cyber security Crossword Puzzles

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. A nutrient found in meat, beans and spinach, important for red blood cells
  2. A drink that keeps us hydrated and is essential for survival
  3. The study of how food affects health and the nutrients the body needs for growth and energy
  4. The body's most important mineral needed for hydration
  5. A healthy food group that includes carrots, broccoli, and spinach
  6. A vitamin found in dairy that helps us have strong bones
  7. The food we get from cows, commonly used in cereal or coffee
  8. A prolonged period of low rainfall that can lead to crop failure and food shortages
  9. A sweet food made from fruit, sugar often used with bread
Down
  1. __ is present in eggs, chicken or beans
  2. A citrus fruit that is an excellent source of vitamin c
  3. A green vegetable that is often used in salads and has lots of vitamins
  4. A food that gives energy and found in rice, bread and pasta
  5. A leafy green vegetable high in Vitamin K
  6. A sweet food made from cocoa beans and sugar enjoyed as a treat

15 Clues: __ is present in eggs, chicken or beansA leafy green vegetable high in Vitamin KThe body's most important mineral needed for hydrationA citrus fruit that is an excellent source of vitamin cA vitamin found in dairy that helps us have strong bonesA sweet food made from fruit, sugar often used with bread...

Food security 2024-11-28

Food security crossword puzzle
Across
  1. the fruit great for athletes because they gives you energy
  2. the fruit Increases Bone Mass
  3. the fruit help fight off infections
  4. vegetable protects your heart
  5. juice reduce kidney stone formation
  6. the fruit provides support for immune system
  7. the fruit which reduce blood cholesterol levels
  8. the fruit contains 92% water helps to reduce weight
Down
  1. the fruit help calm your nervous system
  2. the fruit which may help lower risk of developing diabetes and asthma
  3. the fruit fight against arthritis
  4. the fruit prevent against diabetes
  5. the fruit can fight against cancer and aging
  6. the fruit reduce the risk of blindness
  7. the fruit Reduce blood pressure and lowers the risk of blood clots

15 Clues: the fruit Increases Bone Massvegetable protects your heartthe fruit fight against arthritisthe fruit prevent against diabetesthe fruit help fight off infectionsjuice reduce kidney stone formationthe fruit reduce the risk of blindnessthe fruit help calm your nervous systemthe fruit can fight against cancer and aging...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. A place where food is grown.
  2. Food that is not old or spoiled.
  3. What farmers do to crops.
  4. Food like rice, wheat, or corn.
  5. A place to keep food safe.
  6. Food that grows on trees or plants.
  7. Plants grown for food.
Down
  1. Food that is good to eat.
  2. Not having enough food to eat.
  3. Helps plants and crops grow.
  4. Breakfast, lunch, or dinner.
  5. Needed to grow plants and crops.
  6. What we do with food.
  7. Something we eat to stay alive.
  8. To make food ready to eat.

15 Clues: What we do with food.Plants grown for food.Food that is good to eat.What farmers do to crops.A place to keep food safe.To make food ready to eat.A place where food is grown.Helps plants and crops grow.Breakfast, lunch, or dinner.Not having enough food to eat.Food like rice, wheat, or corn.Something we eat to stay alive....

Food security 2024-12-17

Food security crossword puzzle
Across
  1. The opposite of full
  2. large animal that gives us milk
  3. The process of growing plants for food
  4. This is needed to cook food
  5. Food grown without chemicals
  6. The nutrient that helps build strong muscles
  7. The season when farmers plant seeds
  8. A person who grows crops
Down
  1. healthy drink made from fruits
  2. Green vegetable shaped like a tree
  3. A grain used to make bread
  4. Crops like wheat, rice,or corn
  5. The main source of water for plants
  6. fruit that is red and round
  7. The place where food is grown

15 Clues: The opposite of fullA person who grows cropsA grain used to make breadThis is needed to cook foodfruit that is red and roundFood grown without chemicalsThe place where food is grownhealthy drink made from fruitsCrops like wheat, rice,or cornlarge animal that gives us milkGreen vegetable shaped like a treeThe main source of water for plants...

Food security 2024-12-17

Food security crossword puzzle
Across
  1. sweet and healthy food
  2. makes food sweet
  3. what we eat to live
  4. where plants grow
  5. a vegetable with layers
  6. improves health and prevents hunger
  7. comes from chicken
Down
  1. a food from water
  2. food for cows
  3. is the primary source of food production
  4. a living thing that grows in soil
  5. used for cooking food
  6. sweet food made by bees
  7. a drink from cows
  8. a big plant that gives fruits

15 Clues: food for cowsmakes food sweeta food from waterwhere plants growa drink from cowscomes from chickenwhat we eat to liveused for cooking foodsweet and healthy foodsweet food made by beesa vegetable with layersa big plant that gives fruitsa living thing that grows in soilimproves health and prevents hungeris the primary source of food production

Configuration Management -E-Mates 2024-01-29

Configuration Management -E-Mates crossword puzzle
Across
  1. submits the updated change plan to the change control board.
  2. A list of administrator-approved programs, IP and email addresses that can access the network.Blocks whatever is not on the list.
  3. The users profile
  4. The rules a company has for who can change the security systems.
  5. Settings that help you navigate the login
  6. Enable security configurations
  7. Enable security configurations
  8. Changes done to the security to improve the system
  9. Any unwanted changes get blocked and reported protecting the system
  10. Connections from far away
Down
  1. Multiple layers of security
  2. Restrictions on a area of importance
  3. The enviornment in which the secuirty will effect
  4. Enable security configurations
  5. Security plans to protect the system

15 Clues: The users profileConnections from far awayMultiple layers of securityEnable security configurationsEnable security configurationsEnable security configurationsRestrictions on a area of importanceSecurity plans to protect the systemSettings that help you navigate the loginThe enviornment in which the secuirty will effect...

Computer Crosword 2021-10-06

Computer Crosword crossword puzzle
Across
  1. wide area network
  2. To get into a person's account without their permission.
  3. The right to make copies.
  4. Not CPU,but it is connected to CPU.
  5. Stealing another person's identity.
  6. Hard disk drive.
  7. connects a device to a computer
Down
  1. Security Security online.
  2. Drive A small portable Drive.
  3. local area network
  4. security measures.
  5. A piece or part of something.
  6. A list of rules that apply when you communicate across the internet.
  7. annoying repeated messages
  8. random-access memory
  9. a CPU is the central processing unit.
  10. use A limited use of copyright.
  11. solid-state drive

18 Clues: Hard disk drive.wide area networksolid-state drivelocal area networksecurity measures.random-access memoryThe right to make copies.annoying repeated messagesSecurity Security online.A piece or part of something.connects a device to a computerDrive A small portable Drive.Not CPU,but it is connected to CPU.use A limited use of copyright....

The Internet 1 - 8.º ano - Finder 193 2024-07-09

The Internet 1 - 8.º ano - Finder 193 crossword puzzle
Across
  1. Mundo digital
  2. Bloguista
  3. Fórum
  4. Correio eletrónico
Down
  1. Endereço de correio eletrónico
  2. Sala de chat
  3. Cibercrime
  4. Blogue
  5. Aplicação

9 Clues: FórumBlogueBloguistaAplicaçãoCibercrimeSala de chatMundo digitalCorreio eletrónicoEndereço de correio eletrónico

Schoeman Wedding 2025-07-14

Schoeman Wedding crossword puzzle
Across
  1. Bride's Name?
  2. Video game Arthur plays?
  3. Oom Piet & Henri's Vendor?
  4. Kelly's Employer?
  5. What Rynier does all the time?
  6. Rynier's Employer?
  7. Where is Aidan from?
  8. Groom's Name?
Down
  1. Garth's Vendor?
  2. Fran's wife's name?
  3. XON Head of Cyber?
  4. Gender for Ilze and Dillons' little one?
  5. Palo Territory Director?

13 Clues: Bride's Name?Groom's Name?Garth's Vendor?Kelly's Employer?XON Head of Cyber?Rynier's Employer?Fran's wife's name?Where is Aidan from?Video game Arthur plays?Palo Territory Director?Oom Piet & Henri's Vendor?What Rynier does all the time?Gender for Ilze and Dillons' little one?

IG crossword 2019-02-18

IG crossword crossword puzzle
Across
  1. Our incident management system
  2. Permitted by law
  3. Exposure to danger
  4. Who or what a person is
  5. Meeting rules or standards
  6. A protection code
  7. Private information
  8. Relating to computers
  9. Document outlining a process
  10. Patient information
Down
  1. A valuable thing
  2. A portable computer
  3. Taking a course
  4. Protecting from harm
  5. Make private information known
  6. Collection of historical documents
  7. An adverse event
  8. A written or spoken agreement
  9. Oversees data processing
  10. Facts and statistics

20 Clues: Taking a courseA valuable thingPermitted by lawAn adverse eventA protection codeExposure to dangerA portable computerPrivate informationPatient informationProtecting from harmFacts and statisticsRelating to computersWho or what a person isOversees data processingMeeting rules or standardsDocument outlining a processA written or spoken agreement...

HPE 2019-04-03

HPE crossword puzzle
Across
  1. Serious disagreement
  2. wholesome
  3. Period of becoming sexually mature
  4. talk to others
  5. Pressure reason to become alcholic
  6. kind of a behaviour
  7. Bullying bullying through the internet
  8. beginning of human life
  9. Male hormone
  10. Forceful personality
  11. of a person
Down
  1. a person has
  2. Atomic
  3. come to a settlement
  4. what happens next
  5. ability to control others
  6. people make every day
  7. Human egg
  8. different people in society
  9. what you kick
  10. Confidence in one
  11. everyone belongs to

22 Clues: AtomicwholesomeHuman eggof a persona person hasMale hormonewhat you kicktalk to otherswhat happens nextConfidence in onekind of a behavioureveryone belongs tocome to a settlementSerious disagreementForceful personalitypeople make every daybeginning of human lifeability to control othersdifferent people in societyPeriod of becoming sexually mature...

Simon's January News Crossword Puzzle 2014-01-22

Simon's January News Crossword Puzzle crossword puzzle
Across
  1. The name of the person that his staffs are under scrutiny of closing bridges for political revenge.
  2. Colorado and Washington State legalize this "drug".
  3. What US government agency implanted radio frequency software in thousands of computers which can be wrongfully used for cyber attacks.
  4. Which company have to pay 32.5 million dollar to the US Federal Trade Commission for allowing children to purchase applications without their parents consent?
  5. What is the Ford's new F-150's body frame made out of?
  6. How many school shootings took place in United State in January?
Down
  1. What is the name of the guy who was allowed to take his pipe bomb even after Canadian Air Transport Security Authority in Edmonton noticed the explosive?
  2. What is the name of the 11th Prime Minister of Israel who died on January 11, 2014 (Israel Time)?
  3. Who won the Ballon d'Or?
  4. Which film won the best picture in drama for the 2014 Golden Globe Award?
  5. Who is the Famous MLB player suspended for a year for usage of performance enhancing drugs?

11 Clues: Who won the Ballon d'Or?Colorado and Washington State legalize this "drug".What is the Ford's new F-150's body frame made out of?How many school shootings took place in United State in January?Which film won the best picture in drama for the 2014 Golden Globe Award?...

ANALYTICS 2014-08-24

ANALYTICS crossword puzzle
Across
  1. dynamic application Security testing (4)
  2. parses the code and identify constructs that seem to introduce threats.(4, 7)
  3. Flying mammal
  4. an action taken to harm an asset (6)
  5. Has a trunk
  6. a type of network security attack where the attacker takes control of a communication (9)
  7. used by attackers to gain unauthorized access to systems or data (6, 8)
  8. aprocess of converting data having many possible representations into a standard form (16)
  9. technique used to attack data driven applications through code injection (3, 9)
  10. cross-site Request Forgery (4)
  11. an attempt to acquire sensitive information by redirecting to a false site (8)
  12. Large marsupial
  13. a weakness that makes a threat possible (13)
  14. a character encoding standard (7)
  15. an operating system (4)
  16. provides remote access to a targeted computer system (6)
  17. an open-standard application protocol for directory access (4)
Down
  1. a method of bypassing normal authentication (8)
  2. an open-source web application security project (5)
  3. a possible danger that may act to breach security (6)
  4. the art of writing or solving secret codes (12)
  5. the act of confirming the truth of an attribute of an entity (14)
  6. a list of known good inputs (9)
  7. Likes to chase mice
  8. a list of software weaknesses (3)
  9. a safeguard that addresses a threat and mitigates risk (14)
  10. authentication, authorization and accounting (3)
  11. static application security testing (4)
  12. the degree of resistance to, or protection from, harm (8)
  13. provides pluggable dynamic authentication for applications and services (3)
  14. process of creating computer software (6)
  15. a software that controls the incoming and outgoing network traffic (8)
  16. a malware program (5)
  17. cross-site Scripting (3)
  18. Man's best friend

35 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase micea malware program (5)an operating system (4)cross-site Scripting (3)cross-site Request Forgery (4)a list of known good inputs (9)a list of software weaknesses (3)a character encoding standard (7)an action taken to harm an asset (6)static application security testing (4)...

Security Manager Crossword 2021-12-01

Security Manager Crossword crossword puzzle
Across
  1. A possessor of classified information determines a prospective recipients justification to access or have knowledge of classified data.
  2. A process of identifying critical information and subsequently analyzing friendly actions of military activities.
  3. Any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of national security information.
  4. An area under government jurisdiction in which special security measures are employed to prevent unauthorized entry.
  5. Individual overall responsible for an organization's Personnel Security Program.
  6. The ability and opportunity to obtain knowledge of classified information.
  7. An unauthorized disclosure of classified information.
Down
  1. The authorized change in status of information from classified to unclassified.
  2. Any knowing, willful, or negligent action that can reasonably be expected to not compromise national security.
  3. Measures taken by an organization to protect itself against all acts designed to impair its effectiveness.
  4. An individual who makes a classification determination and applied that to specific information or material.
  5. The determination that information classified at a specific level will be classified at a lower level.
  6. The process by which information is determined to be sensitive to national security.
  7. A calculated use of violence or threats to incite fear and promote change.
  8. The organization that conducts all background checks of military, federal, and contract personnel.
  9. Intergovernmental military alliance between foreign states in agreement of mutual defense.
  10. The time period covered between investigations.

17 Clues: The time period covered between investigations.An unauthorized disclosure of classified information.A calculated use of violence or threats to incite fear and promote change.The ability and opportunity to obtain knowledge of classified information.The authorized change in status of information from classified to unclassified....

