cyber security Crossword Puzzles
Places in town 2020-09-16
Security Terms 2022-11-17
Across
- Malicious computer code that reproduces itself on a computer
- Publicly released software security update to repair a vulnerability
- Malware preventing devices from properly operating until a fee is paid
- Hardware or software designed to limit spread of malware
- General term used to describe software that spies on users by gathering information without consent
- Software code that gives access to a program that circumvents normal security protections
Down
- Software that helps prevent computers from becoming infected by spyware
- Database of viruses used to identify infected files
- Logical computer network of zombies under control of an attacker
- Computer code that is dormant until it is triggered by a specific logical event
- Attacker who controls a botnet
- Software that is a cumulative package of all patches and feature updates
- Security program that delivers advertising content in a way that is unexpected and unwanted
- Infected computer under remote control of an attacker
14 Clues: Attacker who controls a botnet • Database of viruses used to identify infected files • Infected computer under remote control of an attacker • Hardware or software designed to limit spread of malware • Malicious computer code that reproduces itself on a computer • Logical computer network of zombies under control of an attacker • ...
USAJ Security 2022-03-30
14 Clues: The wand • On the glass • USA Jet AOSC • Alternate AOSC • Tamper evidence • Check that cargo • Fingerprint lady • Search procedure • Check your record • Need to know only • Broken wand (2 words) • Fingerprint lady, too • Security training required • Aviation security regulator
Security Awareness 2023-08-01
Across
- lax approach to policies and procedures, creating risks
- as a DoD employee, you are a _______
- when a blue light is blinking in an area, it means there is an ______ individual
- you are required to ______ suspicious behavior
- an adversary having the intent, capability, and opportunity to cause loss or damage
- anyone with access to classified information can become a _______ classifier
- lack of awareness of policies and procedures, creating risks
Down
- everyone's responsibility
- intentional acts, creating risks
- the practice of spying or of using spies, typically by governments to obtain political and military information
- a potential risk indicator for someone living above their means
- program access is based on ______ and material contribution
- report _______ travel at least 30 days in advance
- there is ______ a need to talk around classified outside a classified environment
14 Clues: everyone's responsibility • intentional acts, creating risks • as a DoD employee, you are a _______ • you are required to ______ suspicious behavior • report _______ travel at least 30 days in advance • lax approach to policies and procedures, creating risks • program access is based on ______ and material contribution • ...
information security 2023-08-29
Across
- Virus macros which have been programmed to carry out malicious intent
- gap or weakness which undermines an organization’s security efforts
- rights an individual or organization has over information and how it is used
- requirement of being private or secret
- intent of doing harm
- making sure a person is who they say they are
Down
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain
- information or data which can be accessed when needed
- procedure used to determine user privileges or access levels to the system
- state of being complete or uncorrupted
- how information is protected
- network of computers and devices managed as a unit with the same procedures and rules
- to or damage sensitive information on a computer
- calculated assessment of potential threats to an organization’s security
14 Clues: intent of doing harm • how information is protected • state of being complete or uncorrupted • requirement of being private or secret • making sure a person is who they say they are • to or damage sensitive information on a computer • information or data which can be accessed when needed • gap or weakness which undermines an organization’s security efforts • ...
FOOD SECURITY 2024-11-28
Across
- - A prolonged period of abnormally low rainfall
- - The process of preserving food to prevent spoilage
- - A system for managing water resources for agricultural use
- - The buying and selling of agricultural products
- - A sudden increase in the price of food
- - A government program that provides food assistance to low-income individuals
- - The science of soil management and crop production
Down
- - The science of cultivating land, raising crops, and feeding livestock
- - The variety of plant and animal life in a particular habitat
- - The gradual warming of the Earth's climate
- - A system of farming that avoids synthetic fertilizers and pesticides
- - The movement of people or animals from one region to another
- - The process of adding nutrients to food to improve its nutritional content
- - A period of severe food scarcity
14 Clues: - A period of severe food scarcity • - A sudden increase in the price of food • - The gradual warming of the Earth's climate • - A prolonged period of abnormally low rainfall • - The buying and selling of agricultural products • - The process of preserving food to prevent spoilage • - The science of soil management and crop production • ...
DATA SECURITY 2025-10-22
Across
- A virtual barrier that keeps unauthorized users out of a computer network.
- A secret word or phrase that grants you access to an account or device.
- A small text file saved by a website to your computer that remembers information about you.
- Harmful software that can copy itself and spread to other computers, often deleting or damaging data.
- A set of rules for how you should behave and interact online.
- The record of everything you do and post online; it stays forever!
Down
- A type of software designed to damage, disable, or gain unauthorized access to a computer system.
- A crime where someone steals your personal information to pretend to be you.
- This type of software protects your computer from viruses and other malicious programs.
- The practice of protecting systems, networks, and data from digital attacks.
- A fake message, often an email, trying to trick you into giving away private information.
- A special way to scramble data so only authorized people can read it.
- The general term for information, like facts, statistics, or files.
- Using two different ways to prove you are who you say you are before logging in. (Abbreviation)
14 Clues: A set of rules for how you should behave and interact online. • The record of everything you do and post online; it stays forever! • The general term for information, like facts, statistics, or files. • A special way to scramble data so only authorized people can read it. • A secret word or phrase that grants you access to an account or device. • ...
Financial Literacy Terms 2023-05-12
Across
- distribution of a companys earnings
- a company breaking up shares
- a financial advisor
- pooled money with investors
- a business varying its range
- stock that offers regular/steady income
- security that shows ownership in a company
- five year average sales growth above 15%
- share prices rising
Down
- differs from common stock
- profitability of a company
- selling an assest for MORE than your adjusted basis
- a bond that is a debt obligation
- stocks worth less than a dollar
- share prices falling
- annual income divided by price of security
- selling asset for LESS than adjusted basis
- earnings that are free of debt
- formal document required by and filed with the Securities and Exchange commision
- the value and investor earns from a security
20 Clues: a financial advisor • share prices rising • share prices falling • differs from common stock • profitability of a company • pooled money with investors • a company breaking up shares • a business varying its range • earnings that are free of debt • stocks worth less than a dollar • a bond that is a debt obligation • distribution of a companys earnings • ...
Slack @: 2023-09-22
Across
- The quality of keeping or being kept secret or private
- An act of breaking or failing to observe a law, agreement, or code of conduct.
- -security
- The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
- The art of writing or solving codes
- The process or action of proving or showing something to be true, genuine, or valid
Down
- The quality of being able to be used or obtained
- Type of malware relating to ancient Troy in Asia Minor
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- A cybercrime in which the attacker floods a server with internet traffic from multiple sources to prevent users from accessing connected online services and sites
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A method of accomplishing something primarily by means of strength, without the use of great skill, mechanical aids or thought
- The quality of being honest and having strong moral principles
- The Hollywood name of a person who uses computers to gain unauthorized access to data
- An electronic authentication method in which a user is granted access to a website or application
15 Clues: -security • The art of writing or solving codes • The quality of being able to be used or obtained • Type of malware relating to ancient Troy in Asia Minor • The quality of keeping or being kept secret or private • The quality of being honest and having strong moral principles • An act of breaking or failing to observe a law, agreement, or code of conduct. • ...
TJandCASTROFLORES 2024-10-24
Across
- warfare of security experts will discuss the growing threats to corporations.
- ceremony- when the vessel is formally named and launched is customarily
- warfare- the use of military aircraft and other flying machines in warfare.
- launching- vessel is either completed on perpendicular building ways near the water.
- warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
- conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
- control- measures taken to prevent a fire or collision.
Down
- weapons- traditional weapons such as rifles and explosives
- process- gain the information used to gain estimates of the situation
- warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
- warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
- lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
- warfare are self replicating programs that can hide in systems
- marsupial
- operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
- a series of short cruises to check out the ship and its equipment.
16 Clues: marsupial • control- measures taken to prevent a fire or collision. • weapons- traditional weapons such as rifles and explosives • warfare are self replicating programs that can hide in systems • a series of short cruises to check out the ship and its equipment. • process- gain the information used to gain estimates of the situation • ...
otr 2014-05-12
Across
- ________ visit notifications must be passed 72 hours in advance of the proposed visit by Program Security.
- Do not ____________sensitive subjects on an unclassified phone line, in emails or via other types of unclassified communications.
- Program names and information cannot be listed on _______, websites or other personal documents.
- Accessed personnel should contact Program Security for instructions on the use of secure ______________ equipment.
- All ___________________must review and update their Personnel Security Prescreening Questionnaire (PSPQ) on an annual basis.
Down
- All _______ employees are required to report adverse information.
- Your __________ program security officer (CPSO) is your security liaison for specific programs.
- Report all _______ travel for business and personal reasons.
- ______________ is one type of a special program.
- Users must not share _________ with anyone.
- Security is __________ responsibility
- Refer to a program by its unclassified __________ (PID).
12 Clues: Security is __________ responsibility • Users must not share _________ with anyone. • ______________ is one type of a special program. • Refer to a program by its unclassified __________ (PID). • Report all _______ travel for business and personal reasons. • All _______ employees are required to report adverse information. • ...
Domestic and International Airports (Nicoshia Toailoa/ Dublin ) 2017-09-10
Across
- Is the 3 letter code for the Kapiti Coast
- A company located in check-in area which enables travellers to have their luggage sealed for protection
- Free facilities for transit passengers
- Home of the Worlds longest runway
- Auckland Airport will combine international and domestic _____ as early as 2019
- A facility used by those who wish to pray before a flight
- Acronym for Ministry of Agriculture and Forestry
- This has been dramatically increased after the September 11 2001 attack
- A word that you should not use in or around the Airport areas
- A small item that will be confiscated off you at security due to its risk of having the potential to self ignite
Down
- An official document issued by a government; certifies holders identity and citizenship
- You enter this area once you pass through passport control and Security at the Auckland International Airport
- Located landside, person travelling will need to present passport, ticket and luggage here
- An area accessible to everyone, including those who are not travelling
- A lounge at the Auckland Airport operated by Air New Zealand
- A form of transport available to take you between the 2 Auckland Airport terminals
- The official provider of aviation security services in New Zealand
- A machine in which a conveyer belt move items through in order to ensure security and safety
- A currency exchange company that can be found both landside and airside
- A place where airplanes arrive and take off
20 Clues: Home of the Worlds longest runway • Free facilities for transit passengers • Is the 3 letter code for the Kapiti Coast • A place where airplanes arrive and take off • Acronym for Ministry of Agriculture and Forestry • A facility used by those who wish to pray before a flight • A lounge at the Auckland Airport operated by Air New Zealand • ...
