cyber security Crossword Puzzles

Cyber Vocab 1.1 2025-08-29

Cyber Vocab 1.1 crossword puzzle
Across
  1. A secret string of characters used for authentication.
  2. Precomputed tables used to reverse cryptographic hash functions.
  3. Ensuring that information and resources are accessible when needed.
  4. An attack that attempts common passwords against many accounts.
  5. When two different inputs produce the same hash output.
  6. The combination of username and password or other authentication information.
  7. An authentication method allowing a user to access multiple systems with one login.
  8. A mix of dictionary and brute force attacks.
  9. Authentication based on physical or behavioral characteristics - such as fingerprints or facial recognition.
  10. The practice of protecting systems- networks and programs from digital attacks.
  11. The process of verifying an individual’s identity before granting access.
  12. A process of converting data into a fixed-size string - typically used for storing passwords securely.
  13. The process of verifying the identity of a user or system.
  14. An organized collection of structured information or data stored electronically.
  15. A cryptographic attack that exploits the probability of hash collisions.
  16. Ensuring that information is only accessible to those with proper authorization.
  17. An incident where unauthorized access to data or systems occurs.
Down
  1. A method of breaking passwords by systematically entering every word in a dictionary.
  2. Tracking user actions and activities for auditing and monitoring.
  3. A digital document used to prove ownership of a public key.
  4. Physical cards with embedded chips used for secure authentication.
  5. An attack where stolen credentials are used to gain unauthorized access.
  6. Maintaining the accuracy and trustworthiness of data.
  7. An attack that tries all possible combinations to guess a password.
  8. Restricting access to resources based on user identity and permissions.
  9. A step-by-step procedure for calculations or problem-solving.
  10. A sequence of words used instead of a password for authentication.
  11. A security model consisting of Confidentiality Integrity and Availability.

28 Clues: A mix of dictionary and brute force attacks.Maintaining the accuracy and trustworthiness of data.A secret string of characters used for authentication.When two different inputs produce the same hash output.The process of verifying the identity of a user or system.A digital document used to prove ownership of a public key....

Cyber Crossword 2023 2023-10-06

Cyber Crossword 2023 crossword puzzle
Across
  1. A technique where an attacker moves from one compromised system to the next.
  2. A cyber attack that makes a system unavailable to its intended users.
  3. The group responsible for defending the organization's information systems during a cybersecurity test.
  4. A cyber attack where the victim's data is held hostage and the attacker demands a payment.
Down
  1. Type of authentication that requires users to enter more than just a password.
  2. An exhaustive method for cracking passwords.
  3. In this attack, the attacker intercepts communication to eavesdrop or impersonate.
  4. Triad of cybersecurity tenets.
  5. Ancient cipher used by the Greeks.
  6. A group of penetration testers used to simulate the actions of those who are malicious.

10 Clues: Triad of cybersecurity tenets.Ancient cipher used by the Greeks.An exhaustive method for cracking passwords.A cyber attack that makes a system unavailable to its intended users.A technique where an attacker moves from one compromised system to the next.Type of authentication that requires users to enter more than just a password....

Information Security Crossword Puzzle 2019-07-17

Information Security Crossword Puzzle crossword puzzle
Across
  1. Bypassing security on a system
  2. Recovery and Investigation
  3. Which website is used to check your email is compromised or not ?
  4. Weakness in a system
  5. Which attack is also known as “piggybacking” ?
  6. goggle.com is an example of _________ method
  7. Enemy of Security
  8. Client for SSH
Down
  1. Malware which presents unwanted advertisements
  2. Threat X Vulnerability
  3. Technology designed to keep the bad guys out
  4. Everyone should enable Two Factor _____________
  5. Should not be shared / kept open to everyone
  6. Similar to virus that replicate from one to another
  7. ______ is wealth
  8. distributed ______ of service
  9. Confidentiality, __________, Availability
  10. unplanned disruption or degradation of a network
  11. Common type of social engineering attack
  12. Provide real-time analysis of security alerts

20 Clues: Client for SSH______ is wealthEnemy of SecurityWeakness in a systemThreat X VulnerabilityRecovery and Investigationdistributed ______ of serviceBypassing security on a systemCommon type of social engineering attackConfidentiality, __________, AvailabilityTechnology designed to keep the bad guys outShould not be shared / kept open to everyone...

Cybersecurity/Safety 2024-07-11

Cybersecurity/Safety crossword puzzle
Across
  1. short for any malicious software
  2. digital brick layered wall of security
  3. vulnerability no one is aware of yet
  4. collect/transmit private user info
  5. identifies device is connected to internet
  6. appears harmless/conceals malicious intent
  7. monitors security protection measures
  8. designs, tests, implements security system
  9. media manipulation/false perception
  10. fool's user into providing private info
  11. analyst that designs data communication
Down
  1. Also known as "crackers"
  2. clicking hidden elements "UI redress attack"
  3. Germany had great message _____ until, Alan Turing
  4. "penetration testers" works with organization
  5. software to detect, prevent/remove cpu infections
  6. compromised computers to carry out attacks
  7. digital technology harassment
  8. prudent to use a ____ whenever possible
  9. locks out user for Bitcoin

20 Clues: Also known as "crackers"locks out user for Bitcoindigital technology harassmentshort for any malicious softwarecollect/transmit private user infomedia manipulation/false perceptionvulnerability no one is aware of yetmonitors security protection measuresdigital brick layered wall of securityprudent to use a ____ whenever possible...

ACT Vocab 5 2023-03-29

ACT Vocab 5 crossword puzzle
Across
  1. The young musician displayed a ___________ talent for playing the piano.
  2. The boxer's ___________ attitude towards their opponents often resulted in violent altercations.
  3. The idealistic young activist had a ___________ plan to end poverty, but it was unrealistic and impractical.
  4. The CEO's ___________ approach to business helped the company survive during tough economic times.
  5. I always like to ___________ a book before deciding whether or not to read it.
  6. The author's ___________ writing style made the book difficult to read, with unnecessarily long and convoluted sentences.
  7. The chef was able to ___________ my interest in trying new foods with their creative dishes.
  8. The politician was accused of being too ___________ to her party, and not considering the needs of her constituents.
  9. The manager's ___________ towards the employee's complaints did not help to resolve the issue.
  10. The CEO's ___________ was discovered when he was caught embezzling funds from the company.
  11. The artist was considered a ___________ by many critics because of his lack of appreciation for classical art.
  12. The ___________ customer complained about everything, making it difficult for the server to do their job.
  13. The detective's ___________ attention to detail led to the discovery of crucial evidence in the case.
Down
  1. The ___________ of quality candidates for the job made it difficult for the hiring manager to make a decision.
  2. The ___________ security guard was always interfering with the guests' activities.
  3. The company's ___________ approach to spending meant that there was little money left for important projects.
  4. In some societies, people with disabilities are still seen as ___________ and excluded from social activities.
  5. The ___________ child was already reading chapter books at the age of four.
  6. Learning the ___________ of a scientific field is important for effectively communicating with others in the same field.
  7. The angry customer was difficult to deal with, but the manager hoped to ___________ them by offering a discount on their next purchase.
  8. The politician's ___________ towards making promises they couldn't keep was well-known.
  9. A lack of funding may ___________ the construction of the new building.
  10. The politician's speech was criticized for using a _________ to hand waive an important issue.
  11. The company was in a ___________ about whether to invest in new technology or focus on expanding its current product line.
  12. The new security measures are intended to ___________ the risk of cyber attacks on the company's systems.

25 Clues: A lack of funding may ___________ the construction of the new building.The young musician displayed a ___________ talent for playing the piano.The ___________ child was already reading chapter books at the age of four.I always like to ___________ a book before deciding whether or not to read it....

Danica's puzzle 2023-11-27

Danica's puzzle crossword puzzle
Across
  1. A computer that is suitable for use while travelling.
  2. type of online fraud where a cyber criminal designs a fake
  3. the hardware in a computing device where the operating system
  4. a place where u can store pictures and files and other things and u can loge into the cloud from anywhere and see all your stuff
  5. text files with small pieces of data like a username and password that are used to identify your computer as you use a network.
  6. a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
  7. is a common interface that enables communication between devices and a host controller such as a personal computer
  8. a electronic device with a screen which puts out pixels
  9. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
  10. It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
  11. System It manages the computer's memory and processes
  12. video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
  13. It brings you to a certain website or page, the address.
Down
  1. performs many of the same functions as a computer,typically having a touch screen, internet access, and a operating system capable of running download applications.
  2. a peripheral device that enables a user to input text into a computer or any other electronic machinery.
  3. information that is easy to access which can include management, updating computer databases usually collect aggreations of data, records.
  4. a generic term used to refer to applications, scripts and programs that run on a device.
  5. global network of billions of computers and other electronic devices
  6. a personal computer designed to be used on a desk or table the opposite of portable computers like laptops or tablets
  7. web-centric laptops that run Google's Chrome operating system
  8. an application for accessing websites and the Internet.
  9. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  10. a wireless connection that connects you to the internet through radio waves

23 Clues: A computer that is suitable for use while travelling.System It manages the computer's memory and processesa electronic device with a screen which puts out pixelsan application for accessing websites and the Internet.It brings you to a certain website or page, the address.type of online fraud where a cyber criminal designs a fake...

Artificial Intelligence 2024-12-09

Artificial Intelligence crossword puzzle
Across
  1. This sector has been profoundly influenced by AI-powered technologies, which have revolutionized supply chain management, sorting and packing, and determining the most efficient shipping routes.
  2. capable of anticipating maintenance requirements and arranging them in advance of issues, which lowers expenses and downtime.
  3. AI may also be used to identify fraudulent activity and support strategic decision-making, which improves user engagement and experience
  4. Quality Precise, timely, and consistent data is the cornerstone of artificial intelligence systems.
  5. Context provided by AI technologies, but using AI also brings up moral dilemmas as, for better or worse,
  6. The idea of the technological singularity
  7. AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
  8. AI-powered personalization allows marketing campaigns and product suggestions to be customized to each person's taste.
  9. Artificial Intelligence is utilized in product design, labor planning, and equipment predictive maintenance.
  10. (AI) technologies are employed in transportation to forecast aircraft delays, regulate traffic, and enhance the safetyand efficiency of maritime transportation.
Down
  1. Terms AI is being used to assist automate labor intensive tasks in the legal sector, which saves time and enhances customerservice.
  2. By analyzing data from blogs, social media, and online platforms to detect trends and influencers, artificial intelligence (AI) has completely transformed the fashion business.
  3. Artificial Intelligence is utilized in the film business to enhance digital effects, save costs, and expedite production.
  4. coding Artificial intelligence (AI) is a useful tool in cyber security for anomaly identification, behavioral threat analytics, and false positive resolution.
  5. selecting the appropriate ai model for a project is essential
  6. AI tools such as IBM Watson mimic human medical tasks, while NuMedii's AI-driven AIDD platform looks for medication interactions across diseases.
  7. Robotics integration into the workflow has been pioneered by the manufacturing sector.
  8. AI is also capable of automating room administration, ensuring security, and detecting fraudulent activity.
  9. It is advised to conduct further research on the effects of AI on adaptive tests, individualized learning, and creative teaching environments.
  10. AI is used by banking institutions to enhance loan decision-making, establish credit limits, and find investment possibilities.

20 Clues: The idea of the technological singularityselecting the appropriate ai model for a project is essentialRobotics integration into the workflow has been pioneered by the manufacturing sector.Quality Precise, timely, and consistent data is the cornerstone of artificial intelligence systems....

Krzyżówka Angielski 2025-12-10

Krzyżówka Angielski crossword puzzle
Across
  1. – A document describing an event or findings.
  2. – A secret code to access a system.
  3. – Protection against threats or attacks.
  4. – Unauthorized entry into a system.
  5. – A user identity in a system.
  6. – Accidental or unlawful release of information.
  7. – A formal rule or guideline.
  8. – Proof of an event or action.
  9. – Someone who monitors or watches activity.
  10. – A saved copy of data in case of loss.
  11. – Instructions written for computers.
  12. – Delay in data communication.
  13. – Connected computers that share data.
  14. – To watch or track activity.
  15. – A set of connected computer components.
  16. – Rules about what is morally right or wrong.
  17. – A tool that blocks unwanted network traffic.
  18. – Searching for threats inside a network.
  19. – The chance that something bad may happen.
  20. – Belief that someone or something is reliable.
  21. – A step taken to solve a problem.
  22. – A risk or danger.
  23. – The way a system or user acts.
  24. – A sign that danger or problems may occur.
  25. – Permission to use or enter a system.
  26. – A formal review of systems or processes.
Down
  1. – Following laws, rules, or standards.
  2. – A simplified digital structure used to predict or analyze.
  3. – A prediction based on information.
  4. – Programs used by a computer.
  5. – Use of technology to perform tasks without human input.
  6. – Related to money or cost.
  7. – A tool used to explore or test a system.
  8. – Related to investigating cyber incidents.
  9. – A place where data is kept.
  10. – Monitoring to make sure rules are followed.
  11. – A break in security where data is exposed.
  12. – The right to keep personal data protected.
  13. – A call for data or a service.
  14. – A specific area or internet address space.
  15. – A set of rules for communication.
  16. – To check a system for issues or threats.
  17. – A part of a larger software system.
  18. – Converting information into a secure code.
  19. – A computer that provides resources to others.
  20. – Numerical information used for analysis.
  21. – Learning skills or knowledge.
  22. – Short Definition (EN)
  23. – Records of system activities.
  24. – A weakness that can be exploited.
  25. – An event that disrupts normal operations.
  26. – A connection point in a network.
  27. – Information stored or processed by computers.
  28. – Something unusual that may signal a problem.

54 Clues: – A risk or danger.– Short Definition (EN)– Related to money or cost.– A place where data is kept.– A formal rule or guideline.– To watch or track activity.– Programs used by a computer.– A user identity in a system.– Proof of an event or action.– Delay in data communication.– A call for data or a service.– Learning skills or knowledge....

