cyber security Crossword Puzzles
Tugas-jaringan koputer dan internet 2024-01-11
10 Clues: jaringan • securities • kelola data • pertukaran data • jaringan komputer • jaringan komputer • komputer dan manfaat • teknis jaringan komputer • dan konfigurasi keamanan jaringan • informasi siatem jaringan komputer
Tugas-jaringan koputer dan internet 2024-01-11
10 Clues: jaringan • securities • kelola data • pertukaran data • jaringan komputer • jaringan komputer • komputer dan manfaat • teknis jaringan komputer • dan konfigurasi keamanan jaringan • informasi siatem jaringan komputer
Internet Security 2021-05-06
Across
- Where the sender and receiver both use the same key to encrypt and decrypt data
- Hardware or software for protecting against unauthorised access to a network
- A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
- Issue solved by using public-private key encryption
- A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
- Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
Down
- Where a public and private key are used to encrypt and decrypt data
- A trusted organisation that provides digital certificates and signatures
- Malware that is hidden within another file on your computer
- A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
- A generic term for malware where the program attaches itself to another file in order to infect a computer
- A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
- A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
- A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules
14 Clues: Issue solved by using public-private key encryption • Malware that is hidden within another file on your computer • Where a public and private key are used to encrypt and decrypt data • A trusted organisation that provides digital certificates and signatures • Hardware or software for protecting against unauthorised access to a network • ...
SECURITY MEETING 2024-06-10
Across
- REPORT FILED
- IN MOST CASES USES A FIREARM
- 3 POTENTIAL COURSES OF ACTION
- WILL ENGAGE WITH EMERGENCY RESPONDERS
- POLICY TO PROVIDE GUIDANCE
- NUMBER OF COURSES OF ACTION
- REVIEWED ANNUALLY AND REVISED
- COMPLY WITH LAW ENFORCEMENT
Down
- NAME THE PROGRAM TO REPORT TREASTS AGAINST THE BANK
- PROHIBITED WITHOUT APPROVAL
- MONTHLY TRAINING
- RESPONSIBLE FOR SIGNING
- DO NOT ATTEMPT TO
- A OFFICER WILL NOTIFY RELATIVES
14 Clues: REPORT FILED • MONTHLY TRAINING • DO NOT ATTEMPT TO • RESPONSIBLE FOR SIGNING • POLICY TO PROVIDE GUIDANCE • PROHIBITED WITHOUT APPROVAL • NUMBER OF COURSES OF ACTION • COMPLY WITH LAW ENFORCEMENT • IN MOST CASES USES A FIREARM • 3 POTENTIAL COURSES OF ACTION • REVIEWED ANNUALLY AND REVISED • A OFFICER WILL NOTIFY RELATIVES • WILL ENGAGE WITH EMERGENCY RESPONDERS • ...
Social Security Crossword 2015-01-28
Across
- Social Security benefits represent about 38 percent of the income of the _____
- There were 63 million Social Security _____ in 2013
- Benefits to retired workers has _____ in the past 40 years
- 55 percent of Social Security beneficiaries were _____ in 2013
Down
- 67 years old is the _____ retirement age of a person born after 1960
- The average age of disabled-worker beneficiaries in current-payment status has _____ substantially since 1960
- About 47 percent of _____ persons rely on Social Security for 90 percent or more of their income.
- Supplemental Security _____ (SSI)
- One 5th of all beneficiaries in 2013 were _____ or the spouses and children of retired or disabled workers
- 165 million _____ are covered under Social Security
- 9 out of ten individuals age 65 and older receive Social Security _____
11 Clues: Supplemental Security _____ (SSI) • There were 63 million Social Security _____ in 2013 • 165 million _____ are covered under Social Security • Benefits to retired workers has _____ in the past 40 years • 55 percent of Social Security beneficiaries were _____ in 2013 • 67 years old is the _____ retirement age of a person born after 1960 • ...
Priceless Puzzle 2023-08-25
10 Clues: CEO • Six notes • Comms Queen • Mastercard HQ • The competition • The card name pre-1979 • Cyber Shield acquisition • LGBTQIA+ card personalisation • Location of the Sustainability Lab • Month of the Rugby World Cup final
Principles of CyberSecurity 2025-04-02
Across
- The process of saving data in case it is lost or damaged
- The law that stops that states it is illegal to use or share peoples data except for the reason it was collected
- A type of virus that you think is one thing but is really another thing
- The methods we employ to keep data safe
- a security method where more than one way of determining identity is utilised
- Gaining unauthorised access to a system
- A scam method using email
- A security method where data is put into a code
- The law that says you can have access to any info kept about you
Down
- When an Enterprise has experiences unauthorised access to their data
- Is the data accurate, updated and from a reliable source
- Software that locks your system and you need to pay a few for the code
- The right to keep info about ourselves confidential
- A scam method using SMS
- Where one person pretends to be someone else using confidential information
- landscape The environment in which a system exists and the risks involved in regard to security
- A piece of software designed to block unauthorised access to a system
- The hat colour of a "good" hacker
- Software used to prevent malicious programs from damaging a system
- damage A business may suffer this after a breach
- Security systems that are based on a human feature
- Software designed to damage a system
22 Clues: A scam method using SMS • A scam method using email • The hat colour of a "good" hacker • Software designed to damage a system • The methods we employ to keep data safe • Gaining unauthorised access to a system • A security method where data is put into a code • damage A business may suffer this after a breach • Security systems that are based on a human feature • ...
Security Month 2025-11-03
Across
- A professional who tests computer systems for vulnerabilities. (7, 6)
- The security technique that modifies sensitive details by replacing it with fictitious information. (4, 7)
- Your unique code used to gain access to websites, apps, and more. (8)
- Framework that enables a third party to integrate with Salesforce, potential for them to be compromised. (9, 4)
- An incident where information is accessed, stolen, or exposed without authorization. (6)
Down
- An add-on product to gain extra security for your Salesforce org. (6)
- The security technique that encourages an implicit lack of faith in all users. (4, 5)
- Digitally altered appearances, one of the ways AI could cause security issues. (9)
- Initialism, require a user to provide two or more verification factors to gain access. (3)
- Salesforce encourages the principle of least ___. (10)
- Salesforce recently announced a partnership with this company to enhance Agentforce security. (11)
- Fraudulent communications that appear to come from a legitimate source. (8)
- The EU data privacy and security law. (4)
- This solution is useful in all cases of data loss. (6)
14 Clues: The EU data privacy and security law. (4) • Salesforce encourages the principle of least ___. (10) • This solution is useful in all cases of data loss. (6) • An add-on product to gain extra security for your Salesforce org. (6) • A professional who tests computer systems for vulnerabilities. (7, 6) • ...
Thanksgiving Cyber Puzzle 2014-11-18
Across
- A unit of digital information in computer and usually consists of eight bits
- Original name of the Pilgrims
- Software that is designed to detect and destroy computer viruses
- The day after Thanksgiving is called this color
- Software that gathers computer user information and transmits it to the creator without the explicit knowledge or informed consent of the user
- The first Thanksgiving day football game was started by this team (2 words)
- What a baby turkey is called
- Software used to disrupt computer operation or gain access to sensitive data
- Email scam or attempt to trick you into giving your password or personal information
- The first president to pardon a turkey from a Thanksgiving dinner
- A stick, also know as a flash drive, is a plug-and-paly portable device
- Hardware or software that helps keep hackers from using your computer and it watches for outside attempts to access your system and block unauthorized use
- O'Bannon Bank network domain name
- Before throwing this in a container ask if it is something you would want made public
Down
- The computer term the Monday after Thanksgiving is called
- The busiest travel day of the year is the Friday after this holiday
- Type of email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus
- The name of the famous rock where the pilgrims first landed (2 words)
- The name of the ship the pilgrims came to America on
- Popular web search engine
- The longest balloon in the Macy's Thanksgiving Day Parade
- A secure password should contain at least one of these
- This type of corn is hard
- What a male turkey is called
24 Clues: Popular web search engine • This type of corn is hard • What a baby turkey is called • What a male turkey is called • Original name of the Pilgrims • O'Bannon Bank network domain name • The day after Thanksgiving is called this color • The name of the ship the pilgrims came to America on • A secure password should contain at least one of these • ...
Cyber safety crossword 2016-05-17
Across
- information that can sometimes be kept on a USB.
- a folder where you keep your stuff.
- talking to someone.
- a small group of people together.
- small random videos that can sometimes be unwanted.
- a bug in your computer that is stopping it from working
- sites that are use for different things.
- getting something on your device.
- person that cheats in something
- someone that helps you do things
- revealing your true self.
- a public site with people from all over the world.
- showing the violence of a game,show or movie.
- sending a type message to someone else.
- unwanted virus someone is sending.
Down
- can be downloaded to use.
- a remote used for video games.
- a small square showing your face.
- security used to get in your device.
- a site for exploring and information.
- a site you need to be careful with when watching
- closing screens but can easily go back.
- a site that is not meant to be used.
- a character describing you in a game
- people that can be played with in real life and video games.
- information that is kept to your self.
- a person that makes you upset or sad.
- a mini activity.
- a device that you download apps
29 Clues: a mini activity. • talking to someone. • can be downloaded to use. • revealing your true self. • a remote used for video games. • person that cheats in something • a device that you download apps • someone that helps you do things • a small square showing your face. • a small group of people together. • getting something on your device. • unwanted virus someone is sending. • ...
Estelle cyber safety 2016-06-07
Across
- You use to go places bag.
- you can play stuff on it
- you live there
- You write on
- you have to be careful on it
- it can save were you were up to
- some words that you use to get in to some thing
- it affects you iPad or phone or computer
- You were when it's sunny
- You stay away
- You can eat
Down
- You sleep on
- you do work on
- you call people
- can read
- You can message people
- Helps you write
- you use to brush your teeth
- Use to open something
- you can look at to see if you need it
- you can tip and save it
- you can each stuff
- it's like the news on the computer bully's book.
23 Clues: can read • You can eat • You sleep on • You write on • You stay away • you do work on • you live there • you call people • Helps you write • you can each stuff • Use to open something • You can message people • you can tip and save it • you can play stuff on it • You were when it's sunny • You use to go places bag. • you use to brush your teeth • you have to be careful on it • ...
The Cyber Scramble! 2024-04-19
Across
- Internet connection method that requires a phone line and creates a distinctive sound when connecting, known as ____.
- One of the most popular search engines in the world.
- Virtual space where users can communicate in real-time through text messages, known as a ____.
- Security system that controls the incoming and outgoing network traffic, known as a ____.
- Software used to navigate the internet, such as Internet Explorer or Firefox, is called a ____.
- Opposite of downloading, this term refers to transferring data from your computer to the internet, known as ____.
- Company that provides your internet connection is known as an ____.
- Language used to create web pages is known as ____.
- Collection of web pages linked under a common domain, also known as a ____.
- The most used social media platform in the world.
Down
- Unwanted or unsolicited email, commonly referred to as ____.
- Buying and selling goods or services over the internet, commonly referred to as _____.
- A communication method that uses electronic devices to deliver messages across computer networks.
- Unique address used to locate resources on the internet, abbreviated as ____.
- Advertisement that appears in a separate window while browsing the internet, known as a ____.
- Process of transferring data from the internet to your computer is called a ____.
- Wireless networking technology that allows devices to connect to the internet without the need for physical cables, known as ____.