Investing-Jacob Hawkins 2025-03-24
Across
- total amount of money that you can put in an IRA per year ($)
- they type of risk tolerance you’ll most likely have if you do lump sum investing
- the year that social security was established
- social security and medicare taxes
- age to receive full social security benefits
- Warren Buffet is the CEO of this company
- should we look to celebrities for financial advice?
- this IRA’s contributions are made after taxes
- type of job that offers pension plans
- this thing sometimes contributes to your pension plan
- another type of job that offers a pension plan
- Warren Buffets number one rule of investment
- the age that you can take out the money from both types of IRA’s
Down
- the person your pension is managed by
- president who created social security in 1935
- this IRA’s contributions are made pre tax
- you contribute and sometimes the state contributes to this income source
- the year that you receive a little bonus to your social security plan
- at 67 you can get full benefits from this income source
- CEO of Berkshire Hathaway
- when a person stops working after reaching a certain age
- the type of fund that you should build before investing in Crypto
- the biggest financial fraud in U.S. history
- the thing that created and backs up Fiat Money
- the age you have to be to invest in Crypto
25 Clues: CEO of Berkshire Hathaway • social security and medicare taxes • the person your pension is managed by • type of job that offers pension plans • Warren Buffet is the CEO of this company • this IRA’s contributions are made pre tax • the age you have to be to invest in Crypto • the biggest financial fraud in U.S. history • age to receive full social security benefits • ...
Chapter 6: Social Media Legal and Policies in Malaysia 2023-09-18
Across
- of the MCMC is to promoting and protecting consumer
- deemed to be offensive or illegal can be subject to investigation and action by MCMC
- is the regulatory body for the communications and multimedia industry in Malaysia
- Law that stalking is defined as a repeated act of harassment, which is intended or is likely to cause distress, fear, or alarm to any person for their safety.
- of the social media security ensures to provide best practices forindividuals and organizations to protect their social media accounts from cyber threats
Down
- Agencies responsible of assuring appropriate use of social media by government officials, the management of social media accounts, and the handling of sensitive information on social media
- Social media service providers are also subject to do under regulatory requirements of the CMA
- regulates a wide range of issues, including licensing, spectrum allocation, competition, and consumer protection
8 Clues: of the MCMC is to promoting and protecting consumer • is the regulatory body for the communications and multimedia industry in Malaysia • deemed to be offensive or illegal can be subject to investigation and action by MCMC • Social media service providers are also subject to do under regulatory requirements of the CMA • ...
Alliance Holiday Puzzle 2021-12-07
Across
- Dog made famous in the Grinch
- One division of Alliance
- Covers your ears on a cold day, pom-pom optional
- Treat left behind for Santa
- Tree Glitter
- Winter drink served with marshmallows
- role on the Security side of Alliance
- Treats left for Rudolph
- One of the reindeer; not Rudolph
- role on the Communications side of Alliance
- Green character from Whoville
- Frosty was made of this
- A celebration for the rest of us, from Seinfeld
Down
- Catch Santa on a security one
- gifts go under this
- One division of Alliance
- Charles ________, author of "A Christmas Carol"
- Chocolate countdown to December 24th
- used for Hanukkah celebration
- decorations for your tree
- December drink with a love/hate reputation
- Another word for sled
- Covers your hands on the cold days
- something that is left out for Santa
24 Clues: Tree Glitter • gifts go under this • Another word for sled • Treats left for Rudolph • Frosty was made of this • One division of Alliance • One division of Alliance • decorations for your tree • Treat left behind for Santa • Catch Santa on a security one • Dog made famous in the Grinch • used for Hanukkah celebration • Green character from Whoville • One of the reindeer; not Rudolph • ...
Investing-David V 2025-03-27
Across
- currencies backed up by government
- age to get social security
- good for people with low risk tolerance
- managed by employer
- never forget rule one
- age to invest in crypto
- rising stocks
- transfer funds to different plan
- funds saved only for emergencies
- contributions made post tax
Down
- president that created social security
- government health care plan
- social security Medicare tax
- at age 67 you get these full benefits
- CEO of Berkshire Hathaway
- the ceo of this is warren buffet
- falling stocks
- company requiring you to work a certain amount of time
- an example of a job that is government based
- a sum of money available for a particular purpose
- virtual currency
- system of recording info so it can’t get hacked
22 Clues: rising stocks • falling stocks • virtual currency • managed by employer • never forget rule one • age to invest in crypto • CEO of Berkshire Hathaway • age to get social security • government health care plan • contributions made post tax • social security Medicare tax • the ceo of this is warren buffet • transfer funds to different plan • funds saved only for emergencies • ...
Cybersecurity Santiago Yeison Cristian Yefferson 2025-06-25
Across
- This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
- Criminal activities carried out using computers or the internet.
- The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The programs and other operating information used by a computer.
- The quality of being trustworthy or of performing consistently well.
- The use of computers and the internet to conduct warfare in cyberspace.
- Software used to prevent, detect, and remove malicious software.
- The process of encoding information in such a way that only authorized parties can access it.
Down
- Criminal activities carried out using computers or the internet.
- The practice of protecting systems, networks, and programs from digital attacks.
- Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
- Characterized by malice; intending or intended to do harm.
- As discussed, malicious software.
- An attempt by hackers to damage or destroy a computer network or system.
- The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
- The process of converting encrypted data back into its original form.
- The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- Permanent software programmed into a read-only memory.
- The practice of protecting systems, networks, and programs from digital attacks.
- Broader than antivirus, it protects against various forms of malware, not just viruses.
- Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.
22 Clues: As discussed, malicious software. • Permanent software programmed into a read-only memory. • Characterized by malice; intending or intended to do harm. • Criminal activities carried out using computers or the internet. • Criminal activities carried out using computers or the internet. • The programs and other operating information used by a computer. • ...
Domestic and International Airports 2017-09-10
Across
- Is the 3 letter code for the Kapiti Coast
- Acronym for Ministry of Agriculture and Forestry
- This has been dramatically increased after the September 11 2001 attack
- A lounge at the Auckland Airport operated by Air New Zealand
- An area accessible to everyone, including those who are not travelling
- The official provider of aviation security services in New Zealand
- You enter this area once you pass through passport control and Security at the Auckland International Airport
- Free facilities for transit passengers
- A small item that will be confiscated off you at security due to its risk of having the potential to self ignite
Down
- An official document issued by a government; certifies holders identity and citizenship
- A company located in check-in area which enables travellers to have their luggage sealed for protection
- Located landside, person travelling will need to present passport, ticket and luggage here
- Auckland Airport will combine international and domestic _____ as early as 2019
- A currency exchange company that can be found both landside and airside
- A machine in which a conveyer belt move items through in order to ensure security and safety
- A place where airplanes arrive and take off
- Home of the Worlds longest runway
- A form of transport available to take you between the 2 Auckland Airport terminals
- A word that you should not use in or around the Airport areas
- A facility used by those who wish to pray before a flight
20 Clues: Home of the Worlds longest runway • Free facilities for transit passengers • Is the 3 letter code for the Kapiti Coast • A place where airplanes arrive and take off • Acronym for Ministry of Agriculture and Forestry • A facility used by those who wish to pray before a flight • A lounge at the Auckland Airport operated by Air New Zealand • ...
Monetary Policy 2025-01-14
Across
- Lowers the discount rate
- Which leads to an increase in _____ Supply
- If the FED buys a security, this will lead to a _____ in money supply
- If someone deposits money into the bank from _______ a government security it will give the bank the ability to issue more loans.
- If the FED sells a security, this will cause for a ____ number of jobs
- and can make fewer ______
- Bankers shy away from the higher ______rates and take out fewer loans.
- An increase in production happens when the FED _____ a security
- When banks give the FED money it causes the bank to have less money on ______
Down
- and lower _____ rates
- The _____________ system is able to increase or decrease the amount of money in circulation by buying or selling government
- or by changing the discount rate
- A slowdown in production happens when the FED _____ a security
- Member banks take advantage of the lower rate and _______more money.
- a set of actions to control a nation's overall money supply, and achieve economicgrowth
15 Clues: and lower _____ rates • Lowers the discount rate • and can make fewer ______ • or by changing the discount rate • Which leads to an increase in _____ Supply • A slowdown in production happens when the FED _____ a security • An increase in production happens when the FED _____ a security • Member banks take advantage of the lower rate and _______more money. • ...
cybersecurity Puzzle-Enrique 2023-08-22
Across
- prevents unauthorized changes
- scrambling data
- UI redress attack
- false perception of reality
- disguised attacks
- fools users into providing sensitive information
- personal laptop, smart phones, ect
Down
- online harassment
- virtual private network
- locks users out until they pay
- short for malicious software
- prevents unauthorized access
- transmits information without user knowing
- codes that protect data
- carry out cyber attacks on other systems
15 Clues: scrambling data • online harassment • UI redress attack • disguised attacks • virtual private network • codes that protect data • false perception of reality • short for malicious software • prevents unauthorized access • prevents unauthorized changes • locks users out until they pay • personal laptop, smart phones, ect • carry out cyber attacks on other systems • ...
Cyber Bullying 2016-12-05
Across
- A type of social media that utilizes images and pictures
- Someone that is famous and well known
- A nickname people use on social media to conceal their true identity
- Someone that lives abroad for purposes related to employment
- Degrade purposely to make someone feel bad
- Someone from another country other than your own
Down
- To attack or assault someone verbally or physically
- To have purposely started or initiated an action
- The process of taking advantage of someone weaker than yourself
- A false feeling of over confidence and self-importance
- To make someone seem evil or terrible
- A very precious metal
12 Clues: A very precious metal • Someone that is famous and well known • To make someone seem evil or terrible • Degrade purposely to make someone feel bad • To have purposely started or initiated an action • Someone from another country other than your own • To attack or assault someone verbally or physically • A false feeling of over confidence and self-importance • ...
