cyber security Crossword Puzzles

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

AIRPORT CODES 2018-10-29

AIRPORT CODES crossword puzzle
Across
  1. WELLINGTON AIRPORT CODES
  2. THE THING YOU GET AFTER CHECK IN
  3. AUCKLAND AIRPORT CODE
  4. DUNEDIN AIRPORT
  5. AUSTRALIAN AIRLINES
  6. SINGAPORE AIRPORT NAME
  7. TAURANGA AIRPORT CODES
  8. SHOPPING FACILITY INSIDE THE AIRPORT
  9. BAGGAGE TO BE CARRIED INSIDE THE CABIN
  10. AVIATION SECURITY SERVICE
  11. CHRISTCHURCH AIRPORT CODES
Down
  1. INTERNATIONAL ID
  2. LIVERPOOL AIRPORT NAME
  3. PILOT'S ROOM
  4. THE AREA BEFORE DEPARTING PASSENGERS PASS THROUGH SECURITY
  5. SYDNEY AIRPORT CODE
  6. COUNTRY WITH THE BUSIEST AIRPORT
  7. NUMBER OF RUNWAY IN AUCKLAND AIRPORT
  8. PASSENGER'S BELONGING
  9. AIR TRAFFIC CONTROL

20 Clues: PILOT'S ROOMDUNEDIN AIRPORTINTERNATIONAL IDSYDNEY AIRPORT CODEAUSTRALIAN AIRLINESAIR TRAFFIC CONTROLAUCKLAND AIRPORT CODEPASSENGER'S BELONGINGLIVERPOOL AIRPORT NAMESINGAPORE AIRPORT NAMETAURANGA AIRPORT CODESWELLINGTON AIRPORT CODESAVIATION SECURITY SERVICECHRISTCHURCH AIRPORT CODESTHE THING YOU GET AFTER CHECK INCOUNTRY WITH THE BUSIEST AIRPORT...

Security Forces 2025-07-15

Security Forces crossword puzzle
Across
  1. Non-lethal weapon used for close-quarters
  2. Emergency vehicle response mode.
  3. Used to restrain suspects.
  4. An individual actively engaged in killing or attempting to kill.
  5. Senior SF leader in charge of unit security operations.
Down
  1. Worn headgear that identifies SF personnel.
  2. Latin motto meaning “Strong” representing SF spirit.
  3. Daily pre-duty briefing for Security Forces.
  4. Elite SF team specializing in aircraft security.
  5. Someone attempting to unlawfully drive through a base checkpoint.
  6. Storage location for weapons and gear.
  7. Random security practices designed to deter threats (acronym).

12 Clues: Used to restrain suspects.Emergency vehicle response mode.Storage location for weapons and gear.Non-lethal weapon used for close-quartersWorn headgear that identifies SF personnel.Daily pre-duty briefing for Security Forces.Elite SF team specializing in aircraft security.Latin motto meaning “Strong” representing SF spirit....

AI Assistant for Observability 2024-03-01

AI Assistant for Observability crossword puzzle
Across
  1. How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution)
  2. The Platform Created by Elastic that enables enterprises to accelerate business outcomes by combining the power of search and AI.
Down
  1. What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
  2. This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)

4 Clues: This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution)...

Cisco 5 2024-09-19

Cisco 5 crossword puzzle
Across
  1. Cisco's integrated security solution that provides visibility and control across the entire attack continuum
  2. Cisco's product for secure network connectivity, including remote access
  3. Cisco's solution for detecting and responding to advanced threats
  4. Cisco's security management platform that provides insights and automation to efficiently manage security policies and devices
Down
  1. Cisco's platform for security policy management and orchestration
  2. Cisco's secure internet gateway in the cloud that provides the first line of defense against threats
  3. Cisco's product that provides secure access to the network for any user, from any device, at any time, in any location
  4. Cisco's enterprise firewall product line
  5. Cisco's security framework designed to provide end-to-end network visibility and segmentation
  6. Cisco's email security appliance that blocks phishing, spoofing, and malware emails
  7. Cisco's cloud-based platform that provides advanced malware protection

11 Clues: Cisco's enterprise firewall product lineCisco's platform for security policy management and orchestrationCisco's solution for detecting and responding to advanced threatsCisco's cloud-based platform that provides advanced malware protectionCisco's product for secure network connectivity, including remote access...

Fundamentals of CYbersecurity 2023-01-22

Fundamentals of CYbersecurity crossword puzzle
Across
  1. secrecy of the information
  2. Involves a computer or computer network
  3. Warning for malicious activity
  4. control Role management and rule management
  5. Weakness in information system
Down
  1. assurance that the information received is exact and accurate
  2. enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
  3. Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
  4. Attempt to gain unauthorized access
  5. Virtual component world
  6. security triads
  7. identify the user or system or the entity

12 Clues: security triadsVirtual component worldsecrecy of the informationWarning for malicious activityWeakness in information systemAttempt to gain unauthorized accessInvolves a computer or computer networkidentify the user or system or the entitycontrol Role management and rule managementassurance that the information received is exact and accurate...

SDG Goal 16: Peace, Justice and Strong Institutions 2024-11-24

SDG Goal 16: Peace, Justice and Strong Institutions crossword puzzle
Across
  1. Process of resolving disputes without violence
  2. Fair treatment under the law
  3. Freedom from fear and want
  4. The opposite of corruption
  5. A serious crime, usually with violence involved
  6. Absence of conflict
  7. International organisation promoting peace and security
Down
  1. Systems that provide safety and security to citizens
  2. Government where everyone has a say
  3. Fundamental freedoms that all people should have
  4. Taking responsibility for your actions
  5. Use of power for private gain
  6. Treating everyone equally, regardless of background
  7. Working together towards a common goal

14 Clues: Absence of conflictFreedom from fear and wantThe opposite of corruptionFair treatment under the lawUse of power for private gainGovernment where everyone has a sayTaking responsibility for your actionsWorking together towards a common goalProcess of resolving disputes without violenceA serious crime, usually with violence involved...

Trend Micro Mobile Security 2024-05-06

Trend Micro Mobile Security crossword puzzle
Across
  1. Trend Micro Mobile Security is designed to protect ____ and tablets.
  2. Trend Micro Mobile Security helps protect against ____ attacks. These attacks are deceptive attempts by attackers to trick victims into revealing sensitive information like passwords or financial data by masquerading as a trusted entity.
  3. Trend Micro Mobile Security protects devices running this Google mobile OS
  4. Trend Micro Mobile Security is a ____ security solution
  5. Trend Micro Mobile Security offers ____ browsing protection
Down
  1. Trend Micro Mobile Security supports this Apple mobile OS
  2. Trend Micro Mobile Security scans for ____ on mobile devices. (Starts with m)
  3. Trend Micro Mobile Security helps safeguard user's ____ on mobile devices. (Starts with p)
  4. Trend Micro Mobile Security has features such as ____ tools. These tools help locate, lock or wipe lost/stolen devices to prevent unauthorized access. (Starts with a)

9 Clues: Trend Micro Mobile Security is a ____ security solutionTrend Micro Mobile Security supports this Apple mobile OSTrend Micro Mobile Security offers ____ browsing protectionTrend Micro Mobile Security is designed to protect ____ and tablets.Trend Micro Mobile Security protects devices running this Google mobile OS...

Security Crossword 2024-05-19

Security Crossword crossword puzzle
Across
  1. a secure online service that allows users to connect remotely to another network, such as their workplace network or home Wi-fi
  2. Should be constructed of uppercase, lowercase letters, numbers, and special characters
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid
  4. Fraudulent phone calls or voice message purporting to be from reputable companies in order to trick individuals into revealing personnel information
  5. A type of malware that can collect and transit private user information without the user's knowledge or consent
  6. The "A" in the CIA triad that ensures authorized users have access
Down
  1. faking the sending address of a transmission to gain unauthorized access to a secure system
  2. A type of media manipulation, where bad actors alter an image or video to create a false perception of reality
  3. A sequence of words or text used to control access to a computer, similar to a password
  4. A flaw or weakness in a computer system that could be exploited to violate the system's security
  5. by scanning files and detecting suspicious activity, these programs help protect against cyber attacks that could result in data breaches or stolen information
  6. Unauthorized access to a network, information systems, or application

12 Clues: The "A" in the CIA triad that ensures authorized users have accessUnauthorized access to a network, information systems, or applicationShould be constructed of uppercase, lowercase letters, numbers, and special charactersA sequence of words or text used to control access to a computer, similar to a password...

DEX+: Across & Down to Delivery Greatness! 2025-08-19

DEX+: Across & Down to Delivery Greatness! crossword puzzle
Across
  1. Accountable to deliver various products and services to Business within agreed Service Level / Statement of Work under his/her portfolio.
  2. Accountable for the pre-execution process, i.e. ensuring all service requests are managed promptly from ​Gate 0 to Gate D.
  3. One of the common artifacts/deliverables in the Close Delivery process
  4. The objective of this process is to release the deployed solution to end user upon obtaining Go-Live approval.
  5. Manage project resources according to the scope, budget and project schedule.
  6. An official governing working group responsible for reviewing, assessing, discussing project issues and challenges.
  7. Lead the program throughout the program life cycle and ensure objectives of program are achieved.
Down
  1. The objective of this process is to plan and manage activities for obtaining Change Advisory Committee (CAC) approval to release solution to production environment
  2. Assets owned by Business and the beneficiary is respective asset/OPU/HCU/user.
  3. Accountable to project delivery under his/her portfolio and to endorse closure of projects under his/her portfolio.​
  4. The objective of this process is to pre-identify endorser and approver and develop workplan to prepare for the development of solution proposal.
  5. Accountable to ensure Cyber Security Business Impact and Legal and Regulatory Assessments (CS BIA & LRA) are performed and updated annually.

12 Clues: One of the common artifacts/deliverables in the Close Delivery processManage project resources according to the scope, budget and project schedule.Assets owned by Business and the beneficiary is respective asset/OPU/HCU/user.Lead the program throughout the program life cycle and ensure objectives of program are achieved....

HANDS OFF!! 2025-04-05

HANDS OFF!! crossword puzzle
Across
  1. Preschool for the poor
  2. Soft Power
  3. VA
  4. Int'l Students
  5. Elder Health
  6. health security
  7. Parks
Down
  1. ret security
  2. Public Ed
  3. NEH
  4. Do good volunteers
  5. DEI
  6. Farm and nutrition

13 Clues: VANEHDEIParksPublic EdSoft Powerret securityElder HealthInt'l Studentshealth securityDo good volunteersFarm and nutritionPreschool for the poor

AI Assistant for Observability 2024-03-02

AI Assistant for Observability crossword puzzle
Across
  1. How can we achieve unified app and infrastructure visibility to proactively resolve issues? (Hint: One of Elastic's solution)
  2. The Platform Created by Elastic that enables enterprises to accelerate business outcomes by combining the power of search and AI.
Down
  1. What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
  2. This action lets you retrieve answers across any cloud and vast data sets. (Hint: One of Elastic's solution)

4 Clues: This action lets you retrieve answers across any cloud and vast data sets. (Hint: One of Elastic's solution)What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)How can we achieve unified app and infrastructure visibility to proactively resolve issues? (Hint: One of Elastic's solution)...

cyber1 2024-03-29

cyber1 crossword puzzle
Across
  1. Science of secure communication.
  2. Converting data into code.
  3. Code-breaking secret or tool.
  4. Related to encryption, secrecy.
  5. Method for encrypting text.
Down
  1. Deceptive information stealing tactic.
  2. Unauthorized computer system intruder.
  3. Related to computers, internet.
  4. Artificially generated realistic video (2 words).
  5. Malicious software spreading infection.
  6. Malicious software, harmful intent.
  7. Breaking cryptographic codes, systems.

12 Clues: Converting data into code.Method for encrypting text.Code-breaking secret or tool.Related to computers, internet.Related to encryption, secrecy.Science of secure communication.Malicious software, harmful intent.Deceptive information stealing tactic.Unauthorized computer system intruder.Breaking cryptographic codes, systems....

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  2. Shadowy cyber collective widely known because of its work since 02.2022.
  3. A remote code execution flaw in Nginx web server.
  4. Powerful intercepting proxy and web vulnerability scanner.
  5. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  6. uicydata;104.18.12.126
Down
  1. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
  2. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  3. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
  4. Rhysider 44.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

Pan-Domain Operations Crosswords 2021-03-09

Pan-Domain Operations Crosswords crossword puzzle
Across
  1. learning associated with AI
  2. _____, contest, confront, combat
  3. integration beyond whole-of-government
  4. domain of zeros and ones
  5. major division within the military environment
Down
  1. domain governed by orbital mechanics
  2. domain of narratives
  3. under the threshold zone
  4. speed of operational ______
  5. matrix of _____
  6. type of spine

11 Clues: type of spinematrix of _____domain of narrativesunder the threshold zonedomain of zeros and oneslearning associated with AIspeed of operational ___________, contest, confront, combatdomain governed by orbital mechanicsintegration beyond whole-of-governmentmajor division within the military environment

Cyberspace Article 2024-11-09

Cyberspace Article crossword puzzle
Across
  1. AI
  2. Representing Knowledge
  3. Working alongside Technology
  4. University AI was founded
Down
  1. Prejudice that may impact AI
  2. Cyber Cognitive
  3. Hispanic Author
  4. Operators of AI

8 Clues: AICyber CognitiveHispanic AuthorOperators of AIRepresenting KnowledgeUniversity AI was foundedPrejudice that may impact AIWorking alongside Technology

cyber 2023-06-20

cyber crossword puzzle
Across
  1. : Réglementation européenne sur la protection de données personnelles.
  2. : Technique permettant d'encoder des données ou du texte, à l'aide d'une clef, pour en protéger et contrôler l'accès.
  3. : Technique utilisant principalement la messagerie électronique, et usurpant l'identité d'un organisme dans le but de tromper l'utilisateur et obtenir des informations sensibles.
  4. : Acte de malveillance envers des systèmes informatiques, pouvant être classé en 4 catégories : la cybercriminalité, la déstabilisation, l’espionnage, le sabotage.
Down
  1. : Message électronique non sollicité, à but publicitaire.
  2. : Logiciel malveillant utiliser par les cybercriminels permettant de bloquer l'accès aux données, par chiffrement, en échange d'une somme d'argent.
  3. de passe : Permet l’identification et la sécurisation de la connexion de l’utilisateur à un système informatique ou une application.