- Type of malicious software that can replicate itself and infect other computer files, known as ____.
- Device that allows computers to communicate over telephone lines, also known as a ____.
- Website where individuals or groups regularly post content on specific topics, known as a ____.
20 Clues: The most used social media platform in the world. • Language used to create web pages is known as ____. • One of the most popular search engines in the world. • Unwanted or unsolicited email, commonly referred to as ____. • Company that provides your internet connection is known as an ____. • ...
Cyber Physical Systems 2025-03-20
Across
- The process of making systems operate without human intervention.
- Using models to replicate real-world behaviors.
- A decentralized and secure digital ledger technology.
- Internet-based computing providing storage and processing power.
- Related to manufacturing and production systems.
- A network of connected devices that communicate over the internet.
- Study of control and communication in machines and living beings.
- The ability of different systems to work together.
- A virtual replica of a physical system for monitoring and analysis.
- Devices that detect and respond to physical changes.
Down
- The coordination of processes to operate in unison.
- Protection of digital and cyber-physical systems from threats.
- The capability of a system to function independently.
- A computing system integrated into a larger system.
- Devices that convert electrical signals into mechanical motion.
- A highly automated, connected, and intelligent manufacturing system.
- Machine-based intelligence that enables decision-making.
- Combining different subsystems into a unified system.
- Large volumes of data used for analytics and decision-making.
- Processing data closer to the source rather than a central server.
20 Clues: Using models to replicate real-world behaviors. • Related to manufacturing and production systems. • The ability of different systems to work together. • The coordination of processes to operate in unison. • A computing system integrated into a larger system. • Devices that detect and respond to physical changes. • ...
Puzzle #48 – “How Social Security Is Funded” 2025-06-30
Across
- - Where collected Social Security money is stored
- - Pays half of the Social Security tax
- - Shares payroll tax responsibility with the employee
- - What current workers are funding for today’s retirees
Down
- - Taxes are collected based on these
- - Social Security is funded through this type of tax
- - Social Security receives this from taxes
- - Main way Social Security is funded
- - Acronym for Federal Insurance Contributions Act
- - Often funded alongside Social Security through payroll
10 Clues: - Taxes are collected based on these • - Main way Social Security is funded • - Pays half of the Social Security tax • - Social Security receives this from taxes • - Where collected Social Security money is stored • - Acronym for Federal Insurance Contributions Act • - Social Security is funded through this type of tax • ...
RAF Knowledge Test 2023-04-04
14 Clues: New CAS • C-17 Name • T in NATO • Overseas base • Overseas Base • Home to ISTAR • Atlas C.1 name • Who formed the RAF • A role of Air Power • QRA fall under this group • How many terms at Cranwell • Air, Space and Cyber Group • An Air power Characteristic • An Air Power Characteristic
SAFE-T Week 2026-01-05
Across
- engaging____________
- Customer _________ protocol
- ______ APP
- Civil_____
- Access to ______ Areas
- _____ Response
- Branch&Cafe grab and ____ procedures
- _______ & Security Preparedness Resources
Down
- vandalism, ______ & burglary
- Alarm System & _______ Management
- ________ on branch & cafe premises
- ______ camera footage requests
- suspicious ________
- Opening & _____ the branch
- Associate ______ Awareness
- contract ______ Services
- _______Threats
17 Clues: ______ APP • Civil_____ • _______Threats • _____ Response • suspicious ________ • engaging____________ • Access to ______ Areas • contract ______ Services • Opening & _____ the branch • Associate ______ Awareness • Customer _________ protocol • vandalism, ______ & burglary • ______ camera footage requests • Alarm System & _______ Management • ________ on branch & cafe premises • ...
Midterm Exam Prep 2024-02-29
Across
- Protecting data and resources from unauthorized access.
- This type of denial exists on each ACL.
- Security subnet created by dual firewalls.
- Sophisticated attacks remain undetected.
- A system designed to lure attackers and gather information about their tactics.
- A security zone for suppliers and customers.
- An attack in which the attacker intercepts and analyzes network traffic.
- This type of ACL allows everyone except the one we deny.
- Malware inducing fear tactic.
- This secure remote access protocol should be replaced by telnet.
- Protection of data from unauthorized manipulation or alteration.
- Device authentication mechanism to ensure a secure network.
- Social engineering on high-profile targets.
- It's used for IP translations.
- Policies are used for email delivery.
- This hacker steals valuable information and is often associated with the mafia.
- IPsec protocol that can be used for data encryption.
- This hacker gets in, grabs the goods, and gets out.
- An availability technique.
- Social engineering phase in which the conversation with the victim starts.
- This hackers have political motives.
- This poisoning technique associates a MAC address with the victim's IP address.
- A layer 2 Network segmentation technique.
- Provides a method for mutual authentication of devices within the SAN
- This WSUS server is responsible for testing and approval of patches.
- two worded Layer 2 security configuration on switches.
- These malware can be purchased in a ready-to-use state.
- Social engineering over the phone.
Down
- For this anti-virus scan, you must reboot your system.
- A physical security entry trap
- Storytelling and impersonating legitimate organization.
- In this NIST core function we educate users.
- This standard can be created to apply consistent security configurations.
- FTPs rely on this protocol for security.
- The second Security model layer.
- In this NAC stage we define how NAC should be implemented.
- This Malware spreads through a network.
- Infected computers with a botnet to carry an attack with.
- These appliances can be used to apply quality of service and traffic-shaping.
- IPsec protocol is responsible for establishing security associations (SAs).
- Ethical hacking phase to collect information.
- The best security countermeasure to reduce the risk of a phishing attack.
- A controlled DNS to identify a hacked computer.
- This IPsec operation mode is used for site-to-site VPN connection.
- Protects sensitive data from being exposed
- Email authentication check.
- The file and folder permissions are written in this list.
- Email authentication using signatures.
- File-level encryption.
- Following an authorized personnel to bypass the physical Access Control.
- This type of proxy server can be used for web filtering.
- A temporary power backup.
- A network scanning tool.
- These patches are prioritized even outside of a normal schedule.
54 Clues: File-level encryption. • A network scanning tool. • A temporary power backup. • An availability technique. • Email authentication check. • Malware inducing fear tactic. • A physical security entry trap • It's used for IP translations. • The second Security model layer. • Social engineering over the phone. • This hackers have political motives. • ...
Places in town 2020-09-16
Slack @: 2023-09-22
Across
- The quality of keeping or being kept secret or private
- An act of breaking or failing to observe a law, agreement, or code of conduct.
- -security
- The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
- The art of writing or solving codes
- The process or action of proving or showing something to be true, genuine, or valid
Down
- The quality of being able to be used or obtained
- Type of malware relating to ancient Troy in Asia Minor
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- A cybercrime in which the attacker floods a server with internet traffic from multiple sources to prevent users from accessing connected online services and sites
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A method of accomplishing something primarily by means of strength, without the use of great skill, mechanical aids or thought
- The quality of being honest and having strong moral principles
- The Hollywood name of a person who uses computers to gain unauthorized access to data
- An electronic authentication method in which a user is granted access to a website or application
15 Clues: -security • The art of writing or solving codes • The quality of being able to be used or obtained • Type of malware relating to ancient Troy in Asia Minor • The quality of keeping or being kept secret or private • The quality of being honest and having strong moral principles • An act of breaking or failing to observe a law, agreement, or code of conduct. • ...
TJandCASTROFLORES 2024-10-24
Across
- warfare of security experts will discuss the growing threats to corporations.
- ceremony- when the vessel is formally named and launched is customarily
- warfare- the use of military aircraft and other flying machines in warfare.
- launching- vessel is either completed on perpendicular building ways near the water.
- warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
- conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
- control- measures taken to prevent a fire or collision.
Down
- weapons- traditional weapons such as rifles and explosives
- process- gain the information used to gain estimates of the situation
- warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
- warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
- lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
- warfare are self replicating programs that can hide in systems
- marsupial
- operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
- a series of short cruises to check out the ship and its equipment.
16 Clues: marsupial • control- measures taken to prevent a fire or collision. • weapons- traditional weapons such as rifles and explosives • warfare are self replicating programs that can hide in systems • a series of short cruises to check out the ship and its equipment. • process- gain the information used to gain estimates of the situation • ...
Crossword Period 1 2024-06-04
Across
- Class of conspicuous consumption
- Like a famous fictional knight
- Not quite
- Something precious and portable
- Linked
- Relative of "shy" and "shoo"
- Find intolerable
- Salty or spicy, in speech
- Like the prices on Black Friday or Cyber Monday
Down
- Aggressive military strategy
- For insiders only
- Like a speech or sermon
- You might have this before a big decision
- Opposite of indifference
- Something worse than a lecture
- Link
- Like teacher's answers, sometimes
- All puffed up
- Last ___ of...
- Up in smoke
- Clownish
21 Clues: Link • Linked • Clownish • Not quite • Up in smoke • All puffed up • Last ___ of... • Find intolerable • For insiders only • Like a speech or sermon • Opposite of indifference • Salty or spicy, in speech • Aggressive military strategy • Relative of "shy" and "shoo" • Like a famous fictional knight • Something worse than a lecture • Something precious and portable • Class of conspicuous consumption • ...
Technology 2024-02-16
Across
- to turn on (e)
- stereo
- device
- the touchscreen
- work
- voicemail
- social media
- out of order
- the tablet
- apps
- digital camera
- the charger
- password
- printer
- mouse
- to print
- remote control
Down
- laptop
- the cyber cafe
- the phone
- busy
- to turn off
- make a sound
- slow
- the channel
- the monitor
- the wireless connection
- video call
- keyboard
- TV
- call
- radio
- to turn on (p)
- the internet
34 Clues: TV • busy • slow • work • apps • call • radio • mouse • laptop • stereo • device • printer • keyboard • password • to print • the phone • voicemail • video call • the tablet • to turn off • the channel • the monitor • the charger • make a sound • social media • out of order • the internet • to turn on (e) • the cyber cafe • digital camera • to turn on (p) • remote control • the touchscreen • the wireless connection
16a 2024-07-11
Across
- Paranormal investigation series
- Drummer's intense journey
- Animal city's mystery
- Dysfunctional superhero family
- Boy becomes a hero
- Postapocalyptic road trip
- Alien symbiote film
- Dream master's tale
- Ex-cop's investigations
- Man with multiple selves
- Heist widows' plot
- Cyber world's return
- Antihero group's antics
- Disease thriller film
- Warrior king's realm
Down
- Teen vampire saga
- Picnic-stealing bear
- Arms dealers' story
- Agent's loyalty tested
- Future cop's hunt
- Longhaired princess's tale
- Writer's biographical film
- Street rat's magical tale
- Heroes against corruption
- Balloon house adventure
25 Clues: Teen vampire saga • Future cop's hunt • Boy becomes a hero • Heist widows' plot • Arms dealers' story • Alien symbiote film • Dream master's tale • Picnic-stealing bear • Cyber world's return • Warrior king's realm • Animal city's mystery • Disease thriller film • Agent's loyalty tested • Ex-cop's investigations • Antihero group's antics • Balloon house adventure • Man with multiple selves • ...
Chapter 6: Social Media Legal and Policies in Malaysia 2023-09-18
Across
- of the MCMC is to promoting and protecting consumer
- deemed to be offensive or illegal can be subject to investigation and action by MCMC
- is the regulatory body for the communications and multimedia industry in Malaysia
- Law that stalking is defined as a repeated act of harassment, which is intended or is likely to cause distress, fear, or alarm to any person for their safety.