Krzyżówka Angielski Cyberbezpieczenstwo 2025-12-10

Krzyżówka Angielski Cyberbezpieczenstwo crossword puzzle
Across
  1. The current condition of a system.
  2. Too much data or activity for a system to handle.
  3. A call for data or a service.
  4. A formal rule or guideline.
  5. A mistake or problem in a system.
  6. Records of system activities.
  7. To follow the path of an action or data flow.
  8. Information stored or processed by computers.
  9. Learning skills or knowledge.
  10. To protect from harm or attacks.
  11. A tool that blocks unwanted network traffic.
  12. Accidental or unlawful release of information.
  13. The way a system or user acts.
  14. A place where data is kept.
  15. Connected computers that share data.
  16. A connection point in a network.
  17. Rules about what is morally right or wrong.
  18. A set of connected computer components.
  19. Use of technology to perform tasks without human input.
  20. Unauthorized entry into a system.
  21. Monitoring to make sure rules are followed.
  22. A request for information from a database.
  23. A user identity in a system.
Down
  1. A tool used to explore or test a system.
  2. Official rule made by authorities.
  3. The path data takes to reach a destination.
  4. Protection against threats or attacks.
  5. A specific area or internet address space.
  6. A system on which applications can run.
  7. Measurements used to evaluate performance.
  8. Instructions written for computers.
  9. The ability to manage or direct something.
  10. Programs used by a computer.
  11. A part of a larger software system.
  12. The chance that something bad may happen.
  13. A risk or danger.
  14. Converting information into a secure code.
  15. A secret code to access a system.
  16. Related to investigating cyber incidents.
  17. Numerical information used for analysis.
  18. A sign that danger or problems may occur.
  19. Information sent from one place to another.
  20. Belief that someone or something is reliable.
  21. Studying information to understand it.
  22. An action taken after an incident.
  23. Related to money or cost.
  24. Something unusual that may signal a problem.
  25. A break in security where data is exposed.
  26. A simplified digital structure used to predict or analyze.
  27. Continuous flow of data.
  28. A written record of actions or events
  29. A person or system chosen for attack.

52 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A formal rule or guideline.A place where data is kept.Programs used by a computer.A user identity in a system.A call for data or a service.Records of system activities.Learning skills or knowledge.The way a system or user acts.To protect from harm or attacks....

SN33003FP Chapter 6 2024-07-06

SN33003FP Chapter 6 crossword puzzle
Across
  1. Reduces the severity of the loss or the likelihood of the loss from occurring
  2. Prevent a disaster from occurring
  3. The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
  4. Gets critical systems to another location while repair of the original facility is under way
  5. Avoiding complex solutions that users cannot understand or troubleshoot
  6. Ability to maintain availability during disruptive events
  7. Restricting access so that users only have the level of access required to do their job
  8. It is critical to keep an organization functioning when a disaster occurs
  9. Manages a complete inventory of hardware and software
  10. Discover the incident
  11. Plan for potential incidents
Down
  1. Creating a barrier of multiple defences to prevent attacks
  2. Identifies specific hardware and software products that the organization uses and supports
  3. Breaching one layer of security does not compromise the whole system
  4. Discover unwanted events
  5. Investigate the cause of the incident and ask questions to better understand the nature of the threat
  6. Analyzes the dangers posed by natural and human-caused events to the assets of an organization
  7. Enhances system reliability and availability by distributing them across multiple physical locations
  8. Manages a full inventory of hardware and software components that are vulnerable to security risks
  9. Network protocol that provides for redundancy
  10. Concealing certain types of information to make it more difficult for cyber criminals to attack a system
  11. The set of procedures that an organization follows after an event occurs outside the normal range
  12. Assigns all resources into a group based on common characteristics
  13. Restore the system after a disaster
  14. Minimizes risk by staying ahead of cybercriminals
  15. Ensures system availability in the event of a component failure
  16. Combines multiple physical hard drives into a single logical unit
  17. A group of servers that act like a single system
  18. Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
  19. Enables a system to continue operating if one or more components fail
  20. 99.999% uptime, less than 5.26 minutes downtime yearly

31 Clues: Discover the incidentDiscover unwanted eventsPlan for potential incidentsPrevent a disaster from occurringRestore the system after a disasterNetwork protocol that provides for redundancyA group of servers that act like a single systemMinimizes risk by staying ahead of cybercriminalsManages a complete inventory of hardware and software...

ICS- Review 1 2025-11-03

ICS- Review 1 crossword puzzle
Across
  1. a criminal tactic using scam emails, texts, or calls to trick people into clicking malicious links, downloading malware, revealing sensitive information like passwords or financial details, or transferring money
  2. the design of this malware is to hold a computer system or the data it contains captive until it makes a payment, usually encrypts your information so you can't access it.
  3. You should also use this encrypted service to prevent others from intercepting your information over a public wireless network.
  4. will log the detection and create an alert for a network administrator. It will not take action.
  5. can block or deny traffic based on a positive rule or signature match.
  6. (4,2,3) when a user is accessing data.
  7. (4,2,6) when data is traveling through the network.
  8. (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
  9. (4,10) is the formal process of continuously identifying and assessing risk to reduce the impact of threats and vulnerabilities.
  10. (9,8) where you could backup or copy all your data to i.e. a NAS, or an external hard drive
Down
  1. (6-2-7) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some interruption of network service to users, devices, or applications.
  2. (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
  3. is a computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its code. Usually require end-user interaction to initiate activation and can act on a specific date or time.
  4. a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
  5. (4,2,7) the financial impact of a security breach can
  6. (4,2,4) when data is stored in a computer network or device.
  7. may prevent the loss of irreplaceable data.
  8. (6,11)is manipulating people into performing actions or divulging confidential information.
  9. can have sophisticated security policies applied to the traffic passing through them. Can look deeper into the network traffic to block malicious behaviour.
  10. a type of data breach where the goal is to take sensitive personal data.

20 Clues: (4,2,3) when a user is accessing data.may prevent the loss of irreplaceable data.(4,2,6) when data is traveling through the network.(4,2,7) the financial impact of a security breach can(4,2,4) when data is stored in a computer network or device.can block or deny traffic based on a positive rule or signature match....

Cyber Week Crossword 2024-12-04

Cyber Week Crossword crossword puzzle
Across
  1. what you earn in awardco
  2. where you find all the info
  3. your director
  4. cyber _____
  5. where you request reimbursement
  6. something to use when it's cold
  7. one of our team states
Down
  1. a discount on an item
  2. place your bids here
  3. long wait time
  4. ____ Emily Donaldson
  5. the other team state
  6. _____ Friday
  7. email server

14 Clues: cyber __________ Fridayemail serveryour directorlong wait timeplace your bids here____ Emily Donaldsonthe other team statea discount on an itemone of our team stateswhat you earn in awardcowhere you find all the infowhere you request reimbursementsomething to use when it's cold

Information Technology Pathways 2022-02-16

Information Technology Pathways crossword puzzle
Across
  1. Certificates - _____ Specialist
  2. Associate - _____security
  3. Short-Term _____ Certificates (<30 credits)
  4. Certificates - _____ Information Systems
  5. Associates - _____ Development
  6. Short-term - Software _____
Down
  1. _____ Degrees (60-65 credits)
  2. Short-term - _____ Media Management
  3. Associates - Web _____
  4. - Certificates - _____ Systems

10 Clues: Associates - Web _____Associate - _____securityShort-term - Software __________ Degrees (60-65 credits)- Certificates - _____ SystemsAssociates - _____ DevelopmentCertificates - _____ SpecialistShort-term - _____ Media ManagementCertificates - _____ Information SystemsShort-Term _____ Certificates (<30 credits)

Information Technology Pathways 2022-02-16

Information Technology Pathways crossword puzzle
Across
  1. Certificates - _____ Specialist
  2. Associate - _____security
  3. Short-Term _____ Certificates (<30 credits)
  4. Certificates - _____ Information Systems
  5. Associates - _____ Development
  6. Short-term - Software _____
Down
  1. _____ Degrees (60-65 credits)
  2. Short-term - _____ Media Management
  3. Associates - Web _____
  4. - Certificates - _____ Systems

10 Clues: Associates - Web _____Associate - _____securityShort-term - Software __________ Degrees (60-65 credits)- Certificates - _____ SystemsAssociates - _____ DevelopmentCertificates - _____ SpecialistShort-term - _____ Media ManagementCertificates - _____ Information SystemsShort-Term _____ Certificates (<30 credits)

MARVEL Cloud Computing and Cyber Security Domain 2022-02-24

MARVEL Cloud Computing and Cyber Security Domain crossword puzzle
Across
  1. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
  2. unique name by performing a wide variety of automated tasks on behalf of their master
  3. a Deployment Model which is a combination of a Private and a Public Cloud
  4. what does the P stand for in PaaS
  5. The Cloud Platform that CNA Hardy have chosen
Down
  1. Hash me D8578edf8458ce06fbc5bb76a58c5ca4
  2. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  4. a method, often secret, of bypassing normal authentication in a product
  5. I am a database design which enables the storage and querying of data outside the traditional structures found in relational databases.
  6. Encrypt the word alphabet using a Caesar cipher with a shift of 3

11 Clues: what does the P stand for in PaaSHash me D8578edf8458ce06fbc5bb76a58c5ca4The Cloud Platform that CNA Hardy have chosenEncrypt the word alphabet using a Caesar cipher with a shift of 3a method, often secret, of bypassing normal authentication in a producta Deployment Model which is a combination of a Private and a Public Cloud...

cyber security crossword (designed by:the awesome Xiaoyu) 2015-12-31

cyber security crossword (designed by:the awesome Xiaoyu) crossword puzzle
Across
  1. The process of translating plaintext into ciphertext
  2. the process of attempting to acquire sensitive information used for identity theft
  3. software that records everything you type, then sends it off to whomever installed the software.
  4. an adjective to describe your professor Xiaoyu
  5. software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
Down
  1. a network based on TCP/ICP protocols (an internet) belonging to an organization
  2. to choose options in order to create a custom system
  3. software installed on a network of computers without the owner’s knowledge
  4. A capability to limit network traffic between networks and/or information systems
  5. A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
  6. a bridge between two computer networks

11 Clues: a bridge between two computer networksan adjective to describe your professor Xiaoyuto choose options in order to create a custom systemThe process of translating plaintext into ciphertextsoftware installed on a network of computers without the owner’s knowledgea network based on TCP/ICP protocols (an internet) belonging to an organization...

The Capuanos 2025-09-26

The Capuanos crossword puzzle
Across
  1. Honeymoon location
  2. Giannis car
  3. Their first pet
  4. Bachelors
  5. Carols ideal vacation
Down
  1. Carol is a mega…
  2. Gianni’s football team
  3. Gianni’s ideal vacation
  4. Bachelorette

9 Clues: BachelorsGiannis carBacheloretteTheir first petCarol is a mega…Honeymoon locationCarols ideal vacationGianni’s football teamGianni’s ideal vacation

The Capuanos Trivia 2025-09-26

The Capuanos Trivia crossword puzzle
Across
  1. Honeymoon location
  2. Giannis car
  3. Their first pet
  4. Bachelors
  5. Carols ideal vacation
Down
  1. Carol is a mega…
  2. Gianni’s football team
  3. Gianni’s ideal vacation
  4. Bachelorette

9 Clues: BachelorsGiannis carBacheloretteTheir first petCarol is a mega…Honeymoon locationCarols ideal vacationGianni’s football teamGianni’s ideal vacation

Danica's puzzle 2023-11-27

Danica's puzzle crossword puzzle
Across
  1. A computer that is suitable for use while travelling.
  2. type of online fraud where a cyber criminal designs a fake
  3. the hardware in a computing device where the operating system
  4. a place where u can store pictures and files and other things and u can loge into the cloud from anywhere and see all your stuff
  5. text files with small pieces of data like a username and password that are used to identify your computer as you use a network.
  6. a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
  7. is a common interface that enables communication between devices and a host controller such as a personal computer
  8. a electronic device with a screen which puts out pixels
  9. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
  10. It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
  11. System It manages the computer's memory and processes
  12. video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
  13. It brings you to a certain website or page, the address.
Down
  1. performs many of the same functions as a computer,typically having a touch screen, internet access, and a operating system capable of running download applications.
  2. a peripheral device that enables a user to input text into a computer or any other electronic machinery.
  3. information that is easy to access which can include management, updating computer databases usually collect aggreations of data, records.
  4. a generic term used to refer to applications, scripts and programs that run on a device.
  5. global network of billions of computers and other electronic devices
  6. a personal computer designed to be used on a desk or table the opposite of portable computers like laptops or tablets
  7. web-centric laptops that run Google's Chrome operating system
  8. an application for accessing websites and the Internet.
  9. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  10. a wireless connection that connects you to the internet through radio waves

23 Clues: A computer that is suitable for use while travelling.System It manages the computer's memory and processesa electronic device with a screen which puts out pixelsan application for accessing websites and the Internet.It brings you to a certain website or page, the address.type of online fraud where a cyber criminal designs a fake...

Crossword 2023-08-29

Crossword crossword puzzle
Across
  1. A networking device that connects various networks, directs data packets, and facilitates communication between devices within the same network and across the internet.
  2. The maximum amount of data transmitted over a network or communication channel in each period, measured in bps or multiples, enabling faster data transfer.
  3. A small data unit that transmits information over a network, breaking down larger pieces into manageable chunks for efficient and reliable transmission.
  4. A security device or software monitors and controls network traffic based on predefined rules, safeguarding networks and devices from unauthorized access and cyber threats.
  5. Type of coaxial technology that utilizes digital signaling, allowing the cable to carry only one channel of digital data.
  6. A set of rules and conventions that govern the exchange and communication of data between devices within a network.
  7. The OSI layer responsible for data compression.
  8. A powerful computer that stores, delivers, and manages data, applications, or services to clients over a network, serving various purposes.
Down
  1. The decrease in the strength or intensity of a signal as it travels through a medium or over a distance.
  2. This process converts URLs into IP addresses, enabling other devices to locate and access websites and other internet resources (Acronym).
  3. A device that converts digital data from computers into analog signals for transmission over communication lines like phone lines or cable systems.
  4. A basic network device that connects multiple devices within a local area network (LAN) and broadcasts data, but lacks intelligent data traffic management.
  5. The arrangement of devices, connections, and components in a computer network.
  6. Signals that represent information using binary and have non-continuous wave forms.
  7. A network that connects devices within a limited geographical area (Acronym).
  8. Connections that provide high-speed internet access with diverse frequencies, enabling faster data transfer.
  9. A secure tunnel that hides your internet connection's location, ensuring privacy and security, particularly when using public Wi-Fi or browsing websites (Acronym).
  10. A device which functions as a traffic controller in a network, directing data only to the appropriate device rather than broadcasting it to all devices.
  11. An interconnection of devices, that facilitate data exchange and collaboration through communication and resource sharing.
  12. The Cloud Service model that provides basic configuration options (Acronym).

20 Clues: The OSI layer responsible for data compression.The Cloud Service model that provides basic configuration options (Acronym).A network that connects devices within a limited geographical area (Acronym).The arrangement of devices, connections, and components in a computer network....

