private network inside a computer
- the process of modifying sensitive date in such a way that it is no or little value to unauthorized intruders
- a senior-level executive responsible for developing and implementing an information security program
- regulations, rules and practices that prescribe how to manage, protect and distribute information
- type of malicious software designed to block access
- attempt to destroy, alter, disable or gain access to an asset
- a copy of data made in case the original is lost or damaged
13 Clues: accuracy, completeness and consistency of data • a person or thing likely to cause damage or danger • type of malicious software designed to block access • a copy of data made in case the original is lost or damaged • attempt to destroy, alter, disable or gain access to an asset • authentication method which requires two or more verification factors • ...
cyber bullying 2022-11-11
Across
- if you made a video or a picture online
- if people said something that isn't true
- do's and dont's
- you bully someone online
- if you aren't kind to someone
- when you try to kill yourself
Down
- when people always know where you are
- if you write something on a post
- something you can send messages and call
- if you dont have any friends
- different websites
- if you tease someone every day
- if you are on a website
13 Clues: do's and dont's • different websites • if you are on a website • you bully someone online • if you dont have any friends • if you aren't kind to someone • when you try to kill yourself • if you tease someone every day • if you write something on a post • when people always know where you are • if you made a video or a picture online • something you can send messages and call • ...
Cyber Cross 2024-02-06
Across
- Fraudulent text messages
- The address of a webpage
- Widely used in home network
- Secret messages
- Wireless technology standard over short distances
- Fraudulent mail
Down
- Fraudulent phone calls or voice messages
- where people can access internet via WiFi
- Facebook,instagram,Twitter etc are...
- A type of malicious software used to retrieve sensitive information from user
- Should be constructed of upper case,special characters etc
- Hardware or software to prevent unauthorized access to or from a private network
- Threatening behaviour facilitated through text messages
13 Clues: Secret messages • Fraudulent mail • Fraudulent text messages • The address of a webpage • Widely used in home network • Facebook,instagram,Twitter etc are... • Fraudulent phone calls or voice messages • where people can access internet via WiFi • Wireless technology standard over short distances • Threatening behaviour facilitated through text messages • ...
Cyber Safety 2024-03-28
Across
- Clue: A set of rules or processes followed by computer programs, especially search engines or social media platforms, to determine the order and presentation of content to users.
- Clue: A type of malicious software that can replicate itself and spread to other computers.
- Clue: A secret combination of characters used to access a user's account.
- Clue: Digitally manipulated videos or images that convincingly depict someone saying or doing something they never did.
- Clue: Someone who has the power to affect the purchasing decisions or opinions of others because of their authority, knowledge, position, or relationship with their audience on social media.
- Clue: A digital effect you can put over a video or photo to change your real appearance.
- Clue: A word or phrase preceded by the pound sign (#) used to categorize content on social media.
- Clue: Harassing or intimidating someone online is known as this.
Down
- Clue: A company pays for their product or service to be the first result you see.
- Clue:Information that identifies an individual, such as their name, address, phone number, or email, often collected by companies for various purposes
- Clue: This is your personal page on a social networking site where you share information about yourself.
- Clue: The process of selecting specific criteria, such as demographics or interests, to display ads to a particular audience.
- Clue: Associating a person or page with a post or photo on social media.
13 Clues: Clue: Harassing or intimidating someone online is known as this. • Clue: Associating a person or page with a post or photo on social media. • Clue: A secret combination of characters used to access a user's account. • Clue: A company pays for their product or service to be the first result you see. • ...
cyber bezpieczeństwo 2025-04-16
Across
- o zbiór zasad dotyczących pozytywnych zachowań w sieci, a te wpływają też na naszebezpieczeństwo
- czyli nadmierna wylewność online
- to złośliwe oprogramowanie, mogące przysporzyć nie lada kłopotów.
- kopia zapasowa danych przechowywana w innych miejscach niż ichoryginalne wersje.
- monitoruje Waszą aktywność na urządzeniu.
- bezpieczeństwo w sieci
- paniczny strach przed brakiem dostępu do telefonu podłączonego do internetu
- Systematyczna instalacja nowszych,poprawionych wersji
Down
- służą właśnie do tworzenia losowychkombinacji różnych znaków, co ma nam dać silne zabezpieczenie.
- filmy transmisje na żywo – które prezentują zachowania uznawane za szkodliwe i destrukcyjne.
- o cyberprzestępca, który wykorzystujebłędy, luki i złośliwe oprogramowanie (malware), by przeprowadzić atak.
- o swoisty identyfikator użytkownika sieci lub systemu komputerowego.Swoją nazwę możecie wymyślić sami
- o unikatowy numer identyfikacyjny nadawanyurządzeniom podłączonym do sieci (np. komputerom, tabletom).
13 Clues: bezpieczeństwo w sieci • czyli nadmierna wylewność online • monitoruje Waszą aktywność na urządzeniu. • Systematyczna instalacja nowszych,poprawionych wersji • to złośliwe oprogramowanie, mogące przysporzyć nie lada kłopotów. • paniczny strach przed brakiem dostępu do telefonu podłączonego do internetu • ...
Cyber Ethics 2025-06-10
Across
- Simplest way to prevent plagiarism
- Software is copied and distributed illegally
- Process of transforming data into unreadable code
- Spamming untill mail server gets full
- Illegal intrusion into computer
Down
- Being aware of ethical practices and behaving appropriately in internet
- Act of imitating another person's original work
- Another name for digital footprints
- Equivalent term to hacking
- Hacking done for good purposes
- Unwanted bulk resources from unknown sources
- Act of stealing and misusing someone's personal information
- Security system that prevents unauthorised people from accessing your account
13 Clues: Equivalent term to hacking • Hacking done for good purposes • Illegal intrusion into computer • Simplest way to prevent plagiarism • Another name for digital footprints • Spamming untill mail server gets full • Software is copied and distributed illegally • Unwanted bulk resources from unknown sources • Act of imitating another person's original work • ...
