cyber security Crossword Puzzles
M3 2024-11-04
Across
- Physical or virtual barrier that controls network traffic
- Process of verifying a user's identity
- Security weakness in a system
- A malicious program that replicates itself and spreads to other computers
- Required information to solve a problem
- Process of gathering necessary information about a problem
- Unwanted bulk messages
- Steps taken to prevent attacks
- Testing a solution's effectiveness
- Device for accessing computer networks
Down
- Community-wide computer network
- Malicious software
- To find and fix problems
- Physical components of a computer system
- Final step in problem-solving process
- The practice of protecting systems, networks, and programs from digital attacks
- Make data unreadable to unauthorized users
- A type of social engineering attack using fake emails
- Tools used to detect and remove malware
- Security copy of data
- A common first step in problem-solving
21 Clues: Malicious software • Security copy of data • Unwanted bulk messages • To find and fix problems • Security weakness in a system • Steps taken to prevent attacks • Community-wide computer network • Testing a solution's effectiveness • Final step in problem-solving process • Process of verifying a user's identity • A common first step in problem-solving • ...
Government Acronyms 2024-10-23
Across
- health, education, welfare
- Fannie Mae
- environmental protection agency
- Freddie Mae
- federal deposit insurance corporation
- federal communication commission
- housing urban development
- American Track
- Food drug administration
- United States department of agriculture
- national institute of standards and tech
- National Aeronautics and Space Administration
- Health human sources
- bill of rights
- Bridge investment program
- Transportation security administration
- Department of homeland security
Down
- Federal emergency management agency
- national oreanic atmospheric administration
- securities and exchange
- federal bureau of investigation
- department of defense
- Central Intelligence Agency
- federal aviation administration
- United States of America
- Record of decision
- department of transportation
- social security administration
- attorney general
- Veteren Assistance
- National institutes of health
- Secret service
- Supreme Court of the United States
- Small business association
- Department of justice
35 Clues: Fannie Mae • Freddie Mae • American Track • Secret service • bill of rights • attorney general • Record of decision • Veteren Assistance • Health human sources • department of defense • Department of justice • securities and exchange • United States of America • Food drug administration • housing urban development • Bridge investment program • health, education, welfare • Small business association • ...
Year 12 Cybersecurity 2023-08-16
Across
- A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
- An individual who simulates cyberattacks to evaluate the security of a system.
- A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
- Measures taken to protect physical assets and facilities from unauthorized access or harm.
- The accuracy and reliability of data, protected from unauthorized alteration.
- A hacker who engages in malicious activities for personal gain or to cause harm.
- Mistakes made by individuals that can lead to security breaches.
- Creating multiple security layers to prevent unauthorized access at different levels.
- Covert agents who gather information on behalf of a government or organization.
- An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
- Ensuring that sensitive information is accessible only to authorized individuals.
- The ability to identify and recognize cybersecurity threats and incidents.
- Making sure that data is accessible when needed, without unauthorized disruptions.
- Individuals with advanced computer skills who manipulate software or systems for various purposes.
- Covert activities aimed at gathering confidential information from competitors or enemies.
- Individuals who engage in illegal activities on the internet for financial gain.
- People within an organization who have access to sensitive information and can pose security risks.
- Implementing measures to discourage potential attackers from targeting a system or organization.
- Introducing obstacles and barriers to slow down attackers' progress.
- The process of restoring systems and data after a cybersecurity breach or incident.
- Taking swift actions to address and mitigate cybersecurity incidents.
21 Clues: Mistakes made by individuals that can lead to security breaches. • Introducing obstacles and barriers to slow down attackers' progress. • Taking swift actions to address and mitigate cybersecurity incidents. • The ability to identify and recognize cybersecurity threats and incidents. • ...
Bullying and Conflict 2024-03-10
10 Clues: Private • Two sided • In public • On purpose • Online harassment • over and over again • Fighting and hitting • Alone with someone else • Hurting and being mean to someone • Making fun of looks and skin tone
Procrastination 2014-01-23
Across
- British Defeat, 2013
- Rage, Anger
- ANU Theatre Society
- Director upset over script leak
- Who pays their debts
- Increased payment for journalists, island
- Newest victim of Cyber Warfare
Down
- The White Ewe
- George Bernard Shaw's Famous Play
- Julie Bishop does not approve of treason
- Newest dating app
- 1991 US Invasion
- Adaptation of Austen's Emma
- Mother-in-law of the Leader of the Opposition
- Kurdish Genocide, Iraq
15 Clues: Rage, Anger • The White Ewe • 1991 US Invasion • Newest dating app • ANU Theatre Society • British Defeat, 2013 • Who pays their debts • Kurdish Genocide, Iraq • Adaptation of Austen's Emma • Newest victim of Cyber Warfare • Director upset over script leak • George Bernard Shaw's Famous Play • Julie Bishop does not approve of treason • Increased payment for journalists, island • ...
Types of risks. 2024-07-15
Across
- - Risk from deceitful acts.
- - Risks from regulatory breaches.
- - Risk from natural events.
- - Risks from failed processes.
- - Risk from price fluctuations.
- - Risk affecting the entire market.
- - Risks from poor business decisions.
Down
- - Risk of defaulted loans.
- - Risk of damaged public image.
- - Risk from currency fluctuations.
- - Risks from lawsuits.
- - Risk of insufficient cash.
- - Risk from rate changes.
- - Risks from government actions.
- - Risks from digital attacks
15 Clues: - Risks from lawsuits. • - Risk from rate changes. • - Risk of defaulted loans. • - Risk from deceitful acts. • - Risk from natural events. • - Risk of insufficient cash. • - Risks from digital attacks • - Risks from failed processes. • - Risk of damaged public image. • - Risk from price fluctuations. • - Risks from government actions. • - Risks from regulatory breaches. • ...
Cybersecurity Crossword Puzzle 2025-09-21
Across
- A type of malware that is designed to look like a legitimate program in order to trick users into downloading it.
- The process of simplifying complex systems by focusing on essential features, hiding unnecessary details.
- A malicious program that can self-replicate and attach itself to other files.
- A symbol, typically '=', used in programming to assign a value to a variable.
- The practice of protecting computers, servers, mobile devices, and networks from malicious attacks.
- A value or variable that is passed to a function or method when it is called.
- A software that generates revenue by automatically displaying online advertisements.
- To verify the identity of a user or system.
Down
- A program or set of rules that protects a network by controlling incoming and outgoing traffic.
- An additional component or feature that can be added to a software program.
- A software program used to prevent, detect, and remove malware.
- CONTROL - A security process that controls and manages who is authorized to access certain resources.
- A malicious program that is designed to damage or gain unauthorized access to a computer system.
- The act of sending fraudulent emails in order to trick people into revealing personal information.
- The sum of all possible points where an unauthorized user can try to enter or extract data from a system.
- POISONING - A type of cyber attack that involves sending false ARP messages to redirect network traffic.
- A character encoding standard used to represent text in computers.
- A protocol used to translate IP addresses into MAC addresses.
- A collection of IP-to-MAC address mappings used to speed up network communication.
19 Clues: To verify the identity of a user or system. • A protocol used to translate IP addresses into MAC addresses. • A software program used to prevent, detect, and remove malware. • A character encoding standard used to represent text in computers. • An additional component or feature that can be added to a software program. • ...
U4 M35 The Social Security Program 2023-03-14
Across
- is a United States federal payroll(or employment) contribution directed towards both employees and employers to fund Social Security and Medicare
- Medicare Part D deals with ____ drug plans.
- President ______ signed the Social Security Act in 1935.
- The program works by using taxes paid into a trust fund to provide benefits to people who are eligible.
- is a tax withheld from an employee's salary by an employer who pays it to the government on their behalf.
- is the national health insurance program for people over the age of 65.
Down
- are things that produces good or helpful results or effects or that promotes well-being
- Medicare Part B deals with ____ insurance.
- Payment of monthly Social Security benefits began in _______ 1940.
- Social Security is not the only program that is designed to assist _______ citizens
- Medicare Part A deals with ____ insurance.
- Title II is what we know now as Social Security. In the original legislation, benefits were to be paid only to the _________ worker when he or she retired at age 65.
- The Social Security Act includes two major provisions: 1. Title I provides funds to support state _________ programs.
13 Clues: Medicare Part B deals with ____ insurance. • Medicare Part A deals with ____ insurance. • Medicare Part D deals with ____ drug plans. • President ______ signed the Social Security Act in 1935. • Payment of monthly Social Security benefits began in _______ 1940. • is the national health insurance program for people over the age of 65. • ...
Helloto 2025-11-19
Across
- – Strategically important town occupied one day after the Tehran Communique was signed.
- – 2005 Council of Europe document condemning the occupation of one member state’s territory by another.
- – OSCE mediation format created to negotiate a settlement of the Nagorno-Karabakh conflict.
- – Azerbaijani district whose occupation led to UN Security Council Resolution 822 in 1993.
- – Failed Soviet reform whose collapse helped ignite the Nagorno-Karabakh conflict.
- – UN Security Council resolution adopted after the occupation of Zangilan and Horadiz.
- – 1996 OSCE meeting where principles affirming Azerbaijan’s territorial integrity were adopted despite Armenia’s veto attempt.
- – UN Security Council resolution adopted after the occupation of Aghdam.
Down
- – 2007–2009 basic principles including liberation of territories, interim status and a future vote on Nagorno-Karabakh.
- – Agreement brokered by Iran on 7 May 1992 that failed when Shusha was occupied the next day.
- – Autonomous region that became the main subject of the Armenia–Azerbaijan conflict.
- – Azerbaijani town where a massacre of civilians took place during the conflict.
- – 2006 Vienna document whose principles later formed the basis of the Madrid Principles.
- – Principle invoked by Armenia to justify claims over Nagorno-Karabakh.
- – Negotiation track where Azerbaijani and Armenian foreign ministers met repeatedly from 2003–2004 onward.
- – 1994 document that established the ceasefire from 12 May 1994.
- – 1994 OSCE meeting where Minsk Group co-chairmanship and peacekeeping options were discussed.
- – UN Security Council resolution of October 1993 mentioning Nagorno-Karabakh as part of Azerbaijan.
- – First UN Security Council resolution demanding withdrawal from Kalbajar.
- – Main legal principle emphasized by Azerbaijan in negotiations over Nagorno-Karabakh.
20 Clues: – 1994 document that established the ceasefire from 12 May 1994. • – Principle invoked by Armenia to justify claims over Nagorno-Karabakh. • – UN Security Council resolution adopted after the occupation of Aghdam. • – First UN Security Council resolution demanding withdrawal from Kalbajar. • ...
