cyber security Crossword Puzzles
Cyber Law 2017-09-28
Across
- Any criminal activity associated with a computer.
- Transmitting computer viruses to people to destroy their computer system or files.
- The use of the computer to sabotage computer networks vital to the national welfare.
- The communication via computer or other electronic device of false data that damages a person's reputation.
- Intentionally disrupting, defacing, or even destroying a site.
Down
- An unwelcome intrusion into the private matters of an individual carried out or sustained by a computer.
- Area of the law which concerns computers and computer related crime.
- A crime that involves using a computer to steal computer data stored in a digital format.
- Any illegal activity already in the criminal code committed by using a computer.
- The use of information unlawfully obtained by computer to pressure a victim into granting a payoff to the blackmailer.
- A crime in which a cyber criminal falsely adopts the identity of anothor computer user in order to commit fraud.
- Involves the invasion, distortion, theft, falsification, misuse, destruction, or exploitation of information stored in or related to electronic devices.
12 Clues: Any criminal activity associated with a computer. • Intentionally disrupting, defacing, or even destroying a site. • Area of the law which concerns computers and computer related crime. • Any illegal activity already in the criminal code committed by using a computer. • Transmitting computer viruses to people to destroy their computer system or files. • ...
cyber safety 2013-11-03
Across
- network: when you chat to your friends
- too many advertisements had come up, and for you to press the wrong buttons,
- on the top of your laptop, it tells you the tabs you have opened.
- when you log in to your laptop
- when you are on the network and they are saying mean things about you.
- a person who breaks into your laptop without you knowing
- take notice to what you are doing on your laptop.
- when you need wi-fi you connect.
Down
- advertisements come up on your laptop and you have to click the exist button.
- transferring something on to your laptop
- when you can see the person whilst talking to them, but they are in a different location.
- to make sure the person is getting the information you send them (just like a message.
12 Clues: when you log in to your laptop • when you need wi-fi you connect. • network: when you chat to your friends • transferring something on to your laptop • take notice to what you are doing on your laptop. • a person who breaks into your laptop without you knowing • on the top of your laptop, it tells you the tabs you have opened. • ...
Cyber School 2024-08-15
12 Clues: рано • вместе • километры • далеко от • шесть часов • встречаться • день спорта • онлайн школа • разговаривать с • заниматься, учиться • по интернету / в интернете • отправлять по электронной почте
Cyber Boo 2023-09-26
Across
- A group of words or letters that you type into a search engine to find something.
- What's the term for making a copy of important files so you don't lose them?
- What's the term for a secret code that you use to unlock your devices?
- What do you call the bad guys who try to trick you into giving them your personal information?
- What's the name of a program that can keep your computer safe from viruses?
- What should you avoid clicking on if it looks suspicious or too good to be true?
Down
- A type of computer attack that locks you out of your computer until you pay money.
- What should you set up on your computer to make sure only you can use it?
- The process of keeping your computer software up to date.
- A fake website or email designed to trick you into giving up personal information.
- What do you call a person who tries to hack into computers and steal information?
- The little picture or symbol you click on to open an app or program.
12 Clues: The process of keeping your computer software up to date. • The little picture or symbol you click on to open an app or program. • What's the term for a secret code that you use to unlock your devices? • What should you set up on your computer to make sure only you can use it? • What's the name of a program that can keep your computer safe from viruses? • ...
Cyber krzyżówka 2025-02-10
Across
- – Jak nazywa się technologia zapewniająca bezpieczne i prywatne połączenie z internetem?
- – Jak nazywają się niechciane wiadomości e-mail, często zawierające reklamy lub wirusy?
- – Jak nazywa się system zabezpieczeń sieciowych, który filtruje ruch internetowy?
- – Jak nazywa się tryb przeglądarki internetowej, który nie zapisuje historii przeglądania?
- – Jak nazywa się proces potwierdzania tożsamości użytkownika przed dostępem do systemu?
- – Jak nazywa się proces przekształcania danych w taki sposób, aby były nieczytelne dla osób nieuprawnionych?
- – Jak nazywa się złośliwe oprogramowanie, które może uszkodzić system komputerowy?
Down
- – Jak nazywa się oszustwo polegające na podszywaniu się pod zaufane instytucje w celu wyłudzenia danych?
- – Jak nazywa się osoba, która łamie zabezpieczenia komputerowe?
- – Jak nazywa się ciąg znaków używany do zabezpieczenia konta użytkownika?
- – Jak nazywa się atak, w którym hakerzy blokują dostęp do plików i żądają okupu?
- – Jak nazywa się program chroniący komputer przed złośliwym oprogramowaniem?
12 Clues: – Jak nazywa się osoba, która łamie zabezpieczenia komputerowe? • – Jak nazywa się ciąg znaków używany do zabezpieczenia konta użytkownika? • – Jak nazywa się program chroniący komputer przed złośliwym oprogramowaniem? • – Jak nazywa się atak, w którym hakerzy blokują dostęp do plików i żądają okupu? • ...
Cyber Crime 2024-10-03
Across
- A crime without a harmed party.
- civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm
- Informal language that keeps things groovy.
- Legal protection for creative works.
- Software that shields your computer from malicious code.
- Small sacred space for quiet reflection.
- Where dishes go to get washed
- Digital warfare with a sinister twist.
Down
- the condition of wandering homelessness without regular employment or income
- Covert software that snoops on your digital secrets.
- violation of social or economic boundary
- Space-saving stacked sleeping arrangement.
12 Clues: Where dishes go to get washed • A crime without a harmed party. • Legal protection for creative works. • Digital warfare with a sinister twist. • violation of social or economic boundary • Small sacred space for quiet reflection. • Space-saving stacked sleeping arrangement. • Informal language that keeps things groovy. • ...
Cyber Awareness 2024-10-09
Across
- This barrier keeps unwanted network traffic out of your system.
- A software update that fixes security vulnerabilities.
- Malicious software that locks your files until you pay up.
- Malicious software designed to harm or exploit a computer system.
- Your first line of defense; make it strong and unique.
- Verifying your identity before granting access.
Down
- Malicious software disguises itself as something harmless.
- It turns your data into a secret code to keep it safe.
- Malicious software that secretly gathers information about a user.
- A process that turns data into a fixed-length string of characters.
- A secure tunnel for your internet traffic, often used to protect privacy.
- A copy of your data that you keep safe in case of an emergency.
12 Clues: Verifying your identity before granting access. • It turns your data into a secret code to keep it safe. • A software update that fixes security vulnerabilities. • Your first line of defense; make it strong and unique. • Malicious software disguises itself as something harmless. • Malicious software that locks your files until you pay up. • ...
Cyber ethics 2025-06-07
Across
- act of sending misleading email
- protect from harm
- existing on internet
- unsolicited emails
- unauthorized acces to computer
- harmful software
- the right to keep your personal information
- a unique identifier
Down
- legal protection for original work
- act of using language of another person
- sequence of character used to acces accounts
- to harm someone using digital platform
12 Clues: harmful software • protect from harm • unsolicited emails • a unique identifier • existing on internet • unauthorized acces to computer • act of sending misleading email • legal protection for original work • to harm someone using digital platform • act of using language of another person • the right to keep your personal information • sequence of character used to acces accounts
Cyber Crossword 2025-07-23
Across
- another name for something you are in MFA
- Faking an email address or phone number
- Scrambling messages to make sure nobody unwanted can read them
- Basic cipher done by shifting letters
- Malware that encrypts your files and demands payment
Down
- Type of spyware that tracks what you type
- Stealing info using social engineering
- Protects your computer from dangerous traffic
- Looks and acts like a legitimate program, but isn't
- Secret word used to log in
- A program that can damage your computer
- Using more than one way to verify your identity (abbreviation)
12 Clues: Secret word used to log in • Basic cipher done by shifting letters • Stealing info using social engineering • Faking an email address or phone number • A program that can damage your computer • Type of spyware that tracks what you type • another name for something you are in MFA • Protects your computer from dangerous traffic • ...
Cyber Secure 2025-09-22
Across
- What blagging is used for.
- What a cybercriminal commits.
- Pretending to be trustworthy to deceive someone is this type of engineering.
- Data that has been processed.
- The term for sending fake emails asking for personal information.
- Raw facts and figures.
Down
- Secretly watching someone enter a PIN or password.
- A person who uses the internet to commit a crime.
- Gaining unauthorised access to computers.
- Can identify you on its own or with other details.
- Another name for Two Factor Authentication.
- A law that protects your personal information.
12 Clues: Raw facts and figures. • What blagging is used for. • What a cybercriminal commits. • Data that has been processed. • Gaining unauthorised access to computers. • Another name for Two Factor Authentication. • A law that protects your personal information. • A person who uses the internet to commit a crime. • Secretly watching someone enter a PIN or password. • ...
CIS101 2026-03-13
Across
- Leaked private information
- Security deny list
- Harmful software program
- Breaks into computer systems
- Connected computer system
- Secret login code
- Fake email scam
- Extra login verification
Down
- Blocked access list
- Protecting digital systems
- Secret tracking software
- Multiple login verification
- Scrambles data securely
- Blocks unwanted traffic
- Locks files for money
- Extra saved copy
- Private internet connection
- Self spreading malware
- Malware disguised safe
- Software security fix
20 Clues: Fake email scam • Extra saved copy • Secret login code • Security deny list • Blocked access list • Locks files for money • Software security fix • Self spreading malware • Malware disguised safe • Scrambles data securely • Blocks unwanted traffic • Secret tracking software • Harmful software program • Extra login verification • Connected computer system • Leaked private information • ...
La seguridad y los accidentes 2023-02-22
14 Clues: to land • seatbelt • insurance • to reduce • dangerous • prohibited • traffic jam • to take off • car accident • customsagent • notice;warning • safety;security • security measures • to fasten the seatbelt
Bullying 2013-11-28
Across
- The common group to get cyber-bullied.
- In extreme cases, bullying can lead to ____.
- A free, anonymous and confidential phone and on-line professional counselling service for youth.
- The use superior strength or influence to intimidate someone.
- Using one's body and physical bodily acts to exert power of peers.
Down
- “Sticks and stones may break my bones but ____ will never hurt me.”
- 47% of Canadian _____ report having a child victim of bullying.
- The most common form of bullying behaviour. It includes: name calling, insults, teasing and mimicking etc.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- An act to amend the criminal code (cyber-bullying).
10 Clues: The common group to get cyber-bullied. • In extreme cases, bullying can lead to ____. • An act to amend the criminal code (cyber-bullying). • The use superior strength or influence to intimidate someone. • 47% of Canadian _____ report having a child victim of bullying. • Using one's body and physical bodily acts to exert power of peers. • ...
George 2024-01-09
16 Clues: ηχώ • αρπάζω • αμέσως • σειρήνα • φύλακας • ασφάλεια • συναγερμός • αποτελεσματικά • βάζω στα κρυφά • αδιάφορα, ανέμελα • κατά τα φαινόμενα • αρπάζω κάτι από κάποιον • στριμωγμένος οικονομικά • καταρρέω, γίνομαι κομμάτια • αβέβαια, εκφράζοντας αμφιβολίες • δεν μπορώ να πιστέψω στα αυτιά μου
Marketing Crossword Puzzle 2021-09-30
10 Clues: given money • cyber attacks • Risky situation. • Secure Sockets Layer • wall to prevent fires • malicious computer code • involve a web advertiser • rectangular graphic display • data retention and analysis • Interrupt or damage a device
Cyber Vocabulary 2022-08-19
Across
- A violation of copyrights laws or applicable license restrictions.
- Trying to get sensitive data.
- Sharing a file with other people.
- A software that gathers your data from you and the device and sends it to third parties without your consent to do so.
- spreads to computers to damage the data and its software.
- A virus that is downloaded onto your computer disguised as a real website.
- It’s self-replicating and it affects other computers.
Down
- Content that is not protected by copyright laws and others, it can be copied,shared, altered, and republished by other people.
- The user must agree to go to corporate,internet, or other things.
- Where ads appear when a program is running.
- Something to connect to your device to access to your program and the user (MercuryA).
- That an object as certain security properties.
