cyber security Crossword Puzzles
Cyber Vocab 1.1 2025-08-29
Across
- A secret string of characters used for authentication.
- Precomputed tables used to reverse cryptographic hash functions.
- Ensuring that information and resources are accessible when needed.
- An attack that attempts common passwords against many accounts.
- When two different inputs produce the same hash output.
- The combination of username and password or other authentication information.
- An authentication method allowing a user to access multiple systems with one login.
- A mix of dictionary and brute force attacks.
- Authentication based on physical or behavioral characteristics - such as fingerprints or facial recognition.
- The practice of protecting systems- networks and programs from digital attacks.
- The process of verifying an individual’s identity before granting access.
- A process of converting data into a fixed-size string - typically used for storing passwords securely.
- The process of verifying the identity of a user or system.
- An organized collection of structured information or data stored electronically.
- A cryptographic attack that exploits the probability of hash collisions.
- Ensuring that information is only accessible to those with proper authorization.
- An incident where unauthorized access to data or systems occurs.
Down
- A method of breaking passwords by systematically entering every word in a dictionary.
- Tracking user actions and activities for auditing and monitoring.
- A digital document used to prove ownership of a public key.
- Physical cards with embedded chips used for secure authentication.
- An attack where stolen credentials are used to gain unauthorized access.
- Maintaining the accuracy and trustworthiness of data.
- An attack that tries all possible combinations to guess a password.
- Restricting access to resources based on user identity and permissions.
- A step-by-step procedure for calculations or problem-solving.
- A sequence of words used instead of a password for authentication.
- A security model consisting of Confidentiality Integrity and Availability.
28 Clues: A mix of dictionary and brute force attacks. • Maintaining the accuracy and trustworthiness of data. • A secret string of characters used for authentication. • When two different inputs produce the same hash output. • The process of verifying the identity of a user or system. • A digital document used to prove ownership of a public key. • ...
Cyber Crossword 2023 2023-10-06
Across
- A technique where an attacker moves from one compromised system to the next.
- A cyber attack that makes a system unavailable to its intended users.
- The group responsible for defending the organization's information systems during a cybersecurity test.
- A cyber attack where the victim's data is held hostage and the attacker demands a payment.
Down
- Type of authentication that requires users to enter more than just a password.
- An exhaustive method for cracking passwords.
- In this attack, the attacker intercepts communication to eavesdrop or impersonate.
- Triad of cybersecurity tenets.
- Ancient cipher used by the Greeks.
- A group of penetration testers used to simulate the actions of those who are malicious.
10 Clues: Triad of cybersecurity tenets. • Ancient cipher used by the Greeks. • An exhaustive method for cracking passwords. • A cyber attack that makes a system unavailable to its intended users. • A technique where an attacker moves from one compromised system to the next. • Type of authentication that requires users to enter more than just a password. • ...
Information Security Crossword Puzzle 2019-07-17
Across
- Bypassing security on a system
- Recovery and Investigation
- Which website is used to check your email is compromised or not ?
- Weakness in a system
- Which attack is also known as “piggybacking” ?
- goggle.com is an example of _________ method
- Enemy of Security
- Client for SSH
Down
- Malware which presents unwanted advertisements
- Threat X Vulnerability
- Technology designed to keep the bad guys out
- Everyone should enable Two Factor _____________
- Should not be shared / kept open to everyone
- Similar to virus that replicate from one to another
- ______ is wealth
- distributed ______ of service
- Confidentiality, __________, Availability
- unplanned disruption or degradation of a network
- Common type of social engineering attack
- Provide real-time analysis of security alerts
20 Clues: Client for SSH • ______ is wealth • Enemy of Security • Weakness in a system • Threat X Vulnerability • Recovery and Investigation • distributed ______ of service • Bypassing security on a system • Common type of social engineering attack • Confidentiality, __________, Availability • Technology designed to keep the bad guys out • Should not be shared / kept open to everyone • ...
Cybersecurity/Safety 2024-07-11
Across
- short for any malicious software
- digital brick layered wall of security
- vulnerability no one is aware of yet
- collect/transmit private user info
- identifies device is connected to internet
- appears harmless/conceals malicious intent
- monitors security protection measures
- designs, tests, implements security system
- media manipulation/false perception
- fool's user into providing private info
- analyst that designs data communication
Down
- Also known as "crackers"
- clicking hidden elements "UI redress attack"
- Germany had great message _____ until, Alan Turing
- "penetration testers" works with organization
- software to detect, prevent/remove cpu infections
- compromised computers to carry out attacks
- digital technology harassment
- prudent to use a ____ whenever possible
- locks out user for Bitcoin
20 Clues: Also known as "crackers" • locks out user for Bitcoin • digital technology harassment • short for any malicious software • collect/transmit private user info • media manipulation/false perception • vulnerability no one is aware of yet • monitors security protection measures • digital brick layered wall of security • prudent to use a ____ whenever possible • ...
ACT Vocab 5 2023-03-29
Across
- The young musician displayed a ___________ talent for playing the piano.
- The boxer's ___________ attitude towards their opponents often resulted in violent altercations.
- The idealistic young activist had a ___________ plan to end poverty, but it was unrealistic and impractical.
- The CEO's ___________ approach to business helped the company survive during tough economic times.
- I always like to ___________ a book before deciding whether or not to read it.
- The author's ___________ writing style made the book difficult to read, with unnecessarily long and convoluted sentences.
- The chef was able to ___________ my interest in trying new foods with their creative dishes.
- The politician was accused of being too ___________ to her party, and not considering the needs of her constituents.
- The manager's ___________ towards the employee's complaints did not help to resolve the issue.
- The CEO's ___________ was discovered when he was caught embezzling funds from the company.
- The artist was considered a ___________ by many critics because of his lack of appreciation for classical art.
- The ___________ customer complained about everything, making it difficult for the server to do their job.
- The detective's ___________ attention to detail led to the discovery of crucial evidence in the case.
Down
- The ___________ of quality candidates for the job made it difficult for the hiring manager to make a decision.
- The ___________ security guard was always interfering with the guests' activities.
- The company's ___________ approach to spending meant that there was little money left for important projects.
- In some societies, people with disabilities are still seen as ___________ and excluded from social activities.
- The ___________ child was already reading chapter books at the age of four.
- Learning the ___________ of a scientific field is important for effectively communicating with others in the same field.
- The angry customer was difficult to deal with, but the manager hoped to ___________ them by offering a discount on their next purchase.
- The politician's ___________ towards making promises they couldn't keep was well-known.
- A lack of funding may ___________ the construction of the new building.
- The politician's speech was criticized for using a _________ to hand waive an important issue.
- The company was in a ___________ about whether to invest in new technology or focus on expanding its current product line.
- The new security measures are intended to ___________ the risk of cyber attacks on the company's systems.
25 Clues: A lack of funding may ___________ the construction of the new building. • The young musician displayed a ___________ talent for playing the piano. • The ___________ child was already reading chapter books at the age of four. • I always like to ___________ a book before deciding whether or not to read it. • ...
Danica's puzzle 2023-11-27
Across
- A computer that is suitable for use while travelling.
- type of online fraud where a cyber criminal designs a fake
- the hardware in a computing device where the operating system
- a place where u can store pictures and files and other things and u can loge into the cloud from anywhere and see all your stuff
- text files with small pieces of data like a username and password that are used to identify your computer as you use a network.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- is a common interface that enables communication between devices and a host controller such as a personal computer
- a electronic device with a screen which puts out pixels
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
- System It manages the computer's memory and processes
- video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
- It brings you to a certain website or page, the address.
Down
- performs many of the same functions as a computer,typically having a touch screen, internet access, and a operating system capable of running download applications.
- a peripheral device that enables a user to input text into a computer or any other electronic machinery.
- information that is easy to access which can include management, updating computer databases usually collect aggreations of data, records.
- a generic term used to refer to applications, scripts and programs that run on a device.
- global network of billions of computers and other electronic devices
- a personal computer designed to be used on a desk or table the opposite of portable computers like laptops or tablets
- web-centric laptops that run Google's Chrome operating system
- an application for accessing websites and the Internet.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- a wireless connection that connects you to the internet through radio waves
23 Clues: A computer that is suitable for use while travelling. • System It manages the computer's memory and processes • a electronic device with a screen which puts out pixels • an application for accessing websites and the Internet. • It brings you to a certain website or page, the address. • type of online fraud where a cyber criminal designs a fake • ...
Artificial Intelligence 2024-12-09
Across
- This sector has been profoundly influenced by AI-powered technologies, which have revolutionized supply chain management, sorting and packing, and determining the most efficient shipping routes.
- capable of anticipating maintenance requirements and arranging them in advance of issues, which lowers expenses and downtime.
- AI may also be used to identify fraudulent activity and support strategic decision-making, which improves user engagement and experience
- Quality Precise, timely, and consistent data is the cornerstone of artificial intelligence systems.
- Context provided by AI technologies, but using AI also brings up moral dilemmas as, for better or worse,
- The idea of the technological singularity
- AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
- AI-powered personalization allows marketing campaigns and product suggestions to be customized to each person's taste.
- Artificial Intelligence is utilized in product design, labor planning, and equipment predictive maintenance.
- (AI) technologies are employed in transportation to forecast aircraft delays, regulate traffic, and enhance the safetyand efficiency of maritime transportation.
Down
- Terms AI is being used to assist automate labor intensive tasks in the legal sector, which saves time and enhances customerservice.
- By analyzing data from blogs, social media, and online platforms to detect trends and influencers, artificial intelligence (AI) has completely transformed the fashion business.
- Artificial Intelligence is utilized in the film business to enhance digital effects, save costs, and expedite production.
- coding Artificial intelligence (AI) is a useful tool in cyber security for anomaly identification, behavioral threat analytics, and false positive resolution.
- selecting the appropriate ai model for a project is essential
- AI tools such as IBM Watson mimic human medical tasks, while NuMedii's AI-driven AIDD platform looks for medication interactions across diseases.
- Robotics integration into the workflow has been pioneered by the manufacturing sector.
- AI is also capable of automating room administration, ensuring security, and detecting fraudulent activity.
- It is advised to conduct further research on the effects of AI on adaptive tests, individualized learning, and creative teaching environments.
- AI is used by banking institutions to enhance loan decision-making, establish credit limits, and find investment possibilities.
20 Clues: The idea of the technological singularity • selecting the appropriate ai model for a project is essential • Robotics integration into the workflow has been pioneered by the manufacturing sector. • Quality Precise, timely, and consistent data is the cornerstone of artificial intelligence systems. • ...
Krzyżówka Angielski 2025-12-10
Across
- – A document describing an event or findings.
- – A secret code to access a system.
- – Protection against threats or attacks.
- – Unauthorized entry into a system.
- – A user identity in a system.
- – Accidental or unlawful release of information.
- – A formal rule or guideline.
- – Proof of an event or action.
- – Someone who monitors or watches activity.
- – A saved copy of data in case of loss.
- – Instructions written for computers.
- – Delay in data communication.
- – Connected computers that share data.
- – To watch or track activity.
- – A set of connected computer components.
- – Rules about what is morally right or wrong.
- – A tool that blocks unwanted network traffic.
- – Searching for threats inside a network.
- – The chance that something bad may happen.
- – Belief that someone or something is reliable.
- – A step taken to solve a problem.
- – A risk or danger.
- – The way a system or user acts.
- – A sign that danger or problems may occur.
- – Permission to use or enter a system.
- – A formal review of systems or processes.
Down
- – Following laws, rules, or standards.
- – A simplified digital structure used to predict or analyze.
- – A prediction based on information.
- – Programs used by a computer.
- – Use of technology to perform tasks without human input.
- – Related to money or cost.
- – A tool used to explore or test a system.
- – Related to investigating cyber incidents.
- – A place where data is kept.
- – Monitoring to make sure rules are followed.
- – A break in security where data is exposed.
- – The right to keep personal data protected.
- – A call for data or a service.
- – A specific area or internet address space.
- – A set of rules for communication.
- – To check a system for issues or threats.
- – A part of a larger software system.
- – Converting information into a secure code.
- – A computer that provides resources to others.
- – Numerical information used for analysis.
- – Learning skills or knowledge.
- – Short Definition (EN)
- – Records of system activities.
- – A weakness that can be exploited.
- – An event that disrupts normal operations.
- – A connection point in a network.
- – Information stored or processed by computers.
- – Something unusual that may signal a problem.
54 Clues: – A risk or danger. • – Short Definition (EN) • – Related to money or cost. • – A place where data is kept. • – A formal rule or guideline. • – To watch or track activity. • – Programs used by a computer. • – A user identity in a system. • – Proof of an event or action. • – Delay in data communication. • – A call for data or a service. • – Learning skills or knowledge. • ...