SCUK Data Protection Day 2019 Crossword Quiz 2019-02-12
Across
- The month in which GDPR was adopted in the UK in 2018 (3)
- Secure way for transferring data (4)
- __ Grounds are needed to process personal data (6)
- True or False: GDPR will no longer apply in the UK after Brexit (5)
- Government regulator upholding information rights (11, 12)
- Special category of personal data (9)
- Penalty of 4% of global __ (8)
- Required from data subject for legal processing (7)
- Controller, Organisation or individual in charge of how data is processed (4, 10)
- Subject __ Request (6)
- The ‘R’ in GDPR (10)
- __ to rectification (5)
Down
- The Data Protection __ 2018 (3)
- Where should you go to report a data breach at SCUK? (7, 3)
- Collecting, using, sharing or storing personal data (10)
- Type of cyber-attack (8)
- What does GDPR regulate? (4, 10)
- The right to be __ (9)
- Acronym for organisational role that reports internally and externally at the highest level on Data Protection matters (3)
- Owner of personal data (4, 7)
- __ phishing is a type of social engineering cyber-attack (5)
- Everyone’s responsibility to do when a suspected data protection incident has occurred (6)
- Privacy __ Assessment (6)
- The ‘G’ in GDPR (7)
- Does GDPR apply to charities? (3)
- Category of sensitive personal data (6)
- Acronym of the office regulating Data Protection compliance in the UK (3)
27 Clues: The ‘G’ in GDPR (7) • The ‘R’ in GDPR (10) • The right to be __ (9) • Subject __ Request (6) • __ to rectification (5) • Type of cyber-attack (8) • Privacy __ Assessment (6) • Owner of personal data (4, 7) • Penalty of 4% of global __ (8) • The Data Protection __ 2018 (3) • What does GDPR regulate? (4, 10) • Does GDPR apply to charities? (3) • Secure way for transferring data (4) • ...
Digital Citizenship 2021-12-08
Across
- to keep myself safe online, I should always make my profile ______
- When we are online we should always be thinks about the _____ of ourselves and others.
- One way to get a cyber-bully to stop is to _____ them which doesn't allow them to see your profile anymore.
- the trail of data you create when you go online.
- when I see cyber bullying I show _____ for the bully and the bullied, because you never know what someone else is going through
Down
- Your _______ should never have your real name in it.
- bullying online
- you should never share your ______ information online.
- when online I make sure to create a strong _____ with letters numbers and symbols
- set of proper guidelines we should follow online
- If someone is being unkind on a game you're playing, you can ______ them to the game moderator
11 Clues: bullying online • set of proper guidelines we should follow online • the trail of data you create when you go online. • Your _______ should never have your real name in it. • you should never share your ______ information online. • to keep myself safe online, I should always make my profile ______ • ...
Protective Security Crossword 2013-05-07
Across
- The catalogue of endorsed security devices
- Where you can share classified information by mistake if you are not careful
- Generally delivered by web sites or emails
- What we manage
- That thing you break by downloading movies without paying.
- That pirated software you downloaded last night.
- Easily tarnished by lax security
- What we do not want
- A good place to keep money or information
- Acronym for the spy inside
- Mandatory requirement
Down
- Instrument that governs protective security
- Tinned meat or unwanted email
- Unwanted attention from the Internet
- Someone who impersonates a tasty biscuit you dip in Salsa
- A person who pulls apart code
- Someone who wishes to remain unknown
- A hunting technique using an email bait
- A horse with a secret
19 Clues: What we manage • What we do not want • A horse with a secret • Mandatory requirement • Acronym for the spy inside • Tinned meat or unwanted email • A person who pulls apart code • Easily tarnished by lax security • Unwanted attention from the Internet • Someone who wishes to remain unknown • A hunting technique using an email bait • A good place to keep money or information • ...
Computer Puzzle game 2025-05-27
Across
- misusing personal information
- grooming online child abuse
- hoaxing or misleading
- illegal entry into computer
- deliberate manner of harassing
- frau illegal method to get money
- number consists of 8 digits
- disrupt normal function of computer
Down
- code only understand by computer
- process to protect network
- act of sen misleading email
- blocking unauthorised access
- criminal activity using internet
- adding binary numbers
- protect computer from virus
15 Clues: adding binary numbers • hoaxing or misleading • process to protect network • act of sen misleading email • grooming online child abuse • illegal entry into computer • protect computer from virus • number consists of 8 digits • blocking unauthorised access • misusing personal information • deliberate manner of harassing • code only understand by computer • ...
tipos de delitos 2 2023-11-03
9 Clues: acoso • extorsión • falsificación • delito de odio • tráfico de drogas (drug-____) • posesión de drogas (drug-____) • acoso cibernético (____ bullying) • violencia doméstica (domestic-____) • fraude de tarjeta de crédito (____-card-fraud)
Crossword 2023-05-24
Across
- The practice of using multiple authentication factors to verify identity.
- The device that emits a loud sound when smoke or fire is detected.
- Security measure that verifies the integrity and authenticity of a message
- which type of fire is classified in E class fire _____________
- A set of instructions or guidelines that outline the organization's security policies and procedures.
- Security breach caused by tricking someone into revealing sensitive information
Down
- Technique used to verify the identity of a user
- Employees should never share their _______ with others or write them down in easily accessible locations
- The intentional and unauthorized accessing, use, or disclosure of information.
- Frisking check will be carried out by ________ security guard for all team members while going shift out.
- Physical barriers to restrict access to a secure area
- The practice of reviewing and analyzing system logs to identify potential security issues is called
- The process of encoding data to prevent unauthorized access.
- Unauthorized copying or distribution of copyrighted material
14 Clues: Technique used to verify the identity of a user • Physical barriers to restrict access to a secure area • The process of encoding data to prevent unauthorized access. • Unauthorized copying or distribution of copyrighted material • which type of fire is classified in E class fire _____________ • The device that emits a loud sound when smoke or fire is detected. • ...
Trading Options 2024-08-29
Across
- Transaction where investor pays premium
- An option that gives the holder the right to buy an asset at a specified price
- Strike + Premium or Strike - Premium depending on the strategy and price of an underlying stock where an option will neither realize a profit or loss
- Strategy where investor buys 100 shares of a security and simultaneously writes a call
- When the seller of an option contract must fulfill their obligation (at any time) to buy or sell the underling to the long holder of the option contract at the strike price
- To simultaneously close an option contract and open another contract with the same underlying security, but at a different strike price or expiration date
- When the underlying security is below the strike price for a call or above the strike price for a put
- An option that gives the holder the right to sell an asset at a specified price
- Phenomenon where time value decreases as the expiration date draws near
- Strategy where an investor writes a put and cash, or equivalent is set aside in case of assignment (strike price x 100)
Down
- A statistical measure of the dispersion of returns for a given security
- The date on which an option contract becomes void
- The price paid for an option contract
- An opening transaction that results in a short option position
- The use of borrowed capital to increase the potential return of an investment
- The predetermined price at which an option can be exercised
- For the long strategy, volatility is the name of the game. Composed of a long call and long put on the same underlying security with the same strike price and expiration date
- Transaction where investor receives premium
- When the underlying security is above the strike price for a call or below the strike price for a put
19 Clues: The price paid for an option contract • Transaction where investor pays premium • Transaction where investor receives premium • The date on which an option contract becomes void • The predetermined price at which an option can be exercised • An opening transaction that results in a short option position • ...
Security 2022-01-24
Across
- a device making a loud noise that gives warning of a fire.
- a length of thick strong cord made by twisting together strands of hemp.
- a lamp with a transparent case protecting the electric bulb, and a handle by which it may be carried.
Down
- a covering for the hand worn for protection against cold or dirt.
- directions, detailed information about how something should be done.
- a hard or padded protective hat.
- a covering for all or part of the face to protect against air pollutants.
- a strip to fasten in a car.
8 Clues: a strip to fasten in a car. • a hard or padded protective hat. • a device making a loud noise that gives warning of a fire. • a covering for the hand worn for protection against cold or dirt. • directions, detailed information about how something should be done. • a length of thick strong cord made by twisting together strands of hemp. • ...
Security 2016-03-14
Across
- Theft, especially in a world where so many business people use smartphones to carry out their day to day jobs.
- Any technology, such as tracking software, that aids in gathering information about a person or organization without their knowledge.
- When a virus disguises itself as another program to gain access to a computer
Down
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- Someone who seeks and exploits weaknesses in a computer system or computer network.
- Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details
- Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
- A standalone malware computer program that replicates itself in order to spread to other computers.
8 Clues: When a virus disguises itself as another program to gain access to a computer • Someone who seeks and exploits weaknesses in a computer system or computer network. • A standalone malware computer program that replicates itself in order to spread to other computers. • ...
Security 2025-10-13
Across
- What section is Duty of a CSO who denies entry
- What could you get for excellent service in the Ministry
- what Section is Power to use reasonable force
- What does S stand for in phonetic Alphabet
Down
- What does F Stand for in phonetic Alphabet
- Tactical communications framework
- What radio code is 10-3
- Good morning in Maori
8 Clues: Good morning in Maori • What radio code is 10-3 • Tactical communications framework • What does F Stand for in phonetic Alphabet • What does S stand for in phonetic Alphabet • what Section is Power to use reasonable force • What section is Duty of a CSO who denies entry • What could you get for excellent service in the Ministry
Airport Safety & Security 2025-07-12
Across
- Monitoring for suspicious activity
- Area where passengers board the aircraft
- Permission from air traffic control to proceed
- Paved area for aircraft movement
- Where aircraft are parked, loaded, and refueled
- Safety instructions given to crew
- Path for aircraft to move between runway and gate
- The passenger area of an airport
- Where passengers are dropped off or picked up outside the terminal
- Restricted area past security and customs
- Public area of the airport before security
- To exit the aircraft
Down
- Items passengers check in or carry on
- Emergency medical help
- Emergency removal of passengers from aircraft
- Team or measures ensuring safety in airports
- Device used in passenger screening
- Surface where planes take off and land
- Badge|Required for employees to access secure zones
- Unlawful seizure of an aircraft
20 Clues: To exit the aircraft • Emergency medical help • Unlawful seizure of an aircraft • Paved area for aircraft movement • The passenger area of an airport • Safety instructions given to crew • Monitoring for suspicious activity • Device used in passenger screening • Items passengers check in or carry on • Surface where planes take off and land • ...