12 Clues: Trying to get sensitive data. • Sharing a file with other people. • Where ads appear when a program is running. • That an object as certain security properties. • It’s self-replicating and it affects other computers. • spreads to computers to damage the data and its software. • The user must agree to go to corporate,internet, or other things. • ...
cyber bullying 2019-07-11
Across
- when you want to kill yourself
- someone who enforces law
- when you are the person who gets bullied
- playing with other people
- when you are very sad
- by your self
Down
- someone who is mean for a long amount of time
- something you play
- when people don't know who you are
- someone who teaches people
- in your mind
- when you aren't in danger
12 Clues: in your mind • by your self • something you play • when you are very sad • someone who enforces law • playing with other people • when you aren't in danger • someone who teaches people • when you want to kill yourself • when people don't know who you are • when you are the person who gets bullied • someone who is mean for a long amount of time
cyber bullying 2019-07-11
Across
- when you want to kill yourself
- playing with other people
- when you are the person who gets bullied
- someone who is mean for a long amount of time
- when you are very sad
- by your self
- something you play
Down
- when people don't know who you are
- in your mind
- someone who teaches people
- someone who enforces law
- when you aren't in danger
12 Clues: in your mind • by your self • something you play • when you are very sad • someone who enforces law • playing with other people • when you aren't in danger • someone who teaches people • when you want to kill yourself • when people don't know who you are • when you are the person who gets bullied • someone who is mean for a long amount of time
cyber bullying 2019-07-11
Across
- someone who teaches people
- someone who is mean for a long amount of time
- when people don't know who you are
- when you want to kill yourself
- when you aren't in danger
- in your mind
Down
- by your self
- someone who enforces law
- when you are very sad
- playing with other people
- something you play
- when you are the person who gets bullied
12 Clues: by your self • in your mind • something you play • when you are very sad • someone who enforces law • playing with other people • when you aren't in danger • someone who teaches people • when you want to kill yourself • when people don't know who you are • when you are the person who gets bullied • someone who is mean for a long amount of time
CYBER CRIME 2020-10-18
Across
- To send information from your computer to another computer.
- A term for the actual computer equipment and related machines or computer parts.
- If someone tries to get access to computer systems in order to steal, corrupt or illegitimately view data
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- A set of programs that tell a computer to perform a task.
- a security barrier designed to keep unwanted intruders “outside” a computer system or network
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
Down
- An attempt to acquire a sensitive information such as username, password, files etc.
- A program used to access the Internet example- Firefox, chrome etc.
- Rules or manners for interacting courteously with others online
- Unsolicited email which is sent in large quantities to a large number of users.
- Software used or created by hackers to disrupt computer operation, gather sensitive information or gain access to private computer systems.
12 Clues: A set of programs that tell a computer to perform a task. • To send information from your computer to another computer. • Rules or manners for interacting courteously with others online • A program used to access the Internet example- Firefox, chrome etc. • Unsolicited email which is sent in large quantities to a large number of users. • ...
Cyber Safety 2015-01-27
12 Clues: izdzēst failu • ievadīt paroli • saņemt e-pastu • saglabāt failu • izdzēst e-pastu • ievadīt segvārdu • saņemt pielikumu • izdzēst pielikumu • lejupielādēt failu • lejupielādēt bildi • lejupielādēt mūziku • sarakstīties tiešsaistē
Cyber Grille 2025-07-22
Across
- Correctif appliqué à un logiciel pour corriger une faille
- Technique rendant des données illisibles sans clé
- Barrière logicielle ou matérielle qui bloque les connexions non autorisées
- Protection des systèmes informatiques contre les attaques numériques
- Règlement européen sur la protection des données personnelles
Down
- Réseau d'ordinateurs infectés contrôlés à distance
- Programme espion enregistrant les frappes clavier
- Tromperie par e-mail ou site ou SMS pour soutirer des données personnelles
- Porte dérobé laissée pour accéder à un système sans autorisation
- Hameçonnage réalisé par SMS
- Technologie simulant une intelligence humaine
- Serveur qui sert d'intermédiaire entre un utilisateur et internet
12 Clues: Hameçonnage réalisé par SMS • Technologie simulant une intelligence humaine • Programme espion enregistrant les frappes clavier • Technique rendant des données illisibles sans clé • Réseau d'ordinateurs infectés contrôlés à distance • Correctif appliqué à un logiciel pour corriger une faille • Règlement européen sur la protection des données personnelles • ...
Cyberpigs 1 2015-10-07
Across
- When you ________ an email, remember that it isn’t necessarily private.
- Take an _______ with you if you ever go to meet a cyber-friend.
- Don’t ever give your ________ or address to a cyber-stranger.
- When Lil gave out too much information, her email account was filled up with _________
- What Virtual Pigsty really wanted was Lil’s _________
Down
- Companies can use clubs to find out more information about you to _______ you things you don’t need.
- Websites where you play games with products are not playgrounds – they are ___________.
- The three CyberPigs were surfing the _____ one afternoon
- If Lil Pig entered a contest she would win a _______
9 Clues: If Lil Pig entered a contest she would win a _______ • What Virtual Pigsty really wanted was Lil’s _________ • The three CyberPigs were surfing the _____ one afternoon • Don’t ever give your ________ or address to a cyber-stranger. • Take an _______ with you if you ever go to meet a cyber-friend. • ...
36 2024-07-30
Across
- Witch haunting writer
- Remote farm terror
- Supernatural baby scare
- Cult island nightmare
- Mysterious machine obsession
- Cyber horrors anthology
- Indian ghost legend
- Indian village curse
- Home invasion silent horror
- Indian military interrogation
- Forest deity encounter
- Evil bidding app
Down
- Perpetual haunted store
- Barroom story horror
- Haunted house treatment
- Identity theft webcam horror
- Heart transplant horror
- Ghost soldiers battle
- Invisible predator fear
- Postapocalyptic fatherhood
- Shadowy figure fear
- Imaginary friend danger
- Blindfolded survival thriller
- Refugee haunting drama
- Haunting childhood game
25 Clues: Evil bidding app • Remote farm terror • Shadowy figure fear • Indian ghost legend • Barroom story horror • Indian village curse • Witch haunting writer • Cult island nightmare • Ghost soldiers battle • Refugee haunting drama • Forest deity encounter • Perpetual haunted store • Haunted house treatment • Supernatural baby scare • Heart transplant horror • Invisible predator fear • ...
Thanksgiving Crossword 2022-11-08
Across
- The soup of green bean casserole
- Ocean Spray
- The original Pilgrim colony
- Mac and Cheese brand
- Pie nut
- For the day after Thanksgiving
- Inside turkey
- Popular spiced Thanksgiving pie
- Thanksgiving’s traditional side dish
- The people you spend Thanksgiving with
- The star of the meal
- The thanksgiving emotion
Down
- Friday Shopping extravaganza
- Fall fruit pie
- Thanksgiving’s sport
- Holiday celebrating harvest and gratitude
- Sweet Potato Casserole with ____
- _____ Monday
- The month of Thanksgiving
- Thanksgiving day
- Served with turkey, mashed potatoes, biscuits, and more dishes
- Fall
22 Clues: Fall • Pie nut • Ocean Spray • _____ Monday • Inside turkey • Fall fruit pie • Thanksgiving day • Thanksgiving’s sport • Mac and Cheese brand • The star of the meal • The thanksgiving emotion • The month of Thanksgiving • The original Pilgrim colony • Friday Shopping extravaganza • For the day after Thanksgiving • Popular spiced Thanksgiving pie • The soup of green bean casserole • ...
Test 2023-08-25
9 Clues: Bulk Email • Quickly Spreads • Operating System • Amcor Cyber Month • Malicious Software • Most cyberattack method • Multifactor Authentication • Infected & Slowing your Computer • All things connected with Internet
safety and security 2022-12-12
Across
- / details the emergency procedures designed to maintain safety of guest, employees ad the property. pg 191
- / one reason lodging properties are allowed to refuse service to guest is if guests are intoxicated. pg 186
- / Usually, keys given to employees are metal keys. these should be audited on a regular basis. pg 193
- floors, stairwells / key access also used for...pg 194
- / Ensure every employee knows how to follow the emergency response plan during an emergercy. pg 197
- / are laws that protect both the innkeeper and guest. pg 187
- / the security officer(loss prevention officer) has multiple responsible and is the "boots on the ground". pg 188
- / is the secure and logical control of all keys in the hotel. pg 191
- / review the response, identify any gaps, and make improvements to respond more efficiantly in future emergency situations. pg 197
- / if a hotel dose not have a security department. pg 187
- / are well known for having highly sophisticated security technology. pg 194
- / come from outside such as weather, active assailants, and bomb threats. pg 198
- / the guestroom key opens the door of the room that has been assigned to the guest. pg 192
- / conduct a practice run of the emergency response plan to make employees comfortable. pg 197
- / based on the emergency response plan, determine what needs to be purchased and acquired, and then store these items. pg 196
- / is a specifically encoded key, typically used by the bell attendant to handle a luggage pull. pg 192
- / is any observed behavior that could indicate crime or terrorism. pg 189
- / is the close observation of a situation to provide information for investigations regrading guests, employees, and asset protection. pg 193
- / an innkeekper is an individual or business owner who provides overnight accommodations for guest in exchange for reasonable compensation.pg 187
- / human trafficking is a form of modern-day slavery. It includes the force, fraud, or coercion to labor or commercial s*x. pg 189
- / The security supervisor supports the security manager and the management function. pg 188
- / is typically used by inspector. pg 192
Down
- / as the department head, the security manager(director of security) over...pg 188
- / a comprehensive report that addresses. pg 188
- / The security department is responsible for traininng emplayees to be prepared to hanble emergency situations. pg 191
- / include monitoring keys, surveillance, and awareness of pretinent technological advance. pg 191
- / addresses ensuring the safety and security of the hotel and its guest preventing problem from occurring. pg 190
- / allows access into all of the door locks of the hotel. pg 192
- / is typically used by guestroom attendants. pg 192
- / create an emergency response plan.pg 196
- / is failure to act in a safe manner. pg 18
- / is responsible for handling daily operations in the hotel as well as any emergency situations that arise. pg 195
- / can be defined as having an understanding of what is going on around you. pg 188
- / The director of security maintains relationships with law enforcement(police)...etc. pg 190
- / refers to being responsible for the actions or the condition of an establishment. pg 186
- / are something that happen in the hotel like a gas leak or water damage. pg 198
- / alert guests to potential hazards, such as wet floors. pg 187
- / allows the door lock to be overridden to open the electronically engaged deadbolt. pg 192
- / means that you have a legal duty to act in the way that an ordinary, prudent, reasonable person would. pg 186
- / may be carried by housekeeping, maintenance, and security personnel. pg 194
40 Clues: / create an emergency response plan.pg 196 • / is typically used by inspector. pg 192 • / is failure to act in a safe manner. pg 18 • / a comprehensive report that addresses. pg 188 • / is typically used by guestroom attendants. pg 192 • floors, stairwells / key access also used for...pg 194 • / if a hotel dose not have a security department. pg 187 • ...
Digital Safety 2024-10-08
Across
- Don’t want to talk to someone so you
- not having a virus on your device
- not going on the Dark Web
- having or operating with components such as microchips and transistors that control and direct electric currents.
Down
- the practice of writing sensationalized or misleading headlines in order to attract clicks on a piece of content
- lacking interest or excitement
- breaks into a computer system
- a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself
- the use of technology to harass, threaten, embarrass, or target another person
- the trail of data you leave when using the internet
10 Clues: not going on the Dark Web • breaks into a computer system • lacking interest or excitement • not having a virus on your device • Don’t want to talk to someone so you • the trail of data you leave when using the internet • the use of technology to harass, threaten, embarrass, or target another person • ...
PUMPKINS FLY 2013-01-13
Across
- / Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / Privilege of the permanent members: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- / Granted permanent membership into the Security Council in 1971
- / Location where the first Security Council session took place on 17 January 1946
- How many months do members take turns at holding the presidency of the Security Council
- / Country where military forces were deployed by the USA and Britain without approval from the Security Council.
Down
- / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
- Name the country that had used its veto power the most number of times. This country should be one of the permanent members in the Security Council.
- / Other than Brazil, India and Japan, name the the other country that has made the strongest demand for a permanent seat in the United Nations Security Council.
- / Number of members in the Security Council
- / The country Britain and France join forces with to invade Egypt in 1956 during the Suez Canal crisis.
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- In 2003, the United Nations Security Council was involved in a crisis that happened in Sudan. The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
14 Clues: / Number of members in the Security Council • / Granted permanent membership into the Security Council in 1971 • / Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire • / Location where the first Security Council session took place on 17 January 1946 • How many months do members take turns at holding the presidency of the Security Council • ...
jean bullying crossword 2022-05-23
Across
- what is the D in AB CD's of bullying.
- Cora was spreading rumors about Olivia what type of bullying is this.
- Bella was making fun of Olivia and they both were laughing what type of bullying is this.
- Emma was talk about
- Cora was spreading rumors about Olivia to everybody in the class.
- Olivia pushed Emma down and everybody started laughing what type of bullying is this.
Down
- Bella was talking about Olivia in front of the class everyone was laughing.
- Cora was making fun of James everyone started laughing and James was laughing.
- what is the A in AB CD's of bullying.
- James punched Emma what type of bullying is this.
- what is the B in AB CD's of bullying.
- Asher was talking about Justice and Justice went to the bathroom crying what type of bullying is this.
- Olivia pushed James on the shoulder on purpose what type of bullying is this.
- James texts Emma about how bad she is at the game.What type of bullying is this.
- what is the C in AB CD's of bullying.
15 Clues: Emma was talk about • what is the D in AB CD's of bullying. • what is the A in AB CD's of bullying. • what is the B in AB CD's of bullying. • what is the C in AB CD's of bullying. • James punched Emma what type of bullying is this. • Cora was spreading rumors about Olivia to everybody in the class. • Cora was spreading rumors about Olivia what type of bullying is this. • ...