Krzyżówka Angielski Cyberbezpieczenstwo 2025-12-10
Across
- The current condition of a system.
- Too much data or activity for a system to handle.
- A call for data or a service.
- A formal rule or guideline.
- A mistake or problem in a system.
- Records of system activities.
- To follow the path of an action or data flow.
- Information stored or processed by computers.
- Learning skills or knowledge.
- To protect from harm or attacks.
- A tool that blocks unwanted network traffic.
- Accidental or unlawful release of information.
- The way a system or user acts.
- A place where data is kept.
- Connected computers that share data.
- A connection point in a network.
- Rules about what is morally right or wrong.
- A set of connected computer components.
- Use of technology to perform tasks without human input.
- Unauthorized entry into a system.
- Monitoring to make sure rules are followed.
- A request for information from a database.
- A user identity in a system.
Down
- A tool used to explore or test a system.
- Official rule made by authorities.
- The path data takes to reach a destination.
- Protection against threats or attacks.
- A specific area or internet address space.
- A system on which applications can run.
- Measurements used to evaluate performance.
- Instructions written for computers.
- The ability to manage or direct something.
- Programs used by a computer.
- A part of a larger software system.
- The chance that something bad may happen.
- A risk or danger.
- Converting information into a secure code.
- A secret code to access a system.
- Related to investigating cyber incidents.
- Numerical information used for analysis.
- A sign that danger or problems may occur.
- Information sent from one place to another.
- Belief that someone or something is reliable.
- Studying information to understand it.
- An action taken after an incident.
- Related to money or cost.
- Something unusual that may signal a problem.
- A break in security where data is exposed.
- A simplified digital structure used to predict or analyze.
- Continuous flow of data.
- A written record of actions or events
- A person or system chosen for attack.
52 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A formal rule or guideline. • A place where data is kept. • Programs used by a computer. • A user identity in a system. • A call for data or a service. • Records of system activities. • Learning skills or knowledge. • The way a system or user acts. • To protect from harm or attacks. • ...
SN33003FP Chapter 6 2024-07-06
Across
- Reduces the severity of the loss or the likelihood of the loss from occurring
- Prevent a disaster from occurring
- The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
- Gets critical systems to another location while repair of the original facility is under way
- Avoiding complex solutions that users cannot understand or troubleshoot
- Ability to maintain availability during disruptive events
- Restricting access so that users only have the level of access required to do their job
- It is critical to keep an organization functioning when a disaster occurs
- Manages a complete inventory of hardware and software
- Discover the incident
- Plan for potential incidents
Down
- Creating a barrier of multiple defences to prevent attacks
- Identifies specific hardware and software products that the organization uses and supports
- Breaching one layer of security does not compromise the whole system
- Discover unwanted events
- Investigate the cause of the incident and ask questions to better understand the nature of the threat
- Analyzes the dangers posed by natural and human-caused events to the assets of an organization
- Enhances system reliability and availability by distributing them across multiple physical locations
- Manages a full inventory of hardware and software components that are vulnerable to security risks
- Network protocol that provides for redundancy
- Concealing certain types of information to make it more difficult for cyber criminals to attack a system
- The set of procedures that an organization follows after an event occurs outside the normal range
- Assigns all resources into a group based on common characteristics
- Restore the system after a disaster
- Minimizes risk by staying ahead of cybercriminals
- Ensures system availability in the event of a component failure
- Combines multiple physical hard drives into a single logical unit
- A group of servers that act like a single system
- Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
- Enables a system to continue operating if one or more components fail
- 99.999% uptime, less than 5.26 minutes downtime yearly
31 Clues: Discover the incident • Discover unwanted events • Plan for potential incidents • Prevent a disaster from occurring • Restore the system after a disaster • Network protocol that provides for redundancy • A group of servers that act like a single system • Minimizes risk by staying ahead of cybercriminals • Manages a complete inventory of hardware and software • ...
ICS- Review 1 2025-11-03
Across
- a criminal tactic using scam emails, texts, or calls to trick people into clicking malicious links, downloading malware, revealing sensitive information like passwords or financial details, or transferring money
- the design of this malware is to hold a computer system or the data it contains captive until it makes a payment, usually encrypts your information so you can't access it.
- You should also use this encrypted service to prevent others from intercepting your information over a public wireless network.
- will log the detection and create an alert for a network administrator. It will not take action.
- can block or deny traffic based on a positive rule or signature match.
- (4,2,3) when a user is accessing data.
- (4,2,6) when data is traveling through the network.
- (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
- (4,10) is the formal process of continuously identifying and assessing risk to reduce the impact of threats and vulnerabilities.
- (9,8) where you could backup or copy all your data to i.e. a NAS, or an external hard drive
Down
- (6-2-7) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some interruption of network service to users, devices, or applications.
- (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
- is a computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its code. Usually require end-user interaction to initiate activation and can act on a specific date or time.
- a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
- (4,2,7) the financial impact of a security breach can
- (4,2,4) when data is stored in a computer network or device.
- may prevent the loss of irreplaceable data.
- (6,11)is manipulating people into performing actions or divulging confidential information.
- can have sophisticated security policies applied to the traffic passing through them. Can look deeper into the network traffic to block malicious behaviour.
- a type of data breach where the goal is to take sensitive personal data.
20 Clues: (4,2,3) when a user is accessing data. • may prevent the loss of irreplaceable data. • (4,2,6) when data is traveling through the network. • (4,2,7) the financial impact of a security breach can • (4,2,4) when data is stored in a computer network or device. • can block or deny traffic based on a positive rule or signature match. • ...
Cyber Week Crossword 2024-12-04
14 Clues: cyber _____ • _____ Friday • email server • your director • long wait time • place your bids here • ____ Emily Donaldson • the other team state • a discount on an item • one of our team states • what you earn in awardco • where you find all the info • where you request reimbursement • something to use when it's cold
Information Technology Pathways 2022-02-16
Across
- Certificates - _____ Specialist
- Associate - _____security
- Short-Term _____ Certificates (<30 credits)
- Certificates - _____ Information Systems
- Associates - _____ Development
- Short-term - Software _____
Down
- _____ Degrees (60-65 credits)
- Short-term - _____ Media Management
- Associates - Web _____
- - Certificates - _____ Systems
10 Clues: Associates - Web _____ • Associate - _____security • Short-term - Software _____ • _____ Degrees (60-65 credits) • - Certificates - _____ Systems • Associates - _____ Development • Certificates - _____ Specialist • Short-term - _____ Media Management • Certificates - _____ Information Systems • Short-Term _____ Certificates (<30 credits)
Information Technology Pathways 2022-02-16
Across
- Certificates - _____ Specialist
- Associate - _____security
- Short-Term _____ Certificates (<30 credits)
- Certificates - _____ Information Systems
- Associates - _____ Development
- Short-term - Software _____
Down
- _____ Degrees (60-65 credits)
- Short-term - _____ Media Management
- Associates - Web _____
- - Certificates - _____ Systems
10 Clues: Associates - Web _____ • Associate - _____security • Short-term - Software _____ • _____ Degrees (60-65 credits) • - Certificates - _____ Systems • Associates - _____ Development • Certificates - _____ Specialist • Short-term - _____ Media Management • Certificates - _____ Information Systems • Short-Term _____ Certificates (<30 credits)
MARVEL Cloud Computing and Cyber Security Domain 2022-02-24
Across
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- unique name by performing a wide variety of automated tasks on behalf of their master
- a Deployment Model which is a combination of a Private and a Public Cloud
- what does the P stand for in PaaS
- The Cloud Platform that CNA Hardy have chosen
Down
- Hash me D8578edf8458ce06fbc5bb76a58c5ca4
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- a method, often secret, of bypassing normal authentication in a product
- I am a database design which enables the storage and querying of data outside the traditional structures found in relational databases.
- Encrypt the word alphabet using a Caesar cipher with a shift of 3
11 Clues: what does the P stand for in PaaS • Hash me D8578edf8458ce06fbc5bb76a58c5ca4 • The Cloud Platform that CNA Hardy have chosen • Encrypt the word alphabet using a Caesar cipher with a shift of 3 • a method, often secret, of bypassing normal authentication in a product • a Deployment Model which is a combination of a Private and a Public Cloud • ...
cyber security crossword (designed by:the awesome Xiaoyu) 2015-12-31
Across
- The process of translating plaintext into ciphertext
- the process of attempting to acquire sensitive information used for identity theft
- software that records everything you type, then sends it off to whomever installed the software.
- an adjective to describe your professor Xiaoyu
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
Down
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- to choose options in order to create a custom system
- software installed on a network of computers without the owner’s knowledge
- A capability to limit network traffic between networks and/or information systems
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- a bridge between two computer networks
11 Clues: a bridge between two computer networks • an adjective to describe your professor Xiaoyu • to choose options in order to create a custom system • The process of translating plaintext into ciphertext • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
The Capuanos 2025-09-26
9 Clues: Bachelors • Giannis car • Bachelorette • Their first pet • Carol is a mega… • Honeymoon location • Carols ideal vacation • Gianni’s football team • Gianni’s ideal vacation
The Capuanos Trivia 2025-09-26
9 Clues: Bachelors • Giannis car • Bachelorette • Their first pet • Carol is a mega… • Honeymoon location • Carols ideal vacation • Gianni’s football team • Gianni’s ideal vacation
Danica's puzzle 2023-11-27
Across
- A computer that is suitable for use while travelling.
- type of online fraud where a cyber criminal designs a fake
- the hardware in a computing device where the operating system
- a place where u can store pictures and files and other things and u can loge into the cloud from anywhere and see all your stuff
- text files with small pieces of data like a username and password that are used to identify your computer as you use a network.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- is a common interface that enables communication between devices and a host controller such as a personal computer
- a electronic device with a screen which puts out pixels
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
- System It manages the computer's memory and processes
- video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
- It brings you to a certain website or page, the address.
Down
- performs many of the same functions as a computer,typically having a touch screen, internet access, and a operating system capable of running download applications.
- a peripheral device that enables a user to input text into a computer or any other electronic machinery.
- information that is easy to access which can include management, updating computer databases usually collect aggreations of data, records.
- a generic term used to refer to applications, scripts and programs that run on a device.
- global network of billions of computers and other electronic devices
- a personal computer designed to be used on a desk or table the opposite of portable computers like laptops or tablets
- web-centric laptops that run Google's Chrome operating system
- an application for accessing websites and the Internet.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- a wireless connection that connects you to the internet through radio waves
23 Clues: A computer that is suitable for use while travelling. • System It manages the computer's memory and processes • a electronic device with a screen which puts out pixels • an application for accessing websites and the Internet. • It brings you to a certain website or page, the address. • type of online fraud where a cyber criminal designs a fake • ...
Crossword 2023-08-29
Across
- A networking device that connects various networks, directs data packets, and facilitates communication between devices within the same network and across the internet.
- The maximum amount of data transmitted over a network or communication channel in each period, measured in bps or multiples, enabling faster data transfer.
- A small data unit that transmits information over a network, breaking down larger pieces into manageable chunks for efficient and reliable transmission.
- A security device or software monitors and controls network traffic based on predefined rules, safeguarding networks and devices from unauthorized access and cyber threats.
- Type of coaxial technology that utilizes digital signaling, allowing the cable to carry only one channel of digital data.
- A set of rules and conventions that govern the exchange and communication of data between devices within a network.
- The OSI layer responsible for data compression.
- A powerful computer that stores, delivers, and manages data, applications, or services to clients over a network, serving various purposes.
Down
- The decrease in the strength or intensity of a signal as it travels through a medium or over a distance.
- This process converts URLs into IP addresses, enabling other devices to locate and access websites and other internet resources (Acronym).
- A device that converts digital data from computers into analog signals for transmission over communication lines like phone lines or cable systems.
- A basic network device that connects multiple devices within a local area network (LAN) and broadcasts data, but lacks intelligent data traffic management.
- The arrangement of devices, connections, and components in a computer network.
- Signals that represent information using binary and have non-continuous wave forms.
- A network that connects devices within a limited geographical area (Acronym).
- Connections that provide high-speed internet access with diverse frequencies, enabling faster data transfer.
- A secure tunnel that hides your internet connection's location, ensuring privacy and security, particularly when using public Wi-Fi or browsing websites (Acronym).
- A device which functions as a traffic controller in a network, directing data only to the appropriate device rather than broadcasting it to all devices.
- An interconnection of devices, that facilitate data exchange and collaboration through communication and resource sharing.
- The Cloud Service model that provides basic configuration options (Acronym).
20 Clues: The OSI layer responsible for data compression. • The Cloud Service model that provides basic configuration options (Acronym). • A network that connects devices within a limited geographical area (Acronym). • The arrangement of devices, connections, and components in a computer network. • ...
