cyber security Crossword Puzzles

Places in town 2020-09-16

Places in town crossword puzzle
Across
  1. _____rooms
  2. clothes ______
  3. sports _____
  4. movie _____
Down
  1. _____ stop
  2. ____store
  3. fast food _____
  4. _____café

8 Clues: ____store_____café_____ stop_____roomsmovie _____sports _____clothes ______fast food _____

Security Terms 2022-11-17

Security Terms crossword puzzle
Across
  1. Malicious computer code that reproduces itself on a computer
  2. Publicly released software security update to repair a vulnerability
  3. Malware preventing devices from properly operating until a fee is paid
  4. Hardware or software designed to limit spread of malware
  5. General term used to describe software that spies on users by gathering information without consent
  6. Software code that gives access to a program that circumvents normal security protections
Down
  1. Software that helps prevent computers from becoming infected by spyware
  2. Database of viruses used to identify infected files
  3. Logical computer network of zombies under control of an attacker
  4. Computer code that is dormant until it is triggered by a specific logical event
  5. Attacker who controls a botnet
  6. Software that is a cumulative package of all patches and feature updates
  7. Security program that delivers advertising content in a way that is unexpected and unwanted
  8. Infected computer under remote control of an attacker

14 Clues: Attacker who controls a botnetDatabase of viruses used to identify infected filesInfected computer under remote control of an attackerHardware or software designed to limit spread of malwareMalicious computer code that reproduces itself on a computerLogical computer network of zombies under control of an attacker...

USAJ Security 2022-03-30

USAJ Security crossword puzzle
Across
  1. Security training required
  2. Check that cargo
  3. Alternate AOSC
  4. Check your record
  5. The wand
  6. Need to know only
  7. Search procedure
Down
  1. On the glass
  2. USA Jet AOSC
  3. Aviation security regulator
  4. Broken wand (2 words)
  5. Fingerprint lady
  6. Tamper evidence
  7. Fingerprint lady, too

14 Clues: The wandOn the glassUSA Jet AOSCAlternate AOSCTamper evidenceCheck that cargoFingerprint ladySearch procedureCheck your recordNeed to know onlyBroken wand (2 words)Fingerprint lady, tooSecurity training requiredAviation security regulator

Security Awareness 2023-08-01

Security Awareness crossword puzzle
Across
  1. lax approach to policies and procedures, creating risks
  2. as a DoD employee, you are a _______
  3. when a blue light is blinking in an area, it means there is an ______ individual
  4. you are required to ______ suspicious behavior
  5. an adversary having the intent, capability, and opportunity to cause loss or damage
  6. anyone with access to classified information can become a _______ classifier
  7. lack of awareness of policies and procedures, creating risks
Down
  1. everyone's responsibility
  2. intentional acts, creating risks
  3. the practice of spying or of using spies, typically by governments to obtain political and military information
  4. a potential risk indicator for someone living above their means
  5. program access is based on ______ and material contribution
  6. report _______ travel at least 30 days in advance
  7. there is ______ a need to talk around classified outside a classified environment

14 Clues: everyone's responsibilityintentional acts, creating risksas a DoD employee, you are a _______you are required to ______ suspicious behaviorreport _______ travel at least 30 days in advancelax approach to policies and procedures, creating risksprogram access is based on ______ and material contribution...

information security 2023-08-29

information security crossword puzzle
Across
  1. Virus macros which have been programmed to carry out malicious intent
  2. gap or weakness which undermines an organization’s security efforts
  3. rights an individual or organization has over information and how it is used
  4. requirement of being private or secret
  5. intent of doing harm
  6. making sure a person is who they say they are
Down
  1. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain
  2. information or data which can be accessed when needed
  3. procedure used to determine user privileges or access levels to the system
  4. state of being complete or uncorrupted
  5. how information is protected
  6. network of computers and devices managed as a unit with the same procedures and rules
  7. to or damage sensitive information on a computer
  8. calculated assessment of potential threats to an organization’s security

14 Clues: intent of doing harmhow information is protectedstate of being complete or uncorruptedrequirement of being private or secretmaking sure a person is who they say they areto or damage sensitive information on a computerinformation or data which can be accessed when neededgap or weakness which undermines an organization’s security efforts...

FOOD SECURITY 2024-11-28

FOOD SECURITY crossword puzzle
Across
  1. - A prolonged period of abnormally low rainfall
  2. - The process of preserving food to prevent spoilage
  3. - A system for managing water resources for agricultural use
  4. - The buying and selling of agricultural products
  5. - A sudden increase in the price of food
  6. - A government program that provides food assistance to low-income individuals
  7. - The science of soil management and crop production
Down
  1. - The science of cultivating land, raising crops, and feeding livestock
  2. - The variety of plant and animal life in a particular habitat
  3. - The gradual warming of the Earth's climate
  4. - A system of farming that avoids synthetic fertilizers and pesticides
  5. - The movement of people or animals from one region to another
  6. - The process of adding nutrients to food to improve its nutritional content
  7. - A period of severe food scarcity

14 Clues: - A period of severe food scarcity- A sudden increase in the price of food- The gradual warming of the Earth's climate- A prolonged period of abnormally low rainfall- The buying and selling of agricultural products- The process of preserving food to prevent spoilage- The science of soil management and crop production...

DATA SECURITY 2025-10-22

DATA SECURITY crossword puzzle
Across
  1. A virtual barrier that keeps unauthorized users out of a computer network.
  2. A secret word or phrase that grants you access to an account or device.
  3. A small text file saved by a website to your computer that remembers information about you.
  4. Harmful software that can copy itself and spread to other computers, often deleting or damaging data.
  5. A set of rules for how you should behave and interact online.
  6. The record of everything you do and post online; it stays forever!
Down
  1. A type of software designed to damage, disable, or gain unauthorized access to a computer system.
  2. A crime where someone steals your personal information to pretend to be you.
  3. This type of software protects your computer from viruses and other malicious programs.
  4. The practice of protecting systems, networks, and data from digital attacks.
  5. A fake message, often an email, trying to trick you into giving away private information.
  6. A special way to scramble data so only authorized people can read it.
  7. The general term for information, like facts, statistics, or files.
  8. Using two different ways to prove you are who you say you are before logging in. (Abbreviation)

14 Clues: A set of rules for how you should behave and interact online.The record of everything you do and post online; it stays forever!The general term for information, like facts, statistics, or files.A special way to scramble data so only authorized people can read it.A secret word or phrase that grants you access to an account or device....

Financial Literacy Terms 2023-05-12

Financial Literacy Terms crossword puzzle
Across
  1. distribution of a companys earnings
  2. a company breaking up shares
  3. a financial advisor
  4. pooled money with investors
  5. a business varying its range
  6. stock that offers regular/steady income
  7. security that shows ownership in a company
  8. five year average sales growth above 15%
  9. share prices rising
Down
  1. differs from common stock
  2. profitability of a company
  3. selling an assest for MORE than your adjusted basis
  4. a bond that is a debt obligation
  5. stocks worth less than a dollar
  6. share prices falling
  7. annual income divided by price of security
  8. selling asset for LESS than adjusted basis
  9. earnings that are free of debt
  10. formal document required by and filed with the Securities and Exchange commision
  11. the value and investor earns from a security

20 Clues: a financial advisorshare prices risingshare prices fallingdiffers from common stockprofitability of a companypooled money with investorsa company breaking up sharesa business varying its rangeearnings that are free of debtstocks worth less than a dollara bond that is a debt obligationdistribution of a companys earnings...

Slack @: 2023-09-22

Slack @: crossword puzzle
Across
  1. The quality of keeping or being kept secret or private
  2. An act of breaking or failing to observe a law, agreement, or code of conduct.
  3. -security
  4. The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
  5. The art of writing or solving codes
  6. The process or action of proving or showing something to be true, genuine, or valid
Down
  1. The quality of being able to be used or obtained
  2. Type of malware relating to ancient Troy in Asia Minor
  3. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  4. A cybercrime in which the attacker floods a server with internet traffic from multiple sources to prevent users from accessing connected online services and sites
  5. The process of converting information or data into a code, especially to prevent unauthorized access.
  6. A method of accomplishing something primarily by means of strength, without the use of great skill, mechanical aids or thought
  7. The quality of being honest and having strong moral principles
  8. The Hollywood name of a person who uses computers to gain unauthorized access to data
  9. An electronic authentication method in which a user is granted access to a website or application

15 Clues: -securityThe art of writing or solving codesThe quality of being able to be used or obtainedType of malware relating to ancient Troy in Asia MinorThe quality of keeping or being kept secret or privateThe quality of being honest and having strong moral principlesAn act of breaking or failing to observe a law, agreement, or code of conduct....

TJandCASTROFLORES 2024-10-24

TJandCASTROFLORES crossword puzzle
Across
  1. warfare of security experts will discuss the growing threats to corporations.
  2. ceremony- when the vessel is formally named and launched is customarily
  3. warfare- the use of military aircraft and other flying machines in warfare.
  4. launching- vessel is either completed on perpendicular building ways near the water.
  5. warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
  6. conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
  7. control- measures taken to prevent a fire or collision.
Down
  1. weapons- traditional weapons such as rifles and explosives
  2. process- gain the information used to gain estimates of the situation
  3. warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
  4. warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
  5. lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
  6. warfare are self replicating programs that can hide in systems
  7. marsupial
  8. operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
  9. a series of short cruises to check out the ship and its equipment.

16 Clues: marsupialcontrol- measures taken to prevent a fire or collision.weapons- traditional weapons such as rifles and explosiveswarfare are self replicating programs that can hide in systemsa series of short cruises to check out the ship and its equipment.process- gain the information used to gain estimates of the situation...

otr 2014-05-12

otr crossword puzzle
Across
  1. ________ visit notifications must be passed 72 hours in advance of the proposed visit by Program Security.
  2. Do not ____________sensitive subjects on an unclassified phone line, in emails or via other types of unclassified communications.
  3. Program names and information cannot be listed on _______, websites or other personal documents.
  4. Accessed personnel should contact Program Security for instructions on the use of secure ______________ equipment.
  5. All ___________________must review and update their Personnel Security Prescreening Questionnaire (PSPQ) on an annual basis.
Down
  1. All _______ employees are required to report adverse information.
  2. Your __________ program security officer (CPSO) is your security liaison for specific programs.
  3. Report all _______ travel for business and personal reasons.
  4. ______________ is one type of a special program.
  5. Users must not share _________ with anyone.
  6. Security is __________ responsibility
  7. Refer to a program by its unclassified __________ (PID).

12 Clues: Security is __________ responsibilityUsers must not share _________ with anyone.______________ is one type of a special program.Refer to a program by its unclassified __________ (PID).Report all _______ travel for business and personal reasons.All _______ employees are required to report adverse information....

Domestic and International Airports (Nicoshia Toailoa/ Dublin ) 2017-09-10

Domestic and International Airports (Nicoshia Toailoa/ Dublin ) crossword puzzle
Across
  1. Is the 3 letter code for the Kapiti Coast
  2. A company located in check-in area which enables travellers to have their luggage sealed for protection
  3. Free facilities for transit passengers
  4. Home of the Worlds longest runway
  5. Auckland Airport will combine international and domestic _____ as early as 2019
  6. A facility used by those who wish to pray before a flight
  7. Acronym for Ministry of Agriculture and Forestry
  8. This has been dramatically increased after the September 11 2001 attack
  9. A word that you should not use in or around the Airport areas
  10. A small item that will be confiscated off you at security due to its risk of having the potential to self ignite
Down
  1. An official document issued by a government; certifies holders identity and citizenship
  2. You enter this area once you pass through passport control and Security at the Auckland International Airport
  3. Located landside, person travelling will need to present passport, ticket and luggage here
  4. An area accessible to everyone, including those who are not travelling
  5. A lounge at the Auckland Airport operated by Air New Zealand
  6. A form of transport available to take you between the 2 Auckland Airport terminals
  7. The official provider of aviation security services in New Zealand
  8. A machine in which a conveyer belt move items through in order to ensure security and safety
  9. A currency exchange company that can be found both landside and airside
  10. A place where airplanes arrive and take off

20 Clues: Home of the Worlds longest runwayFree facilities for transit passengersIs the 3 letter code for the Kapiti CoastA place where airplanes arrive and take offAcronym for Ministry of Agriculture and ForestryA facility used by those who wish to pray before a flightA lounge at the Auckland Airport operated by Air New Zealand...