- of the social media security ensures to provide best practices forindividuals and organizations to protect their social media accounts from cyber threats
Down
- Agencies responsible of assuring appropriate use of social media by government officials, the management of social media accounts, and the handling of sensitive information on social media
- Social media service providers are also subject to do under regulatory requirements of the CMA
- regulates a wide range of issues, including licensing, spectrum allocation, competition, and consumer protection
8 Clues: of the MCMC is to promoting and protecting consumer • is the regulatory body for the communications and multimedia industry in Malaysia • deemed to be offensive or illegal can be subject to investigation and action by MCMC • Social media service providers are also subject to do under regulatory requirements of the CMA • ...
Cybersecurity Santiago Yeison Cristian Yefferson 2025-06-25
Across
- This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
- Criminal activities carried out using computers or the internet.
- The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The programs and other operating information used by a computer.
- The quality of being trustworthy or of performing consistently well.
- The use of computers and the internet to conduct warfare in cyberspace.
- Software used to prevent, detect, and remove malicious software.
- The process of encoding information in such a way that only authorized parties can access it.
Down
- Criminal activities carried out using computers or the internet.
- The practice of protecting systems, networks, and programs from digital attacks.
- Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
- Characterized by malice; intending or intended to do harm.
- As discussed, malicious software.
- An attempt by hackers to damage or destroy a computer network or system.
- The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
- The process of converting encrypted data back into its original form.
- The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- Permanent software programmed into a read-only memory.
- The practice of protecting systems, networks, and programs from digital attacks.
- Broader than antivirus, it protects against various forms of malware, not just viruses.
- Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.
22 Clues: As discussed, malicious software. • Permanent software programmed into a read-only memory. • Characterized by malice; intending or intended to do harm. • Criminal activities carried out using computers or the internet. • Criminal activities carried out using computers or the internet. • The programs and other operating information used by a computer. • ...
SECTION 6: WITHHOLDING TAXES 2026-02-14
Across
- Compensation paid in addition to regular wages such as bonuses, commissions, or severance.
- An IRS notice specifying the maximum withholding allowances an employee may claim.
- Income tax withholding required on certain payments when the payee fails to provide a correct taxpayer identification number.
- Law requiring self-employed individuals to pay both the employer and employee portions of Social Security and Medicare taxes.
- An individual who meets residency tests and is taxed similarly to U.S. citizens.
- Federal hospital insurance program funded through the Medicare portion of FICA.
- Federal income tax withheld from employee wages.
- State income tax withheld from employee wages.
- The combined Social Security and Medicare taxes imposed on employees and employers.
- A method for determining federal income tax withholding using wage range tables.
- The employee’s withholding certificate used to determine federal income tax withholding amounts.
- A 0.9 percent tax withheld from employee wages exceeding the annual threshold.
- An SSA online service that allows employers to verify employee names and Social Security numbers.
- The Social Security portion of FICA providing retirement, survivor, and disability benefits.
- An individual who does not meet U.S. residency tests and is taxed only on U.S.-source income.
- A federal or state form completed by an employee to indicate withholding adjustments.
- Government employees subject only to the Medicare portion of FICA.
Down
- One related corporation designated to pay employees working for multiple related entities for FICA and FUTA purposes.
- The process of deducting taxes from employee wages for payment to tax authorities.
- A method for calculating federal income tax withholding using tax rate tables and wage amounts.
- A state or local governmental unit or political subdivision that employs workers.
- Federal law establishing a retirement system for railroad employees similar to Social Security.
- An IRS rule that considers wages paid when the employee has access to them without substantial limitations or restrictions.
- A code received through SSN verification indicating whether the SSN holder is deceased.
- Corporations with common ownership that may be treated as a single employer for certain tax purposes.
- Federal income tax withheld from employee wages when paid.
- The maximum amount of wages subject to Social Security or unemployment taxes.
- The Old Age, Survivors, and Disability Insurance component of FICA.
- A fixed percentage withholding method applied to supplemental wages under certain conditions.
- Agreements between states allowing employees to pay income tax only to their state of residence.
- An individual’s taxpayer identification number issued by the Social Security Administration consisting of nine digits.
- A tax reporting identification number issued to individuals who are not eligible for a Social Security number.
- The hospital insurance portion of Medicare taxes.
- A federal tax credit available to eligible low-income employees that may be claimed when filing a tax return.
- A taxpayer identification number such as a Social Security number or employer identification number.
35 Clues: State income tax withheld from employee wages. • Federal income tax withheld from employee wages. • The hospital insurance portion of Medicare taxes. • Federal income tax withheld from employee wages when paid. • Government employees subject only to the Medicare portion of FICA. • The Old Age, Survivors, and Disability Insurance component of FICA. • ...
cybersecurity Puzzle-Enrique 2023-08-22
Across
- prevents unauthorized changes
- scrambling data
- UI redress attack
- false perception of reality
- disguised attacks
- fools users into providing sensitive information
- personal laptop, smart phones, ect
Down
- online harassment
- virtual private network
- locks users out until they pay
- short for malicious software
- prevents unauthorized access
- transmits information without user knowing
- codes that protect data
- carry out cyber attacks on other systems
15 Clues: scrambling data • online harassment • UI redress attack • disguised attacks • virtual private network • codes that protect data • false perception of reality • short for malicious software • prevents unauthorized access • prevents unauthorized changes • locks users out until they pay • personal laptop, smart phones, ect • carry out cyber attacks on other systems • ...
Cryptober Puzzle #1 2020-09-30
Across
- The means of proving identity using two authentication factors
- Any weakness in an asset or security protection which would allow for a threat to cause harm
- The act of falsifying the identity of the source of a communication or interaction
- A means of security evaluation where automated tools and manual exploitations are performed by security and attack experts
- Program designed to detect and remove computer viruses
- A social engineering attack that attempts to collect information from victims
Down
- The process of proving an individual is a claimed identity
- A means of isolating applications, code or entire operating systems in order to perform testing or evaluation.
- The number one spot in the OWASP 10
- Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system
- A security tool that attempts to detect the presence of intruders or the occurrence of security violations
- A place where websites can store local data on a client machine
- The act of collecting frames or packets off of a data network communication
- An update or change on an operating system or application
- An error or mistake in software coding or hardware design or construction
- Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
16 Clues: The number one spot in the OWASP 10 • Program designed to detect and remove computer viruses • An update or change on an operating system or application • The process of proving an individual is a claimed identity • The means of proving identity using two authentication factors • A place where websites can store local data on a client machine • ...
Information Security Terms 2024-01-31
Across
- Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- A software vulnerability that is exploited by attackers before the vendor releases a fix.
- of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- The process of converting data into a code to prevent unauthorized access.
- Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- Software designed to detect and remove malicious software from a computer.
- The process of verifying the identity of a user, system, or device.
- Security: Security measures to protect network endpoints, such as computers and mobile devices.
- Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- A network security device that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A software update designed to fix vulnerabilities or improve security.
16 Clues: The process of verifying the identity of a user, system, or device. • A software update designed to fix vulnerabilities or improve security. • Software designed to detect and remove malicious software from a computer. • The process of converting data into a code to prevent unauthorized access. • ...
Security Terms 2022-11-17
Across
- Malicious computer code that reproduces itself on a computer
- Publicly released software security update to repair a vulnerability
- Malware preventing devices from properly operating until a fee is paid
- Hardware or software designed to limit spread of malware
- General term used to describe software that spies on users by gathering information without consent
- Software code that gives access to a program that circumvents normal security protections
Down
- Software that helps prevent computers from becoming infected by spyware
- Database of viruses used to identify infected files
- Logical computer network of zombies under control of an attacker
- Computer code that is dormant until it is triggered by a specific logical event
- Attacker who controls a botnet
- Software that is a cumulative package of all patches and feature updates
- Security program that delivers advertising content in a way that is unexpected and unwanted
- Infected computer under remote control of an attacker
14 Clues: Attacker who controls a botnet • Database of viruses used to identify infected files • Infected computer under remote control of an attacker • Hardware or software designed to limit spread of malware • Malicious computer code that reproduces itself on a computer • Logical computer network of zombies under control of an attacker • ...
USAJ Security 2022-03-30
14 Clues: The wand • On the glass • USA Jet AOSC • Alternate AOSC • Tamper evidence • Check that cargo • Fingerprint lady • Search procedure • Check your record • Need to know only • Broken wand (2 words) • Fingerprint lady, too • Security training required • Aviation security regulator
Security Awareness 2023-08-01
Across
- lax approach to policies and procedures, creating risks
- as a DoD employee, you are a _______
- when a blue light is blinking in an area, it means there is an ______ individual
- you are required to ______ suspicious behavior
- an adversary having the intent, capability, and opportunity to cause loss or damage
- anyone with access to classified information can become a _______ classifier
- lack of awareness of policies and procedures, creating risks
Down
- everyone's responsibility
- intentional acts, creating risks
- the practice of spying or of using spies, typically by governments to obtain political and military information
- a potential risk indicator for someone living above their means
- program access is based on ______ and material contribution
- report _______ travel at least 30 days in advance
- there is ______ a need to talk around classified outside a classified environment
14 Clues: everyone's responsibility • intentional acts, creating risks • as a DoD employee, you are a _______ • you are required to ______ suspicious behavior • report _______ travel at least 30 days in advance • lax approach to policies and procedures, creating risks • program access is based on ______ and material contribution • ...
information security 2023-08-29
Across
- Virus macros which have been programmed to carry out malicious intent
- gap or weakness which undermines an organization’s security efforts
- rights an individual or organization has over information and how it is used
- requirement of being private or secret
- intent of doing harm
- making sure a person is who they say they are
Down
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain
- information or data which can be accessed when needed
- procedure used to determine user privileges or access levels to the system
- state of being complete or uncorrupted
- how information is protected
- network of computers and devices managed as a unit with the same procedures and rules
- to or damage sensitive information on a computer
- calculated assessment of potential threats to an organization’s security
14 Clues: intent of doing harm • how information is protected • state of being complete or uncorrupted • requirement of being private or secret • making sure a person is who they say they are • to or damage sensitive information on a computer • information or data which can be accessed when needed • gap or weakness which undermines an organization’s security efforts • ...
FOOD SECURITY 2024-11-28
Across
- - A prolonged period of abnormally low rainfall
- - The process of preserving food to prevent spoilage
- - A system for managing water resources for agricultural use
- - The buying and selling of agricultural products
- - A sudden increase in the price of food
- - A government program that provides food assistance to low-income individuals
- - The science of soil management and crop production
Down
- - The science of cultivating land, raising crops, and feeding livestock
- - The variety of plant and animal life in a particular habitat
- - The gradual warming of the Earth's climate
- - A system of farming that avoids synthetic fertilizers and pesticides
- - The movement of people or animals from one region to another
- - The process of adding nutrients to food to improve its nutritional content
- - A period of severe food scarcity
14 Clues: - A period of severe food scarcity • - A sudden increase in the price of food • - The gradual warming of the Earth's climate • - A prolonged period of abnormally low rainfall • - The buying and selling of agricultural products • - The process of preserving food to prevent spoilage • - The science of soil management and crop production • ...
DATA SECURITY 2025-10-22
Across
- A virtual barrier that keeps unauthorized users out of a computer network.
- A secret word or phrase that grants you access to an account or device.