Hacking 2017-06-27
10 Clues: Ethical Hacker • Must be strong • Network Hacking • A type of Hacking • Recent cyber attack • Protects your computer • Network/Computer Expert • Social Engineering Attacks • Protects Network from virus attack • Platform for attacking web applications
Agencies and corporations 2024-08-09
Across
- York Police Department One of the most famous abbreviations for a police department in the east coast, also in one of the biggest cities in America.
- Service The people who let trumps ear get shot off (almost).
- corps A group for people wanting to volunteer for the Gov't
- JFK wanted to defund these guys in the 60's, bad decision
- Scientists in charge of putting people in space
- The people in charge of cleaning up natural disasters.
- Science for the public funded by the public
- People in charge of environmental security.
- Patrol The people in charge of manning our weak points for immigrants to get in.
Down
- The scary people with scary weapons and tactics.
- Incharge of disease control
- park security They provide security for national parks
- They deliver mail
- The people in charge of taking down drug lords like Heisenberg
- Oversees the security industries
- Involved in some of the most disastrous raids including, The Ruby Ridge incident, and the burning down of mount Carmel
- Security Council National defense and security
- Bureau of Investigation Moto is "Fidelity, Bravery, Integrity"
- Civilizes national aviation.
- Produces the presidents budget
20 Clues: They deliver mail • Incharge of disease control • Civilizes national aviation. • Produces the presidents budget • Oversees the security industries • Science for the public funded by the public • People in charge of environmental security. • Security Council National defense and security • Scientists in charge of putting people in space • ...
Service Management Practice and Cyber Security Practice Controls 2020-09-23
Across
- Cyber incidents are ___________, prioritised, escalated and recorded as per incident response plans, with actions implemented to contain the incident in a timely manner
- System End of Service Management requires IT systems to have defined __________ management procedures in place
- A change record must be ____________ before a change is implemented
- System change management controls are essential to ensure changes to the production environment do not compromise the ______________ of the environment or the confidentiality or integrity of the data stored in the environment
- IT Service _________ processes are in place to ensure the availability and integrity of Customer and Business data and production systems in the event of a disaster or a major IT incident
- An _____________ change is the only change type that can be logged retrospectively
Down
- Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
- IT _______ and self-identified problems requiring root cause identification and permanent corrective action are recorded, analysed, and resolved in a timely manner
- To prevent inappropriate _____ to IT systems and services roles are managed through their lifecycle in accordance with our standards and requirements
- The network is segmented into security zones to ______ IT services and information assets from unauthorised access
- The peer _____ process is the task that authorises a standard change to proceed
- Any change made in production must be ______ to ensure visibility of the change
- Data ____ protection tools identify and prevent inappropriate data transfers and prevent the leakage of confidential information
13 Clues: A change record must be ____________ before a change is implemented • The peer _____ process is the task that authorises a standard change to proceed • Any change made in production must be ______ to ensure visibility of the change • An _____________ change is the only change type that can be logged retrospectively • ...
social media: p. 192-193 2025-11-16
Across
- noun that goes with to behave
- ...a relationship
- ... to experts
- to ... sth online
- similar word: picture
- synonym confidence
- anything computer and virtual reality
- information that is inside
Down
- synonym for mental
- ... theft is a crime
- you should ...
- opposite: for a short time
- noun for to use
- a... meaning per day
- to make something for social media
- synonym to confront
- when you interview people you are making a ...
- when a person kills themselves
18 Clues: you should ... • ... to experts • noun for to use • ...a relationship • to ... sth online • synonym for mental • synonym confidence • synonym to confront • ... theft is a crime • a... meaning per day • similar word: picture • opposite: for a short time • information that is inside • noun that goes with to behave • when a person kills themselves • to make something for social media • ...
Airport and international 2019-03-13
Across
- passenger
- type of plane
- airport security
- stuff you can bring on a plane
- airline
- allowed if declared
- unsecure side of airport
- type of runway incursion
- required to board plane internationally
- required to enter country
- wall of aircraft
- secure part of airport
Down
- alphabet
- covered walkway
- area adjacent to terminal
- go on to plane
- not allowed at all
- security
- cargo compartment
- machine for scanning
20 Clues: airline • alphabet • security • passenger • type of plane • go on to plane • covered walkway • airport security • wall of aircraft • cargo compartment • not allowed at all • allowed if declared • machine for scanning • secure part of airport • unsecure side of airport • type of runway incursion • area adjacent to terminal • required to enter country • stuff you can bring on a plane • ...
Network Concepts and Cyber Ethics 2025-06-03
Across
- collects data.
- Area Network.
- data for security.
- software.
- identifier for a device on a network.
- that forwards data packets between networks.
- for communication between devices.
- system that controls traffic.
- emails to steal data.
- system access.
Down
- networking method.
- network technology
- bullying.
- that provides services or data.
- creative work.
- data transfer rate.
- to access accounts securely.
- email.
- remote access method.
- to keep data secure.
20 Clues: email. • bullying. • software. • Area Network. • collects data. • creative work. • system access. • networking method. • network technology • data for security. • data transfer rate. • to keep data secure. • remote access method. • emails to steal data. • to access accounts securely. • system that controls traffic. • that provides services or data. • for communication between devices. • ...
Cyber Safety-Ashly 2016-05-30
Across
- bad thing that can ruin you're device
- you if there is a virus
- who can steel your password
- thing that an Internet dictionary is
- type of virus
- way of chatting to others
- thing like Youtube that you can watch
- up,something that just pops up onto your screen
- way of searching and listening on the Internet
- thing that every child needs when going on a device
Down
- secret that only you can know
- who can text you things and hurt your feelings
- device that you can get lots of viruses on
- tag,a nickname that a user has chosen for you to be identified when playing Internet Games
- name a user has chosen for your easy access on online
- thing that you can chat on with you're family and friends
- thing that everyone needs to get onto a device
- method of sending short messages
- collection of lots of different websites
19 Clues: type of virus • you if there is a virus • way of chatting to others • who can steel your password • secret that only you can know • method of sending short messages • thing that an Internet dictionary is • bad thing that can ruin you're device • thing like Youtube that you can watch • collection of lots of different websites • device that you can get lots of viruses on • ...
Government Cyber Awareness 2024-10-08
Across
- Unauthorized disclosure of this category of classified information could be expected to cause grave damage to national security (2 words)
- __________ Unclassified Information
- The ability and opportunity to gain knowledge of classified information.
- Unauthorized disclosure of this category of classified information could be expected to cause serious damage to national security
- Unauthorized disclosure of this category of classified information could be expected to cause damage to national security
- This type of controlled access area is established to work on classified material during regular working hours, but during non-working hours, classified material must be stored in an approved repository for classified storage
- __________-in-depth is a determination made by the Cognizant Security Agency (CSA) that a contractor's security program consists of layered and complementary security controls sufficient to deter and detect unauthorized entry and movement within the facility
- Before releasing classified material to someone, the holder of the material must determine that the person has appropriate eligibility for access and a valid __________ (3 words)
Down
- Any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation) agency assets, or individuals.
- The purpose of the Assesment and Authorization (A&A) process is to __________ cleared contractors' new Information Systems for classified processing.
- A security __________ is any weakness that can be exploited by an adversary to gain access to an asset to include a person, structure, facility, information, material, or process that has value.
- __________ Workforce 2.0 is the whole-of-government approach to reform the personnel security process and establish a single vetting system for the U.S. Government.
- This is the supplement to the Federal Acquisition Regulation administered by the Department of Defense (acronym)
- If classified information is transmitted through unsecure means, it is considered a __________ at a minimum.
- There is only one type of these currently available and GSA-approved for classified storage: The Sargent & Greenleaf (S&G) Model 8077
- The alpha-numeric code assigned to each contractor who does work for the U.S. government assigned through the System for Award Management (acronym)
- We lessen the impact of foreign ownership, control, or influence (FOCI) using this type of agreement
- When an administrative determination of eligibility for access to classified information by a specific contractor company has been made, that company is said to be a __________ contractor
- Probability and severity of loss linked to threats or hazards and vulnerabilities.
19 Clues: __________ Unclassified Information • The ability and opportunity to gain knowledge of classified information. • Probability and severity of loss linked to threats or hazards and vulnerabilities. • We lessen the impact of foreign ownership, control, or influence (FOCI) using this type of agreement • ...
Common Cyber Attacks 2022-09-29
Across
- extremely potent and expensive cyber army attack
- malware utilizing multiple types of technology
- Denial-of-Service Acronym
- These make simultaneous requests, overload target
- malware that scares people into action
- demands a payoff in exchange for infected data
- Attacking high-profile executives/gov officials
- attempt to convince a person to take action
Down
- displays online advertisements without permission
- disguised software, trying to trick people
- Used without owners' knowledge
- MANY connected devices flooding a target
- malicious software
- invasive programs, collecting info (TikTok)
- Can replicate without a host
- Target of spear phishing, popular due to COVID
- phishing via text messages
- phishing via voice activation
- NEED a host to replicate their own code
19 Clues: malicious software • Denial-of-Service Acronym • phishing via text messages • Can replicate without a host • phishing via voice activation • Used without owners' knowledge • malware that scares people into action • NEED a host to replicate their own code • MANY connected devices flooding a target • disguised software, trying to trick people • ...
January 2018 Security Crossword Puzzle 2018-01-10
Across
- / Each custodian is subject to a random ____, and is responsible for safeguarding classified material in their custody or under their control.
- / _____ papers are documents and material accumulated or created in the preparation of finished classified documents and material, and must be destroyed or accounted for, before document is 181 days old.
- / For access to national defense classified information, you will need a security ___.
- / ___ use is still illegal according to the federal government, as your security clearance is issued by the federal government.
- / The Emergency Action Plan (EAP) states procedures developed for the ___ of classified material during emergencies.
- / Classified documents _____ for any purpose, including those incorporated in a working paper, are subject to the same controls prescribed for the original documents.
- / The facilities' ___ system is established to deter, detect, and monitor unauthorized introduction or removal of classified material from the facility.
- / The SF 312 is a ___ obligation between you and the U.S. government.
- / A visitor ___ request must be submitted to and approved, by Security, before entering the facility.
- / Your ___ badge provides identification and credentials for access to closed controlled areas.
- / At 1NZ82, classified Information Systems may only be used in Closed and activated _________ areas.
- / The fact that classified information has been made public does not mean that it has been ________.
- / The DD Form 254 is a contractual document that provides the security requirements and ___ guidance that is necessary to execute a classified contract.
- / In closed areas, all vents and ducts penetrating perimeter walls that measure in excess of 96 square inches and over 6 inches in their smallest dimension must be protected by these.
- / The unclassified name referring to investigations and studies of compromising emanations.
- / In his capacity as Perato's ___, Michael Sotelo is responsible for our company's Insider Threat Program and is cleared as a KMP for 1NZ82.
- / Only approved ___ containers, are authorized to store classified information.
- / This type of travel must be reported to security at least 30 day before departure.
- / Only approved shredders are authorized to ____ classified paper documents or discs in the facility.
Down
- / The type of entrance to any of the facilities is strictly prohibited; individual swipe of own badge before entrance is required.
- / This document must be prepared and detail physical and technical control measures used to control access by foreign nationals assigned to, or employed by, cleared contractor facilities.
- / All classified material must be submitted to security department for ___.
- / All employees and visitors must have their Peraton badge ____, to verify authorization of access into our facility.
- / After normal business hours, the contracted company, ________ Security, randomly patrols both the Centennial and Elkton facilities.
- / To be eligible for an FCL, a contractor must 1) need access to classified in connection with a US Government contract, 2) be organized and exist under the laws of one of the 50 states, 3) have a reputation for integrity, and 4) not be under _______ to such a degree that granting an FCL would be inconsistent with national interests.
- / Each classified guidance on the DD Form 254 identifies the classification level and specific types of classified information ___ on the contract.
- / You must submit a document request, when classified materials are ___internally, externally, destroyed.
- / Security department conducts a mandatory annual ___ for all classified materials in the facility.
- / When individual responsibility for a security violation can be assigned, a _________ report must be issued to the CSA.
- / The Department of Defense, as the Cognizant Security Agency (CSA), has delegated security administration responsibility for industry to this organization.
- / All personnel and visitors are subject to unannounced random ___, upon entry or exit of their personnel effects.
31 Clues: / The SF 312 is a ___ obligation between you and the U.S. government. • / All classified material must be submitted to security department for ___. • / Only approved ___ containers, are authorized to store classified information. • / This type of travel must be reported to security at least 30 day before departure. • ...
