cyber security Crossword Puzzles
Cyber Threats and Security 2026-01-19
Security Awareness Month 'SAM' June 2014 2014-05-19
16 Clues: Hazard • Private • Alertness • Information • Safeguarding • Firmly fixed • On your guard • Feel protected • Anagram ssapse • Mentally lively • Security device • Feeling of worry • Free from danger • Set of principles • Opposite of answers • Touchy easily upset
Science, Technology, and Society 2024-12-15
Across
- computing: Processing data near its source.
- New or improved ideas/products.
- Literacy: Understanding media messages.
- Highest biological group.
- Water vapor in the sky.
- Machine for processing information.
- Exists in a digital world.
- oxide: Laughing gas and pollutant.
- Holding radical views.
- Group of related organisms.
- Range of different things.
- Level under class.
- Basic unit of biological classification.
- Early device to play music.
- change: Global weather patterns shifting.
- Division: Separation within society.
- Games: Interactive digital entertainment.
- Level below phylum.
- Grouping above species.
- resources: Freshwater supply.
- Day-to-day atmospheric conditions.
- hacker: Legal cybersecurity tester.
- Prevents infectious diseases.
- World becoming interconnected.
- Unrest: Protests or disturbances in society.
- Global network of networks.
- Classification of living things.
- warming: Rising Earth's temperatures.
- Services for maintaining health.
- security: Reliable access to food.
- Key electronic component.
- Tools to make life easier.
- Long-term weather patterns.
- Organized in levels.
Down
- Related to DNA or heredity.
- Traffic or decision-making standstill.
- Using resources too much.
- media: Online platforms to connect people.
- A machine to write letters.
- Enhances reality with digital elements.
- security: Protecting digital information.
- migration: Large-scale movement of people.
- Mini computer in your pocket.
- Digital letter service.
- Keeping personal information safe.
- Early system to send messages.
- induced: Caused by nature.
- wide web: Connects websites globally.
- Potent greenhouse gas.
- Community of living and nonliving things.
- Second level in classification.
- gases: Trap heat in Earth's atmosphere.
- dioxide: A major greenhouse gas.
- Machines doing tasks automatically.
- areas: Lands near the sea.
- Variety of life on Earth.
- Uneven distribution of resources.
- Device to talk over distance.
- Tiny particles in the air.
- induced: Result of human activity.
60 Clues: Level under class. • Level below phylum. • Organized in levels. • Holding radical views. • Potent greenhouse gas. • Water vapor in the sky. • Digital letter service. • Grouping above species. • Using resources too much. • Highest biological group. • Variety of life on Earth. • Key electronic component. • Exists in a digital world. • induced: Caused by nature. • Range of different things. • ...
SOCIAL MEDIA 2021-05-01
14 Clues: abonné • publier • détestable • l'humiliation • hors connexion • la haine de soi • l'estime de soi • mettre en valeur • le cyber-harcèlement • un(e) pré-adolescent(e) • le financement participatif • qui est sur la même longueur d'ondes • la peur d'être séparé de son portable • personne qui peut influencer les goûts des autres
MARVEL Cloud Computing and Cyber Security Domain 2022-02-24
Across
- used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- unique name by performing a wide variety of automated tasks on behalf of their master
- a Deployment Model which is a combination of a Private and a Public Cloud
- what does the P stand for in PaaS
- The Cloud Platform that CNA Hardy have chosen
Down
- Hash me D8578edf8458ce06fbc5bb76a58c5ca4
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- a method, often secret, of bypassing normal authentication in a product
- I am a database design which enables the storage and querying of data outside the traditional structures found in relational databases.
- Encrypt the word alphabet using a Caesar cipher with a shift of 3
11 Clues: what does the P stand for in PaaS • Hash me D8578edf8458ce06fbc5bb76a58c5ca4 • The Cloud Platform that CNA Hardy have chosen • Encrypt the word alphabet using a Caesar cipher with a shift of 3 • a method, often secret, of bypassing normal authentication in a product • a Deployment Model which is a combination of a Private and a Public Cloud • ...
cyber security crossword (designed by:the awesome Xiaoyu) 2015-12-31
Across
- The process of translating plaintext into ciphertext
- the process of attempting to acquire sensitive information used for identity theft
- software that records everything you type, then sends it off to whomever installed the software.
- an adjective to describe your professor Xiaoyu
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
Down
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- to choose options in order to create a custom system
- software installed on a network of computers without the owner’s knowledge
- A capability to limit network traffic between networks and/or information systems
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- a bridge between two computer networks
11 Clues: a bridge between two computer networks • an adjective to describe your professor Xiaoyu • to choose options in order to create a custom system • The process of translating plaintext into ciphertext • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
CIA Triad 2024-10-07
Across
- Organizing data based on sensitivity.
- Protecting information from unauthorized access.
- Converting data into a secure format.
- Control over who can view or use data.
- Assessing security practices and compliance.
- Creating a unique representation of data.
- Additional resources to ensure availability.
- Responsible handling of data.
- Guaranteeing information is available when needed.
Down
- Following regulations and standards.
- An occurrence that may compromise security.
- Events that hinder access to data.
- Verifying data integrity through calculations.
- Ensuring data remains unaltered and trustworthy.
- Informing users about security practices.
- Potential causes of data breaches or loss.
- Creating copies of data for restoration.
- Actions taken to minimize risks or impacts.
- Verifying the source and integrity of data.
- Confirming user identity before access.
20 Clues: Responsible handling of data. • Events that hinder access to data. • Following regulations and standards. • Organizing data based on sensitivity. • Converting data into a secure format. • Control over who can view or use data. • Confirming user identity before access. • Creating copies of data for restoration. • Informing users about security practices. • ...
Cyber Crossword 2023 2023-10-06
Across
- A technique where an attacker moves from one compromised system to the next.
- A cyber attack that makes a system unavailable to its intended users.
- The group responsible for defending the organization's information systems during a cybersecurity test.
- A cyber attack where the victim's data is held hostage and the attacker demands a payment.
Down
- Type of authentication that requires users to enter more than just a password.
- An exhaustive method for cracking passwords.
- In this attack, the attacker intercepts communication to eavesdrop or impersonate.
- Triad of cybersecurity tenets.
- Ancient cipher used by the Greeks.
- A group of penetration testers used to simulate the actions of those who are malicious.
10 Clues: Triad of cybersecurity tenets. • Ancient cipher used by the Greeks. • An exhaustive method for cracking passwords. • A cyber attack that makes a system unavailable to its intended users. • A technique where an attacker moves from one compromised system to the next. • Type of authentication that requires users to enter more than just a password. • ...
ACT Vocab 5 2023-03-29
Across
- The young musician displayed a ___________ talent for playing the piano.
- The boxer's ___________ attitude towards their opponents often resulted in violent altercations.
- The idealistic young activist had a ___________ plan to end poverty, but it was unrealistic and impractical.
- The CEO's ___________ approach to business helped the company survive during tough economic times.
- I always like to ___________ a book before deciding whether or not to read it.
- The author's ___________ writing style made the book difficult to read, with unnecessarily long and convoluted sentences.
- The chef was able to ___________ my interest in trying new foods with their creative dishes.
- The politician was accused of being too ___________ to her party, and not considering the needs of her constituents.
- The manager's ___________ towards the employee's complaints did not help to resolve the issue.
- The CEO's ___________ was discovered when he was caught embezzling funds from the company.
- The artist was considered a ___________ by many critics because of his lack of appreciation for classical art.
- The ___________ customer complained about everything, making it difficult for the server to do their job.
- The detective's ___________ attention to detail led to the discovery of crucial evidence in the case.
Down
- The ___________ of quality candidates for the job made it difficult for the hiring manager to make a decision.
- The ___________ security guard was always interfering with the guests' activities.
- The company's ___________ approach to spending meant that there was little money left for important projects.
- In some societies, people with disabilities are still seen as ___________ and excluded from social activities.
- The ___________ child was already reading chapter books at the age of four.
- Learning the ___________ of a scientific field is important for effectively communicating with others in the same field.
- The angry customer was difficult to deal with, but the manager hoped to ___________ them by offering a discount on their next purchase.
- The politician's ___________ towards making promises they couldn't keep was well-known.
- A lack of funding may ___________ the construction of the new building.
- The politician's speech was criticized for using a _________ to hand waive an important issue.
- The company was in a ___________ about whether to invest in new technology or focus on expanding its current product line.
- The new security measures are intended to ___________ the risk of cyber attacks on the company's systems.
25 Clues: A lack of funding may ___________ the construction of the new building. • The young musician displayed a ___________ talent for playing the piano. • The ___________ child was already reading chapter books at the age of four. • I always like to ___________ a book before deciding whether or not to read it. • ...
Danica's puzzle 2023-11-27
Across
- A computer that is suitable for use while travelling.
- type of online fraud where a cyber criminal designs a fake
- the hardware in a computing device where the operating system
- a place where u can store pictures and files and other things and u can loge into the cloud from anywhere and see all your stuff
- text files with small pieces of data like a username and password that are used to identify your computer as you use a network.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- is a common interface that enables communication between devices and a host controller such as a personal computer
- a electronic device with a screen which puts out pixels
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
- System It manages the computer's memory and processes
- video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
- It brings you to a certain website or page, the address.
Down
- performs many of the same functions as a computer,typically having a touch screen, internet access, and a operating system capable of running download applications.
- a peripheral device that enables a user to input text into a computer or any other electronic machinery.
- information that is easy to access which can include management, updating computer databases usually collect aggreations of data, records.
- a generic term used to refer to applications, scripts and programs that run on a device.
- global network of billions of computers and other electronic devices
- a personal computer designed to be used on a desk or table the opposite of portable computers like laptops or tablets
- web-centric laptops that run Google's Chrome operating system
- an application for accessing websites and the Internet.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- a wireless connection that connects you to the internet through radio waves
23 Clues: A computer that is suitable for use while travelling. • System It manages the computer's memory and processes • a electronic device with a screen which puts out pixels • an application for accessing websites and the Internet. • It brings you to a certain website or page, the address. • type of online fraud where a cyber criminal designs a fake • ...
Artificial Intelligence 2024-12-09
Across
- This sector has been profoundly influenced by AI-powered technologies, which have revolutionized supply chain management, sorting and packing, and determining the most efficient shipping routes.
- capable of anticipating maintenance requirements and arranging them in advance of issues, which lowers expenses and downtime.
- AI may also be used to identify fraudulent activity and support strategic decision-making, which improves user engagement and experience
- Quality Precise, timely, and consistent data is the cornerstone of artificial intelligence systems.
- Context provided by AI technologies, but using AI also brings up moral dilemmas as, for better or worse,
- The idea of the technological singularity
- AI is becoming more and more significant in a number of industries, including food, as demonstrated by the robotic tea maker developed by Hi Arya and LeewayHertz.
- AI-powered personalization allows marketing campaigns and product suggestions to be customized to each person's taste.
- Artificial Intelligence is utilized in product design, labor planning, and equipment predictive maintenance.
- (AI) technologies are employed in transportation to forecast aircraft delays, regulate traffic, and enhance the safetyand efficiency of maritime transportation.
Down
- Terms AI is being used to assist automate labor intensive tasks in the legal sector, which saves time and enhances customerservice.
- By analyzing data from blogs, social media, and online platforms to detect trends and influencers, artificial intelligence (AI) has completely transformed the fashion business.
- Artificial Intelligence is utilized in the film business to enhance digital effects, save costs, and expedite production.
- coding Artificial intelligence (AI) is a useful tool in cyber security for anomaly identification, behavioral threat analytics, and false positive resolution.
- selecting the appropriate ai model for a project is essential
- AI tools such as IBM Watson mimic human medical tasks, while NuMedii's AI-driven AIDD platform looks for medication interactions across diseases.
- Robotics integration into the workflow has been pioneered by the manufacturing sector.
- AI is also capable of automating room administration, ensuring security, and detecting fraudulent activity.
- It is advised to conduct further research on the effects of AI on adaptive tests, individualized learning, and creative teaching environments.
- AI is used by banking institutions to enhance loan decision-making, establish credit limits, and find investment possibilities.
20 Clues: The idea of the technological singularity • selecting the appropriate ai model for a project is essential • Robotics integration into the workflow has been pioneered by the manufacturing sector. • Quality Precise, timely, and consistent data is the cornerstone of artificial intelligence systems. • ...
Krzyżówka Angielski 2025-12-10
Across
- – A document describing an event or findings.
- – A secret code to access a system.
- – Protection against threats or attacks.
- – Unauthorized entry into a system.
- – A user identity in a system.
- – Accidental or unlawful release of information.
- – A formal rule or guideline.
