cyber security Crossword Puzzles
Schoeman Wedding 2025-07-14
13 Clues: Bride's Name? • Groom's Name? • Garth's Vendor? • Kelly's Employer? • XON Head of Cyber? • Rynier's Employer? • Fran's wife's name? • Where is Aidan from? • Video game Arthur plays? • Palo Territory Director? • Oom Piet & Henri's Vendor? • What Rynier does all the time? • Gender for Ilze and Dillons' little one?
Active Shooter Awareness 2025-09-11
Across
- - Measures taken to be safe.
- - A system of signals or symbols.
- - React quickly to a situation.
- - Take action to defend oneself.
- - A serious, unexpected situation
- - Knowledge of a situation.
- - Move quickly away from danger.
- - Conceal oneself from danger.
Down
- - Security measure to restrict movement.
- - Place giving protection from danger.
- - Keep safe from harm.
- - Protective barrier or defense.
- - Remove people from a place of danger.
- - Process of learning skills.
- - Be quick to notice and respond to danger.
- - U.S. Department responsible for public security.
- - Indication of possible danger.
- - Condition of being protected from harm.
18 Clues: - Keep safe from harm. • - Knowledge of a situation. • - Measures taken to be safe. • - Process of learning skills. • - Conceal oneself from danger. • - React quickly to a situation. • - Protective barrier or defense. • - Take action to defend oneself. • - Indication of possible danger. • - Move quickly away from danger. • - A system of signals or symbols. • ...
Simon's January News Crossword Puzzle 2014-01-22
Across
- The name of the person that his staffs are under scrutiny of closing bridges for political revenge.
- Colorado and Washington State legalize this "drug".
- What US government agency implanted radio frequency software in thousands of computers which can be wrongfully used for cyber attacks.
- Which company have to pay 32.5 million dollar to the US Federal Trade Commission for allowing children to purchase applications without their parents consent?
- What is the Ford's new F-150's body frame made out of?
- How many school shootings took place in United State in January?
Down
- What is the name of the guy who was allowed to take his pipe bomb even after Canadian Air Transport Security Authority in Edmonton noticed the explosive?
- What is the name of the 11th Prime Minister of Israel who died on January 11, 2014 (Israel Time)?
- Who won the Ballon d'Or?
- Which film won the best picture in drama for the 2014 Golden Globe Award?
- Who is the Famous MLB player suspended for a year for usage of performance enhancing drugs?
11 Clues: Who won the Ballon d'Or? • Colorado and Washington State legalize this "drug". • What is the Ford's new F-150's body frame made out of? • How many school shootings took place in United State in January? • Which film won the best picture in drama for the 2014 Golden Globe Award? • ...
Crossword 2018-09-13
Across
- SIA stands for?
- Lindsay Batoryk is the new?
- Moses Owour gave chase to a?
- The trip to Winner's Circle is organised by the?
Down
- Which systems are very different in the US and in the UK according to Phillip Thomas?
- Security training commences from good?
- The online courses (from the US) for security officers are called?
- Which security officer saved a life?
- What model was developed in the UK in 1994?
- Troy Hewitt's first security job was?
- Outside of which store was the unattended vehicle parked?
- A new contract?
- What is the US threat response called?
- A hobby of Stephen Douglas?
- An officer who helped the Jehova's witness?
- Which award provides credibility through transparent evaluation?
16 Clues: A new contract? • SIA stands for? • A hobby of Stephen Douglas? • Lindsay Batoryk is the new? • Moses Owour gave chase to a? • Which security officer saved a life? • Troy Hewitt's first security job was? • Security training commences from good? • What is the US threat response called? • What model was developed in the UK in 1994? • An officer who helped the Jehova's witness? • ...
SECURITY CROSSWORD CHALLENGE 2024-08-19
Across
- How many business days do you have upon return from Foreign Travel to conduct a Foreign Travel Debrief?
- It is your responsibility to _______ all SAP Fraud, Waste and Abuse.
- Last Name of your Program Security Officer.
- A Template-2/Foreign ____________ is completed if you, your spouse or cohabitant have any continued contact with citizens of another country or dual citizens.
- There is _____ a need to discuss or talk around classified information outside of a SAPF.
- Program material can only be reproduced on equipment approved by the _____.
- When couriering SAP information you must make ________ contact with your destination prior to departure.
- All SAP material must be classified IAW the program ___.
- Report all foreign ________ at least 30 Days in advance.
Down
- Security __________ Are any incident that is not in the best interest of security that does not involve the loss, compromise, or suspected compromise of classified information.
- Security ________ Involves loss, compromise, or suspected compromise of classified information.
- Unauthorized ___________ is communication or physical transfer of classified information to an unauthorized recipient.
- Sharing of accounts and _________ is Strictly Prohibited.
- An exemption to the security requirements.
- Author of the Monthly SETA Newsletter Last name?
- Program discussions can only be conducted in an approved ____.
- Enables an individual to retain SAP accesses when the individual is transferred from one location to another for continued SAP access.
- ____________ Security Specialists provide oversight for SAPF functions to include Facility Operating Procedure (FOP) training for personnel granted unescorted access.
18 Clues: An exemption to the security requirements. • Last Name of your Program Security Officer. • Author of the Monthly SETA Newsletter Last name? • All SAP material must be classified IAW the program ___. • Report all foreign ________ at least 30 Days in advance. • Sharing of accounts and _________ is Strictly Prohibited. • ...
The Internet 1 - 8.º ano - Finder 193 2024-07-09
risk assessment 2017-11-17
Across
- Outage, Communications.
- Workplace Accidents Entrapment.
- Acts, bomb treats
- Materials,Nuclear Power Plant
- Dam, Levee
- Strike,demonstrations
- FEMA
- Explosion
Down
- Control System, Utility Outage
- insurance, part of financial risk mitigation
- Accident,Hazardous Materials
- Hazards Program, USGS
- of risk assessment, potential loss
- Workers from Heat Illness - OSHA
- Technology, Loss of Connectivity
- Pandemic Disease
- Information Technology,Malware Attack Hacking Fraud.
- impact analysis, consequence when business is disrupted
- zone, national flood insurance
19 Clues: FEMA • Explosion • Dam, Levee • Pandemic Disease • Acts, bomb treats • Hazards Program, USGS • Strike,demonstrations • Outage, Communications. • Accident,Hazardous Materials • Materials,Nuclear Power Plant • Control System, Utility Outage • zone, national flood insurance • Workplace Accidents Entrapment. • Workers from Heat Illness - OSHA • Technology, Loss of Connectivity • ...
Hospital Codes 2025-08-13
Across
- severe weather
- hazardous materials release
- hostage situation
- fire
- trauma with surgeons
- stroke team alert
- security lockdown
- missing infant
- security needed
- team to prevent code blue
Down
- cardiac arrest
- trauma without surgeons
- disaster
- bomb threat
- patient has left their area
- activate radiation plan
- assist with patient
- active shooter
- missing child
19 Clues: fire • disaster • bomb threat • missing child • severe weather • cardiac arrest • missing infant • active shooter • security needed • hostage situation • stroke team alert • security lockdown • assist with patient • trauma with surgeons • trauma without surgeons • activate radiation plan • team to prevent code blue • hazardous materials release • patient has left their area
IG crossword 2019-02-18
Across
- Our incident management system
- Permitted by law
- Exposure to danger
- Who or what a person is
- Meeting rules or standards
- A protection code
- Private information
- Relating to computers
- Document outlining a process
- Patient information
Down
- A valuable thing
- A portable computer
- Taking a course
- Protecting from harm
- Make private information known
- Collection of historical documents
- An adverse event
- A written or spoken agreement
- Oversees data processing
- Facts and statistics
20 Clues: Taking a course • A valuable thing • Permitted by law • An adverse event • A protection code • Exposure to danger • A portable computer • Private information • Patient information • Protecting from harm • Facts and statistics • Relating to computers • Who or what a person is • Oversees data processing • Meeting rules or standards • Document outlining a process • A written or spoken agreement • ...
HPE 2019-04-03
Across
- Serious disagreement
- wholesome
- Period of becoming sexually mature
- talk to others
- Pressure reason to become alcholic
- kind of a behaviour
- Bullying bullying through the internet
- beginning of human life
- Male hormone
- Forceful personality
- of a person
Down
- a person has
- Atomic
- come to a settlement
- what happens next
- ability to control others
- people make every day
- Human egg
- different people in society
- what you kick
- Confidence in one
- everyone belongs to
22 Clues: Atomic • wholesome • Human egg • of a person • a person has • Male hormone • what you kick • talk to others • what happens next • Confidence in one • kind of a behaviour • everyone belongs to • come to a settlement • Serious disagreement • Forceful personality • people make every day • beginning of human life • ability to control others • different people in society • Period of becoming sexually mature • ...
The Career Academy 2024-11-22
Across
- Pathway for those interested in learning about materials used in manufacturing, plant layout, materials handling, manufacturing processes, and the use of machines
- Pathway for those interested in learning how to install heating and air conditioning units
- Pathway for those interested in learning how to run electrical wire in a house
- Pathway for those interested in coding and web development
- Pathway for those interested in working in agriculture, medicine, environmental, or veterinary fields
- Pathway for those interested in becoming an educator or daycare provider
- Pathway for those interested in exploring the basics of business ownership, marketing, and management
Down
- Pathway for those interested in cyber security and troubleshooting hardware
- Pathway for those who want to get general education requirements done and transfer to a 2 or 4 year program
- Pathway for those interested in learning how to use tools and equipment for building structures or cabinets
- Pathway for those interested in law enforcement
- Pathway for those interested in design drafting and engineering processes
- Pathway for those who want to learn about being a nurse or health care provider
- Pathway for those interested in basic metal fabrication and building/repairing structures or products using OXY/FUEL and PLASMA cutting, ARC, MIG and TIG welding
- Pathway for those interested in social work, being a case manager, or counselor
- Pathway for those interested in learning food service and hospitality skills
16 Clues: Pathway for those interested in law enforcement • Pathway for those interested in coding and web development • Pathway for those interested in becoming an educator or daycare provider • Pathway for those interested in design drafting and engineering processes • Pathway for those interested in cyber security and troubleshooting hardware • ...
SECURITY TERMINOLOGY 2020-05-24
Across
- The unauthorized disclosure of which, could be expected to cause Serious Damage to National Security
- _______________ Assistance Program
- Used on official government information that should be withheld from the public
- The ability and opportunity to obtain knowledge of classified sensitive information
- Given the name “Purple Dragon”
- Reportable action (two words)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)
- Any person with authorized access to any U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems
- You are required to ____________ suspicious behavior
Down
- Not authorized special accesses such as COMSEC
- The unauthorized disclosure of which, could be expected to cause Exceptionally Grave Damage to National Security
- Devotion or loyalty to a person, group, cause, or country
- Goal of an Insider Threat Program
- Data derived from friendly detectable actions and open-source information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities, or activities
- An adversary having the intent, capability, and opportunity to cause loss or damage
15 Clues: Reportable action (two words) • Given the name “Purple Dragon” • Goal of an Insider Threat Program • _______________ Assistance Program • Not authorized special accesses such as COMSEC • You are required to ____________ suspicious behavior • Devotion or loyalty to a person, group, cause, or country • ...
Computer Security 2016-01-05
Across
- type of theft where con artists get your personal information and access your cash and/or credit
- setting these for Internet use can help protect your privacy and security
- Unwanted e-mail, instant messages, and other online communication
- type of software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.
- These people use the Internet to trick children into meeting with them in person
- act in ways that help protect us against the risks that come with Internet use
Down
- credit bureau where one can specify notation on credit account as added security from fraud
- helps create a protective barrier between your computer and the Internet
- Both children and adults may use the Internet to harass or intimidate other people
- Software that tracks your online activities or displays endless ads
- E-mail sent by online criminals to trick you into giving them money
- Software programs designed to invade your computer, and copy, damage, or delete your data
- E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information
- type of software that helps detect and remove computer viruses before they can cause damage
- Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information
15 Clues: Unwanted e-mail, instant messages, and other online communication • Software that tracks your online activities or displays endless ads • E-mail sent by online criminals to trick you into giving them money • helps create a protective barrier between your computer and the Internet • setting these for Internet use can help protect your privacy and security • ...