Cyber Defences 2021-09-22
Across
- Should be strong and have MFA
- Protects against viruses and worms
- This will protect a device/networks ports
- This is used to attract cyber attacks
- Used to record activity and find source of intrusions
- What to do to USB ports to prevent data exfiltration
- An update with a fix for a vulnerability
Down
- Can give false positives that distract administrator (acronym)
- These should be restricted to prevent users from having more access than required
- Teaches staff how to prevent falling for phishing scams
- Makes data unreadable
- Best defence against ransomware
12 Clues: Makes data unreadable • Should be strong and have MFA • Best defence against ransomware • Protects against viruses and worms • This is used to attract cyber attacks • An update with a fix for a vulnerability • This will protect a device/networks ports • What to do to USB ports to prevent data exfiltration • Used to record activity and find source of intrusions • ...
cyber bulling 2022-01-03
Across
- A digital place where you can find information
- A mental disorder that causes the feeling of sadness and lost of intrest
- What people feel when others post offending things about them
- Irrelevant or inappropriate messages sent online
- A secret word or phrase
- Fun and distracting way to spend your times
Down
- Secure
- A technology that was invented by Alexander Bell
- Exprssing an opinion on the web
- Belonging to or for the use of one particular person or group of people only
- Share pictures or tweets with the world
- Informal conversation
12 Clues: Secure • Informal conversation • A secret word or phrase • Exprssing an opinion on the web • Share pictures or tweets with the world • Fun and distracting way to spend your times • A digital place where you can find information • A technology that was invented by Alexander Bell • Irrelevant or inappropriate messages sent online • ...
cyber bullying 2019-07-11
Across
- in your mind
- someone who teaches people
- when you want to kill yourself
- when people don't know who you are
- when you aren't in danger
- by your self
Down
- someone who enforces law
- someone who is mean for a long amount of time
- when you are very sad
- when you are the person who gets bullied
- something you play
- playing with other people
12 Clues: in your mind • by your self • something you play • when you are very sad • someone who enforces law • playing with other people • when you aren't in danger • someone who teaches people • when you want to kill yourself • when people don't know who you are • when you are the person who gets bullied • someone who is mean for a long amount of time
CYBER SAFETY 2020-10-24
13 Clues: bbbb • gggg • ffff • ttttt • dddddddddd • ffffffffff • ffffffffff • fffffffffff • hhhhhhhhhhhhh • rrrrrrrrrrrrrr • ffffffffffffff • ffffffffffffffff • The act of presenting someone else'es work
Cyber Ally 2023-02-01
Across
- Someone who stands up for another person
- What an ally spreads online
- Where can cyberbullying occur
- Where can cyberbullying occur
- Intentionally hurting someone over a period of time with a power imbalance
- Where can cyberbullying occur
- What to do before putting something online
- What to do if you/someone else is cyberbullied
Down
- An app that you can anonymously report bullying
- Trying to get someone OUT of trouble
- Someone who stands and watches bullying
- Just trying to get someone in trouble
- A negative effect of cyburbullying
- What to do if you are cyberbullied
14 Clues: What an ally spreads online • Where can cyberbullying occur • Where can cyberbullying occur • Where can cyberbullying occur • A negative effect of cyburbullying • What to do if you are cyberbullied • Trying to get someone OUT of trouble • Just trying to get someone in trouble • Someone who stands and watches bullying • Someone who stands up for another person • ...
Cyber Crossword 2023-05-22
Across
- some free thing can give you -------
- using vulgar language is called -------
- people stealing your id
- don't add people you don't know
- you should not tell people where you live in ----------
Down
- means someone bullying another person on a device
- Swearing or saying mean things
- don't share your login
- people stealing your work
- don't tell people your ----
- if you share -------- online people can find your location
- stay safe while you are ------
12 Clues: don't share your login • people stealing your id • people stealing your work • don't tell people your ---- • Swearing or saying mean things • stay safe while you are ------ • don't add people you don't know • some free thing can give you ------- • using vulgar language is called ------- • means someone bullying another person on a device • ...
Cyber Gym 2024-11-20
Across
- Don't act in a ......
- Be ...... of obvious errors
- Using phone calls to deceive victims into providing sensitive information
- Withdrawals from their ...... account
- Computer scam to obtain confidential data like passwords, codes, pins, credit card numbers from the victim
- Don't ...... or open suspicious emails
Down
- ...... can be committed at the expense of the victim
- Similar to spear phishing but aimed at high-profile targets like CEOs or CFOs
- Legit email received
- The scammer's ultimate goal is to extort ...... or even steal the victim's identity
- Check the ...... email address
- Don't trust ...... emails
12 Clues: Legit email received • Don't act in a ...... • Don't trust ...... emails • Be ...... of obvious errors • Check the ...... email address • Withdrawals from their ...... account • Don't ...... or open suspicious emails • ...... can be committed at the expense of the victim • Using phone calls to deceive victims into providing sensitive information • ...
Cyber ethics 2025-05-29
12 Clues: Sea animals • Has a trunk • Flying mammal • Flying animal • Tallest animal • Fastest animal • Eat love banna • Slowest animal • Large marsupial • Helps to travell • Man's best friend • Likes to chase mice
Cyber Ethics 2025-06-07
Across
- It refers to unwanted bulk of email that comes from a
- It refers to being aware of the ethical practices.
- It is a legal right granted by law to the creator for his
- PIRACY: when a software is copied and distributed illegally, it is
- work.
- sources.
Down
- It refers to the act of using or imitating the language
- FOOTPRINT: It is an impression or information about a person that exists
- the internet because of his online activity.
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- thoughts of another person as one's original work.
12 Clues: work. • sources. • the internet because of his online activity. • It refers to being aware of the ethical practices. • thoughts of another person as one's original work. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • It refers to an illegal intrusion into a computer system • ...
Cyber Ethics 2025-06-07
Across
- It refers to unwanted bulk of email that comes from a
- It refers to being aware of the ethical practices.
- It is a legal right granted by law to the creator for his
- PIRACY: when a software is copied and distributed illegally, it is
- work.
- sources.
Down
- It refers to the act of using or imitating the language
- FOOTPRINT: It is an impression or information about a person that exists
- the internet because of his online activity.
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- thoughts of another person as one's original work.
12 Clues: work. • sources. • the internet because of his online activity. • It refers to being aware of the ethical practices. • thoughts of another person as one's original work. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • It refers to an illegal intrusion into a computer system • ...
La seguridad y los accidentes 2023-02-21
14 Clues: to land • seatbelt • accident • insurance • to reduce • dangerous • prohibited • to take off • traffic jam • customs agent • notice;warning • safety;security • security measures • to fasten seatbelt
NETWORKING QUIZ 2025-05-17
Across
- Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that sensitive information, like passwords or credit card details, remains private even if intercepted by malicious actors. Encryption is essential for securing data both at rest (stored data) and in transit (data being transmitted).
- A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps to prevent unauthorized access or attacks.
- terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats.
Down
- Private Network (VPN) A VPN is a technology that allows users to create a secure and encrypted connection over a less secure network, such as the internet. It enables remote users to access a private network securely, protecting data from being intercepted by unauthorized parties.
- Control Access control refers to the mechanisms used to regulate who or what can access a network or system, and under what conditions. This includes techniques like authentication (verifying the identity of users) and authorization (granting permission to access resources). Types of access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).
- Detection System (IDS: An IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. It alerts administrators to suspicious behavior, such as an unauthorized attempt to access the network, and can also provide real-time detection of potential security breaches.
- are five key terminologies used in performing network security:
7 Clues: are five key terminologies used in performing network security: • terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats. • ...
Disruptive Technology 2025-08-09
Across
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
Down
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
8 Clues: Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • the development and use of technologies that minimize environmental impact while promoting social and economic benefits • ...
Security Service Management 2023-11-30
Across
- This system requires lesser manpower and is more efficient.
- Hospital security systems are implemented through ________ deployment and electronic security.
- _________ system is the most common electronic security system used in hospitals.
- The areas of focus of security service management in a hospital are properties of the hospital and patients, _______ and the hospital fixtures.
- The space where all activities in a hospital are observed.
Down
- Security personnel to be deployed undergo _______ prior to recruitment.
- The security cameras must be enabled with the provision of _________ at all times.
- This system is installed to prevent any breach of security of fiddling.
- The _________ team would make rounds at different areas of the hospital.
- The electronic security system uses ______ for surveillance and monitoring purposes.
10 Clues: The space where all activities in a hospital are observed. • This system requires lesser manpower and is more efficient. • Security personnel to be deployed undergo _______ prior to recruitment. • This system is installed to prevent any breach of security of fiddling. • The _________ team would make rounds at different areas of the hospital. • ...
Voyager Update 2018 2018-11-20
Across
- basic hardware (computer) and software (operating system) on which software applications can be run.
- doing business that focuses on creating a positive experience for the customer
- analytics process of assessing/modeling data with the goal of discovering insights and support decision-making
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- the action or process through which something is changed so much that it appears to be entirely new.
- Supporting clients make decisions that are right for them
- the ability for clients to perform service transactions themselves
- the conversion of text, pictures, or sound into a digital form that can be processed by a computer.
- make (something) simpler or easier to do or understand.
- lasting or valid for more than one year.
Down
- The use of many different pathways such as phone, email, and face to face to engage clients
- The capability of a system or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth
- taking steps to reduce adverse effects
- the lifelong connection between OPB and its clients
- with various parts or aspects linked or coordinated.
- an act of traveling from one place to another.
- the state or quality of being efficient.
- a thing that makes something better or is better than something else.it was before.
- creating an opportunity by causing something to happen rather than responding to it after it has happened.
19 Clues: taking steps to reduce adverse effects • the state or quality of being efficient. • lasting or valid for more than one year. • an act of traveling from one place to another. • the lifelong connection between OPB and its clients • with various parts or aspects linked or coordinated. • make (something) simpler or easier to do or understand. • ...
Cybersecurity Month 2025-10-03
Across
- Unauthorized access to data
- Network security barrier
- Software update to fix vulnerabilities
- Fraudulent attempt to get personal information
- Malicious software that demands payment
- Local tribal community hosting IT services
- Measures to protect information and systems
Down
- Name of the tribal nation
- IT support for users
- Extra layer of login security
- Software designed to damage or gain unauthorized access
- Secret code to access accounts
- Secure remote network connection
- Process of converting data to unreadable format
- Copy of data for recovery
15 Clues: IT support for users • Network security barrier • Name of the tribal nation • Copy of data for recovery • Unauthorized access to data • Extra layer of login security • Secret code to access accounts • Secure remote network connection • Software update to fix vulnerabilities • Malicious software that demands payment • Local tribal community hosting IT services • ...
