cyber security Crossword Puzzles

Tugas-jaringan koputer dan internet 2024-01-11

Tugas-jaringan koputer dan internet crossword puzzle
Across
  1. komputer dan manfaat
  2. jaringan komputer
  3. jaringan
  4. securities
  5. jaringan komputer
Down
  1. pertukaran data
  2. dan konfigurasi keamanan jaringan
  3. informasi siatem jaringan komputer
  4. teknis jaringan komputer
  5. kelola data

10 Clues: jaringansecuritieskelola datapertukaran datajaringan komputerjaringan komputerkomputer dan manfaatteknis jaringan komputerdan konfigurasi keamanan jaringaninformasi siatem jaringan komputer

Tugas-jaringan koputer dan internet 2024-01-11

Tugas-jaringan koputer dan internet crossword puzzle
Across
  1. komputer dan manfaat
  2. jaringan komputer
  3. jaringan
  4. securities
  5. jaringan komputer
Down
  1. pertukaran data
  2. dan konfigurasi keamanan jaringan
  3. informasi siatem jaringan komputer
  4. teknis jaringan komputer
  5. kelola data

10 Clues: jaringansecuritieskelola datapertukaran datajaringan komputerjaringan komputerkomputer dan manfaatteknis jaringan komputerdan konfigurasi keamanan jaringaninformasi siatem jaringan komputer

Internet Security 2021-05-06

Internet Security crossword puzzle
Across
  1. Where the sender and receiver both use the same key to encrypt and decrypt data
  2. Hardware or software for protecting against unauthorised access to a network
  3. A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
  4. Issue solved by using public-private key encryption
  5. A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
  6. Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
Down
  1. Where a public and private key are used to encrypt and decrypt data
  2. A trusted organisation that provides digital certificates and signatures
  3. Malware that is hidden within another file on your computer
  4. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
  5. A generic term for malware where the program attaches itself to another file in order to infect a computer
  6. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
  7. A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
  8. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules

14 Clues: Issue solved by using public-private key encryptionMalware that is hidden within another file on your computerWhere a public and private key are used to encrypt and decrypt dataA trusted organisation that provides digital certificates and signaturesHardware or software for protecting against unauthorised access to a network...

SECURITY MEETING 2024-06-10

SECURITY MEETING crossword puzzle
Across
  1. REPORT FILED
  2. IN MOST CASES USES A FIREARM
  3. 3 POTENTIAL COURSES OF ACTION
  4. WILL ENGAGE WITH EMERGENCY RESPONDERS
  5. POLICY TO PROVIDE GUIDANCE
  6. NUMBER OF COURSES OF ACTION
  7. REVIEWED ANNUALLY AND REVISED
  8. COMPLY WITH LAW ENFORCEMENT
Down
  1. NAME THE PROGRAM TO REPORT TREASTS AGAINST THE BANK
  2. PROHIBITED WITHOUT APPROVAL
  3. MONTHLY TRAINING
  4. RESPONSIBLE FOR SIGNING
  5. DO NOT ATTEMPT TO
  6. A OFFICER WILL NOTIFY RELATIVES

14 Clues: REPORT FILEDMONTHLY TRAININGDO NOT ATTEMPT TORESPONSIBLE FOR SIGNINGPOLICY TO PROVIDE GUIDANCEPROHIBITED WITHOUT APPROVALNUMBER OF COURSES OF ACTIONCOMPLY WITH LAW ENFORCEMENTIN MOST CASES USES A FIREARM3 POTENTIAL COURSES OF ACTIONREVIEWED ANNUALLY AND REVISEDA OFFICER WILL NOTIFY RELATIVESWILL ENGAGE WITH EMERGENCY RESPONDERS...

Social Security Crossword 2015-01-28

Social Security Crossword crossword puzzle
Across
  1. Social Security benefits represent about 38 percent of the income of the _____
  2. There were 63 million Social Security _____ in 2013
  3. Benefits to retired workers has _____ in the past 40 years
  4. 55 percent of Social Security beneficiaries were _____ in 2013
Down
  1. 67 years old is the _____ retirement age of a person born after 1960
  2. The average age of disabled-worker beneficiaries in current-payment status has _____ substantially since 1960
  3. About 47 percent of _____ persons rely on Social Security for 90 percent or more of their income.
  4. Supplemental Security _____ (SSI)
  5. One 5th of all beneficiaries in 2013 were _____ or the spouses and children of retired or disabled workers
  6. 165 million _____ are covered under Social Security
  7. 9 out of ten individuals age 65 and older receive Social Security _____

11 Clues: Supplemental Security _____ (SSI)There were 63 million Social Security _____ in 2013165 million _____ are covered under Social SecurityBenefits to retired workers has _____ in the past 40 years55 percent of Social Security beneficiaries were _____ in 201367 years old is the _____ retirement age of a person born after 1960...

Priceless Puzzle 2023-08-25

Priceless Puzzle crossword puzzle
Across
  1. The competition
  2. Location of the Sustainability Lab
  3. Mastercard HQ
  4. Month of the Rugby World Cup final
  5. LGBTQIA+ card personalisation
  6. Six notes
Down
  1. Cyber Shield acquisition
  2. The card name pre-1979
  3. CEO
  4. Comms Queen

10 Clues: CEOSix notesComms QueenMastercard HQThe competitionThe card name pre-1979Cyber Shield acquisitionLGBTQIA+ card personalisationLocation of the Sustainability LabMonth of the Rugby World Cup final

Principles of CyberSecurity 2025-04-02

Principles of CyberSecurity crossword puzzle
Across
  1. The process of saving data in case it is lost or damaged
  2. The law that stops that states it is illegal to use or share peoples data except for the reason it was collected
  3. A type of virus that you think is one thing but is really another thing
  4. The methods we employ to keep data safe
  5. a security method where more than one way of determining identity is utilised
  6. Gaining unauthorised access to a system
  7. A scam method using email
  8. A security method where data is put into a code
  9. The law that says you can have access to any info kept about you
Down
  1. When an Enterprise has experiences unauthorised access to their data
  2. Is the data accurate, updated and from a reliable source
  3. Software that locks your system and you need to pay a few for the code
  4. The right to keep info about ourselves confidential
  5. A scam method using SMS
  6. Where one person pretends to be someone else using confidential information
  7. landscape The environment in which a system exists and the risks involved in regard to security
  8. A piece of software designed to block unauthorised access to a system
  9. The hat colour of a "good" hacker
  10. Software used to prevent malicious programs from damaging a system
  11. damage A business may suffer this after a breach
  12. Security systems that are based on a human feature
  13. Software designed to damage a system

22 Clues: A scam method using SMSA scam method using emailThe hat colour of a "good" hackerSoftware designed to damage a systemThe methods we employ to keep data safeGaining unauthorised access to a systemA security method where data is put into a codedamage A business may suffer this after a breachSecurity systems that are based on a human feature...

Security Month 2025-11-03

Security Month crossword puzzle
Across
  1. A professional who tests computer systems for vulnerabilities. (7, 6)
  2. The security technique that modifies sensitive details by replacing it with fictitious information. (4, 7)
  3. Your unique code used to gain access to websites, apps, and more. (8)
  4. Framework that enables a third party to integrate with Salesforce, potential for them to be compromised. (9, 4)
  5. An incident where information is accessed, stolen, or exposed without authorization. (6)
Down
  1. An add-on product to gain extra security for your Salesforce org. (6)
  2. The security technique that encourages an implicit lack of faith in all users. (4, 5)
  3. Digitally altered appearances, one of the ways AI could cause security issues. (9)
  4. Initialism, require a user to provide two or more verification factors to gain access. (3)
  5. Salesforce encourages the principle of least ___. (10)
  6. Salesforce recently announced a partnership with this company to enhance Agentforce security. (11)
  7. Fraudulent communications that appear to come from a legitimate source. (8)
  8. The EU data privacy and security law. (4)
  9. This solution is useful in all cases of data loss. (6)

14 Clues: The EU data privacy and security law. (4)Salesforce encourages the principle of least ___. (10)This solution is useful in all cases of data loss. (6)An add-on product to gain extra security for your Salesforce org. (6)A professional who tests computer systems for vulnerabilities. (7, 6)...

Thanksgiving Cyber Puzzle 2014-11-18

Thanksgiving Cyber Puzzle crossword puzzle
Across
  1. A unit of digital information in computer and usually consists of eight bits
  2. Original name of the Pilgrims
  3. Software that is designed to detect and destroy computer viruses
  4. The day after Thanksgiving is called this color
  5. Software that gathers computer user information and transmits it to the creator without the explicit knowledge or informed consent of the user
  6. The first Thanksgiving day football game was started by this team (2 words)
  7. What a baby turkey is called
  8. Software used to disrupt computer operation or gain access to sensitive data
  9. Email scam or attempt to trick you into giving your password or personal information
  10. The first president to pardon a turkey from a Thanksgiving dinner
  11. A stick, also know as a flash drive, is a plug-and-paly portable device
  12. Hardware or software that helps keep hackers from using your computer and it watches for outside attempts to access your system and block unauthorized use
  13. O'Bannon Bank network domain name
  14. Before throwing this in a container ask if it is something you would want made public
Down
  1. The computer term the Monday after Thanksgiving is called
  2. The busiest travel day of the year is the Friday after this holiday
  3. Type of email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus
  4. The name of the famous rock where the pilgrims first landed (2 words)
  5. The name of the ship the pilgrims came to America on
  6. Popular web search engine
  7. The longest balloon in the Macy's Thanksgiving Day Parade
  8. A secure password should contain at least one of these
  9. This type of corn is hard
  10. What a male turkey is called

24 Clues: Popular web search engineThis type of corn is hardWhat a baby turkey is calledWhat a male turkey is calledOriginal name of the PilgrimsO'Bannon Bank network domain nameThe day after Thanksgiving is called this colorThe name of the ship the pilgrims came to America onA secure password should contain at least one of these...

Cyber safety crossword 2016-05-17

Cyber safety crossword crossword puzzle
Across
  1. information that can sometimes be kept on a USB.
  2. a folder where you keep your stuff.
  3. talking to someone.
  4. a small group of people together.
  5. small random videos that can sometimes be unwanted.
  6. a bug in your computer that is stopping it from working
  7. sites that are use for different things.
  8. getting something on your device.
  9. person that cheats in something
  10. someone that helps you do things
  11. revealing your true self.
  12. a public site with people from all over the world.
  13. showing the violence of a game,show or movie.
  14. sending a type message to someone else.
  15. unwanted virus someone is sending.
Down
  1. can be downloaded to use.
  2. a remote used for video games.
  3. a small square showing your face.
  4. security used to get in your device.
  5. a site for exploring and information.
  6. a site you need to be careful with when watching
  7. closing screens but can easily go back.
  8. a site that is not meant to be used.
  9. a character describing you in a game
  10. people that can be played with in real life and video games.
  11. information that is kept to your self.
  12. a person that makes you upset or sad.
  13. a mini activity.
  14. a device that you download apps

29 Clues: a mini activity.talking to someone.can be downloaded to use.revealing your true self.a remote used for video games.person that cheats in somethinga device that you download appssomeone that helps you do thingsa small square showing your face.a small group of people together.getting something on your device.unwanted virus someone is sending....

Estelle cyber safety 2016-06-07

Estelle cyber safety crossword puzzle
Across
  1. You use to go places bag.
  2. you can play stuff on it
  3. you live there
  4. You write on
  5. you have to be careful on it
  6. it can save were you were up to
  7. some words that you use to get in to some thing
  8. it affects you iPad or phone or computer
  9. You were when it's sunny
  10. You stay away
  11. You can eat
Down
  1. You sleep on
  2. you do work on
  3. you call people
  4. can read
  5. You can message people
  6. Helps you write
  7. you use to brush your teeth
  8. Use to open something
  9. you can look at to see if you need it
  10. you can tip and save it
  11. you can each stuff
  12. it's like the news on the computer bully's book.

23 Clues: can readYou can eatYou sleep onYou write onYou stay awayyou do work onyou live thereyou call peopleHelps you writeyou can each stuffUse to open somethingYou can message peopleyou can tip and save ityou can play stuff on itYou were when it's sunnyYou use to go places bag.you use to brush your teethyou have to be careful on it...

The Cyber Scramble! 2024-04-19

The Cyber Scramble! crossword puzzle
Across
  1. Internet connection method that requires a phone line and creates a distinctive sound when connecting, known as ____.
  2. One of the most popular search engines in the world.
  3. Virtual space where users can communicate in real-time through text messages, known as a ____.
  4. Security system that controls the incoming and outgoing network traffic, known as a ____.
  5. Software used to navigate the internet, such as Internet Explorer or Firefox, is called a ____.
  6. Opposite of downloading, this term refers to transferring data from your computer to the internet, known as ____.
  7. Company that provides your internet connection is known as an ____.
  8. Language used to create web pages is known as ____.
  9. Collection of web pages linked under a common domain, also known as a ____.
  10. The most used social media platform in the world.
Down
  1. Unwanted or unsolicited email, commonly referred to as ____.
  2. Buying and selling goods or services over the internet, commonly referred to as _____.
  3. A communication method that uses electronic devices to deliver messages across computer networks.
  4. Unique address used to locate resources on the internet, abbreviated as ____.
  5. Advertisement that appears in a separate window while browsing the internet, known as a ____.
  6. Process of transferring data from the internet to your computer is called a ____.
  7. Wireless networking technology that allows devices to connect to the internet without the need for physical cables, known as ____.
  8. Type of malicious software that can replicate itself and infect other computer files, known as ____.
  9. Device that allows computers to communicate over telephone lines, also known as a ____.
  10. Website where individuals or groups regularly post content on specific topics, known as a ____.