Cyber Security Awareness (3) 2024-10-15
Across
- Probability of a cyberattack or data breach causing loss or exposure to an organization
- Software or code that cybercriminals use to damage or disrupt devices, steal data, or gain unauthorized access
- practice of protecting systems, networks, and programs from digital attacks
Down
- Text files that contain small amounts of data about a user that can be used for both good and bad purposes
- malicious program that can spread to a computer or network router without the user's knowledge or permission
5 Clues: practice of protecting systems, networks, and programs from digital attacks • Probability of a cyberattack or data breach causing loss or exposure to an organization • Text files that contain small amounts of data about a user that can be used for both good and bad purposes • ...
Crime - Crossword 2025-01-06
12 Clues: shaming • cyber crime • marijuana study • imitation of crime • the criminal career • rational choice theory • the negotiation of justice • biosocial approach to crime • primary and secondary deviance • societal and situational deviance • moral panics and deviance amplificaiton • inadequate socialisation leads to crime
Cyber Treasure Hunt 2014-02-05
Across
- When is the Annual Shareholders Meeting?
- Currently, are there any job openings at Choice Bank?
- On the Community Page, what organization hosts the AirVenture?
- What month was the Target Card scam revealed to the public?
- For Premier Classic Checking, one receives _____ checks for life!
- What is the App Code for Online Banking?
- Choice Bank opened in what month?
- What officer grew up on a farm and enjoys caring for her horses?
- What is the Mobile App called?
- The mortgage resource glossary defines ____ as the local government's specifications for the use of property in certain areas.
- In what month are the Choice Holiday Club checks issued?
Down
- He said it first, "The only real saver is a regular saver"
- What page does the hyperlink "Choice Bankcorp, Inc. Press Releases" take you to?
- Small Business Premier (sole proprietor) is an ___ bearing account.
- For Choice Premier Checking, it has a _____ interest rate
- For the Press Release in February 2013, who received a WBA Scholarship?
- Choice Young Savers accounts have no minimum ____.
- What is the Choice Bankcorp, Inc. symbol that is traded and listed Over the Counter?
- What Online and Mobile banking feature allows you to pay other people within a set time frame for a small fee?
- For Business Money Market, one has ___ withdrawls.
- For a 30-year fixed mortgage rate, it is ___.25%
- In order to receive an account balance through text banking, what must a customer text?
- Who is the Director and Chairman of the Board?
23 Clues: What is the Mobile App called? • Choice Bank opened in what month? • When is the Annual Shareholders Meeting? • What is the App Code for Online Banking? • Who is the Director and Chairman of the Board? • For a 30-year fixed mortgage rate, it is ___.25% • Choice Young Savers accounts have no minimum ____. • For Business Money Market, one has ___ withdrawls. • ...
Cyber Treasure Hunt 2014-02-12
Across
- On the Community Page, what organization hosts the AirVenture?
- Choice Bank opened in what month?
- What is the App Code required to access Choice Bank's Mobile Banking?
- Mobile App, Mobile Browser and ____ Banking are all services provided in Choice Bank's Mobile Banking.
- The ___ feature in our mortgage online services will send the customers emails when rates reach a requested level, or we can email customers rate information on a regular basis.
- For the Business Online Banking services, ACH ___ transfer is useful for companies processing direct deposit for payroll
- What is Choice Bank's Mobile App called as found in the App Store or Google Play?
- The ____ Checking requires a $100 opening deposit, offers No minimum balance requirement, unlimited check writing, ATM/Debit cards, and Easy e-Banking
- What month was the Target Card scam revealed to the public?
- ___ Business Onine Banking includes all of the Basic services, plus the ability to have multiple company users, ACH services, or Desktop Deposit Services
- Choice Young Savers accounts have no minimum ___.
- He said it first, "the only real saver is a regular saver"
- The Security ___ provides Internet safety and password tips, information to help victims of identity theft, and details regarding various scams or alerts.
- For the Press Release in February 2013, who recieved a WBA Scholarship?
- The ___ Deposit Capture Service allows business customers the ability to scan their own deposits directly from their workplace. Image files are sent to the bank for deposit into their business checking account
- The designated number for Text Banking to receive balance and history information is 99__88
- As of 2/10/14, the 30-year fixed mortgage rate is __.25%
- The number of job postings Choice Bank is currenty promoting
Down
- What officer grew up on a farm and enjoys caring for her horses?
- The website _____.com is the site that you are directed to when you want to review activity for your Choice Bank Credit Card
- For Choice Premier Checking, it has a ____ interest rate.
- Choice Bank upholds the Community Bank Advantage:___ decisions, ___ commitment, and ___ investments--all the "blank spaces" are the same word!
- When is the Annual Shareholders Meeting?
- In what month are the Choice Holiday Club checks issued?
- Small Business Premier (sole proprietor) Checking is an ___ bearing account.
- The mortgage resource glossary defines ___ as the local government's specifications for the use of property in certain areas.
- Who is the Director and Chairman of the Board?
- For Business Money Market, one has ___ withdrawls.
- What is the Choice Bancorp, Inc. symbol that is traded and listed Over the Counter?
- In order to receive an account balance through text banking, what must a customer text?
- The 24-hour Telebanking phone number is 1-877-__03-1300
- For Premier Classic Checking, one receives ___ Specialty-Mint wallet-sizechecks for life!
32 Clues: Choice Bank opened in what month? • When is the Annual Shareholders Meeting? • Who is the Director and Chairman of the Board? • Choice Young Savers accounts have no minimum ___. • For Business Money Market, one has ___ withdrawls. • The 24-hour Telebanking phone number is 1-877-__03-1300 • In what month are the Choice Holiday Club checks issued? • ...
Cyber Safety-Georgia 2016-05-25
Across
- proof that something is unsafe online
- an example of social media
- people try offend you online
- don't expect emails from them
- don't listen to them
- to keep you safe online
- something you should not give to people
- place on the internet
- media staying in touch online
Down
- check with them first
- block your computer
- keep your account private
- talk online
- don't give people it
- mail online
- World Wide Web
- sending someone information
- being on the internet
- don't open them
- Can effect your computer
20 Clues: talk online • mail online • World Wide Web • don't open them • block your computer • don't give people it • don't listen to them • check with them first • being on the internet • place on the internet • to keep you safe online • Can effect your computer • keep your account private • an example of social media • sending someone information • people try offend you online • ...
Cyber safety Steph 2016-05-25
Across
- Follow people you know .
- When something is wrong with the computer.
- Tell someone if your computer is sick.
- Don't talk to people you don't know online .
- Take care. Make sure you check it first .
- Don't tell people this
- Don't open if it's not yours .
- Watch appropriate videos .
- Ask to get a game on computers .
Down
- Be careful where you search takes you
- Don't tease people online
- Block viruses
- don't give too much away
- Listen to it
- Don't talk to people you don't have.
- Before you get a game.
- time Limit it
- Don't trust these as they can trick you
- An electronic Apple
- Don't drop them
- Annoying email messages
21 Clues: Listen to it • Block viruses • Don't drop them • An electronic Apple • time Limit it • Before you get a game. • Don't tell people this • Annoying email messages • don't give too much away • Follow people you know . • Don't tease people online • Watch appropriate videos . • Don't open if it's not yours . • Ask to get a game on computers . • Don't talk to people you don't have. • ...
Cyber IWD Crossword 2025-03-06
Across
- The official theme announced by UN Women Australia for International Women’s Day (IWD) 2025
- This number makes up the percentage of women in the cybersecurity workforce in Australia.
- The interview series by PwC’s She’s Here in Cyber and Technology program is called “She’s Here to____”.
- Gender _______; a key focus on closing the gap in opportunities.
- The woman who created the first computer program.
- Australia’s first International Women’s Day was held in 1928 in _____.
- Symbolic color often associated with women's rights.
- UN Sustainable Development Goal to achieve gender equality and empower all women and girls. (including the number)
- Australia's first female Prime Minister.
- Beatrice Page's parents think she can help them with issues with _______ because she works in Cyber and Privacy.
- The person in C&P team has two birds called Roki and Pipin.
Down
- PwC’s network focused on gender equality.
- The person in C&P team was born in Macedonia in Europe.
- The country where the idea of International Women’s Day was initiated.
- Natalie Mu played _____ gaming console as a child.
- The person in C&P team has hiked the Annapurna Circuit in Nepal.
- The person in C&P team has small disco lights at home and often will have a "dance off" on Friday afternoons with her kids to get into the mood for the weekend and celebrate the work week being done.
- Year 190_ women got the vote in Australia through The Commonwealth Franchise Act.
- International Women's Day's primary goal is to create this for women globally.
- The month International Women's Day is celebrated.
20 Clues: Australia's first female Prime Minister. • PwC’s network focused on gender equality. • The woman who created the first computer program. • Natalie Mu played _____ gaming console as a child. • The month International Women's Day is celebrated. • Symbolic color often associated with women's rights. • The person in C&P team was born in Macedonia in Europe. • ...
Cyber Cross puzzle 2025-03-12
Across
- Malware disguised as legitimate.
- BONUS: THIS IS THE PASSCODE FOR THE ANSWERS. Don't use "x" for your x.
- Records keystrokes secretly.
- Demands payment to unlock data.
- Code injection attack.
- Exploit unknown to developers.
- Monitors and controls network traffic.
- Malware that hides its presence.
- Network of infected computers.
- Secure private network connection.
- Software designed to harm.
Down
- Software to detect and remove malware.
- Overwhelms server with traffic.
- Systematic password guessing.
- Hidden access to a system.
- Software update to fix vulnerabilities.
- Converts data into code.
- Authentication: Adds extra security layer.
- Manipulating people for info.
- Malware that spies on users.
20 Clues: Code injection attack. • Converts data into code. • Hidden access to a system. • Software designed to harm. • Records keystrokes secretly. • Malware that spies on users. • Systematic password guessing. • Manipulating people for info. • Exploit unknown to developers. • Network of infected computers. • Overwhelms server with traffic. • Demands payment to unlock data. • ...
Block 6 Cyber Chapter 2 2020-08-10
Across
- the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
- malicious logic that is inserted into an executable file to be triggered at a later time
- a technology that tracks and records key strokes hoping to get sensitive information like usernames and passwords
- an infiltration software that secretly monitors unsuspecting users
- associated with individuals using hacking skills within the law to conduct security assessments and help find vulnerabilities
- self-contained malware that has the ability to copy itself without parasitically infecting the host code
- an individual that utilizes cyber training to hack for the government or an ally
Down
- a means and method used by hackers to retain access to a system or network
- an attempt to fraudulently acquire sensitive information such as user’s name, passwords, or credit card information by pretending to be a trustworthy entity in an electronic communication
- an attack on a computer that exposes an undiscovered or unpatched vulnerability
- the action taken by a nation-state or international organization to use and/or target computers and networks to achieve military objectives
- free computer software that contains advertisements
12 Clues: free computer software that contains advertisements • an infiltration software that secretly monitors unsuspecting users • a means and method used by hackers to retain access to a system or network • an attack on a computer that exposes an undiscovered or unpatched vulnerability • an individual that utilizes cyber training to hack for the government or an ally • ...
Got LAB!!! 2024-08-24
Across
- Used all day by all of us
- do between each patient
- Another name for HealthConnect
- Where blueman is located
- Needs to clot to test
- Separates with fast rpm
- Attaches to the needles
- Changes between patients
Down
- 5 min interactions
- Sometimes one, sometimes 3 sets
- Taught to you as a child
- Proper order
- Cyber attack
- Number system in MOB
- Filled with blood
- 21,23, 25
- Highly emphasized by your employer
- Wrap it up
- Still contains clot activator
19 Clues: 21,23, 25 • Wrap it up • Proper order • Cyber attack • Filled with blood • 5 min interactions • Number system in MOB • Needs to clot to test • do between each patient • Separates with fast rpm • Attaches to the needles • Taught to you as a child • Where blueman is located • Changes between patients • Used all day by all of us • Still contains clot activator • Another name for HealthConnect • ...
vis a vis 2019-02-18
Across
- the villain who calls her the queen dwells
- moder of the proyagonist
- they call her the gypsy
- protagonist blond hair
- the trafficker
- friend of the ex policeman
- director of the prison
Down
- security guard murdered
- yonki girl
- the one thtat dies in the first chapter
- husband of the security guard
- the one thtat burned her husband
- ex gilfrend of the blak gypsy
- fader of the potagonist
- security guard who was a policeman
15 Clues: yonki girl • the trafficker • protagonist blond hair • director of the prison • security guard murdered • they call her the gypsy • fader of the potagonist • moder of the proyagonist • friend of the ex policeman • husband of the security guard • ex gilfrend of the blak gypsy • the one thtat burned her husband • security guard who was a policeman • the one thtat dies in the first chapter • ...