Cyber Threats 2025-10-28
Across
- Targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises
- Can execute itself and spread by infecting other programs or files.
- Use a false promise to pique a victim
- Uses trial and error to crack passwords
- malicious software designed to harm or exploit computer systems.
- Collects information and data on the device and user
- Victims are bombarded with false alarms and fictitious threats
Down
- trick individuals into sharing sensitive information
- Appears as a legitimate software program to gain access to a system.
- Uses psychological manipulation to trick users into making security mistakes.
- Encrypts files on a victim's computer and demands a ransom payment in exchange for the decryption key.
- Tracks a user's browser and download history with the intent to display pop-up
- self-replicate without a host program and typically spreads without any interaction from the malware authors.
13 Clues: Use a false promise to pique a victim • Uses trial and error to crack passwords • trick individuals into sharing sensitive information • Collects information and data on the device and user • Victims are bombarded with false alarms and fictitious threats • malicious software designed to harm or exploit computer systems. • ...
Spanish 2 Ch 11 Vocabulario P1 2021-03-19
Across
- A trip by airplane
- Passengers
- Taxi
- Agent
- Boarding pass
- To inspect or to check
- Passport
- Luggage claim ticket
- Flight number
- Carry on luggage
- Departure/arrival screen
- Suitcases
- No smoking section
Down
- Baggage or luggage
- Ticket
- Before the flight
- Security check
- Departure gate
- Airport
- Seat number
- Ticket
- Scales
- Security
- Counter
- Destination
- Porter
26 Clues: Taxi • Agent • Ticket • Ticket • Scales • Porter • Airport • Counter • Security • Passport • Suitcases • Passengers • Seat number • Destination • Boarding pass • Flight number • Security check • Departure gate • Carry on luggage • Before the flight • Baggage or luggage • A trip by airplane • No smoking section • Luggage claim ticket • To inspect or to check • Departure/arrival screen
46a 2024-07-11
Across
- Video cable
- Touchscreen pen
- Fast storage
- Wired network
- Video recorder
- Data connector
- Physical tech
- Network security
- Power source
- Phone chip
- Internet distributor
- Power adapter
- Data storage
Down
- Data storage
- Online storage
- Image display
- Computer program
- Network host
- Portable storage
- Small headphones
- Web finder
- Security software
- Connector device
- Internet tool
- Mobile software
25 Clues: Web finder • Phone chip • Video cable • Data storage • Fast storage • Network host • Power source • Data storage • Image display • Wired network • Physical tech • Internet tool • Power adapter • Online storage • Video recorder • Data connector • Touchscreen pen • Mobile software • Computer program • Portable storage • Small headphones • Network security • Connector device • Security software • Internet distributor
Bullying 2024-08-04
Across
- Someone who supports or defends victims of bullying
- Forms of bullying carried out through electronic media
- The act of ridiculing or insulting someone's body
- an intentional act of physical violence to harm another person.
Down
- the act of hurting or making another person feel uncomfortable, either physically or emotionally
- One of the social media used by cyber bullying perpetrators
- Forms of bullying that use hurtful words
- One form of physical violence received by victims of bullying
- Persuading others not to be friends with someone is one of what forms of bullying?
9 Clues: Forms of bullying that use hurtful words • The act of ridiculing or insulting someone's body • Someone who supports or defends victims of bullying • Forms of bullying carried out through electronic media • One of the social media used by cyber bullying perpetrators • One form of physical violence received by victims of bullying • ...
stego 2023-08-01
Across
- .... .... was an anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
Down
- u icy data
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- Lbrozz Ignceunywfz Gkwdrz; key - information
9 Clues: u icy data • Rhysider 44. • Lbrozz Ignceunywfz Gkwdrz; key - information • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Shadowy cyber collective widely known because of its work since 02.2022. • Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS. • ...
Network and Security 2024-07-24
Across
- A secret word or phrase that is used to access a computer system or service.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Code that is embedded into the hardware of a computer.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- programs that automatically execute tasks as ordered by creator
- form of cryptocurrency
- Stands for the National Security Agency
- The method of obtaining user information through fraudulent communications targeted directly at people.
- two words. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior
- Text that can be read by the human eye
- creating a fake identity on social network account
- A weakness in a computer system or network that can be exploited by attackers.
- any action that makes a computer system vulnerable
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
- Customizable additions to software for extra functionality
- an error, flaw, failure, or fault
20 Clues: form of cryptocurrency • an error, flaw, failure, or fault • Text that can be read by the human eye • Stands for the National Security Agency • creating a fake identity on social network account • any action that makes a computer system vulnerable • Code that is embedded into the hardware of a computer. • Customizable additions to software for extra functionality • ...
Puzzle #50 – “History of Social Security” 2025-06-30
Across
- - Economic crisis that led to the program's creation
- - Year the Social Security Act became law
- - First monthly ______ were paid in 1940
- - Social Security was passed as this type of legal document
Down
- - People who fund Social Security through payroll taxes
- - Study of how Social Security began and evolved
- - President who signed Social Security into law
- - Original purpose of the Social Security program
- - Where collected Social Security taxes are stored
- - Agency created to manage the program
10 Clues: - Agency created to manage the program • - First monthly ______ were paid in 1940 • - Year the Social Security Act became law • - President who signed Social Security into law • - Study of how Social Security began and evolved • - Original purpose of the Social Security program • - Where collected Social Security taxes are stored • ...