- – Proof of an event or action.
- – Someone who monitors or watches activity.
- – A saved copy of data in case of loss.
- – Instructions written for computers.
- – Delay in data communication.
- – Connected computers that share data.
- – To watch or track activity.
- – A set of connected computer components.
- – Rules about what is morally right or wrong.
- – A tool that blocks unwanted network traffic.
- – Searching for threats inside a network.
- – The chance that something bad may happen.
- – Belief that someone or something is reliable.
- – A step taken to solve a problem.
- – A risk or danger.
- – The way a system or user acts.
- – A sign that danger or problems may occur.
- – Permission to use or enter a system.
- – A formal review of systems or processes.
Down
- – Following laws, rules, or standards.
- – A simplified digital structure used to predict or analyze.
- – A prediction based on information.
- – Programs used by a computer.
- – Use of technology to perform tasks without human input.
- – Related to money or cost.
- – A tool used to explore or test a system.
- – Related to investigating cyber incidents.
- – A place where data is kept.
- – Monitoring to make sure rules are followed.
- – A break in security where data is exposed.
- – The right to keep personal data protected.
- – A call for data or a service.
- – A specific area or internet address space.
- – A set of rules for communication.
- – To check a system for issues or threats.
- – A part of a larger software system.
- – Converting information into a secure code.
- – A computer that provides resources to others.
- – Numerical information used for analysis.
- – Learning skills or knowledge.
- – Short Definition (EN)
- – Records of system activities.
- – A weakness that can be exploited.
- – An event that disrupts normal operations.
- – A connection point in a network.
- – Information stored or processed by computers.
- – Something unusual that may signal a problem.
54 Clues: – A risk or danger. • – Short Definition (EN) • – Related to money or cost. • – A place where data is kept. • – A formal rule or guideline. • – To watch or track activity. • – Programs used by a computer. • – A user identity in a system. • – Proof of an event or action. • – Delay in data communication. • – A call for data or a service. • – Learning skills or knowledge. • ...
Krzyżówka Angielski Cyberbezpieczenstwo 2025-12-10
Across
- The current condition of a system.
- Too much data or activity for a system to handle.
- A call for data or a service.
- A formal rule or guideline.
- A mistake or problem in a system.
- Records of system activities.
- To follow the path of an action or data flow.
- Information stored or processed by computers.
- Learning skills or knowledge.
- To protect from harm or attacks.
- A tool that blocks unwanted network traffic.
- Accidental or unlawful release of information.
- The way a system or user acts.
- A place where data is kept.
- Connected computers that share data.
- A connection point in a network.
- Rules about what is morally right or wrong.
- A set of connected computer components.
- Use of technology to perform tasks without human input.
- Unauthorized entry into a system.
- Monitoring to make sure rules are followed.
- A request for information from a database.
- A user identity in a system.
Down
- A tool used to explore or test a system.
- Official rule made by authorities.
- The path data takes to reach a destination.
- Protection against threats or attacks.
- A specific area or internet address space.
- A system on which applications can run.
- Measurements used to evaluate performance.
- Instructions written for computers.
- The ability to manage or direct something.
- Programs used by a computer.
- A part of a larger software system.
- The chance that something bad may happen.
- A risk or danger.
- Converting information into a secure code.
- A secret code to access a system.
- Related to investigating cyber incidents.
- Numerical information used for analysis.
- A sign that danger or problems may occur.
- Information sent from one place to another.
- Belief that someone or something is reliable.
- Studying information to understand it.
- An action taken after an incident.
- Related to money or cost.
- Something unusual that may signal a problem.
- A break in security where data is exposed.
- A simplified digital structure used to predict or analyze.
- Continuous flow of data.
- A written record of actions or events
- A person or system chosen for attack.
52 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A formal rule or guideline. • A place where data is kept. • Programs used by a computer. • A user identity in a system. • A call for data or a service. • Records of system activities. • Learning skills or knowledge. • The way a system or user acts. • To protect from harm or attacks. • ...
Shields and Scrubs Issue #1 2025-08-07
Across
- A tool to assess agitation: Staring, Tone, Anxiety, Mumbling, Pacing.
- Outpatient care setting included in recent safety assessments.
- To calm a tense or aggressive situation.
- If a caller makes these, it may be time to end the call.
- A phone feature that can help reset a tense moment.
- Setting these respectfully can help prevent escalation.
- Team focused on keeping everyone safe across all campuses.
- Calm, clear ________ helps reduce verbal abuse.
Down
- Essential for a safe workplace—no one does it alone.
- A feeling that empathy and listening can help ease.
- Manager overseeing security at ambulatory and admin locations.
- Security Manager at WCMC focused on violence prevention.
- Chief of Security who shares tips in “Chief’s Corner.”
- What all verbal abuse incidents should be promptly turned in as.
- Showing empathy can help build this with others.
- System used to report workplace violence and safety incidents.
- Along with ambulatory, one area Andy helps protect.
- Always treat others with this—even under stress.
- Vocal quality that can calm or escalate a situation.
- Acronym for Walnut Creek Medical Center.
20 Clues: To calm a tense or aggressive situation. • Acronym for Walnut Creek Medical Center. • Calm, clear ________ helps reduce verbal abuse. • Showing empathy can help build this with others. • Always treat others with this—even under stress. • A feeling that empathy and listening can help ease. • A phone feature that can help reset a tense moment. • ...
Media and Technology 2020-11-17
Cyberbullying 2024-11-08
Dylan-cyber safety 2016-05-31
Across
- something that tricks you and stuffs up your computer
- somebody who cares for you
- at least one in a class
- something you use for social media
- somebody who follows you online
- somebody taking something private
- somebody who teaches
- being rude online
- telling something about someone that they don't want to get out
- to keep it to yourself
- a social media program that you have to be 18+ to use
- something that can belong to someone
Down
- talking to someone
- to do with coding and computers
- protects viruses from a device
- something you need for some of your information
- a way of communicating online
- going into something personal with code ect.
- something that you don't control
- a rude way of saying a word in another way
- a social media program
- put something on something
22 Clues: being rude online • talking to someone • somebody who teaches • a social media program • to keep it to yourself • at least one in a class • somebody who cares for you • put something on something • a way of communicating online • protects viruses from a device • to do with coding and computers • somebody who follows you online • something that you don't control • ...
Senior Cyber Crossword 2020-12-24
Across
- A computer screen that doesn’t need a mouse
- A virtual meeting service
- A not-so-yummy way for websites to remember users
- A person who uses digital tools to test or break into secure systems
- A type of legal control imposed on companies
- The _____ system controls the basic functions of your computer
- Software that includes advertising
- Canned meat, or unwanted email
- A person who uses their computer skills to break the law
- Malicious software that extorts money
- A.I.
- A company’s rules about handling private user data
- A switching device that dispatches data to multiple destinations
- A security system that uses aspects of your physical body to identify you as an authorized user
- A website dedicated to user-created videos
Down
- A secret access code
- The act of breaking into a secure system is called a ______
- A method of impersonating a device or user for nefarious purposes
- A pocket-sized phone with extended functionality
- A method of keeping information secret
- Technology and practices that keep your digital information secret
- Cybernetically enhanced human, or digital device brand
- A very shiny kind of metal
- A trip among the animals
- Net _____, a service provider’s guarantee they will not censor internet content
- A method of tricking people into giving away secure information
- The “name” of a website
- A mathematical formula used by computers to automate complex tasks
- A method of breaching a secure system by hiding malicious code inside a file
- A new term for the Internet
30 Clues: A.I. • A secret access code • The “name” of a website • A trip among the animals • A virtual meeting service • A very shiny kind of metal • A new term for the Internet • Canned meat, or unwanted email • Software that includes advertising • Malicious software that extorts money • A method of keeping information secret • A website dedicated to user-created videos • ...
Basics of Cyber 2023-09-01
Across
- Creates a method to keep access to a machine or network
- Hackers for Good
- Information not disclosed to unauthorized individuals
- Purposefully Malicious Hackers
- Propagates like a virus, but uses network services to move around. Executes on its own once it finds a host
- Users must confirm identity to access data and systems
- Computer Program/part of a program that has damaging/unwanted effects on computer
- Leaving a piece of storage in an open location
- Proof of delivery and proof of sender’s identity
- Authorized users are able to access info quickly and easily, Systems work even during difficult times
- Emails pretending to be legit companies
Down
- Uses made up scenario
- Data is accurate and complete, Data is not altered or destroyed
- Favor for a favor
- Psychological manipulation to get people to perform actions or reveal confidential information
- Gathers data and sends it to another entity
- Hundreds or millions of computer that have been compromised
- Sits quietly until a condition is met
- Looks like something useful. Could install backdoors, rootkits, or turn your machine into a zombie
- Self-replicating software, attaches to another program or file. Only runs when the program or file is opened.
- Follow authorized user into secure area
21 Clues: Hackers for Good • Favor for a favor • Uses made up scenario • Purposefully Malicious Hackers • Sits quietly until a condition is met • Follow authorized user into secure area • Emails pretending to be legit companies • Gathers data and sends it to another entity • Leaving a piece of storage in an open location • Proof of delivery and proof of sender’s identity • ...
CYBER SMART CROSSWORD 2024-09-05
Across
- The address of a webpage. Check the validity of it before clicking on it.
- Should be constructed of upper and lower case letters, numbers, and special characters.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- A sequence of words or text used to control access to a computer; similar to a password.
- Unauthorized access to a network, information systems, or application.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- Threatening behavior facilitated through electronic means such as texting.
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
Down
- The process of taking plain text and scrambling it into an unreadable format.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- Verifying identity.
- A wireless technology standard used over short distances using short-wavelength UHF radio waves.
- The “A” in the C-I-A Triad. It ensures authorized users have access.
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- Facebook, Twitter, Instagram, etc. (Two words)
- The “I” in the C-I-A Triad; protection from unauthorized changes.
20 Clues: Verifying identity. • Facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes. • The “A” in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • ...
Cyber Ethics 🧑🏻💻 2025-05-28
Across
- An impression or information about a person taht exists on the internet because of his online activity.
- Illegal intrusion into a computer system or network.
- When software is copied & distibuted illegally.
- Full form of ICT
- Act of being aware of the ethical practices & behaving responsibly & appropiately while using the internet.
- Act of sending a fraud email to a user and misleading him to believe that it is from a trusted source.
- Fraudulently obtaining money from depositors by claiming to be from an authorise bank.
- The process of transforming data into unreadable code.\
- This refers to an act of stealing and misusing someone's ID .
- The rules making everyone respect the privacy of others.
- Security system that prevents unauthorised people from accessing the system or network.
- Legal right granted by the law to the creator for his original work.
- Act of harming or harassing a person through internet.
Down
- Converting Unreadable code to readable data.
- Act of Imitating the language and thoughts of another person as one's original work.
- Unwanted bulk of fraudulent messages from unknown sources.
- A computer program or a set of programs that disrupts the normal functioning of the computer.
- Accessing the internet in an illegal manner.
- Hacking done for a good cause, such as natinal security.
- Criminal activites done though Internet and comouters
20 Clues: Full form of ICT • Converting Unreadable code to readable data. • Accessing the internet in an illegal manner. • When software is copied & distibuted illegally. • Illegal intrusion into a computer system or network. • Criminal activites done though Internet and comouters • Act of harming or harassing a person through internet. • ...
Cyber securuty - 2 2025-07-08
Across
- Exploiting a bug or vulnerability to gain elevated access rights.
- A network protocol for collecting IP traffic information.
- A framework for managing digital keys and certificates.
- A server that acts as an intermediary for requests from clients.
- Reviewing logs to detect suspicious or unauthorized activities.
- An attack where the attacker secretly intercepts communication between two parties.
- A system that actively blocks detected threats.
- A system that monitors and controls incoming and outgoing network traffic.
- Software designed to cause damage or unauthorized actions.
- A security risk originating from within the organization.
- A set of procedures for identifying and handling security incidents.
- Actions taken after gaining access, like data extraction.
- Software or hardware that detects unauthorized access or anomalies.
- Taking advantage of vulnerabilities to gain access.
- Strategies to detect and prevent threats from within the organization.
- Guaranteeing the accuracy and completeness of data.
- A software update designed to fix vulnerabilities or bugs.
- Controlling network access using device MAC addresses.
- Sending IP packets with a false source IP address.
Down
- A framework for developing and executing exploit code.
- Dividing a network into segments to improve security.
- Preventing parties from denying their actions or commitments.
- The process of applying updates to software to fix vulnerabilities.
- A function that converts data into a fixed-size string of characters.
- Creating an exact copy of a digital device for investigation.
- scanning, Checking for open ports to identify services running on a system.