20 Clues: The most used social media platform in the world.Language used to create web pages is known as ____.One of the most popular search engines in the world.Unwanted or unsolicited email, commonly referred to as ____.Company that provides your internet connection is known as an ____....

Cyber Physical Systems 2025-03-20

Cyber Physical Systems crossword puzzle
Across
  1. The process of making systems operate without human intervention.
  2. Using models to replicate real-world behaviors.
  3. A decentralized and secure digital ledger technology.
  4. Internet-based computing providing storage and processing power.
  5. Related to manufacturing and production systems.
  6. A network of connected devices that communicate over the internet.
  7. Study of control and communication in machines and living beings.
  8. The ability of different systems to work together.
  9. A virtual replica of a physical system for monitoring and analysis.
  10. Devices that detect and respond to physical changes.
Down
  1. The coordination of processes to operate in unison.
  2. Protection of digital and cyber-physical systems from threats.
  3. The capability of a system to function independently.
  4. A computing system integrated into a larger system.
  5. Devices that convert electrical signals into mechanical motion.
  6. A highly automated, connected, and intelligent manufacturing system.
  7. Machine-based intelligence that enables decision-making.
  8. Combining different subsystems into a unified system.
  9. Large volumes of data used for analytics and decision-making.
  10. Processing data closer to the source rather than a central server.

20 Clues: Using models to replicate real-world behaviors.Related to manufacturing and production systems.The ability of different systems to work together.The coordination of processes to operate in unison.A computing system integrated into a larger system.Devices that detect and respond to physical changes....

Puzzle #48 – “How Social Security Is Funded” 2025-06-30

Puzzle #48 – “How Social Security Is Funded” crossword puzzle
Across
  1. - Where collected Social Security money is stored
  2. - Pays half of the Social Security tax
  3. - Shares payroll tax responsibility with the employee
  4. - What current workers are funding for today’s retirees
Down
  1. - Taxes are collected based on these
  2. - Social Security is funded through this type of tax
  3. - Social Security receives this from taxes
  4. - Main way Social Security is funded
  5. - Acronym for Federal Insurance Contributions Act
  6. - Often funded alongside Social Security through payroll

10 Clues: - Taxes are collected based on these- Main way Social Security is funded- Pays half of the Social Security tax- Social Security receives this from taxes- Where collected Social Security money is stored- Acronym for Federal Insurance Contributions Act- Social Security is funded through this type of tax...

RAF Knowledge Test 2023-04-04

RAF Knowledge Test crossword puzzle
Across
  1. How many terms at Cranwell
  2. Overseas Base
  3. Air, Space and Cyber Group
  4. Home to ISTAR
  5. Who formed the RAF
  6. Atlas C.1 name
Down
  1. Overseas base
  2. A role of Air Power
  3. C-17 Name
  4. An Air power Characteristic
  5. An Air Power Characteristic
  6. New CAS
  7. QRA fall under this group
  8. T in NATO

14 Clues: New CASC-17 NameT in NATOOverseas baseOverseas BaseHome to ISTARAtlas C.1 nameWho formed the RAFA role of Air PowerQRA fall under this groupHow many terms at CranwellAir, Space and Cyber GroupAn Air power CharacteristicAn Air Power Characteristic

SAFE-T Week 2026-01-05

SAFE-T Week crossword puzzle
Across
  1. engaging____________
  2. Customer _________ protocol
  3. ______ APP
  4. Civil_____
  5. Access to ______ Areas
  6. _____ Response
  7. Branch&Cafe grab and ____ procedures
  8. _______ & Security Preparedness Resources
Down
  1. vandalism, ______ & burglary
  2. Alarm System & _______ Management
  3. ________ on branch & cafe premises
  4. ______ camera footage requests
  5. suspicious ________
  6. Opening & _____ the branch
  7. Associate ______ Awareness
  8. contract ______ Services
  9. _______Threats

17 Clues: ______ APPCivil____________Threats_____ Responsesuspicious ________engaging____________Access to ______ Areascontract ______ ServicesOpening & _____ the branchAssociate ______ AwarenessCustomer _________ protocolvandalism, ______ & burglary______ camera footage requestsAlarm System & _______ Management________ on branch & cafe premises...

Midterm Exam Prep 2024-02-29

Midterm Exam Prep crossword puzzle
Across
  1. Protecting data and resources from unauthorized access.
  2. This type of denial exists on each ACL.
  3. Security subnet created by dual firewalls.
  4. Sophisticated attacks remain undetected.
  5. A system designed to lure attackers and gather information about their tactics.
  6. A security zone for suppliers and customers.
  7. An attack in which the attacker intercepts and analyzes network traffic.
  8. This type of ACL allows everyone except the one we deny.
  9. Malware inducing fear tactic.
  10. This secure remote access protocol should be replaced by telnet.
  11. Protection of data from unauthorized manipulation or alteration.
  12. Device authentication mechanism to ensure a secure network.
  13. Social engineering on high-profile targets.
  14. It's used for IP translations.
  15. Policies are used for email delivery.
  16. This hacker steals valuable information and is often associated with the mafia.
  17. IPsec protocol that can be used for data encryption.
  18. This hacker gets in, grabs the goods, and gets out.
  19. An availability technique.
  20. Social engineering phase in which the conversation with the victim starts.
  21. This hackers have political motives.
  22. This poisoning technique associates a MAC address with the victim's IP address.
  23. A layer 2 Network segmentation technique.
  24. Provides a method for mutual authentication of devices within the SAN
  25. This WSUS server is responsible for testing and approval of patches.
  26. two worded Layer 2 security configuration on switches.
  27. These malware can be purchased in a ready-to-use state.
  28. Social engineering over the phone.
Down
  1. For this anti-virus scan, you must reboot your system.
  2. A physical security entry trap
  3. Storytelling and impersonating legitimate organization.
  4. In this NIST core function we educate users.
  5. This standard can be created to apply consistent security configurations.
  6. FTPs rely on this protocol for security.
  7. The second Security model layer.
  8. In this NAC stage we define how NAC should be implemented.
  9. This Malware spreads through a network.
  10. Infected computers with a botnet to carry an attack with.
  11. These appliances can be used to apply quality of service and traffic-shaping.
  12. IPsec protocol is responsible for establishing security associations (SAs).
  13. Ethical hacking phase to collect information.
  14. The best security countermeasure to reduce the risk of a phishing attack.
  15. A controlled DNS to identify a hacked computer.
  16. This IPsec operation mode is used for site-to-site VPN connection.
  17. Protects sensitive data from being exposed
  18. Email authentication check.
  19. The file and folder permissions are written in this list.
  20. Email authentication using signatures.
  21. File-level encryption.
  22. Following an authorized personnel to bypass the physical Access Control.
  23. This type of proxy server can be used for web filtering.
  24. A temporary power backup.
  25. A network scanning tool.
  26. These patches are prioritized even outside of a normal schedule.

54 Clues: File-level encryption.A network scanning tool.A temporary power backup.An availability technique.Email authentication check.Malware inducing fear tactic.A physical security entry trapIt's used for IP translations.The second Security model layer.Social engineering over the phone.This hackers have political motives....

Places in town 2020-09-16

Places in town crossword puzzle
Across
  1. _____rooms
  2. clothes ______
  3. sports _____
  4. movie _____
Down
  1. _____ stop
  2. ____store
  3. fast food _____
  4. _____café

8 Clues: ____store_____café_____ stop_____roomsmovie _____sports _____clothes ______fast food _____

Slack @: 2023-09-22

Slack @: crossword puzzle
Across
  1. The quality of keeping or being kept secret or private
  2. An act of breaking or failing to observe a law, agreement, or code of conduct.
  3. -security
  4. The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
  5. The art of writing or solving codes
  6. The process or action of proving or showing something to be true, genuine, or valid
Down
  1. The quality of being able to be used or obtained
  2. Type of malware relating to ancient Troy in Asia Minor
  3. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  4. A cybercrime in which the attacker floods a server with internet traffic from multiple sources to prevent users from accessing connected online services and sites
  5. The process of converting information or data into a code, especially to prevent unauthorized access.
  6. A method of accomplishing something primarily by means of strength, without the use of great skill, mechanical aids or thought
  7. The quality of being honest and having strong moral principles
  8. The Hollywood name of a person who uses computers to gain unauthorized access to data
  9. An electronic authentication method in which a user is granted access to a website or application

15 Clues: -securityThe art of writing or solving codesThe quality of being able to be used or obtainedType of malware relating to ancient Troy in Asia MinorThe quality of keeping or being kept secret or privateThe quality of being honest and having strong moral principlesAn act of breaking or failing to observe a law, agreement, or code of conduct....

TJandCASTROFLORES 2024-10-24

TJandCASTROFLORES crossword puzzle
Across
  1. warfare of security experts will discuss the growing threats to corporations.
  2. ceremony- when the vessel is formally named and launched is customarily
  3. warfare- the use of military aircraft and other flying machines in warfare.
  4. launching- vessel is either completed on perpendicular building ways near the water.
  5. warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
  6. conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
  7. control- measures taken to prevent a fire or collision.
Down
  1. weapons- traditional weapons such as rifles and explosives
  2. process- gain the information used to gain estimates of the situation
  3. warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
  4. warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
  5. lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
  6. warfare are self replicating programs that can hide in systems
  7. marsupial
  8. operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
  9. a series of short cruises to check out the ship and its equipment.

16 Clues: marsupialcontrol- measures taken to prevent a fire or collision.weapons- traditional weapons such as rifles and explosiveswarfare are self replicating programs that can hide in systemsa series of short cruises to check out the ship and its equipment.process- gain the information used to gain estimates of the situation...

Crossword Period 1 2024-06-04

Crossword Period 1 crossword puzzle
Across
  1. Class of conspicuous consumption
  2. Like a famous fictional knight
  3. Not quite
  4. Something precious and portable
  5. Linked
  6. Relative of "shy" and "shoo"
  7. Find intolerable
  8. Salty or spicy, in speech
  9. Like the prices on Black Friday or Cyber Monday
Down
  1. Aggressive military strategy
  2. For insiders only
  3. Like a speech or sermon
  4. You might have this before a big decision
  5. Opposite of indifference
  6. Something worse than a lecture
  7. Link
  8. Like teacher's answers, sometimes
  9. All puffed up
  10. Last ___ of...
  11. Up in smoke
  12. Clownish

21 Clues: LinkLinkedClownishNot quiteUp in smokeAll puffed upLast ___ of...Find intolerableFor insiders onlyLike a speech or sermonOpposite of indifferenceSalty or spicy, in speechAggressive military strategyRelative of "shy" and "shoo"Like a famous fictional knightSomething worse than a lectureSomething precious and portableClass of conspicuous consumption...

Technology 2024-02-16

Technology crossword puzzle
Across
  1. to turn on (e)
  2. stereo
  3. device
  4. the touchscreen
  5. work
  6. voicemail
  7. social media
  8. out of order
  9. the tablet
  10. apps
  11. digital camera
  12. the charger
  13. password
  14. printer
  15. mouse
  16. to print
  17. remote control
Down
  1. laptop
  2. the cyber cafe
  3. the phone
  4. busy
  5. to turn off
  6. make a sound
  7. slow
  8. the channel
  9. the monitor
  10. the wireless connection
  11. video call
  12. keyboard
  13. TV
  14. call
  15. radio
  16. to turn on (p)
  17. the internet

34 Clues: TVbusyslowworkappscallradiomouselaptopstereodeviceprinterkeyboardpasswordto printthe phonevoicemailvideo callthe tabletto turn offthe channelthe monitorthe chargermake a soundsocial mediaout of orderthe internetto turn on (e)the cyber cafedigital camerato turn on (p)remote controlthe touchscreenthe wireless connection

16a 2024-07-11

16a crossword puzzle
Across
  1. Paranormal investigation series
  2. Drummer's intense journey
  3. Animal city's mystery
  4. Dysfunctional superhero family
  5. Boy becomes a hero
  6. Postapocalyptic road trip
  7. Alien symbiote film
  8. Dream master's tale
  9. Ex-cop's investigations
  10. Man with multiple selves
  11. Heist widows' plot
  12. Cyber world's return
  13. Antihero group's antics
  14. Disease thriller film
  15. Warrior king's realm
Down
  1. Teen vampire saga
  2. Picnic-stealing bear
  3. Arms dealers' story
  4. Agent's loyalty tested
  5. Future cop's hunt
  6. Longhaired princess's tale
  7. Writer's biographical film
  8. Street rat's magical tale
  9. Heroes against corruption
  10. Balloon house adventure

25 Clues: Teen vampire sagaFuture cop's huntBoy becomes a heroHeist widows' plotArms dealers' storyAlien symbiote filmDream master's talePicnic-stealing bearCyber world's returnWarrior king's realmAnimal city's mysteryDisease thriller filmAgent's loyalty testedEx-cop's investigationsAntihero group's anticsBalloon house adventureMan with multiple selves...