Domain 1: Security and Risk Management 2025-03-13
Across
- - Meeting legal security standards.
- - Review ensuring regulatory adherence.
- - Plan to maintain operations.
- - Technique to identify potential threats.
Down
- - Structured set of security measures.
- - Process to handle breaches.
- - Formal document outlining security rules.
- - Core principles of security goals.
- - Process to identify and evaluate risks.
- - Code of conduct for security pros.
10 Clues: - Process to handle breaches. • - Plan to maintain operations. • - Meeting legal security standards. • - Core principles of security goals. • - Code of conduct for security pros. • - Structured set of security measures. • - Review ensuring regulatory adherence. • - Process to identify and evaluate risks. • - Technique to identify potential threats. • ...
ICT year 7 keywords 2012-03-20
Across
- search searching a specific keyword
- a form of database
- to sort or categorize
- to search
- mail over the internet
- use policy aup
- an online folder
- an answer
- trustworthy
- statistics
- a question or inquiry
Down
- important or to the subject
- a form of chart for Data
- an online dictionary
- bulling electronically
- a way of showing results
- proof of some sort
- a type of questionnaire
- information to go into a database
19 Clues: to search • an answer • statistics • trustworthy • use policy aup • an online folder • a form of database • proof of some sort • an online dictionary • to sort or categorize • a question or inquiry • mail over the internet • bulling electronically • a type of questionnaire • a form of chart for Data • a way of showing results • important or to the subject • information to go into a database • ...
security technology 2014-07-07
14 Clues: linklayer • bigger risk • cryptography • internet layer • transport layer • filtering system • application layer • someone reads your mail • virtual private network • trusted key distribution • breakingencryption scheme • transport control protocol • send mail and sign your name • someone intercepts your mail and modify
Security Training 2021-12-14
Across
- Would your bank loan on a car that is 12 years old?
- Store Emergency Response Plan can be found in what binder?
- This is located at each desk and teller window
- One way to deter robber
- Located behind teller row and night drop safe
- In the event of a robbery, who do we call?
- Building #2501 lobby
Down
- Secondary Evacuation Location
- House placed in window at front of the building
- Amount you are allowed to have in top drawer
- Our ____ is most important while at work
- What is this number, 877-511-9797?
- Interior Lockdown Location
- In the event of a robbery, bomb threat, hostage or kidnapping situation, we must _____.
14 Clues: Building #2501 lobby • One way to deter robber • Interior Lockdown Location • Secondary Evacuation Location • What is this number, 877-511-9797? • Our ____ is most important while at work • In the event of a robbery, who do we call? • Amount you are allowed to have in top drawer • Located behind teller row and night drop safe • This is located at each desk and teller window • ...
PECS SECURITY 2022-11-17
14 Clues: - ROLE • - COMPANY • - CONTROL • - MAKE OF VAN • - MOVE PRISONERS • - PROVE INNOCENCE • - LOCATION OF OCC • - CONTRACT DIRECTOR • - SECURES PRISONERS • - LET YOU IN PLACES • - SOMETHING HAPPENED • - LET PRISONER LEAVE • - SENT BACK TO PRISON • - WHAT NEEDS TO BE DONE TO AN OFFBAILER
Security Training 2022-12-09
Across
- is our alarm company
- plan is a proactive plan on how to maintain services during an emergency.
- true or false, we can discuss a robbery with the media
- is how often our alarms are tested
- the number of fire extinguishers in the branch
- the silent alarm when it is safe to do so
- is our primary meeting place
Down
- emails when sending out personal information
- is the order you fill the bag if being robbed
- is our secondary meeting point
- is the first reaction during an active shooter
- each member when they walk in
- is the color of paper used to signal the police that the branch is safe
- is our minimum number of tellers on the line
14 Clues: is our alarm company • is our primary meeting place • each member when they walk in • is our secondary meeting point • is how often our alarms are tested • the silent alarm when it is safe to do so • emails when sending out personal information • is our minimum number of tellers on the line • is the order you fill the bag if being robbed • ...
Food Security 2024-11-28
Across
- Food from grains like wheat or rice (5 letters)
- A place to buy food (6 letters)
- Lack of food (6 letters)
- Machine used in farming (7 letters)
- Insects that help pollinate crops (4 letters)
- Nutritious food (4 letters)
Down
- Group of farm animals (4 letters)
- Person who grows crops (6 letters)
- Period with little or no rain (6 letters)
- Harmful insect for crops (4 letters)
- Food from milk (6 letters)
- A place where food is grown (4 letters)
- Natural water from the sky (4 letters)
- Nutritious drink from cows (4 letters)
14 Clues: Lack of food (6 letters) • Food from milk (6 letters) • Nutritious food (4 letters) • A place to buy food (6 letters) • Group of farm animals (4 letters) • Person who grows crops (6 letters) • Machine used in farming (7 letters) • Harmful insect for crops (4 letters) • Natural water from the sky (4 letters) • Nutritious drink from cows (4 letters) • ...
Data Security 2025-12-03
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
Cyber Security Awareness (2) 2024-10-15
Across
- Type of malware that downloads onto a computer disguised as a legitimate program
- Automated process of collecting and analyzing indicators of potential security threats, then triaging these threats with appropriate action
Down
- Foftware that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- Someone who gains access to a computer system or network without authorization
- Form of data security in which information is converted to ciphertext
5 Clues: Form of data security in which information is converted to ciphertext • Someone who gains access to a computer system or network without authorization • Type of malware that downloads onto a computer disguised as a legitimate program • ...
Cyber Security Awareness (1) 2024-10-15
Across
- Fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging
- Network security device that separates a trusted internal network from an external network deemed untrustworthy, such as the internet
Down
- Type of malware that prevents users from accessing their devices or files, and demands payment to restore access
- Ensures that only genuine, authorized users can access online accounts, keeping bad actors out
- A new, improved, or fixed version of software that addresses security vulnerabilities
5 Clues: A new, improved, or fixed version of software that addresses security vulnerabilities • Ensures that only genuine, authorized users can access online accounts, keeping bad actors out • Type of malware that prevents users from accessing their devices or files, and demands payment to restore access • ...
HIPAA and FERPA InfoSec Crossword 2017-03-14
Across
- Students are given the right to file a ___________ with the department regarding a failure to comply with FERPA.
- In the HIPAA Security Rule, CEs must obtain assurances via written __________ from Business Associates that they will safeguard ePHI.
- Educational institutions must give students the opportunity to restrict __________ of directory information.
- Health records maintained by a university clinic on behalf of its students are considered educational or treatment records under FERPA, and are ___________ by HIPAA.
- The HIPAA Security Rule consists of five safeguard and requirement categories: Administrative, Physical, Technical, _______________, and Documentation.
- Risk _____________ in HIPAA consists of two phases, analysis and management.
- HIPAA stands for Health ____________ Portability and Accountability Act.
- HIPAA requires that CEs to implement device and _________ controls for devices and ________ containing ePHI.
- All documentation related to the HIPAA Security Rule must be maintained for _____ years beyond the date of creation, or the date of last effect, whichever is later.
- FERPA does not require educational institutions to provide _____________ of unauthorized disclosure of educational records.
- Directory information, disclosure of which is allowed by FERPA without consent, includes: name, __________, phone number, date and place of birth, honors and awards, and dates of attendance.
- _______ Controls are mechanisms that record and examine activity in information systems containing ePHI, and are required by the HIPAA Security Rule.
- FERPA stands for ________ Educational Rights and Privacy Act.
- FERPA requires educational institutions to notify parents or eligible students of their rights at least __________.
Down
- The HIPAA _________ Rule sets limits and conditions on the use and disclosure of PHI.
- Under FERPA, students have the right to seek ____________ of educational records they believe to be inaccurate.
- Parental rights under FERPA stop once the student enters post-secondary education OR turns _________ years old.
- Patient __________ must be obtained before the disclosure of PHI.
- The HIPAA Security Rule requires _________ user identification, and establishing emergency access procedures.
- All policies, procedures, actions, activities, and assessments related to the HIPAA Security Rule must be maintained in written or electronic _______________.
- ____________ is the process of positively-identifying a user, usually through a username and password.
- The HIPAA _________ Rule requires appropriate administrative, physical, and technical safeguards to ensure the CIA of ePHI.
- The HIPAA Security Rule Administrative Standard includes training requirements on __________ management, login procedures, and malware.
- Covered Entities are required by HIPAA to implement ____________ and appropriate policies and procedures to comply with the standards.
- The primary method to ensure the confidentiality of ePHI both in motion and at rest is by using ____________.
- A _________ Entity is an organization to which HIPAA applies.
26 Clues: A _________ Entity is an organization to which HIPAA applies. • FERPA stands for ________ Educational Rights and Privacy Act. • Patient __________ must be obtained before the disclosure of PHI. • HIPAA stands for Health ____________ Portability and Accountability Act. • Risk _____________ in HIPAA consists of two phases, analysis and management. • ...
Cyber Safety-Georgia 2016-05-25
Across
- proof that something is unsafe online
- an example of social media
- people try offend you online
- don't expect emails from them
- don't listen to them
- to keep you safe online
- something you should not give to people
- place on the internet
- media staying in touch online
Down
- check with them first
- block your computer
- keep your account private
- talk online
- don't give people it
- mail online
- World Wide Web
- sending someone information
- being on the internet
- don't open them
- Can effect your computer
20 Clues: talk online • mail online • World Wide Web • don't open them • block your computer • don't give people it • don't listen to them • check with them first • being on the internet • place on the internet • to keep you safe online • Can effect your computer • keep your account private • an example of social media • sending someone information • people try offend you online • ...
Cyber safety,max 2016-05-31
Across
- computer loading apps with out you realising.
- calling calling you rude words
- info on you or others .
- to spread lies or the truth
- annoying and teasing you .
- a program used to detect ,prevent and remove virus's on mobile devices to stop getting virus on your apps.
- it means someone shows you a violence video.
- to stalk people online.
- is when you feel bad and sad and down .
- email someone who lies to you online.
- someone who cheats or be mean online .
Down
- Encouraging it means that someone will try to make you watch or read bad stuff.
- rude words to you online.
- it's about who you are and were you live.
- law its like a law on the internet.
- crimepeople who hack
- it's where you type down numbers and letters.
- Predator a mean person online .
- it's used to go on online stuff.
- A brief sentence of you
- it means you get a sad feeling in your stomach from a mean message .
- it's about you and stuff and people.
- its where someone gets set up on the electronics and the person who is scaming gets there info online.
23 Clues: crimepeople who hack • info on you or others . • A brief sentence of you • to stalk people online. • rude words to you online. • annoying and teasing you . • to spread lies or the truth • calling calling you rude words • Predator a mean person online . • it's used to go on online stuff. • law its like a law on the internet. • it's about you and stuff and people. • ...
Cyber ethics Crossword 2025-05-22
Across
- - Unauthorized use or reproduction of software.
- - Software that secretly gathers user information.
- - Permission to do something, especially online.
- - The right to keep personal data safe from unauthorized access.
- - A secret string of characters used for authentication.
- - Harmful software designed to damage or disrupt systems.
- - Unauthorized access to or control over a computer system.
- - Informing authorities about suspicious or harmful online behavior.
- - The state of being anonymous online.
- Footprint - The trail of data left by digital activity.
Down
- - A network security device that monitors and filters traffic.
- - Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- - A program that detects and removes malware.
- - Rules users must agree to when using digital services.
- - A dishonest scheme or fraud online.
- - Bullying that takes place over digital devices.
- - Moral principles that govern behavior.
- - Legal right that grants the creator exclusive use of their work.
- - The process of converting data into a secure format.
- - Posting inflammatory content online to provoke others.
20 Clues: - A dishonest scheme or fraud online. • - The state of being anonymous online. • - Moral principles that govern behavior. • - A program that detects and removes malware. • - Unauthorized use or reproduction of software. • - Permission to do something, especially online. • - Bullying that takes place over digital devices. • ...
Networking & Cyber Ethics 2025-05-22
Across
- Using digital platforms to harass others.
- Someone who gains unauthorized access to data.
- A computer that provides data to other computers.
- Moral principles guiding online behavior.
- Device that connects your home to the Internet.
- Footprint The trail of data left behind by online activity.
- Wide Area Network, larger than LAN.
- Software that protects against malicious programs.
- Local Area Network, usually within a building.
- Storing data on remote servers accessed via the Internet.
Down
- Fraudulent attempt to get sensitive information.
- Software designed to harm a computer.
- A device that forwards data packets between networks.
- A set of rules for data communication.
- A global network connecting millions of computers.
- Security system that monitors and controls incoming and outgoing traffic.