Investing-Jacob Hawkins 2025-03-24

Investing-Jacob Hawkins crossword puzzle
Across
  1. total amount of money that you can put in an IRA per year ($)
  2. they type of risk tolerance you’ll most likely have if you do lump sum investing
  3. the year that social security was established
  4. social security and medicare taxes
  5. age to receive full social security benefits
  6. Warren Buffet is the CEO of this company
  7. should we look to celebrities for financial advice?
  8. this IRA’s contributions are made after taxes
  9. type of job that offers pension plans
  10. this thing sometimes contributes to your pension plan
  11. another type of job that offers a pension plan
  12. Warren Buffets number one rule of investment
  13. the age that you can take out the money from both types of IRA’s
Down
  1. the person your pension is managed by
  2. president who created social security in 1935
  3. this IRA’s contributions are made pre tax
  4. you contribute and sometimes the state contributes to this income source
  5. the year that you receive a little bonus to your social security plan
  6. at 67 you can get full benefits from this income source
  7. CEO of Berkshire Hathaway
  8. when a person stops working after reaching a certain age
  9. the type of fund that you should build before investing in Crypto
  10. the biggest financial fraud in U.S. history
  11. the thing that created and backs up Fiat Money
  12. the age you have to be to invest in Crypto

25 Clues: CEO of Berkshire Hathawaysocial security and medicare taxesthe person your pension is managed bytype of job that offers pension plansWarren Buffet is the CEO of this companythis IRA’s contributions are made pre taxthe age you have to be to invest in Cryptothe biggest financial fraud in U.S. historyage to receive full social security benefits...

Chapter 6: Social Media Legal and Policies in Malaysia 2023-09-18

Chapter 6: Social Media Legal and Policies in Malaysia crossword puzzle
Across
  1. of the MCMC is to promoting and protecting consumer
  2. deemed to be offensive or illegal can be subject to investigation and action by MCMC
  3. is the regulatory body for the communications and multimedia industry in Malaysia
  4. Law that stalking is defined as a repeated act of harassment, which is intended or is likely to cause distress, fear, or alarm to any person for their safety.
  5. of the social media security ensures to provide best practices forindividuals and organizations to protect their social media accounts from cyber threats
Down
  1. Agencies responsible of assuring appropriate use of social media by government officials, the management of social media accounts, and the handling of sensitive information on social media
  2. Social media service providers are also subject to do under regulatory requirements of the CMA
  3. regulates a wide range of issues, including licensing, spectrum allocation, competition, and consumer protection

8 Clues: of the MCMC is to promoting and protecting consumeris the regulatory body for the communications and multimedia industry in Malaysiadeemed to be offensive or illegal can be subject to investigation and action by MCMCSocial media service providers are also subject to do under regulatory requirements of the CMA...

Alliance Holiday Puzzle 2021-12-07

Alliance Holiday Puzzle crossword puzzle
Across
  1. Dog made famous in the Grinch
  2. One division of Alliance
  3. Covers your ears on a cold day, pom-pom optional
  4. Treat left behind for Santa
  5. Tree Glitter
  6. Winter drink served with marshmallows
  7. role on the Security side of Alliance
  8. Treats left for Rudolph
  9. One of the reindeer; not Rudolph
  10. role on the Communications side of Alliance
  11. Green character from Whoville
  12. Frosty was made of this
  13. A celebration for the rest of us, from Seinfeld
Down
  1. Catch Santa on a security one
  2. gifts go under this
  3. One division of Alliance
  4. Charles ________, author of "A Christmas Carol"
  5. Chocolate countdown to December 24th
  6. used for Hanukkah celebration
  7. decorations for your tree
  8. December drink with a love/hate reputation
  9. Another word for sled
  10. Covers your hands on the cold days
  11. something that is left out for Santa

24 Clues: Tree Glittergifts go under thisAnother word for sledTreats left for RudolphFrosty was made of thisOne division of AllianceOne division of Alliancedecorations for your treeTreat left behind for SantaCatch Santa on a security oneDog made famous in the Grinchused for Hanukkah celebrationGreen character from WhovilleOne of the reindeer; not Rudolph...

Investing-David V 2025-03-27

Investing-David V crossword puzzle
Across
  1. currencies backed up by government
  2. age to get social security
  3. good for people with low risk tolerance
  4. managed by employer
  5. never forget rule one
  6. age to invest in crypto
  7. rising stocks
  8. transfer funds to different plan
  9. funds saved only for emergencies
  10. contributions made post tax
Down
  1. president that created social security
  2. government health care plan
  3. social security Medicare tax
  4. at age 67 you get these full benefits
  5. CEO of Berkshire Hathaway
  6. the ceo of this is warren buffet
  7. falling stocks
  8. company requiring you to work a certain amount of time
  9. an example of a job that is government based
  10. a sum of money available for a particular purpose
  11. virtual currency
  12. system of recording info so it can’t get hacked

22 Clues: rising stocksfalling stocksvirtual currencymanaged by employernever forget rule oneage to invest in cryptoCEO of Berkshire Hathawayage to get social securitygovernment health care plancontributions made post taxsocial security Medicare taxthe ceo of this is warren buffettransfer funds to different planfunds saved only for emergencies...

Cybersecurity Santiago Yeison Cristian Yefferson 2025-06-25

Cybersecurity Santiago Yeison Cristian Yefferson crossword puzzle
Across
  1. This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
  2. Criminal activities carried out using computers or the internet.
  3. The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. The programs and other operating information used by a computer.
  6. The quality of being trustworthy or of performing consistently well.
  7. The use of computers and the internet to conduct warfare in cyberspace.
  8. Software used to prevent, detect, and remove malicious software.
  9. The process of encoding information in such a way that only authorized parties can access it.
Down
  1. Criminal activities carried out using computers or the internet.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
  4. Characterized by malice; intending or intended to do harm.
  5. As discussed, malicious software.
  6. An attempt by hackers to damage or destroy a computer network or system.
  7. The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
  8. The process of converting encrypted data back into its original form.
  9. The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
  10. Permanent software programmed into a read-only memory.
  11. The practice of protecting systems, networks, and programs from digital attacks.
  12. Broader than antivirus, it protects against various forms of malware, not just viruses.
  13. Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.

22 Clues: As discussed, malicious software.Permanent software programmed into a read-only memory.Characterized by malice; intending or intended to do harm.Criminal activities carried out using computers or the internet.Criminal activities carried out using computers or the internet.The programs and other operating information used by a computer....

Domestic and International Airports 2017-09-10

Domestic and International Airports crossword puzzle
Across
  1. Is the 3 letter code for the Kapiti Coast
  2. Acronym for Ministry of Agriculture and Forestry
  3. This has been dramatically increased after the September 11 2001 attack
  4. A lounge at the Auckland Airport operated by Air New Zealand
  5. An area accessible to everyone, including those who are not travelling
  6. The official provider of aviation security services in New Zealand
  7. You enter this area once you pass through passport control and Security at the Auckland International Airport
  8. Free facilities for transit passengers
  9. A small item that will be confiscated off you at security due to its risk of having the potential to self ignite
Down
  1. An official document issued by a government; certifies holders identity and citizenship
  2. A company located in check-in area which enables travellers to have their luggage sealed for protection
  3. Located landside, person travelling will need to present passport, ticket and luggage here
  4. Auckland Airport will combine international and domestic _____ as early as 2019
  5. A currency exchange company that can be found both landside and airside
  6. A machine in which a conveyer belt move items through in order to ensure security and safety
  7. A place where airplanes arrive and take off
  8. Home of the Worlds longest runway
  9. A form of transport available to take you between the 2 Auckland Airport terminals
  10. A word that you should not use in or around the Airport areas
  11. A facility used by those who wish to pray before a flight

20 Clues: Home of the Worlds longest runwayFree facilities for transit passengersIs the 3 letter code for the Kapiti CoastA place where airplanes arrive and take offAcronym for Ministry of Agriculture and ForestryA facility used by those who wish to pray before a flightA lounge at the Auckland Airport operated by Air New Zealand...

Monetary Policy 2025-01-14

Monetary Policy crossword puzzle
Across
  1. Lowers the discount rate
  2. Which leads to an increase in _____ Supply
  3. If the FED buys a security, this will lead to a _____ in money supply
  4. If someone deposits money into the bank from _______ a government security it will give the bank the ability to issue more loans.
  5. If the FED sells a security, this will cause for a ____ number of jobs
  6. and can make fewer ______
  7. Bankers shy away from the higher ______rates and take out fewer loans.
  8. An increase in production happens when the FED _____ a security
  9. When banks give the FED money it causes the bank to have less money on ______
Down
  1. and lower _____ rates
  2. The _____________ system is able to increase or decrease the amount of money in circulation by buying or selling government
  3. or by changing the discount rate
  4. A slowdown in production happens when the FED _____ a security
  5. Member banks take advantage of the lower rate and _______more money.
  6. a set of actions to control a nation's overall money supply, and achieve economicgrowth

15 Clues: and lower _____ ratesLowers the discount rateand can make fewer ______or by changing the discount rateWhich leads to an increase in _____ SupplyA slowdown in production happens when the FED _____ a securityAn increase in production happens when the FED _____ a securityMember banks take advantage of the lower rate and _______more money....

cybersecurity Puzzle-Enrique 2023-08-22

cybersecurity Puzzle-Enrique crossword puzzle
Across
  1. prevents unauthorized changes
  2. scrambling data
  3. UI redress attack
  4. false perception of reality
  5. disguised attacks
  6. fools users into providing sensitive information
  7. personal laptop, smart phones, ect
Down
  1. online harassment
  2. virtual private network
  3. locks users out until they pay
  4. short for malicious software
  5. prevents unauthorized access
  6. transmits information without user knowing
  7. codes that protect data
  8. carry out cyber attacks on other systems

15 Clues: scrambling dataonline harassmentUI redress attackdisguised attacksvirtual private networkcodes that protect datafalse perception of realityshort for malicious softwareprevents unauthorized accessprevents unauthorized changeslocks users out until they paypersonal laptop, smart phones, ectcarry out cyber attacks on other systems...

Cyber Bullying 2016-12-05

Cyber Bullying crossword puzzle
Across
  1. A type of social media that utilizes images and pictures
  2. Someone that is famous and well known
  3. A nickname people use on social media to conceal their true identity
  4. Someone that lives abroad for purposes related to employment
  5. Degrade purposely to make someone feel bad
  6. Someone from another country other than your own
Down
  1. To attack or assault someone verbally or physically
  2. To have purposely started or initiated an action
  3. The process of taking advantage of someone weaker than yourself
  4. A false feeling of over confidence and self-importance
  5. To make someone seem evil or terrible
  6. A very precious metal

12 Clues: A very precious metalSomeone that is famous and well knownTo make someone seem evil or terribleDegrade purposely to make someone feel badTo have purposely started or initiated an actionSomeone from another country other than your ownTo attack or assault someone verbally or physicallyA false feeling of over confidence and self-importance...