- A European regulation on data protection and privacy.
- The process of sharing cryptographic keys securely.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- A tool that captures and analyzes network traffic.
30 Clues: A system that actively blocks detected threats. • A tool that captures and analyzes network traffic. • Sending IP packets with a false source IP address. • The process of sharing cryptographic keys securely. • Taking advantage of vulnerabilities to gain access. • Guaranteeing the accuracy and completeness of data. • ...
Cyber Society Final 2025-05-16
Across
- In short, Aristotle contends that the best friendship is one that we might call ______ friendship.
- The IT Team's critical tasks include keeping all software and systems ______.
- Assistive _______ products help maintain or improve an individual's functioning related to cognition, communication, hearing, mobility, self-care and visions, thus enabling their health, well being, inclusion, and participation.
- _____ is about protecting your digital information and systems.
- The CEO's Role in cybersecurity includes creating a _____ where everyone cares about digital safety.
- A networked society has major influence on the way we communicate. Instant messaging and video calls connect us _______.
- ____________ is a type of cyberattack where someone tries to trick you into giving away sensitive information like passwords, credit card numbers, or personal details—by pretending to be someone you trust.
- Smart and self-driving cars are a major advancement in transportation, but their reliance on complex technologies and connectivity also introduces several __________ risks.
- According to Aristotle there is only one type of friendship that is pure in its virtue and in its addition to/necessity for a good life. This is the purest form of friendship or "friendship of ______".
- Data integrity refers to the accuracy, completeness, _____, and trustworthiness of data.
- Cyber _____ aim to stop things like data breaches, identity theft, online harassment, and ransomware attacks—all of which cause real harm.
- Artificial __________: The ability for a computer or machine to complete tasks that are usually done by humans.
Down
- Technology can either _____ or undermine friendships.
- Cyberattacks are unique in their subtlety, scope, and psychological impact, often targeting the ______ of modern life rather than just its physical components.
- MFA stands for ______ Authentication: Your data shield
- AI Chatbots: a tool that can understand language and is constantly _____ from it's conversations.
- Citizen science involves public ____________ in scientific research. It connects people to science and nature. Examples include biodiversity monitoring and environmental data collection.
- Chat GPT: A tool that can understand language and is constantly learning from it's conversation. You can ask them a question, and they can provide a human-like response based on ________ data.
- Worm GPT: An AI chat bot that was created for ________ activities.
- Data transfer is ____ data from one computer to another.
- ‘Leaving no one behind’ means ensuring people with disabilities, the older population, those affected by chronic diseases and everyone who needs ____________ technology are included in society and able to live healthy and dignified lives.
- _____ networks amplify voices for social change; Online platforms mobilize support for causes.
- Aristotle's claim is that companion friendships are ______ to a good life.
- A networked society connects _____, organizations, and devices through digital networks.
24 Clues: Technology can either _____ or undermine friendships. • MFA stands for ______ Authentication: Your data shield • Data transfer is ____ data from one computer to another. • _____ is about protecting your digital information and systems. • Worm GPT: An AI chat bot that was created for ________ activities. • ...
Cyber Ethics Rishav 2025-05-30
Across
- Deliberately posting offensive content online
- Unauthorized access to or manipulation of computer systems
- A secret word used to access systems
- THEFT Stealing someone's personal info to impersonate them
- A dishonest scheme online to trick users
- Restriction of access to certain internet content
- Moral principles guiding digital behavior
- A security measure to block unauthorized access
- Using someone else's work without credit
Down
- The process of encoding information for security
- Fraudulent attempt to obtain sensitive information via email
- Software used to detect and remove malicious programs
- Small data files stored on a user's device by websites
- Software designed to harm or exploit systems
- Software that secretly gathers user data
- NEWS False information spread online as real news
- Permission for data collection or actions online
- Bullying that occurs over digital devices
- A global system of interconnected networks
- The right to control personal information online
20 Clues: A secret word used to access systems • Software that secretly gathers user data • A dishonest scheme online to trick users • Using someone else's work without credit • Bullying that occurs over digital devices • Moral principles guiding digital behavior • A global system of interconnected networks • Software designed to harm or exploit systems • ...
Cyber Vocab 1.1 2025-08-29
Across
- A secret string of characters used for authentication.
- Precomputed tables used to reverse cryptographic hash functions.
- Ensuring that information and resources are accessible when needed.
- An attack that attempts common passwords against many accounts.
- When two different inputs produce the same hash output.
- The combination of username and password or other authentication information.
- An authentication method allowing a user to access multiple systems with one login.
- A mix of dictionary and brute force attacks.
- Authentication based on physical or behavioral characteristics - such as fingerprints or facial recognition.
- The practice of protecting systems- networks and programs from digital attacks.
- The process of verifying an individual’s identity before granting access.
- A process of converting data into a fixed-size string - typically used for storing passwords securely.
- The process of verifying the identity of a user or system.
- An organized collection of structured information or data stored electronically.
- A cryptographic attack that exploits the probability of hash collisions.
- Ensuring that information is only accessible to those with proper authorization.
- An incident where unauthorized access to data or systems occurs.
Down
- A method of breaking passwords by systematically entering every word in a dictionary.
- Tracking user actions and activities for auditing and monitoring.
- A digital document used to prove ownership of a public key.
- Physical cards with embedded chips used for secure authentication.
- An attack where stolen credentials are used to gain unauthorized access.
- Maintaining the accuracy and trustworthiness of data.
- An attack that tries all possible combinations to guess a password.
- Restricting access to resources based on user identity and permissions.
- A step-by-step procedure for calculations or problem-solving.
- A sequence of words used instead of a password for authentication.
- A security model consisting of Confidentiality Integrity and Availability.
28 Clues: A mix of dictionary and brute force attacks. • Maintaining the accuracy and trustworthiness of data. • A secret string of characters used for authentication. • When two different inputs produce the same hash output. • The process of verifying the identity of a user or system. • A digital document used to prove ownership of a public key. • ...
SN33003FP Chapter 6 2024-07-06
Across
- Reduces the severity of the loss or the likelihood of the loss from occurring
- Prevent a disaster from occurring
- The common vulnerabilities and exposure (CVE) dictionary assigns unique identifiers to known cybersecurity vulnerabilities and provides brief descriptions
- Gets critical systems to another location while repair of the original facility is under way
- Avoiding complex solutions that users cannot understand or troubleshoot
- Ability to maintain availability during disruptive events
- Restricting access so that users only have the level of access required to do their job
- It is critical to keep an organization functioning when a disaster occurs
- Manages a complete inventory of hardware and software
- Discover the incident
- Plan for potential incidents
Down
- Creating a barrier of multiple defences to prevent attacks
- Identifies specific hardware and software products that the organization uses and supports
- Breaching one layer of security does not compromise the whole system
- Discover unwanted events
- Investigate the cause of the incident and ask questions to better understand the nature of the threat
- Analyzes the dangers posed by natural and human-caused events to the assets of an organization
- Enhances system reliability and availability by distributing them across multiple physical locations
- Manages a full inventory of hardware and software components that are vulnerable to security risks
- Network protocol that provides for redundancy
- Concealing certain types of information to make it more difficult for cyber criminals to attack a system
- The set of procedures that an organization follows after an event occurs outside the normal range
- Assigns all resources into a group based on common characteristics
- Restore the system after a disaster
- Minimizes risk by staying ahead of cybercriminals
- Ensures system availability in the event of a component failure
- Combines multiple physical hard drives into a single logical unit
- A group of servers that act like a single system
- Makes systems tolerant of failure by incorporating redundancy based on the organization's business needs
- Enables a system to continue operating if one or more components fail
- 99.999% uptime, less than 5.26 minutes downtime yearly
31 Clues: Discover the incident • Discover unwanted events • Plan for potential incidents • Prevent a disaster from occurring • Restore the system after a disaster • Network protocol that provides for redundancy • A group of servers that act like a single system • Minimizes risk by staying ahead of cybercriminals • Manages a complete inventory of hardware and software • ...
ICS- Review 1 2025-11-03
Across
- a criminal tactic using scam emails, texts, or calls to trick people into clicking malicious links, downloading malware, revealing sensitive information like passwords or financial details, or transferring money
- the design of this malware is to hold a computer system or the data it contains captive until it makes a payment, usually encrypts your information so you can't access it.
- You should also use this encrypted service to prevent others from intercepting your information over a public wireless network.
- will log the detection and create an alert for a network administrator. It will not take action.
- can block or deny traffic based on a positive rule or signature match.
- (4,2,3) when a user is accessing data.
- (4,2,6) when data is traveling through the network.
- (12,8) attackers get their hands on organisations confidential documents, trade secrets, designs etc.
- (4,10) is the formal process of continuously identifying and assessing risk to reduce the impact of threats and vulnerabilities.
- (9,8) where you could backup or copy all your data to i.e. a NAS, or an external hard drive
Down
- (6-2-7) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some interruption of network service to users, devices, or applications.
- (12,6) is the loss to financial capital social capital and/or market share resulting from damage to an organization's reputation.
- is a computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its code. Usually require end-user interaction to initiate activation and can act on a specific date or time.
- a Cyber Criminal may take control of an organization’s website posting untrue information, is one type of this activity.
- (4,2,7) the financial impact of a security breach can
- (4,2,4) when data is stored in a computer network or device.
- may prevent the loss of irreplaceable data.
- (6,11)is manipulating people into performing actions or divulging confidential information.
- can have sophisticated security policies applied to the traffic passing through them. Can look deeper into the network traffic to block malicious behaviour.
- a type of data breach where the goal is to take sensitive personal data.
20 Clues: (4,2,3) when a user is accessing data. • may prevent the loss of irreplaceable data. • (4,2,6) when data is traveling through the network. • (4,2,7) the financial impact of a security breach can • (4,2,4) when data is stored in a computer network or device. • can block or deny traffic based on a positive rule or signature match. • ...
Cyber Week Crossword 2024-12-04
14 Clues: cyber _____ • _____ Friday • email server • your director • long wait time • place your bids here • ____ Emily Donaldson • the other team state • a discount on an item • one of our team states • what you earn in awardco • where you find all the info • where you request reimbursement • something to use when it's cold
Information Technology Pathways 2022-02-16
Across
- Certificates - _____ Specialist
- Associate - _____security
- Short-Term _____ Certificates (<30 credits)
- Certificates - _____ Information Systems
- Associates - _____ Development
- Short-term - Software _____
Down
- _____ Degrees (60-65 credits)
- Short-term - _____ Media Management
- Associates - Web _____
- - Certificates - _____ Systems
10 Clues: Associates - Web _____ • Associate - _____security • Short-term - Software _____ • _____ Degrees (60-65 credits) • - Certificates - _____ Systems • Associates - _____ Development • Certificates - _____ Specialist • Short-term - _____ Media Management • Certificates - _____ Information Systems • Short-Term _____ Certificates (<30 credits)
Information Technology Pathways 2022-02-16
Across
- Certificates - _____ Specialist
- Associate - _____security
- Short-Term _____ Certificates (<30 credits)
- Certificates - _____ Information Systems
- Associates - _____ Development
- Short-term - Software _____
Down
- _____ Degrees (60-65 credits)
- Short-term - _____ Media Management
- Associates - Web _____
- - Certificates - _____ Systems
10 Clues: Associates - Web _____ • Associate - _____security • Short-term - Software _____ • _____ Degrees (60-65 credits) • - Certificates - _____ Systems • Associates - _____ Development • Certificates - _____ Specialist • Short-term - _____ Media Management • Certificates - _____ Information Systems • Short-Term _____ Certificates (<30 credits)
Financial Market 2025-05-15
Across
- A customized contract to buy or sell at a predetermined future date and price.
- A debt security with a promise to pay a certain sum.
- – An authority supervising the financial market.
- A derivative financial instrument granting the right, but not the obligation, to execute a transaction.
- A debt security confirming the issuer's obligation to repay the debt.
- A financial instrument based on the value of an underlying asset.
- The main instruments traded in the financial market.
- A monetary loan provided under conditions of repayment and interest.
- Long-term financial resources.
- An organized market where financial instruments are traded.
Down
- A place where financial assets are bought and sold.
- A security representing ownership in a company.
- Risk management through derivative contracts.
- A system of economic relations for forming and using monetary funds.
- A measure of investment efficiency.
- A standardized exchange-traded contract for future delivery.
- An intermediary in financial market transactions.
- A party that allocates capital to generate profit.
- A security that represents a bank deposit.
- A universal medium of exchange.
20 Clues: Long-term financial resources. • A universal medium of exchange. • A measure of investment efficiency. • A security that represents a bank deposit. • Risk management through derivative contracts. • A security representing ownership in a company. • – An authority supervising the financial market. • An intermediary in financial market transactions. • ...