Chapter 6: Social Media Legal and Policies in Malaysia 2023-09-18

Chapter 6: Social Media Legal and Policies in Malaysia crossword puzzle
Across
  1. of the MCMC is to promoting and protecting consumer
  2. deemed to be offensive or illegal can be subject to investigation and action by MCMC
  3. is the regulatory body for the communications and multimedia industry in Malaysia
  4. Law that stalking is defined as a repeated act of harassment, which is intended or is likely to cause distress, fear, or alarm to any person for their safety.
  5. of the social media security ensures to provide best practices forindividuals and organizations to protect their social media accounts from cyber threats
Down
  1. Agencies responsible of assuring appropriate use of social media by government officials, the management of social media accounts, and the handling of sensitive information on social media
  2. Social media service providers are also subject to do under regulatory requirements of the CMA
  3. regulates a wide range of issues, including licensing, spectrum allocation, competition, and consumer protection

8 Clues: of the MCMC is to promoting and protecting consumeris the regulatory body for the communications and multimedia industry in Malaysiadeemed to be offensive or illegal can be subject to investigation and action by MCMCSocial media service providers are also subject to do under regulatory requirements of the CMA...

Cybersecurity Santiago Yeison Cristian Yefferson 2025-06-25

Cybersecurity Santiago Yeison Cristian Yefferson crossword puzzle
Across
  1. This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
  2. Criminal activities carried out using computers or the internet.
  3. The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. The programs and other operating information used by a computer.
  6. The quality of being trustworthy or of performing consistently well.
  7. The use of computers and the internet to conduct warfare in cyberspace.
  8. Software used to prevent, detect, and remove malicious software.
  9. The process of encoding information in such a way that only authorized parties can access it.
Down
  1. Criminal activities carried out using computers or the internet.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
  4. Characterized by malice; intending or intended to do harm.
  5. As discussed, malicious software.
  6. An attempt by hackers to damage or destroy a computer network or system.
  7. The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
  8. The process of converting encrypted data back into its original form.
  9. The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
  10. Permanent software programmed into a read-only memory.
  11. The practice of protecting systems, networks, and programs from digital attacks.
  12. Broader than antivirus, it protects against various forms of malware, not just viruses.
  13. Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.

22 Clues: As discussed, malicious software.Permanent software programmed into a read-only memory.Characterized by malice; intending or intended to do harm.Criminal activities carried out using computers or the internet.Criminal activities carried out using computers or the internet.The programs and other operating information used by a computer....

SECTION 6: WITHHOLDING TAXES 2026-02-14

SECTION 6: WITHHOLDING TAXES crossword puzzle
Across
  1. Compensation paid in addition to regular wages such as bonuses, commissions, or severance.
  2. An IRS notice specifying the maximum withholding allowances an employee may claim.
  3. Income tax withholding required on certain payments when the payee fails to provide a correct taxpayer identification number.
  4. Law requiring self-employed individuals to pay both the employer and employee portions of Social Security and Medicare taxes.
  5. An individual who meets residency tests and is taxed similarly to U.S. citizens.
  6. Federal hospital insurance program funded through the Medicare portion of FICA.
  7. Federal income tax withheld from employee wages.
  8. State income tax withheld from employee wages.
  9. The combined Social Security and Medicare taxes imposed on employees and employers.
  10. A method for determining federal income tax withholding using wage range tables.
  11. The employee’s withholding certificate used to determine federal income tax withholding amounts.
  12. A 0.9 percent tax withheld from employee wages exceeding the annual threshold.
  13. An SSA online service that allows employers to verify employee names and Social Security numbers.
  14. The Social Security portion of FICA providing retirement, survivor, and disability benefits.
  15. An individual who does not meet U.S. residency tests and is taxed only on U.S.-source income.
  16. A federal or state form completed by an employee to indicate withholding adjustments.
  17. Government employees subject only to the Medicare portion of FICA.
Down
  1. One related corporation designated to pay employees working for multiple related entities for FICA and FUTA purposes.
  2. The process of deducting taxes from employee wages for payment to tax authorities.
  3. A method for calculating federal income tax withholding using tax rate tables and wage amounts.
  4. A state or local governmental unit or political subdivision that employs workers.
  5. Federal law establishing a retirement system for railroad employees similar to Social Security.
  6. An IRS rule that considers wages paid when the employee has access to them without substantial limitations or restrictions.
  7. A code received through SSN verification indicating whether the SSN holder is deceased.
  8. Corporations with common ownership that may be treated as a single employer for certain tax purposes.
  9. Federal income tax withheld from employee wages when paid.
  10. The maximum amount of wages subject to Social Security or unemployment taxes.
  11. The Old Age, Survivors, and Disability Insurance component of FICA.
  12. A fixed percentage withholding method applied to supplemental wages under certain conditions.
  13. Agreements between states allowing employees to pay income tax only to their state of residence.
  14. An individual’s taxpayer identification number issued by the Social Security Administration consisting of nine digits.
  15. A tax reporting identification number issued to individuals who are not eligible for a Social Security number.
  16. The hospital insurance portion of Medicare taxes.
  17. A federal tax credit available to eligible low-income employees that may be claimed when filing a tax return.
  18. A taxpayer identification number such as a Social Security number or employer identification number.

35 Clues: State income tax withheld from employee wages.Federal income tax withheld from employee wages.The hospital insurance portion of Medicare taxes.Federal income tax withheld from employee wages when paid.Government employees subject only to the Medicare portion of FICA.The Old Age, Survivors, and Disability Insurance component of FICA....

cybersecurity Puzzle-Enrique 2023-08-22

cybersecurity Puzzle-Enrique crossword puzzle
Across
  1. prevents unauthorized changes
  2. scrambling data
  3. UI redress attack
  4. false perception of reality
  5. disguised attacks
  6. fools users into providing sensitive information
  7. personal laptop, smart phones, ect
Down
  1. online harassment
  2. virtual private network
  3. locks users out until they pay
  4. short for malicious software
  5. prevents unauthorized access
  6. transmits information without user knowing
  7. codes that protect data
  8. carry out cyber attacks on other systems

15 Clues: scrambling dataonline harassmentUI redress attackdisguised attacksvirtual private networkcodes that protect datafalse perception of realityshort for malicious softwareprevents unauthorized accessprevents unauthorized changeslocks users out until they paypersonal laptop, smart phones, ectcarry out cyber attacks on other systems...

Cryptober Puzzle #1 2020-09-30

Cryptober Puzzle #1 crossword puzzle
Across
  1. The means of proving identity using two authentication factors
  2. Any weakness in an asset or security protection which would allow for a threat to cause harm
  3. The act of falsifying the identity of the source of a communication or interaction
  4. A means of security evaluation where automated tools and manual exploitations are performed by security and attack experts
  5. Program designed to detect and remove computer viruses
  6. A social engineering attack that attempts to collect information from victims
Down
  1. The process of proving an individual is a claimed identity
  2. A means of isolating applications, code or entire operating systems in order to perform testing or evaluation.
  3. The number one spot in the OWASP 10
  4. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system
  5. A security tool that attempts to detect the presence of intruders or the occurrence of security violations
  6. A place where websites can store local data on a client machine
  7. The act of collecting frames or packets off of a data network communication
  8. An update or change on an operating system or application
  9. An error or mistake in software coding or hardware design or construction
  10. Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard

16 Clues: The number one spot in the OWASP 10Program designed to detect and remove computer virusesAn update or change on an operating system or applicationThe process of proving an individual is a claimed identityThe means of proving identity using two authentication factorsA place where websites can store local data on a client machine...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Security Terms 2022-11-17

Security Terms crossword puzzle
Across
  1. Malicious computer code that reproduces itself on a computer
  2. Publicly released software security update to repair a vulnerability
  3. Malware preventing devices from properly operating until a fee is paid
  4. Hardware or software designed to limit spread of malware
  5. General term used to describe software that spies on users by gathering information without consent
  6. Software code that gives access to a program that circumvents normal security protections
Down
  1. Software that helps prevent computers from becoming infected by spyware
  2. Database of viruses used to identify infected files
  3. Logical computer network of zombies under control of an attacker
  4. Computer code that is dormant until it is triggered by a specific logical event
  5. Attacker who controls a botnet
  6. Software that is a cumulative package of all patches and feature updates
  7. Security program that delivers advertising content in a way that is unexpected and unwanted
  8. Infected computer under remote control of an attacker

14 Clues: Attacker who controls a botnetDatabase of viruses used to identify infected filesInfected computer under remote control of an attackerHardware or software designed to limit spread of malwareMalicious computer code that reproduces itself on a computerLogical computer network of zombies under control of an attacker...

USAJ Security 2022-03-30

USAJ Security crossword puzzle
Across
  1. Security training required
  2. Check that cargo
  3. Alternate AOSC
  4. Check your record
  5. The wand
  6. Need to know only
  7. Search procedure
Down
  1. On the glass
  2. USA Jet AOSC
  3. Aviation security regulator
  4. Broken wand (2 words)
  5. Fingerprint lady
  6. Tamper evidence
  7. Fingerprint lady, too

14 Clues: The wandOn the glassUSA Jet AOSCAlternate AOSCTamper evidenceCheck that cargoFingerprint ladySearch procedureCheck your recordNeed to know onlyBroken wand (2 words)Fingerprint lady, tooSecurity training requiredAviation security regulator

Security Awareness 2023-08-01

Security Awareness crossword puzzle
Across
  1. lax approach to policies and procedures, creating risks
  2. as a DoD employee, you are a _______
  3. when a blue light is blinking in an area, it means there is an ______ individual
  4. you are required to ______ suspicious behavior
  5. an adversary having the intent, capability, and opportunity to cause loss or damage
  6. anyone with access to classified information can become a _______ classifier
  7. lack of awareness of policies and procedures, creating risks
Down
  1. everyone's responsibility
  2. intentional acts, creating risks
  3. the practice of spying or of using spies, typically by governments to obtain political and military information
  4. a potential risk indicator for someone living above their means
  5. program access is based on ______ and material contribution
  6. report _______ travel at least 30 days in advance
  7. there is ______ a need to talk around classified outside a classified environment

14 Clues: everyone's responsibilityintentional acts, creating risksas a DoD employee, you are a _______you are required to ______ suspicious behaviorreport _______ travel at least 30 days in advancelax approach to policies and procedures, creating risksprogram access is based on ______ and material contribution...

information security 2023-08-29

information security crossword puzzle
Across
  1. Virus macros which have been programmed to carry out malicious intent
  2. gap or weakness which undermines an organization’s security efforts
  3. rights an individual or organization has over information and how it is used
  4. requirement of being private or secret
  5. intent of doing harm
  6. making sure a person is who they say they are
Down
  1. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain
  2. information or data which can be accessed when needed
  3. procedure used to determine user privileges or access levels to the system
  4. state of being complete or uncorrupted
  5. how information is protected
  6. network of computers and devices managed as a unit with the same procedures and rules
  7. to or damage sensitive information on a computer
  8. calculated assessment of potential threats to an organization’s security

14 Clues: intent of doing harmhow information is protectedstate of being complete or uncorruptedrequirement of being private or secretmaking sure a person is who they say they areto or damage sensitive information on a computerinformation or data which can be accessed when neededgap or weakness which undermines an organization’s security efforts...

FOOD SECURITY 2024-11-28

FOOD SECURITY crossword puzzle
Across
  1. - A prolonged period of abnormally low rainfall
  2. - The process of preserving food to prevent spoilage
  3. - A system for managing water resources for agricultural use
  4. - The buying and selling of agricultural products
  5. - A sudden increase in the price of food
  6. - A government program that provides food assistance to low-income individuals
  7. - The science of soil management and crop production
Down
  1. - The science of cultivating land, raising crops, and feeding livestock
  2. - The variety of plant and animal life in a particular habitat
  3. - The gradual warming of the Earth's climate
  4. - A system of farming that avoids synthetic fertilizers and pesticides
  5. - The movement of people or animals from one region to another
  6. - The process of adding nutrients to food to improve its nutritional content
  7. - A period of severe food scarcity

14 Clues: - A period of severe food scarcity- A sudden increase in the price of food- The gradual warming of the Earth's climate- A prolonged period of abnormally low rainfall- The buying and selling of agricultural products- The process of preserving food to prevent spoilage- The science of soil management and crop production...