CISO Crossword Quiz - 1425 2025-01-15
Across
- IP_______ is a technique in which hackers change IP address of sender's email id
- Portal by MHA to report fraud Phone calls, SMS & WhatsApp calls or messages
- USB_____ is a type of cyber attack that involves stealing sensitive information using an infected USB drive as a bait for the victim.
- ____bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met
- The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files or systems
Down
- Credential ________ is a type of cyber attack in which the attacker uses stolen login credentials to access a network using large scale automated login requests
- A form of phishing that targets high-profile individuals
- Cyber_______ are the best practices for keeping digital devices and online accounts clean and secure from cyber attacks
- A type of social engineering attack that impersonates a trusted entity to steal information
- The ability of individual to understand and exercise control over how information about themselves may be used by others
10 Clues: A form of phishing that targets high-profile individuals • Portal by MHA to report fraud Phone calls, SMS & WhatsApp calls or messages • IP_______ is a technique in which hackers change IP address of sender's email id • A type of social engineering attack that impersonates a trusted entity to steal information • ...
fantascienza e info 2024-11-27
Across
- Specie cyber-organica di Star Trek
- Operazione di trasferimento di dati su internet
- Abbreviazione per intelligenza artificiale
- Relativo ai neuroni, spesso usato in reti neurali artificiali
- Un miliardo di byte
- Gigantesco robot pilotato, tipico dell’anime e della fantascienza
- Macchina automatica capace di replicare azioni umane
- Il luogo dove si svolgono molte storie di fantascienza
- Rete informatica globale
- Informazioni digitali elaborate dai computer
- Veicolo autonomo spesso utilizzato in scenari futuristici
- Creatura metà uomo e metà macchina
- Abbreviazione per realtà virtuale
- Computer che fornisce servizi ad altri
- Barriera di sicurezza digitale
- Famoso film di fantascienza e ambiente virtuale
- Personaggio magico spesso associato a mondi virtuali e giochi
Down
- Prefisso che indica il mondo digitale o virtuale
- Materiale immaginario, debolezza di Superman
- Esperto di informatica, a volte protagonista di romanzi cyberpunk
- Unità minima di un'immagine digitale
- Pianeta natale di Superman, spesso citato in fantascienza
- Sequenza di istruzioni per risolvere un problema
- Truffa informatica che mira a carpire dati personali
- Unità minima di informazione digitale
- Raggio di luce utilizzato in fantascienza e scienza
- Otto bit, l'unità base per i dati in informatica
- Software che controlla l’hardware
- Flusso di dati, tipico di contenuti multimediali online
- Robot umanoide spesso presente nella fantascienza
30 Clues: Un miliardo di byte • Rete informatica globale • Barriera di sicurezza digitale • Software che controlla l’hardware • Abbreviazione per realtà virtuale • Specie cyber-organica di Star Trek • Creatura metà uomo e metà macchina • Unità minima di un'immagine digitale • Unità minima di informazione digitale • Computer che fornisce servizi ad altri • ...
The hardest crossword puzzle EVERRR 2022-11-16
Across
- Someone fraudulently trying to gain access to an unauthorized system.
- Any security practice put in place to mitigate a security event or incident from occurring.
- Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
- Most useful tool in cybersecurity, pretty much.
- The practice of utilizing trial and error to guess credentials.
- Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
- Copies of data
- A condiment
- describes a minor disruption to the digital landscape that is thought to be unintentional
Down
- A data file through which the identity, authenticity and reliability of a website or web application is established.
- Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
- A possibility of being attacked or harmed
- responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
- A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.
15 Clues: A condiment • Copies of data • A possibility of being attacked or harmed • Most useful tool in cybersecurity, pretty much. • The practice of utilizing trial and error to guess credentials. • Someone fraudulently trying to gain access to an unauthorized system. • Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of? • ...
Security Awareness Month 'SAM' June 2014 2014-05-19
16 Clues: Hazard • Private • Alertness • Information • Safeguarding • Firmly fixed • On your guard • Feel protected • Anagram ssapse • Mentally lively • Security device • Feeling of worry • Free from danger • Set of principles • Opposite of answers • Touchy easily upset
SOCIETAL EMPACT (TANISHKA JHA) 2022-01-02
Across
- Digital footprints we intentionally leave online
- ____ is a person who sows discord on internet by posting off topic messages.
- To prevent the loss of personal info to criminals or pollution send the non-usable devices to a certified ____________ .
- The activity history stored online is__________
- The information uploaded online is stored in the ________ .
- ______ is giving threats online or posting victim's personal info etc.
- Not responding to unnecessary and irrelevant emails or comments is being _________ .
- We shouldn't use ____________ materials without the permission of the creator or owner.
Down
- Respect the ____________ of the people in terms of knowledge and experience.
- Digital ________ work on a unique digital ID issued by a CA to the user.
- Cyber Appellate ___________ has been established to resolve disputes arising from cyber crime.
- We can ________ our used electronic gadgets to trustful organizations that can give it to the needy who cannot afford it otherwise.
- To think before uploading is being ____________ .
- What is an example of cloud shared storage?
- A person's ________ is judged before relying on said person's comments and claims online.
- Digital footprints trail we unintentionally leave online
- ___________ include old mobile phones , CDs or pen drives.
- Our digital footprints cannot be ___________ deleted.
18 Clues: What is an example of cloud shared storage? • The activity history stored online is__________ • Digital footprints we intentionally leave online • To think before uploading is being ____________ . • Our digital footprints cannot be ___________ deleted. • Digital footprints trail we unintentionally leave online • ...
Famous 1963 Pop Culture and Inventions 2023-11-11
Across
- Jean Nidetch founded this now (in)famous organization
- Chinese actor and film producer best known for his prowess in martial arts
- layered, like an onion (or an ogre), he's a man of many talents and accents!