Danica's puzzle 2023-11-27
Across
- A computer that is suitable for use while travelling.
- type of online fraud where a cyber criminal designs a fake
- the hardware in a computing device where the operating system
- a place where u can store pictures and files and other things and u can loge into the cloud from anywhere and see all your stuff
- text files with small pieces of data like a username and password that are used to identify your computer as you use a network.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- is a common interface that enables communication between devices and a host controller such as a personal computer
- a electronic device with a screen which puts out pixels
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
- System It manages the computer's memory and processes
- video camera that is connected to a computer or integrated in a device and allows its images to be seen online.
- It brings you to a certain website or page, the address.
Down
- performs many of the same functions as a computer,typically having a touch screen, internet access, and a operating system capable of running download applications.
- a peripheral device that enables a user to input text into a computer or any other electronic machinery.
- information that is easy to access which can include management, updating computer databases usually collect aggreations of data, records.
- a generic term used to refer to applications, scripts and programs that run on a device.
- global network of billions of computers and other electronic devices
- a personal computer designed to be used on a desk or table the opposite of portable computers like laptops or tablets
- web-centric laptops that run Google's Chrome operating system
- an application for accessing websites and the Internet.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- a wireless connection that connects you to the internet through radio waves
23 Clues: A computer that is suitable for use while travelling. • System It manages the computer's memory and processes • a electronic device with a screen which puts out pixels • an application for accessing websites and the Internet. • It brings you to a certain website or page, the address. • type of online fraud where a cyber criminal designs a fake • ...
Crossword 2023-08-29
Across
- A networking device that connects various networks, directs data packets, and facilitates communication between devices within the same network and across the internet.
- The maximum amount of data transmitted over a network or communication channel in each period, measured in bps or multiples, enabling faster data transfer.
- A small data unit that transmits information over a network, breaking down larger pieces into manageable chunks for efficient and reliable transmission.
- A security device or software monitors and controls network traffic based on predefined rules, safeguarding networks and devices from unauthorized access and cyber threats.
- Type of coaxial technology that utilizes digital signaling, allowing the cable to carry only one channel of digital data.
- A set of rules and conventions that govern the exchange and communication of data between devices within a network.
- The OSI layer responsible for data compression.
- A powerful computer that stores, delivers, and manages data, applications, or services to clients over a network, serving various purposes.
Down
- The decrease in the strength or intensity of a signal as it travels through a medium or over a distance.
- This process converts URLs into IP addresses, enabling other devices to locate and access websites and other internet resources (Acronym).
- A device that converts digital data from computers into analog signals for transmission over communication lines like phone lines or cable systems.
- A basic network device that connects multiple devices within a local area network (LAN) and broadcasts data, but lacks intelligent data traffic management.
- The arrangement of devices, connections, and components in a computer network.
- Signals that represent information using binary and have non-continuous wave forms.
- A network that connects devices within a limited geographical area (Acronym).
- Connections that provide high-speed internet access with diverse frequencies, enabling faster data transfer.
- A secure tunnel that hides your internet connection's location, ensuring privacy and security, particularly when using public Wi-Fi or browsing websites (Acronym).
- A device which functions as a traffic controller in a network, directing data only to the appropriate device rather than broadcasting it to all devices.
- An interconnection of devices, that facilitate data exchange and collaboration through communication and resource sharing.
- The Cloud Service model that provides basic configuration options (Acronym).
20 Clues: The OSI layer responsible for data compression. • The Cloud Service model that provides basic configuration options (Acronym). • A network that connects devices within a limited geographical area (Acronym). • The arrangement of devices, connections, and components in a computer network. • ...
Information Security Crossword Puzzle 2019-07-17
Across
- Bypassing security on a system
- Recovery and Investigation
- Which website is used to check your email is compromised or not ?
- Weakness in a system
- Which attack is also known as “piggybacking” ?
- goggle.com is an example of _________ method
- Enemy of Security
- Client for SSH
Down
- Malware which presents unwanted advertisements
- Threat X Vulnerability
- Technology designed to keep the bad guys out
- Everyone should enable Two Factor _____________
- Should not be shared / kept open to everyone
- Similar to virus that replicate from one to another
- ______ is wealth
- distributed ______ of service
- Confidentiality, __________, Availability
- unplanned disruption or degradation of a network
- Common type of social engineering attack
- Provide real-time analysis of security alerts
20 Clues: Client for SSH • ______ is wealth • Enemy of Security • Weakness in a system • Threat X Vulnerability • Recovery and Investigation • distributed ______ of service • Bypassing security on a system • Common type of social engineering attack • Confidentiality, __________, Availability • Technology designed to keep the bad guys out • Should not be shared / kept open to everyone • ...
Cybersecurity/Safety 2024-07-11
Across
- short for any malicious software
- digital brick layered wall of security
- vulnerability no one is aware of yet
- collect/transmit private user info
- identifies device is connected to internet
- appears harmless/conceals malicious intent
- monitors security protection measures
- designs, tests, implements security system
- media manipulation/false perception
- fool's user into providing private info
- analyst that designs data communication
Down
- Also known as "crackers"
- clicking hidden elements "UI redress attack"
- Germany had great message _____ until, Alan Turing
- "penetration testers" works with organization
- software to detect, prevent/remove cpu infections
- compromised computers to carry out attacks
- digital technology harassment
- prudent to use a ____ whenever possible
- locks out user for Bitcoin
20 Clues: Also known as "crackers" • locks out user for Bitcoin • digital technology harassment • short for any malicious software • collect/transmit private user info • media manipulation/false perception • vulnerability no one is aware of yet • monitors security protection measures • digital brick layered wall of security • prudent to use a ____ whenever possible • ...
Got LAB!!! 2024-08-24
Across
- Used all day by all of us
- do between each patient
- Another name for HealthConnect
- Where blueman is located
- Needs to clot to test
- Separates with fast rpm
- Attaches to the needles
- Changes between patients
Down
- 5 min interactions
- Sometimes one, sometimes 3 sets
- Taught to you as a child
- Proper order
- Cyber attack
- Number system in MOB
- Filled with blood
- 21,23, 25
- Highly emphasized by your employer
- Wrap it up
- Still contains clot activator
19 Clues: 21,23, 25 • Wrap it up • Proper order • Cyber attack • Filled with blood • 5 min interactions • Number system in MOB • Needs to clot to test • do between each patient • Separates with fast rpm • Attaches to the needles • Taught to you as a child • Where blueman is located • Changes between patients • Used all day by all of us • Still contains clot activator • Another name for HealthConnect • ...
Crime - Crossword 2025-01-06
12 Clues: shaming • cyber crime • marijuana study • imitation of crime • the criminal career • rational choice theory • the negotiation of justice • biosocial approach to crime • primary and secondary deviance • societal and situational deviance • moral panics and deviance amplificaiton • inadequate socialisation leads to crime
Cyber Treasure Hunt 2014-02-05
Across
- When is the Annual Shareholders Meeting?
- Currently, are there any job openings at Choice Bank?
- On the Community Page, what organization hosts the AirVenture?
- What month was the Target Card scam revealed to the public?
- For Premier Classic Checking, one receives _____ checks for life!
- What is the App Code for Online Banking?
- Choice Bank opened in what month?
- What officer grew up on a farm and enjoys caring for her horses?
- What is the Mobile App called?
- The mortgage resource glossary defines ____ as the local government's specifications for the use of property in certain areas.
- In what month are the Choice Holiday Club checks issued?
Down
- He said it first, "The only real saver is a regular saver"
- What page does the hyperlink "Choice Bankcorp, Inc. Press Releases" take you to?
- Small Business Premier (sole proprietor) is an ___ bearing account.
- For Choice Premier Checking, it has a _____ interest rate
- For the Press Release in February 2013, who received a WBA Scholarship?
- Choice Young Savers accounts have no minimum ____.
- What is the Choice Bankcorp, Inc. symbol that is traded and listed Over the Counter?
- What Online and Mobile banking feature allows you to pay other people within a set time frame for a small fee?
- For Business Money Market, one has ___ withdrawls.
- For a 30-year fixed mortgage rate, it is ___.25%
- In order to receive an account balance through text banking, what must a customer text?
- Who is the Director and Chairman of the Board?
23 Clues: What is the Mobile App called? • Choice Bank opened in what month? • When is the Annual Shareholders Meeting? • What is the App Code for Online Banking? • Who is the Director and Chairman of the Board? • For a 30-year fixed mortgage rate, it is ___.25% • Choice Young Savers accounts have no minimum ____. • For Business Money Market, one has ___ withdrawls. • ...
Cyber Treasure Hunt 2014-02-12
Across
- On the Community Page, what organization hosts the AirVenture?
- Choice Bank opened in what month?
- What is the App Code required to access Choice Bank's Mobile Banking?
- Mobile App, Mobile Browser and ____ Banking are all services provided in Choice Bank's Mobile Banking.
- The ___ feature in our mortgage online services will send the customers emails when rates reach a requested level, or we can email customers rate information on a regular basis.
- For the Business Online Banking services, ACH ___ transfer is useful for companies processing direct deposit for payroll
- What is Choice Bank's Mobile App called as found in the App Store or Google Play?
- The ____ Checking requires a $100 opening deposit, offers No minimum balance requirement, unlimited check writing, ATM/Debit cards, and Easy e-Banking
- What month was the Target Card scam revealed to the public?
- ___ Business Onine Banking includes all of the Basic services, plus the ability to have multiple company users, ACH services, or Desktop Deposit Services
- Choice Young Savers accounts have no minimum ___.
- He said it first, "the only real saver is a regular saver"
- The Security ___ provides Internet safety and password tips, information to help victims of identity theft, and details regarding various scams or alerts.
- For the Press Release in February 2013, who recieved a WBA Scholarship?
- The ___ Deposit Capture Service allows business customers the ability to scan their own deposits directly from their workplace. Image files are sent to the bank for deposit into their business checking account
- The designated number for Text Banking to receive balance and history information is 99__88
- As of 2/10/14, the 30-year fixed mortgage rate is __.25%
- The number of job postings Choice Bank is currenty promoting
Down
- What officer grew up on a farm and enjoys caring for her horses?
- The website _____.com is the site that you are directed to when you want to review activity for your Choice Bank Credit Card
- For Choice Premier Checking, it has a ____ interest rate.
- Choice Bank upholds the Community Bank Advantage:___ decisions, ___ commitment, and ___ investments--all the "blank spaces" are the same word!
- When is the Annual Shareholders Meeting?
- In what month are the Choice Holiday Club checks issued?
- Small Business Premier (sole proprietor) Checking is an ___ bearing account.
- The mortgage resource glossary defines ___ as the local government's specifications for the use of property in certain areas.
- Who is the Director and Chairman of the Board?
- For Business Money Market, one has ___ withdrawls.
- What is the Choice Bancorp, Inc. symbol that is traded and listed Over the Counter?
- In order to receive an account balance through text banking, what must a customer text?
- The 24-hour Telebanking phone number is 1-877-__03-1300
- For Premier Classic Checking, one receives ___ Specialty-Mint wallet-sizechecks for life!
32 Clues: Choice Bank opened in what month? • When is the Annual Shareholders Meeting? • Who is the Director and Chairman of the Board? • Choice Young Savers accounts have no minimum ___. • For Business Money Market, one has ___ withdrawls. • The 24-hour Telebanking phone number is 1-877-__03-1300 • In what month are the Choice Holiday Club checks issued? • ...
Cyber Safety-Georgia 2016-05-25
Across
- proof that something is unsafe online
- an example of social media
- people try offend you online
- don't expect emails from them
- don't listen to them
- to keep you safe online
- something you should not give to people
- place on the internet
- media staying in touch online
Down
- check with them first
- block your computer
- keep your account private
- talk online
- don't give people it
- mail online
- World Wide Web
- sending someone information
- being on the internet
- don't open them
- Can effect your computer
20 Clues: talk online • mail online • World Wide Web • don't open them • block your computer • don't give people it • don't listen to them • check with them first • being on the internet • place on the internet • to keep you safe online • Can effect your computer • keep your account private • an example of social media • sending someone information • people try offend you online • ...
Cyber safety Steph 2016-05-25
Across
- Follow people you know .
- When something is wrong with the computer.
- Tell someone if your computer is sick.
- Don't talk to people you don't know online .
- Take care. Make sure you check it first .
- Don't tell people this
- Don't open if it's not yours .
- Watch appropriate videos .
- Ask to get a game on computers .
Down
- Be careful where you search takes you
- Don't tease people online
- Block viruses
- don't give too much away
- Listen to it
- Don't talk to people you don't have.