7 Clues: : Message électronique non sollicité, à but publicitaire.: Réglementation européenne sur la protection de données personnelles.: Technique permettant d'encoder des données ou du texte, à l'aide d'une clef, pour en protéger et contrôler l'accès....

Server 2023-10-30

Server crossword puzzle
Across
  1. Servera nosaukums?
  2. Servera drošība? Security
  3. Servera pārlāde?
  4. Servera datu kopijas?
  5. Servera atbilde klientam?
  6. Servera kļūdu žurnāls?
  7. Servera pārvaldības rīki?
  8. Servera kapacitāte?
  9. Servera tīkla adrese?
  10. Servera datu drošība?
  11. Servera veiktspēja?
  12. Servera uzticamība?
  13. Servera izmitināšana?
  14. Servera izslēgšana?
  15. Servera nodrošināšana?
  16. Servera datu krātuve?
  17. Servera izglītība?
Down
  1. Servera atrašanās vieta?
  2. Servera saskarne?
  3. Servera atrašanās vieta?
  4. Servera resursi?
  5. Servera konfigurācija?
  6. Servera uzstādīšana?
  7. Servera izslēgšanas komanda?
  8. Servera izturība?
  9. Servera resursu sadale?
  10. Servera operētājsistēma?
  11. Servera atjaunināšana?
  12. Servera pārvaldība?
  13. Servera pilnveide?

30 Clues: Servera resursi?Servera pārlāde?Servera saskarne?Servera izturība?Servera nosaukums?Servera pilnveide?Servera izglītība?Servera uzstādīšana?Servera kapacitāte?Servera veiktspēja?Servera pārvaldība?Servera uzticamība?Servera izslēgšana?Servera konfigurācija?Servera datu kopijas?Servera tīkla adrese?Servera datu drošība?...

Cybersecurity Terms 2024-07-13

Cybersecurity Terms crossword puzzle
Across
  1. Secure online service
  2. AKA UI Redress attack
  3. Have to pay
  4. Gain access to sensitive infromation
  5. Method of scrambling data
  6. Attempts to steal personal data
  7. Appears harmless
  8. Bring your device
  9. Prevent unauthorized access
Down
  1. Protect, prevent, remove
  2. Harmful software designed to damage
  3. Online harassment
  4. Protect data during encryption process
  5. Security in cloud infrastructure
  6. Interment protocol address
  7. Network of compromised computers
  8. A security feature
  9. Media manipulation
  10. Type of malware
  11. Can be particularly dangerous

20 Clues: Have to payType of malwareAppears harmlessOnline harassmentBring your deviceA security featureMedia manipulationSecure online serviceAKA UI Redress attackProtect, prevent, removeMethod of scrambling dataInterment protocol addressPrevent unauthorized accessCan be particularly dangerousAttempts to steal personal dataSecurity in cloud infrastructure...

Sigma Crossword 2016-11-28

Sigma Crossword crossword puzzle
Across
  1. Name the industry leading mindmapping Software
  2. Quest's industry leading database tool
  3. Traditionally hung above the fireplace
  4. Which Flexera product is the only solution for a unified application readiness process for Windows, Mac and Mobile
  5. Which vendors solutions include Business Security, CloudCare and Managed Workplace
  6. Data erasure management software
  7. Whose products run on the Orion platform
  8. Santa's helpers
  9. Songs sung at Christmas
  10. Who is the leading supplier of innovative mobile security products that are Government certified?
Down
  1. 2015's CRN Specialist Distributor of the year
  2. Santa's chosen method of transportation
  3. Company creating dynamic screencapture Software
  4. Who are Sigma the official EMEA based distributor f or (5,8)
  5. Charles Dickens' Christmas loathing character
  6. Simplify the security of an Active Directory with this Quest product
  7. A sparkly Christmas decoration
  8. Who is the red nosed reindeer?
  9. A striped Christmas treat
  10. A famous snowman

20 Clues: Santa's helpersA famous snowmanSongs sung at ChristmasA striped Christmas treatA sparkly Christmas decorationWho is the red nosed reindeer?Data erasure management softwareQuest's industry leading database toolTraditionally hung above the fireplaceSanta's chosen method of transportationWhose products run on the Orion platform...

Session 1, Foundations (Day One) 2024-04-26

Session 1, Foundations (Day One) crossword puzzle
Across
  1. Deliver as _.
  2. _Integration is the single point of accountability for Natl Security missions delivery.
  3. People + Process = _
  4. Last name of new Project Integration Group director
  5. Last name of Sec of Energy
  6. Triple Constraint + _, the center triangle.
  7. Three types of projects: Expense, Capital and _.
  8. An effort with defined start and end points
  9. Acronym of Lawrence Livermore Nat
  10. Last name of Under Sec of Nuclear Security
Down
  1. _, Time and Cost are the triple constraints.
  2. Name of project management training: _ Project Management
  3. EVM or Earned Value _.
  4. Managing and _ (M&O)contractors
  5. Acronym for Contracting Officer Representative
  6. Acronym of Los Alamos Nat Lab
  7. Name of plant located in Amarillo, Texas
  8. Acronym for Other Project Cost
  9. Frequency of CNS program planning cycle
  10. Acronym for Consolidated Nuclear Security
  11. Acronym for earned value management system
  12. Last name of Infrastructure portfolio manager

22 Clues: Deliver as _.People + Process = _EVM or Earned Value _.Last name of Sec of EnergyAcronym of Los Alamos Nat LabAcronym for Other Project CostManaging and _ (M&O)contractorsAcronym of Lawrence Livermore NatFrequency of CNS program planning cycleName of plant located in Amarillo, TexasAcronym for Consolidated Nuclear Security...

Cybersecurity Crossword Puzzle 2025-03-14

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Network of hijacked computers
  2. Manipulating people for access
  3. Physically isolates a system
  4. Vulnerability with no fix yet
  5. Isolates programs for security
  6. Adds extra login security
  7. Impersonates a trusted source
  8. Blocks unauthorized network access
  9. Fixes security vulnerabilities
  10. Self-replicates across networks
  11. Steals active user session
  12. Takes advantage of a weakness
  13. Disguised malware for attacks
  14. Malicious software harming devices
  15. Tricks users into clicking links
Down
  1. Hidden entry for unauthorized access
  2. Secretly monitors user activity
  3. Secures internet connection
  4. Tries all password combinations
  5. Converts data into fixed string
  6. Unwanted or junk emails
  7. Attacks databases with queries
  8. Records keystrokes for theft
  9. Displays unwanted advertisements
  10. Encrypts files for payment
  11. Overwhelms a server with traffic
  12. Secures data using codes
  13. Fraudulent attempt to steal data
  14. Hidden part of the internet
  15. Hides malware in a system

30 Clues: Unwanted or junk emailsSecures data using codesAdds extra login securityHides malware in a systemEncrypts files for paymentSteals active user sessionSecures internet connectionHidden part of the internetPhysically isolates a systemRecords keystrokes for theftNetwork of hijacked computersVulnerability with no fix yetImpersonates a trusted source...

CTF-CW-9 2025-11-17

CTF-CW-9 crossword puzzle
Across
  1. Native risk without any safety measures
  2. Time attackers spend undetected
  3. Raising a problem to higher-level personnel
  4. Mathematical technique adding statistical noise to protect individual privacy
  5. Trust service criteria audit report
  6. Abbreviation for Confidentiality, Integrity, and Availability
  7. Rules for managing and protecting data
  8. Correctly identified security threat
  9. Red team�s go-to platform for offensive security at Tekion.
  10. Critical information for encryption and decryption
Down
  1. Ensuring maximum privacy protection without user action required
  2. Creating multiple simulated systems on one machine
  3. Anti-phishing and brand protection platform adopted by Tekion.
  4. Real-time monitoring tool at Tekion.
  5. Ethical approach to artificial intelligence development and deployment
  6. Anything of value owned or used
  7. The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
  8. (Duplicate) Procedures for automated or manual response actions
  9. Gathering data from publicly available sources
  10. Again, technology for preventing leaks

20 Clues: Time attackers spend undetectedAnything of value owned or usedTrust service criteria audit reportReal-time monitoring tool at Tekion.Correctly identified security threatRules for managing and protecting dataAgain, technology for preventing leaksNative risk without any safety measuresRaising a problem to higher-level personnel...

QBE 2020-04-01

QBE crossword puzzle
Across
  1. Head of BA
  2. QBE's platform to process payments
  3. Principle of Insurance
  4. QBE CEO
  5. Diverse Hashtag
  6. London based Insurer
  7. P&C Product
  8. #together
  9. SME Team
  10. E-Trade Platform
  11. Insured vehicles must be logged on
  12. Offshore Office
  13. QBE Headquarters
Down
  1. Fleet Product
  2. Minibus Product
  3. Employee Assistance
  4. A vehicle which is off the road must be declared
  5. Data Protection
  6. Complaints are logged on
  7. QBE’s E-Trade Platform
  8. Large broker for Minibus
  9. Minibus has been trading for how many years
  10. Annual Staff Survey
  11. Partner Charity
  12. Large broker for Minibus
  13. Newest SME Product

26 Clues: QBE CEOSME Team#togetherHead of BAP&C ProductFleet ProductMinibus ProductData ProtectionDiverse HashtagPartner CharityOffshore OfficeE-Trade PlatformQBE HeadquartersNewest SME ProductEmployee AssistanceAnnual Staff SurveyLondon based InsurerPrinciple of InsuranceQBE’s E-Trade PlatformComplaints are logged onLarge broker for Minibus...

Cyber Safety - Blake Biddell 2016-05-26

Cyber Safety - Blake Biddell crossword puzzle
Across
  1. downloadable fun
  2. cable needed to power a device
  3. appropriate level of content
  4. protect yourself online
  5. protect your online identity
  6. used to get online
  7. someone who helps at home
  8. site to gain information on the web
  9. to not be online
  10. person who helps at school
Down
  1. people online who aren't nice
  2. one of Apples products
  3. someone who looks after you
  4. provides power
  5. random information sometimes not wanted
  6. uses Electricity
  7. makes your computer sick
  8. scams games that aren't safe
  9. fun to play with
  10. to make a computer screen smaller

20 Clues: provides powerdownloadable funuses Electricityfun to play withto not be onlineused to get onlineone of Apples productsprotect yourself onlinemakes your computer sicksomeone who helps at homeperson who helps at schoolsomeone who looks after youappropriate level of contentscams games that aren't safeprotect your online identity...

Crossword 2 2024-06-07

Crossword 2 crossword puzzle
Across
  1. _ut (c or k?)
  2. _am (j or g?)
  3. _ber (c or s?)
  4. _ki (c or s?)
  5. _ un (j or g?)
  6. _ _ ide (j or g?) and what else?
  7. _olly (j or g?)
  8. _iraffe (j or g?)
  9. _ensus (c or s?)
  10. _angaroo (c or k?)
Down
  1. _ummer (c or s?)
  2. _ivil (c or s?)
  3. _ _ ilty (j or g?) and what else?
  4. _elebrate (c or s?)
  5. _ym (j or g?)
  6. _leeping (c or s?)
  7. _itrus (c or s?)
  8. _andy (c or k?)
  9. _ _ ess (j or g?) and what else?
  10. _otton (c or k?)

20 Clues: _ut (c or k?)_am (j or g?)_ki (c or s?)_ym (j or g?)_ber (c or s?)_ un (j or g?)_ivil (c or s?)_olly (j or g?)_andy (c or k?)_ummer (c or s?)_itrus (c or s?)_ensus (c or s?)_otton (c or k?)_iraffe (j or g?)_leeping (c or s?)_angaroo (c or k?)_elebrate (c or s?)_ _ ide (j or g?) and what else?_ _ ess (j or g?) and what else?...

Westhill Crossword 2024-03-10

Westhill Crossword crossword puzzle
Across
  1. Teachers are wearing this in protest
  2. Helpful Study Resource
  3. Westhills past participle
  4. Superintendent
  5. The 300s and 400s are in the _____ building
  6. You apply to college when you are a ______
  7. ________ Playmakers
  8. _____ and purple
  9. Mr. Alswanger and Mr. Cooney
  10. Alternative to the SAT
Down
  1. Upperclassmen illness
  2. Part of a class curriculum
  3. The Cyber Rams
  4. Nickname for the head janitor at Westhill
  5. Northernmost section of the school building
  6. Popular college for Westhill graduates
  7. Learned in math class
  8. Westhill’s favorite gym rat
  9. We write what you are reading
  10. Created in 1916

20 Clues: The Cyber RamsSuperintendentCreated in 1916_____ and purple________ PlaymakersUpperclassmen illnessLearned in math classHelpful Study ResourceAlternative to the SATWesthills past participlePart of a class curriculumWesthill’s favorite gym ratMr. Alswanger and Mr. CooneyWe write what you are readingTeachers are wearing this in protest...

Masalah Sosial 2025-10-01

Masalah Sosial crossword puzzle
Across
  1. Cyber crime?
  2. Bentuk diskriminasi berbasis genjer disebut?
  3. Apa yang di maksud kesenjangan sosial?
  4. Apa dampak urbanisasi berlebihan?
  5. Penyebaran budaya asing tanpa filter disebut?
  6. Teori anonim dikemukakan oleh?
  7. White collar crime artinya?
  8. Contoh masalah sosial modern?
  9. Penyalahgunaan anak untuk bekerja disebut?
  10. Diskriminasi berbasis orientasi seksual?
  11. Penyalahgunaan kekuasaan untuk kepentingan pribadi disebut?
  12. Kemiskinan relatif dibandingkan dengan?
Down
  1. Eufemisme untuk pengemis?
  2. Kesenjangan akses antara kota dan desa disebut?
  3. Apa penyebab utama kemiskinan?
  4. Kemiskinan absolut diukur dari?
  5. Apa dampak utama pengangguran?
  6. Contoh masalah sosial di bidang pendidikan?
  7. Pengangguran musiman contohnya?
  8. Apa penyebab kriminalitas?