Cisco Security 2016-03-15
Across
- Known for fuzzing tools for software crash testing
- _____-_____ Cracking method trying every possible combination
- Attack which denys a machine or resource to intended users. (ABBR)
- First line of defense. Uses safe libraries, length checks, whitelists (2 words)
- Type of security including locked doors, badge readers and surveillance cams
- Monitored isolated data designed to study attack methods
- Vulnerability which can cause unauthorized data retrieval, modification or execution. SQL _____
- Cisco team who manages receipt, investigation and reporting of security vulnerabilities
Down
- Attack which overwrites buffers boundary and adjacent memory
- "Security has to happen at the _________" - John Chambers
- Malicious intent hacker (2 words)
- Psychological manipulation of people to perform actions or divulge security info (2 words)
- Development process Cisco uses to increase resiliency and trustworthiness.
- First half of a login
- Hacker with protective intent (2 words)
15 Clues: First half of a login • Malicious intent hacker (2 words) • Hacker with protective intent (2 words) • Known for fuzzing tools for software crash testing • Monitored isolated data designed to study attack methods • "Security has to happen at the _________" - John Chambers • Attack which overwrites buffers boundary and adjacent memory • ...
Security Threats 2018-05-08
Across
- using common or well known words until the right password is discovered
- using every possible password combination until the right one is discovered
- broad category of malicious software
- standing over someone's shoulder to view what's on their screen
- able to replicate itself from system to system with NO user interaction
- type of attack that seeks to overwhelm system resources
- when hackers target a specific group of people or organization
- sits quietly watching everything you do
Down
- hides itself from the operating system and is invisible to anti-virus and anti-malware solutions
- using people to get around security controls
- someone who is not authorized to enter a particular area does so by following behind someone who is authorized
- tricks users into running an application because they think it will do one thing but actually performs some other malicious function
- able to replicate itself from system to system when a user runs an application
- pretending to be someone you are not to gain network or system access
- holds your system hostage until you pay money
15 Clues: broad category of malicious software • sits quietly watching everything you do • using people to get around security controls • holds your system hostage until you pay money • type of attack that seeks to overwhelm system resources • when hackers target a specific group of people or organization • standing over someone's shoulder to view what's on their screen • ...
Food Security 2024-11-28
Across
- Food grown under the ground, like potatoes and carrots.
- A liquid food made from blending fruits or vegetables.
- Food that grows on trees, like apples and oranges.
- This happens when there isn’t enough food for people to eat.
- People who grow crops and raise animals.
- The most important meal of the day.
- A food that comes from cows and helps build strong bones.
- This animal gives us eggs.
Down
- This sweet treat is made by bees.
- A store where we buy food.
- A red fruit often used in salads or ketchup.
- Farmers grow this sweet yellow fruit with a peel.
- Something farmers use to water their crops.
- Something green that grows in leaves, like spinach.
- This food is white, grows in water, and is eaten in many countries.
15 Clues: A store where we buy food. • This animal gives us eggs. • This sweet treat is made by bees. • The most important meal of the day. • People who grow crops and raise animals. • Something farmers use to water their crops. • A red fruit often used in salads or ketchup. • Farmers grow this sweet yellow fruit with a peel. • Food that grows on trees, like apples and oranges. • ...
Food Security 2024-11-28
Across
- Places where we go to buy stuff
- Money we get after working for specific duration in firm
- Basic rules to live as provided by constitution
- one who provides work opportunities
- Can you get and afford it?
- Manufacturing and production area in bulk
Down
- Balance diet of all the food intakes provides us?
- Government make these to provide and check facilities
- sensation of discomfort physically because of lack of food
- Is there enough?
- People who work on scientific knowledge to deduce facts
- Steps you take to fulfill the requirement
- Farming of crops and other resources
- Status of our physical body in medical terms
- Opposite of harming
15 Clues: Is there enough? • Opposite of harming • Can you get and afford it? • Places where we go to buy stuff • one who provides work opportunities • Farming of crops and other resources • Steps you take to fulfill the requirement • Manufacturing and production area in bulk • Status of our physical body in medical terms • Basic rules to live as provided by constitution • ...
Food Security 2024-11-28
Across
- A nutrient found in meat, beans and spinach, important for red blood cells
- A drink that keeps us hydrated and is essential for survival
- The study of how food affects health and the nutrients the body needs for growth and energy
- The body's most important mineral needed for hydration
- A healthy food group that includes carrots, broccoli, and spinach
- A vitamin found in dairy that helps us have strong bones
- The food we get from cows, commonly used in cereal or coffee
- A prolonged period of low rainfall that can lead to crop failure and food shortages
- A sweet food made from fruit, sugar often used with bread
Down
- __ is present in eggs, chicken or beans
- A citrus fruit that is an excellent source of vitamin c
- A green vegetable that is often used in salads and has lots of vitamins
- A food that gives energy and found in rice, bread and pasta
- A leafy green vegetable high in Vitamin K
- A sweet food made from cocoa beans and sugar enjoyed as a treat
15 Clues: __ is present in eggs, chicken or beans • A leafy green vegetable high in Vitamin K • The body's most important mineral needed for hydration • A citrus fruit that is an excellent source of vitamin c • A vitamin found in dairy that helps us have strong bones • A sweet food made from fruit, sugar often used with bread • ...
Food security 2024-11-28
Across
- the fruit great for athletes because they gives you energy
- the fruit Increases Bone Mass
- the fruit help fight off infections
- vegetable protects your heart
- juice reduce kidney stone formation
- the fruit provides support for immune system
- the fruit which reduce blood cholesterol levels
- the fruit contains 92% water helps to reduce weight
Down
- the fruit help calm your nervous system
- the fruit which may help lower risk of developing diabetes and asthma
- the fruit fight against arthritis
- the fruit prevent against diabetes
- the fruit can fight against cancer and aging
- the fruit reduce the risk of blindness
- the fruit Reduce blood pressure and lowers the risk of blood clots
15 Clues: the fruit Increases Bone Mass • vegetable protects your heart • the fruit fight against arthritis • the fruit prevent against diabetes • the fruit help fight off infections • juice reduce kidney stone formation • the fruit reduce the risk of blindness • the fruit help calm your nervous system • the fruit can fight against cancer and aging • ...
Food Security 2024-12-17
Across
- A place where food is grown.
- Food that is not old or spoiled.
- What farmers do to crops.
- Food like rice, wheat, or corn.
- A place to keep food safe.
- Food that grows on trees or plants.
- Plants grown for food.
Down
- Food that is good to eat.
- Not having enough food to eat.
- Helps plants and crops grow.
- Breakfast, lunch, or dinner.
- Needed to grow plants and crops.
- What we do with food.
- Something we eat to stay alive.
- To make food ready to eat.
15 Clues: What we do with food. • Plants grown for food. • Food that is good to eat. • What farmers do to crops. • A place to keep food safe. • To make food ready to eat. • A place where food is grown. • Helps plants and crops grow. • Breakfast, lunch, or dinner. • Not having enough food to eat. • Food like rice, wheat, or corn. • Something we eat to stay alive. • ...
Food security 2024-12-17
Across
- The opposite of full
- large animal that gives us milk
- The process of growing plants for food
- This is needed to cook food
- Food grown without chemicals
- The nutrient that helps build strong muscles
- The season when farmers plant seeds
- A person who grows crops
Down
- healthy drink made from fruits
- Green vegetable shaped like a tree
- A grain used to make bread
- Crops like wheat, rice,or corn
- The main source of water for plants
- fruit that is red and round
- The place where food is grown
15 Clues: The opposite of full • A person who grows crops • A grain used to make bread • This is needed to cook food • fruit that is red and round • Food grown without chemicals • The place where food is grown • healthy drink made from fruits • Crops like wheat, rice,or corn • large animal that gives us milk • Green vegetable shaped like a tree • The main source of water for plants • ...
Food security 2024-12-17
Across
- sweet and healthy food
- makes food sweet
- what we eat to live
- where plants grow
- a vegetable with layers
- improves health and prevents hunger
- comes from chicken
Down
- a food from water
- food for cows
- is the primary source of food production
- a living thing that grows in soil
- used for cooking food
- sweet food made by bees
- a drink from cows
- a big plant that gives fruits
15 Clues: food for cows • makes food sweet • a food from water • where plants grow • a drink from cows • comes from chicken • what we eat to live • used for cooking food • sweet and healthy food • sweet food made by bees • a vegetable with layers • a big plant that gives fruits • a living thing that grows in soil • improves health and prevents hunger • is the primary source of food production
Security Patrols 2026-03-03
Across
- A designated path or series of stops during a patrol.
- An access point you should always check for forced entry or being left unsecured.
- The act of walking or driving through an assigned area to maintain safety.
- Checking these is a priority to ensure they are locked and undamaged.
- A type of scheduling you should use to avoid becoming predictable.
- These should be worn at night to inspect dark corners and perimeters.
- The primary document used to record all activity during a shift.
- Crucial document where you record your observations and times
- A patrol conducted without a set pattern to keep intruders guessing
- Maintaining a high _____ helps deter criminal activity.
Down
- The boundary line of your assigned property or site.
- Your primary tool for immediate communication with dispatch or other officers.
- The act of staying alert and watching for anything unusual.
- Using your _____ to identify smells like smoke or chemicals.
- The state of being alert and watchful at all times.
- A type of patrol performed while moving on foot.
16 Clues: A type of patrol performed while moving on foot. • The state of being alert and watchful at all times. • The boundary line of your assigned property or site. • A designated path or series of stops during a patrol. • Maintaining a high _____ helps deter criminal activity. • The act of staying alert and watching for anything unusual. • ...
Financial Market Risks 2024-07-15
Across
- Which risk arises from technological failures or cyber-attacks?
- What risk is associated with fraud or theft by employees?
- What is the risk associated with the volatility in market indices?
- Which risk involves deterioration in the credit spread of a counterparty?
- What risk is associated with potential legal penalties and fines?
- What risk involves potential losses due to legal interpretations?
- What risk involves difficulty in unwinding positions without significant cost?
Down
- What risk involves inadequate or failed internal controls?
- Which risk involves potential losses due to commodity price changes?
- What type of market risk arises from changes in stock prices?
- What term describes the risk that a debtor may restructure debt under bankruptcy?
- Which risk arises from changes in laws affecting business operations?
- Which risk arises when there are insufficient buyers or sellers in the market?
- What type of credit risk is related to sovereign debt?
- What is the risk of a bank facing sudden large withdrawals called?
15 Clues: What type of credit risk is related to sovereign debt? • What risk is associated with fraud or theft by employees? • What risk involves inadequate or failed internal controls? • What type of market risk arises from changes in stock prices? • Which risk arises from technological failures or cyber-attacks? • ...
Resume Vocab 2022-12-12
Across
- ___________ services include occupations related to helping disabled, elderly, impoverished or other underrepresented populations to secure housing, employment, financial assistance or other social services.
- ___________ security includes occupations focused on keeping the country's people, institutions, systems, technology and economy safe from physical or cyber attack.
- ___________ systems include occupations that design and operate public transportation systems — road, air, sea and rail.
Down
- ___________ services include occupations focused on financial planning, asset and hedge fund management.
- ___________ services include workers who assist people with personal, family, educational, mental health, and career decisions and problems.
- ___________ services include occupations focused primarily on changing the health status of patients over time through direct care, treatment, counseling, or health education information.
6 Clues: ___________ services include occupations focused on financial planning, asset and hedge fund management. • ___________ systems include occupations that design and operate public transportation systems — road, air, sea and rail. • ...
Computer Crosword 2021-10-06
Across
- wide area network
- To get into a person's account without their permission.
- The right to make copies.
- Not CPU,but it is connected to CPU.
- Stealing another person's identity.
- Hard disk drive.
- connects a device to a computer
Down
- Security Security online.
- Drive A small portable Drive.
- local area network
- security measures.
- A piece or part of something.
- A list of rules that apply when you communicate across the internet.
- annoying repeated messages
- random-access memory
- a CPU is the central processing unit.
- use A limited use of copyright.
- solid-state drive
18 Clues: Hard disk drive. • wide area network • solid-state drive • local area network • security measures. • random-access memory • The right to make copies. • annoying repeated messages • Security Security online. • A piece or part of something. • connects a device to a computer • Drive A small portable Drive. • Not CPU,but it is connected to CPU. • use A limited use of copyright. • ...