The Career Academy 2024-11-22

The Career Academy crossword puzzle
Across
  1. Pathway for those interested in learning about materials used in manufacturing, plant layout, materials handling, manufacturing processes, and the use of machines
  2. Pathway for those interested in learning how to install heating and air conditioning units
  3. Pathway for those interested in learning how to run electrical wire in a house
  4. Pathway for those interested in coding and web development
  5. Pathway for those interested in working in agriculture, medicine, environmental, or veterinary fields
  6. Pathway for those interested in becoming an educator or daycare provider
  7. Pathway for those interested in exploring the basics of business ownership, marketing, and management
Down
  1. Pathway for those interested in cyber security and troubleshooting hardware
  2. Pathway for those who want to get general education requirements done and transfer to a 2 or 4 year program
  3. Pathway for those interested in learning how to use tools and equipment for building structures or cabinets
  4. Pathway for those interested in law enforcement
  5. Pathway for those interested in design drafting and engineering processes
  6. Pathway for those who want to learn about being a nurse or health care provider
  7. Pathway for those interested in basic metal fabrication and building/repairing structures or products using OXY/FUEL and PLASMA cutting, ARC, MIG and TIG welding
  8. Pathway for those interested in social work, being a case manager, or counselor
  9. Pathway for those interested in learning food service and hospitality skills

16 Clues: Pathway for those interested in law enforcementPathway for those interested in coding and web developmentPathway for those interested in becoming an educator or daycare providerPathway for those interested in design drafting and engineering processesPathway for those interested in cyber security and troubleshooting hardware...

Financial Market Risks 2024-07-15

Financial Market Risks crossword puzzle
Across
  1. Which risk arises from technological failures or cyber-attacks?
  2. What risk is associated with fraud or theft by employees?
  3. What is the risk associated with the volatility in market indices?
  4. Which risk involves deterioration in the credit spread of a counterparty?
  5. What risk is associated with potential legal penalties and fines?
  6. What risk involves potential losses due to legal interpretations?
  7. What risk involves difficulty in unwinding positions without significant cost?
Down
  1. What risk involves inadequate or failed internal controls?
  2. Which risk involves potential losses due to commodity price changes?
  3. What type of market risk arises from changes in stock prices?
  4. What term describes the risk that a debtor may restructure debt under bankruptcy?
  5. Which risk arises from changes in laws affecting business operations?
  6. Which risk arises when there are insufficient buyers or sellers in the market?
  7. What type of credit risk is related to sovereign debt?
  8. What is the risk of a bank facing sudden large withdrawals called?

15 Clues: What type of credit risk is related to sovereign debt?What risk is associated with fraud or theft by employees?What risk involves inadequate or failed internal controls?What type of market risk arises from changes in stock prices?Which risk arises from technological failures or cyber-attacks?...

Cyber World 2023-05-04

Cyber World crossword puzzle
Across
  1. The smallest piece of computer information, either the number 0 or 1.
  2. changes the case of the letter when on
  3. Worldwide network of computers
  4. An input device
  5. The process of transferring information from a computer to a website
  6. An output device
Down
  1. Random Access Memory
  2. Video Display Unit
  3. To start up a computer
  4. These are the devices from which the sound comes out
  5. The brain of the computer
  6. Small, lightweight, portable battery-powered computers that can fit onto your lap
  7. Read-Only Memory

13 Clues: An input deviceAn output deviceRead-Only MemoryVideo Display UnitRandom Access MemoryTo start up a computerThe brain of the computerWorldwide network of computerschanges the case of the letter when onThese are the devices from which the sound comes outThe process of transferring information from a computer to a website...

cyber bullying 2022-11-11

cyber bullying crossword puzzle
Across
  1. if you made a video or a picture online
  2. if people said something that isn't true
  3. do's and dont's
  4. you bully someone online
  5. if you aren't kind to someone
  6. when you try to kill yourself
Down
  1. when people always know where you are
  2. if you write something on a post
  3. something you can send messages and call
  4. if you dont have any friends
  5. different websites
  6. if you tease someone every day
  7. if you are on a website

13 Clues: do's and dont'sdifferent websitesif you are on a websiteyou bully someone onlineif you dont have any friendsif you aren't kind to someonewhen you try to kill yourselfif you tease someone every dayif you write something on a postwhen people always know where you areif you made a video or a picture onlinesomething you can send messages and call...

Talage Crossword 2024-05-29

Talage Crossword crossword puzzle
Across
  1. chat-gpt is an example
  2. leader in insurance technology
  3. click here to get started
  4. protect the company from workplace accidents
  5. legal doc protecting your interests
  6. stop the hackers
  7. connect
Down
  1. understand your data
  2. self-insurance
  3. you're responsible
  4. trusted advisor
  5. innovation in insurance
  6. saving time and money
  7. policy designed to simplify small business insurance
  8. cost of insurance
  9. join lots of workflows together
  10. paid out

17 Clues: connectpaid outself-insurancetrusted advisorstop the hackerscost of insuranceyou're responsibleunderstand your datasaving time and moneychat-gpt is an exampleinnovation in insuranceclick here to get startedleader in insurance technologyjoin lots of workflows togetherlegal doc protecting your interestsprotect the company from workplace accidents...

ANALYTICS 2014-08-24

ANALYTICS crossword puzzle
Across
  1. a method of bypassing normal authentication (8)
  2. cross-site Scripting (3)
  3. a possible danger that may act to breach security (6)
  4. an operating system (4)
  5. a type of network security attack where the attacker takes control of a communication (9)
  6. a weakness that makes a threat possible (13)
  7. static application security testing (4)
  8. parses the code and identify constructs that seem to introduce threats.(4, 7)
  9. aprocess of converting data having many possible representations into a standard form (16)
  10. a character encoding standard (7)
  11. cross-site Request Forgery (4)
  12. an open-standard application protocol for directory access (4)
  13. provides pluggable dynamic authentication for applications and services (3)
  14. technique used to attack data driven applications through code injection (3, 9)
  15. an open-source web application security project (5)
Down
  1. the art of writing or solving secret codes (12)
  2. provides remote access to a targeted computer system (6)
  3. used by attackers to gain unauthorized access to systems or data (6, 8)
  4. a list of known good inputs (9)
  5. the degree of resistance to, or protection from, harm (8)
  6. the act of confirming the truth of an attribute of an entity (14)
  7. dynamic application Security testing (4)
  8. an attempt to acquire sensitive information by redirecting to a false site (8)
  9. authentication, authorization and accounting (3)
  10. a safeguard that addresses a threat and mitigates risk (14)
  11. an action taken to harm an asset (6)
  12. a list of software weaknesses (3)
  13. a software that controls the incoming and outgoing network traffic (8)
  14. process of creating computer software (6)
  15. a malware program (5)

30 Clues: a malware program (5)an operating system (4)cross-site Scripting (3)cross-site Request Forgery (4)a list of known good inputs (9)a list of software weaknesses (3)a character encoding standard (7)an action taken to harm an asset (6)static application security testing (4)dynamic application Security testing (4)...

Jargon 2023-11-30

Jargon crossword puzzle
Across
  1. Account has shares of the underlying
  2. Acronym for Redemption charges on Mutual Funds
  3. Another term for a decimal point
  4. This is 4:30 PM Eastern time
  5. Balance owed
  6. number of shares available for trading
  7. mandates that if the order is not executed immediately, it is canceled.
  8. Another term for the execution of an order
  9. An Option contract’s unit of trade or underlying instrument
  10. Type 5 is
  11. Pattern day trader designation
  12. nine-character identifier used for a U.S. security
  13. Collateralized account
  14. price the seller gets
  15. Tax deferred
  16. The difference between the bid & ask price of a security
  17. 12-character code that identifies a security
  18. does not hold the underlying
Down
  1. Another Term for the Trading price of a Bond
  2. Type 1 is
  3. Reported trade price of a stock
  4. seven character code assigned to securities trading in the U.K.
  5. The Action of buying back a security that was sold short
  6. debt obligations of the U.S. government
  7. characteristic of a security which rises or falls sharply within a short time
  8. Term referring to the global trading of Currencies
  9. The ability to be converted to cash quickly
  10. The Date that an Option Contract will end
  11. Price the buyer pays
  12. vehicle that facilitates reporting of OTC transactions in fixed income securities.
  13. Between Funds of the same family & share class
  14. Type 2 is

32 Clues: Type 1 isType 5 isType 2 isBalance owedTax deferredPrice the buyer paysprice the seller getsCollateralized accountThis is 4:30 PM Eastern timedoes not hold the underlyingPattern day trader designationReported trade price of a stockAnother term for a decimal pointAccount has shares of the underlyingnumber of shares available for trading...

arti 2020-10-30

arti crossword puzzle
Across
  1. her sapling
  2. hes seen not heard
  3. a good mind
  4. the latest bundle
  5. her foray into cyber space
  6. the chris bundle
  7. the blue and pink flower in her life
  8. has her looks
  9. home in the lane
Down
  1. her art
  2. home on the road
  3. chota bhim
  4. he has been in confiment thrice
  5. co contortionist
  6. the flowers companion
  7. the naughty coalman
  8. he has a way to rile her
  9. another rajma chawal
  10. neice
  11. the first bundle

20 Clues: neiceher artchota bhimher saplinga good mindhas her lookshome on the roadco contortionistthe chris bundlethe first bundlehome in the lanethe latest bundlehes seen not heardthe naughty coalmananother rajma chawalthe flowers companionhe has a way to rile herher foray into cyber spacehe has been in confiment thricethe blue and pink flower in her life

HPE 2019-04-03

HPE crossword puzzle
Across
  1. wholesome
  2. Atomic
  3. Serious disagreement
  4. Male hormone
  5. Confidence in one
  6. kind of a behaviour
  7. talk to others
  8. beginning of human life
  9. different people in society
  10. Bullying bullying through the internet
  11. Period of becoming sexually mature
Down
  1. a person has
  2. Forceful personality
  3. what you kick
  4. come to a settlement
  5. people make every day
  6. what happens next
  7. everyone belongs to
  8. ability to control others
  9. Human egg
  10. of a person
  11. Pressure reason to become alcholic

22 Clues: AtomicwholesomeHuman eggof a persona person hasMale hormonewhat you kicktalk to otherswhat happens nextConfidence in oneeveryone belongs tokind of a behaviourForceful personalitySerious disagreementcome to a settlementpeople make every daybeginning of human lifeability to control othersdifferent people in societyPeriod of becoming sexually mature...

mov29 2024-07-01

mov29 crossword puzzle
Across
  1. Stallone's night chase
  2. Martial arts showdown
  3. Military thriller
  4. Will Smith's cop duo
  5. Pirate adventure
  6. Rebel uprising
  7. Disaster thriller
  8. Mel Gibson's thriller
  9. Sci-Fi boat action
  10. Wild West action
  11. Police thriller
  12. Space cowboy
Down
  1. Futuristic combat
  2. Charles Bronson's return
  3. Schwarzenegger's sequel
  4. Urban crime action
  5. Submarine thriller
  6. Sci-Fi rebirth
  7. Dystopian future
  8. Digital age thriller
  9. Harrison Ford's CIA
  10. Sci-Fi escape
  11. Comedy superhero
  12. Space survival
  13. Superhero revenge

25 Clues: Space cowboySci-Fi escapeSci-Fi rebirthRebel uprisingSpace survivalPolice thrillerDystopian futurePirate adventureComedy superheroWild West actionFuturistic combatMilitary thrillerDisaster thrillerSuperhero revengeUrban crime actionSubmarine thrillerSci-Fi boat actionHarrison Ford's CIAWill Smith's cop duoDigital age thrillerMartial arts showdown...

India by JSS 2022-10-18

India by JSS crossword puzzle
Across
  1. IT capital
  2. Lotus Temple is located
  3. Largest Railway Station (Short Form)
  4. Deccan Plateau located
  5. Elephants
  6. Cyber City
  7. Largest Metro organization (Short Form)
Down
  1. Land of Coconut
  2. Araku Valley is located
  3. Land of Faith
  4. Financial Capital
  5. Largest Airport (Short Form)
  6. Largest National Park is located

13 Clues: ElephantsIT capitalCyber CityLand of FaithLand of CoconutFinancial CapitalDeccan Plateau locatedAraku Valley is locatedLotus Temple is locatedLargest Airport (Short Form)Largest National Park is locatedLargest Railway Station (Short Form)Largest Metro organization (Short Form)

Homeland Security 2024-03-18

Homeland Security crossword puzzle
Across
  1. What department within Homeland Security deals with transportation security
  2. How many departments did the Homeland Security Act of 2002 combine
  3. What type of security does Homeland Security deal with when relating to the internet
  4. Acronym for department of homeland security
  5. What department within Homeland Security deals with emergency management
Down
  1. What is one Geographical Aspect Homeland Security Protects
  2. What kind of events does Homeland Security prepare for
  3. How would opposers of Homeland Security describe its strategy
  4. What Homeland Security was made to defend against

9 Clues: Acronym for department of homeland securityWhat Homeland Security was made to defend againstWhat kind of events does Homeland Security prepare forWhat is one Geographical Aspect Homeland Security ProtectsHow would opposers of Homeland Security describe its strategyHow many departments did the Homeland Security Act of 2002 combine...

Hello, It`s me again :)) 2025-10-16

Hello, It`s me again :)) crossword puzzle
Across
  1. Birth city of the scholar (1946).
  2. Sector tied to resources, markets, and welfare.
  3. Global-scale version of that framing process.
  4. Epistemological lens shaping his approach.
  5. Counterpart whose security is intertwined with Israel’s.
  6. Copenhagen institute where he led projects (1988–2002).
  7. Role at the European Journal of International Relations (2004–2008).
  8. Defined as freedom from threat and preservation of identity.
  9. Case illustrating identity fractures in the societal sector.
  10. Sector centered on identity and cohesion.
  11. Security-studies school he is strongly linked with.
  12. British-Canadian scholar behind “People, States and Fear.”
  13. Internal weaknesses contrasted with external dangers.
  14. Field asking “how do we know?” in theory.
  15. Strategy of addressing both internal and external risks.
  16. Field asking “what exists?” in theory.
Down
  1. Cold War example of a macro-level threat narrative.
  2. Post-9/11 candidate for macro-securitization.
  3. Country his family later moved to.
  4. Sector dealing with armed threats and defense.
  5. Sector focused on climate, disasters, and nature.
  6. External dangers contrasted with internal weaknesses.
  7. System trait his ontology accepts in IR.
  8. Word completing “regional security ______.”
  9. State used in Middle East interdependence example.
  10. Essence of security in his definition.
  11. The “friendship” side shaping regional orders.
  12. The hostile counterpart in regional relations.
  13. Sector covering ideology and state institutions.
  14. Leader who announced a global “war on terror.”
  15. Framing an issue as an existential threat.