20 Clues: Cyber crime?Eufemisme untuk pengemis?Apa penyebab kriminalitas?White collar crime artinya?Contoh masalah sosial modern?Apa penyebab utama kemiskinan?Apa dampak utama pengangguran?Teori anonim dikemukakan oleh?Kemiskinan absolut diukur dari?Pengangguran musiman contohnya?Apa dampak urbanisasi berlebihan?Apa yang di maksud kesenjangan sosial?...

Masalah Sosial 2025-10-01

Masalah Sosial crossword puzzle
Across
  1. Cyber crime?
  2. Bentuk diskriminasi berbasis genjer disebut?
  3. Apa yang di maksud kesenjangan sosial?
  4. Apa dampak urbanisasi berlebihan?
  5. Penyebaran budaya asing tanpa filter disebut?
  6. Teori anonim dikemukakan oleh?
  7. White collar crime artinya?
  8. Contoh masalah sosial modern?
  9. Penyalahgunaan anak untuk bekerja disebut?
  10. Diskriminasi berbasis orientasi seksual?
  11. Penyalahgunaan kekuasaan untuk kepentingan pribadi disebut?
  12. Kemiskinan relatif dibandingkan dengan?
Down
  1. Eufemisme untuk pengemis?
  2. Kesenjangan akses antara kota dan desa disebut?
  3. Apa penyebab utama kemiskinan?
  4. Kemiskinan absolut diukur dari?
  5. Apa dampak utama pengangguran?
  6. Contoh masalah sosial di bidang pendidikan?
  7. Pengangguran musiman contohnya?
  8. Apa penyebab kriminalitas?

20 Clues: Cyber crime?Eufemisme untuk pengemis?Apa penyebab kriminalitas?White collar crime artinya?Contoh masalah sosial modern?Apa penyebab utama kemiskinan?Apa dampak utama pengangguran?Teori anonim dikemukakan oleh?Kemiskinan absolut diukur dari?Pengangguran musiman contohnya?Apa dampak urbanisasi berlebihan?Apa yang di maksud kesenjangan sosial?...

Security Cross Word 2025-10-14

Security Cross Word crossword puzzle
Across
  1. Virtual private connection over public networks
  2. Restricting distribution based on sensitivity
  3. Detects, blocks, and responds on endpoints (abbr.)
  4. Legal framework protecting personal information
  5. Network barrier enforcing traffic rules
  6. Targeted, well-researched phishing attack
  7. Manipulating people to bypass security
  8. Program that demands payment to restore data
  9. Authentication standard for phishing resistance
  10. Application for generating/storing credentials
  11. Principle: assume breach and verify explicitly
Down
  1. Backups that enable restoration after attacks
  2. Small software flaw exploited by attackers
  3. Process of reporting an event to Security
  4. Transforming data to unreadable form
  5. Attack where criminals pose as executives
  6. Practice of updating systems to fix flaws
  7. Limiting access to only what’s needed
  8. Protects data in transit on untrusted networks
  9. Malicious software
  10. Deceptive emails designed to steal information
  11. Policy prohibiting unapproved tools
  12. Security model emphasizing continuous verification
  13. Second factor for identity verification
  14. Preventing unauthorized data exfiltration (abbr.)

25 Clues: Malicious softwarePolicy prohibiting unapproved toolsTransforming data to unreadable formManipulating people to bypass securityLimiting access to only what‚Äôs neededNetwork barrier enforcing traffic rulesSecond factor for identity verificationProcess of reporting an event to SecurityAttack where criminals pose as executives...

CTF-CW-9 2025-11-17

CTF-CW-9 crossword puzzle
Across
  1. Native risk without any safety measures
  2. Time attackers spend undetected
  3. Raising a problem to higher-level personnel
  4. Mathematical technique adding statistical noise to protect individual privacy
  5. Trust service criteria audit report
  6. Abbreviation for Confidentiality, Integrity, and Availability
  7. Rules for managing and protecting data
  8. Correctly identified security threat
  9. Red team�s go-to platform for offensive security at Tekion.
  10. Critical information for encryption and decryption
Down
  1. Ensuring maximum privacy protection without user action required
  2. Creating multiple simulated systems on one machine
  3. Anti-phishing and brand protection platform adopted by Tekion.
  4. Real-time monitoring tool at Tekion.
  5. Ethical approach to artificial intelligence development and deployment
  6. Anything of value owned or used
  7. The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
  8. (Duplicate) Procedures for automated or manual response actions
  9. Gathering data from publicly available sources
  10. Again, technology for preventing leaks

20 Clues: Time attackers spend undetectedAnything of value owned or usedTrust service criteria audit reportReal-time monitoring tool at Tekion.Correctly identified security threatRules for managing and protecting dataAgain, technology for preventing leaksNative risk without any safety measuresRaising a problem to higher-level personnel...

CTF-CW-10 2025-11-17

CTF-CW-10 crossword puzzle
Across
  1. The practice of hiding meaning in messages
  2. Service at Tekion for simplifying software requests.
  3. Sprint and issue management dashboard at Tekion.
  4. Requirement to delete data when no longer needed for its purpose
  5. GDPR requirement to gather least amount of data needed
  6. Keeping personal or sensitive information safe
  7. Establishing true user identity
  8. International standard for Privacy Information Management Systems
  9. (Triplicate) Adversary methods description
Down
  1. (Duplicate) Handling threats as a team
  2. (Duplicate) Plan for handling security disasters
  3. United Kingdom's post-Brexit data protection regulation
  4. (Duplicate) Host-level monitoring security tool
  5. Ensuring data hasn�t been changed or tampered
  6. Person in charge of independent checks
  7. Test run or legal proceeding
  8. More than password needed to get in (again
  9. Choosing how to handle each identified threat
  10. Measure to prevent unwanted events
  11. Cloud-based security layer used by Tekion to protect its websites from online attacks.

20 Clues: Test run or legal proceedingEstablishing true user identityMeasure to prevent unwanted events(Duplicate) Handling threats as a teamPerson in charge of independent checksThe practice of hiding meaning in messagesMore than password needed to get in (again(Triplicate) Adversary methods descriptionEnsuring data hasn�t been changed or tampered...

Sample Quiz 1 2023-10-12

Sample Quiz 1 crossword puzzle
Across
  1. Compliance also includes satisfying _____ requirements.
  2. I am aware that breach of any policy requirement can result in _____ action.
  3. Security _____ of an organization are identified by conducting a risk assessment.
  4. Employee _____ is a mandatory requirement before an employee is employed.
Down
  1. Apart from any incident, I am also responsible for reporting any ______ which I may identify in any of the security controls.
  2. "Need to Know" is the _____ of granting access.
  3. The first point in Information Security Policy statement refers to ____ security.
  4. Senior management team is responsible for _______ the implementation of security controls.
  5. ______ usage policy specifies do’s and don’ts for online activities using company infrastructure.
  6. My company can ____ all my communications initiated from the company provided or owned electronic device.
  7. Information Security should become a part of the ____ of the organization.

11 Clues: "Need to Know" is the _____ of granting access.Compliance also includes satisfying _____ requirements.Employee _____ is a mandatory requirement before an employee is employed.Information Security should become a part of the ____ of the organization.I am aware that breach of any policy requirement can result in _____ action....

computer crimes 2024-11-08

computer crimes crossword puzzle
Across
  1. SOFTWARE Internet based software or programs that are used to disrupt a network
  2. SOLICITING AND ABUSE Type of cyber crime wherein criminals solicit minors via chat rooms
  3. VANDALISM Damaging or destroying data rather than stealing
  4. HORSES malicious program that appears to be friendly, they are not technically viruses.
  5. Act by the criminal who floods the bandwidth of the victim’s network.
  6. refers to any crime that involves a computer/ mobile and a network
  7. type of virus hides on the user’s disk and waits for a specific event to occur before running.
  8. a program whose purpose is to duplicate itself.
  9. The least common cybercrime
Down
  1. This category of cybercrime involves one individual distributing malicious or illegal information online.
  2. VIRUSES these viruses take up residence in the computer’s memory, making then hard to detect
  3. VIRUS Type of virus make changes to a disk’s file system
  4. Means an illegal intrusion into a computer system and/or network
  5. HAT HACKERS hackers between the good and the bad guys
  6. STALKING A kind of online harrassment wherein the victim is subjected to a barrage of online messages and emails.
  7. DISSEMINATION- Malicious software that attches itself to other software.
  8. PIRACY Theft of software through the illegal copying of genuine products.
  9. TERRORISM Defined as an act of terrorism committed through the use of cyberspace
  10. VIRUSES VIRUS DESIGNED TO INFECT SPECIFIC TYPE OF DOCUMENT
  11. HAT HACKERS can be seen as the “good guys”

20 Clues: The least common cybercrimeHAT HACKERS can be seen as the “good guys”a program whose purpose is to duplicate itself.HAT HACKERS hackers between the good and the bad guysVIRUS Type of virus make changes to a disk’s file systemVANDALISM Damaging or destroying data rather than stealingVIRUSES VIRUS DESIGNED TO INFECT SPECIFIC TYPE OF DOCUMENT...

Cybersecurity 2025-03-10

Cybersecurity crossword puzzle
Across
  1. Fake emails to steal info
  2. Locks files for money
  3. Fixes security issue
  4. Shows unwanted ads
  5. horse Fake safe program
  6. Hides online activity
  7. force Guessing passwords
  8. Floods a website
  9. Extra password step
  10. Blocks bad connections
Down
  1. Hides info
  2. New security problem
  3. Looks safe but is bad
  4. Group of hacked computers
  5. Secret way in
  6. Records what you type
  7. Hides bad software
  8. Bad software
  9. Watches what you do
  10. engineering Tricks people

20 Clues: Hides infoBad softwareSecret way inFloods a websiteHides bad softwareShows unwanted adsWatches what you doExtra password stepNew security problemFixes security issueLooks safe but is badLocks files for moneyRecords what you typeHides online activityBlocks bad connectionshorse Fake safe programFake emails to steal infoGroup of hacked computers...

Cyber Security 2022-03-10

Cyber Security crossword puzzle
Across
  1. purpose
Down
  1. case

2 Clues: casepurpose

Personell in tourism 2024-03-21

Personell in tourism crossword puzzle
Across
  1. Flies aircraft.
  2. Provides medical care.
  3. Oversees operations.
  4. Teaches specific skills.
  5. Ensures safety and security.
  6. Provides amusement or enjoyment.
  7. Serves food and drinks.
  8. Manages office tasks.
  9. Maintains cleanliness.
  10. Books travel arrangements.
Down
  1. Organizes events or activities.
  2. Supervises swimming areas.
  3. Offers therapeutic services.
  4. Leads tours.
  5. Mixes and serves beverages.
  6. Prepares and cooks food.
  7. A person who buys goods or services.
  8. Cleans rooms and areas.
  9. Greets and assists guests.
  10. Helps with guest requests.
  11. Operates vehicles.

21 Clues: Leads tours.Flies aircraft.Operates vehicles.Oversees operations.Manages office tasks.Provides medical care.Maintains cleanliness.Cleans rooms and areas.Serves food and drinks.Prepares and cooks food.Teaches specific skills.Supervises swimming areas.Greets and assists guests.Helps with guest requests.Books travel arrangements....

Investment Crossword 2025-03-25

Investment Crossword crossword puzzle
Across
  1. investors use a ____ time period, with no specific plan in time
  2. The "p" In IPO stands for _____
  3. you contribute, the state, and your ____ contributes to your pension plan
  4. one way investors can make money from stocks
  5. at age ___, you can collect full social security benefits
  6. thousand-Five-Hundred the max amount of money to contribute in a 401k is- __,___
  7. Bull market stock prices are __
  8. A pension is managed by your,
  9. 1.45% for this tax
  10. the opposite of traders
  11. a ____ symbol is used to represent a company
  12. Roth IRA contributions are made _____ tax
  13. Social Security was created by which president
Down
  1. What retirement income source is funded by the government?
  2. there are ____ sources of retirement incomes
  3. bear market stock prices are ____
  4. Higher risk often means ______ Return
  5. in year____ social security was created
  6. You can withdrawal funds for your IRA & Roth IRA with no ________ at age 59.5 Seventy-three RMDs must start at age ____
  7. The total maximum contribution for IRA combined per year is ______
  8. 401K contributions are taken out of your paycheck _____ Taxes.
  9. plan what plan is managed by your employer
  10. social security and medicare together are called _____ Tax
  11. what kind of gains increase in value when you sell an asset for more than you bought it
  12. traders use a _____ time frame

25 Clues: 1.45% for this taxthe opposite of tradersA pension is managed by your,The "p" In IPO stands for _____Bull market stock prices are __traders use a _____ time framebear market stock prices are ____Higher risk often means ______ Returnin year____ social security was createdRoth IRA contributions are made _____ tax...

November 2023-11-22

November crossword puzzle
Across
  1. Chronically online Monday.
  2. The preferred holiday meal.
  3. ICAC Conference #1s
  4. American organization; big part of our community
  5. It's a fruit, actually.
Down
  1. Funny feast
  2. Bring more!
  3. It's giving
  4. Brought Thanksgiving back.