Cyber Security Awareness (3) 2024-10-15

Cyber Security Awareness (3) crossword puzzle
Across
  1. Probability of a cyberattack or data breach causing loss or exposure to an organization
  2. Software or code that cybercriminals use to damage or disrupt devices, steal data, or gain unauthorized access
  3. practice of protecting systems, networks, and programs from digital attacks
Down
  1. Text files that contain small amounts of data about a user that can be used for both good and bad purposes
  2. malicious program that can spread to a computer or network router without the user's knowledge or permission

5 Clues: practice of protecting systems, networks, and programs from digital attacksProbability of a cyberattack or data breach causing loss or exposure to an organizationText files that contain small amounts of data about a user that can be used for both good and bad purposes...

Crime - Crossword 2025-01-06

Crime - Crossword crossword puzzle
Across
  1. moral panics and deviance amplificaiton
  2. inadequate socialisation leads to crime
  3. biosocial approach to crime
  4. marijuana study
  5. shaming
  6. the negotiation of justice
Down
  1. societal and situational deviance
  2. rational choice theory
  3. primary and secondary deviance
  4. imitation of crime
  5. the criminal career
  6. cyber crime

12 Clues: shamingcyber crimemarijuana studyimitation of crimethe criminal careerrational choice theorythe negotiation of justicebiosocial approach to crimeprimary and secondary deviancesocietal and situational deviancemoral panics and deviance amplificaitoninadequate socialisation leads to crime

Cyber Treasure Hunt 2014-02-05

Cyber Treasure Hunt crossword puzzle
Across
  1. When is the Annual Shareholders Meeting?
  2. Currently, are there any job openings at Choice Bank?
  3. On the Community Page, what organization hosts the AirVenture?
  4. What month was the Target Card scam revealed to the public?
  5. For Premier Classic Checking, one receives _____ checks for life!
  6. What is the App Code for Online Banking?
  7. Choice Bank opened in what month?
  8. What officer grew up on a farm and enjoys caring for her horses?
  9. What is the Mobile App called?
  10. The mortgage resource glossary defines ____ as the local government's specifications for the use of property in certain areas.
  11. In what month are the Choice Holiday Club checks issued?
Down
  1. He said it first, "The only real saver is a regular saver"
  2. What page does the hyperlink "Choice Bankcorp, Inc. Press Releases" take you to?
  3. Small Business Premier (sole proprietor) is an ___ bearing account.
  4. For Choice Premier Checking, it has a _____ interest rate
  5. For the Press Release in February 2013, who received a WBA Scholarship?
  6. Choice Young Savers accounts have no minimum ____.
  7. What is the Choice Bankcorp, Inc. symbol that is traded and listed Over the Counter?
  8. What Online and Mobile banking feature allows you to pay other people within a set time frame for a small fee?
  9. For Business Money Market, one has ___ withdrawls.
  10. For a 30-year fixed mortgage rate, it is ___.25%
  11. In order to receive an account balance through text banking, what must a customer text?
  12. Who is the Director and Chairman of the Board?

23 Clues: What is the Mobile App called?Choice Bank opened in what month?When is the Annual Shareholders Meeting?What is the App Code for Online Banking?Who is the Director and Chairman of the Board?For a 30-year fixed mortgage rate, it is ___.25%Choice Young Savers accounts have no minimum ____.For Business Money Market, one has ___ withdrawls....

Cyber Treasure Hunt 2014-02-12

Cyber Treasure Hunt crossword puzzle
Across
  1. On the Community Page, what organization hosts the AirVenture?
  2. Choice Bank opened in what month?
  3. What is the App Code required to access Choice Bank's Mobile Banking?
  4. Mobile App, Mobile Browser and ____ Banking are all services provided in Choice Bank's Mobile Banking.
  5. The ___ feature in our mortgage online services will send the customers emails when rates reach a requested level, or we can email customers rate information on a regular basis.
  6. For the Business Online Banking services, ACH ___ transfer is useful for companies processing direct deposit for payroll
  7. What is Choice Bank's Mobile App called as found in the App Store or Google Play?
  8. The ____ Checking requires a $100 opening deposit, offers No minimum balance requirement, unlimited check writing, ATM/Debit cards, and Easy e-Banking
  9. What month was the Target Card scam revealed to the public?
  10. ___ Business Onine Banking includes all of the Basic services, plus the ability to have multiple company users, ACH services, or Desktop Deposit Services
  11. Choice Young Savers accounts have no minimum ___.
  12. He said it first, "the only real saver is a regular saver"
  13. The Security ___ provides Internet safety and password tips, information to help victims of identity theft, and details regarding various scams or alerts.
  14. For the Press Release in February 2013, who recieved a WBA Scholarship?
  15. The ___ Deposit Capture Service allows business customers the ability to scan their own deposits directly from their workplace. Image files are sent to the bank for deposit into their business checking account
  16. The designated number for Text Banking to receive balance and history information is 99__88
  17. As of 2/10/14, the 30-year fixed mortgage rate is __.25%
  18. The number of job postings Choice Bank is currenty promoting
Down
  1. What officer grew up on a farm and enjoys caring for her horses?
  2. The website _____.com is the site that you are directed to when you want to review activity for your Choice Bank Credit Card
  3. For Choice Premier Checking, it has a ____ interest rate.
  4. Choice Bank upholds the Community Bank Advantage:___ decisions, ___ commitment, and ___ investments--all the "blank spaces" are the same word!
  5. When is the Annual Shareholders Meeting?
  6. In what month are the Choice Holiday Club checks issued?
  7. Small Business Premier (sole proprietor) Checking is an ___ bearing account.
  8. The mortgage resource glossary defines ___ as the local government's specifications for the use of property in certain areas.
  9. Who is the Director and Chairman of the Board?
  10. For Business Money Market, one has ___ withdrawls.
  11. What is the Choice Bancorp, Inc. symbol that is traded and listed Over the Counter?
  12. In order to receive an account balance through text banking, what must a customer text?
  13. The 24-hour Telebanking phone number is 1-877-__03-1300
  14. For Premier Classic Checking, one receives ___ Specialty-Mint wallet-sizechecks for life!

32 Clues: Choice Bank opened in what month?When is the Annual Shareholders Meeting?Who is the Director and Chairman of the Board?Choice Young Savers accounts have no minimum ___.For Business Money Market, one has ___ withdrawls.The 24-hour Telebanking phone number is 1-877-__03-1300In what month are the Choice Holiday Club checks issued?...

Cyber Safety-Georgia 2016-05-25

Cyber Safety-Georgia crossword puzzle
Across
  1. proof that something is unsafe online
  2. an example of social media
  3. people try offend you online
  4. don't expect emails from them
  5. don't listen to them
  6. to keep you safe online
  7. something you should not give to people
  8. place on the internet
  9. media staying in touch online
Down
  1. check with them first
  2. block your computer
  3. keep your account private
  4. talk online
  5. don't give people it
  6. mail online
  7. World Wide Web
  8. sending someone information
  9. being on the internet
  10. don't open them
  11. Can effect your computer

20 Clues: talk onlinemail onlineWorld Wide Webdon't open themblock your computerdon't give people itdon't listen to themcheck with them firstbeing on the internetplace on the internetto keep you safe onlineCan effect your computerkeep your account privatean example of social mediasending someone informationpeople try offend you online...

Cyber safety Steph 2016-05-25

Cyber safety      Steph crossword puzzle
Across
  1. Follow people you know .
  2. When something is wrong with the computer.
  3. Tell someone if your computer is sick.
  4. Don't talk to people you don't know online .
  5. Take care. Make sure you check it first .
  6. Don't tell people this
  7. Don't open if it's not yours .
  8. Watch appropriate videos .
  9. Ask to get a game on computers .
Down
  1. Be careful where you search takes you
  2. Don't tease people online
  3. Block viruses
  4. don't give too much away
  5. Listen to it
  6. Don't talk to people you don't have.
  7. Before you get a game.
  8. time Limit it
  9. Don't trust these as they can trick you
  10. An electronic Apple
  11. Don't drop them
  12. Annoying email messages

21 Clues: Listen to itBlock virusesDon't drop themAn electronic Appletime Limit itBefore you get a game.Don't tell people thisAnnoying email messagesdon't give too much awayFollow people you know .Don't tease people onlineWatch appropriate videos .Don't open if it's not yours .Ask to get a game on computers .Don't talk to people you don't have....

Cyber IWD Crossword 2025-03-06

Cyber IWD Crossword crossword puzzle
Across
  1. The official theme announced by UN Women Australia for International Women’s Day (IWD) 2025
  2. This number makes up the percentage of women in the cybersecurity workforce in Australia.
  3. The interview series by PwC’s She’s Here in Cyber and Technology program is called “She’s Here to____”.
  4. Gender _______; a key focus on closing the gap in opportunities.
  5. The woman who created the first computer program.
  6. Australia’s first International Women’s Day was held in 1928 in _____.
  7. Symbolic color often associated with women's rights.
  8. UN Sustainable Development Goal to achieve gender equality and empower all women and girls. (including the number)
  9. Australia's first female Prime Minister.
  10. Beatrice Page's parents think she can help them with issues with _______ because she works in Cyber and Privacy.
  11. The person in C&P team has two birds called Roki and Pipin.
Down
  1. PwC’s network focused on gender equality.
  2. The person in C&P team was born in Macedonia in Europe.
  3. The country where the idea of International Women’s Day was initiated.
  4. Natalie Mu played _____ gaming console as a child.
  5. The person in C&P team has hiked the Annapurna Circuit in Nepal.
  6. The person in C&P team has small disco lights at home and often will have a "dance off" on Friday afternoons with her kids to get into the mood for the weekend and celebrate the work week being done.
  7. Year 190_ women got the vote in Australia through The Commonwealth Franchise Act.
  8. International Women's Day's primary goal is to create this for women globally.
  9. The month International Women's Day is celebrated.

20 Clues: Australia's first female Prime Minister.PwC’s network focused on gender equality.The woman who created the first computer program.Natalie Mu played _____ gaming console as a child.The month International Women's Day is celebrated.Symbolic color often associated with women's rights.The person in C&P team was born in Macedonia in Europe....

Cyber Cross puzzle 2025-03-12

Cyber Cross puzzle crossword puzzle
Across
  1. Malware disguised as legitimate.
  2. BONUS: THIS IS THE PASSCODE FOR THE ANSWERS. Don't use "x" for your x.
  3. Records keystrokes secretly.
  4. Demands payment to unlock data.
  5. Code injection attack.
  6. Exploit unknown to developers.
  7. Monitors and controls network traffic.
  8. Malware that hides its presence.
  9. Network of infected computers.
  10. Secure private network connection.
  11. Software designed to harm.
Down
  1. Software to detect and remove malware.
  2. Overwhelms server with traffic.
  3. Systematic password guessing.
  4. Hidden access to a system.
  5. Software update to fix vulnerabilities.
  6. Converts data into code.
  7. Authentication: Adds extra security layer.
  8. Manipulating people for info.
  9. Malware that spies on users.

20 Clues: Code injection attack.Converts data into code.Hidden access to a system.Software designed to harm.Records keystrokes secretly.Malware that spies on users.Systematic password guessing.Manipulating people for info.Exploit unknown to developers.Network of infected computers.Overwhelms server with traffic.Demands payment to unlock data....

Block 6 Cyber Chapter 2 2020-08-10

Block 6 Cyber Chapter 2 crossword puzzle
Across
  1. the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
  2. malicious logic that is inserted into an executable file to be triggered at a later time
  3. a technology that tracks and records key strokes hoping to get sensitive information like usernames and passwords
  4. an infiltration software that secretly monitors unsuspecting users
  5. associated with individuals using hacking skills within the law to conduct security assessments and help find vulnerabilities
  6. self-contained malware that has the ability to copy itself without parasitically infecting the host code
  7. an individual that utilizes cyber training to hack for the government or an ally
Down
  1. a means and method used by hackers to retain access to a system or network
  2. an attempt to fraudulently acquire sensitive information such as user’s name, passwords, or credit card information by pretending to be a trustworthy entity in an electronic communication
  3. an attack on a computer that exposes an undiscovered or unpatched vulnerability
  4. the action taken by a nation-state or international organization to use and/or target computers and networks to achieve military objectives
  5. free computer software that contains advertisements

12 Clues: free computer software that contains advertisementsan infiltration software that secretly monitors unsuspecting usersa means and method used by hackers to retain access to a system or networkan attack on a computer that exposes an undiscovered or unpatched vulnerabilityan individual that utilizes cyber training to hack for the government or an ally...

Got LAB!!! 2024-08-24

Got LAB!!! crossword puzzle
Across
  1. Used all day by all of us
  2. do between each patient
  3. Another name for HealthConnect
  4. Where blueman is located
  5. Needs to clot to test
  6. Separates with fast rpm
  7. Attaches to the needles
  8. Changes between patients
Down
  1. 5 min interactions
  2. Sometimes one, sometimes 3 sets
  3. Taught to you as a child
  4. Proper order
  5. Cyber attack
  6. Number system in MOB
  7. Filled with blood
  8. 21,23, 25
  9. Highly emphasized by your employer
  10. Wrap it up
  11. Still contains clot activator

19 Clues: 21,23, 25Wrap it upProper orderCyber attackFilled with blood5 min interactionsNumber system in MOBNeeds to clot to testdo between each patientSeparates with fast rpmAttaches to the needlesTaught to you as a childWhere blueman is locatedChanges between patientsUsed all day by all of usStill contains clot activatorAnother name for HealthConnect...

vis a vis 2019-02-18

vis a vis crossword puzzle
Across
  1. the villain who calls her the queen dwells
  2. moder of the proyagonist
  3. they call her the gypsy
  4. protagonist blond hair
  5. the trafficker
  6. friend of the ex policeman
  7. director of the prison
Down
  1. security guard murdered
  2. yonki girl
  3. the one thtat dies in the first chapter
  4. husband of the security guard
  5. the one thtat burned her husband
  6. ex gilfrend of the blak gypsy
  7. fader of the potagonist
  8. security guard who was a policeman

15 Clues: yonki girlthe traffickerprotagonist blond hairdirector of the prisonsecurity guard murderedthey call her the gypsyfader of the potagonistmoder of the proyagonistfriend of the ex policemanhusband of the security guardex gilfrend of the blak gypsythe one thtat burned her husbandsecurity guard who was a policemanthe one thtat dies in the first chapter...

Domain 1: Security and Risk Management 2025-03-13

Domain 1: Security and Risk Management crossword puzzle
Across
  1. - Meeting legal security standards.
  2. - Review ensuring regulatory adherence.
  3. - Plan to maintain operations.
  4. - Technique to identify potential threats.
Down
  1. - Structured set of security measures.
  2. - Process to handle breaches.
  3. - Formal document outlining security rules.
  4. - Core principles of security goals.
  5. - Process to identify and evaluate risks.
  6. - Code of conduct for security pros.