- first liver ____ and lung ____ surgeries are performed
- rapper Leon Ivey Jr's stage name, can be synonymous with "okie dokie"
- this alternative to rotary dial was first made publicly available by Bell Systems
- athlete Jordan's first name was the most popular for boys in 1963
- introduced in 1963, these would become the dominant music format in the 1980s
- first name of the first Black Miss America, was later prolific on screen and stage
- last name of American director whose films contain copious amounts of violence, gore, and profanity
Down
- played a pirate, a chocolatier, and a chocolatier's boyfriend
- psychedelic showpieces that now help cyber security companies generate random numbers
- a drink ML would never enjoy, quick fix way of consuming caffeine
- time traveling adventurer whose first episode aired 3 days after ML was born
- shares a birthday with ML! This actress voiced the character Mulan in Disney's 1998 animated film
- Doug Englbart's solution for controlling a pointer on a graphic display, this electronic "rodent" is still widely used today
- released in '63, this Hitchcock film's titular creatures begin attacking humans
- actress whose quirky character frequently performed the song "Smelly Cat"
- vaccine for this childhood disease was made available
- John who will always be "Uncle Jesse"
- first to earn People magazine's "Sexiest Man Alive" title twice
21 Clues: John who will always be "Uncle Jesse" • Jean Nidetch founded this now (in)famous organization • vaccine for this childhood disease was made available • first liver ____ and lung ____ surgeries are performed • played a pirate, a chocolatier, and a chocolatier's boyfriend • first to earn People magazine's "Sexiest Man Alive" title twice • ...
Module 3 LU1 &LU2 2025-04-02
Across
- Which QA activity ensures that team members follow defined standards and guidelines?
- Which aspect of QA focuses on refining procedures to enhance efficiency and effectiveness?
- What testing method ensures software can handle expected workload and stress?
- What is the final testing phase where end-users confirm the software meets their needs?
- What are issues or errors found in the software that testing aims to identify and fix?
- Which test objective ensures software adheres to legal, regulatory, and contractual requirements?
- What is a static testing method that checks documents, designs, and specifications without executing code?
- Which testing phase ensures different components work together seamlessly?
- What is the core element being assessed in testing to ensure quality and functionality?
- What is the process of identifying the fundamental reason behind a defect?
- Which comprehensive testing phase evaluates the entire software application for expected performance?
Down
- What process focuses on preventing defects rather than just detecting them?
- What is the process of locating and fixing defects found during testing?
- Which process involves tracking and managing defects until resolution?
- What measures how consistently software performs over time without failure?
- Which important aspect of testing ensures protection against cyber threats and vulnerabilities?
- What proactive measure involves reviewing code to prevent defects?
- What is a dynamic testing process that involves executing code to confirm it meets requirements?
- What testing activity involves running test cases and documenting results?
- Which technique ensures software is built correctly according to specifications?
- Which testing process ensures that software meets user needs and requirements?
- What is another term for flaws or issues found in software during testing?
22 Clues: What proactive measure involves reviewing code to prevent defects? • Which process involves tracking and managing defects until resolution? • What is the process of locating and fixing defects found during testing? • What testing activity involves running test cases and documenting results? • ...
CIA Triad 2024-10-07
Across
- Organizing data based on sensitivity.
- Protecting information from unauthorized access.
- Converting data into a secure format.
- Control over who can view or use data.
- Assessing security practices and compliance.
- Creating a unique representation of data.
- Additional resources to ensure availability.
- Responsible handling of data.
- Guaranteeing information is available when needed.
Down
- Following regulations and standards.
- An occurrence that may compromise security.
- Events that hinder access to data.
- Verifying data integrity through calculations.
- Ensuring data remains unaltered and trustworthy.
- Informing users about security practices.
- Potential causes of data breaches or loss.
- Creating copies of data for restoration.
- Actions taken to minimize risks or impacts.
- Verifying the source and integrity of data.
- Confirming user identity before access.
20 Clues: Responsible handling of data. • Events that hinder access to data. • Following regulations and standards. • Organizing data based on sensitivity. • Converting data into a secure format. • Control over who can view or use data. • Confirming user identity before access. • Creating copies of data for restoration. • Informing users about security practices. • ...
Media and Technology 2020-11-17
Cyberbullying 2024-11-08
11/10 Fndts Vocab 2021-11-10
Across
- The background of the project where the Actors are placed
- Hackers ethical hackers use skills for good, ethical and legal purposes to compromise networks/systems to discover network vulnerabilities in order to be fixed by developers
- stops character from leaving a trial
- Persistent Threat a continuous computer hack that occurs under the radar against a specific object
- uses quotations marks at the beginning and end of this data; not recognized by the programming software
- The order in which steps or events happen
- determines how quickly an object will move through commands
- A set of known actions that the computer can perform
- A Tynker character or object that can talk and interact with others
- this code is used to move objects forward
Down
- Hackers individuals who commit crimes and unethical things, not for personal gain or damage, but to allow the affected organization to know of compromised or weakness in networks
- uses a hashtag to begin the text that is unrecognized by the programming software used for informational purposes only
- has character start drawing a trail
- Broker grey hat hackers: attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
- Warning Systems provide information about potential attacks
- The language that tells a computer what to do
- A specific action or instruction that tells the computer to do something
- Moves Tracy to a specified coordinate
- Domains an area to be protected may be limited by a logical or physical boundary
- Hackers unethical criminals that violate computer/network security
20 Clues: has character start drawing a trail • stops character from leaving a trial • Moves Tracy to a specified coordinate • The order in which steps or events happen • this code is used to move objects forward • The language that tells a computer what to do • A set of known actions that the computer can perform • The background of the project where the Actors are placed • ...
Cyber Bullying 2015-03-09
Across
- the form of bullying by fighting in order to harm the victim.
- which social media site has the logo of an F?