- Before you get a game.
- time Limit it
- Don't trust these as they can trick you
- An electronic Apple
- Don't drop them
- Annoying email messages
21 Clues: Listen to it • Block viruses • Don't drop them • An electronic Apple • time Limit it • Before you get a game. • Don't tell people this • Annoying email messages • don't give too much away • Follow people you know . • Don't tease people online • Watch appropriate videos . • Don't open if it's not yours . • Ask to get a game on computers . • Don't talk to people you don't have. • ...
Cyber IWD Crossword 2025-03-06
Across
- The official theme announced by UN Women Australia for International Women’s Day (IWD) 2025
- This number makes up the percentage of women in the cybersecurity workforce in Australia.
- The interview series by PwC’s She’s Here in Cyber and Technology program is called “She’s Here to____”.
- Gender _______; a key focus on closing the gap in opportunities.
- The woman who created the first computer program.
- Australia’s first International Women’s Day was held in 1928 in _____.
- Symbolic color often associated with women's rights.
- UN Sustainable Development Goal to achieve gender equality and empower all women and girls. (including the number)
- Australia's first female Prime Minister.
- Beatrice Page's parents think she can help them with issues with _______ because she works in Cyber and Privacy.
- The person in C&P team has two birds called Roki and Pipin.
Down
- PwC’s network focused on gender equality.
- The person in C&P team was born in Macedonia in Europe.
- The country where the idea of International Women’s Day was initiated.
- Natalie Mu played _____ gaming console as a child.
- The person in C&P team has hiked the Annapurna Circuit in Nepal.
- The person in C&P team has small disco lights at home and often will have a "dance off" on Friday afternoons with her kids to get into the mood for the weekend and celebrate the work week being done.
- Year 190_ women got the vote in Australia through The Commonwealth Franchise Act.
- International Women's Day's primary goal is to create this for women globally.
- The month International Women's Day is celebrated.
20 Clues: Australia's first female Prime Minister. • PwC’s network focused on gender equality. • The woman who created the first computer program. • Natalie Mu played _____ gaming console as a child. • The month International Women's Day is celebrated. • Symbolic color often associated with women's rights. • The person in C&P team was born in Macedonia in Europe. • ...
Cyber Cross puzzle 2025-03-12
Across
- Malware disguised as legitimate.
- BONUS: THIS IS THE PASSCODE FOR THE ANSWERS. Don't use "x" for your x.
- Records keystrokes secretly.
- Demands payment to unlock data.
- Code injection attack.
- Exploit unknown to developers.
- Monitors and controls network traffic.
- Malware that hides its presence.
- Network of infected computers.
- Secure private network connection.
- Software designed to harm.
Down
- Software to detect and remove malware.
- Overwhelms server with traffic.
- Systematic password guessing.
- Hidden access to a system.
- Software update to fix vulnerabilities.
- Converts data into code.
- Authentication: Adds extra security layer.
- Manipulating people for info.
- Malware that spies on users.
20 Clues: Code injection attack. • Converts data into code. • Hidden access to a system. • Software designed to harm. • Records keystrokes secretly. • Malware that spies on users. • Systematic password guessing. • Manipulating people for info. • Exploit unknown to developers. • Network of infected computers. • Overwhelms server with traffic. • Demands payment to unlock data. • ...
Block 6 Cyber Chapter 2 2020-08-10
Across
- the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
- malicious logic that is inserted into an executable file to be triggered at a later time
- a technology that tracks and records key strokes hoping to get sensitive information like usernames and passwords
- an infiltration software that secretly monitors unsuspecting users
- associated with individuals using hacking skills within the law to conduct security assessments and help find vulnerabilities
- self-contained malware that has the ability to copy itself without parasitically infecting the host code
- an individual that utilizes cyber training to hack for the government or an ally
Down
- a means and method used by hackers to retain access to a system or network
- an attempt to fraudulently acquire sensitive information such as user’s name, passwords, or credit card information by pretending to be a trustworthy entity in an electronic communication
- an attack on a computer that exposes an undiscovered or unpatched vulnerability
- the action taken by a nation-state or international organization to use and/or target computers and networks to achieve military objectives
- free computer software that contains advertisements
12 Clues: free computer software that contains advertisements • an infiltration software that secretly monitors unsuspecting users • a means and method used by hackers to retain access to a system or network • an attack on a computer that exposes an undiscovered or unpatched vulnerability • an individual that utilizes cyber training to hack for the government or an ally • ...
Cyber Security Awareness (3) 2024-10-15
Across
- Probability of a cyberattack or data breach causing loss or exposure to an organization
- Software or code that cybercriminals use to damage or disrupt devices, steal data, or gain unauthorized access
- practice of protecting systems, networks, and programs from digital attacks
Down
- Text files that contain small amounts of data about a user that can be used for both good and bad purposes
- malicious program that can spread to a computer or network router without the user's knowledge or permission
5 Clues: practice of protecting systems, networks, and programs from digital attacks • Probability of a cyberattack or data breach causing loss or exposure to an organization • Text files that contain small amounts of data about a user that can be used for both good and bad purposes • ...
cyber threats and security 2026-01-19
Cyber threats and security 2026-01-19
5 Clues: It is a criminal activity • It is a ilelgal entry into a computer system • It is is a process of monitoring and capturing • It is an act of imitating or making a false copy • It is an attacker harasses a victim through e-mails
The Capuanos 2025-09-26
9 Clues: Bachelors • Giannis car • Bachelorette • Their first pet • Carol is a mega… • Honeymoon location • Carols ideal vacation • Gianni’s football team • Gianni’s ideal vacation
The Capuanos Trivia 2025-09-26
9 Clues: Bachelors • Giannis car • Bachelorette • Their first pet • Carol is a mega… • Honeymoon location • Carols ideal vacation • Gianni’s football team • Gianni’s ideal vacation
ICT year 7 keywords 2012-03-20
Across
- search searching a specific keyword
- a form of database
- to sort or categorize
- to search
- mail over the internet
- use policy aup
- an online folder
- an answer
- trustworthy
- statistics
- a question or inquiry
Down
- important or to the subject
- a form of chart for Data
- an online dictionary
- bulling electronically
- a way of showing results
- proof of some sort
- a type of questionnaire
- information to go into a database
19 Clues: to search • an answer • statistics • trustworthy • use policy aup • an online folder • a form of database • proof of some sort • an online dictionary • to sort or categorize • a question or inquiry • mail over the internet • bulling electronically • a type of questionnaire • a form of chart for Data • a way of showing results • important or to the subject • information to go into a database • ...
Cyber Security Month 2021 2021-09-15
Across
- Social engineers use this to trick you
- The practice of being diligent about your online activities
Down
- Assurance that information is accurate and Trustworthy
- Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
- not disclosing information to unauthorized individuals
5 Clues: Social engineers use this to trick you • Assurance that information is accurate and Trustworthy • not disclosing information to unauthorized individuals • The practice of being diligent about your online activities • Engineer Someone who takes information from many sources and uses them to piece together a bigger puzzle
Cyber Security Awareness (2) 2024-10-15
Across
- Type of malware that downloads onto a computer disguised as a legitimate program
- Automated process of collecting and analyzing indicators of potential security threats, then triaging these threats with appropriate action
Down
- Foftware that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
- Someone who gains access to a computer system or network without authorization
- Form of data security in which information is converted to ciphertext
5 Clues: Form of data security in which information is converted to ciphertext • Someone who gains access to a computer system or network without authorization • Type of malware that downloads onto a computer disguised as a legitimate program • ...
Cyber Security Awareness (1) 2024-10-15
Across
- Fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging
- Network security device that separates a trusted internal network from an external network deemed untrustworthy, such as the internet
Down
- Type of malware that prevents users from accessing their devices or files, and demands payment to restore access
- Ensures that only genuine, authorized users can access online accounts, keeping bad actors out
- A new, improved, or fixed version of software that addresses security vulnerabilities
5 Clues: A new, improved, or fixed version of software that addresses security vulnerabilities • Ensures that only genuine, authorized users can access online accounts, keeping bad actors out • Type of malware that prevents users from accessing their devices or files, and demands payment to restore access • ...
Cyber threats and security 2026-01-19
Across
- process of converting into a a form that is not readable
- to an illegal entry into a computer system
Down
- process of converting of encrpted information back into to readable form
- a computer compromised by malware
- the receiver is tricked by making him/her believe that the massage is received from trusted source
5 Clues: a computer compromised by malware • to an illegal entry into a computer system • process of converting into a a form that is not readable • process of converting of encrpted information back into to readable form • the receiver is tricked by making him/her believe that the massage is received from trusted source
Ancaman, Tantangan, Hambatan dan Gangguan terhadap Integrasi Nasional 2025-05-05
Across
- solusi menghadapi ATHG
- ancaman dari luar
- usaha yang membahayakan kedaulatan negara
- hambatan integrasi nasional
- proses membentuk suatu keseluruhan
- faktor pendorong integrasi
- identitas nasional
- ancaman di bidang ideologi
Down
- ancaman di bidang sosial budaya
- ancaman hibrida
- tantangan mewujudkan integrasi nasional
- ancaman disintegrasi
- ancaman dari dalam negeri
- ancaman di bidang ekonomi
- ancaman di bidang politik
- hal internal yang menghalangi upaya untuk mencapai tujuan
- meningkatkan kerjasama antar negara
17 Clues: ancaman hibrida • ancaman dari luar • identitas nasional • ancaman disintegrasi • solusi menghadapi ATHG • ancaman dari dalam negeri • ancaman di bidang ekonomi • ancaman di bidang politik • faktor pendorong integrasi • ancaman di bidang ideologi • hambatan integrasi nasional • ancaman di bidang sosial budaya • proses membentuk suatu keseluruhan • meningkatkan kerjasama antar negara • ...
Cyber Safety-Georgia 2016-05-25
Across
- proof that something is unsafe online
- an example of social media
- people try offend you online
- don't expect emails from them
- don't listen to them
- to keep you safe online
- something you should not give to people
- place on the internet
- media staying in touch online
Down
- check with them first
- block your computer
- keep your account private
- talk online
- don't give people it
- mail online
- World Wide Web
- sending someone information
- being on the internet
- don't open them
- Can effect your computer
20 Clues: talk online • mail online • World Wide Web • don't open them • block your computer • don't give people it • don't listen to them • check with them first • being on the internet • place on the internet • to keep you safe online • Can effect your computer • keep your account private • an example of social media • sending someone information • people try offend you online • ...
Cyber safety,max 2016-05-31
Across
- computer loading apps with out you realising.
- calling calling you rude words
- info on you or others .
- to spread lies or the truth
- annoying and teasing you .
- a program used to detect ,prevent and remove virus's on mobile devices to stop getting virus on your apps.
- it means someone shows you a violence video.
- to stalk people online.
- is when you feel bad and sad and down .
- email someone who lies to you online.
- someone who cheats or be mean online .
Down
- Encouraging it means that someone will try to make you watch or read bad stuff.
- rude words to you online.
- it's about who you are and were you live.
- law its like a law on the internet.
- crimepeople who hack
- it's where you type down numbers and letters.
- Predator a mean person online .
- it's used to go on online stuff.
- A brief sentence of you
- it means you get a sad feeling in your stomach from a mean message .
- it's about you and stuff and people.
- its where someone gets set up on the electronics and the person who is scaming gets there info online.
23 Clues: crimepeople who hack • info on you or others . • A brief sentence of you • to stalk people online. • rude words to you online. • annoying and teasing you . • to spread lies or the truth • calling calling you rude words • Predator a mean person online . • it's used to go on online stuff. • law its like a law on the internet. • it's about you and stuff and people. • ...
Cyber ethics Crossword 2025-05-22
Across
- - Unauthorized use or reproduction of software.
- - Software that secretly gathers user information.
- - Permission to do something, especially online.
- - The right to keep personal data safe from unauthorized access.
- - A secret string of characters used for authentication.
- - Harmful software designed to damage or disrupt systems.
- - Unauthorized access to or control over a computer system.
- - Informing authorities about suspicious or harmful online behavior.
- - The state of being anonymous online.
- Footprint - The trail of data left by digital activity.
Down
- - A network security device that monitors and filters traffic.
- - Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- - A program that detects and removes malware.
- - Rules users must agree to when using digital services.
- - A dishonest scheme or fraud online.
- - Bullying that takes place over digital devices.
- - Moral principles that govern behavior.
- - Legal right that grants the creator exclusive use of their work.
- - The process of converting data into a secure format.
- - Posting inflammatory content online to provoke others.