Cyber Defences 2021-09-22

Cyber Defences crossword puzzle
Across
  1. Should be strong and have MFA
  2. Protects against viruses and worms
  3. This will protect a device/networks ports
  4. This is used to attract cyber attacks
  5. Used to record activity and find source of intrusions
  6. What to do to USB ports to prevent data exfiltration
  7. An update with a fix for a vulnerability
Down
  1. Can give false positives that distract administrator (acronym)
  2. These should be restricted to prevent users from having more access than required
  3. Teaches staff how to prevent falling for phishing scams
  4. Makes data unreadable
  5. Best defence against ransomware

12 Clues: Makes data unreadableShould be strong and have MFABest defence against ransomwareProtects against viruses and wormsThis is used to attract cyber attacksAn update with a fix for a vulnerabilityThis will protect a device/networks portsWhat to do to USB ports to prevent data exfiltrationUsed to record activity and find source of intrusions...

cyber bulling 2022-01-03

cyber bulling crossword puzzle
Across
  1. A digital place where you can find information
  2. A mental disorder that causes the feeling of sadness and lost of intrest
  3. What people feel when others post offending things about them
  4. Irrelevant or inappropriate messages sent online
  5. A secret word or phrase
  6. Fun and distracting way to spend your times
Down
  1. Secure
  2. A technology that was invented by Alexander Bell
  3. Exprssing an opinion on the web
  4. Belonging to or for the use of one particular person or group of people only
  5. Share pictures or tweets with the world
  6. Informal conversation

12 Clues: SecureInformal conversationA secret word or phraseExprssing an opinion on the webShare pictures or tweets with the worldFun and distracting way to spend your timesA digital place where you can find informationA technology that was invented by Alexander BellIrrelevant or inappropriate messages sent online...

cyber bullying 2019-07-11

cyber bullying crossword puzzle
Across
  1. in your mind
  2. someone who teaches people
  3. when you want to kill yourself
  4. when people don't know who you are
  5. when you aren't in danger
  6. by your self
Down
  1. someone who enforces law
  2. someone who is mean for a long amount of time
  3. when you are very sad
  4. when you are the person who gets bullied
  5. something you play
  6. playing with other people

12 Clues: in your mindby your selfsomething you playwhen you are very sadsomeone who enforces lawplaying with other peoplewhen you aren't in dangersomeone who teaches peoplewhen you want to kill yourselfwhen people don't know who you arewhen you are the person who gets bulliedsomeone who is mean for a long amount of time

CYBER SAFETY 2020-10-24

CYBER SAFETY crossword puzzle
Across
  1. bbbb
  2. rrrrrrrrrrrrrr
  3. gggg
  4. ffffffffffffff
  5. ffffffffff
  6. The act of presenting someone else'es work
Down
  1. ttttt
  2. ffffffffffffffff
  3. dddddddddd
  4. ffffffffff
  5. hhhhhhhhhhhhh
  6. ffff
  7. fffffffffff

13 Clues: bbbbggggfffftttttddddddddddfffffffffffffffffffffffffffffffhhhhhhhhhhhhhrrrrrrrrrrrrrrffffffffffffffffffffffffffffffThe act of presenting someone else'es work

Cyber Ally 2023-02-01

Cyber Ally crossword puzzle
Across
  1. Someone who stands up for another person
  2. What an ally spreads online
  3. Where can cyberbullying occur
  4. Where can cyberbullying occur
  5. Intentionally hurting someone over a period of time with a power imbalance
  6. Where can cyberbullying occur
  7. What to do before putting something online
  8. What to do if you/someone else is cyberbullied
Down
  1. An app that you can anonymously report bullying
  2. Trying to get someone OUT of trouble
  3. Someone who stands and watches bullying
  4. Just trying to get someone in trouble
  5. A negative effect of cyburbullying
  6. What to do if you are cyberbullied

14 Clues: What an ally spreads onlineWhere can cyberbullying occurWhere can cyberbullying occurWhere can cyberbullying occurA negative effect of cyburbullyingWhat to do if you are cyberbulliedTrying to get someone OUT of troubleJust trying to get someone in troubleSomeone who stands and watches bullyingSomeone who stands up for another person...

Cyber Crossword 2023-05-22

Cyber Crossword crossword puzzle
Across
  1. some free thing can give you -------
  2. using vulgar language is called -------
  3. people stealing your id
  4. don't add people you don't know
  5. you should not tell people where you live in ----------
Down
  1. means someone bullying another person on a device
  2. Swearing or saying mean things
  3. don't share your login
  4. people stealing your work
  5. don't tell people your ----
  6. if you share -------- online people can find your location
  7. stay safe while you are ------

12 Clues: don't share your loginpeople stealing your idpeople stealing your workdon't tell people your ----Swearing or saying mean thingsstay safe while you are ------don't add people you don't knowsome free thing can give you -------using vulgar language is called -------means someone bullying another person on a device...

Cyber Gym 2024-11-20

Cyber Gym crossword puzzle
Across
  1. Don't act in a ......
  2. Be ...... of obvious errors
  3. Using phone calls to deceive victims into providing sensitive information
  4. Withdrawals from their ...... account
  5. Computer scam to obtain confidential data like passwords, codes, pins, credit card numbers from the victim
  6. Don't ...... or open suspicious emails
Down
  1. ...... can be committed at the expense of the victim
  2. Similar to spear phishing but aimed at high-profile targets like CEOs or CFOs
  3. Legit email received
  4. The scammer's ultimate goal is to extort ...... or even steal the victim's identity
  5. Check the ...... email address
  6. Don't trust ...... emails

12 Clues: Legit email receivedDon't act in a ......Don't trust ...... emailsBe ...... of obvious errorsCheck the ...... email addressWithdrawals from their ...... accountDon't ...... or open suspicious emails...... can be committed at the expense of the victimUsing phone calls to deceive victims into providing sensitive information...

Cyber ethics 2025-05-29

Cyber ethics crossword puzzle
Across
  1. Sea animals
  2. Large marsupial
  3. Has a trunk
  4. Fastest animal
  5. Eat love banna
  6. Slowest animal
Down
  1. Helps to travell
  2. Flying mammal
  3. Tallest animal
  4. Flying animal
  5. Likes to chase mice
  6. Man's best friend

12 Clues: Sea animalsHas a trunkFlying mammalFlying animalTallest animalFastest animalEat love bannaSlowest animalLarge marsupialHelps to travellMan's best friendLikes to chase mice

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk of email that comes from a
  2. It refers to being aware of the ethical practices.
  3. It is a legal right granted by law to the creator for his
  4. PIRACY: when a software is copied and distributed illegally, it is
  5. work.
  6. sources.
Down
  1. It refers to the act of using or imitating the language
  2. FOOTPRINT: It is an impression or information about a person that exists
  3. the internet because of his online activity.
  4. It refers to an illegal intrusion into a computer system
  5. It is the process of transforming data into an unreadable code.
  6. thoughts of another person as one's original work.

12 Clues: work.sources.the internet because of his online activity.It refers to being aware of the ethical practices.thoughts of another person as one's original work.It refers to unwanted bulk of email that comes from aIt refers to the act of using or imitating the languageIt refers to an illegal intrusion into a computer system...

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk of email that comes from a
  2. It refers to being aware of the ethical practices.
  3. It is a legal right granted by law to the creator for his
  4. PIRACY: when a software is copied and distributed illegally, it is
  5. work.
  6. sources.
Down
  1. It refers to the act of using or imitating the language
  2. FOOTPRINT: It is an impression or information about a person that exists
  3. the internet because of his online activity.
  4. It refers to an illegal intrusion into a computer system
  5. It is the process of transforming data into an unreadable code.
  6. thoughts of another person as one's original work.

12 Clues: work.sources.the internet because of his online activity.It refers to being aware of the ethical practices.thoughts of another person as one's original work.It refers to unwanted bulk of email that comes from aIt refers to the act of using or imitating the languageIt refers to an illegal intrusion into a computer system...

La seguridad y los accidentes 2023-02-21

La seguridad y los accidentes crossword puzzle
Across
  1. security measures
  2. insurance
  3. to land
  4. accident
  5. traffic jam
  6. notice;warning
  7. customs agent
  8. dangerous
Down
  1. safety;security
  2. prohibited
  3. seatbelt
  4. to reduce
  5. to take off
  6. to fasten seatbelt

14 Clues: to landseatbeltaccidentinsuranceto reducedangerousprohibitedto take offtraffic jamcustoms agentnotice;warningsafety;securitysecurity measuresto fasten seatbelt

NETWORKING QUIZ 2025-05-17

NETWORKING QUIZ crossword puzzle
Across
  1. Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that sensitive information, like passwords or credit card details, remains private even if intercepted by malicious actors. Encryption is essential for securing data both at rest (stored data) and in transit (data being transmitted).
  2. A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps to prevent unauthorized access or attacks.
  3. terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats.
Down
  1. Private Network (VPN) A VPN is a technology that allows users to create a secure and encrypted connection over a less secure network, such as the internet. It enables remote users to access a private network securely, protecting data from being intercepted by unauthorized parties.
  2. Control Access control refers to the mechanisms used to regulate who or what can access a network or system, and under what conditions. This includes techniques like authentication (verifying the identity of users) and authorization (granting permission to access resources). Types of access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).
  3. Detection System (IDS: An IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. It alerts administrators to suspicious behavior, such as an unauthorized attempt to access the network, and can also provide real-time detection of potential security breaches.
  4. are five key terminologies used in performing network security:

7 Clues: are five key terminologies used in performing network security:terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats....

Disruptive Technology 2025-08-09

Disruptive Technology crossword puzzle
Across
  1. comprehensive approach that combines practices and technologies to protect applications and services from disruptions
  2. the development and use of technologies that minimize environmental impact while promoting social and economic benefits
  3. refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
  4. digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
Down
  1. cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
  2. the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
  3. distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
  4. Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks

8 Clues: Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networkscomprehensive approach that combines practices and technologies to protect applications and services from disruptionsthe development and use of technologies that minimize environmental impact while promoting social and economic benefits...

Security Service Management 2023-11-30

Security Service Management crossword puzzle
Across
  1. This system requires lesser manpower and is more efficient.
  2. Hospital security systems are implemented through ________ deployment and electronic security.
  3. _________ system is the most common electronic security system used in hospitals.
  4. The areas of focus of security service management in a hospital are properties of the hospital and patients, _______ and the hospital fixtures.
  5. The space where all activities in a hospital are observed.
Down
  1. Security personnel to be deployed undergo _______ prior to recruitment.
  2. The security cameras must be enabled with the provision of _________ at all times.
  3. This system is installed to prevent any breach of security of fiddling.
  4. The _________ team would make rounds at different areas of the hospital.
  5. The electronic security system uses ______ for surveillance and monitoring purposes.

10 Clues: The space where all activities in a hospital are observed.This system requires lesser manpower and is more efficient.Security personnel to be deployed undergo _______ prior to recruitment.This system is installed to prevent any breach of security of fiddling.The _________ team would make rounds at different areas of the hospital....

Voyager Update 2018 2018-11-20

Voyager Update 2018 crossword puzzle
Across
  1. basic hardware (computer) and software (operating system) on which software applications can be run.
  2. doing business that focuses on creating a positive experience for the customer
  3. analytics process of assessing/modeling data with the goal of discovering insights and support decision-making
  4. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  5. the action or process through which something is changed so much that it appears to be entirely new.
  6. Supporting clients make decisions that are right for them
  7. the ability for clients to perform service transactions themselves
  8. the conversion of text, pictures, or sound into a digital form that can be processed by a computer.
  9. make (something) simpler or easier to do or understand.
  10. lasting or valid for more than one year.
Down
  1. The use of many different pathways such as phone, email, and face to face to engage clients
  2. The capability of a system or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth
  3. taking steps to reduce adverse effects
  4. the lifelong connection between OPB and its clients
  5. with various parts or aspects linked or coordinated.
  6. an act of traveling from one place to another.
  7. the state or quality of being efficient.
  8. a thing that makes something better or is better than something else.it was before.
  9. creating an opportunity by causing something to happen rather than responding to it after it has happened.

19 Clues: taking steps to reduce adverse effectsthe state or quality of being efficient.lasting or valid for more than one year.an act of traveling from one place to another.the lifelong connection between OPB and its clientswith various parts or aspects linked or coordinated.make (something) simpler or easier to do or understand....

Cybersecurity Month 2025-10-03

Cybersecurity Month crossword puzzle
Across
  1. Unauthorized access to data
  2. Network security barrier
  3. Software update to fix vulnerabilities
  4. Fraudulent attempt to get personal information
  5. Malicious software that demands payment
  6. Local tribal community hosting IT services
  7. Measures to protect information and systems
Down
  1. Name of the tribal nation
  2. IT support for users
  3. Extra layer of login security
  4. Software designed to damage or gain unauthorized access
  5. Secret code to access accounts
  6. Secure remote network connection
  7. Process of converting data to unreadable format
  8. Copy of data for recovery

15 Clues: IT support for usersNetwork security barrierName of the tribal nationCopy of data for recoveryUnauthorized access to dataExtra layer of login securitySecret code to access accountsSecure remote network connectionSoftware update to fix vulnerabilitiesMalicious software that demands paymentLocal tribal community hosting IT services...