10 Clues: - Process to handle breaches.- Plan to maintain operations.- Meeting legal security standards.- Core principles of security goals.- Code of conduct for security pros.- Structured set of security measures.- Review ensuring regulatory adherence.- Process to identify and evaluate risks.- Technique to identify potential threats....

ICT year 7 keywords 2012-03-20

ICT year 7 keywords crossword puzzle
Across
  1. search searching a specific keyword
  2. a form of database
  3. to sort or categorize
  4. to search
  5. mail over the internet
  6. use policy aup
  7. an online folder
  8. an answer
  9. trustworthy
  10. statistics
  11. a question or inquiry
Down
  1. important or to the subject
  2. a form of chart for Data
  3. an online dictionary
  4. bulling electronically
  5. a way of showing results
  6. proof of some sort
  7. a type of questionnaire
  8. information to go into a database

19 Clues: to searchan answerstatisticstrustworthyuse policy aupan online foldera form of databaseproof of some sortan online dictionaryto sort or categorizea question or inquirymail over the internetbulling electronicallya type of questionnairea form of chart for Dataa way of showing resultsimportant or to the subjectinformation to go into a database...

security technology 2014-07-07

security technology crossword puzzle
Across
  1. linklayer
  2. trusted key distribution
  3. breakingencryption scheme
  4. bigger risk
  5. cryptography
  6. someone reads your mail
  7. someone intercepts your mail and modify
  8. application layer
  9. virtual private network
Down
  1. transport control protocol
  2. internet layer
  3. filtering system
  4. transport layer
  5. send mail and sign your name

14 Clues: linklayerbigger riskcryptographyinternet layertransport layerfiltering systemapplication layersomeone reads your mailvirtual private networktrusted key distributionbreakingencryption schemetransport control protocolsend mail and sign your namesomeone intercepts your mail and modify

Security Training 2021-12-14

Security Training crossword puzzle
Across
  1. Would your bank loan on a car that is 12 years old?
  2. Store Emergency Response Plan can be found in what binder?
  3. This is located at each desk and teller window
  4. One way to deter robber
  5. Located behind teller row and night drop safe
  6. In the event of a robbery, who do we call?
  7. Building #2501 lobby
Down
  1. Secondary Evacuation Location
  2. House placed in window at front of the building
  3. Amount you are allowed to have in top drawer
  4. Our ____ is most important while at work
  5. What is this number, 877-511-9797?
  6. Interior Lockdown Location
  7. In the event of a robbery, bomb threat, hostage or kidnapping situation, we must _____.

14 Clues: Building #2501 lobbyOne way to deter robberInterior Lockdown LocationSecondary Evacuation LocationWhat is this number, 877-511-9797?Our ____ is most important while at workIn the event of a robbery, who do we call?Amount you are allowed to have in top drawerLocated behind teller row and night drop safeThis is located at each desk and teller window...

PECS SECURITY 2022-11-17

PECS SECURITY crossword puzzle
Across
  1. - CONTRACT DIRECTOR
  2. - ROLE
  3. - PROVE INNOCENCE
  4. - WHAT NEEDS TO BE DONE TO AN OFFBAILER
  5. - MOVE PRISONERS
  6. - CONTROL
  7. - LET YOU IN PLACES
  8. - LET PRISONER LEAVE
Down
  1. - MAKE OF VAN
  2. - SOMETHING HAPPENED
  3. - SECURES PRISONERS
  4. - LOCATION OF OCC
  5. - COMPANY
  6. - SENT BACK TO PRISON

14 Clues: - ROLE- COMPANY- CONTROL- MAKE OF VAN- MOVE PRISONERS- PROVE INNOCENCE- LOCATION OF OCC- CONTRACT DIRECTOR- SECURES PRISONERS- LET YOU IN PLACES- SOMETHING HAPPENED- LET PRISONER LEAVE- SENT BACK TO PRISON- WHAT NEEDS TO BE DONE TO AN OFFBAILER

Security Training 2022-12-09

Security Training crossword puzzle
Across
  1. is our alarm company
  2. plan is a proactive plan on how to maintain services during an emergency.
  3. true or false, we can discuss a robbery with the media
  4. is how often our alarms are tested
  5. the number of fire extinguishers in the branch
  6. the silent alarm when it is safe to do so
  7. is our primary meeting place
Down
  1. emails when sending out personal information
  2. is the order you fill the bag if being robbed
  3. is our secondary meeting point
  4. is the first reaction during an active shooter
  5. each member when they walk in
  6. is the color of paper used to signal the police that the branch is safe
  7. is our minimum number of tellers on the line

14 Clues: is our alarm companyis our primary meeting placeeach member when they walk inis our secondary meeting pointis how often our alarms are testedthe silent alarm when it is safe to do soemails when sending out personal informationis our minimum number of tellers on the lineis the order you fill the bag if being robbed...

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. Food from grains like wheat or rice (5 letters)
  2. A place to buy food (6 letters)
  3. Lack of food (6 letters)
  4. Machine used in farming (7 letters)
  5. Insects that help pollinate crops (4 letters)
  6. Nutritious food (4 letters)
Down
  1. Group of farm animals (4 letters)
  2. Person who grows crops (6 letters)
  3. Period with little or no rain (6 letters)
  4. Harmful insect for crops (4 letters)
  5. Food from milk (6 letters)
  6. A place where food is grown (4 letters)
  7. Natural water from the sky (4 letters)
  8. Nutritious drink from cows (4 letters)

14 Clues: Lack of food (6 letters)Food from milk (6 letters)Nutritious food (4 letters)A place to buy food (6 letters)Group of farm animals (4 letters)Person who grows crops (6 letters)Machine used in farming (7 letters)Harmful insect for crops (4 letters)Natural water from the sky (4 letters)Nutritious drink from cows (4 letters)...

Data Security 2025-12-03

Data Security crossword puzzle
Across
  1. medveten
  2. regelbundet
  3. tyvärr
  4. förbättra
  5. tecken
  6. utväljande
  7. bära på
Down
  1. utveckla
  2. bilaga
  3. värdefull
  4. lita på
  5. undvika
  6. lösenord
  7. innefatta

14 Clues: bilagatyvärrteckenlita påundvikabära påutvecklamedvetenlösenordvärdefullförbättrainnefattautväljanderegelbundet

Cyber Security Month 2021 2021-09-15

Cyber Security Month 2021 crossword puzzle
Across
  1. Social engineers use this to trick you
  2. The practice of being diligent about your online activities
Down
  1. Assurance that information is accurate and Trustworthy
  2. Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
  3. not disclosing information to unauthorized individuals

5 Clues: Social engineers use this to trick youAssurance that information is accurate and Trustworthynot disclosing information to unauthorized individualsThe practice of being diligent about your online activitiesEngineer Someone who takes information from many sources and uses them to piece together a bigger puzzle

Cyber Security Awareness (2) 2024-10-15

Cyber Security Awareness (2) crossword puzzle
Across
  1. Type of malware that downloads onto a computer disguised as a legitimate program
  2. Automated process of collecting and analyzing indicators of potential security threats, then triaging these threats with appropriate action
Down
  1. Foftware that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  2. Someone who gains access to a computer system or network without authorization
  3. Form of data security in which information is converted to ciphertext

5 Clues: Form of data security in which information is converted to ciphertextSomeone who gains access to a computer system or network without authorizationType of malware that downloads onto a computer disguised as a legitimate program...

Cyber Security Awareness (1) 2024-10-15

Cyber Security Awareness (1) crossword puzzle
Across
  1. Fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging
  2. Network security device that separates a trusted internal network from an external network deemed untrustworthy, such as the internet
Down
  1. Type of malware that prevents users from accessing their devices or files, and demands payment to restore access
  2. Ensures that only genuine, authorized users can access online accounts, keeping bad actors out
  3. A new, improved, or fixed version of software that addresses security vulnerabilities

5 Clues: A new, improved, or fixed version of software that addresses security vulnerabilitiesEnsures that only genuine, authorized users can access online accounts, keeping bad actors outType of malware that prevents users from accessing their devices or files, and demands payment to restore access...

HIPAA and FERPA InfoSec Crossword 2017-03-14

HIPAA and FERPA InfoSec Crossword crossword puzzle
Across
  1. Students are given the right to file a ___________ with the department regarding a failure to comply with FERPA.
  2. In the HIPAA Security Rule, CEs must obtain assurances via written __________ from Business Associates that they will safeguard ePHI.
  3. Educational institutions must give students the opportunity to restrict __________ of directory information.
  4. Health records maintained by a university clinic on behalf of its students are considered educational or treatment records under FERPA, and are ___________ by HIPAA.
  5. The HIPAA Security Rule consists of five safeguard and requirement categories: Administrative, Physical, Technical, _______________, and Documentation.
  6. Risk _____________ in HIPAA consists of two phases, analysis and management.
  7. HIPAA stands for Health ____________ Portability and Accountability Act.
  8. HIPAA requires that CEs to implement device and _________ controls for devices and ________ containing ePHI.
  9. All documentation related to the HIPAA Security Rule must be maintained for _____ years beyond the date of creation, or the date of last effect, whichever is later.
  10. FERPA does not require educational institutions to provide _____________ of unauthorized disclosure of educational records.
  11. Directory information, disclosure of which is allowed by FERPA without consent, includes: name, __________, phone number, date and place of birth, honors and awards, and dates of attendance.
  12. _______ Controls are mechanisms that record and examine activity in information systems containing ePHI, and are required by the HIPAA Security Rule.
  13. FERPA stands for ________ Educational Rights and Privacy Act.
  14. FERPA requires educational institutions to notify parents or eligible students of their rights at least __________.
Down
  1. The HIPAA _________ Rule sets limits and conditions on the use and disclosure of PHI.
  2. Under FERPA, students have the right to seek ____________ of educational records they believe to be inaccurate.
  3. Parental rights under FERPA stop once the student enters post-secondary education OR turns _________ years old.
  4. Patient __________ must be obtained before the disclosure of PHI.
  5. The HIPAA Security Rule requires _________ user identification, and establishing emergency access procedures.
  6. All policies, procedures, actions, activities, and assessments related to the HIPAA Security Rule must be maintained in written or electronic _______________.
  7. ____________ is the process of positively-identifying a user, usually through a username and password.
  8. The HIPAA _________ Rule requires appropriate administrative, physical, and technical safeguards to ensure the CIA of ePHI.
  9. The HIPAA Security Rule Administrative Standard includes training requirements on __________ management, login procedures, and malware.
  10. Covered Entities are required by HIPAA to implement ____________ and appropriate policies and procedures to comply with the standards.
  11. The primary method to ensure the confidentiality of ePHI both in motion and at rest is by using ____________.
  12. A _________ Entity is an organization to which HIPAA applies.

26 Clues: A _________ Entity is an organization to which HIPAA applies.FERPA stands for ________ Educational Rights and Privacy Act.Patient __________ must be obtained before the disclosure of PHI.HIPAA stands for Health ____________ Portability and Accountability Act.Risk _____________ in HIPAA consists of two phases, analysis and management....

Cyber Safety-Georgia 2016-05-25

Cyber Safety-Georgia crossword puzzle
Across
  1. proof that something is unsafe online
  2. an example of social media
  3. people try offend you online
  4. don't expect emails from them
  5. don't listen to them
  6. to keep you safe online
  7. something you should not give to people
  8. place on the internet
  9. media staying in touch online
Down
  1. check with them first
  2. block your computer
  3. keep your account private
  4. talk online
  5. don't give people it
  6. mail online
  7. World Wide Web
  8. sending someone information
  9. being on the internet
  10. don't open them
  11. Can effect your computer

20 Clues: talk onlinemail onlineWorld Wide Webdon't open themblock your computerdon't give people itdon't listen to themcheck with them firstbeing on the internetplace on the internetto keep you safe onlineCan effect your computerkeep your account privatean example of social mediasending someone informationpeople try offend you online...

Cyber safety,max 2016-05-31

Cyber safety,max crossword puzzle
Across
  1. computer loading apps with out you realising.
  2. calling calling you rude words
  3. info on you or others .
  4. to spread lies or the truth
  5. annoying and teasing you .
  6. a program used to detect ,prevent and remove virus's on mobile devices to stop getting virus on your apps.
  7. it means someone shows you a violence video.
  8. to stalk people online.
  9. is when you feel bad and sad and down .
  10. email someone who lies to you online.
  11. someone who cheats or be mean online .
Down
  1. Encouraging it means that someone will try to make you watch or read bad stuff.
  2. rude words to you online.
  3. it's about who you are and were you live.
  4. law its like a law on the internet.
  5. crimepeople who hack
  6. it's where you type down numbers and letters.
  7. Predator a mean person online .
  8. it's used to go on online stuff.
  9. A brief sentence of you
  10. it means you get a sad feeling in your stomach from a mean message .
  11. it's about you and stuff and people.
  12. its where someone gets set up on the electronics and the person who is scaming gets there info online.

23 Clues: crimepeople who hackinfo on you or others .A brief sentence of youto stalk people online.rude words to you online.annoying and teasing you .to spread lies or the truthcalling calling you rude wordsPredator a mean person online .it's used to go on online stuff.law its like a law on the internet.it's about you and stuff and people....

Cyber ethics Crossword 2025-05-22

Cyber ethics Crossword crossword puzzle
Across
  1. - Unauthorized use or reproduction of software.
  2. - Software that secretly gathers user information.
  3. - Permission to do something, especially online.
  4. - The right to keep personal data safe from unauthorized access.
  5. - A secret string of characters used for authentication.
  6. - Harmful software designed to damage or disrupt systems.
  7. - Unauthorized access to or control over a computer system.
  8. - Informing authorities about suspicious or harmful online behavior.
  9. - The state of being anonymous online.
  10. Footprint - The trail of data left by digital activity.
Down
  1. - A network security device that monitors and filters traffic.
  2. - Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  3. - A program that detects and removes malware.
  4. - Rules users must agree to when using digital services.
  5. - A dishonest scheme or fraud online.
  6. - Bullying that takes place over digital devices.
  7. - Moral principles that govern behavior.
  8. - Legal right that grants the creator exclusive use of their work.
  9. - The process of converting data into a secure format.
  10. - Posting inflammatory content online to provoke others.

20 Clues: - A dishonest scheme or fraud online.- The state of being anonymous online.- Moral principles that govern behavior.- A program that detects and removes malware.- Unauthorized use or reproduction of software.- Permission to do something, especially online.- Bullying that takes place over digital devices....