20 Clues: - A dishonest scheme or fraud online. • - The state of being anonymous online. • - Moral principles that govern behavior. • - A program that detects and removes malware. • - Unauthorized use or reproduction of software. • - Permission to do something, especially online. • - Bullying that takes place over digital devices. • ...
Networking & Cyber Ethics 2025-05-22
Across
- Using digital platforms to harass others.
- Someone who gains unauthorized access to data.
- A computer that provides data to other computers.
- Moral principles guiding online behavior.
- Device that connects your home to the Internet.
- Footprint The trail of data left behind by online activity.
- Wide Area Network, larger than LAN.
- Software that protects against malicious programs.
- Local Area Network, usually within a building.
- Storing data on remote servers accessed via the Internet.
Down
- Fraudulent attempt to get sensitive information.
- Software designed to harm a computer.
- A device that forwards data packets between networks.
- A set of rules for data communication.
- A global network connecting millions of computers.
- Security system that monitors and controls incoming and outgoing traffic.
- A computer that receives data from a server.
- Address A unique number assigned to a device on a network.
- Secret code used for authentication.
- Virtual Private Network provides secure Internet access.
20 Clues: Wide Area Network, larger than LAN. • Secret code used for authentication. • Software designed to harm a computer. • A set of rules for data communication. • Using digital platforms to harass others. • Moral principles guiding online behavior. • A computer that receives data from a server. • Someone who gains unauthorized access to data. • ...
security technology 2014-07-07
14 Clues: linklayer • bigger risk • cryptography • internet layer • transport layer • filtering system • application layer • someone reads your mail • virtual private network • trusted key distribution • breakingencryption scheme • transport control protocol • send mail and sign your name • someone intercepts your mail and modify
Security Training 2021-12-14
Across
- Would your bank loan on a car that is 12 years old?
- Store Emergency Response Plan can be found in what binder?
- This is located at each desk and teller window
- One way to deter robber
- Located behind teller row and night drop safe
- In the event of a robbery, who do we call?
- Building #2501 lobby
Down
- Secondary Evacuation Location
- House placed in window at front of the building
- Amount you are allowed to have in top drawer
- Our ____ is most important while at work
- What is this number, 877-511-9797?
- Interior Lockdown Location
- In the event of a robbery, bomb threat, hostage or kidnapping situation, we must _____.
14 Clues: Building #2501 lobby • One way to deter robber • Interior Lockdown Location • Secondary Evacuation Location • What is this number, 877-511-9797? • Our ____ is most important while at work • In the event of a robbery, who do we call? • Amount you are allowed to have in top drawer • Located behind teller row and night drop safe • This is located at each desk and teller window • ...
PECS SECURITY 2022-11-17
14 Clues: - ROLE • - COMPANY • - CONTROL • - MAKE OF VAN • - MOVE PRISONERS • - PROVE INNOCENCE • - LOCATION OF OCC • - CONTRACT DIRECTOR • - SECURES PRISONERS • - LET YOU IN PLACES • - SOMETHING HAPPENED • - LET PRISONER LEAVE • - SENT BACK TO PRISON • - WHAT NEEDS TO BE DONE TO AN OFFBAILER
Security Training 2022-12-09
Across
- is our alarm company
- plan is a proactive plan on how to maintain services during an emergency.
- true or false, we can discuss a robbery with the media
- is how often our alarms are tested
- the number of fire extinguishers in the branch
- the silent alarm when it is safe to do so
- is our primary meeting place
Down
- emails when sending out personal information
- is the order you fill the bag if being robbed
- is our secondary meeting point
- is the first reaction during an active shooter
- each member when they walk in
- is the color of paper used to signal the police that the branch is safe
- is our minimum number of tellers on the line
14 Clues: is our alarm company • is our primary meeting place • each member when they walk in • is our secondary meeting point • is how often our alarms are tested • the silent alarm when it is safe to do so • emails when sending out personal information • is our minimum number of tellers on the line • is the order you fill the bag if being robbed • ...
Food Security 2024-11-28
Across
- Food from grains like wheat or rice (5 letters)
- A place to buy food (6 letters)
- Lack of food (6 letters)
- Machine used in farming (7 letters)
- Insects that help pollinate crops (4 letters)
- Nutritious food (4 letters)
Down
- Group of farm animals (4 letters)
- Person who grows crops (6 letters)
- Period with little or no rain (6 letters)
- Harmful insect for crops (4 letters)
- Food from milk (6 letters)
- A place where food is grown (4 letters)
- Natural water from the sky (4 letters)
- Nutritious drink from cows (4 letters)
14 Clues: Lack of food (6 letters) • Food from milk (6 letters) • Nutritious food (4 letters) • A place to buy food (6 letters) • Group of farm animals (4 letters) • Person who grows crops (6 letters) • Machine used in farming (7 letters) • Harmful insect for crops (4 letters) • Natural water from the sky (4 letters) • Nutritious drink from cows (4 letters) • ...
Data Security 2025-12-03
vis a vis 2019-02-18
Across
- the villain who calls her the queen dwells
- moder of the proyagonist
- they call her the gypsy
- protagonist blond hair
- the trafficker
- friend of the ex policeman
- director of the prison
Down
- security guard murdered
- yonki girl
- the one thtat dies in the first chapter
- husband of the security guard
- the one thtat burned her husband
- ex gilfrend of the blak gypsy
- fader of the potagonist
- security guard who was a policeman
15 Clues: yonki girl • the trafficker • protagonist blond hair • director of the prison • security guard murdered • they call her the gypsy • fader of the potagonist • moder of the proyagonist • friend of the ex policeman • husband of the security guard • ex gilfrend of the blak gypsy • the one thtat burned her husband • security guard who was a policeman • the one thtat dies in the first chapter • ...
Cyber bullying Crossword 2022-10-17
Across
- make sure and have all your blank settings on
- to prevent cyberbullying from occurring you must understand exactly what it is
- a person who speaks and acts of an individual or cause
- using digital devices,sites, and apps to intimidate, harm and upset someone
- if you are being cyberbullied blank the person
- is a person who is present at an event or incident but does not take part
- blank when you post a picture that you don't want anyone else seen
- untrue rumors
- saying" I know where you live"
- out blank blank out of all your accounts
- in order to raise blank you need to start a movement, create a club, build a campaign, or host an event to bring awareness to cyberbullying
- don't cyberbully blank
- make sure all your accounts are on blank
- never open blank or unsolicited messages
- aggressive and vulgar things posting
- keep your photos blank
Down
- gaining info from someone you just met
- getting in someones account without consent
- including everyone in a group chat except one person
- do not blank it will make the situation worse
- to help prevent cyberbullying you could blank yourself
- offensive messages
- harassment
- if you are being cyberbullied blank the messages sent
- keep your blank private at all times
- posting an embarrassing pic of someone
26 Clues: harassment • untrue rumors • offensive messages • don't cyberbully blank • keep your photos blank • saying" I know where you live" • keep your blank private at all times • aggressive and vulgar things posting • gaining info from someone you just met • posting an embarrassing pic of someone • make sure all your accounts are on blank • never open blank or unsolicited messages • ...
Cyber Crossword (Stella) 2020-10-15
Across
- Highest level or privileges can change global settings.
- Software that prevents, detects, and removes threats on your computer.
- A small window that suddenly opens
- A computer program that can spread by modifying other computer programs and inserting its own code.
- A collection of stored data and files.
- The primary software that runs applications and manages all the hardware.
- Updates that address and fix security vulnerabilities within a program or product.
- A copy or snapshot of the state of your computer.
- Android, iOS, Blackberry.
- Protects confidential data from attackers.
- Programs that only work on one type of OS.
Down
- Provided to secure and trustworthy sites.
- Graphical User Interface.
- What a user is allowed and not allowed to do.
- Keyboard/mouse/monitor.
- Programs that work on multiple OS.
- Takes up less space on your hard drive.
- Used to customize a browser.
- An intermediary between the user and the internet.
- A set of computer instructions that tell the computer how to work.
- 32-bit and 64-bit.
21 Clues: 32-bit and 64-bit. • Keyboard/mouse/monitor. • Graphical User Interface. • Android, iOS, Blackberry. • Used to customize a browser. • A small window that suddenly opens • Programs that work on multiple OS. • A collection of stored data and files. • Takes up less space on your hard drive. • Provided to secure and trustworthy sites. • Protects confidential data from attackers. • ...
Cyber Safety Irene 2016-05-30
Across
- Engine something you can search information on
- a program that lets you find,see and hear material on website
- a giant collection of networks of networks
- an add that automatically comes onto the screen
- a starting point on the web
- Tag the nickname a user has chosen to be identified by when playing Internet Games
- a security system to keep your things safe
- a search engine visual for parents mostly
- to upload information to the web
Down
- a bad thing that can ruin your device
- a website to search with
- a name that a user selects for you
- a thing you can chat on with family and friends
- to send information from your computer to another computer
- an adviser that teaches you how to use technology
- a secret code to open something
- a program,or set of instructions
- a method of sending short messages
- something you can send to others
- a small hand-controlled divide for pointing and clicking
20 Clues: a website to search with • a starting point on the web • a secret code to open something • something you can send to others • to upload information to the web • a program,or set of instructions • a name that a user selects for you • a method of sending short messages • a bad thing that can ruin your device • a search engine visual for parents mostly • ...
Cyber safety- Caitlin 2016-06-08
Across
- computer or iPad user who try's to gain unauthorised access to your computer or iPad
- social network that you should be careful on
- trying to get you to do something by telling you something that is not true
- lie on your computer
- you don't want to tell people
- - you should always be this online
- you do when you get new apps on a iPad
- you watch
- to make you feel safe
- a letter to someone on the computer
- someone a message on your device
Down
- popular a site where you watch and post videos
- what they really are
- mean to one person over again
- person you don't know
- your computer is sick
- stop something coming to you
- to get into a website
- school page is a -------
- -to check with an adult
- call someone you can trust this
21 Clues: you watch • what they really are • lie on your computer • person you don't know • your computer is sick • to get into a website • to make you feel safe • -to check with an adult • school page is a ------- • stop something coming to you • mean to one person over again • you don't want to tell people • call someone you can trust this • someone a message on your device • ...
Cyber safty dona 2016-06-08
Across
- Service Provider (ISP)
- unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can appear in many forms, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.
- copy a file from one of your computer system to another via the Internet (usually your computer or a mobile phone, it can also be dangerous sometimes . )
- unwanted messages which may contain threats
- and blogs
- computing
- scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
- generic term for any company that can connect you directly to the Internet.
- even families and acquaintances
- on the Internet threatening or implying violent behavior, displaying suicidal tendencies
- fights where scornful and offensive messages are posted on websites ,
- spam
Down
- virus
- excluding someone from an online group
- viruses are maliciously-designed programs that infect computers by hiding themselves inside normal, harmless programs.
- to channel surfing on a television, Internet one involves users browsing around various websites following whatever interests them.
- that some people that will hack in really easily and will Steal thing.
- into someone's email or other online accounting and sending messages that will cause embarrassments
- internet-related illegal activity.
- when criminals post fake Facebook “like” buttons to webpages. Users who click the button don’t “like” the page, but instead download malware.
- is a virus also a worm which spreads by .
- number tracking feature of Internet browsers that shows all the recent websites visited.
22 Clues: spam • virus • and blogs • computing • Service Provider (ISP) • even families and acquaintances • internet-related illegal activity. • excluding someone from an online group • is a virus also a worm which spreads by . • unwanted messages which may contain threats • fights where scornful and offensive messages are posted on websites , • ...
Cyber safety Steph 2016-05-24
Across
- give your password out to people you don't know.
- Don't talk to people you don't have.
- Tell someone in your family if you have a virus on the computer .
- computers get lots of viruses .
- Watch appropriate videos .
- be careful on messages on iPad .
- Follow people you know .
- Don't open if it not yours .
- a percent if there is something wrong with the computer.
- Make sure it makes sure you check first .
Down
- Don't give people it.
- Don't go on a website you haven't gone on before .
- Tell mum and dad to get a game on computers .
- strangers don't talk to them online .
- Don't tell people your pass code
- Before you get a game.
- Block viruses .
- Bullying don't talk to people you don't know
- iPhones are dangerous online .
- Don't listen to adds because they can be viruses.
20 Clues: Block viruses . • Don't give people it. • Before you get a game. • Follow people you know . • Watch appropriate videos . • Don't open if it not yours . • iPhones are dangerous online . • computers get lots of viruses . • Don't tell people your pass code • be careful on messages on iPad . • Don't talk to people you don't have. • strangers don't talk to them online . • ...
Cyber safety Steph 2016-05-24
Across
- iPhones are dangerous online .
- Watch appropriate videos .