DATA SECURITY 2025-10-22

DATA SECURITY crossword puzzle
Across
  1. A virtual barrier that keeps unauthorized users out of a computer network.
  2. A secret word or phrase that grants you access to an account or device.
  3. A small text file saved by a website to your computer that remembers information about you.
  4. Harmful software that can copy itself and spread to other computers, often deleting or damaging data.
  5. A set of rules for how you should behave and interact online.
  6. The record of everything you do and post online; it stays forever!
Down
  1. A type of software designed to damage, disable, or gain unauthorized access to a computer system.
  2. A crime where someone steals your personal information to pretend to be you.
  3. This type of software protects your computer from viruses and other malicious programs.
  4. The practice of protecting systems, networks, and data from digital attacks.
  5. A fake message, often an email, trying to trick you into giving away private information.
  6. A special way to scramble data so only authorized people can read it.
  7. The general term for information, like facts, statistics, or files.
  8. Using two different ways to prove you are who you say you are before logging in. (Abbreviation)

14 Clues: A set of rules for how you should behave and interact online.The record of everything you do and post online; it stays forever!The general term for information, like facts, statistics, or files.A special way to scramble data so only authorized people can read it.A secret word or phrase that grants you access to an account or device....

Financial Literacy Terms 2023-05-12

Financial Literacy Terms crossword puzzle
Across
  1. distribution of a companys earnings
  2. a company breaking up shares
  3. a financial advisor
  4. pooled money with investors
  5. a business varying its range
  6. stock that offers regular/steady income
  7. security that shows ownership in a company
  8. five year average sales growth above 15%
  9. share prices rising
Down
  1. differs from common stock
  2. profitability of a company
  3. selling an assest for MORE than your adjusted basis
  4. a bond that is a debt obligation
  5. stocks worth less than a dollar
  6. share prices falling
  7. annual income divided by price of security
  8. selling asset for LESS than adjusted basis
  9. earnings that are free of debt
  10. formal document required by and filed with the Securities and Exchange commision
  11. the value and investor earns from a security

20 Clues: a financial advisorshare prices risingshare prices fallingdiffers from common stockprofitability of a companypooled money with investorsa company breaking up sharesa business varying its rangeearnings that are free of debtstocks worth less than a dollara bond that is a debt obligationdistribution of a companys earnings...

otr 2014-05-12

otr crossword puzzle
Across
  1. ________ visit notifications must be passed 72 hours in advance of the proposed visit by Program Security.
  2. Do not ____________sensitive subjects on an unclassified phone line, in emails or via other types of unclassified communications.
  3. Program names and information cannot be listed on _______, websites or other personal documents.
  4. Accessed personnel should contact Program Security for instructions on the use of secure ______________ equipment.
  5. All ___________________must review and update their Personnel Security Prescreening Questionnaire (PSPQ) on an annual basis.
Down
  1. All _______ employees are required to report adverse information.
  2. Your __________ program security officer (CPSO) is your security liaison for specific programs.
  3. Report all _______ travel for business and personal reasons.
  4. ______________ is one type of a special program.
  5. Users must not share _________ with anyone.
  6. Security is __________ responsibility
  7. Refer to a program by its unclassified __________ (PID).

12 Clues: Security is __________ responsibilityUsers must not share _________ with anyone.______________ is one type of a special program.Refer to a program by its unclassified __________ (PID).Report all _______ travel for business and personal reasons.All _______ employees are required to report adverse information....

NETWORKING QUIZ 2025-05-17

NETWORKING QUIZ crossword puzzle
Across
  1. Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that sensitive information, like passwords or credit card details, remains private even if intercepted by malicious actors. Encryption is essential for securing data both at rest (stored data) and in transit (data being transmitted).
  2. A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps to prevent unauthorized access or attacks.
  3. terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats.
Down
  1. Private Network (VPN) A VPN is a technology that allows users to create a secure and encrypted connection over a less secure network, such as the internet. It enables remote users to access a private network securely, protecting data from being intercepted by unauthorized parties.
  2. Control Access control refers to the mechanisms used to regulate who or what can access a network or system, and under what conditions. This includes techniques like authentication (verifying the identity of users) and authorization (granting permission to access resources). Types of access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).
  3. Detection System (IDS: An IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. It alerts administrators to suspicious behavior, such as an unauthorized attempt to access the network, and can also provide real-time detection of potential security breaches.
  4. are five key terminologies used in performing network security:

7 Clues: are five key terminologies used in performing network security:terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats....

Test Your Knowledge 2023-11-08

Test Your Knowledge crossword puzzle
Across
  1. information that can be used to distinguish or trace an individual’s identity either directly or indirectly through linkages with other information
  2. individuals” who have access to classified information or hold a
  3. information would would cause "exceptionally grave damage to the national security" if there were an unauthorized release.
  4. a type of classification that is based on the classification of another source.
  5. establishes requirements for the protection of classified information disclosed to or developed by contractors, licensees, grantees, or certificate holders (hereinafter referred to as contractors) to prevent unauthorized disclosure.
  6. information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies but is not classified .
  7. and result in, or could be expected to result in, the loss or compromise of
  8. information
  9. security incidents that indicate knowing, willful, and negligence for security
  10. establishes standardized reporting requirements across the federal government for all
  11. the process by which we protect critical information whether it is classified or unclassified that can be used against us. It focuses on preventing our adversaries' access to information and actions that may compromise an operation.
Down
  1. a security incident involving failure to comply with requirements
  2. information that is determined to have the potential to cause danger to the national security with unauthorized release.
  3. or compromise of classified information
  4. cannot reasonably be expected to) and does not, result in the loss, suspected
  5. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  6. information that would, with unauthorized release, be expected to cause "serious" damage to the national security.
  7. a perceived threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
  8. position.

19 Clues: position.informationor compromise of classified informationindividuals” who have access to classified information or hold aa security incident involving failure to comply with requirementsand result in, or could be expected to result in, the loss or compromise ofcannot reasonably be expected to) and does not, result in the loss, suspected...

Voyager Update 2018 2018-11-20

Voyager Update 2018 crossword puzzle
Across
  1. basic hardware (computer) and software (operating system) on which software applications can be run.
  2. doing business that focuses on creating a positive experience for the customer
  3. analytics process of assessing/modeling data with the goal of discovering insights and support decision-making
  4. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  5. the action or process through which something is changed so much that it appears to be entirely new.
  6. Supporting clients make decisions that are right for them
  7. the ability for clients to perform service transactions themselves
  8. the conversion of text, pictures, or sound into a digital form that can be processed by a computer.
  9. make (something) simpler or easier to do or understand.
  10. lasting or valid for more than one year.
Down
  1. The use of many different pathways such as phone, email, and face to face to engage clients
  2. The capability of a system or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth
  3. taking steps to reduce adverse effects
  4. the lifelong connection between OPB and its clients
  5. with various parts or aspects linked or coordinated.
  6. an act of traveling from one place to another.
  7. the state or quality of being efficient.
  8. a thing that makes something better or is better than something else.it was before.
  9. creating an opportunity by causing something to happen rather than responding to it after it has happened.

19 Clues: taking steps to reduce adverse effectsthe state or quality of being efficient.lasting or valid for more than one year.an act of traveling from one place to another.the lifelong connection between OPB and its clientswith various parts or aspects linked or coordinated.make (something) simpler or easier to do or understand....

Disruptive Technology 2025-08-09

Disruptive Technology crossword puzzle
Across
  1. comprehensive approach that combines practices and technologies to protect applications and services from disruptions
  2. the development and use of technologies that minimize environmental impact while promoting social and economic benefits
  3. refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
  4. digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
Down
  1. cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
  2. the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
  3. distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
  4. Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks

8 Clues: Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networkscomprehensive approach that combines practices and technologies to protect applications and services from disruptionsthe development and use of technologies that minimize environmental impact while promoting social and economic benefits...

Domestic and International Airports (Nicoshia Toailoa/ Dublin ) 2017-09-10

Domestic and International Airports (Nicoshia Toailoa/ Dublin ) crossword puzzle
Across
  1. Is the 3 letter code for the Kapiti Coast
  2. A company located in check-in area which enables travellers to have their luggage sealed for protection
  3. Free facilities for transit passengers
  4. Home of the Worlds longest runway
  5. Auckland Airport will combine international and domestic _____ as early as 2019
  6. A facility used by those who wish to pray before a flight
  7. Acronym for Ministry of Agriculture and Forestry
  8. This has been dramatically increased after the September 11 2001 attack
  9. A word that you should not use in or around the Airport areas
  10. A small item that will be confiscated off you at security due to its risk of having the potential to self ignite
Down
  1. An official document issued by a government; certifies holders identity and citizenship
  2. You enter this area once you pass through passport control and Security at the Auckland International Airport
  3. Located landside, person travelling will need to present passport, ticket and luggage here
  4. An area accessible to everyone, including those who are not travelling
  5. A lounge at the Auckland Airport operated by Air New Zealand
  6. A form of transport available to take you between the 2 Auckland Airport terminals
  7. The official provider of aviation security services in New Zealand
  8. A machine in which a conveyer belt move items through in order to ensure security and safety
  9. A currency exchange company that can be found both landside and airside
  10. A place where airplanes arrive and take off

20 Clues: Home of the Worlds longest runwayFree facilities for transit passengersIs the 3 letter code for the Kapiti CoastA place where airplanes arrive and take offAcronym for Ministry of Agriculture and ForestryA facility used by those who wish to pray before a flightA lounge at the Auckland Airport operated by Air New Zealand...

Investing-Jacob Hawkins 2025-03-24

Investing-Jacob Hawkins crossword puzzle
Across
  1. total amount of money that you can put in an IRA per year ($)
  2. they type of risk tolerance you’ll most likely have if you do lump sum investing
  3. the year that social security was established
  4. social security and medicare taxes
  5. age to receive full social security benefits
  6. Warren Buffet is the CEO of this company
  7. should we look to celebrities for financial advice?
  8. this IRA’s contributions are made after taxes
  9. type of job that offers pension plans
  10. this thing sometimes contributes to your pension plan
  11. another type of job that offers a pension plan
  12. Warren Buffets number one rule of investment
  13. the age that you can take out the money from both types of IRA’s
Down
  1. the person your pension is managed by
  2. president who created social security in 1935
  3. this IRA’s contributions are made pre tax
  4. you contribute and sometimes the state contributes to this income source
  5. the year that you receive a little bonus to your social security plan
  6. at 67 you can get full benefits from this income source
  7. CEO of Berkshire Hathaway
  8. when a person stops working after reaching a certain age
  9. the type of fund that you should build before investing in Crypto
  10. the biggest financial fraud in U.S. history
  11. the thing that created and backs up Fiat Money
  12. the age you have to be to invest in Crypto

25 Clues: CEO of Berkshire Hathawaysocial security and medicare taxesthe person your pension is managed bytype of job that offers pension plansWarren Buffet is the CEO of this companythis IRA’s contributions are made pre taxthe age you have to be to invest in Cryptothe biggest financial fraud in U.S. historyage to receive full social security benefits...

Cyber Bullying 2016-12-05

Cyber Bullying crossword puzzle
Across
  1. A type of social media that utilizes images and pictures
  2. Someone that is famous and well known
  3. A nickname people use on social media to conceal their true identity
  4. Someone that lives abroad for purposes related to employment
  5. Degrade purposely to make someone feel bad
  6. Someone from another country other than your own
Down
  1. To attack or assault someone verbally or physically
  2. To have purposely started or initiated an action
  3. The process of taking advantage of someone weaker than yourself
  4. A false feeling of over confidence and self-importance
  5. To make someone seem evil or terrible
  6. A very precious metal

12 Clues: A very precious metalSomeone that is famous and well knownTo make someone seem evil or terribleDegrade purposely to make someone feel badTo have purposely started or initiated an actionSomeone from another country other than your ownTo attack or assault someone verbally or physicallyA false feeling of over confidence and self-importance...