31 Clues: Birth city of the scholar (1946).Country his family later moved to.Essence of security in his definition.Field asking “what exists?” in theory.System trait his ontology accepts in IR.Sector centered on identity and cohesion.Field asking “how do we know?” in theory.Epistemological lens shaping his approach.Framing an issue as an existential threat....

cyber security crossword (designed by:X, the Awesome!) 2015-12-31

cyber security crossword (designed by:X, the Awesome!) crossword puzzle
Across
  1. A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
  2. The process of translating plaintext into ciphertext
  3. the process of attempting to acquire sensitive information used for identity theft
  4. software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
  5. software that records everything you type, then sends it off to whomever installed the software.
  6. an adjective to describe your professor Xiaoyu
Down
  1. a bridge between two computer networks
  2. a network based on TCP/ICP protocols (an internet) belonging to an organization
  3. to choose options in order to create a custom system
  4. software installed on a network of computers without the owner’s knowledge
  5. A capability to limit network traffic between networks and/or information systems

11 Clues: a bridge between two computer networksan adjective to describe your professor Xiaoyuto choose options in order to create a custom systemThe process of translating plaintext into ciphertextsoftware installed on a network of computers without the owner’s knowledgea network based on TCP/ICP protocols (an internet) belonging to an organization...

CISO Crossword Riddle - 2525 2025-11-12

CISO Crossword Riddle - 2525 crossword puzzle
Across
  1. I stand guard twice to verify who you are, Two layers strong — that’s security’s shining star
  2. I’m not an outsider, I already have the key, When I turn rogue, no firewall can stop me
  3. Infected machines obey a hacker’s command unseen, A silent cyber army waging war on the digital screen
  4. Every post and click leaves a mark in cyber space, Guard your trail — your data’s your trace
  5. Voices and faces I twist to deceive your sight, AI’s mask of lies — beware what feels too right
Down
  1. I look like your bank App but hide a cyber trap, Install me once — your data’s in my lap
  2. I’m the hacker’s grind, guessing passwords in a race, Weak logins fall when persistence finds its place
  3. I bait you with emails that seem so right, Click my link, and you’ll lose the fight
  4. They clone your number and steal your call, One fake SIM — and your bank account can fall
  5. I’m your one-time digital shield, protecting login doors, Use me once and never share — that’s how safety soars

10 Clues: I bait you with emails that seem so right, Click my link, and you’ll lose the fightI’m not an outsider, I already have the key, When I turn rogue, no firewall can stop meI look like your bank App but hide a cyber trap, Install me once — your data’s in my lapThey clone your number and steal your call, One fake SIM — and your bank account can fall...

Huntsville Government Security Crossword 2023-06-02

Huntsville Government Security Crossword crossword puzzle
Across
  1. The first step you should take when unsecured classified information is found unattended is to ___________ it
  2. To gain access to a closed space you must have a signed SF 312, Need to know and a _____
  3. Refer to ____ to determine if something is classified
  4. When securing a GSA safe or combination lock you must not forget to ____ the dial
  5. As a cleared employee it is your ______ to safeguard classified material
  6. Leanne _______ is the Huntsville site FSO
  7. Loss of aggregated CUI is the one of the most significant risks to national security, directly affecting lethality of our ___________
  8. if you discover a security incident, infration or violation you would contact your ______ POC for the area
Down
  1. Report any suspicious ______ that approach you about classified information
  2. you must _______ any security violation or adverse information
  3. Certain information requiring protection against unauthorized disclosure in the interests of national defense and security or foreign relations of the United States pursuant to Federal statute or Executive order
  4. government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies
  5. Richard _________ is the Huntsville site Industrial Security Manager
  6. All Visitors must sign a ____
  7. Unclear visitors must be __________ at all times
  8. Classified information is ___ to be discussed in open areas
  9. an ________ threat is someone with access who will use that access for illegal means
  10. ______ information needs to be self reported such as having a bill go to collections

18 Clues: All Visitors must sign a ____Leanne _______ is the Huntsville site FSOUnclear visitors must be __________ at all timesRefer to ____ to determine if something is classifiedClassified information is ___ to be discussed in open areasyou must _______ any security violation or adverse information...

PUMPKINS FLY 2013-01-13

PUMPKINS FLY crossword puzzle
Across
  1. / Conflict region in Sudan where the killings of thousands of civilians by the Janjaweed militias took place in 2003. Action taken by the UN Security Council was weak and ineffective, leading to at least half a million civilian deaths in Sudan.
  2. / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
  3. / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
  4. / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
  5. / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
  6. / Location in Britain where the first Security Council session took place on 17 January 1946.
  7. / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
  8. / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
  1. / Granted permanent membership into the Security Council in 1971.
  2. / Country that has made the strongest requests for a permanent seat in the UN Security Council other than Brazil, India and Japan.
  3. / The deliberate and organised massacre of a large group of people, especially those of a particular ethnicity, race or religion. Occurred in Cambodia (1975 - 1978), Rwanda (1994 - 1996) and Germany (1933 - 1945).
  4. / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
  5. / Permanent member of the UN Security Council that has used its veto power the greatest number of times.
  6. / Russian inaction that allowed the UN Security Council to pass the resolution in 1950 that condemned North Korea and called for the deployment of armed forces by member states to aid South Korea.
  7. / Number of members in the Security Council.
  8. / UN peacekeeping force sent to Rwanda in 1993 to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out as the conflict between the Rwandese Patriotic Front (RPF) and the official Rwandan Army escalated.
  9. / Arguably the only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)

17 Clues: / Number of members in the Security Council./ Granted permanent membership into the Security Council in 1971./ Location in Britain where the first Security Council session took place on 17 January 1946./ Permanent member of the UN Security Council that has used its veto power the greatest number of times....

Matt's Birthday Crossword 2024-04-05

Matt's Birthday Crossword crossword puzzle
Across
  1. not a real meal
  2. necrophiliac
  3. fingerling potatoes fan
  4. your cyber friend
  5. thank you, in the language of your people
  6. "matthew"
  7. adjective describing you
  8. going to the motherland this summer
Down
  1. hometown icon
  2. you and arun found here
  3. future plateau man
  4. canadian weeb
  5. would make a great man
  6. charlie would not attend ____'s concert
  7. running pal
  8. your rival

16 Clues: "matthew"your rivalrunning palnecrophiliachometown iconcanadian weebnot a real mealyour cyber friendfuture plateau manwould make a great manyou and arun found herefingerling potatoes fanadjective describing yougoing to the motherland this summercharlie would not attend ____'s concertthank you, in the language of your people

Goodbye Emma 2024-08-13

Goodbye Emma crossword puzzle
Across
  1. emma's position in the 20km
  2. emma's favorite EFRAG TEG person
  3. emma's favorite kitchen object
  4. emma's baby
  5. emma's achilles heel
Down
  1. emma's beverage
  2. emma's favorite task in EFRAG
  3. emma's spot
  4. emma's first day axiety
  5. emma's biggest distraction
  6. emma's next destination
  7. emma's lunch break escape
  8. emma's main research project

13 Clues: emma's spotemma's babyemma's beverageemma's achilles heelemma's first day axietyemma's next destinationemma's lunch break escapeemma's biggest distractionemma's position in the 20kmemma's main research projectemma's favorite task in EFRAGemma's favorite kitchen objectemma's favorite EFRAG TEG person

:-) 2019-09-20

:-) crossword puzzle
Across
  1. Flaw that occurs when untrusted data is sent to an interpreter as part of a command or query and the attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
  2. Attack using poorly configured XML processors evaluate external entity references within XML documents, which can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.
  3. Ericssons model to incorporate security and privacy considerations into all phases of product development.
  4. Flaw that occurs when application functions related to authentication and session management are implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.
  5. Set of technologies designed to detect conditions indicative of a security vulnerability in an application in its running state.
  6. Responsible for Ericsson product vulnerability management process, coordination of customer product security incidents and reported security issues affecting Ericsson products, solutions, and services.
  7. Practice of increasing product security by reducing its attack surface.
Down
  1. Cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities.
  2. Recognized as a fundamental human right by the United Nations (UN) in Article 12 of the Universal Declaration of Human Rights
  3. This Kubernetes Benchmark is a reference document that can be used by system administrators, security and audit professionals and other IT roles to establish a secure configuration baseline for Kubernetes.
  4. Comprehensive, versatile, automated black box fuzzer that enables organizations to efficiently and effectively discover and remediate security weaknesses in software.
  5. One of the world’s most popular free security tools for finding security vulnerabilities in web applications.
  6. Flaw exploited to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files, modify other users' data, change access rights, etc.
  7. Software testing technique consisting of finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.
  8. Set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities.

15 Clues: Practice of increasing product security by reducing its attack surface.Ericssons model to incorporate security and privacy considerations into all phases of product development.One of the world’s most popular free security tools for finding security vulnerabilities in web applications....

ANALYTICS 2014-08-24

ANALYTICS crossword puzzle
Across
  1. parses the code and identify constructs that seem to introduce threats.(4, 7)
  2. technique used to attack data driven applications through code injection (3, 9)
  3. a weakness that makes a threat possible (13)
  4. a software that controls the incoming and outgoing network traffic (8)
  5. the degree of resistance to, or protection from, harm (8)
  6. an open-source web application security project (5)
  7. the act of confirming the truth of an attribute of an entity (14)
  8. process of creating computer software (6)
  9. an operating system (4)
  10. provides remote access to a targeted computer system (6)
  11. a type of network security attack where the attacker takes control of a communication (9)
Down
  1. a method of bypassing normal authentication (8)
  2. an attempt to acquire sensitive information by redirecting to a false site (8)
  3. a safeguard that addresses a threat and mitigates risk (14)
  4. a list of known good inputs (9)
  5. an action taken to harm an asset (6)
  6. dynamic application Security testing (4)
  7. a list of software weaknesses (3)
  8. used by attackers to gain unauthorized access to systems or data (6, 8)
  9. authentication, authorization and accounting (3)
  10. cross-site Request Forgery (4)
  11. a character encoding standard (7)
  12. a malware program (5)
  13. a possible danger that may act to breach security (6)
  14. the art of writing or solving secret codes (12)
  15. cross-site Scripting (3)

26 Clues: a malware program (5)an operating system (4)cross-site Scripting (3)cross-site Request Forgery (4)a list of known good inputs (9)a list of software weaknesses (3)a character encoding standard (7)an action taken to harm an asset (6)dynamic application Security testing (4)process of creating computer software (6)...

Extreme Sports 2021-09-23

Extreme Sports crossword puzzle
Across
  1. Use this element when you do Paragliding
  2. A security element to do bungee jumping
  3. Extreme sport in which a person throws himself from a high height,
  4. A situation similar to dizziness
  5. A security element that does not allow you to drown
  6. Extreme sport where you jump out of a plane with a parachute
  7. Use this security element to protect the head
Down
  1. Use this element when you're in a dark cave
  2. Extreme sport that is done in the rapids of a river
  3. A security element to protect your eyes
  4. When you broke a bone anywhere in your body
  5. Activity in which a person is propelled by the wind-down a ravine and uses a parachute
  6. A natural underground chamber
  7. A security element to protect your hand from hurting you

14 Clues: A natural underground chamberA situation similar to dizzinessA security element to protect your eyesA security element to do bungee jumpingUse this element when you do ParaglidingUse this element when you're in a dark caveWhen you broke a bone anywhere in your bodyUse this security element to protect the head...

Crossword Period 1 2024-06-04

Crossword Period 1 crossword puzzle
Across
  1. For insiders only
  2. Not quite
  3. Class of conspicuous consumption
  4. Like teacher's answers, sometimes
  5. Something precious and portable
  6. All puffed up
  7. Like a speech or sermon
  8. Last ___ of...
  9. Like the prices on Black Friday or Cyber Monday
Down
  1. Linked
  2. Like a famous fictional knight
  3. Relative of "shy" and "shoo"
  4. Clownish
  5. You might have this before a big decision
  6. Salty or spicy, in speech
  7. Link
  8. Something worse than a lecture
  9. Find intolerable
  10. Opposite of indifference

19 Clues: LinkLinkedClownishNot quiteAll puffed upLast ___ of...Find intolerableFor insiders onlyLike a speech or sermonOpposite of indifferenceSalty or spicy, in speechRelative of "shy" and "shoo"Like a famous fictional knightSomething worse than a lectureSomething precious and portableClass of conspicuous consumptionLike teacher's answers, sometimes...

Crossword Period 1 2024-06-04

Crossword Period 1 crossword puzzle
Across
  1. For insiders only
  2. Not quite
  3. Class of conspicuous consumption
  4. Like teacher's answers, sometimes
  5. Something precious and portable
  6. All puffed up
  7. Like a speech or sermon
  8. Last ___ of...
  9. Like the prices on Black Friday or Cyber Monday
Down
  1. Linked
  2. Like a famous fictional knight
  3. Relative of "shy" and "shoo"
  4. Clownish
  5. You might have this before a big decision
  6. Salty or spicy, in speech
  7. Link
  8. Something worse than a lecture
  9. Find intolerable
  10. Opposite of indifference

19 Clues: LinkLinkedClownishNot quiteAll puffed upLast ___ of...Find intolerableFor insiders onlyLike a speech or sermonOpposite of indifferenceSalty or spicy, in speechRelative of "shy" and "shoo"Like a famous fictional knightSomething worse than a lectureSomething precious and portableClass of conspicuous consumptionLike teacher's answers, sometimes...

safe computing assignment 2025-08-06

safe computing assignment crossword puzzle
Across
  1. Attack traffic to take servers down
  2. scrambles data for protection
  3. network of infected computers
  4. manipulating into confidential info
  5. hides malware
  6. records keynotes
  7. hides IP
  8. identity check
  9. stealing data from emails
Down
  1. watches and sends information to others
  2. malware disguised as program
  3. fix for volnurability
  4. attack targeting vulnerabilities of software
  5. blocks unauthorized access
  6. knowledge about cyber threats
  7. hacking to find flaws
  8. providing identity
  9. tries everything to gain access
  10. locks data until paid for

19 Clues: hides IPhides malwareidentity checkrecords keynotesproviding identityfix for volnurabilityhacking to find flawslocks data until paid forstealing data from emailsblocks unauthorized accessmalware disguised as programscrambles data for protectionnetwork of infected computersknowledge about cyber threatstries everything to gain access...