Cyber World 2023-05-04
Across
- The smallest piece of computer information, either the number 0 or 1.
- changes the case of the letter when on
- Worldwide network of computers
- An input device
- The process of transferring information from a computer to a website
- An output device
Down
- Random Access Memory
- Video Display Unit
- To start up a computer
- These are the devices from which the sound comes out
- The brain of the computer
- Small, lightweight, portable battery-powered computers that can fit onto your lap
- Read-Only Memory
13 Clues: An input device • An output device • Read-Only Memory • Video Display Unit • Random Access Memory • To start up a computer • The brain of the computer • Worldwide network of computers • changes the case of the letter when on • These are the devices from which the sound comes out • The process of transferring information from a computer to a website • ...
cyber bullying 2022-11-11
Across
- if you made a video or a picture online
- if people said something that isn't true
- do's and dont's
- you bully someone online
- if you aren't kind to someone
- when you try to kill yourself
Down
- when people always know where you are
- if you write something on a post
- something you can send messages and call
- if you dont have any friends
- different websites
- if you tease someone every day
- if you are on a website
13 Clues: do's and dont's • different websites • if you are on a website • you bully someone online • if you dont have any friends • if you aren't kind to someone • when you try to kill yourself • if you tease someone every day • if you write something on a post • when people always know where you are • if you made a video or a picture online • something you can send messages and call • ...
arti 2020-10-30
Across
- her sapling
- hes seen not heard
- a good mind
- the latest bundle
- her foray into cyber space
- the chris bundle
- the blue and pink flower in her life
- has her looks
- home in the lane
Down
- her art
- home on the road
- chota bhim
- he has been in confiment thrice
- co contortionist
- the flowers companion
- the naughty coalman
- he has a way to rile her
- another rajma chawal
- neice
- the first bundle
20 Clues: neice • her art • chota bhim • her sapling • a good mind • has her looks • home on the road • co contortionist • the chris bundle • the first bundle • home in the lane • the latest bundle • hes seen not heard • the naughty coalman • another rajma chawal • the flowers companion • he has a way to rile her • her foray into cyber space • he has been in confiment thrice • the blue and pink flower in her life
HPE 2019-04-03
Across
- wholesome
- Atomic
- Serious disagreement
- Male hormone
- Confidence in one
- kind of a behaviour
- talk to others
- beginning of human life
- different people in society
- Bullying bullying through the internet
- Period of becoming sexually mature
Down
- a person has
- Forceful personality
- what you kick
- come to a settlement
- people make every day
- what happens next
- everyone belongs to
- ability to control others
- Human egg
- of a person
- Pressure reason to become alcholic
22 Clues: Atomic • wholesome • Human egg • of a person • a person has • Male hormone • what you kick • talk to others • what happens next • Confidence in one • everyone belongs to • kind of a behaviour • Forceful personality • Serious disagreement • come to a settlement • people make every day • beginning of human life • ability to control others • different people in society • Period of becoming sexually mature • ...
mov29 2024-07-01
Across
- Stallone's night chase
- Martial arts showdown
- Military thriller
- Will Smith's cop duo
- Pirate adventure
- Rebel uprising
- Disaster thriller
- Mel Gibson's thriller
- Sci-Fi boat action
- Wild West action
- Police thriller
- Space cowboy
Down
- Futuristic combat
- Charles Bronson's return
- Schwarzenegger's sequel
- Urban crime action
- Submarine thriller
- Sci-Fi rebirth
- Dystopian future
- Digital age thriller
- Harrison Ford's CIA
- Sci-Fi escape
- Comedy superhero
- Space survival
- Superhero revenge
25 Clues: Space cowboy • Sci-Fi escape • Sci-Fi rebirth • Rebel uprising • Space survival • Police thriller • Dystopian future • Pirate adventure • Comedy superhero • Wild West action • Futuristic combat • Military thriller • Disaster thriller • Superhero revenge • Urban crime action • Submarine thriller • Sci-Fi boat action • Harrison Ford's CIA • Will Smith's cop duo • Digital age thriller • Martial arts showdown • ...
Crossword Puzzle 2017-09-05
Across
- An item designed to explode on impact
- A report used for writing incidences / crimes.
- When managing threats, avoid taking any personnel _________. (Plural)
- A type of tape used for securing incidences and crime scene.
- If you see a suspicious vehicle, you must write down its _________ plate number
- A commonly used security communication equipment is a two-way _________.
- Most prevalent security threats at the moment
- If a bomb threat is received by phone, fill out all information on Bomb Threat Call _________.
Down
- whom you should immediately alert when reporting threats.
- IED is also known as Improvised _________ Device.
- A video surveillance system used for safety and security purposes
- Two things security officers must protect: lives and _________.
- You should always stay _________ during security threat/crisis.
- Typically, there will be a lot of _________ on a suspicious parcel. (Plural)
- A common characteristic of a suspicious person is that he/she constantly licks of his/her _________. (Plural)
15 Clues: An item designed to explode on impact • Most prevalent security threats at the moment • A report used for writing incidences / crimes. • IED is also known as Improvised _________ Device. • whom you should immediately alert when reporting threats. • A type of tape used for securing incidences and crime scene. • ...
Configuration Management -E-Mates 2024-01-29
Across
- submits the updated change plan to the change control board.
- A list of administrator-approved programs, IP and email addresses that can access the network.Blocks whatever is not on the list.
- The users profile
- The rules a company has for who can change the security systems.
- Settings that help you navigate the login
- Enable security configurations
- Enable security configurations
- Changes done to the security to improve the system
- Any unwanted changes get blocked and reported protecting the system
- Connections from far away
Down
- Multiple layers of security
- Restrictions on a area of importance
- The enviornment in which the secuirty will effect
- Enable security configurations
- Security plans to protect the system
15 Clues: The users profile • Connections from far away • Multiple layers of security • Enable security configurations • Enable security configurations • Enable security configurations • Restrictions on a area of importance • Security plans to protect the system • Settings that help you navigate the login • The enviornment in which the secuirty will effect • ...
Talage Crossword 2024-05-29
Across
- chat-gpt is an example
- leader in insurance technology
- click here to get started
- protect the company from workplace accidents
- legal doc protecting your interests
- stop the hackers
- connect
Down
- understand your data
- self-insurance
- you're responsible
- trusted advisor
- innovation in insurance
- saving time and money
- policy designed to simplify small business insurance
- cost of insurance
- join lots of workflows together
- paid out
17 Clues: connect • paid out • self-insurance • trusted advisor • stop the hackers • cost of insurance • you're responsible • understand your data • saving time and money • chat-gpt is an example • innovation in insurance • click here to get started • leader in insurance technology • join lots of workflows together • legal doc protecting your interests • protect the company from workplace accidents • ...
ANALYTICS 2014-08-24
Across
- dynamic application Security testing (4)
- parses the code and identify constructs that seem to introduce threats.(4, 7)
- Flying mammal
- an action taken to harm an asset (6)
- Has a trunk
- a type of network security attack where the attacker takes control of a communication (9)
- used by attackers to gain unauthorized access to systems or data (6, 8)
- aprocess of converting data having many possible representations into a standard form (16)
- technique used to attack data driven applications through code injection (3, 9)
- cross-site Request Forgery (4)
- an attempt to acquire sensitive information by redirecting to a false site (8)
- Large marsupial
- a weakness that makes a threat possible (13)
- a character encoding standard (7)
- an operating system (4)
- provides remote access to a targeted computer system (6)
- an open-standard application protocol for directory access (4)
Down
- a method of bypassing normal authentication (8)
- an open-source web application security project (5)
- a possible danger that may act to breach security (6)
- the art of writing or solving secret codes (12)
- the act of confirming the truth of an attribute of an entity (14)
- a list of known good inputs (9)
- Likes to chase mice
- a list of software weaknesses (3)
- a safeguard that addresses a threat and mitigates risk (14)
- authentication, authorization and accounting (3)
- static application security testing (4)
- the degree of resistance to, or protection from, harm (8)
- provides pluggable dynamic authentication for applications and services (3)
- process of creating computer software (6)
- a software that controls the incoming and outgoing network traffic (8)
- a malware program (5)
- cross-site Scripting (3)
- Man's best friend
35 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • a malware program (5) • an operating system (4) • cross-site Scripting (3) • cross-site Request Forgery (4) • a list of known good inputs (9) • a list of software weaknesses (3) • a character encoding standard (7) • an action taken to harm an asset (6) • static application security testing (4) • ...
Security Manager Crossword 2021-12-01
Across
- A possessor of classified information determines a prospective recipients justification to access or have knowledge of classified data.
- A process of identifying critical information and subsequently analyzing friendly actions of military activities.
- Any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of national security information.
- An area under government jurisdiction in which special security measures are employed to prevent unauthorized entry.
- Individual overall responsible for an organization's Personnel Security Program.
- The ability and opportunity to obtain knowledge of classified information.
- An unauthorized disclosure of classified information.
Down
- The authorized change in status of information from classified to unclassified.
- Any knowing, willful, or negligent action that can reasonably be expected to not compromise national security.
- Measures taken by an organization to protect itself against all acts designed to impair its effectiveness.
- An individual who makes a classification determination and applied that to specific information or material.
- The determination that information classified at a specific level will be classified at a lower level.
- The process by which information is determined to be sensitive to national security.
- A calculated use of violence or threats to incite fear and promote change.
- The organization that conducts all background checks of military, federal, and contract personnel.
- Intergovernmental military alliance between foreign states in agreement of mutual defense.
- The time period covered between investigations.
17 Clues: The time period covered between investigations. • An unauthorized disclosure of classified information. • A calculated use of violence or threats to incite fear and promote change. • The ability and opportunity to obtain knowledge of classified information. • The authorized change in status of information from classified to unclassified. • ...
India by JSS 2022-10-18
13 Clues: Elephants • IT capital • Cyber City • Land of Faith • Land of Coconut • Financial Capital • Deccan Plateau located • Araku Valley is located • Lotus Temple is located • Largest Airport (Short Form) • Largest National Park is located • Largest Railway Station (Short Form) • Largest Metro organization (Short Form)
ANALYTICS 2014-08-24
Across
- a method of bypassing normal authentication (8)
- cross-site Scripting (3)
- a possible danger that may act to breach security (6)
- an operating system (4)
- a type of network security attack where the attacker takes control of a communication (9)
- a weakness that makes a threat possible (13)
- static application security testing (4)
- parses the code and identify constructs that seem to introduce threats.(4, 7)
- aprocess of converting data having many possible representations into a standard form (16)
- a character encoding standard (7)
- cross-site Request Forgery (4)
- an open-standard application protocol for directory access (4)
- provides pluggable dynamic authentication for applications and services (3)
- technique used to attack data driven applications through code injection (3, 9)
- an open-source web application security project (5)
Down
- the art of writing or solving secret codes (12)
- provides remote access to a targeted computer system (6)
- used by attackers to gain unauthorized access to systems or data (6, 8)
- a list of known good inputs (9)
- the degree of resistance to, or protection from, harm (8)
- the act of confirming the truth of an attribute of an entity (14)
- dynamic application Security testing (4)
- an attempt to acquire sensitive information by redirecting to a false site (8)
- authentication, authorization and accounting (3)
- a safeguard that addresses a threat and mitigates risk (14)
- an action taken to harm an asset (6)
- a list of software weaknesses (3)
- a software that controls the incoming and outgoing network traffic (8)
- process of creating computer software (6)
- a malware program (5)
30 Clues: a malware program (5) • an operating system (4) • cross-site Scripting (3) • cross-site Request Forgery (4) • a list of known good inputs (9) • a list of software weaknesses (3) • a character encoding standard (7) • an action taken to harm an asset (6) • static application security testing (4) • dynamic application Security testing (4) • ...