Cyber Defences 2021-09-22

Cyber Defences crossword puzzle
Across
  1. Should be strong and have MFA
  2. Protects against viruses and worms
  3. This will protect a device/networks ports
  4. This is used to attract cyber attacks
  5. Used to record activity and find source of intrusions
  6. What to do to USB ports to prevent data exfiltration
  7. An update with a fix for a vulnerability
Down
  1. Can give false positives that distract administrator (acronym)
  2. These should be restricted to prevent users from having more access than required
  3. Teaches staff how to prevent falling for phishing scams
  4. Makes data unreadable
  5. Best defence against ransomware

12 Clues: Makes data unreadableShould be strong and have MFABest defence against ransomwareProtects against viruses and wormsThis is used to attract cyber attacksAn update with a fix for a vulnerabilityThis will protect a device/networks portsWhat to do to USB ports to prevent data exfiltrationUsed to record activity and find source of intrusions...

cyber bulling 2022-01-03

cyber bulling crossword puzzle
Across
  1. A digital place where you can find information
  2. A mental disorder that causes the feeling of sadness and lost of intrest
  3. What people feel when others post offending things about them
  4. Irrelevant or inappropriate messages sent online
  5. A secret word or phrase
  6. Fun and distracting way to spend your times
Down
  1. Secure
  2. A technology that was invented by Alexander Bell
  3. Exprssing an opinion on the web
  4. Belonging to or for the use of one particular person or group of people only
  5. Share pictures or tweets with the world
  6. Informal conversation

12 Clues: SecureInformal conversationA secret word or phraseExprssing an opinion on the webShare pictures or tweets with the worldFun and distracting way to spend your timesA digital place where you can find informationA technology that was invented by Alexander BellIrrelevant or inappropriate messages sent online...

cyber bullying 2019-07-11

cyber bullying crossword puzzle
Across
  1. in your mind
  2. someone who teaches people
  3. when you want to kill yourself
  4. when people don't know who you are
  5. when you aren't in danger
  6. by your self
Down
  1. someone who enforces law
  2. someone who is mean for a long amount of time
  3. when you are very sad
  4. when you are the person who gets bullied
  5. something you play
  6. playing with other people

12 Clues: in your mindby your selfsomething you playwhen you are very sadsomeone who enforces lawplaying with other peoplewhen you aren't in dangersomeone who teaches peoplewhen you want to kill yourselfwhen people don't know who you arewhen you are the person who gets bulliedsomeone who is mean for a long amount of time

CYBER SAFETY 2020-10-24

CYBER SAFETY crossword puzzle
Across
  1. bbbb
  2. rrrrrrrrrrrrrr
  3. gggg
  4. ffffffffffffff
  5. ffffffffff
  6. The act of presenting someone else'es work
Down
  1. ttttt
  2. ffffffffffffffff
  3. dddddddddd
  4. ffffffffff
  5. hhhhhhhhhhhhh
  6. ffff
  7. fffffffffff

13 Clues: bbbbggggfffftttttddddddddddfffffffffffffffffffffffffffffffhhhhhhhhhhhhhrrrrrrrrrrrrrrffffffffffffffffffffffffffffffThe act of presenting someone else'es work

Cyber Ally 2023-02-01

Cyber Ally crossword puzzle
Across
  1. Someone who stands up for another person
  2. What an ally spreads online
  3. Where can cyberbullying occur
  4. Where can cyberbullying occur
  5. Intentionally hurting someone over a period of time with a power imbalance
  6. Where can cyberbullying occur
  7. What to do before putting something online
  8. What to do if you/someone else is cyberbullied
Down
  1. An app that you can anonymously report bullying
  2. Trying to get someone OUT of trouble
  3. Someone who stands and watches bullying
  4. Just trying to get someone in trouble
  5. A negative effect of cyburbullying
  6. What to do if you are cyberbullied

14 Clues: What an ally spreads onlineWhere can cyberbullying occurWhere can cyberbullying occurWhere can cyberbullying occurA negative effect of cyburbullyingWhat to do if you are cyberbulliedTrying to get someone OUT of troubleJust trying to get someone in troubleSomeone who stands and watches bullyingSomeone who stands up for another person...

Cyber Crossword 2023-05-22

Cyber Crossword crossword puzzle
Across
  1. some free thing can give you -------
  2. using vulgar language is called -------
  3. people stealing your id
  4. don't add people you don't know
  5. you should not tell people where you live in ----------
Down
  1. means someone bullying another person on a device
  2. Swearing or saying mean things
  3. don't share your login
  4. people stealing your work
  5. don't tell people your ----
  6. if you share -------- online people can find your location
  7. stay safe while you are ------

12 Clues: don't share your loginpeople stealing your idpeople stealing your workdon't tell people your ----Swearing or saying mean thingsstay safe while you are ------don't add people you don't knowsome free thing can give you -------using vulgar language is called -------means someone bullying another person on a device...

Cyber Gym 2024-11-20

Cyber Gym crossword puzzle
Across
  1. Don't act in a ......
  2. Be ...... of obvious errors
  3. Using phone calls to deceive victims into providing sensitive information
  4. Withdrawals from their ...... account
  5. Computer scam to obtain confidential data like passwords, codes, pins, credit card numbers from the victim
  6. Don't ...... or open suspicious emails
Down
  1. ...... can be committed at the expense of the victim
  2. Similar to spear phishing but aimed at high-profile targets like CEOs or CFOs
  3. Legit email received
  4. The scammer's ultimate goal is to extort ...... or even steal the victim's identity
  5. Check the ...... email address
  6. Don't trust ...... emails

12 Clues: Legit email receivedDon't act in a ......Don't trust ...... emailsBe ...... of obvious errorsCheck the ...... email addressWithdrawals from their ...... accountDon't ...... or open suspicious emails...... can be committed at the expense of the victimUsing phone calls to deceive victims into providing sensitive information...

Cyber ethics 2025-05-29

Cyber ethics crossword puzzle
Across
  1. Sea animals
  2. Large marsupial
  3. Has a trunk
  4. Fastest animal
  5. Eat love banna
  6. Slowest animal
Down
  1. Helps to travell
  2. Flying mammal
  3. Tallest animal
  4. Flying animal
  5. Likes to chase mice
  6. Man's best friend

12 Clues: Sea animalsHas a trunkFlying mammalFlying animalTallest animalFastest animalEat love bannaSlowest animalLarge marsupialHelps to travellMan's best friendLikes to chase mice

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk of email that comes from a
  2. It refers to being aware of the ethical practices.
  3. It is a legal right granted by law to the creator for his
  4. PIRACY: when a software is copied and distributed illegally, it is
  5. work.
  6. sources.
Down
  1. It refers to the act of using or imitating the language
  2. FOOTPRINT: It is an impression or information about a person that exists
  3. the internet because of his online activity.
  4. It refers to an illegal intrusion into a computer system
  5. It is the process of transforming data into an unreadable code.
  6. thoughts of another person as one's original work.

12 Clues: work.sources.the internet because of his online activity.It refers to being aware of the ethical practices.thoughts of another person as one's original work.It refers to unwanted bulk of email that comes from aIt refers to the act of using or imitating the languageIt refers to an illegal intrusion into a computer system...

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk of email that comes from a
  2. It refers to being aware of the ethical practices.
  3. It is a legal right granted by law to the creator for his
  4. PIRACY: when a software is copied and distributed illegally, it is
  5. work.
  6. sources.
Down
  1. It refers to the act of using or imitating the language
  2. FOOTPRINT: It is an impression or information about a person that exists
  3. the internet because of his online activity.
  4. It refers to an illegal intrusion into a computer system
  5. It is the process of transforming data into an unreadable code.
  6. thoughts of another person as one's original work.

12 Clues: work.sources.the internet because of his online activity.It refers to being aware of the ethical practices.thoughts of another person as one's original work.It refers to unwanted bulk of email that comes from aIt refers to the act of using or imitating the languageIt refers to an illegal intrusion into a computer system...

Monetary Policy 2025-01-14

Monetary Policy crossword puzzle
Across
  1. Lowers the discount rate
  2. Which leads to an increase in _____ Supply
  3. If the FED buys a security, this will lead to a _____ in money supply
  4. If someone deposits money into the bank from _______ a government security it will give the bank the ability to issue more loans.
  5. If the FED sells a security, this will cause for a ____ number of jobs
  6. and can make fewer ______
  7. Bankers shy away from the higher ______rates and take out fewer loans.
  8. An increase in production happens when the FED _____ a security
  9. When banks give the FED money it causes the bank to have less money on ______
Down
  1. and lower _____ rates
  2. The _____________ system is able to increase or decrease the amount of money in circulation by buying or selling government
  3. or by changing the discount rate
  4. A slowdown in production happens when the FED _____ a security
  5. Member banks take advantage of the lower rate and _______more money.
  6. a set of actions to control a nation's overall money supply, and achieve economicgrowth

15 Clues: and lower _____ ratesLowers the discount rateand can make fewer ______or by changing the discount rateWhich leads to an increase in _____ SupplyA slowdown in production happens when the FED _____ a securityAn increase in production happens when the FED _____ a securityMember banks take advantage of the lower rate and _______more money....

Crossword 08 2023-10-25

Crossword 08 crossword puzzle
Across
  1. refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
  2. refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring;
  3. Pornography refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
  4. refers to gathering and receiving information;
  5. Authority refers to the DOJ – Office of Cybercrime;
  6. Authority refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be;
  7. data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
  8. Data refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic data.
  9. refers to a computer or a computer network, the electronic medium in which online communication takes place;
  10. refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
  11. refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
  12. value refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
Down
  1. refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
  2. system refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media
  3. infrastructure refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
  4. refers to the modification or change, in form or substance, of an existing computer data or program;
  5. program refers to a set of instructions executed by the computer to achieve intended results;
  6. refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet;
  7. refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
  8. refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network;

20 Clues: refers to gathering and receiving information;Authority refers to the DOJ – Office of Cybercrime;program refers to a set of instructions executed by the computer to achieve intended results;refers to the modification or change, in form or substance, of an existing computer data or program;...

Domestic and International Airports 2017-09-10

Domestic and International Airports crossword puzzle
Across
  1. Is the 3 letter code for the Kapiti Coast
  2. Acronym for Ministry of Agriculture and Forestry
  3. This has been dramatically increased after the September 11 2001 attack
  4. A lounge at the Auckland Airport operated by Air New Zealand
  5. An area accessible to everyone, including those who are not travelling
  6. The official provider of aviation security services in New Zealand
  7. You enter this area once you pass through passport control and Security at the Auckland International Airport
  8. Free facilities for transit passengers
  9. A small item that will be confiscated off you at security due to its risk of having the potential to self ignite
Down
  1. An official document issued by a government; certifies holders identity and citizenship
  2. A company located in check-in area which enables travellers to have their luggage sealed for protection
  3. Located landside, person travelling will need to present passport, ticket and luggage here
  4. Auckland Airport will combine international and domestic _____ as early as 2019
  5. A currency exchange company that can be found both landside and airside
  6. A machine in which a conveyer belt move items through in order to ensure security and safety
  7. A place where airplanes arrive and take off
  8. Home of the Worlds longest runway
  9. A form of transport available to take you between the 2 Auckland Airport terminals
  10. A word that you should not use in or around the Airport areas
  11. A facility used by those who wish to pray before a flight

20 Clues: Home of the Worlds longest runwayFree facilities for transit passengersIs the 3 letter code for the Kapiti CoastA place where airplanes arrive and take offAcronym for Ministry of Agriculture and ForestryA facility used by those who wish to pray before a flightA lounge at the Auckland Airport operated by Air New Zealand...

Bullying - jayden 2023-03-21

Bullying - jayden crossword puzzle
Across
  1. online bullying
  2. physical touch
  3. does the bullying
  4. gets bullied
  5. name calling
Down
  1. intimidates the victim
  2. title
  3. witnesses bullying

8 Clues: titlegets bulliedname callingphysical touchonline bullyingdoes the bullyingwitnesses bullyingintimidates the victim

Alliance Holiday Puzzle 2021-12-07

Alliance Holiday Puzzle crossword puzzle
Across
  1. Dog made famous in the Grinch
  2. One division of Alliance
  3. Covers your ears on a cold day, pom-pom optional
  4. Treat left behind for Santa
  5. Tree Glitter
  6. Winter drink served with marshmallows
  7. role on the Security side of Alliance
  8. Treats left for Rudolph
  9. One of the reindeer; not Rudolph
  10. role on the Communications side of Alliance
  11. Green character from Whoville
  12. Frosty was made of this
  13. A celebration for the rest of us, from Seinfeld
Down
  1. Catch Santa on a security one
  2. gifts go under this
  3. One division of Alliance
  4. Charles ________, author of "A Christmas Carol"
  5. Chocolate countdown to December 24th
  6. used for Hanukkah celebration
  7. decorations for your tree
  8. December drink with a love/hate reputation
  9. Another word for sled
  10. Covers your hands on the cold days
  11. something that is left out for Santa

24 Clues: Tree Glittergifts go under thisAnother word for sledTreats left for RudolphFrosty was made of thisOne division of AllianceOne division of Alliancedecorations for your treeTreat left behind for SantaCatch Santa on a security oneDog made famous in the Grinchused for Hanukkah celebrationGreen character from WhovilleOne of the reindeer; not Rudolph...

Investing-David V 2025-03-27

Investing-David V crossword puzzle
Across
  1. currencies backed up by government
  2. age to get social security
  3. good for people with low risk tolerance
  4. managed by employer
  5. never forget rule one
  6. age to invest in crypto
  7. rising stocks
  8. transfer funds to different plan
  9. funds saved only for emergencies
  10. contributions made post tax
Down
  1. president that created social security
  2. government health care plan
  3. social security Medicare tax
  4. at age 67 you get these full benefits
  5. CEO of Berkshire Hathaway
  6. the ceo of this is warren buffet
  7. falling stocks
  8. company requiring you to work a certain amount of time
  9. an example of a job that is government based
  10. a sum of money available for a particular purpose
  11. virtual currency
  12. system of recording info so it can’t get hacked

22 Clues: rising stocksfalling stocksvirtual currencymanaged by employernever forget rule oneage to invest in cryptoCEO of Berkshire Hathawayage to get social securitygovernment health care plancontributions made post taxsocial security Medicare taxthe ceo of this is warren buffettransfer funds to different planfunds saved only for emergencies...