Operating Systems and Security 2025-09-23

Operating Systems and Security crossword puzzle
Across
  1. - Google's mobile operating system used on smartphones, tablets, and wearable devices.
  2. - To convert information into a code to prevent unauthorized access.
  3. - Security vulnerability that prompts software companies to release emergency updates.
  4. - System privilege that should only be granted to employees who require it.
  5. - File system capability that tracks changes before execution to prevent data loss.
  6. - The method by which users communicate and control their computer system.
  7. - Microsoft's advanced file system that replaced the older FAT32 format for better performance
  8. - Social media account settings that should be set to private for better security.
  9. - Personal verification process needed before accepting social media friend requests.
Down
  1. - File identifiers like .jpg or .docx that indicate the file type and format. FIRMWARE - Software that directly controls specific hardware devices connected to a computer system
  2. - Internet software that should prioritize security features over convenience.
  3. - System resource that the operating system must efficiently allocate to running programs.
  4. - File system feature that reduces storage space but increases file opening time.
  5. - Software program that may request excessive permissions to access personal data.
  6. - Digital service that stores instant messages on their servers permanently.
  7. - Computer environment that requires hard drive encryption and screen locking for security.
  8. - Data collection practice that privacy-focused search engines avoid doing.
  9. - A secret combination of characters used to authenticate a user’s identity.
  10. - Internet software that should prioritize security features over convenience.
  11. - Small data files stored by websites to remember user preferences and track activity.
  12. - Security feature that only allows approved websites and applications to run.

21 Clues: - To convert information into a code to prevent unauthorized access.- The method by which users communicate and control their computer system.- System privilege that should only be granted to employees who require it.- Data collection practice that privacy-focused search engines avoid doing....

A+ 2025-02-11

A+ crossword puzzle
Across
  1. A common method for securing Wi-Fi networks.
  2. A software used to detect and remove malware.
  3. A Windows utility that displays real-time network usage.
  4. A Windows command used to format a disk.
  5. A network protocol used to automatically assign IP addresses.
  6. A form of authentication that uses fingerprints or facial recognition.
  7. A Windows component used to view system performance and logs.
  8. A tool for managing group policies in Windows.
  9. A network security system that monitors and filters incoming/outgoing traffic.
Down
  1. A security method that removes unnecessary user privileges.
  2. A security setting requiring a user to change their password after a period.
  3. A Linux command used to move files.
  4. A security setting that locks a user account after too many failed logins.
  5. A bootable Windows environment used for troubleshooting.
  6. A process that translates domain names into IP addresses.
  7. A Linux command used to change file permissions.
  8. A Windows command used to display active network connections.
  9. A Linux command used to list directory contents.

18 Clues: A Linux command used to move files.A Windows command used to format a disk.A common method for securing Wi-Fi networks.A software used to detect and remove malware.A tool for managing group policies in Windows.A Linux command used to change file permissions.A Linux command used to list directory contents....

Bullying - jayden 2023-03-21

Bullying - jayden crossword puzzle
Across
  1. online bullying
  2. physical touch
  3. does the bullying
  4. gets bullied
  5. name calling
Down
  1. intimidates the victim
  2. title
  3. witnesses bullying

8 Clues: titlegets bulliedname callingphysical touchonline bullyingdoes the bullyingwitnesses bullyingintimidates the victim

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Cybersecurity 2024-03-18

Cybersecurity crossword puzzle
Across
  1. stalking through web technology
  2. Process of confirming someone's identity
  3. Protection against potential harm
  4. Malware that can collect/transmit user data without the user's knowledge
  5. Malware designed to restrict access
  6. Illegal activity done on the internet
  7. Unlocking encrypted information
  8. free from public attention
  9. False claims to get private information
Down
  1. Network security monitors/controls incoming and outgoing traffic
  2. Security threat from within company
  3. hacker who is highly motivated by principles
  4. Information converted into secret form
  5. Someone who tries to gain access without authorization
  6. Software that delivers ads on your system
  7. Unwanted emails from unknown senders
  8. Bullying on the internet
  9. Gaining access an undocumented way
  10. Malicious software designed to infect
  11. File from website that stores your info
  12. collection of malware that spreads through computer

21 Clues: Bullying on the internetfree from public attentionstalking through web technologyUnlocking encrypted informationProtection against potential harmGaining access an undocumented waySecurity threat from within companyMalware designed to restrict accessUnwanted emails from unknown sendersIllegal activity done on the internet...

Investing-David 2025-03-25

Investing-David crossword puzzle
Across
  1. transfer funds to different plan
  2. age to get social security
  3. good for people with low risk tolerance
  4. currencies backed up by government
  5. company requiring you to work a certain amount of time
  6. at age 67 you get these full benefits
  7. an example of a job that is government based
  8. CEO of Berkshire Hathaway
  9. managed by employer
  10. age to invest in crypto
  11. rising stocks
Down
  1. government health care plan
  2. system of recording info so it can’t get hacked
  3. contributions made post tax
  4. the ceo of this is warren buffet
  5. virtual currency
  6. funds saved only for emergencies
  7. social security Medicare tax
  8. never forget rule one
  9. falling stocks
  10. a sum of money available for a particular purpose
  11. president that created social security

22 Clues: rising stocksfalling stocksvirtual currencymanaged by employernever forget rule oneage to invest in cryptoCEO of Berkshire Hathawayage to get social securitygovernment health care plancontributions made post taxsocial security Medicare taxtransfer funds to different planthe ceo of this is warren buffetfunds saved only for emergencies...

Crossword 08 2023-10-25

Crossword 08 crossword puzzle
Across
  1. refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
  2. refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring;
  3. Pornography refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
  4. refers to gathering and receiving information;
  5. Authority refers to the DOJ – Office of Cybercrime;
  6. Authority refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be;
  7. data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
  8. Data refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic data.
  9. refers to a computer or a computer network, the electronic medium in which online communication takes place;
  10. refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
  11. refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
  12. value refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
Down
  1. refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
  2. system refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media
  3. infrastructure refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
  4. refers to the modification or change, in form or substance, of an existing computer data or program;
  5. program refers to a set of instructions executed by the computer to achieve intended results;
  6. refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet;
  7. refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
  8. refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network;

20 Clues: refers to gathering and receiving information;Authority refers to the DOJ – Office of Cybercrime;program refers to a set of instructions executed by the computer to achieve intended results;refers to the modification or change, in form or substance, of an existing computer data or program;...

Cybersecurity 2023-09-07

Cybersecurity crossword puzzle
Across
  1. a computer infection
  2. protects organizations on internet attacks
  3. locks databases
  4. gives a scammer access to your personal computer
  5. security for computers
  6. information
  7. faking
  8. to save something
Down
  1. deceive people into giving up their personal info
  2. ransomeware
  3. authentication method (2)
  4. to ensure protection
  5. worker
  6. when something isnt safe
  7. protecting information
  8. desktop
  9. authentication method
  10. scammers that impersonate a business
  11. when a virus spreads
  12. damages

20 Clues: workerfakingdesktopdamagesransomewareinformationlocks databasesto save somethinga computer infectionto ensure protectionwhen a virus spreadsauthentication methodprotecting informationsecurity for computerswhen something isnt safeauthentication method (2)scammers that impersonate a businessprotects organizations on internet attacks...

nin26 2024-07-03

nin26 crossword puzzle
Across
  1. Data transfer rate
  2. Unwanted email
  3. Clickable link
  4. Access code
  5. Saved URL
  6. Login name
  7. Data security
  8. Very large data unit
  9. Restart computer
  10. Processor speed
  11. Programming rules
  12. Data unit
Down
  1. Windows feature
  2. Network security
  3. Computer chip material
  4. Online scam
  5. Computational process
  6. Computer protection
  7. Onscreen pointer
  8. Trash bin icon
  9. Massive data unit
  10. Software addon
  11. Background image
  12. Main screen
  13. Large data unit

25 Clues: Saved URLData unitLogin nameOnline scamAccess codeMain screenData securityUnwanted emailClickable linkTrash bin iconSoftware addonWindows featureProcessor speedLarge data unitNetwork securityOnscreen pointerRestart computerBackground imageMassive data unitProgramming rulesData transfer rateComputer protectionVery large data unit...

Cyber Manners 2017-09-20

Cyber Manners crossword puzzle
Across
  1. a person who commits a crime
  2. to say unkind things about somebody
  3. to make somebody feel stupid and ashamed
  4. falsh
  5. a synonym for puberty or the period between childhood and adulthood
  6. when you do not know a person's name
Down
  1. making you feel serious and think carefully
  2. to be sent permanently away from an institution, for instance school
  3. not being allowed to attend a certain school (noun)
  4. when you cannot find out where something comes from
  5. to make fun of in an unfriendly way
  6. causing someone to feel offended

12 Clues: falsha person who commits a crimecausing someone to feel offendedto say unkind things about somebodyto make fun of in an unfriendly waywhen you do not know a person's nameto make somebody feel stupid and ashamedmaking you feel serious and think carefullynot being allowed to attend a certain school (noun)...

Cyber Manners 2017-09-20

Cyber Manners crossword puzzle
Across
  1. to say unkind Things about somebody
  2. a person WHO commits a crime
  3. causing someone to feel offended
  4. to force somebody to leave school
  5. to make somebody feel ashamed and stupid
  6. making you feel serious and think carefully
Down
  1. puberty, or the period between childhood and adulthood
  2. when you cannot find out where somthing comes from
  3. not being allowed to attend school
  4. when you do not know a person's name
  5. false
  6. to make fun of somebody in an unfriendly way

12 Clues: falsea person WHO commits a crimecausing someone to feel offendedto force somebody to leave schoolnot being allowed to attend schoolto say unkind Things about somebodywhen you do not know a person's nameto make somebody feel ashamed and stupidmaking you feel serious and think carefullyto make fun of somebody in an unfriendly way...

cyber bullying 2024-04-23

cyber bullying crossword puzzle
Across
  1. The act of intentionally excluding or isolating someone from an online group or community
  2. Pretending to be someone else online in order to harass or deceive them
  3. FOOTPRINT A digital representation of a person's online presence and activities
  4. The act of harassing, threatening, or embarrassing others online
  5. A type of online harassment that involves repeatedly sending unwanted messages
  6. The emotional or psychological harm caused by cyberbullying
  7. MEDIA An online platform or community where people can share and interact with content
  8. LITERACY The use of digital tools and resources to create and share content
  9. A false or misleading piece of information spread online, often to cause harm
Down
  1. A person who stands up against bullying and supports the victim
  2. The practice of protecting one's personal information and privacy online
  3. Sharing private or embarrassing information about someone online without their consent
  4. The practice of using electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
  5. A network of interconnected web pages, also known as the "World Wide Web"
  6. CITIZENSHIP The ability to use technology and the internet in a safe, responsible, and ethical manner

15 Clues: The emotional or psychological harm caused by cyberbullyingA person who stands up against bullying and supports the victimThe act of harassing, threatening, or embarrassing others onlinePretending to be someone else online in order to harass or deceive themThe practice of protecting one's personal information and privacy online...