- the opposite of up stander. someone who is present at an event but does not get involved.
- most cyber bullying is carried out online using a mobile .....
- which social media site has the logo of a bird?
Down
- someone who stands up for something
- which social media app is used to send photographs?. This app has a yellow logo.
- the form of bullying used online.
- where somebody attempts to take their own life.
- the form of bullying that relies on the use of language (shouting.)
10 Clues: the form of bullying used online. • someone who stands up for something • which social media site has the logo of an F? • where somebody attempts to take their own life. • which social media site has the logo of a bird? • the form of bullying by fighting in order to harm the victim. • most cyber bullying is carried out online using a mobile ..... • ...
TTS REVOLUSI INDUSTRI 2025-09-22
Across
- Revolusi Industri kedua ditandai dengan penggunaan listrik secara luas (marketing 2.0)
- Era marketing yang memakai teknologi canggih untuk meningkatkan pengalaman manusia (Marketing 5.0)
- Revolusi Industri ketiga ditandai dengan hadirnya komputer dan otomatisasi (marketing 3.0)
- Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan (Marketing 3.0)
Down
- Era marketing yang menekankan komunitas, keberlanjutan, dan tanggung jawab sosial (Marketing 6.0)
- Revolusi Industri keempat dikenal dengan istilah cyber physical system (marketing 4.0)
- Era marketing yang berfokus pada kebutuhan dan keinginan konsumen (Marketing 2.0)
- Era marketing yang menggabungkan pemasaran tradisional dengan dunia digital (Marketing 4.0)
- Era marketing yang berorientasi pada produk (Marketing 1.0)
- Revolusi Industri pertama ditandai dengan penemuan mesin uap (marketing 1.0)
10 Clues: Era marketing yang berorientasi pada produk (Marketing 1.0) • Revolusi Industri pertama ditandai dengan penemuan mesin uap (marketing 1.0) • Era marketing yang berfokus pada kebutuhan dan keinginan konsumen (Marketing 2.0) • Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan (Marketing 3.0) • ...
Match the Card to the Duelist 2023-04-06
Across
- Elemental HERO Divine Neos
- Cyber End Dragon
- Bloom Diva the Melodious Choir
- Number 106: Giant Hand
- Earthbound Immortal Ccapac Apu
- Red Dragon Archfiend
- Super Vehicroid Jumbo Drill
- Abyss Actor - Superstar
- Stardust Dragon
- Earthbound Immortal Wiraqocha Rasca
- Jinzo
- Black Rose Dragon
- Dark Necrofear
- Harpie Lady Sisters
- Ice Beast Zerofyne
- Masked Beast Des Gardius
- Gandora the Dragon of Destruction
- The Legendary Fisherman
- Duza the Meteor Cubic Vessel
- Ancient Fairy Dragon
- Malefic Truth Dragon
- Cyber Commander
- Borreload Dragon
- Pumpking the King of Ghosts
- Curse Necrofear
- Trickstar Holly Angel
- Maiden in Love
- Tin Archduke
- Rainbow Dragon
- Infernity Doom Dragon
- Evil HERO Malicious Fiend
- Gouki The Great Ogre
- Red-Eyes Black Dragon (Good User)
- Volcanic Doomfire
- Gate Guardian
Down
- Galaxy-Eyes Photon Dragon
- Fairy Cheer Girl
- Ojama King
- Indiora Doom Volt the Cubic Emperor
- Yubel
- Fortune Fairy Chee
- Destiny Hero - Plasma
- Number 39: Utopia
- Salamangreat Heatleo
- Orgoth the Relentless
- Insect Queen
- Power Tool Dragon
- Black-Winged Dragon
- Odd-Eyes Pendulum Dragon
- Ancient Gear Golem
- D/D/D Doom King Armageddon
- Goyo Guardian
- Sephylon, the Ultimate Timelord
- Number 32: Shark Drake
- Number 15: Gimmick Puppet Giant Grinder
- Water Dragon
- Dark Rebellion Xyz Dragon
- Raidraptor - Rise Falcon
- Blue-Eyes White Dragon (Primary User)
- T.G. Halberd Cannon
- Lava Golem
- Number 6: Chronomaly Atlandis
- Cyber Blader
- Dark Magician (Good User)
- Relinquished
- Decode Talker
- Blue-Eyes White Dragon (Secondary User)
- Earthbound Immortal Aslla Piscu
- Dark Magician Girl
- Superdreadnought Rail Cannon Gustav Max
- Mine Golem
- Ultimate Tyranno
- Fossil Warrior Skull King
- Meklord Emperor Wisel
- Frightfur Bear
- Red-Eyes Black Dragon (Evil User)
- Superheavy Samurai Big Benkei
- Arcana Force EX - The Light Ruler
- Barrel Dragon
- Elemental HERO Neos
- Blast Held by a Tribute
- Dark Magician (Evil User)
- Meklord Astro Mekanikle
- Embodiment of Apophis
84 Clues: Yubel • Jinzo • Ojama King • Lava Golem • Mine Golem • Insect Queen • Water Dragon • Cyber Blader • Relinquished • Tin Archduke • Goyo Guardian • Decode Talker • Barrel Dragon • Gate Guardian • Dark Necrofear • Frightfur Bear • Maiden in Love • Rainbow Dragon • Stardust Dragon • Cyber Commander • Curse Necrofear • Fairy Cheer Girl • Cyber End Dragon • Borreload Dragon • Ultimate Tyranno • Number 39: Utopia • ...
stego 2023-08-01
Across
- .... .... was an anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
Down
- u icy data
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- Lbrozz Ignceunywfz Gkwdrz; key - information
9 Clues: u icy data • Rhysider 44. • Lbrozz Ignceunywfz Gkwdrz; key - information • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Shadowy cyber collective widely known because of its work since 02.2022. • Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS. • ...