Seminar 2 Crossword 2013-07-09
Across
- Confidentiality; Integrity; Availability
- The breaking into of telephone systems
- The appropiate word for intruding into a system without permission
- A person, usually an employee, that deliberately breaks into a system to assess security deficiencies
- Used to describe any areas of a system that is open to a possible attack
- The process of reviewing firewall logs, records, and procedures
- A text file on a computer that a browser creates and stores on the hard drive
- Seeks to compromise a DNS server so that users are redirected to malicious websites
- Generic term for software that has a malicious purpose
- Slang term used in movies and in the news to describe any person who breaks into a computer system
- Software that literally spies on what you do on a computer
Down
- A barrier between a network and the outside world
- The most basic security activity that determines if credentials are authorized for access
- A technique for breaching a systems's security by exploiting human nature rather than technology
- Locating wireless networks to gain access to a system
- This type of detection system works to detect attempts to circumvent security measures
- A security approach in which not only is the perimeter secured, but also individual systems within the network are secured
- Appears to be benign software but secretly downloads a virus to the computer from within
- Designed to prevent legitimate access to a system
- A device that hides the internal network's IP addresses and presents a single IP address (it's own) to the outside world
20 Clues: The breaking into of telephone systems • Confidentiality; Integrity; Availability • A barrier between a network and the outside world • Designed to prevent legitimate access to a system • Locating wireless networks to gain access to a system • Generic term for software that has a malicious purpose • Software that literally spies on what you do on a computer • ...
security crossword 2021-08-31
13 Clues: Five O • On the seas • Immigration • In the skys • I can see you • Secret service • Big metal ships • He has a weapon • Best in the world • Keeping shops safe • Boss of the Prison • Locks you up behind bars • To chase thief's when on the run
Security Crossword 2013-02-28
Across
- table which holds relationship between parent and child role
- a function call or a program call
- Founded by 5 IBMers in 1972
- doorway to SAP system
- a template to derive roles/ with * for org elements
- This mode pull the auth changes of SU24 to roles/ ____ Mode of generation
- Cross System Responsibility can be defined by ____ role
- Transaction to read the Audit logs
Down
- permission to perform an action/provide right access to user
- User type for communication within same system
- TSTC is _____ independent table/ SM01
- Authorization check can be traced
- transaction to compare two users/roles
13 Clues: doorway to SAP system • Founded by 5 IBMers in 1972 • a function call or a program call • Authorization check can be traced • Transaction to read the Audit logs • TSTC is _____ independent table/ SM01 • transaction to compare two users/roles • User type for communication within same system • a template to derive roles/ with * for org elements • ...
INTERNET SECURITY 2024-02-12
13 Clues: Ψευδείς ειδήσεις • Διαδικτυακή φήμη • Κωδικοί πρόσβασης • Κακόβουλο λογισμικό • Ηλεκτρονικές απάτες • Πειρατεία λογισμικού • Εθισμός στο διαδίκτυο • Άγνωστοι στο διαδίκτυο • Διαδικτυακός εκφοβισμός • Παιχνίδια στο διαδίκτυο • Στοχευμένες διαφημίσεις • Προστασία προσωπικών δεδομένων • Εικόνα σώματος & κοινωνικά δίκτυα
Email Security 2024-07-15
Across
- Email's bossy rulemaker
- Secret code for your messages
- Targeting the "big fish" with emails
- Baiting users to reveal sensitive info
- Email's digital fingerprint
- Email sender's fancy passport
- Pretending to be someone else via email
Down
- Email's safe playpen
- Computer bugs causing trouble
- Collecting email addresses for spamming purposes
- Protects secrets from escaping
- Assuming an employee's identity to trick others via email
- Email's "bouncer" when it visits the club
13 Clues: Email's safe playpen • Email's bossy rulemaker • Email's digital fingerprint • Computer bugs causing trouble • Secret code for your messages • Email sender's fancy passport • Protects secrets from escaping • Targeting the "big fish" with emails • Baiting users to reveal sensitive info • Pretending to be someone else via email • Email's "bouncer" when it visits the club • ...
Data Security 2025-12-07
Across
- Deleting data so it cannot be recovered easily.
- Physically destroying storage devices.
- A secret word to log in.
- Software that removes malware.
- Uses fingerprints or face scans to identify users.
- Data backed-up away from the main building.
Down
- Used to enter a PIN.
- Checking user identity.
- Uses two ways to log in.
- Rules about what users can access.
- Blocks unsafe network traffic.
- Scrambling data to keep it secret.
- Uses radio waves to read data from a card.
13 Clues: Used to enter a PIN. • Checking user identity. • Uses two ways to log in. • A secret word to log in. • Blocks unsafe network traffic. • Software that removes malware. • Rules about what users can access. • Scrambling data to keep it secret. • Physically destroying storage devices. • Uses radio waves to read data from a card. • Data backed-up away from the main building. • ...
TKeefer Network devices 2023-01-03
Across
- hardcodedbymanufacturerofnic
- improve security
- connecttointernet
- builds up IDS traffic
- access to wireless devices
- recievedataononeportandsendofftootherports
- way to power devices with no power available
- like legacy but have embedded microchips
- formfactorfornic
- provides an endpoint
Down
- usedtorepairweaksignals
- protects stuff from unwanted access
- divideLANsintosegmants
- connectswirelessconnections
- used to collect incoming cables
- connects devices to the network
- all in one security
- monitor traffic
- no longer supported, still in operation
19 Clues: monitor traffic • improve security • formfactorfornic • connecttointernet • all in one security • provides an endpoint • builds up IDS traffic • divideLANsintosegmants • usedtorepairweaksignals • access to wireless devices • connectswirelessconnections • hardcodedbymanufacturerofnic • used to collect incoming cables • connects devices to the network • protects stuff from unwanted access • ...
Ap human Natalie Yanez p5 2023-05-12
15 Clues: theory • Region • Family • and Burn • Geography • Settlement • and Metacity • and Quantitive • Fertility Rate • In Time Delivery • and Intraregional • and Subsequent Boundaries • Branch and Language Group • security and Food Security • Domestic Product and Gross National Product
GOLD LOANS 2020-01-08
15 Clues: Expert • Valuable • Register • Jewellery • Bullion gold • Security type • Precious metal • Specially minted • single repayment • Used to test purity • Additional security • Variant of gold loan • Gold with Cadmium alloy • Method of testing purity • Unit for measuring purity and weight of gold
Threads 2023-03-31
Across
- The organization behind India's first quantum-computing based telecom network link (4)
- A British computer built in the late 1940s that was used to break German codes during World War II (8)
- A type of attack that involves flooding a network with traffic to make it unavailable (4, 6)
- A type of wireless technology used for short-range communications (9)
- A type of AI that specializes in image processing and classification (3)
- A type of network topology in which all devices are connected to a central hub (4)
- A cryptocurrency exchange that was recently bankrupted due to lack of liquidity (3)
- This spice is now the name of an official Ubuntu Flavor (8)
- A type of storage device that uses flash memory (3)
- The CEO of YouTube who had recently stepped down (5, 8)
Down
- A type of security system that requires users to provide two forms of identification (3, 6, 14)
- An input device used to control the movement of a cursor (5)
- The newest rival to Twitch in live streaming, promising creator-friendly policies like a 95% revenue split (4)
- A type of machine learning that uses neural networks with multiple layers (4, 8)
- A type of cyber attack that involves tricking someone into revealing sensitive information (8)
- An app that notifies its users simultaneously everyday at a different time to capture and share a photo in 2 Minutes (6)
- The first commercially available computer, built in the US in the 1950s (6)
- It allows users to interact with electronic devices through graphical icons and audio indicators (3)
- An AI model that generates images from natural language descriptions, recently releasing its improved fifth version (10)
- It is often used to format the presentation of a web document (3)
20 Clues: A type of storage device that uses flash memory (3) • The CEO of YouTube who had recently stepped down (5, 8) • This spice is now the name of an official Ubuntu Flavor (8) • An input device used to control the movement of a cursor (5) • It is often used to format the presentation of a web document (3) • ...
FITCVOCABBRM 2013-05-15
Across
- sign that you would use for your shop.
- what you are talking about.
- A couple of words that gets people attention so they come to your store.
- Safety: Is when you have security for people trying to hack you.
- it says how many bars you have on your internet.
- the address of a cite.
- it is when you take someones idea.
- the brain.
- Engine: it is a website on the internet.
- device: a phone a ipad a movie player.
- the fifth biggest download.
- is the things you sell in your store or online.
- Is the internet your using.
- it is a commercial on the television.
- wifi stands for wireless Fidelity and it helps you go on the internet.
- The 4th biggest download.
- the word paper or the power point paper.
- the second biggest download.
Down
- port: where you plug in your headphones.
- Board: the heart of a computer.
- a watch with the hands.
- The third biggest download.
- It is when you are near someone and you hook up phones.
- a little folder you can save stuff in.
- them work at your place.
- They are a lot of folders.
- is an app that you can download games, tools and more.
- it is when people are looking for jobs and you are looking and maybe
- a hand object that you use to scroll.
- is usually in the store telling everything about the store.
- program like a power point but it is on the internet and you put facts
- sound in your headphones the music is audio.
- is the 6th biggest download.
- it is some type of electronic.
- it is the smallest download.
35 Clues: the brain. • the address of a cite. • a watch with the hands. • them work at your place. • The 4th biggest download. • They are a lot of folders. • what you are talking about. • The third biggest download. • the fifth biggest download. • Is the internet your using. • is the 6th biggest download. • the second biggest download. • it is the smallest download. • ...
Networking + Cyber Ethics 2025-05-30
Across
- Unwanted email
- Device that connects networks
- Crime involving computers
- Someone who breaks into networks
- Secret code for access
- Keeps your device safe
- Short for Internet Protocol
- Tells the computer where to send data
- Connecting two or more computers
Down
- Device used to connect to the internet
- Data protection rules you must follow
- Large network of networks
- Safe online behavior
- A set of connected computers
- You must not copy others' work
- Type of network at home
- Fake website to steal info
- File spreader with viruses
18 Clues: Unwanted email • Safe online behavior • Secret code for access • Keeps your device safe • Type of network at home • Crime involving computers • Large network of networks • Fake website to steal info • File spreader with viruses • Short for Internet Protocol • A set of connected computers • Device that connects networks • You must not copy others' work • Someone who breaks into networks • ...