Morphtronic Dials 911 for Danny 2022-08-27
12 Clues: sorry tuners • cyberse boss • ban this card • The one hand trap • Zombie shenanigans • inflict 500 Damage • better Cyber Dragon • synchro & xyz archetype • During the Standby Phase... • gain life and summon from GY • "That's a pretty good draw." • effect(s) based on the number of material(s)
Crimes against people and property 2017-11-16
Across
- rob someone
- of funds
- or larceny victim suffers injury
- take property
- crime- crimes online
- items back
- or damage
- prevent future crimes
- act to get personal gain
- killing someone in defense
- gain something from force or threats
Down
- harm
- killings
- restore someones health
- crime- commit crime because of hate
- discourage act
- something up in return of their offenses
- swear an oath to tell the truth
- physical attack
- setting houses on fire
20 Clues: harm • of funds • killings • or damage • items back • rob someone • take property • discourage act • physical attack • crime- crimes online • prevent future crimes • setting houses on fire • restore someones health • act to get personal gain • killing someone in defense • swear an oath to tell the truth • or larceny victim suffers injury • crime- commit crime because of hate • ...
Netiquette 2021-11-09
Across
- beleidigen Andere respektieren
- Sie sind auf YouTube zu sehen
- muss man während der Messe leisestellen
- Es sind Bilder, die gesendet werden können
- mit anderen kommunizieren
- es "infiziert" den Computer
- kontinuierliche Nachrichten
- Adresse um anderen eine Nachricht zu senden
- Nachrichten, die nicht wahr sind
- Mobbing im Internet
- veröffentlichen
- er hat Windows 11
Down
- richtige Orthographie
- Facebook, Instagram, Twitter sind…
- Hier kann man Nachrichten lesen
- Apparat zum anrufen
- Mozartstraße ist meine…
- Diskriminierung anderer Menschen
- Inhalte anderen schicken
- wird mit dem Benutzernamen verwendet
20 Clues: veröffentlichen • er hat Windows 11 • Apparat zum anrufen • Mobbing im Internet • richtige Orthographie • Mozartstraße ist meine… • Inhalte anderen schicken • mit anderen kommunizieren • es "infiziert" den Computer • kontinuierliche Nachrichten • Sie sind auf YouTube zu sehen • beleidigen Andere respektieren • Hier kann man Nachrichten lesen • Diskriminierung anderer Menschen • ...
Vocabulary 2023-03-21
Across
- the keyboard
- public
- online
- an email
- an app
- a Filter
- the username
- to take a photo
- to text
- Private
- a comment
- a telephone
- to search
- A password
- followers
Down
- an Account
- to record
- to send
- a tablet
- to upload
- to click
- to download
- a website
- to save
- to stream
- the file
- to share
- Social Media
- the mouse
- flash drive
- the computer
- cyber bullying
- to post
33 Clues: public • online • an app • to send • to save • to text • Private • to post • a tablet • to click • an email • a Filter • the file • to share • to record • to upload • a website • to stream • the mouse • a comment • to search • followers • an Account • A password • to download • flash drive • a telephone • the keyboard • the username • Social Media • the computer • cyber bullying • to take a photo
Practice Cybersecurity Terminology Puzzle 2025-03-14
Across
- Data hostage for ransom
- Protection of networks from threats
- Update that fixes vulnerabilities
- Requires multiple identity proofs
- Information about cyber threats
- Malicious software that harms systems
- Encoding sensitive information
- Impersonation to obtain information
Down
- Vulnerability with no available patch
- Weakness in a system
- Distributed denial-of-service attack
- Verifying user identity
- Converting data into codes
- Longterm targeted cyberattack
- Secure internet connection
- Unauthorized access to systems
- Blocks unwanted traffic
- Software that detects malware
- Software that secretly monitors
- Continuous cybersecurity monitoring
20 Clues: Weakness in a system • Data hostage for ransom • Verifying user identity • Blocks unwanted traffic • Converting data into codes • Secure internet connection • Longterm targeted cyberattack • Software that detects malware • Unauthorized access to systems • Encoding sensitive information • Information about cyber threats • Software that secretly monitors • ...
OL 4, Unit 4, Station 2 2025-05-07
Across
- Foto
- Seite (im Internet)
- Konto
- seit
- soziale Medien
- einige, mehrere
- begrüßen
- Lieblings-
- eigentlich, grundsätzlich
- Selfie
- geben, existieren
- die Hälfte
- nicht mögen
- modisch, trendy
- Karte, Plan
- veraltet
- streamen
- seit, seitdem
- Cyber-Mobbing
- äußerst, sehr
Down
- abonnieren
- kommunizieren
- Einfluss, Auswirkung
- beeinflussen
- Kommentar
- täglich
- sofort, gleich
- Anfrage
- Veganismus
- mobil, tragbar
- Clip; Ausschnitt
- Innovation, Neuheit
- Tonne
- online stellen
- verdienen
- zerissen
36 Clues: Foto • seit • Konto • Tonne • Selfie • täglich • Anfrage • begrüßen • veraltet • zerissen • streamen • Kommentar • verdienen • abonnieren • Veganismus • Lieblings- • die Hälfte • nicht mögen • Karte, Plan • beeinflussen • kommunizieren • seit, seitdem • Cyber-Mobbing • äußerst, sehr • sofort, gleich • soziale Medien • mobil, tragbar • online stellen • einige, mehrere • modisch, trendy • Clip; Ausschnitt • geben, existieren • ...
Cyber and Digital Literacy 2024-04-30
Across
- The use of electronic communication to harass, intimidate, or threaten individuals, typically through social media, messaging apps, or online forums.
- The main screen area on a computer where icons, windows, and other graphical elements are displayed.
- a concept that refers to the ability to ascertain who the author of a text is, what their biases are, how authoritative the information may be, and so on.
- Being able to solve problems in digital environment
- Building resilience to digital threats and challenges, including cyberbullying, online scams, and misinformation, through education, awareness, and support networks.
- A display screen used to visually output information from a computer.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in an electronic communication.
- With video games becoming increasingly interactive and connected, familiarizing oneself with the norms and practices of these virtual landscapes are crucial.
- the standard language used to create and design web pages.
- Knowing how to access and navigate the internet effectively, including using web browsers, conducting searches, evaluating website credibility, and understanding basic internet safety and security practices.
- An electronic device that processes data and performs tasks according to instructions.
- The process of transferring data from a remote computer or server to a local device.
- Wireless networking technology that allows devices to connect to the internet without the need for physical cables.
- A live online seminar or presentation conducted over the internet, typically featuring audio, video, and interactive elements.
- the ability to understand and use information in multiple formats from a wide range of sources when it is presented via computers
- a unit of digital information comprising eight bits
- A satellite-based navigation system that provides location and time information anywhere on or near the Earth.
- a programming language that a computer can execute
- To gain unauthorized access to a computer system
- Understanding the importance of protecting personal information online and implementing strategies to safeguard digital identity and data.
- A collection of data stored in a computer under a specific name.
- Understanding and interpreting data and statistics, including those presented in digital formats, to make informed decisions and conclusions.
- The maximum rate of data transfer across a network connection, typically measured in bits per second (bps) or megabits per second (Mbps).
- Recognizing the potential of digital technologies to empower individuals and communities, including access to information, education, and economic opportunities.
- Understanding the principles of cybersecurity and learning to identify vulnerabilities and potential threats in digital systems, often used for defensive purposes.
- Being aware of common cybersecurity threats, such as malware, phishing, and social engineering, and implementing best practices to protect oneself and others online.
- a method of exchanging digital messages over the internet.
- Ethical principles and considerations related to the use of digital technologies, including privacy, transparency, accountability, and the ethical implications of cyber operations and capabilities.
- Knowledge and practices to protect oneself and others from online threats, scams, and harmful content.
Down
- Accessing and participating in digital educational resources, courses, and programs, often facilitated through learning management systems and online platforms.
- A networking device that forwards data packets between computer networks, typically using IP addresses.
- Knowing how to safely and effectively shop online represents digital literacy.
- Possessing the ability to write, post, and maintain a blog is an essential facet of digital literacy.
- Criminal activities carried out by means of computers or the internet, such as hacking, identity theft, fraud, and cyber espionage.
- the ability to locate, identify, retrieve, process and use digital information optimally
- Acknowledging the disparities in access to digital technologies and resources based on factors such as socioeconomic status, geographic location, age, and disability, and working to bridge these gaps.
- Strategies and measures employed to protect computer systems, networks, and data from cyber threats, including preventive, detective, and corrective actions.
- A device that enables computers to transmit data over telephone or cable lines.
- A software application used to access and view information on the World Wide Web.
- Online platforms and websites that enable users to create and share content, connect with others, and interact in virtual communities.
- The ability to objectively analyze and evaluate information, arguments, and evidence, crucial for navigating the vast amount of digital content.
- A program that searches for and identifies items in a database matching keywords or specified criteria.
- Relating to or characteristic of the culture of computers, information technology, and virtual reality.
- Understanding one's rights, responsibilities, and ethical behavior in digital environments, including issues related to online privacy, security, copyright, and appropriate online conduct.
- Understanding different modes of online communication, including email, instant messaging, social media, and video conferencing, and being able to communicate effectively and respectfully in digital environments.
- The process of transferring data from a local device to a remote computer or server.
- Understanding how to use a computer, including tasks such as turning it on/off, navigating the operating system, using a keyboard and mouse, managing files and folders, and connecting to the internet.
- organized and processed for analysis or storage.
- A global network of interconnected computers that allows communication and information sharing.
- Relating to or using signals or information represented by discrete values (digits) of a physical quantity.
- Physical components of a computer system, such as the monitor, keyboard, and motherboard.
51 Clues: To gain unauthorized access to a computer system • organized and processed for analysis or storage. • a programming language that a computer can execute • Being able to solve problems in digital environment • a unit of digital information comprising eight bits • the standard language used to create and design web pages. • ...
HIPAA, ARRA, and HITECH Technology Legislation Kelli Lutz & Terence Brown Health Informatics 2016-10-01
Across
- The ________ rule deliberated a standard for electronic signature
- _____A EHR has this to show they meet all requirements.
- Policies and procedures that address the management of computer resources.
- Granted permission to disclose confidential info as defined HIPAA Privacy Rule
- physical characteristics of users (fingerprints etc)
- HIPAA Data security provision that provide objective and scope for rule as a whole.
- HITECH rule that requires covered entities and business associates to identify unpermitted access to PHI requires disclosure
- type of access controls from damage in person.
- a document given to patients to describe how information is used and shared abbreviation.
- Protected Health Information in the Electronic Form.
- Healthcare providers would be offered financial incentives for demonstrating this type of use.
- a violation of the policies or standards develops to ensure security
- Encryption that uses math or logic functions to transform data to useless data.
- ABRV. Authority to manage and set standards for the stimulus program
- Log of Log-ins Log-outs and files accessed with time stamps.
- Act includes requirements for standards development and for investment in health information technology infrastructure originally called stimulus package.
Down
- Process of identifying sound of health record entries by attaching authors signature or e signature.
- Term that HIPPA Title II creates privacy rule security rule code set standards.
- ARRA was developed to preserve and create ______ and promote economic recovery
- (Abbreviation)Prepared a series of webinars to train Federal Agencies on ARRA.
- protections that are requires for every person undergoing medical treatment
- ________severity of payment.
- Alternative name for HIPAA
- Preventative measures restrict access to only those that specifically need access.
- This type of plan is put into effect for responding to system outages or emergencies.
- Agency within the DHHS responsible for enforcement of security and privacy rules Abbreviation.
- Type of associates subject to privacy and security Regulations.
- HITECH Some of the core requirements include using a __________
- The federal legislation enacted to provide continuity of health coverage control fraud and abuse in healthcare reduce healthcare costs and guarantee the security and privacy
- Section of HIPAA that establishes standards for providers,establishes Rights, and Security Rules
30 Clues: Alternative name for HIPAA • ________severity of payment. • type of access controls from damage in person. • physical characteristics of users (fingerprints etc) • Protected Health Information in the Electronic Form. • _____A EHR has this to show they meet all requirements. • Log of Log-ins Log-outs and files accessed with time stamps. • ...
Industrial Security Concepts Crossword Puzzle 2025-10-29
Across
- An act or condition which results in a situation conducive to a breach of the protection system and the subsequent loss or compromise, or damage to personnel, property or facilities.
- Placement of security offices near entry points.
- Fences, gates, guard posts, and barriers.Landscaping (trees, bushes, lighting) designed to limit hiding places and improve visibility.
- - spreading the risk through decentralzation to limit the impact (criticality) of the potential loss
- - An indication of impending danger or harm;
- - A chance of being injured or harmed;
- - minimizing the probability of the potential loss
- - these involve the installation of physical barriers, security lighting, use of vaults, locks and others.
- - include mountains, rivers, seas, desserts to traverse. To be fullyeffective, these barriers must be under surveillance of guards.
Down
- a system of barriers placed between the potential intruder and the objects/matter to be protected.
- - The susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazard.
- - inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury.
- — is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). probability of an event to happen that will lead to loss.
- - removing the risk totally from the business
- the state of being free from harm, danger, or fear, or the measures taken to ensure that protection
- - moving the financial impact of the potential loss over to an insurance company.