- A small text file saved by a website to your computer that remembers information about you.
- Harmful software that can copy itself and spread to other computers, often deleting or damaging data.
- A set of rules for how you should behave and interact online.
- The record of everything you do and post online; it stays forever!
Down
- A type of software designed to damage, disable, or gain unauthorized access to a computer system.
- A crime where someone steals your personal information to pretend to be you.
- This type of software protects your computer from viruses and other malicious programs.
- The practice of protecting systems, networks, and data from digital attacks.
- A fake message, often an email, trying to trick you into giving away private information.
- A special way to scramble data so only authorized people can read it.
- The general term for information, like facts, statistics, or files.
- Using two different ways to prove you are who you say you are before logging in. (Abbreviation)
14 Clues: A set of rules for how you should behave and interact online. • The record of everything you do and post online; it stays forever! • The general term for information, like facts, statistics, or files. • A special way to scramble data so only authorized people can read it. • A secret word or phrase that grants you access to an account or device. • ...
Financial Literacy Terms 2023-05-12
Across
- distribution of a companys earnings
- a company breaking up shares
- a financial advisor
- pooled money with investors
- a business varying its range
- stock that offers regular/steady income
- security that shows ownership in a company
- five year average sales growth above 15%
- share prices rising
Down
- differs from common stock
- profitability of a company
- selling an assest for MORE than your adjusted basis
- a bond that is a debt obligation
- stocks worth less than a dollar
- share prices falling
- annual income divided by price of security
- selling asset for LESS than adjusted basis
- earnings that are free of debt
- formal document required by and filed with the Securities and Exchange commision
- the value and investor earns from a security
20 Clues: a financial advisor • share prices rising • share prices falling • differs from common stock • profitability of a company • pooled money with investors • a company breaking up shares • a business varying its range • earnings that are free of debt • stocks worth less than a dollar • a bond that is a debt obligation • distribution of a companys earnings • ...
otr 2014-05-12
Across
- ________ visit notifications must be passed 72 hours in advance of the proposed visit by Program Security.
- Do not ____________sensitive subjects on an unclassified phone line, in emails or via other types of unclassified communications.
- Program names and information cannot be listed on _______, websites or other personal documents.
- Accessed personnel should contact Program Security for instructions on the use of secure ______________ equipment.
- All ___________________must review and update their Personnel Security Prescreening Questionnaire (PSPQ) on an annual basis.
Down
- All _______ employees are required to report adverse information.
- Your __________ program security officer (CPSO) is your security liaison for specific programs.
- Report all _______ travel for business and personal reasons.
- ______________ is one type of a special program.
- Users must not share _________ with anyone.
- Security is __________ responsibility
- Refer to a program by its unclassified __________ (PID).
12 Clues: Security is __________ responsibility • Users must not share _________ with anyone. • ______________ is one type of a special program. • Refer to a program by its unclassified __________ (PID). • Report all _______ travel for business and personal reasons. • All _______ employees are required to report adverse information. • ...
NETWORKING QUIZ 2025-05-17
Across
- Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that sensitive information, like passwords or credit card details, remains private even if intercepted by malicious actors. Encryption is essential for securing data both at rest (stored data) and in transit (data being transmitted).
- A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps to prevent unauthorized access or attacks.
- terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats.
Down
- Private Network (VPN) A VPN is a technology that allows users to create a secure and encrypted connection over a less secure network, such as the internet. It enables remote users to access a private network securely, protecting data from being intercepted by unauthorized parties.
- Control Access control refers to the mechanisms used to regulate who or what can access a network or system, and under what conditions. This includes techniques like authentication (verifying the identity of users) and authorization (granting permission to access resources). Types of access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).
- Detection System (IDS: An IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. It alerts administrators to suspicious behavior, such as an unauthorized attempt to access the network, and can also provide real-time detection of potential security breaches.
- are five key terminologies used in performing network security:
7 Clues: are five key terminologies used in performing network security: • terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats. • ...
Test Your Knowledge 2023-11-08
Across
- information that can be used to distinguish or trace an individual’s identity either directly or indirectly through linkages with other information
- individuals” who have access to classified information or hold a
- information would would cause "exceptionally grave damage to the national security" if there were an unauthorized release.
- a type of classification that is based on the classification of another source.
- establishes requirements for the protection of classified information disclosed to or developed by contractors, licensees, grantees, or certificate holders (hereinafter referred to as contractors) to prevent unauthorized disclosure.
- information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies but is not classified .
- and result in, or could be expected to result in, the loss or compromise of
- information
- security incidents that indicate knowing, willful, and negligence for security
- establishes standardized reporting requirements across the federal government for all
- the process by which we protect critical information whether it is classified or unclassified that can be used against us. It focuses on preventing our adversaries' access to information and actions that may compromise an operation.
Down
- a security incident involving failure to comply with requirements
- information that is determined to have the potential to cause danger to the national security with unauthorized release.
- or compromise of classified information
- cannot reasonably be expected to) and does not, result in the loss, suspected
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- information that would, with unauthorized release, be expected to cause "serious" damage to the national security.
- a perceived threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
- position.
19 Clues: position. • information • or compromise of classified information • individuals” who have access to classified information or hold a • a security incident involving failure to comply with requirements • and result in, or could be expected to result in, the loss or compromise of • cannot reasonably be expected to) and does not, result in the loss, suspected • ...
Voyager Update 2018 2018-11-20
Across
- basic hardware (computer) and software (operating system) on which software applications can be run.
- doing business that focuses on creating a positive experience for the customer
- analytics process of assessing/modeling data with the goal of discovering insights and support decision-making
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- the action or process through which something is changed so much that it appears to be entirely new.
- Supporting clients make decisions that are right for them
- the ability for clients to perform service transactions themselves
- the conversion of text, pictures, or sound into a digital form that can be processed by a computer.
- make (something) simpler or easier to do or understand.
- lasting or valid for more than one year.
Down
- The use of many different pathways such as phone, email, and face to face to engage clients
- The capability of a system or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth
- taking steps to reduce adverse effects
- the lifelong connection between OPB and its clients
- with various parts or aspects linked or coordinated.
- an act of traveling from one place to another.
- the state or quality of being efficient.
- a thing that makes something better or is better than something else.it was before.
- creating an opportunity by causing something to happen rather than responding to it after it has happened.
19 Clues: taking steps to reduce adverse effects • the state or quality of being efficient. • lasting or valid for more than one year. • an act of traveling from one place to another. • the lifelong connection between OPB and its clients • with various parts or aspects linked or coordinated. • make (something) simpler or easier to do or understand. • ...
Disruptive Technology 2025-08-09
Across
- comprehensive approach that combines practices and technologies to protect applications and services from disruptions
- the development and use of technologies that minimize environmental impact while promoting social and economic benefits
- refers to the technologies, applications, and practices used to collect, analyze, and present business data to support informed decision-making
- digital environment where users can engage with diverse and interconnected virtual experiences across various platforms and devices
Down
- cloud computing model where public cloud services are deployed across multiple geographic locations, but managed centrally by a single provider
- the ability of computer systems to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and decision-making
- distributed approach to security that focuses on securing individual assets (devices, users, etc.) rather than relying on a single, centralized network perimeter
- Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks
8 Clues: Cyber insurance covers the losses relating to damage to, or loss of information from, IT systems and networks • comprehensive approach that combines practices and technologies to protect applications and services from disruptions • the development and use of technologies that minimize environmental impact while promoting social and economic benefits • ...
Domestic and International Airports (Nicoshia Toailoa/ Dublin ) 2017-09-10
Across
- Is the 3 letter code for the Kapiti Coast
- A company located in check-in area which enables travellers to have their luggage sealed for protection
- Free facilities for transit passengers
- Home of the Worlds longest runway
- Auckland Airport will combine international and domestic _____ as early as 2019
- A facility used by those who wish to pray before a flight
- Acronym for Ministry of Agriculture and Forestry
- This has been dramatically increased after the September 11 2001 attack
- A word that you should not use in or around the Airport areas
- A small item that will be confiscated off you at security due to its risk of having the potential to self ignite
Down
- An official document issued by a government; certifies holders identity and citizenship
- You enter this area once you pass through passport control and Security at the Auckland International Airport
- Located landside, person travelling will need to present passport, ticket and luggage here
- An area accessible to everyone, including those who are not travelling
- A lounge at the Auckland Airport operated by Air New Zealand
- A form of transport available to take you between the 2 Auckland Airport terminals
- The official provider of aviation security services in New Zealand
- A machine in which a conveyer belt move items through in order to ensure security and safety
- A currency exchange company that can be found both landside and airside
- A place where airplanes arrive and take off
20 Clues: Home of the Worlds longest runway • Free facilities for transit passengers • Is the 3 letter code for the Kapiti Coast • A place where airplanes arrive and take off • Acronym for Ministry of Agriculture and Forestry • A facility used by those who wish to pray before a flight • A lounge at the Auckland Airport operated by Air New Zealand • ...
Investing-Jacob Hawkins 2025-03-24
Across
- total amount of money that you can put in an IRA per year ($)
- they type of risk tolerance you’ll most likely have if you do lump sum investing
- the year that social security was established
- social security and medicare taxes
- age to receive full social security benefits
- Warren Buffet is the CEO of this company
- should we look to celebrities for financial advice?
- this IRA’s contributions are made after taxes
- type of job that offers pension plans
- this thing sometimes contributes to your pension plan
- another type of job that offers a pension plan
- Warren Buffets number one rule of investment
- the age that you can take out the money from both types of IRA’s
Down
- the person your pension is managed by
- president who created social security in 1935
- this IRA’s contributions are made pre tax
- you contribute and sometimes the state contributes to this income source
- the year that you receive a little bonus to your social security plan
- at 67 you can get full benefits from this income source
- CEO of Berkshire Hathaway
- when a person stops working after reaching a certain age
- the type of fund that you should build before investing in Crypto
- the biggest financial fraud in U.S. history
- the thing that created and backs up Fiat Money
- the age you have to be to invest in Crypto
25 Clues: CEO of Berkshire Hathaway • social security and medicare taxes • the person your pension is managed by • type of job that offers pension plans • Warren Buffet is the CEO of this company • this IRA’s contributions are made pre tax • the age you have to be to invest in Crypto • the biggest financial fraud in U.S. history • age to receive full social security benefits • ...
Cyber Bullying 2016-12-05
Across
- A type of social media that utilizes images and pictures
- Someone that is famous and well known
- A nickname people use on social media to conceal their true identity
- Someone that lives abroad for purposes related to employment
- Degrade purposely to make someone feel bad
- Someone from another country other than your own
Down
- To attack or assault someone verbally or physically
- To have purposely started or initiated an action
- The process of taking advantage of someone weaker than yourself
- A false feeling of over confidence and self-importance
- To make someone seem evil or terrible
- A very precious metal
12 Clues: A very precious metal • Someone that is famous and well known • To make someone seem evil or terrible • Degrade purposely to make someone feel bad • To have purposely started or initiated an action • Someone from another country other than your own • To attack or assault someone verbally or physically • A false feeling of over confidence and self-importance • ...