Shields and Scrubs Issue #1 2025-08-07
Across
- A tool to assess agitation: Staring, Tone, Anxiety, Mumbling, Pacing.
- Outpatient care setting included in recent safety assessments.
- To calm a tense or aggressive situation.
- If a caller makes these, it may be time to end the call.
- A phone feature that can help reset a tense moment.
- Setting these respectfully can help prevent escalation.
- Team focused on keeping everyone safe across all campuses.
- Calm, clear ________ helps reduce verbal abuse.
Down
- Essential for a safe workplace—no one does it alone.
- A feeling that empathy and listening can help ease.
- Manager overseeing security at ambulatory and admin locations.
- Security Manager at WCMC focused on violence prevention.
- Chief of Security who shares tips in “Chief’s Corner.”
- What all verbal abuse incidents should be promptly turned in as.
- Showing empathy can help build this with others.
- System used to report workplace violence and safety incidents.
- Along with ambulatory, one area Andy helps protect.
- Always treat others with this—even under stress.
- Vocal quality that can calm or escalate a situation.
- Acronym for Walnut Creek Medical Center.
20 Clues: To calm a tense or aggressive situation. • Acronym for Walnut Creek Medical Center. • Calm, clear ________ helps reduce verbal abuse. • Showing empathy can help build this with others. • Always treat others with this—even under stress. • A feeling that empathy and listening can help ease. • A phone feature that can help reset a tense moment. • ...
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
Cyber Security October'23 2023-10-10
Across
- A common method used by cybercriminals to trick people.
- What you should do with your passwords to make them more .
- A program that can protect your computer from viruses and malware.
Down
- Malicious software that can damage your computer or steal your data.
- The act of keeping your sensitive information secret online.
5 Clues: A common method used by cybercriminals to trick people. • What you should do with your passwords to make them more . • The act of keeping your sensitive information secret online. • A program that can protect your computer from viruses and malware. • Malicious software that can damage your computer or steal your data.
Financial Market 2025-05-15
Across
- A customized contract to buy or sell at a predetermined future date and price.
- A debt security with a promise to pay a certain sum.
- – An authority supervising the financial market.
- A derivative financial instrument granting the right, but not the obligation, to execute a transaction.
- A debt security confirming the issuer's obligation to repay the debt.
- A financial instrument based on the value of an underlying asset.
- The main instruments traded in the financial market.
- A monetary loan provided under conditions of repayment and interest.
- Long-term financial resources.
- An organized market where financial instruments are traded.
Down
- A place where financial assets are bought and sold.
- A security representing ownership in a company.
- Risk management through derivative contracts.
- A system of economic relations for forming and using monetary funds.
- A measure of investment efficiency.
- A standardized exchange-traded contract for future delivery.
- An intermediary in financial market transactions.
- A party that allocates capital to generate profit.
- A security that represents a bank deposit.
- A universal medium of exchange.
20 Clues: Long-term financial resources. • A universal medium of exchange. • A measure of investment efficiency. • A security that represents a bank deposit. • Risk management through derivative contracts. • A security representing ownership in a company. • – An authority supervising the financial market. • An intermediary in financial market transactions. • ...
SOCIAL MEDIA 2021-05-01
14 Clues: abonné • publier • détestable • l'humiliation • hors connexion • la haine de soi • l'estime de soi • mettre en valeur • le cyber-harcèlement • un(e) pré-adolescent(e) • le financement participatif • qui est sur la même longueur d'ondes • la peur d'être séparé de son portable • personne qui peut influencer les goûts des autres
Science, Technology, and Society 2024-12-15
Across
- computing: Processing data near its source.
- New or improved ideas/products.
- Literacy: Understanding media messages.
- Highest biological group.
- Water vapor in the sky.
- Machine for processing information.
- Exists in a digital world.
- oxide: Laughing gas and pollutant.
- Holding radical views.
- Group of related organisms.
- Range of different things.
- Level under class.
- Basic unit of biological classification.
- Early device to play music.
- change: Global weather patterns shifting.
- Division: Separation within society.
- Games: Interactive digital entertainment.
- Level below phylum.
- Grouping above species.
- resources: Freshwater supply.
- Day-to-day atmospheric conditions.
- hacker: Legal cybersecurity tester.
- Prevents infectious diseases.
- World becoming interconnected.
- Unrest: Protests or disturbances in society.
- Global network of networks.
- Classification of living things.
- warming: Rising Earth's temperatures.
- Services for maintaining health.
- security: Reliable access to food.
- Key electronic component.
- Tools to make life easier.
- Long-term weather patterns.
- Organized in levels.
Down
- Related to DNA or heredity.
- Traffic or decision-making standstill.
- Using resources too much.
- media: Online platforms to connect people.
- A machine to write letters.
- Enhances reality with digital elements.
- security: Protecting digital information.
- migration: Large-scale movement of people.
- Mini computer in your pocket.
- Digital letter service.
- Keeping personal information safe.
- Early system to send messages.
- induced: Caused by nature.
- wide web: Connects websites globally.
- Potent greenhouse gas.
- Community of living and nonliving things.
- Second level in classification.
- gases: Trap heat in Earth's atmosphere.
- dioxide: A major greenhouse gas.
- Machines doing tasks automatically.
- areas: Lands near the sea.
- Variety of life on Earth.
- Uneven distribution of resources.
- Device to talk over distance.
- Tiny particles in the air.
- induced: Result of human activity.
60 Clues: Level under class. • Level below phylum. • Organized in levels. • Holding radical views. • Potent greenhouse gas. • Water vapor in the sky. • Digital letter service. • Grouping above species. • Using resources too much. • Highest biological group. • Variety of life on Earth. • Key electronic component. • Exists in a digital world. • induced: Caused by nature. • Range of different things. • ...