Cyber travel 2024-06-20

Cyber travel crossword puzzle
Across
  1. this is a festival
  2. this is picnic
  3. this is trojan
  4. this is tourist
  5. this is cookie
Down
  1. this is camping
  2. this is pixel
  3. this is bluetooth
  4. this is a souvenir
  5. this is chatgpt
  6. this is email
  7. this is tiktok

12 Clues: this is pixelthis is emailthis is picnicthis is trojanthis is tiktokthis is cookiethis is campingthis is chatgptthis is touristthis is bluetooththis is a festivalthis is a souvenir

Cyber Safety 2023-09-14

Cyber Safety crossword puzzle
Across
  1. Malware that requires the victim to pay a ransom to access encrypted files.
  2. criminals who break into computer networks with malicious intent.
  3. two words creates and stores strong passwords
  4. sending, posting, or sharing negative, harmful, false, or mean content about someone else.
  5. two words. long (phrases or sentences) that mix capital and lowercase letters, numbers, and symbols
Down
  1. Malicious software
  2. The numeric address of a computer on the internet
  3. A Private Network that ensures your anonymity on the internet
  4. Which social media platform is a hackers’ favorite
  5. Software used to protect a computer from viruses
  6. Main component of a server
  7. unwanted email messages

12 Clues: Malicious softwareunwanted email messagesMain component of a servertwo words creates and stores strong passwordsSoftware used to protect a computer from virusesThe numeric address of a computer on the internetWhich social media platform is a hackers’ favoriteA Private Network that ensures your anonymity on the internet...

Cyber law 2023-08-23

Cyber law crossword puzzle
Across
  1. menggunggah
  2. kejahatan melalui dunia maya
  3. keamanan pribadi
  4. hak merk
  5. jauh
Down
  1. penyampaian informasi
  2. hak cipta/hak intelektual
  3. pencurian melalui internet
  4. pencemaran nama baik
  5. community
  6. penggabungan
  7. ruang/dunia maya

12 Clues: jauhhak merkcommunitymenggunggahpenggabungankeamanan pribadiruang/dunia mayapencemaran nama baikpenyampaian informasihak cipta/hak intelektualpencurian melalui internetkejahatan melalui dunia maya

cyber bullying 2021-05-06

cyber bullying crossword puzzle
Across
  1. the main people who do this
  2. someone repetitively picking on you
  3. a mental illness
  4. a way someone cyberbullies
  5. not right
  6. a way of death
Down
  1. :(
  2. by yourself
  3. an act of bullying
  4. it will be...
  5. being careful
  6. 000

12 Clues: :(000not rightby yourselfit will be...being carefula way of deatha mental illnessan act of bullyinga way someone cyberbulliesthe main people who do thissomeone repetitively picking on you

CYBER CROSSWORD 2021-09-02

CYBER CROSSWORD crossword puzzle
Across
  1. The process of converting analogue data into digital form.
  2. A global domain within the information environment consisting of the interdependent network of information systems.
  3. Act of sending unsolicited e-mails.
  4. The process of exploring and analyzing large blocks of information to glean meaningful patterns and trends.
  5. The worldwide network of economic activities enabled by information and Communications Technologies.
  6. The primary law in India dealing with Cybercrime and E-Commerce.
  7. The process of preventing unauthorized people from reading the data that is transmitted over your wireless network.
Down
  1. The use of information and communication technology in political and governance processes.
  2. A program that disrupts the normal functioning of your computer systems.
  3. The Adoption or increase in the use of digital or computer technology by an organization, industry etc.
  4. The programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
  5. A small text file created by a website that is stored in the user's computer for recognizing and keeping track of the user's preferences.

12 Clues: Act of sending unsolicited e-mails.The process of converting analogue data into digital form.The primary law in India dealing with Cybercrime and E-Commerce.A program that disrupts the normal functioning of your computer systems.The use of information and communication technology in political and governance processes....

Cyber Ethics 2025-06-14

Cyber Ethics crossword puzzle
Across
  1. – Using someone else's ideas or words as your own work
  2. – Unwanted bulk emails from unknown sources
  3. – Following internet manners and being respectful
  4. – Ethical use of computers, internet, and digital content
  5. – Legal rights over one’s creative work or inventions
  6. – Rules about right and wrong use of computers and internet
Down
  1. – Important thing to protect while using digital platforms
  2. – Illegal intrusion into a computer system or network
  3. – The online trail left by your internet activity
  4. – Moral principles that guide right or wrong actions online
  5. – Good behavior and manners while using the internet
  6. – Stealing software by copying it illegally
  7. – Something made or invented by a person
  8. – The right to control what personal data is shared online
  9. – Copying and sharing software without permission

15 Clues: – Something made or invented by a person– Unwanted bulk emails from unknown sources– Stealing software by copying it illegally– The online trail left by your internet activity– Following internet manners and being respectful– Copying and sharing software without permission– Good behavior and manners while using the internet...

Cyber terms 2022-02-10

Cyber terms crossword puzzle
Across
  1. passthrough for IPsec
  2. blocks the use of proxy servers
  3. blocks internet requests from unknown sources
  4. prevents a local computer from using a URL or IP address to gain access to the local server
Down
  1. Legacy firewall
  2. Point to Point
  3. blocks multicast
  4. blocks Java
  5. blocks ActiveX
  6. blocks cookies
  7. layer two tunnelling protocol pass through
  8. keeps port 113 from being scanned by devices

12 Clues: blocks JavaPoint to Pointblocks ActiveXblocks cookiesLegacy firewallblocks multicastpassthrough for IPsecblocks the use of proxy serverslayer two tunnelling protocol pass throughkeeps port 113 from being scanned by devicesblocks internet requests from unknown sources...

Cyber Crossword1 2022-07-18

Cyber Crossword1 crossword puzzle
Across
  1. Security Operations center
  2. login with a single ID
  3. The traid
  4. Making it inaccessible to users
  5. Hide the true meaning
  6. likely cause danger
  7. Flaw
Down
  1. Form of Malware
  2. Type of Social Engineering attack
  3. ISACA certification
  4. controls incoming and outcoming traffic
  5. software to harm or exploit any device

12 Clues: FlawThe traidForm of MalwareISACA certificationlikely cause dangerHide the true meaninglogin with a single IDSecurity Operations centerMaking it inaccessible to usersType of Social Engineering attacksoftware to harm or exploit any devicecontrols incoming and outcoming traffic

Cyber Ethics 2025-05-23

Cyber Ethics crossword puzzle
Across
  1. Fully connected topology
  2. Wireless Network
  3. Topology with backbone cable
  4. Illegal Intrusion in a computer via internet
  5. Responsible Behaviour
  6. wireless fidelity
  7. Legal right for original creator for his/her own work
Down
  1. Sender transform data into unreadable code
  2. All nodes are connected via a central device
  3. Network Within a city
  4. Connected devices in network
  5. Use single user software in multiple system
  6. Network across the world

13 Clues: Wireless Networkwireless fidelityNetwork Within a cityResponsible BehaviourFully connected topologyNetwork across the worldConnected devices in networkTopology with backbone cableSender transform data into unreadable codeUse single user software in multiple systemAll nodes are connected via a central device...

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk of email that comes from a
  2. It refers to being aware of the ethical practices.
  3. It is a legal right granted by law to the creator for his
  4. PIRACY: when a software is copied and distributed illegally, it is
  5. work.
  6. sources.
Down
  1. It refers to the act of using or imitating the language
  2. FOOTPRINT: It is an impression or information about a person that exists
  3. the internet because of his online activity.
  4. It refers to an illegal intrusion into a computer system
  5. It is the process of transforming data into an unreadable code.
  6. thoughts of another person as one's original work.

12 Clues: work.sources.the internet because of his online activity.It refers to being aware of the ethical practices.thoughts of another person as one's original work.It refers to unwanted bulk of email that comes from aIt refers to the act of using or imitating the languageIt refers to an illegal intrusion into a computer system...

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk of email that comes from a
  2. It refers to being aware of the ethical practices.
  3. It is a legal right granted by law to the creator for his
  4. PIRACY: When a software is copied and distributed illegally, it is
  5. work.
  6. sources.
Down
  1. It refers to the act of using or imitating the language
  2. FOOTPRINT: It is an impression or information about a person that exists
  3. the internet because of his online activity.
  4. It refers to an illegal intrusion into a computer system
  5. It is the process of transforming data into an unreadable code.
  6. thoughts of another person as one's original work.

12 Clues: work.sources.the internet because of his online activity.It refers to being aware of the ethical practices.thoughts of another person as one's original work.It refers to unwanted bulk of email that comes from aIt refers to the act of using or imitating the languageIt refers to an illegal intrusion into a computer system...

Cyber Awareness 2025-11-06

Cyber Awareness crossword puzzle
Across
  1. Attack that overwhelms a system with massive fake traffic.
  2. General term for malicious software.
  3. Login method requiring two forms of authentication.
  4. An update that fixes security vulnerabilities in software.
  5. Network security system that blocks unauthorized access.
  6. Software or hardware that records everything typed.
Down
  1. A network of compromised computers controlled remotely
  2. Unauthorized access to sensitive systems or data.
  3. A vulnerability that hackers exploit before it’s patched.
  4. A fake email scam designed to steal personal information.
  5. Self-replicating program that spreads without human help.
  6. Malware that locks files and demands payment.

12 Clues: General term for malicious software.Malware that locks files and demands payment.Unauthorized access to sensitive systems or data.Login method requiring two forms of authentication.Software or hardware that records everything typed.A network of compromised computers controlled remotelyNetwork security system that blocks unauthorized access....

Darragh cyber safety 2016-06-07

Darragh cyber safety crossword puzzle
Across
  1. people who help you get rid of the hackers
  2. thing that you can play video games
  3. things that are your special things
  4. big site where hackers can hack into things
  5. things are your personal things
  6. people sticking their heads in.
  7. ups adds that automatically appear on your device
  8. you need to be careful when doing this
Down
  1. people who will help you with bully's
  2. shutting down your device.
  3. someone who pretends to be nice but the
  4. safety things
  5. a device that you can go on line
  6. to get something on your
  7. someone who tries to be mean on line
  8. a thing that allows someone to speak to you
  9. word or numbers that allows you to go on to a device
  10. people who are getting rid of your things on line.
  11. things that everyone can see

19 Clues: safety thingsto get something on yourshutting down your device.things that everyone can seethings are your personal thingspeople sticking their heads in.a device that you can go on linething that you can play video gamesthings that are your special thingssomeone who tries to be mean on linepeople who will help you with bully's...

Angryword 2021-09-06

Angryword crossword puzzle
Across
  1. cyber attack leg joint
  2. return to multiple boiled porks
  3. 1000 year card game
  4. lots of males look
  5. ale maker road
  6. Dutch car stop
  7. Ash's friend healthy green space
  8. west country gaff
Down
  1. cover up postpone
  2. knighthood five scientific suffix
  3. aircraft tilt position to left or right
  4. red cheese rectangle
  5. bacon country mound
  6. alcohol processor 8 ball game road
  7. broken glass

15 Clues: broken glassale maker roadDutch car stopcover up postponewest country gafflots of males look1000 year card gamebacon country moundred cheese rectanglecyber attack leg jointreturn to multiple boiled porksAsh's friend healthy green spaceknighthood five scientific suffixalcohol processor 8 ball game roadaircraft tilt position to left or right

Law Enforcement in TV 2023-10-20

Law Enforcement in TV crossword puzzle
Across
  1. Starring Larry Wilcox and Erik Estrada
  2. Dr. Reid works for this FBI unit (abbreviation)
  3. Reality, famous theme song
  4. Brennan & Booth
  5. Famous gavel noise
  6. Springfield's police chief
  7. 21 Jump ____
  8. Cagney & _____
Down
  1. Knight Rider's artificially intelligent car
  2. "Just one more thing..."
  3. Stylish 80s series
  4. Miami, NY, Cyber
  5. Chicago Med, Fire, and _____
  6. Nine-Nine, stars Andy Samburg
  7. Recently reached 20th season on CBS

15 Clues: 21 Jump ____Cagney & _____Brennan & BoothMiami, NY, CyberStylish 80s seriesFamous gavel noise"Just one more thing..."Reality, famous theme songSpringfield's police chiefChicago Med, Fire, and _____Nine-Nine, stars Andy SamburgRecently reached 20th season on CBSStarring Larry Wilcox and Erik EstradaKnight Rider's artificially intelligent car...