- Tell someone in your family if you have a virus on the computer .
- computers get lots of viruses .
- Don't give people it.
- Follow people you know .
- be careful on messages on iPad .
- Don't talk to people you don't have.
- a percent if there is something wrong with the computer.
Down
- give your password out to people you don't know.
- Don't go on a website you haven't gone on before .
- Don't tell people your pass code
- Don't listen to adds because they can be viruses.
- Tell mum and dad to get a game on computers .
- Before you get a game.
- strangers don't talk to them online .
- Block viruses .
- Bullying don't talk to people you don't know
- Don't open if it not yours .
- Make sure it makes sure you check first .
20 Clues: Block viruses . • Don't give people it. • Before you get a game. • Follow people you know . • Watch appropriate videos . • Don't open if it not yours . • iPhones are dangerous online . • computers get lots of viruses . • Don't tell people your pass code • be careful on messages on iPad . • Don't talk to people you don't have. • strangers don't talk to them online . • ...
Cyber safety crossword 2016-05-25
Across
- piece of tech used to control something.
- ,a thing that can destroy your device.
- mini game or active.
- place where you can watch videos.
- a thing that many people have.
- ,someone who you trust.
- thing were you get close a page.
- program that lets you find materials on the web.
- who can cheat on a app.
- that only you know.
- device.
- ,A site that supports many other sites.
Down
- ,A site that allows you to search for information.
- something that represents you in a game.
- who teasers and is mean to others.
- that when you look at it you see your face.
- place where can post pictures and comments.
- who trusts you.
- that comes up randomly .
- thing for a device.
- a site were you can post stuff.
- you recommend a thing.
- , a phone,IPad,computer or any device.
23 Clues: device. • who trusts you. • thing for a device. • that only you know. • mini game or active. • you recommend a thing. • ,someone who you trust. • who can cheat on a app. • that comes up randomly . • a thing that many people have. • a site were you can post stuff. • thing were you get close a page. • place where you can watch videos. • who teasers and is mean to others. • ...
Networking & Cyber Ethics 2025-05-22
Across
- Using digital platforms to harass others.
- Someone who gains unauthorized access to data.
- A computer that provides data to other computers.
- Moral principles guiding online behavior.
- Device that connects your home to the Internet.
- Footprint The trail of data left behind by online activity.
- Wide Area Network, larger than LAN.
- Software that protects against malicious programs.
- Local Area Network, usually within a building.
- Storing data on remote servers accessed via the Internet.
Down
- Fraudulent attempt to get sensitive information.
- Software designed to harm a computer.
- A device that forwards data packets between networks.
- A set of rules for data communication.
- A global network connecting millions of computers.
- Security system that monitors and controls incoming and outgoing traffic.
- A computer that receives data from a server.
- Address A unique number assigned to a device on a network.
- Secret code used for authentication.
- Virtual Private Network provides secure Internet access.
20 Clues: Wide Area Network, larger than LAN. • Secret code used for authentication. • Software designed to harm a computer. • A set of rules for data communication. • Using digital platforms to harass others. • Moral principles guiding online behavior. • A computer that receives data from a server. • Someone who gains unauthorized access to data. • ...
Tugas-jaringan koputer dan internet 2024-01-11
10 Clues: jaringan • securities • kelola data • pertukaran data • jaringan komputer • jaringan komputer • komputer dan manfaat • teknis jaringan komputer • dan konfigurasi keamanan jaringan • informasi siatem jaringan komputer
Information Security 2020-12-17
Across
- a secret word
- the act of stopping something from happening
- positions of authority
- an illegal plan for tricking people
- connected computers around the world
- an action that affects someone in an unwanted way
Down
- illegal activities
- someone allow you to do something
- to take something without the permission
- an arrangement with a bank
- you buy something need this
- computer program
- a set of computer equipment and programs
- someone's right to keep their personal matters secret
14 Clues: a secret word • computer program • illegal activities • positions of authority • an arrangement with a bank • you buy something need this • someone allow you to do something • an illegal plan for tricking people • connected computers around the world • to take something without the permission • a set of computer equipment and programs • the act of stopping something from happening • ...
Information Security 2020-12-17
Across
- a secret word
- the act of stopping something from happening
- positions of authority
- an illegal plan for tricking people
- connected computers around the world
- an action that affects someone in an unwanted way
Down
- illegal activities
- someone allow you to do something
- to take something without the permission
- an arrangement with a bank
- you buy something need this
- computer program
- a set of computer equipment and programs
- someone's right to keep their personal matters secret
14 Clues: a secret word • computer program • illegal activities • positions of authority • an arrangement with a bank • you buy something need this • someone allow you to do something • an illegal plan for tricking people • connected computers around the world • to take something without the permission • a set of computer equipment and programs • the act of stopping something from happening • ...
Internet Security 2012-12-12
Across
- Computer criminals. Otherwise known as 'black-hat hatters'
- Software created to damage or alter the computer data or its operations
- An electronic way of proving your identity (2 words)
- A self-copying program that has the capacity to move from one computer to another without human help, by exploiting security flaws
- Software designed to collect information from computers for commercial or criminal purposes
- Email fraud conducted for the purposes of information or identity theft
Down
- A fraudulent or deceptive act or operation
- To alter using a secret code so as to be unitelligible to unauthorised parties
- A program designed to protect against viruses
- A program designed to prevent spyware from gaining access to the internal network
- A malicious program disguised as innocent-looking files or embedded within legitimate software. It doesn't copy itself (2 words)
- Anonymous:noun
- A program that spreads by attaching itself to executable files or documents
- The unauthorised reproduction or use of copyrighted books, music etc
14 Clues: Anonymous:noun • A fraudulent or deceptive act or operation • A program designed to protect against viruses • An electronic way of proving your identity (2 words) • Computer criminals. Otherwise known as 'black-hat hatters' • The unauthorised reproduction or use of copyrighted books, music etc • Software created to damage or alter the computer data or its operations • ...
Security Awareness 2024-04-22
Across
- Information Security Officer
- Information Security is not just a ______ issue
- What type of password is a strong password with descriptors before or after it?
- The strongest password is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca!, This_p^zz1e!
- What type of calls are made by social engineers?
- This can slow down your computer AND watch everywhere you go on the internet
- This horse can stampede your security defenses for the bad guys and make you look sheepish too!
- Who should you tell if you think you just got phished or pretext called?
Down
- When somebody sends and e-mail with a link to a bogus website
- Our Company may do this on your internet usage
- You should not just heck identity, you should also confirm
- The front line of defense in information security!
- Regular e-mail is sent in this type of text
- As employees of the bank, we should not expect this in the use of our e-mail systems
14 Clues: Information Security Officer • Regular e-mail is sent in this type of text • Our Company may do this on your internet usage • Information Security is not just a ______ issue • What type of calls are made by social engineers? • The front line of defense in information security! • You should not just heck identity, you should also confirm • ...
Security Guard 2023-05-19
Across
- Portions of a case held in camera are held in private before a judge where the press and the public are not allowed to take part.
- Official measures intended to protect the people.
- To move through their assigned areas at regular intervals to detect or prevent violations of the law or problems of any kind.
- A person who is believed to have committed a crime, but has not yet been found guilty.
- The individual who registered to engage in uniformed services
- A roughly cylindrical club made of wood, rubber, plastic, or metal.
Down
- The freedom from injury, harm, danger or loss to personal property whether deliberate or accidental.
- An official or formal statement of facts or proceedings.
- written laws gathered together, usually covering a specific subject matter.
- To deliver, publish, or execute as a required by law.
- Someone's institution that has power.
- Someone who watches over in order to protect and control.
- A variety of conduct that violates public order, disturbs the public, or incites violence.
- Behavior toward another that is marked by civility, respect, attention, consideration, cooperation, or generosity.
14 Clues: Someone's institution that has power. • Official measures intended to protect the people. • To deliver, publish, or execute as a required by law. • An official or formal statement of facts or proceedings. • Someone who watches over in order to protect and control. • The individual who registered to engage in uniformed services • ...
FOOD SECURITY 2024-11-28
Across
- The refrigerator is the best place to perishables.
- Is a kitchen device that can ensure food is cooked to a proper temperature.
- Is not a food safety step when preparing raw meat or poultry?
- cooking with frozen foods by following these for
- safety and quality.
- What temperature does poultry need to reach to be food safe?
Down
- While everyone is at risk of a youngChildren and elderly people have a higher risk
- To avoid cross contamination, keep raw meat from produce.
- Leftovers should be put in the refrigerator or freezer within?
- What foodborne pathogen is often linked to raw eggs?
- Start out with hands surfaces and utensils before cooking
- It is recommended to wash hands with warm water and soap for seconds
- Four steps to help you tackle bacteria
- Only food that contains flour when it is fully cooked
14 Clues: safety and quality. • Four steps to help you tackle bacteria • cooking with frozen foods by following these for • The refrigerator is the best place to perishables. • What foodborne pathogen is often linked to raw eggs? • Only food that contains flour when it is fully cooked • To avoid cross contamination, keep raw meat from produce. • ...
Security Principles 2025-02-25
Across
- A bond must be registered within ____ months after the debt is incurred to obtain a preferential right
- Consent may be required in terms of the Matrimonial Property Act
- To enforce a GNB, a creditor's personal security must first be ______
- Registration of a bond creates a _____ right
- Essential to establish Pledge
- A _____ debt is backed by an asset as collateral
- Type of obligation created by guarantees
Down
- Sureties are ________ in nature and reliant on the default of the principal debtor
- Essential to establish Lien
- A bond registered over movable property
- Business _______ is a formal restructuring process available to financially distressed companies
- Most common type of mortgage bond
- Type of security that arises out of the operation of law
- Type of cession where the asset is temporarily transferred as security for the debt
14 Clues: Essential to establish Lien • Essential to establish Pledge • Most common type of mortgage bond • A bond registered over movable property • Type of obligation created by guarantees • Registration of a bond creates a _____ right • A _____ debt is backed by an asset as collateral • Type of security that arises out of the operation of law • ...
Domain 1: Security and Risk Management 2025-03-13
Across
- - Meeting legal security standards.
- - Review ensuring regulatory adherence.
- - Plan to maintain operations.
- - Technique to identify potential threats.
Down
- - Structured set of security measures.
- - Process to handle breaches.
- - Formal document outlining security rules.
- - Core principles of security goals.
- - Process to identify and evaluate risks.
- - Code of conduct for security pros.
10 Clues: - Process to handle breaches. • - Plan to maintain operations. • - Meeting legal security standards. • - Core principles of security goals. • - Code of conduct for security pros. • - Structured set of security measures. • - Review ensuring regulatory adherence. • - Process to identify and evaluate risks. • - Technique to identify potential threats. • ...
Safe on internet 2025-04-22
Across
- Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird
- ,, ... Sie Ihre digitale Welt"
- Beispiel für Cyber-Mobbing
- ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen
Down
- du sollst immer auf dein ...gefühl hören
- Cyber-Mobbing meint das absichtliche Beleidigen, Bloßstellen, Bedrohen oder Belästigen im ... oder über das Handy
- erst ... , dann tippen
7 Clues: erst ... , dann tippen • Beispiel für Cyber-Mobbing • ,, ... Sie Ihre digitale Welt" • du sollst immer auf dein ...gefühl hören • Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird • ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen • ...
Safe on internet 2025-04-22
Across
- Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird
- ,, ... Sie Ihre digitale Welt"
- Beispiel für Cyber-Mobbing
- ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen
Down
- du sollst immer auf dein ...gefühl hören
- Cyber-Mobbing meint das absichtliche Beleidigen, Bloßstellen, Bedrohen oder Belästigen im ... oder über das Handy
- erst ... , dann tippen
7 Clues: erst ... , dann tippen • Beispiel für Cyber-Mobbing • ,, ... Sie Ihre digitale Welt" • du sollst immer auf dein ...gefühl hören • Glaub ... alles, was dir auf Instagram,WhatsApp, YouTube & Co. versprochen wird • ist ein Trick, bei dem Betrüger versuchen, an deine persönlichen Daten zu kommen • ...
After all, revolution is just another puzzle 2026-02-25
Across
- Signal triggered when a security threat is detected
- Device used to arm or disarm the system using a code, key fob, or card
- Faking a device identity to gain unauthorized access
- Device that signals an alarm with audible and visual alerts
- Technology that protects data from interception
- The process of improving a device by fixing issues or adding new features
- Ukrainian manufacturer behind the world’s first wireless Grade 3 security system
- Security system supporting both wired and wireless devices
Down
- Wireless communication technology enabling secure device interaction
- The process of confirming an alarm event using visual or audio evidence
- Adjustable parameter defining a detector’s response level
- The process of connecting devices from different systems into a unified security setup
- Essential resource required to keep a device operational
- The central unit of a security system
14 Clues: The central unit of a security system • Technology that protects data from interception • Signal triggered when a security threat is detected • Faking a device identity to gain unauthorized access • Essential resource required to keep a device operational • Adjustable parameter defining a detector’s response level • ...