Dylan-cyber safety 2016-05-31
Across
- something that tricks you and stuffs up your computer
- somebody who cares for you
- at least one in a class
- something you use for social media
- somebody who follows you online
- somebody taking something private
- somebody who teaches
- being rude online
- telling something about someone that they don't want to get out
- to keep it to yourself
- a social media program that you have to be 18+ to use
- something that can belong to someone
Down
- talking to someone
- to do with coding and computers
- protects viruses from a device
- something you need for some of your information
- a way of communicating online
- going into something personal with code ect.
- something that you don't control
- a rude way of saying a word in another way
- a social media program
- put something on something
22 Clues: being rude online • talking to someone • somebody who teaches • a social media program • to keep it to yourself • at least one in a class • somebody who cares for you • put something on something • a way of communicating online • protects viruses from a device • to do with coding and computers • somebody who follows you online • something that you don't control • ...
Senior Cyber Crossword 2020-12-24
Across
- A computer screen that doesn’t need a mouse
- A virtual meeting service
- A not-so-yummy way for websites to remember users
- A person who uses digital tools to test or break into secure systems
- A type of legal control imposed on companies
- The _____ system controls the basic functions of your computer
- Software that includes advertising
- Canned meat, or unwanted email
- A person who uses their computer skills to break the law
- Malicious software that extorts money
- A.I.
- A company’s rules about handling private user data
- A switching device that dispatches data to multiple destinations
- A security system that uses aspects of your physical body to identify you as an authorized user
- A website dedicated to user-created videos
Down
- A secret access code
- The act of breaking into a secure system is called a ______
- A method of impersonating a device or user for nefarious purposes
- A pocket-sized phone with extended functionality
- A method of keeping information secret
- Technology and practices that keep your digital information secret
- Cybernetically enhanced human, or digital device brand
- A very shiny kind of metal
- A trip among the animals
- Net _____, a service provider’s guarantee they will not censor internet content
- A method of tricking people into giving away secure information
- The “name” of a website
- A mathematical formula used by computers to automate complex tasks
- A method of breaching a secure system by hiding malicious code inside a file
- A new term for the Internet
30 Clues: A.I. • A secret access code • The “name” of a website • A trip among the animals • A virtual meeting service • A very shiny kind of metal • A new term for the Internet • Canned meat, or unwanted email • Software that includes advertising • Malicious software that extorts money • A method of keeping information secret • A website dedicated to user-created videos • ...
Basics of Cyber 2023-09-01
Across
- Creates a method to keep access to a machine or network
- Hackers for Good
- Information not disclosed to unauthorized individuals
- Purposefully Malicious Hackers
- Propagates like a virus, but uses network services to move around. Executes on its own once it finds a host
- Users must confirm identity to access data and systems
- Computer Program/part of a program that has damaging/unwanted effects on computer
- Leaving a piece of storage in an open location
- Proof of delivery and proof of sender’s identity
- Authorized users are able to access info quickly and easily, Systems work even during difficult times
- Emails pretending to be legit companies
Down
- Uses made up scenario
- Data is accurate and complete, Data is not altered or destroyed
- Favor for a favor
- Psychological manipulation to get people to perform actions or reveal confidential information
- Gathers data and sends it to another entity
- Hundreds or millions of computer that have been compromised
- Sits quietly until a condition is met
- Looks like something useful. Could install backdoors, rootkits, or turn your machine into a zombie
- Self-replicating software, attaches to another program or file. Only runs when the program or file is opened.
- Follow authorized user into secure area
21 Clues: Hackers for Good • Favor for a favor • Uses made up scenario • Purposefully Malicious Hackers • Sits quietly until a condition is met • Follow authorized user into secure area • Emails pretending to be legit companies • Gathers data and sends it to another entity • Leaving a piece of storage in an open location • Proof of delivery and proof of sender’s identity • ...
CYBER SMART CROSSWORD 2024-09-05
Across
- The address of a webpage. Check the validity of it before clicking on it.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- A sequence of words or text used to control access to a computer; similar to a password.
- Unauthorized access to a network, information systems, or application.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- Threatening behavior facilitated through electronic means such as texting.
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
Down
- The process of taking plain text and scrambling it into an unreadable format.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- Verifying identity.
- A wireless technology standard used over short distances using short-wavelength UHF radio waves.
- The “A” in the C-I-A Triad. It ensures authorized users have access.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- Facebook, Twitter, Instagram, etc. (Two words)
- The “I” in the C-I-A Triad; protection from unauthorized changes.
20 Clues: Verifying identity. • Facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes. • The “A” in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Cyber Ethics 🧑🏻💻 2025-05-28
Across
- An impression or information about a person taht exists on the internet because of his online activity.
- Illegal intrusion into a computer system or network.
- When software is copied & distibuted illegally.
- Full form of ICT
- Act of being aware of the ethical practices & behaving responsibly & appropiately while using the internet.
- Act of sending a fraud email to a user and misleading him to believe that it is from a trusted source.
- Fraudulently obtaining money from depositors by claiming to be from an authorise bank.
- The process of transforming data into unreadable code.\
- This refers to an act of stealing and misusing someone's ID .
- The rules making everyone respect the privacy of others.
- Security system that prevents unauthorised people from accessing the system or network.
- Legal right granted by the law to the creator for his original work.
- Act of harming or harassing a person through internet.
Down
- Converting Unreadable code to readable data.
- Act of Imitating the language and thoughts of another person as one's original work.
- Unwanted bulk of fraudulent messages from unknown sources.
- A computer program or a set of programs that disrupts the normal functioning of the computer.
- Accessing the internet in an illegal manner.
- Hacking done for a good cause, such as natinal security.