- A computer that receives data from a server.
- Address A unique number assigned to a device on a network.
- Secret code used for authentication.
- Virtual Private Network provides secure Internet access.
20 Clues: Wide Area Network, larger than LAN. • Secret code used for authentication. • Software designed to harm a computer. • A set of rules for data communication. • Using digital platforms to harass others. • Moral principles guiding online behavior. • A computer that receives data from a server. • Someone who gains unauthorized access to data. • ...
Ancaman, Tantangan, Hambatan dan Gangguan terhadap Integrasi Nasional 2025-05-05
Across
- solusi menghadapi ATHG
- ancaman dari luar
- usaha yang membahayakan kedaulatan negara
- hambatan integrasi nasional
- proses membentuk suatu keseluruhan
- faktor pendorong integrasi
- identitas nasional
- ancaman di bidang ideologi
Down
- ancaman di bidang sosial budaya
- ancaman hibrida
- tantangan mewujudkan integrasi nasional
- ancaman disintegrasi
- ancaman dari dalam negeri
- ancaman di bidang ekonomi
- ancaman di bidang politik
- hal internal yang menghalangi upaya untuk mencapai tujuan
- meningkatkan kerjasama antar negara
17 Clues: ancaman hibrida • ancaman dari luar • identitas nasional • ancaman disintegrasi • solusi menghadapi ATHG • ancaman dari dalam negeri • ancaman di bidang ekonomi • ancaman di bidang politik • faktor pendorong integrasi • ancaman di bidang ideologi • hambatan integrasi nasional • ancaman di bidang sosial budaya • proses membentuk suatu keseluruhan • meningkatkan kerjasama antar negara • ...
Cyber bullying Crossword 2022-10-17
Across
- make sure and have all your blank settings on
- to prevent cyberbullying from occurring you must understand exactly what it is
- a person who speaks and acts of an individual or cause
- using digital devices,sites, and apps to intimidate, harm and upset someone
- if you are being cyberbullied blank the person
- is a person who is present at an event or incident but does not take part
- blank when you post a picture that you don't want anyone else seen
- untrue rumors
- saying" I know where you live"
- out blank blank out of all your accounts
- in order to raise blank you need to start a movement, create a club, build a campaign, or host an event to bring awareness to cyberbullying
- don't cyberbully blank
- make sure all your accounts are on blank
- never open blank or unsolicited messages
- aggressive and vulgar things posting
- keep your photos blank
Down
- gaining info from someone you just met
- getting in someones account without consent
- including everyone in a group chat except one person
- do not blank it will make the situation worse
- to help prevent cyberbullying you could blank yourself
- offensive messages
- harassment
- if you are being cyberbullied blank the messages sent
- keep your blank private at all times
- posting an embarrassing pic of someone
26 Clues: harassment • untrue rumors • offensive messages • don't cyberbully blank • keep your photos blank • saying" I know where you live" • keep your blank private at all times • aggressive and vulgar things posting • gaining info from someone you just met • posting an embarrassing pic of someone • make sure all your accounts are on blank • never open blank or unsolicited messages • ...
Cyber Crossword (Stella) 2020-10-15
Across
- Highest level or privileges can change global settings.
- Software that prevents, detects, and removes threats on your computer.
- A small window that suddenly opens
- A computer program that can spread by modifying other computer programs and inserting its own code.
- A collection of stored data and files.
- The primary software that runs applications and manages all the hardware.
- Updates that address and fix security vulnerabilities within a program or product.
- A copy or snapshot of the state of your computer.
- Android, iOS, Blackberry.
- Protects confidential data from attackers.
- Programs that only work on one type of OS.
Down
- Provided to secure and trustworthy sites.
- Graphical User Interface.
- What a user is allowed and not allowed to do.
- Keyboard/mouse/monitor.
- Programs that work on multiple OS.
- Takes up less space on your hard drive.
- Used to customize a browser.
- An intermediary between the user and the internet.
- A set of computer instructions that tell the computer how to work.
- 32-bit and 64-bit.
21 Clues: 32-bit and 64-bit. • Keyboard/mouse/monitor. • Graphical User Interface. • Android, iOS, Blackberry. • Used to customize a browser. • A small window that suddenly opens • Programs that work on multiple OS. • A collection of stored data and files. • Takes up less space on your hard drive. • Provided to secure and trustworthy sites. • Protects confidential data from attackers. • ...
Cyber Safety Irene 2016-05-30
Across
- Engine something you can search information on
- a program that lets you find,see and hear material on website
- a giant collection of networks of networks
- an add that automatically comes onto the screen
- a starting point on the web
- Tag the nickname a user has chosen to be identified by when playing Internet Games
- a security system to keep your things safe
- a search engine visual for parents mostly
- to upload information to the web
Down
- a bad thing that can ruin your device
- a website to search with
- a name that a user selects for you
- a thing you can chat on with family and friends
- to send information from your computer to another computer
- an adviser that teaches you how to use technology
- a secret code to open something
- a program,or set of instructions
- a method of sending short messages
- something you can send to others
- a small hand-controlled divide for pointing and clicking
20 Clues: a website to search with • a starting point on the web • a secret code to open something • something you can send to others • to upload information to the web • a program,or set of instructions • a name that a user selects for you • a method of sending short messages • a bad thing that can ruin your device • a search engine visual for parents mostly • ...
Cyber safety- Caitlin 2016-06-08
Across
- computer or iPad user who try's to gain unauthorised access to your computer or iPad
- social network that you should be careful on
- trying to get you to do something by telling you something that is not true
- lie on your computer
- you don't want to tell people
- - you should always be this online
- you do when you get new apps on a iPad
- you watch
- to make you feel safe
- a letter to someone on the computer
- someone a message on your device
Down
- popular a site where you watch and post videos
- what they really are
- mean to one person over again
- person you don't know
- your computer is sick
- stop something coming to you
- to get into a website
- school page is a -------
- -to check with an adult
- call someone you can trust this
21 Clues: you watch • what they really are • lie on your computer • person you don't know • your computer is sick • to get into a website • to make you feel safe • -to check with an adult • school page is a ------- • stop something coming to you • mean to one person over again • you don't want to tell people • call someone you can trust this • someone a message on your device • ...
Cyber safty dona 2016-06-08
Across
- Service Provider (ISP)
- unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can appear in many forms, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.
- copy a file from one of your computer system to another via the Internet (usually your computer or a mobile phone, it can also be dangerous sometimes . )
- unwanted messages which may contain threats
- and blogs
- computing
- scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
- generic term for any company that can connect you directly to the Internet.
- even families and acquaintances
- on the Internet threatening or implying violent behavior, displaying suicidal tendencies
- fights where scornful and offensive messages are posted on websites ,
- spam
Down
- virus
- excluding someone from an online group
- viruses are maliciously-designed programs that infect computers by hiding themselves inside normal, harmless programs.
- to channel surfing on a television, Internet one involves users browsing around various websites following whatever interests them.
- that some people that will hack in really easily and will Steal thing.
- into someone's email or other online accounting and sending messages that will cause embarrassments
- internet-related illegal activity.
- when criminals post fake Facebook “like” buttons to webpages. Users who click the button don’t “like” the page, but instead download malware.
- is a virus also a worm which spreads by .
- number tracking feature of Internet browsers that shows all the recent websites visited.
22 Clues: spam • virus • and blogs • computing • Service Provider (ISP) • even families and acquaintances • internet-related illegal activity. • excluding someone from an online group • is a virus also a worm which spreads by . • unwanted messages which may contain threats • fights where scornful and offensive messages are posted on websites , • ...
Cyber safety Steph 2016-05-24
Across
- give your password out to people you don't know.
- Don't talk to people you don't have.
- Tell someone in your family if you have a virus on the computer .
- computers get lots of viruses .
- Watch appropriate videos .
- be careful on messages on iPad .
- Follow people you know .
- Don't open if it not yours .
- a percent if there is something wrong with the computer.
- Make sure it makes sure you check first .
Down
- Don't give people it.
- Don't go on a website you haven't gone on before .
- Tell mum and dad to get a game on computers .
- strangers don't talk to them online .
- Don't tell people your pass code
- Before you get a game.
- Block viruses .
- Bullying don't talk to people you don't know
- iPhones are dangerous online .
- Don't listen to adds because they can be viruses.
20 Clues: Block viruses . • Don't give people it. • Before you get a game. • Follow people you know . • Watch appropriate videos . • Don't open if it not yours . • iPhones are dangerous online . • computers get lots of viruses . • Don't tell people your pass code • be careful on messages on iPad . • Don't talk to people you don't have. • strangers don't talk to them online . • ...
Cyber safety Steph 2016-05-24
Across
- iPhones are dangerous online .
- Watch appropriate videos .
- Tell someone in your family if you have a virus on the computer .
- computers get lots of viruses .
- Don't give people it.
- Follow people you know .
- be careful on messages on iPad .
- Don't talk to people you don't have.
- a percent if there is something wrong with the computer.
Down
- give your password out to people you don't know.
- Don't go on a website you haven't gone on before .
- Don't tell people your pass code
- Don't listen to adds because they can be viruses.
- Tell mum and dad to get a game on computers .
- Before you get a game.
- strangers don't talk to them online .
- Block viruses .
- Bullying don't talk to people you don't know
- Don't open if it not yours .
- Make sure it makes sure you check first .
20 Clues: Block viruses . • Don't give people it. • Before you get a game. • Follow people you know . • Watch appropriate videos . • Don't open if it not yours . • iPhones are dangerous online . • computers get lots of viruses . • Don't tell people your pass code • be careful on messages on iPad . • Don't talk to people you don't have. • strangers don't talk to them online . • ...
Cyber safety crossword 2016-05-25
Across
- piece of tech used to control something.
- ,a thing that can destroy your device.
- mini game or active.
- place where you can watch videos.
- a thing that many people have.
- ,someone who you trust.
- thing were you get close a page.
- program that lets you find materials on the web.
- who can cheat on a app.
- that only you know.
- device.
- ,A site that supports many other sites.
Down
- ,A site that allows you to search for information.
- something that represents you in a game.
- who teasers and is mean to others.
- that when you look at it you see your face.
- place where can post pictures and comments.
- who trusts you.
- that comes up randomly .
- thing for a device.
- a site were you can post stuff.
- you recommend a thing.
- , a phone,IPad,computer or any device.
23 Clues: device. • who trusts you. • thing for a device. • that only you know. • mini game or active. • you recommend a thing. • ,someone who you trust. • who can cheat on a app. • that comes up randomly . • a thing that many people have. • a site were you can post stuff. • thing were you get close a page. • place where you can watch videos. • who teasers and is mean to others. • ...
Networking & Cyber Ethics 2025-05-22
Across
- Using digital platforms to harass others.
- Someone who gains unauthorized access to data.
- A computer that provides data to other computers.
- Moral principles guiding online behavior.
- Device that connects your home to the Internet.
- Footprint The trail of data left behind by online activity.
- Wide Area Network, larger than LAN.
- Software that protects against malicious programs.
- Local Area Network, usually within a building.
- Storing data on remote servers accessed via the Internet.
Down
- Fraudulent attempt to get sensitive information.
- Software designed to harm a computer.
- A device that forwards data packets between networks.
- A set of rules for data communication.
- A global network connecting millions of computers.
- Security system that monitors and controls incoming and outgoing traffic.
- A computer that receives data from a server.
- Address A unique number assigned to a device on a network.
- Secret code used for authentication.
- Virtual Private Network provides secure Internet access.
20 Clues: Wide Area Network, larger than LAN. • Secret code used for authentication. • Software designed to harm a computer. • A set of rules for data communication. • Using digital platforms to harass others. • Moral principles guiding online behavior. • A computer that receives data from a server. • Someone who gains unauthorized access to data. • ...
Tugas-jaringan koputer dan internet 2024-01-11
10 Clues: jaringan • securities • kelola data • pertukaran data • jaringan komputer • jaringan komputer • komputer dan manfaat • teknis jaringan komputer • dan konfigurasi keamanan jaringan • informasi siatem jaringan komputer
AVSEC QC Crossword #2 2025-04-09
Across
- ___________ questions work best when a specific answer is required or when verifying information. Eg Is this your bag?
- __________ is a phenomenon that will translate into a passive situation whereby the persons questioned withhold information; mask information; block communication
- The auditee must be provided with __________ regarding inspection findings during the post-inspection meeting
- ___________ questions do not imply personal judgment and the inspected party is free to answer what he/she pleases. Eg What do you think of your security system?