Networking & Cyber Ethics 2025-05-22

Networking & Cyber Ethics crossword puzzle
Across
  1. Using digital platforms to harass others.
  2. Someone who gains unauthorized access to data.
  3. A computer that provides data to other computers.
  4. Moral principles guiding online behavior.
  5. Device that connects your home to the Internet.
  6. Footprint The trail of data left behind by online activity.
  7. Wide Area Network, larger than LAN.
  8. Software that protects against malicious programs.
  9. Local Area Network, usually within a building.
  10. Storing data on remote servers accessed via the Internet.
Down
  1. Fraudulent attempt to get sensitive information.
  2. Software designed to harm a computer.
  3. A device that forwards data packets between networks.
  4. A set of rules for data communication.
  5. A global network connecting millions of computers.
  6. Security system that monitors and controls incoming and outgoing traffic.
  7. A computer that receives data from a server.
  8. Address A unique number assigned to a device on a network.
  9. Secret code used for authentication.
  10. Virtual Private Network provides secure Internet access.

20 Clues: Wide Area Network, larger than LAN.Secret code used for authentication.Software designed to harm a computer.A set of rules for data communication.Using digital platforms to harass others.Moral principles guiding online behavior.A computer that receives data from a server.Someone who gains unauthorized access to data....

Ancaman, Tantangan, Hambatan dan Gangguan terhadap Integrasi Nasional 2025-05-05

Ancaman, Tantangan, Hambatan dan Gangguan terhadap Integrasi Nasional crossword puzzle
Across
  1. solusi menghadapi ATHG
  2. ancaman dari luar
  3. usaha yang membahayakan kedaulatan negara
  4. hambatan integrasi nasional
  5. proses membentuk suatu keseluruhan
  6. faktor pendorong integrasi
  7. identitas nasional
  8. ancaman di bidang ideologi
Down
  1. ancaman di bidang sosial budaya
  2. ancaman hibrida
  3. tantangan mewujudkan integrasi nasional
  4. ancaman disintegrasi
  5. ancaman dari dalam negeri
  6. ancaman di bidang ekonomi
  7. ancaman di bidang politik
  8. hal internal yang menghalangi upaya untuk mencapai tujuan
  9. meningkatkan kerjasama antar negara

17 Clues: ancaman hibridaancaman dari luaridentitas nasionalancaman disintegrasisolusi menghadapi ATHGancaman dari dalam negeriancaman di bidang ekonomiancaman di bidang politikfaktor pendorong integrasiancaman di bidang ideologihambatan integrasi nasionalancaman di bidang sosial budayaproses membentuk suatu keseluruhanmeningkatkan kerjasama antar negara...

Cyber bullying Crossword 2022-10-17

Cyber bullying Crossword crossword puzzle
Across
  1. make sure and have all your blank settings on
  2. to prevent cyberbullying from occurring you must understand exactly what it is
  3. a person who speaks and acts of an individual or cause
  4. using digital devices,sites, and apps to intimidate, harm and upset someone
  5. if you are being cyberbullied blank the person
  6. is a person who is present at an event or incident but does not take part
  7. blank when you post a picture that you don't want anyone else seen
  8. untrue rumors
  9. saying" I know where you live"
  10. out blank blank out of all your accounts
  11. in order to raise blank you need to start a movement, create a club, build a campaign, or host an event to bring awareness to cyberbullying
  12. don't cyberbully blank
  13. make sure all your accounts are on blank
  14. never open blank or unsolicited messages
  15. aggressive and vulgar things posting
  16. keep your photos blank
Down
  1. gaining info from someone you just met
  2. getting in someones account without consent
  3. including everyone in a group chat except one person
  4. do not blank it will make the situation worse
  5. to help prevent cyberbullying you could blank yourself
  6. offensive messages
  7. harassment
  8. if you are being cyberbullied blank the messages sent
  9. keep your blank private at all times
  10. posting an embarrassing pic of someone

26 Clues: harassmentuntrue rumorsoffensive messagesdon't cyberbully blankkeep your photos blanksaying" I know where you live"keep your blank private at all timesaggressive and vulgar things postinggaining info from someone you just metposting an embarrassing pic of someonemake sure all your accounts are on blanknever open blank or unsolicited messages...

Cyber Crossword (Stella) 2020-10-15

Cyber Crossword (Stella) crossword puzzle
Across
  1. Highest level or privileges can change global settings.
  2. Software that prevents, detects, and removes threats on your computer.
  3. A small window that suddenly opens
  4. A computer program that can spread by modifying other computer programs and inserting its own code.
  5. A collection of stored data and files.
  6. The primary software that runs applications and manages all the hardware.
  7. Updates that address and fix security vulnerabilities within a program or product.
  8. A copy or snapshot of the state of your computer.
  9. Android, iOS, Blackberry.
  10. Protects confidential data from attackers.
  11. Programs that only work on one type of OS.
Down
  1. Provided to secure and trustworthy sites.
  2. Graphical User Interface.
  3. What a user is allowed and not allowed to do.
  4. Keyboard/mouse/monitor.
  5. Programs that work on multiple OS.
  6. Takes up less space on your hard drive.
  7. Used to customize a browser.
  8. An intermediary between the user and the internet.
  9. A set of computer instructions that tell the computer how to work.
  10. 32-bit and 64-bit.

21 Clues: 32-bit and 64-bit.Keyboard/mouse/monitor.Graphical User Interface.Android, iOS, Blackberry.Used to customize a browser.A small window that suddenly opensPrograms that work on multiple OS.A collection of stored data and files.Takes up less space on your hard drive.Provided to secure and trustworthy sites.Protects confidential data from attackers....

Cyber Safety Irene 2016-05-30

Cyber Safety Irene crossword puzzle
Across
  1. Engine something you can search information on
  2. a program that lets you find,see and hear material on website
  3. a giant collection of networks of networks
  4. an add that automatically comes onto the screen
  5. a starting point on the web
  6. Tag the nickname a user has chosen to be identified by when playing Internet Games
  7. a security system to keep your things safe
  8. a search engine visual for parents mostly
  9. to upload information to the web
Down
  1. a bad thing that can ruin your device
  2. a website to search with
  3. a name that a user selects for you
  4. a thing you can chat on with family and friends
  5. to send information from your computer to another computer
  6. an adviser that teaches you how to use technology
  7. a secret code to open something
  8. a program,or set of instructions
  9. a method of sending short messages
  10. something you can send to others
  11. a small hand-controlled divide for pointing and clicking

20 Clues: a website to search witha starting point on the weba secret code to open somethingsomething you can send to othersto upload information to the weba program,or set of instructionsa name that a user selects for youa method of sending short messagesa bad thing that can ruin your devicea search engine visual for parents mostly...

Cyber safety- Caitlin 2016-06-08

Cyber safety- Caitlin crossword puzzle
Across
  1. computer or iPad user who try's to gain unauthorised access to your computer or iPad
  2. social network that you should be careful on
  3. trying to get you to do something by telling you something that is not true
  4. lie on your computer
  5. you don't want to tell people
  6. - you should always be this online
  7. you do when you get new apps on a iPad
  8. you watch
  9. to make you feel safe
  10. a letter to someone on the computer
  11. someone a message on your device
Down
  1. popular a site where you watch and post videos
  2. what they really are
  3. mean to one person over again
  4. person you don't know
  5. your computer is sick
  6. stop something coming to you
  7. to get into a website
  8. school page is a -------
  9. -to check with an adult
  10. call someone you can trust this

21 Clues: you watchwhat they really arelie on your computerperson you don't knowyour computer is sickto get into a websiteto make you feel safe-to check with an adultschool page is a -------stop something coming to youmean to one person over againyou don't want to tell peoplecall someone you can trust thissomeone a message on your device...

Cyber safty dona 2016-06-08

Cyber safty dona crossword puzzle
Across
  1. Service Provider (ISP)
  2. unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can appear in many forms, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.
  3. copy a file from one of your computer system to another via the Internet (usually your computer or a mobile phone, it can also be dangerous sometimes . )
  4. unwanted messages which may contain threats
  5. and blogs
  6. computing
  7. scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
  8. generic term for any company that can connect you directly to the Internet.
  9. even families and acquaintances
  10. on the Internet threatening or implying violent behavior, displaying suicidal tendencies
  11. fights where scornful and offensive messages are posted on websites ,
  12. spam
Down
  1. virus
  2. excluding someone from an online group
  3. viruses are maliciously-designed programs that infect computers by hiding themselves inside normal, harmless programs.
  4. to channel surfing on a television, Internet one involves users browsing around various websites following whatever interests them.
  5. that some people that will hack in really easily and will Steal thing.
  6. into someone's email or other online accounting and sending messages that will cause embarrassments
  7. internet-related illegal activity.
  8. when criminals post fake Facebook “like” buttons to webpages. Users who click the button don’t “like” the page, but instead download malware.
  9. is a virus also a worm which spreads by .
  10. number tracking feature of Internet browsers that shows all the recent websites visited.

22 Clues: spamvirusand blogscomputingService Provider (ISP)even families and acquaintancesinternet-related illegal activity.excluding someone from an online groupis a virus also a worm which spreads by .unwanted messages which may contain threatsfights where scornful and offensive messages are posted on websites ,...

Cyber safety Steph 2016-05-24

Cyber safety      Steph crossword puzzle
Across
  1. give your password out to people you don't know.
  2. Don't talk to people you don't have.
  3. Tell someone in your family if you have a virus on the computer .
  4. computers get lots of viruses .
  5. Watch appropriate videos .
  6. be careful on messages on iPad .
  7. Follow people you know .
  8. Don't open if it not yours .
  9. a percent if there is something wrong with the computer.
  10. Make sure it makes sure you check first .
Down
  1. Don't give people it.
  2. Don't go on a website you haven't gone on before .
  3. Tell mum and dad to get a game on computers .
  4. strangers don't talk to them online .
  5. Don't tell people your pass code
  6. Before you get a game.
  7. Block viruses .
  8. Bullying don't talk to people you don't know
  9. iPhones are dangerous online .
  10. Don't listen to adds because they can be viruses.

20 Clues: Block viruses .Don't give people it.Before you get a game.Follow people you know .Watch appropriate videos .Don't open if it not yours .iPhones are dangerous online .computers get lots of viruses .Don't tell people your pass codebe careful on messages on iPad .Don't talk to people you don't have.strangers don't talk to them online ....

Cyber safety Steph 2016-05-24

Cyber safety      Steph crossword puzzle
Across
  1. iPhones are dangerous online .
  2. Watch appropriate videos .
  3. Tell someone in your family if you have a virus on the computer .
  4. computers get lots of viruses .
  5. Don't give people it.
  6. Follow people you know .
  7. be careful on messages on iPad .
  8. Don't talk to people you don't have.
  9. a percent if there is something wrong with the computer.
Down
  1. give your password out to people you don't know.
  2. Don't go on a website you haven't gone on before .
  3. Don't tell people your pass code
  4. Don't listen to adds because they can be viruses.
  5. Tell mum and dad to get a game on computers .
  6. Before you get a game.
  7. strangers don't talk to them online .
  8. Block viruses .
  9. Bullying don't talk to people you don't know
  10. Don't open if it not yours .
  11. Make sure it makes sure you check first .

20 Clues: Block viruses .Don't give people it.Before you get a game.Follow people you know .Watch appropriate videos .Don't open if it not yours .iPhones are dangerous online .computers get lots of viruses .Don't tell people your pass codebe careful on messages on iPad .Don't talk to people you don't have.strangers don't talk to them online ....

Cyber safety crossword 2016-05-25

Cyber safety crossword crossword puzzle
Across
  1. piece of tech used to control something.
  2. ,a thing that can destroy your device.
  3. mini game or active.
  4. place where you can watch videos.
  5. a thing that many people have.
  6. ,someone who you trust.
  7. thing were you get close a page.
  8. program that lets you find materials on the web.
  9. who can cheat on a app.
  10. that only you know.
  11. device.
  12. ,A site that supports many other sites.
Down
  1. ,A site that allows you to search for information.
  2. something that represents you in a game.
  3. who teasers and is mean to others.
  4. that when you look at it you see your face.
  5. place where can post pictures and comments.
  6. who trusts you.
  7. that comes up randomly .
  8. thing for a device.
  9. a site were you can post stuff.
  10. you recommend a thing.
  11. , a phone,IPad,computer or any device.

23 Clues: device.who trusts you.thing for a device.that only you know.mini game or active.you recommend a thing.,someone who you trust.who can cheat on a app.that comes up randomly .a thing that many people have.a site were you can post stuff.thing were you get close a page.place where you can watch videos.who teasers and is mean to others....

Networking & Cyber Ethics 2025-05-22

Networking & Cyber Ethics crossword puzzle
Across
  1. Using digital platforms to harass others.
  2. Someone who gains unauthorized access to data.
  3. A computer that provides data to other computers.
  4. Moral principles guiding online behavior.
  5. Device that connects your home to the Internet.
  6. Footprint The trail of data left behind by online activity.
  7. Wide Area Network, larger than LAN.
  8. Software that protects against malicious programs.
  9. Local Area Network, usually within a building.
  10. Storing data on remote servers accessed via the Internet.
Down
  1. Fraudulent attempt to get sensitive information.
  2. Software designed to harm a computer.
  3. A device that forwards data packets between networks.
  4. A set of rules for data communication.
  5. A global network connecting millions of computers.
  6. Security system that monitors and controls incoming and outgoing traffic.
  7. A computer that receives data from a server.
  8. Address A unique number assigned to a device on a network.
  9. Secret code used for authentication.
  10. Virtual Private Network provides secure Internet access.

20 Clues: Wide Area Network, larger than LAN.Secret code used for authentication.Software designed to harm a computer.A set of rules for data communication.Using digital platforms to harass others.Moral principles guiding online behavior.A computer that receives data from a server.Someone who gains unauthorized access to data....