La seguridad y los accidentes 2023-02-22

La seguridad y los accidentes crossword puzzle
Across
  1. seatbelt
  2. to land
  3. to fasten the seatbelt
  4. to reduce
  5. security measures
  6. dangerous
  7. notice;warning
Down
  1. prohibited
  2. safety;security
  3. car accident
  4. insurance
  5. customsagent
  6. traffic jam
  7. to take off

14 Clues: to landseatbeltinsuranceto reducedangerousprohibitedtraffic jamto take offcar accidentcustomsagentnotice;warningsafety;securitysecurity measuresto fasten the seatbelt

Indústria 4.0 2023-02-24

Indústria 4.0 crossword puzzle
Across
  1. of things
  2. Aditiva
  3. of services
  4. M2M
Down
  1. Aumentada
  2. Virtual
  3. Factories
  4. Artificial
  5. cyber físicos

9 Clues: M2MVirtualAditivaof thingsAumentadaFactoriesArtificialof servicescyber físicos

George 2024-01-09

George crossword puzzle
Across
  1. αδιάφορα, ανέμελα
  2. αρπάζω κάτι από κάποιον
  3. αμέσως
  4. δεν μπορώ να πιστέψω στα αυτιά μου
  5. φύλακας
  6. καταρρέω, γίνομαι κομμάτια
  7. αβέβαια, εκφράζοντας αμφιβολίες
  8. βάζω στα κρυφά
Down
  1. συναγερμός
  2. κατά τα φαινόμενα
  3. σειρήνα
  4. ηχώ
  5. αρπάζω
  6. ασφάλεια
  7. στριμωγμένος οικονομικά
  8. αποτελεσματικά

16 Clues: ηχώαρπάζωαμέσωςσειρήναφύλακαςασφάλειασυναγερμόςαποτελεσματικάβάζω στα κρυφάαδιάφορα, ανέμελακατά τα φαινόμενααρπάζω κάτι από κάποιονστριμωγμένος οικονομικάκαταρρέω, γίνομαι κομμάτιααβέβαια, εκφράζοντας αμφιβολίεςδεν μπορώ να πιστέψω στα αυτιά μου

Thanksgiving crossword puzzle 2022-11-30

Thanksgiving crossword puzzle crossword puzzle
Across
  1. mom and dad
  2. some thing u thourw in a pot and cook it
  3. american football
  4. too eat
  5. thankful
  6. Cyber Monday
Down
  1. to give to some one
  2. people really close to u
  3. from the Latin peregrinus
  4. the mount of thanksgiving
  5. what macy dose on thanksgiving
  6. after lunch

12 Clues: too eatthankfulmom and dadafter lunchCyber Mondayamerican footballto give to some onepeople really close to ufrom the Latin peregrinusthe mount of thanksgivingwhat macy dose on thanksgivingsome thing u thourw in a pot and cook it

safety and security 2022-12-12

safety and security crossword puzzle
Across
  1. / details the emergency procedures designed to maintain safety of guest, employees ad the property. pg 191
  2. / one reason lodging properties are allowed to refuse service to guest is if guests are intoxicated. pg 186
  3. / Usually, keys given to employees are metal keys. these should be audited on a regular basis. pg 193
  4. floors, stairwells / key access also used for...pg 194
  5. / Ensure every employee knows how to follow the emergency response plan during an emergercy. pg 197
  6. / are laws that protect both the innkeeper and guest. pg 187
  7. / the security officer(loss prevention officer) has multiple responsible and is the "boots on the ground". pg 188
  8. / is the secure and logical control of all keys in the hotel. pg 191
  9. / review the response, identify any gaps, and make improvements to respond more efficiantly in future emergency situations. pg 197
  10. / if a hotel dose not have a security department. pg 187
  11. / are well known for having highly sophisticated security technology. pg 194
  12. / come from outside such as weather, active assailants, and bomb threats. pg 198
  13. / the guestroom key opens the door of the room that has been assigned to the guest. pg 192
  14. / conduct a practice run of the emergency response plan to make employees comfortable. pg 197
  15. / based on the emergency response plan, determine what needs to be purchased and acquired, and then store these items. pg 196
  16. / is a specifically encoded key, typically used by the bell attendant to handle a luggage pull. pg 192
  17. / is any observed behavior that could indicate crime or terrorism. pg 189
  18. / is the close observation of a situation to provide information for investigations regrading guests, employees, and asset protection. pg 193
  19. / an innkeekper is an individual or business owner who provides overnight accommodations for guest in exchange for reasonable compensation.pg 187
  20. / human trafficking is a form of modern-day slavery. It includes the force, fraud, or coercion to labor or commercial s*x. pg 189
  21. / The security supervisor supports the security manager and the management function. pg 188
  22. / is typically used by inspector. pg 192
Down
  1. / as the department head, the security manager(director of security) over...pg 188
  2. / a comprehensive report that addresses. pg 188
  3. / The security department is responsible for traininng emplayees to be prepared to hanble emergency situations. pg 191
  4. / include monitoring keys, surveillance, and awareness of pretinent technological advance. pg 191
  5. / addresses ensuring the safety and security of the hotel and its guest preventing problem from occurring. pg 190
  6. / allows access into all of the door locks of the hotel. pg 192
  7. / is typically used by guestroom attendants. pg 192
  8. / create an emergency response plan.pg 196
  9. / is failure to act in a safe manner. pg 18
  10. / is responsible for handling daily operations in the hotel as well as any emergency situations that arise. pg 195
  11. / can be defined as having an understanding of what is going on around you. pg 188
  12. / The director of security maintains relationships with law enforcement(police)...etc. pg 190
  13. / refers to being responsible for the actions or the condition of an establishment. pg 186
  14. / are something that happen in the hotel like a gas leak or water damage. pg 198
  15. / alert guests to potential hazards, such as wet floors. pg 187
  16. / allows the door lock to be overridden to open the electronically engaged deadbolt. pg 192
  17. / means that you have a legal duty to act in the way that an ordinary, prudent, reasonable person would. pg 186
  18. / may be carried by housekeeping, maintenance, and security personnel. pg 194

40 Clues: / create an emergency response plan.pg 196/ is typically used by inspector. pg 192/ is failure to act in a safe manner. pg 18/ a comprehensive report that addresses. pg 188/ is typically used by guestroom attendants. pg 192floors, stairwells / key access also used for...pg 194/ if a hotel dose not have a security department. pg 187...

Marketing Crossword Puzzle 2021-09-30

Marketing Crossword Puzzle crossword puzzle
Across
  1. Interrupt or damage a device
  2. rectangular graphic display
  3. data retention and analysis
  4. Secure Sockets Layer
  5. Risky situation.
Down
  1. cyber attacks
  2. wall to prevent fires
  3. given money
  4. malicious computer code
  5. involve a web advertiser

10 Clues: given moneycyber attacksRisky situation.Secure Sockets Layerwall to prevent firesmalicious computer codeinvolve a web advertiserrectangular graphic displaydata retention and analysisInterrupt or damage a device

General Cyber Terms 2021-08-03

General Cyber Terms crossword puzzle
Across
  1. open web application security program
  2. tricking users with fake usernames, emails or URLs
  3. using SMS for phishing attacks
  4. this control allows roll back to a previous development point
  5. demands money to unlock yr computer
  6. stealing information
  7. retending to be a reputable person / entity to induce the disclorure of sensitive info
  8. appears a safe program but creates a PC backdoor
  9. a type of eavesdropping attack by a 3rd party
Down
  1. redirecting users to false websites that imitate the legitimate URL
  2. this sneak surfing type observes password entry from "behind" the person
  3. process of catching things that live in water
  4. a phishing type target someone with something of value
  5. 'zombie' computer launching DDoS attacks
  6. infects host with spam, unwanted ads, hijacks browser, etc
  7. take advantage of a vulnerability
  8. a form of mining
  9. unauthorised computer access
  10. malicious software

19 Clues: a form of miningmalicious softwarestealing informationunauthorised computer accessusing SMS for phishing attackstake advantage of a vulnerabilitydemands money to unlock yr computeropen web application security program'zombie' computer launching DDoS attacksprocess of catching things that live in watera type of eavesdropping attack by a 3rd party...

Cyber & Digital Safety 2024-11-10

Cyber & Digital Safety crossword puzzle
Across
  1. Australian agency providing tools and support for staying safe online.
  2. Settings that help control who can view your information online.
  3. An online trick designed to steal money or personal information.
  4. Notifying a trusted adult or platform about inappropriate content or behaviour.
  5. An extra layer of security for protecting online accounts.
  6. When someone uses your personal information to impersonate you.
  7. Capturing an image of your screen, sometimes used to save evidence.
  8. A counseling service providing support for kids in need of help.
  9. Pretending to be someone else online to deceive or manipulate others.
  10. Measures to protect devices and networks from digital threats.
Down
  1. Bullying or harassment that takes place online or through digital devices.
  2. The trail of data you leave online, like posts and searches.
  3. When someone builds trust with a minor online to exploit or harm them.
  4. The sharing of someone's private images without consent.
  5. Websites that are reliable and safe for information or purchases.
  6. Treating others well online and avoiding hurtful actions.
  7. False information spread online, often by mistake.
  8. The amount of time spent on devices with screens, like phones or tablets.
  9. Someone who supports others positively online, especially against bullying.

19 Clues: False information spread online, often by mistake.The sharing of someone's private images without consent.Treating others well online and avoiding hurtful actions.An extra layer of security for protecting online accounts.The trail of data you leave online, like posts and searches.Measures to protect devices and networks from digital threats....

Bullying 2013-11-28

Bullying crossword puzzle
Across
  1. The common group to get cyber-bullied.
  2. In extreme cases, bullying can lead to ____.
  3. A free, anonymous and confidential phone and on-line professional counselling service for youth.
  4. The use superior strength or influence to intimidate someone.
  5. Using one's body and physical bodily acts to exert power of peers.
Down
  1. “Sticks and stones may break my bones but ____ will never hurt me.”
  2. 47% of Canadian _____ report having a child victim of bullying.
  3. The most common form of bullying behaviour. It includes: name calling, insults, teasing and mimicking etc.
  4. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  5. An act to amend the criminal code (cyber-bullying).

10 Clues: The common group to get cyber-bullied.In extreme cases, bullying can lead to ____.An act to amend the criminal code (cyber-bullying).The use superior strength or influence to intimidate someone.47% of Canadian _____ report having a child victim of bullying.Using one's body and physical bodily acts to exert power of peers....

Cyber-crossword 2017-03-01

Cyber-crossword crossword puzzle
Across
  1. applications that allow you to communicate with friends
  2. do not ... requests from strangers
  3. the ... web browse concerns us all
  4. an act of violence on the internet against another user
  5. an application which helps you contact with your friends
  6. you need to be sure of someone's ... before you start a conversation with them
Down
  1. when you are on the internet you are...
  2. you need to use the internet with ...
  3. the ... of cyberbullying
  4. protection of your on-line information
  5. browsing machine
  6. what you need to do if anything happens to you on-line

12 Clues: browsing machinethe ... of cyberbullyingdo not ... requests from strangersthe ... web browse concerns us allyou need to use the internet with ...protection of your on-line informationwhen you are on the internet you are...what you need to do if anything happens to you on-lineapplications that allow you to communicate with friends...

Cyber Law 2017-09-28

Cyber Law crossword puzzle
Across
  1. Any criminal activity associated with a computer.
  2. Transmitting computer viruses to people to destroy their computer system or files.
  3. The use of the computer to sabotage computer networks vital to the national welfare.
  4. The communication via computer or other electronic device of false data that damages a person's reputation.
  5. Intentionally disrupting, defacing, or even destroying a site.
Down
  1. An unwelcome intrusion into the private matters of an individual carried out or sustained by a computer.
  2. Area of the law which concerns computers and computer related crime.
  3. A crime that involves using a computer to steal computer data stored in a digital format.
  4. Any illegal activity already in the criminal code committed by using a computer.
  5. The use of information unlawfully obtained by computer to pressure a victim into granting a payoff to the blackmailer.
  6. A crime in which a cyber criminal falsely adopts the identity of anothor computer user in order to commit fraud.
  7. Involves the invasion, distortion, theft, falsification, misuse, destruction, or exploitation of information stored in or related to electronic devices.