- Criminal activites done though Internet and comouters
20 Clues: Full form of ICT • Converting Unreadable code to readable data. • Accessing the internet in an illegal manner. • When software is copied & distibuted illegally. • Illegal intrusion into a computer system or network. • Criminal activites done though Internet and comouters • Act of harming or harassing a person through internet. • ...
Cyber securuty - 2 2025-07-08
Across
- Exploiting a bug or vulnerability to gain elevated access rights.
- A network protocol for collecting IP traffic information.
- A framework for managing digital keys and certificates.
- A server that acts as an intermediary for requests from clients.
- Reviewing logs to detect suspicious or unauthorized activities.
- An attack where the attacker secretly intercepts communication between two parties.
- A system that actively blocks detected threats.
- A system that monitors and controls incoming and outgoing network traffic.
- Software designed to cause damage or unauthorized actions.
- A security risk originating from within the organization.
- A set of procedures for identifying and handling security incidents.
- Actions taken after gaining access, like data extraction.
- Software or hardware that detects unauthorized access or anomalies.
- Taking advantage of vulnerabilities to gain access.
- Strategies to detect and prevent threats from within the organization.
- Guaranteeing the accuracy and completeness of data.
- A software update designed to fix vulnerabilities or bugs.
- Controlling network access using device MAC addresses.
- Sending IP packets with a false source IP address.
Down
- A framework for developing and executing exploit code.
- Dividing a network into segments to improve security.
- Preventing parties from denying their actions or commitments.
- The process of applying updates to software to fix vulnerabilities.
- A function that converts data into a fixed-size string of characters.
- Creating an exact copy of a digital device for investigation.
- scanning, Checking for open ports to identify services running on a system.
- A European regulation on data protection and privacy.
- The process of sharing cryptographic keys securely.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- A tool that captures and analyzes network traffic.
30 Clues: A system that actively blocks detected threats. • A tool that captures and analyzes network traffic. • Sending IP packets with a false source IP address. • The process of sharing cryptographic keys securely. • Taking advantage of vulnerabilities to gain access. • Guaranteeing the accuracy and completeness of data. • ...
Cyber Society Final 2025-05-16
Across
- In short, Aristotle contends that the best friendship is one that we might call ______ friendship.
- The IT Team's critical tasks include keeping all software and systems ______.
- Assistive _______ products help maintain or improve an individual's functioning related to cognition, communication, hearing, mobility, self-care and visions, thus enabling their health, well being, inclusion, and participation.
- _____ is about protecting your digital information and systems.
- The CEO's Role in cybersecurity includes creating a _____ where everyone cares about digital safety.
- A networked society has major influence on the way we communicate. Instant messaging and video calls connect us _______.
- ____________ is a type of cyberattack where someone tries to trick you into giving away sensitive information like passwords, credit card numbers, or personal details—by pretending to be someone you trust.
- Smart and self-driving cars are a major advancement in transportation, but their reliance on complex technologies and connectivity also introduces several __________ risks.
- According to Aristotle there is only one type of friendship that is pure in its virtue and in its addition to/necessity for a good life. This is the purest form of friendship or "friendship of ______".
- Data integrity refers to the accuracy, completeness, _____, and trustworthiness of data.
- Cyber _____ aim to stop things like data breaches, identity theft, online harassment, and ransomware attacks—all of which cause real harm.
- Artificial __________: The ability for a computer or machine to complete tasks that are usually done by humans.
Down
- Technology can either _____ or undermine friendships.
- Cyberattacks are unique in their subtlety, scope, and psychological impact, often targeting the ______ of modern life rather than just its physical components.
- MFA stands for ______ Authentication: Your data shield
- AI Chatbots: a tool that can understand language and is constantly _____ from it's conversations.
- Citizen science involves public ____________ in scientific research. It connects people to science and nature. Examples include biodiversity monitoring and environmental data collection.
- Chat GPT: A tool that can understand language and is constantly learning from it's conversation. You can ask them a question, and they can provide a human-like response based on ________ data.
- Worm GPT: An AI chat bot that was created for ________ activities.
- Data transfer is ____ data from one computer to another.
- ‘Leaving no one behind’ means ensuring people with disabilities, the older population, those affected by chronic diseases and everyone who needs ____________ technology are included in society and able to live healthy and dignified lives.
- _____ networks amplify voices for social change; Online platforms mobilize support for causes.
- Aristotle's claim is that companion friendships are ______ to a good life.
- A networked society connects _____, organizations, and devices through digital networks.
24 Clues: Technology can either _____ or undermine friendships. • MFA stands for ______ Authentication: Your data shield • Data transfer is ____ data from one computer to another. • _____ is about protecting your digital information and systems. • Worm GPT: An AI chat bot that was created for ________ activities. • ...
Cyber Ethics Rishav 2025-05-30
Across
- Deliberately posting offensive content online
- Unauthorized access to or manipulation of computer systems
- A secret word used to access systems
- THEFT Stealing someone's personal info to impersonate them
- A dishonest scheme online to trick users
- Restriction of access to certain internet content
- Moral principles guiding digital behavior
- A security measure to block unauthorized access
- Using someone else's work without credit
Down
- The process of encoding information for security
- Fraudulent attempt to obtain sensitive information via email
- Software used to detect and remove malicious programs
- Small data files stored on a user's device by websites
- Software designed to harm or exploit systems
- Software that secretly gathers user data
- NEWS False information spread online as real news
- Permission for data collection or actions online
- Bullying that occurs over digital devices
- A global system of interconnected networks
- The right to control personal information online
20 Clues: A secret word used to access systems • Software that secretly gathers user data • A dishonest scheme online to trick users • Using someone else's work without credit • Bullying that occurs over digital devices • Moral principles guiding digital behavior • A global system of interconnected networks • Software designed to harm or exploit systems • ...