- _____________ consists of repeating in simple terms the answers provided by the interviewee. It is a method for clarifying information and a means of verifying what has been stated by the person
- Any enforcement action taken by a State would require ________ Authority
- The auditor should display __________ while conducting an interview
- Security ____________ that are identified early and corrected will also deter acts of unlawful interference
- Security _________ is an inquiry into any act or attempted act of unlawful interference against civil aviation and/or any alleged or suspected instance of non-compliance with a State’s National Civil Aviation Security Programme
- the _____________ Authority determines the categories of compliance to be used during inspections
- The pre-inspection _____________ is a document, which is sent to the airport authority or inspected entity prior to the inspection to collect current information
Down
- A standard is any specification for physical characteristics, configuration, matériel, performance, personnel or procedure, the uniform application of which is recognized as _____________ for the safety or regularity of international air navigation and to which Contracting States will conform in accordance with the Convention.
- Security ___________ evaluation of security needs including the identification of vulnerabilities which could be exploited to carry out an act of unlawful interference, and the recommendation of corrective actions.
- Security ________ is a covert or overt trial of an aviation security measure, which simulates an attempt to commit an unlawful act
- For practical purposes a __________ is a smaller document, one that is easy to handle, would make the inspectors’ job efficient. This kind of document will be complementary to the inspection guide
- Annex 17 requires a state to ____________ a NCASQCP.
- ___________ questions involves the opinion of the person asking the question. It tends to influence the answer. These questions are not objective and should therefore be avoided during inspections
- Benchmark, _________ and auditor are the three components of the inspection concept
- __________ interviews should be part of the inspection
- The Interim Findings Report will serve as a basis for the presentation during the post inspection debriefing and the final _________
20 Clues: Annex 17 requires a state to ____________ a NCASQCP. • __________ interviews should be part of the inspection • The auditor should display __________ while conducting an interview • Any enforcement action taken by a State would require ________ Authority • Benchmark, _________ and auditor are the three components of the inspection concept • ...
PUMPKINS FLY 2013-01-13
Across
- / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
- Permanent member of the UN Security Council that has used its veto power the greatest number of times.
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
- / Location where the first Security Council session took place on 17 January 1946.
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- / Granted permanent membership into the Security Council in 1971.
Down
- / In 2003, the UN Security Council was involved in a crisis that happened in Sudan / The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
- / Number of members in the Security Council.
- / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
- / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
- / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
- / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- / Country that has made the strongest request for a permanent seat in the UN Security Council other than Brazil, India and Japan.
- / UN peacekeeping force sent to Rwanda to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out in the midst of the genocide.
15 Clues: / Number of members in the Security Council. • / Granted permanent membership into the Security Council in 1971. • / Location where the first Security Council session took place on 17 January 1946. • Permanent member of the UN Security Council that has used its veto power the greatest number of times. • ...
PUMPKINS FLY 2013-01-13
Across
- / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / UN peacekeeping force sent to Rwanda to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out in the midst of the genocide.
- / Number of members in the Security Council.
- / Location where the first Security Council session took place on 17 January 1946.
- / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
- / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- Permanent member of the UN Security Council that has used its veto power the greatest number of times.
- / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
- / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
- / Country that has made the strongest request for a permanent seat in the UN Security Council other than Brazil, India and Japan.
- / Granted permanent membership into the Security Council in 1971.
- / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- / In 2003, the UN Security Council was involved in a crisis that happened in Sudan / The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
15 Clues: / Number of members in the Security Council. • / Granted permanent membership into the Security Council in 1971. • / Location where the first Security Council session took place on 17 January 1946. • Permanent member of the UN Security Council that has used its veto power the greatest number of times. • ...
Kuis BK Perundungan 2024-08-15
Across
- sikaptidakinginmengikutsertakantemandalamkelompokbelajarmerupakanperundungansecara
- perundungandilakukandimediasosial
- caramenghindaribulying
Down
- sebabsebabmelakukanbullying
- menghinatemandengankatakatayangkotortermasukperundungan
- salahsatudampaknegatifperundunggan
- memukultemantermasukmelakukanperundungan?
7 Clues: caramenghindaribulying • sebabsebabmelakukanbullying • perundungandilakukandimediasosial • salahsatudampaknegatifperundunggan • memukultemantermasukmelakukanperundungan? • menghinatemandengankatakatayangkotortermasukperundungan • sikaptidakinginmengikutsertakantemandalamkelompokbelajarmerupakanperundungansecara
Safe on internet 2025-04-22
Across
- Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird
- ,, ... Sie Ihre digitale Welt"
- Beispiel für Cyber-Mobbing
- ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen
Down
- du sollst immer auf dein ...gefühl hören
- Cyber-Mobbing meint das absichtliche Beleidigen, Bloßstellen, Bedrohen oder Belästigen im ... oder über das Handy
- erst ... , dann tippen
7 Clues: erst ... , dann tippen • Beispiel für Cyber-Mobbing • ,, ... Sie Ihre digitale Welt" • du sollst immer auf dein ...gefühl hören • Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird • ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen • ...
Safe on internet 2025-04-22
Across
- Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird
- ,, ... Sie Ihre digitale Welt"
- Beispiel für Cyber-Mobbing
- ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen
Down
- du sollst immer auf dein ...gefühl hören
- Cyber-Mobbing meint das absichtliche Beleidigen, Bloßstellen, Bedrohen oder Belästigen im ... oder über das Handy
- erst ... , dann tippen
7 Clues: erst ... , dann tippen • Beispiel für Cyber-Mobbing • ,, ... Sie Ihre digitale Welt" • du sollst immer auf dein ...gefühl hören • Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird • ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen • ...
Information Security 2020-12-17
Across
- a secret word
- the act of stopping something from happening
- positions of authority
- an illegal plan for tricking people
- connected computers around the world
- an action that affects someone in an unwanted way
Down
- illegal activities
- someone allow you to do something
- to take something without the permission
- an arrangement with a bank
- you buy something need this
- computer program
- a set of computer equipment and programs
- someone's right to keep their personal matters secret
14 Clues: a secret word • computer program • illegal activities • positions of authority • an arrangement with a bank • you buy something need this • someone allow you to do something • an illegal plan for tricking people • connected computers around the world • to take something without the permission • a set of computer equipment and programs • the act of stopping something from happening • ...
Information Security 2020-12-17
Across
- a secret word
- the act of stopping something from happening
- positions of authority
- an illegal plan for tricking people
- connected computers around the world
- an action that affects someone in an unwanted way
Down
- illegal activities
- someone allow you to do something
- to take something without the permission
- an arrangement with a bank
- you buy something need this
- computer program
- a set of computer equipment and programs
- someone's right to keep their personal matters secret
14 Clues: a secret word • computer program • illegal activities • positions of authority • an arrangement with a bank • you buy something need this • someone allow you to do something • an illegal plan for tricking people • connected computers around the world • to take something without the permission • a set of computer equipment and programs • the act of stopping something from happening • ...
Internet Security 2012-12-12
Across
- Computer criminals. Otherwise known as 'black-hat hatters'
- Software created to damage or alter the computer data or its operations
- An electronic way of proving your identity (2 words)
- A self-copying program that has the capacity to move from one computer to another without human help, by exploiting security flaws
- Software designed to collect information from computers for commercial or criminal purposes
- Email fraud conducted for the purposes of information or identity theft
Down
- A fraudulent or deceptive act or operation
- To alter using a secret code so as to be unitelligible to unauthorised parties
- A program designed to protect against viruses
- A program designed to prevent spyware from gaining access to the internal network
- A malicious program disguised as innocent-looking files or embedded within legitimate software. It doesn't copy itself (2 words)
- Anonymous:noun
- A program that spreads by attaching itself to executable files or documents
- The unauthorised reproduction or use of copyrighted books, music etc
14 Clues: Anonymous:noun • A fraudulent or deceptive act or operation • A program designed to protect against viruses • An electronic way of proving your identity (2 words) • Computer criminals. Otherwise known as 'black-hat hatters' • The unauthorised reproduction or use of copyrighted books, music etc • Software created to damage or alter the computer data or its operations • ...
Security Awareness 2024-04-22
Across
- Information Security Officer
- Information Security is not just a ______ issue
- What type of password is a strong password with descriptors before or after it?
- The strongest password is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca!, This_p^zz1e!
- What type of calls are made by social engineers?
- This can slow down your computer AND watch everywhere you go on the internet
- This horse can stampede your security defenses for the bad guys and make you look sheepish too!
- Who should you tell if you think you just got phished or pretext called?
Down
- When somebody sends and e-mail with a link to a bogus website
- Our Company may do this on your internet usage
- You should not just heck identity, you should also confirm
- The front line of defense in information security!
- Regular e-mail is sent in this type of text
- As employees of the bank, we should not expect this in the use of our e-mail systems
14 Clues: Information Security Officer • Regular e-mail is sent in this type of text • Our Company may do this on your internet usage • Information Security is not just a ______ issue • What type of calls are made by social engineers? • The front line of defense in information security! • You should not just heck identity, you should also confirm • ...
Security Guard 2023-05-19
Across
- Portions of a case held in camera are held in private before a judge where the press and the public are not allowed to take part.
- Official measures intended to protect the people.
- To move through their assigned areas at regular intervals to detect or prevent violations of the law or problems of any kind.
- A person who is believed to have committed a crime, but has not yet been found guilty.
- The individual who registered to engage in uniformed services
- A roughly cylindrical club made of wood, rubber, plastic, or metal.
Down
- The freedom from injury, harm, danger or loss to personal property whether deliberate or accidental.
- An official or formal statement of facts or proceedings.
- written laws gathered together, usually covering a specific subject matter.
- To deliver, publish, or execute as a required by law.
- Someone's institution that has power.
- Someone who watches over in order to protect and control.
- A variety of conduct that violates public order, disturbs the public, or incites violence.
- Behavior toward another that is marked by civility, respect, attention, consideration, cooperation, or generosity.
14 Clues: Someone's institution that has power. • Official measures intended to protect the people. • To deliver, publish, or execute as a required by law. • An official or formal statement of facts or proceedings. • Someone who watches over in order to protect and control. • The individual who registered to engage in uniformed services • ...
FOOD SECURITY 2024-11-28
Across
- The refrigerator is the best place to perishables.
- Is a kitchen device that can ensure food is cooked to a proper temperature.
- Is not a food safety step when preparing raw meat or poultry?
- cooking with frozen foods by following these for
- safety and quality.
- What temperature does poultry need to reach to be food safe?
Down
- While everyone is at risk of a youngChildren and elderly people have a higher risk
- To avoid cross contamination, keep raw meat from produce.
- Leftovers should be put in the refrigerator or freezer within?
- What foodborne pathogen is often linked to raw eggs?
- Start out with hands surfaces and utensils before cooking
- It is recommended to wash hands with warm water and soap for seconds
- Four steps to help you tackle bacteria
- Only food that contains flour when it is fully cooked
14 Clues: safety and quality. • Four steps to help you tackle bacteria • cooking with frozen foods by following these for • The refrigerator is the best place to perishables. • What foodborne pathogen is often linked to raw eggs? • Only food that contains flour when it is fully cooked • To avoid cross contamination, keep raw meat from produce. • ...
Security Principles 2025-02-25
Across
- A bond must be registered within ____ months after the debt is incurred to obtain a preferential right
- Consent may be required in terms of the Matrimonial Property Act
- To enforce a GNB, a creditor's personal security must first be ______
- Registration of a bond creates a _____ right
- Essential to establish Pledge
- A _____ debt is backed by an asset as collateral
- Type of obligation created by guarantees
Down
- Sureties are ________ in nature and reliant on the default of the principal debtor
- Essential to establish Lien
- A bond registered over movable property
- Business _______ is a formal restructuring process available to financially distressed companies
- Most common type of mortgage bond
- Type of security that arises out of the operation of law
- Type of cession where the asset is temporarily transferred as security for the debt
14 Clues: Essential to establish Lien • Essential to establish Pledge • Most common type of mortgage bond • A bond registered over movable property • Type of obligation created by guarantees • Registration of a bond creates a _____ right • A _____ debt is backed by an asset as collateral • Type of security that arises out of the operation of law • ...
Cyberbullying 2024-11-08
Priceless Puzzle 2023-08-25
10 Clues: CEO • Six notes • Comms Queen • Mastercard HQ • The competition • The card name pre-1979 • Cyber Shield acquisition • LGBTQIA+ card personalisation • Location of the Sustainability Lab • Month of the Rugby World Cup final
security technology 2014-07-07
14 Clues: linklayer • bigger risk • cryptography • internet layer • transport layer • filtering system • application layer • someone reads your mail • virtual private network • trusted key distribution • breakingencryption scheme • transport control protocol • send mail and sign your name • someone intercepts your mail and modify
Internet security 2021-11-30
Across
- prove your identity
- A pot you hope attracts interest
- My words on your video
- A weakness that allows a threat
- Happens when a buffer has too much
- tricks you to click it
Down
- Click all traffic lights in this image
- Blocks incoming and outgoing connections
- identity falsified
- horse with hidden surprise
- denial of service attacks this
- fake email link bait
- encrypt files to extort money
- Our kind doesn't rain
14 Clues: identity falsified • prove your identity • fake email link bait • Our kind doesn't rain • My words on your video • tricks you to click it • horse with hidden surprise • encrypt files to extort money • denial of service attacks this • A weakness that allows a threat • A pot you hope attracts interest • Happens when a buffer has too much • Click all traffic lights in this image • ...