9 Clues: Funny feastBring more!It's givingICAC Conference #1sIt's a fruit, actually.Chronically online Monday.Brought Thanksgiving back.The preferred holiday meal.American organization; big part of our community

Annu's world! 2023-02-23

Annu's world! crossword puzzle
Across
  1. Mr Lomas' kannada advice "Dont do .."
  2. Cake + fruits + juice + sweets + ..
  3. Not a smash
  4. Tortoise's coat
  5. That 834 am activity
  6. 30 min of this time means 60 min .. He he he
Down
  1. Colorful bday gift
  2. Hindustani Gaga
  3. Avidin's processor
  4. My favorite brand err fruit
  5. old school cyber people
  6. "Not at 530 am please!"
  7. is always his policy

13 Clues: Not a smashHindustani GagaTortoise's coatColorful bday giftAvidin's processorThat 834 am activityis always his policyold school cyber people"Not at 530 am please!"My favorite brand err fruitCake + fruits + juice + sweets + ..Mr Lomas' kannada advice "Dont do .."30 min of this time means 60 min .. He he he

Internet 2024-10-15

Internet crossword puzzle
Across
  1. krađa identiteta, krađa lozinki ili lažno predstavljanje
  2. Slanje agresivnih poruka
  3. programi koji mogu ugroziti računalo
  4. Društvena mreža
  5. TCP-IP
  6. Slijed koraka u programiranju
Down
  1. online nasilje
  2. prevara koja korisnika navodi na otkrivanje korisničkog imena i lozinke
  3. nasilan upad 'prijatelja' na društvenim mrežama na nečije profile
  4. socijalna izolacija osobe
  5. Umjetna inteligencija
  6. Globalna računalna mreža
  7. Društvena mreža
  8. e-klevetanje

14 Clues: TCP-IPe-klevetanjeDruštvena mrežaDruštvena mrežaonline nasiljeUmjetna inteligencijaGlobalna računalna mrežaSlanje agresivnih porukasocijalna izolacija osobeSlijed koraka u programiranjuprogrami koji mogu ugroziti računalokrađa identiteta, krađa lozinki ili lažno predstavljanjenasilan upad 'prijatelja' na društvenim mrežama na nečije profile...

Team-3 2023-03-31

Team-3 crossword puzzle
Across
  1. Maximum tolerable time that a computer/application can be down after a failure/disaster occurs
  2. Document for capturing all the contractual security requirements
Down
  1. Issues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions

3 Clues: Document for capturing all the contractual security requirementsMaximum tolerable time that a computer/application can be down after a failure/disaster occursIssues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions

TIK 2023-08-23

TIK crossword puzzle
Across
  1. jaringan yang terdiri dari komputer client dan server
  2. untuk mengakses berita di seluruh dunia
  3. jaringan yang mencakup dunia
  4. jaringan yang meliputi satu kota
  5. jaringan yang hanya mencakup wilayah kecil
Down
  1. Internet untuk militer
  2. Komputer yang menerima data dari server
  3. Penyakit yang ada di internet
  4. Pencurian Nomor kartu kredit
  5. dilarang oleh agama
  6. Nama awal internet
  7. terputusnya jaringan internet
  8. tempat awal pengembangan jaringan
  9. bentuk dokumen di Internet
  10. format file gambar
  11. kejahatan cyber

16 Clues: kejahatan cyberNama awal internetformat file gambardilarang oleh agamaInternet untuk militerbentuk dokumen di InternetPencurian Nomor kartu kreditjaringan yang mencakup duniaPenyakit yang ada di internetterputusnya jaringan internetjaringan yang meliputi satu kotatempat awal pengembangan jaringanKomputer yang menerima data dari server...

HACKTIVISM 2024-10-17

HACKTIVISM crossword puzzle
Across
  1. Of one’s own free will, without being forced
  2. Leaker, revealer
  3. To engage in a struggle or defense against opposition
  4. Done carelessly, without regard for consequences
  5. In a way that seeks to undermine
  6. To take action or stand firm against something or someone
Down
  1. To rise in opposition
  2. To challenge or dispute something
  3. In a bold, fearless manner
  4. Snitch, source
  5. Campaigner, advocate
  6. Speak in favor of, advertise something
  7. Intentionally
  8. Cyber activist
  9. Hacker
  10. Demonstrator

16 Clues: HackerDemonstratorIntentionallySnitch, sourceCyber activistLeaker, revealerCampaigner, advocateTo rise in oppositionIn a bold, fearless mannerIn a way that seeks to undermineTo challenge or dispute somethingSpeak in favor of, advertise somethingOf one’s own free will, without being forcedDone carelessly, without regard for consequences...

15 Exectutive Departments 2016-09-20

15 Exectutive Departments crossword puzzle
Across
  1. / represents the united states in court
  2. / grants patents and registers trademarks
  3. / provides military forces and protects the nations security
  4. / inspects food
  5. affairs / oversees military cemeteries
  6. / produces coins and bills
  7. / operates job training programs
  8. / enforces fair housing laws
  9. / negotiates agreements with foreign countries
Down
  1. / helps native Americans manage their affairs
  2. security / in charge of border and transportation security
  3. / administers federal aid to schools
  4. / promotes production of renewable energy, fossil fuels, and nuclear energy
  5. / administers programs to promote and regulate highways, mass transit, railroads, waterways, air travel, and oil & gas pipelines
  6. services / funds health care research programs

15 Clues: / inspects food/ produces coins and bills/ enforces fair housing laws/ operates job training programs/ administers federal aid to schoolsaffairs / oversees military cemeteries/ represents the united states in court/ grants patents and registers trademarks/ helps native Americans manage their affairsservices / funds health care research programs...

Challenges of Securing Information 2023-09-25

Challenges of Securing Information crossword puzzle
Across
  1. concurrent lines of execution a shared resource
  2. incorrectly configured
  3. company does not provide support for their device
  4. manufacturers security settings
  5. wrong personnel making security decisions
  6. deficiencies or weaknesses in software
  7. that is that's not filtered or validated could cause a malicious action
  8. has not been identified
  9. widespread proliferation of devices
Down
  1. options that provide limited security choices
  2. devices not accounted for
  3. account that may provide more access than necessary
  4. error condition that allows an attacker access
  5. a situation in which an attacker manipulates commonplace business processes that are routinely performed
  6. no longer receives updates due to age

15 Clues: incorrectly configuredhas not been identifieddevices not accounted formanufacturers security settingswidespread proliferation of devicesno longer receives updates due to agedeficiencies or weaknesses in softwarewrong personnel making security decisionsoptions that provide limited security choiceserror condition that allows an attacker access...

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. This involves the illegal copying of information from the magnetic strip of a credit card.
  2. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  3. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  4. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  5. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  6. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. is another type of malware that is activated each time a computer system boots (loads) up.
  9. involves gaining access to a computer or network with authorization from a company or organisation.
  10. is the processed output of data making it meaningful to the person who receives it.
  11. This involves gaining personal information through deception.
  12. involves gaining access to a computer or network without authorization.
  13. is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
  1. is the conversion of data into a form that cannot be easily understood by unauthorized people.
  2. also known as zombie is a group of computers connected together for malicious purposes.
  3. is a software application that automatically displays advertising banners while the program is running.
  4. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  5. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  6. is a secret way to access a computer without passing security mechanisms.
  7. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  8. refers to any crime that involves a computer and a network.
  9. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  10. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  11. is raw unorganized facts that need to be processed.
  12. is malicious software designed to install itself on a computer without the owner’s knowledge.
  13. The practice of recovering sensitive information from discarded material.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. is sequences of instructions that make a computer program perform a specific task.
  16. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.is a secret way to access a computer without passing security mechanisms....

ETHICS AND SECURITY 2014-10-08

ETHICS AND SECURITY crossword puzzle
Across
  1. MONITORS USER USAGE AND DATAENTRY
  2. TEXT WHICH HAS BEEN SCRAMBLED
  3. THE SCRAMBLING/CODING OF DATA
  4. THE USER IS TRICKED BY A FAKE URL
  5. THE USER IS TRICKED BY A FAKE EMAIL
  6. A SET OF BELIEFS
  7. A IMAGE USED TO SHOW A SITE IS SECURE
  8. USED TO MONITOR USAGE AND STORE URLS
  9. THE UNSCRAMBLING OF DATA
  10. A BARRIER OF PROECTION PROVIDE BY SOFTWARE/HARDWARE
  11. PROCTECT COMPUTER BY RUNNING ALL TIME AND DAILY SCANS
Down
  1. AN INFECTION WHICH CHANGES COMPUTER SETTINGS AND SLOWS PERFORMANCE
  2. THIS SHOULD BE CHANGED OFTEN AND CONTAIN TEXT/NO./SYMBOLS
  3. TO TAKE SOMEONES WORK AND CLAIM IT IS YOUR OWN
  4. THE ENTRY OF DATA WHICH IS UNIQUE TO THE USER
  5. A SET OF LAWS TO PROTECT ARTISTS/CREATORS
  6. A METHOD OF SECURING DATA
  7. SOMEONE WHO TRIES TO STEAL INFORMATION
  8. AN INFECTION WHICH DUPLICATES ITSELF OVER AND OVER
  9. A FORM OF PROCTION WHEN EXCHANGING INFO ONLINE

20 Clues: A SET OF BELIEFSTHE UNSCRAMBLING OF DATAA METHOD OF SECURING DATATEXT WHICH HAS BEEN SCRAMBLEDTHE SCRAMBLING/CODING OF DATAMONITORS USER USAGE AND DATAENTRYTHE USER IS TRICKED BY A FAKE URLTHE USER IS TRICKED BY A FAKE EMAILUSED TO MONITOR USAGE AND STORE URLSA IMAGE USED TO SHOW A SITE IS SECURESOMEONE WHO TRIES TO STEAL INFORMATION...

Security in computing 2015-02-19

Security in computing crossword puzzle
Across
  1. a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port
  2. the fault detection – waiting for a system to fail
  3. The science of deducing the plaintext from a ciphertext, without knowledge of the key
  4. The process of writing the malicious code for a particular machine or a particular application is called ---- malicious code
  5. protocol analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network
  6. malicious code detected based on the behavior
  7. a virus that attaches itself to a file and replicates when the infected program is executed
  8. A computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating
  9. The process of anticipating the faults and handling them to minimize disruption and maximize the safety
  10. These are the programs that leak the information
  11. the fault detection – construct a system that reacts to a failure
Down
  1. A cryptosystem is a system for encrypting and decrypting data
  2. is an unforgeable token that gives the possessor certain rights to an object
  3. – keeps a copy of everything pressed
  4. The assurance that the communicating entity is the one that it claims to be
  5. (secure shell) is a pair of protocols defined for Unix
  6. systems reveal information that could facilitate an attack
  7. in this Attack- Malicious program exists between two programs
  8. each program operates as if other routines in the system were malicious or incorrect
  9. door is an undocumented entry point to a module which has occurred because of the developer
  10. Provides protection against denial by one of the entities involved in a communication
  11. defines a single choke point that keeps unauthorized users out of the protected network
  12. this is a cipher which encrypts a digital data stream one bit or one byte at a time
  13. The virus that gets lodged in main memory as part of a resident system program and the virus may infect every program that executes
  14. The study of cryptography and cryptanalysis
  15. This attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination

26 Clues: – keeps a copy of everything pressedThe study of cryptography and cryptanalysismalicious code detected based on the behaviorThese are the programs that leak the informationthe fault detection – waiting for a system to fail(secure shell) is a pair of protocols defined for Unixsystems reveal information that could facilitate an attack...

Data Security Puzzle 2025-03-21

Data Security Puzzle crossword puzzle
Across
  1. A weakness in system security procedures, software, hardware, design, implementation, internal controls, technical controls, physical controls, or other controls that could be accidentally triggered or intentionally exploited and result in a violation of the system's security policy
  2. attack created by a flood of requests from a coordinated large number of distributed nodes to overwhelm a server.
  3. a piece of code or a technique that takes advantage of a vulnerability or flaw in software or hardware to gain unauthorized access, cause unintended behavior, or disrupt a system
  4. an adversary sponsored by a country's government that are often well organized and funded
  5. using a carefully crafted software code that violates the operating systems access control policy and allows the attacker to gain full control of the system
  6. any method by which an adversary interferes with the traffic on a physical level.
  7. an attack enabled by leakage of information from a physical cryptosystem including timing, power consumption, and electromagnetic emissions.
  8. one principle of persuasion that says that people will tend to avoid mistakes by acting according to what others have done
  9. one principle of persuasion that says they are more likely to respond to messages from people they share similarities with or have a good feeling about
  10. one principle of persuasion that workers tend to respond to people above them such as their boss or higher ups
  11. a carefully crafted script in the user input to redirect a user and retrieve their login information (in the form of a cookie) from a legitimate website database.
  12. an attack where the adversary uses carefully crafted code that sends the users cookie to their computer so they now control the current session
  13. a document signed in organizations to ensure that technology is used for their intended purposes only.
  14. a set of changes or updates to a software program or operating system, designed to fix bugs, address security vulnerabilities, or improve functionality or performance
  15. the idea that users complete tasks with the least amount of cognitive effort
  16. systems that closely connect hardware, software and networks that often run autonomously
  17. hiding in a network and collecting all the bits that are being transferred between hosts
  18. turning long numbers or passwords into smaller pieces of data to help user memory
  19. type of data that includes social security number, usernames, passwords, etc..
  20. a law that protects the personal private data for citizens in the European Union.
  21. an event where confidential, private, protected, or sensitive information is exposed to unauthorized individuals, either through an accidental occurrence or an intentional act to steal information
  22. one principle of persuasion that says perceived value is greater if they believe it is limited and they must hurry to get it
  23. the type of data that is stored, transferred, inputted/outputted, or processed
  24. this is the state we refer to data that is traveling across a network
  25. this attack uses the amount of time it takes for each part of a cryptographic function to infer information.
  26. one principle of persuasion that says people tend to repay someone that has provided them something
  27. measuring the surrounding EM of the hardware to infer cryptographic keys
Down
  1. type of attack that uses the fact that some data is not fully deleted
  2. this is the state we refer to data that is currently being stored either on a device, server, cloud, or backup medium
  3. sending fake information to a network devices, servers, or applications with malicious intent
  4. one principle of persuasion that says that you can pressure someone by crafting messages to a cause they believe in
  5. A type of DDoS attack that uses a large number of spoofed IP addresses to send UDP packets to overwhelm a server
  6. attack intent to deny legitimate network users access to a resource such as a network, server, or website
  7. carefully crafted command in the user input to execute a malicious command on the website's hosting server.
  8. Individuals or groups operating domestically or internationally who use violence or threat of violence inflicted through cyber means with the intention of coercing or intimidating governments or societies into succumbing to their demands
  9. a requiring that hardware respond to tampering by failing in a safe way
  10. a security requirement for any hardware handling data protection
  11. a string that says: this user is authenticated already
  12. federal law that sets the consequences for accessing data or computers that you are not authorized to access in the federal government
  13. type of data that contains roles and authorized resources to be used for reading, writing, and processing
  14. type of data that sets rules for how to protect data on all other levels
  15. carefully crafted SQL syntax in the user input to retrieve information stored in a database
  16. erasing critical parts of memory in response to tampering
  17. changing the identifyable information on a computer to be that of another computer. This can be done with MAC addresses or IP addresses
  18. federal law that protects a person's health records and sets rules for how it can be used or disclosed.
  19. individual that uses cyberspace to break the law
  20. a mathematical algorithm that converts an input of any length into a fixed-size output, called a hash or message digest, ensuring data integrity and authenticity
  21. a type of man-in-the-middle attack that allows an adversary to set up an unsecure connection to the user and establishes a secure connection with the target website gaining complete unencrypted access to user requests.
  22. an electrical grid that includes central control and monitoring connecting to smart meters, smart appliances, etc..
  23. a type of DDoS attack that exploits the TCP three way handshake.
  24. techniques for luring a user to yield their credentials using persuasion, technological manipulation, and carefully crafted messages
  25. a type of attack that measures the level of electricity needed for each bit of data. 1s use more energy than 0s.
  26. this is the state we refer to data that is currently being processed by an application
  27. 3D model used to represent design aspects for securing data at every level
  28. an accidental or non malicious individual that makes a mistake with sharing or triggering malicious software by not following standard cyber safety protocols
  29. a temporary place to put data to help predict possible next processes. This is often used to do side channel attacks as it takes a different amount of time to process compared to RAM.
  30. any method by which authorized or unauthorized users are able to get around a security policy in systems.
  31. a vulnerability discovered and exploited by adversaries but never reported to the software vendor, NVD, or CERT
  32. federal law that affords parents the right to have access to their children's records, the right to change records, and the right to have some control over disclosure.
  33. a law passed in California that protects the personal data for citizens of California.