Operating Systems and Security 2025-09-23
Across
- - Google's mobile operating system used on smartphones, tablets, and wearable devices.
- - To convert information into a code to prevent unauthorized access.
- - Security vulnerability that prompts software companies to release emergency updates.
- - System privilege that should only be granted to employees who require it.
- - File system capability that tracks changes before execution to prevent data loss.
- - The method by which users communicate and control their computer system.
- - Microsoft's advanced file system that replaced the older FAT32 format for better performance
- - Social media account settings that should be set to private for better security.
- - Personal verification process needed before accepting social media friend requests.
Down
- - File identifiers like .jpg or .docx that indicate the file type and format. FIRMWARE - Software that directly controls specific hardware devices connected to a computer system
- - Internet software that should prioritize security features over convenience.
- - System resource that the operating system must efficiently allocate to running programs.
- - File system feature that reduces storage space but increases file opening time.
- - Software program that may request excessive permissions to access personal data.
- - Digital service that stores instant messages on their servers permanently.
- - Computer environment that requires hard drive encryption and screen locking for security.
- - Data collection practice that privacy-focused search engines avoid doing.
- - A secret combination of characters used to authenticate a user’s identity.
- - Internet software that should prioritize security features over convenience.
- - Small data files stored by websites to remember user preferences and track activity.
- - Security feature that only allows approved websites and applications to run.
21 Clues: - To convert information into a code to prevent unauthorized access. • - The method by which users communicate and control their computer system. • - System privilege that should only be granted to employees who require it. • - Data collection practice that privacy-focused search engines avoid doing. • ...
A+ 2025-02-11
Across
- A common method for securing Wi-Fi networks.
- A software used to detect and remove malware.
- A Windows utility that displays real-time network usage.
- A Windows command used to format a disk.
- A network protocol used to automatically assign IP addresses.
- A form of authentication that uses fingerprints or facial recognition.
- A Windows component used to view system performance and logs.
- A tool for managing group policies in Windows.
- A network security system that monitors and filters incoming/outgoing traffic.
Down
- A security method that removes unnecessary user privileges.
- A security setting requiring a user to change their password after a period.
- A Linux command used to move files.
- A security setting that locks a user account after too many failed logins.
- A bootable Windows environment used for troubleshooting.
- A process that translates domain names into IP addresses.
- A Linux command used to change file permissions.
- A Windows command used to display active network connections.
- A Linux command used to list directory contents.
18 Clues: A Linux command used to move files. • A Windows command used to format a disk. • A common method for securing Wi-Fi networks. • A software used to detect and remove malware. • A tool for managing group policies in Windows. • A Linux command used to change file permissions. • A Linux command used to list directory contents. • ...
Bullying - jayden 2023-03-21
Information Security Terms 2024-01-31
Across
- Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- A software vulnerability that is exploited by attackers before the vendor releases a fix.
- of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- The process of converting data into a code to prevent unauthorized access.
- Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- Software designed to detect and remove malicious software from a computer.
- The process of verifying the identity of a user, system, or device.
- Security: Security measures to protect network endpoints, such as computers and mobile devices.
- Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- A network security device that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A software update designed to fix vulnerabilities or improve security.
16 Clues: The process of verifying the identity of a user, system, or device. • A software update designed to fix vulnerabilities or improve security. • Software designed to detect and remove malicious software from a computer. • The process of converting data into a code to prevent unauthorized access. • ...
Cybersecurity 2024-03-18
Across
- stalking through web technology
- Process of confirming someone's identity
- Protection against potential harm
- Malware that can collect/transmit user data without the user's knowledge
- Malware designed to restrict access
- Illegal activity done on the internet
- Unlocking encrypted information
- free from public attention
- False claims to get private information
Down
- Network security monitors/controls incoming and outgoing traffic
- Security threat from within company
- hacker who is highly motivated by principles
- Information converted into secret form
- Someone who tries to gain access without authorization
- Software that delivers ads on your system
- Unwanted emails from unknown senders
- Bullying on the internet
- Gaining access an undocumented way
- Malicious software designed to infect
- File from website that stores your info
- collection of malware that spreads through computer
21 Clues: Bullying on the internet • free from public attention • stalking through web technology • Unlocking encrypted information • Protection against potential harm • Gaining access an undocumented way • Security threat from within company • Malware designed to restrict access • Unwanted emails from unknown senders • Illegal activity done on the internet • ...
Investing-David 2025-03-25
Across
- transfer funds to different plan
- age to get social security
- good for people with low risk tolerance
- currencies backed up by government
- company requiring you to work a certain amount of time
- at age 67 you get these full benefits
- an example of a job that is government based
- CEO of Berkshire Hathaway
- managed by employer
- age to invest in crypto
- rising stocks
Down
- government health care plan
- system of recording info so it can’t get hacked
- contributions made post tax
- the ceo of this is warren buffet
- virtual currency
- funds saved only for emergencies
- social security Medicare tax
- never forget rule one
- falling stocks
- a sum of money available for a particular purpose
- president that created social security
22 Clues: rising stocks • falling stocks • virtual currency • managed by employer • never forget rule one • age to invest in crypto • CEO of Berkshire Hathaway • age to get social security • government health care plan • contributions made post tax • social security Medicare tax • transfer funds to different plan • the ceo of this is warren buffet • funds saved only for emergencies • ...
Crossword 08 2023-10-25
Across
- refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
- refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring;
- Pornography refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
- refers to gathering and receiving information;
- Authority refers to the DOJ – Office of Cybercrime;
- Authority refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be;
- data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
- Data refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic data.
- refers to a computer or a computer network, the electronic medium in which online communication takes place;
- refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
- value refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
Down
- refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
- system refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media
- infrastructure refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
- refers to the modification or change, in form or substance, of an existing computer data or program;
- program refers to a set of instructions executed by the computer to achieve intended results;
- refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet;
- refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
- refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network;
20 Clues: refers to gathering and receiving information; • Authority refers to the DOJ – Office of Cybercrime; • program refers to a set of instructions executed by the computer to achieve intended results; • refers to the modification or change, in form or substance, of an existing computer data or program; • ...
Cybersecurity 2023-09-07
Across
- a computer infection
- protects organizations on internet attacks
- locks databases
- gives a scammer access to your personal computer
- security for computers
- information
- faking
- to save something
Down
- deceive people into giving up their personal info
- ransomeware
- authentication method (2)
- to ensure protection
- worker
- when something isnt safe
- protecting information
- desktop
- authentication method
- scammers that impersonate a business
- when a virus spreads
- damages
20 Clues: worker • faking • desktop • damages • ransomeware • information • locks databases • to save something • a computer infection • to ensure protection • when a virus spreads • authentication method • protecting information • security for computers • when something isnt safe • authentication method (2) • scammers that impersonate a business • protects organizations on internet attacks • ...
nin26 2024-07-03
Across
- Data transfer rate
- Unwanted email
- Clickable link
- Access code
- Saved URL
- Login name
- Data security
- Very large data unit
- Restart computer
- Processor speed
- Programming rules
- Data unit
Down
- Windows feature
- Network security
- Computer chip material
- Online scam
- Computational process
- Computer protection
- Onscreen pointer
- Trash bin icon
- Massive data unit
- Software addon
- Background image
- Main screen
- Large data unit
25 Clues: Saved URL • Data unit • Login name • Online scam • Access code • Main screen • Data security • Unwanted email • Clickable link • Trash bin icon • Software addon • Windows feature • Processor speed • Large data unit • Network security • Onscreen pointer • Restart computer • Background image • Massive data unit • Programming rules • Data transfer rate • Computer protection • Very large data unit • ...
Cyber Manners 2017-09-20
Across
- a person who commits a crime
- to say unkind things about somebody
- to make somebody feel stupid and ashamed
- falsh
- a synonym for puberty or the period between childhood and adulthood
- when you do not know a person's name
Down
- making you feel serious and think carefully
- to be sent permanently away from an institution, for instance school
- not being allowed to attend a certain school (noun)
- when you cannot find out where something comes from
- to make fun of in an unfriendly way
- causing someone to feel offended
12 Clues: falsh • a person who commits a crime • causing someone to feel offended • to say unkind things about somebody • to make fun of in an unfriendly way • when you do not know a person's name • to make somebody feel stupid and ashamed • making you feel serious and think carefully • not being allowed to attend a certain school (noun) • ...
Cyber Manners 2017-09-20
Across
- to say unkind Things about somebody
- a person WHO commits a crime
- causing someone to feel offended
- to force somebody to leave school
- to make somebody feel ashamed and stupid
- making you feel serious and think carefully
Down
- puberty, or the period between childhood and adulthood
- when you cannot find out where somthing comes from
- not being allowed to attend school
- when you do not know a person's name
- false
- to make fun of somebody in an unfriendly way
12 Clues: false • a person WHO commits a crime • causing someone to feel offended • to force somebody to leave school • not being allowed to attend school • to say unkind Things about somebody • when you do not know a person's name • to make somebody feel ashamed and stupid • making you feel serious and think carefully • to make fun of somebody in an unfriendly way • ...
cyber bullying 2024-04-23
Across
- The act of intentionally excluding or isolating someone from an online group or community
- Pretending to be someone else online in order to harass or deceive them
- FOOTPRINT A digital representation of a person's online presence and activities
- The act of harassing, threatening, or embarrassing others online
- A type of online harassment that involves repeatedly sending unwanted messages
- The emotional or psychological harm caused by cyberbullying
- MEDIA An online platform or community where people can share and interact with content
- LITERACY The use of digital tools and resources to create and share content
- A false or misleading piece of information spread online, often to cause harm
Down
- A person who stands up against bullying and supports the victim
- The practice of protecting one's personal information and privacy online
- Sharing private or embarrassing information about someone online without their consent
- The practice of using electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- A network of interconnected web pages, also known as the "World Wide Web"
- CITIZENSHIP The ability to use technology and the internet in a safe, responsible, and ethical manner
15 Clues: The emotional or psychological harm caused by cyberbullying • A person who stands up against bullying and supports the victim • The act of harassing, threatening, or embarrassing others online • Pretending to be someone else online in order to harass or deceive them • The practice of protecting one's personal information and privacy online • ...