Tugas-jaringan koputer dan internet 2024-01-11

Tugas-jaringan koputer dan internet crossword puzzle
Across
  1. jaringan komputer
  2. kelola data
  3. pertukaran data
  4. informasi siatem jaringan komputer
  5. komputer dan manfaat
  6. jaringan
  7. dan konfigurasi keamanan jaringan
Down
  1. jaringan komputer
  2. securities
  3. teknis jaringan komputer

10 Clues: jaringansecuritieskelola datapertukaran datajaringan komputerjaringan komputerkomputer dan manfaatteknis jaringan komputerdan konfigurasi keamanan jaringaninformasi siatem jaringan komputer

AVSEC QC Crossword #2 2025-04-09

AVSEC QC Crossword #2 crossword puzzle
Across
  1. ___________ questions work best when a specific answer is required or when verifying information. Eg Is this your bag?
  2. __________ is a phenomenon that will translate into a passive situation whereby the persons questioned withhold information; mask information; block communication
  3. The auditee must be provided with __________ regarding inspection findings during the post-inspection meeting
  4. ___________ questions do not imply personal judgment and the inspected party is free to answer what he/she pleases. Eg What do you think of your security system?
  5. _____________ consists of repeating in simple terms the answers provided by the interviewee. It is a method for clarifying information and a means of verifying what has been stated by the person
  6. Any enforcement action taken by a State would require ________ Authority
  7. The auditor should display __________ while conducting an interview
  8. Security ____________ that are identified early and corrected will also deter acts of unlawful interference
  9. Security _________ is an inquiry into any act or attempted act of unlawful interference against civil aviation and/or any alleged or suspected instance of non-compliance with a State’s National Civil Aviation Security Programme
  10. the _____________ Authority determines the categories of compliance to be used during inspections
  11. The pre-inspection _____________ is a document, which is sent to the airport authority or inspected entity prior to the inspection to collect current information
Down
  1. A standard is any specification for physical characteristics, configuration, matériel, performance, personnel or procedure, the uniform application of which is recognized as _____________ for the safety or regularity of international air navigation and to which Contracting States will conform in accordance with the Convention.
  2. Security ___________ evaluation of security needs including the identification of vulnerabilities which could be exploited to carry out an act of unlawful interference, and the recommendation of corrective actions.
  3. Security ________ is a covert or overt trial of an aviation security measure, which simulates an attempt to commit an unlawful act
  4. For practical purposes a __________ is a smaller document, one that is easy to handle, would make the inspectors’ job efficient. This kind of document will be complementary to the inspection guide
  5. Annex 17 requires a state to ____________ a NCASQCP.
  6. ___________ questions involves the opinion of the person asking the question. It tends to influence the answer. These questions are not objective and should therefore be avoided during inspections
  7. Benchmark, _________ and auditor are the three components of the inspection concept
  8. __________ interviews should be part of the inspection
  9. The Interim Findings Report will serve as a basis for the presentation during the post inspection debriefing and the final _________

20 Clues: Annex 17 requires a state to ____________ a NCASQCP.__________ interviews should be part of the inspectionThe auditor should display __________ while conducting an interviewAny enforcement action taken by a State would require ________ AuthorityBenchmark, _________ and auditor are the three components of the inspection concept...

PUMPKINS FLY 2013-01-13

PUMPKINS FLY crossword puzzle
Across
  1. / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
  2. Permanent member of the UN Security Council that has used its veto power the greatest number of times.
  3. / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
  4. / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
  5. / Location where the first Security Council session took place on 17 January 1946.
  6. / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
  7. / Granted permanent membership into the Security Council in 1971.
Down
  1. / In 2003, the UN Security Council was involved in a crisis that happened in Sudan / The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
  2. / Number of members in the Security Council.
  3. / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
  4. / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
  5. / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
  6. / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
  7. / Country that has made the strongest request for a permanent seat in the UN Security Council other than Brazil, India and Japan.
  8. / UN peacekeeping force sent to Rwanda to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out in the midst of the genocide.

15 Clues: / Number of members in the Security Council./ Granted permanent membership into the Security Council in 1971./ Location where the first Security Council session took place on 17 January 1946.Permanent member of the UN Security Council that has used its veto power the greatest number of times....

PUMPKINS FLY 2013-01-13

PUMPKINS FLY crossword puzzle
Across
  1. / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
  2. / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
  3. / UN peacekeeping force sent to Rwanda to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out in the midst of the genocide.
  4. / Number of members in the Security Council.
  5. / Location where the first Security Council session took place on 17 January 1946.
  6. / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
  1. / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
  2. Permanent member of the UN Security Council that has used its veto power the greatest number of times.
  3. / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
  4. / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
  5. / Country that has made the strongest request for a permanent seat in the UN Security Council other than Brazil, India and Japan.
  6. / Granted permanent membership into the Security Council in 1971.
  7. / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
  8. / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
  9. / In 2003, the UN Security Council was involved in a crisis that happened in Sudan / The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.

15 Clues: / Number of members in the Security Council./ Granted permanent membership into the Security Council in 1971./ Location where the first Security Council session took place on 17 January 1946.Permanent member of the UN Security Council that has used its veto power the greatest number of times....

Kuis BK Perundungan 2024-08-15

Kuis BK Perundungan crossword puzzle
Across
  1. sikaptidakinginmengikutsertakantemandalamkelompokbelajarmerupakanperundungansecara
  2. perundungandilakukandimediasosial
  3. caramenghindaribulying
Down
  1. sebabsebabmelakukanbullying
  2. menghinatemandengankatakatayangkotortermasukperundungan
  3. salahsatudampaknegatifperundunggan
  4. memukultemantermasukmelakukanperundungan?

7 Clues: caramenghindaribulyingsebabsebabmelakukanbullyingperundungandilakukandimediasosialsalahsatudampaknegatifperundungganmemukultemantermasukmelakukanperundungan?menghinatemandengankatakatayangkotortermasukperundungansikaptidakinginmengikutsertakantemandalamkelompokbelajarmerupakanperundungansecara

Safe on internet 2025-04-22

Safe on internet crossword puzzle
Across
  1. Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird
  2. ,, ... Sie Ihre digitale Welt"
  3. Beispiel für Cyber-Mobbing
  4. ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen
Down
  1. du sollst immer auf dein ...gefühl hören
  2. Cyber-Mobbing meint das absichtliche Beleidigen, Bloßstellen, Bedrohen oder Belästigen im ... oder über das Handy
  3. erst ... , dann tippen

7 Clues: erst ... , dann tippenBeispiel für Cyber-Mobbing,, ... Sie Ihre digitale Welt"du sollst immer auf dein ...gefühl hörenGlaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wirdist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen...

Safe on internet 2025-04-22

Safe on internet crossword puzzle
Across
  1. Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird
  2. ,, ... Sie Ihre digitale Welt"
  3. Beispiel für Cyber-Mobbing
  4. ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen
Down
  1. du sollst immer auf dein ...gefühl hören
  2. Cyber-Mobbing meint das absichtliche Beleidigen, Bloßstellen, Bedrohen oder Belästigen im ... oder über das Handy
  3. erst ... , dann tippen

7 Clues: erst ... , dann tippenBeispiel für Cyber-Mobbing,, ... Sie Ihre digitale Welt"du sollst immer auf dein ...gefühl hörenGlaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wirdist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen...

Information Security 2020-12-17

Information Security crossword puzzle
Across
  1. a secret word
  2. the act of stopping something from happening
  3. positions of authority
  4. an illegal plan for tricking people
  5. connected computers around the world
  6. an action that affects someone in an unwanted way
Down
  1. illegal activities
  2. someone allow you to do something
  3. to take something without the permission
  4. an arrangement with a bank
  5. you buy something need this
  6. computer program
  7. a set of computer equipment and programs
  8. someone's right to keep their personal matters secret

14 Clues: a secret wordcomputer programillegal activitiespositions of authorityan arrangement with a bankyou buy something need thissomeone allow you to do somethingan illegal plan for tricking peopleconnected computers around the worldto take something without the permissiona set of computer equipment and programsthe act of stopping something from happening...

Information Security 2020-12-17

Information Security crossword puzzle
Across
  1. a secret word
  2. the act of stopping something from happening
  3. positions of authority
  4. an illegal plan for tricking people
  5. connected computers around the world
  6. an action that affects someone in an unwanted way
Down
  1. illegal activities
  2. someone allow you to do something
  3. to take something without the permission
  4. an arrangement with a bank
  5. you buy something need this
  6. computer program
  7. a set of computer equipment and programs
  8. someone's right to keep their personal matters secret

14 Clues: a secret wordcomputer programillegal activitiespositions of authorityan arrangement with a bankyou buy something need thissomeone allow you to do somethingan illegal plan for tricking peopleconnected computers around the worldto take something without the permissiona set of computer equipment and programsthe act of stopping something from happening...

Internet Security 2012-12-12

Internet Security crossword puzzle
Across
  1. Computer criminals. Otherwise known as 'black-hat hatters'
  2. Software created to damage or alter the computer data or its operations
  3. An electronic way of proving your identity (2 words)
  4. A self-copying program that has the capacity to move from one computer to another without human help, by exploiting security flaws
  5. Software designed to collect information from computers for commercial or criminal purposes
  6. Email fraud conducted for the purposes of information or identity theft
Down
  1. A fraudulent or deceptive act or operation
  2. To alter using a secret code so as to be unitelligible to unauthorised parties
  3. A program designed to protect against viruses
  4. A program designed to prevent spyware from gaining access to the internal network
  5. A malicious program disguised as innocent-looking files or embedded within legitimate software. It doesn't copy itself (2 words)
  6. Anonymous:noun
  7. A program that spreads by attaching itself to executable files or documents
  8. The unauthorised reproduction or use of copyrighted books, music etc

14 Clues: Anonymous:nounA fraudulent or deceptive act or operationA program designed to protect against virusesAn electronic way of proving your identity (2 words)Computer criminals. Otherwise known as 'black-hat hatters'The unauthorised reproduction or use of copyrighted books, music etcSoftware created to damage or alter the computer data or its operations...

Security Awareness 2024-04-22

Security Awareness crossword puzzle
Across
  1. Information Security Officer
  2. Information Security is not just a ______ issue
  3. What type of password is a strong password with descriptors before or after it?
  4. The strongest password is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca!, This_p^zz1e!
  5. What type of calls are made by social engineers?
  6. This can slow down your computer AND watch everywhere you go on the internet
  7. This horse can stampede your security defenses for the bad guys and make you look sheepish too!
  8. Who should you tell if you think you just got phished or pretext called?
Down
  1. When somebody sends and e-mail with a link to a bogus website
  2. Our Company may do this on your internet usage
  3. You should not just heck identity, you should also confirm
  4. The front line of defense in information security!
  5. Regular e-mail is sent in this type of text
  6. As employees of the bank, we should not expect this in the use of our e-mail systems

14 Clues: Information Security OfficerRegular e-mail is sent in this type of textOur Company may do this on your internet usageInformation Security is not just a ______ issueWhat type of calls are made by social engineers?The front line of defense in information security!You should not just heck identity, you should also confirm...

Security Guard 2023-05-19

Security Guard crossword puzzle
Across
  1. Portions of a case held in camera are held in private before a judge where the press and the public are not allowed to take part.
  2. Official measures intended to protect the people.
  3. To move through their assigned areas at regular intervals to detect or prevent violations of the law or problems of any kind.
  4. A person who is believed to have committed a crime, but has not yet been found guilty.
  5. The individual who registered to engage in uniformed services
  6. A roughly cylindrical club made of wood, rubber, plastic, or metal.
Down
  1. The freedom from injury, harm, danger or loss to personal property whether deliberate or accidental.
  2. An official or formal statement of facts or proceedings.
  3. written laws gathered together, usually covering a specific subject matter.
  4. To deliver, publish, or execute as a required by law.
  5. Someone's institution that has power.
  6. Someone who watches over in order to protect and control.
  7. A variety of conduct that violates public order, disturbs the public, or incites violence.
  8. Behavior toward another that is marked by civility, respect, attention, consideration, cooperation, or generosity.

14 Clues: Someone's institution that has power.Official measures intended to protect the people.To deliver, publish, or execute as a required by law.An official or formal statement of facts or proceedings.Someone who watches over in order to protect and control.The individual who registered to engage in uniformed services...

FOOD SECURITY 2024-11-28

FOOD SECURITY crossword puzzle
Across
  1. The refrigerator is the best place to perishables.
  2. Is a kitchen device that can ensure food is cooked to a proper temperature.
  3. Is not a food safety step when preparing raw meat or poultry?
  4. cooking with frozen foods by following these for
  5. safety and quality.
  6. What temperature does poultry need to reach to be food safe?
Down
  1. While everyone is at risk of a youngChildren and elderly people have a higher risk
  2. To avoid cross contamination, keep raw meat from produce.
  3. Leftovers should be put in the refrigerator or freezer within?
  4. What foodborne pathogen is often linked to raw eggs?
  5. Start out with hands surfaces and utensils before cooking
  6. It is recommended to wash hands with warm water and soap for seconds
  7. Four steps to help you tackle bacteria
  8. Only food that contains flour when it is fully cooked

14 Clues: safety and quality.Four steps to help you tackle bacteriacooking with frozen foods by following these forThe refrigerator is the best place to perishables.What foodborne pathogen is often linked to raw eggs?Only food that contains flour when it is fully cookedTo avoid cross contamination, keep raw meat from produce....

Security Principles 2025-02-25

Security Principles crossword puzzle
Across
  1. A bond must be registered within ____ months after the debt is incurred to obtain a preferential right
  2. Consent may be required in terms of the Matrimonial Property Act
  3. To enforce a GNB, a creditor's personal security must first be ______
  4. Registration of a bond creates a _____ right
  5. Essential to establish Pledge
  6. A _____ debt is backed by an asset as collateral
  7. Type of obligation created by guarantees
Down
  1. Sureties are ________ in nature and reliant on the default of the principal debtor
  2. Essential to establish Lien
  3. A bond registered over movable property
  4. Business _______ is a formal restructuring process available to financially distressed companies
  5. Most common type of mortgage bond
  6. Type of security that arises out of the operation of law
  7. Type of cession where the asset is temporarily transferred as security for the debt

14 Clues: Essential to establish LienEssential to establish PledgeMost common type of mortgage bondA bond registered over movable propertyType of obligation created by guaranteesRegistration of a bond creates a _____ rightA _____ debt is backed by an asset as collateralType of security that arises out of the operation of law...

Cyberbullying 2024-11-08

Cyberbullying crossword puzzle
Across
  1. Safety
  2. Shaming
  3. Speech
Down
  1. Footprint
  2. Health
  3. threats
  4. Media

7 Clues: MediaHealthSafetySpeechthreatsShamingFootprint

Priceless Puzzle 2023-08-25

Priceless Puzzle crossword puzzle
Across
  1. The competition
  2. Location of the Sustainability Lab
  3. Mastercard HQ
  4. Month of the Rugby World Cup final
  5. LGBTQIA+ card personalisation
  6. Six notes
Down
  1. Cyber Shield acquisition
  2. The card name pre-1979
  3. CEO
  4. Comms Queen

10 Clues: CEOSix notesComms QueenMastercard HQThe competitionThe card name pre-1979Cyber Shield acquisitionLGBTQIA+ card personalisationLocation of the Sustainability LabMonth of the Rugby World Cup final

security technology 2014-07-07

security technology crossword puzzle
Across
  1. linklayer
  2. trusted key distribution
  3. breakingencryption scheme
  4. bigger risk
  5. cryptography
  6. someone reads your mail
  7. someone intercepts your mail and modify
  8. application layer
  9. virtual private network
Down
  1. transport control protocol
  2. internet layer
  3. filtering system
  4. transport layer
  5. send mail and sign your name

14 Clues: linklayerbigger riskcryptographyinternet layertransport layerfiltering systemapplication layersomeone reads your mailvirtual private networktrusted key distributionbreakingencryption schemetransport control protocolsend mail and sign your namesomeone intercepts your mail and modify

Internet security 2021-11-30

Internet security crossword puzzle
Across
  1. prove your identity
  2. A pot you hope attracts interest
  3. My words on your video
  4. A weakness that allows a threat
  5. Happens when a buffer has too much
  6. tricks you to click it
Down
  1. Click all traffic lights in this image
  2. Blocks incoming and outgoing connections
  3. identity falsified
  4. horse with hidden surprise
  5. denial of service attacks this
  6. fake email link bait
  7. encrypt files to extort money
  8. Our kind doesn't rain

14 Clues: identity falsifiedprove your identityfake email link baitOur kind doesn't rainMy words on your videotricks you to click ithorse with hidden surpriseencrypt files to extort moneydenial of service attacks thisA weakness that allows a threatA pot you hope attracts interestHappens when a buffer has too muchClick all traffic lights in this image...