60 Clues: individual that uses cyberspace to break the lawa string that says: this user is authenticated alreadyerasing critical parts of memory in response to tamperinga security requirement for any hardware handling data protectiona type of DDoS attack that exploits the TCP three way handshake....

Security Crossword Craziness 2025-06-11

Security Crossword Craziness crossword puzzle
Across
  1. Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
  2. Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
  3. ___ your laptop securely when it is not under your direct control
  4. – report all lost devices to the ___
  5. Change of ___
  6. Do not use ___ accessories such as headsets and keyboards
  7. A marking used to show a document is originator controlled
  8. – Online sites that can put your personal information at risk
  9. A secure way to connect remotely to our network
  10. Key to entering secure areas
  11. Bag used to transport material RESTRICTED and above
Down
  1. What you should do when you step away from your laptop
  2. – A way to categorise information to protect it
  3. Pre-travel notification is required when travelling through a ___ country
  4. Fake emails to get you to click
  5. Encourages putting sensitive information away at the end of the day
  6. A person who gains access by pretending to belong
  7. Suspicious, ongoing, unusual or ___
  8. – access to official information is governed by your ___
  9. Do not disclose online that you hold a ___ ___ clearance
  10. Must be strong and never shared
  11. – Reporting these allow MFAT to identify and manage security risks
  12. - Work laptops, iPads, phones, and documents being more susceptible to theft or loss when working ___

23 Clues: Change of ___Key to entering secure areasFake emails to get you to clickMust be strong and never sharedSuspicious, ongoing, unusual or ___– report all lost devices to the ___– A way to categorise information to protect itA secure way to connect remotely to our networkA person who gains access by pretending to belong...

Aviation Security & Safety 2025-06-13

Aviation Security & Safety crossword puzzle
Across
  1. Suitcases and bags you take with you when travelling
  2. Any potential risk to aviation safety, including unauthorized access over secutiry borders
  3. The key to sharing information clearly, whether in aviation or daily life
  4. A place where passengers check in, board flights, and retrieve luggage
  5. The hub where passengers arrive, depart, and connect in the skies
  6. The heart of hospitality in aviation, ensuring passengers needs are met with care and efficiency
  7. Someone who travels by plane, train or car but doesn't operate the vehicle
  8. The public area of an airport, accessible to the public
  9. Where passports are checked before passengers cross international borders
Down
  1. A type of flight that keeps you within your home country's borders
  2. Where passengers luggage and belongings are checked before entering or departing a country
  3. Planes need this long, clear path to lift off or touch down safely
  4. A type of flight that takes you beyond your home country's borders
  5. The invisible line separating nations, often requiring passports and security checks to cross
  6. A protective shelter where aircraft rest, get maintained and prepare for the next flight
  7. The secured part of an airport you reach when clearing security and boarding begins
  8. The process of inspecting passengers, luggage and cargo to detect prohibited or dangerous items
  9. Controlling who can enter restricted airport zones to prevent unauthorized personnel from reaching sensitive areas
  10. A situation requiring immediate attention, often triggering special airport procedures
  11. The top priority in aviation, guiding procedures to protect passengers and crew

20 Clues: Suitcases and bags you take with you when travellingThe public area of an airport, accessible to the publicThe hub where passengers arrive, depart, and connect in the skiesA type of flight that keeps you within your home country's bordersPlanes need this long, clear path to lift off or touch down safely...

Security Awareness Training 2025-07-23

Security Awareness Training crossword puzzle
Across
  1. Fined for transferring user data to China
  2. Phishing method that uses text messages
  3. Passwords should be at least this many characters long
  4. Former Yahoo scientist accused of stealing proprietary code
  5. AI-generated phishing that’s dynamic and hard to detect
  6. Your code, docs, and slides are this type of asset
  7. Company breached over Memorial Day weekend in 2025
  8. What you should do immediately if something goes wrong
  9. Browser-based password manager you should avoid
  10. Secure method that requires two steps to log in
Down
  1. Files should be saved here, not on your desktop
  2. Phishing that uses voice calls
  3. What hackers exploited at Co-op in May 2025
  4. QR code-based phishing
  5. Secure password manager employees should use
  6. One login, many tools — safer, faster, smarter
  7. Adidas breach was caused by this third party
  8. Must never be uploaded into public AI tools
  9. Exposed data for 6 years due to a misconfigured Google Drive
  10. Human factor responsible for 74% of breaches

20 Clues: QR code-based phishingPhishing that uses voice callsPhishing method that uses text messagesFined for transferring user data to ChinaWhat hackers exploited at Co-op in May 2025Must never be uploaded into public AI toolsSecure password manager employees should useAdidas breach was caused by this third partyHuman factor responsible for 74% of breaches...

security crossword puzzle 2022-12-02

security crossword puzzle crossword puzzle
Across
  1. a set of of software tools used by an attack to hide the actions or presence of other types of malicious software
  2. Software that scans the computer as well as any new documents for viruses
  3. a malicious program designed to enter a computer via a network to take advantage of vulnerability in an application or an operating system
  4. a logical computer network of zombies under the control of an attacker
  5. malware that can trigger arbitrary code execution from one computer to a second computer over a etwork or the internet
  6. a separate program or feature incorporated within a browser that stops popup advertisement from appearing
  7. an infected computer that is under the remote control of an attacker
  8. Hardware or software that limits the spread of malware
  9. software that is a cumulative package of all patches and features updates
Down
  1. software code that allows one incirconventing normal security measures
  2. a database of viruses that is used to identify an infected file
  3. Software that helps prevent computers from being infected by spyware
  4. Malware that prevents a users device from working properly until a fee is paid
  5. an attacker who controls a botnet
  6. enhancements to the software to provide new or expanded functionality, but do not address security vulnerability
  7. an executable program that is advertised as performing one activity but actually performs a malicious activity
  8. a general term used to describe software that spies on users by gathering information without consent
  9. Computer code that lies dormant until triggered by a specific logical event
  10. software of a hardware device that captures and stores each keystroke that a user types on the computers keyboard
  11. a public release software security update intended to repair a vulnerability

20 Clues: an attacker who controls a botnetHardware or software that limits the spread of malwarea database of viruses that is used to identify an infected fileSoftware that helps prevent computers from being infected by spywarean infected computer that is under the remote control of an attacker...

Friendship & Cyber Friends 2022-11-01

Friendship & Cyber Friends crossword puzzle
Across
  1. sammen
  2. et venskab
  3. at dele
  4. en konto
  5. et skænderi
  6. en opdatering
  7. en ven
  8. mobning
  9. vigtigt
Down
  1. at såre
  2. en tanke
  3. et forhold
  4. en besked
  5. en hemmelighed
  6. en interesse
  7. en bølle
  8. en kammerat
  9. en følelse

18 Clues: sammenen venat såreat delemobningvigtigten tankeen kontoen bølleen beskedet forholdet venskaben følelseen kammeratet skænderien interesseen opdateringen hemmelighed

Amped Up 2025-11-18

Amped Up crossword puzzle
Across
  1. Deville or Deluxe?
  2. variations include "cyber"
  3. Echo, echo echo...
  4. Shaky amp geared towards lower frequencies
  5. Tweed or Pro?
  6. Now in the LTX model
Down
  1. 1995 retro design
  2. 10 watt, great for beginners
  3. The rebranding of the "Dual Professional"
  4. 1948 low power studio staple
  5. Ivy League
  6. Evolution of the "Woodie"
  7. Early 50s amp designed by Freddie Tavares

13 Clues: Ivy LeagueTweed or Pro?1995 retro designDeville or Deluxe?Echo, echo echo...Now in the LTX modelEvolution of the "Woodie"variations include "cyber"10 watt, great for beginners1948 low power studio stapleThe rebranding of the "Dual Professional"Early 50s amp designed by Freddie TavaresShaky amp geared towards lower frequencies

CWiCS Breaches of 2020 2021-02-11

CWiCS Breaches of 2020 crossword puzzle
Across
  1. This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
  2. Malicious code was sneaked into updates to this SolarWinds software
  3. The telecom service provider became the victim of a Magecart card-skimming attack.
  4. International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
  5. this based cyber attacks rose 630% between January and April 2020
  6. This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
  7. this Milpitas, Calif.-based platform security vendor had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
  8. The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
  9. Such attacks target executives across manufacturing, finance, government, and tech with the goal of obtaining sensitive info
  10. Malware designed to steal sensitive information stored on an infected device.
  11. Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
  12. Allows attackers to execute scripts in the victim’s browser which can hijack user sessions
  13. Hackers are now using this Google service to bypass web security and steal credit cards
  14. Hackers hit Nebraska Medical Center with --------- and stole patient data
  15. This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
  16. In April 2020, Google blocked 18 million daily malware and phishing emails related to _______
  17. Since This , the US FBI reported a 300% increase in reported cybercrimes
Down
  1. hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
  2. LodaRAT Windows Malware Now Also Targets ______ Devices
  3. Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
  4. A _______ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
  5. Top 10 from ___ is the most effective first step towards changing the software development culture within your org
  6. This Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
  7. This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
  8. Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
  9. Indian WAF vendor Indusface's this app offers protection to online businesses during corona virus outbreak
  10. Hackers target Microsoft Windows machines running which servers to deploy backdoors and other kinds of malware
  11. A dedicated, global Cisco team that manages the receipt, investigation, and public reporting of security vulnerabilities
  12. A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
  13. Trojan functioning as a downloader or dropper of other malwares
  14. Attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization

31 Clues: LodaRAT Windows Malware Now Also Targets ______ DevicesTrojan functioning as a downloader or dropper of other malwaresthis based cyber attacks rose 630% between January and April 2020Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation BugMalicious code was sneaked into updates to this SolarWinds software...

CWiCS Breaches of 2020 2021-02-16

CWiCS Breaches of 2020 crossword puzzle
Across
  1. This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
  2. Malicious code was sneaked into updates to this SolarWinds software
  3. The telecom service provider became the victim of a Magecart card-skimming attack.
  4. International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
  5. This based cyber attacks rose 630% between January and April 2020
  6. This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
  7. This Milpitas, Calif.-based platform security vendor had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
  8. The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
  9. Such attacks target executives across manufacturing, finance, government, and tech with the goal of obtaining sensitive info
  10. Malware designed to steal sensitive information stored on an infected device.
  11. Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
  12. Allows attackers to execute scripts in the victim’s browser which can hijack user sessions
  13. Hackers are now using this Google service to bypass web security and steal credit cards
  14. Hackers hit Nebraska Medical Center with --------- and stole patient data
  15. This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
  16. In April 2020, Google blocked 18 million daily malware and phishing emails related to _______
  17. Since This , the US FBI reported a 300% increase in reported cybercrimes
Down
  1. Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
  2. LodaRAT Windows Malware Now Also Targets ______ Devices
  3. Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
  4. A _______ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
  5. Top 10 from ___ is the most effective first step towards changing the software development culture within your org
  6. This Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
  7. This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
  8. Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
  9. Indian WAF vendor Indusface's this app offers protection to online businesses during corona virus outbreak
  10. Hackers target Microsoft Windows machines running which servers to deploy backdoors and other kinds of malware
  11. A dedicated, global Cisco team that manages the receipt, investigation, and public reporting of security vulnerabilities
  12. A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
  13. Trojan functioning as a downloader or dropper of other malwares
  14. Attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization

31 Clues: LodaRAT Windows Malware Now Also Targets ______ DevicesTrojan functioning as a downloader or dropper of other malwaresThis based cyber attacks rose 630% between January and April 2020Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation BugMalicious code was sneaked into updates to this SolarWinds software...