Cyber travel 2024-06-20
12 Clues: this is pixel • this is email • this is picnic • this is trojan • this is tiktok • this is cookie • this is camping • this is chatgpt • this is tourist • this is bluetooth • this is a festival • this is a souvenir
Cyber Safety 2023-09-14
Across
- Malware that requires the victim to pay a ransom to access encrypted files.
- criminals who break into computer networks with malicious intent.
- two words creates and stores strong passwords
- sending, posting, or sharing negative, harmful, false, or mean content about someone else.
- two words. long (phrases or sentences) that mix capital and lowercase letters, numbers, and symbols
Down
- Malicious software
- The numeric address of a computer on the internet
- A Private Network that ensures your anonymity on the internet
- Which social media platform is a hackers’ favorite
- Software used to protect a computer from viruses
- Main component of a server
- unwanted email messages
12 Clues: Malicious software • unwanted email messages • Main component of a server • two words creates and stores strong passwords • Software used to protect a computer from viruses • The numeric address of a computer on the internet • Which social media platform is a hackers’ favorite • A Private Network that ensures your anonymity on the internet • ...
Cyber law 2023-08-23
12 Clues: jauh • hak merk • community • menggunggah • penggabungan • keamanan pribadi • ruang/dunia maya • pencemaran nama baik • penyampaian informasi • hak cipta/hak intelektual • pencurian melalui internet • kejahatan melalui dunia maya
cyber bullying 2021-05-06
12 Clues: :( • 000 • not right • by yourself • it will be... • being careful • a way of death • a mental illness • an act of bullying • a way someone cyberbullies • the main people who do this • someone repetitively picking on you
CYBER CROSSWORD 2021-09-02
Across
- The process of converting analogue data into digital form.
- A global domain within the information environment consisting of the interdependent network of information systems.
- Act of sending unsolicited e-mails.
- The process of exploring and analyzing large blocks of information to glean meaningful patterns and trends.
- The worldwide network of economic activities enabled by information and Communications Technologies.
- The primary law in India dealing with Cybercrime and E-Commerce.
- The process of preventing unauthorized people from reading the data that is transmitted over your wireless network.
Down
- The use of information and communication technology in political and governance processes.
- A program that disrupts the normal functioning of your computer systems.
- The Adoption or increase in the use of digital or computer technology by an organization, industry etc.
- The programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
- A small text file created by a website that is stored in the user's computer for recognizing and keeping track of the user's preferences.
12 Clues: Act of sending unsolicited e-mails. • The process of converting analogue data into digital form. • The primary law in India dealing with Cybercrime and E-Commerce. • A program that disrupts the normal functioning of your computer systems. • The use of information and communication technology in political and governance processes. • ...
Cyber Ethics 2025-06-14
Across
- – Using someone else's ideas or words as your own work
- – Unwanted bulk emails from unknown sources
- – Following internet manners and being respectful
- – Ethical use of computers, internet, and digital content
- – Legal rights over one’s creative work or inventions
- – Rules about right and wrong use of computers and internet
Down
- – Important thing to protect while using digital platforms
- – Illegal intrusion into a computer system or network
- – The online trail left by your internet activity
- – Moral principles that guide right or wrong actions online
- – Good behavior and manners while using the internet
- – Stealing software by copying it illegally
- – Something made or invented by a person
- – The right to control what personal data is shared online
- – Copying and sharing software without permission
15 Clues: – Something made or invented by a person • – Unwanted bulk emails from unknown sources • – Stealing software by copying it illegally • – The online trail left by your internet activity • – Following internet manners and being respectful • – Copying and sharing software without permission • – Good behavior and manners while using the internet • ...
Cyber terms 2022-02-10
Across
- passthrough for IPsec
- blocks the use of proxy servers
- blocks internet requests from unknown sources
- prevents a local computer from using a URL or IP address to gain access to the local server
Down
- Legacy firewall
- Point to Point
- blocks multicast
- blocks Java
- blocks ActiveX
- blocks cookies
- layer two tunnelling protocol pass through
- keeps port 113 from being scanned by devices
12 Clues: blocks Java • Point to Point • blocks ActiveX • blocks cookies • Legacy firewall • blocks multicast • passthrough for IPsec • blocks the use of proxy servers • layer two tunnelling protocol pass through • keeps port 113 from being scanned by devices • blocks internet requests from unknown sources • ...
Cyber Crossword1 2022-07-18
12 Clues: Flaw • The traid • Form of Malware • ISACA certification • likely cause danger • Hide the true meaning • login with a single ID • Security Operations center • Making it inaccessible to users • Type of Social Engineering attack • software to harm or exploit any device • controls incoming and outcoming traffic
Cyber Ethics 2025-05-23
Across
- Fully connected topology
- Wireless Network
- Topology with backbone cable
- Illegal Intrusion in a computer via internet
- Responsible Behaviour
- wireless fidelity
- Legal right for original creator for his/her own work
Down
- Sender transform data into unreadable code
- All nodes are connected via a central device
- Network Within a city
- Connected devices in network
- Use single user software in multiple system
- Network across the world
13 Clues: Wireless Network • wireless fidelity • Network Within a city • Responsible Behaviour • Fully connected topology • Network across the world • Connected devices in network • Topology with backbone cable • Sender transform data into unreadable code • Use single user software in multiple system • All nodes are connected via a central device • ...
Cyber Ethics 2025-06-07
Across
- It refers to unwanted bulk of email that comes from a
- It refers to being aware of the ethical practices.
- It is a legal right granted by law to the creator for his
- PIRACY: when a software is copied and distributed illegally, it is
- work.
- sources.
Down
- It refers to the act of using or imitating the language
- FOOTPRINT: It is an impression or information about a person that exists
- the internet because of his online activity.
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- thoughts of another person as one's original work.
12 Clues: work. • sources. • the internet because of his online activity. • It refers to being aware of the ethical practices. • thoughts of another person as one's original work. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • It refers to an illegal intrusion into a computer system • ...
Cyber Ethics 2025-06-07
Across
- It refers to unwanted bulk of email that comes from a
- It refers to being aware of the ethical practices.
- It is a legal right granted by law to the creator for his
- PIRACY: When a software is copied and distributed illegally, it is
- work.
- sources.
Down
- It refers to the act of using or imitating the language
- FOOTPRINT: It is an impression or information about a person that exists
- the internet because of his online activity.
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- thoughts of another person as one's original work.
12 Clues: work. • sources. • the internet because of his online activity. • It refers to being aware of the ethical practices. • thoughts of another person as one's original work. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • It refers to an illegal intrusion into a computer system • ...
Cyber Awareness 2025-11-06
Across
- Attack that overwhelms a system with massive fake traffic.
- General term for malicious software.
- Login method requiring two forms of authentication.
- An update that fixes security vulnerabilities in software.
- Network security system that blocks unauthorized access.
- Software or hardware that records everything typed.
Down
- A network of compromised computers controlled remotely
- Unauthorized access to sensitive systems or data.
- A vulnerability that hackers exploit before it’s patched.
- A fake email scam designed to steal personal information.
- Self-replicating program that spreads without human help.
- Malware that locks files and demands payment.
12 Clues: General term for malicious software. • Malware that locks files and demands payment. • Unauthorized access to sensitive systems or data. • Login method requiring two forms of authentication. • Software or hardware that records everything typed. • A network of compromised computers controlled remotely • Network security system that blocks unauthorized access. • ...
Darragh cyber safety 2016-06-07
Across
- people who help you get rid of the hackers
- thing that you can play video games
- things that are your special things
- big site where hackers can hack into things
- things are your personal things
- people sticking their heads in.
- ups adds that automatically appear on your device
- you need to be careful when doing this
Down
- people who will help you with bully's
- shutting down your device.
- someone who pretends to be nice but the
- safety things
- a device that you can go on line
- to get something on your
- someone who tries to be mean on line
- a thing that allows someone to speak to you
- word or numbers that allows you to go on to a device
- people who are getting rid of your things on line.
- things that everyone can see
19 Clues: safety things • to get something on your • shutting down your device. • things that everyone can see • things are your personal things • people sticking their heads in. • a device that you can go on line • thing that you can play video games • things that are your special things • someone who tries to be mean on line • people who will help you with bully's • ...
Angryword 2021-09-06
Across
- cyber attack leg joint
- return to multiple boiled porks
- 1000 year card game
- lots of males look
- ale maker road
- Dutch car stop
- Ash's friend healthy green space
- west country gaff
Down
- cover up postpone
- knighthood five scientific suffix
- aircraft tilt position to left or right
- red cheese rectangle
- bacon country mound
- alcohol processor 8 ball game road
- broken glass
15 Clues: broken glass • ale maker road • Dutch car stop • cover up postpone • west country gaff • lots of males look • 1000 year card game • bacon country mound • red cheese rectangle • cyber attack leg joint • return to multiple boiled porks • Ash's friend healthy green space • knighthood five scientific suffix • alcohol processor 8 ball game road • aircraft tilt position to left or right
Law Enforcement in TV 2023-10-20
Across
- Starring Larry Wilcox and Erik Estrada
- Dr. Reid works for this FBI unit (abbreviation)
- Reality, famous theme song
- Brennan & Booth
- Famous gavel noise
- Springfield's police chief
- 21 Jump ____
- Cagney & _____
Down
- Knight Rider's artificially intelligent car
- "Just one more thing..."
- Stylish 80s series
- Miami, NY, Cyber
- Chicago Med, Fire, and _____
- Nine-Nine, stars Andy Samburg
- Recently reached 20th season on CBS
15 Clues: 21 Jump ____ • Cagney & _____ • Brennan & Booth • Miami, NY, Cyber • Stylish 80s series • Famous gavel noise • "Just one more thing..." • Reality, famous theme song • Springfield's police chief • Chicago Med, Fire, and _____ • Nine-Nine, stars Andy Samburg • Recently reached 20th season on CBS • Starring Larry Wilcox and Erik Estrada • Knight Rider's artificially intelligent car • ...