Protective Security Crossword 2013-05-07
Across
- The catalogue of endorsed security devices
- Where you can share classified information by mistake if you are not careful
- Generally delivered by web sites or emails
- What we manage
- That thing you break by downloading movies without paying.
- That pirated software you downloaded last night.
- Easily tarnished by lax security
- What we do not want
- A good place to keep money or information
- Acronym for the spy inside
- Mandatory requirement
Down
- Instrument that governs protective security
- Tinned meat or unwanted email
- Unwanted attention from the Internet
- Someone who impersonates a tasty biscuit you dip in Salsa
- A person who pulls apart code
- Someone who wishes to remain unknown
- A hunting technique using an email bait
- A horse with a secret
19 Clues: What we manage • What we do not want • A horse with a secret • Mandatory requirement • Acronym for the spy inside • Tinned meat or unwanted email • A person who pulls apart code • Easily tarnished by lax security • Unwanted attention from the Internet • Someone who wishes to remain unknown • A hunting technique using an email bait • A good place to keep money or information • ...
Security 2022-02-24
Across
- a secret code used to gain access
- when something that is usually protected, is no longer secure
- it protects your computer from attacks via email of the Internet
- a system to allow you to watch what is happening in other parts of the building
Down
- actions taken to deter people like hackers or
- without the right to look at or use something, i.g. personal information, on the computer
- it allows you to see inside bags
- stealing people's personal information and using it
8 Clues: it allows you to see inside bags • a secret code used to gain access • actions taken to deter people like hackers or • stealing people's personal information and using it • when something that is usually protected, is no longer secure • it protects your computer from attacks via email of the Internet • ...
Security 2022-01-25
Across
- a device making a loud noise that gives warning of a fire.
- a length of thick strong cord made by twisting together strands of hemp.
- a lamp with a transparent case protecting the electric bulb, and a handle by which it may be carried.
Down
- a covering for the hand worn for protection against cold or dirt.
- directions, detailed information about how something should be done.
- a hard or padded protective hat.
- a covering for all or part of the face to protect against air pollutants.
- a strip to fasten in a car.
8 Clues: a strip to fasten in a car. • a hard or padded protective hat. • a device making a loud noise that gives warning of a fire. • a covering for the hand worn for protection against cold or dirt. • directions, detailed information about how something should be done. • a length of thick strong cord made by twisting together strands of hemp. • ...
Security 2024-08-24
Across
- something that is used to helps prevent an electronic from a virus
- some form of security that is mostly used for extra security for an app sometimes using another app to confirm it is you
- something usually used to defend yourself
Down
- something that sometimes has a three digit code that holds secures chains and heavy duty things
- something used to see past and live footage of any break in to protect your home
- usually a four digit code that protects phones
- something that is meant to protect your electronic from hackers
- something used to prevent people from accessing whatever has a password
8 Clues: something usually used to defend yourself • usually a four digit code that protects phones • something that is meant to protect your electronic from hackers • something that is used to helps prevent an electronic from a virus • something used to prevent people from accessing whatever has a password • ...
Security check 2024-06-27
13 Clues: płyn • zgłaszać • przejść (dalej) • wsiąść (na pokład) • ... free - bezcłowy • tacka (przy taśmie) • ... up - pospieszyć się • ... around - obrócić się • ... out - wyjąć (z plecaka) • last ... - ostatnie wezwanie • ... on - założyć (na siebie) • ... check - kontrola osobista • ... the flight - przegapić lot
Information Security 2023-08-28
Across
- intent of doing harm
- requirement of being private or secret
- procedure to determine user privileges or access to programs
- info or data which can be accessed when needed
- gap or weakness which undermines an organization's security
Down
- network of computers and devices managed as a unit with procedures and rules
- how information is protected
- short for "malicious software" and covers threats such as viruses, worms, Trojan horse, ransom ware,and the numerous other programs used by hackers to gain or access or damage computer programs
- macros which have been coded with malicious intent
- calculated assessment of potential threats to an organizations security
- making sure a person is who they say they are
- state of being complete or uncorrupted
- rights an individual or organization has over info and how it is used
13 Clues: intent of doing harm • how information is protected • requirement of being private or secret • state of being complete or uncorrupted • making sure a person is who they say they are • info or data which can be accessed when needed • macros which have been coded with malicious intent • gap or weakness which undermines an organization's security • ...
Food security 2024-12-17
Across
- Large marsupial
- We eat this animal from the sea or rivers
- Has a trunk
- Pollinator that plays a critical role in food production
- This animal helps carry things and gives wool
Down
- Poultry raised for eggs
- Small animal raised
- Man's best friend
- This animal helps people on farms and can be ridden
- Animal raised for wool
- Likes to chase mice
- This animal gives milk and is important in the desert
- Flying mammal
13 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Small animal raised • Likes to chase mice • Animal raised for wool • Poultry raised for eggs • We eat this animal from the sea or rivers • This animal helps carry things and gives wool • This animal helps people on farms and can be ridden • This animal gives milk and is important in the desert • ...
Data Security 2025-01-20
Across
- Maintaining the accuracy and completeness of data.
- An unauthorized access or exposure of sensitive data.
- Ensuring that information is accessible only to those authorized to have access.
- Adhering to data protection regulations.
- A copy of data stored separately to protect against data loss.
- A weakness that can be exploited.
Down
- The process of converting information into a secure format to prevent unauthorized access.
- The technique of obscuring specific data within a database to protect sensitive information.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Verifying the identity of a user or system before granting access.
- An event that compromises data security.
- Data Loss Prevention, strategies to prevent data breaches.
- The potential for loss or damage.
13 Clues: A weakness that can be exploited. • The potential for loss or damage. • An event that compromises data security. • Adhering to data protection regulations. • Maintaining the accuracy and completeness of data. • An unauthorized access or exposure of sensitive data. • Data Loss Prevention, strategies to prevent data breaches. • ...
Food Security 2024-10-17
Across
- A is a kitchen device that can ensure food is cooked to a proper temperature
- What temperature does poultry need to reach to be food safe?
- Leftovers should be put in the refrigerator or freezer within
- Four steps to help you tackle bacteria.
- It is recommended to wash hands with warm water and soap for seconds
Down
- Simplify cooking with frozen foods by following these for optimal safety and quality
- What is not a food safety step when preparing raw meat or poultry?
- While everyone is at risk of ayoung children and elderly people have a higher risk
- Only food that contains flour when it is fully cooked.
- What foodborne pathogen is often linked to raw eggs?
- To avoid cross contamination, keep raw meat from produce
- Start out with hands, surfaces and utensils before cooking.
- The refrigerator is the best place to perishables.
13 Clues: Four steps to help you tackle bacteria. • The refrigerator is the best place to perishables. • What foodborne pathogen is often linked to raw eggs? • Only food that contains flour when it is fully cooked. • To avoid cross contamination, keep raw meat from produce • Start out with hands, surfaces and utensils before cooking. • ...
Food security 2024-11-28
Across
- - Energy-rich molecules, often sweet and starchy
- - Amount of agricultural produce harvested per unit of land area
- - Plants cultivated for food, especially on a large scale
- - Extended period of water scarcity affecting crop yields
- - Essential vitamins and minerals required in small amounts
- - Lack of proper nutrients
- - Long-term maintenance of food production without depleting resources
Down
- - Relating to the handling and storage of crops after collection
- - Artificial application of water to land for growing crops
- - Removal and destruction of a forest or stand of trees from land that is then converted to non-forest use
- - Unwanted intruders spoiling kitchen cleanliness
- - Essential building block for body tissues
- - Variety of plant and animal life in a particular habitat
13 Clues: - Lack of proper nutrients • - Essential building block for body tissues • - Energy-rich molecules, often sweet and starchy • - Unwanted intruders spoiling kitchen cleanliness • - Plants cultivated for food, especially on a large scale • - Extended period of water scarcity affecting crop yields • - Variety of plant and animal life in a particular habitat • ...
Application Security 2025-09-03
Across
- Injection attack that tricks a database.
- Secret string used for login.
- Verifying who is accessing the system.
- Confidence that users have in an application.
- Scrambling data so it can’t be read if stolen.
- Writing software instructions for a computer.
- Tool that scans code before deployment.
- Blocks attacks on applications.
Down
- Checking user input for safety.
- Improves or secures software.
- List of the top 10 application risks.
- Decides what a user can do.
- A small software fix.
13 Clues: A small software fix. • Decides what a user can do. • Improves or secures software. • Secret string used for login. • Checking user input for safety. • Blocks attacks on applications. • List of the top 10 application risks. • Verifying who is accessing the system. • Tool that scans code before deployment. • Injection attack that tricks a database. • ...
Security Terminology 2025-09-08
Across
- direct and deliberate observation of people and/or property
- device triggered by a person and designed to alert others (authorities) in emergency situations
- device which announces an alarm via sound, light or other means
- armor-plated truck with strong locks and doors which is operated by armed personnel and used to transport currency and other valuables
- equipped with a firearm
- pre-recorded message to be used in case of an emergency
Down
- test performed under conditions as close to as possible to real-world conditions
- device which, when triggered, alerts security personnel and/or police of disturbance without the knowledge of the intruder or criminal
- inquiry into the history, behaviors and character of an individual
- program which detects and removes computer viruses
- risk remaining after measures are taken to reduce or eliminate risk
- any property, tangible or intangible, which is owned by an individual or company and can be assigned a monetary value
- system of sensors, controls and annunciators arranged to detect and report an intrusion or other emergency
13 Clues: equipped with a firearm • program which detects and removes computer viruses • pre-recorded message to be used in case of an emergency • direct and deliberate observation of people and/or property • device which announces an alarm via sound, light or other means • inquiry into the history, behaviors and character of an individual • ...
Security igcse 2025-10-07
Across
- uses a private key and a public key
- when the computer asks users if they are sure they want to carry out instructions
- a type of software which may track user behavior to display targeted ads based on their interests
- one method for avoiding acccidental data loss
- an attack on a server designed to deny service coming from multiple computers
Down
- sits between the main server and the internet and protects the main server from attacks
- programs that collect personal or sensitive data then send them to another device
- when an authentic-looking message or email tries to trick you into sending sensitive data
- malicious software which tricks you into visiting false websites and giving sensitive data
- a program that disguises itself as another programs, when run it deletes and corrupts files
- a security technology that monitors a computer’s incoming and outgoing traffic
- programs that replicate themselves over and over and fill the computer storage
- self-replicating software which can delete and corrupt files
13 Clues: uses a private key and a public key • one method for avoiding acccidental data loss • self-replicating software which can delete and corrupt files • an attack on a server designed to deny service coming from multiple computers • a security technology that monitors a computer’s incoming and outgoing traffic • ...