February Hotel Hero 2025-02-27

February Hotel Hero crossword puzzle
Across
  1. Taylor - In Room Dining
  2. De Loera - Security
  3. Thomas - Reservations
  4. Patino - Culinary
  5. Schindler - Restaurant
  6. Fernandez - Restaurant
  7. Atkinson - Technology Innovation & Data
  8. Dubois - In Room Dining
Down
  1. Regalado Lopez - Security
  2. Aceves Mancilla - In Room Dining
  3. Tingle - Spa
  4. Nevarez - Culinary
  5. Anquetil - Housekeeping
  6. Baxter - Pastry
  7. Reyes - Housekeeping

15 Clues: Tingle - SpaBaxter - PastryPatino - CulinaryNevarez - CulinaryDe Loera - SecurityReyes - HousekeepingThomas - ReservationsSchindler - RestaurantFernandez - RestaurantTaylor - In Room DiningAnquetil - HousekeepingDubois - In Room DiningRegalado Lopez - SecurityAceves Mancilla - In Room DiningAtkinson - Technology Innovation & Data

Security Crossword Puzzle 2025-06-26

Security Crossword Puzzle crossword puzzle
Across
  1. When classified information mistakenly ends up on an unsecured system.
  2. Everyone, cleared and uncleared, is responsible for ________ classified information.
  3. Sharing classified information with uncleared persons is called ________ disclosure.
  4. Reporting _________ information to security is a requirement for all employees.
  5. The document located on the FSO page where you can locate all security policies and procedures (Abbr.).
  6. To access classified information, you must first have a favorable _____________ determination at the appropriate level.
Down
  1. Security risk that comes from within the organization.
  2. Before you embark on any ________ travel, you must complete a pre-briefing in Sign-In Compliance.
  3. The person in charge of a company's security program.
  4. How often every employee must complete their required security trainings.
  5. Only those with eligibility AND need-to-know can _______ classified information.
  6. Not a classification, but a designation.

12 Clues: Not a classification, but a designation.The person in charge of a company's security program.Security risk that comes from within the organization.When classified information mistakenly ends up on an unsecured system.How often every employee must complete their required security trainings....

Win an iPad mini from SIX Financial Information! 2013-05-09

Win an iPad mini from SIX Financial Information! crossword puzzle
Across
  1. US regulation to combat offshore tax evasion
  2. European tax on interest income
  3. How many millions of securities in SIX Financial’s DB?
  4. FACTA report and revenue collector
  5. How many global security ID schemes cross-referenced by SIX
  6. Managing Director of SIX Financial Information USA
  7. Requirement for FATCA compliance: Fund ___________
  8. Nothing is certain but death and ________ (Benjamin Franklin)
  9. Adherence to regulations
  10. "Legal Entity _____________"
  11. Fund look through required for this regulation
Down
  1. Market transparency directive dating to 2004
  2. No. times SIX named "Best Corp. Actions Data Provider"
  3. Type of data describing a security or an issuer
  4. First country to introduce a financial transaction tax
  5. Swiss tax treaty with UK & Austria, "Final __________ Tax"
  6. Provider of robust tax & compliance data
  7. Set of directives allowing cross-border fund sales in the EU
  8. How many decades SIX has been in business?
  9. Swiss national security ID number
  10. Second country to introduce a financial transaction tax

21 Clues: Adherence to regulations"Legal Entity _____________"European tax on interest incomeSwiss national security ID numberFACTA report and revenue collectorProvider of robust tax & compliance dataHow many decades SIX has been in business?Market transparency directive dating to 2004US regulation to combat offshore tax evasion...

bullying 2023-03-21

bullying crossword puzzle
Across
  1. speaking
  2. online
  3. a type of physical
  4. repeated teasing
  5. to do with friends
  6. contact
Down
  1. a type of psychological
  2. to do with the brain

8 Clues: onlinecontactspeakingrepeated teasinga type of physicalto do with friendsto do with the braina type of psychological

Cyber Quiz 2021-08-30

Cyber Quiz crossword puzzle
Across
  1. assortment of PCs with enormous capacity abilities that distantly serve demands.
  2. Any endeavor to disregard the security border of a consistent climate
  3. The action of breaking down and additionally looking through information to discover things of importance, importance or worth.
  4. - communicated as series of the digits 0 and 1
  5. A stack of info sent from a site to an internet browser that records a client's action on that site.
Down
  1. Equipment and additionally programming intended to keep unapproved clients from getting to a PC framework.
  2. the change of text, pictures, or sound into a computerized structure that can be prepared by a PC
  3. A strategically or philosophically propelled digital assault or hack.
  4. The second a programmer effectively takes advantage of a weakness in a PC or gadget, and accesses its records and organization.
  5. An online diary. Constriction of the term web log.
  6. Making a copy duplicate of information onto a different actual stockpiling gadget or on the web/distributed storage arrangement

11 Clues: - communicated as series of the digits 0 and 1An online diary. Constriction of the term web log.A strategically or philosophically propelled digital assault or hack.Any endeavor to disregard the security border of a consistent climateassortment of PCs with enormous capacity abilities that distantly serve demands....

Cyber Crossword 2021-09-05

Cyber Crossword crossword puzzle
Across
  1. “the adoption or increase in use of digital or computer technology by an organization, industry, country.
  2. a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide.
  3. a paperless method of sending messages, notes or letters from one person to another or even many people at the same time via Internet.
  4. action or process of digitizing or conversion of analogue data in digital form.
  5. an integrated service of electronic applications needed for any kind of healthcare function.
Down
  1. validates contracts entered into electronically, and validates electronic signatures.
  2. virtual network of websites connected by hyperlinks.
  3. This in Cyber space is a focal point for two opposing schools of thought, the Cyberlibertarians and the Cyber-paternalists.
  4. an Internet utility software used touploaded and download files.
  5. a type of Network Bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure.
  6. the first paying method from partner to partner,which does not have any mediator and obtains its power from the users.

11 Clues: virtual network of websites connected by hyperlinks.an Internet utility software used touploaded and download files.action or process of digitizing or conversion of analogue data in digital form.validates contracts entered into electronically, and validates electronic signatures....

Cyber Safety 2022-09-26

Cyber Safety crossword puzzle
Across
  1. putting something online
  2. content that only trusted people can see
  3. who you are
  4. your contact number
  5. where you live
  6. Apps like Facebook and TikTok
Down
  1. content that everyone can see
  2. people who see your posts
  3. what you think about something
  4. telling others not to give up
  5. organisation that cares for money

11 Clues: who you arewhere you liveyour contact numberputting something onlinepeople who see your postscontent that everyone can seetelling others not to give upApps like Facebook and TikTokwhat you think about somethingorganisation that cares for moneycontent that only trusted people can see

CYBER BULLYING 2019-11-19

CYBER BULLYING crossword puzzle
Across
  1. A ELECTRONIC THAT TENNAGERS HAVE
  2. little KIDS HAS THIS ELETRONIC
  3. presedent DONALD TRUMP HAS A ACCOUNT ON THIS APP
  4. adults HAVE THIS APP
  5. you CAN SNAP PITHURES
  6. GETS BULLIED ON THE INTERNET
Down
  1. THIS IS WHAT GETS BULLIED
  2. its A MOTHER BOARD OF APPS
  3. HAS A KEYBORD
  4. MEAN TO DO
  5. TO PUT SOMETHING ON THE INTERNET

11 Clues: MEAN TO DOHAS A KEYBORDadults HAVE THIS APPyou CAN SNAP PITHURESTHIS IS WHAT GETS BULLIEDits A MOTHER BOARD OF APPSGETS BULLIED ON THE INTERNETlittle KIDS HAS THIS ELETRONICA ELECTRONIC THAT TENNAGERS HAVETO PUT SOMETHING ON THE INTERNETpresedent DONALD TRUMP HAS A ACCOUNT ON THIS APP

Cyber-bullying 2020-11-20

Cyber-bullying crossword puzzle
Across
  1. photo editor
  2. an app where you can post images
  3. the effect on someone
  4. people who comment hateful messages
  5. an image you take off of the device your on
  6. the act of someone or yourself acting like someone else
Down
  1. the act of being bullied online
  2. a funny photo with a caption
  3. a social platform where you can post images and text
  4. online platform where you make videos with dances
  5. a symbol and a title

11 Clues: photo editora symbol and a titlethe effect on someonea funny photo with a captionthe act of being bullied onlinean app where you can post imagespeople who comment hateful messagesan image you take off of the device your ononline platform where you make videos with dancesa social platform where you can post images and text...

Cyber Love 2022-12-14

Cyber Love crossword puzzle
Across
  1. private
  2. personal information
  3. feelings
  4. opportunity
  5. at last
Down
  1. same interests
  2. to stop
  3. in fact really
  4. internet
  5. I think
  6. to talk

11 Clues: to stopprivateI thinkto talkat lastinternetfeelingsopportunitysame interestsin fact reallypersonal information

Cyber Safety 2025-02-05

Cyber Safety crossword puzzle
Across
  1. Stop
  2. Divide
  3. Appear
  4. Press a button on the mouse
  5. Security
  6. Complain
Down
  1. Power down
  2. Support button
  3. Have a high opinion of someone
  4. Unwanted presence of someone online
  5. Believe

11 Clues: StopDivideAppearBelieveSecurityComplainPower downSupport buttonPress a button on the mouseHave a high opinion of someoneUnwanted presence of someone online

Cyber Crossword 2025-06-11

Cyber Crossword crossword puzzle
Across
  1. A secret way for hackers to get access
  2. Restarting a computer
  3. A virus that is named for a Greek god
  4. An operating system. Or something you look out of.
  5. A half-person half-computer
  6. Someone who hacks
Down
  1. Malware that gives hackers access to root access
  2. A purple friend
  3. A way of tricking someone into giving access
  4. Make a message into a weird code
  5. Turn a weird code back into a message

11 Clues: A purple friendSomeone who hacksRestarting a computerA half-person half-computerMake a message into a weird codeA virus that is named for a Greek godTurn a weird code back into a messageA secret way for hackers to get accessA way of tricking someone into giving accessMalware that gives hackers access to root access...

Health Informatics 2024-02-19

Health Informatics crossword puzzle
Across
  1. the ability of different systems and devices to work together and exchange data effectively
  2. the process of identifying, assessing, and mitigating potential risks to the confidentiality, integrity, and availability of sensitive information
  3. a security system that controls access to a network or system by blocking unauthorized traffic.
  4. a comprehensive clinical terminology used for coding and indexing of health information
  5. the use of computer algorithms to perform tasks that normally require human intelligence, such as decision-making or pattern recognition.
  6. a digital record of a patient's health information that they can access and update themselves
  7. the act of adhering to laws, regulations, and standards related to information security and privacy.
  8. the use of technology to provide healthcare services remotely such as through video calls or online
Down
  1. a digital version of a patient's medical history and treatment information within one healthcare organization.
  2. the unauthorized access or release of sensitive information.
  3. the process of identifying and evaluating potential risks to the security and confidentiality of Information.
  4. the use of technology to manage and analyze health-related data and processes
  5. a standard for information security management systems (ISMS)
  6. the use of mobile devices and technology to support health and healthcare.
  7. the field of science that uses computational techniques to analyze and interpret biological data
  8. the process of managing who can access information and resources.
  9. the process of converting data into a code to protect it from unauthorized access
  10. the process of reviewing and evaluating information security and privacy practices to ensure compliance with laws, regulations, and standards.
  11. the study of how genetic information is modified by environmental factors
  12. a standard for identifying laboratory and other clinical observations

20 Clues: the unauthorized access or release of sensitive information.a standard for information security management systems (ISMS)the process of managing who can access information and resources.a standard for identifying laboratory and other clinical observationsthe study of how genetic information is modified by environmental factors...

SecureEdge 2023-05-22

SecureEdge crossword puzzle
Across
  1. SASE Network Edge
  2. CGF Management UI
  3. An on-prem or cloud-delivered network security service
  4. Barracuda’s VPN protocol
  5. By 2025, Gartner predicts ____ % of enterprises will adopt SASE solutions
  6. SecureEdge ____ runs on the Barracuda Cloud
  7. Simplified Cloud Management Portal
  8. An on-prem or cloud-based security policy enforcement point
  9. SecureEdge replaces this product
  10. Core function of CGF and SecureEdge
  11. Needed to connect to GCP
Down
  1. Coined by Gartner
  2. SecureEdge is a ____ replacement
  3. Half of SASE framework that provides cloud-based network services
  4. An expensive networking technology
  5. ____ provides a highly granular access mechanism to apps, data, services based on a user’s identity
  6. Campus SecureEdge Sales Specialist Course
  7. Enterprise grade firewall with SD-WAN
  8. Half of SASE framework the provides cloud-based network security services
  9. SecureEdge Hardware or Virtual appliance
  10. SecureEdge WorkRamp analogy for SASE
  11. Cloud-based firewall
  12. SecureEdge remote access client

23 Clues: Coined by GartnerSASE Network EdgeCGF Management UICloud-based firewallBarracuda’s VPN protocolNeeded to connect to GCPSecureEdge remote access clientSecureEdge is a ____ replacementSecureEdge replaces this productAn expensive networking technologySimplified Cloud Management PortalCore function of CGF and SecureEdge...

¿A dónde vas a viajar? list 1 Sp 2 2025-05-08

¿A dónde vas a viajar? list 1 Sp 2 crossword puzzle
Across
  1. ticket 1
  2. suitcase
  3. seatbelt/security belt
  4. ticket 2
  5. to pack a suitcase
  6. layover
  7. to take a trip
  8. to board
  9. platform
  10. baggage claim
  11. plane
  12. airport
  13. to be delayed
  14. train station
  15. customs
  16. to fly
  17. ticket counter (airport)
  18. to camp, to go camping
  19. arrival
  20. to take off
  21. to stay
  22. passport
  23. to be on vacation
  24. to make plans
  25. carry-on luggage
  26. gate
Down
  1. flight
  2. ticket booth (train station)
  3. to travel
  4. to lose; to miss
  5. departure
  6. to check luggage
  7. stop
  8. security agent (TSA)
  9. luggage
  10. conductor/controller
  11. passenger
  12. flight attendant
  13. sleeping car
  14. boarding pass
  15. to be on time
  16. to wait (for); to hope
  17. to go through security
  18. to land (plane)
  19. in the airport
  20. seat

46 Clues: stopseatgateplaneflightto flylayoverluggageairportcustomsarrivalto stayticket 1suitcaseticket 2to boardplatformpassportto traveldeparturepassengerto take offsleeping carbaggage claimto be delayedtrain stationboarding passto be on timeto make plansto take a tripin the airportto land (plane)to lose; to missto check luggageflight attendant...