Cyber Defences 2021-09-22
Across
- Should be strong and have MFA
- Protects against viruses and worms
- This will protect a device/networks ports
- This is used to attract cyber attacks
- Used to record activity and find source of intrusions
- What to do to USB ports to prevent data exfiltration
- An update with a fix for a vulnerability
Down
- Can give false positives that distract administrator (acronym)
- These should be restricted to prevent users from having more access than required
- Teaches staff how to prevent falling for phishing scams
- Makes data unreadable
- Best defence against ransomware
12 Clues: Makes data unreadable • Should be strong and have MFA • Best defence against ransomware • Protects against viruses and worms • This is used to attract cyber attacks • An update with a fix for a vulnerability • This will protect a device/networks ports • What to do to USB ports to prevent data exfiltration • Used to record activity and find source of intrusions • ...
cyber bulling 2022-01-03
Across
- A digital place where you can find information
- A mental disorder that causes the feeling of sadness and lost of intrest
- What people feel when others post offending things about them
- Irrelevant or inappropriate messages sent online
- A secret word or phrase
- Fun and distracting way to spend your times
Down
- Secure
- A technology that was invented by Alexander Bell
- Exprssing an opinion on the web
- Belonging to or for the use of one particular person or group of people only
- Share pictures or tweets with the world
- Informal conversation
12 Clues: Secure • Informal conversation • A secret word or phrase • Exprssing an opinion on the web • Share pictures or tweets with the world • Fun and distracting way to spend your times • A digital place where you can find information • A technology that was invented by Alexander Bell • Irrelevant or inappropriate messages sent online • ...
cyber bullying 2019-07-11
Across
- in your mind
- someone who teaches people
- when you want to kill yourself
- when people don't know who you are
- when you aren't in danger
- by your self
Down
- someone who enforces law
- someone who is mean for a long amount of time
- when you are very sad
- when you are the person who gets bullied
- something you play
- playing with other people
12 Clues: in your mind • by your self • something you play • when you are very sad • someone who enforces law • playing with other people • when you aren't in danger • someone who teaches people • when you want to kill yourself • when people don't know who you are • when you are the person who gets bullied • someone who is mean for a long amount of time
CYBER SAFETY 2020-10-24
13 Clues: bbbb • gggg • ffff • ttttt • dddddddddd • ffffffffff • ffffffffff • fffffffffff • hhhhhhhhhhhhh • rrrrrrrrrrrrrr • ffffffffffffff • ffffffffffffffff • The act of presenting someone else'es work
Cyber Ally 2023-02-01
Across
- Someone who stands up for another person
- What an ally spreads online
- Where can cyberbullying occur
- Where can cyberbullying occur
- Intentionally hurting someone over a period of time with a power imbalance
- Where can cyberbullying occur
- What to do before putting something online
- What to do if you/someone else is cyberbullied
Down
- An app that you can anonymously report bullying
- Trying to get someone OUT of trouble
- Someone who stands and watches bullying
- Just trying to get someone in trouble
- A negative effect of cyburbullying
- What to do if you are cyberbullied
14 Clues: What an ally spreads online • Where can cyberbullying occur • Where can cyberbullying occur • Where can cyberbullying occur • A negative effect of cyburbullying • What to do if you are cyberbullied • Trying to get someone OUT of trouble • Just trying to get someone in trouble • Someone who stands and watches bullying • Someone who stands up for another person • ...
Cyber Crossword 2023-05-22
Across
- some free thing can give you -------
- using vulgar language is called -------
- people stealing your id
- don't add people you don't know
- you should not tell people where you live in ----------
Down
- means someone bullying another person on a device
- Swearing or saying mean things
- don't share your login
- people stealing your work
- don't tell people your ----
- if you share -------- online people can find your location
- stay safe while you are ------
12 Clues: don't share your login • people stealing your id • people stealing your work • don't tell people your ---- • Swearing or saying mean things • stay safe while you are ------ • don't add people you don't know • some free thing can give you ------- • using vulgar language is called ------- • means someone bullying another person on a device • ...
Cyber Gym 2024-11-20
Across
- Don't act in a ......
- Be ...... of obvious errors
- Using phone calls to deceive victims into providing sensitive information
- Withdrawals from their ...... account
- Computer scam to obtain confidential data like passwords, codes, pins, credit card numbers from the victim
- Don't ...... or open suspicious emails
Down
- ...... can be committed at the expense of the victim
- Similar to spear phishing but aimed at high-profile targets like CEOs or CFOs
- Legit email received
- The scammer's ultimate goal is to extort ...... or even steal the victim's identity
- Check the ...... email address
- Don't trust ...... emails
12 Clues: Legit email received • Don't act in a ...... • Don't trust ...... emails • Be ...... of obvious errors • Check the ...... email address • Withdrawals from their ...... account • Don't ...... or open suspicious emails • ...... can be committed at the expense of the victim • Using phone calls to deceive victims into providing sensitive information • ...
Cyber ethics 2025-05-29
12 Clues: Sea animals • Has a trunk • Flying mammal • Flying animal • Tallest animal • Fastest animal • Eat love banna • Slowest animal • Large marsupial • Helps to travell • Man's best friend • Likes to chase mice
Cyber Ethics 2025-06-07
Across
- It refers to unwanted bulk of email that comes from a
- It refers to being aware of the ethical practices.
- It is a legal right granted by law to the creator for his
- PIRACY: when a software is copied and distributed illegally, it is
- work.
- sources.
Down
- It refers to the act of using or imitating the language
- FOOTPRINT: It is an impression or information about a person that exists
- the internet because of his online activity.
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- thoughts of another person as one's original work.
12 Clues: work. • sources. • the internet because of his online activity. • It refers to being aware of the ethical practices. • thoughts of another person as one's original work. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • It refers to an illegal intrusion into a computer system • ...
Cyber Ethics 2025-06-07
Across
- It refers to unwanted bulk of email that comes from a
- It refers to being aware of the ethical practices.
- It is a legal right granted by law to the creator for his
- PIRACY: when a software is copied and distributed illegally, it is
- work.
- sources.
Down
- It refers to the act of using or imitating the language
- FOOTPRINT: It is an impression or information about a person that exists
- the internet because of his online activity.
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- thoughts of another person as one's original work.
12 Clues: work. • sources. • the internet because of his online activity. • It refers to being aware of the ethical practices. • thoughts of another person as one's original work. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • It refers to an illegal intrusion into a computer system • ...
Monetary Policy 2025-01-14
Across
- Lowers the discount rate
- Which leads to an increase in _____ Supply
- If the FED buys a security, this will lead to a _____ in money supply
- If someone deposits money into the bank from _______ a government security it will give the bank the ability to issue more loans.
- If the FED sells a security, this will cause for a ____ number of jobs
- and can make fewer ______
- Bankers shy away from the higher ______rates and take out fewer loans.
- An increase in production happens when the FED _____ a security
- When banks give the FED money it causes the bank to have less money on ______
Down
- and lower _____ rates
- The _____________ system is able to increase or decrease the amount of money in circulation by buying or selling government
- or by changing the discount rate
- A slowdown in production happens when the FED _____ a security
- Member banks take advantage of the lower rate and _______more money.
- a set of actions to control a nation's overall money supply, and achieve economicgrowth
15 Clues: and lower _____ rates • Lowers the discount rate • and can make fewer ______ • or by changing the discount rate • Which leads to an increase in _____ Supply • A slowdown in production happens when the FED _____ a security • An increase in production happens when the FED _____ a security • Member banks take advantage of the lower rate and _______more money. • ...
Crossword 08 2023-10-25
Across
- refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
- refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring;
- Pornography refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
- refers to gathering and receiving information;
- Authority refers to the DOJ – Office of Cybercrime;
- Authority refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be;
- data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
- Data refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic data.
- refers to a computer or a computer network, the electronic medium in which online communication takes place;
- refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
- value refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
Down
- refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
- system refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media
- infrastructure refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
- refers to the modification or change, in form or substance, of an existing computer data or program;
- program refers to a set of instructions executed by the computer to achieve intended results;
- refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet;
- refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
- refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network;
20 Clues: refers to gathering and receiving information; • Authority refers to the DOJ – Office of Cybercrime; • program refers to a set of instructions executed by the computer to achieve intended results; • refers to the modification or change, in form or substance, of an existing computer data or program; • ...
Domestic and International Airports 2017-09-10
Across
- Is the 3 letter code for the Kapiti Coast
- Acronym for Ministry of Agriculture and Forestry
- This has been dramatically increased after the September 11 2001 attack
- A lounge at the Auckland Airport operated by Air New Zealand
- An area accessible to everyone, including those who are not travelling
- The official provider of aviation security services in New Zealand
- You enter this area once you pass through passport control and Security at the Auckland International Airport
- Free facilities for transit passengers
- A small item that will be confiscated off you at security due to its risk of having the potential to self ignite
Down
- An official document issued by a government; certifies holders identity and citizenship
- A company located in check-in area which enables travellers to have their luggage sealed for protection
- Located landside, person travelling will need to present passport, ticket and luggage here
- Auckland Airport will combine international and domestic _____ as early as 2019
- A currency exchange company that can be found both landside and airside
- A machine in which a conveyer belt move items through in order to ensure security and safety
- A place where airplanes arrive and take off
- Home of the Worlds longest runway
- A form of transport available to take you between the 2 Auckland Airport terminals
- A word that you should not use in or around the Airport areas
- A facility used by those who wish to pray before a flight
20 Clues: Home of the Worlds longest runway • Free facilities for transit passengers • Is the 3 letter code for the Kapiti Coast • A place where airplanes arrive and take off • Acronym for Ministry of Agriculture and Forestry • A facility used by those who wish to pray before a flight • A lounge at the Auckland Airport operated by Air New Zealand • ...
Bullying - jayden 2023-03-21
Alliance Holiday Puzzle 2021-12-07
Across
- Dog made famous in the Grinch
- One division of Alliance
- Covers your ears on a cold day, pom-pom optional
- Treat left behind for Santa
- Tree Glitter
- Winter drink served with marshmallows
- role on the Security side of Alliance
- Treats left for Rudolph
- One of the reindeer; not Rudolph
- role on the Communications side of Alliance
- Green character from Whoville
- Frosty was made of this
- A celebration for the rest of us, from Seinfeld
Down
- Catch Santa on a security one
- gifts go under this
- One division of Alliance
- Charles ________, author of "A Christmas Carol"
- Chocolate countdown to December 24th
- used for Hanukkah celebration
- decorations for your tree
- December drink with a love/hate reputation
- Another word for sled
- Covers your hands on the cold days
- something that is left out for Santa
24 Clues: Tree Glitter • gifts go under this • Another word for sled • Treats left for Rudolph • Frosty was made of this • One division of Alliance • One division of Alliance • decorations for your tree • Treat left behind for Santa • Catch Santa on a security one • Dog made famous in the Grinch • used for Hanukkah celebration • Green character from Whoville • One of the reindeer; not Rudolph • ...
Investing-David V 2025-03-27
Across
- currencies backed up by government
- age to get social security
- good for people with low risk tolerance
- managed by employer
- never forget rule one
- age to invest in crypto
- rising stocks
- transfer funds to different plan
- funds saved only for emergencies
- contributions made post tax
Down
- president that created social security
- government health care plan
- social security Medicare tax
- at age 67 you get these full benefits
- CEO of Berkshire Hathaway
- the ceo of this is warren buffet
- falling stocks
- company requiring you to work a certain amount of time
- an example of a job that is government based
- a sum of money available for a particular purpose
- virtual currency
- system of recording info so it can’t get hacked
22 Clues: rising stocks • falling stocks • virtual currency • managed by employer • never forget rule one • age to invest in crypto • CEO of Berkshire Hathaway • age to get social security • government health care plan • contributions made post tax • social security Medicare tax • the ceo of this is warren buffet • transfer funds to different plan • funds saved only for emergencies • ...