La seguridad y los accidentes 2023-02-22
14 Clues: to land • seatbelt • insurance • to reduce • dangerous • prohibited • traffic jam • to take off • car accident • customsagent • notice;warning • safety;security • security measures • to fasten the seatbelt
Indústria 4.0 2023-02-24
George 2024-01-09
16 Clues: ηχώ • αρπάζω • αμέσως • σειρήνα • φύλακας • ασφάλεια • συναγερμός • αποτελεσματικά • βάζω στα κρυφά • αδιάφορα, ανέμελα • κατά τα φαινόμενα • αρπάζω κάτι από κάποιον • στριμωγμένος οικονομικά • καταρρέω, γίνομαι κομμάτια • αβέβαια, εκφράζοντας αμφιβολίες • δεν μπορώ να πιστέψω στα αυτιά μου
Thanksgiving crossword puzzle 2022-11-30
12 Clues: too eat • thankful • mom and dad • after lunch • Cyber Monday • american football • to give to some one • people really close to u • from the Latin peregrinus • the mount of thanksgiving • what macy dose on thanksgiving • some thing u thourw in a pot and cook it
safety and security 2022-12-12
Across
- / details the emergency procedures designed to maintain safety of guest, employees ad the property. pg 191
- / one reason lodging properties are allowed to refuse service to guest is if guests are intoxicated. pg 186
- / Usually, keys given to employees are metal keys. these should be audited on a regular basis. pg 193
- floors, stairwells / key access also used for...pg 194
- / Ensure every employee knows how to follow the emergency response plan during an emergercy. pg 197
- / are laws that protect both the innkeeper and guest. pg 187
- / the security officer(loss prevention officer) has multiple responsible and is the "boots on the ground". pg 188
- / is the secure and logical control of all keys in the hotel. pg 191
- / review the response, identify any gaps, and make improvements to respond more efficiantly in future emergency situations. pg 197
- / if a hotel dose not have a security department. pg 187
- / are well known for having highly sophisticated security technology. pg 194
- / come from outside such as weather, active assailants, and bomb threats. pg 198
- / the guestroom key opens the door of the room that has been assigned to the guest. pg 192
- / conduct a practice run of the emergency response plan to make employees comfortable. pg 197
- / based on the emergency response plan, determine what needs to be purchased and acquired, and then store these items. pg 196
- / is a specifically encoded key, typically used by the bell attendant to handle a luggage pull. pg 192
- / is any observed behavior that could indicate crime or terrorism. pg 189
- / is the close observation of a situation to provide information for investigations regrading guests, employees, and asset protection. pg 193
- / an innkeekper is an individual or business owner who provides overnight accommodations for guest in exchange for reasonable compensation.pg 187
- / human trafficking is a form of modern-day slavery. It includes the force, fraud, or coercion to labor or commercial s*x. pg 189
- / The security supervisor supports the security manager and the management function. pg 188
- / is typically used by inspector. pg 192
Down
- / as the department head, the security manager(director of security) over...pg 188
- / a comprehensive report that addresses. pg 188
- / The security department is responsible for traininng emplayees to be prepared to hanble emergency situations. pg 191
- / include monitoring keys, surveillance, and awareness of pretinent technological advance. pg 191
- / addresses ensuring the safety and security of the hotel and its guest preventing problem from occurring. pg 190
- / allows access into all of the door locks of the hotel. pg 192
- / is typically used by guestroom attendants. pg 192
- / create an emergency response plan.pg 196
- / is failure to act in a safe manner. pg 18
- / is responsible for handling daily operations in the hotel as well as any emergency situations that arise. pg 195
- / can be defined as having an understanding of what is going on around you. pg 188
- / The director of security maintains relationships with law enforcement(police)...etc. pg 190
- / refers to being responsible for the actions or the condition of an establishment. pg 186
- / are something that happen in the hotel like a gas leak or water damage. pg 198
- / alert guests to potential hazards, such as wet floors. pg 187
- / allows the door lock to be overridden to open the electronically engaged deadbolt. pg 192
- / means that you have a legal duty to act in the way that an ordinary, prudent, reasonable person would. pg 186
- / may be carried by housekeeping, maintenance, and security personnel. pg 194
40 Clues: / create an emergency response plan.pg 196 • / is typically used by inspector. pg 192 • / is failure to act in a safe manner. pg 18 • / a comprehensive report that addresses. pg 188 • / is typically used by guestroom attendants. pg 192 • floors, stairwells / key access also used for...pg 194 • / if a hotel dose not have a security department. pg 187 • ...
Marketing Crossword Puzzle 2021-09-30
10 Clues: given money • cyber attacks • Risky situation. • Secure Sockets Layer • wall to prevent fires • malicious computer code • involve a web advertiser • rectangular graphic display • data retention and analysis • Interrupt or damage a device
General Cyber Terms 2021-08-03
Across
- open web application security program
- tricking users with fake usernames, emails or URLs
- using SMS for phishing attacks
- this control allows roll back to a previous development point
- demands money to unlock yr computer
- stealing information
- retending to be a reputable person / entity to induce the disclorure of sensitive info
- appears a safe program but creates a PC backdoor
- a type of eavesdropping attack by a 3rd party
Down
- redirecting users to false websites that imitate the legitimate URL
- this sneak surfing type observes password entry from "behind" the person
- process of catching things that live in water
- a phishing type target someone with something of value
- 'zombie' computer launching DDoS attacks
- infects host with spam, unwanted ads, hijacks browser, etc
- take advantage of a vulnerability
- a form of mining
- unauthorised computer access
- malicious software
19 Clues: a form of mining • malicious software • stealing information • unauthorised computer access • using SMS for phishing attacks • take advantage of a vulnerability • demands money to unlock yr computer • open web application security program • 'zombie' computer launching DDoS attacks • process of catching things that live in water • a type of eavesdropping attack by a 3rd party • ...
Cyber & Digital Safety 2024-11-10
Across
- Australian agency providing tools and support for staying safe online.
- Settings that help control who can view your information online.
- An online trick designed to steal money or personal information.
- Notifying a trusted adult or platform about inappropriate content or behaviour.
- An extra layer of security for protecting online accounts.
- When someone uses your personal information to impersonate you.
- Capturing an image of your screen, sometimes used to save evidence.
- A counseling service providing support for kids in need of help.
- Pretending to be someone else online to deceive or manipulate others.
- Measures to protect devices and networks from digital threats.
Down
- Bullying or harassment that takes place online or through digital devices.
- The trail of data you leave online, like posts and searches.
- When someone builds trust with a minor online to exploit or harm them.
- The sharing of someone's private images without consent.
- Websites that are reliable and safe for information or purchases.
- Treating others well online and avoiding hurtful actions.
- False information spread online, often by mistake.
- The amount of time spent on devices with screens, like phones or tablets.
- Someone who supports others positively online, especially against bullying.
19 Clues: False information spread online, often by mistake. • The sharing of someone's private images without consent. • Treating others well online and avoiding hurtful actions. • An extra layer of security for protecting online accounts. • The trail of data you leave online, like posts and searches. • Measures to protect devices and networks from digital threats. • ...
Bullying 2013-11-28
Across
- The common group to get cyber-bullied.
- In extreme cases, bullying can lead to ____.
- A free, anonymous and confidential phone and on-line professional counselling service for youth.
- The use superior strength or influence to intimidate someone.
- Using one's body and physical bodily acts to exert power of peers.
Down
- “Sticks and stones may break my bones but ____ will never hurt me.”
- 47% of Canadian _____ report having a child victim of bullying.
- The most common form of bullying behaviour. It includes: name calling, insults, teasing and mimicking etc.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- An act to amend the criminal code (cyber-bullying).
10 Clues: The common group to get cyber-bullied. • In extreme cases, bullying can lead to ____. • An act to amend the criminal code (cyber-bullying). • The use superior strength or influence to intimidate someone. • 47% of Canadian _____ report having a child victim of bullying. • Using one's body and physical bodily acts to exert power of peers. • ...
Cyber-crossword 2017-03-01
Across
- applications that allow you to communicate with friends
- do not ... requests from strangers
- the ... web browse concerns us all
- an act of violence on the internet against another user
- an application which helps you contact with your friends
- you need to be sure of someone's ... before you start a conversation with them
Down
- when you are on the internet you are...
- you need to use the internet with ...
- the ... of cyberbullying
- protection of your on-line information
- browsing machine
- what you need to do if anything happens to you on-line
12 Clues: browsing machine • the ... of cyberbullying • do not ... requests from strangers • the ... web browse concerns us all • you need to use the internet with ... • protection of your on-line information • when you are on the internet you are... • what you need to do if anything happens to you on-line • applications that allow you to communicate with friends • ...
Cyber Law 2017-09-28
Across
- Any criminal activity associated with a computer.
- Transmitting computer viruses to people to destroy their computer system or files.
- The use of the computer to sabotage computer networks vital to the national welfare.
- The communication via computer or other electronic device of false data that damages a person's reputation.
- Intentionally disrupting, defacing, or even destroying a site.
Down
- An unwelcome intrusion into the private matters of an individual carried out or sustained by a computer.
- Area of the law which concerns computers and computer related crime.
- A crime that involves using a computer to steal computer data stored in a digital format.
- Any illegal activity already in the criminal code committed by using a computer.
- The use of information unlawfully obtained by computer to pressure a victim into granting a payoff to the blackmailer.
- A crime in which a cyber criminal falsely adopts the identity of anothor computer user in order to commit fraud.
- Involves the invasion, distortion, theft, falsification, misuse, destruction, or exploitation of information stored in or related to electronic devices.
12 Clues: Any criminal activity associated with a computer. • Intentionally disrupting, defacing, or even destroying a site. • Area of the law which concerns computers and computer related crime. • Any illegal activity already in the criminal code committed by using a computer. • Transmitting computer viruses to people to destroy their computer system or files. • ...
cyber safety 2013-11-03
Across
- network: when you chat to your friends
- too many advertisements had come up, and for you to press the wrong buttons,
- on the top of your laptop, it tells you the tabs you have opened.
- when you log in to your laptop
- when you are on the network and they are saying mean things about you.
- a person who breaks into your laptop without you knowing
- take notice to what you are doing on your laptop.
- when you need wi-fi you connect.