Code CrossWord 2016-02-08

Code CrossWord crossword puzzle
Across
  1. bully a bully over online
  2. a logic gate
  3. to identify or remove errors
  4. a command
  5. a file of information
  6. a programming
  7. getting mail from a computer
  8. a virus on a computer
Down
  1. when you dont receive messages from that person
  2. literacy process of teaching and learning and using technology
  3. a system
  4. health and wellness physical and psychological well-being in a digital technology world
  5. a error

13 Clues: a errora systema commanda logic gatea programminga file of informationa virus on a computerbully a bully over onlineto identify or remove errorsgetting mail from a computerwhen you dont receive messages from that personliteracy process of teaching and learning and using technology...

SN33003FP Chapter 7 2024-07-06

SN33003FP Chapter 7 crossword puzzle
Across
  1. Secure privileged accounts, configure password policies and lockout policies and enable logs to record all events
  2. Protects data by transforming it using a complicated algorithm to make it unreadable
  3. Include measurements of the face, fingerprint, hand geometry, iris, retina, signature, and voice
  4. Hardware/software that enforces network security policies by filtering unauthorized or potentially dangerous traffic
  5. Uses Message Integrity Check (MIC) to detect if an attacker had altered the data and Temporal Key Integrity Protocol (TKIP) to better handle, protect and change encryption keys
  6. Any wireless device can connect to the wireless network and is used where security is of no concern
  7. Equipment uses networks (e.g. internet) to make / receive phone calls
  8. Consists of permissions that limit folder or file access for an individual or for a group of users
  9. Users should be limited to only the resources they need
  10. Fends off problems posed by rogue access points and requires two-way authentication
  11. Freezes hard drive partitions, reverting a system to its preset state upon restart
  12. Allows an individual to gain access to an area with automated entry points using various technologies
  13. Uses Advanced Encryption Standard (AES) for even better key management and encryption protection
  14. Control access to an organization's sensitive areas
  15. Manufacturers combine patches and upgrades into a service pack to mitigate attacks
Down
  1. Automatically logs the user out and locks the screen after a specified period
  2. Private network that connects remote sites or users together over a public network, like the Internet
  3. Copies the contents of a computer's hard disk to an image file
  4. Video and electronic surveillance supplement or in some cases, replace security guards
  5. Enhances default security, removes unnecessary programs, applies patches, systematically updates, and identifies vulnerabilities
  6. Power protection controls, HVAC systems, and hardware monitoring systems
  7. One of the first widely used Wi-Fi security standards that suffered from numerous security weaknesses
  8. Uses satellites and computers to determine the location of a device
  9. A dedicated site that monitors, assesses, and defends the organization's information systems
  10. One or more locations containing the tools that provide administrators with a detailed status of the organization's network
  11. Antivirus protection, adware protection, phishing protection, spyware protection
  12. A program that allows or denies traffic between the computer and other connected computers
  13. Provides mechanisms to authenticate and encrypt data between a wireless client and wireless router

28 Clues: Control access to an organization's sensitive areasUsers should be limited to only the resources they needCopies the contents of a computer's hard disk to an image fileUses satellites and computers to determine the location of a deviceEquipment uses networks (e.g. internet) to make / receive phone calls...

SMS des Schreckens 2017-12-21

SMS des Schreckens crossword puzzle
Across
  1. Wichtigstes Utensil für viele Jugendliche
  2. Name einer Online Beratung bei Mobbing
  3. Was wurde bei der Kaffeejause gegessen
  4. Hauptperson
  5. Lieblingsspeise Julias
Down
  1. Absichtliches Beleidigen im Internet oder über das Handy
  2. Vorname der Autorin
  3. Spitzname von Julias Geographielehrerin
  4. Abkürzung für Short Message Sending
  5. Bruder von Emma
  6. SMS Kürzel für See you
  7. Name von Julias zukünftigen Stiefvater
  8. Julias beste Freundin

13 Clues: HauptpersonBruder von EmmaVorname der AutorinJulias beste FreundinSMS Kürzel für See youLieblingsspeise JuliasAbkürzung für Short Message SendingName einer Online Beratung bei MobbingWas wurde bei der Kaffeejause gegessenName von Julias zukünftigen StiefvaterSpitzname von Julias GeographielehrerinWichtigstes Utensil für viele Jugendliche...

IT, technology, computers 2023-06-10

IT, technology, computers crossword puzzle
Across
  1. : Wireless network technology
  2. : Unauthorized access to systems
  3. : A tiny element of an image
  4. : Central processing unit
  5. : A computer that provides services
  6. : Device for internet connection
  7. : Network device for internet connection
  8. : Software for web browsing
Down
  1. : An open-source operating system
  2. : Online storage and computing
  3. : Relating to computers and the internet
  4. : A programming language
  5. : Instructions for computers
  6. : Random access memory
  7. : A unit of digital information
  8. : A computer input device

16 Clues: : Random access memory: A programming language: Central processing unit: A computer input device: Software for web browsing: A tiny element of an image: Instructions for computers: Wireless network technology: Online storage and computing: A unit of digital information: Unauthorized access to systems: Device for internet connection...

Puzzle #15 – “Social Security Fraud” 2025-06-29

Puzzle #15 – “Social Security Fraud” crossword puzzle
Across
  1. - Illegal use or abuse of Social Security information
  2. - Never give out your Social Security ______ over the phone
  3. - Email tactic scammers use to steal info
  4. - Scammers often use this to trick people
  5. - What you must do to your Social Security information
Down
  1. - Type of theft involving stolen personal information
  2. - Type of program scammers try to exploit
  3. - What you should do if you suspect fraud
  4. - A common scheme to steal your Social Security number
  5. - Agency that investigates Social Security fraud

10 Clues: - Type of program scammers try to exploit- What you should do if you suspect fraud- Email tactic scammers use to steal info- Scammers often use this to trick people- Agency that investigates Social Security fraud- Type of theft involving stolen personal information- Illegal use or abuse of Social Security information...

Quarta Rivoluzione industriale 2024-02-05

Quarta Rivoluzione industriale crossword puzzle
Across
  1. ne saranno capaci Le macchine
  2. Sono sistemi di produzione
  3. come sono le macchine
  4. Industrial
  5. Sono state create…intelligenti
Down
  1. rende più…il lavoro
  2. Bisogna dare attenzione
  3. aumento dell’uso
  4. contiene 4 elementi chiave

9 Clues: Industrialaumento dell’usorende più…il lavorocome sono le macchineBisogna dare attenzionecontiene 4 elementi chiaveSono sistemi di produzionene saranno capaci Le macchineSono state create…intelligenti

Quarta Rivoluzione industriale 2024-02-05

Quarta Rivoluzione industriale crossword puzzle
Across
  1. Sono sistemi di produzione
  2. ne saranno capaci Le macchine
  3. come sono le macchine
  4. aumento dell’uso
  5. contiene 4 elementi chiave
Down
  1. Bisogna dare attenzione
  2. Industrial
  3. Sono state create…intelligenti
  4. rende più…il lavoro

9 Clues: Industrialaumento dell’usorende più…il lavorocome sono le macchineBisogna dare attenzioneSono sistemi di produzionecontiene 4 elementi chiavene saranno capaci Le macchineSono state create…intelligenti

Social Security & Markets 2020-12-05

Social Security & Markets crossword puzzle
Across
  1. These enrollees must provide evidence of insurability if they enter the group plan after the open enrollment period.
  2. The acronym for the amount of monthly payment one receives once Social Security Benefits are activated and calculated by a formula into this amount.
  3. This type of ownership occurs when the applicant purchases a policy on the insured who is not themselves
  4. This type of plan is used when business partners purchase life insurance on one another so that in the event of one of their death the other business partner can purchase the shares of the deceased business partner.
  5. These groups are formed for a purpose other than to purchase insurance.
  6. The number of credits required to be considered eligible for the maximum amount of social security benefits.
  7. the minimum number of credits to qualify for disability insurance
  8. This is also is referred to as the minimum amount necessary to qualify for disability insurance.
  9. This type of group plan requires that 100% of eligible participants must participate and all premiums are paid by the employer.
  10. this is the number of credits a working individual receives for every year of work towards their social security
  11. Each group policy participant receives this as their proof of being part of the plan.
  12. Current full retirement age.
  13. The surviving spouse may continue to receive benefits until the youngest child reaches this age.
Down
  1. An individual who has succesfully received all of the credits necessary to receive the maximum amount of social security benefits.
  2. This plan is used so that the business can purchase life insurance on the partners and buy back the shares from the deceased partners' estate or family.
  3. This policy controls the group life insurance plan and must have the producers information and signature.
  4. almost every group life insurance policy is written as this type of insurance.
  5. The original name for social security
  6. The number of years required to work in order to qualify for the maximum benefit amount for social security benefits.
  7. This type of group plan requires that 75% of eligible participants must participate and some premiums are paid by the employer.
  8. This type of policy is purchased in order to protect the company from loss of an employee that is integral to the business.
  9. The minimum age at which someone could begin to receive social security benefits but would permanently reduce the benefits received.

22 Clues: Current full retirement age.The original name for social securitythe minimum number of credits to qualify for disability insuranceThese groups are formed for a purpose other than to purchase insurance.almost every group life insurance policy is written as this type of insurance....

Zajedno za bolji internet 2023-03-01

Zajedno za bolji internet crossword puzzle
Across
  1. male datoteke
  2. prividna stvranost nastala pomoću računala
  3. nosimo ih kao dan borbe protiv nasilja
  4. podatci koje ostavljamo na internetu
  5. nasilničko ponašanje
  6. namjerno ih ostavljamo na internetu
  7. neželjna pošta
  8. skup znakova koji imaju neko značenje
Down
  1. bez namjere ih ostavljamo na internetu
  2. govorenje nečeg ljepog nekoj osobi
  3. naslije preko interneta
  4. vrijeđanje druge osobe
  5. zbirka elektroničkih dokaza
  6. mogućnost slanja poruka putem interneta
  7. vrijeđanje osoba putem tehnologije

15 Clues: male datotekeneželjna poštanasilničko ponašanjevrijeđanje druge osobenaslije preko internetazbirka elektroničkih dokazagovorenje nečeg ljepog nekoj osobivrijeđanje osoba putem tehnologijenamjerno ih ostavljamo na internetupodatci koje ostavljamo na internetuskup znakova koji imaju neko značenjebez namjere ih ostavljamo na internetu...

Cyber 2022-11-16

Cyber crossword puzzle
Across
  1. are in place
  2. must be classified
  3. how it works
  4. are faced daily
Down
  1. work together
  2. must be followed
  3. is a must

7 Clues: is a mustare in placehow it workswork togetherare faced dailymust be followedmust be classified

DOMESTIC & INTERNATIONAL AIRPORTS ASH 2017-09-11

DOMESTIC & INTERNATIONAL AIRPORTS ASH crossword puzzle
Across
  1. A AREA WHERE YOU GO THROUGH SECURITY
  2. RUNWAYS
  3. A AREA BEFORE DEPARTING PASSENGERS
  4. A PLACE TO SELL AND BUY FOREIGN CURRENCY FOUND ON BOTH AIRSIDE AND LANDSIDE
  5. A WORD YOU SHOULD NOT USE IN AIRPORT AREA
  6. LUGGAGE STORAGE AREA
  7. THREE LETTER CODE FOR TAURANGA
  8. MANY AIRPORTS OFFER BOTH SHORT AND LONG TERM____
  9. NEED TO SHOW ______ AT THE PASSPORT CONTROL
Down
  1. THREE LETTER CODE FOR TIMARU
  2. AIRPORT OPERATES
  3. A MACHINE IN WHICH A CONVEYER BELTS MOVES THE ITEMS THROUGH THE MACHINE
  4. A AREA WHICH BAGS MUST NEVER BE LEFT UNATTENDED
  5. WHO HANDLE_____FOR A NUMBER OF AIRLINES
  6. A PLACE FOR PURCHASING GOODS ON AIRSIDE
  7. LIQUIDS, AEROSOLS AND GELS ARE KEPT INSIDE IT
  8. BEFORE GOING TO AIRSIDE YOU MUST PASS____
  9. A FAST FOOD RESTAURANT FOUND ON THE AIRSIDE OF THE AIRPORT
  10. AVIATION SECURITY
  11. A AIRPORT THAT HAS 15 MILLION PASSENGERS

20 Clues: RUNWAYSAIRPORT OPERATESAVIATION SECURITYLUGGAGE STORAGE AREATHREE LETTER CODE FOR TIMARUTHREE LETTER CODE FOR TAURANGAA AREA BEFORE DEPARTING PASSENGERSA AREA WHERE YOU GO THROUGH SECURITYWHO HANDLE_____FOR A NUMBER OF AIRLINESA PLACE FOR PURCHASING GOODS ON AIRSIDEA AIRPORT THAT HAS 15 MILLION PASSENGERSBEFORE GOING TO AIRSIDE YOU MUST PASS____...

CTF-CW-2S 2025-11-17

CTF-CW-2S crossword puzzle
Across
  1. Legal basis requiring explicit permission for data processing
  2. Special rights or access levels in a system
  3. Offensive security and threat-simulation platform at Tekion.
  4. Privacy principle restricting how long personal data can be kept
  5. Copying data for recovery after loss
  6. AI-powered platform at Tekion that finds and fixes app code vulnerabilities.
  7. Sequence of actions to achieve an outcome
  8. Tactics, Techniques, and Procedures acronym
  9. Self-replicating malware spreading through networks
Down
  1. Unplanned event threatening data or operations
  2. A company you hire to run your security monitoring remotely
  3. Verifying identity to access a system
  4. Canada's Personal Information Protection and Electronic Documents Act
  5. Recovery strategy for a detected issue
  6. Combining individual data points into statistical summaries to protect privacy
  7. Document tracking known risks
  8. Runtime application security platform deployed at Tekion.
  9. Bringing operations back after an incident
  10. International standards-setting organization
  11. Data Loss Prevention: protecting info from leaving the network

20 Clues: Document tracking known risksCopying data for recovery after lossVerifying identity to access a systemRecovery strategy for a detected issueSequence of actions to achieve an outcomeBringing operations back after an incidentSpecial rights or access levels in a systemTactics, Techniques, and Procedures acronym...