Operating Systems and Security 2025-09-23

Operating Systems and Security crossword puzzle
Across
  1. - Google's mobile operating system used on smartphones, tablets, and wearable devices.
  2. - To convert information into a code to prevent unauthorized access.
  3. - Security vulnerability that prompts software companies to release emergency updates.
  4. - System privilege that should only be granted to employees who require it.
  5. - File system capability that tracks changes before execution to prevent data loss.
  6. - The method by which users communicate and control their computer system.
  7. - Microsoft's advanced file system that replaced the older FAT32 format for better performance
  8. - Social media account settings that should be set to private for better security.
  9. - Personal verification process needed before accepting social media friend requests.
Down
  1. - File identifiers like .jpg or .docx that indicate the file type and format. FIRMWARE - Software that directly controls specific hardware devices connected to a computer system
  2. - Internet software that should prioritize security features over convenience.
  3. - System resource that the operating system must efficiently allocate to running programs.
  4. - File system feature that reduces storage space but increases file opening time.
  5. - Software program that may request excessive permissions to access personal data.
  6. - Digital service that stores instant messages on their servers permanently.
  7. - Computer environment that requires hard drive encryption and screen locking for security.
  8. - Data collection practice that privacy-focused search engines avoid doing.
  9. - A secret combination of characters used to authenticate a user’s identity.
  10. - Internet software that should prioritize security features over convenience.
  11. - Small data files stored by websites to remember user preferences and track activity.
  12. - Security feature that only allows approved websites and applications to run.

21 Clues: - To convert information into a code to prevent unauthorized access.- The method by which users communicate and control their computer system.- System privilege that should only be granted to employees who require it.- Data collection practice that privacy-focused search engines avoid doing....

CPSC 4240 - Linux Security 2026-03-30

CPSC 4240 - Linux Security crossword puzzle
Across
  1. front-facing software vulnerable to malicious actors
  2. hiding data in a large media file
  3. system in which data is written to a file instead of being written directly to the file system to minimize the chance of file corruption
  4. a software update meant to fix security issues
  5. value used in hashing to reduce collisions
  6. data about file data
  7. malware that affected an Iranian nuclear power facility in 2010
  8. a large kernel that runs all its modules in kernel space
  9. a user with elevated privileges within the system
  10. one of the greatest and most unpredictable treats to a network system
  11. essential to have in case of system failure, damage, sabotage, etc.
  12. defense in _____: having multiple layers of security
Down
  1. command to safely detach an external file system
  2. automated test used to verify human users and detect bots
  3. security measure meant to filter network traffic
  4. security that is inconspicuous
  5. using an algorithm and key to hide data from outside parties
  6. authentication methods such as fingerprints, iris scans, and face recognition
  7. command used to safely edit the etc/sudoers file
  8. file containing usernames and hashes of their passwords
  9. devices that can be attached or removed without rebooting the system
  10. not telling malicious actors what kinds of security measures are in place
  11. value used to determine the permissions of a newly-created file or directory
  12. data structure that contains information about a file or directory, including the location of its contents

24 Clues: data about file datasecurity that is inconspicuoushiding data in a large media filevalue used in hashing to reduce collisionsa software update meant to fix security issuescommand to safely detach an external file systemsecurity measure meant to filter network trafficcommand used to safely edit the etc/sudoers file...

A+ 2025-02-11

A+ crossword puzzle
Across
  1. A common method for securing Wi-Fi networks.
  2. A software used to detect and remove malware.
  3. A Windows utility that displays real-time network usage.
  4. A Windows command used to format a disk.
  5. A network protocol used to automatically assign IP addresses.
  6. A form of authentication that uses fingerprints or facial recognition.
  7. A Windows component used to view system performance and logs.
  8. A tool for managing group policies in Windows.
  9. A network security system that monitors and filters incoming/outgoing traffic.
Down
  1. A security method that removes unnecessary user privileges.
  2. A security setting requiring a user to change their password after a period.
  3. A Linux command used to move files.
  4. A security setting that locks a user account after too many failed logins.
  5. A bootable Windows environment used for troubleshooting.
  6. A process that translates domain names into IP addresses.
  7. A Linux command used to change file permissions.
  8. A Windows command used to display active network connections.
  9. A Linux command used to list directory contents.

18 Clues: A Linux command used to move files.A Windows command used to format a disk.A common method for securing Wi-Fi networks.A software used to detect and remove malware.A tool for managing group policies in Windows.A Linux command used to change file permissions.A Linux command used to list directory contents....

La seguridad y los accidentes 2023-02-21

La seguridad y los accidentes crossword puzzle
Across
  1. security measures
  2. insurance
  3. to land
  4. accident
  5. traffic jam
  6. notice;warning
  7. customs agent
  8. dangerous
Down
  1. safety;security
  2. prohibited
  3. seatbelt
  4. to reduce
  5. to take off
  6. to fasten seatbelt

14 Clues: to landseatbeltaccidentinsuranceto reducedangerousprohibitedto take offtraffic jamcustoms agentnotice;warningsafety;securitysecurity measuresto fasten seatbelt

Cyber Manners 2017-09-20

Cyber Manners crossword puzzle
Across
  1. a person who commits a crime
  2. to say unkind things about somebody
  3. to make somebody feel stupid and ashamed
  4. falsh
  5. a synonym for puberty or the period between childhood and adulthood
  6. when you do not know a person's name
Down
  1. making you feel serious and think carefully
  2. to be sent permanently away from an institution, for instance school
  3. not being allowed to attend a certain school (noun)
  4. when you cannot find out where something comes from
  5. to make fun of in an unfriendly way
  6. causing someone to feel offended

12 Clues: falsha person who commits a crimecausing someone to feel offendedto say unkind things about somebodyto make fun of in an unfriendly waywhen you do not know a person's nameto make somebody feel stupid and ashamedmaking you feel serious and think carefullynot being allowed to attend a certain school (noun)...

Cyber Manners 2017-09-20

Cyber Manners crossword puzzle
Across
  1. to say unkind Things about somebody
  2. a person WHO commits a crime
  3. causing someone to feel offended
  4. to force somebody to leave school
  5. to make somebody feel ashamed and stupid
  6. making you feel serious and think carefully
Down
  1. puberty, or the period between childhood and adulthood
  2. when you cannot find out where somthing comes from
  3. not being allowed to attend school
  4. when you do not know a person's name
  5. false
  6. to make fun of somebody in an unfriendly way

12 Clues: falsea person WHO commits a crimecausing someone to feel offendedto force somebody to leave schoolnot being allowed to attend schoolto say unkind Things about somebodywhen you do not know a person's nameto make somebody feel ashamed and stupidmaking you feel serious and think carefullyto make fun of somebody in an unfriendly way...

cyber bullying 2024-04-23

cyber bullying crossword puzzle
Across
  1. The act of intentionally excluding or isolating someone from an online group or community
  2. Pretending to be someone else online in order to harass or deceive them
  3. FOOTPRINT A digital representation of a person's online presence and activities
  4. The act of harassing, threatening, or embarrassing others online
  5. A type of online harassment that involves repeatedly sending unwanted messages
  6. The emotional or psychological harm caused by cyberbullying
  7. MEDIA An online platform or community where people can share and interact with content
  8. LITERACY The use of digital tools and resources to create and share content
  9. A false or misleading piece of information spread online, often to cause harm
Down
  1. A person who stands up against bullying and supports the victim
  2. The practice of protecting one's personal information and privacy online
  3. Sharing private or embarrassing information about someone online without their consent
  4. The practice of using electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
  5. A network of interconnected web pages, also known as the "World Wide Web"
  6. CITIZENSHIP The ability to use technology and the internet in a safe, responsible, and ethical manner

15 Clues: The emotional or psychological harm caused by cyberbullyingA person who stands up against bullying and supports the victimThe act of harassing, threatening, or embarrassing others onlinePretending to be someone else online in order to harass or deceive themThe practice of protecting one's personal information and privacy online...

Cyber travel 2024-06-20

Cyber travel crossword puzzle
Across
  1. this is a festival
  2. this is picnic
  3. this is trojan
  4. this is tourist
  5. this is cookie
Down
  1. this is camping
  2. this is pixel
  3. this is bluetooth
  4. this is a souvenir
  5. this is chatgpt
  6. this is email
  7. this is tiktok

12 Clues: this is pixelthis is emailthis is picnicthis is trojanthis is tiktokthis is cookiethis is campingthis is chatgptthis is touristthis is bluetooththis is a festivalthis is a souvenir

Cyber Safety 2023-09-14

Cyber Safety crossword puzzle
Across
  1. Malware that requires the victim to pay a ransom to access encrypted files.
  2. criminals who break into computer networks with malicious intent.
  3. two words creates and stores strong passwords
  4. sending, posting, or sharing negative, harmful, false, or mean content about someone else.
  5. two words. long (phrases or sentences) that mix capital and lowercase letters, numbers, and symbols
Down
  1. Malicious software
  2. The numeric address of a computer on the internet
  3. A Private Network that ensures your anonymity on the internet
  4. Which social media platform is a hackers’ favorite
  5. Software used to protect a computer from viruses
  6. Main component of a server
  7. unwanted email messages

12 Clues: Malicious softwareunwanted email messagesMain component of a servertwo words creates and stores strong passwordsSoftware used to protect a computer from virusesThe numeric address of a computer on the internetWhich social media platform is a hackers’ favoriteA Private Network that ensures your anonymity on the internet...

Cyber law 2023-08-23

Cyber law crossword puzzle
Across
  1. menggunggah
  2. kejahatan melalui dunia maya
  3. keamanan pribadi
  4. hak merk
  5. jauh
Down
  1. penyampaian informasi
  2. hak cipta/hak intelektual
  3. pencurian melalui internet
  4. pencemaran nama baik
  5. community
  6. penggabungan
  7. ruang/dunia maya

12 Clues: jauhhak merkcommunitymenggunggahpenggabungankeamanan pribadiruang/dunia mayapencemaran nama baikpenyampaian informasihak cipta/hak intelektualpencurian melalui internetkejahatan melalui dunia maya

cyber bullying 2021-05-06

cyber bullying crossword puzzle
Across
  1. the main people who do this
  2. someone repetitively picking on you
  3. a mental illness
  4. a way someone cyberbullies
  5. not right
  6. a way of death
Down
  1. :(
  2. by yourself
  3. an act of bullying
  4. it will be...
  5. being careful
  6. 000

12 Clues: :(000not rightby yourselfit will be...being carefula way of deatha mental illnessan act of bullyinga way someone cyberbulliesthe main people who do thissomeone repetitively picking on you

CYBER CROSSWORD 2021-09-02

CYBER CROSSWORD crossword puzzle
Across
  1. The process of converting analogue data into digital form.
  2. A global domain within the information environment consisting of the interdependent network of information systems.
  3. Act of sending unsolicited e-mails.
  4. The process of exploring and analyzing large blocks of information to glean meaningful patterns and trends.
  5. The worldwide network of economic activities enabled by information and Communications Technologies.
  6. The primary law in India dealing with Cybercrime and E-Commerce.
  7. The process of preventing unauthorized people from reading the data that is transmitted over your wireless network.
Down
  1. The use of information and communication technology in political and governance processes.
  2. A program that disrupts the normal functioning of your computer systems.
  3. The Adoption or increase in the use of digital or computer technology by an organization, industry etc.
  4. The programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
  5. A small text file created by a website that is stored in the user's computer for recognizing and keeping track of the user's preferences.

12 Clues: Act of sending unsolicited e-mails.The process of converting analogue data into digital form.The primary law in India dealing with Cybercrime and E-Commerce.A program that disrupts the normal functioning of your computer systems.The use of information and communication technology in political and governance processes....

Cyber Ethics 2025-06-14

Cyber Ethics crossword puzzle
Across
  1. – Using someone else's ideas or words as your own work
  2. – Unwanted bulk emails from unknown sources
  3. – Following internet manners and being respectful
  4. – Ethical use of computers, internet, and digital content
  5. – Legal rights over one’s creative work or inventions
  6. – Rules about right and wrong use of computers and internet
Down
  1. – Important thing to protect while using digital platforms
  2. – Illegal intrusion into a computer system or network
  3. – The online trail left by your internet activity
  4. – Moral principles that guide right or wrong actions online
  5. – Good behavior and manners while using the internet
  6. – Stealing software by copying it illegally
  7. – Something made or invented by a person
  8. – The right to control what personal data is shared online
  9. – Copying and sharing software without permission

15 Clues: – Something made or invented by a person– Unwanted bulk emails from unknown sources– Stealing software by copying it illegally– The online trail left by your internet activity– Following internet manners and being respectful– Copying and sharing software without permission– Good behavior and manners while using the internet...

Cyber terms 2022-02-10

Cyber terms crossword puzzle
Across
  1. passthrough for IPsec
  2. blocks the use of proxy servers
  3. blocks internet requests from unknown sources
  4. prevents a local computer from using a URL or IP address to gain access to the local server
Down
  1. Legacy firewall
  2. Point to Point
  3. blocks multicast
  4. blocks Java
  5. blocks ActiveX
  6. blocks cookies
  7. layer two tunnelling protocol pass through
  8. keeps port 113 from being scanned by devices

12 Clues: blocks JavaPoint to Pointblocks ActiveXblocks cookiesLegacy firewallblocks multicastpassthrough for IPsecblocks the use of proxy serverslayer two tunnelling protocol pass throughkeeps port 113 from being scanned by devicesblocks internet requests from unknown sources...