General Security 2025-01-13
Across
- A process to identify security weaknesses
- A minor breach of security procedures or policies
- A software update to fix vulnerabilities
- A secret word or phrase used for authentication
- an incident that involves the unauthorized access, disclosure, or compromise of sensitive or classified information
- Software designed to detect and remove viruses
Down
- A person or thing likely to cause damage/danger.
- The act of stealing confidential information
- A malicious code that replicates itself
- An unauthorized disclosure of classified information
- A digital attack aiming to steal personal information
- A security feature to detect intrusions
- A set of rules for securing information systems
- An attempt to gain unauthorized access
14 Clues: An attempt to gain unauthorized access • A malicious code that replicates itself • A security feature to detect intrusions • A software update to fix vulnerabilities • A process to identify security weaknesses • The act of stealing confidential information • Software designed to detect and remove viruses • A secret word or phrase used for authentication • ...
Security Terms 2022-11-17
Across
- Logical computer network of zombies under control of an attacker
- Large marsupial
- Malware preventing devices from properly operating until a fee is paid
- Attacker who controls a botnet
- Likes to chase mice
Down
- Computer code that is dormant until it is triggered by a specific logical event
- Infected computer under remote control of an attacker
- Database of viruses used to identify infected files
- Has a trunk
- Software code that gives access to a program that circumvents normal security protections
- Publicly released software security update to repair a vulnerability
- Flying mammal
- Man's best friend
- Security program that delivers advertising content in a way that is unexpected and unwanted
14 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Attacker who controls a botnet • Database of viruses used to identify infected files • Infected computer under remote control of an attacker • Logical computer network of zombies under control of an attacker • Publicly released software security update to repair a vulnerability • ...
RESENSI 2024-05-02
Across
- Penulisan kata serapan Pancreas
- Penulisan kata serapan echelon
- Penulisan kata serapan Accent
- bahasa latin resensi
- penulisan kata serapan Hierarchy
- tanggapan serta manfaat bagi pembaca
- Penulisan kata serapan Croissant
- Penulisan kata serapan Khalal
Down
- salah satu konjungsi temporal
- Penulisan kata serapan Phase
- Penulisan kata serapan Variety
- kata merupakan konjungsi
- Penulisan kata serapan Cyber
- Penulisan kata serapan cream
- pernyataan berupa saran
- Penulisan kata Actie
16 Clues: bahasa latin resensi • Penulisan kata Actie • pernyataan berupa saran • kata merupakan konjungsi • Penulisan kata serapan Phase • Penulisan kata serapan Cyber • Penulisan kata serapan cream • salah satu konjungsi temporal • Penulisan kata serapan Accent • Penulisan kata serapan Khalal • Penulisan kata serapan Variety • Penulisan kata serapan echelon • Penulisan kata serapan Pancreas • ...
Social Security Crossword 2015-01-28
Across
- Social Security benefits represent about 38 percent of the income of the _____
- There were 63 million Social Security _____ in 2013
- Benefits to retired workers has _____ in the past 40 years
- 55 percent of Social Security beneficiaries were _____ in 2013
Down
- 67 years old is the _____ retirement age of a person born after 1960
- The average age of disabled-worker beneficiaries in current-payment status has _____ substantially since 1960
- About 47 percent of _____ persons rely on Social Security for 90 percent or more of their income.
- Supplemental Security _____ (SSI)
- One 5th of all beneficiaries in 2013 were _____ or the spouses and children of retired or disabled workers
- 165 million _____ are covered under Social Security
- 9 out of ten individuals age 65 and older receive Social Security _____
11 Clues: Supplemental Security _____ (SSI) • There were 63 million Social Security _____ in 2013 • 165 million _____ are covered under Social Security • Benefits to retired workers has _____ in the past 40 years • 55 percent of Social Security beneficiaries were _____ in 2013 • 67 years old is the _____ retirement age of a person born after 1960 • ...
Hatley Independent Practice 2015-01-28
Security Month 2025-11-03
Across
- A professional who tests computer systems for vulnerabilities. (7, 6)
- The security technique that modifies sensitive details by replacing it with fictitious information. (4, 7)
- Your unique code used to gain access to websites, apps, and more. (8)
- Framework that enables a third party to integrate with Salesforce, potential for them to be compromised. (9, 4)
- An incident where information is accessed, stolen, or exposed without authorization. (6)
Down
- An add-on product to gain extra security for your Salesforce org. (6)
- The security technique that encourages an implicit lack of faith in all users. (4, 5)
- Digitally altered appearances, one of the ways AI could cause security issues. (9)
- Initialism, require a user to provide two or more verification factors to gain access. (3)
- Salesforce encourages the principle of least ___. (10)
- Salesforce recently announced a partnership with this company to enhance Agentforce security. (11)
- Fraudulent communications that appear to come from a legitimate source. (8)
- The EU data privacy and security law. (4)
- This solution is useful in all cases of data loss. (6)
14 Clues: The EU data privacy and security law. (4) • Salesforce encourages the principle of least ___. (10) • This solution is useful in all cases of data loss. (6) • An add-on product to gain extra security for your Salesforce org. (6) • A professional who tests computer systems for vulnerabilities. (7, 6) • ...
Puzzle #48 – “How Social Security Is Funded” 2025-06-30
Across
- - Where collected Social Security money is stored
- - Pays half of the Social Security tax
- - Shares payroll tax responsibility with the employee
- - What current workers are funding for today’s retirees
Down
- - Taxes are collected based on these
- - Social Security is funded through this type of tax
- - Social Security receives this from taxes
- - Main way Social Security is funded
- - Acronym for Federal Insurance Contributions Act
- - Often funded alongside Social Security through payroll
10 Clues: - Taxes are collected based on these • - Main way Social Security is funded • - Pays half of the Social Security tax • - Social Security receives this from taxes • - Where collected Social Security money is stored • - Acronym for Federal Insurance Contributions Act • - Social Security is funded through this type of tax • ...
RAF Knowledge Test 2023-04-04
14 Clues: New CAS • C-17 Name • T in NATO • Overseas base • Overseas Base • Home to ISTAR • Atlas C.1 name • Who formed the RAF • A role of Air Power • QRA fall under this group • How many terms at Cranwell • Air, Space and Cyber Group • An Air power Characteristic • An Air Power Characteristic
Tugas-jaringan koputer dan internet 2024-01-11
10 Clues: jaringan • securities • kelola data • pertukaran data • jaringan komputer • jaringan komputer • komputer dan manfaat • teknis jaringan komputer • dan konfigurasi keamanan jaringan • informasi siatem jaringan komputer
Tugas-jaringan koputer dan internet 2024-01-11
10 Clues: jaringan • securities • kelola data • pertukaran data • jaringan komputer • jaringan komputer • komputer dan manfaat • teknis jaringan komputer • dan konfigurasi keamanan jaringan • informasi siatem jaringan komputer
Principles of CyberSecurity 2025-04-02
Across
- The process of saving data in case it is lost or damaged
- The law that stops that states it is illegal to use or share peoples data except for the reason it was collected
- A type of virus that you think is one thing but is really another thing
- The methods we employ to keep data safe
- a security method where more than one way of determining identity is utilised
- Gaining unauthorised access to a system
- A scam method using email
- A security method where data is put into a code
- The law that says you can have access to any info kept about you
Down
- When an Enterprise has experiences unauthorised access to their data
- Is the data accurate, updated and from a reliable source
- Software that locks your system and you need to pay a few for the code
- The right to keep info about ourselves confidential
- A scam method using SMS
- Where one person pretends to be someone else using confidential information
- landscape The environment in which a system exists and the risks involved in regard to security
- A piece of software designed to block unauthorised access to a system
- The hat colour of a "good" hacker
- Software used to prevent malicious programs from damaging a system
- damage A business may suffer this after a breach
- Security systems that are based on a human feature
- Software designed to damage a system
22 Clues: A scam method using SMS • A scam method using email • The hat colour of a "good" hacker • Software designed to damage a system • The methods we employ to keep data safe • Gaining unauthorised access to a system • A security method where data is put into a code • damage A business may suffer this after a breach • Security systems that are based on a human feature • ...
Midterm Exam Prep 2024-02-29
Across
- Protecting data and resources from unauthorized access.
- This type of denial exists on each ACL.
- Security subnet created by dual firewalls.
- Sophisticated attacks remain undetected.
- A system designed to lure attackers and gather information about their tactics.
- A security zone for suppliers and customers.
- An attack in which the attacker intercepts and analyzes network traffic.
- This type of ACL allows everyone except the one we deny.
- Malware inducing fear tactic.
- This secure remote access protocol should be replaced by telnet.
- Protection of data from unauthorized manipulation or alteration.
- Device authentication mechanism to ensure a secure network.
- Social engineering on high-profile targets.
- It's used for IP translations.
- Policies are used for email delivery.
- This hacker steals valuable information and is often associated with the mafia.
- IPsec protocol that can be used for data encryption.
- This hacker gets in, grabs the goods, and gets out.
- An availability technique.
- Social engineering phase in which the conversation with the victim starts.
- This hackers have political motives.
- This poisoning technique associates a MAC address with the victim's IP address.
- A layer 2 Network segmentation technique.
- Provides a method for mutual authentication of devices within the SAN
- This WSUS server is responsible for testing and approval of patches.
- two worded Layer 2 security configuration on switches.
- These malware can be purchased in a ready-to-use state.
- Social engineering over the phone.
Down
- For this anti-virus scan, you must reboot your system.
- A physical security entry trap
- Storytelling and impersonating legitimate organization.
- In this NIST core function we educate users.
- This standard can be created to apply consistent security configurations.
- FTPs rely on this protocol for security.
- The second Security model layer.
- In this NAC stage we define how NAC should be implemented.
- This Malware spreads through a network.
- Infected computers with a botnet to carry an attack with.
- These appliances can be used to apply quality of service and traffic-shaping.
- IPsec protocol is responsible for establishing security associations (SAs).
- Ethical hacking phase to collect information.
- The best security countermeasure to reduce the risk of a phishing attack.
- A controlled DNS to identify a hacked computer.
- This IPsec operation mode is used for site-to-site VPN connection.
- Protects sensitive data from being exposed
- Email authentication check.
- The file and folder permissions are written in this list.
- Email authentication using signatures.
- File-level encryption.
- Following an authorized personnel to bypass the physical Access Control.
- This type of proxy server can be used for web filtering.
- A temporary power backup.
- A network scanning tool.
- These patches are prioritized even outside of a normal schedule.
54 Clues: File-level encryption. • A network scanning tool. • A temporary power backup. • An availability technique. • Email authentication check. • Malware inducing fear tactic. • A physical security entry trap • It's used for IP translations. • The second Security model layer. • Social engineering over the phone. • This hackers have political motives. • ...
Crossword Period 1 2024-06-04
Across
- Class of conspicuous consumption
- Like a famous fictional knight
- Not quite
- Something precious and portable
- Linked
- Relative of "shy" and "shoo"
- Find intolerable
- Salty or spicy, in speech
- Like the prices on Black Friday or Cyber Monday
Down
- Aggressive military strategy
- For insiders only
- Like a speech or sermon
- You might have this before a big decision
- Opposite of indifference
- Something worse than a lecture
- Link
- Like teacher's answers, sometimes
- All puffed up
- Last ___ of...
- Up in smoke
- Clownish
21 Clues: Link • Linked • Clownish • Not quite • Up in smoke • All puffed up • Last ___ of... • Find intolerable • For insiders only • Like a speech or sermon • Opposite of indifference • Salty or spicy, in speech • Aggressive military strategy • Relative of "shy" and "shoo" • Like a famous fictional knight • Something worse than a lecture • Something precious and portable • Class of conspicuous consumption • ...