Operating Systems and Security 2025-09-23
Across
- - Google's mobile operating system used on smartphones, tablets, and wearable devices.
- - To convert information into a code to prevent unauthorized access.
- - Security vulnerability that prompts software companies to release emergency updates.
- - System privilege that should only be granted to employees who require it.
- - File system capability that tracks changes before execution to prevent data loss.
- - The method by which users communicate and control their computer system.
- - Microsoft's advanced file system that replaced the older FAT32 format for better performance
- - Social media account settings that should be set to private for better security.
- - Personal verification process needed before accepting social media friend requests.
Down
- - File identifiers like .jpg or .docx that indicate the file type and format. FIRMWARE - Software that directly controls specific hardware devices connected to a computer system
- - Internet software that should prioritize security features over convenience.
- - System resource that the operating system must efficiently allocate to running programs.
- - File system feature that reduces storage space but increases file opening time.
- - Software program that may request excessive permissions to access personal data.
- - Digital service that stores instant messages on their servers permanently.
- - Computer environment that requires hard drive encryption and screen locking for security.
- - Data collection practice that privacy-focused search engines avoid doing.
- - A secret combination of characters used to authenticate a user’s identity.
- - Internet software that should prioritize security features over convenience.
- - Small data files stored by websites to remember user preferences and track activity.
- - Security feature that only allows approved websites and applications to run.
21 Clues: - To convert information into a code to prevent unauthorized access. • - The method by which users communicate and control their computer system. • - System privilege that should only be granted to employees who require it. • - Data collection practice that privacy-focused search engines avoid doing. • ...
CPSC 4240 - Linux Security 2026-03-30
Across
- front-facing software vulnerable to malicious actors
- hiding data in a large media file
- system in which data is written to a file instead of being written directly to the file system to minimize the chance of file corruption
- a software update meant to fix security issues
- value used in hashing to reduce collisions
- data about file data
- malware that affected an Iranian nuclear power facility in 2010
- a large kernel that runs all its modules in kernel space
- a user with elevated privileges within the system
- one of the greatest and most unpredictable treats to a network system
- essential to have in case of system failure, damage, sabotage, etc.
- defense in _____: having multiple layers of security
Down
- command to safely detach an external file system
- automated test used to verify human users and detect bots
- security measure meant to filter network traffic
- security that is inconspicuous
- using an algorithm and key to hide data from outside parties
- authentication methods such as fingerprints, iris scans, and face recognition
- command used to safely edit the etc/sudoers file
- file containing usernames and hashes of their passwords
- devices that can be attached or removed without rebooting the system
- not telling malicious actors what kinds of security measures are in place
- value used to determine the permissions of a newly-created file or directory
- data structure that contains information about a file or directory, including the location of its contents
24 Clues: data about file data • security that is inconspicuous • hiding data in a large media file • value used in hashing to reduce collisions • a software update meant to fix security issues • command to safely detach an external file system • security measure meant to filter network traffic • command used to safely edit the etc/sudoers file • ...
A+ 2025-02-11
Across
- A common method for securing Wi-Fi networks.
- A software used to detect and remove malware.
- A Windows utility that displays real-time network usage.
- A Windows command used to format a disk.
- A network protocol used to automatically assign IP addresses.
- A form of authentication that uses fingerprints or facial recognition.
- A Windows component used to view system performance and logs.
- A tool for managing group policies in Windows.
- A network security system that monitors and filters incoming/outgoing traffic.
Down
- A security method that removes unnecessary user privileges.
- A security setting requiring a user to change their password after a period.
- A Linux command used to move files.
- A security setting that locks a user account after too many failed logins.
- A bootable Windows environment used for troubleshooting.
- A process that translates domain names into IP addresses.
- A Linux command used to change file permissions.
- A Windows command used to display active network connections.
- A Linux command used to list directory contents.
18 Clues: A Linux command used to move files. • A Windows command used to format a disk. • A common method for securing Wi-Fi networks. • A software used to detect and remove malware. • A tool for managing group policies in Windows. • A Linux command used to change file permissions. • A Linux command used to list directory contents. • ...
La seguridad y los accidentes 2023-02-21
14 Clues: to land • seatbelt • accident • insurance • to reduce • dangerous • prohibited • to take off • traffic jam • customs agent • notice;warning • safety;security • security measures • to fasten seatbelt
Cyber Manners 2017-09-20
Across
- a person who commits a crime
- to say unkind things about somebody
- to make somebody feel stupid and ashamed
- falsh
- a synonym for puberty or the period between childhood and adulthood
- when you do not know a person's name
Down
- making you feel serious and think carefully
- to be sent permanently away from an institution, for instance school
- not being allowed to attend a certain school (noun)
- when you cannot find out where something comes from
- to make fun of in an unfriendly way
- causing someone to feel offended
12 Clues: falsh • a person who commits a crime • causing someone to feel offended • to say unkind things about somebody • to make fun of in an unfriendly way • when you do not know a person's name • to make somebody feel stupid and ashamed • making you feel serious and think carefully • not being allowed to attend a certain school (noun) • ...
Cyber Manners 2017-09-20
Across
- to say unkind Things about somebody
- a person WHO commits a crime
- causing someone to feel offended
- to force somebody to leave school
- to make somebody feel ashamed and stupid
- making you feel serious and think carefully
Down
- puberty, or the period between childhood and adulthood
- when you cannot find out where somthing comes from
- not being allowed to attend school
- when you do not know a person's name
- false
- to make fun of somebody in an unfriendly way
12 Clues: false • a person WHO commits a crime • causing someone to feel offended • to force somebody to leave school • not being allowed to attend school • to say unkind Things about somebody • when you do not know a person's name • to make somebody feel ashamed and stupid • making you feel serious and think carefully • to make fun of somebody in an unfriendly way • ...
cyber bullying 2024-04-23
Across
- The act of intentionally excluding or isolating someone from an online group or community
- Pretending to be someone else online in order to harass or deceive them
- FOOTPRINT A digital representation of a person's online presence and activities
- The act of harassing, threatening, or embarrassing others online
- A type of online harassment that involves repeatedly sending unwanted messages
- The emotional or psychological harm caused by cyberbullying
- MEDIA An online platform or community where people can share and interact with content
- LITERACY The use of digital tools and resources to create and share content
- A false or misleading piece of information spread online, often to cause harm
Down
- A person who stands up against bullying and supports the victim
- The practice of protecting one's personal information and privacy online
- Sharing private or embarrassing information about someone online without their consent
- The practice of using electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- A network of interconnected web pages, also known as the "World Wide Web"
- CITIZENSHIP The ability to use technology and the internet in a safe, responsible, and ethical manner
15 Clues: The emotional or psychological harm caused by cyberbullying • A person who stands up against bullying and supports the victim • The act of harassing, threatening, or embarrassing others online • Pretending to be someone else online in order to harass or deceive them • The practice of protecting one's personal information and privacy online • ...
Cyber travel 2024-06-20
12 Clues: this is pixel • this is email • this is picnic • this is trojan • this is tiktok • this is cookie • this is camping • this is chatgpt • this is tourist • this is bluetooth • this is a festival • this is a souvenir
Cyber Safety 2023-09-14
Across
- Malware that requires the victim to pay a ransom to access encrypted files.
- criminals who break into computer networks with malicious intent.
- two words creates and stores strong passwords
- sending, posting, or sharing negative, harmful, false, or mean content about someone else.
- two words. long (phrases or sentences) that mix capital and lowercase letters, numbers, and symbols
Down
- Malicious software
- The numeric address of a computer on the internet
- A Private Network that ensures your anonymity on the internet
- Which social media platform is a hackers’ favorite
- Software used to protect a computer from viruses
- Main component of a server
- unwanted email messages
12 Clues: Malicious software • unwanted email messages • Main component of a server • two words creates and stores strong passwords • Software used to protect a computer from viruses • The numeric address of a computer on the internet • Which social media platform is a hackers’ favorite • A Private Network that ensures your anonymity on the internet • ...
Cyber law 2023-08-23
12 Clues: jauh • hak merk • community • menggunggah • penggabungan • keamanan pribadi • ruang/dunia maya • pencemaran nama baik • penyampaian informasi • hak cipta/hak intelektual • pencurian melalui internet • kejahatan melalui dunia maya
cyber bullying 2021-05-06
12 Clues: :( • 000 • not right • by yourself • it will be... • being careful • a way of death • a mental illness • an act of bullying • a way someone cyberbullies • the main people who do this • someone repetitively picking on you
CYBER CROSSWORD 2021-09-02
Across
- The process of converting analogue data into digital form.
- A global domain within the information environment consisting of the interdependent network of information systems.
- Act of sending unsolicited e-mails.
- The process of exploring and analyzing large blocks of information to glean meaningful patterns and trends.
- The worldwide network of economic activities enabled by information and Communications Technologies.
- The primary law in India dealing with Cybercrime and E-Commerce.
- The process of preventing unauthorized people from reading the data that is transmitted over your wireless network.
Down
- The use of information and communication technology in political and governance processes.
- A program that disrupts the normal functioning of your computer systems.
- The Adoption or increase in the use of digital or computer technology by an organization, industry etc.
- The programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
- A small text file created by a website that is stored in the user's computer for recognizing and keeping track of the user's preferences.
12 Clues: Act of sending unsolicited e-mails. • The process of converting analogue data into digital form. • The primary law in India dealing with Cybercrime and E-Commerce. • A program that disrupts the normal functioning of your computer systems. • The use of information and communication technology in political and governance processes. • ...
Cyber Ethics 2025-06-14
Across
- – Using someone else's ideas or words as your own work
- – Unwanted bulk emails from unknown sources
- – Following internet manners and being respectful
- – Ethical use of computers, internet, and digital content
- – Legal rights over one’s creative work or inventions
- – Rules about right and wrong use of computers and internet
Down
- – Important thing to protect while using digital platforms
- – Illegal intrusion into a computer system or network
- – The online trail left by your internet activity
- – Moral principles that guide right or wrong actions online
- – Good behavior and manners while using the internet
- – Stealing software by copying it illegally
- – Something made or invented by a person
- – The right to control what personal data is shared online
- – Copying and sharing software without permission
15 Clues: – Something made or invented by a person • – Unwanted bulk emails from unknown sources • – Stealing software by copying it illegally • – The online trail left by your internet activity • – Following internet manners and being respectful • – Copying and sharing software without permission • – Good behavior and manners while using the internet • ...
Cyber terms 2022-02-10
Across
- passthrough for IPsec
- blocks the use of proxy servers
- blocks internet requests from unknown sources
- prevents a local computer from using a URL or IP address to gain access to the local server
Down
- Legacy firewall
- Point to Point
- blocks multicast
- blocks Java
- blocks ActiveX
- blocks cookies
- layer two tunnelling protocol pass through
- keeps port 113 from being scanned by devices
12 Clues: blocks Java • Point to Point • blocks ActiveX • blocks cookies • Legacy firewall • blocks multicast • passthrough for IPsec • blocks the use of proxy servers • layer two tunnelling protocol pass through • keeps port 113 from being scanned by devices • blocks internet requests from unknown sources • ...