CISO Crossword Riddle - 2525 2025-11-12
Across
- I stand guard twice to verify who you are, Two layers strong — that’s security’s shining star
- I’m not an outsider, I already have the key, When I turn rogue, no firewall can stop me
- Infected machines obey a hacker’s command unseen, A silent cyber army waging war on the digital screen
- Every post and click leaves a mark in cyber space, Guard your trail — your data’s your trace
- Voices and faces I twist to deceive your sight, AI’s mask of lies — beware what feels too right
Down
- I look like your bank App but hide a cyber trap, Install me once — your data’s in my lap
- I’m the hacker’s grind, guessing passwords in a race, Weak logins fall when persistence finds its place
- I bait you with emails that seem so right, Click my link, and you’ll lose the fight
- They clone your number and steal your call, One fake SIM — and your bank account can fall
- I’m your one-time digital shield, protecting login doors, Use me once and never share — that’s how safety soars
10 Clues: I bait you with emails that seem so right, Click my link, and you’ll lose the fight • I’m not an outsider, I already have the key, When I turn rogue, no firewall can stop me • I look like your bank App but hide a cyber trap, Install me once — your data’s in my lap • They clone your number and steal your call, One fake SIM — and your bank account can fall • ...
Jargon 2023-11-30
Across
- Account has shares of the underlying
- Acronym for Redemption charges on Mutual Funds
- Another term for a decimal point
- This is 4:30 PM Eastern time
- Balance owed
- number of shares available for trading
- mandates that if the order is not executed immediately, it is canceled.
- Another term for the execution of an order
- An Option contract’s unit of trade or underlying instrument
- Type 5 is
- Pattern day trader designation
- nine-character identifier used for a U.S. security
- Collateralized account
- price the seller gets
- Tax deferred
- The difference between the bid & ask price of a security
- 12-character code that identifies a security
- does not hold the underlying
Down
- Another Term for the Trading price of a Bond
- Type 1 is
- Reported trade price of a stock
- seven character code assigned to securities trading in the U.K.
- The Action of buying back a security that was sold short
- debt obligations of the U.S. government
- characteristic of a security which rises or falls sharply within a short time
- Term referring to the global trading of Currencies
- The ability to be converted to cash quickly
- The Date that an Option Contract will end
- Price the buyer pays
- vehicle that facilitates reporting of OTC transactions in fixed income securities.
- Between Funds of the same family & share class
- Type 2 is
32 Clues: Type 1 is • Type 5 is • Type 2 is • Balance owed • Tax deferred • Price the buyer pays • price the seller gets • Collateralized account • This is 4:30 PM Eastern time • does not hold the underlying • Pattern day trader designation • Reported trade price of a stock • Another term for a decimal point • Account has shares of the underlying • number of shares available for trading • ...
Goodbye Emma 2024-08-13
Across
- emma's position in the 20km
- emma's favorite EFRAG TEG person
- emma's favorite kitchen object
- emma's baby
- emma's achilles heel
Down
- emma's beverage
- emma's favorite task in EFRAG
- emma's spot
- emma's first day axiety
- emma's biggest distraction
- emma's next destination
- emma's lunch break escape
- emma's main research project
13 Clues: emma's spot • emma's baby • emma's beverage • emma's achilles heel • emma's first day axiety • emma's next destination • emma's lunch break escape • emma's biggest distraction • emma's position in the 20km • emma's main research project • emma's favorite task in EFRAG • emma's favorite kitchen object • emma's favorite EFRAG TEG person
cyber security crossword (designed by:X, the Awesome!) 2015-12-31
Across
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- The process of translating plaintext into ciphertext
- the process of attempting to acquire sensitive information used for identity theft
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
- software that records everything you type, then sends it off to whomever installed the software.
- an adjective to describe your professor Xiaoyu
Down
- a bridge between two computer networks
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- to choose options in order to create a custom system
- software installed on a network of computers without the owner’s knowledge
- A capability to limit network traffic between networks and/or information systems
11 Clues: a bridge between two computer networks • an adjective to describe your professor Xiaoyu • to choose options in order to create a custom system • The process of translating plaintext into ciphertext • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
Matt's Birthday Crossword 2024-04-05
Across
- not a real meal
- necrophiliac
- fingerling potatoes fan
- your cyber friend
- thank you, in the language of your people
- "matthew"
- adjective describing you
- going to the motherland this summer
Down
- hometown icon
- you and arun found here
- future plateau man
- canadian weeb
- would make a great man
- charlie would not attend ____'s concert
- running pal
- your rival
16 Clues: "matthew" • your rival • running pal • necrophiliac • hometown icon • canadian weeb • not a real meal • your cyber friend • future plateau man • would make a great man • you and arun found here • fingerling potatoes fan • adjective describing you • going to the motherland this summer • charlie would not attend ____'s concert • thank you, in the language of your people
safer internet 2026-03-19
6 Clues: was ist cyber mobbing? • Was gibt es für gesetze • Anzeichen für eine sucht • was macht schnell süchtig? • Was könnten Gründe für cyber mobbing sein? • wa soll man machen um den post besser zu machen?
Hello, It`s me again :)) 2025-10-16
Across
- Birth city of the scholar (1946).
- Sector tied to resources, markets, and welfare.
- Global-scale version of that framing process.
- Epistemological lens shaping his approach.
- Counterpart whose security is intertwined with Israel’s.
- Copenhagen institute where he led projects (1988–2002).
- Role at the European Journal of International Relations (2004–2008).
- Defined as freedom from threat and preservation of identity.
- Case illustrating identity fractures in the societal sector.
- Sector centered on identity and cohesion.
- Security-studies school he is strongly linked with.
- British-Canadian scholar behind “People, States and Fear.”
- Internal weaknesses contrasted with external dangers.
- Field asking “how do we know?” in theory.
- Strategy of addressing both internal and external risks.
- Field asking “what exists?” in theory.
Down
- Cold War example of a macro-level threat narrative.
- Post-9/11 candidate for macro-securitization.
- Country his family later moved to.
- Sector dealing with armed threats and defense.
- Sector focused on climate, disasters, and nature.
- External dangers contrasted with internal weaknesses.
- System trait his ontology accepts in IR.
- Word completing “regional security ______.”
- State used in Middle East interdependence example.
- Essence of security in his definition.
- The “friendship” side shaping regional orders.
- The hostile counterpart in regional relations.
- Sector covering ideology and state institutions.
- Leader who announced a global “war on terror.”
- Framing an issue as an existential threat.
31 Clues: Birth city of the scholar (1946). • Country his family later moved to. • Essence of security in his definition. • Field asking “what exists?” in theory. • System trait his ontology accepts in IR. • Sector centered on identity and cohesion. • Field asking “how do we know?” in theory. • Epistemological lens shaping his approach. • Framing an issue as an existential threat. • ...
Homeland Security 2024-03-18
Across
- What department within Homeland Security deals with transportation security
- How many departments did the Homeland Security Act of 2002 combine
- What type of security does Homeland Security deal with when relating to the internet
- Acronym for department of homeland security
- What department within Homeland Security deals with emergency management
Down
- What is one Geographical Aspect Homeland Security Protects
- What kind of events does Homeland Security prepare for
- How would opposers of Homeland Security describe its strategy
- What Homeland Security was made to defend against
9 Clues: Acronym for department of homeland security • What Homeland Security was made to defend against • What kind of events does Homeland Security prepare for • What is one Geographical Aspect Homeland Security Protects • How would opposers of Homeland Security describe its strategy • How many departments did the Homeland Security Act of 2002 combine • ...
Huntsville Government Security Crossword 2023-06-02
Across
- The first step you should take when unsecured classified information is found unattended is to ___________ it
- To gain access to a closed space you must have a signed SF 312, Need to know and a _____
- Refer to ____ to determine if something is classified
- When securing a GSA safe or combination lock you must not forget to ____ the dial
- As a cleared employee it is your ______ to safeguard classified material
- Leanne _______ is the Huntsville site FSO
- Loss of aggregated CUI is the one of the most significant risks to national security, directly affecting lethality of our ___________
- if you discover a security incident, infration or violation you would contact your ______ POC for the area
Down
- Report any suspicious ______ that approach you about classified information
- you must _______ any security violation or adverse information
- Certain information requiring protection against unauthorized disclosure in the interests of national defense and security or foreign relations of the United States pursuant to Federal statute or Executive order
- government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies
- Richard _________ is the Huntsville site Industrial Security Manager
- All Visitors must sign a ____
- Unclear visitors must be __________ at all times
- Classified information is ___ to be discussed in open areas
- an ________ threat is someone with access who will use that access for illegal means
- ______ information needs to be self reported such as having a bill go to collections
18 Clues: All Visitors must sign a ____ • Leanne _______ is the Huntsville site FSO • Unclear visitors must be __________ at all times • Refer to ____ to determine if something is classified • Classified information is ___ to be discussed in open areas • you must _______ any security violation or adverse information • ...
crossword 2024-12-04
Across
- How old was the granddaughter that was found in a car when her grandmother went missing?
- how many U.S troops are in South Korea?
- How much money is expected to be spent for Cyber Monday?
- What was stuck on train tracks and got hit by a train?
- how many Americans are traveling after the holidays?
- how big is the biggest asteroid that is coming towards Earth?
- What two places have a new ceasefire?
- What did the sinkhole start as the size of?
- What does Hegseth think about women in the military?
Down
- What miles an hour are winds expected to be due to the bad winter storms?
- How many football fields big is the new facility for Cyber Monday?
- Who had U.S hostages?
- Who denies all accusations about sexual misconduct and alcohol abuse?
- What was the name of the bride that was killed in a car crash on her wedding day?
- Next to Wicked, what movie broke box office records?
- How deep is the sinkhole that a grandmother fell in?
- what judge granted many kids adoptions?
- What does James Van Der Beek suffer from?
- Yoon What is the name of the south korea president?
- Where has the bad weather now stretched to in the U.S?
20 Clues: Who had U.S hostages? • What two places have a new ceasefire? • how many U.S troops are in South Korea? • what judge granted many kids adoptions? • What does James Van Der Beek suffer from? • What did the sinkhole start as the size of? • Next to Wicked, what movie broke box office records? • How deep is the sinkhole that a grandmother fell in? • ...
Henlo 2023-09-26
10 Clues: uniform • dream job • Best pizza • favorite car • best gf ever • Favorite game • favorite food • Big Stinky Place • Animal with supersonic screeching • Big White Animal (Threat to Society)
PUMPKINS FLY 2013-01-13
Across
- / Conflict region in Sudan where the killings of thousands of civilians by the Janjaweed militias took place in 2003. Action taken by the UN Security Council was weak and ineffective, leading to at least half a million civilian deaths in Sudan.
- / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / Location in Britain where the first Security Council session took place on 17 January 1946.
- / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
- / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
- / Granted permanent membership into the Security Council in 1971.
- / Country that has made the strongest requests for a permanent seat in the UN Security Council other than Brazil, India and Japan.
- / The deliberate and organised massacre of a large group of people, especially those of a particular ethnicity, race or religion. Occurred in Cambodia (1975 - 1978), Rwanda (1994 - 1996) and Germany (1933 - 1945).
- / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
- / Permanent member of the UN Security Council that has used its veto power the greatest number of times.
- / Russian inaction that allowed the UN Security Council to pass the resolution in 1950 that condemned North Korea and called for the deployment of armed forces by member states to aid South Korea.
- / Number of members in the Security Council.
- / UN peacekeeping force sent to Rwanda in 1993 to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out as the conflict between the Rwandese Patriotic Front (RPF) and the official Rwandan Army escalated.
- / Arguably the only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
17 Clues: / Number of members in the Security Council. • / Granted permanent membership into the Security Council in 1971. • / Location in Britain where the first Security Council session took place on 17 January 1946. • / Permanent member of the UN Security Council that has used its veto power the greatest number of times. • ...
1.The first thing that your reader to see Answer:HOMEPAGE 2.Construction of pages should start at the start of class Answer:PAGE 3.This is the way for your student to try to capture your personal journey of of learning Answer:REFLECTION 4.This is the b 2025-03-19
Across
- is the basic understanding of HTML,CSS and like creat a shard understanding of what can be done with webpages.
- is teaching students about
- how to select and use digital
- LITERACY
- is the way for your student to try to capture your personal journey of of learning
- and general safety
- and evaluating its validity in order
- around photo posting
- essential part of document management
- is a students should be taught the concepts
- understand copyright laws and property rights for online assets.
- facial recognition
- SOFTWARE
- data,tagging,keywords and catergories to make them aware.
- information from the web and
- applications or services to
Down
- in a globally
- students how to
- arena
- students to be aware and
- viruses, cyber threats,
- cyber bullying etc.
- of pages should start at the start of class
- is use to a video recording using the computer and usually includes an audio
- ARCHIVING
- LETIRACY
- it can be shared
- first thing that your reader to see
- phone numbers etc.