12 Clues: Any criminal activity associated with a computer.Intentionally disrupting, defacing, or even destroying a site.Area of the law which concerns computers and computer related crime.Any illegal activity already in the criminal code committed by using a computer.Transmitting computer viruses to people to destroy their computer system or files....

cyber safety 2013-11-03

cyber safety crossword puzzle
Across
  1. network: when you chat to your friends
  2. too many advertisements had come up, and for you to press the wrong buttons,
  3. on the top of your laptop, it tells you the tabs you have opened.
  4. when you log in to your laptop
  5. when you are on the network and they are saying mean things about you.
  6. a person who breaks into your laptop without you knowing
  7. take notice to what you are doing on your laptop.
  8. when you need wi-fi you connect.
Down
  1. advertisements come up on your laptop and you have to click the exist button.
  2. transferring something on to your laptop
  3. when you can see the person whilst talking to them, but they are in a different location.
  4. to make sure the person is getting the information you send them (just like a message.

12 Clues: when you log in to your laptopwhen you need wi-fi you connect.network: when you chat to your friendstransferring something on to your laptoptake notice to what you are doing on your laptop.a person who breaks into your laptop without you knowingon the top of your laptop, it tells you the tabs you have opened....

Cyber School 2024-08-15

Cyber School crossword puzzle
Across
  1. шесть часов
  2. онлайн школа
  3. по интернету / в интернете
  4. разговаривать с
  5. день спорта
Down
  1. заниматься, учиться
  2. километры
  3. далеко от
  4. рано
  5. отправлять по электронной почте
  6. встречаться
  7. вместе

12 Clues: рановместекилометрыдалеко отшесть часоввстречатьсядень спортаонлайн школаразговаривать сзаниматься, учитьсяпо интернету / в интернетеотправлять по электронной почте

Cyber Boo 2023-09-26

Cyber Boo crossword puzzle
Across
  1. A group of words or letters that you type into a search engine to find something.
  2. What's the term for making a copy of important files so you don't lose them?
  3. What's the term for a secret code that you use to unlock your devices?
  4. What do you call the bad guys who try to trick you into giving them your personal information?
  5. What's the name of a program that can keep your computer safe from viruses?
  6. What should you avoid clicking on if it looks suspicious or too good to be true?
Down
  1. A type of computer attack that locks you out of your computer until you pay money.
  2. What should you set up on your computer to make sure only you can use it?
  3. The process of keeping your computer software up to date.
  4. A fake website or email designed to trick you into giving up personal information.
  5. What do you call a person who tries to hack into computers and steal information?
  6. The little picture or symbol you click on to open an app or program.

12 Clues: The process of keeping your computer software up to date.The little picture or symbol you click on to open an app or program.What's the term for a secret code that you use to unlock your devices?What should you set up on your computer to make sure only you can use it?What's the name of a program that can keep your computer safe from viruses?...

Cyber krzyżówka 2025-02-10

Cyber krzyżówka crossword puzzle
Across
  1. – Jak nazywa się technologia zapewniająca bezpieczne i prywatne połączenie z internetem?
  2. – Jak nazywają się niechciane wiadomości e-mail, często zawierające reklamy lub wirusy?
  3. – Jak nazywa się system zabezpieczeń sieciowych, który filtruje ruch internetowy?
  4. – Jak nazywa się tryb przeglądarki internetowej, który nie zapisuje historii przeglądania?
  5. – Jak nazywa się proces potwierdzania tożsamości użytkownika przed dostępem do systemu?
  6. – Jak nazywa się proces przekształcania danych w taki sposób, aby były nieczytelne dla osób nieuprawnionych?
  7. – Jak nazywa się złośliwe oprogramowanie, które może uszkodzić system komputerowy?
Down
  1. – Jak nazywa się oszustwo polegające na podszywaniu się pod zaufane instytucje w celu wyłudzenia danych?
  2. – Jak nazywa się osoba, która łamie zabezpieczenia komputerowe?
  3. – Jak nazywa się ciąg znaków używany do zabezpieczenia konta użytkownika?
  4. – Jak nazywa się atak, w którym hakerzy blokują dostęp do plików i żądają okupu?
  5. – Jak nazywa się program chroniący komputer przed złośliwym oprogramowaniem?

12 Clues: – Jak nazywa się osoba, która łamie zabezpieczenia komputerowe?– Jak nazywa się ciąg znaków używany do zabezpieczenia konta użytkownika?– Jak nazywa się program chroniący komputer przed złośliwym oprogramowaniem?– Jak nazywa się atak, w którym hakerzy blokują dostęp do plików i żądają okupu?...

Cyber Crime 2024-10-03

Cyber Crime crossword puzzle
Across
  1. A crime without a harmed party.
  2. civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm
  3. Informal language that keeps things groovy.
  4. Legal protection for creative works.
  5. Software that shields your computer from malicious code.
  6. Small sacred space for quiet reflection.
  7. Where dishes go to get washed
  8. Digital warfare with a sinister twist.
Down
  1. the condition of wandering homelessness without regular employment or income
  2. Covert software that snoops on your digital secrets.
  3. violation of social or economic boundary
  4. Space-saving stacked sleeping arrangement.

12 Clues: Where dishes go to get washedA crime without a harmed party.Legal protection for creative works.Digital warfare with a sinister twist.violation of social or economic boundarySmall sacred space for quiet reflection.Space-saving stacked sleeping arrangement.Informal language that keeps things groovy....

Cyber Awareness 2024-10-09

Cyber Awareness crossword puzzle
Across
  1. This barrier keeps unwanted network traffic out of your system.
  2. A software update that fixes security vulnerabilities.
  3. Malicious software that locks your files until you pay up.
  4. Malicious software designed to harm or exploit a computer system.
  5. Your first line of defense; make it strong and unique.
  6. Verifying your identity before granting access.
Down
  1. Malicious software disguises itself as something harmless.
  2. It turns your data into a secret code to keep it safe.
  3. Malicious software that secretly gathers information about a user.
  4. A process that turns data into a fixed-length string of characters.
  5. A secure tunnel for your internet traffic, often used to protect privacy.
  6. A copy of your data that you keep safe in case of an emergency.

12 Clues: Verifying your identity before granting access.It turns your data into a secret code to keep it safe.A software update that fixes security vulnerabilities.Your first line of defense; make it strong and unique.Malicious software disguises itself as something harmless.Malicious software that locks your files until you pay up....

Cyber ethics 2025-06-07

Cyber ethics crossword puzzle
Across
  1. act of sending misleading email
  2. protect from harm
  3. existing on internet
  4. unsolicited emails
  5. unauthorized acces to computer
  6. harmful software
  7. the right to keep your personal information
  8. a unique identifier
Down
  1. legal protection for original work
  2. act of using language of another person
  3. sequence of character used to acces accounts
  4. to harm someone using digital platform

12 Clues: harmful softwareprotect from harmunsolicited emailsa unique identifierexisting on internetunauthorized acces to computeract of sending misleading emaillegal protection for original workto harm someone using digital platformact of using language of another personthe right to keep your personal informationsequence of character used to acces accounts

Cyber Crossword 2025-07-23

Cyber Crossword crossword puzzle
Across
  1. another name for something you are in MFA
  2. Faking an email address or phone number
  3. Scrambling messages to make sure nobody unwanted can read them
  4. Basic cipher done by shifting letters
  5. Malware that encrypts your files and demands payment
Down
  1. Type of spyware that tracks what you type
  2. Stealing info using social engineering
  3. Protects your computer from dangerous traffic
  4. Looks and acts like a legitimate program, but isn't
  5. Secret word used to log in
  6. A program that can damage your computer
  7. Using more than one way to verify your identity (abbreviation)

12 Clues: Secret word used to log inBasic cipher done by shifting lettersStealing info using social engineeringFaking an email address or phone numberA program that can damage your computerType of spyware that tracks what you typeanother name for something you are in MFAProtects your computer from dangerous traffic...

Cyber Secure 2025-09-22

Cyber Secure crossword puzzle
Across
  1. What blagging is used for.
  2. What a cybercriminal commits.
  3. Pretending to be trustworthy to deceive someone is this type of engineering.
  4. Data that has been processed.
  5. The term for sending fake emails asking for personal information.
  6. Raw facts and figures.
Down
  1. Secretly watching someone enter a PIN or password.
  2. A person who uses the internet to commit a crime.
  3. Gaining unauthorised access to computers.
  4. Can identify you on its own or with other details.
  5. Another name for Two Factor Authentication.
  6. A law that protects your personal information.

12 Clues: Raw facts and figures.What blagging is used for.What a cybercriminal commits.Data that has been processed.Gaining unauthorised access to computers.Another name for Two Factor Authentication.A law that protects your personal information.A person who uses the internet to commit a crime.Secretly watching someone enter a PIN or password....

Cyber Vocabulary 2022-08-19

Cyber Vocabulary crossword puzzle
Across
  1. A violation of copyrights laws or applicable license restrictions.
  2. Trying to get sensitive data.
  3. Sharing a file with other people.
  4. A software that gathers your data from you and the device and sends it to third parties without your consent to do so.
  5. spreads to computers to damage the data and its software.
  6. A virus that is downloaded onto your computer disguised as a real website.
  7. It’s self-replicating and it affects other computers.
Down
  1. Content that is not protected by copyright laws and others, it can be copied,shared, altered, and republished by other people.
  2. The user must agree to go to corporate,internet, or other things.
  3. Where ads appear when a program is running.
  4. Something to connect to your device to access to your program and the user (MercuryA).
  5. That an object as certain security properties.

12 Clues: Trying to get sensitive data.Sharing a file with other people.Where ads appear when a program is running.That an object as certain security properties.It’s self-replicating and it affects other computers.spreads to computers to damage the data and its software.The user must agree to go to corporate,internet, or other things....

cyber bullying 2019-07-11

cyber bullying crossword puzzle
Across
  1. when you want to kill yourself
  2. someone who enforces law
  3. when you are the person who gets bullied
  4. playing with other people
  5. when you are very sad
  6. by your self
Down
  1. someone who is mean for a long amount of time
  2. something you play
  3. when people don't know who you are
  4. someone who teaches people
  5. in your mind
  6. when you aren't in danger

12 Clues: in your mindby your selfsomething you playwhen you are very sadsomeone who enforces lawplaying with other peoplewhen you aren't in dangersomeone who teaches peoplewhen you want to kill yourselfwhen people don't know who you arewhen you are the person who gets bulliedsomeone who is mean for a long amount of time

cyber bullying 2019-07-11

cyber bullying crossword puzzle
Across
  1. when you want to kill yourself
  2. playing with other people
  3. when you are the person who gets bullied
  4. someone who is mean for a long amount of time
  5. when you are very sad
  6. by your self
  7. something you play
Down
  1. when people don't know who you are
  2. in your mind
  3. someone who teaches people
  4. someone who enforces law
  5. when you aren't in danger

12 Clues: in your mindby your selfsomething you playwhen you are very sadsomeone who enforces lawplaying with other peoplewhen you aren't in dangersomeone who teaches peoplewhen you want to kill yourselfwhen people don't know who you arewhen you are the person who gets bulliedsomeone who is mean for a long amount of time

cyber bullying 2019-07-11

cyber bullying crossword puzzle
Across
  1. someone who teaches people
  2. someone who is mean for a long amount of time
  3. when people don't know who you are
  4. when you want to kill yourself
  5. when you aren't in danger
  6. in your mind
Down
  1. by your self
  2. someone who enforces law
  3. when you are very sad
  4. playing with other people
  5. something you play
  6. when you are the person who gets bullied

12 Clues: by your selfin your mindsomething you playwhen you are very sadsomeone who enforces lawplaying with other peoplewhen you aren't in dangersomeone who teaches peoplewhen you want to kill yourselfwhen people don't know who you arewhen you are the person who gets bulliedsomeone who is mean for a long amount of time

CYBER CRIME 2020-10-18

CYBER CRIME crossword puzzle
Across
  1. To send information from your computer to another computer.
  2. A term for the actual computer equipment and related machines or computer parts.
  3. If someone tries to get access to computer systems in order to steal, corrupt or illegitimately view data
  4. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  5. A set of programs that tell a computer to perform a task.
  6. a security barrier designed to keep unwanted intruders “outside” a computer system or network
  7. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
Down
  1. An attempt to acquire a sensitive information such as username, password, files etc.
  2. A program used to access the Internet example- Firefox, chrome etc.
  3. Rules or manners for interacting courteously with others online
  4. Unsolicited email which is sent in large quantities to a large number of users.
  5. Software used or created by hackers to disrupt computer operation, gather sensitive information or gain access to private computer systems.