Cyber Crossword1 2022-07-18
12 Clues: Flaw • The traid • Form of Malware • ISACA certification • likely cause danger • Hide the true meaning • login with a single ID • Security Operations center • Making it inaccessible to users • Type of Social Engineering attack • software to harm or exploit any device • controls incoming and outcoming traffic
Cyber Awareness 2025-11-06
Across
- Attack that overwhelms a system with massive fake traffic.
- General term for malicious software.
- Login method requiring two forms of authentication.
- An update that fixes security vulnerabilities in software.
- Network security system that blocks unauthorized access.
- Software or hardware that records everything typed.
Down
- A network of compromised computers controlled remotely
- Unauthorized access to sensitive systems or data.
- A vulnerability that hackers exploit before it’s patched.
- A fake email scam designed to steal personal information.
- Self-replicating program that spreads without human help.
- Malware that locks files and demands payment.
12 Clues: General term for malicious software. • Malware that locks files and demands payment. • Unauthorized access to sensitive systems or data. • Login method requiring two forms of authentication. • Software or hardware that records everything typed. • A network of compromised computers controlled remotely • Network security system that blocks unauthorized access. • ...
Cyber Ethics 2025-05-23
Across
- Fully connected topology
- Wireless Network
- Topology with backbone cable
- Illegal Intrusion in a computer via internet
- Responsible Behaviour
- wireless fidelity
- Legal right for original creator for his/her own work
Down
- Sender transform data into unreadable code
- All nodes are connected via a central device
- Network Within a city
- Connected devices in network
- Use single user software in multiple system
- Network across the world
13 Clues: Wireless Network • wireless fidelity • Network Within a city • Responsible Behaviour • Fully connected topology • Network across the world • Connected devices in network • Topology with backbone cable • Sender transform data into unreadable code • Use single user software in multiple system • All nodes are connected via a central device • ...
Cyber Ethics 2025-06-07
Across
- It refers to unwanted bulk of email that comes from a
- It refers to being aware of the ethical practices.
- It is a legal right granted by law to the creator for his
- PIRACY: when a software is copied and distributed illegally, it is
- work.
- sources.
Down
- It refers to the act of using or imitating the language
- FOOTPRINT: It is an impression or information about a person that exists
- the internet because of his online activity.
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- thoughts of another person as one's original work.
12 Clues: work. • sources. • the internet because of his online activity. • It refers to being aware of the ethical practices. • thoughts of another person as one's original work. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • It refers to an illegal intrusion into a computer system • ...
Cyber Ethics 2025-06-07
Across
- It refers to unwanted bulk of email that comes from a
- It refers to being aware of the ethical practices.
- It is a legal right granted by law to the creator for his
- PIRACY: When a software is copied and distributed illegally, it is
- work.
- sources.
Down
- It refers to the act of using or imitating the language
- FOOTPRINT: It is an impression or information about a person that exists
- the internet because of his online activity.
- It refers to an illegal intrusion into a computer system
- It is the process of transforming data into an unreadable code.
- thoughts of another person as one's original work.
12 Clues: work. • sources. • the internet because of his online activity. • It refers to being aware of the ethical practices. • thoughts of another person as one's original work. • It refers to unwanted bulk of email that comes from a • It refers to the act of using or imitating the language • It refers to an illegal intrusion into a computer system • ...
Security Service Management 2023-11-30
Across
- This system requires lesser manpower and is more efficient.
- Hospital security systems are implemented through ________ deployment and electronic security.
- _________ system is the most common electronic security system used in hospitals.
- The areas of focus of security service management in a hospital are properties of the hospital and patients, _______ and the hospital fixtures.
- The space where all activities in a hospital are observed.
Down
- Security personnel to be deployed undergo _______ prior to recruitment.
- The security cameras must be enabled with the provision of _________ at all times.
- This system is installed to prevent any breach of security of fiddling.
- The _________ team would make rounds at different areas of the hospital.
- The electronic security system uses ______ for surveillance and monitoring purposes.
10 Clues: The space where all activities in a hospital are observed. • This system requires lesser manpower and is more efficient. • Security personnel to be deployed undergo _______ prior to recruitment. • This system is installed to prevent any breach of security of fiddling. • The _________ team would make rounds at different areas of the hospital. • ...
Angryword 2021-09-06
Across
- cyber attack leg joint
- return to multiple boiled porks
- 1000 year card game
- lots of males look
- ale maker road
- Dutch car stop
- Ash's friend healthy green space
- west country gaff
Down
- cover up postpone
- knighthood five scientific suffix
- aircraft tilt position to left or right
- red cheese rectangle
- bacon country mound
- alcohol processor 8 ball game road
- broken glass
15 Clues: broken glass • ale maker road • Dutch car stop • cover up postpone • west country gaff • lots of males look • 1000 year card game • bacon country mound • red cheese rectangle • cyber attack leg joint • return to multiple boiled porks • Ash's friend healthy green space • knighthood five scientific suffix • alcohol processor 8 ball game road • aircraft tilt position to left or right
Law Enforcement in TV 2023-10-20
Across
- Starring Larry Wilcox and Erik Estrada
- Dr. Reid works for this FBI unit (abbreviation)
- Reality, famous theme song
- Brennan & Booth
- Famous gavel noise
- Springfield's police chief
- 21 Jump ____
- Cagney & _____
Down
- Knight Rider's artificially intelligent car
- "Just one more thing..."
- Stylish 80s series
- Miami, NY, Cyber
- Chicago Med, Fire, and _____
- Nine-Nine, stars Andy Samburg
- Recently reached 20th season on CBS
15 Clues: 21 Jump ____ • Cagney & _____ • Brennan & Booth • Miami, NY, Cyber • Stylish 80s series • Famous gavel noise • "Just one more thing..." • Reality, famous theme song • Springfield's police chief • Chicago Med, Fire, and _____ • Nine-Nine, stars Andy Samburg • Recently reached 20th season on CBS • Starring Larry Wilcox and Erik Estrada • Knight Rider's artificially intelligent car • ...
Cybersecurity Month 2025-10-03
Across
- Unauthorized access to data
- Network security barrier
- Software update to fix vulnerabilities
- Fraudulent attempt to get personal information
- Malicious software that demands payment
- Local tribal community hosting IT services
- Measures to protect information and systems
Down
- Name of the tribal nation
- IT support for users
- Extra layer of login security
- Software designed to damage or gain unauthorized access
- Secret code to access accounts
- Secure remote network connection
- Process of converting data to unreadable format
- Copy of data for recovery
15 Clues: IT support for users • Network security barrier • Name of the tribal nation • Copy of data for recovery • Unauthorized access to data • Extra layer of login security • Secret code to access accounts • Secure remote network connection • Software update to fix vulnerabilities • Malicious software that demands payment • Local tribal community hosting IT services • ...
Information Security Terms 2024-01-31
Across
- Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- A software vulnerability that is exploited by attackers before the vendor releases a fix.
- of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- The process of converting data into a code to prevent unauthorized access.
- Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- Software designed to detect and remove malicious software from a computer.
- The process of verifying the identity of a user, system, or device.
- Security: Security measures to protect network endpoints, such as computers and mobile devices.
- Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- A network security device that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- A software update designed to fix vulnerabilities or improve security.
16 Clues: The process of verifying the identity of a user, system, or device. • A software update designed to fix vulnerabilities or improve security. • Software designed to detect and remove malicious software from a computer. • The process of converting data into a code to prevent unauthorized access. • ...
Darragh cyber safety 2016-06-07
Across
- people who help you get rid of the hackers
- thing that you can play video games
- things that are your special things
- big site where hackers can hack into things
- things are your personal things
- people sticking their heads in.
- ups adds that automatically appear on your device
- you need to be careful when doing this
Down
- people who will help you with bully's
- shutting down your device.
- someone who pretends to be nice but the
- safety things
- a device that you can go on line
- to get something on your
- someone who tries to be mean on line
- a thing that allows someone to speak to you
- word or numbers that allows you to go on to a device
- people who are getting rid of your things on line.
- things that everyone can see
19 Clues: safety things • to get something on your • shutting down your device. • things that everyone can see • things are your personal things • people sticking their heads in. • a device that you can go on line • thing that you can play video games • things that are your special things • someone who tries to be mean on line • people who will help you with bully's • ...
The Cyber Gridlock 2026-01-15
Across
- I fail once and many may feet it
- I look real, I sound real but i am not real
- Password go in, Scrambled digits come out
- Your files still exist, but you can't touch them unless you pay me
- I answer without understanding, yet sound like I do
- I wake the system up before it can do anything
- Letting code play without letting it break anything
- A tool that conceals malicious activity at the core level
Down
- James Bond espionage but with WiFi
- Every key you press tells me a secret
- I am strongest when I make no sense
- Flaw exploited before anyone knows
- I make you pay the electricity bill while i earn the coins
- I am software, but I like Hardware
- I understand only Zeros and ones, yet do everything
- silent zombies working together for cyber attack
- Delay before data begins to transfer
- Inbox filler no one asked for
- Two symbols endless meaning
19 Clues: Two symbols endless meaning • Inbox filler no one asked for • I fail once and many may feet it • James Bond espionage but with WiFi • Flaw exploited before anyone knows • I am software, but I like Hardware • I am strongest when I make no sense • Delay before data begins to transfer • Every key you press tells me a secret • Password go in, Scrambled digits come out • ...
Cybersecurity 2024-03-18
Across
- stalking through web technology
- Process of confirming someone's identity
- Protection against potential harm
- Malware that can collect/transmit user data without the user's knowledge
- Malware designed to restrict access
- Illegal activity done on the internet
- Unlocking encrypted information
- free from public attention
- False claims to get private information
Down
- Network security monitors/controls incoming and outgoing traffic
- Security threat from within company
- hacker who is highly motivated by principles
- Information converted into secret form
- Someone who tries to gain access without authorization
- Software that delivers ads on your system
- Unwanted emails from unknown senders
- Bullying on the internet
- Gaining access an undocumented way
- Malicious software designed to infect
- File from website that stores your info
- collection of malware that spreads through computer
21 Clues: Bullying on the internet • free from public attention • stalking through web technology • Unlocking encrypted information • Protection against potential harm • Gaining access an undocumented way • Security threat from within company • Malware designed to restrict access • Unwanted emails from unknown senders • Illegal activity done on the internet • ...
Investing-David 2025-03-25
Across
- transfer funds to different plan
- age to get social security
- good for people with low risk tolerance
- currencies backed up by government
- company requiring you to work a certain amount of time
- at age 67 you get these full benefits
- an example of a job that is government based
- CEO of Berkshire Hathaway
- managed by employer
- age to invest in crypto
- rising stocks
Down
- government health care plan
- system of recording info so it can’t get hacked
- contributions made post tax
- the ceo of this is warren buffet
- virtual currency
- funds saved only for emergencies
- social security Medicare tax
- never forget rule one
- falling stocks
- a sum of money available for a particular purpose
- president that created social security
22 Clues: rising stocks • falling stocks • virtual currency • managed by employer • never forget rule one • age to invest in crypto • CEO of Berkshire Hathaway • age to get social security • government health care plan • contributions made post tax • social security Medicare tax • transfer funds to different plan • the ceo of this is warren buffet • funds saved only for emergencies • ...