- students how to protect
- ways of knowing how to study and learn in a technology enriched environment.
- information such as
- tasks.
- SKILLS
34 Clues: arena • tasks. • SKILLS • LETIRACY • LITERACY • SOFTWARE • ARCHIVING • in a globally • students how to • it can be shared • and general safety • phone numbers etc. • facial recognition • cyber bullying etc. • information such as • around photo posting • viruses, cyber threats, • students how to protect • students to be aware and • is teaching students about • applications or services to • ...
:-) 2019-09-20
Across
- Flaw that occurs when untrusted data is sent to an interpreter as part of a command or query and the attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
- Attack using poorly configured XML processors evaluate external entity references within XML documents, which can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.
- Ericssons model to incorporate security and privacy considerations into all phases of product development.
- Flaw that occurs when application functions related to authentication and session management are implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.
- Set of technologies designed to detect conditions indicative of a security vulnerability in an application in its running state.
- Responsible for Ericsson product vulnerability management process, coordination of customer product security incidents and reported security issues affecting Ericsson products, solutions, and services.
- Practice of increasing product security by reducing its attack surface.
Down
- Cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities.
- Recognized as a fundamental human right by the United Nations (UN) in Article 12 of the Universal Declaration of Human Rights
- This Kubernetes Benchmark is a reference document that can be used by system administrators, security and audit professionals and other IT roles to establish a secure configuration baseline for Kubernetes.
- Comprehensive, versatile, automated black box fuzzer that enables organizations to efficiently and effectively discover and remediate security weaknesses in software.
- One of the world’s most popular free security tools for finding security vulnerabilities in web applications.
- Flaw exploited to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files, modify other users' data, change access rights, etc.
- Software testing technique consisting of finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.
- Set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities.
15 Clues: Practice of increasing product security by reducing its attack surface. • Ericssons model to incorporate security and privacy considerations into all phases of product development. • One of the world’s most popular free security tools for finding security vulnerabilities in web applications. • ...
Cybersecurity Month 2023-05-19
Across
- creating a fake identity on a social network account or dating website
- an error, flaw, failure, or fault in a computer or system
- programs that automatically execute tasks as ordered by the creator of the program that has infected them
- after these are downloaded, opened, or executed, your data becomes corrupt
- programs and other operating systems used by a computer
- a type of malicious software that disguises itself as a harmless program
- a cyber attacker
- private network VPN
- an attack when a person or program disguises themselves as another
- malware used to gain access to a user's system or data
- authentication attaching a phone number or email to an account for extra security
- short for malicious software
- breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
- engineering taking advantage of human trust to gain access to private information
Down
- customizable additions to software for extra functionality
- secret word or phrase used to gain access
- method of obtaining user info through fraudulent communications targeted directly at people
- a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
- the way in which the identity of a user is confirmed
- cryptocurrency
- software that automatically displays or downloads material when a user if offline
- a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
- technology IT
- an internet traffic filter meant to stop unauthorized traffic
- the physical and tangible parts of a computer
25 Clues: technology IT • cryptocurrency • a cyber attacker • private network VPN • short for malicious software • secret word or phrase used to gain access • the physical and tangible parts of a computer • the way in which the identity of a user is confirmed • malware used to gain access to a user's system or data • programs and other operating systems used by a computer • ...
Website 2024-07-29
Across
- situs company profile memang untuk menyampaikan informasi penting terkait perusahaan jasa.
- Singkatan dari Content Managemen Sistem
- Cyber security yang bagus
- halaman
- Desain yang unik
- Kumpulan halaman yang digunakan untuk menampilkan informasi teks, gambar, animasi suara atau gabungan dari semuanya baik yang bersifat statis dan dinamis yang membentuk satu rangakain saling terkait, yang masing-masing dihubungkan dengan jaringan terkait
- Menambah gambar, teks, building block
- Skala kecil hingga menengah
- CNN merupakan sebuah website
- Sebuah website yang dibuat untuk menampilkan karya dan prestasi seseorang atau sebuah perusahaan
- Halaman khusus yang dirancang untuk kebutuhan pemasaran digital dan merupakan bagian dari website
- Bentuk aplikasi web yang berbentuk tulisan-tulisan pada sebuah halaman web. Tulisan-tulisan ini sering kali dimuat dalam urutan isi terbaru dahulu sebelum diikuti isi yang lebih lama, meskipun tidak selamanya demikian.
- Website ecommerce
Down
- Situs jual beli
- Terpajang di Website
- tata letak
- akses
- Dukungan multi bahasa, untuk bisnis Internasional
- CMS yang tidak di Install
- Mencari
- Web memberi situs web atau aplikasi web Anda sebuah server atau mesin di internet
- Nama yang mudah diingat yang terkait dengan alamat IP fisik di internet
- Jenis web yang dimiliki oleh seorang individu
- Standar komunikasi data yang digunakan oleh komunitas internet dalam proses tukar-menukar data
- Domain komersial
- organisasi
- Berita
- Penyedia layanan informasi khusus untuk menarik perhatian pembaca supaya masuk pada laman web yang dicari, dan bisa diakses lewat bermacam fitur semacam desktop, mobile, dan tablet.
- Software yang menambahkan fitur tertentu pada suatu program tanpa mengharuskan Anda mengubah program itu sendiri.
- Uniform Resource Locator
30 Clues: akses • Berita • halaman • Mencari • tata letak • organisasi • Situs jual beli • Desain yang unik • Domain komersial • Website ecommerce • Terpajang di Website • Uniform Resource Locator • Cyber security yang bagus • CMS yang tidak di Install • Skala kecil hingga menengah • CNN merupakan sebuah website • Menambah gambar, teks, building block • Singkatan dari Content Managemen Sistem • ...
Commerce Cybersecurity 2025-03-02
Across
- Wrongful or criminal deception intended to result in financial or personal gain.
- Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data.
- A method to hide the actual web address (URL) of a webpage and replace it with another,
- the action or activity of buying goods from shops.
- Importance requiring swift action.
- Relating to or characteristic of the culture of computers, information technology, and virtual reality.
- Getting your money back after a purchase.
- A voluntary promise offered by the person or business who sold the product or service to you.
Down
- Made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- Acronym for Two factor Authentication
- An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
- Make an online service unavailable by overwhelming it with excessive traffic from many locations and sources.
- A legally binding agreement between two or more people
- Commonly known as the Scamming Captial of the world.
- The power or right to give orders, make decisions, and enforce obedience.
- The state of being free from danger or threat.
- When cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information.
- A program inserted into a system to compromise the confidentiality, integrity, or availability of data.
- pay someone for the use of (something, typically property, land, or a car).
- designed to trick you into giving away your money or your personal details.
20 Clues: Importance requiring swift action. • Acronym for Two factor Authentication • Getting your money back after a purchase. • The state of being free from danger or threat. • the action or activity of buying goods from shops. • Commonly known as the Scamming Captial of the world. • A legally binding agreement between two or more people • ...
Cyber Law (CIA Component 1) 2021-09-04
Across
- ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
- ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
- Regulatory __________, seen as a problem for authorities attempting to capture activities within their web, can also be seen as a solution to problems of excessive or inappropriate regulation as it limits the capacities of authorities.
- This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
- The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
- ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc. (Shortform)
- ___________ was the most prominent cyber paternalistic scholar.
Down
- Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
- The adoption or increase in use of digital or computer technology by an organization, industry, country, etc.
- It is often viewed as the act of sending unsolicited email usually commercial messages.
10 Clues: ___________ was the most prominent cyber paternalistic scholar. • It is often viewed as the act of sending unsolicited email usually commercial messages. • ______is one such constraint in cyber space which allows us to regulate the principle of anonymity. • ...
Cyber Law (CIA Component 1) 2021-09-04
Across
- ________ connection is a permanent telephone connection between two points set up by a telecommunications common carrier.
- ______is one such constraint in cyber space which allows us to regulate the principle of anonymity.
- Regulatory __________, seen as a problem for authorities who attempt to capture activities within the web, however it is also seen as a solution to the problems of excessive or inappropriate regulation as it aims in limiting the capacities and boundaries of authorities.
- This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer.
- The approach of these set of people is that the cyber space is a distinct new space and it cannot be regulated.
- ________is a proven technology that lets anyone place phone calls over an internet connection, Eg: Skype, Facebbok, etc.
- ___________ was the most prominent cyber paternalistic scholar
Down
- Lessig's analysis claims that there are four bases of regulation - competition, community, design and _______.
- The process where companies, indutries, countries, etc increase the use of digital or computer technology.
- The act of sending unsolicited emails which are usually commercial messages.
10 Clues: ___________ was the most prominent cyber paternalistic scholar • The act of sending unsolicited emails which are usually commercial messages. • ______is one such constraint in cyber space which allows us to regulate the principle of anonymity. • The process where companies, indutries, countries, etc increase the use of digital or computer technology. • ...
The Spill 06/07/21 2021-06-08
Across
- BPS USA belongs to the world's _____________ meat producer.
- What kind of whale has been seen near New York recently?
- In a ____________ attack, hackers target a company's computer system.
Down
- People in Hong Kong wanted to hold a candlelight __________.
- Grand Island is a city in which state?
- "Oceanographic" is a _______________ about ocean studies.
- The Tiananmen ____________ protests were student-led rallies calling for democracy in China.
- A _________ of whales is a group that travels together, hunts together, protects one another, and shares in the care of young.
- A ________ company was targeted by a cyber attack.
- Marine biologists have spotted whales in New York Harbor and the Hudson __________.
10 Clues: Grand Island is a city in which state? • A ________ company was targeted by a cyber attack. • What kind of whale has been seen near New York recently? • "Oceanographic" is a _______________ about ocean studies. • BPS USA belongs to the world's _____________ meat producer. • People in Hong Kong wanted to hold a candlelight __________. • ...
Cyber bullying 2013-10-30
Across
- rules that people have agreed to follow
- if a website can be _______ its not a hack
- a right that people have
- to be apart of a civilisation
- on a screen
- when two people agree
- talking
- being mean
Down
- a source of multimedia
- talking by typing sentences to each other via phone or mobile
- bullying some one in the virtual world
- a situation
- a cable has a _________ between the computers
13 Clues: talking • being mean • a situation • on a screen • when two people agree • a source of multimedia • a right that people have • to be apart of a civilisation • bullying some one in the virtual world • rules that people have agreed to follow • if a website can be _______ its not a hack • a cable has a _________ between the computers • ...
Cyber safety 2013-11-03
Across
- up advertisements that pop up on your screen
- a person who breaks into someones personal online information
- a personal web page where you can put anything you want up there
- this is a program taht allows you to access a bunch of information
- the arrow
- where you can share websites with your friends
- its when your computer gets sick because of a terrible problem
Down
- a search engine
- a series of letters and numbers to protect your account
- when you transfer interent information to your computer
- room a online entertainment thing that allows you to chat to other people
- mail sent electronically anywhere
- bulling using the internet to bully people
13 Clues: the arrow • a search engine • mail sent electronically anywhere • bulling using the internet to bully people • up advertisements that pop up on your screen • where you can share websites with your friends • a series of letters and numbers to protect your account • when you transfer interent information to your computer • ...
Cyber safety 2013-11-03
Across
- up advertisements that pop up on your screen
- a person who breaks into someones personal online information
- a personal web page where you can put anything you want up there
- this is a program taht allows you to access a bunch of information
- the arrow
- where you can share websites with your friends
- its when your computer gets sick because of a terrible problem
Down
- a search engine
- a series of letters and numbers to protect your account
- when you transfer interent information to your computer
- room a online entertainment thing that allows you to chat to other people
- mail sent electronically anywhere
- bulling using the internet to bully people
13 Clues: the arrow • a search engine • mail sent electronically anywhere • bulling using the internet to bully people • up advertisements that pop up on your screen • where you can share websites with your friends • a series of letters and numbers to protect your account • when you transfer interent information to your computer • ...