- -those that will deter man from committing such act of fear of being caught, charge in court or get dismissed, such as: security education, programs, investigations, seminars, personnel security check.
- - planned assumption and acceptance of the potential risk by making a deliberate managerial decision of doing nothing about the threat or setting aside resources for use in case of loss.
- includes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyaity to the government, from gaining access to classified matter or to any security facility, and to prevent appointment, or retention as employees of such individuals.
- - can be defined as any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation.
20 Clues: - A chance of being injured or harmed; • - An indication of impending danger or harm; • - removing the risk totally from the business • Placement of security offices near entry points. • - minimizing the probability of the potential loss • - moving the financial impact of the potential loss over to an insurance company. • ...
XMASS2024 2024-12-25
Across
- unmanned flying objects
- exceeding big
- one way provider of space travel
- acess the web from anywhere
- cyber currency
- AI chip designer
- putin nemesis
- resurrection from the ashes
Down
- avoid these in the Red Sea
- singer of the "era"
- Musk's new office
- vax denier/FDA director?
- you have a "fast car", I'll go anywhere
- Trump may appoint more
14 Clues: exceeding big • putin nemesis • cyber currency • AI chip designer • Musk's new office • singer of the "era" • Trump may appoint more • unmanned flying objects • vax denier/FDA director? • avoid these in the Red Sea • acess the web from anywhere • resurrection from the ashes • one way provider of space travel • you have a "fast car", I'll go anywhere
Our Government <3 2025-04-19
Across
- Criminal
- Worm
- Flies false flags
- Should have retired years ago
- Put on blast in in Borat 2
- Loves the bottle
- Was on American Idol
- Dog "lover"
Down
- Receives gifts in exchange for political favors
- Plays in a spaceship
- An inexperienced Speaker
- Just grilling some meats
- Loves Their Sofa
- Got cyber bullied in an online game
14 Clues: Worm • Criminal • Dog "lover" • Loves the bottle • Loves Their Sofa • Flies false flags • Plays in a spaceship • Was on American Idol • An inexperienced Speaker • Just grilling some meats • Put on blast in in Borat 2 • Should have retired years ago • Got cyber bullied in an online game • Receives gifts in exchange for political favors
Cybersecurity 2025-08-29
Across
- Blocks unauthorized access
- User authentication string
- Hides system access
- Overloads a server
- Software security fix
- Tracks online activity
- Adds login security
- Records keystrokes typed
- Protects against malware
- Harmful software program
- Secure network tunnel
- Network of hijacked devices
Down
- Self-replicating virus
- Locks files for payment
- Malware disguised software
- Secretly collects data
- Secures data with code
- Fake email scam
- Decoy system trap
- Unknown software flaw
20 Clues: Fake email scam • Decoy system trap • Overloads a server • Hides system access • Adds login security • Software security fix • Unknown software flaw • Secure network tunnel • Self-replicating virus • Secretly collects data • Tracks online activity • Secures data with code • Locks files for payment • Records keystrokes typed • Protects against malware • Harmful software program • ...
Crossword Puzzle (CYBERCRIME) 2021-07-05
Across
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- A politically- or ideologically-motivated cyber attack or hack.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- or operating in transnational several nations
- The act of one individual harassing or intimidating another individual via the Internet.
- define as “malicious software” specifically designed to gain access to or damage a computer
- the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists.
- the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
- A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
- an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.
- other terms for cybercrime
- These are the types of hackers who break into systems and networks just to draw attention towards an alarming social cause.
- hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications.
- The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
- (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory
- An online journal. Contraction of the term “web log.”
- The overarching program that runs all the functions on a computer or other electronic device.
- administrator An individual who manages and oversees a network.
- sexual arousal involving communication on the internet
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- A group of computers that is linked to share data and other information.
- A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
- hacker objective is to find black hat hackers, intercept and destroy their schemes.
- Plays an essential role in the detection, prevention, mitigation, and investigation of cybercrime because it predominantly owns and manages the critical infrastructure
- A massed data that is used to describe large amounts of other Internet data.
- A website that finds information across the Internet based on a set of search criteria.
- the activity of converting data or information into code
Down
- A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
- They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware.
- This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.
- A company that offers access to the Internet.
- crime that involves a computer and a network.
- An information packet sent from a website to a web browser that records a user’s activity on that website.
- A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
- These are individuals who are considered the “cutting-edge geniuses”. They are the real experts and the innovators in the field of hacking.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- A satellite navigation system that identifies the precise location of the transmitting device.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.
- someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
- someone who attempts to prevent terrorism or intended to prevent terrorism
- These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.
- A way to access an electronic system by bypassing some or all security mechanisms.
- A username and password used to identify an individual attempting to gain access to a restricted page or network.
- A software robot that performs automated tasks.
- it is a modern day, technical twist on a crime that has been around for ages – extortion. At its core, it works when criminals steal something of great value and demand payment in exchange for its return.
- an assault on electronic communication networks
- A camera connected to a computer, generally used to then stream videos to the Internet.
51 Clues: other terms for cybercrime • A company that offers access to the Internet. • or operating in transnational several nations • crime that involves a computer and a network. • A software robot that performs automated tasks. • an assault on electronic communication networks • An online journal. Contraction of the term “web log.” • ...
Thanksgiving Crossword 2022-10-31
Across
- Thanksgiving’s favorite starch
- Thanksgiving day
- The thanksgiving emotion
- THE thanksgiving pie
- Sweet Potato Casserole with ____
- Half of the first Thanksgiving attendants
- Ocean Spray
- The original pilgrim colony
- _____ Monday
- The soup of green bean casserole
Down
- The holiday in question
- Thanksgiving’s sport
- Inside turkey
- Fall
- Pie nut
- The best part of thanksgiving
- Served wWith turkey
- The star of the meal
- Mac & _____
- The second best part of Black Friday
- The month of Thanksgiving
- Friday, Shopping extravaganza
- Fall fruit pie
23 Clues: Fall • Pie nut • Ocean Spray • Mac & _____ • _____ Monday • Inside turkey • Fall fruit pie • Thanksgiving day • Served wWith turkey • Thanksgiving’s sport • THE thanksgiving pie • The star of the meal • The holiday in question • The thanksgiving emotion • The month of Thanksgiving • The original pilgrim colony • The best part of thanksgiving • Friday, Shopping extravaganza • ...
UN Security Council 2022-05-23
Across
- members of the UN agree to accept and carry out decisions of the Security Council in accordance with the present charter.
- member votes needed to make a decision
- and when necessary _____ special reports
- number of members in the UN
- the Security Council elects their own ______
- term of non permanent members
- responsible for the maintenance of international peace and secuirty.
- each member of the Security Council shall be _______ at all times at the seat of the organization.
Down
- the security council shall be so ____ as to be able to function continuously.
- a party to dispute shall ______ from voting
- the Secuirty Council has its own _____ of procedure.
- each member of the committee has this many votes
- UN
- the Secuirty Council shall submit ____ reports
- meetings may be held at other _____
15 Clues: UN • number of members in the UN • term of non permanent members • meetings may be held at other _____ • member votes needed to make a decision • and when necessary _____ special reports • a party to dispute shall ______ from voting • the Security Council elects their own ______ • the Secuirty Council shall submit ____ reports • ...
Investing - Ayden Templeton 2025-03-25
Across
- Government Medical Health Plan
- Buffett CEO of Berkshire Hathaway
- market when markets fall
- market When markets rise
- Factors Something the company has done, like introducing a new product
- A security representing the ownership of a fraction of a corporation.
- Security To address the permanent problem of economic security for the elderly
- cap The total value of a company’s stock
- A company that a larger company owns
- fund A fund that pools money from a large group of investors
Down
- Factors Something that does not directly involve the company, like a pandemic
- traded funds a collection of stocks, bonds, etc
- They represent a loan from the buyer
- Employer-sponsored retirement savings plan
- refers to the process of offering shares of a private corporation
- IRA Individual retirement account
- Federal Insurance Contributions Act(Social Security and Medicare taxes)
- Cost averaging a strategy in which you invest your money in equal amounts, at regular intervals
- Market A place where people buy and sell pieces of companies, called shares, to make money
- The availability of cash
- An amount of money saved/available for a specific purpose
21 Clues: The availability of cash • market when markets fall • market When markets rise • Government Medical Health Plan • Buffett CEO of Berkshire Hathaway • IRA Individual retirement account • They represent a loan from the buyer • A company that a larger company owns • cap The total value of a company’s stock • Employer-sponsored retirement savings plan • ...
Chapter 10: Corrections History and Structure 2023-05-04
Across
- program allowing inmates to leave the institution during the day to work at a job.
- process in which state and federal governments contract with the private sector to help finance and manage correctional facilities
- 18th-century place of penitence for all convicted felons except those sentenced to death
- jails designed to increase staff interaction with inmates by placing the staff inside the inmate housing unit
- camp highly regimented correctional facility where inmates undergo extensive physical conditioning and discipline
- most secure prison facility, sort of super-max, high walls, gun towers and barbed wire or electronic fences.
- system by which prisoners earned "marks" for good behavior to achieve an early release from prison
- prison where the most predatory and dangerous criminals are confined
- prison with lowest level of security housing nondangerous, stable offenders.
- a penal institution generally used to confine first-time offenders between the ages of 16 and 30
Down
- a 19th-century system model that held prisoners in isolation during the night, allowed them to work together during the day in silence
- farms correctional institutions that produce much of the livestock, dairy products, and vegetables used to feed inmates in the state prisons
- 19th-century prison model that separated inmates
- institution that holds pretrial detainees and people convicted of less serious crimes
- facility at the Guantanamo Naval Base in Cuba that is used for the confinement of suspected terrorists
- institution where men and women are confined together
- an institution for the confinement of people who have been convicted of serious crimes
- middle-level prison;relaxed security measures and fewer inmates
18 Clues: 19th-century prison model that separated inmates • institution where men and women are confined together • middle-level prison;relaxed security measures and fewer inmates • prison where the most predatory and dangerous criminals are confined • prison with lowest level of security housing nondangerous, stable offenders. • ...
PERUNDUNGAN 2023-01-09
12 Clues: PERUNDUNGAN • PERUNDUNGAN • CYBER BULLYING • BENTUK PERUNDUNGAN • CONTOH PERUNDUNGAN • ORANG YANG DIBULLY • ORANG YANG MEMBULLY • KETIKA MELIHAT BULLY • JAUH DI MATA DEKAT DI HATI • BURUNG BISA TERBANG KARENA MEMILIKI? • BIASA DIGUNAKAN UNTUK MEMATIKAN AC/TV • APA YANG DILAKUKAN ORANG KETIKA SAKIT?
Cyber Physical System Vulnerabilities 2023-11-28
Across
- published vulnerabilities
- an attack designed to interfere with the normal operation of a system
- people with knowledge and access may present the most serious threat
- __________ between CPSs is often accomplished using low energy wireless communication
- interconnection of multiple devices creates additional attack surfaces
- often motivated by regional and/or international conflicts
- some system are outdated and lack modern security features
- assumption that it is more expensive to do security correctly
- belief that short range communication is secure simply because of distance
- sometimes not encrypted because of low power
- hacking for financial gain
- users should have only the privilege required to do their job and only for the time that they need it
- e.g. not resetting default passwords or falling for fishing scams
- people think they know how to manage/use their computers but may put too much faith in computing
- malicious code executed on a system
- bot created to brick CPSs with default passwords
- connecting unnecessary devices to the internet
- lack of understanding of security and/or security protocols
- easy to get the tools and the knowledge to attach CPSs
Down
- because CPS systems can often be accessed via the internet or even physically, they are considered to be ________-__________
- limit the ability of systems to be accessed remotely, especially with privilege
- everyone has there own moral compass and decision making processes
- malicious system interjected into the network to either sniff or interrupt traffic
- humans treat security as an afterthought
- low power, often with limited power
- gaining access through impersonation
- connection between physical and digital
- The fact that CPSs are _______ adds another layer of attack vectors
- attack designed to interrupt weak network traffic between CPSs
- inconsistent software/security between components
- inadequate education of employees to monitor systems
- likely to be installed but not patched
- low processing ability for computation
- making sure that user accounts are managed to eliminate unused accounts and unneeded privilege
- lack of login security, two-factor, etc.
- lack of segmentation of network infrastructure
- an example of a light weight, low energy communication protocol
37 Clues: published vulnerabilities • hacking for financial gain • low power, often with limited power • malicious code executed on a system • gaining access through impersonation • likely to be installed but not patched • low processing ability for computation • connection between physical and digital • humans treat security as an afterthought • ...
May 2020 Crossword Puzzle 2020-05-07
Across
- A list of blocked email addresses.
- A cyber-attack method where the cyber attacker leaves a voice mail posing as a legitimate institution to trick targets into calling back and revealing their personal information.
- A targeted cybercrime that contacts a target by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- Process of converting plaintext information or data into a ciphertext code to prevent unauthorized access.
- Information identifying an individual that if lost, compromised, or disclosed could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual.