Down
- advertisements come up on your laptop and you have to click the exist button.
- transferring something on to your laptop
- when you can see the person whilst talking to them, but they are in a different location.
- to make sure the person is getting the information you send them (just like a message.
12 Clues: when you log in to your laptop • when you need wi-fi you connect. • network: when you chat to your friends • transferring something on to your laptop • take notice to what you are doing on your laptop. • a person who breaks into your laptop without you knowing • on the top of your laptop, it tells you the tabs you have opened. • ...
Cyber School 2024-08-15
12 Clues: рано • вместе • километры • далеко от • шесть часов • встречаться • день спорта • онлайн школа • разговаривать с • заниматься, учиться • по интернету / в интернете • отправлять по электронной почте
Cyber Boo 2023-09-26
Across
- A group of words or letters that you type into a search engine to find something.
- What's the term for making a copy of important files so you don't lose them?
- What's the term for a secret code that you use to unlock your devices?
- What do you call the bad guys who try to trick you into giving them your personal information?
- What's the name of a program that can keep your computer safe from viruses?
- What should you avoid clicking on if it looks suspicious or too good to be true?
Down
- A type of computer attack that locks you out of your computer until you pay money.
- What should you set up on your computer to make sure only you can use it?
- The process of keeping your computer software up to date.
- A fake website or email designed to trick you into giving up personal information.
- What do you call a person who tries to hack into computers and steal information?
- The little picture or symbol you click on to open an app or program.
12 Clues: The process of keeping your computer software up to date. • The little picture or symbol you click on to open an app or program. • What's the term for a secret code that you use to unlock your devices? • What should you set up on your computer to make sure only you can use it? • What's the name of a program that can keep your computer safe from viruses? • ...
Cyber krzyżówka 2025-02-10
Across
- – Jak nazywa się technologia zapewniająca bezpieczne i prywatne połączenie z internetem?
- – Jak nazywają się niechciane wiadomości e-mail, często zawierające reklamy lub wirusy?
- – Jak nazywa się system zabezpieczeń sieciowych, który filtruje ruch internetowy?
- – Jak nazywa się tryb przeglądarki internetowej, który nie zapisuje historii przeglądania?
- – Jak nazywa się proces potwierdzania tożsamości użytkownika przed dostępem do systemu?
- – Jak nazywa się proces przekształcania danych w taki sposób, aby były nieczytelne dla osób nieuprawnionych?
- – Jak nazywa się złośliwe oprogramowanie, które może uszkodzić system komputerowy?
Down
- – Jak nazywa się oszustwo polegające na podszywaniu się pod zaufane instytucje w celu wyłudzenia danych?
- – Jak nazywa się osoba, która łamie zabezpieczenia komputerowe?
- – Jak nazywa się ciąg znaków używany do zabezpieczenia konta użytkownika?
- – Jak nazywa się atak, w którym hakerzy blokują dostęp do plików i żądają okupu?
- – Jak nazywa się program chroniący komputer przed złośliwym oprogramowaniem?
12 Clues: – Jak nazywa się osoba, która łamie zabezpieczenia komputerowe? • – Jak nazywa się ciąg znaków używany do zabezpieczenia konta użytkownika? • – Jak nazywa się program chroniący komputer przed złośliwym oprogramowaniem? • – Jak nazywa się atak, w którym hakerzy blokują dostęp do plików i żądają okupu? • ...
Cyber Crime 2024-10-03
Across
- A crime without a harmed party.
- civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm
- Informal language that keeps things groovy.
- Legal protection for creative works.
- Software that shields your computer from malicious code.
- Small sacred space for quiet reflection.
- Where dishes go to get washed
- Digital warfare with a sinister twist.
Down
- the condition of wandering homelessness without regular employment or income
- Covert software that snoops on your digital secrets.
- violation of social or economic boundary
- Space-saving stacked sleeping arrangement.
12 Clues: Where dishes go to get washed • A crime without a harmed party. • Legal protection for creative works. • Digital warfare with a sinister twist. • violation of social or economic boundary • Small sacred space for quiet reflection. • Space-saving stacked sleeping arrangement. • Informal language that keeps things groovy. • ...
Cyber Awareness 2024-10-09
Across
- This barrier keeps unwanted network traffic out of your system.
- A software update that fixes security vulnerabilities.
- Malicious software that locks your files until you pay up.
- Malicious software designed to harm or exploit a computer system.
- Your first line of defense; make it strong and unique.
- Verifying your identity before granting access.
Down
- Malicious software disguises itself as something harmless.
- It turns your data into a secret code to keep it safe.
- Malicious software that secretly gathers information about a user.
- A process that turns data into a fixed-length string of characters.
- A secure tunnel for your internet traffic, often used to protect privacy.
- A copy of your data that you keep safe in case of an emergency.
12 Clues: Verifying your identity before granting access. • It turns your data into a secret code to keep it safe. • A software update that fixes security vulnerabilities. • Your first line of defense; make it strong and unique. • Malicious software disguises itself as something harmless. • Malicious software that locks your files until you pay up. • ...
Cyber ethics 2025-06-07
Across
- act of sending misleading email
- protect from harm
- existing on internet
- unsolicited emails
- unauthorized acces to computer
- harmful software
- the right to keep your personal information
- a unique identifier
Down
- legal protection for original work
- act of using language of another person
- sequence of character used to acces accounts
- to harm someone using digital platform
12 Clues: harmful software • protect from harm • unsolicited emails • a unique identifier • existing on internet • unauthorized acces to computer • act of sending misleading email • legal protection for original work • to harm someone using digital platform • act of using language of another person • the right to keep your personal information • sequence of character used to acces accounts
Cyber Crossword 2025-07-23
Across
- another name for something you are in MFA
- Faking an email address or phone number
- Scrambling messages to make sure nobody unwanted can read them
- Basic cipher done by shifting letters
- Malware that encrypts your files and demands payment
Down
- Type of spyware that tracks what you type
- Stealing info using social engineering
- Protects your computer from dangerous traffic
- Looks and acts like a legitimate program, but isn't
- Secret word used to log in
- A program that can damage your computer
- Using more than one way to verify your identity (abbreviation)
12 Clues: Secret word used to log in • Basic cipher done by shifting letters • Stealing info using social engineering • Faking an email address or phone number • A program that can damage your computer • Type of spyware that tracks what you type • another name for something you are in MFA • Protects your computer from dangerous traffic • ...
Cyber Secure 2025-09-22
Across
- What blagging is used for.
- What a cybercriminal commits.
- Pretending to be trustworthy to deceive someone is this type of engineering.
- Data that has been processed.
- The term for sending fake emails asking for personal information.
- Raw facts and figures.
Down
- Secretly watching someone enter a PIN or password.
- A person who uses the internet to commit a crime.
- Gaining unauthorised access to computers.
- Can identify you on its own or with other details.
- Another name for Two Factor Authentication.
- A law that protects your personal information.
12 Clues: Raw facts and figures. • What blagging is used for. • What a cybercriminal commits. • Data that has been processed. • Gaining unauthorised access to computers. • Another name for Two Factor Authentication. • A law that protects your personal information. • A person who uses the internet to commit a crime. • Secretly watching someone enter a PIN or password. • ...
Cyber Vocabulary 2022-08-19
Across
- A violation of copyrights laws or applicable license restrictions.
- Trying to get sensitive data.
- Sharing a file with other people.
- A software that gathers your data from you and the device and sends it to third parties without your consent to do so.
- spreads to computers to damage the data and its software.
- A virus that is downloaded onto your computer disguised as a real website.
- It’s self-replicating and it affects other computers.
Down
- Content that is not protected by copyright laws and others, it can be copied,shared, altered, and republished by other people.
- The user must agree to go to corporate,internet, or other things.
- Where ads appear when a program is running.
- Something to connect to your device to access to your program and the user (MercuryA).
- That an object as certain security properties.
12 Clues: Trying to get sensitive data. • Sharing a file with other people. • Where ads appear when a program is running. • That an object as certain security properties. • It’s self-replicating and it affects other computers. • spreads to computers to damage the data and its software. • The user must agree to go to corporate,internet, or other things. • ...
cyber bullying 2019-07-11
Across
- when you want to kill yourself
- someone who enforces law
- when you are the person who gets bullied
- playing with other people
- when you are very sad
- by your self
Down
- someone who is mean for a long amount of time
- something you play
- when people don't know who you are
- someone who teaches people
- in your mind
- when you aren't in danger
12 Clues: in your mind • by your self • something you play • when you are very sad • someone who enforces law • playing with other people • when you aren't in danger • someone who teaches people • when you want to kill yourself • when people don't know who you are • when you are the person who gets bullied • someone who is mean for a long amount of time
cyber bullying 2019-07-11
Across
- when you want to kill yourself
- playing with other people
- when you are the person who gets bullied
- someone who is mean for a long amount of time
- when you are very sad
- by your self
- something you play
Down
- when people don't know who you are
- in your mind
- someone who teaches people
- someone who enforces law
- when you aren't in danger
12 Clues: in your mind • by your self • something you play • when you are very sad • someone who enforces law • playing with other people • when you aren't in danger • someone who teaches people • when you want to kill yourself • when people don't know who you are • when you are the person who gets bullied • someone who is mean for a long amount of time
cyber bullying 2019-07-11
Across
- someone who teaches people
- someone who is mean for a long amount of time
- when people don't know who you are
- when you want to kill yourself
- when you aren't in danger
- in your mind
Down
- by your self
- someone who enforces law
- when you are very sad
- playing with other people
- something you play
- when you are the person who gets bullied
12 Clues: by your self • in your mind • something you play • when you are very sad • someone who enforces law • playing with other people • when you aren't in danger • someone who teaches people • when you want to kill yourself • when people don't know who you are • when you are the person who gets bullied • someone who is mean for a long amount of time
CYBER CRIME 2020-10-18
Across
- To send information from your computer to another computer.
- A term for the actual computer equipment and related machines or computer parts.
- If someone tries to get access to computer systems in order to steal, corrupt or illegitimately view data
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- A set of programs that tell a computer to perform a task.
- a security barrier designed to keep unwanted intruders “outside” a computer system or network
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
Down
- An attempt to acquire a sensitive information such as username, password, files etc.