Cyber Puzzle 2023-03-30
Across
- fraudulent practice of sending emails or other messages in order to induce individuals to reveal personal or sensitive information
- authentication method which requires two or more verification factors
- accuracy, completeness and consistency of data
- a person or thing likely to cause damage or danger
- making sure that no sensitive information on a monitor when left unattended
Down
- a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it
- attempt to exploit a computer system or a private network inside a computer
- the process of modifying sensitive date in such a way that it is no or little value to unauthorized intruders
- a senior-level executive responsible for developing and implementing an information security program
- regulations, rules and practices that prescribe how to manage, protect and distribute information
- type of malicious software designed to block access
- attempt to destroy, alter, disable or gain access to an asset
- a copy of data made in case the original is lost or damaged
13 Clues: accuracy, completeness and consistency of data • a person or thing likely to cause damage or danger • type of malicious software designed to block access • a copy of data made in case the original is lost or damaged • attempt to destroy, alter, disable or gain access to an asset • authentication method which requires two or more verification factors • ...
cyber bullying 2022-11-11
Across
- if you made a video or a picture online
- if people said something that isn't true
- do's and dont's
- you bully someone online
- if you aren't kind to someone
- when you try to kill yourself
Down
- when people always know where you are
- if you write something on a post
- something you can send messages and call
- if you dont have any friends
- different websites
- if you tease someone every day
- if you are on a website
13 Clues: do's and dont's • different websites • if you are on a website • you bully someone online • if you dont have any friends • if you aren't kind to someone • when you try to kill yourself • if you tease someone every day • if you write something on a post • when people always know where you are • if you made a video or a picture online • something you can send messages and call • ...
Cyber Cross 2024-02-06
Across
- Fraudulent text messages
- The address of a webpage
- Widely used in home network
- Secret messages
- Wireless technology standard over short distances
- Fraudulent mail
Down
- Fraudulent phone calls or voice messages
- where people can access internet via WiFi
- Facebook,instagram,Twitter etc are...
- A type of malicious software used to retrieve sensitive information from user
- Should be constructed of upper case,special characters etc
- Hardware or software to prevent unauthorized access to or from a private network
- Threatening behaviour facilitated through text messages
13 Clues: Secret messages • Fraudulent mail • Fraudulent text messages • The address of a webpage • Widely used in home network • Facebook,instagram,Twitter etc are... • Fraudulent phone calls or voice messages • where people can access internet via WiFi • Wireless technology standard over short distances • Threatening behaviour facilitated through text messages • ...
Cyber Safety 2024-03-28
Across
- Clue: A set of rules or processes followed by computer programs, especially search engines or social media platforms, to determine the order and presentation of content to users.
- Clue: A type of malicious software that can replicate itself and spread to other computers.
- Clue: A secret combination of characters used to access a user's account.
- Clue: Digitally manipulated videos or images that convincingly depict someone saying or doing something they never did.
- Clue: Someone who has the power to affect the purchasing decisions or opinions of others because of their authority, knowledge, position, or relationship with their audience on social media.
- Clue: A digital effect you can put over a video or photo to change your real appearance.
- Clue: A word or phrase preceded by the pound sign (#) used to categorize content on social media.
- Clue: Harassing or intimidating someone online is known as this.
Down
- Clue: A company pays for their product or service to be the first result you see.
- Clue:Information that identifies an individual, such as their name, address, phone number, or email, often collected by companies for various purposes
- Clue: This is your personal page on a social networking site where you share information about yourself.
- Clue: The process of selecting specific criteria, such as demographics or interests, to display ads to a particular audience.
- Clue: Associating a person or page with a post or photo on social media.
13 Clues: Clue: Harassing or intimidating someone online is known as this. • Clue: Associating a person or page with a post or photo on social media. • Clue: A secret combination of characters used to access a user's account. • Clue: A company pays for their product or service to be the first result you see. • ...
cyber bezpieczeństwo 2025-04-16
Across
- o zbiór zasad dotyczących pozytywnych zachowań w sieci, a te wpływają też na naszebezpieczeństwo
- czyli nadmierna wylewność online
- to złośliwe oprogramowanie, mogące przysporzyć nie lada kłopotów.
- kopia zapasowa danych przechowywana w innych miejscach niż ichoryginalne wersje.
- monitoruje Waszą aktywność na urządzeniu.
- bezpieczeństwo w sieci
- paniczny strach przed brakiem dostępu do telefonu podłączonego do internetu
- Systematyczna instalacja nowszych,poprawionych wersji
Down
- służą właśnie do tworzenia losowychkombinacji różnych znaków, co ma nam dać silne zabezpieczenie.
- filmy transmisje na żywo – które prezentują zachowania uznawane za szkodliwe i destrukcyjne.
- o cyberprzestępca, który wykorzystujebłędy, luki i złośliwe oprogramowanie (malware), by przeprowadzić atak.
- o swoisty identyfikator użytkownika sieci lub systemu komputerowego.Swoją nazwę możecie wymyślić sami
- o unikatowy numer identyfikacyjny nadawanyurządzeniom podłączonym do sieci (np. komputerom, tabletom).
13 Clues: bezpieczeństwo w sieci • czyli nadmierna wylewność online • monitoruje Waszą aktywność na urządzeniu. • Systematyczna instalacja nowszych,poprawionych wersji • to złośliwe oprogramowanie, mogące przysporzyć nie lada kłopotów. • paniczny strach przed brakiem dostępu do telefonu podłączonego do internetu • ...
Cyber Ethics 2025-06-10
Across
- Simplest way to prevent plagiarism
- Software is copied and distributed illegally
- Process of transforming data into unreadable code
- Spamming untill mail server gets full
- Illegal intrusion into computer
Down
- Being aware of ethical practices and behaving appropriately in internet
- Act of imitating another person's original work
- Another name for digital footprints
- Equivalent term to hacking
- Hacking done for good purposes
- Unwanted bulk resources from unknown sources
- Act of stealing and misusing someone's personal information
- Security system that prevents unauthorised people from accessing your account
13 Clues: Equivalent term to hacking • Hacking done for good purposes • Illegal intrusion into computer • Simplest way to prevent plagiarism • Another name for digital footprints • Spamming untill mail server gets full • Software is copied and distributed illegally • Unwanted bulk resources from unknown sources • Act of imitating another person's original work • ...
Cyber Threats 2025-10-28
Across
- Targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises
- Can execute itself and spread by infecting other programs or files.
- Use a false promise to pique a victim
- Uses trial and error to crack passwords
- malicious software designed to harm or exploit computer systems.
- Collects information and data on the device and user
- Victims are bombarded with false alarms and fictitious threats
Down
- trick individuals into sharing sensitive information
- Appears as a legitimate software program to gain access to a system.
- Uses psychological manipulation to trick users into making security mistakes.
- Encrypts files on a victim's computer and demands a ransom payment in exchange for the decryption key.
- Tracks a user's browser and download history with the intent to display pop-up
- self-replicate without a host program and typically spreads without any interaction from the malware authors.
13 Clues: Use a false promise to pique a victim • Uses trial and error to crack passwords • trick individuals into sharing sensitive information • Collects information and data on the device and user • Victims are bombarded with false alarms and fictitious threats • malicious software designed to harm or exploit computer systems. • ...
ANALYTICS 2014-08-24
Across
- parses the code and identify constructs that seem to introduce threats.(4, 7)
- technique used to attack data driven applications through code injection (3, 9)
- a weakness that makes a threat possible (13)
- a software that controls the incoming and outgoing network traffic (8)
- the degree of resistance to, or protection from, harm (8)
- an open-source web application security project (5)
- the act of confirming the truth of an attribute of an entity (14)
- process of creating computer software (6)
- an operating system (4)
- provides remote access to a targeted computer system (6)
- a type of network security attack where the attacker takes control of a communication (9)
Down
- a method of bypassing normal authentication (8)
- an attempt to acquire sensitive information by redirecting to a false site (8)
- a safeguard that addresses a threat and mitigates risk (14)
- a list of known good inputs (9)
- an action taken to harm an asset (6)
- dynamic application Security testing (4)
- a list of software weaknesses (3)
- used by attackers to gain unauthorized access to systems or data (6, 8)
- authentication, authorization and accounting (3)
- cross-site Request Forgery (4)
- a character encoding standard (7)
- a malware program (5)
- a possible danger that may act to breach security (6)
- the art of writing or solving secret codes (12)
- cross-site Scripting (3)
26 Clues: a malware program (5) • an operating system (4) • cross-site Scripting (3) • cross-site Request Forgery (4) • a list of known good inputs (9) • a list of software weaknesses (3) • a character encoding standard (7) • an action taken to harm an asset (6) • dynamic application Security testing (4) • process of creating computer software (6) • ...
SN33003FP Chapter 6 2024-07-06
Across
- Reduces the severity of the loss or the likelihood of the loss from occurring
- Prevent a disaster from occurring
- The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
- Gets critical systems to another location while repair of the original facility is under way
- Avoiding complex solutions that users cannot understand or troubleshoot
- Ability to maintain availability during disruptive events
- Restricting access so that users only have the level of access required to do their job
- It is critical to keep an organization functioning when a disaster occurs
- Manages a complete inventory of hardware and software
- Discover the incident
- Plan for potential incidents
Down
- Creating a barrier of multiple defences to prevent attacks
- Identifies specific hardware and software products that the organization uses and supports
- Breaching one layer of security does not compromise the whole system
- Discover unwanted events
- Investigate the cause of the incident and ask questions to better understand the nature of the threat
- Analyzes the dangers posed by natural and human-caused events to the assets of an organization
- Enhances system reliability and availability by distributing them across multiple physical locations
- Manages a full inventory of hardware and software components that are vulnerable to security risks
- Network protocol that provides for redundancy
- Concealing certain types of information to make it more difficult for cyber criminals to attack a system
- The set of procedures that an organization follows after an event occurs outside the normal range
- Assigns all resources into a group based on common characteristics
- Restore the system after a disaster
- Minimizes risk by staying ahead of cybercriminals
- Ensures system availability in the event of a component failure
- Combines multiple physical hard drives into a single logical unit
- A group of servers that act like a single system
- Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
- Enables a system to continue operating if one or more components fail
- 99.999% uptime, less than 5.26 minutes downtime yearly
31 Clues: Discover the incident • Discover unwanted events • Plan for potential incidents • Prevent a disaster from occurring • Restore the system after a disaster • Network protocol that provides for redundancy • A group of servers that act like a single system • Minimizes risk by staying ahead of cybercriminals • Manages a complete inventory of hardware and software • ...
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
Risk, cyber security concern 2023-06-13
Crossword Period 1 2024-06-04
Across
- For insiders only
- Not quite
- Class of conspicuous consumption
- Like teacher's answers, sometimes
- Something precious and portable
- All puffed up
- Like a speech or sermon
- Last ___ of...
- Like the prices on Black Friday or Cyber Monday
Down
- Linked
- Like a famous fictional knight
- Relative of "shy" and "shoo"
- Clownish
- You might have this before a big decision
- Salty or spicy, in speech
- Link
- Something worse than a lecture
- Find intolerable
- Opposite of indifference
19 Clues: Link • Linked • Clownish • Not quite • All puffed up • Last ___ of... • Find intolerable • For insiders only • Like a speech or sermon • Opposite of indifference • Salty or spicy, in speech • Relative of "shy" and "shoo" • Like a famous fictional knight • Something worse than a lecture • Something precious and portable • Class of conspicuous consumption • Like teacher's answers, sometimes • ...
Crossword Period 1 2024-06-04
Across
- For insiders only
- Not quite
- Class of conspicuous consumption
- Like teacher's answers, sometimes
- Something precious and portable
- All puffed up
- Like a speech or sermon
- Last ___ of...
- Like the prices on Black Friday or Cyber Monday
Down
- Linked
- Like a famous fictional knight
- Relative of "shy" and "shoo"
- Clownish
- You might have this before a big decision
- Salty or spicy, in speech
- Link
- Something worse than a lecture
- Find intolerable
- Opposite of indifference
19 Clues: Link • Linked • Clownish • Not quite • All puffed up • Last ___ of... • Find intolerable • For insiders only • Like a speech or sermon • Opposite of indifference • Salty or spicy, in speech • Relative of "shy" and "shoo" • Like a famous fictional knight • Something worse than a lecture • Something precious and portable • Class of conspicuous consumption • Like teacher's answers, sometimes • ...
safe computing assignment 2025-08-06
Across
- Attack traffic to take servers down
- scrambles data for protection
- network of infected computers
- manipulating into confidential info
- hides malware
- records keynotes
- hides IP
- identity check
- stealing data from emails
Down
- watches and sends information to others
- malware disguised as program
- fix for volnurability
- attack targeting vulnerabilities of software
- blocks unauthorized access
- knowledge about cyber threats
- hacking to find flaws
- providing identity
- tries everything to gain access
- locks data until paid for
19 Clues: hides IP • hides malware • identity check • records keynotes • providing identity • fix for volnurability • hacking to find flaws • locks data until paid for • stealing data from emails • blocks unauthorized access • malware disguised as program • scrambles data for protection • network of infected computers • knowledge about cyber threats • tries everything to gain access • ...