Kuis BK Perundungan 2024-08-15
Across
- sikaptidakinginmengikutsertakantemandalamkelompokbelajarmerupakanperundungansecara
- perundungandilakukandimediasosial
- caramenghindaribulying
Down
- sebabsebabmelakukanbullying
- menghinatemandengankatakatayangkotortermasukperundungan
- salahsatudampaknegatifperundunggan
- memukultemantermasukmelakukanperundungan?
7 Clues: caramenghindaribulying • sebabsebabmelakukanbullying • perundungandilakukandimediasosial • salahsatudampaknegatifperundunggan • memukultemantermasukmelakukanperundungan? • menghinatemandengankatakatayangkotortermasukperundungan • sikaptidakinginmengikutsertakantemandalamkelompokbelajarmerupakanperundungansecara
HIPAA and FERPA InfoSec Crossword 2017-03-14
Across
- Students are given the right to file a ___________ with the department regarding a failure to comply with FERPA.
- In the HIPAA Security Rule, CEs must obtain assurances via written __________ from Business Associates that they will safeguard ePHI.
- Educational institutions must give students the opportunity to restrict __________ of directory information.
- Health records maintained by a university clinic on behalf of its students are considered educational or treatment records under FERPA, and are ___________ by HIPAA.
- The HIPAA Security Rule consists of five safeguard and requirement categories: Administrative, Physical, Technical, _______________, and Documentation.
- Risk _____________ in HIPAA consists of two phases, analysis and management.
- HIPAA stands for Health ____________ Portability and Accountability Act.
- HIPAA requires that CEs to implement device and _________ controls for devices and ________ containing ePHI.
- All documentation related to the HIPAA Security Rule must be maintained for _____ years beyond the date of creation, or the date of last effect, whichever is later.
- FERPA does not require educational institutions to provide _____________ of unauthorized disclosure of educational records.
- Directory information, disclosure of which is allowed by FERPA without consent, includes: name, __________, phone number, date and place of birth, honors and awards, and dates of attendance.
- _______ Controls are mechanisms that record and examine activity in information systems containing ePHI, and are required by the HIPAA Security Rule.
- FERPA stands for ________ Educational Rights and Privacy Act.
- FERPA requires educational institutions to notify parents or eligible students of their rights at least __________.
Down
- The HIPAA _________ Rule sets limits and conditions on the use and disclosure of PHI.
- Under FERPA, students have the right to seek ____________ of educational records they believe to be inaccurate.
- Parental rights under FERPA stop once the student enters post-secondary education OR turns _________ years old.
- Patient __________ must be obtained before the disclosure of PHI.
- The HIPAA Security Rule requires _________ user identification, and establishing emergency access procedures.
- All policies, procedures, actions, activities, and assessments related to the HIPAA Security Rule must be maintained in written or electronic _______________.
- ____________ is the process of positively-identifying a user, usually through a username and password.
- The HIPAA _________ Rule requires appropriate administrative, physical, and technical safeguards to ensure the CIA of ePHI.
- The HIPAA Security Rule Administrative Standard includes training requirements on __________ management, login procedures, and malware.
- Covered Entities are required by HIPAA to implement ____________ and appropriate policies and procedures to comply with the standards.
- The primary method to ensure the confidentiality of ePHI both in motion and at rest is by using ____________.
- A _________ Entity is an organization to which HIPAA applies.
26 Clues: A _________ Entity is an organization to which HIPAA applies. • FERPA stands for ________ Educational Rights and Privacy Act. • Patient __________ must be obtained before the disclosure of PHI. • HIPAA stands for Health ____________ Portability and Accountability Act. • Risk _____________ in HIPAA consists of two phases, analysis and management. • ...
Cyberbullying 2024-11-08
AVSEC QC Crossword #2 2025-04-09
Across
- ___________ questions work best when a specific answer is required or when verifying information. Eg Is this your bag?
- __________ is a phenomenon that will translate into a passive situation whereby the persons questioned withhold information; mask information; block communication
- The auditee must be provided with __________ regarding inspection findings during the post-inspection meeting
- ___________ questions do not imply personal judgment and the inspected party is free to answer what he/she pleases. Eg What do you think of your security system?
- _____________ consists of repeating in simple terms the answers provided by the interviewee. It is a method for clarifying information and a means of verifying what has been stated by the person
- Any enforcement action taken by a State would require ________ Authority
- The auditor should display __________ while conducting an interview
- Security ____________ that are identified early and corrected will also deter acts of unlawful interference
- Security _________ is an inquiry into any act or attempted act of unlawful interference against civil aviation and/or any alleged or suspected instance of non-compliance with a State’s National Civil Aviation Security Programme
- the _____________ Authority determines the categories of compliance to be used during inspections
- The pre-inspection _____________ is a document, which is sent to the airport authority or inspected entity prior to the inspection to collect current information
Down
- A standard is any specification for physical characteristics, configuration, matériel, performance, personnel or procedure, the uniform application of which is recognized as _____________ for the safety or regularity of international air navigation and to which Contracting States will conform in accordance with the Convention.
- Security ___________ evaluation of security needs including the identification of vulnerabilities which could be exploited to carry out an act of unlawful interference, and the recommendation of corrective actions.
- Security ________ is a covert or overt trial of an aviation security measure, which simulates an attempt to commit an unlawful act
- For practical purposes a __________ is a smaller document, one that is easy to handle, would make the inspectors’ job efficient. This kind of document will be complementary to the inspection guide
- Annex 17 requires a state to ____________ a NCASQCP.
- ___________ questions involves the opinion of the person asking the question. It tends to influence the answer. These questions are not objective and should therefore be avoided during inspections
- Benchmark, _________ and auditor are the three components of the inspection concept
- __________ interviews should be part of the inspection
- The Interim Findings Report will serve as a basis for the presentation during the post inspection debriefing and the final _________
20 Clues: Annex 17 requires a state to ____________ a NCASQCP. • __________ interviews should be part of the inspection • The auditor should display __________ while conducting an interview • Any enforcement action taken by a State would require ________ Authority • Benchmark, _________ and auditor are the three components of the inspection concept • ...
RESENSI 2024-05-02
Across
- Penulisan kata serapan Pancreas
- Penulisan kata serapan echelon
- Penulisan kata serapan Accent
- bahasa latin resensi
- penulisan kata serapan Hierarchy
- tanggapan serta manfaat bagi pembaca
- Penulisan kata serapan Croissant
- Penulisan kata serapan Khalal
Down
- salah satu konjungsi temporal
- Penulisan kata serapan Phase
- Penulisan kata serapan Variety
- kata merupakan konjungsi
- Penulisan kata serapan Cyber
- Penulisan kata serapan cream
- pernyataan berupa saran
- Penulisan kata Actie
16 Clues: bahasa latin resensi • Penulisan kata Actie • pernyataan berupa saran • kata merupakan konjungsi • Penulisan kata serapan Phase • Penulisan kata serapan Cyber • Penulisan kata serapan cream • salah satu konjungsi temporal • Penulisan kata serapan Accent • Penulisan kata serapan Khalal • Penulisan kata serapan Variety • Penulisan kata serapan echelon • Penulisan kata serapan Pancreas • ...
PUMPKINS FLY 2013-01-13
Across
- / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
- Permanent member of the UN Security Council that has used its veto power the greatest number of times.
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
- / Location where the first Security Council session took place on 17 January 1946.
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- / Granted permanent membership into the Security Council in 1971.
Down
- / In 2003, the UN Security Council was involved in a crisis that happened in Sudan / The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
- / Number of members in the Security Council.
- / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
- / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
- / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
- / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- / Country that has made the strongest request for a permanent seat in the UN Security Council other than Brazil, India and Japan.
- / UN peacekeeping force sent to Rwanda to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out in the midst of the genocide.
15 Clues: / Number of members in the Security Council. • / Granted permanent membership into the Security Council in 1971. • / Location where the first Security Council session took place on 17 January 1946. • Permanent member of the UN Security Council that has used its veto power the greatest number of times. • ...
PUMPKINS FLY 2013-01-13
Across
- / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / UN peacekeeping force sent to Rwanda to enforce a ceasefire. Initially comprised of 2500 troops, which were slowly pulled out in the midst of the genocide.
- / Number of members in the Security Council.
- / Location where the first Security Council session took place on 17 January 1946.
- / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
- / Privilege held by the the permanent members of the UN Security Council: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- Permanent member of the UN Security Council that has used its veto power the greatest number of times.
- / Country that was divided by the UN in 1947 to set up the Jewish state of Israel, which led to a series of wars between Israel and various Arab states.
- / Number of months before the post of President of the UN Security Council, that is held by a representative from member state at the point in time, is assigned to the representative from the next member state.
- / Country that has made the strongest request for a permanent seat in the UN Security Council other than Brazil, India and Japan.
- / Granted permanent membership into the Security Council in 1971.
- / Installation in Egypt that, in 1956, was nationalised by Gamal Abdel Nasser, the President of Egypt. This was done in spite of Britain and France’s possession of majority of the shares of the installation, which led to an invasion of Egypt by Britain, France and Israel.
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- / In 2003, the UN Security Council was involved in a crisis that happened in Sudan / The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
15 Clues: / Number of members in the Security Council. • / Granted permanent membership into the Security Council in 1971. • / Location where the first Security Council session took place on 17 January 1946. • Permanent member of the UN Security Council that has used its veto power the greatest number of times. • ...
Hatley Independent Practice 2015-01-28
security technology 2014-07-07
14 Clues: linklayer • bigger risk • cryptography • internet layer • transport layer • filtering system • application layer • someone reads your mail • virtual private network • trusted key distribution • breakingencryption scheme • transport control protocol • send mail and sign your name • someone intercepts your mail and modify
Internet security 2021-11-30
Across
- prove your identity
- A pot you hope attracts interest
- My words on your video
- A weakness that allows a threat
- Happens when a buffer has too much
- tricks you to click it
Down
- Click all traffic lights in this image
- Blocks incoming and outgoing connections
- identity falsified
- horse with hidden surprise
- denial of service attacks this
- fake email link bait
- encrypt files to extort money
- Our kind doesn't rain
14 Clues: identity falsified • prove your identity • fake email link bait • Our kind doesn't rain • My words on your video • tricks you to click it • horse with hidden surprise • encrypt files to extort money • denial of service attacks this • A weakness that allows a threat • A pot you hope attracts interest • Happens when a buffer has too much • Click all traffic lights in this image • ...
General Security 2025-01-13
Across
- A process to identify security weaknesses
- A minor breach of security procedures or policies
- A software update to fix vulnerabilities
- A secret word or phrase used for authentication
- an incident that involves the unauthorized access, disclosure, or compromise of sensitive or classified information
- Software designed to detect and remove viruses
Down
- A person or thing likely to cause damage/danger.
- The act of stealing confidential information
- A malicious code that replicates itself
- An unauthorized disclosure of classified information
- A digital attack aiming to steal personal information
- A security feature to detect intrusions
- A set of rules for securing information systems
- An attempt to gain unauthorized access
14 Clues: An attempt to gain unauthorized access • A malicious code that replicates itself • A security feature to detect intrusions • A software update to fix vulnerabilities • A process to identify security weaknesses • The act of stealing confidential information • Software designed to detect and remove viruses • A secret word or phrase used for authentication • ...
Security Terms 2022-11-17
Across
- Logical computer network of zombies under control of an attacker
- Large marsupial
- Malware preventing devices from properly operating until a fee is paid
- Attacker who controls a botnet
- Likes to chase mice
Down
- Computer code that is dormant until it is triggered by a specific logical event
- Infected computer under remote control of an attacker
- Database of viruses used to identify infected files
- Has a trunk
- Software code that gives access to a program that circumvents normal security protections
- Publicly released software security update to repair a vulnerability
- Flying mammal
- Man's best friend
- Security program that delivers advertising content in a way that is unexpected and unwanted
14 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Attacker who controls a botnet • Database of viruses used to identify infected files • Infected computer under remote control of an attacker • Logical computer network of zombies under control of an attacker • Publicly released software security update to repair a vulnerability • ...
court security 2026-02-26
14 Clues: plan • nzsis • values • hostile • if CSO has • obligation • shareholders • analyze/assess • structured list • interesting person • shared responsibility • power to detain in other • act governing information access • regulates organisations, collection/use/storage