Cyber Crossword1 2022-07-18

Cyber Crossword1 crossword puzzle
Across
  1. Security Operations center
  2. login with a single ID
  3. The traid
  4. Making it inaccessible to users
  5. Hide the true meaning
  6. likely cause danger
  7. Flaw
Down
  1. Form of Malware
  2. Type of Social Engineering attack
  3. ISACA certification
  4. controls incoming and outcoming traffic
  5. software to harm or exploit any device

12 Clues: FlawThe traidForm of MalwareISACA certificationlikely cause dangerHide the true meaninglogin with a single IDSecurity Operations centerMaking it inaccessible to usersType of Social Engineering attacksoftware to harm or exploit any devicecontrols incoming and outcoming traffic

Cyber Awareness 2025-11-06

Cyber Awareness crossword puzzle
Across
  1. Attack that overwhelms a system with massive fake traffic.
  2. General term for malicious software.
  3. Login method requiring two forms of authentication.
  4. An update that fixes security vulnerabilities in software.
  5. Network security system that blocks unauthorized access.
  6. Software or hardware that records everything typed.
Down
  1. A network of compromised computers controlled remotely
  2. Unauthorized access to sensitive systems or data.
  3. A vulnerability that hackers exploit before it’s patched.
  4. A fake email scam designed to steal personal information.
  5. Self-replicating program that spreads without human help.
  6. Malware that locks files and demands payment.

12 Clues: General term for malicious software.Malware that locks files and demands payment.Unauthorized access to sensitive systems or data.Login method requiring two forms of authentication.Software or hardware that records everything typed.A network of compromised computers controlled remotelyNetwork security system that blocks unauthorized access....

Cyber Ethics 2025-05-23

Cyber Ethics crossword puzzle
Across
  1. Fully connected topology
  2. Wireless Network
  3. Topology with backbone cable
  4. Illegal Intrusion in a computer via internet
  5. Responsible Behaviour
  6. wireless fidelity
  7. Legal right for original creator for his/her own work
Down
  1. Sender transform data into unreadable code
  2. All nodes are connected via a central device
  3. Network Within a city
  4. Connected devices in network
  5. Use single user software in multiple system
  6. Network across the world

13 Clues: Wireless Networkwireless fidelityNetwork Within a cityResponsible BehaviourFully connected topologyNetwork across the worldConnected devices in networkTopology with backbone cableSender transform data into unreadable codeUse single user software in multiple systemAll nodes are connected via a central device...

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk of email that comes from a
  2. It refers to being aware of the ethical practices.
  3. It is a legal right granted by law to the creator for his
  4. PIRACY: when a software is copied and distributed illegally, it is
  5. work.
  6. sources.
Down
  1. It refers to the act of using or imitating the language
  2. FOOTPRINT: It is an impression or information about a person that exists
  3. the internet because of his online activity.
  4. It refers to an illegal intrusion into a computer system
  5. It is the process of transforming data into an unreadable code.
  6. thoughts of another person as one's original work.

12 Clues: work.sources.the internet because of his online activity.It refers to being aware of the ethical practices.thoughts of another person as one's original work.It refers to unwanted bulk of email that comes from aIt refers to the act of using or imitating the languageIt refers to an illegal intrusion into a computer system...

Cyber Ethics 2025-06-07

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk of email that comes from a
  2. It refers to being aware of the ethical practices.
  3. It is a legal right granted by law to the creator for his
  4. PIRACY: When a software is copied and distributed illegally, it is
  5. work.
  6. sources.
Down
  1. It refers to the act of using or imitating the language
  2. FOOTPRINT: It is an impression or information about a person that exists
  3. the internet because of his online activity.
  4. It refers to an illegal intrusion into a computer system
  5. It is the process of transforming data into an unreadable code.
  6. thoughts of another person as one's original work.

12 Clues: work.sources.the internet because of his online activity.It refers to being aware of the ethical practices.thoughts of another person as one's original work.It refers to unwanted bulk of email that comes from aIt refers to the act of using or imitating the languageIt refers to an illegal intrusion into a computer system...

Security Service Management 2023-11-30

Security Service Management crossword puzzle
Across
  1. This system requires lesser manpower and is more efficient.
  2. Hospital security systems are implemented through ________ deployment and electronic security.
  3. _________ system is the most common electronic security system used in hospitals.
  4. The areas of focus of security service management in a hospital are properties of the hospital and patients, _______ and the hospital fixtures.
  5. The space where all activities in a hospital are observed.
Down
  1. Security personnel to be deployed undergo _______ prior to recruitment.
  2. The security cameras must be enabled with the provision of _________ at all times.
  3. This system is installed to prevent any breach of security of fiddling.
  4. The _________ team would make rounds at different areas of the hospital.
  5. The electronic security system uses ______ for surveillance and monitoring purposes.

10 Clues: The space where all activities in a hospital are observed.This system requires lesser manpower and is more efficient.Security personnel to be deployed undergo _______ prior to recruitment.This system is installed to prevent any breach of security of fiddling.The _________ team would make rounds at different areas of the hospital....

Angryword 2021-09-06

Angryword crossword puzzle
Across
  1. cyber attack leg joint
  2. return to multiple boiled porks
  3. 1000 year card game
  4. lots of males look
  5. ale maker road
  6. Dutch car stop
  7. Ash's friend healthy green space
  8. west country gaff
Down
  1. cover up postpone
  2. knighthood five scientific suffix
  3. aircraft tilt position to left or right
  4. red cheese rectangle
  5. bacon country mound
  6. alcohol processor 8 ball game road
  7. broken glass

15 Clues: broken glassale maker roadDutch car stopcover up postponewest country gafflots of males look1000 year card gamebacon country moundred cheese rectanglecyber attack leg jointreturn to multiple boiled porksAsh's friend healthy green spaceknighthood five scientific suffixalcohol processor 8 ball game roadaircraft tilt position to left or right

Law Enforcement in TV 2023-10-20

Law Enforcement in TV crossword puzzle
Across
  1. Starring Larry Wilcox and Erik Estrada
  2. Dr. Reid works for this FBI unit (abbreviation)
  3. Reality, famous theme song
  4. Brennan & Booth
  5. Famous gavel noise
  6. Springfield's police chief
  7. 21 Jump ____
  8. Cagney & _____
Down
  1. Knight Rider's artificially intelligent car
  2. "Just one more thing..."
  3. Stylish 80s series
  4. Miami, NY, Cyber
  5. Chicago Med, Fire, and _____
  6. Nine-Nine, stars Andy Samburg
  7. Recently reached 20th season on CBS

15 Clues: 21 Jump ____Cagney & _____Brennan & BoothMiami, NY, CyberStylish 80s seriesFamous gavel noise"Just one more thing..."Reality, famous theme songSpringfield's police chiefChicago Med, Fire, and _____Nine-Nine, stars Andy SamburgRecently reached 20th season on CBSStarring Larry Wilcox and Erik EstradaKnight Rider's artificially intelligent car...

Cybersecurity Month 2025-10-03

Cybersecurity Month crossword puzzle
Across
  1. Unauthorized access to data
  2. Network security barrier
  3. Software update to fix vulnerabilities
  4. Fraudulent attempt to get personal information
  5. Malicious software that demands payment
  6. Local tribal community hosting IT services
  7. Measures to protect information and systems
Down
  1. Name of the tribal nation
  2. IT support for users
  3. Extra layer of login security
  4. Software designed to damage or gain unauthorized access
  5. Secret code to access accounts
  6. Secure remote network connection
  7. Process of converting data to unreadable format
  8. Copy of data for recovery

15 Clues: IT support for usersNetwork security barrierName of the tribal nationCopy of data for recoveryUnauthorized access to dataExtra layer of login securitySecret code to access accountsSecure remote network connectionSoftware update to fix vulnerabilitiesMalicious software that demands paymentLocal tribal community hosting IT services...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Darragh cyber safety 2016-06-07

Darragh cyber safety crossword puzzle
Across
  1. people who help you get rid of the hackers
  2. thing that you can play video games
  3. things that are your special things
  4. big site where hackers can hack into things
  5. things are your personal things
  6. people sticking their heads in.
  7. ups adds that automatically appear on your device
  8. you need to be careful when doing this
Down
  1. people who will help you with bully's
  2. shutting down your device.
  3. someone who pretends to be nice but the
  4. safety things
  5. a device that you can go on line
  6. to get something on your
  7. someone who tries to be mean on line
  8. a thing that allows someone to speak to you
  9. word or numbers that allows you to go on to a device
  10. people who are getting rid of your things on line.
  11. things that everyone can see

19 Clues: safety thingsto get something on yourshutting down your device.things that everyone can seethings are your personal thingspeople sticking their heads in.a device that you can go on linething that you can play video gamesthings that are your special thingssomeone who tries to be mean on linepeople who will help you with bully's...

The Cyber Gridlock 2026-01-15

The Cyber Gridlock crossword puzzle
Across
  1. I fail once and many may feet it
  2. I look real, I sound real but i am not real
  3. Password go in, Scrambled digits come out
  4. Your files still exist, but you can't touch them unless you pay me
  5. I answer without understanding, yet sound like I do
  6. I wake the system up before it can do anything
  7. Letting code play without letting it break anything
  8. A tool that conceals malicious activity at the core level
Down
  1. James Bond espionage but with WiFi
  2. Every key you press tells me a secret
  3. I am strongest when I make no sense
  4. Flaw exploited before anyone knows
  5. I make you pay the electricity bill while i earn the coins
  6. I am software, but I like Hardware
  7. I understand only Zeros and ones, yet do everything
  8. silent zombies working together for cyber attack
  9. Delay before data begins to transfer
  10. Inbox filler no one asked for
  11. Two symbols endless meaning

19 Clues: Two symbols endless meaningInbox filler no one asked forI fail once and many may feet itJames Bond espionage but with WiFiFlaw exploited before anyone knowsI am software, but I like HardwareI am strongest when I make no senseDelay before data begins to transferEvery key you press tells me a secretPassword go in, Scrambled digits come out...

Cybersecurity 2024-03-18

Cybersecurity crossword puzzle
Across
  1. stalking through web technology
  2. Process of confirming someone's identity
  3. Protection against potential harm
  4. Malware that can collect/transmit user data without the user's knowledge
  5. Malware designed to restrict access
  6. Illegal activity done on the internet
  7. Unlocking encrypted information
  8. free from public attention
  9. False claims to get private information
Down
  1. Network security monitors/controls incoming and outgoing traffic
  2. Security threat from within company
  3. hacker who is highly motivated by principles
  4. Information converted into secret form
  5. Someone who tries to gain access without authorization
  6. Software that delivers ads on your system
  7. Unwanted emails from unknown senders
  8. Bullying on the internet
  9. Gaining access an undocumented way
  10. Malicious software designed to infect
  11. File from website that stores your info
  12. collection of malware that spreads through computer

21 Clues: Bullying on the internetfree from public attentionstalking through web technologyUnlocking encrypted informationProtection against potential harmGaining access an undocumented waySecurity threat from within companyMalware designed to restrict accessUnwanted emails from unknown sendersIllegal activity done on the internet...

Investing-David 2025-03-25

Investing-David crossword puzzle
Across
  1. transfer funds to different plan
  2. age to get social security
  3. good for people with low risk tolerance
  4. currencies backed up by government
  5. company requiring you to work a certain amount of time
  6. at age 67 you get these full benefits
  7. an example of a job that is government based
  8. CEO of Berkshire Hathaway
  9. managed by employer
  10. age to invest in crypto
  11. rising stocks
Down
  1. government health care plan
  2. system of recording info so it can’t get hacked
  3. contributions made post tax
  4. the ceo of this is warren buffet
  5. virtual currency
  6. funds saved only for emergencies
  7. social security Medicare tax
  8. never forget rule one
  9. falling stocks
  10. a sum of money available for a particular purpose
  11. president that created social security

22 Clues: rising stocksfalling stocksvirtual currencymanaged by employernever forget rule oneage to invest in cryptoCEO of Berkshire Hathawayage to get social securitygovernment health care plancontributions made post taxsocial security Medicare taxtransfer funds to different planthe ceo of this is warren buffetfunds saved only for emergencies...