Cyber Bullying 2021-04-26
Across
- defines cyber bullying as a form of bullying through digital technology
- 3words support line for kids phone number 1800 55 1800
Down
- Trisha Prabhu designed this app to prevent cyber bullying
- bullying online is easier because then they can remain _____
- 1 in 5 _____ young people have reported being cyber bullying
5 Clues: 3words support line for kids phone number 1800 55 1800 • Trisha Prabhu designed this app to prevent cyber bullying • bullying online is easier because then they can remain _____ • 1 in 5 _____ young people have reported being cyber bullying • defines cyber bullying as a form of bullying through digital technology
Digital Citizenship :D 2025-07-16
11 Clues: Online • Chatgpt • Digital • Worldwide • To uplift others • Something we all use • Inhabitant of a place • Meeting new people online • what the internet is made of • An annoying person who tricks you • This can protect you from scams and cyber attacks (I think)
Presley's Dictionary 2023-11-27
Across
- a video camera connected to a computer.
- a network security device that monitors incoming and outgoing network traffic
- a wireless connection that connects you to the internet through radio waves
- something that typically has a touch screen and internet access.
- it can hold and transfer data
- the responsibility use of the technology you use
- information that is easy to access which can include management
- a high-capacity, self-contained storage device.
- when you tell the readers that your source came with another writer
- it is made to sit on a table or desk.
- a electronic device with a screen which puts out pixels
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection
- transmits data and connects different networks together
Down
- Somewhere that you can store pictures and files.
- it manages a computers memory, software and hardware.ci
- a type of online fraud where a cyber criminal designs a fake online identy to exposit the victims idenity
- a peripheral device that enables a user to input text into a computer or any other electronic machinery.
- global network of billions of computers and other electronic devices
- a sequence of characters or encoded information identifying when a certain event occurred
- a web centric computer that runs through google.
- A computer that is suitable for use while travelling.
- It brings you to a certain website or page, the address.
- text files with small pieces of data like a username and password
- an application for accessing websites and the Internet.
- is a common interface that enables communication between devices
25 Clues: it can hold and transfer data • it is made to sit on a table or desk. • a video camera connected to a computer. • a high-capacity, self-contained storage device. • Somewhere that you can store pictures and files. • the responsibility use of the technology you use • a web centric computer that runs through google. • A computer that is suitable for use while travelling. • ...
Marleigh's Dictionary 2023-11-27
Across
- When you tell readers where your sources came from
- A video camera that is connected to a computer
- A Personal computer usually located on a desk or table
- the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.
- An application for accessing websites on the internet
- A type of online fraud where a cyber criminal designs a fake online indenty
- connects peripheral devices
- The responsibility of use of the technology you use and own to communication with society.
- An electronic device used for storing and processing data
- An electronic device with a screen which puts out pixels to show a display.
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
- Device used to input text into a computer
- A network security device that monitors network traffic
- A place where you can store pictures and files
- Opposite of saftware
- A unit used to show the amount of storage you have
Down
- Interconnected computing devices that can exchange data and share resources with each other.
- It manages the computer's memory and processes, as well as all of its software and hardware.
- Opposite of hardware
- text files with small pieces of data
- A program that searches for and identifies items in a database
- High capacity self contained storage device
- Mobile phone that performs many functions
- Global network of billions of computers and other devices
- Wireless conection that connects you to the internet
25 Clues: Opposite of hardware • Opposite of saftware • connects peripheral devices • text files with small pieces of data • Mobile phone that performs many functions • Device used to input text into a computer • High capacity self contained storage device • A video camera that is connected to a computer • A place where you can store pictures and files • ...
Chapter 11-12 2023-01-06
Across
- ensuring that every individual has an equal opportunity to make the most of their lives and talents
- body of law that outlines rules on settling disputes between individuals
- Pierre Trudeau added this to the constitution in 1982
- a sentence or a part of a sentence that you serve in the community
- the single unified source of expert advice guidance services and support on cyber security for Canadians
- jurisdiction embraces both the civil law of the province of Quebec and the common law of the other nine provinces and three territories
- British Columbia's superior trial court
- law established by an act of the legislature that is signed by the executive
- local law
- a federal law that includes definitions of most of the criminal offences that the Parliament of Canada has enacted
Down
- a combination of common law and civil law
- to deal with all criminal matters except murder committed by adults and certain other, very serious offences, such as treason
- protect the public by holding youth accountable, by preventing crime and by rehabilitating and reintegrating youth in the community
- regulates and supervises broadcasting and telecommunications in the public interest
- outlined the rights and freedoms everyone is entitled to
- a rule of conduct or action prescribed or formally recognized as binding or enforced by a controlling authority
- principle under which all persons, institutions, and entities are accountable to laws that are
- gives parliaments in Canada the power to override certain portions of the charter for five-year terms when passing legislation
- restoring someone to health or normal life through training and therapy
- the highest court in the province
20 Clues: local law • the highest court in the province • British Columbia's superior trial court • a combination of common law and civil law • Pierre Trudeau added this to the constitution in 1982 • outlined the rights and freedoms everyone is entitled to • a sentence or a part of a sentence that you serve in the community • ...
WMC 2023-09-20
Across
- A system used to verify that a user is human and not a computer bot.
- A saved copy of data used to restore in case of data loss.
- Software designed to infiltrate or damage computer systems.
- Small piece of data stored on a user's computer by the web browser while browsing a website.
- Not a digital bird, but someone overly paranoid about online security!
- A less-than-proficient hacker, maybe more of a couch potato.
- Secure connection between your device and the internet.
- Software designed to identify and stop malicious software.
- A collection of software and tools to make phishing campaigns easier for attackers.
- A network of private computers infected with malicious software and controlled as a group.
- Malicious entities or individuals who conduct harmful cyber operations.
- Malicious software that records every keystroke to secretly gather personal information.
- Targeted phishing attempts directed at specific individuals or companies.
Down
- A secret combination, often alphanumeric, used for authentication.
- Unsolicited and irrelevant messages sent over the internet.
- Confirming the truth of an attribute of a single piece of data or an entity.
- A trap set to detect, deflect, or counteract unauthorized use of information systems.
- Voice-based phishing where attackers use phone calls to deceive victims.
- Phishing attacks that are executed via SMS.
- A deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity.
- Process of converting information to code to prevent unauthorized access.
- AI-generated fake content, often video, that looks convincingly real.
- An authentication method that requires two separate pieces of evidence.
- Imitating a trustworthy source in an attempt to deceive.
- An encrypted online environment not indexed by traditional search engines.
25 Clues: Phishing attacks that are executed via SMS. • Secure connection between your device and the internet. • Imitating a trustworthy source in an attempt to deceive. • A saved copy of data used to restore in case of data loss. • Software designed to identify and stop malicious software. • Unsolicited and irrelevant messages sent over the internet. • ...
RU ITEC411 Crime 2025-11-23
Across
- someone who uses technical skills to explore, access, or break into computer systems
- fake emails that try to fool you into clicking links or sharing login information
- scrambling data so only someone with the right key can read it
- malicious code that attaches to programs and spreads when those programs run
- tricking people into giving up passwords or sensitive information
- a security professional who uses hacking skills to test and improve defenses
- an attack that floods a site or server with traffic so real users can’t reach it
- any harmful software designed to damage systems, steal data, or cause problems
- using hacking skills to make a political point or support a cause
- a self-spreading program that moves across computers on its own and can clog networks
- written statements that falsely harm someone’s reputation
Down
- the main U.S. law that makes unauthorized computer access a crime
- when someone steals personal information to pretend to be someone else
- redirecting a user to a fake website even when they typed the real one
- text message scams that ask for personal or financial information
- a malicious hacker who breaks into systems for theft, disruption, or profit
- a group of infected computers secretly controlled by an attacker
- investigating digital evidence to figure out what happened in a cyber incident
- getting into a computer system without permission, usually by finding weaknesses to exploit
- identification using physical traits like fingerprints, face, or iris patterns
- technology that figures out a user’s real-world location based on Internet data
- phone calls pretending to be from a real company to steal account details
22 Clues: written statements that falsely harm someone’s reputation • scrambling data so only someone with the right key can read it • a group of infected computers secretly controlled by an attacker • the main U.S. law that makes unauthorized computer access a crime • text message scams that ask for personal or financial information • ...
Safety Week Crossword Puzzle. 2023-05-04
Across
- Safety Objective #1: We will protect our People by reducing Employee “______”.
- The Mission Statement of the Safety and Security Department is to (3/4) …”and “______” deals with these issues before they become…”
- The Mission Statement of the Safety and Security Department is to (2/4) “that “______” risks to the operation and workplace……”
- All Southwest Employees are responsible for reading and being familiar with the Safety & Security Commitment and Safety “______”
- Safety can never be sacrificed to achieve our other “______” pillars.
- At the top of our Operational Philosophy sits “______”, and rightly so, as it’s our top priority at Southwest Airlines.
Down
- Safety “______” is the component of our SMS (Safety Management System) that includes training, communication, and other actions that create a positive safety culture within all levels of the Company.
- Safety “______” is the component of our SMS (Safety Management System) that evaluates the continued effectiveness of risk controls and supports the identification of new hazards.
- The Mission Statement of the Safety and Security Department is to (4/4) “…injuries, accidents or “______”.”
- Safety “______” Management is the component of our SMS (Safety Management System) that determines the need for and adequacy of new or revised risk controls based on the assessment of acceptable risk.
- The Mission Statement of the Safety and Security Department (1/4) is to “_______”and support a Safety and Security Culture….”
- Safety “______” is the component of our SMS (Safety Management System) that establishes our commitment to continually improve safety and defines the methods, processes, and organizational structure needed to meet our Company’s safety goals.
- Personal protective equipment, commonly referred to as “______”, is equipment worn to minimize exposure to hazards that cause serious workplace injuries and illnesses.
- Safety Objective #3: We will reduce operational Safety “______”.
- Safety Objective #2: We will reduce aircraft “______” in our operation.
- Safety Objective #4: We will reduce Security “______” Violations.
16 Clues: Safety Objective #3: We will reduce operational Safety “______”. • Safety Objective #4: We will reduce Security “______” Violations. • Safety can never be sacrificed to achieve our other “______” pillars. • Safety Objective #2: We will reduce aircraft “______” in our operation. • Safety Objective #1: We will protect our People by reducing Employee “______”. • ...