General Security 2025-01-13

General Security crossword puzzle
Across
  1. A process to identify security weaknesses
  2. A minor breach of security procedures or policies
  3. A software update to fix vulnerabilities
  4. A secret word or phrase used for authentication
  5. an incident that involves the unauthorized access, disclosure, or compromise of sensitive or classified information
  6. Software designed to detect and remove viruses
Down
  1. A person or thing likely to cause damage/danger.
  2. The act of stealing confidential information
  3. A malicious code that replicates itself
  4. An unauthorized disclosure of classified information
  5. A digital attack aiming to steal personal information
  6. A security feature to detect intrusions
  7. A set of rules for securing information systems
  8. An attempt to gain unauthorized access

14 Clues: An attempt to gain unauthorized accessA malicious code that replicates itselfA security feature to detect intrusionsA software update to fix vulnerabilitiesA process to identify security weaknessesThe act of stealing confidential informationSoftware designed to detect and remove virusesA secret word or phrase used for authentication...

Security Terms 2022-11-17

Security Terms crossword puzzle
Across
  1. Logical computer network of zombies under control of an attacker
  2. Large marsupial
  3. Malware preventing devices from properly operating until a fee is paid
  4. Attacker who controls a botnet
  5. Likes to chase mice
Down
  1. Computer code that is dormant until it is triggered by a specific logical event
  2. Infected computer under remote control of an attacker
  3. Database of viruses used to identify infected files
  4. Has a trunk
  5. Software code that gives access to a program that circumvents normal security protections
  6. Publicly released software security update to repair a vulnerability
  7. Flying mammal
  8. Man's best friend
  9. Security program that delivers advertising content in a way that is unexpected and unwanted

14 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceAttacker who controls a botnetDatabase of viruses used to identify infected filesInfected computer under remote control of an attackerLogical computer network of zombies under control of an attackerPublicly released software security update to repair a vulnerability...

RESENSI 2024-05-02

RESENSI crossword puzzle
Across
  1. Penulisan kata serapan Pancreas
  2. Penulisan kata serapan echelon
  3. Penulisan kata serapan Accent
  4. bahasa latin resensi
  5. penulisan kata serapan Hierarchy
  6. tanggapan serta manfaat bagi pembaca
  7. Penulisan kata serapan Croissant
  8. Penulisan kata serapan Khalal
Down
  1. salah satu konjungsi temporal
  2. Penulisan kata serapan Phase
  3. Penulisan kata serapan Variety
  4. kata merupakan konjungsi
  5. Penulisan kata serapan Cyber
  6. Penulisan kata serapan cream
  7. pernyataan berupa saran
  8. Penulisan kata Actie

16 Clues: bahasa latin resensiPenulisan kata Actiepernyataan berupa sarankata merupakan konjungsiPenulisan kata serapan PhasePenulisan kata serapan CyberPenulisan kata serapan creamsalah satu konjungsi temporalPenulisan kata serapan AccentPenulisan kata serapan KhalalPenulisan kata serapan VarietyPenulisan kata serapan echelonPenulisan kata serapan Pancreas...

Social Security Crossword 2015-01-28

Social Security Crossword crossword puzzle
Across
  1. Social Security benefits represent about 38 percent of the income of the _____
  2. There were 63 million Social Security _____ in 2013
  3. Benefits to retired workers has _____ in the past 40 years
  4. 55 percent of Social Security beneficiaries were _____ in 2013
Down
  1. 67 years old is the _____ retirement age of a person born after 1960
  2. The average age of disabled-worker beneficiaries in current-payment status has _____ substantially since 1960
  3. About 47 percent of _____ persons rely on Social Security for 90 percent or more of their income.
  4. Supplemental Security _____ (SSI)
  5. One 5th of all beneficiaries in 2013 were _____ or the spouses and children of retired or disabled workers
  6. 165 million _____ are covered under Social Security
  7. 9 out of ten individuals age 65 and older receive Social Security _____

11 Clues: Supplemental Security _____ (SSI)There were 63 million Social Security _____ in 2013165 million _____ are covered under Social SecurityBenefits to retired workers has _____ in the past 40 years55 percent of Social Security beneficiaries were _____ in 201367 years old is the _____ retirement age of a person born after 1960...

Hatley Independent Practice 2015-01-28

Hatley Independent Practice crossword puzzle
Across
  1. Red Octagon
  2. Internet Bullying
  3. Feelings
  4. Mean kids
Down
  1. Police keep you ______
  2. Peoples problem
  3. Punching is ________
  4. Grown ups

8 Clues: FeelingsGrown upsMean kidsRed OctagonPeoples problemInternet BullyingPunching is ________Police keep you ______

Security Month 2025-11-03

Security Month crossword puzzle
Across
  1. A professional who tests computer systems for vulnerabilities. (7, 6)
  2. The security technique that modifies sensitive details by replacing it with fictitious information. (4, 7)
  3. Your unique code used to gain access to websites, apps, and more. (8)
  4. Framework that enables a third party to integrate with Salesforce, potential for them to be compromised. (9, 4)
  5. An incident where information is accessed, stolen, or exposed without authorization. (6)
Down
  1. An add-on product to gain extra security for your Salesforce org. (6)
  2. The security technique that encourages an implicit lack of faith in all users. (4, 5)
  3. Digitally altered appearances, one of the ways AI could cause security issues. (9)
  4. Initialism, require a user to provide two or more verification factors to gain access. (3)
  5. Salesforce encourages the principle of least ___. (10)
  6. Salesforce recently announced a partnership with this company to enhance Agentforce security. (11)
  7. Fraudulent communications that appear to come from a legitimate source. (8)
  8. The EU data privacy and security law. (4)
  9. This solution is useful in all cases of data loss. (6)

14 Clues: The EU data privacy and security law. (4)Salesforce encourages the principle of least ___. (10)This solution is useful in all cases of data loss. (6)An add-on product to gain extra security for your Salesforce org. (6)A professional who tests computer systems for vulnerabilities. (7, 6)...

Puzzle #48 – “How Social Security Is Funded” 2025-06-30

Puzzle #48 – “How Social Security Is Funded” crossword puzzle
Across
  1. - Where collected Social Security money is stored
  2. - Pays half of the Social Security tax
  3. - Shares payroll tax responsibility with the employee
  4. - What current workers are funding for today’s retirees
Down
  1. - Taxes are collected based on these
  2. - Social Security is funded through this type of tax
  3. - Social Security receives this from taxes
  4. - Main way Social Security is funded
  5. - Acronym for Federal Insurance Contributions Act
  6. - Often funded alongside Social Security through payroll

10 Clues: - Taxes are collected based on these- Main way Social Security is funded- Pays half of the Social Security tax- Social Security receives this from taxes- Where collected Social Security money is stored- Acronym for Federal Insurance Contributions Act- Social Security is funded through this type of tax...

RAF Knowledge Test 2023-04-04

RAF Knowledge Test crossword puzzle
Across
  1. How many terms at Cranwell
  2. Overseas Base
  3. Air, Space and Cyber Group
  4. Home to ISTAR
  5. Who formed the RAF
  6. Atlas C.1 name
Down
  1. Overseas base
  2. A role of Air Power
  3. C-17 Name
  4. An Air power Characteristic
  5. An Air Power Characteristic
  6. New CAS
  7. QRA fall under this group
  8. T in NATO

14 Clues: New CASC-17 NameT in NATOOverseas baseOverseas BaseHome to ISTARAtlas C.1 nameWho formed the RAFA role of Air PowerQRA fall under this groupHow many terms at CranwellAir, Space and Cyber GroupAn Air power CharacteristicAn Air Power Characteristic

Tugas-jaringan koputer dan internet 2024-01-11

Tugas-jaringan koputer dan internet crossword puzzle
Across
  1. komputer dan manfaat
  2. jaringan komputer
  3. jaringan
  4. securities
  5. jaringan komputer
Down
  1. pertukaran data
  2. dan konfigurasi keamanan jaringan
  3. informasi siatem jaringan komputer
  4. teknis jaringan komputer
  5. kelola data

10 Clues: jaringansecuritieskelola datapertukaran datajaringan komputerjaringan komputerkomputer dan manfaatteknis jaringan komputerdan konfigurasi keamanan jaringaninformasi siatem jaringan komputer

Tugas-jaringan koputer dan internet 2024-01-11

Tugas-jaringan koputer dan internet crossword puzzle
Across
  1. komputer dan manfaat
  2. jaringan komputer
  3. jaringan
  4. securities
  5. jaringan komputer
Down
  1. pertukaran data
  2. dan konfigurasi keamanan jaringan
  3. informasi siatem jaringan komputer
  4. teknis jaringan komputer
  5. kelola data

10 Clues: jaringansecuritieskelola datapertukaran datajaringan komputerjaringan komputerkomputer dan manfaatteknis jaringan komputerdan konfigurasi keamanan jaringaninformasi siatem jaringan komputer

Principles of CyberSecurity 2025-04-02

Principles of CyberSecurity crossword puzzle
Across
  1. The process of saving data in case it is lost or damaged
  2. The law that stops that states it is illegal to use or share peoples data except for the reason it was collected
  3. A type of virus that you think is one thing but is really another thing
  4. The methods we employ to keep data safe
  5. a security method where more than one way of determining identity is utilised
  6. Gaining unauthorised access to a system
  7. A scam method using email
  8. A security method where data is put into a code
  9. The law that says you can have access to any info kept about you
Down
  1. When an Enterprise has experiences unauthorised access to their data
  2. Is the data accurate, updated and from a reliable source
  3. Software that locks your system and you need to pay a few for the code
  4. The right to keep info about ourselves confidential
  5. A scam method using SMS
  6. Where one person pretends to be someone else using confidential information
  7. landscape The environment in which a system exists and the risks involved in regard to security
  8. A piece of software designed to block unauthorised access to a system
  9. The hat colour of a "good" hacker
  10. Software used to prevent malicious programs from damaging a system
  11. damage A business may suffer this after a breach
  12. Security systems that are based on a human feature
  13. Software designed to damage a system

22 Clues: A scam method using SMSA scam method using emailThe hat colour of a "good" hackerSoftware designed to damage a systemThe methods we employ to keep data safeGaining unauthorised access to a systemA security method where data is put into a codedamage A business may suffer this after a breachSecurity systems that are based on a human feature...

Midterm Exam Prep 2024-02-29

Midterm Exam Prep crossword puzzle
Across
  1. Protecting data and resources from unauthorized access.
  2. This type of denial exists on each ACL.
  3. Security subnet created by dual firewalls.
  4. Sophisticated attacks remain undetected.
  5. A system designed to lure attackers and gather information about their tactics.
  6. A security zone for suppliers and customers.
  7. An attack in which the attacker intercepts and analyzes network traffic.
  8. This type of ACL allows everyone except the one we deny.
  9. Malware inducing fear tactic.
  10. This secure remote access protocol should be replaced by telnet.
  11. Protection of data from unauthorized manipulation or alteration.
  12. Device authentication mechanism to ensure a secure network.
  13. Social engineering on high-profile targets.
  14. It's used for IP translations.
  15. Policies are used for email delivery.
  16. This hacker steals valuable information and is often associated with the mafia.
  17. IPsec protocol that can be used for data encryption.
  18. This hacker gets in, grabs the goods, and gets out.
  19. An availability technique.
  20. Social engineering phase in which the conversation with the victim starts.
  21. This hackers have political motives.
  22. This poisoning technique associates a MAC address with the victim's IP address.
  23. A layer 2 Network segmentation technique.
  24. Provides a method for mutual authentication of devices within the SAN
  25. This WSUS server is responsible for testing and approval of patches.
  26. two worded Layer 2 security configuration on switches.
  27. These malware can be purchased in a ready-to-use state.
  28. Social engineering over the phone.
Down
  1. For this anti-virus scan, you must reboot your system.
  2. A physical security entry trap
  3. Storytelling and impersonating legitimate organization.
  4. In this NIST core function we educate users.
  5. This standard can be created to apply consistent security configurations.
  6. FTPs rely on this protocol for security.
  7. The second Security model layer.
  8. In this NAC stage we define how NAC should be implemented.
  9. This Malware spreads through a network.
  10. Infected computers with a botnet to carry an attack with.
  11. These appliances can be used to apply quality of service and traffic-shaping.
  12. IPsec protocol is responsible for establishing security associations (SAs).
  13. Ethical hacking phase to collect information.
  14. The best security countermeasure to reduce the risk of a phishing attack.
  15. A controlled DNS to identify a hacked computer.
  16. This IPsec operation mode is used for site-to-site VPN connection.
  17. Protects sensitive data from being exposed
  18. Email authentication check.
  19. The file and folder permissions are written in this list.
  20. Email authentication using signatures.
  21. File-level encryption.
  22. Following an authorized personnel to bypass the physical Access Control.
  23. This type of proxy server can be used for web filtering.
  24. A temporary power backup.
  25. A network scanning tool.
  26. These patches are prioritized even outside of a normal schedule.

54 Clues: File-level encryption.A network scanning tool.A temporary power backup.An availability technique.Email authentication check.Malware inducing fear tactic.A physical security entry trapIt's used for IP translations.The second Security model layer.Social engineering over the phone.This hackers have political motives....

Crossword Period 1 2024-06-04

Crossword Period 1 crossword puzzle
Across
  1. Class of conspicuous consumption
  2. Like a famous fictional knight
  3. Not quite
  4. Something precious and portable
  5. Linked
  6. Relative of "shy" and "shoo"
  7. Find intolerable
  8. Salty or spicy, in speech
  9. Like the prices on Black Friday or Cyber Monday
Down
  1. Aggressive military strategy
  2. For insiders only
  3. Like a speech or sermon
  4. You might have this before a big decision
  5. Opposite of indifference
  6. Something worse than a lecture
  7. Link
  8. Like teacher's answers, sometimes
  9. All puffed up
  10. Last ___ of...
  11. Up in smoke
  12. Clownish

21 Clues: LinkLinkedClownishNot quiteUp in smokeAll puffed upLast ___ of...Find intolerableFor insiders onlyLike a speech or sermonOpposite of indifferenceSalty or spicy, in speechAggressive military strategyRelative of "shy" and "shoo"Like a famous fictional knightSomething worse than a lectureSomething precious and portableClass of conspicuous consumption...