Time and Space 2025-03-16

Time and Space crossword puzzle
Across
  1. The 1859 solar storm, which inspired "Cyber Cocoon," is known as what event?
  2. Which NASA mission was named after a Greek goddess?
  3. "Beyond the Light" includes a 26-minute cinematic experience divided into how many scenes?
  4. What is the primary tool used to study space, as highlighted in the exhibition?
  5. Jewel Box Sun" showcases the Sun in how many different wavelengths?
  6. What is the name of the art and technology studio that created "Beyond the Light"?
  7. Which Mars rover, represented in "Mars Rovers’ Dreams," was described as having a personality combining whimsy, wonder, and grit?
  8. Which space telescope’s discoveries are featured in "Beyond the Light"?
Down
  1. What type of orbit will Artemis missions use to help astronauts reach the Moon’s South Pole?
  2. What type of propulsion does the Artemis mission use for inclination control thrusters?
  3. The "Cyber Cocoon" installation explores the potential effects of which type of solar event?
  4. Which scientific institute curates the images from the James Webb Space Telescope?
  5. "Nature’s Pulse" visualizes Earth’s health using how many transparent OLED screens?
  6. What celestial body is the focus of NASA’s Artemis mission?
  7. What space agency collaborated with ARTECHOUSE to create "Beyond the Light"?

15 Clues: Which NASA mission was named after a Greek goddess?What celestial body is the focus of NASA’s Artemis mission?Jewel Box Sun" showcases the Sun in how many different wavelengths?Which space telescope’s discoveries are featured in "Beyond the Light"?The 1859 solar storm, which inspired "Cyber Cocoon," is known as what event?...

RÕIVASTUSSTIILID 2022-12-28

RÕIVASTUSSTIILID crossword puzzle
Across
  1. LOOMAMUSTRID, LOODUSLIKUD VÄRVID
  2. ILUS HIRMUÄRATAVAKS, HIRMUÄRATAV ILUSAKS
  3. TAASKASUTUS
  4. VÄHEM ON ROHKEM
  5. LILLELAPSED, VABADUS, NATURAALSUS
Down
  1. EBALOOMULIK JA UNENÄOLINE
  2. SWEET, CYBER, GOTIC...
  3. KORRALIK JA HOOLISETUD

8 Clues: TAASKASUTUSVÄHEM ON ROHKEMSWEET, CYBER, GOTIC...KORRALIK JA HOOLISETUDEBALOOMULIK JA UNENÄOLINELOOMAMUSTRID, LOODUSLIKUD VÄRVIDLILLELAPSED, VABADUS, NATURAALSUSILUS HIRMUÄRATAVAKS, HIRMUÄRATAV ILUSAKS

2.4/2.5 2021-10-06

2.4/2.5 crossword puzzle
Across
  1. The greatest security threat to individuals or organisations. Often dangerous due to BYOD.
  2. Hoax websites can be created to steal information from an individual. Cookies also used to track activity.
  3. Information such as bank details or card details which could be stolen from an individual, organisation or the state.
  4. An organisations patents or designs which they would not want to be stolen.
  5. Funny videos from the past may have been funny back then but could jeopardize someones career prospects if found by employers.
Down
  1. An attack where a server is overloaded with requests and so refuses to process your request and you don't get the information. Typically a threat to organisations or websites.
  2. One of the most valuable things in the world, capable of providing great wealth or power to anyone who possesses it.
  3. Data can be stolen from Individuals, Organisations or The ____.
  4. Pieces of information that would allow a hacker to know information about an individuals name and address.
  5. Organisations could become vulnerable to _____ if information is stolen by someone who wants to gain leverage over the organisation.
  6. What could an organisation lose if they are a victim of a cyber attack. Customers may not trust them anymore.
  7. An organisations development plans may contain possible ____ with other organisations.

12 Clues: Data can be stolen from Individuals, Organisations or The ____.An organisations patents or designs which they would not want to be stolen.An organisations development plans may contain possible ____ with other organisations.The greatest security threat to individuals or organisations. Often dangerous due to BYOD....

Web Ethics & Security 2020-10-21

Web Ethics & Security crossword puzzle
Across
  1. The rights given to a person that created something of their own on their own.
  2. An individual who uses the internet to locate people, typically children to commit child sexual abuse.
  3. A type of program that uses a certain code which then is used to change the way that a computer operates.
  4. Stealing software that is legally protected. For example, copyright, modifying, and distributing.
  5. a scheme used to damage another individual by using email.
Down
  1. Using someone else's identity to gain benefits in their name.
  2. A type of program that copies itself that way it is able to spread onto other computers.
  3. The use of technology to bully someone over the internet. It is usually a mean message, or a threat.
  4. Creation, distribution, or forwarding of a message which contains sexually explicit materials through an electronic device.
  5. Number of internet connected devices, each of these are running one or possibly more bots.
  6. The act of a computer virus attaching itself to a virus
  7. The malicious activity a computer virus or worm is designed to do
  8. When A certain amount used permitted by Copyright.
  9. A device that provides security/safeguard from unauthorized people.
  10. this is a type of software that is usually used to damage other computers.
  11. A type of malware that misleads the person using the computer of its real intent.
  12. Taking someone else’s ideas, or work and saying that is it yours especially without permission.
  13. a large, frequently run program attached to the virus.
  14. The right given to somebody else from the creator in order to publish their work.
  15. Someone who uses computers to gain access to unauthorized data.

20 Clues: When A certain amount used permitted by Copyright.a large, frequently run program attached to the virus.The act of a computer virus attaching itself to a virusUsing someone else's identity to gain benefits in their name.Someone who uses computers to gain access to unauthorized data.The malicious activity a computer virus or worm is designed to do...

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. is a type of malware that self-replicates and distributes copies of itself in a computer network.
  2. refers to any crime that involves a computer and a network.
  3. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  4. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  5. involves gaining access to a computer or network with authorization from a company or organisation.
  6. This involves the illegal copying of information from the magnetic strip of a credit card.
  7. is sequences of instructions that make a computer program perform a specific task.
  8. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  9. is another type of malware that is activated each time a computer system boots (loads) up.
  10. also known as zombie is a group of computers connected together for malicious purposes.
  11. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
  12. is a software application that automatically displays advertising banners while the program is running.
  13. is malicious software designed to install itself on a computer without the owner’s knowledge.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  16. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  17. This involves gaining personal information through deception.
  18. is the conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  2. involves gaining access to a computer or network without authorization.
  3. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  4. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  5. is raw unorganized facts that need to be processed.
  6. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. The practice of recovering sensitive information from discarded material.
  9. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  10. is a secret way to access a computer without passing security mechanisms.
  11. is the processed output of data making it meaningful to the person who receives it.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.The practice of recovering sensitive information from discarded material....

Security Awareness Puzzle 2014-10-20

Security Awareness Puzzle crossword puzzle
Across
  1. These programs/devices can be used both for legitimate network
  2. of computer systems or networks.
  3. Before you throw something in the __________, ask yourself, "Is this something I
  4. An __________ use policy is a set of rules and guidelines that specify appropriate
  5. When somebody sends an email with a link to a bogus website it's called.
  6. A __________ stick, is a plug-and-play portable storage
  7. One thing you should never do with any of your passwords(3 words)
  8. You can share your alarm code with this many people at the facility
  9. All visitors must check in with _________ before they can access our facility.
  10. give to an unauthorized person or want to become publicly available?"
  11. Other than locking the door when you are finished using a secure lab, you must also set this
  12. A __________ is a program and/or device that monitors data traveling over a
  13. True:False: It is good practice to wear your badge around outside the facility to show good company spirit.
Down
  1. and for stealing information off a network
  2. This must be worn at all times while in the facility with no exceptions
  3. Before entering a secure room you must check your pockets for any ________ devices and place them in the bins
  4. All of this material must be locked up when there is no one in the room
  5. If you unlock a room, what must you take off the door and either hold onto or pass to another program accessed person until the room is locked again.
  6. _________ Is required to take the yearly security training
  7. The strongest password is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca, This_P^zz1e!
  8. Even if someone is cleared at the highest level, they still need this to access a classified program. (3 words)
  9. Every operating system and plugin needs these for good health.
  10. If you are holding a classified meeting in one of the conference rooms, these must be posted on the doors that state there is a classified meeting in progress.
  11. that uses flash memory and is lightweight enough to attach to a key chain. These under no circumstance should ever be brought into a work lab.

24 Clues: of computer systems or networks.and for stealing information off a networkA __________ stick, is a plug-and-play portable storage_________ Is required to take the yearly security trainingThese programs/devices can be used both for legitimate networkEvery operating system and plugin needs these for good health....

Security Awareness Puzzle 2015-02-11

Security Awareness Puzzle crossword puzzle
Across
  1. When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
  2. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  3. Never forward any _________ letter.
  4. Use __________ passwords for the various accounts that you may have.
  5. Email scam or attempt to trick you into giving your password or personal information.
  6. Applied to data to protect it from unauthorized use in case of theft or loss.
  7. Healthy email always includes a clear and specific ____________ line.
  8. Use this tool to dispose of documents that contain personal or financial information.
  9. To protect personal information, avoid sending it via_________.
  10. A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
  11. Do not send __________ information over email unless it is encrypted.
  12. A computer ______ can be considered as the modern counterpart of a paper document.
  13. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
  14. Passwords should be _________ every 3-4 months.
  15. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
  16. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  17. Passwords should always be at least this many characters long.
  18. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
Down
  1. Also known as malicious software; any program or file that is harmful to a computer user.
  2. _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
  3. Never share your _________ with another person.
  4. To ________ the amount of spam you receive, be careful who you give your email address to.
  5. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
  6. A software that is designed to detect and destroy computer viruses.
  7. Do not leave your laptop or computer ____________.
  8. Do not _______ your password down or attach it to your keyword or monitor.
  9. Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
  10. Choose a password that is easy for you to ____________ but hard for someone to guess.
  11. Do not __________ your password or account with anyone.
  12. Bin Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
  13. A password is stronger by using a combination of both upper and lower case ___________.
  14. Always ___________ your computer when you leave your desk.
  15. A secure password should contain at least one of these.
  16. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.

34 Clues: Never forward any _________ letter.Never share your _________ with another person.Passwords should be _________ every 3-4 months.Do not leave your laptop or computer ____________.Do not __________ your password or account with anyone.A secure password should contain at least one of these.Always ___________ your computer when you leave your desk....

Aviation Safety + Security 2023-11-15

Aviation Safety + Security crossword puzzle
Across
  1. when you get on the plane
  2. Making sure you are keeping everyone safe
  3. fly to another country
  4. A place where the plane waits
  5. where the plane takes off and lands
  6. A form of identification to travel internationally
  7. uses them to get identify drugs
  8. Gone through customs/security
  9. when going to a different destination
  10. fly in the same country
Down
  1. Anyone is allowed in this area of airport
  2. what happens when you enter a country without a visa
  3. someone who boards a plane
  4. Something you will need when in an airport or something to do
  5. Flying or operate of an aircraft
  6. A child travelling by themself under the age of 12
  7. Your belongs that you take with you
  8. A place you go when travelling domestic or international
  9. A place you go when you want to relax
  10. when you put your bag through an X-ray

20 Clues: fly to another countryfly in the same countrywhen you get on the planesomeone who boards a planeA place where the plane waitsGone through customs/securityuses them to get identify drugsFlying or operate of an aircraftYour belongs that you take with youwhere the plane takes off and landsA place you go when you want to relax...

Security Crossword Puzzle 2023-03-17

Security Crossword Puzzle crossword puzzle
Across
  1. Use two-factor authentication
  2. Trick people by canceling it
  3. Scare, get person to act
  4. Looks similar to actual site
  5. Tracks typing
  6. intrudes on device remotely
  7. Directly targets
  8. Protects with physical key
  9. Password manager
Down
  1. Trusted person betrays trust
  2. Are unaware device was infiltrated
  3. Protects your device using app
  4. origins with Phreaking
  5. Lengthy enough, complex
  6. Talking to a person for info
  7. Facial recognition, fingeprints, hand, etc
  8. Leaves their device unprotected
  9. Must be used during login
  10. Ethical, useful hackers by testing
  11. Person hijacking your SIM card

20 Clues: Tracks typingDirectly targetsPassword managerorigins with PhreakingLengthy enough, complexScare, get person to actMust be used during loginProtects with physical keyintrudes on device remotelyTrusted person betrays trustTrick people by canceling itTalking to a person for infoLooks similar to actual siteUse two-factor authentication...

Energy & Food Security 2024-03-25

Energy & Food Security crossword puzzle
Across
  1. alcohol produced from plant matter (sugar cane or maize) which can be used as an alternative to petrol
  2. form of power for electricity that is generated by utilizing the energy of the sun
  3. the reliable availability of energy sources at an affordable price with consideration of the environmental impacts
  4. Cause of energy insecurity
  5. resources that will run out and not be replenished for millions of years
  6. impact of energy insecurity
  7. lack of adequate nutrition, caused by not having a balanced diet or enough to eat
  8. another form of energy utilizing the power of water
  9. energy generated from the heat under the surface of Earth
  10. any source of energy that can be naturally and quickly replenished
Down
  1. electricity generated by energy from waves or the tides
  2. suffering or death caused by lack of food
  3. renewable resource that utilizes currents in the atmosphere to generate electricity
  4. to store large amounts of goods or materials
  5. systems that react promptly to sudden changes in the supply-demand balance
  6. supply of energy that is in line with economic developments and environmental needs
  7. extreme scarcity of food
  8. defined as 'when all people, at all time, have physical, social and economic access to sufficient, safe & nutritious food that meets their dietary needs and food preferences for an active and healthy life.
  9. increase in salt content, usually of agricultural soils, irrigation water or drinking water
  10. limit the amount of food each person or family is allowed to purchase
  11. market determines the price of a food product; cause of food insecurity
  12. type of power using radioactive materials such as uranium & plutonium. Power is produced from energy released as materials undergo reactions
  13. gas such as methane that can be used as a fuel & is produced by fermenting organic matter.

23 Clues: extreme scarcity of foodCause of energy insecurityimpact of energy insecuritysuffering or death caused by lack of foodto store large amounts of goods or materialsanother form of energy utilizing the power of waterelectricity generated by energy from waves or the tidesenergy generated from the heat under the surface of Earth...