Internet of Things Crossword 2022-11-30
Across
- Characteristic of IOT that helps growth.
- This Cloud provider has 40% (the highest) market share in IOT.
- Connected devices exchanging data with each other.
- Device used to collect measurements.
- Smart*Something* that coordinates energy use and distribution.
- Language that can be used for IOT analytics.
- By 2027, the global IOT market will grow to $1.4 *Something*
- This type of computing uses the device to perform processing and analytics.
- An industry that uses IOT.
- Secure protocol for connecting to IOT devices.
- Is made up of IOT devices that manage utilities, energy, traffic, water and waste management (Two words, 5 letters - 4 letters).
- This protocol has 128 bits in its address.
- The most common cyber attack using IOT devices.
- A very small, single user area network.
- The network the IOT relies on.
- Top connectivity protocol for IOT devices.
Down
- The amount of data generated by 2025 will be 73 *Something*Bytes?
- IOT devices and sensors connect to a centralised hub.
- IIOT.
- This multinode network structure connect dynamically through multiple routers. Provides redundancy and failover.
- Small tags that use radio frequencies to transfer data on the internet.
- The IOT device that performs calculations.
- Where an IOT device might connect to.
- Devices such as smart watches, fitness bands, smart glasses.
- Very large dataset (Two words, 3 letters - 4 letters).
- One of the biggest challenges in IOT.
- Internet Protocol suite used across the internet (3 letters / 2 letters).
- The "OS" that is the most popular for IOT.
- In 2027, it is predicted that there will be 41 *Something* IOT devices.
- A small device, with a sensor, that can do some processing and is connected to the internet.
30 Clues: IIOT. • An industry that uses IOT. • The network the IOT relies on. • Device used to collect measurements. • Where an IOT device might connect to. • One of the biggest challenges in IOT. • A very small, single user area network. • Characteristic of IOT that helps growth. • The IOT device that performs calculations. • This protocol has 128 bits in its address. • ...
Stock market 2024-10-21
Across
- A measure of stock price
- A professional who buys and sells security for claints
- trading A type of investment strategy involved burying and selling options
- order A type of order to sell the security at best available price
- price the price at which a security is currently trading
- A financial instrument representing ownership in company
Down
- order A type of order to buy or sell
- A market where security are bought and sold
- and hold A type of investment strategy that involves holding security for long period of time
- A measure of company profitability
- A sudden and significant drop in market
11 Clues: A measure of stock price • A measure of company profitability • order A type of order to buy or sell • A sudden and significant drop in market • A market where security are bought and sold • A professional who buys and sells security for claints • A financial instrument representing ownership in company • price the price at which a security is currently trading • ...
the great depression crossword chase little 2023-05-23
Across
- started to form in the skies 1930
- dry dirt in the skies
- the day the stock market crashed
- the crop prices plummeted
- traded 16 mil shares in 1930s
- protected people's economic status.
Down
- a lot of unemployed people
- dust cover the skies causing debris every where
- social security singed by?
- half of them failed
- gave people security for there econimic statuse
- socail security was caused by
- spiraled to the great depression
- messed up farm lands
- it is the dust bowl
- spiralled down in the great depression
16 Clues: half of them failed • it is the dust bowl • messed up farm lands • dry dirt in the skies • the crop prices plummeted • a lot of unemployed people • social security singed by? • socail security was caused by • traded 16 mil shares in 1930s • the day the stock market crashed • spiraled to the great depression • started to form in the skies 1930 • protected people's economic status. • ...
bullying 2022-10-20
9 Clues: hurting • being mean • saying mean • spreading rumors • excluding people • sending mean messages • repeatedly being mean • saying you will be mean • making you do things you don't want to
Cyber test 2014-03-28
8 Clues: Currency • Much feared • Don't like China • Ironically targeted • Regular bedtime read • Threat x vulnerablity • Unidentifiable hackers • Best place for cyber advice
SIEM Managed Security and Threat 2014-02-03
Across
- an SIEM gathers Information and presents it in ______ ?
- SOC Location in Europe ?
- Security _____ & xxxxx Management ?
- Security xxxxx & _____ Management ?
- LME stands for Log ______ Enterprise ?
- an LME SIEM generates ______ to alert customer of security incidents ?
- What company received a Frost & Sullivan award for growth ?
- What does an SIEM gather to analyse ?
Down
- SOC Location in Mid USA ?
- _____ Protection System ?
- SOC Location in Asia ?
- Managed SWG protects customers when _______ the web ?
- What device sends SIEM logs showing user connects to the internet
- Managed WAF protects customer ________ on web servers ?
- What does the Managed IVS or EVS Service Scan for ?
- Managed NAC is xxxxxx xxxxxx ______ ?
- SOC Location in Windy City, USA ?
- Who reviews the logs in the SOC ?
18 Clues: SOC Location in Asia ? • SOC Location in Europe ? • SOC Location in Mid USA ? • _____ Protection System ? • SOC Location in Windy City, USA ? • Who reviews the logs in the SOC ? • Security _____ & xxxxx Management ? • Security xxxxx & _____ Management ? • Managed NAC is xxxxxx xxxxxx ______ ? • What does an SIEM gather to analyse ? • LME stands for Log ______ Enterprise ? • ...
Fundamentals of CYbersecurity 2023-01-22
Across
- secrecy of the information
- Involves a computer or computer network
- Warning for malicious activity
- control Role management and rule management
- Weakness in information system
Down
- assurance that the information received is exact and accurate
- enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
- Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
- Attempt to gain unauthorized access
- Virtual component world
- security triads
- identify the user or system or the entity
12 Clues: security triads • Virtual component world • secrecy of the information • Warning for malicious activity • Weakness in information system • Attempt to gain unauthorized access • Involves a computer or computer network • identify the user or system or the entity • control Role management and rule management • assurance that the information received is exact and accurate • ...
cyber 2023-09-28
Across
- Combines technique from question 1 and , but engages the target through SMS/text messages.
- Is a social engineering technique in which an attacker sends fraudulent emails, claiming to be from a reputable and trusted source.
- Be care full with what personal information you share in your online presence or risk falling victim to ___, where an attacker uses that information to create a compelling, targeted attack.
Down
- If you get ___ request from your friends, they could potentially be social engineers attacks.
- When an attacker offers a free music download or gift card in an attempt to trick the user into providing credentials, that's ____.
- Social engineers typically use fear and ____ to trick users into committing risky actions.
- Not all social engineering attacks take place online such as in vishing where the attacker attempts to trick a victim into disclosing sensitive information or granting access to the target's computer over the---.
7 Clues: Combines technique from question 1 and , but engages the target through SMS/text messages. • Social engineers typically use fear and ____ to trick users into committing risky actions. • If you get ___ request from your friends, they could potentially be social engineers attacks. • ...
Explore the Refreshed ascendlearning.com 2023-09-01
Across
- Ascend inclusion learning program
- Ascend Learning value
- Ascend Learning solution
- Ascend Learning healthcare brand
- Leawood office
- Ascend Learning value
- healthcare vertical
- Burlington community outreach group
- CHRO
- Safety & Security brand
- CFO
- Company that recognized Ascend as a Great Workplace for Diversity
Down
- executive VP of corporate development
- Ascend Learning tagline
- CTO
- Fitness and Wellness brand
- CEO
- president of safety and security and international
- general counsel
- president of healthcare
20 Clues: CTO • CEO • CFO • CHRO • Leawood office • general counsel • healthcare vertical • Ascend Learning value • Ascend Learning value • Ascend Learning tagline • president of healthcare • Safety & Security brand • Ascend Learning solution • Fitness and Wellness brand • Ascend Learning healthcare brand • Ascend inclusion learning program • Burlington community outreach group • ...
Sociology of deviant behaviour 2023-10-19
Across
- division of labour
- a behaviour stray from accepted norms
- a public order crime
- home a place for temporarily observing juvenile delinquents
- slaves committing suicide
- another word for anomie
Down
- dry state
- suicide due to lack of integration
- means become goals
- cyber crime
- Prohibitipon of alcohol in Rajasthan
- Mahila Anathalaya
12 Clues: dry state • cyber crime • Mahila Anathalaya • means become goals • division of labour • a public order crime • another word for anomie • slaves committing suicide • suicide due to lack of integration • Prohibitipon of alcohol in Rajasthan • a behaviour stray from accepted norms • home a place for temporarily observing juvenile delinquents
TTS Informatika Nizhar 2024-09-12
10 Clues: Visual • Dunia siber • Lebih lanjut • Informatika mencakup • Cyber physical system • Bahasa inggris informatika • Poin profil pelajar pancasila • Pilar dalam berpikir komputasional • Bidang-bidang pengetahuan informatika • Infografis yang cocok untuk menjelaskan topik pembahasan secara poin per poin
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
Cisco Security & Duo Security In-depth 2020-07-31
Across
- This Cisco product analyzes network traffic?
- Cisco's 1st line of security in the cloud?
- What kind of protection does Cisco AMP provide?
- A type of trust strategy that Duo uses?
- Competitor of Cisco's Duo User Authentication?
- What does Cisco's ESA/CES protect?
- Competitor of Cisco's Fore Power?
- Industry-leading threat and malware protection?
Down
- A type of second source validation?
- Cisco Firepower is a next generation?
- Competitor of Cisco's Email Security?
- Duo uses how many levels of authentication?
- Competitor of Cisco's Duo Access Management?
- A type of access Duo provides for a distributed workforce?
- Competitor of Cisco's Stealthwatch?
- Competitor of Cisco's Umbrella?
- Competitor of Cisco's AMP?
17 Clues: Competitor of Cisco's AMP? • Competitor of Cisco's Umbrella? • Competitor of Cisco's Fore Power? • What does Cisco's ESA/CES protect? • A type of second source validation? • Competitor of Cisco's Stealthwatch? • Cisco Firepower is a next generation? • Competitor of Cisco's Email Security? • A type of trust strategy that Duo uses? • Cisco's 1st line of security in the cloud? • ...
Camouflaged text 2023-08-01
Across
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- uicydata;104.18.12.126
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- A remote code execution flaw in Nginx web server.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Network Security 2013-08-27
Across
- typical exploit used with bad programming
- type of vulnerability typically used by attackers
- how antivirus software detects viruses
- A ______ attack is a technique where every single combination is tested
- Intrusion ______ Systems are considered passive systems
- MD5 is a ______
Down
- self replicating malware on execution
- ______ testing is a test carried out by sec professionals to check a system
- computer system designed to trap attackers and spam
- number one reconnaissance tool used
- monitoring only does not ______ an attacker
- Using a proxy could be considered to be a man-in-the-______ attack
- malware disguised as a useful application
13 Clues: MD5 is a ______ • number one reconnaissance tool used • self replicating malware on execution • how antivirus software detects viruses • typical exploit used with bad programming • malware disguised as a useful application • monitoring only does not ______ an attacker • type of vulnerability typically used by attackers • computer system designed to trap attackers and spam • ...