Technology 2024-02-16

Technology crossword puzzle
Across
  1. to turn on (e)
  2. stereo
  3. device
  4. the touchscreen
  5. work
  6. voicemail
  7. social media
  8. out of order
  9. the tablet
  10. apps
  11. digital camera
  12. the charger
  13. password
  14. printer
  15. mouse
  16. to print
  17. remote control
Down
  1. laptop
  2. the cyber cafe
  3. the phone
  4. busy
  5. to turn off
  6. make a sound
  7. slow
  8. the channel
  9. the monitor
  10. the wireless connection
  11. video call
  12. keyboard
  13. TV
  14. call
  15. radio
  16. to turn on (p)
  17. the internet

34 Clues: TVbusyslowworkappscallradiomouselaptopstereodeviceprinterkeyboardpasswordto printthe phonevoicemailvideo callthe tabletto turn offthe channelthe monitorthe chargermake a soundsocial mediaout of orderthe internetto turn on (e)the cyber cafedigital camerato turn on (p)remote controlthe touchscreenthe wireless connection

16a 2024-07-11

16a crossword puzzle
Across
  1. Paranormal investigation series
  2. Drummer's intense journey
  3. Animal city's mystery
  4. Dysfunctional superhero family
  5. Boy becomes a hero
  6. Postapocalyptic road trip
  7. Alien symbiote film
  8. Dream master's tale
  9. Ex-cop's investigations
  10. Man with multiple selves
  11. Heist widows' plot
  12. Cyber world's return
  13. Antihero group's antics
  14. Disease thriller film
  15. Warrior king's realm
Down
  1. Teen vampire saga
  2. Picnic-stealing bear
  3. Arms dealers' story
  4. Agent's loyalty tested
  5. Future cop's hunt
  6. Longhaired princess's tale
  7. Writer's biographical film
  8. Street rat's magical tale
  9. Heroes against corruption
  10. Balloon house adventure

25 Clues: Teen vampire sagaFuture cop's huntBoy becomes a heroHeist widows' plotArms dealers' storyAlien symbiote filmDream master's talePicnic-stealing bearCyber world's returnWarrior king's realmAnimal city's mysteryDisease thriller filmAgent's loyalty testedEx-cop's investigationsAntihero group's anticsBalloon house adventureMan with multiple selves...

Cryptober Puzzle #1 2020-09-30

Cryptober Puzzle #1 crossword puzzle
Across
  1. The means of proving identity using two authentication factors
  2. Any weakness in an asset or security protection which would allow for a threat to cause harm
  3. The act of falsifying the identity of the source of a communication or interaction
  4. A means of security evaluation where automated tools and manual exploitations are performed by security and attack experts
  5. Program designed to detect and remove computer viruses
  6. A social engineering attack that attempts to collect information from victims
Down
  1. The process of proving an individual is a claimed identity
  2. A means of isolating applications, code or entire operating systems in order to perform testing or evaluation.
  3. The number one spot in the OWASP 10
  4. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system
  5. A security tool that attempts to detect the presence of intruders or the occurrence of security violations
  6. A place where websites can store local data on a client machine
  7. The act of collecting frames or packets off of a data network communication
  8. An update or change on an operating system or application
  9. An error or mistake in software coding or hardware design or construction
  10. Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard

16 Clues: The number one spot in the OWASP 10Program designed to detect and remove computer virusesAn update or change on an operating system or applicationThe process of proving an individual is a claimed identityThe means of proving identity using two authentication factorsA place where websites can store local data on a client machine...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Internet Security 2021-05-06

Internet Security crossword puzzle
Across
  1. Where the sender and receiver both use the same key to encrypt and decrypt data
  2. Hardware or software for protecting against unauthorised access to a network
  3. A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
  4. Issue solved by using public-private key encryption
  5. A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
  6. Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
Down
  1. Where a public and private key are used to encrypt and decrypt data
  2. A trusted organisation that provides digital certificates and signatures
  3. Malware that is hidden within another file on your computer
  4. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
  5. A generic term for malware where the program attaches itself to another file in order to infect a computer
  6. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
  7. A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
  8. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules

14 Clues: Issue solved by using public-private key encryptionMalware that is hidden within another file on your computerWhere a public and private key are used to encrypt and decrypt dataA trusted organisation that provides digital certificates and signaturesHardware or software for protecting against unauthorised access to a network...

SECURITY MEETING 2024-06-10

SECURITY MEETING crossword puzzle
Across
  1. REPORT FILED
  2. IN MOST CASES USES A FIREARM
  3. 3 POTENTIAL COURSES OF ACTION
  4. WILL ENGAGE WITH EMERGENCY RESPONDERS
  5. POLICY TO PROVIDE GUIDANCE
  6. NUMBER OF COURSES OF ACTION
  7. REVIEWED ANNUALLY AND REVISED
  8. COMPLY WITH LAW ENFORCEMENT
Down
  1. NAME THE PROGRAM TO REPORT TREASTS AGAINST THE BANK
  2. PROHIBITED WITHOUT APPROVAL
  3. MONTHLY TRAINING
  4. RESPONSIBLE FOR SIGNING
  5. DO NOT ATTEMPT TO
  6. A OFFICER WILL NOTIFY RELATIVES

14 Clues: REPORT FILEDMONTHLY TRAININGDO NOT ATTEMPT TORESPONSIBLE FOR SIGNINGPOLICY TO PROVIDE GUIDANCEPROHIBITED WITHOUT APPROVALNUMBER OF COURSES OF ACTIONCOMPLY WITH LAW ENFORCEMENTIN MOST CASES USES A FIREARM3 POTENTIAL COURSES OF ACTIONREVIEWED ANNUALLY AND REVISEDA OFFICER WILL NOTIFY RELATIVESWILL ENGAGE WITH EMERGENCY RESPONDERS...

Thanksgiving Cyber Puzzle 2014-11-18

Thanksgiving Cyber Puzzle crossword puzzle
Across
  1. A unit of digital information in computer and usually consists of eight bits
  2. Original name of the Pilgrims
  3. Software that is designed to detect and destroy computer viruses
  4. The day after Thanksgiving is called this color
  5. Software that gathers computer user information and transmits it to the creator without the explicit knowledge or informed consent of the user
  6. The first Thanksgiving day football game was started by this team (2 words)
  7. What a baby turkey is called
  8. Software used to disrupt computer operation or gain access to sensitive data
  9. Email scam or attempt to trick you into giving your password or personal information
  10. The first president to pardon a turkey from a Thanksgiving dinner
  11. A stick, also know as a flash drive, is a plug-and-paly portable device
  12. Hardware or software that helps keep hackers from using your computer and it watches for outside attempts to access your system and block unauthorized use
  13. O'Bannon Bank network domain name
  14. Before throwing this in a container ask if it is something you would want made public
Down
  1. The computer term the Monday after Thanksgiving is called
  2. The busiest travel day of the year is the Friday after this holiday
  3. Type of email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus
  4. The name of the famous rock where the pilgrims first landed (2 words)
  5. The name of the ship the pilgrims came to America on
  6. Popular web search engine
  7. The longest balloon in the Macy's Thanksgiving Day Parade
  8. A secure password should contain at least one of these
  9. This type of corn is hard
  10. What a male turkey is called

24 Clues: Popular web search engineThis type of corn is hardWhat a baby turkey is calledWhat a male turkey is calledOriginal name of the PilgrimsO'Bannon Bank network domain nameThe day after Thanksgiving is called this colorThe name of the ship the pilgrims came to America onA secure password should contain at least one of these...

Cyber safety crossword 2016-05-17

Cyber safety crossword crossword puzzle
Across
  1. information that can sometimes be kept on a USB.
  2. a folder where you keep your stuff.
  3. talking to someone.
  4. a small group of people together.
  5. small random videos that can sometimes be unwanted.
  6. a bug in your computer that is stopping it from working
  7. sites that are use for different things.
  8. getting something on your device.
  9. person that cheats in something
  10. someone that helps you do things
  11. revealing your true self.
  12. a public site with people from all over the world.
  13. showing the violence of a game,show or movie.
  14. sending a type message to someone else.
  15. unwanted virus someone is sending.
Down
  1. can be downloaded to use.
  2. a remote used for video games.
  3. a small square showing your face.
  4. security used to get in your device.
  5. a site for exploring and information.
  6. a site you need to be careful with when watching
  7. closing screens but can easily go back.
  8. a site that is not meant to be used.
  9. a character describing you in a game
  10. people that can be played with in real life and video games.
  11. information that is kept to your self.
  12. a person that makes you upset or sad.
  13. a mini activity.
  14. a device that you download apps

29 Clues: a mini activity.talking to someone.can be downloaded to use.revealing your true self.a remote used for video games.person that cheats in somethinga device that you download appssomeone that helps you do thingsa small square showing your face.a small group of people together.getting something on your device.unwanted virus someone is sending....

Estelle cyber safety 2016-06-07

Estelle cyber safety crossword puzzle
Across
  1. You use to go places bag.
  2. you can play stuff on it
  3. you live there
  4. You write on
  5. you have to be careful on it
  6. it can save were you were up to
  7. some words that you use to get in to some thing
  8. it affects you iPad or phone or computer
  9. You were when it's sunny
  10. You stay away
  11. You can eat
Down
  1. You sleep on
  2. you do work on
  3. you call people
  4. can read
  5. You can message people
  6. Helps you write
  7. you use to brush your teeth
  8. Use to open something
  9. you can look at to see if you need it
  10. you can tip and save it
  11. you can each stuff
  12. it's like the news on the computer bully's book.

23 Clues: can readYou can eatYou sleep onYou write onYou stay awayyou do work onyou live thereyou call peopleHelps you writeyou can each stuffUse to open somethingYou can message peopleyou can tip and save ityou can play stuff on itYou were when it's sunnyYou use to go places bag.you use to brush your teethyou have to be careful on it...

The Cyber Scramble! 2024-04-19

The Cyber Scramble! crossword puzzle
Across
  1. Internet connection method that requires a phone line and creates a distinctive sound when connecting, known as ____.
  2. One of the most popular search engines in the world.
  3. Virtual space where users can communicate in real-time through text messages, known as a ____.
  4. Security system that controls the incoming and outgoing network traffic, known as a ____.
  5. Software used to navigate the internet, such as Internet Explorer or Firefox, is called a ____.
  6. Opposite of downloading, this term refers to transferring data from your computer to the internet, known as ____.
  7. Company that provides your internet connection is known as an ____.
  8. Language used to create web pages is known as ____.
  9. Collection of web pages linked under a common domain, also known as a ____.
  10. The most used social media platform in the world.
Down
  1. Unwanted or unsolicited email, commonly referred to as ____.
  2. Buying and selling goods or services over the internet, commonly referred to as _____.
  3. A communication method that uses electronic devices to deliver messages across computer networks.
  4. Unique address used to locate resources on the internet, abbreviated as ____.
  5. Advertisement that appears in a separate window while browsing the internet, known as a ____.
  6. Process of transferring data from the internet to your computer is called a ____.
  7. Wireless networking technology that allows devices to connect to the internet without the need for physical cables, known as ____.
  8. Type of malicious software that can replicate itself and infect other computer files, known as ____.
  9. Device that allows computers to communicate over telephone lines, also known as a ____.
  10. Website where individuals or groups regularly post content on specific topics, known as a ____.

20 Clues: The most used social media platform in the world.Language used to create web pages is known as ____.One of the most popular search engines in the world.Unwanted or unsolicited email, commonly referred to as ____.Company that provides your internet connection is known as an ____....

Cyber Physical Systems 2025-03-20

Cyber Physical Systems crossword puzzle
Across
  1. The process of making systems operate without human intervention.
  2. Using models to replicate real-world behaviors.
  3. A decentralized and secure digital ledger technology.
  4. Internet-based computing providing storage and processing power.
  5. Related to manufacturing and production systems.
  6. A network of connected devices that communicate over the internet.
  7. Study of control and communication in machines and living beings.
  8. The ability of different systems to work together.
  9. A virtual replica of a physical system for monitoring and analysis.
  10. Devices that detect and respond to physical changes.
Down
  1. The coordination of processes to operate in unison.
  2. Protection of digital and cyber-physical systems from threats.
  3. The capability of a system to function independently.
  4. A computing system integrated into a larger system.
  5. Devices that convert electrical signals into mechanical motion.
  6. A highly automated, connected, and intelligent manufacturing system.
  7. Machine-based intelligence that enables decision-making.
  8. Combining different subsystems into a unified system.
  9. Large volumes of data used for analytics and decision-making.
  10. Processing data closer to the source rather than a central server.

20 Clues: Using models to replicate real-world behaviors.Related to manufacturing and production systems.The ability of different systems to work together.The coordination of processes to operate in unison.A computing system integrated into a larger system.Devices that detect and respond to physical changes....

Test Your Knowledge 2023-11-08

Test Your Knowledge crossword puzzle
Across
  1. information that can be used to distinguish or trace an individual’s identity either directly or indirectly through linkages with other information
  2. individuals” who have access to classified information or hold a
  3. information would would cause "exceptionally grave damage to the national security" if there were an unauthorized release.
  4. a type of classification that is based on the classification of another source.
  5. establishes requirements for the protection of classified information disclosed to or developed by contractors, licensees, grantees, or certificate holders (hereinafter referred to as contractors) to prevent unauthorized disclosure.
  6. information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies but is not classified .
  7. and result in, or could be expected to result in, the loss or compromise of
  8. information
  9. security incidents that indicate knowing, willful, and negligence for security
  10. establishes standardized reporting requirements across the federal government for all
  11. the process by which we protect critical information whether it is classified or unclassified that can be used against us. It focuses on preventing our adversaries' access to information and actions that may compromise an operation.
Down
  1. a security incident involving failure to comply with requirements
  2. information that is determined to have the potential to cause danger to the national security with unauthorized release.
  3. or compromise of classified information
  4. cannot reasonably be expected to) and does not, result in the loss, suspected
  5. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  6. information that would, with unauthorized release, be expected to cause "serious" damage to the national security.
  7. a perceived threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
  8. position.

19 Clues: position.informationor compromise of classified informationindividuals” who have access to classified information or hold aa security incident involving failure to comply with requirementsand result in, or could be expected to result in, the loss or compromise ofcannot reasonably be expected to) and does not, result in the loss, suspected...