Henlo 2023-09-26

Henlo crossword puzzle
Across
  1. uniform
  2. Big White Animal (Threat to Society)
  3. Favorite game
  4. favorite food
Down
  1. Best pizza
  2. Big Stinky Place
  3. favorite car
  4. Animal with supersonic screeching
  5. best gf ever
  6. dream job

10 Clues: uniformdream jobBest pizzafavorite carbest gf everFavorite gamefavorite foodBig Stinky PlaceAnimal with supersonic screechingBig White Animal (Threat to Society)

Cyber Law (CIA Component 1) 2021-09-04

Cyber Law (CIA Component 1) crossword puzzle
Across
  1. ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
  2. ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
  3. Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
  4. This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
  5. The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
  6. ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc. (Shortform)
  7. ___________ was the most prominent cyber paternalistic scholar.
Down
  1. Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
  2. The adoption or increase in use of digital or computer technology by an organization, industry, country, etc.
  3. It is often viewed as the act of sending unsolicited email usually commercial messages.

10 Clues: ___________ was the most prominent cyber paternalistic scholar.It is often viewed as the act of sending unsolicited email usually commercial messages.______is one such constraint in cyber space which allows us to regulate the principle of anonymity....

Cyber Law (CIA Component 1) 2021-09-04

Cyber Law (CIA Component 1) crossword puzzle
Across
  1. ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
  2. ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
  3. Regulatory __________, seen as a problem for authorities who attempt to capture activities within the web, however it is also seen as a solution to the problems of excessive or inappropriate regulation as it aims in limiting the capacities and boundaries of authorities.
  4. This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
  5. The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
  6. ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc.
  7. ___________ was the most prominent cyber paternalistic scholar
Down
  1. Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
  2. The process where companies, indutries, countries, etc increase the use of digital or computer technology.
  3. The act of sending unsolicited emails which are usually commercial messages.

10 Clues: ___________ was the most prominent cyber paternalistic scholarThe act of sending unsolicited emails which are usually commercial messages.______is one such constraint in cyber space which allows us to regulate the principle of anonymity.The process where companies, indutries, countries, etc increase the use of digital or computer technology....

SN33003FP Chapter 6 2024-07-06

SN33003FP Chapter 6 crossword puzzle
Across
  1. Reduces the severity of the loss or the likelihood of the loss from occurring
  2. Prevent a disaster from occurring
  3. The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
  4. Gets critical systems to another location while repair of the original facility is under way
  5. Avoiding complex solutions that users cannot understand or troubleshoot
  6. Ability to maintain availability during disruptive events
  7. Restricting access so that users only have the level of access required to do their job
  8. It is critical to keep an organization functioning when a disaster occurs
  9. Manages a complete inventory of hardware and software
  10. Discover the incident
  11. Plan for potential incidents
Down
  1. Creating a barrier of multiple defences to prevent attacks
  2. Identifies specific hardware and software products that the organization uses and supports
  3. Breaching one layer of security does not compromise the whole system
  4. Discover unwanted events
  5. Investigate the cause of the incident and ask questions to better understand the nature of the threat
  6. Analyzes the dangers posed by natural and human-caused events to the assets of an organization
  7. Enhances system reliability and availability by distributing them across multiple physical locations
  8. Manages a full inventory of hardware and software components that are vulnerable to security risks
  9. Network protocol that provides for redundancy
  10. Concealing certain types of information to make it more difficult for cyber criminals to attack a system
  11. The set of procedures that an organization follows after an event occurs outside the normal range
  12. Assigns all resources into a group based on common characteristics
  13. Restore the system after a disaster
  14. Minimizes risk by staying ahead of cybercriminals
  15. Ensures system availability in the event of a component failure
  16. Combines multiple physical hard drives into a single logical unit
  17. A group of servers that act like a single system
  18. Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
  19. Enables a system to continue operating if one or more components fail
  20. 99.999% uptime, less than 5.26 minutes downtime yearly

31 Clues: Discover the incidentDiscover unwanted eventsPlan for potential incidentsPrevent a disaster from occurringRestore the system after a disasterNetwork protocol that provides for redundancyA group of servers that act like a single systemMinimizes risk by staying ahead of cybercriminalsManages a complete inventory of hardware and software...

crossword 2024-12-04

crossword crossword puzzle
Across
  1. How old was the granddaughter that was found in a car when her grandmother went missing?
  2. how many U.S troops are in South Korea?
  3. How much money is expected to be spent for Cyber Monday?
  4. What was stuck on train tracks and got hit by a train?
  5. how many Americans are traveling after the holidays?
  6. how big is the biggest asteroid that is coming towards Earth?
  7. What two places have a new ceasefire?
  8. What did the sinkhole start as the size of?
  9. What does Hegseth think about women in the military?
Down
  1. What miles an hour are winds expected to be due to the bad winter storms?
  2. How many football fields big is the new facility for Cyber Monday?
  3. Who had U.S hostages?
  4. Who denies all accusations about sexual misconduct and alcohol abuse?
  5. What was the name of the bride that was killed in a car crash on her wedding day?
  6. Next to Wicked, what movie broke box office records?
  7. How deep is the sinkhole that a grandmother fell in?
  8. what judge granted many kids adoptions?
  9. What does James Van Der Beek suffer from?
  10. Yoon What is the name of the south korea president?
  11. Where has the bad weather now stretched to in the U.S?

20 Clues: Who had U.S hostages?What two places have a new ceasefire?how many U.S troops are in South Korea?what judge granted many kids adoptions?What does James Van Der Beek suffer from?What did the sinkhole start as the size of?Next to Wicked, what movie broke box office records?How deep is the sinkhole that a grandmother fell in?...

L'aéroport 2021-09-26

L'aéroport crossword puzzle
Across
  1. security checkpoint
  2. check-in
  3. passeport
  4. luggage carousel
  5. flight
  6. airline ticket
  7. suitcase
Down
  1. security guard
  2. customs
  3. waiting room
  4. passenger
  5. airplane
  6. airport
  7. luggage

14 Clues: flightcustomsairportluggagecheck-inairplanesuitcasepassengerpasseportwaiting roomsecurity guardairline ticketluggage carouselsecurity checkpoint

UN Structure 2025-03-12

UN Structure crossword puzzle
Across
  1. Settles disputes between UN member states
  2. Supervised 11 territories until 1994
  3. Main decision-making body of the UN
  4. Military forces authorized by the Security Council
  5. Carries out UN resolutions
  6. ECOSOC builds partnerships with businesses and these organizations
  7. Ensures peace and has binding resolutions
Down
  1. General Assembly must approve this financial plan
  2. number of Security Council members
  3. Type of Security Council members elected for two-year terms
  4. Current UN Secretary-General
  5. Each UN member state has this amount of votes in the General Assembly
  6. Penalties imposed by the Security Council
  7. number of main General Assembly committees

14 Clues: Carries out UN resolutionsCurrent UN Secretary-Generalnumber of Security Council membersMain decision-making body of the UNSupervised 11 territories until 1994Settles disputes between UN member statesPenalties imposed by the Security CouncilEnsures peace and has binding resolutionsnumber of main General Assembly committees...

L'Aeroport 2025-02-25

L'Aeroport crossword puzzle
Across
  1. pass through
  2. passport checkpoint
  3. security checkpoint
  4. board
  5. security/seat belt
  6. bag tag
Down
  1. customs
  2. boarding room
  3. boarding pass
  4. gate
  5. plane
  6. baggage claim
  7. transfer
  8. direct flight
  9. early

15 Clues: gateplaneboardearlycustomsbag tagtransferpass throughboarding roomboarding passbaggage claimdirect flightsecurity/seat beltpassport checkpointsecurity checkpoint

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Social engineers use this to trick you
  2. The practice of being diligent about your online activities
Down
  1. Assurance that information is accurate and Trustworthy
  2. Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. not disclosing information to unauthorized individuals

5 Clues: Social engineers use this to trick youAssurance that information is accurate and Trustworthynot disclosing information to unauthorized individualsThe practice of being diligent about your online activitiesEngineer Someone who takes information from many sources and uses them to piece together a bigger puzzle

Risk, cyber security concern 2023-06-13

Risk, cyber security concern crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

1.The first thing that your reader to see Answer:HOMEPAGE 2.Construction of pages should start at the start of class Answer:PAGE 3.This is the way for your student to try to capture your personal journey of of learning Answer:REFLECTION 4.This is the b 2025-03-19

1.The first thing that your reader to see Answer:HOMEPAGE  2.Construction of pages should start at the start of class Answer:PAGE  3.This is the way for your student to try to capture your personal journey of of learning Answer:REFLECTION  4.This is the b crossword puzzle
Across
  1. is the basic understanding of HTML,CSS and like creat a shard understanding of what can be done with webpages.
  2. is teaching students about
  3. how to select and use digital
  4. LITERACY
  5. is the way for your student to try to capture your personal journey of of learning
  6. and general safety
  7. and evaluating its validity in order
  8. around photo posting
  9. essential part of document management
  10. is a students should be taught the concepts
  11. understand copyright laws and property rights for online assets.
  12. facial recognition
  13. SOFTWARE
  14. data,tagging,keywords and catergories to make them aware.
  15. information from the web and
  16. applications or services to
Down
  1. in a globally
  2. students how to
  3. arena
  4. students to be aware and
  5. viruses, cyber threats,
  6. cyber bullying etc.
  7. of pages should start at the start of class
  8. is use to a video recording using the computer and usually includes an audio
  9. ARCHIVING
  10. LETIRACY
  11. it can be shared
  12. first thing that your reader to see
  13. phone numbers etc.
  14. students how to protect
  15. ways of knowing how to study and learn in a technology enriched environment.
  16. information such as
  17. tasks.
  18. SKILLS

34 Clues: arenatasks.SKILLSLETIRACYLITERACYSOFTWAREARCHIVINGin a globallystudents how toit can be sharedand general safetyphone numbers etc.facial recognitioncyber bullying etc.information such asaround photo postingviruses, cyber threats,students how to protectstudents to be aware andis teaching students aboutapplications or services to...

Security Awareness Puzzle 2019-08-27

Security Awareness Puzzle crossword puzzle
Across
  1. The individual who is charged with overall formulation and management of Security Procedures within LIAT
  2. An area which makes up the Critical Part of an airport
  3. An item which may pose a threat to persons or property
  4. A means of receiving bomb threats
  5. A Means of controlling access in restricted areas
  6. Probability of an attack within a specified time frame
  7. LIATs regulatory authority with aviation
Down
  1. A major threat to aviation
  2. an individual responsible for Security at Stations
  3. a group of personnel who are responsible for access control
  4. Sensitive or confidential information
  5. An international organization responsible for Security Matters within aviation worldwide
  6. The individual who is at the helm of the Security Org Chart
  7. Part The part of an airport which one must go through security control to have access

14 Clues: A major threat to aviationA means of receiving bomb threatsSensitive or confidential informationLIATs regulatory authority with aviationA Means of controlling access in restricted areasan individual responsible for Security at StationsAn area which makes up the Critical Part of an airportAn item which may pose a threat to persons or property...

The Spill 06/07/21 2021-06-08

The Spill 06/07/21 crossword puzzle
Across
  1. BPS USA belongs to the world's _____________ meat producer.
  2. What kind of whale has been seen near New York recently?
  3. In a ____________ attack, hackers target a company's computer system.
Down
  1. People in Hong Kong wanted to hold a candlelight __________.
  2. Grand Island is a city in which state?
  3. "Oceanographic" is a _______________ about ocean studies.
  4. The Tiananmen ____________ protests were student-led rallies calling for democracy in China.
  5. A _________ of whales is a group that travels together, hunts together, protects one another, and shares in the care of young.
  6. A ________ company was targeted by a cyber attack.
  7. Marine biologists have spotted whales in New York Harbor and the Hudson __________.

10 Clues: Grand Island is a city in which state?A ________ company was targeted by a cyber attack.What kind of whale has been seen near New York recently?"Oceanographic" is a _______________ about ocean studies.BPS USA belongs to the world's _____________ meat producer.People in Hong Kong wanted to hold a candlelight __________....

Cybersecurity Month 2023-05-19

Cybersecurity Month crossword puzzle
Across
  1. creating a fake identity on a social network account or dating website
  2. an error, flaw, failure, or fault in a computer or system
  3. programs that automatically execute tasks as ordered by the creator of the program that has infected them
  4. after these are downloaded, opened, or executed, your data becomes corrupt
  5. programs and other operating systems used by a computer
  6. a type of malicious software that disguises itself as a harmless program
  7. a cyber attacker
  8. private network VPN
  9. an attack when a person or program disguises themselves as another
  10. malware used to gain access to a user's system or data
  11. authentication attaching a phone number or email to an account for extra security
  12. short for malicious software
  13. breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
  14. engineering taking advantage of human trust to gain access to private information
Down
  1. customizable additions to software for extra functionality
  2. secret word or phrase used to gain access
  3. method of obtaining user info through fraudulent communications targeted directly at people
  4. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
  5. the way in which the identity of a user is confirmed
  6. cryptocurrency
  7. software that automatically displays or downloads material when a user if offline
  8. a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
  9. technology IT
  10. an internet traffic filter meant to stop unauthorized traffic
  11. the physical and tangible parts of a computer

25 Clues: technology ITcryptocurrencya cyber attackerprivate network VPNshort for malicious softwaresecret word or phrase used to gain accessthe physical and tangible parts of a computerthe way in which the identity of a user is confirmedmalware used to gain access to a user's system or dataprograms and other operating systems used by a computer...