- Information that can be used to identify an individual alone or with other information.
Down
- Information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified.
- The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via email, telephone, or text message.
- A scam in which the criminal takes on the identity of a victim and then attempts to live and act as the stolen identity.
- A mobile device-oriented attack where the cyber attacker sends you a text message with a fake link that leads to a malicious website.
10 Clues: A list of blocked email addresses. • Information that can be used to identify an individual alone or with other information. • Process of converting plaintext information or data into a ciphertext code to prevent unauthorized access. • A scam in which the criminal takes on the identity of a victim and then attempts to live and act as the stolen identity. • ...
Milestones in Social Security 2025-12-29
Across
- Health insurance program for Americans age 65 and older added to Social Security in 1965
- The Social Security Act provided monthly pension checks for workers age _____ or older who retired from their jobs
- Social Security was financed by this on employers and workers
- The Social Security _____ Act was passed in 1984
- The cost-of-living increase to monthly benefits, offset the effect of _____ on fixed Social Security incomes
Down
- Became eligible for Social Security benefits in 1950
- Some predict that by 2033 the program will _____ of money for benefit payouts
- Provides health insurance to needy persons of any age
- The Social Security program was expanded in 1939 to pay benefits to the survivors of _____ workers or retirees
- In 1950, these adjustments to Social Security began
10 Clues: The Social Security _____ Act was passed in 1984 • In 1950, these adjustments to Social Security began • Became eligible for Social Security benefits in 1950 • Provides health insurance to needy persons of any age • Social Security was financed by this on employers and workers • Some predict that by 2033 the program will _____ of money for benefit payouts • ...
Cyber Crossword 2021-11-01
Across
- a form of malware which locks a user out of their own system and cuts access to their files usually with instructions for payment.
- a stealthy threat actor which gains unauthorised access to a network and remains undetected for an extended period of time.
- software that runs automated tasks over the internet.
- runs a background process to generate profit for the attacker, unbeknownst to the user.
- a cyber-attack in which the perpetrator uses multiple systems to make a machine or network resource unavailable to its users by disrupting the services of a host connected to the internet.
Down
- the part of malware that performs malicious actions.
- a trial and error method to decrypt data.
- a technique which tricks users into revealing sensitive information to seemingly benign sources.
- a destructive self-contained program which can self-replicate.
- a malware program that can be installed on a system which can provide unhindered access to remote applications.
- a threat that is not known to the public and hence hidden from signature-based detection controls.
- a software program designed to hijack a computer system or steal sensitive information from a device.
12 Clues: a trial and error method to decrypt data. • the part of malware that performs malicious actions. • software that runs automated tasks over the internet. • a destructive self-contained program which can self-replicate. • runs a background process to generate profit for the attacker, unbeknownst to the user. • ...
Cyber Awareness 2022-02-12
Across
- programs like worms, trojans, and viruses hackers use to gain access and cause destruction
- protection from unauthorized changes
- this ensures authorized users have access
- process of scrambling plain text into an unreadable format
- email allegedly coming from a company or person you know trying to get personal information
- verify identity
Down
- flaw or weakness in a computer system that could be exploited
- type of malicious software that blocks access until money is paid
- the address of a webpage that you should verify before clicking
- a wireless technology standard used over short distances
- unauthorized access to a network, information systems, or application
- should include lower and upper case letters, numbers, and special characters
12 Clues: verify identity • protection from unauthorized changes • this ensures authorized users have access • a wireless technology standard used over short distances • process of scrambling plain text into an unreadable format • flaw or weakness in a computer system that could be exploited • the address of a webpage that you should verify before clicking • ...
cyber bullying 2024-04-23
Across
- The act of intentionally excluding or isolating someone from an online group or community
- Pretending to be someone else online in order to harass or deceive them
- FOOTPRINT A digital representation of a person's online presence and activities
- The act of harassing, threatening, or embarrassing others online
- A type of online harassment that involves repeatedly sending unwanted messages
- The emotional or psychological harm caused by cyberbullying
- MEDIA An online platform or community where people can share and interact with content
- LITERACY The use of digital tools and resources to create and share content
- A false or misleading piece of information spread online, often to cause harm
Down
- A person who stands up against bullying and supports the victim
- The practice of protecting one's personal information and privacy online
- Sharing private or embarrassing information about someone online without their consent
- The practice of using electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- A network of interconnected web pages, also known as the "World Wide Web"
- CITIZENSHIP The ability to use technology and the internet in a safe, responsible, and ethical manner
15 Clues: The emotional or psychological harm caused by cyberbullying • A person who stands up against bullying and supports the victim • The act of harassing, threatening, or embarrassing others online • Pretending to be someone else online in order to harass or deceive them • The practice of protecting one's personal information and privacy online • ...
Cyber Challenges 2025-01-26
Across
- Malicious software that damages or disrupts systems
- Two-_____authentication: A security measure requiring two forms of verification
- A software update that fixes security vulnerabilities.
- Malicious software that secretly collects user information
- Fraudulent emails or messages designed to steal sensitive data
- A person who illegally accesses computer systems.
- _____breach-unauthorized access to confidential information
Down
- A type of malware that locks files and demands payment to restore access
- The process of converting data into a secure code
- A type of malware disguised as a legitimate program.
- A security system that blocks unauthorized access
- _____fishing-the act of creating a fake online identity to trick and control others
12 Clues: The process of converting data into a secure code • A security system that blocks unauthorized access • A person who illegally accesses computer systems. • Malicious software that damages or disrupts systems • A type of malware disguised as a legitimate program. • A software update that fixes security vulnerabilities. • ...
cyber ethics 2025-06-14
Across
- the simplest way to prevent plagiarism is through proper ----------.
- information or impression about a person that exits on internet because of his online activity.
- what refers to the unwanted bulk emails that come from unknown sources in large ammount.
- hacking done for a good reason is called what?
Down
- process of transforming data into an unreadable code.
- legal rules and laws that is imposed on online user can be also called as what?
- criminal activities that involves the uses of computers and internet connection is called.
- what refers to a illegal intrusion into a computer.
- what refers to being aware of the ethical practices in internet.
- there is an equivalent term of hacking it is called what?
- what refers to the coping another original rights and original works.
- act of harmin and harming,harassing,or targetting a person using the internet in a deliberate manner is called what
12 Clues: hacking done for a good reason is called what? • what refers to a illegal intrusion into a computer. • process of transforming data into an unreadable code. • there is an equivalent term of hacking it is called what? • what refers to being aware of the ethical practices in internet. • the simplest way to prevent plagiarism is through proper ----------. • ...
Cyber Ethics 2025-06-10
Across
- This refers to an act of stealing and misusing someone's personal information
- It is a security system that prevents unauthorised people from accessing our system and network
- It refers to unwanted bulk emails that come from unknown sources
- It means accessing the internet in an illegal manner
- They refers to a set of procedures, moral principles and ethical practises that regulate the use of a computer and the internet
- Fraudulently obtaining money from depositors by claiming to be an authorised bank or a financial institution
Down
- It refers to criminal activities that involve the use of computers, networks, and the internet connections with the intent to cause harm to individuals or their digital devices
- We purchase a single licensed copy of the software and load it onto several computers contrary to the licence's terms
- The practice in which spam attackers keep sending bulk emails till the mail server gets full
- It is a program or a set of programs that disrupts the normal functioning of a computer
- It refers to an illegal intrusion into a computer system or network
- It is the process of transforming data into unreadable code
12 Clues: It means accessing the internet in an illegal manner • It is the process of transforming data into unreadable code • It refers to unwanted bulk emails that come from unknown sources • It refers to an illegal intrusion into a computer system or network • This refers to an act of stealing and misusing someone's personal information • ...
Cyber Quiz 2023-10-26
Across
- I'm a digital spy, silently watching your every move. I send your secrets to others, all without your knowledge. What am I?
- I'm a jigsaw puzzle of letters, numbers, and symbols. You must solve me to gain access to your accounts. What am I?
- type of attack where an attacker attempts to gain unauthorized access by trying various password combinations.
- I'm a guardian that monitors your network, searching for and stopping suspicious activity. What am I?
Down
- I'm a wall of protection that surrounds your computer or network, keeping threats at bay. What am I?
- A security incident in which a system or network is overwhelmed with traffic to make it unavailable.
- I'm a silent watcher in the shadows, recording every key you press and every website you visit. What am I?
- I'm a place where hackers convene and exchange stolen data and cyber-attack strategies. What am I?
- I'm a deceptive chameleon that changes appearance to mimic trustworthy sources. What am I?
- I'm a set of numbers and letters that identifies you online. You use me to log in, but I must be kept secret. What am I?
10 Clues: I'm a deceptive chameleon that changes appearance to mimic trustworthy sources. What am I? • I'm a place where hackers convene and exchange stolen data and cyber-attack strategies. What am I? • I'm a wall of protection that surrounds your computer or network, keeping threats at bay. What am I? • ...
Investing - Ayden Templeton 2025-03-25
Across
- Security To address the permanent problem of economic security for the elderly
- Market A place where people buy and sell pieces of companies, called shares, to make money
- - Government Medical Health Plan
- IRA - Individual retirement account
- market - when markets fall
- Factors Something the company has done, like introducing a new product.
- - Employer-sponsored retirement savings plan
- - An amount of money saved/available for a certain purpose
- market - When markets rise
- cap - The total value of a company’s stock
Down
- funds - a collection of stocks, bonds, etc.
- Factors - Something that does not directly involve the company like a pandemic.
- - They represent a loan from the buyer
- Federal Insurance Contributions Act(Social Security and Medicare taxes)
- refers to the process of offering shares of a private corporation
- - A company that a larger company owns
- Buffett - CEO of Berkshire Hathaway
- fund - A fund that pools money from a large group of investors
- A type of security representing the ownership of a fraction of a corporation.
- - The availability of cash
- Cost averaging - a strategy in which you invest your money in equal amounts, at regular intervals.
21 Clues: - The availability of cash • market - when markets fall • market - When markets rise • - Government Medical Health Plan • Buffett - CEO of Berkshire Hathaway • IRA - Individual retirement account • - They represent a loan from the buyer • - A company that a larger company owns • cap - The total value of a company’s stock • funds - a collection of stocks, bonds, etc. • ...
Investing - Ayden Templeton 2025-03-25
Across
- Security To address the permanent problem of economic security for the elderly
- Market A place where people buy and sell pieces of companies, called shares, to make money
- Government Medical Health Plan
- IRA Individual retirement account
- market when markets fall
- Factors Something the company has done, like introducing a new product.
- Employer-sponsored retirement savings plan
- An amount of money saved/available for a certain purpose
- market When markets rise
- cap The total value of a company’s stock
Down
- funds a collection of stocks, bonds, etc.
- Factors Something that does not directly involve the company like a pandemic.
- They represent a loan from the buyer
- Federal Insurance Contributions Act(Social Security and Medicare taxes)
- refers to the process of offering shares of a private corporation
- A company that a larger company owns
- Buffett CEO of Berkshire Hathaway
- fund A fund that pools money from a large group of investors
- A security representing the ownership of a fraction of a corporation.
- The availability of cash
- Cost averaging - a strategy in which you invest your money in equal amounts, at regular intervals.
21 Clues: The availability of cash • market When markets rise • market when markets fall • Government Medical Health Plan • Buffett CEO of Berkshire Hathaway • IRA Individual retirement account • They represent a loan from the buyer • A company that a larger company owns • cap The total value of a company’s stock • funds a collection of stocks, bonds, etc. • ...
Chapter 3 Retailing in E-Commerce: Products and Services 2020-10-11
Across
- _________ reduces the operational cost by cutting down number of branches and employees of a bank.
- _________-and-mortar is a strategy which it combines the traditional retailer and a webstore.
- Channel _________ is a situation where online sales channel from the manufacturer damage the well-being of an existing channel partner.
- Digitized products eliminates the intermediaries like _________ print media.
- retailing conducted over the Internet.
- An activity that many companies use Internet to conduct to look for potential candidates for vacancies.
- _________ e-tailer sells directly to customers over the Internet without maintaining physical store.
- Online _________ calculator and current loan rates are mostly available on real estate sites.
- One of the limitations of job market which it concerns with personal data posted on the Internet.
Down
- Existence of mature _________ system is one of the criteria of successful e-tailers.
- One of the income sources for online travel and tourism site.
- _________ reality is one of the technologies that some real estate sites embrace to display the property unit.
- retailers who conducts business online.
- A grocer that takes orders online and provides deliveries.
- One of the cyber security attack towards the customers that tempts the customers to click on a link that might lead to stealing of customers' sensitive information.
- Third-party that usually provides free comparison between insurance policies available online.
- _________ service is to ensure a secured transaction where the seller receives the payment, while the customers receive the products.
- Online _________ trading enables the investors to research information about companies and mutual funds more easily.
18 Clues: retailing conducted over the Internet. • retailers who conducts business online. • A grocer that takes orders online and provides deliveries. • One of the income sources for online travel and tourism site. • Digitized products eliminates the intermediaries like _________ print media. • ...