Technology 2024-02-16
Across
- to turn on (e)
- stereo
- device
- the touchscreen
- work
- voicemail
- social media
- out of order
- the tablet
- apps
- digital camera
- the charger
- password
- printer
- mouse
- to print
- remote control
Down
- laptop
- the cyber cafe
- the phone
- busy
- to turn off
- make a sound
- slow
- the channel
- the monitor
- the wireless connection
- video call
- keyboard
- TV
- call
- radio
- to turn on (p)
- the internet
34 Clues: TV • busy • slow • work • apps • call • radio • mouse • laptop • stereo • device • printer • keyboard • password • to print • the phone • voicemail • video call • the tablet • to turn off • the channel • the monitor • the charger • make a sound • social media • out of order • the internet • to turn on (e) • the cyber cafe • digital camera • to turn on (p) • remote control • the touchscreen • the wireless connection
16a 2024-07-11
Across
- Paranormal investigation series
- Drummer's intense journey
- Animal city's mystery
- Dysfunctional superhero family
- Boy becomes a hero
- Postapocalyptic road trip
- Alien symbiote film
- Dream master's tale
- Ex-cop's investigations
- Man with multiple selves
- Heist widows' plot
- Cyber world's return
- Antihero group's antics
- Disease thriller film
- Warrior king's realm
Down
- Teen vampire saga
- Picnic-stealing bear
- Arms dealers' story
- Agent's loyalty tested
- Future cop's hunt
- Longhaired princess's tale
- Writer's biographical film
- Street rat's magical tale
- Heroes against corruption
- Balloon house adventure
25 Clues: Teen vampire saga • Future cop's hunt • Boy becomes a hero • Heist widows' plot • Arms dealers' story • Alien symbiote film • Dream master's tale • Picnic-stealing bear • Cyber world's return • Warrior king's realm • Animal city's mystery • Disease thriller film • Agent's loyalty tested • Ex-cop's investigations • Antihero group's antics • Balloon house adventure • Man with multiple selves • ...
Cryptober Puzzle #1 2020-09-30
Across
- The means of proving identity using two authentication factors
- Any weakness in an asset or security protection which would allow for a threat to cause harm
- The act of falsifying the identity of the source of a communication or interaction
- A means of security evaluation where automated tools and manual exploitations are performed by security and attack experts
- Program designed to detect and remove computer viruses
- A social engineering attack that attempts to collect information from victims
Down
- The process of proving an individual is a claimed identity
- A means of isolating applications, code or entire operating systems in order to perform testing or evaluation.
- The number one spot in the OWASP 10
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system
- A security tool that attempts to detect the presence of intruders or the occurrence of security violations
- A place where websites can store local data on a client machine
- The act of collecting frames or packets off of a data network communication
- An update or change on an operating system or application
- An error or mistake in software coding or hardware design or construction
- Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
16 Clues: The number one spot in the OWASP 10 • Program designed to detect and remove computer viruses • An update or change on an operating system or application • The process of proving an individual is a claimed identity • The means of proving identity using two authentication factors • A place where websites can store local data on a client machine • ...
Information Security Terms 2024-01-31
Across
- Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- A software vulnerability that is exploited by attackers before the vendor releases a fix.
- of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- The process of converting data into a code to prevent unauthorized access.
- Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- Software designed to detect and remove malicious software from a computer.
- The process of verifying the identity of a user, system, or device.
- Security: Security measures to protect network endpoints, such as computers and mobile devices.
- Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- A network security device that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A software update designed to fix vulnerabilities or improve security.
16 Clues: The process of verifying the identity of a user, system, or device. • A software update designed to fix vulnerabilities or improve security. • Software designed to detect and remove malicious software from a computer. • The process of converting data into a code to prevent unauthorized access. • ...
Internet Security 2021-05-06
Across
- Where the sender and receiver both use the same key to encrypt and decrypt data
- Hardware or software for protecting against unauthorised access to a network
- A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
- Issue solved by using public-private key encryption
- A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
- Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
Down
- Where a public and private key are used to encrypt and decrypt data
- A trusted organisation that provides digital certificates and signatures
- Malware that is hidden within another file on your computer
- A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
- A generic term for malware where the program attaches itself to another file in order to infect a computer
- A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
- A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
- A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules
14 Clues: Issue solved by using public-private key encryption • Malware that is hidden within another file on your computer • Where a public and private key are used to encrypt and decrypt data • A trusted organisation that provides digital certificates and signatures • Hardware or software for protecting against unauthorised access to a network • ...
SECURITY MEETING 2024-06-10
Across
- REPORT FILED
- IN MOST CASES USES A FIREARM
- 3 POTENTIAL COURSES OF ACTION
- WILL ENGAGE WITH EMERGENCY RESPONDERS
- POLICY TO PROVIDE GUIDANCE
- NUMBER OF COURSES OF ACTION
- REVIEWED ANNUALLY AND REVISED
- COMPLY WITH LAW ENFORCEMENT
Down
- NAME THE PROGRAM TO REPORT TREASTS AGAINST THE BANK
- PROHIBITED WITHOUT APPROVAL
- MONTHLY TRAINING
- RESPONSIBLE FOR SIGNING
- DO NOT ATTEMPT TO
- A OFFICER WILL NOTIFY RELATIVES
14 Clues: REPORT FILED • MONTHLY TRAINING • DO NOT ATTEMPT TO • RESPONSIBLE FOR SIGNING • POLICY TO PROVIDE GUIDANCE • PROHIBITED WITHOUT APPROVAL • NUMBER OF COURSES OF ACTION • COMPLY WITH LAW ENFORCEMENT • IN MOST CASES USES A FIREARM • 3 POTENTIAL COURSES OF ACTION • REVIEWED ANNUALLY AND REVISED • A OFFICER WILL NOTIFY RELATIVES • WILL ENGAGE WITH EMERGENCY RESPONDERS • ...
Thanksgiving Cyber Puzzle 2014-11-18
Across
- A unit of digital information in computer and usually consists of eight bits
- Original name of the Pilgrims
- Software that is designed to detect and destroy computer viruses
- The day after Thanksgiving is called this color
- Software that gathers computer user information and transmits it to the creator without the explicit knowledge or informed consent of the user
- The first Thanksgiving day football game was started by this team (2 words)
- What a baby turkey is called
- Software used to disrupt computer operation or gain access to sensitive data
- Email scam or attempt to trick you into giving your password or personal information
- The first president to pardon a turkey from a Thanksgiving dinner
- A stick, also know as a flash drive, is a plug-and-paly portable device
- Hardware or software that helps keep hackers from using your computer and it watches for outside attempts to access your system and block unauthorized use
- O'Bannon Bank network domain name
- Before throwing this in a container ask if it is something you would want made public
Down
- The computer term the Monday after Thanksgiving is called
- The busiest travel day of the year is the Friday after this holiday
- Type of email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus
- The name of the famous rock where the pilgrims first landed (2 words)
- The name of the ship the pilgrims came to America on
- Popular web search engine
- The longest balloon in the Macy's Thanksgiving Day Parade
- A secure password should contain at least one of these
- This type of corn is hard
- What a male turkey is called
24 Clues: Popular web search engine • This type of corn is hard • What a baby turkey is called • What a male turkey is called • Original name of the Pilgrims • O'Bannon Bank network domain name • The day after Thanksgiving is called this color • The name of the ship the pilgrims came to America on • A secure password should contain at least one of these • ...
Cyber safety crossword 2016-05-17
Across
- information that can sometimes be kept on a USB.
- a folder where you keep your stuff.
- talking to someone.
- a small group of people together.
- small random videos that can sometimes be unwanted.
- a bug in your computer that is stopping it from working
- sites that are use for different things.
- getting something on your device.
- person that cheats in something
- someone that helps you do things
- revealing your true self.
- a public site with people from all over the world.
- showing the violence of a game,show or movie.
- sending a type message to someone else.
- unwanted virus someone is sending.
Down
- can be downloaded to use.
- a remote used for video games.
- a small square showing your face.
- security used to get in your device.
- a site for exploring and information.
- a site you need to be careful with when watching
- closing screens but can easily go back.
- a site that is not meant to be used.
- a character describing you in a game
- people that can be played with in real life and video games.
- information that is kept to your self.
- a person that makes you upset or sad.
- a mini activity.
- a device that you download apps
29 Clues: a mini activity. • talking to someone. • can be downloaded to use. • revealing your true self. • a remote used for video games. • person that cheats in something • a device that you download apps • someone that helps you do things • a small square showing your face. • a small group of people together. • getting something on your device. • unwanted virus someone is sending. • ...
Estelle cyber safety 2016-06-07
Across
- You use to go places bag.
- you can play stuff on it
- you live there
- You write on
- you have to be careful on it
- it can save were you were up to
- some words that you use to get in to some thing
- it affects you iPad or phone or computer
- You were when it's sunny
- You stay away
- You can eat
Down
- You sleep on
- you do work on
- you call people
- can read
- You can message people
- Helps you write
- you use to brush your teeth
- Use to open something
- you can look at to see if you need it
- you can tip and save it
- you can each stuff
- it's like the news on the computer bully's book.
23 Clues: can read • You can eat • You sleep on • You write on • You stay away • you do work on • you live there • you call people • Helps you write • you can each stuff • Use to open something • You can message people • you can tip and save it • you can play stuff on it • You were when it's sunny • You use to go places bag. • you use to brush your teeth • you have to be careful on it • ...
The Cyber Scramble! 2024-04-19
Across
- Internet connection method that requires a phone line and creates a distinctive sound when connecting, known as ____.
- One of the most popular search engines in the world.
- Virtual space where users can communicate in real-time through text messages, known as a ____.
- Security system that controls the incoming and outgoing network traffic, known as a ____.
- Software used to navigate the internet, such as Internet Explorer or Firefox, is called a ____.
- Opposite of downloading, this term refers to transferring data from your computer to the internet, known as ____.
- Company that provides your internet connection is known as an ____.
- Language used to create web pages is known as ____.
- Collection of web pages linked under a common domain, also known as a ____.
- The most used social media platform in the world.
Down
- Unwanted or unsolicited email, commonly referred to as ____.
- Buying and selling goods or services over the internet, commonly referred to as _____.
- A communication method that uses electronic devices to deliver messages across computer networks.
- Unique address used to locate resources on the internet, abbreviated as ____.
- Advertisement that appears in a separate window while browsing the internet, known as a ____.
- Process of transferring data from the internet to your computer is called a ____.
- Wireless networking technology that allows devices to connect to the internet without the need for physical cables, known as ____.
- Type of malicious software that can replicate itself and infect other computer files, known as ____.
- Device that allows computers to communicate over telephone lines, also known as a ____.
- Website where individuals or groups regularly post content on specific topics, known as a ____.
20 Clues: The most used social media platform in the world. • Language used to create web pages is known as ____. • One of the most popular search engines in the world. • Unwanted or unsolicited email, commonly referred to as ____. • Company that provides your internet connection is known as an ____. • ...
Cyber Physical Systems 2025-03-20
Across
- The process of making systems operate without human intervention.
- Using models to replicate real-world behaviors.
- A decentralized and secure digital ledger technology.
- Internet-based computing providing storage and processing power.
- Related to manufacturing and production systems.
- A network of connected devices that communicate over the internet.
- Study of control and communication in machines and living beings.
- The ability of different systems to work together.
- A virtual replica of a physical system for monitoring and analysis.
- Devices that detect and respond to physical changes.
Down
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- The capability of a system to function independently.
- A computing system integrated into a larger system.
- Devices that convert electrical signals into mechanical motion.
- A highly automated, connected, and intelligent manufacturing system.
- Machine-based intelligence that enables decision-making.
- Combining different subsystems into a unified system.
- Large volumes of data used for analytics and decision-making.
- Processing data closer to the source rather than a central server.
20 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
Test Your Knowledge 2023-11-08
Across
- information that can be used to distinguish or trace an individual’s identity either directly or indirectly through linkages with other information
- individuals” who have access to classified information or hold a
- information would would cause "exceptionally grave damage to the national security" if there were an unauthorized release.
- a type of classification that is based on the classification of another source.
- establishes requirements for the protection of classified information disclosed to or developed by contractors, licensees, grantees, or certificate holders (hereinafter referred to as contractors) to prevent unauthorized disclosure.
- information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies but is not classified .
- and result in, or could be expected to result in, the loss or compromise of
- information
- security incidents that indicate knowing, willful, and negligence for security
- establishes standardized reporting requirements across the federal government for all
- the process by which we protect critical information whether it is classified or unclassified that can be used against us. It focuses on preventing our adversaries' access to information and actions that may compromise an operation.
Down
- a security incident involving failure to comply with requirements
- information that is determined to have the potential to cause danger to the national security with unauthorized release.
- or compromise of classified information
- cannot reasonably be expected to) and does not, result in the loss, suspected
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- information that would, with unauthorized release, be expected to cause "serious" damage to the national security.
- a perceived threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
- position.
19 Clues: position. • information • or compromise of classified information • individuals” who have access to classified information or hold a • a security incident involving failure to comply with requirements • and result in, or could be expected to result in, the loss or compromise of • cannot reasonably be expected to) and does not, result in the loss, suspected • ...