12 Clues: A set of programs that tell a computer to perform a task.To send information from your computer to another computer.Rules or manners for interacting courteously with others onlineA program used to access the Internet example- Firefox, chrome etc.Unsolicited email which is sent in large quantities to a large number of users....

Cyber Safety 2015-01-27

Cyber Safety crossword puzzle
Across
  1. lejupielādēt failu
  2. ievadīt paroli
  3. izdzēst pielikumu
  4. izdzēst failu
  5. saņemt e-pastu
  6. lejupielādēt bildi
  7. saglabāt failu
  8. sarakstīties tiešsaistē
Down
  1. izdzēst e-pastu
  2. ievadīt segvārdu
  3. saņemt pielikumu
  4. lejupielādēt mūziku

12 Clues: izdzēst failuievadīt parolisaņemt e-pastusaglabāt failuizdzēst e-pastuievadīt segvārdusaņemt pielikumuizdzēst pielikumulejupielādēt failulejupielādēt bildilejupielādēt mūzikusarakstīties tiešsaistē

Cyber Grille 2025-07-22

Cyber Grille crossword puzzle
Across
  1. Correctif appliqué à un logiciel pour corriger une faille
  2. Technique rendant des données illisibles sans clé
  3. Barrière logicielle ou matérielle qui bloque les connexions non autorisées
  4. Protection des systèmes informatiques contre les attaques numériques
  5. Règlement européen sur la protection des données personnelles
Down
  1. Réseau d'ordinateurs infectés contrôlés à distance
  2. Programme espion enregistrant les frappes clavier
  3. Tromperie par e-mail ou site ou SMS pour soutirer des données personnelles
  4. Porte dérobé laissée pour accéder à un système sans autorisation
  5. Hameçonnage réalisé par SMS
  6. Technologie simulant une intelligence humaine
  7. Serveur qui sert d'intermédiaire entre un utilisateur et internet

12 Clues: Hameçonnage réalisé par SMSTechnologie simulant une intelligence humaineProgramme espion enregistrant les frappes clavierTechnique rendant des données illisibles sans cléRéseau d'ordinateurs infectés contrôlés à distanceCorrectif appliqué à un logiciel pour corriger une failleRèglement européen sur la protection des données personnelles...

INFORMATIKA SEKARANG DAN MASA DEPAN 2025-08-26

INFORMATIKA SEKARANG DAN MASA DEPAN crossword puzzle
Across
  1. Proses olah data jadi informasi
  2. Terjemahan Artificial Intelligence
  3. Data Kumpulan data sangat besar
  4. Perlindungan data digital
  5. Chatbot termasuk teknologi
  6. Terjemahan cloud computing
  7. Mobil pintar tanpa sopir
  8. Menggali pola dari data
  9. Algoritma belajar dari data
Down
  1. Cara sehat gunakan media digital
  2. Serangan pencuri data digital
  3. Mesin otomatis yang membantu manusia
  4. Dunia buatan imersif
  5. Jaringan global penghubung
  6. Kecerdasan buatan komputer
  7. Singkatan teknologi penghubung perangkat
  8. Kemampuan memahami dunia digital
  9. Teknologi yang bisa menyesuaikan
  10. Perangkat sensor terhubung jaringan
  11. Komunikasi antar mesin otomatis

20 Clues: Dunia buatan imersifMenggali pola dari dataMobil pintar tanpa sopirPerlindungan data digitalJaringan global penghubungKecerdasan buatan komputerChatbot termasuk teknologiTerjemahan cloud computingAlgoritma belajar dari dataSerangan pencuri data digitalProses olah data jadi informasiKomunikasi antar mesin otomatisCara sehat gunakan media digital...

Agencies and corporations 2024-08-09

Agencies and corporations crossword puzzle
Across
  1. York Police Department One of the most famous abbreviations for a police department in the east coast, also in one of the biggest cities in America.
  2. Service The people who let trumps ear get shot off (almost).
  3. corps A group for people wanting to volunteer for the Gov't
  4. JFK wanted to defund these guys in the 60's, bad decision
  5. Scientists in charge of putting people in space
  6. The people in charge of cleaning up natural disasters.
  7. Science for the public funded by the public
  8. People in charge of environmental security.
  9. Patrol The people in charge of manning our weak points for immigrants to get in.
Down
  1. The scary people with scary weapons and tactics.
  2. Incharge of disease control
  3. park security They provide security for national parks
  4. They deliver mail
  5. The people in charge of taking down drug lords like Heisenberg
  6. Oversees the security industries
  7. Involved in some of the most disastrous raids including, The Ruby Ridge incident, and the burning down of mount Carmel
  8. Security Council National defense and security
  9. Bureau of Investigation Moto is "Fidelity, Bravery, Integrity"
  10. Civilizes national aviation.
  11. Produces the presidents budget

20 Clues: They deliver mailIncharge of disease controlCivilizes national aviation.Produces the presidents budgetOversees the security industriesScience for the public funded by the publicPeople in charge of environmental security.Security Council National defense and securityScientists in charge of putting people in space...

PUMPKINS FLY 2013-01-13

PUMPKINS FLY crossword puzzle
Across
  1. / Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire
  2. / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
  3. / Privilege of the permanent members: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
  4. / Granted permanent membership into the Security Council in 1971
  5. / Location where the first Security Council session took place on 17 January 1946
  6. How many months do members take turns at holding the presidency of the Security Council
  7. / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
  1. / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
  2. Name the country that had used its veto power the most number of times. This country should be one of the permanent members in the Security Council.
  3. / Other than Brazil, India and Japan, name the the other country that has made the strongest demand for a permanent seat in the United Nations Security Council.
  4. / Number of members in the Security Council
  5. / The country Britain and France join forces with to invade Egypt in 1956 during the Suez Canal crisis.
  6. / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
  7. In 2003, the United Nations Security Council was involved in a crisis that happened in Sudan. The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.

14 Clues: / Number of members in the Security Council/ Granted permanent membership into the Security Council in 1971/ Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire/ Location where the first Security Council session took place on 17 January 1946How many months do members take turns at holding the presidency of the Security Council...

Airport and international 2019-03-13

Airport and international crossword puzzle
Across
  1. passenger
  2. type of plane
  3. airport security
  4. stuff you can bring on a plane
  5. airline
  6. allowed if declared
  7. unsecure side of airport
  8. type of runway incursion
  9. required to board plane internationally
  10. required to enter country
  11. wall of aircraft
  12. secure part of airport
Down
  1. alphabet
  2. covered walkway
  3. area adjacent to terminal
  4. go on to plane
  5. not allowed at all
  6. security
  7. cargo compartment
  8. machine for scanning

20 Clues: airlinealphabetsecuritypassengertype of planego on to planecovered walkwayairport securitywall of aircraftcargo compartmentnot allowed at allallowed if declaredmachine for scanningsecure part of airportunsecure side of airporttype of runway incursionarea adjacent to terminalrequired to enter countrystuff you can bring on a plane...

Network Concepts and Cyber Ethics 2025-06-03

Network Concepts and Cyber Ethics crossword puzzle
Across
  1. collects data.
  2. Area Network.
  3. data for security.
  4. software.
  5. identifier for a device on a network.
  6. that forwards data packets between networks.
  7. for communication between devices.
  8. system that controls traffic.
  9. emails to steal data.
  10. system access.
Down
  1. networking method.
  2. network technology
  3. bullying.
  4. that provides services or data.
  5. creative work.
  6. data transfer rate.
  7. to access accounts securely.
  8. email.
  9. remote access method.
  10. to keep data secure.

20 Clues: email.bullying.software.Area Network.collects data.creative work.system access.networking method.network technologydata for security.data transfer rate.to keep data secure.remote access method.emails to steal data.to access accounts securely.system that controls traffic.that provides services or data.for communication between devices....

Test 2023-08-25

Test crossword puzzle
Across
  1. Operating System
  2. Bulk Email
  3. All things connected with Internet
  4. Malicious Software
  5. Multifactor Authentication
Down
  1. Most cyberattack method
  2. Amcor Cyber Month
  3. Quickly Spreads
  4. Infected & Slowing your Computer

9 Clues: Bulk EmailQuickly SpreadsOperating SystemAmcor Cyber MonthMalicious SoftwareMost cyberattack methodMultifactor AuthenticationInfected & Slowing your ComputerAll things connected with Internet

36 2024-07-30

36 crossword puzzle
Across
  1. Witch haunting writer
  2. Remote farm terror
  3. Supernatural baby scare
  4. Cult island nightmare
  5. Mysterious machine obsession
  6. Cyber horrors anthology
  7. Indian ghost legend
  8. Indian village curse
  9. Home invasion silent horror
  10. Indian military interrogation
  11. Forest deity encounter
  12. Evil bidding app
Down
  1. Perpetual haunted store
  2. Barroom story horror
  3. Haunted house treatment
  4. Identity theft webcam horror
  5. Heart transplant horror
  6. Ghost soldiers battle
  7. Invisible predator fear
  8. Postapocalyptic fatherhood
  9. Shadowy figure fear
  10. Imaginary friend danger
  11. Blindfolded survival thriller
  12. Refugee haunting drama
  13. Haunting childhood game

25 Clues: Evil bidding appRemote farm terrorShadowy figure fearIndian ghost legendBarroom story horrorIndian village curseWitch haunting writerCult island nightmareGhost soldiers battleRefugee haunting dramaForest deity encounterPerpetual haunted storeHaunted house treatmentSupernatural baby scareHeart transplant horrorInvisible predator fear...

Thanksgiving Crossword 2022-11-08

Thanksgiving Crossword crossword puzzle
Across
  1. The soup of green bean casserole
  2. Ocean Spray
  3. The original Pilgrim colony
  4. Mac and Cheese brand
  5. Pie nut
  6. For the day after Thanksgiving
  7. Inside turkey
  8. Popular spiced Thanksgiving pie
  9. Thanksgiving’s traditional side dish
  10. The people you spend Thanksgiving with
  11. The star of the meal
  12. The thanksgiving emotion
Down
  1. Friday Shopping extravaganza
  2. Fall fruit pie
  3. Thanksgiving’s sport
  4. Holiday celebrating harvest and gratitude
  5. Sweet Potato Casserole with ____
  6. _____ Monday
  7. The month of Thanksgiving
  8. Thanksgiving day
  9. Served with turkey, mashed potatoes, biscuits, and more dishes
  10. Fall

22 Clues: FallPie nutOcean Spray_____ MondayInside turkeyFall fruit pieThanksgiving dayThanksgiving’s sportMac and Cheese brandThe star of the mealThe thanksgiving emotionThe month of ThanksgivingThe original Pilgrim colonyFriday Shopping extravaganzaFor the day after ThanksgivingPopular spiced Thanksgiving pieThe soup of green bean casserole...

Cyberpigs 1 2015-10-07

Cyberpigs 1 crossword puzzle
Across
  1. When you ________ an email, remember that it isn’t necessarily private.
  2. Take an _______ with you if you ever go to meet a cyber-friend.
  3. Don’t ever give your ________ or address to a cyber-stranger.
  4. When Lil gave out too much information, her email account was filled up with _________
  5. What Virtual Pigsty really wanted was Lil’s _________
Down
  1. Companies can use clubs to find out more information about you to _______ you things you don’t need.
  2. Websites where you play games with products are not playgrounds – they are ___________.
  3. The three CyberPigs were surfing the _____ one afternoon
  4. If Lil Pig entered a contest she would win a _______

9 Clues: If Lil Pig entered a contest she would win a _______What Virtual Pigsty really wanted was Lil’s _________The three CyberPigs were surfing the _____ one afternoonDon’t ever give your ________ or address to a cyber-stranger.Take an _______ with you if you ever go to meet a cyber-friend....