Network and Security 2024-07-24
Across
- A secret word or phrase that is used to access a computer system or service.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Code that is embedded into the hardware of a computer.
- The programs and other operating systems used by a computer.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- programs that automatically execute tasks as ordered by creator
- form of cryptocurrency
- Stands for the National Security Agency
- The method of obtaining user information through fraudulent communications targeted directly at people.
- two words. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior
- Text that can be read by the human eye
- creating a fake identity on social network account
- A weakness in a computer system or network that can be exploited by attackers.
- any action that makes a computer system vulnerable
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
- Customizable additions to software for extra functionality
- an error, flaw, failure, or fault
20 Clues: form of cryptocurrency • an error, flaw, failure, or fault • Text that can be read by the human eye • Stands for the National Security Agency • creating a fake identity on social network account • any action that makes a computer system vulnerable • Code that is embedded into the hardware of a computer. • Customizable additions to software for extra functionality • ...
Extreme Sports 2021-09-23
Across
- Use this element when you do Paragliding
- A security element to do bungee jumping
- Extreme sport in which a person throws himself from a high height,
- A situation similar to dizziness
- A security element that does not allow you to drown
- Extreme sport where you jump out of a plane with a parachute
- Use this security element to protect the head
Down
- Use this element when you're in a dark cave
- Extreme sport that is done in the rapids of a river
- A security element to protect your eyes
- When you broke a bone anywhere in your body
- Activity in which a person is propelled by the wind-down a ravine and uses a parachute
- A natural underground chamber
- A security element to protect your hand from hurting you
14 Clues: A natural underground chamber • A situation similar to dizziness • A security element to protect your eyes • A security element to do bungee jumping • Use this element when you do Paragliding • Use this element when you're in a dark cave • When you broke a bone anywhere in your body • Use this security element to protect the head • ...
Famous 1963 Pop Culture and Inventions 2023-11-11
Across
- Jean Nidetch founded this now (in)famous organization
- Chinese actor and film producer best known for his prowess in martial arts
- layered, like an onion (or an ogre), he's a man of many talents and accents!
- first liver ____ and lung ____ surgeries are performed
- rapper Leon Ivey Jr's stage name, can be synonymous with "okie dokie"
- this alternative to rotary dial was first made publicly available by Bell Systems
- athlete Jordan's first name was the most popular for boys in 1963
- introduced in 1963, these would become the dominant music format in the 1980s
- first name of the first Black Miss America, was later prolific on screen and stage
- last name of American director whose films contain copious amounts of violence, gore, and profanity
Down
- played a pirate, a chocolatier, and a chocolatier's boyfriend
- psychedelic showpieces that now help cyber security companies generate random numbers
- a drink ML would never enjoy, quick fix way of consuming caffeine
- time traveling adventurer whose first episode aired 3 days after ML was born
- shares a birthday with ML! This actress voiced the character Mulan in Disney's 1998 animated film
- Doug Englbart's solution for controlling a pointer on a graphic display, this electronic "rodent" is still widely used today
- released in '63, this Hitchcock film's titular creatures begin attacking humans
- actress whose quirky character frequently performed the song "Smelly Cat"
- vaccine for this childhood disease was made available
- John who will always be "Uncle Jesse"
- first to earn People magazine's "Sexiest Man Alive" title twice
21 Clues: John who will always be "Uncle Jesse" • Jean Nidetch founded this now (in)famous organization • vaccine for this childhood disease was made available • first liver ____ and lung ____ surgeries are performed • played a pirate, a chocolatier, and a chocolatier's boyfriend • first to earn People magazine's "Sexiest Man Alive" title twice • ...
Module 3 LU1 &LU2 2025-04-02
Across
- Which QA activity ensures that team members follow defined standards and guidelines?
- Which aspect of QA focuses on refining procedures to enhance efficiency and effectiveness?
- What testing method ensures software can handle expected workload and stress?
- What is the final testing phase where end-users confirm the software meets their needs?
- What are issues or errors found in the software that testing aims to identify and fix?
- Which test objective ensures software adheres to legal, regulatory, and contractual requirements?
- What is a static testing method that checks documents, designs, and specifications without executing code?
- Which testing phase ensures different components work together seamlessly?
- What is the core element being assessed in testing to ensure quality and functionality?
- What is the process of identifying the fundamental reason behind a defect?
- Which comprehensive testing phase evaluates the entire software application for expected performance?
Down
- What process focuses on preventing defects rather than just detecting them?
- What is the process of locating and fixing defects found during testing?
- Which process involves tracking and managing defects until resolution?
- What measures how consistently software performs over time without failure?
- Which important aspect of testing ensures protection against cyber threats and vulnerabilities?
- What proactive measure involves reviewing code to prevent defects?
- What is a dynamic testing process that involves executing code to confirm it meets requirements?
- What testing activity involves running test cases and documenting results?
- Which technique ensures software is built correctly according to specifications?
- Which testing process ensures that software meets user needs and requirements?
- What is another term for flaws or issues found in software during testing?
22 Clues: What proactive measure involves reviewing code to prevent defects? • Which process involves tracking and managing defects until resolution? • What is the process of locating and fixing defects found during testing? • What testing activity involves running test cases and documenting results? • ...
L'Aeroport 2025-02-25
15 Clues: gate • plane • board • early • customs • bag tag • transfer • pass through • boarding room • boarding pass • baggage claim • direct flight • security/seat belt • passport checkpoint • security checkpoint
fantascienza e info 2024-11-27
Across
- Specie cyber-organica di Star Trek
- Operazione di trasferimento di dati su internet
- Abbreviazione per intelligenza artificiale
- Relativo ai neuroni, spesso usato in reti neurali artificiali
- Un miliardo di byte
- Gigantesco robot pilotato, tipico dell’anime e della fantascienza
- Macchina automatica capace di replicare azioni umane
- Il luogo dove si svolgono molte storie di fantascienza
- Rete informatica globale
- Informazioni digitali elaborate dai computer
- Veicolo autonomo spesso utilizzato in scenari futuristici
- Creatura metà uomo e metà macchina
- Abbreviazione per realtà virtuale
- Computer che fornisce servizi ad altri
- Barriera di sicurezza digitale
- Famoso film di fantascienza e ambiente virtuale
- Personaggio magico spesso associato a mondi virtuali e giochi
Down
- Prefisso che indica il mondo digitale o virtuale
- Materiale immaginario, debolezza di Superman
- Esperto di informatica, a volte protagonista di romanzi cyberpunk
- Unità minima di un'immagine digitale
- Pianeta natale di Superman, spesso citato in fantascienza
- Sequenza di istruzioni per risolvere un problema
- Truffa informatica che mira a carpire dati personali
- Unità minima di informazione digitale
- Raggio di luce utilizzato in fantascienza e scienza
- Otto bit, l'unità base per i dati in informatica
- Software che controlla l’hardware
- Flusso di dati, tipico di contenuti multimediali online
- Robot umanoide spesso presente nella fantascienza
30 Clues: Un miliardo di byte • Rete informatica globale • Barriera di sicurezza digitale • Software che controlla l’hardware • Abbreviazione per realtà virtuale • Specie cyber-organica di Star Trek • Creatura metà uomo e metà macchina • Unità minima di un'immagine digitale • Unità minima di informazione digitale • Computer che fornisce servizi ad altri • ...
Bullying 2024-08-04
Across
- Someone who supports or defends victims of bullying
- Forms of bullying carried out through electronic media
- The act of ridiculing or insulting someone's body
- an intentional act of physical violence to harm another person.
Down
- the act of hurting or making another person feel uncomfortable, either physically or emotionally
- One of the social media used by cyber bullying perpetrators
- Forms of bullying that use hurtful words
- One form of physical violence received by victims of bullying
- Persuading others not to be friends with someone is one of what forms of bullying?
9 Clues: Forms of bullying that use hurtful words • The act of ridiculing or insulting someone's body • Someone who supports or defends victims of bullying • Forms of bullying carried out through electronic media • One of the social media used by cyber bullying perpetrators • One form of physical violence received by victims of bullying • ...
stego 2023-08-01
Across
- .... .... was an anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
Down
- u icy data
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- Lbrozz Ignceunywfz Gkwdrz; key - information
9 Clues: u icy data • Rhysider 44. • Lbrozz Ignceunywfz Gkwdrz; key - information • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Shadowy cyber collective widely known because of its work since 02.2022. • Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS. • ...
Security Awareness Puzzle 2019-08-27
Across
- The individual who is charged with overall formulation and management of Security Procedures within LIAT
- An area which makes up the Critical Part of an airport
- An item which may pose a threat to persons or property
- A means of receiving bomb threats
- A Means of controlling access in restricted areas
- Probability of an attack within a specified time frame
- LIATs regulatory authority with aviation
Down
- A major threat to aviation
- an individual responsible for Security at Stations
- a group of personnel who are responsible for access control
- Sensitive or confidential information
- An international organization responsible for Security Matters within aviation worldwide
- The individual who is at the helm of the Security Org Chart
- Part The part of an airport which one must go through security control to have access
14 Clues: A major threat to aviation • A means of receiving bomb threats • Sensitive or confidential information • LIATs regulatory authority with aviation • A Means of controlling access in restricted areas • an individual responsible for Security at Stations • An area which makes up the Critical Part of an airport • An item which may pose a threat to persons or property • ...
UN Structure 2025-03-12
Across
- Settles disputes between UN member states
- Supervised 11 territories until 1994
- Main decision-making body of the UN
- Military forces authorized by the Security Council
- Carries out UN resolutions
- ECOSOC builds partnerships with businesses and these organizations
- Ensures peace and has binding resolutions
Down
- General Assembly must approve this financial plan
- number of Security Council members
- Type of Security Council members elected for two-year terms
- Current UN Secretary-General
- Each UN member state has this amount of votes in the General Assembly
- Penalties imposed by the Security Council
- number of main General Assembly committees
14 Clues: Carries out UN resolutions • Current UN Secretary-General • number of Security Council members • Main decision-making body of the UN • Supervised 11 territories until 1994 • Settles disputes between UN member states • Penalties imposed by the Security Council • Ensures peace and has binding resolutions • number of main General Assembly committees • ...
SOCIETAL EMPACT (TANISHKA JHA) 2022-01-02
Across
- Digital footprints we intentionally leave online
- ____ is a person who sows discord on internet by posting off topic messages.
- To prevent the loss of personal info to criminals or pollution send the non-usable devices to a certified ____________ .
- The activity history stored online is__________
- The information uploaded online is stored in the ________ .
- ______ is giving threats online or posting victim's personal info etc.
- Not responding to unnecessary and irrelevant emails or comments is being _________ .
- We shouldn't use ____________ materials without the permission of the creator or owner.
Down
- Respect the ____________ of the people in terms of knowledge and experience.
- Digital ________ work on a unique digital ID issued by a CA to the user.
- Cyber Appellate ___________ has been established to resolve disputes arising from cyber crime.
- We can ________ our used electronic gadgets to trustful organizations that can give it to the needy who cannot afford it otherwise.
- To think before uploading is being ____________ .
- What is an example of cloud shared storage?
- A person's ________ is judged before relying on said person's comments and claims online.
- Digital footprints trail we unintentionally leave online
- ___________ include old mobile phones , CDs or pen drives.
- Our digital footprints cannot be ___________ deleted.
18 Clues: What is an example of cloud shared storage? • The activity history stored online is__________ • Digital footprints we intentionally leave online • To think before uploading is being ____________ . • Our digital footprints cannot be ___________ deleted. • Digital footprints trail we unintentionally leave online • ...