SFS 2 Vocab 2/3 2023-09-26
Across
- Do the letters flow or are they erratic and shaky?
- fiber created from natural materials or by chemical processes, a man-made fiber
- Check for pressure on the downward and upward strokes.
- the writing tilt to the left or right, or is it straight up and down
- handwriting is difficult to disguise and forge
Down
- Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute of uncertain
- Similar to fingerprints, every person's handwriting is unique
- Compare how capital letters are joined to lowercase letters
- Specially trained person who scientifically analyzes handwriting and other features in a document.
- the overall height, width, and size of the letters
- the examination and comparison of questioned documents with known material
- making, altering, or falsifying a person's signature or any other aspect of a document with the intent to deceive another
- a computer or computer system intended to mimic likely targets of cyber attacks
- Good tool for including or excluding persons when determining a match
- Examine the average amount of area between words and letter formation. Are the letters and margins the same/similar? Are the letters equally spaced or crowded?
- also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
- about the amount that is written in illegitimate checks every
- (aka. Baseline characteristics) Does the writing tend to follow a straight line, move downward, or move upward? Is it above or below the line?
18 Clues: handwriting is difficult to disguise and forge • Do the letters flow or are they erratic and shaky? • the overall height, width, and size of the letters • Check for pressure on the downward and upward strokes. • Compare how capital letters are joined to lowercase letters • Similar to fingerprints, every person's handwriting is unique • ...
bullying 2025-06-19
9 Clues: online • left out • punching • talking to them • doing something evryday • health bad mental health • just watching not helping • doing it straight to somone • helping the person getting builled
TTS BK Part 1 2022-10-25
Across
- - sifat kewanitaan
- - Mengomentari fisik orang lain secara negatif
- - Luarnya tenang. Dalemnya ambyar
- - Dunia maya
- - Takut ketinggalan trend
- - Lawan kata insecure
- - Hubungan yang tidak menyenangkan
- - sifat kelaki-lakian
Down
- - lawan dari fear of missing out
- - Ketergantungan dengan teknologi digital dan media sosial secara terus-menerus
- - Tidak percaya diri
- - Perundungan
- - Salah satu dampak dari memendam perasaan
13 Clues: - Dunia maya • - Perundungan • - sifat kewanitaan • - Tidak percaya diri • - Lawan kata insecure • - sifat kelaki-lakian • - Takut ketinggalan trend • - lawan dari fear of missing out • - Luarnya tenang. Dalemnya ambyar • - Hubungan yang tidak menyenangkan • - Salah satu dampak dari memendam perasaan • - Mengomentari fisik orang lain secara negatif • ...
Anonymous and hacktivism 2021-02-12
13 Clues: menace • reveal • self-assured • refusing to obey • not easy to find • opposite of a lie • make something known • illegal cyber activity • an opinion take a stand • a large number of people • a person who defies the government • someone who breaks into a computer system • a person who alerts about something illegal
Week 6 2025-01-10
Across
- What does Trump want to do to Canada
- What did they do to the results of the election this week
- What boulevard had many abandoned cars due to the fire
- What kind of crab are they fishing for
- What animal was shown playing in the snow
- Where has there been a ban on crab fishing for the past two yeas
- How did the cyber truck attacker find information for his plan
- What president made his final journey to Washington
- How did they get to the fire through the cars
- What kind of cancer did she have causing him to take over
- What part of California is currently taken over by wildfires
- Trump wants to change the name of the Gulf of Mexico to the Gulf of what
Down
- What street is in need of repairs brought to light by recent events
- What company is ending fact checking
- Who won their first Golden Globe
- The cyber truck was a American what
- Did the man take over for his adoptive or biological mother
- What countries prime minister resigned
- Where is the Bakery give me sugar
- What percent of crab has vanished from the water
- What cars have been having issues with hitting parked cars
- What canal does Trump want to take over
- What new cost is adding $45 a week to new yorkers
23 Clues: Who won their first Golden Globe • Where is the Bakery give me sugar • The cyber truck was a American what • What company is ending fact checking • What does Trump want to do to Canada • What countries prime minister resigned • What kind of crab are they fishing for • What canal does Trump want to take over • What animal was shown playing in the snow • ...
online 2020-08-26
cyber-security-safety-on-the-road 2023-09-14
Across
- Use this drive for business or project files.
- Before you leave, _____ your data.
- Use ___ to access the Boise Cascade network.
- Block unauthorized access while permitting outward communication.
Down
- Many phones can be turned into a _______.
- Use this drive for department files.
- Another word for concealed.
- Avoid public ____.
8 Clues: Avoid public ____. • Another word for concealed. • Before you leave, _____ your data. • Use this drive for department files. • Many phones can be turned into a _______. • Use ___ to access the Boise Cascade network. • Use this drive for business or project files. • Block unauthorized access while permitting outward communication.
RU ITEC411( Crime and Security) 2023-10-17
Across
- Thieves utilize the identity of an ignorant, innocent person in a variety of crimes
- utilize their expertise to expose system flaws and enhance security
- voice phishing
- open access was first implemented as a method of sharing material for study.
- methods for stealing financial and personal data
- By putting fake U RLs in Domain Name Servers, fake websites that fish for personal and financial information
- text messaging
Down
- the expansion of mobile and online technologies
- Unauthorized use of a computer is prohibited.
- a duty to advance with security as a priority
- are employed to keep an eye on and block communication from unreliable websites.
- Publishers are required to stop content or services from being accessed in nations where they are prohibited.
- A worm with incredible sophistication
- is hacking used to advance a political purpose
- biological traits that are specific to an individual
- a duty to employ security tools and keep an eye on their networks to thwart attacks
- a duty to research the available resources, ask questions, and become knowledgeable about security measures
- The expense of defending against an attack was included to the definition of loss under Act.
- The excitement of programming
20 Clues: e-mail • voice phishing • text messaging • The excitement of programming • A worm with incredible sophistication • Unauthorized use of a computer is prohibited. • a duty to advance with security as a priority • is hacking used to advance a political purpose • the expansion of mobile and online technologies • methods for stealing financial and personal data • ...
Team-4 2023-03-31
3 Clues: Continuously monitors end user devices to detect and respond to cyber threats • A document prepared for capturing controls implemented for meetina contractual requirement • Group of experts responsible for the protection against detection of and response to an organisation's security incidents
Angus cyber safety 2016-06-08
Across
- you can search stuff up
- way you read fast
- you type in to log onto a computer
- and dad
- that no one can see
- who goes into your account and steals stuff
- who stalks you online
- way to contact people
Down
- device people use to text
- who bully's you online
- details
- front of your computer
- that no one can see
- protects your computer
- who you don't know that emails you heaps of times
- a cold for your computer
- who teaches you
- use a keyboard to type words onto it
- of unsafe
- people use to send stuff to anyone who has it
20 Clues: details • and dad • of unsafe • who teaches you • way you read fast • that no one can see • that no one can see • who stalks you online • way to contact people • who bully's you online • front of your computer • protects your computer • you can search stuff up • a cold for your computer • device people use to text • you type in to log onto a computer • use a keyboard to type words onto it • ...
Cyber - Key words 2024-12-03
Across
- Protects systems by controlling incoming and outgoing network traffic.
- Malicious software that blocks access to data until a ransom is paid.
- Virtual Private Network, enhances online privacy and security.
- Software designed to disrupt, damage, or gain unauthorized access to systems.
- Small data stored on a user's computer by a website.
- A string of characters used to authenticate access to a system.
- Regularly applied software improvements for security and functionality.
- An attack that floods a system with traffic to disrupt its normal operations.
- Moral principles guiding responsible use of technology.
Down
- Fraudulent attempt to obtain sensitive information through deceptive emails.
- Information processed or stored by a computer.
- A group of interconnected devices sharing resources.
- A type of malware disguised as legitimate software.
- A barrier to protect a network from unauthorized access.
- Software designed to detect and remove malicious programs.
- Software that secretly gathers user information without consent.
- Unwanted or junk email messages.
- The process of converting data into a code to prevent unauthorized access.
- A set of rules governing data communication over a network.
- A person who exploits weaknesses in computer systems or networks.
20 Clues: Unwanted or junk email messages. • Information processed or stored by a computer. • A type of malware disguised as legitimate software. • A group of interconnected devices sharing resources. • Small data stored on a user's computer by a website. • Moral principles guiding responsible use of technology. • A barrier to protect a network from unauthorized access. • ...
The Cyber Gridlock 2026-01-15
Across
- I fail once and many may feet it
- I look real, I sound real but i am not real
- Password go in, Scrambled digits come out
- Your files still exist, but you can't touch them unless you pay me
- I answer without understanding, yet sound like I do
- I wake the system up before it can do anything
- Letting code play without letting it break anything
- A tool that conceals malicious activity at the core level
Down
- James Bond espionage but with Wi-Fi
- Every key you press tells me a secret
- I am strongest when I make no sense
- Flaw exploited before anyone knows
- I make you pay the electricity bill while i earn the coins
- I am software, but I like Hardware
- I understand only Zeros and ones, yet do everything
- silent zombies working together for cyber attack
- Delay before data begins to transfer
- Inbox filler no one asked for
- Two symbols endless meaning
19 Clues: Two symbols endless meaning • Inbox filler no one asked for • I fail once and many may feet it • Flaw exploited before anyone knows • I am software, but I like Hardware • James Bond espionage but with Wi-Fi • I am strongest when I make no sense • Delay before data begins to transfer • Every key you press tells me a secret • Password go in, Scrambled digits come out • ...
Piggyccinos 2022-10-04
13 Clues: Bae of Bengal • Cyber-venomous • Big brother Tae • Banana profiling • King of Persia-h • Teacup piggyccino • Turk administration • Clean out the channel • Beatle greeting, circa '68 • home is where the heart is • land of the pop culture E-mau5 • Asian-pigmentation-fusion = profit • What a broken clock that's all talk needs
CyberSN Kickoff 2023-01-31
Across
- Will send you phish
- When Identity Matters Most
- I can't pay this fee
- Your match awaits
- Cyber ______ Center
- Changing the game or a disturbance
Down
- CI at CyberSN
- Platform front end techstack
- ____ is the conversation
- Commission free trading
- Has a conversion rate in the agreement
- In many languages this morning
- Primary color
13 Clues: CI at CyberSN • Primary color • Your match awaits • Will send you phish • Cyber ______ Center • I can't pay this fee • Commission free trading • ____ is the conversation • When Identity Matters Most • Platform front end techstack • In many languages this morning • Changing the game or a disturbance • Has a conversion rate in the agreement
Contributions to the governemnt by Franklin D. Roosevelt 2025-04-08
Across
- AKAdirty thirties
- - who had less government involvement
- - what caused the enactment of the social security act
- - how long did the dust bowl last
- - who was the social security act originally for
- - start of dust bowl
Down
- - start of social security act
- - who had more government involvement
- - how much was the pension throughout the social security act
- - what slowly brought the dust bowl to an end
- people - how many people joined clubs to support Francis E. Townsend
- - how much land did the drought render
- - what event happened because of the stock market crash.
13 Clues: AKAdirty thirties • - start of dust bowl • - start of social security act • - how long did the dust bowl last • - who had more government involvement • - who had less government involvement • - how much land did the drought render • - what slowly brought the dust bowl to an end • - who was the social security act originally for • ...
Crossword Puzzle (CDI 04) 2021-07-05
Across
- A way to access an electronic system by bypassing some or all security mechanisms.
- A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
- A politically- or ideologically-motivated cyber attack or hack.
- the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
- A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
- or operating in transnational several nations
- A website that finds information across the Internet based on a set of search criteria.
- an assault on electronic communication networks
- An information packet sent from a website to a web browser that records a user’s activity on that website.
- This is the set of individuals who simply want to observe and learn about the world of hacking. It comprises those who join learning communities to watch videos and tutorials about hacking.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
- A company that offers access to the Internet.
- someone who attempts to prevent terrorism or intended to prevent terrorism
- A username and password used to identify an individual attempting to gain access to a restricted page or network.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
- define as “malicious software” specifically designed to gain access to or damage a computer
- These are individuals who are considered the “cutting-edge geniuses”. They are the real experts and the innovators in the field of hacking.
- Plays an essential role in the detection, prevention, mitigation, and investigation of cybercrime because it predominantly owns and manages the critical infrastructure
- A software robot that performs automated tasks.
- A camera connected to a computer, generally used to then stream videos to the Internet.
- hidden collective of internet sites only accessible by a specialized web browser. It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications.
- A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
Down
- An online journal. Contraction of the term “web log.”
- crime that involves a computer and a network.
- These are hackers who use psychological manipulation to make people to divulge private contents or to perform certain actions. It is a more complex crime scheme.
- They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware.
- hacker objective is to find black hat hackers, intercept and destroy their schemes.
- an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.
- sexual arousal involving communication on the internet
- The act of one individual harassing or intimidating another individual via the Internet.
- A massed data that is used to describe large amounts of other Internet data.
- someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
- the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists.
- when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.
- administrator An individual who manages and oversees a network.
- A satellite navigation system that identifies the precise location of the transmitting device.
- it is a modern day, technical twist on a crime that has been around for ages – extortion. At its core, it works when criminals steal something of great value and demand payment in exchange for its return.
- a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- These are the types of hackers who break into systems and networks just to draw attention towards an alarming social cause.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- A coordinated attack that aims to overwhelm the resources of a targeted system to crash that system.
- (computer science) written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory
- The overarching program that runs all the functions on a computer or other electronic device.
- other terms for cybercrime
- The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
- the activity of converting data or information into code
- A group of computers that is linked to share data and other information.
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
51 Clues: other terms for cybercrime • crime that involves a computer and a network. • or operating in transnational several nations • A company that offers access to the Internet. • an assault on electronic communication networks • A software robot that performs automated tasks. • An online journal. Contraction of the term “web log.” • ...
Cybersecurity Crossword Puzzle 2026-02-27
Across
- Structures like NIST used to manage security risk.
- Software designed to damage or gain unauthorized access to a system.
- A security handshake that requires at least two pieces of proof.
- Top IT security role
- Malware that demands payment to unlock files.
- Phishing via voice or phone call.
Down
- The digital sentry that monitors network traffic.
- Verifying that a user is who they claim to be
- AI-generated media that replaces a person's likeness.
- A vulnerability that is previously unknown to the software developer.
- A digital cipher that keeps data from prying eyes.
- Phishing via SMS text message.
- The "weakest link" in the security chain.
- System generated cryptographic key pairs more secure than a password.
- A digital "sit-in" that overwhelms a website’s server with fake requests.
15 Clues: Top IT security role • Phishing via SMS text message. • Phishing via voice or phone call. • The "weakest link" in the security chain. • Verifying that a user is who they claim to be • Malware that demands payment to unlock files. • The digital sentry that monitors network traffic. • A digital cipher that keeps data from prying eyes. • ...
Security 2017-09-24
8 Clues: Widespread hunger • demand for autonomy • Health security threat • Internal security threat • Environmental security threat • essence for existence of human life • Both parties have equal military power • Countries joining together for common gains
Security!!! 2023-10-31
Across
- Ensure NO ___ information is left out
- Associates are allowed to enter the branch in the morning while on their cell phone
- "This is the capitalone information center..."
Down
- What area(s) are to be disarmed by the Opener when accessing the branch in the morning?
- Associates would go to in the event of an evacuation.
- A minimum of two associates, an ____ and an “observer,”
- A form of theft that includes robbery. It occurs when a suspect follows a victim from a bank to their next location.
- The ____ should set the alarm and exit the branch
8 Clues: Ensure NO ___ information is left out • "This is the capitalone information center..." • The ____ should set the alarm and exit the branch • Associates would go to in the event of an evacuation. • A minimum of two associates, an ____ and an “observer,” • Associates are allowed to enter the branch in the morning while on their cell phone • ...
Security 2019-02-12
Across
- Electronic machine the bank customers and credit union members can use to withdraw cash and make other financial transactions
- A bad side effect of free downloads that may be used to send you pop-up ads, redirect your computer to unwanted Web sites, monitor your Internet surfing, or record your keystrokes in an effort to steal identity
Down
- A benefit of a checking account
- Appears in the form of an email or pop-up message; usually looks like it's fro a legitimate financial institution and prompts you to provide your personal information in order to fix a "problem" with your account
- funds transfer Allows employers to deposit your paycheck directly into your bank account instead of giving you a paper check that you need to deposit
- Occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission
- A device attached to an ATM that reads your card numbers
- Free software that, due to file sharing, can give you access to your account information
8 Clues: A benefit of a checking account • A device attached to an ATM that reads your card numbers • Free software that, due to file sharing, can give you access to your account information • Electronic machine the bank customers and credit union members can use to withdraw cash and make other financial transactions • ...
Why you Bully me 2023-09-01
10 Clues: Stops bullying • A group spectator • Fancy synonym for • The school villain • Technological bullying • Baby word for decision • Better word for choice • Spectator of a bullying • The dude who gets bullied • Synonym for attack (physical)
Social security crossword 2024-04-23
Across
- The bill was designated to bring immediate ____ to the elderly
- By 2041 economists worry that the social security trust fund will be completely
- What economic recession occurred in the 1930's?
- Where does the money for social security come from?
- Who was the main group of people social security was meant for?
Down
- A system implemented by the government that replaces a percentage of a workers retirement income
- Who can access the social security trust fund?
- what president signed the social security bill?
- Who was the first person to receive a social security check?
- Social security funds have been misused for things like
10 Clues: Who can access the social security trust fund? • what president signed the social security bill? • What economic recession occurred in the 1930's? • Where does the money for social security come from? • Social security funds have been misused for things like • Who was the first person to receive a social security check? • ...
Information Security Crossword Puzzle 2024-08-15
Across
- A device used to monitor and record activity (6)
- A physical barrier designed to restrict access (7)
- A physical security measure to deter intruders (8)
- A type of lock that requires a key (5)
- A social engineering tactic using urgency or fear (7)
- A person who pretends to be someone else (8)
- A common social engineering tactic involving emails (8)
Down
- A physical security device used to control access (6)
- A physical barrier used to control access (7)
- system A security system that detects unauthorized entry (10)
- Unauthorized access to data (6)
- Unauthorized access by following someone through a secured entryway (2 words)
- A social engineering tactic using flattery or charm (8)
- Deceptive manipulation (8)
- A security measure to protect against fire (7)
- A method of gaining information through deception (12)
16 Clues: Deceptive manipulation (8) • Unauthorized access to data (6) • A type of lock that requires a key (5) • A person who pretends to be someone else (8) • A physical barrier used to control access (7) • A security measure to protect against fire (7) • A device used to monitor and record activity (6) • A physical barrier designed to restrict access (7) • ...
Impact of Cybersecurity 2025-03-03
Across
- ___ security aims to protect the organization’s technology assets
- ______ security encompasses the protection of tangible items such as buildings, equipment, and other physical assets.
- _____ Triad is a security measure that guarantees every system is system.
- _______ ensures that information is protected from unauthorized or unintentional alteration.
- There are ____ pillars of security that can safeguard an organization against potential threats.
- _____ is the protection of information from people who are not authorized to view it.
- ________ is the protection of computer systems, networks, and data from digital attacks.
- _________ of Things is a network of devices with the ability to connect and exchange data.
Down
- ___ security aims to reduce the risk of human error, negligence, or intentional acts of harm.
- __ security involves safeguarding confidential information from theft, unauthorized access, and ensuring data privacy, both in storage and transit.
- _____ involves developing an incident response plan
- is assurance that systems and data are accessible by authorized users when and where it is needed
12 Clues: _____ involves developing an incident response plan • ___ security aims to protect the organization’s technology assets • _____ Triad is a security measure that guarantees every system is system. • _____ is the protection of information from people who are not authorized to view it. • ...
roles and responsibilities of working at a domestic and international airport 2018-02-26
Across
- PER
- amount of duty-free alcohol each passenger is aloud on a flight
- location of worlds longest runway
- location of worlds busiest airport
- 3ounces 1quart 1bag
- amount of new full-time jobs auckland 30 year plan with create
- assists planes to locates and land on runway
- where would someone go if they wanted to pray
- electronic that security will ask to check
Down
- item of clothing that security may ask you to remove
- located on airside
- a negative of aucklands 30 year plan
- accessible for both travellers and non-travellers
- where an airport turns from landslide to airside
- 24hour time for 12am
- new zealands 10th busiest airport
- prohibited item
- year of the first permanent commercial terminal
- amount of liquid aloud on a flight
- aviation security service
20 Clues: PER • prohibited item • located on airside • 3ounces 1quart 1bag • 24hour time for 12am • aviation security service • location of worlds longest runway • new zealands 10th busiest airport • location of worlds busiest airport • amount of liquid aloud on a flight • a negative of aucklands 30 year plan • electronic that security will ask to check • ...
Belly Up 2019-10-19
Across
- What is the murder weapon?
- Who was the animal that was murdered?
- What does everyone call the doctor?
- Doc did an _______ to figure how Henry was killed.
- What snake got out of it's exhibit?
- What is the zoo called?
- When anyone dies you have a _______ to honor them.
- What is J.J's daughters name?
- who tells people off and arrests them?
- What things do you see at zoos?
Down
- Who is the head of security?
- Who is the owner of the zoo?
- Where did teddy and his family used too live?
- Who is the main character?
- What does Teddy live in?
- Henry was ________.
- What security guard hates Teddy?
- What animal almost killed a bunch of people?
- What did Teddy find outside his trailer?
- Teddy called the ______ to tell them about Henry's death.
20 Clues: Henry was ________. • What is the zoo called? • What does Teddy live in? • What is the murder weapon? • Who is the main character? • Who is the head of security? • Who is the owner of the zoo? • What is J.J's daughters name? • What things do you see at zoos? • What security guard hates Teddy? • What does everyone call the doctor? • What snake got out of it's exhibit? • ...
cyber security crossword designed by awesome Xiaoyu 2015-12-31
Across
- a network based on TCP/ICP protocols (an internet) belonging to an organization
- software that records everything you type, then sends it off to whomever installed the software.
- to choose options in order to create a custom system
- the process of attempting to acquire sensitive information used for identity theft
- a bridge between two computer networks
Down
- software that displays advertisements; you may see popup ads or a small window or bar that displays ads in your browser.
- The process of translating plaintext into ciphertext
- A capability to limit network traffic between networks and/or information systems
- A person attacks your computer with a bot – or remote control agent – by bypassing your firewall and antivirus software
- software installed on a network of computers without the owner’s knowledge
10 Clues: a bridge between two computer networks • The process of translating plaintext into ciphertext • to choose options in order to create a custom system • software installed on a network of computers without the owner’s knowledge • a network based on TCP/ICP protocols (an internet) belonging to an organization • ...
RED BOOK 2023-09-04
Across
- This Key Risk Area category best defines any risks involving cyber security.
- A person who exposes wrongdoing within an organization.
- One of the purpose of a Risk Management Manual and Guidelines is to _______ an effective Risk Management culture throughout the Duopharma Biotech Group.
- The tagline for Group Risk Management logo is ________.
- There are two types of risks which are General & ________.
- A system designed to prevent bribery and promote integrity within an organization.
- The act of accepting or offering something of value to influence decisions improperly.
- The colour _____ in risk rating matrix table represents High level of risk.
- A system of rules and principles that guide ethical behavior.
- When there is no further action required to affect likelihood or consequences, the Risk Decision is to ______.
Down
- The quality of being honest and having strong moral principles. Doing the right things even no one is watching.
- Risk Coordinators consists of selected _______ in the respective department.
- All Duopharma Biotech Group staff is a Risk _______.
- The process of disclosing any personal or financial interests that may pose a conflict with one's job responsibilities.
- The act of being accountable for one's actions and decisions.
- When a Risk Owner develops a risk register, they are required to create their own Risk ID using the GRM __ Table which can be accessed on INTRANET.
- Evaluation of risk rating is done at three different types of rating which are ______, Residual and Target.
- Upholding strong moral values, even in difficult situations.
- The practice of being transparent and open in all dealings.
- A set of rules or guidelines that govern the actions and decisions within an organization.
20 Clues: All Duopharma Biotech Group staff is a Risk _______. • A person who exposes wrongdoing within an organization. • The tagline for Group Risk Management logo is ________. • There are two types of risks which are General & ________. • The practice of being transparent and open in all dealings. • Upholding strong moral values, even in difficult situations. • ...
altafiber Security Awareness 2022-08-29
Across
- Your ____ is like your underwear; don't share it with your friends, and change it often.
- Personal Identifiable Information
- _________ software helps prevent and eliminate viruses and other malware from infecting your computer.
- ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one.
- A distinct subset of the internet with addresses sharing a common suffix or under the control of a particular organization or individual.
- A weakness in a program or system that can be exploited
- A layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's login
- The process of changing plain text to cipher text using an algorithm
- Logical or physical device used to filter network traffic
Down
- Email _____ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity.
- United States Federal Agency that specializes in cybersecurity
- National Institute of Standards and Technology
- The form of malware that encrypted Colonial Pipeline files in 2021.
- An email that tricks you into giving up your passphrase, password or clicking on a malicious link
- Cyber Security Awareness Month
- A Virtual Private Network connection that establishes a secure connection between you and the internet.
- Malicious software or commands that take advantage of a system’s vulnerabilities. Common forms include: viruses, trojans, worms and ransomware
- Similar to a password except you use a string of words and it gives you access to your computer.
18 Clues: Cyber Security Awareness Month • Personal Identifiable Information • National Institute of Standards and Technology • A weakness in a program or system that can be exploited • Logical or physical device used to filter network traffic • United States Federal Agency that specializes in cybersecurity • The form of malware that encrypted Colonial Pipeline files in 2021. • ...