Website 2024-07-29

Website crossword puzzle
Across
  1. situs company profile memang untuk menyampaikan informasi penting terkait perusahaan jasa.
  2. Singkatan dari Content Managemen Sistem
  3. Cyber security yang bagus
  4. halaman
  5. Desain yang unik
  6. Kumpulan halaman yang digunakan untuk menampilkan informasi teks, gambar, animasi suara atau gabungan dari semuanya baik yang bersifat statis dan dinamis yang membentuk satu rangakain saling terkait, yang masing-masing dihubungkan dengan jaringan terkait
  7. Menambah gambar, teks, building block
  8. Skala kecil hingga menengah
  9. CNN merupakan sebuah website
  10. Sebuah website yang dibuat untuk menampilkan karya dan prestasi seseorang atau sebuah perusahaan
  11. Halaman khusus yang dirancang untuk kebutuhan pemasaran digital dan merupakan bagian dari website
  12. Bentuk aplikasi web yang berbentuk tulisan-tulisan pada sebuah halaman web. Tulisan-tulisan ini sering kali dimuat dalam urutan isi terbaru dahulu sebelum diikuti isi yang lebih lama, meskipun tidak selamanya demikian.
  13. Website ecommerce
Down
  1. Situs jual beli
  2. Terpajang di Website
  3. tata letak
  4. akses
  5. Dukungan multi bahasa, untuk bisnis Internasional
  6. CMS yang tidak di Install
  7. Mencari
  8. Web memberi situs web atau aplikasi web Anda sebuah server atau mesin di internet
  9. Nama yang mudah diingat yang terkait dengan alamat IP fisik di internet
  10. Jenis web yang dimiliki oleh seorang individu
  11. Standar komunikasi data yang digunakan oleh komunitas internet dalam proses tukar-menukar data
  12. Domain komersial
  13. organisasi
  14. Berita
  15. Penyedia layanan informasi khusus untuk menarik perhatian pembaca supaya masuk pada laman web yang dicari, dan bisa diakses lewat bermacam fitur semacam desktop, mobile, dan tablet.
  16. Software yang menambahkan fitur tertentu pada suatu program tanpa mengharuskan Anda mengubah program itu sendiri.
  17. Uniform Resource Locator

30 Clues: aksesBeritahalamanMencaritata letakorganisasiSitus jual beliDesain yang unikDomain komersialWebsite ecommerceTerpajang di WebsiteUniform Resource LocatorCyber security yang bagusCMS yang tidak di InstallSkala kecil hingga menengahCNN merupakan sebuah websiteMenambah gambar, teks, building blockSingkatan dari Content Managemen Sistem...

Commerce Cybersecurity 2025-03-02

Commerce Cybersecurity crossword puzzle
Across
  1. Wrongful or criminal deception intended to result in financial or personal gain.
  2. Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data.
  3. A method to hide the actual web address (URL) of a webpage and replace it with another,
  4. the action or activity of buying goods from shops.
  5. Importance requiring swift action.
  6. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
  7. Getting your money back after a purchase.
  8. A voluntary promise offered by the person or business who sold the product or service to you.
Down
  1. Made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  2. Acronym for Two factor Authentication
  3. An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
  4. Make an online service unavailable by overwhelming it with excessive traffic from many locations and sources.
  5. A legally binding agreement between two or more people
  6. Commonly known as the Scamming Captial of the world.
  7. The power or right to give orders, make decisions, and enforce obedience.
  8. The state of being free from danger or threat.
  9. When cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information.
  10. A program inserted into a system to compromise the confidentiality, integrity, or availability of data.
  11. pay someone for the use of (something, typically property, land, or a car).
  12. designed to trick you into giving away your money or your personal details.

20 Clues: Importance requiring swift action.Acronym for Two factor AuthenticationGetting your money back after a purchase.The state of being free from danger or threat.the action or activity of buying goods from shops.Commonly known as the Scamming Captial of the world.A legally binding agreement between two or more people...

Cyber bullying 2013-10-30

Cyber bullying crossword puzzle
Across
  1. rules that people have agreed to follow
  2. if a website can be _______ its not a hack
  3. a right that people have
  4. to be apart of a civilisation
  5. on a screen
  6. when two people agree
  7. talking
  8. being mean
Down
  1. a source of multimedia
  2. talking by typing sentences to each other via phone or mobile
  3. bullying some one in the virtual world
  4. a situation
  5. a cable has a _________ between the computers

13 Clues: talkingbeing meana situationon a screenwhen two people agreea source of multimediaa right that people haveto be apart of a civilisationbullying some one in the virtual worldrules that people have agreed to followif a website can be _______ its not a hacka cable has a _________ between the computers...

Cyber safety 2013-11-03

Cyber safety crossword puzzle
Across
  1. up advertisements that pop up on your screen
  2. a person who breaks into someones personal online information
  3. a personal web page where you can put anything you want up there
  4. this is a program taht allows you to access a bunch of information
  5. the arrow
  6. where you can share websites with your friends
  7. its when your computer gets sick because of a terrible problem
Down
  1. a search engine
  2. a series of letters and numbers to protect your account
  3. when you transfer interent information to your computer
  4. room a online entertainment thing that allows you to chat to other people
  5. mail sent electronically anywhere
  6. bulling using the internet to bully people

13 Clues: the arrowa search enginemail sent electronically anywherebulling using the internet to bully peopleup advertisements that pop up on your screenwhere you can share websites with your friendsa series of letters and numbers to protect your accountwhen you transfer interent information to your computer...

Cyber safety 2013-11-03

Cyber safety crossword puzzle
Across
  1. up advertisements that pop up on your screen
  2. a person who breaks into someones personal online information
  3. a personal web page where you can put anything you want up there
  4. this is a program taht allows you to access a bunch of information
  5. the arrow
  6. where you can share websites with your friends
  7. its when your computer gets sick because of a terrible problem
Down
  1. a search engine
  2. a series of letters and numbers to protect your account
  3. when you transfer interent information to your computer
  4. room a online entertainment thing that allows you to chat to other people
  5. mail sent electronically anywhere
  6. bulling using the internet to bully people

13 Clues: the arrowa search enginemail sent electronically anywherebulling using the internet to bully peopleup advertisements that pop up on your screenwhere you can share websites with your friendsa series of letters and numbers to protect your accountwhen you transfer interent information to your computer...

Cyber Puzzle 2023-03-30

Cyber Puzzle crossword puzzle
Across
  1. fraudulent practice of sending emails or other messages in order to induce individuals to reveal personal or sensitive information
  2. authentication method which requires two or more verification factors
  3. accuracy, completeness and consistency of data
  4. a person or thing likely to cause damage or danger
  5. making sure that no sensitive information on a monitor when left unattended
Down
  1. a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it
  2. attempt to exploit a computer system or a private network inside a computer
  3. the process of modifying sensitive date in such a way that it is no or little value to unauthorized intruders
  4. a senior-level executive responsible for developing and implementing an information security program
  5. regulations, rules and practices that prescribe how to manage, protect and distribute information
  6. type of malicious software designed to block access
  7. attempt to destroy, alter, disable or gain access to an asset
  8. a copy of data made in case the original is lost or damaged

13 Clues: accuracy, completeness and consistency of dataa person or thing likely to cause damage or dangertype of malicious software designed to block accessa copy of data made in case the original is lost or damagedattempt to destroy, alter, disable or gain access to an assetauthentication method which requires two or more verification factors...

cyber bullying 2022-11-11

cyber bullying crossword puzzle
Across
  1. if you made a video or a picture online
  2. if people said something that isn't true
  3. do's and dont's
  4. you bully someone online
  5. if you aren't kind to someone
  6. when you try to kill yourself
Down
  1. when people always know where you are
  2. if you write something on a post
  3. something you can send messages and call
  4. if you dont have any friends
  5. different websites
  6. if you tease someone every day
  7. if you are on a website

13 Clues: do's and dont'sdifferent websitesif you are on a websiteyou bully someone onlineif you dont have any friendsif you aren't kind to someonewhen you try to kill yourselfif you tease someone every dayif you write something on a postwhen people always know where you areif you made a video or a picture onlinesomething you can send messages and call...

Cyber Cross 2024-02-06

Cyber Cross crossword puzzle
Across
  1. Fraudulent text messages
  2. The address of a webpage
  3. Widely used in home network
  4. Secret messages
  5. Wireless technology standard over short distances
  6. Fraudulent mail
Down
  1. Fraudulent phone calls or voice messages
  2. where people can access internet via WiFi
  3. Facebook,instagram,Twitter etc are...
  4. A type of malicious software used to retrieve sensitive information from user
  5. Should be constructed of upper case,special characters etc
  6. Hardware or software to prevent unauthorized access to or from a private network
  7. Threatening behaviour facilitated through text messages

13 Clues: Secret messagesFraudulent mailFraudulent text messagesThe address of a webpageWidely used in home networkFacebook,instagram,Twitter etc are...Fraudulent phone calls or voice messageswhere people can access internet via WiFiWireless technology standard over short distancesThreatening behaviour facilitated through text messages...

Cyber Safety 2024-03-28

Cyber Safety crossword puzzle
Across
  1. Clue: A set of rules or processes followed by computer programs, especially search engines or social media platforms, to determine the order and presentation of content to users.
  2. Clue: A type of malicious software that can replicate itself and spread to other computers.
  3. Clue: A secret combination of characters used to access a user's account.
  4. Clue: Digitally manipulated videos or images that convincingly depict someone saying or doing something they never did.
  5. Clue: Someone who has the power to affect the purchasing decisions or opinions of others because of their authority, knowledge, position, or relationship with their audience on social media.
  6. Clue: A digital effect you can put over a video or photo to change your real appearance.
  7. Clue: A word or phrase preceded by the pound sign (#) used to categorize content on social media.
  8. Clue: Harassing or intimidating someone online is known as this.
Down
  1. Clue: A company pays for their product or service to be the first result you see.
  2. Clue:Information that identifies an individual, such as their name, address, phone number, or email, often collected by companies for various purposes
  3. Clue: This is your personal page on a social networking site where you share information about yourself.
  4. Clue: The process of selecting specific criteria, such as demographics or interests, to display ads to a particular audience.
  5. Clue: Associating a person or page with a post or photo on social media.

13 Clues: Clue: Harassing or intimidating someone online is known as this.Clue: Associating a person or page with a post or photo on social media.Clue: A secret combination of characters used to access a user's account.Clue: A company pays for their product or service to be the first result you see....

cyber bezpieczeństwo 2025-04-16

cyber bezpieczeństwo crossword puzzle
Across
  1. o zbiór zasad dotyczących pozytywnych zachowań w sieci, a te wpływają też na naszebezpieczeństwo
  2. czyli nadmierna wylewność online
  3. to złośliwe oprogramowanie, mogące przysporzyć nie lada kłopotów.
  4. kopia zapasowa danych przechowywana w innych miejscach niż ichoryginalne wersje.
  5. monitoruje Waszą aktywność na urządzeniu.
  6. bezpieczeństwo w sieci
  7. paniczny strach przed brakiem dostępu do telefonu podłączonego do internetu
  8. Systematyczna instalacja nowszych,poprawionych wersji
Down
  1. służą właśnie do tworzenia losowychkombinacji różnych znaków, co ma nam dać silne zabezpieczenie.
  2. filmy transmisje na żywo – które prezentują zachowania uznawane za szkodliwe i destrukcyjne.
  3. o cyberprzestępca, który wykorzystujebłędy, luki i złośliwe oprogramowanie (malware), by przeprowadzić atak.
  4. o swoisty identyfikator użytkownika sieci lub systemu komputerowego.Swoją nazwę możecie wymyślić sami
  5. o unikatowy numer identyfikacyjny nadawanyurządzeniom podłączonym do sieci (np. komputerom, tabletom).

13 Clues: bezpieczeństwo w sieciczyli nadmierna wylewność onlinemonitoruje Waszą aktywność na urządzeniu.Systematyczna instalacja nowszych,poprawionych wersjito złośliwe oprogramowanie, mogące przysporzyć nie lada kłopotów.paniczny strach przed brakiem dostępu do telefonu podłączonego do internetu...

Cyber Ethics 2025-06-10

Cyber Ethics crossword puzzle
Across
  1. Simplest way to prevent plagiarism
  2. Software is copied and distributed illegally
  3. Process of transforming data into unreadable code
  4. Spamming untill mail server gets full
  5. Illegal intrusion into computer
Down
  1. Being aware of ethical practices and behaving appropriately in internet
  2. Act of imitating another person's original work
  3. Another name for digital footprints
  4. Equivalent term to hacking
  5. Hacking done for good purposes
  6. Unwanted bulk resources from unknown sources
  7. Act of stealing and misusing someone's personal information
  8. Security system that prevents unauthorised people from accessing your account

13 Clues: Equivalent term to hackingHacking done for good purposesIllegal intrusion into computerSimplest way to prevent plagiarismAnother name for digital footprintsSpamming untill mail server gets fullSoftware is copied and distributed illegallyUnwanted bulk resources from unknown sourcesAct of imitating another person's original work...

Cyber Threats 2025-10-28

Cyber Threats crossword puzzle
Across
  1. Targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises
  2. Can execute itself and spread by infecting other programs or files.
  3. Use a false promise to pique a victim
  4. Uses trial and error to crack passwords
  5. malicious software designed to harm or exploit computer systems.
  6. Collects information and data on the device and user
  7. Victims are bombarded with false alarms and fictitious threats
Down
  1. trick individuals into sharing sensitive information
  2. Appears as a legitimate software program to gain access to a system.
  3. Uses psychological manipulation to trick users into making security mistakes.
  4. Encrypts files on a victim's computer and demands a ransom payment in exchange for the decryption key.
  5. Tracks a user's browser and download history with the intent to display pop-up
  6. self-replicate without a host program and typically spreads without any interaction from the malware authors.

13 Clues: Use a false promise to pique a victimUses trial and error to crack passwordstrick individuals into sharing sensitive informationCollects information and data on the device and userVictims are bombarded with false alarms and fictitious threatsmalicious software designed to harm or exploit computer systems....

Spanish 2 Ch 11 Vocabulario P1 2021-03-19

Spanish 2 Ch 11 Vocabulario P1 crossword puzzle
Across
  1. A trip by airplane
  2. Passengers
  3. Taxi
  4. Agent
  5. Boarding pass
  6. To inspect or to check
  7. Passport
  8. Luggage claim ticket
  9. Flight number
  10. Carry on luggage
  11. Departure/arrival screen
  12. Suitcases
  13. No smoking section
Down
  1. Baggage or luggage
  2. Ticket
  3. Before the flight
  4. Security check
  5. Departure gate
  6. Airport
  7. Seat number
  8. Ticket
  9. Scales
  10. Security
  11. Counter
  12. Destination
  13. Porter

26 Clues: TaxiAgentTicketTicketScalesPorterAirportCounterSecurityPassportSuitcasesPassengersSeat numberDestinationBoarding passFlight numberSecurity checkDeparture gateCarry on luggageBefore the flightBaggage or luggageA trip by airplaneNo smoking sectionLuggage claim ticketTo inspect or to checkDeparture/arrival screen

46a 2024-07-11

46a crossword puzzle
Across
  1. Video cable
  2. Touchscreen pen
  3. Fast storage
  4. Wired network
  5. Video recorder
  6. Data connector
  7. Physical tech
  8. Network security
  9. Power source
  10. Phone chip
  11. Internet distributor
  12. Power adapter
  13. Data storage
Down
  1. Data storage
  2. Online storage
  3. Image display
  4. Computer program
  5. Network host
  6. Portable storage
  7. Small headphones
  8. Web finder
  9. Security software
  10. Connector device
  11. Internet tool
  12. Mobile software

25 Clues: Web finderPhone chipVideo cableData storageFast storageNetwork hostPower sourceData storageImage displayWired networkPhysical techInternet toolPower adapterOnline storageVideo recorderData connectorTouchscreen penMobile softwareComputer programPortable storageSmall headphonesNetwork securityConnector deviceSecurity softwareInternet distributor

Bullying 2024-08-04

Bullying crossword puzzle
Across
  1. Someone who supports or defends victims of bullying
  2. Forms of bullying carried out through electronic media
  3. The act of ridiculing or insulting someone's body
  4. an intentional act of physical violence to harm another person.
Down
  1. the act of hurting or making another person feel uncomfortable, either physically or emotionally
  2. One of the social media used by cyber bullying perpetrators
  3. Forms of bullying that use hurtful words
  4. One form of physical violence received by victims of bullying
  5. Persuading others not to be friends with someone is one of what forms of bullying?