I.T. Security 2014-04-13
Across
- Programs designed to gain access to a computer without the user´s authorization.
- A program that appears to be useful but in reality it damages the system.
- Showing desire to cause harm.
- Software that replaces the user´s search engine.
- A failure in security.
- Softare that send information about the use of the system.
- A program that limits the data that can pass through a network and protects the user´s machine from damage or infection.
- A program that automatically downloads advertisements to your computer
Down
- Software used for scanning and removing viruses from your computer.
- Malicious programs that copy themselves into other programs and cause system problems.
- A string of characters used for authenticating a user on a computer system.
- The coding of information so that it can only be decoded and read by someone who has the correct decoding key.
- A person who can gain unauthorized access to other computers.
13 Clues: A failure in security. • Showing desire to cause harm. • Software that replaces the user´s search engine. • Softare that send information about the use of the system. • A person who can gain unauthorized access to other computers. • Software used for scanning and removing viruses from your computer. • ...
Security Systems 2016-05-24
Across
- protection from harm
- protected and not in danger
- to stop something from happening
- unwanted junk mail
- something that may cause damage
- software that tries to prevent problems
- to ruin something
- an operating system
Down
- an electronic message
- an electronic device that stores and processes data
- program that protects your computer from harm
- program designed to destroy your computer
- someone who breaks into computer systems
13 Clues: to ruin something • unwanted junk mail • an operating system • protection from harm • an electronic message • protected and not in danger • something that may cause damage • to stop something from happening • software that tries to prevent problems • someone who breaks into computer systems • program designed to destroy your computer • program that protects your computer from harm • ...
Security Guides 2023-09-21
Across
- First suggested response method directed by the Department of Homeland Security in the case of an active shooter
- How often is an annual audit of credit union keys completed?
- How often is the burglary alarms tested?
- The wrongful use of force, intimidation, or authority to obtain money, property or other benefits
- Who does LMCU use for currency transportation?
- What is more important to the credit union than the safety and security of its employees?
- What must be documented each day when opened?
Down
- What radio do we listen to for weather alerts and warnings?
- Person responsible for the issue and retrieval of all keys
- How often does the security department review the CCTV systems?
- How many days are video images stored for?
- Must be verified within 24 hours of receipt
- The signal used to indicate that the building is safe to enter
13 Clues: How often is the burglary alarms tested? • How many days are video images stored for? • Must be verified within 24 hours of receipt • What must be documented each day when opened? • Who does LMCU use for currency transportation? • Person responsible for the issue and retrieval of all keys • What radio do we listen to for weather alerts and warnings? • ...
SECURITY MEETING 2024-06-10
Across
- PROHIBITED WITHOUT APPROVAL
- PROGRAM TO REPORT THREATS AGAINST THE BANK
- 3 POTENTIAL COURSES OF ACTION
- EMPLOYEES RESPONSIBLE FOR SIGNING
- NUMBER OF COURSES OF ACTIONS
Down
- IN MOST CASES USES A FIREARM
- DO NOT ATTEMPT TO MOVE
- REVIEWED ANNUALLY AND REVISED
- COMPLY WITH REGULATIONS OF
- REPORT FILED
- DEPARTMENT TO ENGAGE WITH EMERGENCY RESPONDERS
- MUST USE ACTIVE SHOOTER MEDIA STATEMENT
- MONTHLY TRAINING
13 Clues: REPORT FILED • MONTHLY TRAINING • DO NOT ATTEMPT TO MOVE • COMPLY WITH REGULATIONS OF • PROHIBITED WITHOUT APPROVAL • IN MOST CASES USES A FIREARM • NUMBER OF COURSES OF ACTIONS • REVIEWED ANNUALLY AND REVISED • 3 POTENTIAL COURSES OF ACTION • EMPLOYEES RESPONSIBLE FOR SIGNING • MUST USE ACTIVE SHOOTER MEDIA STATEMENT • PROGRAM TO REPORT THREATS AGAINST THE BANK • ...
Security Puzzle 2024-09-10
Across
- Virus yang menyamar sebagai perangkat lunak yang sah atau berguna, namun memiliki niat jahat.
- Protokol keamanan yang digunakan untuk memastikan komunikasi yang aman melalui internet.
- Teknik yang digunakan untuk memalsukan alamat IP agar terlihat sah.
- Protokol untuk mengamankan transfer file di jaringan komputer
- Pengujian terhadap sistem untuk menemukan celah atau kelemahan dalam sistem keamanan disebut testing.
- Serangan yang berusaha membuat layanan tidak dapat diakses oleh pengguna.
- Serangan dengan cara menebak-nebak password sampai berhasil.
- Proses verifikasi identitas pengguna disebut authentification.
Down
- Penggunaan firewall bertujuan untuk memfilter dan mengontrol data.
- Sebuah program yang dapat menggandakan diri dan menyebar ke komputer lain tanpa izin.
- Istilah untuk menggambarkan pencurian identitas online untuk tujuan yang merugikan.
- Proses untuk mengubah data menjadi bentuk yang tidak dapat dibaca tanpa kunci khusus.
- Istilah untuk menggambarkan akses yang tidak sah ke sistem atau jaringan komputer.
13 Clues: Serangan dengan cara menebak-nebak password sampai berhasil. • Protokol untuk mengamankan transfer file di jaringan komputer • Proses verifikasi identitas pengguna disebut authentification. • Penggunaan firewall bertujuan untuk memfilter dan mengontrol data. • Teknik yang digunakan untuk memalsukan alamat IP agar terlihat sah. • ...
Resource Security 2025-06-19
Across
- Build up of water behind a dam.
- Barrier built across a river to create a reservoir.
- lack of enough safe and nutritious food to remain healthy & active.
- Inability of a population to safeguard sustainable access to adequate quantities of acceptable quality water.
- Extracting too much water from a ground source.
- Expensive and energy intensive process to turn salt water into fresh water.
- Underground water store in permeable rock.
Down
- when more water is withdrawn than a region can sustainably support.
- ability of a country to produce the resources it needs, without relying on other countries.
- Lack of proper nutrition.
- Supply of water to crops.
- Severe and prolonged shortage of food.
- - Relating to money and jobs.
13 Clues: Lack of proper nutrition. • Supply of water to crops. • - Relating to money and jobs. • Build up of water behind a dam. • Severe and prolonged shortage of food. • Underground water store in permeable rock. • Extracting too much water from a ground source. • Barrier built across a river to create a reservoir. • ...
Security igcse 2025-10-07
Across
- uses a private key and a public key
- when the computer asks users if they are sure they want to carry out instructions
- a type of software which may track user behavior to display targeted ads based on their interests
- one method for avoiding acccidental data loss
- an attack on a server designed to deny service coming from multiple computers
Down
- sits between the main server and the internet and protects the main server from attacks
- programs that collect personal or sensitive data then send them to another device
- when an authentic-looking message or email tries to trick you into sending sensitive data
- malicious software which tricks you into visiting false websites and giving sensitive data
- a program that disguises itself as another programs, when run it deletes and corrupts files
- a security technology that monitors a computer’s incoming and outgoing traffic
- programs that replicate themselves over and over and fill the computer storage
- self-replicating software which can delete and corrupt files
13 Clues: uses a private key and a public key • one method for avoiding acccidental data loss • self-replicating software which can delete and corrupt files • an attack on a server designed to deny service coming from multiple computers • a security technology that monitors a computer’s incoming and outgoing traffic • ...
Executive Departments 2022-02-10
Across
- to enhance the health and well-being of all Americans
- assists U.S. communities in providing fair and equal housing
- counterterrorism, cybersecurity, aviation security, border security, port security, maritime security
- responsible for formulating and recommending domestic and international financial, economic, and tax policy
- oversees the management and distribution of the federal budget for education initiatives
- to enforce the law and defend the interests of the United States according to the law
- foster, promote, and develop the welfare of the wage earners
- to ensure America's security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions
- promotes job creation and economic growth by ensuring fair trade
Down
- responsible for planning and coordinating federal transportation projects
- to enforce the law and defend the interests of the United States according to the law
- the principal defense policymaker and adviser
- in charge of coordinating agricultural research, extension and teaching activity
- advises the president and leads the nation in foreign policy issues
- responsible for administering veteran benefits, memorials/cemeteries, and health care
15 Clues: the principal defense policymaker and adviser • to enhance the health and well-being of all Americans • assists U.S. communities in providing fair and equal housing • foster, promote, and develop the welfare of the wage earners • promotes job creation and economic growth by ensuring fair trade • advises the president and leads the nation in foreign policy issues • ...
Relations toxiques 2 2025-10-24
Across
- HARCÈLEMENT Harcèlement en ligne
- Acte violent ou illégal
- Faire peur ou menacer quelqu’un
- Mauvais traitement ou exploitation
- Rendre quelqu’un honteux
- Quelqu’un qui viole les règles
- Désaccord ou dispute
- Contrôle strict ou excessif
Down
- Forcer quelqu’un à faire quelque chose
- Personne qui subit un dommage
- Influencer quelqu’un pour son intérêt
- Traiter quelqu’un différemment et injustement
- Parole blessante
- Comportement répété et nuisible
- Influence forte pour faire agir quelqu’un
15 Clues: Parole blessante • Désaccord ou dispute • Acte violent ou illégal • Rendre quelqu’un honteux • Contrôle strict ou excessif • Personne qui subit un dommage • Quelqu’un qui viole les règles • Faire peur ou menacer quelqu’un • Comportement répété et nuisible • HARCÈLEMENT Harcèlement en ligne • Mauvais traitement ou exploitation • Influencer quelqu’un pour son intérêt • ...
HIPAA Crosswords 2023-08-17
Across
- Imposing penalties for HIPAA violations to ensure compliance.
- Healthcare providers, health plans, or clearinghouses subject to HIPAA.
- Central concept of HIPAA that protects individuals' health information.
- Sensitive patient data covered by HIPAA.
- Third parties that handle PHI on behalf of covered entities.
- Record of electronic PHI access to track potential security breaches.
- Permission required to disclose PHI for purposes not covered by HIPAA.