Cybersecurity 2023-09-07

Cybersecurity crossword puzzle
Across
  1. a computer infection
  2. protects organizations on internet attacks
  3. locks databases
  4. gives a scammer access to your personal computer
  5. security for computers
  6. information
  7. faking
  8. to save something
Down
  1. deceive people into giving up their personal info
  2. ransomeware
  3. authentication method (2)
  4. to ensure protection
  5. worker
  6. when something isnt safe
  7. protecting information
  8. desktop
  9. authentication method
  10. scammers that impersonate a business
  11. when a virus spreads
  12. damages

20 Clues: workerfakingdesktopdamagesransomewareinformationlocks databasesto save somethinga computer infectionto ensure protectionwhen a virus spreadsauthentication methodprotecting informationsecurity for computerswhen something isnt safeauthentication method (2)scammers that impersonate a businessprotects organizations on internet attacks...

nin26 2024-07-03

nin26 crossword puzzle
Across
  1. Data transfer rate
  2. Unwanted email
  3. Clickable link
  4. Access code
  5. Saved URL
  6. Login name
  7. Data security
  8. Very large data unit
  9. Restart computer
  10. Processor speed
  11. Programming rules
  12. Data unit
Down
  1. Windows feature
  2. Network security
  3. Computer chip material
  4. Online scam
  5. Computational process
  6. Computer protection
  7. Onscreen pointer
  8. Trash bin icon
  9. Massive data unit
  10. Software addon
  11. Background image
  12. Main screen
  13. Large data unit

25 Clues: Saved URLData unitLogin nameOnline scamAccess codeMain screenData securityUnwanted emailClickable linkTrash bin iconSoftware addonWindows featureProcessor speedLarge data unitNetwork securityOnscreen pointerRestart computerBackground imageMassive data unitProgramming rulesData transfer rateComputer protectionVery large data unit...

"The Retirement Blueprint Crossword Collection Vol. 1" 2026-04-02

"The Retirement Blueprint Crossword Collection Vol. 1" crossword puzzle
Across
  1. Annual Social Security document showing your earnings history
  2. The list of prescription drugs covered by your Medicare Part D plan
  3. Medicare ___ — covers doctor visits and outpatient care
  4. Benefit that lets a husband or wife claim up to 50% of their partner's amount
  5. Adjusting your investments to return to your target asset mix
  6. Waiting past full retirement age to collect — increases your check
  7. Type of IRA where contributions may be tax-deductible
  8. Your complete collection of investments
  9. The gradual rise in prices that erodes purchasing power over time
  10. The monthly payments you receive from Social Security
  11. ___ plan — extra coverage that fills Medicare gaps
  12. Free money your company adds when you contribute to your 401k
  13. Money coming in during retirement from all sources
  14. Amount you pay before your insurance coverage kicks in
  15. Everything you own that will be passed on after you die
  16. Monthly payment you make to keep your insurance coverage active
  17. Annual window when you can change your Medicare or insurance planUp to 85% of your Social Security income may be ___ by the IRS
  18. Group of doctors and hospitals that accept your insurance plan
  19. Required Minimum ___ — mandatory withdrawal starting at age 73 (abbr.)
  20. What you leave behind — financially and personally — for future generations
  21. Work units you earn each year; you need 40 to qualify for Social Security
  22. Type of Social Security benefit paid to a deceased worker's spouse or child
Down
  1. Taking money out of your retirement savings account
  2. The money you put into your retirement account each year
  3. The schedule that determines when employer contributions become fully yours
  4. Legal arrangement to hold and transfer assets to loved ones
  5. The age at which you qualify for 100% of your Social Security
  6. Moving your 401k balance to an IRA without paying taxes
  7. Fixed fee you pay each time you visit a doctor
  8. A loan you make to a government or company that pays interest
  9. Federal health insurance program that starts at age 65
  10. Social Security income for those unable to work due to health conditions
  11. The Retirement ___ — your personalized plan for financial freedom
  12. ___ fund — investment that tracks a market benchmark like the S&P; 500
  13. Supplemental Security Income — program for low-income seniors (abbr.)
  14. Regular cash payment made to shareholders from company profits
  15. Social Security Insurance — disability program abbreviation
  16. Taking Social Security before full retirement age, starting at 62
  17. The company that may match a portion of your 401k deposits
  18. Annual adjustment that protects your benefit from inflation (abbr.)
  19. ___ of returns risk — retiring during a market downturn hurts long-term wealth
  20. ___ contribution — extra amount workers 50+ can add to retirement accounts
  21. Insurance product that provides guaranteed income for life
  22. ___Elimination Provision — reduces benefits for some government workers
  23. The person named to receive your assets or insurance payout
  24. ___ of Attorney — legal document giving someone authority to act for you
  25. ___ risk — the chance of outliving your retirement savings
  26. Health Savings Account — tax-free account for medical expenses (abbr.)
  27. ___ IRA — retirement account funded with after-tax dollars

49 Clues: Your complete collection of investmentsFixed fee you pay each time you visit a doctor___ plan — extra coverage that fills Medicare gapsMoney coming in during retirement from all sourcesTaking money out of your retirement savings accountType of IRA where contributions may be tax-deductibleThe monthly payments you receive from Social Security...

Indústria 4.0 2023-02-24

Indústria 4.0 crossword puzzle
Across
  1. of things
  2. Aditiva
  3. of services
  4. M2M
Down
  1. Aumentada
  2. Virtual
  3. Factories
  4. Artificial
  5. cyber físicos

9 Clues: M2MVirtualAditivaof thingsAumentadaFactoriesArtificialof servicescyber físicos

Thanksgiving crossword puzzle 2022-11-30

Thanksgiving crossword puzzle crossword puzzle
Across
  1. mom and dad
  2. some thing u thourw in a pot and cook it
  3. american football
  4. too eat
  5. thankful
  6. Cyber Monday
Down
  1. to give to some one
  2. people really close to u
  3. from the Latin peregrinus
  4. the mount of thanksgiving
  5. what macy dose on thanksgiving
  6. after lunch

12 Clues: too eatthankfulmom and dadafter lunchCyber Mondayamerican footballto give to some onepeople really close to ufrom the Latin peregrinusthe mount of thanksgivingwhat macy dose on thanksgivingsome thing u thourw in a pot and cook it

INFORMATIKA SEKARANG DAN MASA DEPAN 2025-08-26

INFORMATIKA SEKARANG DAN MASA DEPAN crossword puzzle
Across
  1. Proses olah data jadi informasi
  2. Terjemahan Artificial Intelligence
  3. Data Kumpulan data sangat besar
  4. Perlindungan data digital
  5. Chatbot termasuk teknologi
  6. Terjemahan cloud computing
  7. Mobil pintar tanpa sopir
  8. Menggali pola dari data
  9. Algoritma belajar dari data
Down
  1. Cara sehat gunakan media digital
  2. Serangan pencuri data digital
  3. Mesin otomatis yang membantu manusia
  4. Dunia buatan imersif
  5. Jaringan global penghubung
  6. Kecerdasan buatan komputer
  7. Singkatan teknologi penghubung perangkat
  8. Kemampuan memahami dunia digital
  9. Teknologi yang bisa menyesuaikan
  10. Perangkat sensor terhubung jaringan
  11. Komunikasi antar mesin otomatis

20 Clues: Dunia buatan imersifMenggali pola dari dataMobil pintar tanpa sopirPerlindungan data digitalJaringan global penghubungKecerdasan buatan komputerChatbot termasuk teknologiTerjemahan cloud computingAlgoritma belajar dari dataSerangan pencuri data digitalProses olah data jadi informasiKomunikasi antar mesin otomatisCara sehat gunakan media digital...

General Cyber Terms 2021-08-03

General Cyber Terms crossword puzzle
Across
  1. open web application security program
  2. tricking users with fake usernames, emails or URLs
  3. using SMS for phishing attacks
  4. this control allows roll back to a previous development point
  5. demands money to unlock yr computer
  6. stealing information
  7. retending to be a reputable person / entity to induce the disclorure of sensitive info
  8. appears a safe program but creates a PC backdoor
  9. a type of eavesdropping attack by a 3rd party
Down
  1. redirecting users to false websites that imitate the legitimate URL
  2. this sneak surfing type observes password entry from "behind" the person
  3. process of catching things that live in water
  4. a phishing type target someone with something of value
  5. 'zombie' computer launching DDoS attacks
  6. infects host with spam, unwanted ads, hijacks browser, etc
  7. take advantage of a vulnerability
  8. a form of mining
  9. unauthorised computer access
  10. malicious software

19 Clues: a form of miningmalicious softwarestealing informationunauthorised computer accessusing SMS for phishing attackstake advantage of a vulnerabilitydemands money to unlock yr computeropen web application security program'zombie' computer launching DDoS attacksprocess of catching things that live in watera type of eavesdropping attack by a 3rd party...

Cyber & Digital Safety 2024-11-10

Cyber & Digital Safety crossword puzzle
Across
  1. Australian agency providing tools and support for staying safe online.
  2. Settings that help control who can view your information online.
  3. An online trick designed to steal money or personal information.
  4. Notifying a trusted adult or platform about inappropriate content or behaviour.
  5. An extra layer of security for protecting online accounts.
  6. When someone uses your personal information to impersonate you.
  7. Capturing an image of your screen, sometimes used to save evidence.
  8. A counseling service providing support for kids in need of help.
  9. Pretending to be someone else online to deceive or manipulate others.
  10. Measures to protect devices and networks from digital threats.
Down
  1. Bullying or harassment that takes place online or through digital devices.
  2. The trail of data you leave online, like posts and searches.
  3. When someone builds trust with a minor online to exploit or harm them.
  4. The sharing of someone's private images without consent.
  5. Websites that are reliable and safe for information or purchases.
  6. Treating others well online and avoiding hurtful actions.
  7. False information spread online, often by mistake.
  8. The amount of time spent on devices with screens, like phones or tablets.
  9. Someone who supports others positively online, especially against bullying.

19 Clues: False information spread online, often by mistake.The sharing of someone's private images without consent.Treating others well online and avoiding hurtful actions.An extra layer of security for protecting online accounts.The trail of data you leave online, like posts and searches.Measures to protect devices and networks from digital threats....

Cyber-crossword 2017-03-01

Cyber-crossword crossword puzzle
Across
  1. applications that allow you to communicate with friends
  2. do not ... requests from strangers
  3. the ... web browse concerns us all
  4. an act of violence on the internet against another user
  5. an application which helps you contact with your friends
  6. you need to be sure of someone's ... before you start a conversation with them
Down
  1. when you are on the internet you are...
  2. you need to use the internet with ...
  3. the ... of cyberbullying
  4. protection of your on-line information
  5. browsing machine
  6. what you need to do if anything happens to you on-line

12 Clues: browsing machinethe ... of cyberbullyingdo not ... requests from strangersthe ... web browse concerns us allyou need to use the internet with ...protection of your on-line informationwhen you are on the internet you are...what you need to do if anything happens to you on-lineapplications that allow you to communicate with friends...

Cyber Law 2017-09-28

Cyber Law crossword puzzle
Across
  1. Any criminal activity associated with a computer.
  2. Transmitting computer viruses to people to destroy their computer system or files.
  3. The use of the computer to sabotage computer networks vital to the national welfare.
  4. The communication via computer or other electronic device of false data that damages a person's reputation.
  5. Intentionally disrupting, defacing, or even destroying a site.
Down
  1. An unwelcome intrusion into the private matters of an individual carried out or sustained by a computer.
  2. Area of the law which concerns computers and computer related crime.
  3. A crime that involves using a computer to steal computer data stored in a digital format.
  4. Any illegal activity already in the criminal code committed by using a computer.
  5. The use of information unlawfully obtained by computer to pressure a victim into granting a payoff to the blackmailer.
  6. A crime in which a cyber criminal falsely adopts the identity of anothor computer user in order to commit fraud.
  7. Involves the invasion, distortion, theft, falsification, misuse, destruction, or exploitation of information stored in or related to electronic devices.

12 Clues: Any criminal activity associated with a computer.Intentionally disrupting, defacing, or even destroying a site.Area of the law which concerns computers and computer related crime.Any illegal activity already in the criminal code committed by using a computer.Transmitting computer viruses to people to destroy their computer system or files....

cyber safety 2013-11-03

cyber safety crossword puzzle
Across
  1. network: when you chat to your friends
  2. too many advertisements had come up, and for you to press the wrong buttons,
  3. on the top of your laptop, it tells you the tabs you have opened.
  4. when you log in to your laptop
  5. when you are on the network and they are saying mean things about you.
  6. a person who breaks into your laptop without you knowing
  7. take notice to what you are doing on your laptop.
  8. when you need wi-fi you connect.
Down
  1. advertisements come up on your laptop and you have to click the exist button.
  2. transferring something on to your laptop
  3. when you can see the person whilst talking to them, but they are in a different location.
  4. to make sure the person is getting the information you send them (just like a message.

12 Clues: when you log in to your laptopwhen you need wi-fi you connect.network: when you chat to your friendstransferring something on to your laptoptake notice to what you are doing on your laptop.a person who breaks into your laptop without you knowingon the top of your laptop, it tells you the tabs you have opened....

Cyber School 2024-08-15

Cyber School crossword puzzle
Across
  1. шесть часов
  2. онлайн школа
  3. по интернету / в интернете
  4. разговаривать с
  5. день спорта
Down
  1. заниматься, учиться
  2. километры
  3. далеко от
  4. рано
  5. отправлять по электронной почте
  6. встречаться
  7. вместе

12 Clues: рановместекилометрыдалеко отшесть часоввстречатьсядень спортаонлайн школаразговаривать сзаниматься, учитьсяпо интернету / в интернетеотправлять по электронной почте