9 Clues: Forms of bullying that use hurtful wordsThe act of ridiculing or insulting someone's bodySomeone who supports or defends victims of bullyingForms of bullying carried out through electronic mediaOne of the social media used by cyber bullying perpetratorsOne form of physical violence received by victims of bullying...

stego 2023-08-01

stego crossword puzzle
Across
  1. .... .... was an anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
  2. Shadowy cyber collective widely known because of its work since 02.2022.
  3. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  4. Rhysider 44.
  5. A remote code execution flaw in Nginx web server.
Down
  1. u icy data
  2. Powerful intercepting proxy and web vulnerability scanner.
  3. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  4. Lbrozz Ignceunywfz Gkwdrz; key - information

9 Clues: u icy dataRhysider 44.Lbrozz Ignceunywfz Gkwdrz; key - informationA remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Shadowy cyber collective widely known because of its work since 02.2022.Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS....

Network and Security 2024-07-24

Network and Security crossword puzzle
Across
  1. A secret word or phrase that is used to access a computer system or service.
  2. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  3. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  4. Code that is embedded into the hardware of a computer.
  5. The programs and other operating systems used by a computer.
  6. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. programs that automatically execute tasks as ordered by creator
  8. form of cryptocurrency
  9. Stands for the National Security Agency
  10. The method of obtaining user information through fraudulent communications targeted directly at people.
  11. two words. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
  1. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior
  2. Text that can be read by the human eye
  3. creating a fake identity on social network account
  4. A weakness in a computer system or network that can be exploited by attackers.
  5. any action that makes a computer system vulnerable
  6. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  7. Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
  8. Customizable additions to software for extra functionality
  9. an error, flaw, failure, or fault

20 Clues: form of cryptocurrencyan error, flaw, failure, or faultText that can be read by the human eyeStands for the National Security Agencycreating a fake identity on social network accountany action that makes a computer system vulnerableCode that is embedded into the hardware of a computer.Customizable additions to software for extra functionality...

Puzzle #50 – “History of Social Security” 2025-06-30

Puzzle #50 – “History of Social Security” crossword puzzle
Across
  1. - Economic crisis that led to the program's creation
  2. - Year the Social Security Act became law
  3. - First monthly ______ were paid in 1940
  4. - Social Security was passed as this type of legal document
Down
  1. - People who fund Social Security through payroll taxes
  2. - Study of how Social Security began and evolved
  3. - President who signed Social Security into law
  4. - Original purpose of the Social Security program
  5. - Where collected Social Security taxes are stored
  6. - Agency created to manage the program

10 Clues: - Agency created to manage the program- First monthly ______ were paid in 1940- Year the Social Security Act became law- President who signed Social Security into law- Study of how Social Security began and evolved- Original purpose of the Social Security program- Where collected Social Security taxes are stored...

CISO Crossword Quiz - 1425 2025-01-15

CISO Crossword Quiz - 1425 crossword puzzle
Across
  1. IP_______ is a technique in which hackers change IP address of sender's email id
  2. Portal by MHA to report fraud Phone calls, SMS & WhatsApp calls or messages
  3. USB_____ is a type of cyber attack that involves stealing sensitive information using an infected USB drive as a bait for the victim.
  4. ____bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met
  5. The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files or systems
Down
  1. Credential ________ is a type of cyber attack in which the attacker uses stolen login credentials to access a network using large scale automated login requests
  2. A form of phishing that targets high-profile individuals
  3. Cyber_______ are the best practices for keeping digital devices and online accounts clean and secure from cyber attacks
  4. A type of social engineering attack that impersonates a trusted entity to steal information
  5. The ability of individual to understand and exercise control over how information about themselves may be used by others

10 Clues: A form of phishing that targets high-profile individualsPortal by MHA to report fraud Phone calls, SMS & WhatsApp calls or messagesIP_______ is a technique in which hackers change IP address of sender's email idA type of social engineering attack that impersonates a trusted entity to steal information...

fantascienza e info 2024-11-27

fantascienza e info crossword puzzle
Across
  1. Specie cyber-organica di Star Trek
  2. Operazione di trasferimento di dati su internet
  3. Abbreviazione per intelligenza artificiale
  4. Relativo ai neuroni, spesso usato in reti neurali artificiali
  5. Un miliardo di byte
  6. Gigantesco robot pilotato, tipico dell’anime e della fantascienza
  7. Macchina automatica capace di replicare azioni umane
  8. Il luogo dove si svolgono molte storie di fantascienza
  9. Rete informatica globale
  10. Informazioni digitali elaborate dai computer
  11. Veicolo autonomo spesso utilizzato in scenari futuristici
  12. Creatura metà uomo e metà macchina
  13. Abbreviazione per realtà virtuale
  14. Computer che fornisce servizi ad altri
  15. Barriera di sicurezza digitale
  16. Famoso film di fantascienza e ambiente virtuale
  17. Personaggio magico spesso associato a mondi virtuali e giochi
Down
  1. Prefisso che indica il mondo digitale o virtuale
  2. Materiale immaginario, debolezza di Superman
  3. Esperto di informatica, a volte protagonista di romanzi cyberpunk
  4. Unità minima di un'immagine digitale
  5. Pianeta natale di Superman, spesso citato in fantascienza
  6. Sequenza di istruzioni per risolvere un problema
  7. Truffa informatica che mira a carpire dati personali
  8. Unità minima di informazione digitale
  9. Raggio di luce utilizzato in fantascienza e scienza
  10. Otto bit, l'unità base per i dati in informatica
  11. Software che controlla l’hardware
  12. Flusso di dati, tipico di contenuti multimediali online
  13. Robot umanoide spesso presente nella fantascienza

30 Clues: Un miliardo di byteRete informatica globaleBarriera di sicurezza digitaleSoftware che controlla l’hardwareAbbreviazione per realtà virtualeSpecie cyber-organica di Star TrekCreatura metà uomo e metà macchinaUnità minima di un'immagine digitaleUnità minima di informazione digitaleComputer che fornisce servizi ad altri...

The hardest crossword puzzle EVERRR 2022-11-16

The hardest crossword puzzle EVERRR crossword puzzle
Across
  1. Someone fraudulently trying to gain access to an unauthorized system.
  2. Any security practice put in place to mitigate a security event or incident from occurring.
  3. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
  4. Most useful tool in cybersecurity, pretty much.
  5. The practice of utilizing trial and error to guess credentials.
  6. Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
  7. Copies of data
  8. A condiment
  9. describes a minor disruption to the digital landscape that is thought to be unintentional
Down
  1. A data file through which the identity, authenticity and reliability of a website or web application is established.
  2. Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
  3. A possibility of being attacked or harmed
  4. responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
  5. A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
  6. A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.

15 Clues: A condimentCopies of dataA possibility of being attacked or harmedMost useful tool in cybersecurity, pretty much.The practice of utilizing trial and error to guess credentials.Someone fraudulently trying to gain access to an unauthorized system.Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?...

Security Awareness Month 'SAM' June 2014 2014-05-19

Security Awareness Month 'SAM' June 2014 crossword puzzle
Across
  1. Feeling of worry
  2. Safeguarding
  3. Information
  4. Alertness
  5. Free from danger
  6. Anagram ssapse
  7. On your guard
  8. Set of principles
  9. Firmly fixed
Down
  1. Feel protected
  2. Mentally lively
  3. Opposite of answers
  4. Private
  5. Security device
  6. Touchy easily upset
  7. Hazard

16 Clues: HazardPrivateAlertnessInformationSafeguardingFirmly fixedOn your guardFeel protectedAnagram ssapseMentally livelySecurity deviceFeeling of worryFree from dangerSet of principlesOpposite of answersTouchy easily upset

SOCIETAL EMPACT (TANISHKA JHA) 2022-01-02

SOCIETAL EMPACT (TANISHKA JHA) crossword puzzle
Across
  1. Digital footprints we intentionally leave online
  2. ____ is a person who sows discord on internet by posting off topic messages.
  3. To prevent the loss of personal info to criminals or pollution send the non-usable devices to a certified ____________ .
  4. The activity history stored online is__________
  5. The information uploaded online is stored in the ________ .
  6. ______ is giving threats online or posting victim's personal info etc.
  7. Not responding to unnecessary and irrelevant emails or comments is being _________ .
  8. We shouldn't use ____________ materials without the permission of the creator or owner.
Down
  1. Respect the ____________ of the people in terms of knowledge and experience.
  2. Digital ________ work on a unique digital ID issued by a CA to the user.
  3. Cyber Appellate ___________ has been established to resolve disputes arising from cyber crime.
  4. We can ________ our used electronic gadgets to trustful organizations that can give it to the needy who cannot afford it otherwise.
  5. To think before uploading is being ____________ .
  6. What is an example of cloud shared storage?
  7. A person's ________ is judged before relying on said person's comments and claims online.
  8. Digital footprints trail we unintentionally leave online
  9. ___________ include old mobile phones , CDs or pen drives.
  10. Our digital footprints cannot be ___________ deleted.

18 Clues: What is an example of cloud shared storage?The activity history stored online is__________Digital footprints we intentionally leave onlineTo think before uploading is being ____________ .Our digital footprints cannot be ___________ deleted.Digital footprints trail we unintentionally leave online...

Famous 1963 Pop Culture and Inventions 2023-11-11

Famous 1963 Pop Culture and Inventions crossword puzzle
Across
  1. Jean Nidetch founded this now (in)famous organization
  2. Chinese actor and film producer best known for his prowess in martial arts
  3. layered, like an onion (or an ogre), he's a man of many talents and accents!
  4. first liver ____ and lung ____ surgeries are performed
  5. rapper Leon Ivey Jr's stage name, can be synonymous with "okie dokie"
  6. this alternative to rotary dial was first made publicly available by Bell Systems
  7. athlete Jordan's first name was the most popular for boys in 1963
  8. introduced in 1963, these would become the dominant music format in the 1980s
  9. first name of the first Black Miss America, was later prolific on screen and stage
  10. last name of American director whose films contain copious amounts of violence, gore, and profanity
Down
  1. played a pirate, a chocolatier, and a chocolatier's boyfriend
  2. psychedelic showpieces that now help cyber security companies generate random numbers
  3. a drink ML would never enjoy, quick fix way of consuming caffeine
  4. time traveling adventurer whose first episode aired 3 days after ML was born
  5. shares a birthday with ML! This actress voiced the character Mulan in Disney's 1998 animated film
  6. Doug Englbart's solution for controlling a pointer on a graphic display, this electronic "rodent" is still widely used today
  7. released in '63, this Hitchcock film's titular creatures begin attacking humans
  8. actress whose quirky character frequently performed the song "Smelly Cat"
  9. vaccine for this childhood disease was made available
  10. John who will always be "Uncle Jesse"
  11. first to earn People magazine's "Sexiest Man Alive" title twice

21 Clues: John who will always be "Uncle Jesse"Jean Nidetch founded this now (in)famous organizationvaccine for this childhood disease was made availablefirst liver ____ and lung ____ surgeries are performedplayed a pirate, a chocolatier, and a chocolatier's boyfriendfirst to earn People magazine's "Sexiest Man Alive" title twice...

Module 3 LU1 &LU2 2025-04-02

Module 3 LU1 &LU2 crossword puzzle
Across
  1. Which QA activity ensures that team members follow defined standards and guidelines?
  2. Which aspect of QA focuses on refining procedures to enhance efficiency and effectiveness?
  3. What testing method ensures software can handle expected workload and stress?
  4. What is the final testing phase where end-users confirm the software meets their needs?
  5. What are issues or errors found in the software that testing aims to identify and fix?
  6. Which test objective ensures software adheres to legal, regulatory, and contractual requirements?
  7. What is a static testing method that checks documents, designs, and specifications without executing code?
  8. Which testing phase ensures different components work together seamlessly?
  9. What is the core element being assessed in testing to ensure quality and functionality?
  10. What is the process of identifying the fundamental reason behind a defect?
  11. Which comprehensive testing phase evaluates the entire software application for expected performance?
Down
  1. What process focuses on preventing defects rather than just detecting them?
  2. What is the process of locating and fixing defects found during testing?
  3. Which process involves tracking and managing defects until resolution?
  4. What measures how consistently software performs over time without failure?
  5. Which important aspect of testing ensures protection against cyber threats and vulnerabilities?
  6. What proactive measure involves reviewing code to prevent defects?
  7. What is a dynamic testing process that involves executing code to confirm it meets requirements?
  8. What testing activity involves running test cases and documenting results?
  9. Which technique ensures software is built correctly according to specifications?
  10. Which testing process ensures that software meets user needs and requirements?
  11. What is another term for flaws or issues found in software during testing?

22 Clues: What proactive measure involves reviewing code to prevent defects?Which process involves tracking and managing defects until resolution?What is the process of locating and fixing defects found during testing?What testing activity involves running test cases and documenting results?...

CIA Triad 2024-10-07

CIA Triad crossword puzzle
Across
  1. Organizing data based on sensitivity.
  2. Protecting information from unauthorized access.
  3. Converting data into a secure format.
  4. Control over who can view or use data.
  5. Assessing security practices and compliance.
  6. Creating a unique representation of data.
  7. Additional resources to ensure availability.
  8. Responsible handling of data.
  9. Guaranteeing information is available when needed.
Down
  1. Following regulations and standards.
  2. An occurrence that may compromise security.
  3. Events that hinder access to data.
  4. Verifying data integrity through calculations.
  5. Ensuring data remains unaltered and trustworthy.
  6. Informing users about security practices.
  7. Potential causes of data breaches or loss.
  8. Creating copies of data for restoration.
  9. Actions taken to minimize risks or impacts.
  10. Verifying the source and integrity of data.
  11. Confirming user identity before access.