Cybersecurity 2023-09-07
Across
- a computer infection
- protects organizations on internet attacks
- locks databases
- gives a scammer access to your personal computer
- security for computers
- information
- faking
- to save something
Down
- deceive people into giving up their personal info
- ransomeware
- authentication method (2)
- to ensure protection
- worker
- when something isnt safe
- protecting information
- desktop
- authentication method
- scammers that impersonate a business
- when a virus spreads
- damages
20 Clues: worker • faking • desktop • damages • ransomeware • information • locks databases • to save something • a computer infection • to ensure protection • when a virus spreads • authentication method • protecting information • security for computers • when something isnt safe • authentication method (2) • scammers that impersonate a business • protects organizations on internet attacks • ...
nin26 2024-07-03
Across
- Data transfer rate
- Unwanted email
- Clickable link
- Access code
- Saved URL
- Login name
- Data security
- Very large data unit
- Restart computer
- Processor speed
- Programming rules
- Data unit
Down
- Windows feature
- Network security
- Computer chip material
- Online scam
- Computational process
- Computer protection
- Onscreen pointer
- Trash bin icon
- Massive data unit
- Software addon
- Background image
- Main screen
- Large data unit
25 Clues: Saved URL • Data unit • Login name • Online scam • Access code • Main screen • Data security • Unwanted email • Clickable link • Trash bin icon • Software addon • Windows feature • Processor speed • Large data unit • Network security • Onscreen pointer • Restart computer • Background image • Massive data unit • Programming rules • Data transfer rate • Computer protection • Very large data unit • ...
"The Retirement Blueprint Crossword Collection Vol. 1" 2026-04-02
Across
- Annual Social Security document showing your earnings history
- The list of prescription drugs covered by your Medicare Part D plan
- Medicare ___ — covers doctor visits and outpatient care
- Benefit that lets a husband or wife claim up to 50% of their partner's amount
- Adjusting your investments to return to your target asset mix
- Waiting past full retirement age to collect — increases your check
- Type of IRA where contributions may be tax-deductible
- Your complete collection of investments
- The gradual rise in prices that erodes purchasing power over time
- The monthly payments you receive from Social Security
- ___ plan — extra coverage that fills Medicare gaps
- Free money your company adds when you contribute to your 401k
- Money coming in during retirement from all sources
- Amount you pay before your insurance coverage kicks in
- Everything you own that will be passed on after you die
- Monthly payment you make to keep your insurance coverage active
- Annual window when you can change your Medicare or insurance planUp to 85% of your Social Security income may be ___ by the IRS
- Group of doctors and hospitals that accept your insurance plan
- Required Minimum ___ — mandatory withdrawal starting at age 73 (abbr.)
- What you leave behind — financially and personally — for future generations
- Work units you earn each year; you need 40 to qualify for Social Security
- Type of Social Security benefit paid to a deceased worker's spouse or child
Down
- Taking money out of your retirement savings account
- The money you put into your retirement account each year
- The schedule that determines when employer contributions become fully yours
- Legal arrangement to hold and transfer assets to loved ones
- The age at which you qualify for 100% of your Social Security
- Moving your 401k balance to an IRA without paying taxes
- Fixed fee you pay each time you visit a doctor
- A loan you make to a government or company that pays interest
- Federal health insurance program that starts at age 65
- Social Security income for those unable to work due to health conditions
- The Retirement ___ — your personalized plan for financial freedom
- ___ fund — investment that tracks a market benchmark like the S&P; 500
- Supplemental Security Income — program for low-income seniors (abbr.)
- Regular cash payment made to shareholders from company profits
- Social Security Insurance — disability program abbreviation
- Taking Social Security before full retirement age, starting at 62
- The company that may match a portion of your 401k deposits
- Annual adjustment that protects your benefit from inflation (abbr.)
- ___ of returns risk — retiring during a market downturn hurts long-term wealth
- ___ contribution — extra amount workers 50+ can add to retirement accounts
- Insurance product that provides guaranteed income for life
- ___Elimination Provision — reduces benefits for some government workers
- The person named to receive your assets or insurance payout
- ___ of Attorney — legal document giving someone authority to act for you
- ___ risk — the chance of outliving your retirement savings
- Health Savings Account — tax-free account for medical expenses (abbr.)
- ___ IRA — retirement account funded with after-tax dollars
49 Clues: Your complete collection of investments • Fixed fee you pay each time you visit a doctor • ___ plan — extra coverage that fills Medicare gaps • Money coming in during retirement from all sources • Taking money out of your retirement savings account • Type of IRA where contributions may be tax-deductible • The monthly payments you receive from Social Security • ...
Indústria 4.0 2023-02-24
Thanksgiving crossword puzzle 2022-11-30
12 Clues: too eat • thankful • mom and dad • after lunch • Cyber Monday • american football • to give to some one • people really close to u • from the Latin peregrinus • the mount of thanksgiving • what macy dose on thanksgiving • some thing u thourw in a pot and cook it
INFORMATIKA SEKARANG DAN MASA DEPAN 2025-08-26
Across
- Proses olah data jadi informasi
- Terjemahan Artificial Intelligence
- Data Kumpulan data sangat besar
- Perlindungan data digital
- Chatbot termasuk teknologi
- Terjemahan cloud computing
- Mobil pintar tanpa sopir
- Menggali pola dari data
- Algoritma belajar dari data
Down
- Cara sehat gunakan media digital
- Serangan pencuri data digital
- Mesin otomatis yang membantu manusia
- Dunia buatan imersif
- Jaringan global penghubung
- Kecerdasan buatan komputer
- Singkatan teknologi penghubung perangkat
- Kemampuan memahami dunia digital
- Teknologi yang bisa menyesuaikan
- Perangkat sensor terhubung jaringan
- Komunikasi antar mesin otomatis
20 Clues: Dunia buatan imersif • Menggali pola dari data • Mobil pintar tanpa sopir • Perlindungan data digital • Jaringan global penghubung • Kecerdasan buatan komputer • Chatbot termasuk teknologi • Terjemahan cloud computing • Algoritma belajar dari data • Serangan pencuri data digital • Proses olah data jadi informasi • Komunikasi antar mesin otomatis • Cara sehat gunakan media digital • ...
General Cyber Terms 2021-08-03
Across
- open web application security program
- tricking users with fake usernames, emails or URLs
- using SMS for phishing attacks
- this control allows roll back to a previous development point
- demands money to unlock yr computer
- stealing information
- retending to be a reputable person / entity to induce the disclorure of sensitive info
- appears a safe program but creates a PC backdoor
- a type of eavesdropping attack by a 3rd party
Down
- redirecting users to false websites that imitate the legitimate URL
- this sneak surfing type observes password entry from "behind" the person
- process of catching things that live in water
- a phishing type target someone with something of value
- 'zombie' computer launching DDoS attacks
- infects host with spam, unwanted ads, hijacks browser, etc
- take advantage of a vulnerability
- a form of mining
- unauthorised computer access
- malicious software
19 Clues: a form of mining • malicious software • stealing information • unauthorised computer access • using SMS for phishing attacks • take advantage of a vulnerability • demands money to unlock yr computer • open web application security program • 'zombie' computer launching DDoS attacks • process of catching things that live in water • a type of eavesdropping attack by a 3rd party • ...
Cyber & Digital Safety 2024-11-10
Across
- Australian agency providing tools and support for staying safe online.
- Settings that help control who can view your information online.
- An online trick designed to steal money or personal information.
- Notifying a trusted adult or platform about inappropriate content or behaviour.
- An extra layer of security for protecting online accounts.
- When someone uses your personal information to impersonate you.
- Capturing an image of your screen, sometimes used to save evidence.
- A counseling service providing support for kids in need of help.
- Pretending to be someone else online to deceive or manipulate others.
- Measures to protect devices and networks from digital threats.
Down
- Bullying or harassment that takes place online or through digital devices.
- The trail of data you leave online, like posts and searches.
- When someone builds trust with a minor online to exploit or harm them.
- The sharing of someone's private images without consent.
- Websites that are reliable and safe for information or purchases.
- Treating others well online and avoiding hurtful actions.
- False information spread online, often by mistake.
- The amount of time spent on devices with screens, like phones or tablets.
- Someone who supports others positively online, especially against bullying.
19 Clues: False information spread online, often by mistake. • The sharing of someone's private images without consent. • Treating others well online and avoiding hurtful actions. • An extra layer of security for protecting online accounts. • The trail of data you leave online, like posts and searches. • Measures to protect devices and networks from digital threats. • ...
Cyber-crossword 2017-03-01
Across
- applications that allow you to communicate with friends
- do not ... requests from strangers
- the ... web browse concerns us all
- an act of violence on the internet against another user
- an application which helps you contact with your friends
- you need to be sure of someone's ... before you start a conversation with them
Down
- when you are on the internet you are...
- you need to use the internet with ...
- the ... of cyberbullying
- protection of your on-line information
- browsing machine
- what you need to do if anything happens to you on-line
12 Clues: browsing machine • the ... of cyberbullying • do not ... requests from strangers • the ... web browse concerns us all • you need to use the internet with ... • protection of your on-line information • when you are on the internet you are... • what you need to do if anything happens to you on-line • applications that allow you to communicate with friends • ...
Cyber Law 2017-09-28
Across
- Any criminal activity associated with a computer.
- Transmitting computer viruses to people to destroy their computer system or files.
- The use of the computer to sabotage computer networks vital to the national welfare.
- The communication via computer or other electronic device of false data that damages a person's reputation.
- Intentionally disrupting, defacing, or even destroying a site.
Down
- An unwelcome intrusion into the private matters of an individual carried out or sustained by a computer.
- Area of the law which concerns computers and computer related crime.
- A crime that involves using a computer to steal computer data stored in a digital format.
- Any illegal activity already in the criminal code committed by using a computer.
- The use of information unlawfully obtained by computer to pressure a victim into granting a payoff to the blackmailer.
- A crime in which a cyber criminal falsely adopts the identity of anothor computer user in order to commit fraud.
- Involves the invasion, distortion, theft, falsification, misuse, destruction, or exploitation of information stored in or related to electronic devices.
12 Clues: Any criminal activity associated with a computer. • Intentionally disrupting, defacing, or even destroying a site. • Area of the law which concerns computers and computer related crime. • Any illegal activity already in the criminal code committed by using a computer. • Transmitting computer viruses to people to destroy their computer system or files. • ...
cyber safety 2013-11-03
Across
- network: when you chat to your friends
- too many advertisements had come up, and for you to press the wrong buttons,
- on the top of your laptop, it tells you the tabs you have opened.
- when you log in to your laptop
- when you are on the network and they are saying mean things about you.
- a person who breaks into your laptop without you knowing
- take notice to what you are doing on your laptop.
- when you need wi-fi you connect.
Down
- advertisements come up on your laptop and you have to click the exist button.
- transferring something on to your laptop
- when you can see the person whilst talking to them, but they are in a different location.
- to make sure the person is getting the information you send them (just like a message.
12 Clues: when you log in to your laptop • when you need wi-fi you connect. • network: when you chat to your friends • transferring something on to your laptop • take notice to what you are doing on your laptop. • a person who breaks into your laptop without you knowing • on the top of your laptop, it tells you the tabs you have opened. • ...
Cyber School 2024-08-15
12 Clues: рано • вместе • километры • далеко от • шесть часов • встречаться • день спорта • онлайн школа • разговаривать с • заниматься, учиться • по интернету / в интернете • отправлять по электронной почте