L'aéroport 2021-09-26
14 Clues: flight • customs • airport • luggage • check-in • airplane • suitcase • passenger • passeport • waiting room • security guard • airline ticket • luggage carousel • security checkpoint
11/10 Fndts Vocab 2021-11-10
Across
- The background of the project where the Actors are placed
- Hackers ethical hackers use skills for good, ethical and legal purposes to compromise networks/systems to discover network vulnerabilities in order to be fixed by developers
- stops character from leaving a trial
- Persistent Threat a continuous computer hack that occurs under the radar against a specific object
- uses quotations marks at the beginning and end of this data; not recognized by the programming software
- The order in which steps or events happen
- determines how quickly an object will move through commands
- A set of known actions that the computer can perform
- A Tynker character or object that can talk and interact with others
- this code is used to move objects forward
Down
- Hackers individuals who commit crimes and unethical things, not for personal gain or damage, but to allow the affected organization to know of compromised or weakness in networks
- uses a hashtag to begin the text that is unrecognized by the programming software used for informational purposes only
- has character start drawing a trail
- Broker grey hat hackers: attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
- Warning Systems provide information about potential attacks
- The language that tells a computer what to do
- A specific action or instruction that tells the computer to do something
- Moves Tracy to a specified coordinate
- Domains an area to be protected may be limited by a logical or physical boundary
- Hackers unethical criminals that violate computer/network security
20 Clues: has character start drawing a trail • stops character from leaving a trial • Moves Tracy to a specified coordinate • The order in which steps or events happen • this code is used to move objects forward • The language that tells a computer what to do • A set of known actions that the computer can perform • The background of the project where the Actors are placed • ...
Match the Card to the Duelist 2023-04-06
Across
- Elemental HERO Divine Neos
- Cyber End Dragon
- Bloom Diva the Melodious Choir
- Number 106: Giant Hand
- Earthbound Immortal Ccapac Apu
- Red Dragon Archfiend
- Super Vehicroid Jumbo Drill
- Abyss Actor - Superstar
- Stardust Dragon
- Earthbound Immortal Wiraqocha Rasca
- Jinzo
- Black Rose Dragon
- Dark Necrofear
- Harpie Lady Sisters
- Ice Beast Zerofyne
- Masked Beast Des Gardius
- Gandora the Dragon of Destruction
- The Legendary Fisherman
- Duza the Meteor Cubic Vessel
- Ancient Fairy Dragon
- Malefic Truth Dragon
- Cyber Commander
- Borreload Dragon
- Pumpking the King of Ghosts
- Curse Necrofear
- Trickstar Holly Angel
- Maiden in Love
- Tin Archduke
- Rainbow Dragon
- Infernity Doom Dragon
- Evil HERO Malicious Fiend
- Gouki The Great Ogre
- Red-Eyes Black Dragon (Good User)
- Volcanic Doomfire
- Gate Guardian
Down
- Galaxy-Eyes Photon Dragon
- Fairy Cheer Girl
- Ojama King
- Indiora Doom Volt the Cubic Emperor
- Yubel
- Fortune Fairy Chee
- Destiny Hero - Plasma
- Number 39: Utopia
- Salamangreat Heatleo
- Orgoth the Relentless
- Insect Queen
- Power Tool Dragon
- Black-Winged Dragon
- Odd-Eyes Pendulum Dragon
- Ancient Gear Golem
- D/D/D Doom King Armageddon
- Goyo Guardian
- Sephylon, the Ultimate Timelord
- Number 32: Shark Drake
- Number 15: Gimmick Puppet Giant Grinder
- Water Dragon
- Dark Rebellion Xyz Dragon
- Raidraptor - Rise Falcon
- Blue-Eyes White Dragon (Primary User)
- T.G. Halberd Cannon
- Lava Golem
- Number 6: Chronomaly Atlandis
- Cyber Blader
- Dark Magician (Good User)
- Relinquished
- Decode Talker
- Blue-Eyes White Dragon (Secondary User)
- Earthbound Immortal Aslla Piscu
- Dark Magician Girl
- Superdreadnought Rail Cannon Gustav Max
- Mine Golem
- Ultimate Tyranno
- Fossil Warrior Skull King
- Meklord Emperor Wisel
- Frightfur Bear
- Red-Eyes Black Dragon (Evil User)
- Superheavy Samurai Big Benkei
- Arcana Force EX - The Light Ruler
- Barrel Dragon
- Elemental HERO Neos
- Blast Held by a Tribute
- Dark Magician (Evil User)
- Meklord Astro Mekanikle
- Embodiment of Apophis
84 Clues: Yubel • Jinzo • Ojama King • Lava Golem • Mine Golem • Insect Queen • Water Dragon • Cyber Blader • Relinquished • Tin Archduke • Goyo Guardian • Decode Talker • Barrel Dragon • Gate Guardian • Dark Necrofear • Frightfur Bear • Maiden in Love • Rainbow Dragon • Stardust Dragon • Cyber Commander • Curse Necrofear • Fairy Cheer Girl • Cyber End Dragon • Borreload Dragon • Ultimate Tyranno • Number 39: Utopia • ...
Spanish 2 Ch 11 Vocabulario P1 2021-03-19
Across
- A trip by airplane
- Passengers
- Taxi
- Agent
- Boarding pass
- To inspect or to check
- Passport
- Luggage claim ticket
- Flight number
- Carry on luggage
- Departure/arrival screen
- Suitcases
- No smoking section
Down
- Baggage or luggage
- Ticket
- Before the flight
- Security check
- Departure gate
- Airport
- Seat number
- Ticket
- Scales
- Security
- Counter
- Destination
- Porter
26 Clues: Taxi • Agent • Ticket • Ticket • Scales • Porter • Airport • Counter • Security • Passport • Suitcases • Passengers • Seat number • Destination • Boarding pass • Flight number • Security check • Departure gate • Carry on luggage • Before the flight • Baggage or luggage • A trip by airplane • No smoking section • Luggage claim ticket • To inspect or to check • Departure/arrival screen
46a 2024-07-11
Across
- Video cable
- Touchscreen pen
- Fast storage
- Wired network
- Video recorder
- Data connector
- Physical tech
- Network security
- Power source
- Phone chip
- Internet distributor
- Power adapter
- Data storage
Down
- Data storage
- Online storage
- Image display
- Computer program
- Network host
- Portable storage
- Small headphones
- Web finder
- Security software
- Connector device
- Internet tool
- Mobile software
25 Clues: Web finder • Phone chip • Video cable • Data storage • Fast storage • Network host • Power source • Data storage • Image display • Wired network • Physical tech • Internet tool • Power adapter • Online storage • Video recorder • Data connector • Touchscreen pen • Mobile software • Computer program • Portable storage • Small headphones • Network security • Connector device • Security software • Internet distributor
stego 2023-08-01
Across
- .... .... was an anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
Down
- u icy data
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- Lbrozz Ignceunywfz Gkwdrz; key - information
9 Clues: u icy data • Rhysider 44. • Lbrozz Ignceunywfz Gkwdrz; key - information • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Shadowy cyber collective widely known because of its work since 02.2022. • Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS. • ...
The hardest crossword puzzle EVERRR 2022-11-16
Across
- Someone fraudulently trying to gain access to an unauthorized system.
- Any security practice put in place to mitigate a security event or incident from occurring.
- Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
- Most useful tool in cybersecurity, pretty much.
- The practice of utilizing trial and error to guess credentials.
- Posing as a fraudulent person or organization and sending messages in their name. An attempt to acquire PID and credentials from victim.
- Copies of data
- A condiment
- describes a minor disruption to the digital landscape that is thought to be unintentional
Down
- A data file through which the identity, authenticity and reliability of a website or web application is established.
- Intentional damage, theft and/or unauthorized access that has direct or indirect impact to any substantial part of an organization's information, systems, devices, services or products.
- A possibility of being attacked or harmed
- responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- A computer software vulnerability that has yet to be discovered by the team in charge of mitigating it.
- A general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer and Transport Layer Security protocols.
15 Clues: A condiment • Copies of data • A possibility of being attacked or harmed • Most useful tool in cybersecurity, pretty much. • The practice of utilizing trial and error to guess credentials. • Someone fraudulently trying to gain access to an unauthorized system. • Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of? • ...
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
Cyber Security October'23 2023-10-10
Across
- A common method used by cybercriminals to trick people.
- What you should do with your passwords to make them more .
- A program that can protect your computer from viruses and malware.
Down
- Malicious software that can damage your computer or steal your data.
- The act of keeping your sensitive information secret online.
5 Clues: A common method used by cybercriminals to trick people. • What you should do with your passwords to make them more . • The act of keeping your sensitive information secret online. • A program that can protect your computer from viruses and malware. • Malicious software that can damage your computer or steal your data.
Cyber Bullying 2015-03-09
Across
- the form of bullying by fighting in order to harm the victim.
- which social media site has the logo of an F?
- the opposite of up stander. someone who is present at an event but does not get involved.
- most cyber bullying is carried out online using a mobile .....
- which social media site has the logo of a bird?
Down
- someone who stands up for something
- which social media app is used to send photographs?. This app has a yellow logo.
- the form of bullying used online.
- where somebody attempts to take their own life.
- the form of bullying that relies on the use of language (shouting.)
10 Clues: the form of bullying used online. • someone who stands up for something • which social media site has the logo of an F? • where somebody attempts to take their own life. • which social media site has the logo of a bird? • the form of bullying by fighting in order to harm the victim. • most cyber bullying is carried out online using a mobile ..... • ...
TTS REVOLUSI INDUSTRI 2025-09-22
Across
- Revolusi Industri kedua ditandai dengan penggunaan listrik secara luas (marketing 2.0)
- Era marketing yang memakai teknologi canggih untuk meningkatkan pengalaman manusia (Marketing 5.0)
- Revolusi Industri ketiga ditandai dengan hadirnya komputer dan otomatisasi (marketing 3.0)
- Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan (Marketing 3.0)
Down
- Era marketing yang menekankan komunitas, keberlanjutan, dan tanggung jawab sosial (Marketing 6.0)
- Revolusi Industri keempat dikenal dengan istilah cyber physical system (marketing 4.0)
- Era marketing yang berfokus pada kebutuhan dan keinginan konsumen (Marketing 2.0)
- Era marketing yang menggabungkan pemasaran tradisional dengan dunia digital (Marketing 4.0)
- Era marketing yang berorientasi pada produk (Marketing 1.0)
- Revolusi Industri pertama ditandai dengan penemuan mesin uap (marketing 1.0)
10 Clues: Era marketing yang berorientasi pada produk (Marketing 1.0) • Revolusi Industri pertama ditandai dengan penemuan mesin uap (marketing 1.0) • Era marketing yang berfokus pada kebutuhan dan keinginan konsumen (Marketing 2.0) • Era marketing yang menekankan aspek nilai, emosi, dan kemanusiaan (Marketing 3.0) • ...
CISO Crossword Quiz - 1425 2025-01-15
Across
- IP_______ is a technique in which hackers change IP address of sender's email id
- Portal by MHA to report fraud Phone calls, SMS & WhatsApp calls or messages
- USB_____ is a type of cyber attack that involves stealing sensitive information using an infected USB drive as a bait for the victim.
- ____bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met
- The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files or systems
Down
- Credential ________ is a type of cyber attack in which the attacker uses stolen login credentials to access a network using large scale automated login requests
- A form of phishing that targets high-profile individuals
- Cyber_______ are the best practices for keeping digital devices and online accounts clean and secure from cyber attacks
- A type of social engineering attack that impersonates a trusted entity to steal information
- The ability of individual to understand and exercise control over how information about themselves may be used by others
10 Clues: A form of phishing that targets high-profile individuals • Portal by MHA to report fraud Phone calls, SMS & WhatsApp calls or messages • IP_______ is a technique in which hackers change IP address of sender's email id • A type of social engineering attack that impersonates a trusted entity to steal information • ...
Puzzle #50 – “History of Social Security” 2025-06-30
Across
- - Economic crisis that led to the program's creation
- - Year the Social Security Act became law
- - First monthly ______ were paid in 1940
- - Social Security was passed as this type of legal document
Down
- - People who fund Social Security through payroll taxes
- - Study of how Social Security began and evolved
- - President who signed Social Security into law
- - Original purpose of the Social Security program
- - Where collected Social Security taxes are stored
- - Agency created to manage the program
10 Clues: - Agency created to manage the program • - First monthly ______ were paid in 1940 • - Year the Social Security Act became law • - President who signed Social Security into law • - Study of how Social Security began and evolved • - Original purpose of the Social Security program • - Where collected Social Security taxes are stored • ...