20 Clues: Responsible handling of data.Events that hinder access to data.Following regulations and standards.Organizing data based on sensitivity.Converting data into a secure format.Control over who can view or use data.Confirming user identity before access.Creating copies of data for restoration.Informing users about security practices....

Media and Technology 2020-11-17

Media and Technology crossword puzzle
Across
  1. Luddites
  2. patents
  3. gap
  4. globalization
Down
  1. patents
  2. feminism
  3. obsolescence
  4. divide

8 Clues: gapdividepatentspatentsLudditesfeminismobsolescenceglobalization

Cyberbullying 2024-11-08

Cyberbullying crossword puzzle
Across
  1. Safety
  2. Shaming
  3. Speech
Down
  1. Footprint
  2. Health
  3. threats
  4. Media

7 Clues: MediaHealthSafetySpeechthreatsShamingFootprint

11/10 Fndts Vocab 2021-11-10

11/10 Fndts Vocab crossword puzzle
Across
  1. The background of the project where the Actors are placed
  2. Hackers ethical hackers use skills for good, ethical and legal purposes to compromise networks/systems to discover network vulnerabilities in order to be fixed by developers
  3. stops character from leaving a trial
  4. Persistent Threat a continuous computer hack that occurs under the radar against a specific object
  5. uses quotations marks at the beginning and end of this data; not recognized by the programming software
  6. The order in which steps or events happen
  7. determines how quickly an object will move through commands
  8. A set of known actions that the computer can perform
  9. A Tynker character or object that can talk and interact with others
  10. this code is used to move objects forward
Down
  1. Hackers individuals who commit crimes and unethical things, not for personal gain or damage, but to allow the affected organization to know of compromised or weakness in networks
  2. uses a hashtag to begin the text that is unrecognized by the programming software used for informational purposes only
  3. has character start drawing a trail
  4. Broker grey hat hackers: attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
  5. Warning Systems provide information about potential attacks
  6. The language that tells a computer what to do
  7. A specific action or instruction that tells the computer to do something
  8. Moves Tracy to a specified coordinate
  9. Domains an area to be protected may be limited by a logical or physical boundary
  10. Hackers unethical criminals that violate computer/network security

20 Clues: has character start drawing a trailstops character from leaving a trialMoves Tracy to a specified coordinateThe order in which steps or events happenthis code is used to move objects forwardThe language that tells a computer what to doA set of known actions that the computer can performThe background of the project where the Actors are placed...

Cyber Bullying 2015-03-09

Cyber Bullying crossword puzzle
Across
  1. the form of bullying by fighting in order to harm the victim.
  2. which social media site has the logo of an F?
  3. the opposite of up stander. someone who is present at an event but does not get involved.
  4. most cyber bullying is carried out online using a mobile .....
  5. which social media site has the logo of a bird?
Down
  1. someone who stands up for something
  2. which social media app is used to send photographs?. This app has a yellow logo.
  3. the form of bullying used online.
  4. where somebody attempts to take their own life.
  5. the form of bullying that relies on the use of language (shouting.)

10 Clues: the form of bullying used online.someone who stands up for somethingwhich social media site has the logo of an F?where somebody attempts to take their own life.which social media site has the logo of a bird?the form of bullying by fighting in order to harm the victim.most cyber bullying is carried out online using a mobile ........

TTS REVOLUSI INDUSTRI 2025-09-22

TTS REVOLUSI INDUSTRI crossword puzzle
Across
  1. Revolusi Industri kedua ditandai dengan penggunaan listrik secara luas (marketing 2.0)
  2. Era marketing yang memakai teknologi canggih untuk meningkatkan pengalaman manusia (Marketing 5.0)
  3. Revolusi Industri ketiga ditandai dengan hadirnya komputer dan otomatisasi (marketing 3.0)
  4. Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan (Marketing 3.0)
Down
  1. Era marketing yang menekankan komunitas, keberlanjutan, dan tanggung jawab sosial (Marketing 6.0)
  2. Revolusi Industri keempat dikenal dengan istilah cyber physical system (marketing 4.0)
  3. Era marketing yang berfokus pada kebutuhan dan keinginan konsumen (Marketing 2.0)
  4. Era marketing yang menggabungkan pemasaran tradisional dengan dunia digital (Marketing 4.0)
  5. Era marketing yang berorientasi pada produk (Marketing 1.0)
  6. Revolusi Industri pertama ditandai dengan penemuan mesin uap (marketing 1.0)

10 Clues: Era marketing yang berorientasi pada produk (Marketing 1.0)Revolusi Industri pertama ditandai dengan penemuan mesin uap (marketing 1.0)Era marketing yang berfokus pada kebutuhan dan keinginan konsumen (Marketing 2.0)Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan (Marketing 3.0)...

Match the Card to the Duelist 2023-04-06

Match the Card to the Duelist crossword puzzle
Across
  1. Elemental HERO Divine Neos
  2. Cyber End Dragon
  3. Bloom Diva the Melodious Choir
  4. Number 106: Giant Hand
  5. Earthbound Immortal Ccapac Apu
  6. Red Dragon Archfiend
  7. Super Vehicroid Jumbo Drill
  8. Abyss Actor - Superstar
  9. Stardust Dragon
  10. Earthbound Immortal Wiraqocha Rasca
  11. Jinzo
  12. Black Rose Dragon
  13. Dark Necrofear
  14. Harpie Lady Sisters
  15. Ice Beast Zerofyne
  16. Masked Beast Des Gardius
  17. Gandora the Dragon of Destruction
  18. The Legendary Fisherman
  19. Duza the Meteor Cubic Vessel
  20. Ancient Fairy Dragon
  21. Malefic Truth Dragon
  22. Cyber Commander
  23. Borreload Dragon
  24. Pumpking the King of Ghosts
  25. Curse Necrofear
  26. Trickstar Holly Angel
  27. Maiden in Love
  28. Tin Archduke
  29. Rainbow Dragon
  30. Infernity Doom Dragon
  31. Evil HERO Malicious Fiend
  32. Gouki The Great Ogre
  33. Red-Eyes Black Dragon (Good User)
  34. Volcanic Doomfire
  35. Gate Guardian
Down
  1. Galaxy-Eyes Photon Dragon
  2. Fairy Cheer Girl
  3. Ojama King
  4. Indiora Doom Volt the Cubic Emperor
  5. Yubel
  6. Fortune Fairy Chee
  7. Destiny Hero - Plasma
  8. Number 39: Utopia
  9. Salamangreat Heatleo
  10. Orgoth the Relentless
  11. Insect Queen
  12. Power Tool Dragon
  13. Black-Winged Dragon
  14. Odd-Eyes Pendulum Dragon
  15. Ancient Gear Golem
  16. D/D/D Doom King Armageddon
  17. Goyo Guardian
  18. Sephylon, the Ultimate Timelord
  19. Number 32: Shark Drake
  20. Number 15: Gimmick Puppet Giant Grinder
  21. Water Dragon
  22. Dark Rebellion Xyz Dragon
  23. Raidraptor - Rise Falcon
  24. Blue-Eyes White Dragon (Primary User)
  25. T.G. Halberd Cannon
  26. Lava Golem
  27. Number 6: Chronomaly Atlandis
  28. Cyber Blader
  29. Dark Magician (Good User)
  30. Relinquished
  31. Decode Talker
  32. Blue-Eyes White Dragon (Secondary User)
  33. Earthbound Immortal Aslla Piscu
  34. Dark Magician Girl
  35. Superdreadnought Rail Cannon Gustav Max
  36. Mine Golem
  37. Ultimate Tyranno
  38. Fossil Warrior Skull King
  39. Meklord Emperor Wisel
  40. Frightfur Bear
  41. Red-Eyes Black Dragon (Evil User)
  42. Superheavy Samurai Big Benkei
  43. Arcana Force EX - The Light Ruler
  44. Barrel Dragon
  45. Elemental HERO Neos
  46. Blast Held by a Tribute
  47. Dark Magician (Evil User)
  48. Meklord Astro Mekanikle
  49. Embodiment of Apophis

84 Clues: YubelJinzoOjama KingLava GolemMine GolemInsect QueenWater DragonCyber BladerRelinquishedTin ArchdukeGoyo GuardianDecode TalkerBarrel DragonGate GuardianDark NecrofearFrightfur BearMaiden in LoveRainbow DragonStardust DragonCyber CommanderCurse NecrofearFairy Cheer GirlCyber End DragonBorreload DragonUltimate TyrannoNumber 39: Utopia...

stego 2023-08-01

stego crossword puzzle
Across
  1. .... .... was an anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
  2. Shadowy cyber collective widely known because of its work since 02.2022.
  3. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  4. Rhysider 44.
  5. A remote code execution flaw in Nginx web server.
Down
  1. u icy data
  2. Powerful intercepting proxy and web vulnerability scanner.
  3. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  4. Lbrozz Ignceunywfz Gkwdrz; key - information

9 Clues: u icy dataRhysider 44.Lbrozz Ignceunywfz Gkwdrz; key - informationA remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Shadowy cyber collective widely known because of its work since 02.2022.Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS....

Shields and Scrubs Issue #1 2025-08-07

Shields and Scrubs Issue #1 crossword puzzle
Across
  1. A tool to assess agitation: Staring, Tone, Anxiety, Mumbling, Pacing.
  2. Outpatient care setting included in recent safety assessments.
  3. To calm a tense or aggressive situation.
  4. If a caller makes these, it may be time to end the call.
  5. A phone feature that can help reset a tense moment.
  6. Setting these respectfully can help prevent escalation.
  7. Team focused on keeping everyone safe across all campuses.
  8. Calm, clear ________ helps reduce verbal abuse.
Down
  1. Essential for a safe workplace—no one does it alone.
  2. A feeling that empathy and listening can help ease.
  3. Manager overseeing security at ambulatory and admin locations.
  4. Security Manager at WCMC focused on violence prevention.
  5. Chief of Security who shares tips in “Chief’s Corner.”
  6. What all verbal abuse incidents should be promptly turned in as.
  7. Showing empathy can help build this with others.
  8. System used to report workplace violence and safety incidents.
  9. Along with ambulatory, one area Andy helps protect.
  10. Always treat others with this—even under stress.
  11. Vocal quality that can calm or escalate a situation.
  12. Acronym for Walnut Creek Medical Center.

20 Clues: To calm a tense or aggressive situation.Acronym for Walnut Creek Medical Center.Calm, clear ________ helps reduce verbal abuse.Showing empathy can help build this with others.Always treat others with this—even under stress.A feeling that empathy and listening can help ease.A phone feature that can help reset a tense moment....

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Social engineers use this to trick you
  2. The practice of being diligent about your online activities
Down
  1. Assurance that information is accurate and Trustworthy
  2. Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. not disclosing information to unauthorized individuals

5 Clues: Social engineers use this to trick youAssurance that information is accurate and Trustworthynot disclosing information to unauthorized individualsThe practice of being diligent about your online activitiesEngineer Someone who takes information from many sources and uses them to piece together a bigger puzzle

Cyber Security October'23 2023-10-10

Cyber Security October'23 crossword puzzle
Across
  1. A common method used by cybercriminals to trick people.
  2. What you should do with your passwords to make them more .
  3. A program that can protect your computer from viruses and malware.
Down
  1. Malicious software that can damage your computer or steal your data.
  2. The act of keeping your sensitive information secret online.

5 Clues: A common method used by cybercriminals to trick people.What you should do with your passwords to make them more .The act of keeping your sensitive information secret online.A program that can protect your computer from viruses and malware.Malicious software that can damage your computer or steal your data.

Financial Market 2025-05-15

Financial Market crossword puzzle
Across
  1. A customized contract to buy or sell at a predetermined future date and price.
  2. A debt security with a promise to pay a certain sum.
  3. – An authority supervising the financial market.
  4. A derivative financial instrument granting the right, but not the obligation, to execute a transaction.
  5. A debt security confirming the issuer's obligation to repay the debt.
  6. A financial instrument based on the value of an underlying asset.
  7. The main instruments traded in the financial market.
  8. A monetary loan provided under conditions of repayment and interest.
  9. Long-term financial resources.
  10. An organized market where financial instruments are traded.
Down
  1. A place where financial assets are bought and sold.
  2. A security representing ownership in a company.
  3. Risk management through derivative contracts.
  4. A system of economic relations for forming and using monetary funds.
  5. A measure of investment efficiency.
  6. A standardized exchange-traded contract for future delivery.
  7. An intermediary in financial market transactions.
  8. A party that allocates capital to generate profit.
  9. A security that represents a bank deposit.
  10. A universal medium of exchange.

20 Clues: Long-term financial resources.A universal medium of exchange.A measure of investment efficiency.A security that represents a bank deposit.Risk management through derivative contracts.A security representing ownership in a company.– An authority supervising the financial market.An intermediary in financial market transactions....