Down
- Assessing security vulnerabilities to prevent data breaches.
- HIPAA component focused on protecting electronic health information.
- Process of removing identifying information from health data.
- Requirement to inform affected individuals in case of a security breach.
- Principle of limiting PHI access to what's required for a specific purpose.
- Adhering to HIPAA regulations to ensure patient data security.
- Patient's agreement for certain uses and disclosures of their PHI.
- Department responsible for enforcing HIPAA regulations.
15 Clues: Sensitive patient data covered by HIPAA. • Department responsible for enforcing HIPAA regulations. • Assessing security vulnerabilities to prevent data breaches. • Third parties that handle PHI on behalf of covered entities. • Imposing penalties for HIPAA violations to ensure compliance. • Process of removing identifying information from health data. • ...
Code CrossWord 2016-02-08
Across
- to identify or remove errors
- a logic gate
- a command
- health and wellness physical and psychological well-being in a digital technology world
- a virus on a computer
- a programming
- getting mail from a computer
Down
- a file of information
- a error
- when you dont receive messages from that person
- communication electronic exchange of information
- literacy process of teaching and learning and using technology
- a system
- bully a bully over online
14 Clues: a error • a system • a command • a logic gate • a programming • a file of information • a virus on a computer • bully a bully over online • to identify or remove errors • getting mail from a computer • when you dont receive messages from that person • communication electronic exchange of information • literacy process of teaching and learning and using technology • ...
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
Cyber-wellness Crossword Puzzle 2013-06-06
Across
- Save the ________ using screenshots when you were being cyber bullied.
- You should be ______________ for your words and action online because it can hurt others feelings.
- Do not post things that will _______ others feeling.
Down
- Gamming ___________ is when you can’t control yourself to stop playing that game.
- ______ bullying is using the computer or phone on online social media to say hurtful things to someone or to spread rumors
- You should have proper __________ when on the internet.
- Do not interfere other people’s quarrel as you can become another ________.
- Do not send _________ message or emails to unknown people as it could be spamming.
- You should not _________ or reply to strangers because they can ask you further private information.
- You should report the _________ to your parents or teachers.
10 Clues: Do not post things that will _______ others feeling. • You should have proper __________ when on the internet. • You should report the _________ to your parents or teachers. • Save the ________ using screenshots when you were being cyber bullied. • Do not interfere other people’s quarrel as you can become another ________. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Cybersecurity 2023-01-26
Across
- steals information though a link
- keeps intruders out
- changes IP to look legitimate
- helps provent cyber attacks
- takes data for money
- looks safe but isn’t
- Malware that can reproduce itself
- checks vulnerabilities in a system
- manipulates human error
- someone successfully got in
Down
- identifying a user’s identity.
- malicious software or infected data
- a network of infected computers
- malware used to spy
- manipulating someone's mouse
- A series 15 numbers
- private encrypted network
- protects information from hackers
- locks up a website with requests
19 Clues: keeps intruders out • malware used to spy • A series 15 numbers • takes data for money • looks safe but isn’t • manipulates human error • private encrypted network • helps provent cyber attacks • someone successfully got in • manipulating someone's mouse • changes IP to look legitimate • identifying a user’s identity. • a network of infected computers • steals information though a link • ...
Security Threats 2021-07-09
Across
- Takes advantage of a vulnerability in order to access or infect a computer
- software that permits advertisers or hackers to gather sensitive information without your permission
- a form of malware that replicates across the Internet or local networks
- software that denies you access to your files or computer until you pay a ransom
- a form of trap security specialists use to detect hacking attacks or collect malware samples
- malicious computer programs that can spread to other files
Down
- A collection of infected computers that are remotely controlled by a hacker
- malicious software
- unsolicited bulk email
- Files placed on your computer that allow websites to remember details
- reports of false and unsubstantiated claims, in an attempt to trick or defraud users.
- software add-ons designed to fix software bugs
- deceiving recipients into sharing sensitive
13 Clues: malicious software • unsolicited bulk email • deceiving recipients into sharing sensitive • software add-ons designed to fix software bugs • malicious computer programs that can spread to other files • Files placed on your computer that allow websites to remember details • a form of malware that replicates across the Internet or local networks • ...
Branch Security 2021-11-04
Across
- CTR's must always reflect a _______ address
- Team members must never ________ a CTR.
- Opening procedures must never be
- items must remain in plain sight of other person
- opening procedures must be altered
- are responsible for keeping dual custody keys and combos in your possession at all times
- must be alerted for bomb threats, civil unrest, robberies
Down
- all bank locations must mainatin ___ ____ policy
- not accessible to customers
- should not converse with fellow team members or customers after a robbery
- confirm purpose and ID of all _____ that are not known to the branch
- a security technique that uses two team members
- information collected for transactions more than $3000
13 Clues: not accessible to customers • Opening procedures must never be • opening procedures must be altered • Team members must never ________ a CTR. • CTR's must always reflect a _______ address • a security technique that uses two team members • all bank locations must mainatin ___ ____ policy • items must remain in plain sight of other person • ...
Security Crossword 2013-05-01
Across
- Seeing issues before they happen
- not discussing matters outside of the hospital environment
- Take an item without asking the owner
- To be hit
- Trust reporting procedure
Down
- mandatory training for all frontline NHS staff 8&10
- Lock with key
- Communication tool used by security
- when something happens out of the ordinary
- protecting vunarable persons in our care
- To stop issues happening
- When working in an area by yourself
- Makes a sound if an area is breached
13 Clues: To be hit • Lock with key • To stop issues happening • Trust reporting procedure • Seeing issues before they happen • Communication tool used by security • When working in an area by yourself • Makes a sound if an area is breached • Take an item without asking the owner • protecting vunarable persons in our care • when something happens out of the ordinary • ...
Security Principles 2023-07-28
Across
- Security over intangible movable property
- A bond registered over movable property
- A debt backed by an asset as collateral is called a _______ debt
- ____ and _____ cessions require the title of the intangible movable property to be transferred to the cessionary
- Type of security arising out of operation of law
- A bond registered over immovable property
- Type of obligation created by guarantees
Down
- Business ______ is a formal restructuring process available to financially distressed companies
- Most common type of mortgage bond
- Contact us on info@___________.com
- Limited real right of security in a movable asset, created by delivery of the asset
- Fundamental to Pledge
- An asset is attached by the _____ of the High Court
13 Clues: Fundamental to Pledge • Most common type of mortgage bond • Contact us on info@___________.com • A bond registered over movable property • Type of obligation created by guarantees • Security over intangible movable property • A bond registered over immovable property • Type of security arising out of operation of law • An asset is attached by the _____ of the High Court • ...
Information security 2023-08-28
Across
- Short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer.
- Intent of doing harm.
- Gap or weakness which undermines an organization’s security efforts.
- Making sure a person is who they say they are.
- Rights an individual or organization has over information and how it is used.
- Procedure used to determine user privileges or access levels to the system.
Down
- Virus Macros which have been programmed to carry out malicious intent.
- How information is protected.
- Information or data which can be accessed when needed.
- State of being complete or uncorrupted.
- Calculated assessment of potential threats to an organization’s security.
- Network of computers and devices managed as a unit with the same procedures and rules.
- Requirement of being private or secret.
13 Clues: Intent of doing harm. • How information is protected. • State of being complete or uncorrupted. • Requirement of being private or secret. • Making sure a person is who they say they are. • Information or data which can be accessed when needed. • Gap or weakness which undermines an organization’s security efforts. • ...
information security 2023-08-28
Across
- networks of computers and devices managed as a unit with the same procedures and rules.
- intent of doing harm
- rights an individual or organization has over information and how it is used.
- gap or weakness which undermines an organization’s security efforts.
- calculated assessment of potential threats to an organization’s security.
- State of being complete or uncorrupted
- Short for malicious software and covers threats such as viruses, worms, trojans, Horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive info on a computer.
- how information is protected
Down
- making sure a person is who they say they are.
- Information or date which can be accessed when needed.
- procedure used to determine users privilege or access levels to the system.
- requirement of being private or secret
- virus macros which have been programmed to carry out malicious intent
13 Clues: intent of doing harm • how information is protected • requirement of being private or secret • State of being complete or uncorrupted • making sure a person is who they say they are. • Information or date which can be accessed when needed. • gap or weakness which undermines an organization’s security efforts. • ...
Food Security 2024-11-28
Across
- The state of having enough food for all people
- The number of servings of fruits and vegetables recommended per day
- A condition in which people do not have enough food to lead a healthy life
- A large area where food is grown
- A type of food that helps build muscles
- A food that is produced using sustainable farming methods
- A system that provides food to people in different regions
Down
- The act of providing food for a specific group or community
- The process of keeping food fresh for longer periods
- A person who works in agriculture
- The practice of growing crops and raising animals for food
- The essential nutrient in fruits and vegetables
- A type of food that provides energy
13 Clues: A large area where food is grown • A person who works in agriculture • A type of food that provides energy • A type of food that helps build muscles • The state of having enough food for all people • The essential nutrient in fruits and vegetables • The process of keeping food fresh for longer periods • A food that is produced using sustainable farming methods • ...
victor/bulling 2020-11-30
Across
- disclosing someones secrets
- spreading lies
- the person who stands up to a bully
- stalking repeating harassment
- trying to get rid of someone
- the person who has been bullied
- helping the bullied
Down
- not helping the bullied
- pretending to be someone else
- a mean person
- repeating online bulling
- tricking someone to give you personal info
- online arguments
- someone who repeats it
14 Clues: a mean person • spreading lies • online arguments • helping the bullied • someone who repeats it • not helping the bullied • repeating online bulling • disclosing someones secrets • trying to get rid of someone • pretending to be someone else • stalking repeating harassment • the person who has been bullied • the person who stands up to a bully • ...
Ασφαλή χρήση διαδικτύου 2024-02-12
10 Clues: κακόβουλο λογισμικό • news ψευδείς ειδήσεις • διαδικτυακός εκφοβισμός • scams ηλεκτρονικές απάτες • reputationδιαδικτυακή φήμη • piracy πειρατεία λογισμικού • gaming παιχνίδια στο διαδίκτυο • advertisement στοχευμένες διαφημίσεις • privacy προστασία προσωπικών δεδομένων • positive εικόνα σώματος &κοινωνικά δίκτυα
Godzilla 2023-03-01
10 Clues: He lived in • Godzilla was • He was a huge • Godzilla was a • Main character • What stopped the • Godzilla stopped the • He the whole universe • How did it include the • They were stuck in a traffic jam
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