- A program used to access the Internet example- Firefox, chrome etc.
- Rules or manners for interacting courteously with others online
- Unsolicited email which is sent in large quantities to a large number of users.
- Software used or created by hackers to disrupt computer operation, gather sensitive information or gain access to private computer systems.
12 Clues: A set of programs that tell a computer to perform a task. • To send information from your computer to another computer. • Rules or manners for interacting courteously with others online • A program used to access the Internet example- Firefox, chrome etc. • Unsolicited email which is sent in large quantities to a large number of users. • ...
Cyber Safety 2015-01-27
12 Clues: izdzēst failu • ievadīt paroli • saņemt e-pastu • saglabāt failu • izdzēst e-pastu • ievadīt segvārdu • saņemt pielikumu • izdzēst pielikumu • lejupielādēt failu • lejupielādēt bildi • lejupielādēt mūziku • sarakstīties tiešsaistē
Cyber Grille 2025-07-22
Across
- Correctif appliqué à un logiciel pour corriger une faille
- Technique rendant des données illisibles sans clé
- Barrière logicielle ou matérielle qui bloque les connexions non autorisées
- Protection des systèmes informatiques contre les attaques numériques
- Règlement européen sur la protection des données personnelles
Down
- Réseau d'ordinateurs infectés contrôlés à distance
- Programme espion enregistrant les frappes clavier
- Tromperie par e-mail ou site ou SMS pour soutirer des données personnelles
- Porte dérobé laissée pour accéder à un système sans autorisation
- Hameçonnage réalisé par SMS
- Technologie simulant une intelligence humaine
- Serveur qui sert d'intermédiaire entre un utilisateur et internet
12 Clues: Hameçonnage réalisé par SMS • Technologie simulant une intelligence humaine • Programme espion enregistrant les frappes clavier • Technique rendant des données illisibles sans clé • Réseau d'ordinateurs infectés contrôlés à distance • Correctif appliqué à un logiciel pour corriger une faille • Règlement européen sur la protection des données personnelles • ...
INFORMATIKA SEKARANG DAN MASA DEPAN 2025-08-26
Across
- Proses olah data jadi informasi
- Terjemahan Artificial Intelligence
- Data Kumpulan data sangat besar
- Perlindungan data digital
- Chatbot termasuk teknologi
- Terjemahan cloud computing
- Mobil pintar tanpa sopir
- Menggali pola dari data
- Algoritma belajar dari data
Down
- Cara sehat gunakan media digital
- Serangan pencuri data digital
- Mesin otomatis yang membantu manusia
- Dunia buatan imersif
- Jaringan global penghubung
- Kecerdasan buatan komputer
- Singkatan teknologi penghubung perangkat
- Kemampuan memahami dunia digital
- Teknologi yang bisa menyesuaikan
- Perangkat sensor terhubung jaringan
- Komunikasi antar mesin otomatis
20 Clues: Dunia buatan imersif • Menggali pola dari data • Mobil pintar tanpa sopir • Perlindungan data digital • Jaringan global penghubung • Kecerdasan buatan komputer • Chatbot termasuk teknologi • Terjemahan cloud computing • Algoritma belajar dari data • Serangan pencuri data digital • Proses olah data jadi informasi • Komunikasi antar mesin otomatis • Cara sehat gunakan media digital • ...
Agencies and corporations 2024-08-09
Across
- York Police Department One of the most famous abbreviations for a police department in the east coast, also in one of the biggest cities in America.
- Service The people who let trumps ear get shot off (almost).
- corps A group for people wanting to volunteer for the Gov't
- JFK wanted to defund these guys in the 60's, bad decision
- Scientists in charge of putting people in space
- The people in charge of cleaning up natural disasters.
- Science for the public funded by the public
- People in charge of environmental security.
- Patrol The people in charge of manning our weak points for immigrants to get in.
Down
- The scary people with scary weapons and tactics.
- Incharge of disease control
- park security They provide security for national parks
- They deliver mail
- The people in charge of taking down drug lords like Heisenberg
- Oversees the security industries
- Involved in some of the most disastrous raids including, The Ruby Ridge incident, and the burning down of mount Carmel
- Security Council National defense and security
- Bureau of Investigation Moto is "Fidelity, Bravery, Integrity"
- Civilizes national aviation.
- Produces the presidents budget
20 Clues: They deliver mail • Incharge of disease control • Civilizes national aviation. • Produces the presidents budget • Oversees the security industries • Science for the public funded by the public • People in charge of environmental security. • Security Council National defense and security • Scientists in charge of putting people in space • ...
PUMPKINS FLY 2013-01-13
Across
- / Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / Privilege of the permanent members: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- / Granted permanent membership into the Security Council in 1971
- / Location where the first Security Council session took place on 17 January 1946
- How many months do members take turns at holding the presidency of the Security Council
- / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
- / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
- Name the country that had used its veto power the most number of times. This country should be one of the permanent members in the Security Council.
- / Other than Brazil, India and Japan, name the the other country that has made the strongest demand for a permanent seat in the United Nations Security Council.
- / Number of members in the Security Council
- / The country Britain and France join forces with to invade Egypt in 1956 during the Suez Canal crisis.
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- In 2003, the United Nations Security Council was involved in a crisis that happened in Sudan. The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
14 Clues: / Number of members in the Security Council • / Granted permanent membership into the Security Council in 1971 • / Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire • / Location where the first Security Council session took place on 17 January 1946 • How many months do members take turns at holding the presidency of the Security Council • ...
Airport and international 2019-03-13
Across
- passenger
- type of plane
- airport security
- stuff you can bring on a plane
- airline
- allowed if declared
- unsecure side of airport
- type of runway incursion
- required to board plane internationally
- required to enter country
- wall of aircraft
- secure part of airport
Down
- alphabet
- covered walkway
- area adjacent to terminal
- go on to plane
- not allowed at all
- security
- cargo compartment
- machine for scanning
20 Clues: airline • alphabet • security • passenger • type of plane • go on to plane • covered walkway • airport security • wall of aircraft • cargo compartment • not allowed at all • allowed if declared • machine for scanning • secure part of airport • unsecure side of airport • type of runway incursion • area adjacent to terminal • required to enter country • stuff you can bring on a plane • ...
Network Concepts and Cyber Ethics 2025-06-03
Across
- collects data.
- Area Network.
- data for security.
- software.
- identifier for a device on a network.
- that forwards data packets between networks.
- for communication between devices.
- system that controls traffic.
- emails to steal data.
- system access.
Down
- networking method.
- network technology
- bullying.
- that provides services or data.
- creative work.
- data transfer rate.
- to access accounts securely.
- email.
- remote access method.
- to keep data secure.
20 Clues: email. • bullying. • software. • Area Network. • collects data. • creative work. • system access. • networking method. • network technology • data for security. • data transfer rate. • to keep data secure. • remote access method. • emails to steal data. • to access accounts securely. • system that controls traffic. • that provides services or data. • for communication between devices. • ...
Test 2023-08-25
9 Clues: Bulk Email • Quickly Spreads • Operating System • Amcor Cyber Month • Malicious Software • Most cyberattack method • Multifactor Authentication • Infected & Slowing your Computer • All things connected with Internet
36 2024-07-30
Across
- Witch haunting writer
- Remote farm terror
- Supernatural baby scare
- Cult island nightmare
- Mysterious machine obsession
- Cyber horrors anthology
- Indian ghost legend
- Indian village curse
- Home invasion silent horror
- Indian military interrogation
- Forest deity encounter
- Evil bidding app
Down
- Perpetual haunted store
- Barroom story horror
- Haunted house treatment
- Identity theft webcam horror
- Heart transplant horror
- Ghost soldiers battle
- Invisible predator fear
- Postapocalyptic fatherhood
- Shadowy figure fear
- Imaginary friend danger
- Blindfolded survival thriller
- Refugee haunting drama
- Haunting childhood game
25 Clues: Evil bidding app • Remote farm terror • Shadowy figure fear • Indian ghost legend • Barroom story horror • Indian village curse • Witch haunting writer • Cult island nightmare • Ghost soldiers battle • Refugee haunting drama • Forest deity encounter • Perpetual haunted store • Haunted house treatment • Supernatural baby scare • Heart transplant horror • Invisible predator fear • ...
Thanksgiving Crossword 2022-11-08
Across
- The soup of green bean casserole
- Ocean Spray
- The original Pilgrim colony
- Mac and Cheese brand
- Pie nut
- For the day after Thanksgiving
- Inside turkey
- Popular spiced Thanksgiving pie
- Thanksgiving’s traditional side dish
- The people you spend Thanksgiving with
- The star of the meal
- The thanksgiving emotion
Down
- Friday Shopping extravaganza
- Fall fruit pie
- Thanksgiving’s sport
- Holiday celebrating harvest and gratitude
- Sweet Potato Casserole with ____
- _____ Monday
- The month of Thanksgiving
- Thanksgiving day
- Served with turkey, mashed potatoes, biscuits, and more dishes
- Fall
22 Clues: Fall • Pie nut • Ocean Spray • _____ Monday • Inside turkey • Fall fruit pie • Thanksgiving day • Thanksgiving’s sport • Mac and Cheese brand • The star of the meal • The thanksgiving emotion • The month of Thanksgiving • The original Pilgrim colony • Friday Shopping extravaganza • For the day after Thanksgiving • Popular spiced Thanksgiving pie • The soup of green bean casserole • ...
Cyberpigs 1 2015-10-07
Across
- When you ________ an email, remember that it isn’t necessarily private.
- Take an _______ with you if you ever go to meet a cyber-friend.
- Don’t ever give your ________ or address to a cyber-stranger.
- When Lil gave out too much information, her email account was filled up with _________
- What Virtual Pigsty really wanted was Lil’s _________
Down
- Companies can use clubs to find out more information about you to _______ you things you don’t need.
- Websites where you play games with products are not playgrounds – they are ___________.
- The three CyberPigs were surfing the _____ one afternoon
- If Lil Pig entered a contest she would win a _______
9 Clues: If Lil Pig entered a contest she would win a _______ • What Virtual Pigsty really wanted was Lil’s _________ • The three CyberPigs were surfing the _____ one afternoon • Don’t ever give your ________ or address to a cyber-stranger. • Take an _______ with you if you ever go to meet a cyber-friend. • ...