SOCIAL MEDIA 2021-05-01

SOCIAL MEDIA crossword puzzle
Across
  1. personne qui peut influencer les goûts des autres
  2. l'humiliation
  3. abonné
  4. la peur d'être séparé de son portable
  5. publier
  6. l'estime de soi
Down
  1. le cyber-harcèlement
  2. détestable
  3. le financement participatif
  4. la haine de soi
  5. mettre en valeur
  6. qui est sur la même longueur d'ondes
  7. un(e) pré-adolescent(e)
  8. hors connexion

14 Clues: abonnépublierdétestablel'humiliationhors connexionla haine de soil'estime de soimettre en valeurle cyber-harcèlementun(e) pré-adolescent(e)le financement participatifqui est sur la même longueur d'ondesla peur d'être séparé de son portablepersonne qui peut influencer les goûts des autres

Science, Technology, and Society 2024-12-15

Science, Technology, and Society crossword puzzle
Across
  1. computing: Processing data near its source.
  2. New or improved ideas/products.
  3. Literacy: Understanding media messages.
  4. Highest biological group.
  5. Water vapor in the sky.
  6. Machine for processing information.
  7. Exists in a digital world.
  8. oxide: Laughing gas and pollutant.
  9. Holding radical views.
  10. Group of related organisms.
  11. Range of different things.
  12. Level under class.
  13. Basic unit of biological classification.
  14. Early device to play music.
  15. change: Global weather patterns shifting.
  16. Division: Separation within society.
  17. Games: Interactive digital entertainment.
  18. Level below phylum.
  19. Grouping above species.
  20. resources: Freshwater supply.
  21. Day-to-day atmospheric conditions.
  22. hacker: Legal cybersecurity tester.
  23. Prevents infectious diseases.
  24. World becoming interconnected.
  25. Unrest: Protests or disturbances in society.
  26. Global network of networks.
  27. Classification of living things.
  28. warming: Rising Earth's temperatures.
  29. Services for maintaining health.
  30. security: Reliable access to food.
  31. Key electronic component.
  32. Tools to make life easier.
  33. Long-term weather patterns.
  34. Organized in levels.
Down
  1. Related to DNA or heredity.
  2. Traffic or decision-making standstill.
  3. Using resources too much.
  4. media: Online platforms to connect people.
  5. A machine to write letters.
  6. Enhances reality with digital elements.
  7. security: Protecting digital information.
  8. migration: Large-scale movement of people.
  9. Mini computer in your pocket.
  10. Digital letter service.
  11. Keeping personal information safe.
  12. Early system to send messages.
  13. induced: Caused by nature.
  14. wide web: Connects websites globally.
  15. Potent greenhouse gas.
  16. Community of living and nonliving things.
  17. Second level in classification.
  18. gases: Trap heat in Earth's atmosphere.
  19. dioxide: A major greenhouse gas.
  20. Machines doing tasks automatically.
  21. areas: Lands near the sea.
  22. Variety of life on Earth.
  23. Uneven distribution of resources.
  24. Device to talk over distance.
  25. Tiny particles in the air.
  26. induced: Result of human activity.

60 Clues: Level under class.Level below phylum.Organized in levels.Holding radical views.Potent greenhouse gas.Water vapor in the sky.Digital letter service.Grouping above species.Using resources too much.Highest biological group.Variety of life on Earth.Key electronic component.Exists in a digital world.induced: Caused by nature.Range of different things....

Dylan-cyber safety 2016-05-31

Dylan-cyber safety crossword puzzle
Across
  1. something that tricks you and stuffs up your computer
  2. somebody who cares for you
  3. at least one in a class
  4. something you use for social media
  5. somebody who follows you online
  6. somebody taking something private
  7. somebody who teaches
  8. being rude online
  9. telling something about someone that they don't want to get out
  10. to keep it to yourself
  11. a social media program that you have to be 18+ to use
  12. something that can belong to someone
Down
  1. talking to someone
  2. to do with coding and computers
  3. protects viruses from a device
  4. something you need for some of your information
  5. a way of communicating online
  6. going into something personal with code ect.
  7. something that you don't control
  8. a rude way of saying a word in another way
  9. a social media program
  10. put something on something

22 Clues: being rude onlinetalking to someonesomebody who teachesa social media programto keep it to yourselfat least one in a classsomebody who cares for youput something on somethinga way of communicating onlineprotects viruses from a deviceto do with coding and computerssomebody who follows you onlinesomething that you don't control...

Senior Cyber Crossword 2020-12-24

Senior Cyber Crossword crossword puzzle
Across
  1. A computer screen that doesn’t need a mouse
  2. A virtual meeting service
  3. A not-so-yummy way for websites to remember users
  4. A person who uses digital tools to test or break into secure systems
  5. A type of legal control imposed on companies
  6. The _____ system controls the basic functions of your computer
  7. Software that includes advertising
  8. Canned meat, or unwanted email
  9. A person who uses their computer skills to break the law
  10. Malicious software that extorts money
  11. A.I.
  12. A company’s rules about handling private user data
  13. A switching device that dispatches data to multiple destinations
  14. A security system that uses aspects of your physical body to identify you as an authorized user
  15. A website dedicated to user-created videos
Down
  1. A secret access code
  2. The act of breaking into a secure system is called a ______
  3. A method of impersonating a device or user for nefarious purposes
  4. A pocket-sized phone with extended functionality
  5. A method of keeping information secret
  6. Technology and practices that keep your digital information secret
  7. Cybernetically enhanced human, or digital device brand
  8. A very shiny kind of metal
  9. A trip among the animals
  10. Net _____, a service provider’s guarantee they will not censor internet content
  11. A method of tricking people into giving away secure information
  12. The “name” of a website
  13. A mathematical formula used by computers to automate complex tasks
  14. A method of breaching a secure system by hiding malicious code inside a file
  15. A new term for the Internet

30 Clues: A.I.A secret access codeThe “name” of a websiteA trip among the animalsA virtual meeting serviceA very shiny kind of metalA new term for the InternetCanned meat, or unwanted emailSoftware that includes advertisingMalicious software that extorts moneyA method of keeping information secretA website dedicated to user-created videos...

Basics of Cyber 2023-09-01

Basics of Cyber crossword puzzle
Across
  1. Creates a method to keep access to a machine or network
  2. Hackers for Good
  3. Information not disclosed to unauthorized individuals
  4. Purposefully Malicious Hackers
  5. Propagates like a virus, but uses network services to move around. Executes on its own once it finds a host
  6. Users must confirm identity to access data and systems
  7. Computer Program/part of a program that has damaging/unwanted effects on computer
  8. Leaving a piece of storage in an open location
  9. Proof of delivery and proof of sender’s identity
  10. Authorized users are able to access info quickly and easily, Systems work even during difficult times
  11. Emails pretending to be legit companies
Down
  1. Uses made up scenario
  2. Data is accurate and complete, Data is not altered or destroyed
  3. Favor for a favor
  4. Psychological manipulation to get people to perform actions or reveal confidential information
  5. Gathers data and sends it to another entity
  6. Hundreds or millions of computer that have been compromised
  7. Sits quietly until a condition is met
  8. Looks like something useful. Could install backdoors, rootkits, or turn your machine into a zombie
  9. Self-replicating software, attaches to another program or file. Only runs when the program or file is opened.
  10. Follow authorized user into secure area

21 Clues: Hackers for GoodFavor for a favorUses made up scenarioPurposefully Malicious HackersSits quietly until a condition is metFollow authorized user into secure areaEmails pretending to be legit companiesGathers data and sends it to another entityLeaving a piece of storage in an open locationProof of delivery and proof of sender’s identity...

CYBER SMART CROSSWORD 2024-09-05

CYBER SMART CROSSWORD crossword puzzle
Across
  1. The address of a webpage. Check the validity of it before clicking on it.
  2. Should be constructed of upper and lower case letters, numbers, and special characters.
  3. Hardware or software designed to prevent unauthorized access to or from a private network.
  4. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  5. A sequence of words or text used to control access to a computer; similar to a password.
  6. Unauthorized access to a network, information systems, or application.
  7. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  8. Threatening behavior facilitated through electronic means such as texting.
  9. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
Down
  1. The process of taking plain text and scrambling it into an unreadable format.
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  4. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  5. A fraudulent email purportedly from a reputable company attempting to get personal information.
  6. Verifying identity.
  7. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  8. The “A” in the C-I-A Triad. It ensures authorized users have access.
  9. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  10. Facebook, Twitter, Instagram, etc. (Two words)
  11. The “I” in the C-I-A Triad; protection from unauthorized changes.

20 Clues: Verifying identity.Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cyber Ethics 🧑🏻‍💻 2025-05-28

Cyber Ethics 🧑🏻‍💻 crossword puzzle
Across
  1. An impression or information about a person taht exists on the internet because of his online activity.
  2. Illegal intrusion into a computer system or network.
  3. When software is copied & distibuted illegally.
  4. Full form of ICT
  5. Act of being aware of the ethical practices & behaving responsibly & appropiately while using the internet.
  6. Act of sending a fraud email to a user and misleading him to believe that it is from a trusted source.
  7. Fraudulently obtaining money from depositors by claiming to be from an authorise bank.
  8. The process of transforming data into unreadable code.\
  9. This refers to an act of stealing and misusing someone's ID .
  10. The rules making everyone respect the privacy of others.
  11. Security system that prevents unauthorised people from accessing the system or network.
  12. Legal right granted by the law to the creator for his original work.
  13. Act of harming or harassing a person through internet.
Down
  1. Converting Unreadable code to readable data.
  2. Act of Imitating the language and thoughts of another person as one's original work.
  3. Unwanted bulk of fraudulent messages from unknown sources.
  4. A computer program or a set of programs that disrupts the normal functioning of the computer.
  5. Accessing the internet in an illegal manner.
  6. Hacking done for a good cause, such as natinal security.
  7. Criminal activites done though Internet and comouters

20 Clues: Full form of ICTConverting Unreadable code to readable data.Accessing the internet in an illegal manner.When software is copied & distibuted illegally.Illegal intrusion into a computer system or network.Criminal activites done though Internet and comoutersAct of harming or harassing a person through internet....

Cyber securuty - 2 2025-07-08

Cyber securuty - 2 crossword puzzle
Across
  1. Exploiting a bug or vulnerability to gain elevated access rights.
  2. A network protocol for collecting IP traffic information.
  3. A framework for managing digital keys and certificates.
  4. A server that acts as an intermediary for requests from clients.
  5. Reviewing logs to detect suspicious or unauthorized activities.
  6. An attack where the attacker secretly intercepts communication between two parties.
  7. A system that actively blocks detected threats.
  8. A system that monitors and controls incoming and outgoing network traffic.
  9. Software designed to cause damage or unauthorized actions.
  10. A security risk originating from within the organization.
  11. A set of procedures for identifying and handling security incidents.
  12. Actions taken after gaining access, like data extraction.
  13. Software or hardware that detects unauthorized access or anomalies.
  14. Taking advantage of vulnerabilities to gain access.
  15. Strategies to detect and prevent threats from within the organization.
  16. Guaranteeing the accuracy and completeness of data.
  17. A software update designed to fix vulnerabilities or bugs.
  18. Controlling network access using device MAC addresses.
  19. Sending IP packets with a false source IP address.
Down
  1. A framework for developing and executing exploit code.
  2. Dividing a network into segments to improve security.
  3. Preventing parties from denying their actions or commitments.
  4. The process of applying updates to software to fix vulnerabilities.
  5. A function that converts data into a fixed-size string of characters.
  6. Creating an exact copy of a digital device for investigation.
  7. scanning, Checking for open ports to identify services running on a system.
  8. A European regulation on data protection and privacy.
  9. The process of sharing cryptographic keys securely.
  10. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  11. A tool that captures and analyzes network traffic.

30 Clues: A system that actively blocks detected threats.A tool that captures and analyzes network traffic.Sending IP packets with a false source IP address.The process of sharing cryptographic keys securely.Taking advantage of vulnerabilities to gain access.Guaranteeing the accuracy and completeness of data....

Cyber Society Final 2025-05-16

Cyber Society Final crossword puzzle
Across
  1. In short, Aristotle contends that the best friendship is one that we might call ______ friendship.
  2. The IT Team's critical tasks include keeping all software and systems ______.
  3. Assistive _______ products help maintain or improve an individual's functioning related to cognition, communication, hearing, mobility, self-care and visions, thus enabling their health, well being, inclusion, and participation.
  4. _____ is about protecting your digital information and systems.
  5. The CEO's Role in cybersecurity includes creating a _____ where everyone cares about digital safety.
  6. A networked society has major influence on the way we communicate. Instant messaging and video calls connect us _______.
  7. ____________ is a type of cyberattack where someone tries to trick you into giving away sensitive information like passwords, credit card numbers, or personal details—by pretending to be someone you trust.
  8. Smart and self-driving cars are a major advancement in transportation, but their reliance on complex technologies and connectivity also introduces several __________ risks.
  9. According to Aristotle there is only one type of friendship that is pure in its virtue and in its addition to/necessity for a good life. This is the purest form of friendship or "friendship of ______".
  10. Data integrity refers to the accuracy, completeness, _____, and trustworthiness of data.
  11. Cyber _____ aim to stop things like data breaches, identity theft, online harassment, and ransomware attacks—all of which cause real harm.
  12. Artificial __________: The ability for a computer or machine to complete tasks that are usually done by humans.
Down
  1. Technology can either _____ or undermine friendships.
  2. Cyberattacks are unique in their subtlety, scope, and psychological impact, often targeting the ______ of modern life rather than just its physical components.
  3. MFA stands for ______ Authentication: Your data shield
  4. AI Chatbots: a tool that can understand language and is constantly _____ from it's conversations.
  5. Citizen science involves public ____________ in scientific research. It connects people to science and nature. Examples include biodiversity monitoring and environmental data collection.
  6. Chat GPT: A tool that can understand language and is constantly learning from it's conversation. You can ask them a question, and they can provide a human-like response based on ________ data.
  7. Worm GPT: An AI chat bot that was created for ________ activities.
  8. Data transfer is ____ data from one computer to another.
  9. ‘Leaving no one behind’ means ensuring people with disabilities, the older population, those affected by chronic diseases and everyone who needs ____________ technology are included in society and able to live healthy and dignified lives.
  10. _____ networks amplify voices for social change; Online platforms mobilize support for causes.
  11. Aristotle's claim is that companion friendships are ______ to a good life.
  12. A networked society connects _____, organizations, and devices through digital networks.

24 Clues: Technology can either _____ or undermine friendships.MFA stands for ______ Authentication: Your data shieldData transfer is ____ data from one computer to another._____ is about protecting your digital information and systems.Worm GPT: An AI chat bot that was created for ________ activities....

Cyber Ethics Rishav 2025-05-30

Cyber Ethics Rishav crossword puzzle
Across
  1. Deliberately posting offensive content online
  2. Unauthorized access to or manipulation of computer systems
  3. A secret word used to access systems
  4. THEFT Stealing someone's personal info to impersonate them
  5. A dishonest scheme online to trick users
  6. Restriction of access to certain internet content
  7. Moral principles guiding digital behavior
  8. A security measure to block unauthorized access
  9. Using someone else's work without credit
Down
  1. The process of encoding information for security
  2. Fraudulent attempt to obtain sensitive information via email
  3. Software used to detect and remove malicious programs
  4. Small data files stored on a user's device by websites
  5. Software designed to harm or exploit systems
  6. Software that secretly gathers user data
  7. NEWS False information spread online as real news
  8. Permission for data collection or actions online
  9. Bullying that occurs over digital devices
  10. A global system of interconnected networks
  11. The right to control personal information online

20 Clues: A secret word used to access systemsSoftware that secretly gathers user dataA dishonest scheme online to trick usersUsing someone else's work without creditBullying that occurs over digital devicesMoral principles guiding digital behaviorA global system of interconnected networksSoftware designed to harm or exploit systems...